An issue was discovered in Control Web Panel (CWP) before 0.9.8.1209. User input passed via the "key" GET parameter to /admin/index.php (when the "api" parameter is set) is not properly sanitized before being used to execute OS commands. This can be exploited by unauthenticated attackers to inject and execute arbitrary OS commands with the privileges of root on the web server. Softaculous or SitePad must be present.
History

Fri, 08 May 2026 08:00:00 +0000

Type Values Removed Values Added
Title Unauthenticated OS Command Injection via 'key' API Parameter in Control Web Panel before v0.9.8.1209
Weaknesses CWE-78

Fri, 08 May 2026 07:30:00 +0000

Type Values Removed Values Added
References

Fri, 08 May 2026 06:30:00 +0000

Type Values Removed Values Added
Description An issue was discovered in Control Web Panel (CWP) before 0.9.8.1209. User input passed via the "key" GET parameter to /admin/index.php (when the "api" parameter is set) is not properly sanitized before being used to execute OS commands. This can be exploited by unauthenticated attackers to inject and execute arbitrary OS commands with the privileges of root on the web server. Softaculous or SitePad must be present.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-05-08T05:52:30.620Z

Reserved: 2025-12-12T00:00:00.000Z

Link: CVE-2025-67888

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-08T07:16:28.487

Modified: 2026-05-08T07:16:28.487

Link: CVE-2025-67888

cve-icon Redhat

No data.