cPanel before 71.9980.37 allows attackers to make API calls that bypass the cron feature restriction (SEC-427).
The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.
Link | Tags |
---|---|
https://documentation.cpanel.net/display/CL/72+Change+Log | release notes vendor advisory |