April 2026 (30)
@sveltejs/adapter-node BODY_SIZE_LIMIT Bypass Vulnerability
2 rules 1 TTP 1 CVEA vulnerability exists in @sveltejs/adapter-node where requests could bypass the `BODY_SIZE_LIMIT` on SvelteKit applications, potentially leading to denial of service.
AWS S3 Rapid Bucket Posture API Calls Indicate Reconnaissance
2 rules 4 TTPsAn AWS principal rapidly enumerates S3 bucket configurations using read-only APIs, potentially indicating reconnaissance activity by security scanners, CSPM tools, or malicious actors performing post-compromise enumeration.
BugSink Authenticated File Write Vulnerability (CVE-2026-40162)
2 rules 1 TTP 1 CVEBugSink 2.1.0 is vulnerable to an authenticated file write vulnerability (CVE-2026-40162) allowing an attacker with a valid authentication token to write arbitrary content to the filesystem, potentially leading to code execution or data compromise.
CactusThemes VideoPro Theme Local File Inclusion Vulnerability (CVE-2025-58913)
2 rules 1 TTP 1 CVECVE-2025-58913 is a PHP Local File Inclusion vulnerability in the CactusThemes VideoPro WordPress theme, affecting versions from n/a through 2.3.8.1 due to improper control of the filename for include/require statements, potentially allowing unauthorized file access.
Case Theme User WordPress Plugin Local File Inclusion Vulnerability (CVE-2025-5804)
2 rules 1 TTP 1 CVECVE-2025-5804 is a PHP Local File Inclusion vulnerability in the Case Theme User WordPress plugin before version 1.0.4 due to improper filename control in include/require statements, potentially allowing attackers to execute arbitrary code by including malicious local files.
Chamilo LMS Path Traversal Vulnerability (CVE-2026-31939)
2 rules 1 TTP 1 CVEA path traversal vulnerability (CVE-2026-31939) in Chamilo LMS versions prior to 1.11.38 allows authenticated attackers to delete arbitrary files via unsanitized user input in the 'test' parameter of savescores.php.
Chamilo LMS Privilege Escalation via REST API (CVE-2026-33706)
2 rules 1 TTP 1 CVEChamilo LMS before 1.11.38 allows authenticated users with a REST API key to escalate their privileges by modifying their user status via the update_user_from_username endpoint, potentially granting unauthorized course management capabilities.
Chamilo LMS REST API Key Brute-Force Vulnerability (CVE-2026-33710)
2 rules 1 TTP 1 CVEChamilo LMS versions prior to 1.11.38 and 2.0.0-RC.3 generate predictable REST API keys, allowing attackers with knowledge of a username and approximate key creation time to brute-force access.
Chamilo LMS SSRF Vulnerability in Social Wall Feature
2 rules 1 TTP 1 CVEA Server-Side Request Forgery (SSRF) vulnerability exists in Chamilo LMS versions prior to 1.11.38 and 2.0.0-RC.3, allowing authenticated attackers to make arbitrary HTTP requests, scan internal ports, and access cloud instance metadata via the Social Wall feature.
Chamilo LMS Unauthenticated Remote Code Execution via Configuration Injection (CVE-2026-33618)
2 rules 1 TTP 1 CVEChamilo LMS versions prior to 2.0.0-RC.3 are vulnerable to remote code execution (RCE) via eval injection, where an authenticated administrator can inject arbitrary PHP code into platform settings that is then executed when any user (including unauthenticated) requests the /platform-config/list endpoint.
Chamilo LMS Weak Password Reset Vulnerability (CVE-2026-33707)
2 rules 1 TTP 1 CVEChamilo LMS versions prior to 1.11.38 and 2.0.0-RC.3 are vulnerable to a weak password reset mechanism, allowing attackers to compute password reset tokens using only a user's email address due to the use of SHA1 hashing without randomization, expiration, or rate limiting, leading to unauthorized account takeover.
CouchCMS Privilege Escalation via f_k_levels_list Parameter Manipulation (CVE-2026-29002)
2 rules 1 TTP 1 CVECouchCMS is vulnerable to privilege escalation, allowing authenticated Admin-level users to create SuperAdmin accounts by manipulating the 'f_k_levels_list' parameter during user creation, granting them full application control.
DotNetNuke.Core Stored XSS via SVG Upload
2 rules 2 TTPsDotNetNuke.Core is vulnerable to stored cross-site scripting (XSS) where a user can upload a specially crafted SVG file containing malicious scripts, potentially targeting both authenticated and unauthenticated DNN users, with successful exploitation requiring user interaction and leading to high impact on confidentiality, integrity, and availability.
Elastic Defend Alert from Package Manager Install Ancestry
3 rules 1 TTPThis rule detects Elastic Defend alerts where the alerted process has a package-manager install context in its ancestry (npm, PyPI, Rust), indicating potential supply chain compromise via malicious postinstall scripts.
Helm Plugin Path Traversal Vulnerability
2 rules 1 TTP 1 CVEA path traversal vulnerability in Helm versions 4.0.0 to 4.1.3 allows a malicious plugin to write files to arbitrary locations on the filesystem, leading to potential system compromise.
LiteLLM Remote Code Execution via Bytecode Rewriting (CVE-2026-40217)
2 rules 1 TTP 1 CVELiteLLM through 2026-04-08 allows remote attackers to execute arbitrary code via bytecode rewriting at the /guardrails/test_custom_code URI, potentially leading to complete system compromise.
Math.js Improperly Controlled Modification of Object Attributes Leads to RCE
2 rules 1 TTPA vulnerability in math.js versions before 15.2.0 allows for arbitrary JavaScript execution through the expression parser when evaluating user-supplied expressions.
Multiple Rare Elastic Defend Behavior Rules Triggered on Single Host
2 rules 8 TTPsThis rule identifies hosts triggering multiple distinct, globally rare Elastic Defend behavior rules, increasing the likelihood of detecting compromised hosts while reducing false positives.
wpForo Forum Plugin Arbitrary File Deletion Vulnerability (CVE-2026-5809)
2 rules 1 TTP 1 CVEThe wpForo Forum plugin for WordPress is vulnerable to arbitrary file deletion due to a logic flaw that allows authenticated users to delete arbitrary files writable by the PHP process by manipulating post metadata.
BuddyPress Groupblog Plugin Privilege Escalation Vulnerability (CVE-2026-5144)
2 rules 1 TTP 1 CVEThe BuddyPress Groupblog plugin for WordPress is vulnerable to privilege escalation (CVE-2026-5144), allowing a low-privileged user to gain administrator access on a WordPress Multisite network by manipulating group blog settings.
Chartbrew Cross-Tenant Authorization Bypass Vulnerability
2 rules 1 TTP 1 CVEChartbrew versions prior to 4.9.0 are vulnerable to a cross-tenant authorization bypass, allowing an authenticated attacker to access project data belonging to other teams.
Goshs File-Based ACL Authorization Bypass Vulnerability
3 rules 4 TTPs 4 IOCsGoshs is vulnerable to an authorization bypass (CVE-2026-40189) due to inconsistent enforcement of .goshs ACLs on state-changing routes, allowing an unauthenticated attacker to manipulate files within protected directories and bypass authentication barriers.
PraisonAI Remote Code Execution via Malicious Workflow YAML
2 rules 1 TTP 2 IOCsPraisonAI is vulnerable to remote code execution; loading untrusted YAML files with `type: job` can lead to arbitrary host command execution, potentially enabling full system compromise.
PraisonAI UI Hardcoded Approval Mode Leads to Remote Code Execution
2 rules 3 TTPsA vulnerability in PraisonAI allows authenticated users to execute arbitrary shell commands due to a hardcoded approval setting in the Chainlit UI modules, overriding administrator configurations and bypassing intended approval gates; insufficient command sanitization allows for destructive command execution, leading to confidentiality breach, integrity compromise, and availability impact on the server.
LXD Backup Import Bypass Allows Privilege Escalation in Restricted Projects
2 rules 1 TTPA vulnerability in LXD allows an attacker with instance-creation rights in a restricted project to bypass project restrictions and escalate privileges by crafting a malicious backup archive.
Chamilo LMS Insecure Direct Object Reference Vulnerability (CVE-2026-32930)
2 rules 2 TTPs 1 CVEAn Insecure Direct Object Reference (IDOR) vulnerability in Chamilo LMS (CVE-2026-32930) allows authenticated teachers to modify gradebook evaluation settings of other courses by manipulating the 'editeval' GET parameter, leading to unauthorized data modification.
Entra ID ADRS Token Request by Microsoft Authentication Broker
2 rules 2 TTPs 1 IOCDetects suspicious OAuth 2.0 token requests where the Microsoft Authentication Broker requests access to the Device Registration Service on behalf of a user principal, potentially indicating an attempt to abuse device registration for unauthorized persistence.
OpenClaw Insufficient Access Control in Gateway Agent Session Reset (CVE-2026-35660)
2 rules 1 TTP 1 CVEOpenClaw before 2026.3.23 contains an insufficient access control vulnerability in the Gateway agent /reset endpoint that allows callers with operator.write permission to reset admin sessions by invoking /reset or /new messages with an explicit sessionKey, bypassing operator.admin requirements.
GitHub Exfiltration via High Number of Repository Clones
2 rules 3 TTPsA single user rapidly cloning a high number of GitHub repositories indicates potential exfiltration of sensitive data such as proprietary code, embedded secrets, and build artifacts.
OpenClaw Path Traversal Vulnerability (CVE-2026-35668)
2 rules 1 TTP 1 CVEOpenClaw before 2026.3.24 is vulnerable to path traversal, allowing sandboxed agents to read arbitrary files from other agents' workspaces via manipulated URL parameters.