<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>HestiaCP 1.9.1 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/hestiacp-1.9.1/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 19 May 2026 14:17:43 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/hestiacp-1.9.1/feed.xml" rel="self" type="application/rss+xml"/><item><title>HestiaCP Deserialization Vulnerability (CVE-2026-43633)</title><link>https://feed.craftedsignal.io/briefs/2026-05-hestiacp-deserialization/</link><pubDate>Tue, 19 May 2026 14:17:43 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-hestiacp-deserialization/</guid><description>HestiaCP versions 1.9.0 through 1.9.4 are vulnerable to unauthenticated remote code execution due to a deserialization flaw in the web terminal component (CVE-2026-43633), stemming from a session format mismatch between PHP and Node.js, allowing attackers to inject malicious data via HTTP headers.</description><content:encoded><![CDATA[<p>HestiaCP versions 1.9.0, 1.9.1, 1.9.2, 1.9.3, and 1.9.4 are affected by a critical deserialization vulnerability (CVE-2026-43633) within the web terminal component. This vulnerability arises from an inconsistency in session handling between PHP and Node.js. Specifically, the PHP session handler processes HTTP headers containing crafted data, but the Node.js web terminal component incorrectly deserializes these values, treating them as trusted session data. This discrepancy enables unauthenticated remote attackers to execute arbitrary code at the root level on vulnerable systems where the web terminal feature is enabled. The attacker exploits the session format mismatch to inject malicious commands through HTTP headers, leading to full system compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker sends a crafted HTTP request to the HestiaCP server.</li>
<li>The HTTP request includes malicious serialized data within the HTTP headers, targeting session variables used by the web terminal component.</li>
<li>The PHP session handler processes and stores the malicious data in the session.</li>
<li>The Node.js web terminal component deserializes the session data. Due to the format mismatch between PHP&rsquo;s serialization and Node.js&rsquo;s deserialization, the injected malicious data is interpreted as code.</li>
<li>The deserialized code is executed within the context of the Node.js web terminal, granting the attacker control.</li>
<li>The attacker leverages the initial code execution to escalate privileges to root.</li>
<li>With root privileges, the attacker can install malware, create new user accounts, or exfiltrate sensitive data.</li>
<li>The attacker achieves persistent access and control over the compromised HestiaCP server.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows unauthenticated remote attackers to gain complete control over the HestiaCP server. This can lead to data breaches, system downtime, and the potential for further attacks on other systems within the network. Given the CVSS v3.1 base score of 10.0, this is a highly critical vulnerability.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply available patches or upgrade to a version of HestiaCP beyond 1.9.4 to remediate CVE-2026-43633.</li>
<li>Deploy the Sigma rule <code>Detect HestiaCP CVE-2026-43633 Attack</code> to identify exploitation attempts based on suspicious HTTP headers in web server logs.</li>
<li>Monitor web server logs for unusual patterns in HTTP headers, specifically those related to session management.</li>
<li>Disable the web terminal feature if it is not actively used to reduce the attack surface until patches can be applied.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">threat</category><category>deserialization</category><category>rce</category><category>cve</category></item></channel></rss>