Article ID: 114378, created on Jul 15, 2012, last review on Jun 17, 2016

  • Applies to:
  • Plesk 10.4 for Linux/Unix
  • Plesk 10.3 for Linux/Unix
  • Plesk 10.2 for Linux/Unix
  • Plesk 10.1 for Linux/Unix
  • Virtuozzo containers for Linux 4.7

Release Notes

This article provides fixes for the most critical vulnerabilities in older Parallels Plesk Panel versions, including 8.x, 9.0.x - 9.5.5, and 10.0.x - 10.4.4 on Linux. Even earlier versions, such as 7.x, 6.x, etc., must be upgraded to a later version that is not vulnerable.

NOTE: The mentioned fixes are available through the following Micro-Updates:

8.6.0 MU#15

9.5.4 MU#21

10.0.1 MU#14

10.1.1 MU#23

10.2.0 MU#17

10.3.1 MU#18

10.4.4 MU#39


  1. Create a temporary directory:

    # mkdir plesk_remote_vulnerability_fix_deployer
  2. Go to the created directory:

    # cd plesk_remote_vulnerability_fix_deployer
  3. Download the attached file (md5sum: 7589fba44bd3d5b8c5b5c430a86d79f7) and decompress it:

    # wget
    # tar -xzf plesk_remote_vulnerability_fix_deployer.tar.gz
  4. Run the following command from the created temporary directory:

    # /usr/local/psa/admin/bin/php plesk_remote_vulnerability_fix_deployer.php

NOTE: To simplify a mass deployment in the Parallels Virtuozzo Containers (PVC) for Linux environment, it is recommended that you utilize the plesk_remote_vulnerability_fix_mass_deployer script:

  1. Upload this archive to a separate folder on the Hardware Node: plesk_remote_vulnerability_fix_mass_deployer.tar.gz (md5sum: 2dd4f90ca8f591814dd7d7d2cf2e8477)

  2. Unpack the archive:

    # tar -xzf plesk_remote_vulnerability_fix_mass_deployer.tar.gz
  3. Run the contained shell script as root:

    # ./ 

Expand specific

If you have 9.5.4 for Linux or 9.5.4/9.5.5 for Windows, both of which are managed by Parallels Expand, Parallels Plesk Panel 9.5.4 and Parallels Plesk Expand 2.3.2+ Compatibility Patch should be installed after applying the MUs or custom fixes.

Search Words

Security Update Custom Fixes for Linux


plesk vulnerability


56797cefb1efc9130f7c48a7d1db0f0c a914db3fdc7a53ddcfd1b2db8f5a1b9c e8e50b42231236b82df27684e7ec0beb 2897d76d56d2010f4e3a28f864d69223 d02f9caf3e11b191a38179103495106f 29d1e90fd304f01e6420fbe60f66f838 e8756e9388aeca36710ac39e739b2b37 dd0611b6086474193d9bf78e2b293040 0c05f0c76fec3dd785e9feafce1099a9 f4ce8084cb23619ef5fe9428ecc388ea def31538ba607bde27398f48ab5956be d3c493291d6d9f66837ac7495dfea9ca

Email subscription for changes to this article
Save as PDF