VYPR
Low severity3.5OSV Advisory· Published Dec 30, 2025· Updated Apr 29, 2026

CVE-2025-15241

CVE-2025-15241

Description

A security vulnerability has been detected in CloudPanel Community Edition up to 2.5.1. The affected element is an unknown function of the file /admin/users of the component HTTP Header Handler. Such manipulation of the argument Referer leads to open redirect. It is possible to launch the attack remotely. The exploit has been disclosed publicly and may be used. Upgrading to version 2.5.2 is sufficient to fix this issue. Upgrading the affected component is recommended.

Affected products

1

Patches

1
4578c74711bc

.

https://github.com/cloudpanel-io/cloudpanel-ceStefan WieczorekNov 26, 2024via osv
1 file changed · +1 1
  • README.md+1 1 modified
    @@ -10,7 +10,7 @@ Run **PHP**, **Node.js**, **Static Websites**, **Reverse Proxies** and **Python
     
     <p align="center">
       <a href="https://www.cloudpanel.io" target="_blank">
    -    <img src="/assets/images/cloudpanel.png?v=0.0.5">
    +    <img src="/assets/images/cloudpanel.png?v=0.0.6">
       </a>
     </p>
     
    

Vulnerability mechanics

Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

4

News mentions

0

No linked articles in our index yet.