
Cloud Vulnerability DB
A community-led vulnerabilities database
Webmin version 1.973 was found to be vulnerable to a reflected Cross-Site Scripting (XSS) vulnerability that could lead to Remote Command Execution (RCE) through the application's running process feature. The vulnerability was discovered and reported in 2021, affecting the web-based system administration tool that has over 1,000,000 installations worldwide (Webmin GitHub).
The vulnerability is tracked as CVE-2021-31761 and has received a CVSS v3.1 Base Score of 9.6 (CRITICAL) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H. The vulnerability exists in the running process feature of Webmin, where a reflected XSS attack can be leveraged to achieve remote command execution. The attack requires user interaction but can be executed remotely without authentication (NVD).
The successful exploitation of this vulnerability could allow an attacker to execute arbitrary commands with root privileges on the affected system. Given Webmin's role as a system administration tool with access to critical system functions, the impact of this vulnerability is particularly severe as it could lead to complete system compromise (Webmin GitHub).
Users running Webmin 1.973 should upgrade to a newer version of the software. The vulnerability has been addressed in subsequent releases. System administrators should also consider implementing additional security controls such as web application firewalls and restricting access to the Webmin interface (Webmin GitHub).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."