<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Api-Vulnerability — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/api-vulnerability/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 17 Apr 2026 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/api-vulnerability/feed.xml" rel="self" type="application/rss+xml"/><item><title>Paperclip Unauthenticated API Access Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-paperclip-auth-bypass/</link><pubDate>Fri, 17 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-paperclip-auth-bypass/</guid><description>Paperclip application suffers from multiple unauthenticated API access vulnerabilities allowing attackers to access sensitive data, gather reconnaissance, and potentially bypass authentication.</description><content:encoded><![CDATA[<p>Paperclip, a software application, contains multiple API endpoints that lack proper authentication checks, even when the application is configured in &ldquo;authenticated&rdquo; mode. This vulnerability allows unauthenticated access to sensitive information and functionality. Observed in versions prior to 2026.416.0, the issue impacts the confidentiality and integrity of the application. An attacker can exploit these vulnerabilities to gather reconnaissance information about the deployment, access heartbeat run issues, retrieve agent instructions, and potentially bypass authentication mechanisms via unauthenticated CLI challenge creation. The disclosed information includes API structure, authentication mechanisms, and internal workflows, which can be leveraged for further malicious activities.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker sends an unauthenticated GET request to <code>/api/health</code> to obtain deployment mode, exposure setting, auth status, version, and feature flags.</li>
<li>The attacker sends an unauthenticated GET request to <code>/api/skills/index</code> to retrieve a list of available skill endpoints.</li>
<li>The attacker sends an unauthenticated GET request to <code>/api/skills/paperclip</code> to leak the agent heartbeat procedure, API endpoints, parameters, authentication mechanisms, and agent coordination protocols.</li>
<li>The attacker sends an unauthenticated GET request to <code>/api/heartbeat-runs/:runId/issues</code>, attempting to access issue data for a heartbeat run by guessing or obtaining a valid <code>runId</code>.</li>
<li>The attacker sends an unauthenticated POST request to <code>/api/cli-auth/challenges</code> with a JSON payload containing a command to create a CLI authentication challenge and obtain a <code>boardApiToken</code>.</li>
<li>The attacker uses the leaked information to map the internal API structure and plan further attacks or unauthorized access.</li>
<li>The attacker exploits the <code>boardApiToken</code> obtained in step 5, combined with open registration (if enabled), to persistently generate API keys.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>This vulnerability results in significant data exposure, including heartbeat run issues, agent instructions, and internal API structure. An attacker can fingerprint the deployment and map the entire internal API for reconnaissance purposes. Successful exploitation of the unauthenticated CLI challenge creation allows for authentication bypass, potentially leading to a full remote code execution chain. The vulnerability affects organizations using Paperclip versions prior to 2026.416.0. A successful attack can compromise sensitive data, facilitate unauthorized access, and lead to further malicious activities.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the patch to upgrade Paperclip to version 2026.416.0 or later, which addresses the unauthenticated API access vulnerabilities.</li>
<li>Implement authentication checks for the <code>/api/heartbeat-runs/:runId/issues</code> endpoint in <code>server/src/routes/activity.ts</code> using <code>assertCompanyAccess</code>.</li>
<li>Implement authentication checks for the <code>/api/cli-auth/challenges</code> endpoint in <code>server/src/routes/access.ts</code> using <code>assertBoard</code>.</li>
<li>Implement authentication checks for the <code>/api/skills/index</code> and <code>/api/skills/:skillName</code> endpoints in <code>server/src/routes/access.ts</code>.</li>
<li>Reduce the information exposed by the <code>/api/health</code> endpoint by removing sensitive data such as <code>deploymentMode</code>, <code>deploymentExposure</code>, and <code>version</code> or by requiring authentication via <code>assertBoard</code>.</li>
<li>Deploy the Sigma rule &ldquo;Detect Paperclip Unauthenticated Health Endpoint Access&rdquo; to identify unauthorized access attempts to the <code>/api/health</code> endpoint.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>paperclip</category><category>authentication-bypass</category><category>api-vulnerability</category></item><item><title>WWBN AVideo Unauthenticated decryptString Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-03-avideo-decryptstring/</link><pubDate>Tue, 24 Mar 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-avideo-decryptstring/</guid><description>WWBN AVideo, up to version 26.0, contains an improper authentication vulnerability (CVE-2026-33512) in the API plugin's `decryptString` action, allowing unauthenticated users to decrypt publicly accessible ciphertext and potentially recover protected tokens/metadata.</description><content:encoded><![CDATA[<p>WWBN AVideo is an open-source video platform. Versions up to and including 26.0 are vulnerable to an improper authentication issue within the API plugin. The <code>decryptString</code> action, intended for internal decryption processes, is exposed without any authentication requirements. Attackers can exploit this vulnerability to submit ciphertext, which is publicly accessible through endpoints like <code>view/url2Embed.json.php</code>, and receive the corresponding plaintext. Successful exploitation allows…</p>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-33512</category><category>avideo</category><category>improper-authentication</category><category>api-vulnerability</category></item></channel></rss>