{"id":"CVE-2023-33747","details":"CloudPanel v2.2.2 allows attackers to execute a path traversal.","modified":"2026-04-11T12:45:17.286462Z","published":"2023-06-06T18:15:11.497Z","database_specific":{},"references":[{"type":"WEB","url":"https://cwe.mitre.org/data/definitions/264.html"},{"type":"WEB","url":"https://cwe.mitre.org/data/definitions/269.html"},{"type":"WEB","url":"https://cwe.mitre.org/data/definitions/35.html"},{"type":"ADVISORY","url":"https://www.cloudpanel.io/docs/v2/changelog/"},{"type":"EVIDENCE","url":"http://packetstormsecurity.com/files/172768/CloudPanel-2.2.2-Privilege-Escalation-Path-Traversal.html"},{"type":"EVIDENCE","url":"https://github.com/EagleTube/CloudPanel"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/cloudpanel-io/cloudpanel-ce","events":[{"introduced":"3af11e531206d2c05a206c34c039547ccdd3d1d7"},{"last_affected":"3e154cf3de190507b67868de58cf36d69e48de9c"}],"database_specific":{"cpe":"cpe:2.3:a:mgt-commerce:cloudpanel:*:*:*:*:*:*:*:*","extracted_events":[{"introduced":"2.0.0"},{"last_affected":"2.2.2"}],"source":"CPE_FIELD"}}],"versions":["v2.0.0","v2.0.1","v2.0.2","v2.0.3","v2.0.4","v2.1.0","v2.2.0","v2.2.1","v2.2.2"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-33747.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}