VYPR
Moderate severityNVD Advisory· Published Oct 24, 2018· Updated Aug 5, 2024

CVE-2018-18548

CVE-2018-18548

Description

ajenticp (aka Ajenti Docker control panel) for Ajenti through v1.2.23.13 has XSS via a filename that is mishandled in File Manager.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Ajenti File Manager in Ajenti versions through 1.2.23.13 is vulnerable to stored XSS via a crafted filename.

Vulnerability

Ajenti 1 (aka Ajenti Docker control panel) through version v1.2.23.13 contains a stored cross-site scripting (XSS) vulnerability in its File Manager component [1][2]. The issue occurs because filenames are not properly sanitized before being displayed in the interface. An attacker who can create or rename a file on the server can inject arbitrary JavaScript code into the filename [1]. This affects all installations running Ajenti v1.2.23.13 or earlier [3].

Exploitation

To exploit this vulnerability, an attacker must have write access to the file system managed by the Ajenti File Manager, typically via valid credentials or through another compromise [1]. The attacker creates a file (or renames an existing file) using a name containing malicious JavaScript, such as ``. When an administrator or user views the file listing in the File Manager, the injected script is executed in their browser session [1]. No additional user interaction beyond viewing the file list is required [1].

Impact

Successful exploitation allows the attacker to execute arbitrary JavaScript in the context of the Ajenti application [1]. This enables session hijacking, credential theft, defacement, or redirection to malicious sites. Since Ajenti is a server administration panel, compromise could lead to full control of the underlying server if an administrator account is targeted [3].

Mitigation

As of the available references, no patched version has been released for Ajenti 1 [1][2][3]. The project's main repository indicates Ajenti 2 is under development [3], and mitigations may only be available in that major version. Users should restrict access to the File Manager to trusted users and avoid uploading or renaming files from untrusted sources until a fix is provided [1][2].

AI Insight generated on May 22, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
ajentiPyPI
<= 1.2.23.13

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

7

News mentions

0

No linked articles in our index yet.