
Cloud Vulnerability DB
A community-led vulnerabilities database
A Cross-Site Scripting (XSS) vulnerability was discovered in Webmin version 1.973 affecting the Scheduled Cron Jobs feature. The vulnerability was identified and assigned CVE-2021-32157. This security issue affects the web-based system administration tool that is widely used for Unix-like servers, with over 1,000,000 installations worldwide (GitHub POC).
The vulnerability is classified as a Reflected Cross-Site Scripting (XSS) attack that can potentially lead to Remote Command Execution (RCE) through the Webmin's Scheduled Cron Jobs feature. The issue specifically affects Webmin version 1.973, which was the latest version at the time of discovery in March 2021 (MITRE CVE).
The vulnerability allows remote attackers to inject arbitrary web script or HTML code via the Scheduled Cron Jobs feature. When successfully exploited, this could lead to remote command execution on the affected system, potentially compromising the entire server (GitHub POC).
Users running affected versions of Webmin should upgrade to a patched version. As this vulnerability requires authentication, ensuring strong access controls and limiting Webmin access to trusted administrators can help mitigate the risk (Debian Tracker).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."