CVE-2022-2636

Plain English Summary

AI-powered analysis for quick understanding

This vulnerability allows an attacker to inject malicious code into the HestiaCP control panel, potentially leading to unauthorized access or control over the system. It requires the attacker to have access to the control panel, making it critical for administrators to ensure only trusted users can log in.

Technical Description

Improper Control of Generation of Code ('Code Injection') in GitHub repository hestiacp/hestiacp prior to 1.6.6.

CVSS Vector Analysis

Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
Confidentiality ImpactHigh
Integrity ImpactHigh
Availability ImpactHigh
ScopeUnchanged

Vector String

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References

Est. Bounty
$4,789($1K-$5K)
Vendor Response
Grade FPatched in 1300 days

Quick Information

Published

Aug 5, 2022

over 3 years ago

Last Modified

Feb 25, 2026

about 1 month ago

Vendor

hestiacp

Product

control panel