CVE-2025-66430

9.1 CRITICAL

📋 TL;DR

CVE-2025-66430 is an incorrect access control vulnerability in Plesk's Password Protected Directories feature that allows authenticated Plesk users to escalate privileges and gain root-level access to the server. This affects Plesk 18.0 installations with the vulnerable feature enabled. Attackers can compromise the entire server if they have any Plesk user account.

💻 Affected Systems

Products:
  • Plesk
Versions: 18.0
Operating Systems: Linux, Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Password Protected Directories feature to be enabled, which is commonly used for web directory protection.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full server compromise with root access, allowing complete control over the system, data theft, installation of persistent backdoors, and lateral movement to other systems.

🟠

Likely Case

Authenticated attackers with Plesk accounts gain root privileges, enabling them to access all customer data, modify configurations, and install malicious software.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to specific directories, but privilege escalation risk remains if exploited.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access to Plesk, but the vulnerability is straightforward to exploit once authenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Plesk 18.0.60 or later

Vendor Advisory: https://support.plesk.com/hc/en-us/articles/36261922405015

Restart Required: No

Instructions:

1. Log into Plesk admin panel. 2. Navigate to Tools & Settings > Updates and Upgrades. 3. Install all available updates. 4. Verify version is 18.0.60 or higher.

🔧 Temporary Workarounds

Disable Password Protected Directories

linux

Temporarily disable the vulnerable feature until patching is possible

plesk bin extension --disable password-protected-directories

🧯 If You Can't Patch

  • Restrict Plesk user accounts to only trusted administrators
  • Implement network segmentation to isolate Plesk servers from critical infrastructure

🔍 How to Verify

Check if Vulnerable:

Check Plesk version and if Password Protected Directories extension is enabled in Plesk admin panel

Check Version:

plesk version

Verify Fix Applied:

Verify Plesk version is 18.0.60 or higher and test privilege escalation attempts fail

📡 Detection & Monitoring

Log Indicators:

  • Unusual root-level commands from Plesk users
  • Unauthorized access to protected directories
  • Privilege escalation attempts in system logs

Network Indicators:

  • Unexpected outbound connections from Plesk server
  • Unusual authentication patterns to Plesk admin interface

SIEM Query:

source="plesk.log" AND ("privilege escalation" OR "root access" OR "unauthorized directory access")

🔗 References

📤 Share & Export