1panel-exploit

Fail

Audited by Gen Agent Trust Hub on Apr 22, 2026

Risk Level: HIGHREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONDATA_EXFILTRATIONEXTERNAL_DOWNLOADS
Full Analysis
  • [REMOTE_CODE_EXECUTION]: The skill includes a functional Python exploit (scripts/CVE-2025-54424.py) that leverages an mTLS certificate bypass to gain an interactive root shell via a WebSocket terminal endpoint on 1Panel instances. This script automates certificate generation and communication to establish an unauthorized shell session.
  • [COMMAND_EXECUTION]: Detailed exploitation procedures are provided for CVE-2024-39911 and CVE-2024-39907 in references/cve-exploits.md. These procedures use SQL injection techniques (specifically ATTACH DATABASE) to write arbitrary PHP webshells to the target server's web root, enabling persistent remote command execution.
  • [DATA_EXFILTRATION]: The file references/file-read-and-defense.md documents how to exploit a path traversal vulnerability to read sensitive system files. Provided payloads target the retrieval of SSH private keys (/root/.ssh/id_rsa), system user information (/etc/passwd), and application configuration files (app.yaml) containing database credentials.
  • [EXTERNAL_DOWNLOADS]: The provided exploit script requires the installation of external Python libraries including requests, websocket-client, and cryptography to perform its network operations and cryptographic bypasses.
Recommendations
  • AI detected serious security threats
Audit Metadata
Risk Level
HIGH
Analyzed
Apr 22, 2026, 10:07 AM