<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Ajenti — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/ajenti/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 03 Apr 2026 03:57:43 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/ajenti/feed.xml" rel="self" type="application/rss+xml"/><item><title>Ajenti Authorization Bypass Vulnerability (CVE-2026-35175)</title><link>https://feed.craftedsignal.io/briefs/2026-04-ajenti-auth-bypass/</link><pubDate>Fri, 03 Apr 2026 03:57:43 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-ajenti-auth-bypass/</guid><description>Ajenti versions before 2.2.15 contain an authorization bypass vulnerability that allows authenticated non-superuser users to install custom packages, potentially leading to privilege escalation and system compromise.</description><content:encoded><![CDATA[<p>Ajenti is a web-based system administration panel. Prior to version 2.2.15, a flaw exists in the <code>auth_users</code> authentication plugin that permits authenticated users lacking superuser privileges to install custom packages. This vulnerability, identified as CVE-2026-35175, allows a low-privileged user to bypass intended authorization checks, potentially escalating their privileges and compromising the entire system. An attacker could leverage this vulnerability to install malicious packages, execute arbitrary code with elevated privileges, and gain unauthorized access to sensitive data or system functionalities. Organizations using vulnerable versions of Ajenti are at risk of internal privilege escalation attacks.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the Ajenti web panel with a valid, non-superuser account using the <code>auth_users</code> plugin.</li>
<li>The attacker navigates to the custom package installation feature within the Ajenti web interface.</li>
<li>The attacker uploads a malicious custom package designed to execute arbitrary commands or install backdoors.</li>
<li>Ajenti fails to properly validate the user&rsquo;s privileges before initiating the package installation process.</li>
<li>The malicious package is installed with the privileges of the Ajenti process, which may include elevated permissions.</li>
<li>The malicious package executes its payload, potentially installing a reverse shell, creating new administrative accounts, or modifying critical system files.</li>
<li>The attacker leverages the installed backdoor or elevated privileges to gain persistent access to the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an authenticated, non-superuser user to execute arbitrary code with elevated privileges. This can lead to full system compromise, data theft, and disruption of services. While the precise number of affected installations is unknown, any organization running Ajenti versions prior to 2.2.15 with the <code>auth_users</code> authentication plugin enabled is vulnerable. The impact includes potential data breaches, system downtime, and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately upgrade Ajenti to version 2.2.15 or later to patch CVE-2026-35175 (see References).</li>
<li>Implement the Sigma rule <code>Detect Suspicious Ajenti Package Installation</code> to detect unauthorized package installations.</li>
<li>Review Ajenti access logs for unusual activity or attempts to access restricted functionalities.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>ajenti</category><category>authorization-bypass</category><category>privilege-escalation</category><category>CVE-2026-35175</category></item></channel></rss>