CVE-2026-23525
January 18, 2026
1Panel is an open-source, web-based control panel for Linux server management. A stored Cross-Site Scripting (XSS) vulnerability exists in the 1Panel App Store when viewing application details. Malicious scripts can execute in the context of the user’s browser, potentially compromising session data or sensitive system interfaces. All versions of 1Panel up to and including v1.10.33-lts and v2.0.16 are affected. An attacker could publish a malicious application that, when loaded by users (locally or remotely), can execute arbitrary scripts. This may result in theft of user cookies, unauthorized access to system functions, or other actions that compromise the confidentiality, integrity, and availability of the system. The vulnerability is caused by insufficient sanitization of content rendered by the MdEditor component with the "previewOnly" attribute enabled. Specifically, the App Store renders application README content without proper XSS protection, allowing script execution during content rendering; and similar issues exist in system upgrade-related components, which can be fixed by implementing proper XSS sanitization in the MdEditor component. These vulnerabilities can be mitigated by applying proper XSS protection and sanitization when rendering content in the MdEditor component. Safe versions with a patch incorporated are v1.10.34-lts and v2.0.17.
Affected Packages
https://github.com/1Panel-dev/1Panel.git (GITHUB):
Affected version(s) >=v1.0.0 <v1.10.34-ltsFix Suggestion:
Update to version v1.10.34-ltshttps://github.com/1Panel-dev/1Panel.git (GITHUB):
Affected version(s) >=v2.0.0 <v2.0.17Fix Suggestion:
Update to version v2.0.17github.com/1Panel-dev/1Panel (GO):
Affected version(s) >=v2.0.0 <v2.0.17Fix Suggestion:
Update to version v2.0.17github.com/1Panel-dev/1Panel (GO):
Affected version(s) >=v1.0.0 <v1.10.34Fix Suggestion:
Update to version v1.10.34Related Resources (1)
Do you need more information?
Contact UsCVSS v4
Base Score:
7.3
Attack Vector
NETWORK
Attack Complexity
HIGH
Attack Requirements
NONE
Privileges Required
HIGH
User Interaction
PASSIVE
Vulnerable System Confidentiality
HIGH
Vulnerable System Integrity
HIGH
Vulnerable System Availability
HIGH
Subsequent System Confidentiality
NONE
Subsequent System Integrity
NONE
Subsequent System Availability
NONE
CVSS v3
Base Score:
6.4
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
HIGH
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
HIGH
Availability
HIGH
Weakness Type (CWE)
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
EPSS
Base Score:
0.07