CVE-2023-29489
cPanel Analyse et atténuation des vulnérabilités

Aperçu

A reflected cross-site scripting (XSS) vulnerability was discovered in cPanel (CVE-2023-29489) affecting versions before 11.109.9999.116. The vulnerability, also known as SEC-669, allows XSS to occur on the cpsrvd error page via an invalid webcall ID. With approximately 1.4 million cPanel installations exposed on the internet, this vulnerability affects a significant number of websites. The issue was discovered in January 2023 and was fixed by March 2023 (Assetnote Blog, NVD).

Détails techniques

The vulnerability exists in the handling of webcall IDs through the /cpanelwebcall/ directory. When an invalid webcall ID is provided, the error message is not properly sanitized before being displayed on the cpsrvd error page. The vulnerability received a CVSS v3.1 base score of 6.1 (Medium) with vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N. The issue was resolved by adding HTML encoding through the Cpanel::Encoder::Tiny::safe_html_encode_str function (Assetnote Blog, NVD).

Impact

The vulnerability allows attackers to execute arbitrary JavaScript pre-authentication on almost every port of a webserver using cPanel in its default setup. Due to Apache's proxy rules, the vulnerability is exploitable even on ports 80 and 443, affecting not only cPanel management ports but also applications running on these ports. An attacker could potentially hijack legitimate users' cPanel sessions and, if successful, upload web shells to gain command execution (Assetnote Blog).

Atténuation et solutions de contournement

The vulnerability has been patched in the following cPanel versions: 11.109.9999.116, 11.108.0.13, 11.106.0.18, and 11.102.0.31. Users are advised to upgrade to these versions or newer. Many cPanel installations have auto-update functionality enabled, which provides automatic protection. However, installations without auto-update enabled remain vulnerable and require manual updating (Assetnote Blog).

Ressources additionnelles


SourceCe rapport a été généré à l’aide de l’IA

Apparenté cPanel Vulnérabilités:

Identifiant CVE

Sévérité

Score

Technologies

Nom du composant

Exploit CISA KEV

A corrigé

Date de publication

CVE-2026-41940CRITICAL9.3
  • cPanelcPanel
  • cpe:2.3:a:cpanel:cpanel
OuiOuiApr 29, 2026
CVE-2025-66429HIGH8.8
  • cPanelcPanel
  • cpe:2.3:a:cpanel:cpanel
NonOuiDec 11, 2025
CVE-2021-38589HIGH8.1
  • cPanelcPanel
  • cpe:2.3:a:cpanel:cpanel
NonOuiAug 11, 2021
CVE-2023-29489MEDIUM6.1
  • cPanelcPanel
  • cpe:2.3:a:cpanel:cpanel
NonOuiApr 27, 2023
CVE-2021-38590MEDIUM5.5
  • cPanelcPanel
  • cpe:2.3:a:cpanel:cpanel
NonOuiAug 11, 2021

Évaluation gratuite des vulnérabilités

Évaluez votre posture de sécurité dans le cloud

Évaluez vos pratiques de sécurité cloud dans 9 domaines de sécurité pour évaluer votre niveau de risque et identifier les failles dans vos défenses.

Demander une évaluation

Obtenez une démo personnalisée

Prêt(e) à voir Wiz en action ?

"La meilleure expérience utilisateur que j’ai jamais vue, offre une visibilité totale sur les workloads cloud."
David EstlickRSSI
"Wiz fournit une interface unique pour voir ce qui se passe dans nos environnements cloud."
Adam FletcherChef du service de sécurité
"Nous savons que si Wiz identifie quelque chose comme critique, c’est qu’il l’est réellement."
Greg PoniatowskiResponsable de la gestion des menaces et des vulnérabilités