Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2025-52562 β€” AI Deep Analysis Summary

CVSS 10.0 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: Convoy Panel < 4.4.1 suffers from a **Directory Traversal** flaw in the `LocaleController`.…

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: **CWE-22 (Improper Limitation of a Pathname to a Restricted Directory)**. The `LocaleController` fails to sanitize user input, allowing path manipulation to escape the intended directory structure.

Q3Who is affected? (Versions/Components)

πŸ‘₯ **Affected**: **Convoy Panel** versions **prior to 4.4.1**. Specifically targets the **LocaleController** component used by hosting providers and enthusiasts.

Q4What can hackers do? (Privileges/Data)

πŸ’€ **Attacker Capabilities**: With **High** impact (CVSS H/H/H), hackers can: πŸ”“ Access sensitive server files (configs, keys). πŸ’Ύ Modify application logic.…

Q5Is exploitation threshold high? (Auth/Config)

⚑ **Exploitation Threshold**: **LOW**. CVSS Vector `AV:N/AC:L/PR:N/UI:N` means: 🌐 Network accessible. 🎯 Low complexity. πŸ”‘ No authentication required. πŸ‘€ No user interaction needed. Easy to exploit!

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ“¦ **Public Exploit**: **No**. The `pocs` field is empty. However, the vulnerability is confirmed via GitHub Advisory (GHSA-43g3-qpwq-hfgg). Wild exploitation is likely imminent given the low barrier.

Q7How to self-check? (Features/Scanning)

πŸ” **Self-Check**: Scan for Convoy Panel instances. Check version numbers. Look for `LocaleController` endpoints in network traffic.…

Q8Is it fixed officially? (Patch/Mitigation)

βœ… **Official Fix**: **YES**. Patched in **Convoy Panel 4.4.1**. πŸ“ Commit: `f8d6202f3e4912b65dbd9f80ba625576944ab36c`. Update immediately to the latest version.

Q9What if no patch? (Workaround)

🚧 **No Patch Workaround**: If you cannot update: 🚫 Restrict network access to the panel (Firewall/WAF). πŸ”’ Disable the `LocaleController` if possible. πŸ›‘ Monitor logs for unusual file access patterns.

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Urgency**: **CRITICAL**. CVSS Score is **High** (likely 9.8+). No auth required. Public advisory exists. **Action**: Patch NOW. Do not wait for an exploit to appear in the wild.