9.8
CRITICAL CVSS 3.1
CVE-2025-54336
Plesk Obsidian Authentication Bypass Vulnerability
Description

In Plesk Obsidian 18.0.70, _isAdminPasswordValid uses an == comparison. Thus, if the correct password is "0e" followed by any digit string, then an attacker can login with any other string that evaluates to 0.0 (such as the 0e0 string). This occurs in admin/plib/LoginManager.php.

INFO

Published Date :

Aug. 19, 2025, 2:15 p.m.

Last Modified :

Aug. 26, 2025, 3:15 p.m.

Remotely Exploit :

Yes !
Affected Products

The following products are affected by CVE-2025-54336 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

No affected product recoded yet

CVSS Scores
The Common Vulnerability Scoring System is a standardized framework for assessing the severity of vulnerabilities in software and systems. We collect and displays CVSS scores from various sources for each CVE.
Score Version Severity Vector Exploitability Score Impact Score Source
CVSS 3.1 CRITICAL 134c704f-9b21-4f2e-91b3-4a467353bcc0
Solution
Update Plesk to the latest version to fix authentication bypass vulnerability.
  • Update Plesk to the latest version.
  • Verify the version is not affected.
  • Apply vendor patches if available.
References to Advisories, Solutions, and Tools

Here, you will find a curated list of external links that provide in-depth information, practical solutions, and valuable tools related to CVE-2025-54336.

URL Resource
https://blog.aziz.tn/2025/08/cve-2025-54336.html/
https://support.plesk.com/hc/en-us/articles/33785727869847-Vulnerability-CVE-2025-54336
https://www.plesk.com/blog/plesk-news-announcements/introducing-plesk-obsidian-18-0-70-anniversary-edition/
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2025-54336 is associated with the following CWEs:

Common Attack Pattern Enumeration and Classification (CAPEC)

Common Attack Pattern Enumeration and Classification (CAPEC) stores attack patterns, which are descriptions of the common attributes and approaches employed by adversaries to exploit the CVE-2025-54336 weaknesses.

CAPEC-3: Using Leading 'Ghost' Character Sequences to Bypass Input Filters Using Leading 'Ghost' Character Sequences to Bypass Input Filters CAPEC-6: Argument Injection Argument Injection CAPEC-7: Blind SQL Injection Blind SQL Injection CAPEC-8: Buffer Overflow in an API Call Buffer Overflow in an API Call CAPEC-9: Buffer Overflow in Local Command-Line Utilities Buffer Overflow in Local Command-Line Utilities CAPEC-10: Buffer Overflow via Environment Variables Buffer Overflow via Environment Variables CAPEC-14: Client-side Injection-induced Buffer Overflow Client-side Injection-induced Buffer Overflow CAPEC-15: Command Delimiters Command Delimiters CAPEC-24: Filter Failure through Buffer Overflow Filter Failure through Buffer Overflow CAPEC-41: Using Meta-characters in E-mail Headers to Inject Malicious Payloads Using Meta-characters in E-mail Headers to Inject Malicious Payloads CAPEC-43: Exploiting Multiple Input Interpretation Layers Exploiting Multiple Input Interpretation Layers CAPEC-44: Overflow Binary Resource File Overflow Binary Resource File CAPEC-45: Buffer Overflow via Symbolic Links Buffer Overflow via Symbolic Links CAPEC-46: Overflow Variables and Tags Overflow Variables and Tags CAPEC-47: Buffer Overflow via Parameter Expansion Buffer Overflow via Parameter Expansion CAPEC-52: Embedding NULL Bytes Embedding NULL Bytes CAPEC-53: Postfix, Null Terminate, and Backslash Postfix, Null Terminate, and Backslash CAPEC-64: Using Slashes and URL Encoding Combined to Bypass Validation Logic Using Slashes and URL Encoding Combined to Bypass Validation Logic CAPEC-67: String Format Overflow in syslog() String Format Overflow in syslog() CAPEC-71: Using Unicode Encoding to Bypass Validation Logic Using Unicode Encoding to Bypass Validation Logic CAPEC-73: User-Controlled Filename User-Controlled Filename CAPEC-78: Using Escaped Slashes in Alternate Encoding Using Escaped Slashes in Alternate Encoding CAPEC-79: Using Slashes in Alternate Encoding Using Slashes in Alternate Encoding CAPEC-80: Using UTF-8 Encoding to Bypass Validation Logic Using UTF-8 Encoding to Bypass Validation Logic CAPEC-88: OS Command Injection OS Command Injection CAPEC-92: Forced Integer Overflow Forced Integer Overflow CAPEC-120: Double Encoding Double Encoding CAPEC-182: Flash Injection Flash Injection CAPEC-267: Leverage Alternate Encoding Leverage Alternate Encoding

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2025-54336 vulnerability anywhere in the article.

  • Daily CyberSecurity
CVE-2025-54336 (CVSS 9.8): Critical Flaw in Plesk Obsidian Exposes Servers to Full Compromise

A newly disclosed security vulnerability in Plesk Obsidian, a widely used web hosting control panel, has been assigned CVE-2025-54336 with a CVSS severity score of 9.8. The flaw, which affects authent ... Read more

Published Date: Aug 20, 2025 (2 weeks, 6 days ago)
  • Daily CyberSecurity
Apple’s “Made in India” Revolution: iPhone 17 Production Ramps Up Ahead of Launch

According to reports, Apple has, for the first time, begun large-scale simultaneous production of four iPhone 17 models in India ahead of their official unveiling, with plans to rely on five local fac ... Read more

Published Date: Aug 20, 2025 (2 weeks, 6 days ago)
  • Daily CyberSecurity
Google Chrome Issues High-Severity Fix for V8 Engine Vulnerability (CVE-2025-9132)

Google has released a Stable Channel Update for its Chrome browser, addressing a critical security issue in the widely used V8 JavaScript engine. The update, rolling out to Windows, macOS, and Linux u ... Read more

Published Date: Aug 20, 2025 (2 weeks, 6 days ago)
  • Daily CyberSecurity
A ChatGPT App Is Hiding a Backdoor: Microsoft Exposes the PipeMagic Malware

Microsoft Threat Intelligence has uncovered PipeMagic, a sophisticated modular backdoor used by the financially motivated threat actor Storm-2460. The malware masquerades as a legitimate open-source C ... Read more

Published Date: Aug 20, 2025 (2 weeks, 6 days ago)
  • Daily CyberSecurity
Researcher Details CVE-2025-29824 – A Windows CLFS 0-Day Exploited by Ransomware Gang

In April, Microsoft has patched a high-severity, zero-day vulnerability (CVE-2025-29824) in the Windows Common Log File System that was exploited by the RansomEXX gang. The use-after-free flaw allowed ... Read more

Published Date: Aug 20, 2025 (2 weeks, 6 days ago)

The following table lists the changes that have been made to the CVE-2025-54336 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • CVE Modified by [email protected]

    Aug. 26, 2025

    Action Type Old Value New Value
    Added Reference https://blog.aziz.tn/2025/08/cve-2025-54336.html/
  • CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0

    Aug. 19, 2025

    Action Type Old Value New Value
    Added CVSS V3.1 AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
    Added CWE CWE-697
  • New CVE Received by [email protected]

    Aug. 19, 2025

    Action Type Old Value New Value
    Added Description In Plesk Obsidian 18.0.70, _isAdminPasswordValid uses an == comparison. Thus, if the correct password is "0e" followed by any digit string, then an attacker can login with any other string that evaluates to 0.0 (such as the 0e0 string). This occurs in admin/plib/LoginManager.php.
    Added Reference https://support.plesk.com/hc/en-us/articles/33785727869847-Vulnerability-CVE-2025-54336
    Added Reference https://www.plesk.com/blog/plesk-news-announcements/introducing-plesk-obsidian-18-0-70-anniversary-edition/
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
Vulnerability Scoring Details
Base CVSS Score: 9.8
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact