Home

Description

1Panel is an open-source, web-based control panel for Linux server management. Versions 2.0.13 and below allow an unauthenticated attacker to disable CAPTCHA verification by abusing a client-controlled parameter. Because the server previously trusted this value without proper validation, CAPTCHA protections can be bypassed, enabling automated login attempts and significantly increasing the risk of account takeover (ATO). This issue is fixed in version 2.0.14.

PUBLISHED Reserved 2025-12-03 | Published 2025-12-09 | Updated 2025-12-09 | Assigner GitHub_M




HIGH: 7.5CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Problem types

CWE-602: Client-Side Enforcement of Server-Side Security

CWE-807: Reliance on Untrusted Inputs in a Security Decision

CWE-290: Authentication Bypass by Spoofing

Product status

< 2.0.14
affected

References

github.com/...1Panel/security/advisories/GHSA-qmg5-v42x-qqhq

github.com/...ommit/ac43f00273be745f8d04b90b6e2b9c1a40ef7bca

github.com/1Panel-dev/1Panel/releases/tag/v2.0.14

cve.org (CVE-2025-66507)

nvd.nist.gov (CVE-2025-66507)

Download JSON