VYPR
High severity8.8NVD Advisory· Published May 10, 2026· Updated May 13, 2026

CVE-2021-47949

CVE-2021-47949

Description

CyberPanel 2.1 contains a command execution vulnerability that allows authenticated attackers to read arbitrary files and execute remote code by exploiting symlink attacks through the filemanager controller endpoint. Attackers can manipulate the completeStartingPath parameter in POST requests to /filemanager/controller to create symbolic links, read sensitive files like database credentials, and execute arbitrary shell commands through the /websites/fetchFolderDetails endpoint.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

CyberPanel 2.1 has an authenticated remote code execution vulnerability via symlink attacks in the filemanager controller, enabling file reading and command execution.

Vulnerability

Overview

CVE-2021-47949 is an authenticated remote code execution vulnerability in CyberPanel version 2.1. The root cause lies in insufficient validation of the completeStartingPath parameter in POST requests to the /filemanager/controller endpoint. Attackers can manipulate this parameter to create symbolic links pointing to arbitrary files on the server, such as database credentials or system files [2][4].

Exploitation

Details

An attacker with valid CyberPanel credentials can exploit this flaw by sending a crafted POST request to /filemanager/controller with a malicious completeStartingPath value that creates a symlink. Subsequently, the attacker leverages the /websites/fetchFolderDetails endpoint to execute arbitrary shell commands through the symlink, effectively achieving remote code execution [2]. No additional privileges beyond a standard user account are required, making the attack surface broad for any authenticated user.

Impact

Successful exploitation allows an attacker to read sensitive files (e.g., database credentials, configuration files) and execute arbitrary operating system commands with the privileges of the web server. This can lead to full compromise of the CyberPanel server, including data exfiltration, lateral movement, and potential takeover of hosted websites [4].

Mitigation

The vulnerability affects CyberPanel version 2.1 and earlier. The CyberPanel project has addressed this issue in subsequent releases; users are strongly advised to upgrade to the latest version. Public exploit code is available [2], increasing the risk of active exploitation. No workarounds are documented, so patching is the recommended course of action.

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.