J-Security Center

Title: cPanel Passwd Remote SQL Injection Vulnerability

Severity: HIGH


cPanel is a multi-platform web hosting control panel that allows a user to manage their hosted account through a web-based interface. It is available for Unix and Linux variants.

cPanel is reportedly affected by a remote SQL injection vulnerability in the passwd script. This issue is due to a failure of the application to properly sanitize user-supplied URI parameter input before using it in an SQL query.

The problem presents itself when malicious SQL statements are passed to the 'passwd' script through the 'password', 'domain', and 'user' parameters.

As a result of this a malicious user may influence database queries in order to view or modify sensitive information, potentially compromising the software or the database. Because cPanel is employed in a multi-hosting environment it is reported that it may be possible for an attacker to disclose or modify the administrator password hash of other cPanel hosted sites by exploiting this issue.

Affected Products:

  • cPanel cPanel 5.0.0
  • cPanel cPanel 5.3.0
  • cPanel cPanel 6.0.0
  • cPanel cPanel 6.2.0
  • cPanel cPanel 6.4.0
  • cPanel cPanel 6.4.1
  • cPanel cPanel 6.4.2
  • cPanel cPanel 6.4.2.STABLE_48
  • cPanel cPanel 7.0.0
  • cPanel cPanel 8.0.0
  • cPanel cPanel 9.0.0
  • cPanel cPanel 9.1.0
  • cPanel cPanel


Juniper Networks provides this content via a wide variety of sources and production methods. If notified of errors or omissions in the content of this page, Juniper Networks, at its discretion, will modify or remove the page or leave the content as is, depending on various factors including but not limited to the reputation and authority of the party providing the notification. Please use the contact information displayed elsewhere on this page to report any errors or omissions regarding the content on this page.