ZPanel includes a helper binary named zsudo, intended to allow restricted privilege escalation for administrative tasks. However, when misconfigured in /etc/sudoers, zsudo can be invoked by low-privileged users to execute arbitrary commands as root. This flaw enables local attackers with shell access to escalate privileges by writing a payload to a writable directory and executing it via zsudo. The vulnerability is particularly impactful in post-exploitation scenarios following web server compromise, where the attacker inherits access to zsudo.
CVSS
No CVSS.
References
Configurations
No configuration.
History
05 Aug 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/linux/local/zpanel_zsudo.rb - | |
References | () https://www.exploit-db.com/exploits/26451 - |
05 Aug 2025, 14:34
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
04 Aug 2025, 18:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-08-04 18:15
Updated : 2025-08-05 16:15
NVD link : CVE-2013-10052
Mitre link : CVE-2013-10052
CVE.ORG link : CVE-2013-10052
JSON object : View
Products Affected
No product.
CWE
CWE-269
Improper Privilege Management