Skip to content
Threat Feed

January 2024 (30)

high advisory

ARMember WordPress Plugin Vulnerable to Time-Based Blind SQL Injection (CVE-2026-7649)

A time-based blind SQL Injection vulnerability exists in the ARMember WordPress plugin (<= 4.0.60) due to insufficient input sanitization of the 'orderby' parameter, allowing unauthenticated attackers to extract sensitive database information.

ARMember – Membership Plugin, Content Restriction, Member Levels, User Profile & User signup plugin <= 4.0.60 sql-injection wordpress armember cve-2026-7649
2r 1t 1c
critical advisory

AstrBotDevs AstrBot Vulnerability Leads to Hardcoded Credentials (CVE-2026-7579)

CVE-2026-7579 describes a vulnerability in AstrBotDevs AstrBot up to version 4.16.0 where improper handling of the `auth.py` file in the dashboard component leads to hardcoded credentials being exposed, enabling remote exploitation.

AstrBot cve hardcoded-credentials web-application
2r 1t 1c
high advisory

authd Incorrect Primary Group ID Vulnerability

authd 0.6.0 contains a bug that leads to an incorrect primary group ID being set to the user's UID, potentially leading to local privilege escalation and incorrect file ownership, fixed in authd >= 0.6.4.

authd privilege-escalation linux
2r 1t 1c
high advisory

AVideo CloneSite Unauthenticated Information Disclosure Leading to Remote Database Dump

AVideo is vulnerable to unauthenticated information disclosure via the `plugin/CloneSite/cloneClient.json.php` endpoint, which echoes the local CloneSite shared secret (`$objClone->myKey`) in HTTP responses without authentication, enabling cross-site database dumps of the configured clone server.

avideo information_disclosure database_dump
2r 2t
high advisory

AVideo SSRF Vulnerability via HTTP Redirect and DNS Rebinding

AVideo is vulnerable to Server-Side Request Forgery (SSRF) due to improper validation of user-supplied URLs that does not prevent HTTP redirects, and DNS rebinding due to discarded resolved IP addresses.

aVideo ssrf dns-rebinding
2r 1i
high advisory

Avo Framework Broken Access Control Vulnerability

Avo framework version 3.x contains a critical Broken Access Control vulnerability in the ActionsController. Due to insecure action lookup logic, an authenticated user can execute any Action class on any resource, even if the action is not registered for that specific resource. This leads to Privilege Escalation and unauthorized data manipulation across the entire application. Version 3.31.2 remediates this issue.

avo broken-access-control privilege-escalation ruby
2r 1t
high advisory

AWS AssumeRoleWithWebIdentity from Kubernetes SA and External ASN

Detects successful AWS `AssumeRoleWithWebIdentity` calls where the caller identity is a Kubernetes service account and the source autonomous system organization is not `Amazon.com, Inc.`, which may indicate a stolen or misused projected service-account token being exchanged for IAM credentials off-cluster.

EKS +1 aws cloudtrail iam kubernetes initial-access web-identity
2r 1t
high advisory

AWS Bedrock Model Invocation Logging Deletion Attempt

Detection of attempts to delete AWS Bedrock model invocation logging configurations, potentially indicating an adversary trying to remove audit trails of model interactions after credential compromise, to hide malicious AI model usage.

CloudTrail +3 aws bedrock logging defense-evasion
2r 1t
high advisory

AWS CloudTrail Logging Evasion via UpdateTrail

Attackers modify AWS CloudTrail settings using UpdateTrail events to evade detection by disabling or limiting logging, as indicated by non-console user agents.

AWS CloudTrail +3 aws cloudtrail defense-evasion logging
2r 1t
high advisory

AWS CloudTrail Logging Stopped for Defense Evasion

Detection of AWS CloudTrail StopLogging events indicates a potential defense evasion attempt by an attacker to operate stealthily within a compromised AWS environment and hinder incident response.

Splunk Enterprise +3 aws cloudtrail defense-evasion aws-account
2r 1t
high advisory

AWS CloudTrail Logging Stopped for Defense Evasion

Detection of AWS CloudTrail `StopLogging` events indicating potential defense evasion by adversaries attempting to operate undetected within a compromised AWS environment by halting the logging of their malicious activities.

CloudTrail +4 aws defense-evasion cloud
2r 1t 1i
medium advisory

AWS CloudTrail Update for Defense Evasion

Attackers may attempt to evade detection by altering CloudTrail logging configurations, such as changing multi-regional logging to a single region, which impairs the logging of their activities and hinders incident response.

CloudTrail +4 aws defense-evasion cloud
2r 1t
high advisory

AWS CloudWatch Log Group Deletion for Defense Evasion

Detection of AWS CloudWatch log group deletions via CloudTrail logs, excluding console-based actions, indicating potential defense evasion by attackers attempting to hide their tracks.

Splunk Enterprise +3 aws cloudwatch defense-evasion
2r 1t
high advisory

AWS EC2 Instance Profile Associated with Running Instance

An attacker may escalate privileges by associating a compromised EC2 instance with a more privileged IAM instance profile.

EC2 +1 aws privilege-escalation lateral-movement
2r 2t
high advisory

AWS EC2 Stop, Start, and User Data Modification Correlation

Detection of a sequence of AWS EC2 management API calls indicative of malicious modification of instance user data to execute arbitrary code upon instance restart, potentially leading to privilege escalation and persistence.

EC2 aws user-data privilege-escalation persistence execution
3r 2t
medium advisory

AWS IAM Customer Managed Policy Version Manipulation for Privilege Escalation

Successful creation of new or setting default versions of customer-managed IAM policies can indicate privilege escalation attempts by attackers modifying policy permissions.

Amazon Web Services privilege-escalation aws iam
2r 2t
high advisory

AWS Network ACL Deletion Detected

Detection of AWS Network Access Control List (ACL) deletion via CloudTrail logs indicating potential unauthorized access or data exfiltration.

AWS CloudTrail +3 cloud aws network-acl privilege-escalation
2r
high advisory

AWS Security Services Configuration Deletion

Detection of deletion of critical AWS Security Services configurations like CloudWatch alarms, GuardDuty detectors, and Web Application Firewall rules to evade detection, potentially leading to data breaches and unauthorized access.

CloudWatch +5 aws cloudtrail defense-evasion security-service
2r 1t
high advisory

AWS Security Services Impairment via Deletion of Resources

Detection of adversaries attempting to impair or disable AWS security services by deleting resources across GuardDuty, AWS WAF, CloudWatch, Route 53, and CloudWatch Logs to evade detection and remove visibility.

CloudWatch +5 aws cloudtrail defense-evasion cloud
2r 1t
medium advisory

AWS STS AssumeRole Misuse for Lateral Movement and Privilege Escalation

Abuse of AWS STS AssumeRole can allow attackers to move laterally within an AWS environment and escalate privileges, potentially leading to unauthorized access to sensitive resources and data.

AWS STS attack.lateral-movement attack.privilege-escalation attack.t1548 attack.t1550 attack.t1550.001
1r 2t
high advisory

AWS STS GetFederationToken with AdministratorAccess in Request

Detection of AWS STS GetFederationToken calls with AdministratorAccess in the request parameters, indicating potential privilege escalation or dangerous automation via broadly privileged temporary credentials.

AWS STS aws privilege-escalation lateral-movement sts getfederationtoken
2r 2t
high advisory

AWS VPC Flow Logs Deletion for Defense Evasion

An adversary may delete VPC Flow Logs in AWS EC2 by calling the DeleteFlowLogs API to evade detection and hinder forensic investigations.

Elastic Compute Cloud cloud aws defense-evasion vpc flow-logs
2r 1t
critical advisory

Axios Prototype Pollution Vulnerability Leads to Request Hijacking and Data Exfiltration

Axios versions 0.19.0 through 1.13.6 are vulnerable to prototype pollution, allowing attackers to intercept and modify JSON responses, hijack HTTP requests, and exfiltrate sensitive data by polluting the Object.prototype with keys like `parseReviver` and `transport`.

axios +1 prototype-pollution request-hijacking data-exfiltration javascript
2r 1t
medium advisory

AzuraCast Account Takeover via X-Forwarded-Host Poisoning

AzuraCast is vulnerable to password reset poisoning due to unconditionally trusting the X-Forwarded-Host header, allowing an attacker to inject a malicious host into the password reset URL, exfiltrate the reset token, reset the victim's password, and disable 2FA, leading to account takeover.

azuracast +2 account takeover x-forwarded-host password reset poisoning
2r 3t 2i
critical advisory

AzuraCast Path Traversal Leads to Remote Code Execution

AzuraCast is vulnerable to path traversal in the Flow.js media upload endpoint, allowing authenticated users with media permissions to write arbitrary files, leading to remote code execution via PHP webshell upload.

azuracast path-traversal rce webserver
2r 3t 3i
medium advisory

Azure AD MFA Disabled to Bypass Authentication

An adversary may disable multi-factor authentication (MFA) in Azure Active Directory to weaken an organization's security posture and bypass authentication mechanisms, potentially gaining unauthorized access to sensitive resources and maintaining persistence.

Azure Active Directory azure mfa credential-access persistence defense-impairment
2r 1t
medium advisory

Azure AD Risk-Based Consent Disabled

The analytic detects when the risk-based step-up consent security setting in Azure AD is disabled by monitoring Azure Active Directory logs for the 'Update authorization policy' operation and changes to the 'AllowUserConsentForRiskyApps' setting, potentially exposing organizations to OAuth phishing attacks.

Azure Active Directory azure oauth consent phishing
2r 1t
medium advisory

Azure AD User Added to Administrator Role

An adversary adds a user to an Azure Active Directory administrative role to gain initial access, persist in the environment, escalate privileges, and potentially operate stealthily.

Azure Active Directory attack.initial-access attack.persistence attack.privilege-escalation attack.stealth attack.t1098.003 attack.t1078
2r 4t
medium advisory

Azure Owner Removed from Application or Service Principal

An adversary may remove an owner from an Azure application or service principal to weaken access controls, persist in the environment, or escalate privileges.

Azure attack.stealth
2r 1t
high advisory

Azure Subscription Permission Elevation via Activity Logs

An attacker elevates their Azure subscription permissions to manage all subscriptions, potentially leading to unauthorized access and control over the environment.

Azure privilege-escalation persistence initial-access stealth
2r 1t