<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>High — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/severities/high/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 04 May 2026 18:16:29 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/severities/high/feed.xml" rel="self" type="application/rss+xml"/><item><title>WordPress Easy PayPal Events &amp; Tickets Plugin Information Disclosure Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-wordpress-easy-paypal-info-disclosure/</link><pubDate>Mon, 04 May 2026 18:16:29 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-wordpress-easy-paypal-info-disclosure/</guid><description>An information disclosure vulnerability in the Easy PayPal Events &amp; Tickets WordPress plugin (versions 1.3 and earlier) allows unauthenticated attackers to enumerate and retrieve all customer order records via the scan_qr.php endpoint.</description><content:encoded><![CDATA[<p>The Easy PayPal Events &amp; Tickets plugin for WordPress, versions 1.3 and earlier, contains an information disclosure vulnerability (CVE-2026-41471). This vulnerability allows unauthenticated attackers to iterate through WordPress post IDs via the <code>scan_qr.php</code> endpoint. By sequentially accessing these IDs, attackers can retrieve customer order records stored within the WordPress database. The plugin was officially closed as of March 18, 2026, meaning websites using the plugin prior to this date are vulnerable. This allows for the potential harvesting of sensitive customer data including names, addresses, and purchase histories.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a WordPress site using the vulnerable Easy PayPal Events &amp; Tickets plugin (version 1.3 or earlier).</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>scan_qr.php</code> endpoint.</li>
<li>The attacker modifies the request to iterate through sequential WordPress post IDs.</li>
<li>The server processes the request without proper authentication or authorization checks.</li>
<li>The <code>scan_qr.php</code> endpoint queries the WordPress database for order records associated with the provided post ID.</li>
<li>If a valid order record is found, the server returns the information in the HTTP response.</li>
<li>The attacker parses the HTTP response to extract customer order information.</li>
<li>The attacker repeats steps 2-7, incrementing the post ID to enumerate all order records.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows unauthenticated attackers to retrieve all customer order records stored in the WordPress database. This can lead to the disclosure of sensitive customer information, including names, email addresses, purchase history, and potentially other personal details. The number of affected victims depends on the popularity and usage of the vulnerable plugin. If the database contains financial information the impact could be severe.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule detecting requests to the scan_qr.php endpoint with iterative post IDs to identify potential exploitation attempts.</li>
<li>If still using the Easy PayPal Events &amp; Tickets plugin, remove the plugin, as it was closed as of 2026-03-18.</li>
<li>Monitor web server logs for suspicious activity targeting the <code>scan_qr.php</code> endpoint.</li>
<li>Review the WordPress access logs for requests originating from unusual IP addresses accessing the <code>scan_qr.php</code> endpoint.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>wordpress</category><category>info-disclosure</category><category>cve-2026-41471</category><category>unauthenticated</category><category>enumeration</category></item><item><title>WordPress Easy PayPal Events &amp; Tickets Plugin Authentication Bypass Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-wordpress-paypal-auth-bypass/</link><pubDate>Mon, 04 May 2026 18:16:27 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-wordpress-paypal-auth-bypass/</guid><description>An unauthenticated remote attacker can exploit a hardcoded authentication bypass vulnerability in the Easy PayPal Events &amp; Tickets plugin for WordPress (versions 1.3 and earlier) by providing 'test' as the hash parameter, allowing retrieval of sensitive order details.</description><content:encoded><![CDATA[<p>The Easy PayPal Events &amp; Tickets plugin for WordPress, version 1.3 and earlier, contains a critical hardcoded authentication bypass vulnerability (CVE-2026-32834) within its QR code scanning functionality. This flaw allows unauthenticated remote attackers to bypass hash verification by supplying the string &rsquo;test&rsquo; as the hash parameter when accessing the <code>add_wpeevent_button_qr</code> action. This bypass enables attackers to retrieve sensitive order details associated with any post ID, including PayPal transaction IDs, customer email addresses, purchase amounts, and ticket information. The vulnerable plugin was officially closed on March 18, 2026, making it imperative to identify and mitigate any remaining installations to prevent potential data breaches.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a WordPress site using the Easy PayPal Events &amp; Tickets plugin (version 1.3 or earlier).</li>
<li>Attacker crafts a malicious HTTP GET request targeting the <code>/wp-admin/admin-ajax.php</code> endpoint.</li>
<li>The request includes the <code>action</code> parameter set to <code>add_wpeevent_button_qr</code>.</li>
<li>The request includes a <code>hash</code> parameter set to the hardcoded value <code>test</code>.</li>
<li>The request includes a <code>post_id</code> parameter, either guessed or obtained through other means.</li>
<li>The vulnerable plugin bypasses authentication due to the hardcoded hash.</li>
<li>The plugin processes the request and retrieves sensitive order details associated with the provided <code>post_id</code>.</li>
<li>The attacker receives the sensitive data, including PayPal transaction IDs, customer email addresses, purchase amounts, and ticket information.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability grants unauthenticated attackers access to sensitive customer and transaction data associated with events and tickets managed through the Easy PayPal Events &amp; Tickets plugin. The leaked information, including customer email addresses and PayPal transaction IDs, can be used for further malicious activities such as phishing campaigns, identity theft, and financial fraud. The number of affected WordPress sites is unknown, but any site using a vulnerable version of the plugin is at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect WordPress Easy PayPal Events &amp; Tickets Authentication Bypass Attempt</code> to your SIEM to detect exploitation attempts targeting the vulnerable endpoint.</li>
<li>Inspect web server logs for requests to <code>/wp-admin/admin-ajax.php</code> with the <code>action</code> parameter set to <code>add_wpeevent_button_qr</code> and the <code>hash</code> parameter set to <code>test</code> to identify potential exploitation attempts.</li>
<li>Monitor network traffic for suspicious data exfiltration following the identified exploitation attempts to mitigate potential damage.</li>
<li>If the plugin is still installed, remove it immediately.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>wordpress</category><category>authentication bypass</category><category>vulnerability</category></item><item><title>Quarkus Vertx HTTP Authorization Bypass via Matrix Parameters</title><link>https://feed.craftedsignal.io/briefs/2026-05-quarkus-auth-bypass/</link><pubDate>Mon, 04 May 2026 17:20:20 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-quarkus-auth-bypass/</guid><description>Quarkus Vertx HTTP versions &lt; 3.20.6.1, &gt;= 3.21.0 and &lt; 3.27.3.1, &gt;= 3.30.0 and &lt; 3.33.1.1, and &gt;= 3.34.0 and &lt; 3.35.1.1 are vulnerable to an authorization bypass where appending a semicolon and arbitrary text to the request URL allows unauthorized access to protected resources.</description><content:encoded><![CDATA[<p>A vulnerability exists in Quarkus Vertx HTTP versions &lt; 3.20.6.1, &gt;= 3.21.0 and &lt; 3.27.3.1, &gt;= 3.30.0 and &lt; 3.33.1.1, and &gt;= 3.34.0 and &lt; 3.35.1.1. The vulnerability, designated as CVE-2026-39852, allows unauthenticated or lower-privileged users to bypass HTTP path-based authorization policies. By appending a semicolon (<code>;</code>) and arbitrary text to the request URL, attackers can gain unauthorized access to protected resources. This vulnerability stems from an inconsistency in path normalization: Quarkus&rsquo;s security layer checks the raw URL path, while RESTEasy Reactive&rsquo;s routing layer strips matrix parameters before matching endpoints. This means a request like <code>/api/admin;anything</code> can bypass authorization for <code>/api/admin</code> while still routing to the protected endpoint. This issue was discovered and verified by the GitHub Security Lab.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a protected endpoint, such as <code>/api/admin</code>, that requires authentication or specific privileges.</li>
<li>The attacker crafts a malicious HTTP request targeting the protected endpoint but appends a semicolon and arbitrary text, such as <code>/api/admin;anything</code>.</li>
<li>The request is sent to the Quarkus Vertx HTTP server.</li>
<li>Quarkus&rsquo;s security layer performs an authorization check on the raw URL path <code>/api/admin;anything</code>, which may not match the intended authorization rules for <code>/api/admin</code>.</li>
<li>RESTEasy Reactive&rsquo;s routing layer strips the matrix parameters (<code>;anything</code>) from the URL, resulting in the endpoint <code>/api/admin</code> being matched.</li>
<li>The request is routed to the protected endpoint <code>/api/admin</code>, bypassing the intended authorization checks.</li>
<li>The attacker gains unauthorized access to the protected resource or functionality.</li>
<li>The attacker performs actions they would not normally be authorized to perform, such as accessing sensitive data or modifying system configurations.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability can lead to unauthorized access to sensitive data, modification of system configurations, or other malicious activities. The vulnerability affects Quarkus Vertx HTTP applications that rely on path-based authorization policies. The number of affected applications is currently unknown, but any application using the vulnerable versions of Quarkus Vertx HTTP is susceptible.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Quarkus Vertx HTTP to a patched version (&gt;= 3.20.6.1, &gt;= 3.27.3.1, &gt;= 3.33.1.1, &gt;= 3.35.1.1) to remediate CVE-2026-39852.</li>
<li>Deploy the Sigma rule <code>Detect Quarkus Authorization Bypass Attempt</code> to identify potential exploitation attempts in web server logs.</li>
<li>Monitor web server logs for requests containing semicolons in the URL path to detect potential exploitation attempts using the <code>Monitor Semicolons in URL Path</code> Sigma rule.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>authentication-bypass</category><category>authorization-bypass</category><category>web-application</category></item><item><title>Qualcomm Driver IOCTL Memory Corruption Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-ioctl-memory-corruption/</link><pubDate>Mon, 04 May 2026 17:16:21 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-ioctl-memory-corruption/</guid><description>A memory corruption vulnerability, CVE-2025-47408, exists in Qualcomm drivers when another driver calls an IOCTL with an invalid input/output buffer, potentially leading to code execution or denial of service.</description><content:encoded><![CDATA[<p>A memory corruption vulnerability has been identified in Qualcomm drivers, tracked as CVE-2025-47408. This vulnerability occurs when one driver makes an Input/Output Control (IOCTL) call to another driver using a malformed or invalid input/output buffer. The flaw stems from improper validation or handling of the provided buffer, leading to a memory corruption condition. Successful exploitation of this vulnerability could lead to arbitrary code execution, privilege escalation, or a denial-of-service condition. This vulnerability was disclosed in the May 2026 Qualcomm Security Bulletin. The potential impact necessitates that detection engineering teams prioritize identifying and mitigating this threat across systems utilizing affected Qualcomm components.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the system, potentially through social engineering or exploiting another vulnerability.</li>
<li>The attacker identifies a vulnerable Qualcomm driver that is susceptible to IOCTL calls with invalid buffers.</li>
<li>The attacker develops a malicious driver or application capable of making IOCTL calls.</li>
<li>The malicious driver crafts a specific IOCTL request with a purposefully malformed input/output buffer.</li>
<li>The malicious driver sends the crafted IOCTL request to the targeted Qualcomm driver.</li>
<li>The targeted Qualcomm driver receives the IOCTL request and attempts to process the invalid buffer.</li>
<li>Due to the malformed buffer, the driver&rsquo;s memory management routines are corrupted, leading to a write to an arbitrary memory location.</li>
<li>The attacker leverages the memory corruption to execute arbitrary code, escalate privileges, or cause a denial-of-service condition.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2025-47408 can have severe consequences. An attacker can gain complete control over the affected system, potentially leading to data theft, system compromise, or disruption of services. While the specific number of affected devices or sectors is not explicitly stated, the widespread use of Qualcomm components in various devices suggests a broad potential impact. If successful, this exploit could allow attackers to install persistent backdoors, steal sensitive information, or use the compromised device as a launching point for further attacks within the network.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process creations for unsigned or untrusted drivers being loaded, and deploy the first Sigma rule provided below, to identify potential malicious driver activity.</li>
<li>Enable driver verifier on test systems using Qualcomm drivers to trigger memory corruption issues and aid in reverse engineering the vulnerability.</li>
<li>Review Qualcomm&rsquo;s May 2026 Security Bulletin for specific device models and affected driver versions to prioritize patching efforts.</li>
<li>Implement the second Sigma rule to detect suspicious IOCTL calls originating from unusual processes or locations, focusing on potential exploitation attempts of CVE-2025-47408.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>memory corruption</category><category>ioctl</category><category>driver vulnerability</category><category>cve-2025-47408</category></item><item><title>Memory Corruption Vulnerability in Digital Signal Processor (CVE-2025-47407)</title><link>https://feed.craftedsignal.io/briefs/2026-05-dsp-memory-corruption/</link><pubDate>Mon, 04 May 2026 17:16:21 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-dsp-memory-corruption/</guid><description>CVE-2025-47407 describes a memory corruption vulnerability affecting the digital signal processor due to allocation failure at the kernel level, potentially leading to arbitrary code execution with elevated privileges on affected systems.</description><content:encoded><![CDATA[<p>CVE-2025-47407 is a memory corruption vulnerability reported by Qualcomm, Inc., affecting digital signal processors (DSPs). The vulnerability stems from an allocation failure at the kernel level during process creation on the DSP. This can lead to memory corruption, potentially allowing an attacker to execute arbitrary code with elevated privileges. While the exact products affected are not specified, the issue resides within Qualcomm DSPs and could impact various devices utilizing these processors. This vulnerability was published on May 4, 2026, and requires patching of the affected DSP firmware to mitigate the risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a device containing a vulnerable Qualcomm DSP.</li>
<li>The attacker triggers a process creation event on the DSP. This could involve sending a specifically crafted request to the DSP or exploiting another vulnerability to initiate the process creation.</li>
<li>During the process creation, a memory allocation failure occurs within the DSP kernel.</li>
<li>This allocation failure leads to memory corruption, where data is written to an incorrect memory location.</li>
<li>The attacker leverages the memory corruption to overwrite critical kernel data structures or code.</li>
<li>The attacker injects malicious code into the corrupted memory region.</li>
<li>The DSP executes the injected malicious code, granting the attacker control over the DSP.</li>
<li>The attacker can then use the compromised DSP to further compromise the device or network it is connected to.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2025-47407 allows an attacker to execute arbitrary code on the DSP with elevated privileges. This can lead to a complete compromise of the affected device, allowing the attacker to steal sensitive data, install malware, or use the device as a launchpad for further attacks. The vulnerability can potentially impact a wide range of devices that utilize Qualcomm DSPs.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process creation events for anomalies that may indicate a memory allocation failure, using the <code>process_creation</code> log category and filtering for processes related to the digital signal processor.</li>
<li>Apply the security patch released by Qualcomm, as referenced in the advisory URL (<a href="https://docs.qualcomm.com/product/publicresources/securitybulletin/may-2026-bulletin.html)">https://docs.qualcomm.com/product/publicresources/securitybulletin/may-2026-bulletin.html)</a>, to address the memory corruption vulnerability.</li>
<li>Deploy the Sigma rule provided below to detect potential exploitation attempts by monitoring for specific events related to process creation and memory allocation.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>memory-corruption</category><category>dsp</category><category>qualcomm</category><category>cve-2025-47407</category></item><item><title>Multi-Stage 'Code of Conduct' Phishing Campaign Leads to AiTM Token Compromise</title><link>https://feed.craftedsignal.io/briefs/2026-05-aitm-phishing/</link><pubDate>Mon, 04 May 2026 15:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-aitm-phishing/</guid><description>A widespread phishing campaign utilized 'code of conduct' lures, a multi-step attack chain, and legitimate email services to distribute authenticated messages from attacker-controlled domains, ultimately leading to adversary-in-the-middle (AiTM) token compromise, primarily targeting US-based organizations.</description><content:encoded><![CDATA[<p>Between April 14 and 16, 2026, Microsoft Defender Research observed a sophisticated, large-scale phishing campaign targeting over 35,000 users across more than 13,000 organizations in 26 countries, predominantly in the United States (92%). The campaign, which did not focus on a single vertical, impacted a range of industries, with Healthcare &amp; life sciences (19%), Financial services (18%), Professional services (11%), and Technology &amp; software (11%) being the most affected. Attackers employed code of conduct-themed lures delivered via emails that appeared as internal compliance or regulatory communications. The campaign utilized a multi-step attack chain, including CAPTCHA challenges and intermediate staging pages, to reinforce legitimacy and filter out automated defenses, ultimately leading to an adversary-in-the-middle (AiTM) phishing flow.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attack begins with phishing emails posing as internal compliance communications, using subjects like &ldquo;Internal case log issued under conduct policy&rdquo;.</li>
<li>The emails contain a PDF attachment (e.g., &ldquo;Awareness Case Log File – Tuesday 14th, April 2026.pdf&rdquo;) that claims a &ldquo;code of conduct review&rdquo; has been initiated.</li>
<li>Recipients are instructed to click a “Review Case Materials” link within the PDF.</li>
<li>Clicking the link redirects the user to one of the attacker-controlled domains (e.g., acceptable-use-policy-calendly[.]de).</li>
<li>The landing page displays a Cloudflare CAPTCHA to validate the user and impede automated analysis.</li>
<li>After CAPTCHA completion, the user is redirected to an intermediate site that informs them the requested documentation is encrypted and requires account authentication.</li>
<li>The user is presented with a legitimate-looking sign-in experience, part of an AiTM phishing flow.</li>
<li>The attackers proxy the authentication session in real time and capture authentication tokens, granting immediate account access.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>This campaign resulted in the compromise of authentication tokens, enabling attackers to gain unauthorized access to user accounts and bypass multifactor authentication. With more than 35,000 users targeted across over 13,000 organizations, the potential for widespread data breaches, financial fraud, and further malicious activities is significant. The targeting of sectors like Healthcare and Financial Services indicates a focus on high-value targets with sensitive data.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Educate users about phishing lures, especially those using social engineering tactics and enterprise-style HTML templates.</li>
<li>Deploy the Sigma rule &ldquo;Detect Suspicious PDF Opening via Uncommon Applications&rdquo; to identify unusual PDF execution paths, based on the &lsquo;file_event&rsquo; log source.</li>
<li>Configure email security settings in Microsoft Defender for Office 365 to filter out phishing emails effectively.</li>
<li>Enable network protection to leverage SmartScreen as a host-based web proxy.</li>
<li>Block access to the attacker-controlled domains, such as acceptable-use-policy-calendly[.]de, at the DNS resolver level.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>phishing</category><category>credential-theft</category><category>AiTM</category><category>token-compromise</category></item><item><title>AAP Gateway Account Hijacking Vulnerability (CVE-2026-6266)</title><link>https://feed.craftedsignal.io/briefs/2026-05-aap-account-hijacking/</link><pubDate>Mon, 04 May 2026 14:16:35 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-aap-account-hijacking/</guid><description>CVE-2026-6266 allows a remote attacker to hijack user accounts in AAP gateway by manipulating the IDP-provided email during the user auto-linking process, potentially gaining unauthorized access, including administrative privileges.</description><content:encoded><![CDATA[<p>A vulnerability, tracked as CVE-2026-6266, exists in the AAP gateway. Specifically, the user auto-link strategy introduced in AAP 2.6 automatically links external Identity Provider (IDP) identities to existing AAP user accounts based on email matching without verifying email ownership. This vulnerability enables a remote attacker to potentially hijack a victim&rsquo;s account and gain unauthorized access to other accounts, including administrative accounts. The attacker achieves this by manipulating the email address provided by the IDP during the auto-linking process. This poses a significant risk to organizations using AAP for identity management, potentially leading to data breaches and system compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a target user account within the AAP gateway.</li>
<li>Attacker creates an account on a configured external Identity Provider (IDP).</li>
<li>Attacker configures the IDP account with the same email address as the target user in the AAP gateway.</li>
<li>The target user attempts to authenticate to the AAP gateway using the configured IDP.</li>
<li>The AAP gateway, running version 2.6 or later, automatically links the attacker-controlled IDP identity to the existing AAP user account based on email matching, without verifying ownership.</li>
<li>The attacker successfully authenticates to the AAP gateway using the attacker-controlled IDP account, gaining access to the target user&rsquo;s account.</li>
<li>If the hijacked account has administrative privileges, the attacker can escalate privileges and compromise the entire AAP gateway environment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-6266 can lead to unauthorized access to sensitive data and systems managed by the AAP gateway. This includes the potential compromise of administrative accounts, which could allow an attacker to gain full control over the AAP environment. The vulnerability impacts organizations using AAP 2.6 and later for identity management. The potential consequences include data breaches, service disruption, and financial loss.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the patch provided in Red Hat Security Advisory RHSA-2026:13508 to remediate CVE-2026-6266.</li>
<li>Monitor AAP gateway logs for successful authentications from unexpected IDPs to detect potential account hijacking attempts. Deploy a Sigma rule to detect this behavior.</li>
<li>Implement multi-factor authentication (MFA) for all AAP accounts to mitigate the impact of successful account hijacking, even if the IDP is compromised.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-6266</category><category>account-hijacking</category><category>authentication-bypass</category></item><item><title>Norton Secure VPN Privilege Escalation Vulnerability (CVE-2025-58074)</title><link>https://feed.craftedsignal.io/briefs/2026-05-norton-privesc/</link><pubDate>Mon, 04 May 2026 14:16:28 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-norton-privesc/</guid><description>A privilege escalation vulnerability exists in Norton Secure VPN during installation via the Microsoft Store (CVE-2025-58074), allowing a low-privilege user to replace files leading to arbitrary file deletion and potential elevation of privileges.</description><content:encoded><![CDATA[<p>CVE-2025-58074 describes a privilege escalation vulnerability affecting Norton Secure VPN when installed through the Microsoft Store. A low-privilege local user can exploit this vulnerability by manipulating files during the installation process. Successful exploitation can lead to arbitrary file deletion and, more critically, elevation of privileges on the affected system. This vulnerability poses a significant risk as it could allow an attacker to gain unauthorized access and control over a system. The vulnerability was reported by Talos and assigned a CVSS v3.1 score of 8.8 (HIGH).</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A low-privilege user initiates the installation of Norton Secure VPN from the Microsoft Store.</li>
<li>During the installation process, the user leverages their limited privileges to identify a directory or file that will be created/modified by the installer.</li>
<li>The user replaces a legitimate file or creates a junction point/mount point to a protected system directory.</li>
<li>The installer, running with elevated privileges, attempts to write data to the replaced file or the target of the junction/mount point.</li>
<li>Due to the replaced file or manipulated directory, the installer inadvertently deletes arbitrary files in a protected location or writes malicious content to a privileged location.</li>
<li>This malicious file or manipulated registry key is then executed or utilized by a privileged process.</li>
<li>The attacker gains elevated privileges on the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2025-58074 allows a low-privilege user to escalate their privileges to SYSTEM. This could lead to complete compromise of the affected system, including unauthorized access to sensitive data, installation of malware, and modification of system configurations. The impact is significant, as it bypasses standard security controls and allows for persistent and potentially undetectable access.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor for suspicious file modifications during software installations, especially those originating from the Microsoft Store. Use the &ldquo;Detect Suspicious File Replacement During Installation&rdquo; Sigma rule to detect file replacements in common installation directories.</li>
<li>Implement strict access control policies to limit the ability of low-privilege users to modify system files or directories.</li>
<li>Investigate any alerts generated by the &ldquo;Detect Insecure Junction Point Creation&rdquo; Sigma rule, which identifies the creation of junction points by non-administrator users.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>privilege-escalation</category><category>windows</category><category>vulnerability</category></item><item><title>Multiple Vulnerabilities in Progress Software MOVEit Automation</title><link>https://feed.craftedsignal.io/briefs/2026-05-moveit-automation-vulns/</link><pubDate>Mon, 04 May 2026 10:24:10 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-moveit-automation-vulns/</guid><description>Multiple vulnerabilities in Progress Software MOVEit Automation can be exploited by an attacker to bypass security measures or gain elevated privileges.</description><content:encoded><![CDATA[<p>Progress Software&rsquo;s MOVEit Automation is susceptible to multiple vulnerabilities that, if exploited, could allow an attacker to circumvent existing security measures and escalate privileges within the system. While specific details on the vulnerabilities are lacking, the advisory indicates a potential for significant impact on the confidentiality, integrity, and availability of systems utilizing the affected software. This is especially concerning given the role of MOVEit Automation in managing and transferring sensitive files, making it a high-value target for malicious actors seeking to exfiltrate data or disrupt business operations. Defenders should prioritize identifying and patching vulnerable instances of MOVEit Automation to mitigate the risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable MOVEit Automation instance.</li>
<li>Attacker exploits a vulnerability to gain initial access to the system. Due to lack of specifics, it is unknown how initial access occurs.</li>
<li>Attacker bypasses security measures using an unspecified exploit.</li>
<li>Attacker escalates privileges within the MOVEit Automation environment.</li>
<li>Attacker leverages escalated privileges to access sensitive data or system configurations.</li>
<li>Attacker moves laterally within the network, exploiting the compromised MOVEit Automation instance as a pivot point.</li>
<li>Attacker exfiltrates sensitive data or deploys malicious payloads to other systems on the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities could lead to unauthorized access to sensitive data, system compromise, and potential disruption of business operations. The lack of specific details makes it difficult to quantify the exact number of victims or sectors targeted. However, given the widespread use of MOVEit Automation in various industries, a successful attack could have far-reaching consequences, including financial losses, reputational damage, and regulatory penalties.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the latest security patches provided by Progress Software for MOVEit Automation to remediate the vulnerabilities.</li>
<li>Monitor MOVEit Automation logs for suspicious activity indicative of exploitation attempts.</li>
<li>Implement network segmentation to limit the potential impact of a successful attack on MOVEit Automation.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>vulnerability</category><category>privilege-escalation</category><category>defense-evasion</category></item><item><title>Totolink N300RH Buffer Overflow Vulnerability in setWanConfig</title><link>https://feed.craftedsignal.io/briefs/2026-05-totolink-n300rh-buffer-overflow/</link><pubDate>Mon, 04 May 2026 10:16:01 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-totolink-n300rh-buffer-overflow/</guid><description>A buffer overflow vulnerability exists in Totolink N300RH version 3.2.4-B20220812, specifically affecting the setWanConfig function within the /cgi-bin/cstecgi.cgi file, allowing a remote attacker to exploit it by manipulating the priDns argument in a POST request.</description><content:encoded><![CDATA[<p>A buffer overflow vulnerability has been identified in Totolink N300RH router version 3.2.4-B20220812. The vulnerability resides in the <code>setWanConfig</code> function within the <code>/cgi-bin/cstecgi.cgi</code> file, which handles POST requests. An attacker can exploit this vulnerability by manipulating the <code>priDns</code> argument in a crafted POST request. The vulnerability allows for remote exploitation, meaning an attacker does not need local access to the device. Public exploits for this vulnerability are already available, increasing the risk of exploitation. This vulnerability was published on 2026-05-04.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable Totolink N300RH router running firmware version 3.2.4-B20220812.</li>
<li>The attacker crafts a malicious POST request targeting the <code>/cgi-bin/cstecgi.cgi</code> endpoint.</li>
<li>Within the POST request, the attacker includes the <code>priDns</code> argument with a value exceeding the buffer size.</li>
<li>The <code>setWanConfig</code> function processes the <code>priDns</code> argument without proper bounds checking.</li>
<li>The oversized <code>priDns</code> value overwrites adjacent memory on the stack, potentially including control flow data.</li>
<li>The attacker gains control of the program execution flow by overwriting the return address.</li>
<li>The attacker executes arbitrary code on the router, potentially gaining a shell.</li>
<li>The attacker could then use the compromised router to perform lateral movement, exfiltrate data, or establish a persistent backdoor.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this buffer overflow vulnerability can lead to complete compromise of the Totolink N300RH router. An attacker could gain unauthorized access to the device&rsquo;s configuration, intercept network traffic, or use the router as a pivot point to attack other devices on the network. Given that public exploits are available, a wide range of attackers could potentially exploit this vulnerability. The CVSS v3.1 base score is 8.8 (HIGH).</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for POST requests to <code>/cgi-bin/cstecgi.cgi</code> with abnormally long <code>priDns</code> values to detect potential exploitation attempts using the provided Sigma rule.</li>
<li>Implement network intrusion detection system (NIDS) rules to detect and block malicious POST requests targeting <code>/cgi-bin/cstecgi.cgi</code>.</li>
<li>Contact Totolink for a security patch or firmware update to address CVE-2026-7749.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>buffer-overflow</category><category>router</category><category>cve-2026-7749</category></item><item><title>MariaDB Vulnerability Allows Denial of Service and Potential Code Execution</title><link>https://feed.craftedsignal.io/briefs/2024-01-mariadb-dos/</link><pubDate>Mon, 04 May 2026 09:34:06 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-mariadb-dos/</guid><description>A remote, authenticated attacker can exploit a vulnerability in MariaDB to perform a denial of service attack and potentially execute arbitrary program code.</description><content:encoded><![CDATA[<p>A vulnerability exists in MariaDB that allows a remote, authenticated attacker to perform a denial of service attack and potentially execute arbitrary program code. This vulnerability could be exploited by an attacker who has already gained valid credentials to the MariaDB server. Successful exploitation leads to service disruption and potential compromise of the underlying system. Defenders should implement appropriate access controls and monitoring to detect and prevent unauthorized access and exploitation attempts. This vulnerability poses a significant risk to organizations relying on MariaDB for critical services.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker obtains valid credentials for a MariaDB user, potentially through credential stuffing, phishing, or other means.</li>
<li>The attacker authenticates to the MariaDB server using the compromised credentials.</li>
<li>The attacker crafts a malicious SQL query or stored procedure designed to trigger the vulnerability.</li>
<li>The attacker executes the malicious query or stored procedure against the MariaDB server.</li>
<li>The vulnerability is triggered, leading to a denial of service condition, potentially crashing the MariaDB server process.</li>
<li>If the vulnerability allows code execution, the attacker injects malicious code into the MariaDB process.</li>
<li>The malicious code executes with the privileges of the MariaDB process.</li>
<li>The attacker gains further control of the system or performs other malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability can lead to a denial of service, disrupting services relying on MariaDB. In the event of code execution, the attacker could potentially gain complete control of the system, leading to data exfiltration, data manipulation, or further compromise of the network. The number of affected organizations is potentially large, as MariaDB is a widely used database server.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Implement strong password policies and multi-factor authentication to prevent credential compromise and unauthorized access to MariaDB servers.</li>
<li>Monitor MariaDB logs for suspicious activity, such as failed login attempts, unusual query patterns, or attempts to execute stored procedures from unexpected sources. Deploy the Sigma rule <code>DetectSuspiciousMariaDBStoredProcedureExecution</code> to detect the execution of potentially malicious stored procedures.</li>
<li>Regularly review and update access control lists to ensure that users only have the necessary privileges to perform their duties.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>mariadb</category><category>denial-of-service</category><category>code-execution</category></item><item><title>GoBGP AIGP Attribute Parser Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-gobgp-buffer-overflow/</link><pubDate>Mon, 04 May 2026 06:16:02 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-gobgp-buffer-overflow/</guid><description>A remote buffer overflow vulnerability exists in osrg GoBGP up to version 4.3.0 within the PathAttributeAigp.DecodeFromBytes function, allowing attackers to potentially execute arbitrary code by manipulating the AIGP Attribute Parser.</description><content:encoded><![CDATA[<p>A buffer overflow vulnerability has been identified in the osrg GoBGP software, specifically affecting versions up to 4.3.0. The vulnerability resides in the <code>PathAttributeAigp.DecodeFromBytes</code> function of the <code>pkg/packet/bgp/bgp.go</code> file, which is part of the AIGP Attribute Parser component. An attacker can remotely trigger this vulnerability by sending a crafted BGP message containing a malicious AIGP attribute. Successful exploitation could lead to arbitrary code execution on the affected system. GoBGP is an open source BGP implementation. Organizations using GoBGP for routing purposes should upgrade to version 4.4.0 or apply the provided patch (51ad1ada06cb41ce47b7066799981816f50b7ced) to mitigate this risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a GoBGP instance running a vulnerable version (&lt;= 4.3.0).</li>
<li>Attacker crafts a malicious BGP update message containing a specially crafted AIGP attribute.</li>
<li>The crafted AIGP attribute is designed to trigger a buffer overflow in the <code>PathAttributeAigp.DecodeFromBytes</code> function.</li>
<li>The attacker sends the malicious BGP update message to the vulnerable GoBGP instance over TCP port 179.</li>
<li>The GoBGP instance receives the message and attempts to parse the AIGP attribute using the vulnerable function.</li>
<li>The <code>PathAttributeAigp.DecodeFromBytes</code> function fails to properly validate the size of the input data, leading to a buffer overflow.</li>
<li>The buffer overflow overwrites adjacent memory regions, potentially including critical program data or executable code.</li>
<li>The attacker leverages the memory corruption to execute arbitrary code on the GoBGP instance, gaining control of the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows a remote attacker to execute arbitrary code on the affected GoBGP instance. This can lead to a complete compromise of the routing infrastructure, allowing the attacker to intercept, modify, or disrupt network traffic. In service provider environments, this could affect a large number of customers and cause significant network outages. Given the CVSS v3.1 score of 7.3, this is considered a high-severity vulnerability.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to GoBGP version 4.4.0 to remediate the vulnerability as mentioned in the overview.</li>
<li>Apply the patch <code>51ad1ada06cb41ce47b7066799981816f50b7ced</code> to the affected component to mitigate the vulnerability if upgrading is not immediately possible.</li>
<li>Monitor network traffic for BGP update messages with unusually large or malformed AIGP attributes, using a network intrusion detection system.</li>
<li>Deploy the Sigma rule detecting connections to port 179 from unusual sources to identify potentially malicious hosts attempting to exploit the vulnerability.</li>
<li>Review and harden BGP configuration to limit accepted peer connections to trusted sources only.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-7735</category><category>buffer-overflow</category><category>bgp</category></item><item><title>Funadmin Unrestricted File Upload Vulnerability (CVE-2026-7733)</title><link>https://feed.craftedsignal.io/briefs/2026-05-funadmin-upload/</link><pubDate>Mon, 04 May 2026 06:16:02 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-funadmin-upload/</guid><description>Funadmin versions up to 7.1.0-rc6 are vulnerable to unrestricted file uploads due to improper handling of the File argument in the UploadService::chunkUpload function, potentially leading to remote code execution.</description><content:encoded><![CDATA[<p>Funadmin, a web framework, is vulnerable to an unrestricted file upload vulnerability (CVE-2026-7733) affecting versions up to 7.1.0-rc6. The vulnerability exists within the <code>UploadService::chunkUpload</code> function in the <code>app/common/service/UploadService.php</code> file, which handles frontend chunked uploads. An attacker can manipulate the <code>File</code> argument during the upload process to bypass security checks and upload arbitrary files. The vulnerability is remotely exploitable, and an exploit has been published. Patch 59 is available to remediate this vulnerability. This issue enables attackers to upload malicious files, such as web shells or executable code, leading to potential remote code execution on the affected server.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a Funadmin instance running a vulnerable version (&lt;= 7.1.0-rc6).</li>
<li>The attacker sends a crafted HTTP request to the <code>UploadService::chunkUpload</code> endpoint.</li>
<li>The request includes a manipulated <code>File</code> argument, bypassing file type and size restrictions.</li>
<li>The vulnerable <code>UploadService::chunkUpload</code> function processes the malicious file without proper validation.</li>
<li>The malicious file is written to the server&rsquo;s file system in a publicly accessible directory.</li>
<li>The attacker accesses the uploaded file, potentially triggering execution (e.g., accessing a PHP web shell).</li>
<li>If the uploaded file is executable code (webshell), the attacker can execute arbitrary commands on the server.</li>
<li>The attacker gains control of the web server and potentially pivots to other systems within the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to upload arbitrary files to the Funadmin server. This can lead to several severe consequences, including remote code execution, web server defacement, data exfiltration, and complete system compromise. Given the ease of exploitation (an exploit is publicly available), affected systems are at high risk of being targeted. Organizations using vulnerable versions of Funadmin should apply patch 59 immediately to prevent potential attacks.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply patch 59 to all Funadmin installations running versions up to 7.1.0-rc6 as recommended by the vendor.</li>
<li>Monitor web server logs for unusual activity related to file uploads, specifically requests targeting the <code>UploadService::chunkUpload</code> endpoint (reference: Attack Chain).</li>
<li>Deploy the Sigma rule provided to detect attempts to exploit CVE-2026-7733 by monitoring for requests to the vulnerable endpoint with suspicious parameters.</li>
<li>Implement web application firewall (WAF) rules to filter out requests with malicious payloads targeting the <code>UploadService::chunkUpload</code> endpoint (reference: Attack Chain).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve</category><category>unrestricted file upload</category><category>remote code execution</category></item><item><title>Shandong Hoteam PDM Product Data Management System SQL Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-hoteam-pdm-sqli/</link><pubDate>Mon, 04 May 2026 05:16:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-hoteam-pdm-sqli/</guid><description>Shandong Hoteam Software PDM Product Data Management System up to version 8.3.9 is vulnerable to SQL injection via manipulation of the SortOrder argument in the GetQueryMachineGridOnePageData function of the /Base/BaseService.asmx/DataService file, allowing remote attackers to potentially execute arbitrary SQL commands.</description><content:encoded><![CDATA[<p>Shandong Hoteam Software&rsquo;s PDM Product Data Management System before version 8.3.10 is susceptible to a SQL injection vulnerability. The vulnerability exists in the <code>/Base/BaseService.asmx/DataService</code> file, specifically affecting the <code>GetQueryMachineGridOnePageData</code> function. By manipulating the <code>SortOrder</code> argument, a remote attacker can inject malicious SQL queries into the system. Successful exploitation could lead to unauthorized data access, modification, or even complete system compromise. Organizations using versions prior to 8.3.10 are urged to upgrade immediately to mitigate the risk. This vulnerability was reported on May 4, 2026.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable Shandong Hoteam PDM instance running a version prior to 8.3.10.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>/Base/BaseService.asmx/DataService</code> endpoint.</li>
<li>Within the HTTP request, the attacker modifies the <code>SortOrder</code> argument.</li>
<li>The <code>SortOrder</code> argument is injected with SQL code.</li>
<li>The application fails to properly sanitize the attacker-supplied SQL code.</li>
<li>The application executes the attacker-controlled SQL query against the backend database.</li>
<li>The attacker gains unauthorized access to sensitive data stored within the database.</li>
<li>The attacker exfiltrates the data or uses it for further malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability allows remote attackers to execute arbitrary SQL commands on the affected system. This can lead to unauthorized access to sensitive data, modification of data, or even complete compromise of the database server. Organizations using vulnerable versions of Shandong Hoteam PDM Product Data Management System could suffer significant data breaches, financial losses, and reputational damage. There are no specific victim counts or sector targeting available, but this could affect any organization utilizing the vulnerable PDM system.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Shandong Hoteam Software PDM Product Data Management System to version 8.3.10 or later to remediate the vulnerability as mentioned in the overview.</li>
<li>Implement the provided Sigma rule <code>Detect Hoteam PDM SQL Injection Attempt</code> to identify malicious requests targeting the vulnerable endpoint.</li>
<li>Monitor web server logs for suspicious requests containing potentially malicious SQL syntax in the <code>SortOrder</code> parameter, as described in the attack chain.</li>
<li>Implement proper input validation and sanitization techniques to prevent SQL injection vulnerabilities in web applications, mitigating similar risks in the future.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>cve-2026-7727</category><category>webserver</category></item><item><title>YunaiV yudao-cloud Authentication Bypass Vulnerability (CVE-2026-7710)</title><link>https://feed.craftedsignal.io/briefs/2026-05-yunai-auth-bypass/</link><pubDate>Mon, 04 May 2026 00:16:39 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-yunai-auth-bypass/</guid><description>YunaiV yudao-cloud up to version 3.8.0 is vulnerable to an authentication bypass (CVE-2026-7710) due to improper handling of the mock-token argument in the JwtAuthenticationTokenFilter.java file, allowing remote attackers to bypass authentication.</description><content:encoded><![CDATA[<p>CVE-2026-7710 is an authentication bypass vulnerability affecting YunaiV&rsquo;s yudao-cloud, specifically versions up to 3.8.0. The vulnerability resides in the <code>doFilterInternal</code> function within the <code>JwtAuthenticationTokenFilter.java</code> file of the Ruoyi-Vue-Pro component. An attacker can exploit this vulnerability by manipulating the <code>mock-token</code> argument, leading to improper authentication. This allows a remote attacker to potentially gain unauthorized access to the application. Public exploits are available, increasing the risk of exploitation. The vendor was notified but has not responded.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a YunaiV yudao-cloud instance running a vulnerable version (&lt;= 3.8.0).</li>
<li>Attacker crafts a malicious HTTP request targeting an endpoint protected by authentication.</li>
<li>The crafted request includes a manipulated <code>mock-token</code> argument designed to bypass the JWT authentication filter.</li>
<li>The <code>JwtAuthenticationTokenFilter.java</code> component processes the request and improperly validates the manipulated <code>mock-token</code>.</li>
<li>Due to the flawed authentication logic, the attacker is granted unauthorized access as an authenticated user.</li>
<li>Attacker gains access to protected resources and functionalities within the application.</li>
<li>Attacker performs privileged actions such as data modification, account takeover, or further exploitation of the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7710 allows attackers to bypass authentication and gain unauthorized access to YunaiV yudao-cloud applications. This can lead to the compromise of sensitive data, modification of application settings, and potentially full system takeover. Given the availability of public exploits, organizations using affected versions of yudao-cloud are at high risk. The CVSS v3.1 base score for this vulnerability is 7.3, indicating a high severity level.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade YunaiV yudao-cloud to a patched version that addresses CVE-2026-7710.</li>
<li>Deploy the Sigma rule <code>Detect Malicious Mock Token Argument</code> to identify exploitation attempts by monitoring web server logs for the presence of a <code>mock-token</code> argument.</li>
<li>Implement input validation on the server side to ensure that <code>mock-token</code> values conform to expected patterns.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>authentication bypass</category><category>cve-2026-7710</category><category>web application</category></item><item><title>AV Stumpfl Pixera Two Media Server Code Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-pixera-code-injection/</link><pubDate>Sun, 03 May 2026 17:16:13 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-pixera-code-injection/</guid><description>A remote code injection vulnerability exists in AV Stumpfl Pixera Two Media Server versions up to 25.2 R2 due to improper handling within the Websocket API, potentially allowing unauthenticated attackers to execute arbitrary code.</description><content:encoded><![CDATA[<p>A code injection vulnerability, tracked as CVE-2026-7703, has been identified in AV Stumpfl Pixera Two Media Server impacting versions up to 25.2 R2. The vulnerability resides within an unspecified function of the Websocket API component. Successful exploitation allows a remote attacker to inject and execute arbitrary code on the affected system. Given that an exploit has been published, the risk of exploitation is elevated. Organizations using the Pixera Two Media Server should upgrade to version 25.2 R3 or later to mitigate the risk. This vulnerability poses a significant threat to media production environments relying on the affected software.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable AV Stumpfl Pixera Two Media Server instance running a version prior to 25.2 R3.</li>
<li>The attacker crafts a malicious payload designed to exploit the code injection vulnerability within the Websocket API.</li>
<li>The attacker sends the malicious payload to the Pixera Two Media Server instance via a Websocket connection.</li>
<li>The vulnerable function within the Websocket API fails to properly sanitize or validate the input.</li>
<li>The malicious payload is processed, resulting in the injection of attacker-controlled code into the server&rsquo;s process.</li>
<li>The injected code executes with the privileges of the Pixera Two Media Server process.</li>
<li>The attacker gains arbitrary code execution on the server, potentially leading to complete system compromise.</li>
<li>The attacker can then install malware, exfiltrate sensitive data, or disrupt media server operations.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7703 can result in arbitrary code execution on the AV Stumpfl Pixera Two Media Server. This could allow an attacker to gain complete control over the server, potentially disrupting media presentations, stealing sensitive data, or using the compromised server as a launchpad for further attacks within the network. The impact is significant due to the critical role media servers play in various entertainment and presentation environments.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade AV Stumpfl Pixera Two Media Server to version 25.2 R3 or later to patch CVE-2026-7703 (reference: AV Stumpfl advisory).</li>
<li>Monitor network traffic for suspicious Websocket connections originating from or targeting AV Stumpfl Pixera Two Media Servers using the &ldquo;Detect Suspicious Pixera Websocket Activity&rdquo; Sigma rule.</li>
<li>Implement network segmentation to limit the blast radius of a potential compromise of the Pixera Two Media Server.</li>
<li>Review and harden the configuration of the Pixera Two Media Server to minimize the attack surface.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>code-injection</category><category>websocket</category><category>cve-2026-7703</category></item><item><title>Acrel ECEMS SQL Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-acrel-sql-injection/</link><pubDate>Sun, 03 May 2026 12:15:59 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-acrel-sql-injection/</guid><description>A SQL injection vulnerability in Acrel Electrical ECEMS Enterprise Microgrid Energy Efficiency Management System 1.3.0 allows remote attackers to execute arbitrary SQL commands by manipulating the 'fCircuitids' argument in the '/SubstationWEBV2/main/elecMaxMinAvgValue' file.</description><content:encoded><![CDATA[<p>Acrel Electrical&rsquo;s ECEMS Enterprise Microgrid Energy Efficiency Management System version 1.3.0 is vulnerable to SQL injection. The vulnerability resides in the <code>/SubstationWEBV2/main/elecMaxMinAvgValue</code> file, where manipulation of the <code>fCircuitids</code> argument allows for the injection of arbitrary SQL commands. The vulnerability, identified as CVE-2026-7694, can be exploited remotely without authentication, posing a significant risk to systems exposed to the network. The vendor was notified but did not respond, and a public exploit is available, increasing the likelihood of exploitation. This flaw allows attackers to potentially access, modify, or delete sensitive data within the ECEMS database.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies an accessible instance of Acrel ECEMS 1.3.0.</li>
<li>Attacker crafts a malicious SQL payload designed to extract sensitive information or modify the database.</li>
<li>The attacker sends a crafted HTTP request to <code>/SubstationWEBV2/main/elecMaxMinAvgValue</code> with the SQL payload embedded in the <code>fCircuitids</code> parameter.</li>
<li>The ECEMS application fails to properly sanitize the <code>fCircuitids</code> input.</li>
<li>The application executes the attacker-supplied SQL query against the database.</li>
<li>The database server processes the malicious query, potentially returning sensitive data or executing harmful commands.</li>
<li>The attacker receives the output of the injected SQL query.</li>
<li>The attacker uses the extracted information for further malicious activities, such as data exfiltration, privilege escalation, or denial of service.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability could allow an attacker to read sensitive information from the ECEMS database, modify existing data, or even gain administrative access to the system. This could lead to the compromise of energy efficiency management data, potentially impacting grid stability and financial records. Given the lack of vendor response and the availability of a public exploit, organizations using the affected software are at high risk. The impact includes potential data breaches, system outages, and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Inspect web server logs for suspicious requests to <code>/SubstationWEBV2/main/elecMaxMinAvgValue</code> containing potentially malicious SQL syntax within the <code>fCircuitids</code> parameter (see Sigma rule &ldquo;Detect Acrel ECEMS SQL Injection Attempt&rdquo;).</li>
<li>Deploy the Sigma rule &ldquo;Detect SQL Injection Error Messages&rdquo; to identify potential SQL injection attempts across all web applications.</li>
<li>Apply input validation and sanitization to all user-supplied input, especially the <code>fCircuitids</code> parameter in <code>/SubstationWEBV2/main/elecMaxMinAvgValue</code>, to prevent SQL injection.</li>
<li>Consider deploying a web application firewall (WAF) to filter out malicious requests targeting this vulnerability.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>cve-2026-7694</category><category>webserver</category></item><item><title>Jinher OA 1.0 SQL Injection Vulnerability (CVE-2026-7670)</title><link>https://feed.craftedsignal.io/briefs/2024-01-jinher-oa-sqli/</link><pubDate>Sat, 02 May 2026 23:16:16 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-jinher-oa-sqli/</guid><description>Jinher OA 1.0 is vulnerable to remote SQL injection via the DeptIDList parameter in the /C6/JHSoft.Web.PlanSummarize/UserSel.aspx file, potentially allowing attackers to execute arbitrary SQL queries.</description><content:encoded><![CDATA[<p>A SQL injection vulnerability, identified as CVE-2026-7670, affects Jinher OA 1.0, a web-based office automation software. The vulnerability resides within the /C6/JHSoft.Web.PlanSummarize/UserSel.aspx file, specifically in how the application handles the &lsquo;DeptIDList&rsquo; argument. An unauthenticated remote attacker can manipulate this argument to inject malicious SQL code into database queries. The vulnerability was reported to the vendor; however, there has been no response, and an exploit is publicly available. This lack of response and the availability of an exploit increases the risk to organizations using the affected Jinher OA 1.0.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a Jinher OA 1.0 instance exposed to the internet.</li>
<li>The attacker crafts a malicious HTTP GET or POST request targeting the <code>/C6/JHSoft.Web.PlanSummarize/UserSel.aspx</code> endpoint.</li>
<li>The request includes a modified <code>DeptIDList</code> parameter containing SQL injection payloads.</li>
<li>The server-side application fails to properly sanitize or validate the <code>DeptIDList</code> input.</li>
<li>The unsanitized input is passed directly into a SQL query executed against the underlying database.</li>
<li>The injected SQL code is executed by the database server, potentially allowing the attacker to bypass authentication, extract sensitive data, or modify data.</li>
<li>The attacker retrieves sensitive information, such as user credentials, internal configurations, or financial data, depending on the database structure and injected SQL commands.</li>
<li>The attacker leverages compromised data to gain further access, escalate privileges, or conduct lateral movement within the organization&rsquo;s network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability (CVE-2026-7670) can lead to unauthorized access to sensitive data, including user credentials, financial records, and internal communications. An attacker could potentially gain complete control over the affected Jinher OA 1.0 system and the underlying database. This could result in significant data breaches, financial losses, reputational damage, and disruption of business operations. Given the lack of vendor response, organizations using Jinher OA 1.0 are particularly vulnerable and should take immediate action to mitigate this risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Inspect web server logs for requests to <code>/C6/JHSoft.Web.PlanSummarize/UserSel.aspx</code> containing suspicious characters or SQL keywords within the <code>DeptIDList</code> parameter, as covered by the Sigma rule &ldquo;Detect Jinher OA SQL Injection Attempt via DeptIDList&rdquo;.</li>
<li>Apply input validation and sanitization to all user-supplied data, especially the <code>DeptIDList</code> parameter in <code>/C6/JHSoft.Web.PlanSummarize/UserSel.aspx</code>, to prevent SQL injection attacks.</li>
<li>Deploy the Sigma rule &ldquo;Detect Generic SQL Injection Attempt&rdquo; to identify broader SQL injection attempts across your web applications.</li>
<li>Given the vendor&rsquo;s lack of response, consider isolating the affected Jinher OA 1.0 instance from the network or replacing it with a more secure alternative.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>sql-injection</category><category>cve-2026-7670</category><category>web-application</category></item><item><title>InnoShop Improper Authentication Vulnerability (CVE-2026-7630)</title><link>https://feed.craftedsignal.io/briefs/2026-05-innoshop-auth-bypass/</link><pubDate>Sat, 02 May 2026 14:16:18 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-innoshop-auth-bypass/</guid><description>InnoShop version 0.7.8 and earlier contains an improper authentication vulnerability in the InstallServiceProvider::boot function (CVE-2026-7630) that allows remote attackers to bypass authentication and gain unauthorized access to the installation endpoint.</description><content:encoded><![CDATA[<p>A critical vulnerability, CVE-2026-7630, affects innocommerce InnoShop versions up to 0.7.8. The vulnerability resides in the <code>InstallServiceProvider::boot</code> function within the <code>innopacks/install/src/InstallServiceProvider.php</code> file, which governs the installation endpoint. Successful exploitation allows remote attackers to bypass authentication mechanisms, potentially leading to complete system compromise. Publicly available exploits exist, increasing the risk of active exploitation. It is crucial for administrators to apply the provided patch (identifier: <code>45758e4ec22451ab944ae2ae826b1e70f6450dc9</code>) immediately.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies an InnoShop instance running a vulnerable version (&lt;= 0.7.8).</li>
<li>The attacker crafts a malicious HTTP request targeting the installation endpoint (<code>innopacks/install/src/InstallServiceProvider.php</code>).</li>
<li>The request exploits the improper authentication in the <code>InstallServiceProvider::boot</code> function.</li>
<li>Authentication checks are bypassed due to the vulnerability.</li>
<li>The attacker gains unauthorized access to the installation process.</li>
<li>The attacker injects malicious code or configurations during the installation phase.</li>
<li>The injected code executes with elevated privileges, granting the attacker control over the InnoShop instance.</li>
<li>The attacker establishes a persistent backdoor for future access and potential data exfiltration or further malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7630 allows unauthenticated remote attackers to compromise InnoShop installations. This can lead to complete control of the web server, potentially affecting sensitive customer data, financial information, and intellectual property.  Given the ease of exploitation and publicly available exploits, unpatched InnoShop instances are at high risk of compromise.  The number of affected installations is currently unknown, but the widespread use of InnoShop in e-commerce makes this a significant threat.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately apply the patch identified by <code>45758e4ec22451ab944ae2ae826b1e70f6450dc9</code> to remediate the improper authentication vulnerability.</li>
<li>Deploy the Sigma rule &ldquo;Detect InnoShop Installation Endpoint Access&rdquo; to identify unauthorized access attempts to the installation endpoint.</li>
<li>Monitor web server logs for suspicious activity targeting the <code>innopacks/install/src/InstallServiceProvider.php</code> path, based on &ldquo;Detect InnoShop Installation Endpoint Access&rdquo; to identify post-exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>cve</category><category>authentication bypass</category><category>web application</category></item><item><title>code-projects Online Hospital Management System SQL Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-online-hospital-management-sql-injection/</link><pubDate>Sat, 02 May 2026 14:16:18 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-online-hospital-management-sql-injection/</guid><description>CVE-2026-7632 is a SQL injection vulnerability in code-projects Online Hospital Management System 1.0, allowing a remote attacker to execute arbitrary SQL commands by manipulating the 'delid' argument in the '/viewappointment.php' file.</description><content:encoded><![CDATA[<p>CVE-2026-7632 is a critical security flaw affecting code-projects Online Hospital Management System version 1.0. The vulnerability lies within the <code>/viewappointment.php</code> file, where insufficient input validation allows for SQL injection via the <code>delid</code> argument. A remote attacker can exploit this vulnerability to inject arbitrary SQL queries, potentially leading to unauthorized data access, modification, or deletion. The exploit is publicly disclosed, increasing the risk of widespread exploitation. This vulnerability poses a significant threat to organizations using the affected system, as it could compromise sensitive patient data and disrupt hospital operations.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies an instance of code-projects Online Hospital Management System 1.0 running the vulnerable <code>/viewappointment.php</code> script.</li>
<li>The attacker crafts a malicious HTTP request targeting <code>/viewappointment.php</code> with a specially crafted <code>delid</code> parameter containing SQL injection payloads.</li>
<li>The application fails to properly sanitize the <code>delid</code> input, allowing the injected SQL code to be passed to the database.</li>
<li>The injected SQL code is executed against the database server.</li>
<li>The attacker retrieves sensitive data such as patient records, usernames, and passwords from the database using SQL queries like <code>UNION SELECT</code>.</li>
<li>The attacker may modify or delete data within the database.</li>
<li>The attacker could potentially escalate privileges within the application by manipulating user roles or injecting administrative accounts.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7632 can lead to severe consequences, including unauthorized access to sensitive patient data, such as medical history, personal information, and financial records. Attackers could modify or delete critical data, disrupting hospital operations and potentially impacting patient care. The vulnerability could also allow attackers to gain control of the system, leading to further malicious activities like data exfiltration or ransomware deployment. This poses a significant risk to the privacy and security of patient information.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect SQL Injection in Online Hospital Management System</code> to your SIEM to identify exploitation attempts targeting the <code>/viewappointment.php</code> endpoint.</li>
<li>Implement input validation and sanitization measures in the <code>/viewappointment.php</code> script to prevent SQL injection attacks.</li>
<li>Upgrade to a patched version of code-projects Online Hospital Management System that addresses CVE-2026-7632 (if available).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>web-application</category><category>vulnerability</category></item><item><title>WordPress WCFM Plugin Vulnerable to IDOR Leading to Account Deletion</title><link>https://feed.craftedsignal.io/briefs/2026-05-wordpress-wcfm-idor/</link><pubDate>Sat, 02 May 2026 14:16:17 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-wordpress-wcfm-idor/</guid><description>The WCFM plugin for WordPress is vulnerable to an Insecure Direct Object Reference (IDOR) that allows authenticated attackers with Vendor-level access or higher to delete arbitrary users, including administrators.</description><content:encoded><![CDATA[<p>The WCFM – Frontend Manager for WooCommerce along with Bookings Subscription Listings Compatible plugin, a popular WordPress plugin, is affected by an Insecure Direct Object Reference (IDOR) vulnerability. This flaw, present in versions up to and including 6.7.25, stems from a lack of proper validation on the <code>customerid</code> parameter within the <code>wcfm_delete_wcfm_customer</code> function. An attacker with Vendor-level privileges or higher can exploit this vulnerability to delete any user account on the WordPress instance, including those with administrative rights. This can lead to complete compromise of the affected website.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker authenticates to the WordPress site with Vendor-level access or higher.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>wcfm_delete_wcfm_customer</code> function.</li>
<li>The attacker includes the <code>customerid</code> parameter in the request, setting its value to the ID of the target user account they wish to delete.</li>
<li>Due to the missing validation on the <code>customerid</code> parameter, the application directly uses the provided ID to locate the user account.</li>
<li>The <code>wcfm_delete_wcfm_customer</code> function proceeds to delete the user account identified by the attacker-supplied <code>customerid</code>.</li>
<li>The targeted user account is successfully deleted from the WordPress instance.</li>
<li>If the deleted user account was an administrator, the attacker can effectively take control of the website.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this IDOR vulnerability allows an attacker to delete arbitrary user accounts, including those with administrative privileges. This can lead to a complete compromise of the affected WordPress website. An attacker could then deface the website, steal sensitive data, or use it to launch further attacks. Due to the popularity of the plugin, a large number of WooCommerce stores are potentially affected.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the latest available patch or upgrade to a version of the WCFM plugin greater than 6.7.25 to remediate CVE-2026-2554.</li>
<li>Monitor web server logs for suspicious requests to <code>wcfm_delete_wcfm_customer</code> with unusual <code>customerid</code> values, using the Sigma rule provided below.</li>
<li>Implement input validation on the <code>customerid</code> parameter within the <code>wcfm_delete_wcfm_customer</code> function to prevent arbitrary user deletion.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>idor</category><category>wordpress</category><category>woocommerce</category><category>account-deletion</category></item><item><title>Potential Chroot Container Escape via Mount</title><link>https://feed.craftedsignal.io/briefs/2024-01-chroot-container-escape/</link><pubDate>Sat, 02 May 2026 12:45:21 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-chroot-container-escape/</guid><description>The rule detects a potential chroot container escape via mount, which involves a user within a container mounting the host's root file system and using chroot to escape the containerized environment, indicating a privilege escalation attempt.</description><content:encoded><![CDATA[<p>This detection rule monitors for a specific sequence of commands on Linux systems that could indicate an attempt to escape a containerized environment. The attack involves first mounting a file system, typically targeting the host&rsquo;s root file system, and then using the <code>chroot</code> command to change the root directory. This combination, if successful, allows an attacker inside a container to gain unauthorized access to the host system. The rule is designed to identify this uncommon behavior pattern, which is a strong indicator of malicious activity. The rule is applicable to environments utilizing Elastic Defend, SentinelOne Cloud Funnel, and Crowdstrike FDR. The detection looks for this sequence occurring within a 5-minute timeframe.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a container, possibly through exploiting a vulnerability or misconfiguration in the application running within the container.</li>
<li>The attacker attempts to mount the host&rsquo;s root filesystem within the container using the <code>mount</code> command, often targeting <code>/dev/sd*</code> devices. This requires sufficient privileges within the container, or the exploitation of a container escape vulnerability to gain such privileges.</li>
<li>The <code>mount</code> command is executed with arguments specifying the device to mount and the mount point within the container&rsquo;s file system.</li>
<li>The attacker then executes the <code>chroot</code> command, changing the root directory of the current process to the mounted host&rsquo;s root filesystem.</li>
<li>After successfully executing <code>chroot</code>, the attacker&rsquo;s perspective shifts to the host&rsquo;s file system, allowing them to access and modify sensitive files and configurations.</li>
<li>The attacker uses their newly acquired access to install backdoors, create new user accounts with elevated privileges, or modify system configurations to establish persistence.</li>
<li>The attacker may attempt to move laterally to other containers or systems within the network, leveraging their compromised position on the host.</li>
<li>The final objective is to gain complete control over the host system and potentially the entire infrastructure, leading to data exfiltration, system disruption, or other malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful container escape can have severe consequences, potentially leading to complete compromise of the host system and the data it contains. Depending on the environment, this could affect a single server or spread to many hosts. The compromise of containerized environments can lead to data breaches, service disruption, and reputational damage. Given the sensitive nature of data often processed within containers, the impact can range from financial losses to regulatory penalties.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rules in this brief to your SIEM and tune for your environment to detect potential container escapes.</li>
<li>Enable Elastic Defend integration to collect process data, and ensure Session View data is enabled to enhance visibility as mentioned in the setup guide.</li>
<li>Review and harden container configurations to minimize privileges granted to containerized processes, reducing the attack surface for escape attempts.</li>
<li>Implement network segmentation to limit the potential for lateral movement following a successful container escape.</li>
<li>Monitor process execution logs for unusual mount and chroot command sequences within container environments using Elastic Defend, SentinelOne, and Crowdstrike logs.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>container-escape</category><category>privilege-escalation</category><category>linux</category></item><item><title>Chroot Execution in Container Context on Linux</title><link>https://feed.craftedsignal.io/briefs/2026-05-chroot-container-escape/</link><pubDate>Sat, 02 May 2026 12:45:21 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-chroot-container-escape/</guid><description>Detects suspicious chroot execution within a Linux container context, potentially indicating a container escape attempt by pivoting to an alternate root filesystem.</description><content:encoded><![CDATA[<p>This detection rule identifies instances of the <code>chroot</code> command being executed within a Linux containerized environment. It leverages process execution telemetry from Elastic Defend and Auditd Manager to detect potential container escape attempts. The rule focuses on processes where the name is <code>chroot</code> or the command-line arguments contain <code>chroot</code>. Container context is determined by identifying processes with a title matching <code>runc init</code>, a container workload entry leader, or <code>runc</code> as the parent process. Successful container escapes can allow attackers to gain unauthorized access to the host system. The technique is often combined with sensitive host mounts, which are then leveraged after the <code>chroot</code> to access files and processes outside the container.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a container, potentially through exploiting a vulnerability in the containerized application.</li>
<li>The attacker identifies sensitive host mounts within the container&rsquo;s filesystem, such as <code>/host</code>, <code>/proc/1/root</code>, or other unexpected node paths.</li>
<li>The attacker executes the <code>chroot</code> command, specifying an alternate root filesystem, typically a host-linked mount.</li>
<li>The <code>chroot</code> command redirects system calls to the new root filesystem, effectively isolating the attacker from the container&rsquo;s original environment.</li>
<li>The attacker leverages the new root filesystem to access files, directories, and processes on the host system outside the container&rsquo;s boundaries.</li>
<li>The attacker may then attempt to escalate privileges by exploiting vulnerabilities in host system services or binaries.</li>
<li>The attacker may install malware or establish persistence mechanisms on the host system.</li>
<li>The attacker uses the compromised host system to pivot to other systems on the network or to exfiltrate sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful container escape can lead to full compromise of the underlying host system, potentially impacting all containers running on the same host. This can enable attackers to access sensitive data, disrupt services, and move laterally within the network. In multi-tenant environments, a container escape can compromise the security of other tenants sharing the same infrastructure. A single successful container escape can lead to a widespread breach impacting numerous systems and applications.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Chroot Execution in Container Context</code> to your SIEM and tune for your environment.</li>
<li>Enable process execution telemetry from Elastic Defend and Auditd Manager on Linux to ensure the required data is available for detection.</li>
<li>Investigate any alerts generated by the Sigma rule to determine if the <code>chroot</code> execution was authorized and the target directory is an internal build root versus a host filesystem mount.</li>
<li>Monitor for follow-on shell execution, access to the container runtime socket, or kubelet credential paths, as these are common indicators of container escape attempts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>container-escape</category><category>privilege-escalation</category><category>linux</category><category>chroot</category></item><item><title>Salon Booking System WordPress Plugin Arbitrary File Read Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-wordpress-arbitrary-file-read/</link><pubDate>Sat, 02 May 2026 12:16:16 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-wordpress-arbitrary-file-read/</guid><description>The Salon Booking System WordPress plugin is vulnerable to arbitrary file read, allowing unauthenticated attackers to exfiltrate local files by manipulating file-field values in booking confirmation emails.</description><content:encoded><![CDATA[<p>The Salon Booking System – Free Version plugin for WordPress, versions up to and including 10.30.25, contains an arbitrary file read vulnerability. This flaw stems from the plugin&rsquo;s public booking flow, where it accepts attacker-controlled file-field values. These values are subsequently used as trusted paths when creating email attachments for booking confirmations. This allows an unauthenticated attacker to supply a path to any file accessible to the web server, triggering its inclusion as an attachment in the booking confirmation email, effectively enabling arbitrary file exfiltration. Exploitation requires no authentication and can be triggered remotely.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker accesses the public booking form of a WordPress site running the vulnerable Salon Booking System plugin.</li>
<li>The attacker crafts a malicious request to the booking form, injecting a file path (e.g., <code>/etc/passwd</code>) into a file-field parameter.</li>
<li>The plugin processes the booking request and stores the attacker-supplied file path.</li>
<li>The plugin generates a booking confirmation email.</li>
<li>The plugin uses the stored, attacker-controlled file path to attach the specified file to the confirmation email.</li>
<li>The booking confirmation email, now containing the arbitrary file as an attachment, is sent to the user who initiated the booking (which could be the attacker or an unwitting third party).</li>
<li>The attacker retrieves the email (if sent to the attacker) or intercepts it (if sent to a third party) and extracts the attached file.</li>
<li>The attacker gains unauthorized access to the contents of the exfiltrated file.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows unauthenticated attackers to read arbitrary files from the affected WordPress server. This could lead to the disclosure of sensitive information, such as configuration files, database credentials, or other confidential data. The vulnerability affects versions of the Salon Booking System plugin up to and including 10.30.25. The number of affected WordPress installations is unknown, but could be substantial given the plugin&rsquo;s popularity.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the Salon Booking System plugin to the latest version to patch CVE-2026-6320.</li>
<li>Monitor web server logs (category <code>webserver</code>, product <code>linux</code>) for suspicious requests containing absolute or relative file paths in file-field parameters, using a detection rule similar to the ones provided below.</li>
<li>Implement strict input validation and sanitization for all user-supplied data, especially file paths.</li>
<li>Review and restrict file system permissions to limit the files accessible to the web server process.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>arbitrary-file-read</category><category>wordpress</category><category>plugin-vulnerability</category><category>cve</category></item><item><title>Paid Memberships Pro Plugin Vulnerability Allows Unauthorized Stripe Webhook Modification</title><link>https://feed.craftedsignal.io/briefs/2026-05-pmpro-stripe-webhook-vuln/</link><pubDate>Sat, 02 May 2026 12:16:16 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-pmpro-stripe-webhook-vuln/</guid><description>The Paid Memberships Pro plugin for WordPress is vulnerable to unauthorized modification of Stripe webhook configurations due to missing capability checks, allowing authenticated attackers with Subscriber-level access to disrupt payment processing.</description><content:encoded><![CDATA[<p>The Paid Memberships Pro plugin, a popular WordPress plugin for managing paid subscriptions, contains a vulnerability (CVE-2026-4100) that allows authenticated attackers with minimal privileges (Subscriber-level access) to manipulate Stripe webhook configurations. This flaw exists in versions up to and including 3.6.5 due to missing capability checks on specific AJAX handlers. An attacker exploiting this vulnerability can delete, create, or rebuild the site&rsquo;s Stripe webhook, leading to significant disruptions in payment processing, subscription renewal synchronization, cancellation handling, and management of failed payments. This vulnerability puts revenue streams and customer relationships at risk for any organization using the affected plugin versions.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains Subscriber-level access to the WordPress site, either through registration or compromised credentials.</li>
<li>The attacker crafts a malicious AJAX request targeting the <code>wp_ajax_pmpro_stripe_create_webhook</code> endpoint.</li>
<li>Alternatively, the attacker crafts a malicious AJAX request to the <code>wp_ajax_pmpro_stripe_delete_webhook</code> endpoint.</li>
<li>Or, the attacker crafts a malicious AJAX request to the <code>wp_ajax_pmpro_stripe_rebuild_webhook</code> endpoint.</li>
<li>Due to missing capability checks, the server processes the request without proper authorization.</li>
<li>The Stripe webhook configuration is modified, deleted, or rebuilt based on the attacker&rsquo;s request.</li>
<li>Legitimate payment processing and subscription management processes fail due to the altered webhook configuration.</li>
<li>The attacker effectively disrupts the site&rsquo;s ability to collect payments and manage subscriptions.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to completely disrupt a WordPress site&rsquo;s payment processing and subscription management functionalities. This can result in significant financial losses due to interrupted sales and subscription renewals. Furthermore, the disruption can damage customer trust and lead to churn as users experience issues with their subscriptions. The vulnerability affects all sites using Paid Memberships Pro plugin versions up to 3.6.5.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately update the Paid Memberships Pro plugin to the latest version to patch CVE-2026-4100.</li>
<li>Monitor WordPress web server logs for POST requests to <code>/wp-admin/admin-ajax.php</code> with the <code>action</code> parameter set to <code>pmpro_stripe_create_webhook</code>, <code>pmpro_stripe_delete_webhook</code>, or <code>pmpro_stripe_rebuild_webhook</code> using the &ldquo;Detect Suspicious PMPro Stripe Webhook AJAX Requests&rdquo; Sigma rule.</li>
<li>Review user roles and permissions to minimize the number of users with Subscriber-level access as a temporary mitigation.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>wordpress</category><category>stripe</category><category>webhook</category><category>vulnerability</category><category>plugin</category></item><item><title>Geo Mashup WordPress Plugin Vulnerable to Time-Based SQL Injection (CVE-2026-4062)</title><link>https://feed.craftedsignal.io/briefs/2026-05-geo-mashup-sqli/</link><pubDate>Sat, 02 May 2026 12:16:16 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-geo-mashup-sqli/</guid><description>The Geo Mashup WordPress plugin is vulnerable to Time-Based SQL Injection due to insufficient input sanitization, allowing unauthenticated attackers to extract sensitive database information.</description><content:encoded><![CDATA[<p>The Geo Mashup plugin for WordPress, in versions up to and including 1.13.18, contains a Time-Based SQL Injection vulnerability (CVE-2026-4062). The vulnerability exists within the &lsquo;object_ids&rsquo; and &rsquo;exclude_object_ids&rsquo; parameters. Insufficient escaping of user-supplied input, specifically within the <code>IN(...)</code> and <code>NOT IN(...)</code> SQL context, coupled with inadequate preparation of the existing SQL query, allows for the injection. The <code>esc_sql()</code> function is applied but is rendered ineffective due to its inability to protect against parenthesis or SQL keyword injection within the unquoted <code>IN(...)</code> / <code>NOT IN(...)</code> context. A numeric-only sanitizer exists in <code>sanitize_query_args()</code>, but this is only applied in the AJAX code path and not in the <code>render-map.php</code> or template tag code paths. This flaw enables unauthenticated attackers to append malicious SQL queries, facilitating the extraction of sensitive information from the WordPress database through a time-based blind SQL injection technique.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies the vulnerable Geo Mashup plugin running on a WordPress site.</li>
<li>The attacker crafts a malicious HTTP request targeting an endpoint that utilizes the &lsquo;object_ids&rsquo; or &rsquo;exclude_object_ids&rsquo; parameters.</li>
<li>The attacker injects a time-based SQL injection payload into the &lsquo;object_ids&rsquo; or &rsquo;exclude_object_ids&rsquo; parameter. This payload leverages SQL functions like <code>SLEEP()</code> or <code>BENCHMARK()</code> to introduce delays based on conditional SQL logic.</li>
<li>The vulnerable code fails to properly sanitize the injected SQL code due to the ineffective <code>esc_sql()</code> function in the <code>IN</code>/<code>NOT IN</code> context.</li>
<li>The injected SQL payload is appended to the existing SQL query executed by the Geo Mashup plugin.</li>
<li>The database server executes the combined query, including the injected time-based SQL injection.</li>
<li>The attacker monitors the response time of the HTTP request. A delayed response indicates that the injected SQL logic evaluated to true.</li>
<li>By repeatedly sending requests with different SQL injection payloads, the attacker can extract sensitive information from the database one character at a time.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability can lead to the complete compromise of the WordPress database. An attacker can extract sensitive information such as user credentials, API keys, configuration details, and other confidential data. This can result in data breaches, unauthorized access to the WordPress site, and potential further attacks on connected systems. The CVSS v3.1 base score for this vulnerability is 7.5, indicating a high severity.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the Geo Mashup plugin to a version greater than 1.13.18 to remediate CVE-2026-4062.</li>
<li>Deploy the Sigma rule <code>Detect Geo Mashup Time-Based SQL Injection Attempts</code> to identify potential exploitation attempts targeting the vulnerable parameters.</li>
<li>Monitor web server logs for suspicious requests containing SQL injection payloads in the &lsquo;object_ids&rsquo; or &rsquo;exclude_object_ids&rsquo; parameters to detect exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sqli</category><category>wordpress</category><category>plugin</category></item><item><title>Geo Mashup WordPress Plugin Vulnerable to Time-Based SQL Injection (CVE-2026-4061)</title><link>https://feed.craftedsignal.io/briefs/2026-05-geo-mashup-sql-injection/</link><pubDate>Sat, 02 May 2026 12:16:16 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-geo-mashup-sql-injection/</guid><description>A time-based SQL injection vulnerability (CVE-2026-4061) exists in the Geo Mashup WordPress plugin (&lt;= 1.13.18) due to insufficient sanitization of the 'map_post_type' parameter, enabling unauthenticated attackers to extract sensitive information via time-based blind SQL injection if the Geo Search feature is enabled.</description><content:encoded><![CDATA[<p>The Geo Mashup plugin for WordPress is vulnerable to time-based SQL injection, as detailed in CVE-2026-4061. This vulnerability affects all versions of the plugin up to and including 1.13.18. The root cause lies in the <code>SearchResults</code> hook, where the <code>map_post_type</code> parameter is mishandled. Specifically, the code first calls <code>stripslashes_deep($_POST)</code>, effectively removing WordPress&rsquo;s magic quotes protection. Subsequently, the unsanitized <code>map_post_type</code> value is directly concatenated into an <code>IN(...)</code> clause without proper escaping using <code>esc_sql()</code> or <code>$wpdb-&gt;prepare()</code>. While the &lsquo;any&rsquo; branch of the code correctly applies <code>array_map('esc_sql', ...)</code>, the alternative branch lacks this crucial sanitization step. Successful exploitation requires the Geo Search feature to be enabled in the plugin&rsquo;s settings. This vulnerability allows unauthenticated attackers to inject malicious SQL queries, potentially leading to the extraction of sensitive database information through time-based blind techniques.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a WordPress site using a vulnerable version of the Geo Mashup plugin (&lt;= 1.13.18) with the Geo Search feature enabled.</li>
<li>The attacker crafts a malicious HTTP POST request targeting the <code>SearchResults</code> hook with a specially crafted <code>map_post_type</code> parameter containing SQL injection payload.</li>
<li>The vulnerable code within the Geo Mashup plugin processes the POST request, removing magic quotes using <code>stripslashes_deep($_POST)</code>.</li>
<li>The unsanitized <code>map_post_type</code> value is then concatenated directly into an SQL query within an <code>IN(...)</code> clause without proper escaping.</li>
<li>The injected SQL code executes within the database query, allowing the attacker to manipulate the query&rsquo;s behavior.</li>
<li>The attacker uses time-based SQL injection techniques (e.g., <code>IF(condition, SLEEP(5), 0)</code>) within the injected payload to infer information based on the response time.</li>
<li>By repeatedly sending modified requests and observing the response times, the attacker can extract sensitive data, character by character, from the database.</li>
<li>The attacker extracts sensitive information such as usernames, passwords, API keys, or other confidential data stored in the WordPress database.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows unauthenticated attackers to extract sensitive information from the WordPress database. The severity of the impact depends on the sensitivity of the data stored in the database, but could include exposure of user credentials, confidential business data, or other sensitive information. Because it affects any installation with the Geo Search feature enabled, a large number of websites using the Geo Mashup plugin may be vulnerable. The CVSS v3.1 base score is 7.5, indicating a high severity vulnerability.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the Geo Mashup plugin to the latest version (later than 1.13.18) to patch CVE-2026-4061.</li>
<li>Deploy the provided Sigma rule to detect potential exploitation attempts targeting the vulnerable <code>SearchResults</code> hook using a malicious <code>map_post_type</code> parameter.</li>
<li>Review web server logs for suspicious POST requests to <code>/wp-admin/admin-ajax.php</code> (common AJAX endpoint in WordPress) containing potentially malicious SQL injection payloads in the <code>map_post_type</code> parameter.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>wordpress</category><category>plugin</category></item><item><title>Zyosoft School App Insecure Direct Object Reference Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-zyosoft-school-app-idor/</link><pubDate>Sat, 02 May 2026 10:16:19 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-zyosoft-school-app-idor/</guid><description>Zyosoft's School App contains an Insecure Direct Object Reference vulnerability (CVE-2026-7491) that allows authenticated remote attackers to modify parameters and access or modify other users' data.</description><content:encoded><![CDATA[<p>The Zyosoft School App is susceptible to an Insecure Direct Object Reference (IDOR) vulnerability identified as CVE-2026-7491. This flaw allows authenticated remote attackers to bypass authorization controls by modifying specific parameters within the application&rsquo;s requests. By manipulating these parameters, attackers can gain unauthorized access to sensitive data belonging to other users, as well as modify that data. Successful exploitation allows unauthorized data access and modification, potentially leading to data breaches, privacy violations, and manipulation of user accounts. Defenders should prioritize identifying and mitigating this vulnerability to prevent potential abuse.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker authenticates to the Zyosoft School App using valid credentials.</li>
<li>The attacker identifies a request that includes a user-controlled parameter referencing a specific object (e.g., user ID, record number).</li>
<li>The attacker modifies the value of this parameter to reference a different object belonging to another user.</li>
<li>The attacker sends the modified request to the server.</li>
<li>The server, lacking proper authorization checks, processes the request using the attacker-supplied object reference.</li>
<li>The server returns the data associated with the targeted user&rsquo;s object to the attacker.</li>
<li>The attacker can further modify parameters to alter the data of the targeted user.</li>
<li>The attacker successfully reads or modifies the targeted user&rsquo;s data without proper authorization.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7491 allows authenticated attackers to read and modify other users&rsquo; data within the Zyosoft School App. This can lead to severe consequences, including unauthorized access to sensitive student or staff information, modification of grades or attendance records, and potential data breaches. The number of affected users depends on the app&rsquo;s deployment size, but any instance is vulnerable. This issue could affect any educational institution using the Zyosoft School App.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Inspect web server logs for requests containing unusual parameter modifications, specifically those referencing user IDs or other sensitive data fields (webserver logs).</li>
<li>Deploy the Sigma rule provided below to detect attempts to access or modify resources using potentially manipulated object references (Sigma rule).</li>
<li>Implement robust authorization checks in the Zyosoft School App to verify that users only have access to resources they are explicitly authorized to access.</li>
<li>Contact Zyosoft for a patch addressing CVE-2026-7491.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>idor</category><category>vulnerability</category><category>web application</category><category>cve-2026-7491</category></item><item><title>Sunnet CTMS/CPAS Arbitrary File Upload Vulnerability (CVE-2026-7490)</title><link>https://feed.craftedsignal.io/briefs/2026-05-sunnet-file-upload/</link><pubDate>Sat, 02 May 2026 10:16:18 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-sunnet-file-upload/</guid><description>A privileged remote attacker can exploit CVE-2026-7490 in Sunnet CTMS and CPAS to upload and execute web shell backdoors, leading to arbitrary code execution on the server.</description><content:encoded><![CDATA[<p>CVE-2026-7490 is an arbitrary file upload vulnerability found in Sunnet CTMS and CPAS. Disclosed in May 2026, this vulnerability enables a privileged attacker to upload malicious files, specifically web shell backdoors, to the affected server. This can be achieved remotely, without requiring local system access, given the attacker already possesses valid privileged credentials for the application. Successful exploitation allows the attacker to execute arbitrary code on the server, potentially leading to complete system compromise. This vulnerability poses a significant threat to organizations using these Sunnet products, as it could result in data breaches, service disruption, and other malicious activities.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains privileged access to the CTMS or CPAS application, either through credential theft, phishing, or other means.</li>
<li>Attacker identifies the file upload functionality within the application.</li>
<li>Attacker crafts a malicious file, such as a PHP web shell, designed to execute arbitrary commands on the server.</li>
<li>Attacker bypasses any client-side file type validation mechanisms.</li>
<li>Attacker uploads the malicious file to the server through the vulnerable file upload endpoint.</li>
<li>The application saves the file to a publicly accessible directory without proper sanitization or validation.</li>
<li>Attacker accesses the uploaded web shell via a web browser.</li>
<li>Attacker uses the web shell to execute arbitrary commands on the server, leading to full system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7490 allows attackers to execute arbitrary code on the affected server. This can lead to a range of malicious activities, including data theft, modification, or destruction, installation of malware, and complete system takeover. Since the vulnerability affects CTMS and CPAS, organizations in sectors utilizing these systems for content or process management are particularly at risk. The vulnerability&rsquo;s high severity allows attackers to quickly gain a foothold and potentially compromise sensitive information or disrupt business operations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply available patches or updates from Sunnet to address CVE-2026-7490.</li>
<li>Implement the Sigma rule <code>Detect Malicious File Uploads to Web Servers</code> to detect suspicious file uploads based on file extensions and content.</li>
<li>Review and harden file upload functionalities within CTMS and CPAS to prevent arbitrary file uploads.</li>
<li>Monitor web server logs for access to suspicious files in upload directories, using the <code>Web Shell Access</code> Sigma rule.</li>
<li>Restrict access to file upload functionalities to only authorized users with appropriate privileges.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>arbitrary-file-upload</category><category>web-shell</category><category>code-execution</category></item><item><title>Sunnet CTMS SQL Injection Vulnerability (CVE-2026-7489)</title><link>https://feed.craftedsignal.io/briefs/2026-05-sunnet-ctms-sqli/</link><pubDate>Sat, 02 May 2026 10:16:18 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-sunnet-ctms-sqli/</guid><description>Sunnet CTMS is vulnerable to SQL injection (CVE-2026-7489), allowing authenticated remote attackers to execute arbitrary SQL commands and compromise the database.</description><content:encoded><![CDATA[<p>A SQL Injection vulnerability, identified as CVE-2026-7489, exists in CTMS developed by Sunnet. This flaw allows authenticated remote attackers to inject arbitrary SQL commands. Successful exploitation could allow the attackers to read, modify, and delete database contents. The vulnerability was published on May 2, 2026. The scope of this vulnerability affects systems running the vulnerable CTMS software, potentially leading to data breaches and system compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker authenticates to the CTMS application.</li>
<li>The attacker identifies an endpoint vulnerable to SQL injection.</li>
<li>The attacker crafts a malicious SQL query designed to exploit the injection point, likely using tools like Burp Suite or SQLMap.</li>
<li>The attacker injects the SQL payload via a crafted HTTP request, targeting vulnerable parameters within the request.</li>
<li>The CTMS application executes the injected SQL query against the database.</li>
<li>The attacker bypasses authentication or authorization controls to gain elevated privileges within the application or database.</li>
<li>The attacker reads sensitive data from the database, such as user credentials or confidential business information.</li>
<li>The attacker modifies or deletes database entries, leading to data corruption or denial of service.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability could allow attackers to read sensitive information, modify data, or delete critical database contents. This could lead to a complete compromise of the CTMS application and its underlying database, impacting all users and data managed by the system. The severity is heightened by the potential for attackers to gain complete control over the database, leading to significant data breaches and operational disruption.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the patch or upgrade CTMS to a version that addresses CVE-2026-7489 as soon as it becomes available from Sunnet.</li>
<li>Deploy the Sigma rule &ldquo;Detect Suspicious SQL Injection Attempts&rdquo; to identify potential exploitation attempts against CTMS (see below).</li>
<li>Review web server logs for suspicious activity indicative of SQL injection attempts, specifically looking for unusual characters or SQL syntax in HTTP request parameters.</li>
<li>Implement proper input validation and sanitization techniques to prevent SQL injection vulnerabilities in CTMS and other web applications.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sqli</category><category>cve-2026-7489</category><category>web-application</category></item><item><title>PixelYourSite Pro WordPress Plugin SSRF Vulnerability (CVE-2026-7049)</title><link>https://feed.craftedsignal.io/briefs/2026-05-pys-ssrf/</link><pubDate>Sat, 02 May 2026 06:16:04 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-pys-ssrf/</guid><description>The PixelYourSite Pro WordPress plugin is vulnerable to server-side request forgery (SSRF), allowing unauthenticated attackers to make arbitrary web requests from the server, potentially querying or modifying internal services.</description><content:encoded><![CDATA[<p>CVE-2026-7049 is a server-side request forgery (SSRF) vulnerability found in the PixelYourSite Pro WordPress plugin. Specifically, all versions up to and including 12.5.0.1 are affected. This vulnerability allows unauthenticated attackers to send requests to arbitrary internal or external resources, as viewed from the web server. Although the fetched response bodies are not directly returned to the attacker (making it a blind SSRF), the application parses these responses internally, creating opportunities for reconnaissance and potentially for exploiting vulnerable internal services. Successful exploitation could expose sensitive information or allow unauthorized modification of internal systems.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies the <code>scan_video</code> parameter as an SSRF entry point.</li>
<li>The attacker crafts a malicious HTTP request targeting the WordPress server with the vulnerable PixelYourSite Pro plugin. The request includes the <code>scan_video</code> parameter set to a URL pointing to an internal resource (e.g., internal IP address or hostname).</li>
<li>The WordPress server receives the malicious request.</li>
<li>The PixelYourSite Pro plugin processes the request and initiates an HTTP request to the URL specified in the <code>scan_video</code> parameter.</li>
<li>The WordPress server makes a request to the internal resource.</li>
<li>The response from the internal resource is received by the WordPress server.</li>
<li>The PixelYourSite Pro plugin parses the response body, potentially revealing information about the internal service.</li>
<li>Depending on the targeted internal service and the attacker&rsquo;s crafted request, the attacker might be able to modify information or execute commands on the internal service, even though the response is not directly returned to the attacker.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7049 allows an unauthenticated attacker to perform reconnaissance of internal network resources. The blind nature of the SSRF limits the attacker&rsquo;s immediate visibility into the response, but internal parsing of the response allows for potential information disclosure and exploitation of vulnerable internal services. The scope of the impact depends heavily on the configuration of the internal network and the services exposed.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the PixelYourSite Pro plugin to a version greater than 12.5.0.1 to patch CVE-2026-7049.</li>
<li>Deploy the Sigma rule <code>Detect Suspicious PixelYourSite Pro SSRF Attempts</code> to monitor for exploitation attempts targeting the <code>scan_video</code> parameter.</li>
<li>Review and restrict internal network access to sensitive services to mitigate the potential impact of SSRF vulnerabilities.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>ssrf</category><category>wordpress</category><category>plugin</category></item><item><title>WP Mail Gateway Plugin Vulnerability Leads to Privilege Escalation</title><link>https://feed.craftedsignal.io/briefs/2026-05-wp-mail-gateway-privesc/</link><pubDate>Sat, 02 May 2026 05:16:01 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-wp-mail-gateway-privesc/</guid><description>The WP Mail Gateway plugin for WordPress is vulnerable to unauthorized access due to a missing capability check, allowing authenticated attackers to modify SMTP settings and escalate privileges.</description><content:encoded><![CDATA[<p>The WP Mail Gateway plugin, a WordPress extension, contains a vulnerability (CVE-2026-6963) that allows authenticated users with minimal privileges (Subscriber level or higher) to gain administrative access. The flaw resides in the <code>wmg_save_provider_config</code> AJAX action, which lacks proper authorization checks. This omission enables attackers to manipulate SMTP settings, redirect outgoing emails, and ultimately trigger password reset emails intended for administrators. The vulnerability affects all versions of the WP Mail Gateway plugin up to and including version 1.8. Successful exploitation grants attackers complete control over the WordPress site, making it a critical security concern for any organization using the vulnerable plugin.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker logs into a WordPress site with a Subscriber-level account or higher.</li>
<li>The attacker crafts a malicious AJAX request targeting the <code>wmg_save_provider_config</code> action.</li>
<li>This request modifies the SMTP settings, redirecting outgoing emails to an attacker-controlled server.</li>
<li>The attacker initiates a password reset request for an administrator account.</li>
<li>The password reset email is intercepted by the attacker&rsquo;s server.</li>
<li>The attacker uses the password reset link to gain access to the administrator&rsquo;s account.</li>
<li>The attacker logs into the WordPress dashboard with administrator privileges.</li>
<li>The attacker can now perform any administrative action, including installing malicious plugins, modifying site content, or creating new administrator accounts.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-6963 allows an attacker to completely compromise a WordPress website.  Even low-privileged users can elevate their access to administrator, giving them full control over the site.  This can lead to data breaches, website defacement, malware deployment, and other malicious activities. The vulnerability affects all installations of the WP Mail Gateway plugin up to version 1.8, potentially impacting thousands of WordPress sites.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the WP Mail Gateway plugin to a version beyond 1.8 to patch CVE-2026-6963.</li>
<li>Monitor WordPress logs for suspicious AJAX requests targeting the <code>wmg_save_provider_config</code> action using the Sigma rule provided below. Enable webserver logging to capture HTTP POST requests.</li>
<li>Implement the provided Sigma rule to detect modifications to WordPress options related to SMTP configuration. Enable relevant logging for registry modifications.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>wordpress</category><category>privilege-escalation</category><category>plugin-vulnerability</category></item><item><title>WordPress Import and Export Users Plugin Privilege Escalation Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-wordpress-privesc/</link><pubDate>Sat, 02 May 2026 05:16:01 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-wordpress-privesc/</guid><description>A privilege escalation vulnerability exists in the Import and export users and customers plugin for WordPress (versions &lt;= 2.0.8) due to an incomplete blocklist allowing authenticated users to gain administrator privileges on subsites within a Multisite network.</description><content:encoded><![CDATA[<p>The Import and export users and customers plugin for WordPress, a plugin used to manage user data, is vulnerable to privilege escalation. This vulnerability, identified as CVE-2026-7641, affects all versions of the plugin up to and including 2.0.8. The vulnerability stems from an incomplete blocklist in the <code>save_extra_user_profile_fields()</code> function. This function fails to adequately filter meta keys for subsites within a WordPress Multisite network, allowing attackers to manipulate user roles. Successful exploitation allows authenticated attackers with Subscriber-level access or higher to escalate their privileges to Administrator on any subsite within the Multisite network. Exploitation requires the targeted WordPress instance to be part of a Multisite network and have specific settings enabled.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An administrator imports a CSV file containing multisite-prefixed capability column headers (e.g., <code>wp_2_capabilities</code>) using the affected plugin.</li>
<li>The administrator enables the &ldquo;Show fields in profile?&rdquo; option within the plugin settings. This action stores the imported column headers (including the multisite capabilities) in the <code>acui_columns</code> option.</li>
<li>A low-privileged user (e.g., Subscriber) authenticates to the WordPress subsite.</li>
<li>The attacker navigates to their user profile page (<code>/wp-admin/profile.php</code>). The plugin displays the previously imported multisite capability fields as editable options on the profile page.</li>
<li>The attacker crafts a profile update request, setting the value of the <code>wp_{subsite_id}_capabilities</code> meta key to <code>a:1:{s:13:&quot;administrator&quot;;b:1;}</code> which grants administrator privileges.</li>
<li>The attacker submits the crafted profile update to <code>/wp-admin/profile.php</code>.</li>
<li>The <code>save_extra_user_profile_fields()</code> function processes the update. Due to the incomplete blocklist, the function fails to prevent the modification of the <code>wp_{subsite_id}_capabilities</code> meta key.</li>
<li>The <code>update_user_meta()</code> function writes the attacker-controlled value directly to the user&rsquo;s metadata, granting them Administrator privileges on the specified subsite.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7641 allows an attacker to gain complete control over a WordPress subsite within a Multisite network. This can lead to unauthorized access to sensitive data, modification of website content, installation of malicious plugins or themes, and potential compromise of the entire Multisite network. Given the widespread use of WordPress and the Import and export users and customers plugin, a successful attack can have significant repercussions for affected organizations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the Import and export users and customers plugin to the latest version to patch CVE-2026-7641.</li>
<li>Apply the Sigma rule <code>WordPress Multisite Privilege Escalation via Profile Update</code> to detect exploitation attempts against <code>/wp-admin/profile.php</code>.</li>
<li>Review the <code>acui_columns</code> option in the WordPress database to identify any instances where multisite-prefixed capability column headers have been imported, and remove those fields.</li>
<li>Monitor WordPress user profile updates for unusual modifications to user capabilities using the <code>WordPress User Role Change Detection</code> rule.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>privilege-escalation</category><category>wordpress</category><category>cloud</category></item><item><title>Increased npm Supply Chain Attacks Targeting SAP Developers</title><link>https://feed.craftedsignal.io/briefs/2026-05-npm-supply-chain/</link><pubDate>Sat, 02 May 2026 00:10:33 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-npm-supply-chain/</guid><description>Threat actors are compromising npm packages, including those targeting SAP developers, to steal credentials, embed themselves in CI/CD pipelines, and deploy multi-stage payloads using techniques like wormable propagation and covert C2 channels on GitHub.</description><content:encoded><![CDATA[<p>The npm ecosystem is experiencing a surge in sophisticated supply chain attacks following the Shai-Hulud worm in September 2025. Attackers, including TeamPCP, are actively compromising npm packages to gain access to sensitive information and establish persistence within CI/CD pipelines. The attacks have evolved to include wormable propagation, infrastructure-level persistence, and multi-stage payloads designed to evade detection. In April 2026, two campaigns were observed: one included the string &ldquo;Shai-Hulud: The Third Coming,&rdquo; and the other, dubbed &ldquo;Mini Shai-Hulud,&rdquo; targeted the SAP developer ecosystem. The compromised packages are often part of SAP&rsquo;s Cloud Application Programming (CAP) Model and multitarget application (MTA) build toolchain, increasing the likelihood of impacting enterprise developers and CI/CD pipelines with access to cloud credentials and GitHub tokens.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial Compromise: Attackers compromise legitimate npm packages, such as @cap-js/sqlite, @cap-js/postgres, @cap-js/db-service, and mbt, by injecting malicious code.</li>
<li>Malicious Code Injection: Compromised packages receive two new files: setup.mjs and execution.js, along with a modified package.json containing a &ldquo;preinstall&rdquo; hook.</li>
<li>Execution of setup.mjs: During the <code>npm install</code> process, the preinstall hook executes setup.mjs, which detects the host OS and architecture.</li>
<li>Bun Runtime Download and Execution: setup.mjs downloads the Bun JavaScript runtime (v1.3.13) from GitHub releases and extracts it to a temporary directory.</li>
<li>Execution of execution.js: The Bun runtime executes execution.js, a large (11.7 MB) obfuscated credential stealer and propagation framework.</li>
<li>Credential Harvesting: execution.js harvests GitHub tokens, npm tokens, environment variables, GitHub Actions secrets, AWS STS identity, Azure Key Vault secrets, GCP Secret Manager values, and Kubernetes service account tokens. It also targets Claude and MCP configuration files and Electrum wallets.</li>
<li>Data Exfiltration: The collected data is compressed, encrypted, and exfiltrated to freshly created public GitHub repositories with randomized names and descriptions.</li>
<li>Propagation: The malware searches for commits containing the keyword &ldquo;OhNoWhatsGoingOnWithGitHub,&rdquo; decodes matching commit messages as a token dead-drop, recovers stolen GitHub tokens, and uses them to spread the malware to other packages.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Compromised npm packages can lead to the theft of sensitive credentials, including cloud provider credentials, GitHub tokens, and CI/CD secrets. Successful attacks can result in unauthorized access to cloud infrastructure, code repositories, and deployment pipelines. The Mini Shai-Hulud campaign targeted packages with approximately 570,000 weekly downloads, potentially impacting a large number of SAP developers and enterprise environments. The attackers use stolen credentials to further propagate the malware, increasing the scale and scope of the compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Rotate npm tokens and GitHub Personal Access Tokens (PATs) immediately if any affected packages were installed (refer to the list of affected packages in the IOC table).</li>
<li>Monitor npm install processes for unexpected execution of <code>node setup.mjs</code> (see Attack Chain).</li>
<li>Implement the Sigma rule &ldquo;Detect Suspicious Bun Process Execution&rdquo; to identify potential execution of the Bun runtime from temporary directories.</li>
<li>Monitor network connections for unusual processes connecting to <code>api.github[.]com/search/commits?q=OhNoWhatsGoingOnWithGitHub</code> (see IOCs) to detect potential C2 activity.</li>
<li>Deploy the Sigma rule &ldquo;Detect Github Commit By Claude Email&rdquo; to identify commits authored with the email <code>claude@users.noreply.github.com</code> to detect malicious commits.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>npm</category><category>supply-chain</category><category>credential-theft</category><category>github</category></item><item><title>Expanding Detection Beyond Endpoints to Counter Evolving Threats</title><link>https://feed.craftedsignal.io/briefs/2026-06-detection-beyond-endpoint/</link><pubDate>Fri, 01 May 2026 23:13:22 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-06-detection-beyond-endpoint/</guid><description>Threat actors are rapidly exfiltrating data by exploiting blind spots created by an over-reliance on endpoint data, necessitating a comprehensive security approach that incorporates cloud, identity, and network telemetry for effective threat detection and response.</description><content:encoded><![CDATA[<p>The 2026 Unit 42 Global Incident Response Report highlights that threat actors are moving 4x faster to exfiltration than in 2025, exploiting blind spots due to an over-reliance on endpoint data. The proliferation of cloud services, microservices, and remote users has expanded the attack surface beyond what any single tool can monitor. Unit 42 found that in 75% of incidents, critical evidence was present in logs but wasn&rsquo;t accessible or operationalized, allowing attackers to exploit the gaps. Organizations need to evolve their SOCs to ingest and correlate telemetry across their entire IT landscape, including IAM, cloud assets, OT/IoT, and AI workloads. Unit 42 recommends a single-pane-of-glass strategy powered by an AI-driven SOC platform like Cortex XSIAM to combat these threats.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access via Cloud Misconfiguration:</strong> The attacker gains initial access through a misconfigured cloud service access key.</li>
<li><strong>Cloud Console Manipulation:</strong> The attacker manipulates the cloud console to hide their tracks from endpoint detection.</li>
<li><strong>Pivot to Cloud-Hosted Server:</strong> From the cloud console, the attacker pivots to a cloud-hosted server to begin discovery.</li>
<li><strong>Credential Theft (Covert C2):</strong> The attacker utilizes DNS tunneling to a cloud storage location for C2 communication and steals credentials to use legitimate applications.</li>
<li><strong>Lateral Movement:</strong> The attacker moves laterally using the stolen credentials, triggering impossible travel alerts across SaaS apps.</li>
<li><strong>Rogue Asset Introduction:</strong> The attacker introduces a rogue device into the network, bypassing traditional endpoint security measures.</li>
<li><strong>Persistence:</strong> The attacker maintains persistence through the rogue device, using it for covert movement and access.</li>
<li><strong>Data Exfiltration:</strong> The attacker exfiltrates sensitive data, taking advantage of the gaps in security visibility.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Organizations are increasingly vulnerable to rapid data exfiltration due to the expanded attack surface and reliance on endpoint-centric security. The inability to correlate telemetry across diverse IT zones allows attackers to operate undetected, leading to significant data breaches, financial losses, and reputational damage. Unit 42&rsquo;s research shows that attackers are moving 4x faster to exfiltration, exacerbating the impact of successful intrusions. The attacks target cloud environments, identity systems, and networks, creating a complex threat landscape for security teams to navigate.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Ingest and correlate telemetry from all IT zones (IAM, cloud, OT/IoT, AI workloads) into a single repository, as described in the overview, to eliminate data silos and gain holistic visibility.</li>
<li>Implement User and Entity Behavior Analytics (UEBA) as mentioned in the overview, to detect anomalous behavior indicative of compromised credentials by using a centralized workbench.</li>
<li>Deploy Cortex XSIAM, as discussed in the overview, to leverage AI-driven alert stitching, ML-based incident scoring, and UEBA for automated detection, investigation, and response.</li>
<li>Implement continuous network monitoring and external attack surface management to detect and manage rogue assets, as highlighted in the attack chain.</li>
<li>Evaluate your current visibility through a formal assessment as recommended in the conclusion, to identify gaps in security coverage.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cloud-security</category><category>iam</category><category>incident-response</category><category>threat-detection</category></item><item><title>GenAI Tools Accessing Sensitive Files for Credential Access and Persistence</title><link>https://feed.craftedsignal.io/briefs/2024-12-15-genai-sensitive-file-access/</link><pubDate>Fri, 01 May 2026 22:46:51 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-12-15-genai-sensitive-file-access/</guid><description>This threat brief details the detection of GenAI tools accessing sensitive files containing credentials, SSH keys, browser data, and shell configurations, indicating potential credential harvesting and persistence attempts by attackers leveraging GenAI agents.</description><content:encoded><![CDATA[<p>Attackers are increasingly leveraging GenAI agents to automate the discovery and exfiltration of sensitive information, including credentials, API keys, and tokens stored within files on compromised systems. The observed activity involves GenAI tools accessing critical files such as cloud credentials, SSH keys, browser password databases, and shell configuration files. Successful exploitation allows attackers to harvest credentials, gain unauthorized access to systems, and establish persistence mechanisms for continued access. The GenAI tools mentioned include ollama, textgen, lmstudio, claude, cursor, copilot, codex, jan, gpt4all, gemini-cli, genaiscript, grok, qwen, koboldcpp, llama-server, windsurf, zed, opencode, and goose. This activity highlights the emerging threat landscape of AI-assisted attacks and the need for robust detection and mitigation strategies.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial compromise of a system through an unrelated vulnerability or social engineering.</li>
<li>Installation or execution of a GenAI tool (e.g., ollama, lmstudio) on the compromised system.</li>
<li>The GenAI tool is configured or instructed to scan the file system for sensitive files.</li>
<li>The GenAI tool accesses files containing credentials, such as <code>.aws/credentials</code>, browser password databases (<code>Login Data</code>, <code>key3.db</code>), or SSH keys (<code>.ssh/id_*</code>).</li>
<li>The GenAI tool exfiltrates the harvested credentials and API keys to a remote server controlled by the attacker.</li>
<li>The attacker uses the stolen credentials to gain unauthorized access to cloud resources, internal systems, or other sensitive accounts.</li>
<li>The GenAI tool attempts to modify shell configuration files (e.g., <code>.bashrc</code>, <code>.zshrc</code>) to establish persistence.</li>
<li>Upon system restart or user login, the modified shell configuration executes malicious commands, granting the attacker persistent access.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this threat can lead to significant data breaches, unauthorized access to critical systems, and persistent compromise of affected environments. Attackers can leverage stolen credentials to escalate privileges, move laterally within the network, and exfiltrate sensitive data. The number of victims and sectors targeted are currently unknown, but the potential impact is widespread given the increasing adoption of GenAI tools in various industries. Credential theft leads to financial loss, intellectual property theft, and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;GenAI Process Accessing Sensitive Files&rdquo; to your SIEM to detect GenAI tools accessing sensitive files on endpoints.</li>
<li>Enable file access monitoring on systems where GenAI tools are used to capture access events for analysis.</li>
<li>Review and restrict the use of GenAI tools within the environment, especially concerning access to sensitive file paths.</li>
<li>Monitor for modifications to shell configuration files (e.g., <code>.bashrc</code>, <code>.zshrc</code>, <code>.profile</code>) as an indicator of persistence attempts.</li>
<li>Implement regular credential rotation policies to minimize the impact of stolen credentials.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>genai</category><category>credential-access</category><category>persistence</category><category>collection</category></item><item><title>Sunwood-ai-labs command-executor-mcp-server OS Command Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-sunwood-command-injection/</link><pubDate>Fri, 01 May 2026 21:16:17 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-sunwood-command-injection/</guid><description>CVE-2026-7593 is an OS command injection vulnerability in Sunwood-ai-labs command-executor-mcp-server up to version 0.1.0, allowing remote attackers to execute arbitrary commands via the execute_command function in src/index.ts.</description><content:encoded><![CDATA[<p>A critical security vulnerability, identified as CVE-2026-7593, affects Sunwood-ai-labs command-executor-mcp-server versions up to 0.1.0. This vulnerability resides within the <code>execute_command</code> function of the <code>src/index.ts</code> file, a component of the MCP Interface. Successful exploitation allows a remote attacker to inject and execute arbitrary operating system commands on the server. The vulnerability has been publicly disclosed, making it a high-risk issue for systems running the affected software. The vendor was notified through an issue report but has not yet responded, potentially increasing the window of opportunity for attackers. Defenders should prioritize patching or mitigating this vulnerability to prevent unauthorized command execution and potential system compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable instance of Sunwood-ai-labs command-executor-mcp-server running version 0.1.0 or earlier.</li>
<li>The attacker crafts a malicious request targeting the <code>execute_command</code> function within the MCP Interface.</li>
<li>The malicious request includes an OS command injection payload.</li>
<li>The <code>execute_command</code> function in <code>src/index.ts</code> fails to properly sanitize or neutralize the input, passing it directly to the operating system.</li>
<li>The operating system executes the attacker-supplied command with the privileges of the server process.</li>
<li>The attacker gains arbitrary code execution on the server.</li>
<li>The attacker can then use this access to perform further actions such as escalating privileges, installing malware, or exfiltrating sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7593 allows an attacker to execute arbitrary commands on the affected server. This could lead to complete system compromise, including data theft, service disruption, or the deployment of malicious software. Given the ease of exploitation and the public availability of exploit code, organizations using the vulnerable Sunwood-ai-labs command-executor-mcp-server are at significant risk. While the exact number of affected installations is unknown, the potential impact is severe due to the possibility of full remote control over the compromised server.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply any available patches or updates from Sunwood-ai-labs to address CVE-2026-7593.</li>
<li>Implement input validation and sanitization measures within the <code>execute_command</code> function to prevent OS command injection.</li>
<li>Deploy the Sigma rule <code>Detect Suspicious Command Execution via MCP Server</code> to identify potential exploitation attempts (see below).</li>
<li>Monitor network traffic for suspicious requests targeting the MCP Interface, specifically those containing command injection payloads.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-7593</category><category>command-injection</category><category>webserver</category></item><item><title>Flux159 mcp-game-asset-gen Path Traversal Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-mcp-game-asset-gen-path-traversal/</link><pubDate>Fri, 01 May 2026 21:16:17 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-mcp-game-asset-gen-path-traversal/</guid><description>A path traversal vulnerability exists in Flux159 mcp-game-asset-gen version 0.1.0, where manipulation of the `statusFile` argument in the `image_to_3d_async` function allows for remote exploitation.</description><content:encoded><![CDATA[<p>A path traversal vulnerability, identified as CVE-2026-7594, has been discovered in Flux159 mcp-game-asset-gen version 0.1.0. The vulnerability resides within the <code>image_to_3d_async</code> function located in the <code>src/index.ts</code> file of the MCP Interface component. Successful exploitation allows a remote attacker to manipulate the <code>statusFile</code> argument, potentially leading to unauthorized file access and modification. Public exploits are available, increasing the risk of widespread exploitation. The project maintainers were notified via an issue report, but have not yet addressed the vulnerability. This lack of response, coupled with the existence of public exploits, elevates the urgency for defenders.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable instance of mcp-game-asset-gen 0.1.0 running on a remote server.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>image_to_3d_async</code> function.</li>
<li>Within the request, the attacker manipulates the <code>statusFile</code> argument to include path traversal sequences (e.g., &ldquo;../&rdquo;).</li>
<li>The server-side application processes the request, using the attacker-controlled <code>statusFile</code> value to construct a file path.</li>
<li>Due to insufficient input validation, the path traversal sequences are not properly sanitized.</li>
<li>The application attempts to read or write to a file outside the intended directory, based on the manipulated path.</li>
<li>If successful, the attacker gains unauthorized access to sensitive files or overwrites critical system files.</li>
<li>The attacker leverages the file access to further compromise the system, potentially leading to code execution or data exfiltration.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this path traversal vulnerability could allow attackers to read sensitive files, overwrite critical system files, or even achieve remote code execution on the affected server. This could lead to data breaches, system instability, or complete server compromise. Given the availability of public exploits, organizations using mcp-game-asset-gen 0.1.0 are at immediate risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply input validation and sanitization to the <code>statusFile</code> argument within the <code>image_to_3d_async</code> function to prevent path traversal, addressing CVE-2026-7594.</li>
<li>Monitor web server logs for suspicious requests containing path traversal sequences (e.g., &ldquo;../&rdquo;) in the <code>statusFile</code> parameter using the provided Sigma rule.</li>
<li>Implement the Sigma rule targeting process creation events related to the exploitation of CVE-2026-7594.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>path-traversal</category><category>vulnerability</category><category>web-application</category></item><item><title>AWS IAM Privilege Operations via Lambda Execution Role</title><link>https://feed.craftedsignal.io/briefs/2024-01-09-aws-lambda-iam-privilege-escalation/</link><pubDate>Fri, 01 May 2026 20:57:28 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-09-aws-lambda-iam-privilege-escalation/</guid><description>Detection of IAM API calls that create or empower IAM users and roles, attach policies, or configure instance profiles when the caller is an assumed role session associated with AWS Lambda, potentially indicating privilege escalation or persistence.</description><content:encoded><![CDATA[<p>This threat focuses on the abuse of AWS Lambda execution roles to perform sensitive IAM operations. Lambda functions, often running with over-permissioned roles, can be exploited by adversaries to escalate privileges and establish persistence within an AWS environment. An attacker gaining control of a Lambda function can leverage its execution role to make IAM API calls that would normally require elevated permissions. This includes creating new IAM users or roles, attaching policies to existing IAM entities, and modifying EC2 instance profiles. The scope of this threat includes any AWS environment utilizing Lambda functions with IAM permissions.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains unauthorized access to a Lambda function, either through code injection, vulnerable dependencies, or misconfiguration.</li>
<li>The attacker leverages the Lambda function&rsquo;s execution role, which has excessive IAM permissions.</li>
<li>The attacker executes IAM API calls, such as <code>CreateUser</code>, <code>CreateRole</code>, or <code>CreateAccessKey</code>, to create new IAM identities.</li>
<li>The attacker uses <code>AttachUserPolicy</code>, <code>PutUserPolicy</code>, <code>AttachRolePolicy</code>, or <code>PutRolePolicy</code> to grant elevated permissions to the newly created or existing IAM identities.</li>
<li>The attacker modifies instance profiles using <code>CreateInstanceProfile</code> and <code>AddRoleToInstanceProfile</code> to prepare EC2 instances for lateral movement.</li>
<li>The attacker uses the newly created or modified IAM identities to assume roles and access resources they were not previously authorized to access via <code>sts:AssumeRole</code>.</li>
<li>The attacker achieves privilege escalation, gaining control over sensitive AWS resources and services.</li>
<li>The attacker establishes persistence by creating rogue IAM users, roles, or access keys.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack can lead to full compromise of the AWS environment. An attacker could create highly privileged IAM users and roles, granting them the ability to access and control all AWS resources. This can result in data breaches, service disruptions, and financial losses. The impact is magnified in environments where Lambda functions are heavily relied upon for critical business operations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;AWS IAM Sensitive Operations via Lambda Execution Role&rdquo; to your SIEM and tune for your environment to detect the described IAM API calls originating from Lambda execution roles.</li>
<li>Review and restrict the permissions granted to Lambda execution roles, following the principle of least privilege, to minimize the potential impact of a compromised function.</li>
<li>Monitor <code>aws.cloudtrail.user_identity.arn</code> to identify the Lambda function and associated deployment path responsible for the IAM API calls.</li>
<li>Investigate <code>aws.cloudtrail.request_parameters</code> for targets such as <code>userName</code>, <code>groupName</code>, <code>roleName</code>, <code>policyArn</code>, or <code>instanceProfileName</code> to understand the scope of the IAM operations.</li>
<li>Revoke or rotate the credentials of any compromised Lambda execution roles to prevent further unauthorized access.</li>
<li>Remediate any rogue IAM users, roles, or access keys created by the attacker to eliminate persistence mechanisms.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>aws</category><category>iam</category><category>lambda</category><category>privilege-escalation</category><category>persistence</category></item><item><title>SQL Injection Vulnerability in itsourcecode Courier Management System</title><link>https://feed.craftedsignal.io/briefs/2026-05-courier-mgmt-sqli/</link><pubDate>Fri, 01 May 2026 20:16:24 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-courier-mgmt-sqli/</guid><description>itsourcecode Courier Management System 1.0 is vulnerable to SQL Injection via the ID parameter in /edit_staff.php, potentially allowing remote attackers to execute arbitrary SQL commands.</description><content:encoded><![CDATA[<p>itsourcecode Courier Management System 1.0 is vulnerable to a SQL injection vulnerability. The vulnerability resides in the <code>/edit_staff.php</code> file and can be exploited by manipulating the <code>ID</code> argument. This allows a remote attacker to inject malicious SQL queries, potentially leading to unauthorized data access, modification, or deletion. The exploit is publicly available, increasing the risk of exploitation. The vulnerability was reported on May 1, 2026, and affects version 1.0 of the Courier Management System.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies the <code>/edit_staff.php</code> endpoint in the Courier Management System 1.0.</li>
<li>The attacker crafts a malicious SQL injection payload within the <code>ID</code> parameter of a HTTP GET or POST request.</li>
<li>The attacker sends the crafted request to the <code>/edit_staff.php</code> endpoint.</li>
<li>The application fails to properly sanitize the <code>ID</code> parameter, allowing the SQL injection payload to be processed by the database.</li>
<li>The injected SQL query is executed against the database, potentially allowing the attacker to bypass authentication or authorization controls.</li>
<li>The attacker retrieves sensitive information from the database, such as user credentials, financial records, or other confidential data.</li>
<li>The attacker modifies data in the database, potentially altering application behavior or causing data corruption.</li>
<li>The attacker gains full control of the database server.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability could allow attackers to read, modify, or delete sensitive data within the Courier Management System database. This could lead to unauthorized access to customer information, financial data, and other confidential records. Given the public availability of the exploit, organizations using Courier Management System 1.0 are at a high risk of compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply input validation and sanitization to the <code>ID</code> parameter in <code>/edit_staff.php</code> to prevent SQL injection (CVE-2026-7592).</li>
<li>Deploy the provided Sigma rule to detect potential SQL injection attempts targeting the <code>/edit_staff.php</code> endpoint.</li>
<li>Implement a web application firewall (WAF) rule to block known SQL injection payloads (CVE-2026-7592).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>web-application</category><category>cve</category></item><item><title>Potential Kerberos SPN Spoofing via Suspicious DNS Query</title><link>https://feed.craftedsignal.io/briefs/2024-10-kerberos-spn-spoofing-dns/</link><pubDate>Fri, 01 May 2026 17:31:25 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-10-kerberos-spn-spoofing-dns/</guid><description>Detects suspicious DNS queries containing a base64-encoded blob, indicating potential Kerberos coercion attacks and SPN spoofing via DNS to coerce authentication to attacker-controlled hosts, enabling Kerberos or NTLM relay attacks.</description><content:encoded><![CDATA[<p>This detection identifies a specific pattern in DNS queries indicative of Kerberos SPN spoofing, a technique used to coerce systems into authenticating to attacker-controlled hosts. The pattern &ldquo;UWhRCA&hellip;BAAAA&rdquo; represents a marshaled CREDENTIAL_TARGET_INFORMATION structure. Attackers exploit this by crafting malicious DNS names to trick victim systems into requesting Kerberos tickets for legitimate services, often their own identity, but directed towards an attacker-controlled endpoint. This can lead to Kerberos relay or NTLM reflection/relay attacks, bypassing normal NTLM fallback mechanisms. The technique is associated with tools like RemoteKrbRelay and wspcoerce. This activity has been observed in various attacks targeting Windows environments where Kerberos authentication is prevalent. Defenders need to detect and mitigate this early stage of credential access.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a target Windows system within the network.</li>
<li>The attacker sets up a malicious server to receive coerced authentication requests.</li>
<li>The attacker crafts a malicious DNS query containing a base64-encoded blob &ldquo;UWhRCA&hellip;BAAAA&rdquo; representing a marshaled CREDENTIAL_TARGET_INFORMATION structure.</li>
<li>The victim system, triggered by an external factor (e.g., RPC call, scheduled task, or web request), attempts to resolve the crafted DNS name.</li>
<li>The malicious DNS query is sent to the DNS server, which resolves to the attacker&rsquo;s server.</li>
<li>The victim system initiates a Kerberos authentication request to the attacker&rsquo;s server, believing it to be a legitimate service.</li>
<li>The attacker&rsquo;s server relays the Kerberos ticket or uses NTLM reflection/relay techniques to gain unauthorized access.</li>
<li>The attacker compromises the victim system or pivots to other systems within the network using the stolen credentials.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to credential compromise, lateral movement, and domain takeover. Victims in Active Directory environments are particularly vulnerable. The impact includes unauthorized access to sensitive data, disruption of services, and potential ransomware deployment. If the coerced service has high privileges, the attacker can gain complete control over the compromised system or even the entire domain. Organizations using Kerberos authentication are at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the &ldquo;Potential Kerberos SPN Spoofing via Suspicious DNS Query&rdquo; rule to your SIEM and tune for your environment to detect malicious DNS queries.</li>
<li>Enable Sysmon Event ID 22 - DNS Query logging to provide the necessary data for detection.</li>
<li>Investigate and block any DNS queries resolving to external IPs that contain the &ldquo;UWhRCA&hellip;BAAAA&rdquo; pattern.</li>
<li>Monitor process creation events for processes initiating DNS queries containing the suspicious pattern, specifically looking for known coercion tools.</li>
<li>Implement network segmentation to limit the impact of lateral movement if a system is compromised.</li>
<li>Review and harden Kerberos configurations to prevent SPN spoofing and relay attacks.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>credential-access</category><category>kerberos</category><category>spn-spoofing</category><category>dns</category><category>windows</category></item><item><title>WP Editor Plugin CSRF Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-wp-editor-csrf/</link><pubDate>Fri, 01 May 2026 12:16:16 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-wp-editor-csrf/</guid><description>The WP Editor plugin for WordPress is vulnerable to Cross-Site Request Forgery (CSRF) in versions up to 1.2.9.2, allowing unauthenticated attackers to overwrite arbitrary plugin and theme PHP files with malicious code by tricking a site administrator into clicking a link.</description><content:encoded><![CDATA[<p>The WP Editor plugin, a WordPress plugin, contains a Cross-Site Request Forgery (CSRF) vulnerability affecting versions up to and including 1.2.9.2. This vulnerability stems from a lack of nonce verification in the &lsquo;add_plugins_page&rsquo; and &lsquo;add_themes_page&rsquo; functions. An unauthenticated attacker can exploit this vulnerability by crafting a malicious request designed to overwrite arbitrary plugin and theme PHP files with attacker-controlled code. The success of this attack hinges on the attacker&rsquo;s ability to deceive a site administrator into triggering the forged request, typically by clicking a specially crafted link. This flaw allows for potential arbitrary code execution on the targeted WordPress site.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable WordPress site running a WP Editor plugin version &lt;= 1.2.9.2.</li>
<li>The attacker crafts a malicious HTTP request targeting the &lsquo;add_plugins_page&rsquo; or &lsquo;add_themes_page&rsquo; functions. This request includes parameters designed to overwrite a specific plugin or theme PHP file with attacker-supplied code.</li>
<li>The attacker social engineers a WordPress administrator into clicking a malicious link or visiting a compromised website containing the forged request. This could be achieved via phishing emails or other deceptive techniques.</li>
<li>If the administrator is logged into the WordPress dashboard, their browser automatically sends the forged request to the vulnerable WordPress site.</li>
<li>Due to the missing nonce verification, the WordPress site processes the request without validating its origin.</li>
<li>The target plugin or theme PHP file is overwritten with the attacker&rsquo;s malicious code.</li>
<li>The attacker&rsquo;s code is executed when the plugin or theme is loaded or accessed.</li>
<li>The attacker achieves arbitrary code execution on the WordPress server, potentially leading to complete site compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this CSRF vulnerability allows an unauthenticated attacker to inject arbitrary PHP code into a WordPress website. This can lead to a full compromise of the website, including data theft, defacement, or the installation of backdoors for persistent access. Given the widespread use of WordPress and the WP Editor plugin, a large number of websites are potentially at risk. Successful attacks can result in significant reputational damage and financial losses for affected website owners.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the WP Editor plugin to the latest available version, which includes a fix for CVE-2026-3772.</li>
<li>Implement strong CSRF protection measures on all WordPress forms and administrative functions.</li>
<li>Deploy the provided Sigma rule to detect attempts to exploit this vulnerability through suspicious requests to the <code>add_plugins_page</code> or <code>add_themes_page</code> endpoints.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>csrf</category><category>wordpress</category><category>plugin</category><category>vulnerability</category></item><item><title>Potential Root Effective Shell from Non-Standard Path via Auditd</title><link>https://feed.craftedsignal.io/briefs/2024-01-potential-root-effective-shell/</link><pubDate>Fri, 01 May 2026 09:51:29 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-potential-root-effective-shell/</guid><description>This rule identifies process execution events where the effective user is root while the real user is not, the process arguments include the privileged shell flag commonly associated with setuid-capable shells, and the executable path is outside standard system binary directories, indicating potential privilege escalation.</description><content:encoded><![CDATA[<p>This detection identifies potential privilege escalation attempts on Linux systems by monitoring for processes with a root effective user ID (EUID) but a non-root real user ID (RUID), combined with the use of the <code>-p</code> flag (commonly used to preserve privileges in shells like bash or dash) and execution from a non-standard path (outside of <code>/bin</code>, <code>/sbin</code>, <code>/usr/bin</code>, etc.).  Attackers may copy or link setuid-capable shells or similar helpers into writable locations to regain a root context after local exploitation. This behavior is often associated with post-exploitation activities where attackers attempt to maintain or regain elevated privileges.  The rule relies on Auditd data to provide visibility into process execution events and user context. The original rule was published on 2026-04-24 by Elastic.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial access to the system with limited privileges (e.g., through exploiting a vulnerability or using stolen credentials).</li>
<li>Attacker identifies a writable directory outside of standard system binary paths (e.g., <code>/tmp</code>, <code>/var/tmp</code>).</li>
<li>Attacker copies or creates a symbolic link to a setuid-capable shell (e.g., <code>/bin/bash</code>, <code>/bin/dash</code>) into the identified writable directory. This copied shell retains the setuid bit.</li>
<li>Attacker executes the copied or linked shell from the non-standard path with the <code>-p</code> flag (e.g., <code>/tmp/bash -p</code>). The <code>-p</code> flag instructs the shell to preserve privileges, effectively running with the effective user ID (EUID) of root.</li>
<li>Auditd logs this process execution event, capturing the non-standard path, the use of the <code>-p</code> flag, the root EUID, and the non-root RUID.</li>
<li>The detection rule identifies the process execution event based on the criteria outlined above.</li>
<li>Attacker now has a root shell and can perform administrative tasks, install malware, or further compromise the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful privilege escalation attack can grant an attacker complete control over the compromised system. This allows them to access sensitive data, install malicious software, modify system configurations, and potentially pivot to other systems on the network. This can lead to data breaches, system downtime, and significant financial losses.  The risk score for this type of activity is considered high due to the potential for significant impact.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Potential Root Effective Shell from Non-Standard Path via Auditd</code> to your SIEM and tune for your environment.</li>
<li>Ensure that Auditd Manager or Auditbeat is properly configured to collect process execution events with relevant fields (<code>event.action</code>, <code>user.id</code>, <code>user.effective.id</code>, <code>process.args</code>, and <code>process.executable</code>) as described in the rule setup to enable the rule to function correctly.</li>
<li>Investigate any alerts generated by this rule by inspecting <code>process.executable</code>, <code>process.args</code>, <code>process.parent</code>, and the full command line reconstructed in audit logs.</li>
<li>Regularly audit all setuid binaries on the filesystem to identify any unauthorized or malicious setuid executables.</li>
<li>Implement access controls and file integrity monitoring to prevent unauthorized modification of system binaries and writable directories.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>privilege-escalation</category><category>linux</category><category>auditd</category></item><item><title>Malware Distribution via Hugging Face and ClawHub</title><link>https://feed.craftedsignal.io/briefs/2026-05-huggingface-clawhub-malware/</link><pubDate>Fri, 01 May 2026 08:41:57 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-huggingface-clawhub-malware/</guid><description>Threat actors are using social engineering to distribute malware via AI distribution platforms such as Hugging Face and ClawHub by tricking users into downloading malicious files, which leads to malware infections on Windows, macOS, Linux, and Android systems.</description><content:encoded><![CDATA[<p>Threat actors are leveraging AI distribution platforms like Hugging Face and ClawHub to distribute malware. This involves social engineering tactics to deceive users into downloading files that contain malicious code. Instead of directly compromising AI agents, the attackers abuse user trust by injecting indirect prompts into resources that the AI accesses. Acronis reported that on ClawHub, nearly 600 malicious skills across 13 developer accounts were identified distributing trojans, cryptominers, and information stealers targeting both Windows and macOS. On Hugging Face, attackers created repositories hosting malicious files designed to stage multi-step infection chains leading to infostealers, trojans, malware loaders, and other types of malware targeting Windows, Linux, and Android. This tactic allows attackers to bypass traditional security measures and leverage the platforms&rsquo; reputation for trusted AI tooling.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker creates a malicious repository or skill on Hugging Face or ClawHub.</li>
<li>The repository or skill contains files that appear legitimate but include malicious code.</li>
<li>The attacker uses social engineering to entice users to download the files.</li>
<li>Upon execution, the malicious code fetches additional payloads from external sources.</li>
<li>For macOS, the payload can be Atomic macOS Stealer (AMOS) Stealer.</li>
<li>The downloaded payload executes commands to install hidden dependencies.</li>
<li>The malware establishes persistence on the victim&rsquo;s system.</li>
<li>The malware performs its intended malicious actions, such as stealing information or mining cryptocurrency.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful attacks can lead to the installation of various types of malware, including infostealers, trojans, cryptominers, and malware loaders. The targeted platforms include Windows, macOS, Linux, and Android, potentially impacting a wide range of users and systems. The abuse of trust in AI distribution platforms poses a significant risk, as users may be less likely to scrutinize files from these sources. Acronis identified close to 600 malicious skills on ClawHub alone, indicating the scale of this threat.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process creation events for execution of downloaded files from Hugging Face or ClawHub with unusual parent processes using the &ldquo;Detect Suspicious Process Execution from AI Platforms&rdquo; Sigma rule.</li>
<li>Implement network monitoring to detect connections to known malicious domains or IPs associated with malware distribution campaigns that originate from processes associated with AI platform tooling.</li>
<li>Educate users about the risks of downloading files from untrusted sources, even on trusted platforms like Hugging Face and ClawHub.</li>
<li>Regularly scan systems for known malware signatures and indicators of compromise associated with infostealers and trojans.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>malware</category><category>social-engineering</category><category>ai-platforms</category></item><item><title>SourceCodester Pharmacy Sales and Inventory System SQL Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-pharmacy-sqli/</link><pubDate>Fri, 01 May 2026 05:16:03 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-pharmacy-sqli/</guid><description>SourceCodester Pharmacy Sales and Inventory System 1.0 is vulnerable to remote SQL injection via the ID parameter in the /ajax.php?action=delete_customer endpoint, allowing attackers to potentially read, modify, or delete database information.</description><content:encoded><![CDATA[<p>On May 1, 2026, a SQL injection vulnerability, CVE-2026-7549, was disclosed in SourceCodester Pharmacy Sales and Inventory System version 1.0. The vulnerability resides in the <code>/ajax.php?action=delete_customer</code> endpoint, where the <code>ID</code> parameter is susceptible to manipulation, enabling remote attackers to inject arbitrary SQL commands. Publicly available exploit code exists, increasing the risk of exploitation. Successful exploitation can lead to unauthorized data access, modification, or deletion within the application&rsquo;s database. This vulnerability is particularly concerning due to the sensitive nature of pharmacy data, potentially impacting confidentiality, integrity, and availability.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies the vulnerable <code>/ajax.php?action=delete_customer</code> endpoint in SourceCodester Pharmacy Sales and Inventory System 1.0.</li>
<li>Attacker crafts a malicious HTTP request targeting the vulnerable endpoint.</li>
<li>The malicious request includes a manipulated <code>ID</code> parameter containing a SQL injection payload.</li>
<li>The application fails to properly sanitize the <code>ID</code> parameter before incorporating it into a SQL query.</li>
<li>The injected SQL code is executed against the application&rsquo;s database.</li>
<li>The attacker gains unauthorized access to sensitive data, such as customer information, prescription details, or inventory levels.</li>
<li>The attacker may modify or delete data within the database, potentially disrupting pharmacy operations or causing data integrity issues.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability (CVE-2026-7549) can lead to the complete compromise of the SourceCodester Pharmacy Sales and Inventory System database. Attackers could potentially exfiltrate sensitive patient data, modify prescription information, or disrupt pharmacy operations by deleting critical data. The vulnerability has a CVSS v3.1 score of 7.3 (HIGH), indicating a significant risk. The number of victims and specific sectors targeted remain unknown, but any pharmacy using the affected version is potentially at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply input validation and sanitization to all user-supplied input, especially the <code>ID</code> parameter in <code>/ajax.php?action=delete_customer</code>, to prevent SQL injection (CWE-89).</li>
<li>Deploy the Sigma rule &ldquo;Detect SQL Injection Attempts in Pharmacy Sales System&rdquo; to identify and block malicious requests targeting the vulnerable endpoint.</li>
<li>Upgrade to a patched version of SourceCodester Pharmacy Sales and Inventory System that addresses CVE-2026-7549 once available.</li>
<li>Monitor web server logs for suspicious activity, such as unusual requests to <code>/ajax.php?action=delete_customer</code>, to detect potential exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>web-application</category><category>vulnerability</category></item><item><title>SourceCodester Pharmacy Sales and Inventory System SQL Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-pharmacy-inventory-sql-injection/</link><pubDate>Fri, 01 May 2026 05:16:03 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-pharmacy-inventory-sql-injection/</guid><description>CVE-2026-7550 is an SQL injection vulnerability in SourceCodester Pharmacy Sales and Inventory System 1.0, allowing remote attackers to execute arbitrary SQL commands by manipulating the ID argument in the /ajax.php?action=save_customer endpoint.</description><content:encoded><![CDATA[<p>SourceCodester Pharmacy Sales and Inventory System 1.0 is vulnerable to SQL injection via the /ajax.php?action=save_customer endpoint. Disclosed on May 1, 2026, the vulnerability, identified as CVE-2026-7550, allows unauthenticated remote attackers to inject arbitrary SQL commands by manipulating the <code>ID</code> argument. The vulnerability exists due to insufficient input validation. Public exploit code is available, increasing the risk of exploitation. This vulnerability allows attackers to potentially read, modify, or delete sensitive data within the application&rsquo;s database.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies the vulnerable endpoint <code>/ajax.php?action=save_customer</code> within the Pharmacy Sales and Inventory System 1.0 application.</li>
<li>The attacker crafts a malicious HTTP GET or POST request targeting the <code>/ajax.php?action=save_customer</code> endpoint.</li>
<li>The crafted request includes a manipulated <code>ID</code> parameter designed to inject SQL commands.</li>
<li>The application fails to properly sanitize the input provided in the <code>ID</code> parameter.</li>
<li>The application executes the attacker-supplied SQL code against the database.</li>
<li>The attacker can retrieve sensitive information, such as customer details, product information, or administrative credentials.</li>
<li>The attacker may modify existing data, such as prices or inventory levels.</li>
<li>The attacker may gain complete control of the database, potentially leading to full system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability (CVE-2026-7550) can lead to unauthorized access to sensitive data, data modification, or complete database compromise. This could result in financial losses, reputational damage, and legal repercussions for affected organizations. Given the nature of the application, attackers could potentially access patient data or prescription information, leading to severe privacy breaches.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply input validation and sanitization to the <code>ID</code> parameter in the <code>/ajax.php?action=save_customer</code> endpoint to prevent SQL injection attacks.</li>
<li>Monitor web server logs for suspicious requests targeting the <code>/ajax.php?action=save_customer</code> endpoint with unusual <code>ID</code> parameter values. Deploy the provided Sigma rule to detect potential exploitation attempts.</li>
<li>Consider using a Web Application Firewall (WAF) to filter out malicious requests targeting this vulnerability.</li>
<li>Upgrade to a patched version of the SourceCodester Pharmacy Sales and Inventory System once available.</li>
<li>Implement regular database backups to mitigate potential data loss due to successful exploitation.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>web-application</category><category>cve-2026-7550</category></item><item><title>Chromium Use-After-Free Vulnerability in ANGLE (CVE-2026-7359)</title><link>https://feed.craftedsignal.io/briefs/2026-05-chromium-use-after-free/</link><pubDate>Fri, 01 May 2026 02:21:40 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-chromium-use-after-free/</guid><description>A use-after-free vulnerability in the ANGLE graphics engine within Chromium (CVE-2026-7359) allows for potential exploitation in Google Chrome and Microsoft Edge.</description><content:encoded><![CDATA[<p>CVE-2026-7359 describes a use-after-free vulnerability present in ANGLE (Almost Native Graphics Layer Engine), a crucial component of the Chromium open-source project. This vulnerability impacts applications that utilize the Chromium engine, most notably Google Chrome and Microsoft Edge. While the provided source does not give specific exploitation details, use-after-free vulnerabilities can allow for arbitrary code execution. Google Chrome has already addressed this vulnerability, and Microsoft Edge has incorporated the fix from Chromium. This vulnerability matters to defenders because successful exploitation could lead to compromise of the browser and potentially the underlying system.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious web page containing JavaScript code that leverages a flaw in ANGLE&rsquo;s memory management.</li>
<li>A user visits the malicious web page through Chrome or Edge.</li>
<li>The JavaScript code triggers the use-after-free vulnerability by freeing a memory object in ANGLE and then attempting to access it again.</li>
<li>This memory corruption leads to a controlled crash or allows the attacker to overwrite memory with arbitrary data.</li>
<li>The attacker leverages the memory overwrite to inject malicious code into the browser process.</li>
<li>The injected code executes within the context of the browser, granting the attacker access to user data, cookies, and other sensitive information.</li>
<li>The attacker may then use this access to perform actions on behalf of the user, such as stealing credentials, installing malware, or spreading the attack to other systems.</li>
<li>The attacker achieves arbitrary code execution on the user&rsquo;s system, potentially leading to full system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful exploit of CVE-2026-7359 could allow an attacker to execute arbitrary code within the context of the affected browser (Chrome or Edge). This can lead to sensitive information disclosure, data theft, and potentially full system compromise. The scope of impact is broad, affecting any user who visits a malicious webpage while using a vulnerable version of Chrome or Edge. Since Chrome and Edge are widely used, this vulnerability poses a significant risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect Suspicious WebGL Usage</code> to identify potential exploitation attempts targeting ANGLE via WebGL.</li>
<li>Monitor web server logs for suspicious requests (cs-uri-query) that may be related to the exploitation of CVE-2026-7359.</li>
<li>Ensure that all Chrome and Edge installations are updated to the latest versions to patch CVE-2026-7359.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>use-after-free</category><category>chromium</category><category>edge</category><category>chrome</category><category>cve-2026-7359</category></item><item><title>Chromium Use-After-Free Vulnerability in Media Component (CVE-2026-7355)</title><link>https://feed.craftedsignal.io/briefs/2026-05-chromium-uaf/</link><pubDate>Fri, 01 May 2026 02:21:27 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-chromium-uaf/</guid><description>CVE-2026-7355 is a use-after-free vulnerability in the Media component of Chromium, affecting Google Chrome and Microsoft Edge, potentially allowing for arbitrary code execution.</description><content:encoded><![CDATA[<p>CVE-2026-7355 is a critical use-after-free vulnerability residing in the Media component of the Chromium browser engine. This vulnerability affects Google Chrome and Microsoft Edge, as Edge incorporates Chromium. A use-after-free vulnerability occurs when an application attempts to use memory after it has been freed, which can lead to crashes, arbitrary code execution, or other unexpected behavior. Successful exploitation could allow an attacker to execute arbitrary code within the context of the browser. This vulnerability was reported and patched by the Chromium project.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious webpage containing specially crafted media content.</li>
<li>A user opens the malicious webpage in a vulnerable version of Chrome or Edge.</li>
<li>The browser attempts to process the malicious media content, triggering the use-after-free vulnerability in the Media component.</li>
<li>The vulnerable code attempts to access a freed memory region.</li>
<li>The attacker gains control of the memory region due to the use-after-free condition.</li>
<li>The attacker injects malicious code into the controlled memory region.</li>
<li>The browser executes the attacker-controlled code.</li>
<li>The attacker achieves arbitrary code execution within the context of the browser process, potentially leading to system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7355 can lead to arbitrary code execution within the context of the browser process. An attacker could potentially gain control of the user&rsquo;s system, steal sensitive information, or install malware. Given the widespread use of Chrome and Edge, a successful exploit could impact a large number of users across various sectors.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the latest security updates for Google Chrome and Microsoft Edge to patch CVE-2026-7355.</li>
<li>Deploy the Sigma rule &ldquo;Detect Chromium Use-After-Free in Media Component&rdquo; to identify potential exploitation attempts.</li>
<li>Enable process creation logging to capture events related to potential exploitation attempts, facilitating detection rule functionality.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>use-after-free</category><category>chromium</category><category>cve-2026-7355</category><category>browser</category></item><item><title>Chromium Use-After-Free Vulnerability in Cast (CVE-2026-7349)</title><link>https://feed.craftedsignal.io/briefs/2024-01-chrome-cve-2026-7349/</link><pubDate>Fri, 01 May 2026 02:21:27 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-chrome-cve-2026-7349/</guid><description>CVE-2026-7349 is a use-after-free vulnerability in the Cast component of Chromium, affecting Google Chrome and Microsoft Edge.</description><content:encoded><![CDATA[<p>CVE-2026-7349 is a use-after-free vulnerability found in the Cast component of the Chromium browser engine. This vulnerability affects Google Chrome and, by extension, Microsoft Edge, as Edge is built upon Chromium. Use-after-free vulnerabilities can allow an attacker to execute arbitrary code or cause a denial-of-service. While the original report comes from Chrome, the nature of Chromium&rsquo;s shared codebase means that other Chromium-based browsers are also vulnerable. Successful exploitation of this vulnerability could lead to code execution within the context of the browser process. Defenders need to prioritize patching and monitoring for unusual browser behavior.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious webpage designed to trigger the use-after-free vulnerability in the Cast component.</li>
<li>The user visits the malicious webpage using a vulnerable version of Chrome or Edge.</li>
<li>The Cast component attempts to access a freed memory location.</li>
<li>The attacker exploits the use-after-free condition to corrupt memory.</li>
<li>The attacker overwrites a function pointer or other critical data structure in memory.</li>
<li>The attacker triggers the execution of the corrupted function pointer or data structure.</li>
<li>The attacker gains arbitrary code execution within the context of the browser process.</li>
<li>The attacker could potentially escalate privileges or perform other malicious activities, such as installing malware or stealing sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7349 could allow an attacker to execute arbitrary code within the context of the browser, potentially leading to data theft, malware installation, or further system compromise. Given the widespread use of Chrome and Edge, this vulnerability has a significant impact. The specific number of potential victims is dependent on the speed of patching, but could potentially affect millions of users.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the latest security updates for Google Chrome and Microsoft Edge to patch CVE-2026-7349.</li>
<li>Deploy the Sigma rules provided in this brief to your SIEM to detect potential exploitation attempts.</li>
<li>Monitor browser process execution for unexpected code loading or memory access patterns using process creation logs.</li>
<li>Implement memory protection techniques such as Address Space Layout Randomization (ASLR) and Data Execution Prevention (DEP) to mitigate the impact of successful exploitation.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>use-after-free</category><category>browser</category><category>chromium</category></item><item><title>SourceCodester Advanced School Management System SQL Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-asms-sqli/</link><pubDate>Fri, 01 May 2026 02:16:49 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-asms-sqli/</guid><description>A SQL injection vulnerability (CVE-2026-7545) exists in SourceCodester Advanced School Management System 1.0 within the checkEmail endpoint of commonController.php, allowing remote attackers to potentially execute arbitrary SQL commands.</description><content:encoded><![CDATA[<p>SourceCodester Advanced School Management System version 1.0 is vulnerable to SQL injection in the <code>checkEmail</code> endpoint within the <code>commonController.php</code> file. This vulnerability, identified as CVE-2026-7545, allows a remote attacker to inject arbitrary SQL commands. Publicly available exploits targeting this vulnerability increase the risk of exploitation. Successful exploitation could lead to unauthorized data access, modification, or deletion within the application&rsquo;s database. Given the availability of public exploits, organizations using this software are at an elevated risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies the <code>checkEmail</code> endpoint in <code>commonController.php</code>.</li>
<li>The attacker crafts a malicious HTTP request to the <code>checkEmail</code> endpoint, injecting SQL code into the email parameter.</li>
<li>The vulnerable application fails to properly sanitize the email input.</li>
<li>The injected SQL code is passed directly to the database query.</li>
<li>The database executes the malicious SQL code.</li>
<li>The attacker gains unauthorized access to the database.</li>
<li>The attacker may then read sensitive data, modify existing data, or insert new malicious data.</li>
<li>The attacker might also use this to escalate privileges within the application.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability (CVE-2026-7545) could allow an attacker to read, modify, or delete sensitive data stored in the Advanced School Management System database. This could include student records, financial information, or administrative credentials. The availability of public exploits increases the likelihood of attacks targeting this vulnerability, potentially impacting any organization using the affected software.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply input validation and sanitization to the <code>checkEmail</code> endpoint in <code>commonController.php</code> to prevent SQL injection attacks.</li>
<li>Deploy the Sigma rule <code>Detect ASMS CheckEmail SQL Injection Attempt</code> to identify exploitation attempts in web server logs.</li>
<li>Monitor web server logs for suspicious activity related to the <code>checkEmail</code> endpoint.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sqli</category><category>vulnerability</category><category>web-application</category></item><item><title>Fujian Apex LiveBOS Path Traversal Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-livebos-path-traversal/</link><pubDate>Fri, 01 May 2026 01:16:38 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-livebos-path-traversal/</guid><description>A path traversal vulnerability exists in Fujian Apex LiveBOS version 2.0 and earlier, allowing remote attackers to read arbitrary files by manipulating the filename argument in the /feed/UploadImage.do endpoint.</description><content:encoded><![CDATA[<p>Fujian Apex LiveBOS, a live broadcasting system, is vulnerable to a path traversal attack. This vulnerability, identified as CVE-2026-7519, exists due to insufficient input validation on the filename parameter within the /feed/UploadImage.do endpoint. Versions up to and including 2.0 are affected. Publicly available exploits exist, increasing the risk of exploitation. An attacker can leverage this flaw to access sensitive files on the server, potentially leading to information disclosure or further system compromise. Upgrading to version 2.1 or applying available patches is strongly recommended.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a Fujian Apex LiveBOS instance running version 2.0 or earlier.</li>
<li>The attacker crafts a malicious HTTP request targeting the /feed/UploadImage.do endpoint.</li>
<li>The attacker manipulates the filename parameter within the request, injecting path traversal sequences (e.g., ../../).</li>
<li>The server-side application fails to properly sanitize the filename, allowing the path traversal sequence to be processed.</li>
<li>The application attempts to read a file based on the attacker-controlled path.</li>
<li>If successful, the contents of the targeted file are returned to the attacker in the HTTP response.</li>
<li>The attacker analyzes the leaked file content for sensitive information (e.g., credentials, configuration files).</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability can lead to unauthorized access to sensitive files on the LiveBOS server. This could include configuration files containing database credentials, private keys, or other confidential information. The impact ranges from information disclosure to potential full system compromise, depending on the accessed data. There are no reported victims or sectors targeted as of yet, but the public availability of the exploit increases the likelihood of exploitation.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Fujian Apex LiveBOS to version 2.1 to remediate CVE-2026-7519.</li>
<li>Deploy the Sigma rule <code>Detect LiveBOS Path Traversal Attempt</code> to identify malicious requests exploiting the vulnerability.</li>
<li>Monitor web server logs for requests containing path traversal sequences targeting the <code>/feed/UploadImage.do</code> endpoint.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>path-traversal</category><category>web-application</category><category>cve-2026-7519</category></item><item><title>nextlevelbuilder GoClaw and GoClaw Lite Improper Authorization Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-goclaw-auth-bypass/</link><pubDate>Thu, 30 Apr 2026 23:16:20 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-goclaw-auth-bypass/</guid><description>nextlevelbuilder GoClaw and GoClaw Lite versions up to 3.8.5 are vulnerable to improper authorization in the RPC Handler component, potentially allowing remote attackers to bypass security controls.</description><content:encoded><![CDATA[<p>nextlevelbuilder GoClaw and GoClaw Lite, up to version 3.8.5, contain an improper authorization vulnerability within the RPC Handler component. This flaw allows remote attackers to potentially bypass intended security restrictions, leading to unauthorized access or modification of data. Publicly available exploit code exists, increasing the risk of exploitation. The vulnerability is identified as CVE-2026-7505. Organizations using affected versions of GoClaw or GoClaw Lite should upgrade to version 3.9.0, which includes a patch (406022e79f4a18b3070a446712080571eff11e30) to mitigate this issue. Successful exploitation could lead to unauthorized data access, modification, or other malicious activities.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable instance of nextlevelbuilder GoClaw or GoClaw Lite running version 3.8.5 or earlier.</li>
<li>The attacker crafts a malicious RPC request targeting the vulnerable RPC Handler component.</li>
<li>The attacker sends the crafted RPC request to the vulnerable GoClaw/GoClaw Lite instance remotely.</li>
<li>Due to the improper authorization, the RPC Handler processes the request without proper authentication or authorization checks.</li>
<li>The attacker gains unauthorized access to functions or data within the GoClaw/GoClaw Lite application.</li>
<li>The attacker modifies data, executes unauthorized commands, or performs other malicious actions within the application&rsquo;s scope.</li>
<li>The attacker leverages the compromised application to further escalate privileges or gain access to other systems.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7505 allows an unauthenticated remote attacker to bypass authorization controls in nextlevelbuilder GoClaw and GoClaw Lite. This can lead to unauthorized access to sensitive data, modification of system configurations, or execution of arbitrary commands. While the number of affected installations is unknown, organizations utilizing these products should consider this a high-risk vulnerability due to the availability of exploit code.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately upgrade nextlevelbuilder GoClaw and GoClaw Lite to version 3.9.0 to apply the security patch (406022e79f4a18b3070a446712080571eff11e30), as mentioned in the overview.</li>
<li>Monitor network traffic for suspicious RPC requests targeting GoClaw/GoClaw Lite servers using network connection logs.</li>
<li>Deploy web server access rules to detect and block access to the RPC Handler component from unauthorized IP addresses.</li>
<li>Review and harden access control lists for the GoClaw/GoClaw Lite application to prevent unauthorized access.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>improper-authorization</category><category>rpc-handler</category><category>goclaw</category></item><item><title>Kirby CMS Missing Authorization Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-kirby-auth-bypass/</link><pubDate>Thu, 30 Apr 2026 21:03:20 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-kirby-auth-bypass/</guid><description>A missing authorization vulnerability in Kirby CMS allows authenticated users to bypass intended access restrictions on pages and files, potentially leading to unauthorized information disclosure and content modification; patched in versions 4.9.0 and 5.4.0.</description><content:encoded><![CDATA[<p>Kirby CMS versions prior to 4.9.0 and between 5.0.0 and 5.3.3 are vulnerable to a missing authorization flaw. This vulnerability impacts Kirby sites where user roles are intentionally configured with restricted access to pages or files through disabled <code>pages.access</code>, <code>pages.list</code>, <code>files.access</code>, or <code>files.list</code> permissions. The issue stems from inconsistent permission checks within the Kirby Panel and REST API, allowing authenticated users to access resources they should not be able to. Updating to versions 4.9.0, 5.4.0, or later resolves this vulnerability by implementing consistent permission checks. The vulnerability is identified as CVE-2026-42137.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An authenticated user logs into the Kirby CMS Panel or REST API.</li>
<li>The user attempts to access a page or file for which their role lacks the necessary <code>pages.access</code>/<code>files.access</code> or <code>pages.list</code>/<code>files.list</code> permissions.</li>
<li>Due to inconsistent permission checks, the user can view the page or file details via the &ldquo;changes&rdquo; dialog in the Panel, even if listing is disabled.</li>
<li>The user accesses the REST API, which, despite direct access checks, fails to properly filter collections or related models (children, drafts, files, etc.).</li>
<li>The attacker views images associated with restricted site, pages, or user resources in lists within the Panel.</li>
<li>The user exploits the incorrect permission check (using <code>pages.access</code> instead of <code>pages.list</code> or <code>files.access</code> instead of <code>files.list</code> in specific API routes).</li>
<li>The user traverses to previous or next files using direct links in the files view, even if those files should not be listable.</li>
<li>The attacker gains unauthorized access to sensitive information or modifies content due to the bypassed permission checks.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>This vulnerability allows authenticated users to bypass intended access restrictions within Kirby CMS, leading to potential unauthorized access to sensitive information and/or unauthorized content modification. The inconsistent permission checks in the Panel and REST API could result in unintended disclosure of data restricted by role-based access controls. Successful exploitation could compromise the confidentiality and integrity of the affected Kirby CMS instance. While the advisory does not list the number of victims, this flaw impacts any Kirby site with restricted roles.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to Kirby CMS version 4.9.0 or 5.4.0 (or later) to patch the vulnerability as recommended in the advisory.</li>
<li>Review user role permissions and blueprint configurations to ensure appropriate access controls are in place after patching, as described in the overview.</li>
<li>Monitor web server logs for unusual API requests to resources that should be restricted, using the rules below, to identify potential exploitation attempts.</li>
<li>Implement rate limiting on API endpoints to mitigate potential brute-force attacks attempting to exploit this or other vulnerabilities.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>authorization</category><category>cms</category><category>web-application</category></item><item><title>Contrast CLI CopyFile Policy Subversion via Symlinks Allows Guest Root Filesystem Writes</title><link>https://feed.craftedsignal.io/briefs/2026-04-contrast-copyfile-vuln/</link><pubDate>Thu, 30 Apr 2026 20:57:17 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-contrast-copyfile-vuln/</guid><description>A vulnerability in the CopyFile verification of Kata agent policies generated by the Contrast CLI allows arbitrary writes to the guest root filesystem, potentially leading to a full guest takeover.</description><content:encoded><![CDATA[<p>A vulnerability exists in the Kata agent policies generated by the Contrast CLI (versions prior to v1.19.1). Specifically, the <code>CopyFile</code> verification process is flawed, enabling a malicious host process to write arbitrary data to the guest root filesystem. This attack vector leverages the Kata agent&rsquo;s VSOCK interface, allowing a compromised host to connect to the agent and issue malicious <code>CopyFile</code> requests. The successful exploitation can overwrite critical security files or deceive the workload into divulging sensitive data. This flaw has a high impact, potentially resulting in a complete guest takeover. The issue was patched in Contrast v1.19.1.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A malicious process gains the capability to connect to the Kata agent VSOCK.</li>
<li>The malicious process connects to the Kata agent via VSOCK.</li>
<li>The attacker crafts a series of <code>CopyFile</code> requests.</li>
<li>These <code>CopyFile</code> requests are designed to exploit the vulnerability in the Contrast CLI-generated Kata agent policies.</li>
<li>The attacker uses the <code>CopyFile</code> requests to create symlinks pointing to sensitive or critical system files.</li>
<li>The attacker then uses <code>CopyFile</code> requests to write arbitrary data to the targeted files via the created symlinks.</li>
<li>Security-critical files within the guest root filesystem are overwritten or modified by the attacker.</li>
<li>The compromised system facilitates a full guest takeover, potentially enabling further malicious activities within the containerized environment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows a malicious host process to gain full control over the guest container. This can lead to data exfiltration, denial of service, or further lateral movement within the infrastructure. While the exact number of affected systems is not specified, any environment relying on affected Contrast CLI versions to generate Kata agent policies is potentially at risk. The impact is a full guest takeover.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Contrast CLI to version v1.19.1 or later to remediate the vulnerability.</li>
<li>If upgrading is not immediately possible, implement the policy-only fix described in the provided resources, specifically the rego fix, and pass it to <code>contrast generate --policy</code>.</li>
<li>Monitor network connections to the Kata agent VSOCK for unusual or unauthorized activity, especially originating from untrusted processes.</li>
<li>Implement host-based intrusion detection systems (HIDS) to detect unauthorized file modifications within the guest root filesystem.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>kata-containers</category><category>container-security</category><category>privilege-escalation</category></item><item><title>Clerk Authorization Bypass Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-clerk-auth-bypass/</link><pubDate>Thu, 30 Apr 2026 18:20:02 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-clerk-auth-bypass/</guid><description>Clerk has an authorization bypass vulnerability in multiple packages where the `has()` and `auth.protect()` predicates can incorrectly return true, potentially allowing unauthorized actions.</description><content:encoded><![CDATA[<p>A critical authorization bypass vulnerability has been identified in Clerk&rsquo;s authorization predicates (<code>has()</code> and <code>auth.protect()</code>) across multiple SDKs, including <code>@clerk/shared</code>, <code>@clerk/nextjs</code>, and <code>@clerk/backend</code>. This flaw, reported on April 18, 2026, and patched on April 22, 2026, can lead to incorrect authorization decisions when combining multiple authorization dimensions (e.g., reverification with role). Specifically, the predicates may return <code>true</code> even if the user does not satisfy all required conditions, potentially allowing unauthorized access to gated actions. A secondary bypass exists in <code>@clerk/nextjs</code>, where <code>auth.protect()</code> silently discards authorization parameters under certain conditions. The vulnerability affects applications using specific combinations of authorization checks, emphasizing the need for immediate patching.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies an application utilizing affected Clerk packages and vulnerable authorization checks.</li>
<li>The attacker targets an endpoint protected by a combined authorization check (e.g., requiring a specific role and reverification).</li>
<li>The attacker crafts a request that satisfies one, but not all, of the authorization conditions.</li>
<li>Due to the bypass vulnerability, the <code>has()</code> or <code>auth.protect()</code> predicate incorrectly returns <code>true</code>.</li>
<li>The application grants the attacker access to the protected resource or functionality.</li>
<li>In the case of the <code>@clerk/nextjs</code> bypass, the attacker might exploit the silent discarding of authorization parameters when <code>unauthenticatedUrl</code>, <code>unauthorizedUrl</code>, or <code>token</code> are also present in the <code>auth.protect()</code> call, effectively bypassing authorization.</li>
<li>The attacker performs unauthorized actions, such as modifying data or accessing restricted areas of the application.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability could lead to unauthorized access to sensitive resources and functionalities within applications using Clerk for authentication and authorization. This could result in data breaches, privilege escalation, and other security incidents. The vulnerability affects a wide range of Clerk packages, potentially impacting a significant number of applications relying on Clerk for access control. Immediate patching is crucial to mitigate the risk of exploitation.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to the latest patch release of the consuming app&rsquo;s framework package as specified in the advisory to remediate CVE-2026-42349.</li>
<li>If immediate upgrade is not feasible, implement the suggested workaround of splitting combined <code>has()</code> or <code>auth.protect()</code> calls into sequential single-condition checks as described in the advisory.</li>
<li>Deploy the Sigma rule <code>ClerkAuthProtectBypass</code> to detect potential exploitation attempts by monitoring for calls to <code>auth.protect</code> that include <code>unauthenticatedUrl</code>, <code>unauthorizedUrl</code>, or <code>token</code> parameters.</li>
<li>Deploy the Sigma rule <code>ClerkCombinedAuthCheckBypass</code> to identify suspicious process creation events that may indicate unauthorized access due to the authorization bypass.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>authorization</category><category>bypass</category><category>clerk</category><category>cve-2026-42349</category></item><item><title>GnuTLS DTLS Handshake Parsing Flaw (CVE-2026-33845)</title><link>https://feed.craftedsignal.io/briefs/2026-04-gnutls-dtls-flaw/</link><pubDate>Thu, 30 Apr 2026 18:16:28 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-gnutls-dtls-flaw/</guid><description>A flaw in GnuTLS DTLS handshake parsing allows malformed fragments with zero length and non-zero offset, leading to an integer underflow during reassembly and resulting in an out-of-bounds read, potentially causing information disclosure or denial of service.</description><content:encoded><![CDATA[<p>CVE-2026-33845 describes a vulnerability in the GnuTLS library related to the parsing of DTLS handshake fragments. The vulnerability stems from improper handling of malformed fragments that have a zero length but a non-zero offset. This leads to an integer underflow during the reassembly process, which then triggers an out-of-bounds read. The vulnerability is remotely exploitable, meaning an attacker could potentially trigger it without needing local access. Successful exploitation can lead to information disclosure or a denial-of-service condition. The affected component is the GnuTLS library, which is used by various applications for secure communication.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious DTLS handshake fragment with a zero length and non-zero offset.</li>
<li>The attacker sends the malformed DTLS handshake fragment to a vulnerable GnuTLS server.</li>
<li>The GnuTLS library receives the fragment and begins the reassembly process.</li>
<li>The integer underflow occurs when calculating the correct offset for the fragment reassembly.</li>
<li>The integer underflow leads to an out-of-bounds memory read operation.</li>
<li>The out-of-bounds read allows the attacker to potentially read sensitive information from the server&rsquo;s memory.</li>
<li>Alternatively, the out-of-bounds read may cause the server to crash, resulting in a denial-of-service.</li>
<li>The attacker achieves either information disclosure or denial-of-service based on the server&rsquo;s response to the out-of-bounds read.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-33845 can lead to a denial-of-service condition, impacting the availability of services relying on the vulnerable GnuTLS library. The out-of-bounds read can also potentially expose sensitive information from the server&rsquo;s memory, leading to data breaches. Given the widespread use of GnuTLS in various applications, a successful widespread attack could affect numerous organizations and users.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply available patches for GnuTLS provided by Red Hat or other vendors to address CVE-2026-33845.</li>
<li>Monitor network traffic for malformed DTLS handshake fragments with zero length and non-zero offset that may indicate exploitation attempts targeting CVE-2026-33845.</li>
<li>Deploy the Sigma rule <code>DetectGnuTLSDTLSMalformedFragment</code> to identify suspicious network connections associated with the vulnerability.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve</category><category>denial-of-service</category><category>information-disclosure</category><category>gnutls</category></item><item><title>n8n-mcp SDK Embedder SSRF Vulnerability via IPv6 Bypass</title><link>https://feed.craftedsignal.io/briefs/2026-04-n8n-mcp-ssrf/</link><pubDate>Thu, 30 Apr 2026 18:12:54 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-n8n-mcp-ssrf/</guid><description>The n8n-mcp SDK embedder path is vulnerable to server-side request forgery (SSRF) due to the synchronous URL validator in `SSRFProtection.validateUrlSync()` not checking for IPv6 addresses, allowing attackers to access cloud metadata endpoints, RFC1918 private networks, or localhost services by supplying a crafted `n8nApiUrl`.</description><content:encoded><![CDATA[<p>The n8n-mcp library, when embedded as an SDK, contains a server-side request forgery (SSRF) vulnerability. The vulnerability lies in the <code>SSRFProtection.validateUrlSync()</code> function, specifically within the <code>N8NDocumentationMCPServer</code> constructor, <code>getN8nApiClient()</code>, and <code>validateInstanceContext()</code> methods. This synchronous validator lacks IPv6 checks, allowing IPv4-mapped IPv6 addresses (e.g., <code>http://[::ffff:169.254.169.254]</code>) to bypass existing protections against cloud metadata, localhost, and private IP ranges. An attacker who can control the <code>n8nApiUrl</code> parameter can exploit this flaw to force the server to make HTTP requests to internal or external services. This issue affects deployments embedding n8n-mcp as an SDK using <code>N8NDocumentationMCPServer</code> or <code>N8NMCPEngine</code> with user-supplied <code>InstanceContext</code> on versions v2.47.4 through v2.47.13. Version v2.47.14 and later contain the patch for this vulnerability.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a vulnerable n8n-mcp deployment embedding the SDK and using a user-supplied <code>InstanceContext</code>.</li>
<li>The attacker crafts a malicious <code>n8nApiUrl</code> containing an IPv4-mapped IPv6 address, such as <code>http://[::ffff:169.254.169.254]</code>.</li>
<li>The attacker supplies the crafted <code>n8nApiUrl</code> to the vulnerable <code>N8NDocumentationMCPServer</code> constructor or <code>getN8nApiClient()</code> method.</li>
<li>The <code>validateInstanceContext()</code> function calls <code>SSRFProtection.validateUrlSync()</code> to validate the URL.</li>
<li>The <code>validateUrlSync()</code> function fails to properly validate the IPv4-mapped IPv6 address.</li>
<li>The server issues an HTTP request to the attacker-specified target using the bypassed URL.</li>
<li>The <code>x-n8n-api-key</code> header is forwarded to the attacker-controlled target.</li>
<li>The response body from the target is returned to the attacker, allowing the attacker to gather sensitive information from internal services or cloud metadata endpoints.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SSRF vulnerability allows an attacker to perform unauthorized actions, such as accessing sensitive information from cloud metadata endpoints (AWS IMDS, GCP, Azure, Alibaba, Oracle), RFC1918 private networks, or localhost services. The attacker can also gain access to the <code>n8nApiKey</code>, which is forwarded in the <code>x-n8n-api-key</code> header, potentially leading to further compromise of the n8n instance. This vulnerability impacts deployments embedding n8n-mcp as an SDK between versions v2.47.4 and v2.47.13.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade n8n-mcp to version v2.47.14 or later to patch the vulnerability as described in the advisory.</li>
<li>Implement a network-level block on outbound traffic from the n8n-mcp process to RFC1918 ranges (10.0.0.0/8, 172.16.0.0/12, 192.168.0.0/16), link-local <code>169.254.0.0/16</code>, and cloud metadata endpoints as a defense-in-depth measure.</li>
<li>Deploy the Sigma rule <code>Detect N8N MCP SSRF Attempt via IPv6 Bypass</code> to identify exploitation attempts by detecting outbound connections to internal IPs using IPv6 mapped IPv4 address.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>ssrf</category><category>cwe-918</category><category>n8n-mcp</category></item><item><title>Jupyter Notebook Authentication Token Theft via CommandLinker XSS</title><link>https://feed.craftedsignal.io/briefs/2024-01-30-jupyter-xss/</link><pubDate>Thu, 30 Apr 2026 17:25:47 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-30-jupyter-xss/</guid><description>A stored Cross-Site Scripting (XSS) vulnerability in Jupyter Notebook versions 7.0.0 through 7.5.5 and JupyterLab versions up to 4.5.6 allows attackers to steal authentication tokens by tricking users into interacting with malicious notebook files, leading to complete account takeover via the Jupyter REST API.</description><content:encoded><![CDATA[<p>A stored Cross-Site Scripting (XSS) vulnerability has been identified in Jupyter Notebook and JupyterLab, impacting versions 7.0.0 through 7.5.5 of Jupyter Notebook and versions up to 4.5.6 of JupyterLab. Discovered by Daniel Teixeira of the NVIDIA AI Red Team, this flaw allows an attacker to craft malicious notebook files containing XSS payloads embedded within the command linker functionality. When a user opens and interacts with these files, the injected script executes, potentially stealing the user&rsquo;s authentication token. Successful exploitation grants the attacker full control over the user&rsquo;s Jupyter account, enabling them to read, modify, and create files, execute arbitrary code via running kernels, and establish shell access through created terminals. This vulnerability poses a significant risk to data confidentiality, integrity, and system availability.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker crafts a malicious Jupyter Notebook file containing a stored XSS payload within the command linker functionality.</li>
<li>The attacker distributes the malicious notebook file to a target user (e.g., via email, shared repository, or compromised website).</li>
<li>The victim opens the malicious notebook file in a vulnerable version of Jupyter Notebook or JupyterLab.</li>
<li>The victim interacts with a seemingly legitimate control element within the notebook that is, in fact, part of the XSS payload.</li>
<li>The injected XSS code executes in the victim&rsquo;s browser, stealing their authentication token.</li>
<li>The attacker uses the stolen authentication token to authenticate to the Jupyter REST API.</li>
<li>The attacker gains complete control over the victim&rsquo;s Jupyter account.</li>
<li>The attacker performs malicious actions, such as reading files, modifying files, executing arbitrary code, or creating terminals for shell access.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this XSS vulnerability enables complete account takeover, allowing attackers to read, modify, and create files, access running kernels and execute arbitrary code, and create terminals for shell access within the victim&rsquo;s Jupyter environment. This can lead to data exfiltration, code injection, and potential compromise of sensitive information stored within the Jupyter Notebook environment. Given the widespread use of Jupyter Notebook in data science, machine learning, and research environments, this vulnerability can have far-reaching consequences for individuals and organizations relying on these tools.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately upgrade Jupyter Notebook to version 7.5.6 or later, and JupyterLab to version 4.5.7 or later to patch CVE-2026-40171.</li>
<li>Apply the workaround to disable the help extension via CLI as specified in the advisory to mitigate the vulnerability until patching is possible.</li>
<li>Implement the hardening measure by disabling the command linker functionality via <code>overrides.json</code> to prevent XSS attacks, referencing the configuration details in the advisory.</li>
<li>Deploy the Sigma rule &ldquo;Detect Jupyter Notebook CommandLinker XSS Attempt&rdquo; to detect potential exploitation attempts based on specific HTTP request characteristics.</li>
<li>Educate users about the risks of opening untrusted Jupyter Notebook files and interacting with potentially malicious content.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>xss</category><category>jupyter</category><category>authentication</category><category>account-takeover</category><category>vulnerability</category></item><item><title>Gotenberg Unauthenticated SSRF Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-gotenberg-ssrf/</link><pubDate>Thu, 30 Apr 2026 17:24:55 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-gotenberg-ssrf/</guid><description>Gotenberg version 8.29.1 is vulnerable to Server-Side Request Forgery (SSRF) due to an unfiltered webhook URL, allowing unauthenticated attackers to force outbound HTTP POST requests to arbitrary destinations, enabling internal network probing and interaction with internal services.</description><content:encoded><![CDATA[<p>Gotenberg version 8.29.1, as distributed in the default <code>gotenberg/gotenberg:8</code> Docker image, contains an unauthenticated Server-Side Request Forgery (SSRF) vulnerability. Discovered on April 4, 2026, this flaw allows an attacker with network access to the Gotenberg instance to specify an arbitrary URL via the <code>Gotenberg-Webhook-Url</code> request header, forcing the server to make outbound HTTP POST requests. This is a blind SSRF vulnerability, where the attacker cannot directly read the response body, but can infer information based on the success or failure of the request. The vulnerability exists due to an insecure default in the <code>FilterDeadline</code> function, which, when unconfigured, permits all webhook URLs. The impact includes internal network probing, forced POST requests to internal services, and cloud metadata interaction.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable Gotenberg instance exposed on the network (default port 3000).</li>
<li>The attacker crafts an HTTP POST request to the <code>/forms/chromium/convert/url</code> endpoint.</li>
<li>The attacker includes the <code>Gotenberg-Webhook-Url</code> header, setting it to an internal IP address and port (e.g., <code>http://192.168.1.10:8080/</code>).</li>
<li>The attacker may also set the <code>Gotenberg-Webhook-Error-Url</code> to an attacker-controlled server to monitor for request failures.</li>
<li>Gotenberg&rsquo;s <code>FilterDeadline</code> function fails to properly validate the supplied webhook URL due to an insecure default.</li>
<li>Gotenberg makes an outbound HTTP POST request to the specified internal IP address and port using the retryablehttp client, potentially retrying the request up to 4 times.</li>
<li>If the internal target responds with a 2xx status code, the attacker infers that the host and port are open and accepting POST requests. The error URL is NOT called.</li>
<li>If the internal target responds with a 4xx/5xx status code, times out, or rejects the connection, the attacker receives a request at the <code>Gotenberg-Webhook-Error-Url</code> endpoint, indicating the port is likely closed or the service is unavailable.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The SSRF vulnerability in Gotenberg 8.29.1 allows attackers to probe internal networks, potentially mapping out internal infrastructure by observing the success or failure of requests. Attackers can also force Gotenberg to send POST requests to internal services that perform actions upon receiving such requests, potentially triggering unintended behavior. Although the attacker cannot directly read response bodies, the ability to determine reachability and trigger actions makes this a significant security risk. The retry mechanism amplifies the probing effect, as each request generates up to 4 attempts.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the recommended configuration to either set <code>--env GOTENBERG_API_WEBHOOK_ALLOW_LIST</code> or <code>--env GOTENBERG_API_WEBHOOK_DENY_LIST</code> to restrict or block internal ranges to mitigate the SSRF vulnerability.</li>
<li>Monitor web server logs for POST requests to <code>/forms/chromium/convert/url</code> with the <code>Gotenberg-Webhook-Url</code> header containing suspicious internal IP addresses or domains using the provided Sigma rule.</li>
<li>Deploy the Sigma rule to detect suspicious outbound network connections originating from the Gotenberg process to internal IP ranges or cloud metadata endpoints.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>ssrf</category><category>gotenberg</category><category>cve-2026-39383</category></item><item><title>Potential Copy Fail (CVE-2026-31431) Exploitation via AF_ALG Socket</title><link>https://feed.craftedsignal.io/briefs/2024-01-cve-2026-31431-exploitation/</link><pubDate>Thu, 30 Apr 2026 16:24:01 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-cve-2026-31431-exploitation/</guid><description>This rule detects potential exploitation of CVE-2026-31431, a Copy Fail vulnerability in the Linux kernel, via AF_ALG socket abuse, by correlating non-root AF_ALG-class socket or splice events with a subsequent process execution where the effective user is root but the login user remains non-root, indicating a privilege escalation attempt.</description><content:encoded><![CDATA[<p>CVE-2026-31431, dubbed Copy Fail, is a Linux kernel vulnerability that allows an attacker to write controlled bytes into the page cache of a readable file by abusing the <code>authencesn</code> AEAD path through AF_ALG and <code>splice()</code>. Public exploitation targets setuid-root binaries such as <code>/usr/bin/su</code>, then executes the corrupted in-memory copy to gain root. The vulnerability lies in the shared host page cache, making container-originated activity a possible node-compromise attempt. This exploit leverages the AF_ALG interface, which, while uncommon for unprivileged users, may be used in specific environments like kernel crypto testing or HSM integrations. Defenders should prioritize patching vulnerable kernels and restricting AF_ALG socket creation for untrusted workloads to mitigate this risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unprivileged user initiates multiple AF_ALG socket creation events (auditd.data.syscall == &ldquo;socket&rdquo; and auditd.data.a0 == &ldquo;26&rdquo;) or splice operations.</li>
<li>The attacker leverages the vulnerability to corrupt the page cache of a setuid-root binary, such as <code>/usr/bin/su</code>.</li>
<li>The attacker executes the targeted setuid-root binary (e.g., <code>/usr/bin/su</code>).</li>
<li>Due to the corrupted page cache, the executed binary behaves in an unexpected manner, leading to a privilege escalation.</li>
<li>The process transitions to a root UID, indicating successful privilege escalation.</li>
<li>A root shell is spawned, providing the attacker with elevated privileges.</li>
<li>The attacker performs actions requiring root privileges, such as creating persistence mechanisms or accessing sensitive credentials.</li>
<li>The attacker potentially compromises the entire host or node, especially in containerized environments.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-31431 leads to privilege escalation, allowing attackers to gain root access on the affected Linux system. This can result in complete system compromise, data exfiltration, and the ability to install malware or create persistent backdoors. In containerized environments, a compromised container can lead to node compromise, affecting other containers running on the same host. The vulnerability affects systems running vulnerable kernel versions, potentially impacting a wide range of servers and workstations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Potential Copy Fail (CVE-2026-31431) Exploitation via AF_ALG Socket - Socket Creation Burst&rdquo; to detect initial exploitation attempts based on AF_ALG socket activity.</li>
<li>Deploy the Sigma rule &ldquo;Potential Copy Fail (CVE-2026-31431) Exploitation via AF_ALG Socket - Privilege Escalation&rdquo; to detect privilege escalation attempts by monitoring executed processes with an effective user ID of root.</li>
<li>Immediately patch the kernel with the vendor fix for CVE-2026-31431 to eliminate the underlying vulnerability.</li>
<li>Until patching is possible, consider blocking <code>algif_aead</code> module loading or restricting AF_ALG socket creation via seccomp for untrusted workloads.</li>
<li>Add audit rules for <code>socket</code>, <code>splice</code>, and <code>bind</code> events as described in the rule&rsquo;s Setup instructions to ensure comprehensive monitoring of AF_ALG related syscalls.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>privilege-escalation</category><category>linux</category><category>vulnerability</category><category>cve-2026-31431</category></item><item><title>Q1 2026 Email Threat Landscape: Rise in Phishing Techniques and Tycoon2FA Disruption</title><link>https://feed.craftedsignal.io/briefs/2026-05-email-phishing-trends/</link><pubDate>Thu, 30 Apr 2026 15:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-email-phishing-trends/</guid><description>In Q1 2026, email threats increased, including credential phishing, QR code phishing, and CAPTCHA-gated campaigns, with Microsoft's disruption of the Tycoon2FA phishing platform leading to a 15% volume decrease and shifts in threat actor tactics; BEC activity remained prevalent at 10.7 million attacks.</description><content:encoded><![CDATA[<p>In the first quarter of 2026, Microsoft Threat Intelligence observed a significant rise in email-based phishing threats, totaling approximately 8.3 billion. This increase was driven by surges in QR code phishing (more than doubling over the period), CAPTCHA-gated phishing, and credential phishing attacks. Microsoft&rsquo;s Digital Crime Unit successfully disrupted the Tycoon2FA phishing-as-a-service (PhaaS) platform in early March, leading to a 15% reduction in associated email volume. However, threat actors adapted by shifting hosting providers and domain registration patterns. Business email compromise (BEC) also remained a prevalent threat, with approximately 10.7 million attacks recorded during the quarter, often characterized by low-effort, generic outreach messages. Microsoft Defender Research has also noted the emergence of AI-enabled device code phishing campaigns.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Email Delivery:</strong> Attackers send phishing emails impersonating legitimate services or organizations. These emails may contain links, QR codes, or HTML attachments.</li>
<li><strong>Victim Interaction:</strong> The victim opens the email and clicks on a malicious link or scans a QR code, redirecting them to a phishing page.</li>
<li><strong>Phishing Page Redirection:</strong> The phishing page mimics a legitimate login portal, such as Microsoft 365 or other enterprise applications.</li>
<li><strong>Credential Harvesting:</strong> The victim enters their username and password on the phishing page, which are then captured by the attacker.</li>
<li><strong>MFA Bypass (AiTM):</strong> For attacks using adversary-in-the-middle (AiTM) techniques (like those facilitated by Tycoon2FA), the attacker intercepts the MFA code and uses it to authenticate.</li>
<li><strong>Account Compromise:</strong> With the stolen credentials and MFA code (if applicable), the attacker gains unauthorized access to the victim&rsquo;s account.</li>
<li><strong>Lateral Movement/Data Theft:</strong> The attacker uses the compromised account to access sensitive data, send further phishing emails, or move laterally within the organization.</li>
<li><strong>Business Email Compromise:</strong> In BEC attacks, attackers use compromised accounts or spoofed email addresses to send fraudulent invoices or requests for wire transfers.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The observed email threats in Q1 2026 led to a high risk of credential compromise, financial loss through BEC attacks, and potential data breaches across various sectors. Although the total number of victims is not specified, the billions of phishing attempts indicate a widespread impact. Microsoft&rsquo;s disruption of Tycoon2FA temporarily reduced phishing volumes by 15%, demonstrating the potential for proactive intervention to mitigate these threats. However, threat actors are quickly adapting their techniques, indicating the need for continued vigilance and enhanced security measures. The 10.7 million BEC attacks alone represent a significant financial threat to businesses.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the &ldquo;Detect Tycoon2FA Phishing Attempts&rdquo; Sigma rule to identify email campaigns associated with the Tycoon2FA platform.</li>
<li>Enable Microsoft Defender detections to improve detection of phishing emails and malicious payloads.</li>
<li>Monitor email traffic for suspicious domain registrations, particularly those using newer generic top-level domains (TLDs) such as .DIGITAL, .BUSINESS, .CONTRACTORS, .CEO, and .COMPANY, and the resurgence of .RU registrations, to identify potential Tycoon2FA infrastructure shifts.</li>
<li>Educate users about the dangers of QR code phishing and CAPTCHA-gated attacks, emphasizing the importance of verifying the legitimacy of login pages and email senders, to reduce the effectiveness of phishing campaigns (T1566).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>email</category><category>phishing</category><category>credential-theft</category><category>Tycoon2FA</category><category>BEC</category></item><item><title>ClickFix 'BackgroundFix' Campaign Delivers CastleLoader, NetSupport RAT, and CastleStealer</title><link>https://feed.craftedsignal.io/briefs/2026-04-clickfix-backgroundfix/</link><pubDate>Thu, 30 Apr 2026 13:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-clickfix-backgroundfix/</guid><description>The 'BackgroundFix' ClickFix campaign uses social engineering to trick victims into downloading malware disguised as a free image-editing tool, leading to the deployment of CastleLoader, NetSupport RAT for remote access, and CastleStealer for credential theft.</description><content:encoded><![CDATA[<p>The BackgroundFix campaign is a social engineering scheme using fake &ldquo;remove your photo background&rdquo; services to deliver malware. Victims are lured to malicious sites mimicking legitimate image editing tools. The sites feature fake upload interfaces, progress bars, and download buttons to appear authentic. This campaign delivers a multi-stage payload, starting with CastleLoader. CastleLoader then drops NetSupport RAT, enabling remote access for the attackers, and CastleStealer, a custom .NET stealer designed to exfiltrate browser credentials, wallet extension data, and Telegram session files. This campaign appears to be active, with multiple domains sharing the same template.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Victim searches for an online background removal tool and lands on a malicious BackgroundFix site.</li>
<li>The victim uploads an image to the fake website.</li>
<li>After clicking a checkbox, the site instructs the victim to copy a command to their clipboard.</li>
<li>The copied command executes <code>finger.exe</code> to query <code>cheeshomireciple[.]com</code></li>
<li><code>finger.exe</code> retrieves a batch script from the C2 server.</li>
<li>The batch script executes commands to download and execute further payloads.</li>
<li>CastleLoader is deployed, subsequently dropping NetSupport RAT and CastleStealer.</li>
<li>NetSupport RAT grants the attacker remote access, while CastleStealer exfiltrates sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful attacks result in the installation of NetSupport RAT, granting attackers remote control over the compromised system. Additionally, CastleStealer exfiltrates sensitive information such as browser credentials, wallet extension data, and Telegram session files. This stolen data can be used for further malicious activities, including financial fraud, identity theft, and unauthorized access to sensitive accounts. The active nature of the campaign and the use of multiple domains suggest a broad targeting scope.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process creation events for the execution of <code>finger.exe</code> with command-line arguments pointing to external domains (IOC: <code>cheeshomireciple[.]com</code>).</li>
<li>Deploy the Sigma rule to detect the execution of <code>finger.exe</code> to identify potential initial access attempts.</li>
<li>Block the C2 domain <code>cheeshomireciple[.]com</code> at the DNS resolver to prevent initial payload delivery.</li>
<li>Monitor network connections for NetSupport RAT C2 communications on port 688 to detect compromised systems (IOCs: <code>poronto[.]com:688</code>, <code>giovettiadv[.]com:688</code>).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>clickfix</category><category>malware</category><category>social-engineering</category><category>rat</category><category>infostealer</category><category>castleloader</category><category>netsupport</category></item><item><title>ABB AWIN Gateway Vulnerabilities Allow Remote Reboot and Information Disclosure</title><link>https://feed.craftedsignal.io/briefs/2026-04-abb-awin-gateways/</link><pubDate>Thu, 30 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-abb-awin-gateways/</guid><description>Multiple vulnerabilities in ABB AWIN Gateways allow an unauthenticated attacker to remotely reboot the device (CVE-2025-13778) or disclose sensitive system configuration details (CVE-2025-13777, CVE-2025-13779).</description><content:encoded><![CDATA[<p>ABB AWIN Gateways are vulnerable to multiple security flaws that could be exploited by unauthenticated attackers. These vulnerabilities impact ABB AWIN GW100 rev.2 and GW120 devices running specific firmware versions (2.0-0, 2.0-1, 1.2-0, and 1.2-1). Successful exploitation of these vulnerabilities can lead to a denial-of-service condition via remote reboot or the disclosure of sensitive system configuration information, potentially compromising critical manufacturing infrastructure. The vulnerabilities stem from authentication bypass and missing authentication for critical functions. Firmware versions 2.1-0 for GW100 rev. 2 and 2.0-0 for GW120 address these issues.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies an exposed ABB AWIN Gateway on a network (likely adjacent network).</li>
<li>Attacker sends a crafted, unauthenticated request to the targeted gateway to trigger CVE-2025-13778.</li>
<li>The ABB AWIN Gateway processes the request without authentication.</li>
<li>The gateway initiates a reboot, causing a denial-of-service condition.</li>
<li>Alternatively, the attacker sends another crafted, unauthenticated request to trigger CVE-2025-13777 or CVE-2025-13779.</li>
<li>The gateway responds to the request, disclosing sensitive system configuration information.</li>
<li>The attacker uses the disclosed information to gain further insight into the network and potentially plan further attacks.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities can have significant impacts, particularly within critical manufacturing sectors where these gateways are deployed. A remote reboot (CVE-2025-13778) can disrupt operations, leading to production downtime and financial losses. Disclosure of sensitive system configuration information (CVE-2025-13777, CVE-2025-13779) can provide attackers with valuable insights, enabling them to plan further attacks, such as gaining unauthorized access to other systems or manipulating industrial processes.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately patch affected ABB AWIN Gateways to the fixed versions (ABB AWIN Firmware 2.1-0 installed on ABB AWIN GW100 rev. 2 and ABB AWIN Firmware 2.0-0 installed on ABB AWIN GW120) as recommended in the ABB PSIRT security advisory 4JNO000329.</li>
<li>Minimize network exposure for all control system devices and systems, ensuring they are not accessible from the internet as recommended by CISA.</li>
<li>Monitor network traffic for unauthenticated requests to ABB AWIN Gateways, specifically targeting endpoints related to system reboot or configuration retrieval using the provided Sigma rule.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>ics</category><category>vulnerability</category><category>industrial_control_systems</category></item><item><title>ABB Ability OPTIMAX Authentication Bypass Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-optimax-auth-bypass/</link><pubDate>Thu, 30 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-optimax-auth-bypass/</guid><description>CVE-2025-14510 allows an attacker to bypass Azure Active Directory Single-Sign On authentication in vulnerable ABB Ability OPTIMAX versions, potentially granting unauthorized access to critical infrastructure systems.</description><content:encoded><![CDATA[<p>A critical vulnerability, CVE-2025-14510, affects ABB Ability OPTIMAX versions that utilize Azure Active Directory (Azure AD) for Single-Sign On (SSO) authentication. This flaw stems from an incorrect implementation of the authentication algorithm, potentially allowing attackers to bypass the Azure AD authentication mechanism and gain unauthorized access to the OPTIMAX system. The affected versions include ABB Ability OPTIMAX 6.1 and 6.2 (all versions), 6.3 versions prior to 6.3.1-251120, and 6.4 versions prior to 6.4.1-251120. Successful exploitation could lead to significant disruption in energy, water, and wastewater sectors. The vulnerability was reported to CISA by ABB PSIRT.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies an ABB Ability OPTIMAX installation using Azure AD SSO with a vulnerable version (6.1, 6.2, 6.3 &lt; 6.3.1-251120, or 6.4 &lt; 6.4.1-251120).</li>
<li>The attacker crafts a malicious authentication request, exploiting the incorrect implementation of the authentication algorithm (CWE-303).</li>
<li>The crafted request bypasses the expected Azure AD authentication checks within OPTIMAX.</li>
<li>OPTIMAX incorrectly validates the attacker&rsquo;s session, granting them access to the system.</li>
<li>The attacker leverages their unauthorized access to gain control over OPTIMAX functionalities.</li>
<li>The attacker can then modify control parameters, manipulate data, or disrupt operations within the connected industrial processes.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2025-14510 enables unauthorized access to ABB Ability OPTIMAX systems, potentially leading to severe consequences in critical infrastructure sectors such as energy, water, and wastewater. An attacker could manipulate industrial processes, disrupt critical services, or cause significant financial and operational damage. Given the widespread deployment of ABB Ability OPTIMAX systems globally, a successful campaign exploiting this vulnerability could have far-reaching impact.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately update ABB Ability OPTIMAX to fixed versions (6.3.1-251120 and later) to remediate CVE-2025-14510.</li>
<li>Refer to ABB PSIRT security advisory 9AKK108472A1331 for detailed mitigation steps and recommendations.</li>
<li>Minimize network exposure for all control system devices and/or systems, ensuring they are not accessible from the internet, as per CISA&rsquo;s recommended practices.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>authentication bypass</category><category>ics</category><category>vulnerability</category></item><item><title>Unpatched Microsoft Windows RPC Vulnerability Allows Privilege Escalation</title><link>https://feed.craftedsignal.io/briefs/2026-05-windows-rpc-privesc/</link><pubDate>Thu, 30 Apr 2026 11:16:31 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-windows-rpc-privesc/</guid><description>A local attacker can exploit an unpatched vulnerability in Microsoft Windows RPC to escalate privileges.</description><content:encoded><![CDATA[<p>An unpatched vulnerability exists within the Microsoft Windows Remote Procedure Call (RPC) service. This vulnerability allows a local attacker to escalate their privileges on a vulnerable system. The specific details of the vulnerability are not disclosed, but successful exploitation would allow an attacker to perform actions with elevated permissions, potentially leading to complete system compromise. This poses a significant risk to systems where unauthorized users have local access. Defenders should prioritize detection and mitigation strategies to address this threat.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial local access to a Windows system through some method.</li>
<li>Attacker identifies the presence of the unpatched Windows RPC vulnerability.</li>
<li>Attacker crafts a malicious RPC request designed to exploit the vulnerability.</li>
<li>The malicious RPC request is sent to the Windows RPC service.</li>
<li>The Windows RPC service processes the request, triggering the vulnerability.</li>
<li>The vulnerability allows the attacker to execute code with elevated privileges (e.g., SYSTEM).</li>
<li>Attacker leverages elevated privileges to install malware, modify system configurations, or access sensitive data.</li>
<li>Attacker establishes persistent access and expands their control over the compromised system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows a local attacker to escalate their privileges to SYSTEM. This allows the attacker to perform any action on the system, including installing malware, creating new accounts with administrative privileges, accessing sensitive data, and disrupting system operations. The impact is critical, as a successful attack can lead to complete system compromise and potential data breaches.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable process creation monitoring to detect suspicious processes spawned by the RPC service (see rules below).</li>
<li>Monitor for unusual registry modifications that might indicate privilege escalation attempts (see rules below).</li>
<li>Continuously monitor Microsoft&rsquo;s security advisories for a patch addressing this Windows RPC vulnerability.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>privilege-escalation</category><category>windows</category><category>unpatched-vulnerability</category></item><item><title>Multiple Vulnerabilities in Absolute Secure Access</title><link>https://feed.craftedsignal.io/briefs/2026-05-absolute-secure-access-vulns/</link><pubDate>Thu, 30 Apr 2026 10:44:07 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-absolute-secure-access-vulns/</guid><description>Multiple vulnerabilities in Absolute Secure Access could allow an attacker to escalate privileges, conduct a denial-of-service attack, and disclose sensitive information.</description><content:encoded><![CDATA[<p>Absolute Secure Access is susceptible to multiple vulnerabilities that could be exploited by a malicious actor. These vulnerabilities, if successfully exploited, could lead to a privilege escalation, enabling the attacker to gain higher-level access within the system. Additionally, a denial-of-service (DoS) attack could be launched, disrupting normal operations and potentially causing significant downtime. The vulnerabilities also expose the system to information disclosure, potentially leaking sensitive data to unauthorized parties. This combination of potential impacts makes patching or mitigating these issues critical for defenders.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable endpoint running Absolute Secure Access.</li>
<li>Attacker exploits a vulnerability to gain initial access to the system.</li>
<li>Attacker exploits a privilege escalation vulnerability within Absolute Secure Access to obtain elevated privileges (e.g., SYSTEM or root).</li>
<li>Attacker leverages elevated privileges to modify system configurations or install malicious software.</li>
<li>Attacker exploits a denial-of-service vulnerability to crash the Absolute Secure Access service or the entire system.</li>
<li>Attacker exploits an information disclosure vulnerability to access sensitive data stored or processed by Absolute Secure Access, such as credentials or configuration files.</li>
<li>Attacker uses the disclosed information to further compromise the system or network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities could have severe consequences. Privilege escalation could grant attackers complete control over affected systems. A denial-of-service attack could disrupt critical business functions. Information disclosure could lead to the theft of sensitive data, resulting in financial loss, reputational damage, and regulatory penalties. The scope of the impact depends on the deployment of Absolute Secure Access within the organization and the sensitivity of the data it handles.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process creations for suspicious processes launched by Absolute Secure Access processes, which could indicate privilege escalation (see &ldquo;Detect Suspicious Processes Spawned by Absolute Secure Access&rdquo; Sigma rule).</li>
<li>Implement network monitoring to detect and block any unusual traffic patterns that might indicate a denial-of-service attack targeting Absolute Secure Access.</li>
<li>Review and harden the configurations of Absolute Secure Access to minimize the potential for information disclosure.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>vulnerability</category><category>privilege-escalation</category><category>denial-of-service</category><category>information-disclosure</category></item><item><title>Acronis Cyber Protect Cloud Agent Multiple Vulnerabilities Allow Privilege Escalation</title><link>https://feed.craftedsignal.io/briefs/2026-05-acronis-privesc/</link><pubDate>Thu, 30 Apr 2026 10:19:14 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-acronis-privesc/</guid><description>Multiple vulnerabilities in Acronis Cyber Protect Cloud Agent can be exploited by a local or remote, authenticated attacker to escalate privileges.</description><content:encoded><![CDATA[<p>Multiple vulnerabilities exist within the Acronis Cyber Protect Cloud Agent that could allow an authenticated attacker, either locally or remotely, to escalate their privileges. The vulnerabilities are within the core functionality of the Acronis agent, and successful exploitation could lead to elevated access within the target system. The advisory does not specify the exact nature of the vulnerabilities, but the potential impact of privilege escalation is significant for defenders, as it allows attackers to perform actions they would normally be restricted from doing, such as installing software, modifying data, and accessing sensitive information.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system with a valid, but low-privileged, account. This could be achieved through phishing, compromised credentials, or other means.</li>
<li>The attacker identifies a vulnerable version of the Acronis Cyber Protect Cloud Agent running on the system.</li>
<li>The attacker leverages one of the unspecified vulnerabilities within the Acronis agent through local interaction with the Acronis agent service.</li>
<li>Successful exploitation of the vulnerability allows the attacker to bypass access controls and execute code with elevated privileges.</li>
<li>The attacker uses their newly acquired privileges to install malicious software, such as a keylogger or remote access trojan.</li>
<li>The attacker uses their privileges to access sensitive data, such as user credentials, financial records, or intellectual property.</li>
<li>The attacker establishes persistence on the system by creating a new privileged account or modifying existing system configurations.</li>
<li>The attacker uses the compromised system as a pivot point to further compromise other systems within the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities could allow attackers to gain complete control over affected systems. The number of potential victims is widespread, as Acronis Cyber Protect Cloud Agent is used by numerous organizations for data protection and backup purposes. If an attacker successfully escalates privileges, they can steal sensitive data, install malware, disrupt critical services, and compromise the entire network. The consequences could include significant financial losses, reputational damage, and legal liabilities.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor for suspicious processes spawned by the Acronis Cyber Protect Cloud Agent that do not align with normal activity.</li>
<li>Implement the Sigma rule <code>SuspiciousAcronisChildProcess</code> to detect unusual child processes spawned by the Acronis agent.</li>
<li>Investigate any unauthorized modifications to system configurations or user accounts, particularly those performed by the Acronis Cyber Protect Cloud Agent using the <code>RegistryModificationByAcronis</code> Sigma rule.</li>
<li>Apply the latest patches and updates to Acronis Cyber Protect Cloud Agent as soon as they become available from the vendor.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>privilege-escalation</category><category>acronis</category><category>agent</category></item><item><title>Multiple Vulnerabilities in SonicWall SonicOS Allow Privilege Escalation and DoS</title><link>https://feed.craftedsignal.io/briefs/2026-05-sonicwall-multiple-vulns/</link><pubDate>Thu, 30 Apr 2026 09:57:25 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-sonicwall-multiple-vulns/</guid><description>Multiple vulnerabilities in SonicWall SonicOS allow a remote attacker to escalate privileges, bypass security measures, or cause a denial-of-service condition.</description><content:encoded><![CDATA[<p>SonicWall SonicOS is susceptible to multiple vulnerabilities that could allow an attacker to gain elevated privileges, circumvent security controls, or trigger a denial-of-service (DoS) condition. While the specific nature of these vulnerabilities is not detailed in the advisory, the potential impact on affected SonicWall appliances is significant. Exploitation of these flaws could lead to unauthorized access to sensitive data, disruption of network services, and compromise of the overall security posture. Defenders should promptly investigate and apply any available patches or mitigations to address these vulnerabilities and prevent potential exploitation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<p>Due to lack of specifics in the advisory, the following is a generalized attack chain:</p>
<ol>
<li>An attacker identifies a vulnerable SonicWall appliance running SonicOS. This could be through vulnerability scanning or public disclosure of a zero-day exploit.</li>
<li>The attacker crafts a malicious request or payload specifically designed to exploit one of the unknown vulnerabilities in SonicOS. This may involve exploiting a weakness in the web management interface, VPN services, or other network protocols.</li>
<li>The attacker sends the crafted payload to the vulnerable SonicWall appliance over the network.</li>
<li>The vulnerable appliance processes the malicious payload, leading to a privilege escalation. The attacker gains administrative access to the SonicWall device.</li>
<li>With elevated privileges, the attacker modifies firewall rules, VPN configurations, or other security settings to bypass existing security measures.</li>
<li>Alternatively, the attacker exploits a different vulnerability that causes a denial-of-service condition, disrupting network connectivity and availability. This might involve crashing the device or overwhelming it with traffic.</li>
<li>The attacker leverages their access to gain a foothold in the internal network, potentially launching further attacks against other systems.</li>
<li>The attacker exfiltrates sensitive data, deploys malware, or performs other malicious activities, depending on their objectives.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities could result in significant damage. An attacker gaining elevated privileges could compromise the entire network, potentially impacting hundreds or thousands of users. A denial-of-service condition could disrupt critical business operations, leading to financial losses and reputational damage. The lack of specific details makes it difficult to quantify the exact scope of impact, but the potential for widespread disruption is substantial.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor network traffic for suspicious activity targeting SonicWall devices and investigate any anomalies (network_connection logs).</li>
<li>Implement strict access controls to the SonicWall management interface to limit exposure to potential attackers.</li>
<li>Deploy the generic Sigma rule to detect common web exploits (webserver logs).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>sonicwall</category><category>vulnerability</category><category>privilege-escalation</category><category>denial-of-service</category></item><item><title>Multiple Vulnerabilities in Red Hat Enterprise Linux Fast Datapath</title><link>https://feed.craftedsignal.io/briefs/2026-05-redhat-fast-datapath-vulns/</link><pubDate>Thu, 30 Apr 2026 09:57:14 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-redhat-fast-datapath-vulns/</guid><description>A remote, anonymous attacker can exploit multiple vulnerabilities in Fast Datapath for Red Hat Enterprise Linux to perform a denial-of-service attack or disclose sensitive information.</description><content:encoded><![CDATA[<p>Multiple vulnerabilities exist within the Fast Datapath component of Red Hat Enterprise Linux (RHEL). These vulnerabilities can be exploited by a remote, anonymous attacker without requiring authentication. Successful exploitation could lead to a denial-of-service (DoS) condition, rendering affected systems unavailable, or the unauthorized disclosure of sensitive information. While the specific nature of the vulnerabilities is not detailed, the broad impact necessitates immediate attention from security teams responsible for RHEL environments utilizing Fast Datapath. Defenders should focus on identifying and mitigating potential exploitation attempts targeting this component.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable RHEL system running Fast Datapath exposed to the network.</li>
<li>The attacker crafts a malicious network packet designed to exploit a memory corruption vulnerability within Fast Datapath.</li>
<li>The malicious packet is sent to the target system over the network.</li>
<li>Fast Datapath processes the packet, triggering a buffer overflow or other memory corruption error.</li>
<li>The memory corruption causes the Fast Datapath process to crash, leading to a denial-of-service condition.</li>
<li>(Alternative) The attacker exploits a separate vulnerability to read sensitive information from Fast Datapath&rsquo;s memory.</li>
<li>The attacker exfiltrates the disclosed information.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities could result in a denial of service, disrupting critical services and impacting business operations. The disclosure of sensitive information could also lead to further compromise, including unauthorized access to systems or data. The number of affected systems will depend on the prevalence of Fast Datapath deployments within RHEL environments.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect Suspicious Network Traffic to Fast Datapath</code> to identify potential exploitation attempts (see below).</li>
<li>Investigate and patch systems running Red Hat Enterprise Linux with Fast Datapath enabled as soon as patches are available from Red Hat.</li>
<li>Monitor network traffic for anomalous patterns that may indicate attempts to exploit these vulnerabilities.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>redhat</category><category>vulnerability</category><category>denial-of-service</category></item><item><title>CUPS Vulnerability Allows Local Privilege Escalation</title><link>https://feed.craftedsignal.io/briefs/2026-04-cups-privesc/</link><pubDate>Thu, 30 Apr 2026 09:43:58 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-cups-privesc/</guid><description>A local attacker can exploit a vulnerability in CUPS to execute arbitrary program code with administrator privileges on Linux and macOS systems.</description><content:encoded><![CDATA[<p>A vulnerability exists within the Common Unix Printing System (CUPS), a widely used printing system on Linux and macOS. A local attacker can leverage this flaw to execute arbitrary code with elevated, administrator-level privileges. While the specific details of the vulnerability are not provided in this brief, successful exploitation would grant the attacker full control over the affected system. Apple is the primary maintainer of CUPS. Defenders should focus on identifying and mitigating potential exploitation attempts by monitoring for suspicious CUPS-related processes and file modifications.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial local access to the target system through legitimate means or by exploiting a separate vulnerability.</li>
<li>The attacker identifies the vulnerable CUPS service running on the system.</li>
<li>The attacker crafts a malicious payload designed to exploit the CUPS vulnerability. This payload could be a specially crafted print job or a manipulated configuration file.</li>
<li>The attacker executes the malicious payload, triggering the vulnerability in CUPS.</li>
<li>Due to the vulnerability, CUPS executes the attacker&rsquo;s code with administrator privileges.</li>
<li>The attacker uses the elevated privileges to install persistent backdoors, modify system configurations, or escalate privileges further.</li>
<li>The attacker moves laterally within the network or exfiltrates sensitive data.</li>
<li>The final objective is complete system compromise, data theft, or disruption of services.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this CUPS vulnerability allows a local attacker to gain complete control over the affected system. This could lead to data theft, system disruption, or the installation of persistent backdoors. The widespread use of CUPS in Linux and macOS environments makes this a significant threat. If successfully exploited, attackers can achieve complete system compromise and potentially move laterally within the network.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor for suspicious CUPS processes being spawned by unusual parent processes using the <code>CUPS Spawning Suspicious Processes</code> Sigma rule.</li>
<li>Inspect CUPS configuration files for unauthorized modifications using the <code>CUPS Configuration File Modification</code> Sigma rule.</li>
<li>Investigate any unexplained privilege escalation events originating from the CUPS service.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cups</category><category>privilege-escalation</category><category>linux</category><category>macos</category></item><item><title>Sudo Privilege Escalation Vulnerabilities</title><link>https://feed.craftedsignal.io/briefs/2026-05-sudo-privesc/</link><pubDate>Thu, 30 Apr 2026 09:33:58 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-sudo-privesc/</guid><description>Multiple vulnerabilities in sudo allow a local attacker to bypass security precautions and escalate privileges to root.</description><content:encoded><![CDATA[<p>Multiple vulnerabilities in sudo allow a local attacker to escalate privileges to root. The vulnerabilities can be exploited locally, requiring an attacker to already have some level of access to the system. The exact nature of these vulnerabilities is not specified in the source material, but the impact is a complete compromise of the affected system. Defenders should implement detections for suspicious sudo usage patterns and ensure sudo is updated to the latest version.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the system via an unspecified method (e.g., compromised account, physical access).</li>
<li>The attacker identifies a vulnerable version of sudo installed on the system.</li>
<li>The attacker crafts a malicious sudo command or exploits a configuration flaw to leverage one of the vulnerabilities.</li>
<li>Sudo executes the malicious command with elevated privileges due to the vulnerability.</li>
<li>The attacker uses the elevated privileges to modify system files or execute commands as root.</li>
<li>The attacker installs a backdoor or creates a new privileged account for persistent access.</li>
<li>The attacker uses the escalated privileges to access sensitive data or perform other malicious actions.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities allows a local attacker to gain complete control of the affected system. This can lead to data theft, system corruption, or the installation of malware. The number of potential victims is dependent on the number of systems running vulnerable versions of sudo.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process creations for unexpected sudo usage patterns, especially commands run with root privileges that deviate from normal administrative tasks. (See Sigma rule &ldquo;Detect Suspicious Sudo Usage&rdquo;).</li>
<li>Enable audit logging for sudo to capture detailed information about command execution.</li>
<li>Regularly update sudo to the latest version to patch known vulnerabilities.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>privilege-escalation</category><category>sudo</category><category>linux</category></item><item><title>Multiple Vulnerabilities in Google Chrome</title><link>https://feed.craftedsignal.io/briefs/2026-05-chrome-vulns/</link><pubDate>Thu, 30 Apr 2026 09:09:14 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-chrome-vulns/</guid><description>Multiple vulnerabilities in Google Chrome could allow an attacker to execute arbitrary code, bypass security mechanisms, disclose and manipulate data, and cause a denial-of-service condition.</description><content:encoded><![CDATA[<p>Multiple unspecified vulnerabilities have been identified in Google Chrome. An attacker exploiting these vulnerabilities could potentially execute arbitrary code, circumvent security measures, expose and manipulate sensitive information, and trigger a denial-of-service condition. The specifics of these vulnerabilities, including CVE identifiers, are not detailed in the source document. The lack of detail makes it difficult to determine the scope of the attack, but successful exploitation could lead to significant compromise of systems running Chrome. Defenders should prioritize monitoring for suspicious activity within Chrome processes.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a vulnerable version of Google Chrome.</li>
<li>The attacker crafts a malicious web page or injects malicious code into a legitimate website.</li>
<li>A user visits the malicious web page or a compromised legitimate website using Google Chrome.</li>
<li>The attacker exploits a vulnerability in Chrome, such as a use-after-free or buffer overflow.</li>
<li>Successful exploitation allows the attacker to execute arbitrary code within the context of the Chrome process.</li>
<li>The attacker leverages the code execution to bypass security mechanisms like sandboxing.</li>
<li>The attacker gains access to sensitive data, such as cookies, browsing history, or credentials.</li>
<li>The attacker manipulates data or causes a denial-of-service condition by crashing the browser or consuming excessive resources.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities could allow an attacker to execute arbitrary code, bypass security mechanisms, disclose and manipulate data, and cause a denial-of-service condition. The impact ranges from data theft and credential compromise to complete system takeover, depending on the specific vulnerability and the attacker&rsquo;s objectives. While the exact number of potential victims is unknown, the widespread use of Chrome makes this a high-impact threat.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process creation events for suspicious child processes spawned by chrome.exe, especially those involving command-line interpreters or scripting engines. Use the &ldquo;Detect Suspicious Child Process of Chrome&rdquo; Sigma rule.</li>
<li>Inspect network connections originating from chrome.exe for unusual destinations or protocols. Deploy the &ldquo;Detect Outbound Connection from Chrome without User Interaction&rdquo; Sigma rule.</li>
<li>Implement web content filtering to block access to known malicious websites that might attempt to exploit Chrome vulnerabilities.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>chrome</category><category>vulnerability</category><category>code-execution</category><category>defense-evasion</category><category>information-disclosure</category><category>denial-of-service</category></item><item><title>PackageKit Local Privilege Escalation Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-packagekit-privesc/</link><pubDate>Thu, 30 Apr 2026 09:09:12 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-packagekit-privesc/</guid><description>A local attacker can exploit a vulnerability in PackageKit to escalate their privileges on a Linux system.</description><content:encoded><![CDATA[<p>A privilege escalation vulnerability exists within PackageKit, a suite of tools designed for software management across various Linux distributions. While specific details regarding the vulnerability are currently limited, the core issue allows a local attacker to elevate their privileges on a vulnerable system. This means an attacker with limited access could potentially gain root or administrator-level control, leading to full system compromise. Defenders need to prioritize detecting and mitigating this vulnerability to prevent potential exploitation and unauthorized access. The scope of this vulnerability impacts systems utilizing PackageKit for software management.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial limited access to the target Linux system through legitimate means or by exploiting a separate vulnerability.</li>
<li>The attacker identifies the presence of PackageKit on the system and its accessibility to the current user.</li>
<li>The attacker leverages the PackageKit vulnerability. Due to the lack of specific information on the vulnerability, this could involve manipulating PackageKit&rsquo;s API or command-line interface to perform actions with elevated privileges.</li>
<li>PackageKit, due to the vulnerability, incorrectly authorizes the attacker&rsquo;s request.</li>
<li>The attacker executes commands or scripts with elevated privileges, such as root.</li>
<li>The attacker installs malicious software or modifies system configurations to establish persistence.</li>
<li>The attacker further compromises the system, gaining access to sensitive data and potentially pivoting to other systems on the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows a local attacker to escalate their privileges to root, resulting in complete system compromise. This could lead to data theft, system disruption, and the installation of malware. The number of victims and specific sectors targeted are currently unknown. However, given the widespread use of PackageKit across various Linux distributions, a successful exploit could have broad implications.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process creations for unexpected PackageKit activity initiated by non-root users, using the &ldquo;PackageKit Privilege Escalation - Unexpected Process Invocation&rdquo; Sigma rule.</li>
<li>Implement the &ldquo;PackageKit Privilege Escalation - File Modification&rdquo; Sigma rule to detect unauthorized modifications to PackageKit configuration files or binaries.</li>
<li>Investigate any suspicious PackageKit processes identified through monitoring logs, focusing on those running with elevated privileges.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>privilege-escalation</category><category>linux</category></item><item><title>Multiple Vulnerabilities in Xen and Citrix Systems XenServer</title><link>https://feed.craftedsignal.io/briefs/2026-04-xen-xenserver-vulns/</link><pubDate>Thu, 30 Apr 2026 09:09:11 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-xen-xenserver-vulns/</guid><description>Multiple vulnerabilities exist in Xen and Citrix Systems XenServer that could allow an attacker to escalate privileges, bypass security measures, modify and disclose data, or cause a denial-of-service condition.</description><content:encoded><![CDATA[<p>Multiple vulnerabilities have been identified in Xen and Citrix Systems XenServer. Successful exploitation of these vulnerabilities could allow an attacker to elevate their privileges within the system, circumvent existing security measures designed to protect sensitive data and system integrity, modify data without authorization, disclose confidential information to unauthorized parties, or cause a denial-of-service condition, rendering the system unavailable to legitimate users. The absence of specific CVEs and exploitation details requires a proactive defensive approach. Defenders should focus on detecting anomalous behavior related to privilege escalation and unauthorized data access on affected systems.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system running a vulnerable version of Xen or XenServer, potentially through exploiting an existing vulnerability or misconfiguration.</li>
<li>The attacker leverages a vulnerability to escalate privileges from a low-privileged account to a higher-privileged account or system-level access.</li>
<li>With elevated privileges, the attacker bypasses security measures such as access controls or sandboxing to gain further control over the system.</li>
<li>The attacker exploits a vulnerability to modify sensitive data, such as configuration files or user databases, to further their objectives.</li>
<li>The attacker leverages another vulnerability to disclose sensitive information, such as cryptographic keys or user credentials, to an external attacker-controlled system.</li>
<li>The attacker exploits a denial-of-service vulnerability, causing the Xen or XenServer system to crash or become unresponsive.</li>
<li>The attacker disrupts critical services and impacts availability.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities can lead to a complete compromise of affected Xen and Citrix Systems XenServer environments. This can result in data breaches, system downtime, financial losses, and reputational damage. Organizations using these systems should prioritize patching and implementing security measures to mitigate the risk posed by these vulnerabilities. The impact can range from a single virtual machine being compromised to the entire hypervisor and all hosted VMs being affected.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rules provided below to your SIEM to detect potential exploitation attempts (Sigma rules).</li>
<li>Monitor logs for suspicious activity related to privilege escalation and unauthorized data access on Xen and Citrix Systems XenServer (log sources).</li>
<li>Investigate and remediate any identified vulnerabilities in Xen and Citrix Systems XenServer environments immediately.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>vulnerability</category><category>privilege-escalation</category><category>denial-of-service</category><category>information-disclosure</category></item><item><title>OpenPrinting CUPS Path Traversal Vulnerability (CVE-2026-34978)</title><link>https://feed.craftedsignal.io/briefs/2026-05-cups-path-traversal/</link><pubDate>Thu, 30 Apr 2026 08:46:41 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-cups-path-traversal/</guid><description>CVE-2026-34978 is a path traversal vulnerability in OpenPrinting CUPS that allows writing files outside the CacheDir/rss directory, potentially overwriting the job.cache file.</description><content:encoded><![CDATA[<p>CVE-2026-34978 is a path traversal vulnerability affecting OpenPrinting CUPS, a modular printing system that allows a computer to act as a print server. The vulnerability exists within the RSS notify-recipient-uri functionality, which improperly validates file paths. By crafting a malicious URI, an attacker can write files outside the intended CacheDir/rss directory. This can lead to the overwriting of critical system files, such as job.cache, potentially disrupting print services and, in some scenarios, leading to arbitrary code execution. This vulnerability was disclosed by Microsoft and requires immediate attention from system administrators to prevent potential exploitation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious RSS notify-recipient-uri containing a path traversal sequence (e.g., &ldquo;../&rdquo;).</li>
<li>The crafted URI is submitted to the CUPS server through a print job request or a configuration setting.</li>
<li>CUPS processes the URI and attempts to write a file to the specified location.</li>
<li>Due to the path traversal vulnerability, the file is written outside the intended CacheDir/rss directory.</li>
<li>The attacker overwrites a critical file, such as job.cache, with malicious content.</li>
<li>The CUPS server attempts to access the overwritten file.</li>
<li>If job.cache is successfully overwritten, the attacker can gain control of the print queue or cause a denial of service by corrupting the print system&rsquo;s state.</li>
<li>In a more advanced scenario, the attacker could potentially achieve arbitrary code execution by overwriting other binaries or configuration files.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-34978 can lead to denial of service by corrupting the printing system state. By overwriting critical CUPS files, an attacker can disrupt printing services. In more critical scenarios, the vulnerability could be leveraged to achieve arbitrary code execution, potentially allowing the attacker to gain complete control over the affected system. The scope of the impact is dependent on the permissions of the CUPS process and the specific files that are overwritten.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the security patch provided by OpenPrinting to address CVE-2026-34978.</li>
<li>Monitor CUPS server logs for suspicious activity related to file writes outside the CacheDir/rss directory. Consider deploying the provided Sigma rule <code>Detect CUPS Path Traversal File Write</code> to identify such attempts.</li>
<li>Implement strict input validation on any user-supplied data that is used to construct file paths within CUPS.</li>
<li>Regularly review and audit CUPS configuration settings to ensure that they are secure and do not allow for path traversal vulnerabilities.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>path traversal</category><category>cups</category><category>cve-2026-34978</category><category>file write</category></item><item><title>CVE-2026-5778 Integer Underflow in ChaCha Decryption Leads to Out-of-Bounds Access</title><link>https://feed.craftedsignal.io/briefs/2024-01-chacha-integer-underflow/</link><pubDate>Thu, 30 Apr 2026 08:43:55 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-chacha-integer-underflow/</guid><description>CVE-2026-5778 is an integer underflow vulnerability in the ChaCha decrypt path of an unspecified Microsoft product, leading to an out-of-bounds access issue.</description><content:encoded><![CDATA[<p>CVE-2026-5778 is a critical security vulnerability affecting an unspecified Microsoft product. This vulnerability stems from an integer underflow within the ChaCha decryption process. While the specific product affected is not detailed in the initial advisory, the vulnerability&rsquo;s nature suggests a potential impact on any Microsoft software utilizing ChaCha for encryption or decryption purposes. Successful exploitation of this vulnerability could lead to out-of-bounds memory access, potentially allowing attackers to execute arbitrary code or cause a denial-of-service condition. This vulnerability highlights the importance of secure coding practices and rigorous testing in cryptographic implementations. Defenders should monitor for updates and apply patches as soon as they become available.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious input designed to trigger the ChaCha decryption routine within the vulnerable Microsoft product.</li>
<li>The malicious input exploits a weakness in the bounds checking logic related to the ChaCha algorithm.</li>
<li>During the decryption process, a specially crafted integer value underflows.</li>
<li>This integer underflow results in an incorrect memory address calculation.</li>
<li>The incorrect memory address calculation leads to an out-of-bounds memory access.</li>
<li>The out-of-bounds access allows the attacker to read sensitive data or overwrite memory locations.</li>
<li>By overwriting critical memory locations, the attacker can potentially inject and execute arbitrary code.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-5778 can have severe consequences, including arbitrary code execution and denial of service. The impact will vary depending on the affected product and the specific context of the vulnerability. If exploited, this vulnerability could allow an attacker to gain complete control of a system or disrupt its availability, leading to significant data loss, system compromise, and reputational damage. The lack of specific victim and sector information makes assessing the scope difficult, but all organizations using Microsoft products should consider this a high-priority vulnerability.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor Microsoft&rsquo;s security update guide for specific product advisories related to CVE-2026-5778 and apply patches immediately upon release.</li>
<li>Implement runtime memory protection mechanisms to detect and prevent out-of-bounds memory access attempts.</li>
<li>Deploy the Sigma rule below to detect suspicious processes that may be exploiting this vulnerability via memory access patterns.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>integer-underflow</category><category>memory-corruption</category><category>cve</category></item><item><title>VetCoders mcp-server-semgrep OS Command Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-vetcoders-command-injection/</link><pubDate>Thu, 30 Apr 2026 00:17:01 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-vetcoders-command-injection/</guid><description>VetCoders mcp-server-semgrep version 1.0.0 is vulnerable to remote OS command injection due to manipulation of the ID argument in several functions of the MCP Interface component.</description><content:encoded><![CDATA[<p>A critical OS command injection vulnerability has been identified in VetCoders mcp-server-semgrep version 1.0.0. The vulnerability resides within the MCP Interface component, specifically affecting the <code>analyze_results</code>, <code>filter_results</code>, <code>export_results</code>, <code>compare_results</code>, <code>scan_directory</code>, and <code>create_rule</code> functions in the <code>src/index.ts</code> file. Successful exploitation allows for remote attackers to inject and execute arbitrary operating system commands on the affected system. The vulnerability is publicly known and actively exploitable. VetCoders has released version 1.0.1 to address this issue, with patch <code>141335da044e53c3f5b315e0386e01238405b771</code> containing the fix. Defenders should prioritize upgrading to version 1.0.1 to mitigate this risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable instance of VetCoders mcp-server-semgrep version 1.0.0.</li>
<li>The attacker crafts a malicious request targeting one of the vulnerable functions: <code>analyze_results</code>, <code>filter_results</code>, <code>export_results</code>, <code>compare_results</code>, <code>scan_directory</code>, or <code>create_rule</code>.</li>
<li>The malicious request includes a manipulated <code>ID</code> argument designed to inject OS commands.</li>
<li>The application fails to properly sanitize or validate the <code>ID</code> argument.</li>
<li>The application executes the injected OS command using a function such as <code>exec</code>, <code>system</code>, or equivalent within the affected functions in <code>src/index.ts</code>.</li>
<li>The injected command executes with the privileges of the mcp-server-semgrep process.</li>
<li>The attacker gains arbitrary code execution on the server.</li>
<li>The attacker can then perform actions such as data exfiltration, lateral movement, or denial of service.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows a remote attacker to execute arbitrary operating system commands on the affected server. This could lead to complete system compromise, including data theft, modification, or destruction. Depending on the server&rsquo;s role and the attacker&rsquo;s objectives, this could result in significant financial loss, reputational damage, and disruption of services. There is no information about specific victim counts or targeted sectors.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to VetCoders mcp-server-semgrep version 1.0.1 to remediate the vulnerability as identified in CVE-2026-7446.</li>
<li>Monitor web server logs for suspicious requests targeting the <code>/src/index.ts</code> file with unusual or potentially malicious input in the <code>ID</code> argument, using the Sigma rules provided.</li>
<li>Implement input validation and sanitization for all user-supplied input, especially the <code>ID</code> parameter, to prevent command injection attacks.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>command-injection</category><category>vulnerability</category><category>mcp-server-semgrep</category></item><item><title>Multiple Vulnerabilities in Wireshark Lead to Remote Code Execution and Denial of Service</title><link>https://feed.craftedsignal.io/briefs/2026-04-wireshark-vulns/</link><pubDate>Thu, 30 Apr 2026 00:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-wireshark-vulns/</guid><description>Multiple vulnerabilities in Wireshark versions 4.4.x before 4.4.15 and 4.6.x before 4.6.5 could allow remote attackers to execute arbitrary code, cause a denial of service, or compromise data confidentiality.</description><content:encoded><![CDATA[<p>On April 30, 2026, CERT-FR published an advisory regarding multiple vulnerabilities discovered in Wireshark, a widely used network protocol analyzer. The vulnerabilities affect Wireshark versions 4.4.x prior to 4.4.15 and 4.6.x prior to 4.6.5. Successful exploitation of these vulnerabilities could lead to remote code execution (RCE), denial-of-service (DoS) conditions, and unauthorized disclosure of sensitive data. Given Wireshark&rsquo;s role in network analysis, these vulnerabilities pose a significant risk to organizations using the tool for monitoring and troubleshooting network traffic. These vulnerabilities highlight the importance of keeping software up to date, especially software that handles sensitive data.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker crafts a malicious network packet or capture file.</li>
<li>The victim opens the malicious packet or capture file in a vulnerable version of Wireshark (4.4.x before 4.4.15 or 4.6.x before 4.6.5).</li>
<li>Wireshark parses the packet or file using a vulnerable dissector.</li>
<li>The vulnerable dissector fails to properly handle the malformed data, leading to a buffer overflow or other memory corruption issue.</li>
<li>The memory corruption allows the attacker to overwrite critical program data or inject malicious code.</li>
<li>The injected code is executed within the context of the Wireshark process.</li>
<li>The attacker gains control of the Wireshark process.</li>
<li>The attacker performs unauthorized actions, such as exfiltrating sensitive data or causing a denial-of-service condition.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities can have severe consequences, including remote code execution, potentially allowing an attacker to gain complete control over the affected system. A denial-of-service condition can disrupt network analysis activities and hinder incident response efforts. Data confidentiality can be compromised if an attacker gains access to sensitive network traffic data captured by Wireshark. The impact is significant for network administrators and security professionals who rely on Wireshark for network monitoring and analysis.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately upgrade Wireshark to version 4.4.15 or 4.6.5 or later to patch the vulnerabilities (refer to the Wireshark security advisories wnpa-sec-2026-08 through wnpa-sec-2026-50).</li>
<li>Implement network access controls to limit exposure of Wireshark instances to untrusted network traffic, reducing the likelihood of processing malicious packets.</li>
<li>Deploy the Sigma rule &ldquo;Detect Wireshark opening network capture files from untrusted locations&rdquo; to identify potential exploitation attempts.</li>
<li>Monitor systems running vulnerable versions of Wireshark for suspicious activity, such as unexpected process crashes or unauthorized network connections.</li>
<li>Consider using alternative packet analysis tools or sandboxing Wireshark for analyzing potentially malicious network traffic.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>wireshark</category><category>vulnerability</category><category>rce</category><category>dos</category></item><item><title>Multiple Vulnerabilities in MISP Threat Intelligence Platform</title><link>https://feed.craftedsignal.io/briefs/2026-04-misp-vulns/</link><pubDate>Thu, 30 Apr 2026 00:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-misp-vulns/</guid><description>Multiple vulnerabilities in MISP versions prior to 2.5.37 allow attackers to perform privilege escalation, SQL injection (SQLi), and security policy bypass.</description><content:encoded><![CDATA[<p>Multiple vulnerabilities have been discovered in MISP (Malware Information Sharing Platform and Threat Sharing) versions prior to 2.5.37. These flaws could allow a remote attacker to perform a variety of malicious actions, including escalating privileges to gain unauthorized access, injecting SQL code to potentially read or modify database contents, and bypassing existing security policies to execute restricted operations. These vulnerabilities pose a significant risk to organizations using MISP for threat intelligence, potentially leading to data breaches, unauthorized access to sensitive information, or disruption of threat intelligence operations. Users should upgrade to version 2.5.37 or later as soon as possible.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a vulnerable MISP instance running a version prior to 2.5.37.</li>
<li>The attacker crafts a malicious SQL injection payload designed to exploit a SQLi vulnerability within the MISP application, potentially targeting input fields or API endpoints.</li>
<li>The attacker sends the crafted SQL injection payload to the vulnerable MISP instance through a web request or API call.</li>
<li>The MISP application improperly processes the malicious SQL payload, leading to the execution of attacker-controlled SQL commands against the underlying database.</li>
<li>The attacker exploits a privilege escalation vulnerability to gain elevated privileges within the MISP application, potentially bypassing access controls.</li>
<li>The attacker leverages the security policy bypass vulnerability to circumvent security restrictions and execute unauthorized actions within the MISP system.</li>
<li>The attacker gains unauthorized access to sensitive data stored within the MISP instance, such as threat intelligence reports, indicators of compromise (IOCs), or user credentials.</li>
<li>The attacker exfiltrates the stolen data or uses the compromised system to launch further attacks against other systems or organizations.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities could allow an attacker to gain unauthorized access to sensitive threat intelligence data stored within MISP, potentially impacting organizations relying on MISP for security operations. An attacker could steal sensitive data, modify existing intelligence, or inject false information, impacting trust in the platform. While the number of victims is not specified in the report, any organization using a vulnerable version of MISP is at risk. The severity of impact would depend on the sensitivity of the data stored within the compromised MISP instance.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade MISP to version 2.5.37 or later to remediate the vulnerabilities as per the vendor&rsquo;s security bulletin.</li>
<li>Deploy web application firewall (WAF) rules to detect and block SQL injection attempts targeting MISP, mitigating potential SQLi exploitation.</li>
<li>Monitor MISP logs (category <code>webserver</code>, product <code>linux</code>) for suspicious activity, such as unexpected SQL errors or unauthorized access attempts, to identify potential exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>misp</category><category>vulnerability</category><category>sqli</category><category>privilege-escalation</category><category>security-policy-bypass</category></item><item><title>Multiple Vulnerabilities in Exim Mail Transfer Agent</title><link>https://feed.craftedsignal.io/briefs/2026-04-exim-vulns/</link><pubDate>Thu, 30 Apr 2026 00:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-exim-vulns/</guid><description>Multiple vulnerabilities in Exim versions prior to 4.99.2 allow an attacker to cause a remote denial of service, a breach of data confidentiality, and an unspecified security problem.</description><content:encoded><![CDATA[<p>On April 30, 2026, CERT-FR published an advisory regarding multiple vulnerabilities affecting Exim versions prior to 4.99.2. These vulnerabilities could allow a remote attacker to perform a denial-of-service attack, achieve unauthorized data access, or cause other unspecified security impacts. The vulnerabilities are detailed in the Exim security bulletin cve-2026-04.1. Due to the widespread use of Exim as a mail transfer agent (MTA), these vulnerabilities pose a significant risk to organizations that have not yet applied the necessary patches. Successful exploitation can disrupt email services and potentially lead to sensitive information disclosure.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies an Exim server running a vulnerable version (prior to 4.99.2).</li>
<li>The attacker crafts a malicious network packet targeting a specific vulnerability, such as CVE-2026-40684, CVE-2026-40685, CVE-2026-40686, or CVE-2026-40687.</li>
<li>The attacker sends the crafted packet to the vulnerable Exim server via SMTP.</li>
<li>The Exim process receives the malicious packet and processes it due to missing or insufficient input validation.</li>
<li>Depending on the exploited vulnerability, this could lead to a denial-of-service condition by crashing the Exim process.</li>
<li>Alternatively, successful exploitation may lead to an information leak by disclosing sensitive data from Exim&rsquo;s memory.</li>
<li>In other cases, the unspecified security issue could grant further access to the underlying system, depending on the nature of vulnerability.</li>
<li>The attacker exploits this access to achieve goals like data exfiltration or further system compromise (depending on the specific vulnerability triggered).</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities could lead to denial-of-service conditions, preventing legitimate users from sending and receiving emails. Data confidentiality could also be compromised if sensitive information is exposed. The advisory does not specify the number of victims or specific sectors targeted, but given the widespread use of Exim, a large number of organizations could be affected. Failure to patch Exim servers could result in significant disruption of email services and potential data breaches.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately upgrade Exim servers to version 4.99.2 or later to remediate the vulnerabilities mentioned in the Exim security bulletin cve-2026-04.1.</li>
<li>Monitor network traffic for suspicious activity targeting Exim servers, and correlate with the known CVEs (CVE-2026-40684, CVE-2026-40685, CVE-2026-40686, CVE-2026-40687).</li>
<li>Implement rate limiting and connection filtering to mitigate potential denial-of-service attacks against Exim servers.</li>
<li>Deploy a web server rule that monitors for requests matching known attack patterns related to Exim vulnerabilities.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>vulnerability</category><category>denial-of-service</category><category>information-disclosure</category></item><item><title>Komari Agent Abused as SYSTEM-Level Backdoor</title><link>https://feed.craftedsignal.io/briefs/2026-04-komari-red/</link><pubDate>Thu, 30 Apr 2026 00:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-komari-red/</guid><description>Threat actors are abusing the Komari monitoring agent, a project hosted on GitHub, as a SYSTEM-level backdoor following initial access through compromised VPN credentials and lateral movement via Impacket.</description><content:encoded><![CDATA[<p>Huntress discovered threat actors leveraging the Komari monitoring agent as a SYSTEM-level backdoor within a partner environment. Komari, a Go-based project on GitHub with over 4,000 stars, is designed as a remote-control and monitoring tool. This incident marks a publicly documented case of Komari being abused in a real-world intrusion. The attackers compromised VPN credentials to gain initial access before deploying the Komari agent as a persistent backdoor. Komari inherently functions as a command-and-control (C2) channel, with features enabled by default. The threat actor installed Komari as a Windows service named &ldquo;Windows Update Service&rdquo; using NSSM, directly from the official GitHub repository, which avoided the need for attacker-controlled staging infrastructure. The initial discovery occurred on April 16, 2026.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access:</strong> The attacker establishes an SSLVPN session on a FortiGate device from IP address 45.153.34[.]132, authenticating as a legitimate user, [User 1].</li>
<li><strong>Internal Reconnaissance:</strong> After establishing the VPN connection, the attacker&rsquo;s workstation, identified as VM8514, begins enumerating the internal network from the tunnel IP 10.212.134[.]200.</li>
<li><strong>Lateral Movement:</strong> Using Impacket&rsquo;s smbexec.py, the attacker enables Remote Desktop Protocol (RDP) on the target workstation, [REDACTED-WRKSTN].</li>
<li><strong>RDP Access:</strong> The attacker establishes an interactive RDP session to [REDACTED-WRKSTN].</li>
<li><strong>Persistence - Service Creation:</strong> The attacker uses the Non-Sucking Service Manager (NSSM) to install the Komari agent as a persistent Windows service named &ldquo;Windows Update Service&rdquo;.</li>
<li><strong>Agent Download:</strong> The Komari agent is downloaded from raw.githubusercontent[.]com/komari-monitor/komari-agent using a PowerShell one-liner executed directly on the system.</li>
<li><strong>Command and Control:</strong> The Komari agent establishes a persistent WebSocket connection to its server, allowing the attacker to execute arbitrary commands (PowerShell/sh) and initiate interactive PTY reverse shell sessions.</li>
<li><strong>Maintain Access &amp; Execute:</strong> The attacker maintains SYSTEM-level access via the persistent Komari agent, enabling ongoing remote command execution and control over the compromised workstation.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>This attack demonstrates how readily available monitoring tools can be weaponized for malicious purposes. A single compromised account led to the establishment of a SYSTEM-level backdoor on a critical workstation. This could result in data exfiltration, further lateral movement within the network, and potentially ransomware deployment. Microsoft Defender quarantined an earlier registry hive dumping attempt, preventing further data compromise. The number of affected organizations is currently unknown, but any organization using the Komari agent without proper security controls is potentially at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor FortiGate logs for SSLVPN sessions originating from suspicious IP addresses (45.153.34[.]132) and unusual ASN&rsquo;s (ASN 51396) to detect potentially compromised credentials.</li>
<li>Implement the Sigma rule &ldquo;Detect Komari Agent Installation via PowerShell&rdquo; to identify installations of the Komari agent.</li>
<li>Monitor process creation events for the execution of <code>nssm.exe</code> installing a service named &ldquo;Windows Update Service&rdquo; to detect suspicious service installations.</li>
<li>Block the domain raw.githubusercontent[.]com at the DNS resolver or web proxy to prevent the downloading of malicious tools and payloads.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>komari</category><category>backdoor</category><category>nssm</category><category>github</category><category>rat</category><category>reverse shell</category></item><item><title>n8n MCP OAuth Client XSS Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-n8n-xss-oauth/</link><pubDate>Wed, 29 Apr 2026 21:25:44 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-n8n-xss-oauth/</guid><description>n8n is vulnerable to cross-site scripting (XSS) via a malicious MCP OAuth client, allowing an unauthenticated attacker to inject arbitrary JavaScript into an authenticated user's session.</description><content:encoded><![CDATA[<p>n8n, a workflow automation platform, is susceptible to a cross-site scripting (XSS) vulnerability (CVE-2026-42235) related to the registration of malicious MCP OAuth clients. An unauthenticated attacker can register an OAuth client with a crafted <code>client_name</code> containing malicious JavaScript. This vulnerability exists in versions prior to 2.14.2 and also affects versions 2.17.0 to 2.17.3 and 2.18.0. A successful exploit allows the attacker to execute arbitrary JavaScript within a victim&rsquo;s authenticated n8n session, potentially leading to credential theft, session token theft, workflow manipulation, or privilege escalation. Defenders should prioritize patching to version 2.14.2 or later to mitigate the risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker registers a malicious MCP OAuth client with a crafted <code>client_name</code> containing XSS payload.</li>
<li>A victim user navigates to the n8n instance and is presented with the malicious OAuth consent dialog.</li>
<li>The victim user authorizes the malicious OAuth client, unknowingly injecting the attacker&rsquo;s script into their session.</li>
<li>A second user, possibly an administrator, revokes the OAuth access granted to the malicious client.</li>
<li>This revocation triggers a toast notification to the original victim user.</li>
<li>The toast notification renders the attacker&rsquo;s injected script from the crafted <code>client_name</code>.</li>
<li>The victim user clicks on the link within the toast notification.</li>
<li>The injected JavaScript executes within the victim&rsquo;s authenticated n8n browser session, enabling the attacker to perform malicious actions such as stealing credentials, manipulating workflows, or escalating privileges.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this XSS vulnerability can lead to significant compromise of an n8n instance. Attackers can steal user credentials and session tokens, allowing them to impersonate legitimate users. Malicious actors could also modify or create workflows, leading to data breaches, system disruption, or unauthorized access. Privilege escalation is also possible, potentially granting attackers administrative control over the n8n platform. The number of potential victims depends on the exposure and user base of the vulnerable n8n instances.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade n8n to version 2.14.2 or later to patch CVE-2026-42235, as recommended in the advisory.</li>
<li>Deploy the Sigma rule <code>Detect Suspicious n8n MCP OAuth Client Registration</code> to identify attempts to register OAuth clients with suspicious names.</li>
<li>If immediate patching is not feasible, restrict access to the n8n instance and the MCP OAuth registration endpoint to trusted users only, as suggested in the advisory&rsquo;s workaround.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>xss</category><category>oauth</category><category>n8n</category><category>CVE-2026-42235</category></item><item><title>n8n Python Task Runner Sandbox Escape Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-n8n-python-sandbox-escape/</link><pubDate>Wed, 29 Apr 2026 21:21:50 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-n8n-python-sandbox-escape/</guid><description>A sandbox escape vulnerability exists in n8n's Python Task Runner that allows an authenticated user with workflow creation/modification permissions to achieve arbitrary code execution on the task runner container, impacting n8n instances with the Python Task Runner enabled; upgrade to versions 1.123.32, 2.17.4, 2.18.1 or later to remediate the vulnerability.</description><content:encoded><![CDATA[<p>A sandbox escape vulnerability has been identified in the Python Task Runner of n8n, a workflow automation platform. This vulnerability, assigned CVE-2026-42234, allows an authenticated user who has permissions to create or modify workflows that contain a Python Code Node to escape the sandbox environment. Successful exploitation leads to arbitrary code execution within the task runner container. This issue specifically impacts n8n instances where the Python Task Runner is enabled. The vulnerability affects n8n versions prior to 1.123.32, versions between 2.17.0 and 2.17.4, and versions between 2.18.0 and 2.18.1. Defenders should prioritize patching their n8n instances or implementing available workarounds.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains authenticated access to an n8n instance.</li>
<li>The attacker verifies the Python Task Runner is enabled.</li>
<li>The attacker creates or modifies an n8n workflow.</li>
<li>The workflow includes a Python Code Node.</li>
<li>The attacker crafts malicious Python code designed to escape the sandbox. This code could leverage vulnerabilities in the sandbox implementation to execute commands outside of the intended restricted environment.</li>
<li>The attacker triggers the workflow execution.</li>
<li>The malicious Python code executes, successfully escaping the sandbox.</li>
<li>Arbitrary code is executed on the task runner container, potentially leading to compromise of the n8n instance or the underlying infrastructure.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to execute arbitrary code within the n8n task runner container. This can lead to a full compromise of the n8n instance, allowing the attacker to steal sensitive data, disrupt services, or pivot to other systems within the network. While the exact number of affected instances is unknown, any n8n deployment with the Python Task Runner enabled and vulnerable versions are at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade n8n to versions 1.123.32, 2.17.4, 2.18.1 or later to remediate the vulnerability as recommended by the vendor.</li>
<li>If upgrading is not immediately possible, limit workflow creation and editing permissions to fully trusted users only, as mentioned in the advisory.</li>
<li>As a temporary measure, disable the Python Code node by adding <code>n8n-nodes-base.code</code> to the <code>NODES_EXCLUDE</code> environment variable, or disable the Python Task Runner entirely as documented in the advisory.</li>
<li>Monitor container execution for unexpected processes spawned from the n8n task runner container using the &ldquo;Detect Suspicious Process Execution from n8n Task Runner&rdquo; Sigma rule.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sandbox-escape</category><category>code-execution</category><category>vulnerability</category></item><item><title>Relative Path Traversal Vulnerability in mcpo-simple-server</title><link>https://feed.craftedsignal.io/briefs/2026-04-mcpo-simple-server-traversal/</link><pubDate>Wed, 29 Apr 2026 21:16:22 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-mcpo-simple-server-traversal/</guid><description>A relative path traversal vulnerability exists in getsimpletool mcpo-simple-server &lt;= 0.2.0, allowing remote attackers to delete arbitrary files via manipulation of the `detail` argument in the `delete_shared_prompt` function.</description><content:encoded><![CDATA[<p>A relative path traversal vulnerability, identified as CVE-2026-7404, has been discovered in getsimpletool mcpo-simple-server up to version 0.2.0. The vulnerability resides within the <code>delete_shared_prompt</code> function of the <code>src/mcpo_simple_server/services/prompt_manager/base_manager.py</code> file. By manipulating the <code>detail</code> argument, a remote attacker can traverse the file system and delete arbitrary files. The vulnerability is remotely exploitable, and proof-of-concept exploit code is publicly available. The maintainers of the getsimpletool project have been notified of this vulnerability but have not yet responded. This poses a significant risk to systems running mcpo-simple-server, as it could lead to unauthorized file deletion and potential system compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable mcpo-simple-server instance running version 0.2.0 or earlier.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>delete_shared_prompt</code> function.</li>
<li>The malicious request includes a manipulated <code>detail</code> argument containing relative path traversal sequences (e.g., <code>../</code>).</li>
<li>The server-side application processes the request and passes the manipulated <code>detail</code> argument to the <code>delete_shared_prompt</code> function.</li>
<li>The <code>delete_shared_prompt</code> function uses the attacker-controlled <code>detail</code> argument to construct a file path.</li>
<li>Due to the path traversal sequences, the resulting file path points to a location outside the intended directory.</li>
<li>The application attempts to delete the file at the attacker-specified location.</li>
<li>If permissions allow, the file is successfully deleted, leading to potential data loss or system instability.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to delete arbitrary files on the affected system. This can lead to data loss, application malfunction, or even complete system compromise, depending on the files targeted for deletion. Given the public availability of exploit code, systems running vulnerable versions of mcpo-simple-server are at immediate risk. The impact is especially severe if the targeted files are critical system files or application data.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade mcpo-simple-server to a patched version that addresses CVE-2026-7404, if available from the vendor.</li>
<li>Deploy the Sigma rule <code>Detect Mcpo-Simple-Server Path Traversal Attempt</code> to identify exploitation attempts in web server logs.</li>
<li>Implement strict input validation and sanitization on the <code>detail</code> argument of the <code>delete_shared_prompt</code> function, if patching is not immediately feasible.</li>
<li>Monitor web server logs for suspicious activity, such as requests containing path traversal sequences.</li>
<li>Restrict file system permissions to limit the impact of successful path traversal attacks.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>path-traversal</category><category>web-application</category><category>cve-2026-7404</category></item><item><title>Alloksoft Video Joiner Buffer Overflow Vulnerability (CVE-2018-25315)</title><link>https://feed.craftedsignal.io/briefs/2026-04-alloksoft-overflow/</link><pubDate>Wed, 29 Apr 2026 20:16:27 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-alloksoft-overflow/</guid><description>Alloksoft Video Joiner 4.6.1217 is vulnerable to a local buffer overflow (CVE-2018-25315) allowing attackers to execute arbitrary code via a crafted license name.</description><content:encoded><![CDATA[<p>Alloksoft Video Joiner version 4.6.1217 is susceptible to a buffer overflow vulnerability (CVE-2018-25315). This vulnerability allows a local attacker to execute arbitrary code on a vulnerable system. The attack involves crafting a malicious string and supplying it to the &ldquo;License Name&rdquo; field of the application during registration. Exploitation occurs due to the application&rsquo;s failure to properly validate the length of the input, allowing a buffer overflow to occur. The attacker leverages Structured Exception Handler (SEH) overwrite and injects shellcode to gain code execution in the context of the application. This vulnerability was reported in April 2026.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains local access to a system with Alloksoft Video Joiner 4.6.1217 installed.</li>
<li>The attacker identifies the &ldquo;License Name&rdquo; field within the application&rsquo;s registration process as a potential vulnerability point.</li>
<li>The attacker crafts a malicious string that exceeds the expected buffer size for the &ldquo;License Name&rdquo; field.</li>
<li>The malicious string includes an SEH overwrite payload, redirecting execution flow to the attacker&rsquo;s controlled memory.</li>
<li>The crafted string also contains shellcode designed to perform arbitrary code execution.</li>
<li>The attacker inputs the malicious string into the &ldquo;License Name&rdquo; field and submits the registration form.</li>
<li>The application attempts to process the oversized string, triggering a buffer overflow.</li>
<li>The SEH overwrite redirects execution to the injected shellcode, granting the attacker arbitrary code execution within the context of the Alloksoft Video Joiner process.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this buffer overflow vulnerability allows a local attacker to execute arbitrary code with the privileges of the Alloksoft Video Joiner application. This could lead to complete system compromise, data theft, or installation of malware. While the specific number of affected users is unknown, any system running the vulnerable version of the software is at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process creations for <code>VideoJoiner.exe</code> spawning unusual child processes, indicative of code execution stemming from the overflow.</li>
<li>Consider deploying network egress rules to block connections originating from <code>VideoJoiner.exe</code> to external IPs to prevent command and control.</li>
<li>Implement application control policies to prevent the execution of unsigned or untrusted code within the context of <code>VideoJoiner.exe</code>.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>buffer-overflow</category><category>code-execution</category><category>cve-2018-25315</category><category>windows</category></item><item><title>Allok Soft WMV Converter Buffer Overflow Vulnerability (CVE-2018-25314)</title><link>https://feed.craftedsignal.io/briefs/2026-04-alloksoft-buffer-overflow/</link><pubDate>Wed, 29 Apr 2026 20:16:27 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-alloksoft-buffer-overflow/</guid><description>Allok Soft WMV to AVI MPEG DVD WMV Converter 4.6.1217 is vulnerable to a buffer overflow, allowing local attackers to execute arbitrary code via a crafted License Name field.</description><content:encoded><![CDATA[<p>Allok Soft WMV to AVI MPEG DVD WMV Converter version 4.6.1217 is susceptible to a buffer overflow vulnerability (CVE-2018-25314). This vulnerability allows a local attacker to execute arbitrary code on a targeted system. The attack vector involves supplying an overly long string to the &ldquo;License Name&rdquo; field of the application, triggering the buffer overflow. Successful exploitation allows attackers to inject and execute shellcode within the context of the application, potentially leading to privilege escalation and complete system compromise. This vulnerability was reported in April 2026.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker crafts a malicious input string containing shellcode.</li>
<li>The malicious string is designed to overwrite the Structured Exception Handler (SEH).</li>
<li>Attacker opens Allok Soft WMV to AVI MPEG DVD WMV Converter 4.6.1217.</li>
<li>Attacker inputs the crafted string into the &ldquo;License Name&rdquo; field within the application&rsquo;s interface.</li>
<li>The application attempts to process the oversized input, triggering a buffer overflow.</li>
<li>The overflow overwrites the SEH with a pointer to the attacker-controlled shellcode.</li>
<li>An exception is triggered within the application.</li>
<li>The SEH handler is invoked, redirecting execution flow to the injected shellcode, enabling arbitrary code execution.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2018-25314 allows a local attacker to execute arbitrary code with the privileges of the Allok Soft WMV to AVI MPEG DVD WMV Converter application. This could lead to sensitive data theft, installation of malware, or complete system compromise. While specific victim counts are unavailable, any system running the vulnerable software is at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process creations for <code>wmvconverter.exe</code> spawning unusual child processes using the <code>Alloksoft WMV Converter Spawning Suspicious Process</code> Sigma rule.</li>
<li>Monitor for unexpected registry modifications performed by <code>wmvconverter.exe</code> using the <code>Alloksoft WMV Converter Registry Modification</code> Sigma rule.</li>
<li>Consider removing Allok Soft WMV to AVI MPEG DVD WMV Converter 4.6.1217 from systems where it is not essential, as no patch is available.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>buffer-overflow</category><category>code-execution</category><category>cve-2018-25314</category></item><item><title>SysGauge Pro 4.6.12 Local Buffer Overflow Vulnerability (CVE-2018-25307)</title><link>https://feed.craftedsignal.io/briefs/2026-04-sysgauge-bo/</link><pubDate>Wed, 29 Apr 2026 20:16:26 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-sysgauge-bo/</guid><description>SysGauge Pro 4.6.12 is vulnerable to a local buffer overflow in the Register function, allowing local attackers to overwrite the structured exception handler and execute arbitrary code by supplying a crafted unlock key during registration.</description><content:encoded><![CDATA[<p>SysGauge Pro version 4.6.12 is susceptible to a local buffer overflow vulnerability (CVE-2018-25307) within its registration process. This vulnerability allows a local attacker to gain arbitrary code execution with the privileges of the SysGauge Pro application. Specifically, by providing a maliciously crafted &ldquo;Unlock Key&rdquo; during the registration, an attacker can overwrite the Structured Exception Handler (SEH). This overwrite allows the injection of shellcode, leading to the execution of attacker-controlled code within the context of the application. This is a local vulnerability, meaning the attacker needs local system access to exploit it. The report dates back to 2018, but was only recently published in the NVD database.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains local access to the target system.</li>
<li>Attacker identifies that SysGauge Pro 4.6.12 is installed.</li>
<li>Attacker launches SysGauge Pro.</li>
<li>Attacker initiates the registration process within SysGauge Pro.</li>
<li>Attacker provides a crafted &ldquo;Unlock Key&rdquo; containing shellcode designed to overwrite the Structured Exception Handler (SEH).</li>
<li>The application attempts to process the overly long &ldquo;Unlock Key&rdquo; without proper bounds checking.</li>
<li>The buffer overflow occurs, overwriting the SEH with the attacker&rsquo;s shellcode address.</li>
<li>When an exception occurs within the application, the overwritten SEH is invoked, redirecting execution to the attacker&rsquo;s shellcode, leading to arbitrary code execution with application privileges.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows a local attacker to execute arbitrary code with the privileges of the SysGauge Pro application. This could lead to complete system compromise if the application is running with elevated privileges. The impact includes potential data theft, modification of system settings, or installation of malware. Given that this is a local exploit, the primary risk is to systems where untrusted users have local access.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process creations for SysGauge Pro (SysGauge.exe) spawning unusual child processes to detect potential exploitation attempts, using a <code>process_creation</code> Sigma rule.</li>
<li>Consider deploying application control or whitelisting to prevent execution of unsigned or untrusted executables within the SysGauge Pro process.</li>
<li>Since no patch is available, consider uninstalling SysGauge Pro 4.6.12 from systems where the risk outweighs the benefit of the software.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>vulnerability</category><category>buffer_overflow</category><category>privilege_escalation</category></item><item><title>BuddyPress Xprofile Custom Fields Type 2.6.3 Remote Code Execution via Arbitrary File Deletion</title><link>https://feed.craftedsignal.io/briefs/2026-04-buddypress-rce/</link><pubDate>Wed, 29 Apr 2026 20:16:26 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-buddypress-rce/</guid><description>CVE-2018-25308 is a remote code execution vulnerability in BuddyPress Xprofile Custom Fields Type 2.6.3 that allows authenticated users to delete arbitrary files on the server by manipulating POST parameters.</description><content:encoded><![CDATA[<p>BuddyPress Xprofile Custom Fields Type 2.6.3 is vulnerable to a remote code execution vulnerability, identified as CVE-2018-25308. This flaw enables authenticated users to execute arbitrary code on the server by deleting arbitrary files. The attack involves manipulating unescaped POST parameters, specifically <code>field_hiddenfile</code> and <code>field_deleteimg</code>, during profile editing actions. Successful exploitation allows attackers to unlink files from the server, potentially disrupting services or gaining unauthorized access. This vulnerability was published on 2026-04-29 and poses a significant threat to BuddyPress installations that have not applied the necessary patches.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker authenticates to a BuddyPress site running the vulnerable Xprofile Custom Fields Type 2.6.3 plugin.</li>
<li>The attacker navigates to their profile editing page.</li>
<li>The attacker crafts a malicious HTTP POST request to the profile update endpoint.</li>
<li>Within the POST request, the <code>field_hiddenfile</code> and <code>field_deleteimg</code> parameters are manipulated to point to arbitrary files on the server.</li>
<li>The server-side script processes the crafted POST request without proper sanitization or validation of the file paths.</li>
<li>The <code>unlink()</code> function or an equivalent file deletion function is called with the attacker-controlled file paths.</li>
<li>The targeted files are deleted from the server file system.</li>
<li>The attacker can potentially delete critical system files or web application files, leading to remote code execution or denial of service.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2018-25308 allows authenticated attackers to delete arbitrary files on the server. This can lead to a denial-of-service condition if critical system files are removed. The vulnerability can also potentially lead to remote code execution if the attacker is able to delete and replace executable files or inject malicious code into configuration files. While the number of victims is unknown, all BuddyPress installations using the vulnerable plugin are susceptible.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply any available patches or updates for BuddyPress Xprofile Custom Fields Type to address CVE-2018-25308.</li>
<li>Implement input validation and sanitization on the server-side to prevent manipulation of file paths in POST parameters.</li>
<li>Monitor web server logs for suspicious POST requests targeting the profile update endpoint with unusual <code>field_hiddenfile</code> and <code>field_deleteimg</code> parameter values (reference the attack chain).</li>
<li>Deploy the Sigma rule provided to detect exploitation attempts based on the manipulation of specific POST parameters (reference the Sigma rule).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>rce</category><category>file-deletion</category><category>wordpress</category></item><item><title>XATABoost CMS 1.0.0 SQL Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-xataboost-sql-injection/</link><pubDate>Wed, 29 Apr 2026 20:16:25 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-xataboost-sql-injection/</guid><description>XATABoost CMS 1.0.0 is vulnerable to union-based SQL injection, allowing unauthenticated attackers to manipulate database queries by injecting SQL code through the id parameter via GET requests to news.php, enabling extraction of sensitive database information.</description><content:encoded><![CDATA[<p>XATABoost CMS 1.0.0 is susceptible to a union-based SQL injection vulnerability (CVE-2018-25300). This flaw enables unauthenticated attackers to inject malicious SQL code through the <code>id</code> parameter in <code>news.php</code> via GET requests. By crafting specific payloads, attackers can manipulate database queries to extract sensitive information. This vulnerability poses a significant risk, as it could lead to data breaches, account compromise, and further exploitation of the affected system. The targeted exploitation vector is the <code>news.php</code> file, making it a critical area for monitoring and mitigation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies the <code>news.php</code> endpoint.</li>
<li>The attacker crafts a malicious GET request targeting the <code>id</code> parameter within <code>news.php</code>. This payload contains SQL injection code.</li>
<li>The server-side application fails to properly sanitize the <code>id</code> parameter before constructing the SQL query.</li>
<li>The injected SQL code is executed against the database.</li>
<li>The attacker uses UNION clauses to extract sensitive information from other database tables.</li>
<li>The extracted data is returned as part of the HTTP response.</li>
<li>The attacker parses the HTTP response to retrieve the exfiltrated data.</li>
<li>The attacker uses the exfiltrated data for further malicious activities (e.g., privilege escalation, lateral movement).</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability can result in the unauthorized disclosure of sensitive information stored in the XATABoost CMS database. This includes user credentials, financial data, or other confidential information. The impact could range from a single compromised system to a full-scale data breach, depending on the scope and sensitivity of the data stored within the database. Without further context on affected deployments, the number of potential victims is hard to quantify, but any public-facing XATABoost CMS 1.0.0 instance is vulnerable.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect XATABoost CMS SQL Injection Attempt</code> to identify malicious GET requests targeting the <code>news.php</code> endpoint and tune for your environment.</li>
<li>Implement input validation and sanitization on the <code>id</code> parameter in the <code>news.php</code> file to prevent SQL injection attacks.</li>
<li>Upgrade to a patched version of XATABoost CMS or implement a web application firewall (WAF) rule to mitigate the vulnerability.</li>
<li>Monitor web server logs for suspicious activity related to <code>news.php</code> and unusual SQL queries.</li>
<li>Review and restrict database user permissions to minimize the impact of successful SQL injection attacks.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>web-application</category><category>cve</category></item><item><title>Prime95 Local Buffer Overflow Vulnerability (CVE-2018-25299)</title><link>https://feed.craftedsignal.io/briefs/2026-04-prime95-overflow/</link><pubDate>Wed, 29 Apr 2026 20:16:25 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-prime95-overflow/</guid><description>Prime95 version 29.4b8 contains a local buffer overflow vulnerability, allowing attackers to execute arbitrary code by exploiting structured exception handling (SEH) mechanisms through a malicious payload in the PrimeNet proxy hostname field.</description><content:encoded><![CDATA[<p>Prime95 is a popular application used for finding Mersenne prime numbers, often employed for stress-testing computer hardware. Version 29.4b8 of Prime95 is vulnerable to a local buffer overflow (CVE-2018-25299). An attacker with local access can exploit this vulnerability to execute arbitrary code on the system. The vulnerability stems from insufficient input validation when handling the optional proxy hostname field within the PrimeNet connection settings. By providing an overly long string, an attacker can overwrite parts of the process memory, specifically the Structured Exception Handling (SEH) chain. This allows them to redirect the flow of execution to attacker-controlled code, leading to arbitrary command execution. This vulnerability was published on April 29, 2026, and poses a significant risk to systems running the vulnerable software.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains local access to a system running Prime95 29.4b8.</li>
<li>The attacker modifies the PrimeNet connection settings within Prime95.</li>
<li>The attacker supplies a malicious payload within the optional &ldquo;proxy hostname&rdquo; field, exceeding the expected buffer size.</li>
<li>When Prime95 attempts to process the overly long proxy hostname, a buffer overflow occurs.</li>
<li>The overflow overwrites the Structured Exception Handling (SEH) record on the stack.</li>
<li>When an exception occurs within Prime95 (triggered intentionally or unintentionally), the overwritten SEH record points to attacker-controlled code.</li>
<li>The system attempts to handle the exception, causing execution to jump to the attacker-controlled code injected via the proxy hostname.</li>
<li>The attacker&rsquo;s code executes with the privileges of the Prime95 process, potentially leading to system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to execute arbitrary code on the affected system. This can lead to complete system compromise, data theft, or installation of malware. Since the vulnerability is local, an attacker needs prior access to the system, either through social engineering, stolen credentials, or other means. However, once access is obtained, exploitation is relatively straightforward. This vulnerability has a high CVSS score of 8.4, reflecting the significant potential impact.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to a patched version of Prime95 that addresses CVE-2018-25299. Check the vendor&rsquo;s website (<a href="https://www.mersenne.org/download/#download">https://www.mersenne.org/download/#download</a>) for updates.</li>
<li>Implement strong input validation on any configuration files or settings that Prime95 reads to prevent buffer overflows.</li>
<li>Monitor process creation events for unusual activity originating from the Prime95 executable, which could indicate exploitation. Deploy the Sigma rule provided to detect suspicious command line arguments.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>buffer-overflow</category><category>code-execution</category><category>cve-2018-25299</category></item><item><title>Easy MPEG to DVD Burner 1.7.11 SEH Buffer Overflow</title><link>https://feed.craftedsignal.io/briefs/2026-04-easy-mpeg-seh-overflow/</link><pubDate>Wed, 29 Apr 2026 20:16:25 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-easy-mpeg-seh-overflow/</guid><description>Easy MPEG to DVD Burner 1.7.11 contains a structured exception handling (SEH) local buffer overflow vulnerability that allows local attackers to execute arbitrary code by supplying a malicious username string.</description><content:encoded><![CDATA[<p>Easy MPEG to DVD Burner 1.7.11 is vulnerable to a structured exception handling (SEH) local buffer overflow. This vulnerability allows a local attacker to execute arbitrary code on a targeted system. The vulnerability can be triggered by supplying a malicious username string to the application. The attacker exploits this vulnerability by overwriting the SEH handler, redirecting execution flow to attacker-controlled shellcode, which can then execute arbitrary commands. This vulnerability exists due to insufficient bounds checking when handling user-supplied data, specifically the username. Successful exploitation allows for arbitrary code execution within the context of the application.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker crafts a malicious input string designed to trigger a buffer overflow in Easy MPEG to DVD Burner 1.7.11.</li>
<li>The malicious string includes junk data to fill the buffer, SEH chain pointers to control the exception handling process, and shellcode containing the attacker&rsquo;s desired commands.</li>
<li>The attacker provides the crafted input as a username during application execution, likely via a configuration file or command-line argument.</li>
<li>The application&rsquo;s vulnerable code attempts to copy the attacker-controlled username into a fixed-size buffer without proper bounds checking.</li>
<li>The buffer overflows, overwriting the SEH handler with the attacker-controlled SEH chain pointers.</li>
<li>An exception is triggered within the application due to the buffer overflow, causing the SEH handler to be invoked.</li>
<li>The overwritten SEH handler redirects execution to the attacker&rsquo;s shellcode.</li>
<li>The shellcode executes arbitrary commands, such as launching calc.exe, giving the attacker control over the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows a local attacker to execute arbitrary code with the privileges of the user running Easy MPEG to DVD Burner 1.7.11. This can lead to complete system compromise, data theft, or denial of service. While there is no mention of the number of victims or specific sectors targeted in the provided document, the high CVSS score (8.4) indicates a significant risk. The impact would allow lateral movement and further compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Block execution of Easy MPEG to DVD Burner 1.7.11 if it is not a required application.</li>
<li>Monitor process creations for unusual processes originating from Easy MPEG to DVD Burner using the process creation rule below.</li>
<li>Monitor for unexpected process execution, such as calc.exe (mentioned in the advisory), following the execution of Easy MPEG to DVD Burner 1.7.11.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>buffer overflow</category><category>seh overflow</category><category>cve-2018-25301</category></item><item><title>Allok Video to DVD Burner Stack-Based Buffer Overflow Vulnerability (CVE-2018-25303)</title><link>https://feed.craftedsignal.io/briefs/2026-04-allok-video-buffer-overflow/</link><pubDate>Wed, 29 Apr 2026 20:16:25 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-allok-video-buffer-overflow/</guid><description>Allok Video to DVD Burner 2.6.1217 contains a stack-based buffer overflow vulnerability (CVE-2018-25303) in the License Name field, allowing a local attacker to execute arbitrary code by triggering a structured exception handler (SEH) overwrite.</description><content:encoded><![CDATA[<p>A stack-based buffer overflow vulnerability exists in Allok Video to DVD Burner version 2.6.1217. This vulnerability, identified as CVE-2018-25303, resides within the &ldquo;License Name&rdquo; field of the application. A local attacker can exploit this flaw by crafting a malicious input designed to overwrite the Structured Exception Handler (SEH). Successful exploitation enables the attacker to execute arbitrary code within the context of the application. The vulnerability was reported on 2026-04-29. This is important for defenders because successful exploitation can lead to complete system compromise on vulnerable machines.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains local access to a system with Allok Video to DVD Burner 2.6.1217 installed.</li>
<li>The attacker crafts a malicious input string consisting of 780 bytes of arbitrary data.</li>
<li>The attacker appends SEH chain pointers and shellcode to the crafted input string.</li>
<li>The attacker opens the Allok Video to DVD Burner application and navigates to the registration window.</li>
<li>The attacker pastes the malicious input string into the &ldquo;License Name&rdquo; field.</li>
<li>The application attempts to process the oversized input, triggering the buffer overflow.</li>
<li>The SEH is overwritten with the attacker&rsquo;s controlled pointers.</li>
<li>The shellcode is executed, giving the attacker arbitrary code execution on the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows a local attacker to execute arbitrary code within the context of the Allok Video to DVD Burner application. This could lead to complete system compromise, including data theft, installation of malware, or other malicious activities. The vulnerability affects version 2.6.1217 of the software. The number of potential victims depends on the number of installations of the vulnerable software.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process creations for Allok Video to DVD Burner and unusual child processes using the process creation rule below.</li>
<li>Monitor for registry modifications performed by the vulnerable application that may indicate persistence.</li>
<li>Due to the age of the application, consider whether it should continue to be used within the environment.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve</category><category>buffer overflow</category><category>seh overwrite</category></item><item><title>Allok AVI to DVD SVCD VCD Converter Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-allok-buffer-overflow/</link><pubDate>Wed, 29 Apr 2026 20:16:25 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-allok-buffer-overflow/</guid><description>Allok AVI to DVD SVCD VCD Converter 4.0.1217 is vulnerable to a SEH-based buffer overflow, allowing local attackers to execute arbitrary code by providing a malicious string in the License Name field.</description><content:encoded><![CDATA[<p>Allok AVI to DVD SVCD VCD Converter version 4.0.1217 is susceptible to a structured exception handling (SEH) based buffer overflow vulnerability. This vulnerability enables a local attacker to execute arbitrary code by crafting a specific payload. The attack involves providing a malicious string in the License Name field of the application. This can be exploited without requiring any prior authentication, making it a significant security concern for systems running the vulnerable software. The vulnerability was reported on April 29, 2026.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker prepares a malicious string payload consisting of junk data, an NSEH bypass, an SEH handler address, and shellcode.</li>
<li>The attacker opens the Allok AVI to DVD SVCD VCD Converter application.</li>
<li>The attacker navigates to the registration or license activation section of the software.</li>
<li>The attacker pastes the malicious string into the License Name field.</li>
<li>The attacker clicks the &ldquo;Register&rdquo; button, triggering the buffer overflow.</li>
<li>The overflow overwrites the SEH frame, redirecting execution flow to the attacker-controlled NSEH bypass.</li>
<li>The NSEH bypass redirects execution to the SEH handler address, which points to the attacker&rsquo;s shellcode.</li>
<li>The shellcode executes, allowing the attacker to run arbitrary code on the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this buffer overflow vulnerability allows a local attacker to execute arbitrary code with the privileges of the user running the Allok AVI to DVD SVCD VCD Converter. This could lead to complete system compromise, data theft, or installation of malware. Given the ease of exploitation (no authentication required, local access only) this poses a significant risk to systems with the vulnerable software installed.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Allok AVI Converter SEH Buffer Overflow</code> to detect exploitation attempts based on process creation events.</li>
<li>Monitor for abnormal process execution originating from the Allok AVI to DVD SVCD VCD Converter application to identify potential exploitation (process_creation).</li>
<li>Consider removing the Allok AVI to DVD SVCD VCD Converter 4.0.1217 until a patch is available, due to the high severity and ease of exploitation.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>buffer-overflow</category><category>seh</category><category>cve-2018-25302</category></item><item><title>Path Traversal Vulnerability in mail-mcp-bridge</title><link>https://feed.craftedsignal.io/briefs/2026-04-mail-mcp-bridge-path-traversal/</link><pubDate>Wed, 29 Apr 2026 16:16:29 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-mail-mcp-bridge-path-traversal/</guid><description>A path traversal vulnerability exists in fatbobman mail-mcp-bridge version 1.3.3 and earlier, allowing a remote attacker to read arbitrary files by manipulating the message_ids argument in the src/mail_mcp_server.py file.</description><content:encoded><![CDATA[<p>A path traversal vulnerability, identified as CVE-2026-7386, has been discovered in fatbobman mail-mcp-bridge version 1.3.3 and prior. The vulnerability resides within the <code>src/mail_mcp_server.py</code> file, specifically affecting an unspecified function that handles the <code>message_ids</code> argument. A remote attacker can exploit this flaw by crafting malicious requests containing manipulated <code>message_ids</code> values. Successful exploitation allows the attacker to traverse the file system and potentially read sensitive files. An exploit is publicly available. The vulnerability is addressed in version 1.3.4, with patch <code>638b162b26532e32fa8d8047f638537dbdfe197a</code>.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable instance of mail-mcp-bridge running version 1.3.3 or earlier.</li>
<li>The attacker crafts a malicious HTTP request targeting the endpoint that processes <code>message_ids</code>.</li>
<li>Within the request, the attacker includes a <code>message_ids</code> parameter containing path traversal sequences (e.g., <code>../</code>).</li>
<li>The server-side application, without proper validation, processes the manipulated <code>message_ids</code> value.</li>
<li>The application attempts to access a file path constructed using the attacker-controlled input.</li>
<li>Due to the path traversal sequences, the application accesses a file outside the intended directory.</li>
<li>The application reads the contents of the traversed file.</li>
<li>The attacker retrieves the contents of the file, gaining access to sensitive information.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to read arbitrary files on the server. This could lead to the exposure of sensitive data such as configuration files, application source code, or user data. With a CVSS v3.1 base score of 7.3, this vulnerability poses a significant risk. The number of affected installations is unknown, but any instance of mail-mcp-bridge running a vulnerable version is susceptible to attack.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade fatbobman mail-mcp-bridge to version 1.3.4 or later to apply the patch <code>638b162b26532e32fa8d8047f638537dbdfe197a</code> that resolves CVE-2026-7386.</li>
<li>Deploy the Sigma rule &ldquo;Detect mail-mcp-bridge Path Traversal Attempt&rdquo; to identify exploitation attempts in web server logs.</li>
<li>Implement input validation on the <code>message_ids</code> parameter to prevent path traversal attacks in web applications, even after patching.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>path-traversal</category><category>vulnerability</category><category>web-application</category></item><item><title>EyouCMS SQL Injection Vulnerability (CVE-2026-7389)</title><link>https://feed.craftedsignal.io/briefs/2026-04-eyoucms-sql-injection/</link><pubDate>Wed, 29 Apr 2026 16:16:29 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-eyoucms-sql-injection/</guid><description>A remote SQL injection vulnerability (CVE-2026-7389) exists in EyouCMS versions up to 1.7.9 due to improper handling of the 'sort_asc' argument in the GetSortData function, potentially allowing attackers to execute arbitrary SQL commands.</description><content:encoded><![CDATA[<p>A security vulnerability, CVE-2026-7389, has been identified in EyouCMS, specifically affecting versions up to 1.7.9. This vulnerability stems from insufficient sanitization of user-supplied input passed to the <code>sort_asc</code> argument of the <code>GetSortData</code> function located in the <code>application/common.php</code> file. An unauthenticated, remote attacker can exploit this vulnerability to inject malicious SQL queries into the application. Publicly available exploits increase the risk of widespread exploitation. The project maintainers were notified but have not yet addressed the issue, making timely detection and mitigation critical for defenders.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies an EyouCMS instance running a vulnerable version (&lt;= 1.7.9).</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>GetSortData</code> function within <code>application/common.php</code>.</li>
<li>The crafted request includes a manipulated <code>sort_asc</code> argument containing a SQL injection payload.</li>
<li>The application processes the request without proper sanitization of the <code>sort_asc</code> parameter.</li>
<li>The unsanitized input is incorporated into a SQL query executed by the application.</li>
<li>The injected SQL code modifies the query logic, allowing the attacker to potentially bypass authentication.</li>
<li>The attacker can read sensitive data from the database, such as user credentials or configuration information.</li>
<li>The attacker may escalate privileges or gain complete control of the database server, leading to data exfiltration or service disruption.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability (CVE-2026-7389) could allow an attacker to read, modify, or delete sensitive data stored in the EyouCMS database. This could include user credentials, financial information, or other confidential data. Since an exploit is publicly available, organizations using vulnerable versions of EyouCMS are at increased risk of compromise, potentially leading to data breaches, financial loss, and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect EyouCMS SQL Injection via sort_asc Parameter</code> to identify exploitation attempts in web server logs.</li>
<li>Inspect web server logs for suspicious requests targeting <code>application/common.php</code> with unusual parameters in the <code>sort_asc</code> argument based on the Sigma rule.</li>
<li>Apply input validation and sanitization to the <code>sort_asc</code> parameter in the <code>GetSortData</code> function to prevent SQL injection.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>cve-2026-7389</category><category>web-application</category></item><item><title>OpenClaw StrictInlineEval Approval Bypass Vulnerability (CVE-2026-42423)</title><link>https://feed.craftedsignal.io/briefs/2026-04-openclaw-approval-bypass/</link><pubDate>Wed, 29 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-openclaw-approval-bypass/</guid><description>OpenClaw before 2026.4.8 contains an approval-timeout fallback mechanism that allows attackers to bypass strictInlineEval explicit-approval requirements on gateway and node exec hosts, leading to arbitrary command execution.</description><content:encoded><![CDATA[<p>OpenClaw, a software application, is vulnerable to an approval-timeout bypass (CVE-2026-42423) affecting versions prior to 2026.4.8. This vulnerability stems from a flaw in the strictInlineEval approval mechanism, where an approval-timeout fallback allows the execution of inline eval commands without explicit user approval. An attacker with low privileges can exploit this vulnerability on gateway and node exec hosts to circumvent the intended security boundary. This can lead to unauthorized command execution and potential system compromise. Defenders should upgrade to version 2026.4.8 or implement mitigations to prevent exploitation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains low-privilege access to a gateway or node exec host running a vulnerable version of OpenClaw (prior to 2026.4.8).</li>
<li>The attacker crafts a malicious inline eval command intended to be executed on the system.</li>
<li>The attacker attempts to execute the malicious inline eval command, triggering the strictInlineEval approval mechanism.</li>
<li>The system initiates the explicit approval process, awaiting user confirmation before executing the command.</li>
<li>The attacker waits for the pre-configured approval-timeout to expire without providing any explicit approval.</li>
<li>The approval-timeout fallback mechanism is triggered due to the lack of user approval within the defined timeframe.</li>
<li>The system bypasses the explicit-approval requirement due to the timeout fallback, and the malicious inline eval command is executed.</li>
<li>The attacker achieves arbitrary command execution on the affected host, potentially escalating privileges and compromising the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-42423 allows an attacker to bypass intended security boundaries and execute arbitrary commands on OpenClaw gateway and node exec hosts. This can lead to privilege escalation, unauthorized data access, and potential system compromise. The severity is rated as high (CVSS 7.5) due to the potential for significant impact on confidentiality, integrity, and availability. The number of affected systems depends on the deployment scope of vulnerable OpenClaw versions.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade OpenClaw to version 2026.4.8 or later to patch CVE-2026-42423.</li>
<li>Monitor OpenClaw logs for indicators of unauthorized inline eval command execution, focusing on unexpected activity following approval timeouts.</li>
<li>Implement network segmentation to limit the blast radius of potential compromises, should an attacker successfully exploit CVE-2026-42423 and gain unauthorized access.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>vulnerability</category><category>privilege-escalation</category><category>execution</category></item><item><title>OpenClaw Security Bypass Vulnerability Allows Persistent Browser Profile Mutation</title><link>https://feed.craftedsignal.io/briefs/2026-04-openclaw-bypass/</link><pubDate>Wed, 29 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-openclaw-bypass/</guid><description>OpenClaw before 2026.4.8 contains a security bypass vulnerability in node.invoke(browser.proxy) that allows attackers to circumvent the browser.request persistent profile-mutation guard and modify browser configurations.</description><content:encoded><![CDATA[<p>OpenClaw, a browser automation tool, is vulnerable to a security bypass (CVE-2026-42431) affecting versions prior to 2026.4.8. This vulnerability resides in the <code>node.invoke(browser.proxy)</code> function, which improperly allows mutation of persistent browser profiles. An attacker can leverage this flaw to bypass the <code>browser.request</code> persistent profile-mutation guard. Successful exploitation leads to unauthorized modification of browser configurations, potentially enabling malicious activities such as injecting malicious extensions, altering browser settings, or compromising user data. The vulnerability was publicly disclosed on April 28, 2026.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable OpenClaw instance running a version prior to 2026.4.8.</li>
<li>Attacker crafts a malicious script that calls the <code>node.invoke(browser.proxy)</code> function.</li>
<li>The script is designed to bypass the <code>browser.request</code> persistent profile-mutation guard.</li>
<li>The <code>node.invoke(browser.proxy)</code> function is exploited to mutate the persistent browser profile.</li>
<li>The browser configuration is modified to include malicious settings, such as altered proxy settings or injected malicious extensions.</li>
<li>OpenClaw uses the modified browser profile for subsequent browser automation tasks.</li>
<li>The malicious configurations allow the attacker to intercept or modify browser traffic.</li>
<li>The attacker gains unauthorized access to sensitive information or injects malicious content into the browser session.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-42431 allows attackers to modify browser configurations, potentially leading to data theft, session hijacking, or the injection of malicious content. This can compromise user credentials, financial data, or other sensitive information handled by the browser. The vulnerability affects all users of OpenClaw versions prior to 2026.4.8. While the exact number of affected users is unknown, the impact is high due to the potential for widespread compromise of browser profiles and associated data.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade OpenClaw to version 2026.4.8 or later to patch CVE-2026-42431.</li>
<li>Monitor OpenClaw scripts for suspicious calls to <code>node.invoke(browser.proxy)</code> using network connection monitoring.</li>
<li>Implement strict access controls to limit who can modify OpenClaw scripts and browser profiles.</li>
<li>Deploy the Sigma rule provided below to detect attempts to bypass the <code>browser.request</code> persistent profile-mutation guard.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>security-bypass</category><category>browser-automation</category><category>profile-mutation</category></item><item><title>OpenClaw Role Bypass Vulnerability in device.token.rotate Function</title><link>https://feed.craftedsignal.io/briefs/2026-04-openclaw-role-bypass/</link><pubDate>Wed, 29 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-openclaw-role-bypass/</guid><description>OpenClaw before 2026.4.8 contains a role bypass vulnerability in the device.token.rotate function, allowing attackers to mint tokens for unapproved roles and bypass intended approval processes.</description><content:encoded><![CDATA[<p>OpenClaw, a yet-to-be-defined software, is vulnerable to a role bypass flaw affecting versions prior to 2026.4.8. This vulnerability, identified as CVE-2026-42422, resides within the <code>device.token.rotate</code> function. Attackers can exploit this weakness to mint tokens associated with roles that have not undergone proper authorization. The core issue lies in the ability to bypass the intended device role-upgrade pairing mechanism, granting unauthorized access to roles and scopes. This circumvention allows malicious actors to either maintain existing roles illegitimately or create new ones without appropriate approval, potentially leading to significant privilege escalation and unauthorized data access within the affected system. Defenders need to ensure they are running at least version 2026.4.8.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies an OpenClaw instance running a version prior to 2026.4.8.</li>
<li>Attacker interacts with the <code>device.token.rotate</code> function.</li>
<li>The attacker crafts a request to mint a token, specifying an unapproved role.</li>
<li>Due to the vulnerability, the system incorrectly validates the request.</li>
<li>A token is minted successfully with the unapproved role.</li>
<li>The attacker uses the minted token to authenticate to the OpenClaw instance.</li>
<li>The attacker now has access to resources and functionalities associated with the unapproved role.</li>
<li>The attacker performs actions with elevated privileges, bypassing intended access controls.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-42422 allows attackers to bypass intended authorization mechanisms within OpenClaw. This can lead to significant privilege escalation, potentially granting unauthorized access to sensitive data and critical system functionalities. The impact depends on the specific roles and scopes that can be minted, but it could range from data breaches to complete system compromise. While the exact number of affected systems remains unclear, any OpenClaw deployment prior to version 2026.4.8 is vulnerable.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade all OpenClaw installations to version 2026.4.8 or later to remediate CVE-2026-42422.</li>
<li>Monitor logs for unusual activity related to the <code>device.token.rotate</code> function, particularly requests attempting to mint tokens with unexpected or unapproved roles.</li>
<li>Deploy the Sigma rule &ldquo;Detect OpenClaw Token Minting with Unapproved Roles&rdquo; to detect exploitation attempts targeting CVE-2026-42422.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>role-bypass</category><category>privilege-escalation</category><category>cve-2026-42422</category></item><item><title>OpenClaw QQ Bot Media Download SSRF Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-openclaw-ssrf/</link><pubDate>Wed, 29 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-openclaw-ssrf/</guid><description>OpenClaw before 2026.4.8 is vulnerable to server-side request forgery (SSRF) in QQ Bot media download paths, allowing attackers to bypass SSRF protections and access internal resources.</description><content:encoded><![CDATA[<p>OpenClaw, a QQ Bot platform, is susceptible to a server-side request forgery (SSRF) vulnerability. This flaw exists in versions prior to 2026.4.8 within the media download paths of the QQ Bot functionality. Specifically, the vulnerability allows attackers to bypass existing SSRF protections. By exploiting unprotected media fetch endpoints, malicious actors can potentially gain unauthorized access to internal resources and circumvent established allowlist policies. This vulnerability poses a significant risk to the confidentiality and integrity of systems and data accessible from the OpenClaw server. Successful exploitation can lead to information disclosure, denial of service, or even remote code execution on internal systems, depending on the accessible resources.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies an OpenClaw instance running a version prior to 2026.4.8.</li>
<li>The attacker crafts a malicious URL targeting the QQ Bot media download functionality. This URL contains a payload designed to exploit the SSRF vulnerability.</li>
<li>The attacker injects the malicious URL into the QQ Bot&rsquo;s media download path, bypassing expected SSRF protections.</li>
<li>OpenClaw processes the crafted URL without proper validation, initiating a request to an attacker-controlled internal resource.</li>
<li>The OpenClaw server makes a request to the specified internal resource, potentially exposing sensitive information or triggering unintended actions.</li>
<li>The internal resource responds to the OpenClaw server, and the response is potentially relayed back to the attacker or used to further compromise the system.</li>
<li>The attacker gains unauthorized access to internal resources or sensitive data due to the successful SSRF attack.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SSRF vulnerability (CVE-2026-41914) can lead to the disclosure of sensitive information from internal systems, potentially affecting all users and services dependent on the compromised OpenClaw instance. The severity is amplified by the potential to bypass existing SSRF protections, increasing the attack surface and difficulty of detection. Impact ranges from information disclosure to potential compromise of other internal services, depending on the specific internal resources accessible from the OpenClaw server.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade OpenClaw to version 2026.4.8 or later to patch the SSRF vulnerability (CVE-2026-41914).</li>
<li>Deploy the Sigma rule <code>Detect Suspicious OpenClaw SSRF Attempt</code> to identify potential exploitation attempts targeting the vulnerable media download paths.</li>
<li>Implement strict network segmentation to limit the impact of a successful SSRF attack by restricting access to sensitive internal resources from the OpenClaw server.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>ssrf</category><category>cve-2026-41914</category><category>openclaw</category></item><item><title>OpenClaw Privilege Escalation via Trusted Proxy Authentication (CVE-2026-41404)</title><link>https://feed.craftedsignal.io/briefs/2026-04-openclaw-privilege-escalation/</link><pubDate>Wed, 29 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-openclaw-privilege-escalation/</guid><description>OpenClaw before 2026.3.31 contains an incomplete scope-clearing vulnerability in trusted-proxy authentication mode that allows operator.admin privilege escalation by declaring operator scopes on non-Control-UI clients.</description><content:encoded><![CDATA[<p>OpenClaw before version 2026.3.31 is vulnerable to a privilege escalation flaw within its trusted-proxy authentication mechanism. This vulnerability, identified as CVE-2026-41404, stems from an incomplete scope clearing process. The core issue lies in the ability for attackers to declare operator scopes on clients that are not part of the Control-UI. This leads to a situation where these self-declared scopes are erroneously persisted on authentication paths that bear identity. This allows an attacker to escalate their privileges to operator.admin, effectively gaining administrative control over the OpenClaw instance. This poses a significant risk to the confidentiality, integrity, and availability of systems relying on OpenClaw for authentication and authorization.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies an OpenClaw instance using trusted-proxy authentication mode.</li>
<li>The attacker crafts a request to a non-Control-UI client, declaring operator scopes within the authentication header.</li>
<li>OpenClaw&rsquo;s incomplete scope clearing mechanism fails to remove the attacker-declared operator scopes.</li>
<li>The attacker authenticates through an identity-bearing authentication path.</li>
<li>Due to the persisted operator scopes, the attacker is granted elevated privileges.</li>
<li>The attacker leverages the escalated operator.admin privileges to perform unauthorized actions. This could include modifying configurations, accessing sensitive data, or disrupting services.</li>
<li>The attacker maintains persistent access by creating new administrator accounts.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to gain operator.admin privileges within the OpenClaw environment. This can lead to complete control over the affected OpenClaw instance. Consequences include unauthorized access to sensitive data, modification of system configurations, and disruption of services. The severity is compounded by the fact that the vulnerability exists in the authentication mechanism, potentially affecting all users and systems relying on OpenClaw for access control.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade OpenClaw to version 2026.3.31 or later to patch CVE-2026-41404.</li>
<li>Implement strict input validation on authentication headers to prevent the declaration of unauthorized scopes.</li>
<li>Deploy the Sigma rule <code>Detect OpenClaw Unauthorized Scope Declaration</code> to monitor for suspicious authentication requests.</li>
<li>Review and audit existing OpenClaw configurations to identify and remove any unauthorized operator scopes.</li>
<li>Monitor logs for successful logins with unexpected admin privileges.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>privilege-escalation</category><category>authentication</category><category>cve-2026-41404</category></item></channel></rss>