CVE-2023-29489
cPanel Schwachstellenanalyse und -minderung

Überblick

A reflected cross-site scripting (XSS) vulnerability was discovered in cPanel (CVE-2023-29489) affecting versions before 11.109.9999.116. The vulnerability, also known as SEC-669, allows XSS to occur on the cpsrvd error page via an invalid webcall ID. With approximately 1.4 million cPanel installations exposed on the internet, this vulnerability affects a significant number of websites. The issue was discovered in January 2023 and was fixed by March 2023 (Assetnote Blog, NVD).

Technische Details

The vulnerability exists in the handling of webcall IDs through the /cpanelwebcall/ directory. When an invalid webcall ID is provided, the error message is not properly sanitized before being displayed on the cpsrvd error page. The vulnerability received a CVSS v3.1 base score of 6.1 (Medium) with vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N. The issue was resolved by adding HTML encoding through the Cpanel::Encoder::Tiny::safe_html_encode_str function (Assetnote Blog, NVD).

Aufprall

The vulnerability allows attackers to execute arbitrary JavaScript pre-authentication on almost every port of a webserver using cPanel in its default setup. Due to Apache's proxy rules, the vulnerability is exploitable even on ports 80 and 443, affecting not only cPanel management ports but also applications running on these ports. An attacker could potentially hijack legitimate users' cPanel sessions and, if successful, upload web shells to gain command execution (Assetnote Blog).

Risikominderung und Problemumgehungen

The vulnerability has been patched in the following cPanel versions: 11.109.9999.116, 11.108.0.13, 11.106.0.18, and 11.102.0.31. Users are advised to upgrade to these versions or newer. Many cPanel installations have auto-update functionality enabled, which provides automatic protection. However, installations without auto-update enabled remain vulnerable and require manual updating (Assetnote Blog).

Zusätzliche Ressourcen


QuelleDieser Bericht wurde mithilfe von KI erstellt

Verwandt cPanel Schwachstellen:

CVE-Kennung

Strenge

Punktzahl

Technologieen

Name der Komponente

CISA KEV-Exploit

Hat fix

Veröffentlichungsdatum

CVE-2026-41940CRITICAL9.3
  • cPanelcPanel
  • cpe:2.3:a:cpanel:cpanel
JaJaApr 29, 2026
CVE-2025-66429HIGH8.8
  • cPanelcPanel
  • cpe:2.3:a:cpanel:cpanel
NeinJaDec 11, 2025
CVE-2021-38589HIGH8.1
  • cPanelcPanel
  • cpe:2.3:a:cpanel:cpanel
NeinJaAug 11, 2021
CVE-2023-29489MEDIUM6.1
  • cPanelcPanel
  • cpe:2.3:a:cpanel:cpanel
NeinJaApr 27, 2023
CVE-2021-38590MEDIUM5.5
  • cPanelcPanel
  • cpe:2.3:a:cpanel:cpanel
NeinJaAug 11, 2021

Kostenlose Schwachstellenbewertung

Benchmarking Ihrer Cloud-Sicherheitslage

Bewerten Sie Ihre Cloud-Sicherheitspraktiken in 9 Sicherheitsbereichen, um Ihr Risikoniveau zu bewerten und Lücken in Ihren Abwehrmaßnahmen zu identifizieren.

Bewertung anfordern

Eine personalisierte Demo anfordern

Sind Sie bereit, Wiz in Aktion zu sehen?

"Die beste Benutzererfahrung, die ich je gesehen habe, bietet vollständige Transparenz für Cloud-Workloads."
David EstlickCISO
"„Wiz bietet eine zentrale Oberfläche, um zu sehen, was in unseren Cloud-Umgebungen vor sich geht.“ "
Adam FletcherSicherheitsbeauftragter
"„Wir wissen, dass, wenn Wiz etwas als kritisch identifiziert, es auch wirklich kritisch ist.“"
Greg PoniatowskiLeiter Bedrohungs- und Schwachstellenmanagement