CyberPanel RCE Alert: Patch Now or Face Hack-tastrophe!
CyberPanel versions 2.3.5 and 2.3.6 are hilariously vulnerable to unauthenticated remote code execution. If you’re feeling nostalgic for the days of living dangerously, feel free to test this exploit on your next vacation to “Oops-I-Did-It-Again” land. Just remember, patching is the new black. CVE-2024-51378.

Hot Take:
Who knew that running an outdated version of CyberPanel could turn your server into the latest hangout spot for hackers? It’s like pulling out the red carpet for a security breach! Looks like the only thing remotely executed here is my patience for anyone who hasn’t patched their software.
Key Points:
- CyberPanel versions 2.3.5, 2.3.6, and 2.3.7 are vulnerable to unauthenticated Remote Code Execution (RCE).
- The exploit was discovered by Luka Petrovic and identified as CVE-2024-51378.
- The vulnerability affects endpoints like “/ftp/getresetstatus” and “/dns/getresetstatus”.
- This exploit allows attackers to run malicious code without needing to log in.
- A patch is available; users should update to safeguard their systems.
Already a member? Log in here