<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cockpit — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/cockpit/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 11 May 2026 14:17:09 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/cockpit/feed.xml" rel="self" type="application/rss+xml"/><item><title>CVE-2026-4802: Cockpit Command Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-cockpit-rce/</link><pubDate>Mon, 11 May 2026 14:17:09 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-cockpit-rce/</guid><description>CVE-2026-4802 is a command injection vulnerability in Cockpit's system logs UI that allows a remote attacker to execute arbitrary commands on the host by exploiting unsanitized user-controlled parameters in crafted links.</description><content:encoded><![CDATA[<p>CVE-2026-4802 is a command injection vulnerability affecting Cockpit, a web-based interface for system administration. The vulnerability stems from the system logs UI, where user-controlled parameters within crafted links are not properly sanitized. An attacker can exploit this flaw by injecting shell metacharacters and command substitutions into these parameters, leading to the execution of arbitrary shell commands on the affected system. Successful exploitation can result in a complete system compromise, allowing the attacker to gain full control of the targeted machine. This vulnerability poses a significant risk to systems utilizing Cockpit for remote administration.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker crafts a malicious link containing shell metacharacters and command substitutions within user-controlled parameters.</li>
<li>The attacker delivers the crafted link to a user with access to the Cockpit system logs UI, possibly through phishing or social engineering.</li>
<li>The user clicks on the malicious link, which is processed by the Cockpit system logs UI.</li>
<li>The Cockpit application fails to properly sanitize the user-controlled parameters within the link.</li>
<li>The unsanitized parameters are passed to a system command.</li>
<li>The injected shell metacharacters and command substitutions are interpreted by the shell.</li>
<li>Arbitrary shell commands are executed on the host system with the privileges of the Cockpit process.</li>
<li>The attacker gains control of the system and can perform actions such as installing malware, exfiltrating data, or disrupting services.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-4802 allows a remote attacker to achieve arbitrary command execution on the host system. This can lead to a complete system compromise, potentially affecting all data and services hosted on the system. The lack of sanitization can allow an attacker to perform any action that the compromised Cockpit instance can, including installing malicious software, creating new user accounts, or accessing sensitive data.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply available patches for Cockpit from Red Hat to remediate CVE-2026-4802.</li>
<li>Deploy the Sigma rule &ldquo;Detect CVE-2026-4802 Exploitation Attempt via Crafted URL&rdquo; to identify potential exploitation attempts in webserver logs.</li>
<li>Implement strict input validation and sanitization for all user-supplied parameters within Cockpit&rsquo;s system logs UI.</li>
<li>Regularly review and audit Cockpit logs for suspicious activity or unauthorized access.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>command injection</category><category>rce</category><category>web application</category></item></channel></rss>