CVE-2021-47949
Received Received - Intake
Command Execution via Symlink Attack in CyberPanel

Publication date: 2026-05-10

Last updated on: 2026-05-10

Assigner: VulnCheck

Description
CyberPanel 2.1 contains a command execution vulnerability that allows authenticated attackers to read arbitrary files and execute remote code by exploiting symlink attacks through the filemanager controller endpoint. Attackers can manipulate the completeStartingPath parameter in POST requests to /filemanager/controller to create symbolic links, read sensitive files like database credentials, and execute arbitrary shell commands through the /websites/fetchFolderDetails endpoint.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-10
Last Modified
2026-05-10
Generated
2026-05-10
AI Q&A
2026-05-10
EPSS Evaluated
N/A
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
cyberpanel cyberpanel 2.1
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-59 The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2021-47949 is a vulnerability in CyberPanel version 2.1 that allows authenticated attackers to execute arbitrary commands on the server. This is achieved through a symlink attack by manipulating the completeStartingPath parameter in POST requests to the /filemanager/controller endpoint.

Attackers can create symbolic links to read sensitive files such as database credentials and then execute arbitrary shell commands via the /websites/fetchFolderDetails endpoint. The exploit requires valid user credentials and leverages improper file handling and command injection vulnerabilities.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability in CyberPanel 2.1 allows authenticated attackers to read arbitrary files, including sensitive files such as database credentials, and execute remote code on the server. This unauthorized access to sensitive data could lead to exposure of personal or protected information.

Such exposure and unauthorized access can negatively impact compliance with common standards and regulations like GDPR and HIPAA, which require strict protection of sensitive data and prevention of unauthorized access.

Organizations using vulnerable versions of CyberPanel may face increased risk of data breaches, which could result in regulatory penalties, legal consequences, and loss of trust.


How can this vulnerability impact me? :

This vulnerability can have severe impacts including unauthorized access to sensitive information and full remote code execution on the affected server.

  • Attackers can read sensitive files such as database credentials.
  • Attackers can execute arbitrary shell commands, potentially leading to full control over the server.
  • The exploit requires valid credentials, but once exploited, it can lead to data theft, service disruption, or further compromise of the hosting environment.

How can this vulnerability be detected on my network or system? Can you suggest some commands?

Detection of this vulnerability requires verifying if an authenticated user can exploit the symlink attack via the filemanager controller endpoint. One approach is to monitor POST requests to /filemanager/controller that manipulate the completeStartingPath parameter to create symbolic links.

Additionally, suspicious activity may include attempts to read sensitive files such as database credentials or execution of commands through the /websites/fetchFolderDetails endpoint.

Commands to detect exploitation attempts could include checking for unexpected symbolic links in the file system related to the web root or CyberPanel directories, for example:

  • find /path/to/cyberpanel/websites -type l -ls
  • grep -i 'completeStartingPath' /var/log/apache2/access.log or /var/log/nginx/access.log to find suspicious POST requests
  • Monitor running processes or network connections for unexpected reverse shells or websocket terminals.

Since the exploit requires valid credentials, reviewing authentication logs for unusual login activity combined with these indicators can help detect exploitation.


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include restricting access to the CyberPanel interface to trusted users only, ensuring that only authorized personnel have valid credentials.

Apply any available patches or updates from CyberPanel that address this vulnerability, as the issue was fixed in later versions after 2.1.

Disable or restrict the filemanager controller endpoint if possible, or implement additional input validation and access controls on the completeStartingPath parameter to prevent symlink creation.

Monitor logs for suspicious POST requests to /filemanager/controller and /websites/fetchFolderDetails endpoints and investigate any anomalies.

Consider implementing network-level protections such as firewall rules to limit access to CyberPanel ports and endpoints.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart