Home

Description

CyberPanel versions prior to 2.4.4 contain a stored cross-site scripting vulnerability in the AI Scanner dashboard where the POST /api/ai-scanner/callback endpoint lacks authentication and allows unauthenticated attackers to inject malicious JavaScript by overwriting the findings_json field of ScanHistory records. Attackers can inject JavaScript that executes in an administrator's authenticated session when they visit the AI Scanner dashboard, allowing them to issue same-origin requests to plant cron jobs and achieve remote code execution on the server.

PUBLISHED Reserved 2026-04-20 | Published 2026-04-24 | Updated 2026-04-27 | Assigner VulnCheck




MEDIUM: 5.3CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:N/SC:H/SI:H/SA:N

Problem types

CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Product status

Default status
unaffected

Any version before 2.4.4
affected

0a099b1b193946555fbdd387a28486b1521f9961 (git)
unaffected

Credits

Djibril Mounkoro finder

References

itsrez.re/post/cyberpanel-rce technical-description exploit

github.com/...ommit/0a099b1b193946555fbdd387a28486b1521f9961 patch

www.vulncheck.com/...nel-stored-xss-via-ai-scanner-dashboard third-party-advisory

cve.org (CVE-2026-41472)

nvd.nist.gov (CVE-2026-41472)

Download JSON