VYPR
High severity8.1OSV Advisory· Published Feb 11, 2025· Updated Apr 15, 2026

CVE-2025-25203

CVE-2025-25203

Description

CtrlPanel is open-source billing software for hosting providers. Prior to version 1.0, a Cross-Site Scripting (XSS) vulnerability exists in the TicketsController and Moderation/TicketsController due to insufficient input validation on the priority field during ticket creation and unsafe rendering of this field in the moderator panel. Version 1.0 contains a patch for the issue.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A stored XSS in CtrlPanel's TicketsController priority field allows attackers to execute scripts in the moderator's browser.

A stored Cross-Site Scripting (XSS) vulnerability was identified in CtrlPanel, an open-source billing platform for hosting providers, prior to version 1.0. The flaw resides in TicketsController and Moderation/TicketsController, where the priority field during ticket creation is not validated or sanitized [1]. The code directly accepts user input for the priority field without any filtering, and the same unsanitized data is later rendered with rawColumns in the moderator panel [1].

An attacker can exploit this by crafting a ticket with a malicious payload in the priority field [1]. Since the priority value is output directly as raw HTML in the dataTable method of Moderation/TicketsController, any injected script will be executed when a moderator views the ticket list [1]. No authentication is required other than being able to create a ticket; the attacker simply submits a ticket with an XSS payload as the priority.

Successful exploitation allows an attacker to execute arbitrary JavaScript in the context of the moderator's browser [1]. This can lead to session hijacking, credential theft, or further attacks against the hosting panel. The vulnerability is rated High with a CVSS v3 score of 8.1.

The issue was addressed in version 1.0 via commit 393cbde, which adds proper validation (e.g., 'priority' => ['required', 'in:Low,Medium,High']) to restrict the priority field to allowed values [2]. Users should upgrade to the latest patched version to mitigate the risk.

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

2

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

2

News mentions

0

No linked articles in our index yet.