<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>CyberPanel — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/vendors/cyberpanel/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sun, 10 May 2026 13:21:50 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/vendors/cyberpanel/feed.xml" rel="self" type="application/rss+xml"/><item><title>CyberPanel 2.1 Authenticated Remote Command Execution via Symlink Exploitation (CVE-2021-47949)</title><link>https://feed.craftedsignal.io/briefs/2026-05-cve-2021-47949-cyberpanel-rce/</link><pubDate>Sun, 10 May 2026 13:21:50 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-cve-2021-47949-cyberpanel-rce/</guid><description>CyberPanel version 2.1 is vulnerable to command execution (CVE-2021-47949) where an authenticated attacker can exploit symlink attacks via the filemanager controller endpoint by manipulating the completeStartingPath parameter in POST requests, leading to sensitive file access and arbitrary shell command execution.</description><content:encoded><![CDATA[<p>CyberPanel 2.1 is susceptible to a command execution vulnerability (CVE-2021-47949) that allows authenticated attackers to perform symlink attacks through the filemanager controller endpoint. This vulnerability is exploited by manipulating the <code>completeStartingPath</code> parameter in POST requests to <code>/filemanager/controller</code>. Successful exploitation allows attackers to read arbitrary files, including sensitive data such as database credentials, and execute arbitrary shell commands through the <code>/websites/fetchFolderDetails</code> endpoint. This poses a significant risk to organizations using vulnerable CyberPanel instances, potentially leading to data breaches, system compromise, and unauthorized access.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker authenticates to the CyberPanel web interface.</li>
<li>The attacker crafts a POST request to <code>/filemanager/controller</code>.</li>
<li>The POST request includes a manipulated <code>completeStartingPath</code> parameter, designed to create a symbolic link to a sensitive file (e.g., <code>/etc/shadow</code> or database configuration files).</li>
<li>CyberPanel creates the symlink based on the attacker-supplied path.</li>
<li>The attacker crafts a request to <code>/websites/fetchFolderDetails</code>.</li>
<li>This request leverages the previously created symlink to access the target file.</li>
<li>CyberPanel reads the contents of the file pointed to by the symlink and returns it to the attacker, or executes a command.</li>
<li>The attacker gains access to sensitive information, or executes arbitrary commands on the server.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability (CVE-2021-47949) allows attackers to read arbitrary files on the server, potentially gaining access to sensitive data such as database credentials, configuration files, and private keys. Furthermore, the attacker can execute arbitrary shell commands, leading to complete system compromise, data exfiltration, and denial-of-service. While the number of victims is not specified, any CyberPanel 2.1 instance exposed to authenticated attackers is at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Detect CyberPanel CVE-2021-47949 Exploitation Attempt&rdquo; to your SIEM to identify potential exploitation attempts based on HTTP POST requests to the <code>/filemanager/controller</code> endpoint.</li>
<li>Deploy the Sigma rule &ldquo;Detect CyberPanel CVE-2021-47949 fetchFolderDetails&rdquo; to your SIEM to identify potential exploitation attempts based on HTTP requests to the <code>/websites/fetchFolderDetails</code> endpoint.</li>
<li>Monitor web server logs for suspicious POST requests to <code>/filemanager/controller</code> containing unusual <code>completeStartingPath</code> parameters, as described in the attack chain.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve</category><category>command execution</category><category>symlink</category><category>linux</category></item></channel></rss>