CVE-2025-66292

DPanel is an open source server management panel written in Go. Prior to 1.9.2, DPanel has an arbitrary file deletion vulnerability in the /api/common/attach/delete interface. Authenticated users can delete arbitrary files on the server via path traversal. When a user logs into the administrative backend, this interface can be used to delete files. The vulnerability lies in the Delete function within the app/common/http/controller/attach.go file. The path parameter submitted by the user is directly passed to storage.Local{}.GetSaveRealPath and subsequently to os.Remove without proper sanitization or checking for path traversal characters (../). And the helper function in common/service/storage/local.go uses filepath.Join, which resolves ../ but does not enforce a chroot/jail. This vulnerability is fixed in 1.9.2.
Configurations

Configuration 1 (hide)

cpe:2.3:a:dpanel:dpanel:*:*:*:*:*:go:*:*

History

No history.

Information

Published : 2026-01-15 17:16

Updated : 2026-03-12 18:07


NVD link : CVE-2025-66292

Mitre link : CVE-2025-66292

CVE.ORG link : CVE-2025-66292


JSON object : View

Products Affected

dpanel

  • dpanel
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

CWE-73

External Control of File Name or Path