CVE-2018-18548
Description
ajenticp (aka Ajenti Docker control panel) for Ajenti through v1.2.23.13 has XSS via a filename that is mishandled in File Manager.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Ajenti File Manager in Ajenti versions through 1.2.23.13 is vulnerable to stored XSS via a crafted filename.
Vulnerability
Ajenti 1 (aka Ajenti Docker control panel) through version v1.2.23.13 contains a stored cross-site scripting (XSS) vulnerability in its File Manager component [1][2]. The issue occurs because filenames are not properly sanitized before being displayed in the interface. An attacker who can create or rename a file on the server can inject arbitrary JavaScript code into the filename [1]. This affects all installations running Ajenti v1.2.23.13 or earlier [3].
Exploitation
To exploit this vulnerability, an attacker must have write access to the file system managed by the Ajenti File Manager, typically via valid credentials or through another compromise [1]. The attacker creates a file (or renames an existing file) using a name containing malicious JavaScript, such as ``. When an administrator or user views the file listing in the File Manager, the injected script is executed in their browser session [1]. No additional user interaction beyond viewing the file list is required [1].
Impact
Successful exploitation allows the attacker to execute arbitrary JavaScript in the context of the Ajenti application [1]. This enables session hijacking, credential theft, defacement, or redirection to malicious sites. Since Ajenti is a server administration panel, compromise could lead to full control of the underlying server if an administrator account is targeted [3].
Mitigation
As of the available references, no patched version has been released for Ajenti 1 [1][2][3]. The project's main repository indicates Ajenti 2 is under development [3], and mitigations may only be available in that major version. Users should restrict access to the File Manager to trusted users and avoid uploading or renaming files from untrusted sources until a fix is provided [1][2].
AI Insight generated on May 22, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
ajentiPyPI | <= 1.2.23.13 | — |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
7- www.exploit-db.com/exploits/45691/mitreexploitx_refsource_EXPLOIT-DB
- github.com/advisories/GHSA-5pcv-m8w2-62m9ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2018-18548ghsaADVISORY
- packetstormsecurity.com/files/149898/AjentiCP-1.2.23.13-Cross-Site-Scripting.htmlghsax_refsource_MISCWEB
- github.com/pypa/advisory-database/tree/main/vulns/ajenti/PYSEC-2018-107.yamlghsaWEB
- numanozdemir.com/ajenti-xss.txtghsax_refsource_MISCWEB
- www.exploit-db.com/exploits/45691ghsaWEB
News mentions
0No linked articles in our index yet.