Description
A remote command execution vulnerability exists in ZPanel version 10.0.0.2 in its htpasswd module. When creating .htaccess files, the inHTUsername field is passed unsanitized to a system() call that invokes the system’s htpasswd binary. By injecting shell metacharacters into the username field, an authenticated attacker can execute arbitrary system commands. Exploitation requires a valid ZPanel account—such as one in the default Users, Resellers, or Administrators groups—but no elevated privileges.
INFO
Published Date :
2025-08-01T20:49:05.360Z
Last Modified :
2026-03-23T15:43:18.117Z
Source :
VulnCheck
AFFECTED PRODUCTS
The following products are affected by CVE-2013-10053 vulnerability.
| Vendors | Products |
|---|---|
| Zpanel Project |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2013-10053.
CVSS Vulnerability Scoring System
Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Attack Requirements
Privileges Required
User Interaction
VS Confidentiality
VS Integrity
VS Availability
SS Confidentiality
SS Integrity
SS Availability