A critical vulnerability in CentOS Web Panel (CWP) affecting versions 0.9.8.1188 and 0.9.8.1204 allows attackers to execute arbitrary commands remotely without authentication. The flaw arises from a combination of an authentication bypass in the file manager’s “changePerm” endpoint and a command injection vulnerability via the t_total parameter, which is passed unsanitized to a chmod command. By exploiting this chain, an attacker who knows a valid non-root username can achieve remote code execution and potentially gain a reverse shell under the user’s privileges. The issue has been patched in version 0.9.8.1205.
The IONIX research team is tracking ongoing exploitation attempts and recommends immediate patching. A partial list of potentially affected assets is outlined in this post.
References:

