CVE-2025-34410

7.1 HIGH

📋 TL;DR

This CSRF vulnerability in 1Panel allows attackers to change authenticated users' usernames without consent via malicious webpages. When exploited, victims are logged out and locked out of their accounts, causing denial of service. All 1Panel users running affected versions are vulnerable.

💻 Affected Systems

Products:
  • 1Panel
Versions: 1.10.33 through 2.0.15
Operating Systems: Linux
Default Config Vulnerable: ⚠️ Yes
Notes: All installations with web interface accessible are vulnerable; no special configuration required.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Administrator account lockout leading to complete loss of 1Panel management access, requiring manual recovery or reinstallation.

🟠

Likely Case

Individual user account lockout requiring administrator intervention to restore access via backend database changes.

🟢

If Mitigated

No impact if proper CSRF protections are implemented or workarounds are applied.

🌐 Internet-Facing: HIGH - Web-based attack requiring only victim to visit malicious page while authenticated.
🏢 Internal Only: MEDIUM - Still exploitable via internal phishing or compromised internal sites.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires victim to be authenticated and visit malicious page; simple HTML form can trigger the attack.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.0.16 or later

Vendor Advisory: https://github.com/1Panel-dev/1Panel/releases

Restart Required: Yes

Instructions:

1. Backup current configuration. 2. Update to version 2.0.16 or later via 1Panel update interface or manual installation. 3. Restart 1Panel service.

🔧 Temporary Workarounds

Disable username change functionality

linux

Remove or restrict access to the vulnerable endpoint

# Modify nginx/apache config to block /settings/panel endpoint
# Or implement web application firewall rule

Implement reverse proxy CSRF protection

linux

Add CSRF token validation at reverse proxy level

# Configure nginx with $http_x_csrf_token validation
# Or use mod_security with anti-CSRF rules

🧯 If You Can't Patch

  • Restrict 1Panel access to trusted networks only using firewall rules
  • Implement strict SameSite cookie policies and use browser extensions that block CSRF

🔍 How to Verify

Check if Vulnerable:

Check if version is between 1.10.33 and 2.0.15 inclusive via 1Panel dashboard or version file

Check Version:

cat /opt/1panel/version.txt || docker exec 1panel cat /opt/1panel/version.txt

Verify Fix Applied:

Confirm version is 2.0.16 or later and test username change functionality with missing CSRF token

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed login attempts from same user after username change
  • Username modification requests without referrer headers

Network Indicators:

  • POST requests to /settings/panel without CSRF tokens
  • Cross-origin requests to 1Panel endpoints

SIEM Query:

source="1panel" AND (uri_path="/settings/panel" AND http_method="POST") | stats count by src_ip, user

🔗 References

📤 Share & Export