CVE-2025-25203
Description
CtrlPanel is open-source billing software for hosting providers. Prior to version 1.0, a Cross-Site Scripting (XSS) vulnerability exists in the TicketsController and Moderation/TicketsController due to insufficient input validation on the priority field during ticket creation and unsafe rendering of this field in the moderator panel. Version 1.0 contains a patch for the issue.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A stored XSS in CtrlPanel's TicketsController priority field allows attackers to execute scripts in the moderator's browser.
A stored Cross-Site Scripting (XSS) vulnerability was identified in CtrlPanel, an open-source billing platform for hosting providers, prior to version 1.0. The flaw resides in TicketsController and Moderation/TicketsController, where the priority field during ticket creation is not validated or sanitized [1]. The code directly accepts user input for the priority field without any filtering, and the same unsanitized data is later rendered with rawColumns in the moderator panel [1].
An attacker can exploit this by crafting a ticket with a malicious payload in the priority field [1]. Since the priority value is output directly as raw HTML in the dataTable method of Moderation/TicketsController, any injected script will be executed when a moderator views the ticket list [1]. No authentication is required other than being able to create a ticket; the attacker simply submits a ticket with an XSS payload as the priority.
Successful exploitation allows an attacker to execute arbitrary JavaScript in the context of the moderator's browser [1]. This can lead to session hijacking, credential theft, or further attacks against the hosting panel. The vulnerability is rated High with a CVSS v3 score of 8.1.
The issue was addressed in version 1.0 via commit 393cbde, which adds proper validation (e.g., 'priority' => ['required', 'in:Low,Medium,High']) to restrict the priority field to allowed values [2]. Users should upgrade to the latest patched version to mitigate the risk.
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1- Range: 0.1
Patches
2c26d81f87fdb393cbde662c7Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
2News mentions
0No linked articles in our index yet.