GHSA-qmg5-v42x-qqhq

Suggest an improvement
Source
https://github.com/advisories/GHSA-qmg5-v42x-qqhq
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/12/GHSA-qmg5-v42x-qqhq/GHSA-qmg5-v42x-qqhq.json
JSON Data
https://api.test.osv.dev/v1/vulns/GHSA-qmg5-v42x-qqhq
Aliases
  • CVE-2025-66507
Published
2025-12-08T17:56:27Z
Modified
2025-12-08T18:11:15.662751Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
Summary
1Panel – CAPTCHA Bypass via Client-Controlled Flag
Details

Summary

A CAPTCHA bypass vulnerability in the 1Panel authentication API allows an unauthenticated attacker to disable CAPTCHA verification by abusing a client-controlled parameter. Because the server previously trusted this value without proper validation, CAPTCHA protections could be bypassed, enabling automated login attempts and significantly increasing the risk of account takeover (ATO).

Details

The /api/login endpoint accepts a boolean field named ignoreCaptcha directly from the client request body:

"ignoreCaptcha": true

The backend implementation uses this value to determine whether CAPTCHA validation should be performed:

if !req.IgnoreCaptcha {
    if errMsg := captcha.VerifyCode(req.CaptchaID, req.Captcha); errMsg != "" {
        helper.BadAuth(c, errMsg, nil)
        return
    }
}

Because req.IgnoreCaptcha is taken directly from user input—with no server-side validation, no session binding, and no privilege checks—any unauthenticated attacker can force CAPTCHA validation to be skipped.

There are no additional conditions, such as:

no requirement for MFA

no trusted device

no IP reputation checks

no prior valid session

no rate limiting

This results in CAPTCHA being entirely client-controlled, which violates fundamental authentication and anti-automation security assumptions.

Database specific
{
    "github_reviewed": true,
    "nvd_published_at": null,
    "severity": "HIGH",
    "cwe_ids": [
        "CWE-290",
        "CWE-602",
        "CWE-807"
    ],
    "github_reviewed_at": "2025-12-08T17:56:27Z"
}
References

Affected packages

Go / github.com/1Panel-dev/1Panel

Package

Name
github.com/1Panel-dev/1Panel
View open source insights on deps.dev
Purl
pkg:golang/github.com/1Panel-dev/1Panel

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.0.14

Go / github.com/1Panel-dev/1Panel/core

Package

Name
github.com/1Panel-dev/1Panel/core
View open source insights on deps.dev
Purl
pkg:golang/github.com/1Panel-dev/1Panel/core

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.0.0-20251128030527-ac43f00273be