Convoy is a KVM server management panel for hosting businesses. In versions 3.9.0-rc3 to before 4.4.1, there is a directory traversal vulnerability in the LocaleController component of Performave Convoy. An unauthenticated remote attacker can exploit this vulnerability by sending a specially crafted HTTP request with malicious locale and namespace parameters. This allows the attacker to include and execute arbitrary PHP files on the server. This issue has been patched in version 4.4.1. A temporary workaround involves implementing strict Web Application Firewall (WAF) rules to incoming requests targeting the vulnerable endpoints.
Metrics
Affected Vendors & Products
References
History
Tue, 24 Jun 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 23 Jun 2025 21:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Convoy is a KVM server management panel for hosting businesses. In versions 3.9.0-rc3 to before 4.4.1, there is a directory traversal vulnerability in the LocaleController component of Performave Convoy. An unauthenticated remote attacker can exploit this vulnerability by sending a specially crafted HTTP request with malicious locale and namespace parameters. This allows the attacker to include and execute arbitrary PHP files on the server. This issue has been patched in version 4.4.1. A temporary workaround involves implementing strict Web Application Firewall (WAF) rules to incoming requests targeting the vulnerable endpoints. | |
Title | Convey Panel Directory Traversal in LocaleController leading to Remote Code Execution | |
Weaknesses | CWE-22 CWE-98 |
|
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-06-23T20:48:17.456Z
Updated: 2025-06-24T17:20:21.802Z
Reserved: 2025-06-18T03:55:52.035Z
Link: CVE-2025-52562

Updated: 2025-06-24T17:19:40.113Z

Status : Awaiting Analysis
Published: 2025-06-23T21:15:26.710
Modified: 2025-06-26T18:58:14.280
Link: CVE-2025-52562

No data.