プラットフォーム
go
コンポーネント
github.com/1panel-dev/1panel
修正版
2.0.16
CVE-2025-34430 describes a cross-site request forgery (CSRF) vulnerability affecting 1Panel versions up to 2.0.15. This flaw allows an attacker to manipulate panel names without user consent, potentially leading to confusion or unauthorized modifications. The vulnerability resides within the panel name management functionality and lacks proper CSRF defenses. A patch is available to resolve this issue.
The primary impact of this CSRF vulnerability is the ability for an attacker to modify a victim's 1Panel panel name. This could be used for malicious purposes such as impersonation, phishing attacks, or simply disrupting the user experience. An attacker could craft a malicious webpage containing a request to change the panel name. If a user visits this page while authenticated in 1Panel, their session cookies will be automatically included in the request, allowing the attacker to successfully change the panel name to an arbitrary value. While the immediate impact may seem limited, it can be a stepping stone for further attacks or used to create confusion and distrust among users.
CVE-2025-34430 was publicly disclosed on December 10, 2025. No public proof-of-concept (PoC) code is currently available. The EPSS score is pending evaluation. There are no known active campaigns exploiting this vulnerability at this time. This vulnerability is not currently listed on the CISA KEV catalog.
Users of 1Panel versions 1.10.33 through 2.0.15 are at risk. This includes individuals and organizations relying on 1Panel for web hosting and server management. Shared hosting environments where multiple users share the same 1Panel instance are particularly vulnerable, as an attacker could potentially target other users within the same environment.
• linux / server: Monitor 1Panel logs for suspicious panel name change requests. Look for requests originating from unexpected IP addresses or with unusual user agents.
journalctl -u 1Panel -f | grep 'panel name changed'• generic web: Inspect HTTP requests to the panel name management endpoint for missing or invalid CSRF tokens. Use curl to manually test the endpoint with crafted requests.
curl -X POST -d 'new_panel_name=MaliciousName' <panel_name_endpoint>disclosure
エクスプロイト状況
EPSS
0.03% (9% パーセンタイル)
CISA SSVC
CVSS ベクトル
The recommended mitigation for CVE-2025-34430 is to upgrade 1Panel to a version that includes the fix. Unfortunately, the specific fixed version is not provided. Until an updated version is available, consider implementing temporary workarounds such as restricting access to the panel name management functionality to trusted users or implementing stricter authentication measures. Web application firewalls (WAFs) can be configured to detect and block suspicious CSRF requests based on patterns and referer checks. Monitor 1Panel logs for unusual panel name changes.
1Panel を 2.0.15 以降のバージョンにアップデートしてください。これにより、パネル名管理における CSRF 脆弱性が修正されます。
脆弱性分析と重要アラートをメールでお届けします。
CVE-2025-34430 is a cross-site request forgery (CSRF) vulnerability in 1Panel versions 1.10.33 through 2.0.15, allowing attackers to change panel names without consent.
If you are using 1Panel version 1.10.33 or later, and less than or equal to 2.0.15, you are potentially affected by this vulnerability.
Upgrade 1Panel to a patched version that addresses this vulnerability. The specific fixed version is not provided, so monitor the 1Panel website for updates.
As of December 10, 2025, there are no confirmed reports of active exploitation of CVE-2025-34430.
Refer to the official 1Panel website and security advisories for the latest information and updates regarding CVE-2025-34430.
go.mod ファイルをアップロードすると、影響の有無を即座にお知らせします。