Home

Description

1Panel versions 1.10.33 - 2.0.15 contain a cross-site request forgery (CSRF) vulnerability in the web port configuration functionality. The port-change endpoint lacks CSRF defenses such as anti-CSRF tokens or Origin/Referer validation. An attacker can craft a malicious webpage that submits a port-change request; when a victim visits it while authenticated, the browser includes valid session cookies and the request succeeds. This allows an attacker to change the port on which the 1Panel web service listens, causing loss of access on the original port and resulting in service disruption or denial of service, and may unintentionally expose the service on an attacker-chosen port.

PUBLISHED Reserved 2025-04-15 | Published 2025-12-10 | Updated 2025-12-11 | Assigner VulnCheck




HIGH: 7.0CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-352 Cross-Site Request Forgery (CSRF)

Product status

Default status
unknown

1.10.33 (semver)
affected

Credits

av01t3x finder

References

github.com/1Panel-dev/1Panel/releases product

1panel.pro/ product

www.vulncheck.com/...anel-csrf-web-port-configuration-change third-party-advisory

cve.org (CVE-2025-34429)

nvd.nist.gov (CVE-2025-34429)

Download JSON