-
CVSS Score
-The vulnerability description explicitly identifies SaveContent in api/v1/file.go as the vulnerable function. Key evidence includes: 1) The function handles user-supplied JSON data without path filtering 2) PoC demonstrates writing to /etc/.root/authorized_keys 3) CWE-862 (Missing Authorization) aligns with the lack of access controls 4) The patched version 1.5.0 would logically add path validation/authorization here. No other functions are mentioned in the vulnerability details.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| github.com/1Panel-dev/1Panel | go | = 1.4.3 | 1.5.0 |