Briefs
April 2026 (30)
Webkul Krayin CRM BOLA Vulnerability (CVE-2026-38529)
2 rules 1 TTP 1 CVECVE-2026-38529 is a Broken Object-Level Authorization (BOLA) vulnerability in Webkul Krayin CRM v2.2.x that allows authenticated attackers to reset user passwords and take over accounts.
Fortinet FortiAnalyzer and FortiManager Cloud Heap-Based Buffer Overflow Vulnerability (CVE-2026-22828)
2 rules 2 TTPs 1 CVECVE-2026-22828 is a heap-based buffer overflow in Fortinet FortiAnalyzer and FortiManager Cloud versions 7.6.2 through 7.6.4, potentially allowing a remote unauthenticated attacker to execute arbitrary code with a significant preparation effort due to ASLR and network segmentation.
SQL Injection Vulnerability in anirudhkannan Grocery Store Management System 1.0 (CVE-2025-63939)
2 rules 1 TTP 1 CVE 1 IOCA critical SQL injection vulnerability (CVE-2025-63939) exists in the anirudhkannan Grocery Store Management System 1.0, allowing unauthenticated attackers to execute arbitrary SQL queries via the sitem_name POST parameter in /Grocery/search_products_itname.php.
UniFi Play Path Traversal Vulnerability (CVE-2026-22562)
2 rules 2 TTPs 1 CVEA path traversal vulnerability in UniFi Play devices allows an attacker with network access to write arbitrary files, leading to remote code execution.
State-Sponsored Actors Leveraging Vulnerabilities and Identity for Persistent Access (2025)
2 rules 6 TTPsIn 2025, state-sponsored actors from China, Russia, North Korea, and Iran leveraged vulnerabilities and identity compromise for initial access, focusing on persistence for long-term espionage or disruption.
Suspicious Registry Modifications by Scripting Engines
1 rule 3 TTPsScripting engines such as WScript, CScript, and MSHTA are being used to make registry modifications, potentially for persistence or defense evasion.
Eclipse Jetty HTTP/1.1 Request Smuggling via Chunk Extensions (CVE-2026-2332)
2 rules 3 TTPs 1 CVE 2 IOCsEclipse Jetty's HTTP/1.1 parser is vulnerable to request smuggling due to improper handling of chunk extensions, allowing attackers to inject malicious requests.
NocoBase plugin-workflow-javascript Sandbox Escape Vulnerability
2 rules 1 TTP 1 CVEA remote code execution vulnerability exists in NocoBase plugin-workflow-javascript versions up to 2.0.23 due to a sandbox escape in the createSafeConsole function, allowing unauthenticated attackers to potentially execute arbitrary code on the server.
Pachno 1.0.6 XML External Entity Injection Vulnerability
2 rules 2 TTPs 1 CVE 1 IOCPachno 1.0.6 is vulnerable to XML external entity injection, allowing unauthenticated attackers to read arbitrary files by injecting malicious XML entities into wiki content due to unsafe XML parsing in the TextParser helper.
PHPGurukul Daily Expense Tracking System SQL Injection Vulnerability
2 rules 1 TTP 1 CVEA remote SQL injection vulnerability exists in PHPGurukul Daily Expense Tracking System 1.1 within the /register.php file, where manipulation of the email argument allows for arbitrary SQL command execution, with a public exploit available.
Totolink A3002MU Router Stack-Based Buffer Overflow Vulnerability
2 rules 7 TTPs 1 CVEA stack-based buffer overflow vulnerability (CVE-2026-6194) exists in the Totolink A3002MU B20211125.1046 router firmware, specifically affecting the `/boafrm/formWlanSetup` component's HTTP request handler, which allows remote attackers to execute arbitrary code by manipulating the `wan-url` argument.
libTIFF Vulnerability Allows Code Execution and DoS
2 rules 2 TTPsA remote, anonymous attacker can exploit a vulnerability in libTIFF to potentially execute arbitrary code or cause a denial-of-service condition.
RUGGEDCOM CROSSBOW SAM-P Privilege Escalation Vulnerability (CVE-2026-27668)
2 rules 1 TTP 1 CVECVE-2026-27668 allows authenticated User Administrators in RUGGEDCOM CROSSBOW Secure Access Manager Primary (SAM-P) to escalate their privileges and access any device group, due to an incorrect privilege assignment in versions prior to V5.8.
Industrial Edge Management Authentication Bypass Vulnerability (CVE-2026-33892)
2 rules 1 TTP 1 CVECVE-2026-33892 allows an unauthenticated remote attacker to bypass authentication and impersonate a legitimate user in affected Industrial Edge Management Pro and Virtual versions by exploiting improper enforcement of user authentication on remote connections to devices, potentially enabling unauthorized access and control.
SINEC NMS Authentication Bypass Vulnerability (CVE-2026-24032)
2 rules 1 TTP 1 CVE 1 IOCAn authentication bypass vulnerability (CVE-2026-24032) exists in SINEC NMS versions prior to V4.0 SP3 due to insufficient user identity validation in the UMC component, allowing unauthenticated remote attackers to gain unauthorized access.
Smart Post Show WordPress Plugin PHP Object Injection Vulnerability
2 rules 1 TTP 1 CVEThe Smart Post Show WordPress plugin versions 3.0.12 and earlier are vulnerable to PHP Object Injection via deserialization of untrusted input in the import_shortcodes() function, potentially leading to remote code execution if a suitable POP chain is present.
PraisonAI Unauthenticated Remote Session Hijacking Vulnerability (CVE-2026-40289)
2 rules 5 TTPs 1 CVEPraisonAI versions before 4.5.139 and praisonaiagents versions before 1.5.140 are vulnerable to unauthenticated remote session hijacking due to missing authentication and a bypassable origin check on the /ws WebSocket endpoint, enabling unauthorized remote control and data leakage.
PraisonAI Arbitrary Code Execution Vulnerability
2 rules 1 TTP 1 CVEPraisonAI versions 4.5.138 and below are vulnerable to arbitrary code execution due to the unsanitized import of a malicious tools.py file, leading to potential system compromise.
PraisonAI GitHub Actions Credential Leakage Vulnerability (CVE-2026-40313)
2 rules 2 TTPs 1 CVEPraisonAI versions 4.5.139 and below are vulnerable to credential leakage due to the ArtiPACKED attack, where GitHub Actions workflows using actions/checkout without persist-credentials: false write the GITHUB_TOKEN into the .git/config file, leading to potential exposure in uploaded artifacts and subsequent supply chain compromise.
LearnPress WordPress Plugin Unauthorized Data Deletion Vulnerability (CVE-2026-4365)
2 rules 1 TTP 1 CVEThe LearnPress plugin for WordPress is vulnerable to unauthorized data deletion due to a missing capability check on the `delete_question_answer()` function, allowing unauthenticated attackers to delete quiz answer options.
jq JSON Processor Hash Table Collision Denial-of-Service Vulnerability (CVE-2026-40164)
2 rules 1 TTP 1 CVEA denial-of-service vulnerability exists in jq versions prior to commit 0c7d133c3c7e37c00b6d46b658a02244fdd3c784 due to the use of a hardcoded seed in MurmurHash3, enabling attackers to craft JSON objects that trigger hash collisions and cause excessive CPU consumption.
SAP Business Planning and Consolidation and Business Warehouse SQL Injection Vulnerability
2 rules 1 TTP 1 CVECVE-2026-27681 describes an insufficient authorization check vulnerability in SAP Business Planning and Consolidation and SAP Business Warehouse that allows authenticated users to execute crafted SQL statements, leading to unauthorized data access, modification, and deletion.
NestJS Microservices Denial-of-Service via Recursive handleData
2 rules 1 TTPA denial-of-service vulnerability exists in NestJS's @nestjs/microservices package, affecting versions 11.1.18 and earlier, where an attacker can send multiple small, valid JSON messages within a single TCP frame, causing a stack overflow.
MinIO Unauthenticated Object Write Vulnerability
2 rules 3 TTPsTwo authentication bypass vulnerabilities in MinIO allow writing arbitrary objects to any bucket with only a valid access key, without the secret key or valid signature, impacting all MinIO deployments.
Coinbase AgentKit Prompt Injection Vulnerability
2 rules 2 IOCsA prompt injection vulnerability in Coinbase AgentKit allows for potential wallet drain, infinite approvals, and agent-level remote code execution.
ImageMagick XML Bomb Denial-of-Service Vulnerability (CVE-2026-33908)
2 rules 1 TTP 1 CVEImageMagick versions prior to 7.1.2-19 and 6.9.13-44 are susceptible to a denial-of-service (DoS) attack due to unbounded recursion during XML parsing, potentially leading to stack exhaustion.
UniFi Play Command Injection Vulnerability (CVE-2026-22563)
2 rules 1 TTP 1 CVE 1 IOCA malicious actor with access to the UniFi Play network can exploit improper input validation vulnerabilities (CVE-2026-22563) in UniFi Play PowerAmp and Audio Port to inject commands, potentially leading to arbitrary code execution.
UniFi Play Improper Access Control Allows SSH Enablement
2 rules 1 TTP 1 CVECVE-2026-22564 is an improper access control vulnerability in UniFi Play PowerAmp and Audio Port devices that allows an attacker with network access to enable SSH and make unauthorized system changes.
UniFi Play Improper Access Control Vulnerability (CVE-2026-22566)
2 rules 1 TTP 1 CVEAn improper access control vulnerability in UniFi Play PowerAmp and Audio Port allows a malicious actor with access to the UniFi Play network to obtain WiFi credentials.
ImageMagick Heap Buffer Overflow Vulnerability (CVE-2026-33901)
2 rules 1 TTP 1 CVEImageMagick versions before 7.1.2-19 and 6.9.13-44 are vulnerable to a heap buffer overflow in the MVG decoder, potentially leading to an out-of-bounds write when processing a crafted image, which can result in denial of service or arbitrary code execution.