Description
ZPanel includes a helper binary named zsudo, intended to allow restricted privilege escalation for administrative tasks. However, when misconfigured in /etc/sudoers, zsudo can be invoked by low-privileged users to execute arbitrary commands as root. This flaw enables local attackers with shell access to escalate privileges by writing a payload to a writable directory and executing it via zsudo. The vulnerability is particularly impactful in post-exploitation scenarios following web server compromise, where the attacker inherits access to zsudo.
Published: 2025-08-04
Score: 8.5 High
EPSS: 1.9% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2013-7277 ZPanel includes a helper binary named zsudo, intended to allow restricted privilege escalation for administrative tasks. However, when misconfigured in /etc/sudoers, zsudo can be invoked by low-privileged users to execute arbitrary commands as root. This flaw enables local attackers with shell access to escalate privileges by writing a payload to a writable directory and executing it via zsudo. The vulnerability is particularly impactful in post-exploitation scenarios following web server compromise, where the attacker inherits access to zsudo.
History

Thu, 20 Nov 2025 23:45:00 +0000

Type Values Removed Values Added
First Time appeared Zpanel Project
Zpanel Project zpanel
CPEs cpe:2.3:a:zpanel_project:zpanel:*:*:*:*:*:*:*:*
Vendors & Products Zpanel Project
Zpanel Project zpanel

Tue, 05 Aug 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 05 Aug 2025 07:45:00 +0000

Type Values Removed Values Added
First Time appeared Zpanel
Zpanel zpanel
Vendors & Products Zpanel
Zpanel zpanel

Mon, 04 Aug 2025 18:15:00 +0000

Type Values Removed Values Added
Description ZPanel includes a helper binary named zsudo, intended to allow restricted privilege escalation for administrative tasks. However, when misconfigured in /etc/sudoers, zsudo can be invoked by low-privileged users to execute arbitrary commands as root. This flaw enables local attackers with shell access to escalate privileges by writing a payload to a writable directory and executing it via zsudo. The vulnerability is particularly impactful in post-exploitation scenarios following web server compromise, where the attacker inherits access to zsudo.
Title ZPanel zsudo Local Privilege Escalation
Weaknesses CWE-269
References
Metrics cvssV4_0

{'score': 8.5, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

Zpanel Zpanel
Zpanel Project Zpanel
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-04-07T14:03:09.541Z

Reserved: 2025-08-01T15:15:33.216Z

Link: CVE-2013-10052

cve-icon Vulnrichment

Updated: 2025-08-05T15:52:56.645Z

cve-icon NVD

Status : Deferred

Published: 2025-08-04T18:15:33.923

Modified: 2026-04-15T00:35:42.020

Link: CVE-2013-10052

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-08-05T07:25:39Z

Weaknesses