CVE-2021-47949 PUBLISHED

CyberPanel 2.1 Authenticated Remote Code Execution via Symlink Attack

Assigner: VulnCheck
Reserved: 01.02.2026 Published: 10.05.2026 Updated: 10.05.2026

CyberPanel 2.1 contains a command execution vulnerability that allows authenticated attackers to read arbitrary files and execute remote code by exploiting symlink attacks through the filemanager controller endpoint. Attackers can manipulate the completeStartingPath parameter in POST requests to /filemanager/controller to create symbolic links, read sensitive files like database credentials, and execute arbitrary shell commands through the /websites/fetchFolderDetails endpoint.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
CVSS Score: 8.7

Product Status

Vendor Cyberpanel
Product CyberPanel
Versions
  • Version <= 2.1 is affected

Credits

  • Numan Türle finder

References

Problem Types

  • Improper Link Resolution Before File Access ('Link Following') CWE