-
CVSS Score
-| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| github.com/1Panel-dev/1Panel | go | = 1.4.3 | 1.5.0 |
The vulnerability description explicitly identifies LoadFromFile in api/v1/file.go as the vulnerable function that reads files using unfiltered path parameters. Multiple sources (GitHub Advisory, NVD, and PoC) consistently point to this function's lack of input validation as the root cause. The CWE-22 classification confirms this is a path traversal vulnerability. The function's direct use of user-controlled [path] parameter matches the described attack pattern of reading /etc/passwd through crafted requests to api/v1/files/loadfile endpoint.