CVE-2025-54424
📋 TL;DR
CVE-2025-54424 is a certificate validation bypass vulnerability in 1Panel web interface that allows attackers to intercept HTTPS communications between Core and Agent endpoints. This leads to unauthorized access to administrative interfaces, which can result in remote code execution due to high-privilege command execution capabilities. All 1Panel installations running versions 2.0.5 and below on Linux servers are affected.
💻 Affected Systems
- 1Panel
📦 What is this software?
1panel by Fit2cloud
⚠️ Risk & Real-World Impact
Worst Case
Full server compromise via remote code execution, allowing attacker to execute arbitrary commands with root privileges, access all managed services (websites, containers, databases, LLMs), and potentially pivot to other systems.
Likely Case
Unauthorized administrative access leading to data theft, service disruption, and lateral movement within the managed environment.
If Mitigated
Limited impact with proper network segmentation and certificate pinning, potentially only allowing denial of service or information disclosure.
🎯 Exploit Status
Exploitation requires man-in-the-middle position or ability to intercept network traffic between Core and Agent components. The vulnerability bypasses certificate validation, making standard TLS interception techniques effective.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 2.0.6
Vendor Advisory: https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-8j63-96wh-wh3j
Restart Required: Yes
Instructions:
1. Backup current configuration and data. 2. Stop 1Panel service. 3. Update to version 2.0.6 using the official update mechanism or manual installation. 4. Restart 1Panel service. 5. Verify the update was successful.
🔧 Temporary Workarounds
Network Segmentation
linuxIsolate 1Panel Core and Agent communication to a dedicated, trusted network segment to prevent man-in-the-middle attacks.
# Configure firewall rules to restrict traffic between Core and Agent endpoints
iptables -A INPUT -s <agent_ip> -p tcp --dport <core_port> -j ACCEPT
iptables -A INPUT -p tcp --dport <core_port> -j DROP
Certificate Pinning
linuxImplement certificate pinning to harden TLS validation between Core and Agent components.
# Modify 1Panel configuration to enforce specific certificates
# This requires custom configuration based on your deployment
🧯 If You Can't Patch
- Implement strict network access controls to limit communication between Core and Agent endpoints to trusted IPs only.
- Monitor network traffic between Core and Agent for unusual patterns or unauthorized certificate usage.
🔍 How to Verify
Check if Vulnerable:
Check 1Panel version via web interface or command line. Versions 2.0.5 and below are vulnerable.
Check Version:
1panel version
Verify Fix Applied:
Verify version is 2.0.6 or higher and test certificate validation by attempting to intercept Core-Agent communication with invalid certificates.
📡 Detection & Monitoring
Log Indicators:
- Failed certificate validation attempts in 1Panel logs
- Unusual administrative actions from unexpected IP addresses
- Multiple authentication failures followed by successful access
Network Indicators:
- TLS handshake failures between Core and Agent endpoints
- Unencrypted or improperly encrypted traffic on Core-Agent ports
- Traffic from unexpected sources to Core management ports
SIEM Query:
source="1panel.logs" AND ("certificate validation failed" OR "TLS handshake error") OR source="firewall" AND dest_port IN (443, <core_port>) AND action="allow" AND NOT src_ip IN (trusted_ips)
🔗 References
- https://github.com/1Panel-dev/1Panel/pull/9698/commits/4003284521f8d31ddaf7215d1c30ab8b4cdb0261
- https://github.com/1Panel-dev/1Panel/releases/tag/v2.0.6
- https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-8j63-96wh-wh3j
- https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-8j63-96wh-wh3j