Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2013-7260 | A remote command execution vulnerability exists in ZPanel version 10.0.0.2 in its htpasswd module. When creating .htaccess files, the inHTUsername field is passed unsanitized to a system() call that invokes the system’s htpasswd binary. By injecting shell metacharacters into the username field, an authenticated attacker can execute arbitrary system commands. Exploitation requires a valid ZPanel account—such as one in the default Users, Resellers, or Administrators groups—but no elevated privileges. |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 21 Nov 2025 08:45:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:zpanel_project:zpanel:*:*:*:*:*:*:*:* |
Tue, 05 Aug 2025 01:15:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 04 Aug 2025 18:30:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Zpanel Project
Zpanel Project zpanel |
|
| Vendors & Products |
Zpanel Project
Zpanel Project zpanel |
Sat, 02 Aug 2025 06:00:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A remote command execution vulnerability exists in ZPanel version 10.0.0.2 in its htpasswd module. When creating .htaccess files, the inHTUsername field is passed unsanitized to a system() call that invokes the system’s htpasswd binary. By injecting shell metacharacters into the username field, an authenticated attacker can execute arbitrary system commands. Exploitation requires a valid ZPanel account—such as one in the default Users, Resellers, or Administrators groups—but no elevated privileges. | |
| Title | ZPanel <= 10.0.0.2 htpasswd Module Username Command Execution | |
| Weaknesses | CWE-78 | |
| References |
|
|
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2025-11-20T23:33:26.446Z
Reserved: 2025-08-01T15:30:06.448Z
Link: CVE-2013-10053
Updated: 2025-08-04T16:04:40.759Z
Status : Awaiting Analysis
Published: 2025-08-01T21:15:27.290
Modified: 2025-08-04T16:15:31.957
Link: CVE-2013-10053
No data.
OpenCVE Enrichment
Updated: 2025-08-04T17:49:33Z
EUVD