New Vulnerabilities in Gladinet and Control Web Panel: What You Should Know
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has recently added two significant security vulnerabilities affecting Gladinet and Control Web Panel (CWP) to its Known Exploited Vulnerabilities (KEV) catalog. This action underscores the urgency posed by these flaws, especially given indications of their active exploitation in the ongoing cybersecurity landscape.
Details on the Vulnerabilities
The vulnerabilities in focus are CVE-2025-11371, which carries a CVSS score of 7.5, and CVE-2025-48703 with a notably high CVSS score of 9.0. The former is related to files or directories that can be accessed by external parties in Gladinet CentreStack and Triofox, potentially leading to unintended disclosures of sensitive system information. The latter, a more concerning OS command injection vulnerability in Control Web Panel, allows remote attackers who know a valid username to execute pre-authenticated commands.
The Implications of Active Exploitation
Research from Huntress highlights that the CVE-2025-11371 vulnerability has already been exploited by unknown threat actors to perform reconnaissance operations. Specific details include the execution of reconnaissance commands through a Base64-encoded payload. Exploitation of such vulnerabilities often leads to severe security breaches, emphasizing the need for swift action from affected organizations.
Government Response: A Call to Action
Federal Civilian Executive Branch (FCEB) agencies have been mandated to address these vulnerabilities actively by November 25, 2025, underlining the commitment to securing governmental networks against emerging threats. The recent addition of these flaws to the KEV catalog may also signal a broader pattern of exploitation that eventually targets private organizations as well.
Recommendations for Organizations
Organizations utilizing Gladinet and CWP are urged to take immediate steps to patch these vulnerabilities. This includes updating to the latest software versions to mitigate risks. As highlighted in reports, similar vulnerabilities have compounded throughout various platforms, particularly WordPress, where several critical security flaws have led to significant breaches.
Conclusion: Stay Informed and Protected
Understanding these vulnerabilities is vital for cybersecurity awareness. Organizations are encouraged to regularly review the KEV catalog and implement best practices to safeguard their data and systems. Continuous monitoring is essential in an era where cyber threats can rapidly evolve.
Write A Comment