Categories: Security News

Multiple Persistent XSS vulnerabilities in CentOS Web Panel

CentOS Web Panel is a Linux based web panel like Cpanel or Plesk and it has a couple of features for server management.

A Client-Side XSS vulnerability detected with CentOS Web Panel Version 0.9.8.12, allows an attacker to inject remote codes into the client-side browser to application requests.

With XSS vulnerability attacker can inject untrusted snippets of JavaScript into your application without validation. This JavaScript is then executed by the victim who is visiting the target site.

The vulnerabilities are located in the `id` and `email_address` parameters of the `index.php` file POST method request. Remote attackers are able to inject script code to the POST method request to manipulate the item listing output context. The request method to inject is POST and the attack vector is persistent on the application-side. The injection points are the both add POST method requests and the execution point occurs in the output location of both modules.

Security Researchers from vulnerability laboratory detected the vulnerability, it allows an attacker to hijack the sessions, Phishing attacks, malicious external redirects.

Also Read All Versions of ASUS Routers Affected by Multiple Vulnerabilities that Allows to Gain Complete Router Access

The vulnerability is categorized as a medium one and the exploitation requires no privileged web-application user account and low user interaction. Researchers published a PoC explaining the vulnerability.

Mitigations – CentOS Web Panel

  • Researchers suggested sanitizing in the vulnerable `id` and `email address` parameters of the index.php file.
  • Disallow special characters and parameter inputs.
AddThis Website Tools
Gurubaran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

Hackers Exploit Node.js to Spread Malware and Exfiltrate Data

Threat actors are increasingly targeting Node.js—a staple tool for modern web developers—to launch sophisticated malware…

25 minutes ago

Oracle Issues Patch for 378 Vulnerabilities in Major Security Rollout

Oracle Corporation has released a sweeping Critical Patch Update (CPU) for April 2025, addressing a…

35 minutes ago

MITRE Ends CVE Program Support – Leaked Internal Memo Confirms Departure

A leaked internal memo dated April 15, 2025, has sent shockwaves through the cybersecurity community,…

1 hour ago

Protecting Against Insider Threats – Strategies for CISOs

Insider threats represent a critical vulnerability in organizational cybersecurity, posing risks that are often more…

1 hour ago

Zeek Deployments Rise Across SOCs For Enhanced Network Visibility

Zeek, formerly known as Bro, has established itself as a leading open-source network security monitoring…

1 hour ago

Critical Chrome Vulnerability Exposes Users to Data Theft and Unauthorized Access

A critical security vulnerability has been discovered in Google Chrome, prompting an urgent update as…

2 hours ago