<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Devguard API — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/devguard-api/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 06 May 2026 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/devguard-api/feed.xml" rel="self" type="application/rss+xml"/><item><title>DevGuard Unauthenticated Identity Assertion via X-Admin-Token</title><link>https://feed.craftedsignal.io/briefs/2026-05-devguard-auth-bypass/</link><pubDate>Wed, 06 May 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-devguard-auth-bypass/</guid><description>DevGuard versions before 1.2.2 are vulnerable to unauthenticated identity assertion via a client-supplied `X-Admin-Token` HTTP request header, potentially granting attackers full control over organizations if they can guess an admin/owner's Kratos identity UUID.</description><content:encoded><![CDATA[<p>DevGuard versions prior to 1.2.2 are susceptible to an unauthenticated identity assertion vulnerability. The <code>SessionMiddleware</code> component improperly handles the <code>X-Admin-Token</code> HTTP header, using its value directly as the authenticated <code>userID</code> when a Kratos session cookie is absent. This allows an attacker to impersonate any user, including organization administrators or owners, by knowing or guessing their Kratos identity UUID. Successful exploitation grants the attacker complete control over the targeted organization&rsquo;s DevGuard resources. The vulnerability was patched in version 1.2.2. This issue poses a significant risk to organizations using affected DevGuard versions, potentially leading to unauthorized access, data breaches, and complete compromise of DevGuard resources.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a target DevGuard instance running a version prior to 1.2.2.</li>
<li>The attacker obtains or guesses the Kratos identity UUID of a target user, ideally an organization admin or owner.</li>
<li>The attacker crafts a malicious HTTP request to the DevGuard API, including the <code>X-Admin-Token</code> header set to the target user&rsquo;s Kratos identity UUID.</li>
<li>The DevGuard <code>SessionMiddleware</code> processes the request. Since no Kratos session cookie is present, it trusts the <code>X-Admin-Token</code> header.</li>
<li>The <code>SessionMiddleware</code> incorrectly authenticates the request as the user specified in the <code>X-Admin-Token</code> header.</li>
<li>The attacker, now impersonating the target user, sends further API requests to access and manipulate organization resources.</li>
<li>If the impersonated user is an organization administrator or owner, the attacker gains full control over the organization&rsquo;s DevGuard resources.</li>
<li>The attacker may then create new users, modify existing resources, delete data, or perform other administrative actions.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an unauthenticated attacker to assume the identity of any user, including organization administrators or owners, within affected DevGuard instances. For administrative users, this leads to complete control over the organization&rsquo;s DevGuard resources, allowing for unauthorized data access, modification, or deletion. The impact could range from data breaches to complete compromise of the targeted organization&rsquo;s DevGuard infrastructure.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade all DevGuard API instances to version 1.2.2 to remediate the vulnerability as mentioned in the release notes.</li>
<li>Implement a reverse proxy to strip the <code>X-Admin-Token</code> header from all incoming requests to the DevGuard API as a workaround.</li>
<li>Monitor web server logs for the presence of the <code>X-Admin-Token</code> header in requests lacking a valid Kratos session cookie, using the provided Sigma rule to detect potential exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>authentication</category><category>authorization</category><category>privilege_escalation</category><category>web_application</category></item></channel></rss>