CVE-2018-25117

CRITICAL EXPLOITED

VestaCP <ee03eff - Code Injection

Title source: llm
STIX 2.1

Description

VestaCP commit a3f0fa1 (2018-05-31) up to commit ee03eff (2018-06-13) contain embedded malicious code that resulted in a supply-chain compromise. New installations created from the compromised installer since at least May 2018 were subject to installation of Linux/ChachaDDoS, a multi-stage DDoS bot that uses Lua for second- and third-stage components. The compromise leaked administrative credentials (base64-encoded admin password and server domain) to an external URL during installation and/or resulted in the installer dropping and executing a DDoS malware payload under local system privileges. Compromised servers were subsequently observed participating in large-scale DDoS activity. Vesta acknowledged exploitation in the wild in October 2018.

Scores

CVSS v4 9.3
EPSS 0.0008
EPSS Percentile 23.9%
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N

CISA SSVC

Vulnrichment
Exploitation poc
Automatable no
Technical Impact total

Details

VulnCheck KEV 2018-09-25
CWE
CWE-506
Status published
Products (2)
Vesta/Control Panel (CP) a3f0fa1501d424477786e3e7150bb05c0b99518f - ee03eff016e03cb76fac7ae3a0f9d1ef0f8ee35b
Vesta/Control Panel (CP) commit a3f0fa1 (2018-05-31) - commit ee03eff (2018-06-13)
Published Oct 15, 2025
Tracked Since Feb 18, 2026