OS Command injection vulnerability in function OperateSSH in 1panel 2.0.8 allowing attackers to execute arbitrary commands via the operation parameter to the /api/v2/hosts/ssh/operate endpoint.
                
            References
                    | Link | Resource | 
|---|---|
| https://github.com/August829/CVEP/issues/5 | Issue Tracking | 
| https://github.com/August829/Yu/blob/main/20250812_1.md | Broken Link | 
Configurations
                    History
                    17 Sep 2025, 20:28
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://github.com/August829/CVEP/issues/5 - Issue Tracking | |
| References | () https://github.com/August829/Yu/blob/main/20250812_1.md - Broken Link | |
| CPE | cpe:2.3:a:1panel:1panel:2.0.8:*:*:*:*:*:*:* | |
| First Time | 
        
        1panel
         1panel 1panel  | 
10 Sep 2025, 15:15
| Type | Values Removed | Values Added | 
|---|---|---|
| CVSS | 
        v2 :  v3 :  | 
    
        v2 : unknown
         v3 : 8.8  | 
| CWE | CWE-78 | 
10 Sep 2025, 14:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2025-09-10 14:15
Updated : 2025-09-17 20:28
NVD link : CVE-2025-56413
Mitre link : CVE-2025-56413
CVE.ORG link : CVE-2025-56413
JSON object : View
Products Affected
                1panel
- 1panel
 
CWE
                
                    
                        
                        CWE-78
                        
            Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
