CVE-2025-53534
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-08-05

Last updated on: 2025-08-06

Assigner: GitHub, Inc.

Description
RatPanel is a server operation and maintenance management panel. In versions 2.3.19 through 2.5.5, when an attacker obtains the backend login path of RatPanel (including but not limited to weak default paths, brute-force cracking, etc.), they can execute system commands or take over hosts managed by the panel without logging in. In addition to this remote code execution (RCE) vulnerability, the flawed code also leads to unauthorized access. RatPanel uses the CleanPath middleware provided by github.com/go-chi/chi package to clean URLs, but but the middleware does not process r.URL.Path, which can cause the paths to be misinterpreted. This is fixed in version 2.5.6.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-08-05
Last Modified
2025-08-06
Generated
2026-05-06
AI Q&A
2025-08-05
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 44 associated CPEs
Vendor Product Version / Range
tnborg ratpanel 2.3.34
tnborg ratpanel 2.3.37
tnborg ratpanel 2.3.32
tnborg ratpanel 2.5.4
tnborg ratpanel 2.5.6
tnborg ratpanel 2.3.36
tnborg ratpanel 2.3.50
tnborg ratpanel 2.3.33
tnborg ratpanel 2.3.40
tnborg ratpanel 2.3.45
tnborg ratpanel 2.3.30
tnborg ratpanel 2.3.39
tnborg ratpanel 2.3.53
tnborg ratpanel 2.3.19
tnborg ratpanel 2.3.38
tnborg ratpanel 2.3.20
tnborg ratpanel 2.3.21
tnborg ratpanel 2.3.22
tnborg ratpanel 2.5.0
tnborg ratpanel 2.3.42
tnborg ratpanel 2.3.26
tnborg ratpanel 2.3.52
tnborg ratpanel 2.5.2
tnborg ratpanel 2.5.3
tnborg ratpanel 2.5.1
tnborg ratpanel 2.3.25
tnborg ratpanel 2.3.44
tnborg ratpanel 2.3.31
tnborg ratpanel 2.3.46
tnborg ratpanel 2.3.51
tnborg ratpanel 2.3.24
tnborg ratpanel 2.3.29
tnborg ratpanel 2.3.47
tnborg ratpanel 2.3.54
tnborg ratpanel 2.3.28
tnborg ratpanel 2.3.27
tnborg ratpanel 2.3.43
tnborg ratpanel 2.3.35
tnborg ratpanel 2.3.48
tnborg ratpanel 2.3.49
tnborg ratpanel 2.3.41
tnborg ratpanel 2.3.55
tnborg ratpanel 2.3.23
tnborg ratpanel 2.5.5
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-305 The authentication algorithm is sound, but the implemented mechanism can be bypassed as the result of a separate weakness that is primary to the authentication error.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability affects RatPanel versions 2.3.19 through 2.5.5. If an attacker discovers the backend login path of RatPanel, for example through weak default paths or brute-force attacks, they can execute system commands or take over the hosts managed by the panel without needing to log in. The issue arises because the CleanPath middleware used to clean URLs does not process r.URL.Path correctly, causing path misinterpretation. This flaw allows unauthorized access and remote code execution. The vulnerability is fixed in version 2.5.6.


How can this vulnerability impact me? :

This vulnerability can lead to severe impacts including unauthorized access to the system, remote code execution, and full takeover of hosts managed by RatPanel. Attackers can execute arbitrary system commands without authentication, potentially compromising the confidentiality, integrity, and availability of the affected systems.


What immediate steps should I take to mitigate this vulnerability?

Upgrade RatPanel to version 2.5.6 or later, as this version fixes the vulnerability related to URL path processing and prevents unauthorized access and remote code execution.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart