Description
1Panel is an open-source, web-based control panel for Linux server management. Versions 2.0.14 and below use Gin's default configuration which trusts all IP addresses as proxies (TrustedProxies = 0.0.0.0/0), allowing any client to spoof the X-Forwarded-For header. Since all IP-based access controls (AllowIPs, API whitelists, localhost-only checks) rely on ClientIP(), attackers can bypass these protections by simply sending X-Forwarded-For: 127.0.0.1 or any whitelisted IP. This renders all IP-based security controls ineffective. This issue is fixed in version 2.0.14.
Published: 2025-12-09
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-7cqv-qcq2-r765 1Panel IP Access Control Bypass via Untrusted X-Forwarded-For Headers
History

Wed, 10 Dec 2025 21:30:00 +0000

Type Values Removed Values Added
First Time appeared Fit2cloud
Fit2cloud 1panel
CPEs cpe:2.3:a:fit2cloud:1panel:*:*:*:*:*:*:*:*
Vendors & Products Fit2cloud
Fit2cloud 1panel

Tue, 09 Dec 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 09 Dec 2025 10:15:00 +0000

Type Values Removed Values Added
First Time appeared 1panel
1panel 1panel
Vendors & Products 1panel
1panel 1panel

Tue, 09 Dec 2025 02:00:00 +0000

Type Values Removed Values Added
Description 1Panel is an open-source, web-based control panel for Linux server management. Versions 2.0.14 and below use Gin's default configuration which trusts all IP addresses as proxies (TrustedProxies = 0.0.0.0/0), allowing any client to spoof the X-Forwarded-For header. Since all IP-based access controls (AllowIPs, API whitelists, localhost-only checks) rely on ClientIP(), attackers can bypass these protections by simply sending X-Forwarded-For: 127.0.0.1 or any whitelisted IP. This renders all IP-based security controls ineffective. This issue is fixed in version 2.0.14.
Title 1Panel IP Access Control Bypass via Untrusted X-Forwarded-For Headers
Weaknesses CWE-290
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2025-12-09T16:03:08.608Z

Reserved: 2025-12-03T15:12:22.978Z

Link: CVE-2025-66508

cve-icon Vulnrichment

Updated: 2025-12-09T14:17:10.920Z

cve-icon NVD

Status : Analyzed

Published: 2025-12-09T16:18:19.437

Modified: 2025-12-10T21:28:08.197

Link: CVE-2025-66508

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-12-09T10:04:27Z

Weaknesses