Webmin Webmin

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in Webmin.

Known Exploited Webmin Vulnerabilities

The following Webmin vulnerabilities have been marked by CISA as Known to be Exploited by threat actors.

Title Description Added
Webmin Command Injection Vulnerability An issue was discovered in Webmin. The parameter old in password_change.cgi contains a command injection vulnerability.
CVE-2019-15107 Exploit Probability: 94.5%
March 25, 2022

The vulnerability CVE-2019-15107: Webmin Command Injection Vulnerability is in the top 1% of the currently known exploitable vulnerabilities.

By the Year

In 2026 there have been 0 vulnerabilities in Webmin. Last year, in 2025 Webmin had 2 security vulnerabilities published. Right now, Webmin is on track to have less security vulnerabilities in 2026 than it did last year.




Year Vulnerabilities Average Score
2026 0 0.00
2025 2 7.80
2024 7 6.63
2023 17 5.61
2022 13 7.85
2021 3 9.07
2020 4 8.80
2019 6 7.63
2018 1 9.80

It may take a day or so for new Webmin vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Webmin Security Vulnerabilities

Unquoted Arg in Webmin Squid cachemgr.cgi (pre2.600)
CVE-2025-67738 8.5 - High - December 11, 2025

squid/cachemgr.cgi in Webmin before 2.600 does not properly quote arguments. This is relevant if Webmin's Squid module and its Cache Manager feature are available, and an untrusted party is able to authenticate to Webmin and has certain Cache Manager permissions (the "cms" security option).

Shell injection

Webmin 2.5.10 Host Header Injection in Password Reset
CVE-2025-61541 7.1 - High - October 16, 2025

Webmin 2.510 is vulnerable to a Host Header Injection in the password reset functionality (forgot_send.cgi). The reset link sent to users is constructed using the HTTP Host header via get_webmin_email_url(). An attacker can manipulate the Host header to inject a malicious domain into the reset email. If a victim follows the poisoned link, the attacker can intercept the reset token and gain full control of the target account.

Authorization

Webmin CGI Command Injection RCE via Authenticated Requests
CVE-2024-12828 8.8 - High - December 30, 2024

Webmin CGI Command Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Webmin. Authentication is required to exploit this vulnerability. The specific flaw exists within the handling of CGI requests. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-22346.

Shell injection

Webmin 2.202 & Virtualmin 7.20.2: Network Traffic Loop via Spoofed UDP 10000
CVE-2024-45692 7.5 - High - September 04, 2024

Webmin before 2.202 and Virtualmin before 7.20.2 allow a network traffic loop via spoofed UDP packets on port 10000.

Infinite Loop

Webmin ajaxterm PrivEsc (2.003) Hijack Console Session
CVE-2024-36451 - July 10, 2024

Improper handling of insufficient permissions or privileges vulnerability exists in ajaxterm module of Webmin prior to 2.003. If this vulnerability is exploited, a console session may be hijacked by an unauthorized user. As a result, data within a system may be referred, a webpage may be altered, or a server may be permanently halted.

CSRF in Webmin ajaxterm (pre-2.003) data leak & server crash
CVE-2024-36452 - July 10, 2024

Cross-site request forgery vulnerability exists in ajaxterm module of Webmin versions prior to 2.003. If this vulnerability is exploited, unintended operations may be performed when a user views a malicious page while logged in. As a result, data within a system may be referred, a webpage may be altered, or a server may be permanently halted.

Webmin/Usermin XSS in session_login.cgi <1.970/1.820
CVE-2024-36453 - July 10, 2024

Cross-site scripting vulnerability exists in session_login.cgi of Webmin versions prior to 1.970 and Usermin versions prior to 1.820. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who accessed the website using the product. As a result, a webpage may be altered or sensitive information such as a credential may be disclosed.

XSS in sysinfo.cgi before v1.910 of Webmin
CVE-2024-36450 5.4 - Medium - July 10, 2024

Cross-site scripting vulnerability exists in sysinfo.cgi of Webmin versions prior to 1.910. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who accessed the website using the product. As a result, a session ID may be obtained, a webpage may be altered, or a server may be halted.

XSS

Webmin 2.105 XSS via Execute cron job as field
CVE-2023-52046 4.8 - Medium - January 25, 2024

Cross Site Scripting vulnerability (XSS) in webmin v.2.105 and earlier allows a remote attacker to execute arbitrary code via a crafted payload to the "Execute cron job as" tab Input field.

XSS

Stored XSS in Webmin 2.002 via Cluster Cron Job Input
CVE-2023-43309 4.8 - Medium - September 21, 2023

There is a stored cross-site scripting (XSS) vulnerability in Webmin 2.002 and below via the Cluster Cron Job tab Input field, which allows attackers to run malicious scripts by injecting a specially crafted payload.

XSS

Reflected XSS in Webmin v2.100 File Manager
CVE-2023-40983 6.1 - Medium - September 15, 2023

A reflected cross-site scripting (XSS) vulnerability in the File Manager function of Webmin v2.100 allows attackers to execute malicious scripts via injecting a crafted payload into the Find in Results file.

XSS

Stored XSS in Webmin 2.100 via cloned module name param
CVE-2023-40982 5.4 - Medium - September 15, 2023

A stored cross-site scripting (XSS) vulnerability in Webmin v2.100 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the cloned module name parameter.

XSS

Webmin 2.100 XSS in File Manager via Search/Replace
CVE-2023-40985 5.4 - Medium - September 15, 2023

An issue was discovered in Webmin 2.100. The File Manager functionality allows an attacker to exploit a Cross-Site Scripting (XSS) vulnerability. By providing a malicious payload, an attacker can inject arbitrary code, which is then executed within the context of the victim's browser when any file is searched/replaced.

XSS

Webmin v2.100 Stored XSS via Usermin Config Custom Field
CVE-2023-40986 5.4 - Medium - September 15, 2023

A stored cross-site scripting (XSS) vulnerability in the Usermin Configuration function of Webmin v2.100 allows attackers to execute arbitrary web sripts or HTML via a crafted payload injected into the Custom field.

XSS

Webmin v2.100 Reflected XSS in File Manager Replace in Results
CVE-2023-40984 5.4 - Medium - September 15, 2023

A reflected cross-site scripting (XSS) vulnerability in the File Manager function of Webmin v2.100 allows attackers to execute malicious scripts via injecting a crafted payload into the Replace in Results file.

XSS

Stored XSS via Mail Forwarding in Webmin 2.000 (Usermin)
CVE-2023-41155 5.4 - Medium - September 13, 2023

A Stored Cross-Site Scripting (XSS) vulnerability in the mail forwarding and replies tab in Webmin and Usermin 2.000 allows remote attackers to inject arbitrary web script or HTML via the forward to field while creating a mail forwarding rule.

XSS

Usermin 2.000 XSS via Replace-in-Results Field on File Manager Tab
CVE-2023-41163 6.1 - Medium - August 30, 2023

A Reflected Cross-site scripting (XSS) vulnerability in the file manager tab in Usermin 2.000 allows remote attackers to inject arbitrary web script or HTML via the replace in results field while replacing the results under the tools drop down.

XSS

XSS in Webmin 2.021 Download Functionality
CVE-2023-38305 6.1 - Medium - July 31, 2023

An issue was discovered in Webmin 2.021. The download functionality allows an attacker to exploit a Cross-Site Scripting (XSS) vulnerability. By providing a crafted download path containing a malicious payload, an attacker can inject arbitrary code, which is then executed within the context of the victim's browser when the download link is accessed.

XSS

Webmin 2.021 XSS ByPass via File Upload
CVE-2023-38306 6.1 - Medium - July 31, 2023

An issue was discovered in Webmin 2.021. A Cross-site Scripting (XSS) Bypass vulnerability was discovered in the file upload functionality. Normally, the application restricts the upload of certain file types such as .svg, .php, etc., and displays an error message if a prohibited file type is detected. However, by following certain steps, an attacker can bypass these restrictions and inject malicious code.

XSS

Stored XSS in Webmin 2.021 Users&Groups real_name field
CVE-2023-38307 5.4 - Medium - July 31, 2023

An issue was discovered in Webmin 2.021. A Stored Cross-Site Scripting (XSS) vulnerability was discovered in the Users and Groups functionality. The vulnerability occurs when an authenticated user adds a new user and inserts an XSS payload into the user's real name.

XSS

Webmin 2.021 XSS via HTTP Tunnel URLs
CVE-2023-38308 6.1 - Medium - July 31, 2023

An issue was discovered in Webmin 2.021. A Cross-Site Scripting (XSS) vulnerability was discovered in the HTTP Tunnel functionality when handling third-party domain URLs. By providing a crafted URL from a third-party domain, an attacker can inject malicious code. leading to the execution of arbitrary JavaScript code within the context of the victim's browser.

XSS

Webmin 2.021 Reflected XSS via Package Search field
CVE-2023-38309 6.1 - Medium - July 31, 2023

An issue was discovered in Webmin 2.021. A Reflected Cross-Site Scripting (XSS) vulnerability was discovered in the package search functionality. The vulnerability allows an attacker to inject a malicious payload in the "Search for Package" field, which gets reflected back in the application's response, leading to the execution of arbitrary JavaScript code within the context of the victim's browser.

XSS

Stored XSS in Webmin 2.021 System Logs Config
CVE-2023-38310 5.4 - Medium - July 31, 2023

An issue was discovered in Webmin 2.021. A Stored Cross-Site Scripting (XSS) vulnerability was discovered in the configuration settings of the system logs functionality. The vulnerability allows an attacker to store an XSS payload in the configuration settings of specific log files. This results in the execution of that payload whenever the affected log files are accessed.

XSS

Stored XSS in Webmin 2.0.21 System Logs Viewer
CVE-2023-38311 5.4 - Medium - July 31, 2023

An issue was discovered in Webmin 2.021. A Stored Cross-Site Scripting (XSS) vulnerability was discovered in the System Logs Viewer functionality. The vulnerability allows an attacker to store a malicious payload in the configuration field, triggering the execution of the payload when saving the configuration or when accessing the System Logs Viewer page.

XSS

Webmin 2.021 Stored XSS in Users/Groups Real Name RCE
CVE-2023-38303 5.4 - Medium - July 31, 2023

An issue was discovered in Webmin 2.021. One can exploit a stored Cross-Site Scripting (XSS) attack to achieve Remote Command Execution (RCE) through the Users and Group's real name parameter.

XSS

Webmin 2.021 Stored XSS in Group Name Field
CVE-2023-38304 5.4 - Medium - July 31, 2023

An issue was discovered in Webmin 2.021. A Stored Cross-Site Scripting (XSS) vulnerability was discovered in the Users and Groups functionality, allowing an attacker to store a malicious payload in the Group Name field when creating a new group.

XSS

CVE-2022-3844: XSS in Webmin 2.001 via xterm/index.cgi
CVE-2022-3844 6.1 - Medium - November 02, 2022

A vulnerability, which was classified as problematic, was found in Webmin 2.001. Affected is an unknown function of the file xterm/index.cgi. The manipulation leads to basic cross site scripting. It is possible to launch the attack remotely. Upgrading to version 2.003 is able to address this issue. The patch is identified as d3d33af3c0c3fd3a889c84e287a038b7a457d811. It is recommended to upgrade the affected component. VDB-212862 is the identifier assigned to this vulnerability.

XSS

Webmin 1.995 XSS via crafted HTML email in Read Mail module
CVE-2022-36880 6.1 - Medium - July 27, 2022

The Read Mail module in Webmin 1.995 and Usermin through 1.850 allows XSS via a crafted HTML e-mail message.

XSS

software/apt-lib.pl in Webmin before 1.997 lacks HTML escaping for a UI command.
CVE-2022-36446 9.8 - Critical - July 25, 2022

software/apt-lib.pl in Webmin before 1.997 lacks HTML escaping for a UI command.

Output Sanitization

Webmin through 1.991, when the Authentic theme is used, allows remote code execution when a user has been manually created (i.e
CVE-2022-30708 8.8 - High - May 15, 2022

Webmin through 1.991, when the Authentic theme is used, allows remote code execution when a user has been manually created (i.e., not created in Virtualmin or Cloudmin). This occurs because settings-editor_write.cgi does not properly restrict the file parameter.

A cross-site request forgery (CSRF) vulnerability exists in Webmin 1.973
CVE-2021-32156 8.8 - High - April 11, 2022

A cross-site request forgery (CSRF) vulnerability exists in Webmin 1.973 via the Scheduled Cron Jobs feature.

Session Riding

A Cross-Site Scripting (XSS) vulnerability exists in Webmin 1.973
CVE-2021-32158 6.1 - Medium - April 11, 2022

A Cross-Site Scripting (XSS) vulnerability exists in Webmin 1.973 via the Upload and Download feature.

XSS

A Cross-site request forgery (CSRF) vulnerability exists in Webmin 1.973
CVE-2021-32159 8.8 - High - April 11, 2022

A Cross-site request forgery (CSRF) vulnerability exists in Webmin 1.973 via the Upload and Download feature.

Session Riding

A Cross-Site Scripting (XSS) vulnerability exists in Webmin 1.973 through the Add Users feature.
CVE-2021-32160 6.1 - Medium - April 11, 2022

A Cross-Site Scripting (XSS) vulnerability exists in Webmin 1.973 through the Add Users feature.

XSS

A Cross-Site Scripting (XSS) vulnerability exists in Webmin 1.973 through the File Manager feature.
CVE-2021-32161 6.1 - Medium - April 11, 2022

A Cross-Site Scripting (XSS) vulnerability exists in Webmin 1.973 through the File Manager feature.

XSS

A Cross-site request forgery (CSRF) vulnerability exists in Webmin 1.973 through the File Manager feature.
CVE-2021-32162 8.8 - High - April 11, 2022

A Cross-site request forgery (CSRF) vulnerability exists in Webmin 1.973 through the File Manager feature.

Session Riding

A Cross-Site Scripting (XSS) vulnerability exists in Webmin 1.973
CVE-2021-32157 9.6 - Critical - April 11, 2022

A Cross-Site Scripting (XSS) vulnerability exists in Webmin 1.973 via the Scheduled Cron Jobs feature.

XSS

Improper Access Control to Remote Code Execution in GitHub repository webmin/webmin prior to 1.990.
CVE-2022-0824 8.8 - High - March 02, 2022

Improper Access Control to Remote Code Execution in GitHub repository webmin/webmin prior to 1.990.

Authorization

Improper Authorization in GitHub repository webmin/webmin prior to 1.990.
CVE-2022-0829 8.1 - High - March 02, 2022

Improper Authorization in GitHub repository webmin/webmin prior to 1.990.

AuthZ

Webmin 1.973 is affected by Cross Site Request Forgery (CSRF) to create a privileged user through Webmin's add users feature
CVE-2021-31762 8.8 - High - April 25, 2021

Webmin 1.973 is affected by Cross Site Request Forgery (CSRF) to create a privileged user through Webmin's add users feature, and then get a reverse shell through Webmin's running process feature.

Session Riding

Webmin 1.973 is affected by reflected Cross Site Scripting (XSS) to achieve Remote Command Execution through Webmin's running process feature.
CVE-2021-31761 9.6 - Critical - April 25, 2021

Webmin 1.973 is affected by reflected Cross Site Scripting (XSS) to achieve Remote Command Execution through Webmin's running process feature.

XSS

Webmin 1.973 is affected by Cross Site Request Forgery (CSRF) to achieve Remote Command Execution (RCE) through Webmin's running process feature.
CVE-2021-31760 8.8 - High - April 25, 2021

Webmin 1.973 is affected by Cross Site Request Forgery (CSRF) to achieve Remote Command Execution (RCE) through Webmin's running process feature.

Session Riding

Arbitrary command execution can occur in Webmin through 1.962
CVE-2020-35606 8.8 - High - December 21, 2020

Arbitrary command execution can occur in Webmin through 1.962. Any user authorized for the Package Updates module can execute arbitrary commands with root privileges via vectors involving %0A and %0C. NOTE: this issue exists because of an incomplete fix for CVE-2019-12840.

Shell injection

XSS exists in Webmin 1.941 and earlier affecting the Save function of the Read User Email Module / mailboxes Endpoint when attempting to save HTML emails
CVE-2020-12670 - October 12, 2020

XSS exists in Webmin 1.941 and earlier affecting the Save function of the Read User Email Module / mailboxes Endpoint when attempting to save HTML emails. This module parses any output without sanitizing SCRIPT elements, as opposed to the View function, which sanitizes the input correctly. A malicious user can send any JavaScript payload into the message body and execute it if the user decides to save that email.

An Improper Data Validation Vulnerability exists in Webmin 1.941 and earlier affecting the Command Shell Endpoint
CVE-2020-8821 - October 12, 2020

An Improper Data Validation Vulnerability exists in Webmin 1.941 and earlier affecting the Command Shell Endpoint. A user may enter HTML code into the Command field and submit it. Then, after visiting the Action Logs Menu and displaying logs, the HTML code will be rendered (however, JavaScript is not executed). Changes are kept across users.

An XSS Vulnerability exists in Webmin 1.941 and earlier affecting the Cluster Shell Commands Endpoint
CVE-2020-8820 - October 12, 2020

An XSS Vulnerability exists in Webmin 1.941 and earlier affecting the Cluster Shell Commands Endpoint. A user may enter any XSS Payload into the Command field and execute it. Then, after revisiting the Cluster Shell Commands Menu, the XSS Payload will be rendered and executed.

rpc.cgi in Webmin through 1.920
CVE-2019-15642 8.8 - High - August 26, 2019

rpc.cgi in Webmin through 1.920 allows authenticated Remote Code Execution via a crafted object name because unserialise_variable makes an eval call. NOTE: the Webmin_Servers_Index documentation states "RPC can be used to run any command or modify any file on a server, which is why access to it must not be granted to un-trusted Webmin users."

Code Injection

xmlrpc.cgi in Webmin through 1.930 allows authenticated XXE attacks
CVE-2019-15641 6.5 - Medium - August 26, 2019

xmlrpc.cgi in Webmin through 1.930 allows authenticated XXE attacks. By default, only root, admin, and sysadm can access xmlrpc.cgi.

XXE

An issue was discovered in Webmin <=1.920
CVE-2019-15107 9.8 - Critical - August 16, 2019

An issue was discovered in Webmin <=1.920. The parameter old in password_change.cgi contains a command injection vulnerability.

Shell injection

In Webmin through 1.910, any user authorized to the "Package Updates" module can execute arbitrary commands with root privileges
CVE-2019-12840 - June 15, 2019

In Webmin through 1.910, any user authorized to the "Package Updates" module can execute arbitrary commands with root privileges via the data parameter to update.cgi.

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Webmin or by Webmin? Click the Watch button to subscribe.

Webmin
Vendor

Webmin
Product

subscribe