A new alert has been issued by The Cybersecurity and Infrastructure Security Agency (CISA) today about active exploitation of a severe vulnerability in Control Web Panel (CWP) - a widely used server management tool for CentOS-based systems.
CVE-2025-48703 allows unauthenticated remote code execution via OS command injection. Attackers must know a valid non-root username, but these can be easy to guess.
CISA issued a remediation deadline of November 25, urging immediate action. The flaw affects all CWP versions prior to 0.9.8.1205, released in June 2025.
Help Net Security reports that system administrators are advised to upgrade to the patched version, restrict UI access on port 2083 to trusted IPs, and monitor for indicators of compromise such as suspicious shell commands, modified .bashrc files, or unauthorized user accounts. If no vendor patch is available, CISA recommends considering a migration to alternative hosting panel solutions. Organizations should also deploy web application firewalls and intrusion detection systems to detect ongoing exploitation attempts.
CVE-2025-48703 allows unauthenticated remote code execution via OS command injection. Attackers must know a valid non-root username, but these can be easy to guess.
CISA issued a remediation deadline of November 25, urging immediate action. The flaw affects all CWP versions prior to 0.9.8.1205, released in June 2025.
Help Net Security reports that system administrators are advised to upgrade to the patched version, restrict UI access on port 2083 to trusted IPs, and monitor for indicators of compromise such as suspicious shell commands, modified .bashrc files, or unauthorized user accounts. If no vendor patch is available, CISA recommends considering a migration to alternative hosting panel solutions. Organizations should also deploy web application firewalls and intrusion detection systems to detect ongoing exploitation attempts.


