CVE-2025-53534
BaseFortify
Publication date: 2025-08-05
Last updated on: 2025-08-06
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| tnborg | ratpanel | 2.3.34 |
| tnborg | ratpanel | 2.3.37 |
| tnborg | ratpanel | 2.3.32 |
| tnborg | ratpanel | 2.5.4 |
| tnborg | ratpanel | 2.5.6 |
| tnborg | ratpanel | 2.3.36 |
| tnborg | ratpanel | 2.3.50 |
| tnborg | ratpanel | 2.3.33 |
| tnborg | ratpanel | 2.3.40 |
| tnborg | ratpanel | 2.3.45 |
| tnborg | ratpanel | 2.3.30 |
| tnborg | ratpanel | 2.3.39 |
| tnborg | ratpanel | 2.3.53 |
| tnborg | ratpanel | 2.3.19 |
| tnborg | ratpanel | 2.3.38 |
| tnborg | ratpanel | 2.3.20 |
| tnborg | ratpanel | 2.3.21 |
| tnborg | ratpanel | 2.3.22 |
| tnborg | ratpanel | 2.5.0 |
| tnborg | ratpanel | 2.3.42 |
| tnborg | ratpanel | 2.3.26 |
| tnborg | ratpanel | 2.3.52 |
| tnborg | ratpanel | 2.5.2 |
| tnborg | ratpanel | 2.5.3 |
| tnborg | ratpanel | 2.5.1 |
| tnborg | ratpanel | 2.3.25 |
| tnborg | ratpanel | 2.3.44 |
| tnborg | ratpanel | 2.3.31 |
| tnborg | ratpanel | 2.3.46 |
| tnborg | ratpanel | 2.3.51 |
| tnborg | ratpanel | 2.3.24 |
| tnborg | ratpanel | 2.3.29 |
| tnborg | ratpanel | 2.3.47 |
| tnborg | ratpanel | 2.3.54 |
| tnborg | ratpanel | 2.3.28 |
| tnborg | ratpanel | 2.3.27 |
| tnborg | ratpanel | 2.3.43 |
| tnborg | ratpanel | 2.3.35 |
| tnborg | ratpanel | 2.3.48 |
| tnborg | ratpanel | 2.3.49 |
| tnborg | ratpanel | 2.3.41 |
| tnborg | ratpanel | 2.3.55 |
| tnborg | ratpanel | 2.3.23 |
| tnborg | ratpanel | 2.5.5 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-305 | The authentication algorithm is sound, but the implemented mechanism can be bypassed as the result of a separate weakness that is primary to the authentication error. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability affects RatPanel versions 2.3.19 through 2.5.5. If an attacker discovers the backend login path of RatPanel, for example through weak default paths or brute-force attacks, they can execute system commands or take over the hosts managed by the panel without needing to log in. The issue arises because the CleanPath middleware used to clean URLs does not process r.URL.Path correctly, causing path misinterpretation. This flaw allows unauthorized access and remote code execution. The vulnerability is fixed in version 2.5.6.
How can this vulnerability impact me? :
This vulnerability can lead to severe impacts including unauthorized access to the system, remote code execution, and full takeover of hosts managed by RatPanel. Attackers can execute arbitrary system commands without authentication, potentially compromising the confidentiality, integrity, and availability of the affected systems.
What immediate steps should I take to mitigate this vulnerability?
Upgrade RatPanel to version 2.5.6 or later, as this version fixes the vulnerability related to URL path processing and prevents unauthorized access and remote code execution.