April 2026 (30)
OpenClaw Trust Model Vulnerability: System Prompt Channel Injection
2 rulesOpenClaw versions 2026.4.2 and earlier are vulnerable to a trust model issue where authenticated wake hooks or mapped wake payloads can be promoted into the trusted System prompt channel, potentially leading to security vulnerabilities within the OpenClaw trust model.
HashiCorp go-getter Arbitrary File Read Vulnerability (CVE-2026-4660)
2 rules 1 TTP 1 CVE 1 IOCHashiCorp's go-getter library up to v1.8.5 is vulnerable to arbitrary file reads on the file system during certain git operations through a maliciously crafted URL (CVE-2026-4660), potentially allowing attackers to access sensitive information.
Nix Package Manager Arbitrary File Overwrite Vulnerability
2 rules 1 TTP 2 CVEsA flaw in Nix package manager allows arbitrary file overwrites via symlink following during fixed-output derivation registration, potentially leading to root privilege escalation on multi-user Linux systems.
OpenEXR DWA Lossy Decoder Heap Out-of-Bounds Write Vulnerability
2 rules 1 TTP 1 CVE 1 IOCA heap out-of-bounds write vulnerability exists in OpenEXR's DWA lossy decoder due to integer overflow during block pointer calculation, triggered via crafted DWAA files, leading to crashes during DCT execution.
Saleor GraphQL Batch Query Resource Exhaustion Vulnerability (CVE-2026-33756)
2 rules 1 TTP 1 CVEUnauthenticated attackers can exploit a resource exhaustion vulnerability (CVE-2026-33756) in Saleor e-commerce platform versions before 3.23.0a3, 3.22.47, 3.21.54, and 3.20.118 by sending a single HTTP request with a large number of GraphQL operations, bypassing query complexity limits and exhausting server resources.
WAGO PLC OpenVPN Configuration Vulnerability (CVE-2024-1490)
2 rules 1 TTP 1 CVE 2 IOCsAn authenticated remote attacker with high privileges can exploit the OpenVPN configuration via the web-based management interface of a WAGO PLC to achieve arbitrary command execution on the device.
Vim Vulnerability Allows Local Code Execution
2 rules 1 TTPA local attacker can exploit a vulnerability in Vim to execute arbitrary code on a vulnerable system.
Multiple Vulnerabilities in Zammad
2 rules 3 TTPsMultiple vulnerabilities in Zammad allow a remote attacker to execute arbitrary code, bypass security measures, disclose sensitive information, and perform cross-site scripting attacks.
D-Link DIR-882 Remote Command Injection Vulnerability (CVE-2026-5844)
2 rules 1 TTP 1 CVE 1 IOCA command injection vulnerability (CVE-2026-5844) exists in the D-Link DIR-882 router version 1.01B02, allowing a remote attacker to execute arbitrary OS commands by manipulating the IPAddress argument in the HNAP1 SetNetworkSettings Handler via the prog.cgi script.
Decolua 9router Authorization Bypass Vulnerability (CVE-2026-5842)
2 rules 1 TTP 1 CVECVE-2026-5842 is an authorization bypass vulnerability in decolua 9router versions up to 0.3.47, allowing remote attackers to gain unauthorized access via manipulation of the /api endpoint.
PHPGurukul News Portal Project SQL Injection Vulnerability (CVE-2026-5837)
2 rules 1 TTP 1 CVEPHPGurukul News Portal Project version 4.1 is vulnerable to SQL injection via the Comment parameter in /news-details.php, potentially allowing remote attackers to execute arbitrary SQL queries.
code-projects Simple IT Discussion Forum SQL Injection Vulnerability (CVE-2026-5829)
2 rules 1 TTP 1 CVEA remote SQL injection vulnerability (CVE-2026-5829) exists in code-projects Simple IT Discussion Forum 1.0 due to improper handling of the 'post_id' argument in the '/pages/content.php' file, allowing attackers to execute arbitrary SQL queries.
Tenda AC15 Router Stack-Based Buffer Overflow (CVE-2026-5830)
2 rules 2 TTPs 1 CVEA stack-based buffer overflow vulnerability (CVE-2026-5830) in Tenda AC15 firmware version 15.03.05.18 allows remote attackers to execute arbitrary code by manipulating password change parameters, potentially leading to complete device compromise.
Simple IT Discussion Forum SQL Injection Vulnerability (CVE-2026-5827)
2 rules 1 TTP 1 CVECVE-2026-5827 is a SQL injection vulnerability in code-projects Simple IT Discussion Forum 1.0, allowing remote attackers to execute arbitrary SQL commands by manipulating the 'content' argument in /question-function.php.
MemProcFS DLL and Shared Library Hijacking Vulnerability
2 rules 3 TTPs 1 CVEMemProcFS before 5.17 is susceptible to DLL and shared-library hijacking due to unsafe library-loading patterns, allowing attackers to achieve arbitrary code execution by placing malicious libraries or manipulating the library search path.
parseusbs OS Command Injection Vulnerability (CVE-2026-40030)
2 rules 1 TTP 1 CVEparseusbs before 1.9 is vulnerable to OS command injection (CVE-2026-40030) due to improper sanitization of the volume listing path argument, potentially allowing arbitrary command execution via crafted volume paths.
parseusbs Unsanitized LNK File Command Injection Vulnerability
2 rules 1 TTP 1 CVEparseusbs before 1.9 is vulnerable to OS command injection in parseUSBs.py due to unsanitized LNK file paths passed to os.popen(), allowing arbitrary command execution via crafted .lnk filenames.
UAC (Unix-like Artifacts Collector) Command Injection Vulnerability
2 rules 1 TTP 1 CVEUAC before 3.3.0-rc1 is vulnerable to command injection in the _run_command() function, allowing attackers to execute arbitrary commands with the privileges of the UAC process through manipulated input values.
Sleuth Kit Path Traversal Vulnerability (CVE-2026-40024)
2 rules 3 TTPs 1 CVEA path traversal vulnerability exists in The Sleuth Kit through 4.14.0 (tsk_recover), enabling attackers to write files to arbitrary locations via crafted filenames with path traversal sequences in a filesystem image, potentially leading to code execution.
PraisonAI Vulnerable to OS Command Injection
2 rules 1 TTP 1 IOCPraisonAI is vulnerable to OS command injection due to the use of `subprocess.run()` with `shell=True` on user-controlled inputs, allowing attackers to inject arbitrary shell commands and potentially leading to sensitive data exfiltration or system compromise in versions prior to 4.5.121.
PraisonAI Unauthenticated Agent Activity Exposure (CVE-2026-39889)
2 rules 1 TTP 1 CVEPraisonAI versions prior to 4.5.115 expose agent activity without authentication due to improperly secured A2U event stream endpoints, potentially allowing unauthorized access to sensitive agent information.
First Time Python Process Creates macOS Launch Agent or Daemon
2 rules 2 TTPsThis rule detects the initial creation or modification of a macOS LaunchAgent or LaunchDaemon plist file by a Python process, a common persistence technique employed by attackers using malicious scripts, compromised dependencies, or model file deserialization.
Kamailio Out-of-Bounds Access Denial of Service Vulnerability
2 rules 1 TTP 1 CVEA remote attacker can exploit an out-of-bounds access vulnerability (CVE-2026-39863) in Kamailio versions prior to 6.1.1, 6.0.6, and 5.8.8 by sending a specially crafted data packet over TCP, causing a denial-of-service condition.
InvenTree Privilege Escalation via API Abuse (CVE-2026-35476)
2 rules 1 TTP 1 CVEA non-staff authenticated user can elevate their account to a staff level via a POST request against their user account endpoint in InvenTree versions prior to 1.2.7 and 1.3.0 due to improperly configured API write permissions.
React Server Components Denial of Service Vulnerability (CVE-2026-23869)
2 rules 1 TTP 1 CVEA denial of service vulnerability, CVE-2026-23869, exists in React Server Components due to excessive CPU usage triggered by specially crafted HTTP requests to Server Function endpoints, potentially leading to service disruption.
Immich Stored XSS Vulnerability in 360° Panorama Viewer (CVE-2026-35455)
2 rules 2 TTPs 1 CVEA stored cross-site scripting (XSS) vulnerability in Immich versions before 2.7.0 allows authenticated users to inject arbitrary JavaScript via crafted equirectangular images, leading to session hijacking, data exfiltration, and unauthorized access.
LORIS Directory Traversal Vulnerability
2 rules 2 TTPs 1 CVELORIS, a neuroimaging research data management web application, is vulnerable to directory traversal (CVE-2026-35446) due to an incorrect order of operations in the FilesDownloadHandler, allowing authenticated attackers to access unauthorized files.
Saleor GraphQL Resource Exhaustion Vulnerability (CVE-2026-35401)
2 rules 1 TTP 1 CVEA remote, unauthenticated attacker can cause resource exhaustion in Saleor e-commerce platforms via maliciously crafted GraphQL API requests, leading to denial of service.
LORIS File Traversal Vulnerability (CVE-2026-34392)
2 rules 1 TTP 1 CVEA file traversal vulnerability (CVE-2026-34392) in LORIS versions 20.0.0 to before 27.0.3 and 28.0.1 allows an unauthenticated attacker to download arbitrary files via the static file router.
mcp-from-openapi SSRF Vulnerability via Untrusted OpenAPI Specifications
2 rules 2 IOCsThe mcp-from-openapi library is vulnerable to Server-Side Request Forgery (SSRF) due to insecure handling of $ref pointers in OpenAPI specifications, allowing attackers to read local files, internal network resources, and cloud metadata endpoints by processing untrusted OpenAPI specifications.