CVE-2021-47949
Description
CyberPanel 2.1 contains a command execution vulnerability that allows authenticated attackers to read arbitrary files and execute remote code by exploiting symlink attacks through the filemanager controller endpoint. Attackers can manipulate the completeStartingPath parameter in POST requests to /filemanager/controller to create symbolic links, read sensitive files like database credentials, and execute arbitrary shell commands through the /websites/fetchFolderDetails endpoint.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
CyberPanel 2.1 has an authenticated remote code execution vulnerability via symlink attacks in the filemanager controller, enabling file reading and command execution.
Vulnerability
Overview
CVE-2021-47949 is an authenticated remote code execution vulnerability in CyberPanel version 2.1. The root cause lies in insufficient validation of the completeStartingPath parameter in POST requests to the /filemanager/controller endpoint. Attackers can manipulate this parameter to create symbolic links pointing to arbitrary files on the server, such as database credentials or system files [2][4].
Exploitation
Details
An attacker with valid CyberPanel credentials can exploit this flaw by sending a crafted POST request to /filemanager/controller with a malicious completeStartingPath value that creates a symlink. Subsequently, the attacker leverages the /websites/fetchFolderDetails endpoint to execute arbitrary shell commands through the symlink, effectively achieving remote code execution [2]. No additional privileges beyond a standard user account are required, making the attack surface broad for any authenticated user.
Impact
Successful exploitation allows an attacker to read sensitive files (e.g., database credentials, configuration files) and execute arbitrary operating system commands with the privileges of the web server. This can lead to full compromise of the CyberPanel server, including data exfiltration, lateral movement, and potential takeover of hosted websites [4].
Mitigation
The vulnerability affects CyberPanel version 2.1 and earlier. The CyberPanel project has addressed this issue in subsequent releases; users are strongly advised to upgrade to the latest version. Public exploit code is available [2], increasing the risk of active exploitation. No workarounds are documented, so patching is the recommended course of action.
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2(expand)+ 1 more
- (no CPE)
- (no CPE)range: =2.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3News mentions
0No linked articles in our index yet.