CVE-2025-49618

5.8 MEDIUM

📋 TL;DR

This vulnerability in Plesk Obsidian allows unauthenticated attackers to access AWS credentials via a specific endpoint. It affects Plesk Obsidian 18.0.69 installations that use AWS integration. Attackers can obtain AWS access keys, potentially leading to unauthorized cloud resource access.

💻 Affected Systems

Products:
  • Plesk Obsidian
Versions: 18.0.69
Operating Systems: Linux, Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with AWS integration configured. The vulnerability is in the web interface component.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers obtain AWS credentials and gain full control over associated AWS resources, leading to data theft, resource hijacking, or service disruption.

🟠

Likely Case

Attackers harvest AWS credentials and use them for unauthorized API calls, potentially incurring costs or accessing sensitive cloud data.

🟢

If Mitigated

With proper AWS IAM policies and monitoring, impact is limited to credential exposure without significant resource compromise.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple HTTP GET request to /login_up.php reveals credentials. No authentication required.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 18.0.70 or later

Vendor Advisory: https://www.plesk.com/blog/plesk-news-announcements/plesk-obsidian-18-0-69-is-here/

Restart Required: No

Instructions:

1. Log into Plesk admin panel. 2. Navigate to Tools & Settings > Updates and Upgrades. 3. Click 'Check for Updates'. 4. Install available updates to version 18.0.70 or higher.

🔧 Temporary Workarounds

Block vulnerable endpoint

all

Temporarily block access to /login_up.php via web server configuration

# For Apache: add to .htaccess or virtual host config
RewriteEngine On
RewriteRule ^login_up\.php$ - [F,L]
# For Nginx: add to server block
location = /login_up.php { deny all; }

Rotate AWS credentials

all

Immediately rotate all AWS access keys used by Plesk

# 1. Log into AWS Console
# 2. Navigate to IAM > Users
# 3. Find Plesk user
# 4. Create new access key
# 5. Update Plesk with new credentials
# 6. Delete old access key

🧯 If You Can't Patch

  • Implement network-level access controls to restrict access to Plesk admin interface
  • Enable AWS CloudTrail logging and set up alerts for unauthorized API calls

🔍 How to Verify

Check if Vulnerable:

Send HTTP GET request to https://[plesk-server]/login_up.php and check if AWS credentials are returned in response

Check Version:

plesk version

Verify Fix Applied:

After update, same request should return error or no credentials. Check Plesk version is 18.0.70+

📡 Detection & Monitoring

Log Indicators:

  • Multiple unauthenticated requests to /login_up.php
  • Unusual AWS API calls from Plesk credentials

Network Indicators:

  • HTTP GET requests to /login_up.php from external IPs
  • Outbound connections to AWS services from unexpected locations

SIEM Query:

source="plesk_access.log" AND uri="/login_up.php" AND status=200

🔗 References

📤 Share & Export