RatPanel is a server operation and maintenance management panel. In versions 2.3.19 through 2.5.5, when an attacker obtains the backend login path of RatPanel (including but not limited to weak default paths, brute-force cracking, etc.), they can execute system commands or take over hosts managed by the panel without logging in. In addition to this remote code execution (RCE) vulnerability, the flawed code also leads to unauthorized access. RatPanel uses the CleanPath middleware provided by github.com/go-chi/chi package to clean URLs, but but the middleware does not process r.URL.Path, which can cause the paths to be misinterpreted. This is fixed in version 2.5.6.
Metrics
Affected Vendors & Products
References
History
Thu, 07 Aug 2025 07:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Ratpanel Project
Ratpanel Project ratpanel |
|
Vendors & Products |
Ratpanel Project
Ratpanel Project ratpanel |
Wed, 06 Aug 2025 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 05 Aug 2025 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | RatPanel is a server operation and maintenance management panel. In versions 2.3.19 through 2.5.5, when an attacker obtains the backend login path of RatPanel (including but not limited to weak default paths, brute-force cracking, etc.), they can execute system commands or take over hosts managed by the panel without logging in. In addition to this remote code execution (RCE) vulnerability, the flawed code also leads to unauthorized access. RatPanel uses the CleanPath middleware provided by github.com/go-chi/chi package to clean URLs, but but the middleware does not process r.URL.Path, which can cause the paths to be misinterpreted. This is fixed in version 2.5.6. | |
Title | RatPanel can perform remote command execution without authorization | |
Weaknesses | CWE-305 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-08-05T20:58:56.350Z
Updated: 2025-08-06T19:21:42.760Z
Reserved: 2025-07-02T15:15:11.515Z
Link: CVE-2025-53534

Updated: 2025-08-06T16:14:53.446Z

Status : Awaiting Analysis
Published: 2025-08-05T21:15:38.897
Modified: 2025-08-06T20:23:52.133
Link: CVE-2025-53534

No data.