CVE-2025-50927

6.3 MEDIUM

📋 TL;DR

This reflected XSS vulnerability in EHCP v20.04.1.b allows authenticated attackers to inject malicious JavaScript via the ftpusername parameter, which executes in victims' browsers. It affects EHCP users with FTP user management access. Attackers could steal session cookies, redirect users, or perform actions on their behalf.

💻 Affected Systems

Products:
  • EHCP (Easy Hosting Control Panel)
Versions: v20.04.1.b
Operating Systems: Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to the List All FTP User function. All default installations with this version are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Authenticated attacker steals administrator session cookies, gains full control of EHCP panel, compromises hosted websites, and potentially accesses underlying server.

🟠

Likely Case

Attacker steals session cookies of other authenticated users, performs unauthorized actions within their permissions, or redirects to phishing sites.

🟢

If Mitigated

Attack limited to stealing low-privilege user sessions if proper input validation and output encoding are implemented.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires authenticated access and social engineering to trick victims into clicking malicious links.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for patched version

Vendor Advisory: https://www.ehcp.net/?p=402

Restart Required: No

Instructions:

1. Check EHCP vendor advisory for patched version. 2. Update to the latest version. 3. Verify the fix by testing the vulnerable parameter.

🔧 Temporary Workarounds

Input Validation Filter

all

Implement server-side input validation to reject malicious characters in ftpusername parameter

Output Encoding

all

Apply proper HTML entity encoding to user-controlled data before rendering in browser

🧯 If You Can't Patch

  • Implement WAF rules to block XSS payloads in ftpusername parameter
  • Restrict access to EHCP panel to trusted IP addresses only

🔍 How to Verify

Check if Vulnerable:

Test by injecting <script>alert('XSS')</script> into ftpusername parameter and checking if script executes

Check Version:

Check EHCP version in admin panel or configuration files

Verify Fix Applied:

Attempt same XSS payload after patching - script should not execute and should be properly encoded

📡 Detection & Monitoring

Log Indicators:

  • Unusual characters like <script> in ftpusername parameter logs
  • Multiple failed login attempts followed by XSS payloads

Network Indicators:

  • HTTP requests with suspicious JavaScript in ftpusername parameter
  • Unusual redirects from EHCP panel

SIEM Query:

source="ehcp_logs" AND (ftpusername CONTAINS "<script>" OR ftpusername CONTAINS "javascript:")

🔗 References

📤 Share & Export