We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
ZPanel includes a helper binary named zsudo, intended to allow restricted privilege escalation for administrative tasks. However, when misconfigured in /etc/sudoers, zsudo can be invoked by low-privileged users to execute arbitrary commands as root. This flaw enables local attackers with shell access to escalate privileges by writing a payload to a writable directory and executing it via zsudo. The vulnerability is particularly impactful in post-exploitation scenarios following web server compromise, where the attacker inherits access to zsudo.
Reserved 2025-08-01 | Published 2025-08-04 | Updated 2025-08-04 | Assigner VulnCheckCWE-269 Improper Privilege Management
sinn3r
juan vazquez
raw.githubusercontent.com/...its/linux/local/zpanel_zsudo.rb
www.exploit-db.com/exploits/26451
github.com/zpanel/zpanelx
www.vulncheck.com/advisories/zpanel-zsudo-local-priv-esc
Support options