-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
The vulnerability stems from firewall rule handlers that constructed OS commands using unsanitized user inputs. The patch added cmd.CheckIllegal validations to these exact functions, confirming they were injection points. The PoC demonstrates command injection through firewall parameters, and the CWE-78 classification matches the command injection pattern. The functions directly handle the /hosts/firewall/ip endpoint's parameters as evidenced by the security advisory and commit changes.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| github.com/1Panel-dev/1Panel | go | <= 1.4.2 | 1.4.3 |
Ongoing coverage of React2Shell