CWP <=0.9.8.1205 – Unauth RCE via shell metacharacters in t_total param
CVE-2025-48703 Published on September 19, 2025

CWP (aka Control Web Panel or CentOS Web Panel) before 0.9.8.1205 allows unauthenticated remote code execution via shell metacharacters in the t_total parameter in a filemanager changePerm request. A valid non-root username must be known.

NVD

Known Exploited Vulnerability

This CWP Control Web Panel OS Command Injection Vulnerability is part of CISA's list of Known Exploited Vulnerabilities. CWP Control Web Panel (formerly CentOS Web Panel) contains an OS command Injection vulnerability that allows unauthenticated remote code execution via shell metacharacters in the t_total parameter in a filemanager changePerm request. A valid non-root username must be known.

The following remediation steps are recommended / required by November 25, 2025: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Weakness Type

What is a Shell injection Vulnerability?

The software constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.

CVE-2025-48703 has been classified to as a Shell injection vulnerability or weakness.


Products Associated with CVE-2025-48703

Want to know whenever a new CVE is published for Centos Webpanel Centos Web Panel? stack.watch will email you.

 

Affected Versions

centos-webpanel CentOS Web Panel:

Exploit Probability

EPSS
62.02%
Percentile
98.35%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.