VYPR

Packagist (Composer) package

billz/raspap-webgui

pkg:composer/billz/raspap-webgui

Vulnerabilities (10)

  • CVE-2026-24788HigFeb 2, 2026
    affected < 3.3.6fixed 3.3.6

    RaspAP raspap-webgui versions prior to 3.3.6 contain an OS command injection vulnerability. If exploited, an arbitrary OS command may be executed by a user who can log in to the product.

  • CVE-2025-44163Jun 27, 2025
    affected < 3.3.6fixed 3.3.6

    RaspAP raspap-webgui 3.3.1 is vulnerable to Directory Traversal in ajax/networking/get_wgkey.php. An authenticated attacker can send a crafted POST request with a path traversal payload in the `entity` parameter to overwrite arbitrary files writable by the web server via abuse of

  • CVE-2024-41637HigJul 29, 2024
    affected <= 3.1.4

    RaspAP before 3.1.5 allows an attacker to escalate privileges: the www-data user has write access to the restapi.service file and also possesses Sudo privileges to execute several critical commands without a password.

  • CVE-2024-2497Mar 15, 2024
    affected <= 3.0.9

    A vulnerability was found in RaspAP raspap-webgui 3.0.9 and classified as critical. This issue affects some unknown processing of the file includes/provider.php of the component HTTP POST Request Handler. The manipulation of the argument country leads to code injection. The attac

  • CVE-2024-28754Mar 8, 2024
    affected < 3.1.0fixed 3.1.0

    RaspAP (aka raspap-webgui) through 3.0.9 allows remote attackers to cause a persistent denial of service (bricking) via a crafted request.

  • CVE-2022-39987Aug 1, 2023
    affected >= 2.8.0, < 2.9.5fixed 2.9.5

    A Command injection vulnerability in RaspAP 2.8.0 thru 2.9.2 allows an authenticated attacker to execute arbitrary OS commands as root via the "entity" POST parameters in /ajax/networking/get_wgkey.php.

  • CVE-2022-39986Aug 1, 2023
    affected >= 2.8.0, < 2.8.8fixed 2.8.8

    A Command injection vulnerability in RaspAP 2.8.0 thru 2.8.7 allows unauthenticated attackers to execute arbitrary commands via the cfg_id parameter in /ajax/openvpn/activate_ovpncfg.php and /ajax/openvpn/del_ovpncfg.php.

  • CVE-2023-30260Jun 23, 2023
    affected < 2.8.9fixed 2.8.9

    Command injection vulnerability in RaspAP raspap-webgui 2.8.8 and earlier allows remote attackers to run arbitrary commands via crafted POST request to hostapd settings form.

  • CVE-2021-38556Aug 24, 2021
    affected <= 2.6.6

    includes/configure_client.php in RaspAP 2.6.6 allows attackers to execute commands via command injection.

  • CVE-2021-38557Aug 24, 2021
    affected <= 2.6.6

    raspap-webgui in RaspAP 2.6.6 allows attackers to execute commands as root because of the insecure sudoers permissions. The www-data account can execute /etc/raspap/hostapd/enablelog.sh as root with no password; however, the www-data account can also overwrite /etc/raspap/hostapd