{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-66507","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2025-12-03T15:12:22.978Z","datePublished":"2025-12-09T01:25:48.140Z","dateUpdated":"2025-12-09T16:03:18.696Z"},"containers":{"cna":{"title":"1Panel – CAPTCHA Bypass via Client-Controlled Flag","problemTypes":[{"descriptions":[{"cweId":"CWE-602","lang":"en","description":"CWE-602: Client-Side Enforcement of Server-Side Security","type":"CWE"}]},{"descriptions":[{"cweId":"CWE-807","lang":"en","description":"CWE-807: Reliance on Untrusted Inputs in a Security Decision","type":"CWE"}]},{"descriptions":[{"cweId":"CWE-290","lang":"en","description":"CWE-290: Authentication Bypass by Spoofing","type":"CWE"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":7.5,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","version":"3.1"}}],"references":[{"name":"https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-qmg5-v42x-qqhq","tags":["x_refsource_CONFIRM"],"url":"https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-qmg5-v42x-qqhq"},{"name":"https://github.com/1Panel-dev/1Panel/commit/ac43f00273be745f8d04b90b6e2b9c1a40ef7bca","tags":["x_refsource_MISC"],"url":"https://github.com/1Panel-dev/1Panel/commit/ac43f00273be745f8d04b90b6e2b9c1a40ef7bca"},{"name":"https://github.com/1Panel-dev/1Panel/releases/tag/v2.0.14","tags":["x_refsource_MISC"],"url":"https://github.com/1Panel-dev/1Panel/releases/tag/v2.0.14"}],"affected":[{"vendor":"1Panel-dev","product":"1Panel","versions":[{"version":"< 2.0.14","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2025-12-09T01:25:48.140Z"},"descriptions":[{"lang":"en","value":"1Panel is an open-source, web-based control panel for Linux server management. Versions 2.0.13 and below allow an unauthenticated attacker to disable CAPTCHA verification by abusing a client-controlled parameter. Because the server previously trusted this value without proper validation, CAPTCHA protections can be bypassed, enabling automated login attempts and significantly increasing the risk of account takeover (ATO). This issue is fixed in version 2.0.14."}],"source":{"advisory":"GHSA-qmg5-v42x-qqhq","discovery":"UNKNOWN"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-12-09T14:17:19.235491Z","id":"CVE-2025-66507","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-12-09T16:03:18.696Z"}}]}}