Command Execution Vulnerability in CyberPanel by CyberPanel Technologies
CVE-2021-47949
Key Information:
- Vendor
Cyberpanel
- Status
- Vendor
- CVE Published:
- 10 May 2026
Badges
What is CVE-2021-47949?
CyberPanel 2.1 is affected by a command execution vulnerability that enables authenticated attackers to exploit symlink attacks via the filemanager controller endpoint. By manipulating the completeStartingPath parameter in POST requests directed to /filemanager/controller, adversaries can create symbolic links allowing them to read sensitive files, including database credentials. Furthermore, through the /websites/fetchFolderDetails endpoint, attackers can execute arbitrary shell commands, potentially compromising the integrity of the system.
Affected Version(s)
CyberPanel <= 2.1
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved
