Home

Description

1Panel versions 1.10.33 - 2.0.15 contain a cross-site request forgery (CSRF) vulnerability in the Change Username functionality available from the settings panel (/settings/panel). The endpoint does not implement CSRF protections such as anti-CSRF tokens or Origin/Referer validation. An attacker can craft a malicious webpage that submits a username-change request; when a victim visits the page while authenticated, the browser includes valid session cookies and the request succeeds. This allows an attacker to change the victim’s 1Panel username without consent. After the change, the victim is logged out and unable to log in with the previous username, resulting in account lockout and denial of service.

PUBLISHED Reserved 2025-04-15 | Published 2025-12-10 | Updated 2025-12-10 | Assigner VulnCheck




HIGH: 7.0CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-352 Cross-Site Request Forgery (CSRF)

Product status

Default status
unaffected

1.10.33 (semver)
affected

Credits

av01t3x finder

References

github.com/1Panel-dev/1Panel/releases product

1panel.pro/ product

www.vulncheck.com/...me-functionality-allows-account-lockout third-party-advisory

cve.org (CVE-2025-34410)

nvd.nist.gov (CVE-2025-34410)

Download JSON