Generated remediation guidance and an executive summary. No account required.
In CWP (aka Control Web Panel or CentOS Web Panel) before 0.9.8.1107, an unauthenticated attacker can use %00 bytes to cause /user/loader.php to register an arbitrary API key, as demonstrated by a /user/loader.php?api=1&scripts= .%00./.%00./api/account_new_create&acc=guadaapi URI. Any number of %00 instances can be used, e.g., .%00%00%00./.%00%00%00./api/account_new_create could also be used for the scripts parameter.
Use CWE-862, Control-Webpanel vendor hub and Webpanel product page to widen CVE-2021-45467 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2022-44877, CVE-2025-48703 and CVE-2023-42121 for nearby disclosures in the same product family.