GHSA-wrvc-x3wf-j5f5

Suggest an improvement
Source
https://github.com/advisories/GHSA-wrvc-x3wf-j5f5
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/12/GHSA-wrvc-x3wf-j5f5/GHSA-wrvc-x3wf-j5f5.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-wrvc-x3wf-j5f5
Aliases
  • CVE-2025-34429
Published
2025-12-10T21:31:32Z
Modified
2025-12-10T22:11:16.904573Z
Severity
  • 7.0 (High) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N CVSS Calculator
Summary
1Panel contains a cross-site request forgery (CSRF) vulnerability in the web port configuration functionality
Details

1Panel versions 1.10.33 - 2.0.15 contain a cross-site request forgery (CSRF) vulnerability in the web port configuration functionality. The port-change endpoint lacks CSRF defenses such as anti-CSRF tokens or Origin/Referer validation. An attacker can craft a malicious webpage that submits a port-change request; when a victim visits it while authenticated, the browser includes valid session cookies and the request succeeds. This allows an attacker to change the port on which the 1Panel web service listens, causing loss of access on the original port and resulting in service disruption or denial of service, and may unintentionally expose the service on an attacker-chosen port.

Database specific
{
    "cwe_ids": [
        "CWE-352"
    ],
    "github_reviewed_at": "2025-12-10T21:55:56Z",
    "severity": "HIGH",
    "nvd_published_at": "2025-12-10T19:16:13Z",
    "github_reviewed": true
}
References

Affected packages

Go / github.com/1Panel-dev/1Panel

Package

Name
github.com/1Panel-dev/1Panel
View open source insights on deps.dev
Purl
pkg:golang/github.com/1Panel-dev/1Panel

Affected ranges

Type
SEMVER
Events
Introduced
1.10.33
Last affected
2.0.15