CVE-2025-56413

8.8 HIGH

📋 TL;DR

This CVE describes an OS command injection vulnerability in 1panel's SSH operation function that allows attackers to execute arbitrary commands on the server. Attackers can exploit this by sending specially crafted requests to the vulnerable API endpoint. All systems running the affected 1panel version are at risk.

💻 Affected Systems

Products:
  • 1panel
Versions: 2.0.8
Operating Systems: Linux
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the default configuration of 1panel 2.0.8 when the SSH operation functionality is enabled.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to execute arbitrary commands with the privileges of the 1panel process, potentially leading to data theft, ransomware deployment, or persistent backdoor installation.

🟠

Likely Case

Unauthorized command execution leading to data exfiltration, lateral movement within the network, or service disruption.

🟢

If Mitigated

Limited impact if proper network segmentation and least privilege principles are implemented, though the vulnerability still provides initial access.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authentication to the 1panel interface. The vulnerability is in a core SSH management function that attackers with valid credentials can access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.0.9 or later

Vendor Advisory: https://github.com/1Panel-dev/1Panel

Restart Required: Yes

Instructions:

1. Backup your 1panel configuration and data. 2. Update 1panel to version 2.0.9 or later using the built-in update mechanism or manual installation. 3. Restart the 1panel service. 4. Verify the update was successful.

🔧 Temporary Workarounds

Disable SSH Operations

linux

Temporarily disable SSH operation functionality in 1panel to prevent exploitation.

# Modify 1panel configuration to disable SSH operations
# Check 1panel documentation for specific configuration options

Network Access Control

linux

Restrict access to the 1panel API endpoint to trusted IP addresses only.

# Example using iptables
iptables -A INPUT -p tcp --dport 1panel_port -s trusted_ip -j ACCEPT
iptables -A INPUT -p tcp --dport 1panel_port -j DROP

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate 1panel instances from critical systems
  • Apply principle of least privilege to 1panel service accounts and monitor for suspicious activity

🔍 How to Verify

Check if Vulnerable:

Check if 1panel version is 2.0.8 by accessing the web interface or checking the installation directory.

Check Version:

docker exec 1panel cat /opt/1panel/version || cat /opt/1panel/version

Verify Fix Applied:

Verify the version has been updated to 2.0.9 or later in the 1panel web interface or via version check command.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SSH operation requests in 1panel logs
  • Suspicious command execution patterns in system logs
  • Multiple failed authentication attempts followed by SSH operations

Network Indicators:

  • Unusual outbound connections from 1panel server
  • Traffic to the /api/v2/hosts/ssh/operate endpoint with suspicious parameters

SIEM Query:

source="1panel" AND (uri_path="/api/v2/hosts/ssh/operate" AND operation="*") OR (process="bash" OR process="sh" AND parent_process="1panel")

🔗 References

📤 Share & Export