Critical Vulnerability Information Vulnerability Overview Vulnerability Name: RatPanel can perform remote command execution without authorization CVE ID: CVE-2022-50331 Severity: 7.7/10 Affected Versions Affected Versions: v2.3.19 to v2.5.6 Fixed Version: v2.5.6 Vulnerability Description When an attacker accesses the backend login path of RatPanel, due to weak default policies and authentication check flaws, they can execute system commands or take over the host without logging in. Technical Details Code Flaw: In , the middleware incorrectly processes request paths, leading to improper path parsing. Exploitation Method: Attackers can construct specific URL paths to bypass authentication and access dangerous endpoints such as and . Example Code: PoC (Proof of Concept) Steps: The attacker first accesses the backend login page normally, then uses the parameter provided by to calculate the offset of the target file, thereby bypassing authentication and executing commands. Payload Example Payload: Impact Users running versions v2.3.19 to v2.5.6, especially those who have exposed their backend panel login URL, must upgrade immediately to prevent unauthorized access. Additionally, versions v2.5.6 and above correctly handle and block this vulnerability.