Home

Description

dpanel is an open source server management panel written in Go. In versions 1.2.0 through 1.7.2, dpanel allows authenticated users to read arbitrary files from the server via the /api/app/compose/get-from-uri API endpoint. The vulnerability exists in the GetFromUri function in app/application/http/controller/compose.go, where the uri parameter is passed directly to os.ReadFile without proper validation or access control. A logged-in attacker can exploit this flaw to read sensitive files from the host system, leading to information disclosure. No patched version is available as of this writing.

PUBLISHED Reserved 2025-06-27 | Published 2025-08-22 | Updated 2025-08-22 | Assigner GitHub_M




MEDIUM: 4.8CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N/E:P

Problem types

CWE-73: External Control of File Name or Path

CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Product status

>= 1.2.0, <= 1.7.2
affected

References

github.com/...dpanel/security/advisories/GHSA-gcqf-pxgg-gw8q

cve.org (CVE-2025-53363)

nvd.nist.gov (CVE-2025-53363)

Download JSON