Authentication Bypass Vulnerability in CyberPanel by Etherparty
CVE-2026-41473

8.8HIGH

Key Information:

Vendor

Usmannasir

Vendor
CVE Published:
24 April 2026

Badges

๐Ÿ‘พ Exploit Exists๐ŸŸก Public PoC

What is CVE-2026-41473?

CyberPanel versions before 2.4.4 are exposed to an authentication bypass vulnerability that affects the AI Scanner worker API endpoints. This flaw enables unauthenticated remote attackers to gain unauthorized access and potentially write arbitrary data to the database. By manipulating requests sent to the /api/ai-scanner/status-webhook and /api/ai-scanner/callback endpoints, attackers can exploit the absence of proper authentication checks. This could result in denial of service through storage exhaustion, corruption of scan history records, and the injection of malicious data into database fields.

Affected Version(s)

cyberpanel 0 < 2.4.4

cyberpanel 0a099b1b193946555fbdd387a28486b1521f9961

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V4

Score:
8.8
Severity:
HIGH
Confidentiality:
None
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • ๐ŸŸก

    Public PoC available

  • ๐Ÿ‘พ

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

Djibril Mounkoro
.