{"description":"Trending threats, MITRE ATT\u0026CK coverage, and detection metadata. Fed continuously.","feed_url":"https://feed.craftedsignal.io/products/mantisbt--2.23.0--2.28.1/feed.json","home_page_url":"https://feed.craftedsignal.io/","items":[{"_cs_actors":[],"_cs_cpes":[],"_cs_cves":[],"_cs_exploited":false,"_cs_has_poc":false,"_cs_poc_references":[],"_cs_products":["mantisbt (\u003e= 2.23.0, \u003c= 2.28.1)"],"_cs_severities":["high"],"_cs_tags":["credential-access","authorization-bypass","rest-api"],"_cs_type":"advisory","_cs_vendors":["MantisBT"],"content_html":"\u003cp\u003eMantisBT versions 2.23.0 through 2.28.1 are susceptible to an authorization bypass vulnerability (CVE-2026-42071) affecting the REST and SOAP APIs. A missing authorization check in the file visibility function allows any authenticated user with REPORTER access level or higher to download attachments on private bugnotes. These private bugnotes are intended for internal developer discussions, and their attachments (logs, screenshots, patches) should be equally protected. This issue was discovered and responsibly reported by multiple security researchers, including Vishal Shukla, Tristan Madani (@TristanInSec) from Talence Security, and Tang Cheuk Hei (@siunam321). The web UI is not affected by this vulnerability.\u003c/p\u003e\n\u003ch2 id=\"attack-chain\"\u003eAttack Chain\u003c/h2\u003e\n\u003col\u003e\n\u003cli\u003eAn attacker authenticates to the MantisBT instance with REPORTER or higher access.\u003c/li\u003e\n\u003cli\u003eThe attacker identifies the ID of a bug issue.\u003c/li\u003e\n\u003cli\u003eThe attacker uses the REST API endpoint \u003ccode\u003eGET /api/rest/issues/{id}/files\u003c/code\u003e or the SOAP API endpoint \u003ccode\u003emc_issue_attachment_get\u003c/code\u003e to request attachments associated with the issue.\u003c/li\u003e\n\u003cli\u003eThe API endpoint fails to properly validate whether the authenticated user has permission to access attachments associated with private bugnotes within that issue.\u003c/li\u003e\n\u003cli\u003eThe attacker receives a list of attachment metadata, including file names and download URLs, associated with private bugnotes.\u003c/li\u003e\n\u003cli\u003eThe attacker uses the download URLs to retrieve the contents of attachments on private bugnotes.\u003c/li\u003e\n\u003cli\u003eThe attacker gains access to sensitive information contained within the attachments, such as logs, screenshots, or patches related to internal development discussions.\u003c/li\u003e\n\u003c/ol\u003e\n\u003ch2 id=\"impact\"\u003eImpact\u003c/h2\u003e\n\u003cp\u003eSuccessful exploitation of this vulnerability allows low-privileged authenticated users (REPORTER+) to access sensitive information intended for internal developer discussion, potentially leading to information disclosure. Attachments may contain sensitive data such as logs, screenshots, or patches, compromising the confidentiality of internal development processes. The number of affected installations is unknown, but all MantisBT instances running versions 2.23.0 to 2.28.1 are potentially vulnerable.\u003c/p\u003e\n\u003ch2 id=\"recommendation\"\u003eRecommendation\u003c/h2\u003e\n\u003cul\u003e\n\u003cli\u003eUpgrade MantisBT to a patched version beyond 2.28.1 to address CVE-2026-42071.\u003c/li\u003e\n\u003cli\u003eDeploy the Sigma rules provided below to your SIEM to detect potential exploitation attempts targeting the vulnerable REST API endpoint.\u003c/li\u003e\n\u003cli\u003eMonitor web server logs for unusual activity targeting the \u003ccode\u003e/api/rest/issues/{id}/files\u003c/code\u003e endpoint to identify potential exploit attempts.\u003c/li\u003e\n\u003c/ul\u003e\n","date_modified":"2026-05-11T19:40:12Z","date_published":"2026-05-11T19:40:12Z","id":"https://feed.craftedsignal.io/briefs/2026-05-mantisbt-auth-bypass/","summary":"MantisBT is vulnerable to a missing authorization check in its file visibility function, allowing authenticated users with REPORTER or higher access to download attachments on private bugnotes they should not be able to access through the REST API and SOAP API, affecting versions 2.23.0 to 2.28.1.","title":"MantisBT Private Bugnote Attachment Content Leak via REST API","url":"https://feed.craftedsignal.io/briefs/2026-05-mantisbt-auth-bypass/"}],"language":"en","title":"CraftedSignal Threat Feed — Mantisbt (\u003e= 2.23.0, \u003c= 2.28.1)","version":"https://jsonfeed.org/version/1.1"}