The cybersecurity landscape is currently on high alert due to the discovery of CVE-2024-51378, a serious authentication bypass vulnerability in CyberPanel. This web hosting control panel flaw could allow attackers to execute arbitrary commands remotely, increasing the urgency for users to update their systems.
CVE-2024-51378 affects several versions of CyberPanel, including all versions up to 2.3.6 and the unpatched 2.3.7. It was particularly noted for being exploited by the PSAUX ransomware group during an extensive campaign in October 2024 targeting around 22,000 instances. "This vulnerability enables unauthenticated remote attackers to achieve complete system compromise through command injection," emphasized security analysts aware of the incident.
"This vulnerability enables unauthenticated remote attackers to achieve complete system compromise through command injection,"
The vulnerability resides within the getresetstatus function found in the dns/views.py and ftp/views.py files. Herein lies a critical oversight: the authentication middleware in CyberPanel fails to adequately validate methods beyond POST requests. Instead of blocking unauthorized access, these endpoints permit attackers to bypass the authentication entirely. "Attackers can exploit this oversight by sending requests using alternative HTTP methods," explained a cybersecurity researcher familiar with the flaw.
"Attackers can exploit this oversight by sending requests using alternative HTTP methods,"

Race Results
As a result, once an attacker bypasses authentication, they can inject shell metacharacters via the statusfile property. This weak point allows malicious commands to be executed under the CyberPanel service account privileges due to improper input validation prior to passing user inputs to system shell commands.
The gravity of the situation is further underscored by the fact that the vulnerability has been actively listed in CISA's Known Exploited Vulnerabilities (KEV) catalog, indicating it has become a common target for hackers. "It's a significant wake-up call for users of CyberPanel," said one security expert. "Those running affected versions are at risk of complete system compromise."
"It's a significant wake-up call for users of CyberPanel,"
The root cause of this vulnerability can be traced to two primary failures: the lack of robust protections for HTTP methods other than POST and the direct incorporation of unsanitized parameters into shell command execution paths. "Simply put, the defenses that were supposed to prevent unauthorized access were insufficient," noted an industry analyst.
"Simply put, the defenses that were supposed to prevent unauthorized access were insufficient,"
Championship Implications
Attack vectors for exploiting this vulnerability are alarmingly straightforward. Attackers can craft specific HTTP requests to the /dns/getresetstatus or /ftp/getresetstatus endpoints without requiring user interaction or authentication. By employing methods other than POST and injecting shell metacharacters in the statusfile parameter, they can achieve complete control over the affected systems. "This represents a serious vulnerability that could have severe ramifications if left unaddressed," warned a prominent cybersecurity consultant.
"This represents a serious vulnerability that could have severe ramifications if left unaddressed,"

The timeline of this discovery shows that CVE-2024-51378 was published to the National Vulnerability Database (NVD) on October 29, 2024, and has since undergone updates. "Organizations need to take immediate action to patch their systems and secure their installations," concluded the researcher, emphasizing the need for vigilance within the cybersecurity community.
"Organizations need to take immediate action to patch their systems and secure their installations,"
Looking Ahead
Given the growing prevalence of ransomware attacks and the sophistication of modern cyber threats, the attention surrounding CVE-2024-51378 serves as a crucial reminder. It highlights the necessity for constant vigilance, timely updates, and enhanced security protocols to safeguard against future breaches. As experts advise staying informed and proactive, the pressing question remains: How many more vulnerabilities are yet to be discovered in widely used software like CyberPanel?


