Cyber Posture

CVE-2024-53582

HighPublic PoC

Published: 31 January 2025

Published
31 January 2025
Modified
23 May 2025
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
EPSS Score 0.0676 91.4th percentile
Risk Priority 19 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2024-53582 is a high-severity Path Traversal (CWE-22) vulnerability in Openpanel Openpanel. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 8.6% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Validates HTTP request parameters in Copy and View functions to block directory traversal sequences like '../'.

prevent

Enforces logical access controls to restrict file reads to authorized directories only, preventing unauthorized access via traversal.

prevent

Remediates the specific directory traversal flaw by identifying, testing, and applying patches such as OpenPanel v0.3.5.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Directory traversal in internet-facing File Manager component directly enables remote unauthenticated file read via crafted requests, mapping to exploitation of public-facing applications.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

An issue found in the Copy and View functions in the File Manager component of OpenPanel v0.3.4 allows attackers to execute a directory traversal via a crafted HTTP request.

Deeper analysisAI

CVE-2024-53582 is a directory traversal vulnerability (CWE-22) in the Copy and View functions of the File Manager component in OpenPanel version 0.3.4. The flaw allows attackers to traverse directories and access unauthorized files through a crafted HTTP request. It carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N), indicating high severity due to significant confidentiality impact.

Remote attackers require no authentication or privileges to exploit this vulnerability over the network, with low attack complexity and no user interaction needed. Exploitation enables reading of sensitive files outside the intended scope, potentially exposing configuration data, user files, or other confidential information on the affected system.

The OpenPanel changelog for version 0.3.5 includes security fixes that address this issue. Further technical details are documented on PacketStorm.

Details

CWE(s)

Affected Products

openpanel
openpanel
0.3.4

CVEs Like This One

CVE-2024-53537Same product: Openpanel Openpanel
CVE-2025-25871Same product: Openpanel Openpanel
CVE-2024-53584Same product: Openpanel Openpanel
CVE-2025-59384Shared CWE-22
CVE-2025-15031Shared CWE-22
CVE-2026-7213Shared CWE-22
CVE-2026-24479Shared CWE-22
CVE-2025-66744Shared CWE-22
CVE-2026-6057Shared CWE-22
CVE-2026-5436Shared CWE-22

References