CISA Alert: Critical CentOS Web Panel Bug Exploited - What You Need to Know (2025)

A Critical Bug Exposes Web Hosting Servers to Attackers

The cybersecurity world is on alert! The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning about a critical bug in CentOS Web Panel (CWP), a popular web hosting control panel. This vulnerability, if left unpatched, could allow remote attackers to execute commands on affected servers, potentially leading to devastating consequences.

CISA has identified a remote command execution flaw (CVE-2025-48703) in CWP, which is used by many web hosting providers and system administrators. This bug allows unauthorized users with a valid username to run arbitrary shell commands, giving them control over the server. And this is where it gets technical: the issue stems from the 'changePerm' endpoint in the file manager, which fails to properly validate requests, and the 't_total' parameter, which can be manipulated to inject malicious shell commands.

The bug was responsibly disclosed by security researcher Maxime Rinaudo, who demonstrated the exploit on CentOS 7. CWP developers released a fix in version 0.9.8.1205, but the race to patch is on! CISA has given federal entities until November 25 to update their systems or stop using CWP. But here's where it gets controversial—CISA has provided little information about the ongoing attacks, leaving many wondering about the scope and nature of the threat.

Additionally, CISA added another vulnerability (CVE-2025-11371) to its Known Exploited Vulnerabilities (KEV) catalog, affecting Gladinet CentreStack and Triofox products. This local file inclusion flaw was also given the November 25 deadline for patching. The quick response from CISA emphasizes the severity of these vulnerabilities, urging immediate action.

While CISA's KEV catalog primarily targets federal agencies, these warnings are essential for all organizations to heed. The impact of these bugs could be far-reaching, affecting not just government entities but also businesses and individuals who rely on these services.

As the digital landscape evolves, with technologies like Model Context Protocol (MCP) gaining traction, staying vigilant against such threats is crucial. MCP, as the new standard for connecting LLMs to tools, brings its own security considerations. A free cheat sheet offering 7 security best practices for MCP can be a great starting point for organizations to enhance their security posture.

The CentOS Web Panel bug serves as a stark reminder that staying proactive about security updates is essential. Ignoring these warnings could leave systems vulnerable to attacks with potentially catastrophic outcomes. Are you prepared to handle these emerging threats? Share your thoughts and strategies in the comments below!

CISA Alert: Critical CentOS Web Panel Bug Exploited - What You Need to Know (2025)
Top Articles
Latest Posts
Recommended Articles
Article information

Author: Greg O'Connell

Last Updated:

Views: 6287

Rating: 4.1 / 5 (62 voted)

Reviews: 85% of readers found this page helpful

Author information

Name: Greg O'Connell

Birthday: 1992-01-10

Address: Suite 517 2436 Jefferey Pass, Shanitaside, UT 27519

Phone: +2614651609714

Job: Education Developer

Hobby: Cooking, Gambling, Pottery, Shooting, Baseball, Singing, Snowboarding

Introduction: My name is Greg O'Connell, I am a delightful, colorful, talented, kind, lively, modern, tender person who loves writing and wants to share my knowledge and understanding with you.