1Panel versions 1.10.33 through 2.0.15 contain a cross-site request forgery (CSRF) vulnerability in the panel name management functionality. The affected endpoint does not implement CSRF defenses such as anti-CSRF tokens or Origin/Referer validation. An attacker can craft a malicious webpage that submits a panel-name change request; if a victim visits the page while authenticated, the browser includes valid session cookies and the request succeeds. This allows a remote attacker to change the victim’s panel name to an arbitrary value without consent.
References
| Link | Resource |
|---|---|
| https://1panel.pro/ | Product |
| https://github.com/1Panel-dev/1Panel/releases | Product Release Notes |
| https://www.vulncheck.com/advisories/1panel-csrf-panel-name-modification | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2025-12-10 19:16
Updated : 2025-12-23 15:11
NVD link : CVE-2025-34430
Mitre link : CVE-2025-34430
CVE.ORG link : CVE-2025-34430
JSON object : View
Products Affected
fit2cloud
- 1panel
CWE
CWE-352
Cross-Site Request Forgery (CSRF)
