CVE-2025-48703

9.0 CRITICAL CISA KEV

📋 TL;DR

CVE-2025-48703 allows unauthenticated attackers to execute arbitrary commands on CWP (Control Web Panel) servers by injecting shell metacharacters into the t_total parameter. This affects all CWP installations before version 0.9.8.1205 where a valid non-root username is known to the attacker.

💻 Affected Systems

Products:
  • Control Web Panel (CWP)
  • CentOS Web Panel
Versions: All versions before 0.9.8.1205
Operating Systems: CentOS, RHEL, AlmaLinux, Rocky Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Requires knowledge of a valid non-root username on the system, which can often be guessed or discovered through enumeration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with root-level access, data theft, ransomware deployment, and complete server takeover.

🟠

Likely Case

Unauthenticated remote code execution leading to web shell installation, data exfiltration, and lateral movement within the network.

🟢

If Mitigated

Limited impact if proper network segmentation, WAF rules, and intrusion detection are in place to block exploitation attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit code is publicly available and actively used in attacks. CISA has added this to their Known Exploited Vulnerabilities catalog.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 0.9.8.1205

Vendor Advisory: https://control-webpanel.com/changelog

Restart Required: No

Instructions:

1. Log into CWP admin panel. 2. Navigate to Updates section. 3. Click 'Update' to install version 0.9.8.1205 or later. 4. Verify update completes successfully.

🔧 Temporary Workarounds

Block vulnerable endpoint

linux

Temporarily block access to the vulnerable filemanager endpoint via web server configuration

# For Apache: add to .htaccess or virtual host config
RewriteEngine On
RewriteRule ^/filemanager/changePerm - [F]

Restrict network access

linux

Limit access to CWP admin interface to trusted IP addresses only

# iptables example
sudo iptables -A INPUT -p tcp --dport 2030 -s TRUSTED_IP -j ACCEPT
sudo iptables -A INPUT -p tcp --dport 2030 -j DROP

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate CWP servers from critical systems
  • Deploy web application firewall (WAF) rules to block shell metacharacters in t_total parameter

🔍 How to Verify

Check if Vulnerable:

Check CWP version via admin panel or run: grep 'CWP_VERSION' /usr/local/cwpsrv/htdocs/resources/admin/include/version.php

Check Version:

grep 'CWP_VERSION' /usr/local/cwpsrv/htdocs/resources/admin/include/version.php

Verify Fix Applied:

Confirm version is 0.9.8.1205 or higher in admin dashboard or via version.php file

📡 Detection & Monitoring

Log Indicators:

  • POST requests to /filemanager/changePerm with shell metacharacters in parameters
  • Unusual process execution from web server user

Network Indicators:

  • HTTP requests containing t_total parameter with characters like ;, |, &, $, (, )
  • Outbound connections from web server to suspicious IPs

SIEM Query:

source="web_logs" AND uri_path="/filemanager/changePerm" AND (t_total="*;*" OR t_total="*|*" OR t_total="*&*" OR t_total="*$(*)")

🔗 References

📤 Share & Export