<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Authentication-Bypass — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/authentication-bypass/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 04 May 2026 18:16:27 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/authentication-bypass/feed.xml" rel="self" type="application/rss+xml"/><item><title>WordPress Easy PayPal Events &amp; Tickets Plugin Authentication Bypass Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-wordpress-paypal-auth-bypass/</link><pubDate>Mon, 04 May 2026 18:16:27 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-wordpress-paypal-auth-bypass/</guid><description>An unauthenticated remote attacker can exploit a hardcoded authentication bypass vulnerability in the Easy PayPal Events &amp; Tickets plugin for WordPress (versions 1.3 and earlier) by providing 'test' as the hash parameter, allowing retrieval of sensitive order details.</description><content:encoded><![CDATA[<p>The Easy PayPal Events &amp; Tickets plugin for WordPress, version 1.3 and earlier, contains a critical hardcoded authentication bypass vulnerability (CVE-2026-32834) within its QR code scanning functionality. This flaw allows unauthenticated remote attackers to bypass hash verification by supplying the string &rsquo;test&rsquo; as the hash parameter when accessing the <code>add_wpeevent_button_qr</code> action. This bypass enables attackers to retrieve sensitive order details associated with any post ID, including PayPal transaction IDs, customer email addresses, purchase amounts, and ticket information. The vulnerable plugin was officially closed on March 18, 2026, making it imperative to identify and mitigate any remaining installations to prevent potential data breaches.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a WordPress site using the Easy PayPal Events &amp; Tickets plugin (version 1.3 or earlier).</li>
<li>Attacker crafts a malicious HTTP GET request targeting the <code>/wp-admin/admin-ajax.php</code> endpoint.</li>
<li>The request includes the <code>action</code> parameter set to <code>add_wpeevent_button_qr</code>.</li>
<li>The request includes a <code>hash</code> parameter set to the hardcoded value <code>test</code>.</li>
<li>The request includes a <code>post_id</code> parameter, either guessed or obtained through other means.</li>
<li>The vulnerable plugin bypasses authentication due to the hardcoded hash.</li>
<li>The plugin processes the request and retrieves sensitive order details associated with the provided <code>post_id</code>.</li>
<li>The attacker receives the sensitive data, including PayPal transaction IDs, customer email addresses, purchase amounts, and ticket information.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability grants unauthenticated attackers access to sensitive customer and transaction data associated with events and tickets managed through the Easy PayPal Events &amp; Tickets plugin. The leaked information, including customer email addresses and PayPal transaction IDs, can be used for further malicious activities such as phishing campaigns, identity theft, and financial fraud. The number of affected WordPress sites is unknown, but any site using a vulnerable version of the plugin is at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect WordPress Easy PayPal Events &amp; Tickets Authentication Bypass Attempt</code> to your SIEM to detect exploitation attempts targeting the vulnerable endpoint.</li>
<li>Inspect web server logs for requests to <code>/wp-admin/admin-ajax.php</code> with the <code>action</code> parameter set to <code>add_wpeevent_button_qr</code> and the <code>hash</code> parameter set to <code>test</code> to identify potential exploitation attempts.</li>
<li>Monitor network traffic for suspicious data exfiltration following the identified exploitation attempts to mitigate potential damage.</li>
<li>If the plugin is still installed, remove it immediately.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>wordpress</category><category>authentication bypass</category><category>vulnerability</category></item><item><title>Quarkus Vertx HTTP Authorization Bypass via Matrix Parameters</title><link>https://feed.craftedsignal.io/briefs/2026-05-quarkus-auth-bypass/</link><pubDate>Mon, 04 May 2026 17:20:20 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-quarkus-auth-bypass/</guid><description>Quarkus Vertx HTTP versions &lt; 3.20.6.1, &gt;= 3.21.0 and &lt; 3.27.3.1, &gt;= 3.30.0 and &lt; 3.33.1.1, and &gt;= 3.34.0 and &lt; 3.35.1.1 are vulnerable to an authorization bypass where appending a semicolon and arbitrary text to the request URL allows unauthorized access to protected resources.</description><content:encoded><![CDATA[<p>A vulnerability exists in Quarkus Vertx HTTP versions &lt; 3.20.6.1, &gt;= 3.21.0 and &lt; 3.27.3.1, &gt;= 3.30.0 and &lt; 3.33.1.1, and &gt;= 3.34.0 and &lt; 3.35.1.1. The vulnerability, designated as CVE-2026-39852, allows unauthenticated or lower-privileged users to bypass HTTP path-based authorization policies. By appending a semicolon (<code>;</code>) and arbitrary text to the request URL, attackers can gain unauthorized access to protected resources. This vulnerability stems from an inconsistency in path normalization: Quarkus&rsquo;s security layer checks the raw URL path, while RESTEasy Reactive&rsquo;s routing layer strips matrix parameters before matching endpoints. This means a request like <code>/api/admin;anything</code> can bypass authorization for <code>/api/admin</code> while still routing to the protected endpoint. This issue was discovered and verified by the GitHub Security Lab.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a protected endpoint, such as <code>/api/admin</code>, that requires authentication or specific privileges.</li>
<li>The attacker crafts a malicious HTTP request targeting the protected endpoint but appends a semicolon and arbitrary text, such as <code>/api/admin;anything</code>.</li>
<li>The request is sent to the Quarkus Vertx HTTP server.</li>
<li>Quarkus&rsquo;s security layer performs an authorization check on the raw URL path <code>/api/admin;anything</code>, which may not match the intended authorization rules for <code>/api/admin</code>.</li>
<li>RESTEasy Reactive&rsquo;s routing layer strips the matrix parameters (<code>;anything</code>) from the URL, resulting in the endpoint <code>/api/admin</code> being matched.</li>
<li>The request is routed to the protected endpoint <code>/api/admin</code>, bypassing the intended authorization checks.</li>
<li>The attacker gains unauthorized access to the protected resource or functionality.</li>
<li>The attacker performs actions they would not normally be authorized to perform, such as accessing sensitive data or modifying system configurations.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability can lead to unauthorized access to sensitive data, modification of system configurations, or other malicious activities. The vulnerability affects Quarkus Vertx HTTP applications that rely on path-based authorization policies. The number of affected applications is currently unknown, but any application using the vulnerable versions of Quarkus Vertx HTTP is susceptible.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Quarkus Vertx HTTP to a patched version (&gt;= 3.20.6.1, &gt;= 3.27.3.1, &gt;= 3.33.1.1, &gt;= 3.35.1.1) to remediate CVE-2026-39852.</li>
<li>Deploy the Sigma rule <code>Detect Quarkus Authorization Bypass Attempt</code> to identify potential exploitation attempts in web server logs.</li>
<li>Monitor web server logs for requests containing semicolons in the URL path to detect potential exploitation attempts using the <code>Monitor Semicolons in URL Path</code> Sigma rule.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>authentication-bypass</category><category>authorization-bypass</category><category>web-application</category></item><item><title>Critical Authentication Bypass Vulnerability in MOVEit Automation (CVE-2026-4670)</title><link>https://feed.craftedsignal.io/briefs/2026-05-moveit-auth-bypass/</link><pubDate>Mon, 04 May 2026 15:08:49 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-moveit-auth-bypass/</guid><description>A critical authentication bypass vulnerability (CVE-2026-4670) in Progress MOVEit Automation allows an unauthenticated remote attacker to gain administrative access, potentially leading to full control over the application and sensitive file transfer workflows.</description><content:encoded><![CDATA[<p>Progress MOVEit Automation is affected by a critical authentication bypass vulnerability, CVE-2026-4670, which has a CVSS score of 9.8. Successful exploitation allows an unauthenticated remote attacker to gain administrative access to the vulnerable service. Additionally, a high severity privilege escalation vulnerability, CVE-2026-5174, exists due to improper input validation. While there is no current evidence of active exploitation in the wild, the historical targeting of Managed File Transfer (MFT) solutions, such as the 2023 Cl0p ransomware campaigns targeting MOVEit Transfer, heightens the urgency of patching this vulnerability. The affected versions of MOVEit Automation include versions prior to 2024.0.0, versions 2024.0.0 before 2024.1.8, versions 2025.0.0 before 2025.0.9, and versions 2025.1.0 before 2025.1.5. Defenders should prioritize patching to prevent potential exploitation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker sends a specially crafted request to the MOVEit Automation server, exploiting CVE-2026-4670 (authentication bypass).</li>
<li>The vulnerable MOVEit Automation software fails to properly validate the attacker&rsquo;s identity, granting them unauthorized access.</li>
<li>The attacker gains access to the MOVEit Automation application with administrative privileges.</li>
<li>The attacker leverages CVE-2026-5174 (improper input validation) to further escalate privileges within the application.</li>
<li>The attacker manipulates sensitive file transfer workflows, potentially modifying file permissions or altering transfer schedules.</li>
<li>The attacker exfiltrates sensitive data stored within MOVEit Automation.</li>
<li>Alternatively, the attacker could deploy malicious scripts or backdoors to maintain persistence and control over the system.</li>
<li>The attacker achieves complete control over the MOVEit Automation server, potentially impacting connected systems and data integrity.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-4670 allows an unauthenticated attacker to gain administrative access to Progress MOVEit Automation servers. This can lead to the compromise of sensitive data, disruption of file transfer workflows, and potential deployment of ransomware or other malicious payloads. Given the history of MOVEit products being targeted, a successful attack could have widespread impact across various sectors that rely on MOVEit for secure file transfer, potentially affecting thousands of organizations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately patch all affected MOVEit Automation installations to versions 2025.1.5 or later, 2025.0.9 or later, or 2024.1.8 or later as recommended by Progress Software to remediate CVE-2026-4670 and CVE-2026-5174.</li>
<li>Upscale monitoring and detection capabilities to identify any suspicious activity related to MOVEit Automation, as recommended by the CCB.</li>
<li>Implement the provided Sigma rule &ldquo;Detect MOVEit Automation Authentication Bypass Attempt&rdquo; to identify potential exploitation attempts targeting CVE-2026-4670 based on web server logs.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">threat</category><category>authentication-bypass</category><category>privilege-escalation</category><category>cve-2026-4670</category><category>cve-2026-5174</category><category>webserver</category></item><item><title>AAP Gateway Account Hijacking Vulnerability (CVE-2026-6266)</title><link>https://feed.craftedsignal.io/briefs/2026-05-aap-account-hijacking/</link><pubDate>Mon, 04 May 2026 14:16:35 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-aap-account-hijacking/</guid><description>CVE-2026-6266 allows a remote attacker to hijack user accounts in AAP gateway by manipulating the IDP-provided email during the user auto-linking process, potentially gaining unauthorized access, including administrative privileges.</description><content:encoded><![CDATA[<p>A vulnerability, tracked as CVE-2026-6266, exists in the AAP gateway. Specifically, the user auto-link strategy introduced in AAP 2.6 automatically links external Identity Provider (IDP) identities to existing AAP user accounts based on email matching without verifying email ownership. This vulnerability enables a remote attacker to potentially hijack a victim&rsquo;s account and gain unauthorized access to other accounts, including administrative accounts. The attacker achieves this by manipulating the email address provided by the IDP during the auto-linking process. This poses a significant risk to organizations using AAP for identity management, potentially leading to data breaches and system compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a target user account within the AAP gateway.</li>
<li>Attacker creates an account on a configured external Identity Provider (IDP).</li>
<li>Attacker configures the IDP account with the same email address as the target user in the AAP gateway.</li>
<li>The target user attempts to authenticate to the AAP gateway using the configured IDP.</li>
<li>The AAP gateway, running version 2.6 or later, automatically links the attacker-controlled IDP identity to the existing AAP user account based on email matching, without verifying ownership.</li>
<li>The attacker successfully authenticates to the AAP gateway using the attacker-controlled IDP account, gaining access to the target user&rsquo;s account.</li>
<li>If the hijacked account has administrative privileges, the attacker can escalate privileges and compromise the entire AAP gateway environment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-6266 can lead to unauthorized access to sensitive data and systems managed by the AAP gateway. This includes the potential compromise of administrative accounts, which could allow an attacker to gain full control over the AAP environment. The vulnerability impacts organizations using AAP 2.6 and later for identity management. The potential consequences include data breaches, service disruption, and financial loss.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the patch provided in Red Hat Security Advisory RHSA-2026:13508 to remediate CVE-2026-6266.</li>
<li>Monitor AAP gateway logs for successful authentications from unexpected IDPs to detect potential account hijacking attempts. Deploy a Sigma rule to detect this behavior.</li>
<li>Implement multi-factor authentication (MFA) for all AAP accounts to mitigate the impact of successful account hijacking, even if the IDP is compromised.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-6266</category><category>account-hijacking</category><category>authentication-bypass</category></item><item><title>YunaiV yudao-cloud Authentication Bypass Vulnerability (CVE-2026-7710)</title><link>https://feed.craftedsignal.io/briefs/2026-05-yunai-auth-bypass/</link><pubDate>Mon, 04 May 2026 00:16:39 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-yunai-auth-bypass/</guid><description>YunaiV yudao-cloud up to version 3.8.0 is vulnerable to an authentication bypass (CVE-2026-7710) due to improper handling of the mock-token argument in the JwtAuthenticationTokenFilter.java file, allowing remote attackers to bypass authentication.</description><content:encoded><![CDATA[<p>CVE-2026-7710 is an authentication bypass vulnerability affecting YunaiV&rsquo;s yudao-cloud, specifically versions up to 3.8.0. The vulnerability resides in the <code>doFilterInternal</code> function within the <code>JwtAuthenticationTokenFilter.java</code> file of the Ruoyi-Vue-Pro component. An attacker can exploit this vulnerability by manipulating the <code>mock-token</code> argument, leading to improper authentication. This allows a remote attacker to potentially gain unauthorized access to the application. Public exploits are available, increasing the risk of exploitation. The vendor was notified but has not responded.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a YunaiV yudao-cloud instance running a vulnerable version (&lt;= 3.8.0).</li>
<li>Attacker crafts a malicious HTTP request targeting an endpoint protected by authentication.</li>
<li>The crafted request includes a manipulated <code>mock-token</code> argument designed to bypass the JWT authentication filter.</li>
<li>The <code>JwtAuthenticationTokenFilter.java</code> component processes the request and improperly validates the manipulated <code>mock-token</code>.</li>
<li>Due to the flawed authentication logic, the attacker is granted unauthorized access as an authenticated user.</li>
<li>Attacker gains access to protected resources and functionalities within the application.</li>
<li>Attacker performs privileged actions such as data modification, account takeover, or further exploitation of the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7710 allows attackers to bypass authentication and gain unauthorized access to YunaiV yudao-cloud applications. This can lead to the compromise of sensitive data, modification of application settings, and potentially full system takeover. Given the availability of public exploits, organizations using affected versions of yudao-cloud are at high risk. The CVSS v3.1 base score for this vulnerability is 7.3, indicating a high severity level.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade YunaiV yudao-cloud to a patched version that addresses CVE-2026-7710.</li>
<li>Deploy the Sigma rule <code>Detect Malicious Mock Token Argument</code> to identify exploitation attempts by monitoring web server logs for the presence of a <code>mock-token</code> argument.</li>
<li>Implement input validation on the server side to ensure that <code>mock-token</code> values conform to expected patterns.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>authentication bypass</category><category>cve-2026-7710</category><category>web application</category></item><item><title>InnoShop Improper Authentication Vulnerability (CVE-2026-7630)</title><link>https://feed.craftedsignal.io/briefs/2026-05-innoshop-auth-bypass/</link><pubDate>Sat, 02 May 2026 14:16:18 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-innoshop-auth-bypass/</guid><description>InnoShop version 0.7.8 and earlier contains an improper authentication vulnerability in the InstallServiceProvider::boot function (CVE-2026-7630) that allows remote attackers to bypass authentication and gain unauthorized access to the installation endpoint.</description><content:encoded><![CDATA[<p>A critical vulnerability, CVE-2026-7630, affects innocommerce InnoShop versions up to 0.7.8. The vulnerability resides in the <code>InstallServiceProvider::boot</code> function within the <code>innopacks/install/src/InstallServiceProvider.php</code> file, which governs the installation endpoint. Successful exploitation allows remote attackers to bypass authentication mechanisms, potentially leading to complete system compromise. Publicly available exploits exist, increasing the risk of active exploitation. It is crucial for administrators to apply the provided patch (identifier: <code>45758e4ec22451ab944ae2ae826b1e70f6450dc9</code>) immediately.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies an InnoShop instance running a vulnerable version (&lt;= 0.7.8).</li>
<li>The attacker crafts a malicious HTTP request targeting the installation endpoint (<code>innopacks/install/src/InstallServiceProvider.php</code>).</li>
<li>The request exploits the improper authentication in the <code>InstallServiceProvider::boot</code> function.</li>
<li>Authentication checks are bypassed due to the vulnerability.</li>
<li>The attacker gains unauthorized access to the installation process.</li>
<li>The attacker injects malicious code or configurations during the installation phase.</li>
<li>The injected code executes with elevated privileges, granting the attacker control over the InnoShop instance.</li>
<li>The attacker establishes a persistent backdoor for future access and potential data exfiltration or further malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7630 allows unauthenticated remote attackers to compromise InnoShop installations. This can lead to complete control of the web server, potentially affecting sensitive customer data, financial information, and intellectual property.  Given the ease of exploitation and publicly available exploits, unpatched InnoShop instances are at high risk of compromise.  The number of affected installations is currently unknown, but the widespread use of InnoShop in e-commerce makes this a significant threat.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately apply the patch identified by <code>45758e4ec22451ab944ae2ae826b1e70f6450dc9</code> to remediate the improper authentication vulnerability.</li>
<li>Deploy the Sigma rule &ldquo;Detect InnoShop Installation Endpoint Access&rdquo; to identify unauthorized access attempts to the installation endpoint.</li>
<li>Monitor web server logs for suspicious activity targeting the <code>innopacks/install/src/InstallServiceProvider.php</code> path, based on &ldquo;Detect InnoShop Installation Endpoint Access&rdquo; to identify post-exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>cve</category><category>authentication bypass</category><category>web application</category></item><item><title>WordPress User Verification Plugin Authentication Bypass Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-wordpress-auth-bypass/</link><pubDate>Sat, 02 May 2026 05:16:01 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-wordpress-auth-bypass/</guid><description>The User Verification by PickPlugins plugin for WordPress is vulnerable to authentication bypass in versions up to 2.0.46 due to a loose PHP comparison, allowing unauthenticated attackers to log in as any verified user by submitting a 'true' OTP value.</description><content:encoded><![CDATA[<p>The User Verification by PickPlugins plugin, a popular WordPress plugin, contains a critical authentication bypass vulnerability (CVE-2026-7458) affecting all versions up to and including 2.0.46. The flaw resides within the <code>user_verification_form_wrap_process_otpLogin</code> function, where a loose PHP comparison operator is used to validate OTP codes. This weakness allows unauthenticated attackers to bypass the OTP verification process and log in as any user with a verified email address, potentially gaining administrative access. Successful exploitation requires the attacker to submit the string &ldquo;true&rdquo; as the OTP value. This vulnerability poses a significant risk to WordPress sites using the affected plugin, potentially leading to complete site compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a WordPress site using a vulnerable version of the User Verification by PickPlugins plugin (&lt;= 2.0.46).</li>
<li>The attacker navigates to the OTP login form provided by the plugin.</li>
<li>The attacker enters the email address of a target user, such as an administrator.</li>
<li>The attacker intercepts the OTP request and instead of a numerical code, submits the string &ldquo;true&rdquo; as the OTP value.</li>
<li>The vulnerable <code>user_verification_form_wrap_process_otpLogin</code> function processes the submitted OTP. Due to the loose PHP comparison (e.g., <code>==</code> instead of <code>===</code>), the string &ldquo;true&rdquo; evaluates to <code>true</code>, bypassing the intended OTP validation.</li>
<li>The plugin incorrectly authenticates the attacker as the targeted user.</li>
<li>The attacker gains unauthorized access to the targeted user&rsquo;s account, potentially gaining administrative privileges.</li>
<li>The attacker can now perform actions such as modifying website content, installing malicious plugins, or exfiltrating sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7458 allows unauthenticated attackers to bypass the OTP verification mechanism and gain unauthorized access to any user account with a verified email address on a vulnerable WordPress site. This can lead to complete compromise of the affected WordPress site, enabling attackers to modify content, inject malicious code, steal sensitive data, or use the site for malicious purposes. Given the plugin&rsquo;s popularity, this vulnerability could impact a large number of WordPress websites.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the User Verification by PickPlugins plugin to the latest version (greater than 2.0.46) to patch CVE-2026-7458.</li>
<li>Monitor WordPress access logs for unusual login attempts or the presence of &ldquo;true&rdquo; as OTP values to identify potential exploitation attempts. Deploy the <code>Detect Successful Authentication Bypass via True OTP</code> Sigma rule.</li>
<li>Implement stricter input validation and sanitization for OTP codes to prevent similar bypass vulnerabilities.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">threat</category><category>wordpress</category><category>authentication bypass</category><category>cve-2026-7458</category></item><item><title>WordPress Temporary Login Plugin Authentication Bypass (CVE-2026-7567)</title><link>https://feed.craftedsignal.io/briefs/2024-01-wordpress-temp-login-auth-bypass/</link><pubDate>Fri, 01 May 2026 10:15:58 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-wordpress-temp-login-auth-bypass/</guid><description>The Temporary Login plugin for WordPress versions up to 1.0.0 is vulnerable to authentication bypass due to improper input validation, allowing unauthenticated attackers to log in as arbitrary temporary users by sending a specially crafted GET request.</description><content:encoded><![CDATA[<p>CVE-2026-7567 is an authentication bypass vulnerability that affects the Temporary Login plugin for WordPress, specifically versions up to and including 1.0.0. The vulnerability stems from a failure to properly validate the &rsquo;temp-login-token&rsquo; GET parameter within the <code>maybe_login_temporary_user()</code> function. By supplying an array as the value for this parameter, attackers can circumvent the intended <code>empty()</code> check. This leads to the <code>sanitize_key()</code> function returning an empty string, which is then used in a database query to fetch users. WordPress ignores empty <code>meta_value</code> parameters, causing the query to return all users with the <code>_temporary_login_token</code> meta key. Consequently, an unauthenticated attacker can effectively authenticate as any user with an active temporary login session by sending a single, maliciously crafted GET request. This poses a severe risk to website security, as it allows unauthorized access to user accounts and potentially sensitive data.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a WordPress site using the vulnerable Temporary Login plugin (version &lt;= 1.0.0).</li>
<li>The attacker crafts a malicious GET request targeting the WordPress site&rsquo;s login endpoint, including the &rsquo;temp-login-token&rsquo; parameter as an array (e.g., <code>temp-login-token[]=</code>).</li>
<li>The web server receives the GET request.</li>
<li>The <code>maybe_login_temporary_user()</code> function processes the request.</li>
<li>Due to improper input validation, the <code>empty()</code> check is bypassed when the &rsquo;temp-login-token&rsquo; parameter is an array.</li>
<li><code>sanitize_key()</code> processes the array and returns an empty string as the meta_value.</li>
<li>WordPress executes a database query using the empty meta_value, effectively retrieving all users with active temporary login tokens.</li>
<li>The attacker is granted unauthorized access to the account of a targeted temporary user, bypassing normal authentication procedures.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7567 allows unauthenticated attackers to bypass login restrictions and gain unauthorized access to WordPress user accounts utilizing the vulnerable Temporary Login plugin. The severity is high, as it allows complete compromise of user accounts without requiring any valid credentials. The impact includes potential data theft, account takeover, website defacement, and other malicious activities, depending on the privileges of the compromised user account.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the available patch or upgrade the Temporary Login plugin to a version greater than 1.0.0 to remediate CVE-2026-7567.</li>
<li>Deploy the Sigma rule <code>Detect WordPress Temporary Login Authentication Bypass Attempt</code> to detect exploitation attempts by monitoring HTTP requests with array-based <code>temp-login-token</code> parameters in the query string.</li>
<li>Implement input validation on the web server to reject requests containing array-based parameters where scalar strings are expected.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>authentication bypass</category><category>wordpress</category><category>plugin vulnerability</category><category>cve-2026-7567</category><category>cloud</category></item><item><title>Critical Authentication Bypass Vulnerability in cPanel &amp; WHM (CVE-2026-41940)</title><link>https://feed.craftedsignal.io/briefs/2026-05-cpanel-auth-bypass/</link><pubDate>Thu, 30 Apr 2026 12:16:14 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-cpanel-auth-bypass/</guid><description>CVE-2026-41940 is a critical authentication bypass vulnerability in cPanel &amp; WHM, allowing unauthenticated remote attackers to gain administrative access by manipulating session data.</description><content:encoded><![CDATA[<p>A critical authentication bypass vulnerability, CVE-2026-41940, affects all versions of cPanel &amp; WHM. This vulnerability allows unauthenticated remote attackers to gain administrative access to affected systems due to improper handling of session data. Public technical analyses and proof-of-concept code are available, significantly lowering the barrier to exploitation. There are indications that the vulnerability has been actively exploited in the wild, potentially as a zero-day. cPanel &amp; WHM is commonly exposed to the internet and manages hosting environments, making it an attractive target for attackers seeking control over hosting infrastructures and numerous websites.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a cPanel &amp; WHM server exposed to the internet.</li>
<li>The attacker crafts a malicious HTTP request targeting the cPanel &amp; WHM login endpoint.</li>
<li>The crafted request manipulates session creation and processing by injecting controlled data into the session files.</li>
<li>This injected data alters authentication-related attributes within the session, bypassing the normal authentication flow.</li>
<li>The attacker successfully establishes a session that is treated as fully authenticated without providing valid credentials.</li>
<li>With administrative privileges, the attacker gains full control over the cPanel server.</li>
<li>The attacker accesses hosted websites and databases, potentially compromising sensitive data.</li>
<li>The attacker establishes persistence through backdoors or additional user accounts, ensuring continued access to the compromised system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-41940 allows attackers to gain complete control over cPanel &amp; WHM servers. This can lead to the compromise of hosted websites, databases, and sensitive customer data. Given the central role of cPanel in hosting environments, this vulnerability can result in large-scale compromise affecting multiple customers and services. The widespread use of cPanel &amp; WHM makes this a high-impact vulnerability.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the security patch provided by cPanel to address CVE-2026-41940 immediately after thorough testing to prevent exploitation.</li>
<li>Implement increased monitoring and detection capabilities to identify suspicious activity related to CVE-2026-41940 as recommended by CCB.</li>
<li>Review web server logs for unusual patterns or requests targeting cPanel login endpoints to detect potential exploitation attempts. Create a Sigma rule based on webserver logs.</li>
<li>Monitor for unauthorized changes to user accounts or the creation of new administrative accounts on cPanel servers. Create a Sigma rule based on process creation logs.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">threat</category><category>authentication bypass</category><category>cPanel</category><category>web hosting</category><category>vulnerability</category></item><item><title>ABB Edgenius Management Portal Authentication Bypass Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-abb-edgenius-auth-bypass/</link><pubDate>Thu, 30 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-abb-edgenius-auth-bypass/</guid><description>An authentication bypass vulnerability in ABB Edgenius Management Portal versions 3.2.0.0 and 3.2.1.1 allows attackers to execute arbitrary code and modify application configurations by sending a specially crafted message to the system node.</description><content:encoded><![CDATA[<p>ABB Edgenius Management Portal versions 3.2.0.0 and 3.2.1.1 are vulnerable to an authentication bypass (CVE-2025-10571). An attacker who has gained network access to a vulnerable Edgenius deployment can send a specially crafted message to the system node, bypassing authentication controls. Successful exploitation allows an attacker to install and run arbitrary code, uninstall applications, and modify the configuration of installed applications. ABB reported this vulnerability to CISA. ABB has released version 3.2.2.0 to address the vulnerability. As a mitigation, ABB advises customers to disable the Edgenius Management Portal until the upgrade can be applied.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains access to the network where the Edgenius Management Portal is deployed.</li>
<li>The attacker identifies a vulnerable ABB Edgenius Management Portal instance (versions 3.2.0.0 or 3.2.1.1).</li>
<li>The attacker crafts a malicious message designed to exploit the authentication bypass vulnerability (CVE-2025-10571).</li>
<li>The attacker sends the specially crafted message to the system node of the Edgenius Management Portal.</li>
<li>The vulnerable Edgenius Management Portal improperly processes the crafted message, bypassing authentication.</li>
<li>The attacker leverages the bypassed authentication to install and execute arbitrary code on the system.</li>
<li>The attacker uninstalls applications, further compromising the system&rsquo;s functionality.</li>
<li>The attacker modifies the configuration of installed applications to maintain persistence and control.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to gain full control over the ABB Edgenius Management Portal. The attacker can install malicious software, uninstall critical applications, and modify configurations, leading to significant disruption of industrial processes, data theft, or further lateral movement within the OT network. Affected sectors include critical manufacturing and information technology, with deployments worldwide.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to ABB Ability Edgenius version 3.2.2.0 to remediate CVE-2025-10571, as this version contains the vendor fix.</li>
<li>Until the upgrade is applied, disable the Edgenius Management Portal to mitigate the vulnerability as recommended by ABB.</li>
<li>Minimize network exposure for all control system devices by ensuring they are not accessible from the internet, as suggested by CISA.</li>
<li>Locate control system networks and remote devices behind firewalls, isolating them from business networks per CISA recommendations.</li>
<li>Implement the Sigma rule &ldquo;Detect ABB Edgenius Management Portal Exploitation Attempt&rdquo; to identify potential exploitation attempts based on network traffic patterns.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>abb</category><category>edgenius</category><category>authentication bypass</category><category>CVE-2025-10571</category><category>critical infrastructure</category></item><item><title>ABB Ability OPTIMAX Authentication Bypass Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-optimax-auth-bypass/</link><pubDate>Thu, 30 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-optimax-auth-bypass/</guid><description>CVE-2025-14510 allows an attacker to bypass Azure Active Directory Single-Sign On authentication in vulnerable ABB Ability OPTIMAX versions, potentially granting unauthorized access to critical infrastructure systems.</description><content:encoded><![CDATA[<p>A critical vulnerability, CVE-2025-14510, affects ABB Ability OPTIMAX versions that utilize Azure Active Directory (Azure AD) for Single-Sign On (SSO) authentication. This flaw stems from an incorrect implementation of the authentication algorithm, potentially allowing attackers to bypass the Azure AD authentication mechanism and gain unauthorized access to the OPTIMAX system. The affected versions include ABB Ability OPTIMAX 6.1 and 6.2 (all versions), 6.3 versions prior to 6.3.1-251120, and 6.4 versions prior to 6.4.1-251120. Successful exploitation could lead to significant disruption in energy, water, and wastewater sectors. The vulnerability was reported to CISA by ABB PSIRT.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies an ABB Ability OPTIMAX installation using Azure AD SSO with a vulnerable version (6.1, 6.2, 6.3 &lt; 6.3.1-251120, or 6.4 &lt; 6.4.1-251120).</li>
<li>The attacker crafts a malicious authentication request, exploiting the incorrect implementation of the authentication algorithm (CWE-303).</li>
<li>The crafted request bypasses the expected Azure AD authentication checks within OPTIMAX.</li>
<li>OPTIMAX incorrectly validates the attacker&rsquo;s session, granting them access to the system.</li>
<li>The attacker leverages their unauthorized access to gain control over OPTIMAX functionalities.</li>
<li>The attacker can then modify control parameters, manipulate data, or disrupt operations within the connected industrial processes.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2025-14510 enables unauthorized access to ABB Ability OPTIMAX systems, potentially leading to severe consequences in critical infrastructure sectors such as energy, water, and wastewater. An attacker could manipulate industrial processes, disrupt critical services, or cause significant financial and operational damage. Given the widespread deployment of ABB Ability OPTIMAX systems globally, a successful campaign exploiting this vulnerability could have far-reaching impact.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately update ABB Ability OPTIMAX to fixed versions (6.3.1-251120 and later) to remediate CVE-2025-14510.</li>
<li>Refer to ABB PSIRT security advisory 9AKK108472A1331 for detailed mitigation steps and recommendations.</li>
<li>Minimize network exposure for all control system devices and/or systems, ensuring they are not accessible from the internet, as per CISA&rsquo;s recommended practices.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>authentication bypass</category><category>ics</category><category>vulnerability</category></item><item><title>cPanel and WHM Authentication Bypass Vulnerability (CVE-2026-41940)</title><link>https://feed.craftedsignal.io/briefs/2026-04-cpanel-auth-bypass/</link><pubDate>Wed, 29 Apr 2026 16:16:25 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-cpanel-auth-bypass/</guid><description>An authentication bypass vulnerability in cPanel and WHM versions prior to 11.110.0.97, 11.118.0.63, 11.126.0.54, 11.132.0.29, 11.134.0.20, and 11.136.0.5 allows unauthenticated remote attackers to gain unauthorized access to the control panel.</description><content:encoded><![CDATA[<p>On April 28, 2026, a critical authentication bypass vulnerability (CVE-2026-41940) was disclosed affecting cPanel and WHM. This vulnerability impacts versions prior to 11.110.0.97, 11.118.0.63, 11.126.0.54, 11.132.0.29, 11.134.0.20, and 11.136.0.5. The vulnerability exists within the login flow, allowing unauthenticated remote attackers to bypass authentication and gain unauthorized access to the control panel. Successful exploitation grants attackers complete control over the affected cPanel and WHM instances, potentially leading to data theft, server compromise, and further malicious activities. This vulnerability poses a significant risk to web hosting providers and their customers.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker sends a crafted HTTP request to the cPanel/WHM login page, exploiting the authentication bypass vulnerability.</li>
<li>The vulnerable cPanel/WHM version fails to properly validate the request, allowing the attacker to bypass the login process.</li>
<li>The attacker gains unauthorized access to the cPanel/WHM interface.</li>
<li>The attacker enumerates the server to identify valuable files, directories, and database configurations.</li>
<li>The attacker leverages the compromised cPanel/WHM access to upload malicious scripts or binaries.</li>
<li>The attacker executes uploaded payloads to establish persistent access, such as a web shell.</li>
<li>The attacker uses the web shell to perform arbitrary commands on the server, including escalating privileges.</li>
<li>The attacker exfiltrates sensitive data, defaces websites, or deploys ransomware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-41940 can lead to complete compromise of cPanel and WHM servers. This can result in data breaches, website defacement, and denial-of-service attacks. The vulnerability affects a wide range of cPanel and WHM installations, potentially impacting thousands of web hosting providers and their customers. The high CVSS score (9.8) reflects the severity of the risk and the ease with which it can be exploited.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately upgrade cPanel and WHM installations to versions 11.110.0.97, 11.118.0.63, 11.126.0.54, 11.132.0.29, 11.134.0.20, or 11.136.0.5, or later to patch CVE-2026-41940.</li>
<li>Monitor web server logs for unusual activity and unauthorized access attempts to the cPanel/WHM interface by deploying the Sigma rule <code>DetectCpanelAuthBypassAccess</code>.</li>
<li>Implement strict access control policies to limit access to cPanel/WHM administrative interfaces and monitor the user activity by deploying the Sigma rule <code>DetectCpanelAccountManipulation</code>.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cpanel</category><category>whm</category><category>authentication-bypass</category><category>CVE-2026-41940</category><category>webserver</category></item><item><title>Multiple Vulnerabilities in Spring Boot Allow Authorization Bypass and Potential RCE</title><link>https://feed.craftedsignal.io/briefs/2026-04-spring-boot-vulns/</link><pubDate>Wed, 29 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-spring-boot-vulns/</guid><description>Multiple vulnerabilities in Spring Boot, including CVE-2026-40976, CVE-2026-40973, and CVE-2026-40972, can allow attackers to bypass authorization, hijack sessions, or achieve remote code execution, potentially leading to data breaches and system compromise.</description><content:encoded><![CDATA[<p>A set of critical vulnerabilities has been discovered in Spring Boot, a widely used Java framework for building web applications and backend services. These vulnerabilities, including CVE-2026-40976 (CVSS 9.1), CVE-2026-40973 (CVSS 7.0), and CVE-2026-40972 (CVSS 7.5), pose a significant threat to organizations using affected versions (specifically versions before 4.0.6, 3.5.14, 3.4.16, 3.3.19, and 2.7.33). Successful exploitation could lead to unauthorized access, session hijacking, and remote code execution, impacting the confidentiality, integrity, and availability of critical business systems. The initial advisory was released by CCB Belgium on April 28, 2026, urging immediate patching.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access (CVE-2026-40976 - Authentication Bypass):</strong> An attacker sends a crafted HTTP request to a vulnerable Spring Boot application endpoint.</li>
<li><strong>Exploit Default Configuration:</strong> If the application is servlet-based, relies on the default Spring Security filter chain, depends on spring-boot-actuator-autoconfigure, and does not depend on spring-boot-health, the default web security configuration fails to enforce authorization.</li>
<li><strong>Unauthorized Access:</strong> Due to the authorization bypass, the attacker gains unauthorized access to all application endpoints without proper authentication.</li>
<li><strong>Session Hijacking (CVE-2026-40973):</strong> A local attacker exploits the vulnerability to take control of the ApplicationTemp directory.</li>
<li><strong>Code Execution (CVE-2026-40973):</strong> Once in control of the ApplicationTemp directory, the attacker can potentially execute arbitrary code within the context of the application.</li>
<li><strong>Timing Attack (CVE-2026-40972):</strong> An attacker on the same network conducts a timing attack against the DevTools remote secret.</li>
<li><strong>Remote Code Execution (CVE-2026-40972):</strong> By successfully exploiting the timing attack, the attacker can potentially achieve remote code execution on the vulnerable server.</li>
<li><strong>Impact:</strong> The attacker gains full control of the system, allowing for data exfiltration, system compromise, and operational downtime.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these Spring Boot vulnerabilities can lead to significant damage, including unauthorized access to sensitive data, complete system compromise, and extended operational downtime. The potential number of victims is vast, considering the widespread use of Spring Boot in various sectors including finance, healthcare, and e-commerce. If an attacker successfully exploits these vulnerabilities, they could steal sensitive customer data, disrupt critical business operations, or deploy ransomware, resulting in significant financial losses and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately patch Spring Boot applications to the latest versions (&gt;=4.0.6, &gt;=3.5.14, &gt;=3.4.16, &gt;=3.3.19, &gt;=2.7.33) to address CVE-2026-40976, CVE-2026-40973, and CVE-2026-40972.</li>
<li>Deploy the Sigma rule &ldquo;Detect Suspicious Access to Actuator Endpoints&rdquo; to identify potential exploitation attempts targeting CVE-2026-40976 by monitoring access to sensitive actuator endpoints.</li>
<li>Upscale monitoring and detection capabilities to identify any related suspicious activity as recommended by the CCB.</li>
<li>Investigate and remediate any potentially compromised systems following the patching process.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>spring-boot</category><category>vulnerability</category><category>rce</category><category>authentication-bypass</category><category>session-hijacking</category></item><item><title>SmythOS sre Authentication Bypass Vulnerability (CVE-2026-7022)</title><link>https://feed.craftedsignal.io/briefs/2026-04-smythos-auth-bypass/</link><pubDate>Sun, 26 Apr 2026 06:16:02 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-smythos-auth-bypass/</guid><description>A remote improper authentication vulnerability exists in SmythOS sre up to version 0.0.15, allowing attackers to bypass authentication by manipulating the X-DEBUG-RUN/X-DEBUG-INJ arguments in the HTTP Header Handler component.</description><content:encoded><![CDATA[<p>A security vulnerability, CVE-2026-7022, has been identified in SmythOS sre versions up to 0.0.15. The vulnerability resides in the AgentRuntime function within the packages/core/src/subsystems/AgentManager/AgentRuntime.class.ts file, specifically affecting the HTTP Header Handler. By manipulating the X-DEBUG-RUN and X-DEBUG-INJ arguments within HTTP headers, an attacker can bypass authentication mechanisms. This vulnerability is remotely exploitable and has a publicly available exploit, posing a significant risk to systems running vulnerable versions of SmythOS sre. The vendor was notified but did not respond.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a SmythOS sre instance running version 0.0.15 or earlier.</li>
<li>The attacker crafts a malicious HTTP request targeting the AgentRuntime function.</li>
<li>The attacker includes specially crafted X-DEBUG-RUN and/or X-DEBUG-INJ headers in the HTTP request.</li>
<li>The vulnerable AgentRuntime function improperly processes these headers.</li>
<li>The system bypasses authentication checks due to the manipulated header values.</li>
<li>The attacker gains unauthorized access to protected resources or functionalities.</li>
<li>The attacker performs privileged actions or exfiltrates sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7022 allows an attacker to bypass authentication, potentially leading to complete system compromise. This could result in unauthorized access to sensitive data, modification of system configurations, or disruption of services. Given the public availability of the exploit, vulnerable systems are at high risk of attack.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply appropriate input validation and sanitization to the <code>AgentRuntime</code> function within <code>packages/core/src/subsystems/AgentManager/AgentRuntime.class.ts</code> to prevent manipulation of <code>X-DEBUG-RUN</code> and <code>X-DEBUG-INJ</code> headers (CVE-2026-7022).</li>
<li>Deploy the provided Sigma rule to detect exploitation attempts targeting the vulnerable <code>AgentRuntime</code> function.</li>
<li>Monitor web server logs for HTTP requests containing suspicious <code>X-DEBUG-RUN</code> and <code>X-DEBUG-INJ</code> headers.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>authentication-bypass</category><category>CVE-2026-7022</category></item><item><title>Multiple Vulnerabilities in Cisco Products Allow for Remote Code Execution</title><link>https://feed.craftedsignal.io/briefs/2024-07-cisco-multiple-vulns/</link><pubDate>Fri, 24 Apr 2026 05:43:56 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-07-cisco-multiple-vulns/</guid><description>Multiple vulnerabilities in Cisco ASA, Secure Firewall Threat Defense, IOS, IOS XE, and IOS XR allow a remote attacker to bypass authentication and execute arbitrary code with administrator privileges.</description><content:encoded><![CDATA[<p>A cluster of vulnerabilities affects Cisco ASA (Adaptive Security Appliance), Cisco Secure Firewall Threat Defense, Cisco IOS, Cisco IOS XE, and Cisco IOS XR. A remote attacker, either authenticated or anonymous, can exploit these vulnerabilities to bypass authentication mechanisms and execute arbitrary code with administrator privileges. The broad scope of affected products, ranging from security appliances to core networking infrastructure, makes this a critical issue for organizations relying on Cisco technology. Successful exploitation could lead to widespread network compromise and data breaches.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable Cisco device (ASA, Firewall Threat Defense, IOS, IOS XE, or IOS XR).</li>
<li>Attacker exploits a vulnerability allowing authentication bypass.</li>
<li>Upon successful authentication bypass, the attacker gains unauthorized access to the device.</li>
<li>Attacker leverages another vulnerability on the compromised system to inject and execute arbitrary code.</li>
<li>The code executes with administrator privileges, granting the attacker full control over the device.</li>
<li>Attacker uses the compromised device as a pivot point to move laterally within the network.</li>
<li>Attacker compromises additional systems and exfiltrates sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities can lead to complete compromise of affected Cisco devices, allowing attackers to gain full administrative control. This can result in significant data breaches, service disruptions, and the potential for lateral movement within the network to compromise other critical systems. The broad range of affected Cisco products means a wide array of organizations are potentially at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rules to your SIEM and tune for your environment to detect exploitation attempts.</li>
<li>Consult Cisco&rsquo;s security advisories for specific vulnerability details and apply the appropriate patches or mitigations as soon as they become available.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cisco</category><category>vulnerability</category><category>rce</category><category>authentication-bypass</category></item><item><title>OpenVPN-auth-oauth2 Authentication Bypass in Plugin Mode</title><link>https://feed.craftedsignal.io/briefs/2026-04-openvpn-auth-bypass/</link><pubDate>Wed, 22 Apr 2026 14:29:22 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-openvpn-auth-bypass/</guid><description>A critical authentication bypass vulnerability exists in openvpn-auth-oauth2 versions 1.26.3 through 1.27.2 when deployed in the experimental plugin mode; clients that do not support WebAuth/SSO are incorrectly granted VPN access without completing OIDC authentication.</description><content:encoded><![CDATA[<p>OpenVPN-auth-oauth2, a plugin for OpenVPN, is susceptible to an authentication bypass vulnerability in versions 1.26.3 through 1.27.2 when deployed in the experimental plugin mode. This flaw allows unauthenticated VPN access for clients that do not support WebAuth/SSO. Specifically, standard OpenVPN clients like the Linux CLI <code>openvpn</code>, which do not advertise WebAuth/SSO support (<code>IV_SSO=webauth</code>), can bypass OIDC authentication and gain full network access. The default management-interface mode is not affected. Successful exploitation grants unauthorized access to the internal network behind the VPN. This vulnerability is addressed in version 1.27.3.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies an OpenVPN server running openvpn-auth-oauth2 in experimental plugin mode (versions 1.26.3 - 1.27.2).</li>
<li>Attacker uses a standard OpenVPN client (e.g., Linux <code>openvpn</code> CLI) that does not support WebAuth/SSO.</li>
<li>The client initiates a connection to the OpenVPN server, bypassing the expected WebAuth/SSO flow.</li>
<li>The openvpn-auth-oauth2 plugin attempts to deny the client by writing &ldquo;0&rdquo; to the <code>auth_control_file</code>.</li>
<li>The plugin incorrectly returns <code>OPENVPN_PLUGIN_FUNC_SUCCESS</code> to the OpenVPN server.</li>
<li>OpenVPN interprets the <code>FUNC_SUCCESS</code> return code as successful authentication, ignoring the &ldquo;0&rdquo; in the <code>auth_control_file</code>.</li>
<li>The OpenVPN server grants the unauthenticated client full access to the internal network behind the VPN.</li>
<li>Attacker gains unauthorized access to internal resources and performs malicious activities such as data exfiltration or lateral movement.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability grants unauthenticated attackers full access to the internal network behind the OpenVPN server. This could lead to data breaches, lateral movement within the network, and potential compromise of sensitive systems. The vulnerability affects any deployment using the experimental plugin mode with vulnerable versions. This could result in significant financial losses, reputational damage, and legal repercussions for affected organizations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately upgrade to openvpn-auth-oauth2 version 1.27.3 to apply the fix described in commit <a href="https://github.com/jkroepke/openvpn-auth-oauth2/commit/36f69a6c67c1054da7cbfa04ced3f0555127c8f2"><code>36f69a6</code></a>.</li>
<li>If immediate upgrade is not feasible, switch to the standalone management client mode (the default, non-plugin deployment) as a workaround.</li>
<li>Monitor OpenVPN server logs for connection attempts from clients that do not support WebAuth/SSO (identified by missing <code>IV_SSO=webauth</code> in the logs) and correlate with network access activity.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>openvpn</category><category>authentication-bypass</category><category>vpn</category></item><item><title>NVIDIA KAI Scheduler Authentication Bypass Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-nvidia-kai-auth-bypass/</link><pubDate>Wed, 22 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-nvidia-kai-auth-bypass/</guid><description>CVE-2026-24177 describes an authentication bypass vulnerability in NVIDIA KAI Scheduler that could allow unauthorized access to API endpoints, leading to information disclosure.</description><content:encoded><![CDATA[<p>CVE-2026-24177 details a security flaw within the NVIDIA KAI Scheduler. This vulnerability stems from a lack of proper authentication mechanisms for critical API endpoints. An attacker exploiting this flaw could potentially bypass authorization checks and gain unauthorized access to sensitive functionalities. Successful exploitation leads to information disclosure. The affected product is NVIDIA KAI Scheduler. As of April 2026, exploitation in the wild has not been confirmed, but the potential impact warrants immediate attention from security teams. This vulnerability allows an attacker with network access to the KAI Scheduler to retrieve sensitive information without proper authorization.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies an exposed NVIDIA KAI Scheduler instance.</li>
<li>The attacker crafts a malicious HTTP request targeting an API endpoint lacking authentication (CWE-306).</li>
<li>The attacker sends the request to the KAI Scheduler.</li>
<li>Due to the missing authentication check, the KAI Scheduler processes the request without verifying the attacker&rsquo;s identity.</li>
<li>The KAI Scheduler returns sensitive information to the attacker.</li>
<li>The attacker analyzes the disclosed information for further exploitation.</li>
<li>The attacker uses the disclosed information to access other systems.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-24177 enables an attacker to bypass authentication and access sensitive information managed by the NVIDIA KAI Scheduler. The type of information exposed depends on the specific API endpoint accessed, and could include configuration data, user credentials, or internal system details. The NIST advisory assigns a CVSS v3.1 base score of 7.7 (HIGH), highlighting the significant risk of information disclosure.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for suspicious requests to NVIDIA KAI Scheduler API endpoints (webserver category, product linux/windows).</li>
<li>Inspect network traffic for unauthorized access to NVIDIA KAI Scheduler API endpoints (network_connection category).</li>
<li>Deploy the Sigma rules provided to detect potential exploitation attempts against NVIDIA KAI Scheduler.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">threat</category><category>vulnerability</category><category>authentication-bypass</category><category>nvidia</category></item><item><title>JetBrains TeamCity Authentication Bypass and Path Traversal Vulnerabilities</title><link>https://feed.craftedsignal.io/briefs/2026-04-jetbrains-teamcity-vulns/</link><pubDate>Wed, 22 Apr 2026 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-jetbrains-teamcity-vulns/</guid><description>Unpatched JetBrains TeamCity servers are being actively exploited via an authentication bypass (CVE-2024-27198) and path traversal vulnerability (CVE-2024-27199), allowing attackers to perform administrative actions and potentially conduct supply-chain attacks.</description><content:encoded><![CDATA[<p>JetBrains TeamCity, a CI/CD software platform, is vulnerable to CVE-2024-27198, an authentication bypass, and CVE-2024-27199, a path traversal vulnerability. These flaws affect TeamCity versions prior to 2023.11.4. Initially, there was no observed active exploitation. However, by March 7, 2024, widespread exploitation was detected following the public availability of proof-of-concept code. Attackers are actively exploiting these vulnerabilities to create new user accounts on publicly exposed, unpatched TeamCity instances. A substantial number of compromised servers are utilized as production machines for software building and deployment. These attacks have the potential to lead to supply-chain compromises by exposing sensitive information. CISA added CVE-2024-27199 to its Known Exploited Vulnerabilities catalog on April 20, 2026.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker sends a crafted HTTP request to a vulnerable TeamCity server, exploiting CVE-2024-27198 to bypass authentication.</li>
<li>Once authenticated (or bypassing authentication), the attacker leverages CVE-2024-27199, a path traversal vulnerability, to access sensitive files and directories on the server.</li>
<li>The attacker reads configuration files containing credentials for other systems and services.</li>
<li>The attacker creates new administrative user accounts on the TeamCity server to ensure persistent access.</li>
<li>The attacker modifies build configurations to inject malicious code into software builds.</li>
<li>The attacker compromises the software supply chain by injecting malicious code into build artifacts.</li>
<li>The attacker uses stolen credentials to access deployment environments and deploy compromised builds.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to perform administrative actions on affected TeamCity servers, leading to a compromise of confidentiality, integrity, and availability of data and infrastructure. The compromise of TeamCity servers used for software building and deployment can result in supply-chain attacks, as these servers often contain sensitive information, such as credentials for deployment environments. A substantial portion of compromised TeamCity servers are utilized as production machines for software building and deployment processes, increasing the scope and impact of potential supply chain attacks.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately patch all JetBrains TeamCity servers to version 2023.11.4 or later to remediate CVE-2024-27198 and CVE-2024-27199 (Reference: <a href="https://www.jetbrains.com/privacy-security/issues-fixed/)">https://www.jetbrains.com/privacy-security/issues-fixed/)</a>.</li>
<li>Deploy the Sigma rule &ldquo;Detect TeamCity Authentication Bypass Attempt&rdquo; to your SIEM to detect exploitation attempts of CVE-2024-27198.</li>
<li>Enable web server logging and increase monitoring to detect suspicious activity related to path traversal attempts indicative of CVE-2024-27199 exploitation.</li>
<li>Monitor for the creation of new user accounts within TeamCity, especially administrative accounts, which could indicate successful exploitation.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">threat</category><category>teamcity</category><category>vulnerability</category><category>authentication bypass</category><category>path traversal</category><category>supply-chain</category></item><item><title>Rowboatlabs Rowboat Improper Authentication Vulnerability (CVE-2026-6635)</title><link>https://feed.craftedsignal.io/briefs/2026-04-rowboat-auth-bypass/</link><pubDate>Mon, 20 Apr 2026 12:16:09 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-rowboat-auth-bypass/</guid><description>An improper authentication vulnerability in rowboatlabs rowboat &lt;=0.1.67 allows remote attackers to bypass authentication by manipulating the X-Tools-JWE argument in the tool_call function, potentially leading to unauthorized access and control.</description><content:encoded><![CDATA[<p>A critical security flaw, identified as CVE-2026-6635, has been discovered in rowboatlabs rowboat, specifically in versions up to and including 0.1.67. This vulnerability resides within the <code>tool_call</code> function located in the <code>apps/experimental/tools_webhook/app.py</code> file of the <code>tools_webhook</code> component.  The vulnerability stems from the improper handling of the <code>X-Tools-JWE</code> argument, which can be manipulated by a remote attacker to bypass authentication mechanisms. This flaw allows attackers to potentially gain unauthorized access and execute arbitrary actions within the application. Public exploits are available, increasing the urgency for mitigation. The vendor was notified but has not responded.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable instance of rowboatlabs rowboat version 0.1.67 or earlier.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>tool_call</code> function.</li>
<li>Within the HTTP request, the attacker manipulates the <code>X-Tools-JWE</code> argument with a crafted payload designed to bypass authentication checks.</li>
<li>The vulnerable <code>tool_call</code> function fails to properly validate the manipulated <code>X-Tools-JWE</code> argument.</li>
<li>The application grants the attacker unauthorized access based on the bypassed authentication.</li>
<li>The attacker leverages the unauthorized access to execute actions normally restricted to authenticated users.</li>
<li>Depending on the application&rsquo;s functionality, this could involve data exfiltration, modification, or execution of arbitrary code.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-6635 can lead to complete compromise of the rowboatlabs rowboat application. Attackers can gain unauthorized access to sensitive data, modify application settings, or even execute arbitrary code on the server. Due to the ease of exploitation with public exploits available, all instances of vulnerable rowboat versions are at immediate risk. The specific impact depends on the application&rsquo;s role and the data it handles, but potential consequences include data breaches, service disruption, and financial loss.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply appropriate input validation to <code>X-Tools-JWE</code> argument using <code>tool_call</code> function within <code>apps/experimental/tools_webhook/app.py</code> to prevent improper authentication (CVE-2026-6635).</li>
<li>Deploy the Sigma rule <code>Detect Rowboat Authentication Bypass Attempt via X-Tools-JWE Manipulation</code> to detect exploitation attempts.</li>
<li>Monitor web server logs for HTTP requests targeting the <code>tool_call</code> function with unusual <code>X-Tools-JWE</code> values.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-6635</category><category>authentication bypass</category><category>web application</category></item><item><title>liangliangyy DjangoBlog Authentication Bypass Vulnerability (CVE-2026-6577)</title><link>https://feed.craftedsignal.io/briefs/2026-04-djangoblog-auth-bypass/</link><pubDate>Sun, 19 Apr 2026 20:16:28 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-djangoblog-auth-bypass/</guid><description>A critical authentication bypass vulnerability in liangliangyy DjangoBlog up to version 2.1.0.0 (CVE-2026-6577) allows remote attackers to inject arbitrary GPS data without authentication via the logtracks endpoint, potentially leading to data manipulation and unauthorized access.</description><content:encoded><![CDATA[<p>CVE-2026-6577 is an authentication bypass vulnerability affecting liangliangyy DjangoBlog versions up to 2.1.0.0. The vulnerability exists within an unknown function of the <code>owntracks/views.py</code> file related to the <code>logtracks</code> endpoint. Due to missing authentication, a remote attacker can inject arbitrary GPS data without proper authorization. This can lead to manipulation of location data, unauthorized access to location-based features, and potentially further compromise of the application. A public exploit for this vulnerability is available, increasing the risk of exploitation. This vulnerability poses a significant threat to organizations using DjangoBlog, potentially impacting data integrity and confidentiality.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a DjangoBlog instance running a vulnerable version (&lt;= 2.1.0.0).</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>/owntracks/views.py</code> <code>logtracks</code> endpoint.</li>
<li>The malicious request injects arbitrary GPS data, bypassing the authentication mechanisms.</li>
<li>The DjangoBlog application processes the crafted request without proper authentication checks.</li>
<li>The injected GPS data is stored and associated with a user or device, potentially overwriting legitimate data.</li>
<li>The attacker gains unauthorized access to location-based features or data due to the injected GPS coordinates.</li>
<li>The attacker leverages the compromised location data to perform further malicious activities, such as tracking user movements or manipulating location-based services.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-6577 allows attackers to inject arbitrary GPS data into vulnerable DjangoBlog instances. This can lead to the manipulation of user location data, potentially impacting location-based services and features. An attacker can track user movements, access restricted resources based on location, or even impersonate legitimate users. Given the availability of a public exploit, unpatched DjangoBlog instances are at high risk of compromise, potentially affecting hundreds of deployments. The lack of vendor response exacerbates the risk, as no official patch or mitigation is available.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect Suspicious GPS Data Injection</code> to your SIEM to identify exploitation attempts targeting the <code>logtracks</code> endpoint (logsource: webserver).</li>
<li>Inspect web server logs for requests to <code>/owntracks/views.py</code> with unusual parameters or patterns, potentially indicating malicious GPS data injection (logsource: webserver).</li>
<li>Monitor application logs for any anomalies related to GPS data processing or location-based services, which might be signs of successful exploitation (logsource: webserver).</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-6577</category><category>djangoblog</category><category>authentication-bypass</category><category>gps-injection</category><category>web-application</category></item><item><title>FastGPT NoSQL Injection Vulnerability (CVE-2026-40351)</title><link>https://feed.craftedsignal.io/briefs/2026-04-fastgpt-nosql-injection/</link><pubDate>Sat, 18 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-fastgpt-nosql-injection/</guid><description>FastGPT versions before 4.14.9.5 are vulnerable to NoSQL injection, allowing unauthenticated attackers to bypass authentication and gain administrative access.</description><content:encoded><![CDATA[<p>FastGPT is an AI Agent building platform. Versions prior to 4.14.9.5 are susceptible to a critical NoSQL injection vulnerability (CVE-2026-40351) affecting the password-based login endpoint. The vulnerability stems from the use of TypeScript type assertion without runtime validation, enabling unauthenticated attackers to inject MongoDB query operators within the password field. This bypasses the intended password check, granting the attacker the ability to authenticate as any user, including the root administrator. Successful exploitation leads to complete control over the FastGPT instance and its associated data. This vulnerability was addressed in FastGPT version 4.14.9.5. All users of FastGPT versions prior to 4.14.9.5 are vulnerable to this attack.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a vulnerable FastGPT instance running a version prior to 4.14.9.5.</li>
<li>The attacker crafts a malicious HTTP POST request to the password-based login endpoint.</li>
<li>Within the POST request body, the attacker places a MongoDB query operator object (e.g., <code>{&quot;$ne&quot;: &quot;&quot;}</code>) in the password field, bypassing the standard password check.</li>
<li>The vulnerable FastGPT application processes the malicious request without proper validation.</li>
<li>The MongoDB query operator is executed, bypassing the authentication mechanism.</li>
<li>The attacker is granted unauthorized access to the FastGPT application, assuming the identity of an arbitrary user, including the root administrator.</li>
<li>The attacker leverages their administrative privileges to access sensitive data, modify configurations, or perform other malicious actions within the FastGPT instance.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-40351 allows an unauthenticated attacker to gain complete control over a FastGPT instance. This can lead to unauthorized access to sensitive AI agent configurations, user data, and other critical information. The impact includes data breaches, service disruption, and potential compromise of downstream systems that rely on the FastGPT platform. Given the critical nature of AI agent building platforms, the compromise of a FastGPT instance can have far-reaching consequences.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately upgrade all FastGPT instances to version 4.14.9.5 or later to patch CVE-2026-40351.</li>
<li>Deploy the Sigma rule <code>Detect FastGPT NoSQL Injection Attempt</code> to identify potential exploitation attempts targeting the login endpoint.</li>
<li>Monitor web server logs for unusual POST requests to the login endpoint, specifically looking for MongoDB query operators within the password field as detected by rule <code>Detect FastGPT NoSQL Injection Attempt</code>.</li>
<li>Review and restrict network access to the FastGPT instance to only authorized users and systems to minimize the attack surface.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>NoSQL injection</category><category>authentication bypass</category><category>CVE-2026-40351</category><category>FastGPT</category></item><item><title>Anviz CX2 Lite and CX7 Unauthenticated Debug Setting Modification</title><link>https://feed.craftedsignal.io/briefs/2026-04-anviz-auth-bypass/</link><pubDate>Fri, 17 Apr 2026 20:16:36 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-anviz-auth-bypass/</guid><description>Anviz CX2 Lite and CX7 devices are vulnerable to unauthenticated POST requests that allow modification of debug settings such as enabling SSH, leading to unauthorized state changes and potential compromise.</description><content:encoded><![CDATA[<p>CVE-2026-40461 describes a vulnerability affecting Anviz CX2 Lite and CX7 devices. The vulnerability allows unauthenticated attackers to send POST requests that modify debug settings on the devices. A successful exploit can enable features like SSH, which are normally restricted. This unauthorized configuration change could be leveraged to gain unauthorized access to the device and potentially the network it is connected to, allowing for further malicious activity. The vulnerability was disclosed in April 2026 and poses a significant risk to organizations using the affected Anviz devices for access control.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies an Anviz CX2 Lite or CX7 device on the network.</li>
<li>The attacker sends an unauthenticated POST request to the device&rsquo;s web interface.</li>
<li>The POST request targets a specific endpoint responsible for modifying debug settings.</li>
<li>The request includes parameters that enable debug features, such as SSH.</li>
<li>The device improperly processes the request without requiring authentication, modifying the debug settings accordingly.</li>
<li>The attacker uses the newly enabled SSH service to gain shell access to the device.</li>
<li>The attacker leverages the gained access to escalate privileges, move laterally within the network, or exfiltrate sensitive information.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-40461 allows an attacker to modify device settings, potentially enabling unauthorized access and control over Anviz CX2 Lite and CX7 devices. This can lead to a compromise of the physical security system and potentially the entire network. The impact includes unauthorized entry, data breaches, and disruption of operations. The number of affected devices and organizations is currently unknown.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor network traffic for POST requests targeting Anviz CX2 Lite and CX7 devices attempting to modify debug settings. Deploy the Sigma rule <code>Detect Anviz Debug Setting Modification</code> to identify such activity.</li>
<li>Implement network segmentation to isolate Anviz devices from critical network resources to limit the impact of a potential compromise.</li>
<li>Consult the vendor&rsquo;s website (<a href="https://www.anviz.com/contact-us.html">https://www.anviz.com/contact-us.html</a>) and CISA advisory (<a href="https://www.cisa.gov/news-events/ics-advisories/icsa-26-106-03">https://www.cisa.gov/news-events/ics-advisories/icsa-26-106-03</a>) for any available patches or mitigations.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-40461</category><category>authentication-bypass</category><category>iot</category></item><item><title>OpenViking Authentication Bypass Vulnerability (CVE-2026-40525)</title><link>https://feed.craftedsignal.io/briefs/2024-02-openviking-auth-bypass/</link><pubDate>Fri, 17 Apr 2026 19:16:39 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-02-openviking-auth-bypass/</guid><description>OpenViking versions prior to commit c7bb167 are vulnerable to an authentication bypass that allows remote attackers to invoke privileged bot-control functionality without authentication when the api_key configuration is unset or empty, potentially leading to unauthorized access to downstream systems and data.</description><content:encoded><![CDATA[<p>OpenViking, a bot management framework, contains a critical authentication bypass vulnerability (CVE-2026-40525) affecting versions prior to commit c7bb167. Specifically, the VikingBot OpenAPI HTTP route surface fails to enforce authentication when the <code>api_key</code> configuration value is either unset or configured as an empty string. This vulnerability enables remote attackers with network access to the exposed OpenViking service to bypass authentication controls and execute privileged bot-control functionalities. This includes submitting attacker-controlled prompts, creating or manipulating bot sessions, and gaining unauthorized access to downstream tools, integrations, secrets, and sensitive data that the bot has access to. Given the potential for broad impact and ease of exploitation, this vulnerability poses a significant risk to organizations using vulnerable versions of OpenViking.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable OpenViking instance with an exposed VikingBot OpenAPI endpoint.</li>
<li>Attacker checks the <code>api_key</code> configuration on the target, either through misconfiguration or default settings, it&rsquo;s found to be unset or empty.</li>
<li>Attacker crafts a malicious HTTP request to the VikingBot OpenAPI endpoint, omitting the required <code>X-API-Key</code> header.</li>
<li>Due to the authentication bypass, the vulnerable OpenViking instance processes the attacker&rsquo;s request without proper authentication.</li>
<li>Attacker utilizes the exposed bot-control functionalities to submit malicious prompts.</li>
<li>Attacker creates or hijacks bot sessions, leveraging the compromised session to access downstream systems.</li>
<li>Attacker leverages the bot&rsquo;s permissions to access internal tools, integrations, and secrets, potentially escalating privileges.</li>
<li>Attacker exfiltrates sensitive data or compromises downstream systems accessible to the bot.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-40525 allows attackers to completely bypass authentication controls and gain full access to bot control functionalities within the OpenViking framework. This could lead to unauthorized access to sensitive data, compromise of downstream systems and integrations, and potential financial loss. The CVSS v3.1 base score for this vulnerability is 9.1, highlighting its critical severity and the potential for widespread damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately upgrade OpenViking to a version containing commit c7bb167 or later to patch CVE-2026-40525.</li>
<li>If upgrading is not immediately possible, configure a strong, unique <code>api_key</code> value within the OpenViking configuration to mitigate the authentication bypass.</li>
<li>Deploy the Sigma rule &ldquo;OpenViking Authentication Bypass Attempt&rdquo; to detect unauthorized requests to the VikingBot API endpoint lacking the <code>X-API-Key</code> header.</li>
<li>Monitor web server logs for HTTP requests to the VikingBot OpenAPI endpoint without the <code>X-API-Key</code> header to identify potential exploitation attempts using the &ldquo;OpenViking API requests without API Key&rdquo; Sigma rule.</li>
<li>Review access logs for downstream systems connected to OpenViking for any unauthorized activity originating from the OpenViking server following potential exploitation.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>CVE-2026-40525</category><category>authentication-bypass</category><category>openviking</category><category>api</category></item><item><title>Paperclip Unauthenticated API Access Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-paperclip-auth-bypass/</link><pubDate>Fri, 17 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-paperclip-auth-bypass/</guid><description>Paperclip application suffers from multiple unauthenticated API access vulnerabilities allowing attackers to access sensitive data, gather reconnaissance, and potentially bypass authentication.</description><content:encoded><![CDATA[<p>Paperclip, a software application, contains multiple API endpoints that lack proper authentication checks, even when the application is configured in &ldquo;authenticated&rdquo; mode. This vulnerability allows unauthenticated access to sensitive information and functionality. Observed in versions prior to 2026.416.0, the issue impacts the confidentiality and integrity of the application. An attacker can exploit these vulnerabilities to gather reconnaissance information about the deployment, access heartbeat run issues, retrieve agent instructions, and potentially bypass authentication mechanisms via unauthenticated CLI challenge creation. The disclosed information includes API structure, authentication mechanisms, and internal workflows, which can be leveraged for further malicious activities.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker sends an unauthenticated GET request to <code>/api/health</code> to obtain deployment mode, exposure setting, auth status, version, and feature flags.</li>
<li>The attacker sends an unauthenticated GET request to <code>/api/skills/index</code> to retrieve a list of available skill endpoints.</li>
<li>The attacker sends an unauthenticated GET request to <code>/api/skills/paperclip</code> to leak the agent heartbeat procedure, API endpoints, parameters, authentication mechanisms, and agent coordination protocols.</li>
<li>The attacker sends an unauthenticated GET request to <code>/api/heartbeat-runs/:runId/issues</code>, attempting to access issue data for a heartbeat run by guessing or obtaining a valid <code>runId</code>.</li>
<li>The attacker sends an unauthenticated POST request to <code>/api/cli-auth/challenges</code> with a JSON payload containing a command to create a CLI authentication challenge and obtain a <code>boardApiToken</code>.</li>
<li>The attacker uses the leaked information to map the internal API structure and plan further attacks or unauthorized access.</li>
<li>The attacker exploits the <code>boardApiToken</code> obtained in step 5, combined with open registration (if enabled), to persistently generate API keys.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>This vulnerability results in significant data exposure, including heartbeat run issues, agent instructions, and internal API structure. An attacker can fingerprint the deployment and map the entire internal API for reconnaissance purposes. Successful exploitation of the unauthenticated CLI challenge creation allows for authentication bypass, potentially leading to a full remote code execution chain. The vulnerability affects organizations using Paperclip versions prior to 2026.416.0. A successful attack can compromise sensitive data, facilitate unauthorized access, and lead to further malicious activities.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the patch to upgrade Paperclip to version 2026.416.0 or later, which addresses the unauthenticated API access vulnerabilities.</li>
<li>Implement authentication checks for the <code>/api/heartbeat-runs/:runId/issues</code> endpoint in <code>server/src/routes/activity.ts</code> using <code>assertCompanyAccess</code>.</li>
<li>Implement authentication checks for the <code>/api/cli-auth/challenges</code> endpoint in <code>server/src/routes/access.ts</code> using <code>assertBoard</code>.</li>
<li>Implement authentication checks for the <code>/api/skills/index</code> and <code>/api/skills/:skillName</code> endpoints in <code>server/src/routes/access.ts</code>.</li>
<li>Reduce the information exposed by the <code>/api/health</code> endpoint by removing sensitive data such as <code>deploymentMode</code>, <code>deploymentExposure</code>, and <code>version</code> or by requiring authentication via <code>assertBoard</code>.</li>
<li>Deploy the Sigma rule &ldquo;Detect Paperclip Unauthenticated Health Endpoint Access&rdquo; to identify unauthorized access attempts to the <code>/api/health</code> endpoint.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>paperclip</category><category>authentication-bypass</category><category>api-vulnerability</category></item><item><title>Velociraptor Authentication Bypass via query() Plugin</title><link>https://feed.craftedsignal.io/briefs/2026-04-velociraptor-auth-bypass/</link><pubDate>Wed, 15 Apr 2026 18:17:25 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-velociraptor-auth-bypass/</guid><description>Velociraptor versions prior to 0.76.3 contain an authentication bypass vulnerability in the query() plugin, allowing authenticated users to access data from other organizations within the Velociraptor deployment, potentially leading to unauthorized data access and privilege escalation.</description><content:encoded><![CDATA[<p>Velociraptor, a powerful open-source endpoint detection and response (EDR) framework, is vulnerable to an authentication bypass issue affecting versions prior to 0.76.3. The vulnerability, identified as CVE-2026-6290, resides within the <code>query()</code> plugin.  A user with valid credentials and access to one organization within Velociraptor can leverage the <code>query()</code> plugin from a notebook cell to execute VQL (Velociraptor Query Language) queries against other organizations, irrespective of their explicit permissions in those other organizations. This occurs because the plugin improperly uses the user&rsquo;s current ACL token for all queries, effectively granting the user the same level of access across all organizations as they have in their primary organization. This vulnerability allows for potentially broad data exfiltration and privilege escalation within a Velociraptor deployment.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains valid credentials for a user account within one organization in a vulnerable Velociraptor instance (version &lt; 0.76.3).</li>
<li>The attacker logs into the Velociraptor GUI.</li>
<li>The attacker creates a new notebook or modifies an existing one.</li>
<li>Within a notebook cell, the attacker uses the <code>query()</code> plugin with a crafted VQL query designed to access data from a different organization. For example, using <code>SELECT * FROM org_id='TARGET_ORG'</code>.</li>
<li>The Velociraptor server processes the query using the attacker&rsquo;s existing ACL token, bypassing the organization&rsquo;s access controls.</li>
<li>The server returns data from the target organization to the attacker.</li>
<li>The attacker analyzes the retrieved data, potentially gaining access to sensitive information or identifying further targets within the compromised Velociraptor instance.</li>
<li>The attacker uses the information gathered to perform actions in other organizations, based on the permissions of their initial account.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-6290 could allow an attacker to gain unauthorized access to sensitive data stored within different organizations managed by the same Velociraptor instance.  This could lead to the exfiltration of confidential information, potential privilege escalation within targeted organizations, and a compromise of the overall security posture of the affected environment. The severity is compounded by the fact that it&rsquo;s a logic error within a security product, making it harder to detect and remediate without patching. The CVSS v3.1 score is 8.0 HIGH, indicating a significant risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately upgrade all Velociraptor installations to version 0.76.3 or later to patch CVE-2026-6290.</li>
<li>Prioritize reviewing Velociraptor user accounts and their assigned organizational access to identify potentially compromised accounts.</li>
<li>Deploy the Sigma rule provided in this brief to detect anomalous use of the <code>query()</code> plugin that targets different organizations than the user&rsquo;s primary organization.</li>
<li>Monitor Velociraptor server logs for any unexpected access patterns or data retrieval attempts originating from the <code>query()</code> plugin.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>velociraptor</category><category>authentication bypass</category><category>privilege escalation</category><category>cve-2026-6290</category></item><item><title>OAuth2 Proxy Authentication Bypass via User-Agent Header</title><link>https://feed.craftedsignal.io/briefs/2026-04-oauth2-bypass/</link><pubDate>Wed, 15 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-oauth2-bypass/</guid><description>A critical authentication bypass vulnerability (CVE-2026-34457) exists in OAuth2 Proxy when used with `auth_request`-style integration and either `--ping-user-agent` is set or `--gcp-healthchecks` is enabled, allowing unauthenticated access to protected resources.</description><content:encoded><![CDATA[<p>OAuth2 Proxy is vulnerable to an authentication bypass (CVE-2026-34457) when configured with <code>auth_request</code>-style integration (e.g., nginx <code>auth_request</code>) and either the <code>--ping-user-agent</code> option is set or <code>--gcp-healthchecks</code> is enabled. This flaw allows an unauthenticated remote attacker to gain unauthorized access to protected upstream resources. The vulnerability exists because OAuth2 Proxy incorrectly treats requests with the configured health check <code>User-Agent</code> value as legitimate health checks, irrespective of the requested path. This bypasses the normal login flow, granting access without proper authentication. Versions prior to v7.15.2 are affected, alongside versions &lt;= 3.2.0. Defenders must take immediate action to remediate affected deployments.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies an OAuth2 Proxy deployment utilizing <code>auth_request</code> and either <code>--ping-user-agent</code> or <code>--gcp-healthchecks</code>.</li>
<li>Attacker determines the configured <code>--ping-user-agent</code> value or identifies that <code>--gcp-healthchecks</code> is enabled (default User-Agent: GoogleHC/1.0).</li>
<li>Attacker crafts an HTTP request to a protected resource, setting the <code>User-Agent</code> header to the configured <code>--ping-user-agent</code> value (or &ldquo;GoogleHC/1.0&rdquo; if <code>--gcp-healthchecks</code> is enabled).</li>
<li>The reverse proxy (e.g., Nginx) forwards the request to the OAuth2 Proxy&rsquo;s <code>/oauth2/auth</code> endpoint.</li>
<li>OAuth2 Proxy incorrectly interprets the request as a health check due to the matching <code>User-Agent</code> header.</li>
<li>OAuth2 Proxy responds to the reverse proxy with a 200 OK status, indicating successful authentication.</li>
<li>The reverse proxy, believing the authentication was successful, forwards the attacker&rsquo;s request to the protected upstream resource.</li>
<li>Attacker successfully accesses the protected resource without authenticating, achieving unauthorized access.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability results in complete authentication bypass, granting attackers unauthorized access to sensitive resources protected by OAuth2 Proxy. The number of affected deployments is unknown, but any organization using OAuth2 Proxy with the specified configurations is potentially at risk. This can lead to data breaches, service disruption, and other severe security incidents.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to OAuth2 Proxy version <code>v7.15.2</code> or later to patch CVE-2026-34457.</li>
<li>Disable the <code>--gcp-healthchecks</code> flag if it is enabled.</li>
<li>Remove any configured <code>--ping-user-agent</code> flag.</li>
<li>Implement reverse proxy configurations, such as the provided Nginx example, to prevent forwarding client-controlled <code>User-Agent</code> headers to the OAuth2 Proxy <code>/oauth2/auth</code> endpoint.</li>
<li>Deploy the Sigma rule &ldquo;OAuth2 Proxy Authentication Bypass Attempt&rdquo; to detect malicious requests exploiting this vulnerability.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>oauth2-proxy</category><category>authentication-bypass</category><category>web-application</category></item><item><title>Industrial Edge Management Authentication Bypass Vulnerability (CVE-2026-33892)</title><link>https://feed.craftedsignal.io/briefs/2026-04-industrial-edge-auth-bypass/</link><pubDate>Tue, 14 Apr 2026 09:16:36 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-industrial-edge-auth-bypass/</guid><description>CVE-2026-33892 allows an unauthenticated remote attacker to bypass authentication and impersonate a legitimate user in affected Industrial Edge Management Pro and Virtual versions by exploiting improper enforcement of user authentication on remote connections to devices, potentially enabling unauthorized access and control.</description><content:encoded><![CDATA[<p>A critical authentication bypass vulnerability, CVE-2026-33892, affects Industrial Edge Management Pro V1 (versions &gt;= V1.7.6 and &lt; V1.15.17), Industrial Edge Management Pro V2 (versions &gt;= V2.0.0 and &lt; V2.1.1), and Industrial Edge Management Virtual (versions &gt;= V2.2.0 and &lt; V2.8.0). The flaw stems from a failure to properly enforce user authentication on remote connections to managed devices. An unauthenticated attacker can exploit this vulnerability to circumvent authentication mechanisms and impersonate a legitimate user, potentially gaining unauthorized access to and control over the affected devices. Successful exploitation requires the attacker to discover the header and port used for remote connections and that the remote connection feature is enabled on the targeted device. While exploitation grants access to the device, it&rsquo;s important to note that security features implemented directly on the device itself, such as application-specific authentication, remain unaffected.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable Industrial Edge Management Pro or Virtual instance.</li>
<li>The attacker probes the target system to identify the header and port used for remote connections to managed devices. This may involve network scanning or analyzing network traffic.</li>
<li>The attacker exploits CVE-2026-33892 by crafting a malicious request that bypasses authentication, impersonating a legitimate user. This request is sent to the identified port using the specific header.</li>
<li>The vulnerable system accepts the unauthenticated request due to the improper enforcement of user authentication.</li>
<li>The attacker establishes a tunnel to the targeted managed device.</li>
<li>The attacker gains unauthorized access to the managed device, potentially allowing them to execute commands or access sensitive data.</li>
<li>The attacker leverages the tunneled connection to further compromise the device or network.</li>
<li>The attacker&rsquo;s final objective depends on their motives, potentially involving data exfiltration, disruption of services, or lateral movement within the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-33892 can lead to complete compromise of Industrial Edge Management systems and the managed devices connected to them. This could enable attackers to disrupt critical industrial processes, steal sensitive data, or launch further attacks within the affected network. The lack of proper authentication enforcement allows an attacker to impersonate legitimate users, granting them elevated privileges and potentially unrestricted access to the compromised system and devices. The severity of the impact depends on the criticality of the managed devices and the data they handle.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately upgrade Industrial Edge Management Pro V1 to a version &gt;= V1.15.17, Pro V2 to a version &gt;= V2.1.1, and Virtual to a version &gt;= V2.8.0 to patch CVE-2026-33892, as outlined in the product&rsquo;s security advisory.</li>
<li>Monitor network traffic for suspicious connections to Industrial Edge Management systems on non-standard ports, using the provided network_connection Sigma rule to identify potentially malicious activity.</li>
<li>Implement network segmentation to isolate Industrial Edge Management systems and managed devices from other parts of the network, limiting the potential impact of a successful exploit.</li>
<li>Review and enforce strong authentication policies on the managed devices themselves to mitigate the risk of unauthorized access even if the Industrial Edge Management system is compromised.</li>
<li>Enable and review logs from Industrial Edge Management systems, focusing on authentication attempts and remote connection activity, to detect and respond to suspicious behavior.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>CVE-2026-33892</category><category>authentication-bypass</category><category>industrial-control-system</category><category>edge-management</category></item><item><title>SINEC NMS Authentication Bypass Vulnerability (CVE-2026-24032)</title><link>https://feed.craftedsignal.io/briefs/2026-04-sinecnms-auth-bypass/</link><pubDate>Tue, 14 Apr 2026 09:16:34 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-sinecnms-auth-bypass/</guid><description>An authentication bypass vulnerability (CVE-2026-24032) exists in SINEC NMS versions prior to V4.0 SP3 due to insufficient user identity validation in the UMC component, allowing unauthenticated remote attackers to gain unauthorized access.</description><content:encoded><![CDATA[<p>A critical authentication bypass vulnerability, identified as CVE-2026-24032, affects SINEC NMS (Network Management System) versions prior to V4.0 SP3 with UMC (Unified Management Center). This weakness stems from insufficient validation of user identity within the UMC component, a central piece of the SINEC NMS architecture. Successful exploitation could allow a remote, unauthenticated attacker to bypass security measures and gain unauthorized access to the SINEC NMS application. Siemens has released a security advisory (SSA-801704) addressing this vulnerability. This poses a significant risk to organizations relying on SINEC NMS for network management, potentially leading to data breaches, system compromise, and denial-of-service attacks. The vulnerability was reported through the Zero Day Initiative (ZDI-CAN-27564).</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable SINEC NMS instance running a version prior to V4.0 SP3 with UMC.</li>
<li>The attacker crafts a malicious request that exploits the insufficient user identity validation in the UMC component.</li>
<li>This request is sent to the SINEC NMS server, targeting the UMC component&rsquo;s authentication process.</li>
<li>The UMC component fails to properly validate the user&rsquo;s identity due to the vulnerability.</li>
<li>The attacker bypasses the authentication mechanism, gaining unauthorized access.</li>
<li>With unauthorized access, the attacker can access sensitive data within the SINEC NMS application.</li>
<li>The attacker may then leverage their access to modify configurations, add malicious users, or disrupt network operations.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-24032 allows an unauthenticated remote attacker to gain complete unauthorized access to the SINEC NMS application. This could lead to the compromise of sensitive network configuration data, allowing the attacker to reconfigure managed network devices, monitor network traffic, and potentially disrupt critical infrastructure. Given the broad use of SINEC NMS in industrial control systems (ICS) and critical infrastructure, a successful attack could have significant consequences, including financial losses, operational downtime, and even physical damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately upgrade SINEC NMS to version V4.0 SP3 with UMC or later to patch CVE-2026-24032 as referenced in the Siemens advisory <a href="https://cert-portal.siemens.com/productcert/html/ssa-801704.html">https://cert-portal.siemens.com/productcert/html/ssa-801704.html</a>.</li>
<li>Deploy the Sigma rules provided in this brief to your SIEM to detect potential exploitation attempts.</li>
<li>Monitor web server logs for suspicious activity and unexpected requests targeting the UMC component.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sinec-nms</category><category>authentication-bypass</category><category>cve-2026-24032</category><category>siemens</category></item><item><title>MinIO Unauthenticated Object Write Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-minio-auth-bypass/</link><pubDate>Tue, 14 Apr 2026 00:05:52 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-minio-auth-bypass/</guid><description>Two authentication bypass vulnerabilities in MinIO allow writing arbitrary objects to any bucket with only a valid access key, without the secret key or valid signature, impacting all MinIO deployments.</description><content:encoded><![CDATA[<p>MinIO is susceptible to two authentication bypass vulnerabilities affecting all deployments up to AIStor RELEASE.2026-04-11T03-20-12Z. The vulnerability lies within the <code>STREAMING-UNSIGNED-PAYLOAD-TRAILER</code> code path. An attacker possessing a valid access key (including the default <code>minioadmin</code> or any key with WRITE permissions) can exploit these flaws to write arbitrary objects to any bucket. This bypass eliminates the need for the secret key or a valid cryptographic signature. One vulnerability involves missing signature verification in <code>PutObjectExtractHandler</code>, while the other bypasses signature verification using query-string credentials. These issues stem from the introduction of <code>authTypeStreamingUnsignedTrailer</code> support in commit 76913a9fd, specifically impacting releases from RELEASE.2023-05-18T00-05-36Z onwards.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker obtains a valid MinIO access key, either through default credentials or compromised accounts.</li>
<li>For vulnerability 1, the attacker crafts a PUT request with <code>X-Amz-Content-Sha256: STREAMING-UNSIGNED-PAYLOAD-TRAILER</code>, <code>X-Amz-Meta-Snowball-Auto-Extract: true</code>, and an <code>Authorization</code> header containing the valid access key but a fabricated signature.</li>
<li>The request is sent to the MinIO server&rsquo;s <code>PutObjectExtractHandler</code> endpoint.</li>
<li>Due to the missing signature verification in the <code>PutObjectExtractHandler</code>, the request proceeds without proper authentication.</li>
<li>The server extracts the access key and checks IAM permissions via <code>isPutActionAllowed</code>, but the fabricated signature is not validated.</li>
<li>The server accepts the request, and the attacker-controlled payload is extracted into the target bucket.</li>
<li>For vulnerability 2, the attacker crafts a PUT or PUT Part request omitting the <code>Authorization</code> header.</li>
<li>The attacker includes authentication credentials (access key) exclusively via the <code>X-Amz-Credential</code> query parameter. Since the <code>Authorization</code> header is missing, signature verification is skipped, and the request proceeds with the permissions of the impersonated access key, allowing the attacker to write arbitrary objects.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities allows unauthorized users to modify objects within MinIO storage buckets, potentially leading to data breaches, service disruptions, or the injection of malicious content. Any MinIO deployment is affected, creating a widespread risk for organizations relying on MinIO for their storage infrastructure. The CVSS v4.0 score of 8.8 (High) highlights the severity and potential impact of these vulnerabilities. The number of victims depends on the adoption rate of vulnerable MinIO versions.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to MinIO AIStor version <code>RELEASE.2026-04-11T03-20-12Z</code> or later, as indicated in the <a href="https://docs.min.io/enterprise/aistor-object-store/upgrade-aistor-server/community-edition/">MinIO AIStor documentation</a>.</li>
<li>Implement a block at the load balancer or reverse proxy to reject any requests containing <code>X-Amz-Content-Sha256: STREAMING-UNSIGNED-PAYLOAD-TRAILER</code>, as mentioned in the <strong>Workarounds</strong> section.</li>
<li>Deploy the Sigma rule <code>Detect MinIO Unsigned Payload Trailer</code> to identify exploitation attempts based on the presence of the vulnerable header.</li>
<li>Review and restrict WRITE permissions (<code>s3:PutObject</code>) to trusted principals to reduce the attack surface as described in the <strong>Workarounds</strong> section.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>minio</category><category>authentication-bypass</category><category>object-storage</category></item><item><title>zhayujie chatgpt-on-wechat CowAgent Authentication Bypass (CVE-2026-6129)</title><link>https://feed.craftedsignal.io/briefs/2026-04-chatgpt-wechat-auth-bypass/</link><pubDate>Sun, 12 Apr 2026 20:16:19 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-chatgpt-wechat-auth-bypass/</guid><description>CVE-2026-6129 is a critical vulnerability in zhayujie chatgpt-on-wechat CowAgent up to version 2.0.4, allowing remote attackers to bypass authentication via manipulation of the Agent Mode Service.</description><content:encoded><![CDATA[<p>A critical authentication bypass vulnerability, CVE-2026-6129, has been identified in zhayujie chatgpt-on-wechat CowAgent versions up to 2.0.4. This flaw resides within the Agent Mode Service component and enables unauthenticated remote attackers to execute unauthorized actions by manipulating requests. The vulnerability stems from missing authentication checks, allowing malicious actors to potentially gain unauthorized access and control over affected systems. Exploit code is publicly available, increasing the risk of widespread exploitation. The vendor has been notified, but has not yet responded to the report.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable instance of zhayujie chatgpt-on-wechat CowAgent running version 2.0.4 or earlier.</li>
<li>Attacker crafts a malicious request targeting the Agent Mode Service.</li>
<li>The malicious request bypasses authentication checks due to the missing authentication vulnerability (CVE-2026-6129).</li>
<li>The Agent Mode Service processes the crafted request without proper authorization.</li>
<li>Attacker gains unauthorized access to sensitive functions and data within the application.</li>
<li>Attacker leverages the gained access to execute arbitrary commands or manipulate application settings.</li>
<li>Attacker potentially escalates privileges within the application.</li>
<li>Attacker achieves full control over the affected chatgpt-on-wechat CowAgent instance.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-6129 can lead to complete compromise of the chatgpt-on-wechat CowAgent instance. This includes unauthorized access to user data, modification of application settings, and potentially remote code execution. The lack of authentication allows attackers to perform administrative actions without legitimate credentials. The impact is significant, especially if the affected instance handles sensitive information or is integrated with critical systems.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply available patches or updates for zhayujie chatgpt-on-wechat CowAgent immediately to remediate CVE-2026-6129.</li>
<li>Monitor web server logs for suspicious requests targeting the Agent Mode Service to identify potential exploitation attempts. Deploy the Sigma rule <code>Detect ChatGPT WeChat CowAgent Authentication Bypass Attempt</code> to detect exploitation attempts in web server logs.</li>
<li>Implement strong authentication mechanisms for all application endpoints, especially those handling sensitive data or administrative functions.</li>
<li>Restrict network access to the chatgpt-on-wechat CowAgent instance to only authorized users and systems.</li>
<li>Review and audit the application&rsquo;s codebase to identify and address any other potential security vulnerabilities.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-6129</category><category>authentication-bypass</category><category>chatgpt-on-wechat</category></item><item><title>zhayujie chatgpt-on-wechat CowAgent Authentication Bypass Vulnerability (CVE-2026-6126)</title><link>https://feed.craftedsignal.io/briefs/2026-04-cowagent-auth-bypass/</link><pubDate>Sun, 12 Apr 2026 11:16:16 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-cowagent-auth-bypass/</guid><description>CVE-2026-6126 is an unauthenticated remote code execution vulnerability in zhayujie chatgpt-on-wechat CowAgent 2.0.4 due to missing authentication in the Administrative HTTP Endpoint.</description><content:encoded><![CDATA[<p>A critical vulnerability, CVE-2026-6126, has been discovered in zhayujie chatgpt-on-wechat CowAgent version 2.0.4. This flaw resides within an unspecified function of the Administrative HTTP Endpoint component. Successful exploitation of this vulnerability allows remote attackers to bypass authentication mechanisms, potentially leading to unauthorized access and control over the affected system. The vulnerability is due to missing authentication checks on a critical function. Publicly available exploits exist, increasing the likelihood of exploitation. The project maintainers were notified; however, there has been no response at the time of this writing. This poses a significant risk to any deployment of chatgpt-on-wechat CowAgent 2.0.4 accessible over a network.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable instance of zhayujie chatgpt-on-wechat CowAgent 2.0.4.</li>
<li>Attacker crafts a malicious HTTP request targeting the Administrative HTTP Endpoint.</li>
<li>The malicious request bypasses authentication due to the missing authentication vulnerability (CVE-2026-6126).</li>
<li>The request executes an unauthorized administrative function.</li>
<li>Attacker gains unauthorized access to sensitive data or configuration.</li>
<li>Attacker deploys a persistent backdoor for long-term access.</li>
<li>Attacker uses the backdoor to pivot to other systems or networks.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-6126 can lead to complete compromise of the chatgpt-on-wechat CowAgent instance. This may enable attackers to access sensitive data, modify configurations, or disrupt services. Given that the application integrates with WeChat, a successful attack might expose sensitive user data or allow the attacker to conduct further attacks via the compromised instance. Due to the ease of exploitation and public availability of exploit code, the risk is considered high.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply available patches or updates for zhayujie chatgpt-on-wechat CowAgent to address CVE-2026-6126 as soon as they are released.</li>
<li>Monitor web server logs for suspicious activity targeting the Administrative HTTP Endpoint using the Sigma rule provided below.</li>
<li>Implement network segmentation to limit the potential impact of a compromised CowAgent instance.</li>
<li>Deploy a web application firewall (WAF) with rules to detect and block exploit attempts targeting CVE-2026-6126.</li>
<li>Conduct regular security audits of the chatgpt-on-wechat CowAgent deployment to identify and remediate potential vulnerabilities.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>CVE-2026-6126</category><category>authentication-bypass</category><category>web-application</category></item><item><title>Laravel Passport Authentication Bypass Vulnerability (CVE-2026-39976)</title><link>https://feed.craftedsignal.io/briefs/2026-04-laravel-auth-bypass/</link><pubDate>Thu, 09 Apr 2026 17:16:31 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-laravel-auth-bypass/</guid><description>Laravel Passport versions 13.0.0 before 13.7.1 contain an authentication bypass vulnerability (CVE-2026-39976) where machine-to-machine tokens can authenticate as a real user due to improper validation of the JWT sub claim.</description><content:encoded><![CDATA[<p>Laravel Passport, an OAuth2 server implementation for Laravel, is vulnerable to an authentication bypass (CVE-2026-39976) in versions 13.0.0 up to, but not including, 13.7.1. The vulnerability stems from the <code>league/oauth2-server</code> library, where the JWT <code>sub</code> claim is set to the client identifier for <code>client_credentials</code> tokens, as there is no associated user. Subsequently, the token guard uses this client identifier to retrieve user information via <code>retrieveById()</code> without proper validation, potentially resolving and authenticating an unrelated, real user. This means any machine-to-machine token can inadvertently authenticate as an actual user within the Laravel application. The vulnerability is resolved in Laravel Passport version 13.7.1. This allows attackers to perform actions with the privileges of the authenticated user.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker obtains a valid <code>client_credentials</code> token issued by Laravel Passport (versions 13.0.0 - 13.7.0). This could be a token intended for machine-to-machine communication.</li>
<li>The attacker sends a request to a protected endpoint of the Laravel application, including the <code>client_credentials</code> token in the <code>Authorization</code> header.</li>
<li>The Laravel Passport token guard extracts the JWT <code>sub</code> claim from the token. In vulnerable versions, this <code>sub</code> claim contains the client identifier.</li>
<li>The token guard calls <code>retrieveById()</code> using the client identifier from the <code>sub</code> claim as the user ID.</li>
<li>Due to the lack of validation, <code>retrieveById()</code> queries the user database, potentially finding a user whose ID matches the client identifier.</li>
<li>If a user with the matching ID is found, the application authenticates the request as that user, granting the attacker their privileges.</li>
<li>The attacker can then access resources and perform actions as the authenticated user.</li>
<li>The attacker exploits the user&rsquo;s privileges to compromise data or perform unauthorized actions within the application.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-39976 allows attackers to bypass authentication and gain unauthorized access to user accounts in Laravel applications using affected versions of Laravel Passport. This can lead to data breaches, privilege escalation, and other malicious activities, depending on the privileges of the compromised user accounts. The severity of the impact depends on the application&rsquo;s functionality and the sensitivity of the data it handles. Potentially all applications using Laravel Passport for authentication are vulnerable.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Laravel Passport to version 13.7.1 or later to patch CVE-2026-39976.</li>
<li>Implement additional validation within the application&rsquo;s authentication logic to verify that the user ID extracted from the JWT <code>sub</code> claim corresponds to a valid user, especially when using <code>client_credentials</code> tokens.</li>
<li>Monitor application logs for unexpected authentication events or API requests originating from machine-to-machine tokens that are being authenticated as users. The <code>webserver</code> log source can be used for this monitoring.</li>
<li>Deploy the Sigma rule provided to detect requests to protected endpoints with <code>client_credentials</code> tokens that are incorrectly authenticated as users.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-39976</category><category>laravel</category><category>oauth2</category><category>authentication bypass</category></item><item><title>LiteLLM Authentication Bypass via Password Hash Exposure and Pass-the-Hash</title><link>https://feed.craftedsignal.io/briefs/2024-01-09-litellm-auth-bypass/</link><pubDate>Wed, 08 Apr 2026 00:04:12 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-09-litellm-auth-bypass/</guid><description>LiteLLM versions before 1.83.0 stored user passwords as unsalted SHA-256 hashes and exposed these hashes through multiple API endpoints, enabling an authenticated user to retrieve another user's password hash and use it to log in as that user due to the /v2/login endpoint accepting the raw SHA-256 hash without re-hashing, leading to potential privilege escalation.</description><content:encoded><![CDATA[<p>LiteLLM versions prior to 1.83.0 are vulnerable to an authentication bypass vulnerability. User passwords are stored as unsalted SHA-256 hashes, a weak cryptographic practice that makes them susceptible to rainbow table attacks. Furthermore, these password hashes are exposed through several API endpoints, including <code>/user/info</code>, <code>/user/update</code>, and <code>/spend/users</code>, allowing any authenticated user to retrieve them. The <code>/v2/login</code> endpoint also accepts the raw SHA-256 hash as a valid password without proper re-hashing. This combination of vulnerabilities allows an attacker with low-level access to escalate privileges by obtaining another user&rsquo;s password hash and using it to directly log in as that user. Defenders should upgrade to version 1.83.0 or later to mitigate this vulnerability.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial access to LiteLLM and authenticates as a low-privilege user.</li>
<li>Attacker sends a request to <code>/user/info</code> to retrieve the password hash of another user.</li>
<li>The API responds with the target user&rsquo;s SHA-256 password hash.</li>
<li>Attacker sends a POST request to the <code>/v2/login</code> endpoint using the stolen SHA-256 hash as the password.</li>
<li>The <code>/v2/login</code> endpoint accepts the raw SHA-256 hash without re-hashing.</li>
<li>The server authenticates the attacker as the target user.</li>
<li>Attacker now has the privileges of the target user, potentially gaining access to sensitive data or administrative functions.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability leads to unauthorized access and privilege escalation within the LiteLLM application. An attacker can impersonate other users, including administrators, potentially leading to data breaches, system compromise, and unauthorized modifications. The number of victims depends on the deployment size, but any LiteLLM instance running a version prior to 1.83.0 is vulnerable. Sectors utilizing LiteLLM are at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade LiteLLM to version 1.83.0 or later to patch the vulnerability (reference: Patches section).</li>
<li>Deploy the Sigma rule &ldquo;Detect LiteLLM User Info Hash Access&rdquo; to monitor for unauthorized access to user password hashes via the <code>/user/info</code> endpoint (reference: rule: &ldquo;Detect LiteLLM User Info Hash Access&rdquo;).</li>
<li>Deploy the Sigma rule &ldquo;Detect LiteLLM Login with SHA256 Hash&rdquo; to detect login attempts using SHA256 hashes (reference: rule: &ldquo;Detect LiteLLM Login with SHA256 Hash&rdquo;).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>litellm</category><category>authentication-bypass</category><category>credential-access</category><category>privilege-escalation</category></item><item><title>Totolink A8000R Authentication Bypass Vulnerability (CVE-2026-5676)</title><link>https://feed.craftedsignal.io/briefs/2026-04-totolink-auth-bypass/</link><pubDate>Mon, 06 Apr 2026 19:16:30 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-totolink-auth-bypass/</guid><description>A remote, unauthenticated attacker can bypass authentication on Totolink A8000R routers running firmware version 5.9c.681_B20180413 by manipulating the `langType` argument in the `setLanguageCfg` function of the `/cgi-bin/cstecgi.cgi` file.</description><content:encoded><![CDATA[<p>CVE-2026-5676 is an authentication bypass vulnerability affecting Totolink A8000R routers with firmware version 5.9c.681_B20180413. The vulnerability resides in the <code>/cgi-bin/cstecgi.cgi</code> file, specifically within the <code>setLanguageCfg</code> function. By manipulating the <code>langType</code> argument, an attacker can bypass authentication checks, potentially gaining unauthorized access to sensitive router functionalities. This vulnerability can be exploited remotely without requiring any prior authentication. A public exploit is available, increasing the likelihood of exploitation. Defenders should prioritize detection and patching of this vulnerability to prevent unauthorized access and control of affected devices.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a vulnerable Totolink A8000R router running firmware 5.9c.681_B20180413.</li>
<li>The attacker sends a crafted HTTP request to <code>/cgi-bin/cstecgi.cgi</code>.</li>
<li>The request targets the <code>setLanguageCfg</code> function.</li>
<li>The request includes a manipulated <code>langType</code> argument designed to bypass authentication.</li>
<li>The vulnerable <code>setLanguageCfg</code> function processes the request without proper authentication checks.</li>
<li>The attacker gains unauthorized access to router configuration settings.</li>
<li>The attacker modifies sensitive settings such as DNS, routing rules, or firewall configuration.</li>
<li>The attacker achieves full control of the router, potentially using it for malicious purposes like eavesdropping, traffic redirection, or botnet activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-5676 allows a remote, unauthenticated attacker to gain full control of the affected Totolink A8000R router. This can lead to a variety of malicious activities, including unauthorized access to the local network, data theft, DNS hijacking, and the use of the router as part of a botnet. The potential number of affected devices is substantial, as the A8000R model is widely used.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule to detect malicious HTTP requests targeting the vulnerable <code>setLanguageCfg</code> function (see &ldquo;Detect Totolink A8000R Authentication Bypass Attempt&rdquo; rule below).</li>
<li>Monitor web server logs for requests to <code>/cgi-bin/cstecgi.cgi</code> with unusual <code>langType</code> parameters (see &ldquo;Detect Totolink A8000R Authentication Bypass Attempt&rdquo; rule below).</li>
<li>Upgrade the firmware of Totolink A8000R routers to a patched version that addresses CVE-2026-5676 (consult the vendor&rsquo;s website for updates).</li>
<li>Implement network segmentation to limit the impact of a compromised router on other devices on the network.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-5676</category><category>authentication-bypass</category><category>totolink</category></item><item><title>Mattermost Legal Hold Plugin Authentication Bypass Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-mattermost-legal-hold-auth-bypass/</link><pubDate>Mon, 06 Apr 2026 13:17:18 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-mattermost-legal-hold-auth-bypass/</guid><description>Mattermost Legal Hold plugin versions 1.1.4 and earlier allow authenticated attackers to bypass authorization checks, enabling unauthorized access and modification of legal hold data via crafted API requests.</description><content:encoded><![CDATA[<p>The Mattermost Legal Hold plugin, in versions 1.1.4 and earlier, contains an authentication bypass vulnerability (CVE-2026-3524) that can be exploited by authenticated attackers. The vulnerability lies in the ServeHTTP function, where a failed authorization check does not properly halt request processing. This flaw allows attackers to craft malicious API requests to the plugin&rsquo;s endpoints, enabling them to access, create, download, and delete legal hold data without proper authorization. The vulnerability is identified by Mattermost Advisory ID MMSA-2026-00621 and poses a significant risk to organizations using the affected plugin versions, potentially leading to data breaches and compliance violations.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker authenticates to the Mattermost server with valid user credentials.</li>
<li>Attacker crafts a malicious API request targeting the Legal Hold plugin&rsquo;s endpoints.</li>
<li>The request is sent to the Mattermost server.</li>
<li>The ServeHTTP function in the Legal Hold plugin processes the request.</li>
<li>Authorization check fails due to insufficient privileges or incorrect parameters.</li>
<li>Instead of halting request processing, the plugin continues to execute the request.</li>
<li>The attacker gains unauthorized access to legal hold data or performs unauthorized actions (create, download, delete).</li>
<li>The attacker successfully exfiltrates or manipulates sensitive legal hold information.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability (CVE-2026-3524) allows authenticated attackers to bypass authorization controls within the Mattermost Legal Hold plugin. This can result in unauthorized access, creation, modification, or deletion of sensitive legal hold data. The vulnerability affects versions 1.1.4 and earlier of the plugin. Organizations using the affected versions are at risk of data breaches, compliance violations, and reputational damage. A CVSS v3.1 score of 8.8 indicates a high level of severity due to the potential for significant data compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the Mattermost Legal Hold plugin to a version later than 1.1.4 to remediate CVE-2026-3524.</li>
<li>Deploy the Sigma rules provided in this brief to detect exploitation attempts targeting the vulnerable Legal Hold plugin endpoints (see rules section).</li>
<li>Monitor Mattermost server logs for unusual API requests to the Legal Hold plugin, specifically those resulting in unexpected data access or modification, as a potential sign of exploitation (webserver log source).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>mattermost</category><category>authentication-bypass</category><category>legal-hold</category></item><item><title>GPT Researcher Authentication Bypass Vulnerability (CVE-2026-5632)</title><link>https://feed.craftedsignal.io/briefs/2026-04-gpt-researcher-auth-bypass/</link><pubDate>Mon, 06 Apr 2026 07:16:02 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-gpt-researcher-auth-bypass/</guid><description>CVE-2026-5632 is an authentication bypass vulnerability in assafelovic gpt-researcher up to version 3.4.3, affecting the HTTP REST API Endpoint and allowing remote attackers to perform actions without proper authorization.</description><content:encoded><![CDATA[<p>A critical authentication bypass vulnerability, CVE-2026-5632, has been identified in assafelovic&rsquo;s gpt-researcher up to version 3.4.3. The vulnerability resides within the HTTP REST API Endpoint component. A remote attacker can exploit this flaw by manipulating requests, effectively bypassing authentication mechanisms. This issue allows unauthorized access to functionalities that should be protected. A proof-of-concept exploit is publicly available, increasing the risk of exploitation. Despite being reported through issue #1695, the project maintainers have not yet provided a patch or mitigation. The vulnerability poses a significant threat to systems running affected versions of gpt-researcher, potentially leading to data breaches, unauthorized modifications, or denial of service.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable gpt-researcher instance running version 3.4.3 or earlier.</li>
<li>Attacker crafts a malicious HTTP request targeting the vulnerable HTTP REST API Endpoint.</li>
<li>The crafted request manipulates authentication parameters, exploiting the authentication bypass vulnerability (CVE-2026-5632).</li>
<li>The application fails to properly validate the request due to the missing authentication check.</li>
<li>The attacker gains unauthorized access to restricted functionalities and data.</li>
<li>Attacker performs unauthorized actions, such as retrieving sensitive information, modifying data, or executing arbitrary commands.</li>
<li>The attacker may escalate privileges within the application to further compromise the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-5632 allows an unauthenticated attacker to perform actions as if they were a legitimate user. The impact includes unauthorized access to sensitive data, modification of system settings, or even complete system compromise. Given the nature of gpt-researcher, this could lead to the exposure of research data, API keys, or other confidential information. As a publicly known exploit exists, the risk is elevated for deployments that have not yet been patched or mitigated.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply any available patches or updates for assafelovic gpt-researcher to address CVE-2026-5632.</li>
<li>If a patch is not yet available, implement temporary mitigations such as access control restrictions or input validation on the HTTP REST API Endpoint.</li>
<li>Monitor web server logs for suspicious activity targeting the HTTP REST API Endpoint to identify potential exploitation attempts; deploy the Sigma rule &ldquo;Detect GPT Researcher Authentication Bypass Attempt&rdquo; to identify potential exploitation attempts.</li>
<li>Implement network segmentation to limit the potential impact of a successful exploit.</li>
<li>Review and harden authentication and authorization mechanisms within the gpt-researcher application.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>CVE-2026-5632</category><category>authentication-bypass</category><category>web-application</category></item><item><title>JeecgBoot AI Chat Module Authentication Bypass Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-jeecgboot-auth-bypass/</link><pubDate>Mon, 06 Apr 2026 04:16:13 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-jeecgboot-auth-bypass/</guid><description>JeecgBoot versions 3.9.0 and 3.9.1 are vulnerable to a remote unauthenticated bypass in the AI Chat Module, specifically affecting the JeecgBizToolsProvider.java file, potentially allowing unauthorized access.</description><content:encoded><![CDATA[<p>A critical authentication bypass vulnerability has been identified in JeecgBoot, a low-code development platform, affecting versions 3.9.0 and 3.9.1. The vulnerability resides within the AI Chat Module, specifically impacting the <code>jeecg-boot/jeecg-module-system/jeecg-system-biz/src/main/java/org/jeecg/modules/airag/JeecgBizToolsProvider.java</code> file. An attacker can exploit this flaw remotely to bypass authentication mechanisms, potentially gaining unauthorized access to sensitive functionalities or data. The identified patch is <code>b7c9aeba7aefda9e008ea8fe4fc3daf08d0c5b39/2c1cc88b8d983868df8c520a343d6ff4369d9e59</code>. The project has addressed the issue with a commit that will be included in the next official release, urging users to apply the patch.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a JeecgBoot instance running versions 3.9.0 or 3.9.1 with the AI Chat Module enabled.</li>
<li>The attacker crafts a malicious HTTP request targeting the vulnerable <code>JeecgBizToolsProvider.java</code> component.</li>
<li>This request exploits the authentication bypass vulnerability, likely by manipulating specific parameters or headers.</li>
<li>The application fails to properly validate the attacker&rsquo;s identity due to the missing authentication check.</li>
<li>The attacker gains unauthorized access to the AI Chat Module&rsquo;s functionalities.</li>
<li>Depending on the module&rsquo;s capabilities, the attacker could potentially access user data or execute arbitrary code within the context of the application.</li>
<li>The attacker leverages the compromised AI Chat Module to escalate privileges within the JeecgBoot application.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows unauthenticated attackers to gain unauthorized access to the AI Chat Module in vulnerable JeecgBoot instances. The impact could range from data breaches and unauthorized access to sensitive information to complete system compromise, depending on the permissions and functionality exposed through the AI Chat Module. While the number of affected instances is currently unknown, JeecgBoot&rsquo;s popularity suggests a potentially widespread risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the patch <code>b7c9aeba7aefda9e008ea8fe4fc3daf08d0c5b39/2c1cc88b8d983868df8c520a343d6ff4369d9e59</code> to the vulnerable <code>JeecgBizToolsProvider.java</code> file immediately.</li>
<li>Monitor web server logs for suspicious requests targeting the AI Chat Module endpoints, specifically <code>JeecgBizToolsProvider.java</code>, using the provided Sigma rule.</li>
<li>Upgrade to the next official release of JeecgBoot containing the fix for CVE-2026-5616 once it becomes available.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>jeecgboot</category><category>authentication-bypass</category><category>ai-chat-module</category></item><item><title>Technostrobe HI-LED-WR120-G2 Improper Authentication Vulnerability (CVE-2026-5570)</title><link>https://feed.craftedsignal.io/briefs/2026-04-technostrobe-auth-bypass/</link><pubDate>Sun, 05 Apr 2026 14:16:17 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-technostrobe-auth-bypass/</guid><description>CVE-2026-5570 is an improper authentication vulnerability in the index_config function of the /LoginCB file of Technostrobe HI-LED-WR120-G2 version 5.5.0.1R6.03.30, allowing remote attackers to bypass authentication.</description><content:encoded><![CDATA[<p>A critical vulnerability, CVE-2026-5570, exists in Technostrobe HI-LED-WR120-G2 version 5.5.0.1R6.03.30. This vulnerability resides within the <code>index_config</code> function of the <code>/LoginCB</code> file. Successful exploitation allows remote attackers to bypass authentication mechanisms. Publicly available exploit code exists, increasing the risk of widespread exploitation. The vendor was notified but did not respond. Given the lack of vendor response and the existence of a public exploit, organizations using affected Technostrobe devices should immediately assess their exposure and implement mitigation measures.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a vulnerable Technostrobe HI-LED-WR120-G2 device running firmware version 5.5.0.1R6.03.30 accessible over the network.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>/LoginCB</code> endpoint.</li>
<li>The crafted request exploits the improper authentication flaw in the <code>index_config</code> function.</li>
<li>The vulnerable function fails to properly validate the attacker&rsquo;s identity due to the flaw.</li>
<li>The attacker gains unauthorized access to administrative functionalities.</li>
<li>The attacker modifies device configurations, potentially disrupting operations or gaining further control.</li>
<li>The attacker uses the gained access to access internal network resources.</li>
<li>The attacker uses the compromised device as a foothold for lateral movement within the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-5570 allows attackers to bypass authentication on affected Technostrobe HI-LED-WR120-G2 devices. This could lead to unauthorized access to sensitive configurations, disruption of lighting systems, and potential use of the compromised device as a pivot point for further attacks within the network. The lack of vendor response to the vulnerability exacerbates the risk, as no official patch is available.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for suspicious requests to the <code>/LoginCB</code> endpoint, specifically those attempting to manipulate the <code>index_config</code> function, to detect potential exploitation attempts related to CVE-2026-5570.</li>
<li>Deploy the Sigma rule provided below to detect unauthorized access attempts via the vulnerable endpoint.</li>
<li>Implement network segmentation to limit the impact of a compromised Technostrobe device on other network resources.</li>
<li>Consider placing the affected Technostrobe device behind a reverse proxy with strict access controls and input validation rules.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve</category><category>authentication-bypass</category><category>webserver</category></item><item><title>PraisonAI Gateway Unauthenticated Access Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-praisonai-auth-bypass/</link><pubDate>Fri, 03 Apr 2026 23:17:06 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-praisonai-auth-bypass/</guid><description>PraisonAI Gateway server versions prior to 4.5.97 allow unauthenticated access to WebSocket connections and agent topology, enabling unauthorized message sending and agent enumeration.</description><content:encoded><![CDATA[<p>CVE-2026-34952 exposes a critical vulnerability in PraisonAI, a multi-agent teams system. Specifically, versions of the PraisonAI Gateway server prior to 4.5.97 lack authentication for WebSocket connections at the <code>/ws</code> endpoint and for serving agent topology information at the <code>/info</code> endpoint. This absence of authentication means that any client on the network can connect to these endpoints. Attackers could exploit this vulnerability to enumerate registered agents, send arbitrary messages to agents and their associated tool sets, and potentially gain unauthorized control over the PraisonAI system. The vulnerability was reported on April 3, 2026, and is addressed in version 4.5.97 of PraisonAI.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a vulnerable PraisonAI Gateway server running a version prior to 4.5.97.</li>
<li>The attacker establishes a WebSocket connection to the <code>/ws</code> endpoint of the server without providing any credentials.</li>
<li>The server, lacking authentication, accepts the connection.</li>
<li>The attacker sends a request to the <code>/info</code> endpoint to enumerate registered agents and their topology.</li>
<li>The server responds with the agent topology data.</li>
<li>The attacker crafts arbitrary messages and sends them to specific agents through the established WebSocket connection.</li>
<li>The targeted agent receives the message and executes the corresponding actions, potentially including tool usage or data modification.</li>
<li>The attacker achieves unauthorized control over the PraisonAI system by manipulating agents and their tool sets.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability could lead to complete compromise of the PraisonAI system. Attackers can enumerate and control agents, manipulate data, and potentially use the agents&rsquo; tool sets for malicious purposes, such as data theft or system disruption. This could impact organizations relying on PraisonAI for critical functions, leading to financial losses, reputational damage, and operational downtime. The severity is high due to the ease of exploitation and the potential for widespread damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade all PraisonAI Gateway servers to version 4.5.97 or later to patch CVE-2026-34952.</li>
<li>Deploy the Sigma rules provided to detect unauthorized connections to the <code>/ws</code> and <code>/info</code> endpoints.</li>
<li>Monitor network traffic for suspicious WebSocket connections to the PraisonAI Gateway server to detect potential exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>vulnerability</category><category>authentication bypass</category><category>websocket</category></item><item><title>OAuthenticator Authentication Bypass Vulnerability (CVE-2026-33175)</title><link>https://feed.craftedsignal.io/briefs/2026-04-oauthenticator-auth-bypass/</link><pubDate>Fri, 03 Apr 2026 22:16:26 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-oauthenticator-auth-bypass/</guid><description>OAuthenticator versions prior to 17.4.0 contain an authentication bypass vulnerability (CVE-2026-33175) that allows an attacker with an unverified email address on an Auth0 tenant to log in to JupyterHub when email is used as the username claim, potentially leading to account takeover.</description><content:encoded><![CDATA[<p>OAuthenticator is a software package that enables the integration of OAuth2 identity providers with JupyterHub. A critical authentication bypass vulnerability, identified as CVE-2026-33175, affects OAuthenticator versions prior to 17.4.0. This flaw permits an attacker with an unverified email address on an Auth0 tenant to successfully authenticate and log in to a JupyterHub instance. The vulnerability arises when email is used as the <code>username_claim</code>, granting attackers control over their username and potentially enabling account takeover. Organizations using affected versions of OAuthenticator in conjunction with Auth0 are at risk. The vulnerability was patched in version 17.4.0.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains access to an Auth0 tenant and creates an account.</li>
<li>The attacker does not verify the email address associated with the Auth0 account.</li>
<li>JupyterHub is configured to use OAuthenticator for authentication, with email specified as the <code>username_claim</code>.</li>
<li>The attacker attempts to log in to JupyterHub using the unverified Auth0 account.</li>
<li>Due to the vulnerability in OAuthenticator versions prior to 17.4.0, the authentication bypass occurs, allowing the attacker to successfully log in.</li>
<li>The attacker gains unauthorized access to the JupyterHub environment.</li>
<li>Attacker leverages the compromised account to perform malicious activities, such as accessing sensitive data or modifying Jupyter notebooks.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-33175 allows unauthorized access to JupyterHub instances. This can lead to the compromise of sensitive data, modification of Jupyter notebooks, and potential disruption of services. The vulnerability impacts organizations that use OAuthenticator with Auth0 and rely on email as the username claim. The number of affected organizations is currently unknown.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade OAuthenticator to version 17.4.0 or later to patch CVE-2026-33175.</li>
<li>Review JupyterHub configurations to ensure that email is not used as the <code>username_claim</code> if possible.</li>
<li>Implement multi-factor authentication (MFA) for JupyterHub accounts to mitigate the risk of account takeover.</li>
<li>Monitor logs for suspicious login attempts from Auth0 accounts with unverified email addresses. Deploy the provided Sigma rule targeting process creation after successful authentication to detect suspicious activity.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>authentication-bypass</category><category>jupyterhub</category><category>oauthenticator</category><category>cve-2026-33175</category></item><item><title>Unauthenticated Access to Administrative Endpoint (CVE-2026-32646)</title><link>https://feed.craftedsignal.io/briefs/2026-04-cve-2026-32646/</link><pubDate>Fri, 03 Apr 2026 21:17:11 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-cve-2026-32646/</guid><description>CVE-2026-32646 allows unauthenticated access to a specific administrative endpoint, potentially exposing device management functions, with a CVSS v3.1 score of 7.5.</description><content:encoded><![CDATA[<p>CVE-2026-32646 describes a critical vulnerability affecting an unspecified device or application. This vulnerability allows unauthenticated access to a specific administrative endpoint, thereby bypassing intended access controls.  Successful exploitation grants unauthorized access to device management functions, potentially leading to configuration changes, data manipulation, or complete device compromise. The vulnerability was reported to ICS-CERT and assigned a CVSS v3.1 base score of 7.5 (High).  The specific products affected are not detailed in the source document. The vulnerability falls under CWE-306, Missing Authentication for Critical Function. Defenders need to identify affected systems and implement appropriate access controls to mitigate the risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Reconnaissance:</strong> The attacker identifies the vulnerable administrative endpoint.</li>
<li><strong>Unauthenticated Request:</strong> The attacker sends a crafted HTTP request to the administrative endpoint without providing any authentication credentials.</li>
<li><strong>Access Granted:</strong> Due to the missing authentication check, the server incorrectly grants access to the requested administrative functions.</li>
<li><strong>Device Information Retrieval:</strong> The attacker uses the exposed administrative functions to retrieve sensitive device configuration information.</li>
<li><strong>Configuration Modification:</strong> The attacker modifies device settings, potentially changing network configurations or security policies.</li>
<li><strong>Privilege Escalation (Potential):</strong> Using the modified configuration, the attacker may escalate privileges within the affected system or network.</li>
<li><strong>Lateral Movement (Potential):</strong> The compromised device is used as a pivot point to access other systems on the network.</li>
<li><strong>System Compromise:</strong> The attacker achieves full control over the targeted device, potentially leading to data theft, denial of service, or further network compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-32646 allows unauthorized access to device management functions. The specific impact depends on the functions exposed, but could include configuration changes, data manipulation, or complete device compromise. Absent specific product information, it is difficult to estimate the number of affected devices or target sectors; however, successful exploitation could lead to significant operational disruption and data breaches.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Identify systems potentially affected by CVE-2026-32646 and prioritize patching or mitigation (reference CVE-2026-32646).</li>
<li>Inspect web server logs for requests to administrative endpoints without valid authentication tokens or credentials (reference webserver log source).</li>
<li>Implement network segmentation to limit the impact of a compromised device.</li>
<li>Deploy the Sigma rules provided below to your SIEM to detect unauthorized access attempts to administrative endpoints.</li>
<li>Monitor network traffic for unusual activity originating from devices that may be vulnerable.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-32646</category><category>authentication-bypass</category><category>device-management</category></item><item><title>Critical Authentication Bypass Vulnerability in Cisco Integrated Management Controller (CVE-2026-20093)</title><link>https://feed.craftedsignal.io/briefs/2026-04-cisco-imc-auth-bypass/</link><pubDate>Fri, 03 Apr 2026 14:00:09 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-cisco-imc-auth-bypass/</guid><description>An unauthenticated remote attacker can exploit CVE-2026-20093 to bypass authentication in Cisco Integrated Management Controller (IMC), gain full administrative access, and manipulate hardware settings, potentially disrupting critical infrastructure.</description><content:encoded><![CDATA[<p>A critical authentication bypass vulnerability, CVE-2026-20093, affects multiple versions of Cisco Integrated Management Controller (IMC) software. The vulnerability allows an unauthenticated remote attacker to bypass the login process and gain full administrative privileges on the affected system. This flaw stems from improper input validation (CWE-20). Exploitation grants the attacker the ability to change user passwords, manipulate hardware settings such as power cycling servers, and potentially use the compromised device to launch attacks on other systems within the network. The impacted product list is extensive, spanning multiple Cisco product lines, including the 5000 Series ENCS, Catalyst 8300 Series Edge uCPE, UCS C-Series M5/M6 Rack Servers, and UCS E-Series M3/M6. This vulnerability poses a significant threat to organizations relying on these systems for critical infrastructure management.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The unauthenticated attacker sends a specially crafted request to the Cisco IMC web interface.</li>
<li>The vulnerable IMC software fails to properly validate the request, allowing the attacker to bypass the authentication mechanism.</li>
<li>The attacker gains full administrative access to the IMC.</li>
<li>The attacker changes the password of an existing administrative user or creates a new administrative user.</li>
<li>The attacker logs in to the IMC with the newly acquired administrative credentials.</li>
<li>The attacker modifies hardware settings, such as power management configurations, potentially power cycling servers.</li>
<li>The attacker disrupts critical infrastructure managed by the compromised IMC.</li>
<li>The attacker uses the compromised device as a pivot point to launch further attacks against other systems on the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-20093 grants an attacker complete control over the affected Cisco IMC. This can lead to severe consequences, including disruption of critical services, data breaches, and lateral movement within the network. Given the hardware-level access provided by IMC, attackers can manipulate physical infrastructure, leading to extended downtime and potential data loss. The CCB has assessed the risk of this vulnerability as high due to the ease of exploitation and the potential impact on confidentiality, integrity, and availability.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately patch all affected Cisco IMC instances to the latest available version to remediate CVE-2026-20093 (refer to the affected software list).</li>
<li>Upscale monitoring and detection capabilities to identify any suspicious activity related to unauthorized access attempts to Cisco IMC web interfaces (deploy the Sigma rules provided).</li>
<li>In case of an intrusion, report the incident via <a href="https://ccb.belgium.be/en/cert/report-incident">https://ccb.belgium.be/en/cert/report-incident</a>.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>authentication bypass</category><category>cisco</category><category>imc</category><category>cve-2026-20093</category></item><item><title>OneUptime SAML SSO Authentication Bypass Vulnerability (CVE-2026-34840)</title><link>https://feed.craftedsignal.io/briefs/2024-01-oneuptime-auth-bypass/</link><pubDate>Thu, 02 Apr 2026 20:16:28 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-oneuptime-auth-bypass/</guid><description>OneUptime versions prior to 10.0.42 are vulnerable to an authentication bypass due to improper SAML signature validation, allowing attackers to impersonate users by prepending unsigned assertions.</description><content:encoded><![CDATA[<p>OneUptime, an open-source monitoring and observability platform, is vulnerable to an authentication bypass in versions prior to 10.0.42. The vulnerability, identified as CVE-2026-34840, resides in the SAML Single Sign-On (SSO) implementation within the <code>App/FeatureSet/Identity/Utils/SSO.ts</code> file. The flawed logic involves a decoupling of signature verification and identity extraction processes. Specifically, the <code>isSignatureValid()</code> function checks the signature of the first <code>&lt;Signature&gt;</code> element, while the <code>getEmail()</code> function extracts the email address from the first assertion element <code>assertion[0]</code>. This design allows an attacker to prepend a malicious, unsigned SAML assertion containing an arbitrary identity before a legitimate, signed assertion. This bypasses authentication, potentially granting unauthorized access to sensitive monitoring data and platform functionalities. The vulnerability has been patched in version 10.0.42.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker crafts a malicious SAML response containing an unsigned assertion with a forged identity (e.g., a privileged user&rsquo;s email).</li>
<li>The attacker prepends this malicious assertion to a valid, signed SAML assertion generated for a low-privilege account or a newly created account.</li>
<li>The combined SAML response is sent to the OneUptime platform for authentication.</li>
<li>The <code>isSignatureValid()</code> function verifies the signature of the second assertion (the originally signed, valid one), passing the signature check.</li>
<li>The <code>getEmail()</code> function extracts the email address from the first assertion (the malicious, unsigned one), effectively impersonating the forged identity.</li>
<li>OneUptime grants access based on the forged identity extracted from the malicious assertion.</li>
<li>The attacker gains unauthorized access to the OneUptime platform with the privileges of the impersonated user.</li>
<li>The attacker can then view monitoring data, modify configurations, or perform other actions allowed to the compromised account.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-34840 allows an attacker to bypass authentication and impersonate any user on the OneUptime platform. This could lead to unauthorized access to sensitive monitoring data, modification of system configurations, and potentially complete compromise of the OneUptime instance. The vulnerability has a CVSS v3.1 base score of 8.1, indicating a high severity. Organizations using vulnerable OneUptime versions are at risk of significant data breaches and operational disruption.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately upgrade OneUptime instances to version 10.0.42 or later to patch CVE-2026-34840.</li>
<li>Implement a web application firewall (WAF) rule to inspect SAML responses for multiple assertions and reject requests containing more than one assertion to prevent the attack described in the attack chain.</li>
<li>Monitor web server logs for suspicious SAML authentication requests and responses, focusing on unusual source IPs or deviations from normal authentication patterns related to the webserver log source.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>CVE-2026-34840</category><category>saml</category><category>authentication-bypass</category><category>webserver</category></item><item><title>Hirschmann HiEOS HTTP(S) Management Module Authentication Bypass (CVE-2024-14034)</title><link>https://feed.craftedsignal.io/briefs/2026-04-hieos-auth-bypass/</link><pubDate>Thu, 02 Apr 2026 20:16:19 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-hieos-auth-bypass/</guid><description>Hirschmann HiEOS devices contain an authentication bypass vulnerability (CVE-2024-14034) in the HTTP(S) management module, allowing unauthenticated remote attackers to gain administrative access by sending specially crafted HTTP(S) requests.</description><content:encoded><![CDATA[<p>CVE-2024-14034 describes an authentication bypass vulnerability affecting Hirschmann HiEOS devices. The vulnerability resides within the HTTP(S) management module and allows unauthenticated remote attackers to gain administrative privileges. By sending specially crafted HTTP(S) requests, attackers can bypass authentication checks due to improper handling. This enables them to perform unauthorized actions such as downloading or uploading device configurations and modifying the device firmware. Successful exploitation leads to a complete compromise of the affected HiEOS device.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable Hirschmann HiEOS device accessible over the network via HTTP(S).</li>
<li>The attacker crafts a malicious HTTP(S) request designed to exploit the authentication bypass. This request likely targets specific endpoints in the management module.</li>
<li>The attacker sends the crafted HTTP(S) request to the vulnerable HiEOS device.</li>
<li>Due to improper authentication handling, the device incorrectly processes the request, granting the attacker administrative privileges.</li>
<li>The attacker leverages the elevated privileges to download the device configuration, potentially exposing sensitive information.</li>
<li>The attacker modifies the device configuration, injecting malicious settings or backdoors.</li>
<li>The attacker uploads the modified configuration to the HiEOS device, effectively compromising its functionality.</li>
<li>Alternatively, the attacker could use their elevated privileges to upload and install a modified firmware image. This allows complete control over the device and can ensure persistence.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2024-14034 allows an unauthenticated attacker to gain full administrative control over the targeted Hirschmann HiEOS device. This can lead to device configuration modification, firmware manipulation, and potential disruption of network services relying on the compromised device. Given the nature of HiEOS devices, successful attacks can impact industrial control systems (ICS) and critical infrastructure. A CVSS v3.1 base score of 9.8 reflects the critical severity and potential impact.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the patches or mitigations provided in the Belden Security Bulletin BSECV-2024-02 (reference URL in the References section) to remediate CVE-2024-14034.</li>
<li>Monitor webserver logs for unusual HTTP requests targeting the HiEOS management interface using the Sigma rule &ldquo;Detect Suspicious HiEOS Management Requests&rdquo;.</li>
<li>Implement network segmentation to limit the exposure of HiEOS devices and reduce the potential impact of a successful attack.</li>
<li>Regularly review and update firmware on HiEOS devices to address known vulnerabilities and improve overall security posture.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>authentication bypass</category><category>cve-2024-14034</category><category>hieos</category><category>ics</category></item><item><title>goshs Authentication Bypass Vulnerability (CVE-2026-34581)</title><link>https://feed.craftedsignal.io/briefs/2026-04-goshs-auth-bypass/</link><pubDate>Thu, 02 Apr 2026 19:21:32 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-goshs-auth-bypass/</guid><description>goshs versions 1.1.0 to before 2.0.0-beta.2 are vulnerable to authentication bypass via Share Token, potentially allowing code execution (CVE-2026-34581).</description><content:encoded><![CDATA[<p>CVE-2026-34581 affects goshs, a SimpleHTTPServer written in Go. Versions 1.1.0 to before 2.0.0-beta.2 are susceptible to an authentication bypass vulnerability. When a user attempts to access the server with a Share Token, it is possible to bypass the intended file download restriction, gaining access to all goshs functionalities. This includes the ability to execute arbitrary code on the server. The vulnerability was patched in version 2.0.0-beta.2. This vulnerability allows unauthenticated attackers to potentially gain full control of the server hosting goshs. Organizations using affected versions of goshs should upgrade immediately.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a server running a vulnerable version of goshs (1.1.0 to before 2.0.0-beta.2).</li>
<li>Attacker requests a resource that should be protected by the Share Token.</li>
<li>The server prompts for the Share Token.</li>
<li>Attacker exploits the authentication bypass vulnerability by manipulating the request (details not specified in source).</li>
<li>Successful exploitation grants the attacker access to all goshs functionalities, bypassing the intended file download restriction.</li>
<li>Attacker leverages the unrestricted access to execute arbitrary code on the server.</li>
<li>Attacker gains a shell or other form of remote access to the compromised server.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-34581 allows an unauthenticated attacker to execute arbitrary code on the server. This can lead to complete system compromise, data theft, or denial of service. The impact is significant for organizations using vulnerable versions of goshs to serve sensitive files or applications. The report does not mention the number of victims, but the severity is high given the potential for code execution.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade goshs to version 2.0.0-beta.2 or later to patch CVE-2026-34581 (reference: <a href="https://github.com/patrickhener/goshs/releases/tag/v2.0.0-beta.2)">https://github.com/patrickhener/goshs/releases/tag/v2.0.0-beta.2)</a>.</li>
<li>Deploy the Sigma rule <code>Detect Goshs Code Execution via Auth Bypass</code> to detect potential exploitation attempts.</li>
<li>Monitor web server logs for suspicious activity related to goshs, specifically requests that might be attempting to bypass authentication.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-34581</category><category>authentication-bypass</category><category>code-execution</category></item><item><title>vanna-ai vanna Authentication Bypass Vulnerability (CVE-2026-5320)</title><link>https://feed.craftedsignal.io/briefs/2026-04-vanna-auth-bypass/</link><pubDate>Thu, 02 Apr 2026 05:16:04 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-vanna-auth-bypass/</guid><description>CVE-2026-5320 describes an unauthenticated remote access vulnerability in vanna-ai vanna up to version 2.0.2 via manipulation of the /api/vanna/v2/ Chat API endpoint, potentially allowing unauthorized access and actions.</description><content:encoded><![CDATA[<p>A critical authentication bypass vulnerability, identified as CVE-2026-5320, affects vanna-ai vanna versions up to 2.0.2. The vulnerability lies within the Chat API Endpoint located at <code>/api/vanna/v2/</code>. Successful exploitation allows remote attackers to bypass authentication mechanisms through a yet unspecified manipulation of the API endpoint. Public exploits are available, increasing the risk of widespread exploitation. The vendor has been unresponsive to disclosure attempts, further raising the urgency for mitigation. This vulnerability allows attackers to interact with the Chat API without proper authorization, potentially leading to data breaches, unauthorized actions, or disruption of service.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable vanna-ai vanna instance running a version up to 2.0.2.</li>
<li>The attacker sends a crafted request to the <code>/api/vanna/v2/</code> Chat API endpoint.</li>
<li>The request exploits the missing authentication vulnerability (CVE-2026-5320) through an unspecified manipulation.</li>
<li>The server improperly processes the request without requiring valid authentication credentials.</li>
<li>The attacker gains unauthorized access to the Chat API functionality.</li>
<li>The attacker interacts with the API, potentially retrieving sensitive information or executing unauthorized actions.</li>
<li>The attacker may leverage the unauthorized access to compromise user accounts or exfiltrate data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-5320 allows attackers to bypass authentication and gain unauthorized access to the vanna-ai vanna Chat API. This can lead to the compromise of user data, unauthorized actions performed on behalf of legitimate users, and potential disruption of the service. The lack of vendor response and the availability of public exploits significantly increase the risk and potential impact of this vulnerability. Given the nature of AI chatbot applications, sensitive information handled by the application could be exposed, damaging data confidentiality.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply immediate patching or mitigation measures to vanna-ai vanna instances running versions up to 2.0.2. Consult the vendor&rsquo;s website for any available patches, or consider applying a reverse proxy rule to enforce authentication on the <code>/api/vanna/v2/</code> endpoint until a patch is available.</li>
<li>Deploy the provided Sigma rule <code>Detect vanna-ai vanna Authentication Bypass Attempt</code> to identify and alert on exploitation attempts targeting the <code>/api/vanna/v2/</code> endpoint.</li>
<li>Monitor web server logs for suspicious activity targeting the <code>/api/vanna/v2/</code> endpoint, paying close attention to unusual request patterns or error codes, and investigate any anomalies.</li>
<li>Implement web application firewall (WAF) rules to block requests exploiting CVE-2026-5320 based on known exploit patterns.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>authentication-bypass</category><category>cve-2026-5320</category><category>vanna-ai</category></item><item><title>IBM Verify and Security Verify Access Authentication Bypass Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-ibm-verify-auth-bypass/</link><pubDate>Wed, 01 Apr 2026 21:17:02 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-ibm-verify-auth-bypass/</guid><description>CVE-2026-4101 describes an authentication bypass vulnerability in IBM Verify Identity Access Container and IBM Security Verify Access Container versions 11.0 through 11.0.2 and 10.0 through 10.0.9.1, respectively, that could allow unauthorized access under specific load conditions.</description><content:encoded><![CDATA[<p>IBM Verify Identity Access Container and IBM Security Verify Access Container are vulnerable to an authentication bypass vulnerability identified as CVE-2026-4101. The affected versions include IBM Verify Identity Access Container 11.0 through 11.0.2 and IBM Security Verify Access Container 10.0 through 10.0.9.1, as well as IBM Verify Identity Access 11.0 through 11.0.2 and IBM Security Verify Access 10.0 through 10.0.9.1. This vulnerability can be exploited under certain load conditions, potentially granting an attacker unauthorized access to the application. Defenders should prioritize patching vulnerable systems to mitigate the risk of exploitation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable IBM Verify or Security Verify Access instance running a susceptible version (11.0-11.0.2 or 10.0-10.0.9.1).</li>
<li>The attacker floods the targeted application with requests to induce high load conditions.</li>
<li>Under these high load conditions, a flaw in the authentication mechanism is triggered.</li>
<li>The attacker crafts specific requests to exploit the authentication bypass.</li>
<li>The application incorrectly validates the attacker&rsquo;s request, bypassing authentication controls.</li>
<li>The attacker gains unauthorized access to the application.</li>
<li>Once authenticated, the attacker may perform privileged actions, access sensitive data, or escalate privileges within the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-4101 allows an unauthenticated attacker to bypass authentication mechanisms and gain unauthorized access to the targeted IBM Verify or Security Verify Access application. This could lead to the compromise of sensitive data, unauthorized modification of system configurations, and potential lateral movement within the network. The number of potential victims is dependent on the number of unpatched IBM Verify and Security Verify Access instances exposed to network traffic.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the patches provided by IBM to address CVE-2026-4101 on all affected IBM Verify Identity Access Container and IBM Security Verify Access Container instances (refer to IBM&rsquo;s advisory <a href="https://www.ibm.com/support/pages/node/7268253">https://www.ibm.com/support/pages/node/7268253</a>).</li>
<li>Monitor web server logs for unusual HTTP requests or error patterns that may indicate exploitation attempts. Deploy the Sigma rule targeting HTTP 500 responses originating from the access container to detect potential exploitation attempts.</li>
<li>Implement rate limiting and traffic shaping mechanisms to mitigate the risk of denial-of-service conditions that could exacerbate the vulnerability.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>authentication-bypass</category><category>cve-2026-4101</category><category>ibm-verify</category></item><item><title>Goshs Authentication Bypass via Share Token</title><link>https://feed.craftedsignal.io/briefs/2024-01-02-goshs-auth-bypass/</link><pubDate>Wed, 01 Apr 2026 20:58:48 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-02-goshs-auth-bypass/</guid><description>Goshs is vulnerable to an authentication bypass via share tokens, allowing attackers to bypass authentication checks by using a valid share token in conjunction with other functionalities like WebSocket connections to gain unauthorized access and execute arbitrary commands on the server.</description><content:encoded><![CDATA[<p>Goshs versions 1.1.0 and later are susceptible to an authentication bypass vulnerability (CVE-2026-34581) when using share tokens. The vulnerability resides in the <code>BasicAuthMiddleware</code> which prioritizes token validation over credential checks. This allows an attacker with a valid share token to bypass all authentication and access restricted functionalities such as directory listing, file deletion, clipboard access, WebSocket connections, and CLI command execution. A patch is available in version v2.0.0-beta.2. This vulnerability affects systems using goshs where authentication is enabled alongside the share token feature, potentially leading to unauthorized access and command execution.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A legitimate user creates a share token for a specific file using the goshs web interface or API.</li>
<li>The attacker obtains a valid share token, either through social engineering or other means.</li>
<li>The attacker crafts a malicious request to the goshs server, including the valid share token as a query parameter (e.g., <code>?token=</code>).</li>
<li>The <code>BasicAuthMiddleware</code> in goshs checks for the <code>token</code> parameter first and, upon finding a valid token, bypasses subsequent authentication checks.</li>
<li>The attacker includes a <code>ws</code> parameter in the same request (e.g., <code>?ws&amp;token=</code>), enabling a WebSocket connection.</li>
<li>Using the established WebSocket connection, the attacker sends commands to the server by sending a JSON payload with <code>{&quot;type&quot;:&quot;command&quot;,&quot;Content&quot;:&quot;command_to_execute&quot;}</code>.</li>
<li>The server executes the attacker-supplied command, such as <code>id</code> or <code>cat /etc/passwd</code>.</li>
<li>The attacker receives the output of the executed command via the WebSocket connection, effectively achieving remote code execution.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability (CVE-2026-34581) allows an attacker to bypass authentication, gain unauthorized access to the goshs server, and execute arbitrary commands. This can lead to complete system compromise, data exfiltration, and denial-of-service. Since the vulnerability exists in a widely used web file server, a successful attack could impact numerous organizations using goshs.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to goshs version v2.0.0-beta.2 or later to patch CVE-2026-34581, as the vulnerability is fixed in that version (<a href="https://github.com/patrickhener/goshs/releases/tag/v2.0.0-beta.2">https://github.com/patrickhener/goshs/releases/tag/v2.0.0-beta.2</a>).</li>
<li>Monitor web server logs for requests containing both <code>token</code> and <code>ws</code> parameters in the query string, which may indicate an attempt to exploit this vulnerability (see the detection rule below).</li>
<li>Implement network monitoring to detect unusual WebSocket connections originating from or destined to the goshs server (see the detection rule below).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>authentication-bypass</category><category>code-execution</category><category>goshs</category></item><item><title>Multiple Vulnerabilities in Dovecot Mail Server</title><link>https://feed.craftedsignal.io/briefs/2026-03-dovecot-vulns/</link><pubDate>Mon, 30 Mar 2026 10:14:10 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-dovecot-vulns/</guid><description>Multiple vulnerabilities in Dovecot can be exploited by an attacker to perform SQL injection attacks, bypass authentication, disclose sensitive information, or cause a denial-of-service condition.</description><content:encoded><![CDATA[<p>Multiple vulnerabilities have been identified in the Dovecot mail server software. An attacker can leverage these flaws to execute SQL injection attacks, potentially gaining unauthorized access to the underlying database. Furthermore, successful exploitation could lead to bypassing authentication mechanisms, allowing unauthorized access to mailboxes and sensitive information. The vulnerabilities also pose a risk of sensitive information disclosure and denial-of-service (DoS) conditions, disrupting mail services. The broad functionality affected by these flaws makes it a high-priority issue for organizations using Dovecot.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a vulnerable Dovecot instance accessible over the network.</li>
<li>The attacker crafts a malicious input string designed to exploit a SQL injection vulnerability in Dovecot&rsquo;s authentication or user management modules.</li>
<li>The attacker submits the crafted input to a Dovecot service, such as IMAP or POP3, during the authentication process.</li>
<li>If the SQL injection is successful, the attacker gains unauthorized access to the Dovecot database.</li>
<li>The attacker uses the database access to extract user credentials or modify authentication settings.</li>
<li>Alternatively, the attacker exploits the SQL injection to disclose sensitive configuration data or internal system information.</li>
<li>If authentication bypass is successful, the attacker logs into a targeted user&rsquo;s mailbox without valid credentials.</li>
<li>The attacker causes a denial-of-service condition by sending malformed requests that crash the Dovecot server.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities could lead to complete compromise of the Dovecot server and the data it manages. This includes unauthorized access to user mailboxes, disclosure of sensitive information, and disruption of email services. The impact ranges from data breaches and loss of confidentiality to service outages and reputational damage. The severity depends on the specific vulnerability exploited and the configuration of the Dovecot instance.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Closely monitor Dovecot logs for suspicious SQL-related errors or authentication failures (reference: description of SQL injection vulnerability).</li>
<li>Implement strict input validation and sanitization measures to mitigate potential SQL injection attacks within Dovecot configurations.</li>
<li>Since the advisory does not list specific log sources, enable verbose logging for Dovecot services to capture detailed information about authentication attempts and database interactions.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>dovecot</category><category>vulnerability</category><category>sql-injection</category><category>authentication-bypass</category><category>dos</category></item><item><title>OpenClaw Feishu Webhook Authentication Bypass (CVE-2026-32974)</title><link>https://feed.craftedsignal.io/briefs/2026-03-openclaw-auth-bypass/</link><pubDate>Sun, 29 Mar 2026 13:17:01 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-openclaw-auth-bypass/</guid><description>OpenClaw before 2026.3.12 is vulnerable to an authentication bypass in Feishu webhook mode when only verificationToken is configured without encryptKey, allowing unauthenticated network attackers to inject forged Feishu events and trigger downstream tool execution.</description><content:encoded><![CDATA[<p>OpenClaw before version 2026.3.12 is susceptible to an authentication bypass vulnerability (CVE-2026-32974) affecting Feishu webhook integrations. This vulnerability arises when the <code>verificationToken</code> is configured without the <code>encryptKey</code>. This configuration flaw enables unauthenticated attackers to forge Feishu events and send them to the webhook endpoint. Successful exploitation allows attackers to trigger arbitrary downstream tool execution within the OpenClaw environment. This is a…</p>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>authentication-bypass</category><category>webhook</category><category>cve-2026-32974</category></item><item><title>OpenBao OIDC Direct Callback Authentication Bypass Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-17-openbao-oidc-bypass/</link><pubDate>Thu, 26 Mar 2026 18:33:37 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-17-openbao-oidc-bypass/</guid><description>OpenBao versions before 2.5.2 lack user confirmation for OIDC direct callback mode, allowing attackers to perform remote phishing and bypass authentication.</description><content:encoded><![CDATA[<p>OpenBao, a secrets management tool, is vulnerable to an authentication bypass in versions prior to 2.5.2. This vulnerability stems from the lack of user confirmation when logging in via JWT/OIDC with a role configured with <code>callback_mode</code> set to <code>direct</code>. The vulnerability allows an attacker to initiate an authentication request and trick a victim into visiting a URL, which automatically logs them into the attacker&rsquo;s session. This constitutes a &ldquo;remote phishing&rdquo; attack because the attacker never directly interacts with the victim&rsquo;s credentials. The <code>direct</code> callback mode interacts directly with the OpenBao API, enabling the attacker to poll for a token after the victim has been authenticated and a token has been issued. The vulnerability is tracked as CVE-2026-33757.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker configures an OpenBao role with <code>callback_mode=direct</code>.</li>
<li>The attacker initiates an OIDC authentication request, generating a unique URL.</li>
<li>The attacker sends the generated URL to the victim via phishing or other social engineering methods.</li>
<li>The victim clicks the link and authenticates through the OIDC provider. OpenBao automatically associates this authentication with the attacker&rsquo;s session due to the <code>direct</code> callback.</li>
<li>OpenBao&rsquo;s API receives a direct callback, skipping user confirmation.</li>
<li>OpenBao issues a token associated with the attacker&rsquo;s session, effectively authenticating the attacker as the victim.</li>
<li>The attacker continuously polls the OpenBao API for the issued token.</li>
<li>The attacker retrieves the token and gains unauthorized access to secrets and resources managed by OpenBao, impersonating the victim.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to impersonate a legitimate user within OpenBao. This can lead to unauthorized access to sensitive data, including secrets, credentials, and other protected resources. The impact is critical as it allows complete bypass of intended authentication mechanisms, potentially affecting all users and systems managed by the vulnerable OpenBao instance. This can lead to data breaches, service disruption, and privilege escalation.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade OpenBao to version 2.5.2 or later to apply the patch that introduces a confirmation screen for <code>direct</code> type logins.</li>
<li>As a workaround, remove any OpenBao roles configured with <code>callback_mode=direct</code>.</li>
<li>Enforce confirmation for every session on the token issuer side for the Client ID used by OpenBao, mitigating the risk even if roles with <code>callback_mode=direct</code> exist.</li>
<li>Monitor web server logs for unusual patterns of requests to the OpenBao OIDC callback endpoint after authentication, using the &ldquo;Detect OpenBao Direct Callback Abuse&rdquo; Sigma rule to identify potential exploitation attempts.</li>
<li>Deploy the &ldquo;Detect OpenBao Direct Callback Configuration&rdquo; Sigma rule to identify roles configured with the vulnerable <code>callback_mode=direct</code> setting.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>openbao</category><category>oidc</category><category>authentication-bypass</category><category>phishing</category></item><item><title>Wecodex Hotel CMS 1.0 SQL Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-03-wecodex-sqli/</link><pubDate>Thu, 26 Mar 2026 12:16:04 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-wecodex-sqli/</guid><description>Wecodex Hotel CMS 1.0 is vulnerable to SQL injection in the admin login functionality, allowing unauthenticated attackers to bypass authentication and potentially extract sensitive database information or gain administrative access by injecting SQL code through the username parameter in POST requests to index.php with action=processlogin.</description><content:encoded><![CDATA[<p>Wecodex Hotel CMS 1.0 is susceptible to an SQL injection vulnerability (CVE-2018-25195) within its admin login feature. Discovered in 2026, this flaw enables unauthenticated attackers to inject malicious SQL code into the &lsquo;username&rsquo; parameter of a POST request sent to the &lsquo;index.php&rsquo; page with the &lsquo;action=processlogin&rsquo; parameter. Successful exploitation could lead to the bypass of authentication mechanisms, potentially granting unauthorized administrative privileges. The vulnerability poses a significant risk to organizations utilizing the vulnerable CMS, as attackers could gain full control over the web application and its underlying data, including user credentials and sensitive business information. This requires immediate attention and patching.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a Wecodex Hotel CMS 1.0 instance.</li>
<li>The attacker crafts a malicious SQL payload designed to bypass authentication.</li>
<li>The attacker sends a POST request to <code>index.php</code> with the parameter <code>action=processlogin</code>.</li>
<li>The crafted SQL payload is injected into the <code>username</code> parameter of the POST request.</li>
<li>The application fails to properly sanitize the input, passing the malicious SQL to the database.</li>
<li>The injected SQL code manipulates the authentication query, likely using <code>OR</code> clauses and commenting out the rest of the original query.</li>
<li>The manipulated query returns a successful authentication result, bypassing the intended login process.</li>
<li>The attacker gains unauthorized access to the administrative panel of the Wecodex Hotel CMS.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability allows attackers to bypass authentication controls and gain administrative access to the Wecodex Hotel CMS 1.0. This can lead to full compromise of the system, including the theft of sensitive data such as customer information, financial records, and proprietary business data. Attackers can also modify the website, inject malicious code, or use the compromised server as a launching point for further attacks. Given the potential for complete system compromise, this vulnerability poses a critical risk to affected organizations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Block POST requests to <code>/index.php</code> containing suspicious SQL syntax in the <code>username</code> parameter using a web application firewall (WAF) or intrusion detection system (IDS), based on the provided attack chain.</li>
<li>Deploy the provided Sigma rule to detect exploitation attempts targeting the login functionality of Wecodex Hotel CMS.</li>
<li>Upgrade to a patched version of Wecodex Hotel CMS that addresses CVE-2018-25195 if available from the vendor.</li>
<li>Implement parameterized queries or prepared statements in the application code to prevent SQL injection vulnerabilities.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>sqli</category><category>web-application</category><category>authentication-bypass</category></item><item><title>MacCMS 2025.1000.4052 Missing Authentication Vulnerability (CVE-2026-4562)</title><link>https://feed.craftedsignal.io/briefs/2026-03-maccms-auth-bypass/</link><pubDate>Tue, 24 Mar 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-maccms-auth-bypass/</guid><description>A missing authentication vulnerability exists in MacCMS 2025.1000.4052, specifically affecting the Timming API Endpoint component in application/api/controller/Timming.php, allowing remote attackers to bypass authentication.</description><content:encoded>&lt;p>CVE-2026-4562 details a missing authentication vulnerability within MacCMS version 2025.1000.4052. The vulnerability is located in the &lt;code>application/api/controller/Timming.php&lt;/code> file, specifically within the Timming API Endpoint component. This flaw allows unauthenticated remote attackers to execute actions that should normally require authentication. The vulnerability has been publicly disclosed, increasing the risk of exploitation. Defenders should prioritize identifying and mitigating…&lt;/p>
</content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>CVE-2026-4562</category><category>authentication-bypass</category><category>web-application</category></item><item><title>Contest Gallery WordPress Plugin Authentication Bypass Vulnerability (CVE-2026-4021)</title><link>https://feed.craftedsignal.io/briefs/2026-03-contest-gallery-auth-bypass/</link><pubDate>Tue, 24 Mar 2026 00:16:31 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-contest-gallery-auth-bypass/</guid><description>CVE-2026-4021 describes an authentication bypass vulnerability in the Contest Gallery plugin for WordPress, allowing unauthenticated attackers to gain admin access by manipulating the user activation key and using an AJAX login endpoint.</description><content:encoded><![CDATA[<p>The Contest Gallery plugin for WordPress, versions up to and including 28.1.5, is vulnerable to a critical authentication bypass (CVE-2026-4021). This vulnerability stems from how the <code>users-registry-check-after-email-or-pin-confirmation.php</code> script handles email confirmations, combined with an unauthenticated key-based login endpoint in <code>ajax-functions-frontend.php</code>.  If the <code>RegMailOptional=1</code> setting is enabled (non-default), an attacker can register a new user account with a specially…</p>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>wordpress</category><category>authentication-bypass</category><category>plugin-vulnerability</category><category>cve-2026-4021</category></item><item><title>Critical Vulnerabilities in Quest KACE SMA Allow System Takeover</title><link>https://feed.craftedsignal.io/briefs/2026-03-quest-kace-sma-vulns/</link><pubDate>Sat, 21 Mar 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-quest-kace-sma-vulns/</guid><description>Multiple critical vulnerabilities in Quest KACE Systems Management Appliance (SMA), including authentication bypass and 2FA bypass, allow unauthenticated attackers to achieve system takeover and cause denial of service; active exploitation is reported.</description><content:encoded><![CDATA[<p>Quest KACE Systems Management Appliance (SMA) is an IT systems management solution used by organizations to manage and secure endpoints. In June 2025, multiple critical vulnerabilities were disclosed. These include CVE-2025-32975, an authentication bypass; CVE-2025-32976, a 2FA bypass; CVE-2025-32977, malicious backup upload; and CVE-2025-32978, license replacement leading to denial of service. The vulnerabilities were discovered during a third-party assessment. As of March 20, 2026, active exploitation has been reported, making immediate patching critical. Versions affected include KACE SMA versions 13.0.385, 13.1.81, 13.2.183, 14.0.341, and 14.1.101. Successful exploitation can lead to complete system compromise, impacting enterprise security and operations.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Unauthenticated Request (CVE-2025-32975):</strong> An attacker sends a crafted request to the KACE SMA server, exploiting the improper authentication handling in the SSO mechanism.</li>
<li><strong>Authentication Bypass:</strong> The server fails to properly validate the request, allowing the attacker to bypass authentication and impersonate a legitimate user, gaining unauthorized access to the system.</li>
<li><strong>2FA Bypass (CVE-2025-32976):</strong> If the attacker has valid credentials, they exploit a logic flaw in the two-factor authentication implementation to bypass TOTP-based 2FA requirements.</li>
<li><strong>Privilege Escalation:</strong> Using the bypassed authentication, the attacker gains access to administrative privileges within the KACE SMA.</li>
<li><strong>Malicious Backup Upload (CVE-2025-32977):</strong> An unauthenticated attacker uploads a malicious backup file to the system, exploiting weaknesses in the cryptographic signature validation process.</li>
<li><strong>System Compromise:</strong> The malicious backup content is processed, compromising the system&rsquo;s integrity and potentially allowing the attacker to execute arbitrary code.</li>
<li><strong>License Replacement (CVE-2025-32978):</strong> The attacker uses a web interface intended for license renewal to replace valid system licenses with expired or trial licenses.</li>
<li><strong>Denial of Service:</strong> The replacement of valid licenses causes a denial of service, disrupting normal operations and preventing legitimate users from accessing the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities allows attackers to gain complete control over the KACE SMA, leading to the compromise of managed endpoints. The denial-of-service vulnerability disrupts IT operations. While the exact number of victims is unknown, the widespread use of KACE SMA across various sectors suggests a broad potential impact. Active exploitation reported as of March 2026 increases the urgency.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the patches released by Quest for KACE SMA versions 13.0.385, 13.1.81, 13.2.183, 14.0.341 (Patch 5), 14.1.101 (Patch 4) to remediate CVE-2025-32975, CVE-2025-32976, CVE-2025-32977, and CVE-2025-32978.</li>
<li>Upscale monitoring and detection capabilities to identify any related suspicious activity as recommended by CCB.</li>
<li>Implement the Sigma rule &ldquo;Detect Unauthenticated Access Attempts to KACE SMA&rdquo; to identify potential exploitation attempts targeting CVE-2025-32975.</li>
<li>Review web server logs for suspicious file uploads to detect potential exploitation of CVE-2025-32977.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>quest-kace</category><category>vulnerability</category><category>authentication-bypass</category><category>2fa-bypass</category><category>denial-of-service</category><category>sma</category></item><item><title>Apache Artemis and ActiveMQ Artemis Authentication Bypass Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-03-apache-artemis-auth-bypass/</link><pubDate>Thu, 05 Mar 2026 09:31:38 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-apache-artemis-auth-bypass/</guid><description>CVE-2026-27446 allows an unauthenticated remote attacker to inject malicious messages or exfiltrate data from Apache Artemis and ActiveMQ Artemis brokers due to a missing authentication check in the Core protocol.</description><content:encoded>&lt;p>On March 5, 2026, the Centre for Cybersecurity Belgium (CCB) issued a warning regarding CVE-2026-27446, a critical authentication bypass vulnerability affecting Apache Artemis and Apache ActiveMQ Artemis. This vulnerability stems from a lack of proper authentication controls within the Core protocol used for communication between brokers. Successful exploitation allows unauthenticated remote attackers to force a target broker to establish an outbound Core federation connection to a rogue broker…&lt;/p>
</content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>apache-artemis</category><category>apache-activemq</category><category>authentication-bypass</category><category>message-injection</category><category>data-exfiltration</category></item><item><title>Pelco Sarix Pro 3 Series IP Camera Authentication Bypass Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-02-pelco-sarix-auth-bypass/</link><pubDate>Fri, 27 Feb 2026 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-02-pelco-sarix-auth-bypass/</guid><description>An authentication bypass vulnerability (CVE-2026-1241) in the web management interface of Pelco Sarix Pro 3 Series IP Cameras (versions &lt;= 02.52) allows unauthenticated attackers to access sensitive device data and bypass surveillance controls.</description><content:encoded>&lt;p>Pelco Sarix Pro 3 Series IP Cameras are affected by an authentication bypass vulnerability (CVE-2026-1241) in their web management interface. The vulnerability stems from inadequate access control enforcement, allowing unauthorized access to certain functionalities without proper authentication. This issue impacts Sarix Professional IMP 3 Series, IXP 3 Series, IBP 3 Series, and IWP 3 Series IP Cameras with firmware versions equal to or less than 02.52. Successful exploitation can lead to…&lt;/p>
</content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-1241</category><category>authentication-bypass</category><category>ip-camera</category><category>ics</category></item><item><title>Traefik ForwardAuth Authentication Bypass via X-Forwarded-Prefix Spoofing</title><link>https://feed.craftedsignal.io/briefs/2024-07-traefik-auth-bypass/</link><pubDate>Wed, 03 Jul 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-07-traefik-auth-bypass/</guid><description>A high-severity authentication bypass vulnerability exists in Traefik's `ForwardAuth` middleware when `trustForwardHeader=false` is configured and Traefik is deployed behind a trusted upstream proxy; Traefik fails to sanitize the `X-Forwarded-Prefix` header, allowing attackers to spoof a trusted prefix value and gain unauthorized access to protected backend routes.</description><content:encoded><![CDATA[<p>A critical authentication bypass vulnerability impacts Traefik instances utilizing the <code>ForwardAuth</code> middleware with <code>trustForwardHeader=false</code>, when deployed behind a trusted upstream proxy. This vulnerability arises from Traefik&rsquo;s failure to properly sanitize the <code>X-Forwarded-Prefix</code> header. Although Traefik correctly rebuilds other <code>X-Forwarded-*</code> headers like <code>X-Forwarded-For</code> and <code>X-Forwarded-Host</code>, it does not strip or rebuild <code>X-Forwarded-Prefix</code>. An attacker can inject a malicious <code>X-Forwarded-Prefix</code> value, which is then passed to the authentication service in the subrequest. If the authentication service relies on the <code>X-Forwarded-Prefix</code> header for authorization decisions, an attacker can bypass access controls and reach protected backend routes. This issue affects Traefik versions v2.11.x before v2.11.43, v3.6.x before v3.6.14, and v3.7.0-rc.1.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker sends a request with a crafted <code>X-Forwarded-Prefix</code> header (e.g., <code>X-Forwarded-Prefix: /admin</code>) to a trusted upstream proxy (e.g., nginx).</li>
<li>The trusted proxy forwards the request to the Traefik instance.</li>
<li>Traefik&rsquo;s <code>StripPrefix</code> middleware processes the request, stripping a configured prefix (e.g., <code>/forbidden</code>) and appending it to the <code>X-Forwarded-Prefix</code> header using <code>Header.Add</code>.</li>
<li>The <code>ForwardAuth</code> middleware creates a subrequest to the authentication service, copying all incoming headers, including the attacker-controlled <code>X-Forwarded-Prefix</code> and the <code>StripPrefix</code>-added value.</li>
<li>The authentication service receives the subrequest with the concatenated <code>X-Forwarded-Prefix</code> values, where the attacker&rsquo;s value appears first (e.g., <code>X-Forwarded-Prefix: /admin, /forbidden</code>).</li>
<li>The authentication service incorrectly uses the attacker-supplied <code>/admin</code> prefix to make authorization decisions.</li>
<li>The authentication service authorizes the request due to the spoofed prefix.</li>
<li>Traefik forwards the request to the protected backend route, granting the attacker unauthorized access.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows unauthenticated attackers to bypass access controls and gain unauthorized access to protected backend routes. This can lead to data breaches, unauthorized modification of resources, and other security compromises. The impact is especially severe in environments where <code>StripPrefix</code> is used before <code>ForwardAuth</code>, and where the authentication service relies heavily on the <code>X-Forwarded-Prefix</code> header for authorization decisions. The number of affected deployments is unknown but likely significant, given Traefik&rsquo;s popularity as a reverse proxy and load balancer.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to Traefik version v2.11.43, v3.6.14, or v3.7.0-rc.2 or later to patch the vulnerability.</li>
<li>As a workaround, if upgrading is not immediately feasible, configure your authentication service to validate and sanitize the <code>X-Forwarded-Prefix</code> header, ensuring it only trusts values originating from the trusted proxy.</li>
<li>Implement the following Sigma rule to detect suspicious requests with the <code>X-Forwarded-Prefix</code> header targeting the <code>/forbidden</code> path, indicating potential exploitation attempts.</li>
<li>Review and harden your Traefik configuration to ensure that the <code>trustForwardHeader</code> parameter is appropriately set based on your deployment environment and trust relationships.</li>
<li>Monitor Traefik access logs for suspicious activity, especially requests with unusual <code>X-Forwarded-Prefix</code> values, using the <code>webserver</code> log source.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>traefik</category><category>authentication-bypass</category><category>webserver</category></item><item><title>Dgraph Unauthenticated Admin Token Disclosure via /debug/vars</title><link>https://feed.craftedsignal.io/briefs/2024-05-dgraph-auth-bypass/</link><pubDate>Thu, 02 May 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-05-dgraph-auth-bypass/</guid><description>Dgraph versions prior to 25.3.3 expose the admin token via the `/debug/vars` endpoint, allowing unauthenticated attackers to bypass authentication and gain administrative access.</description><content:encoded><![CDATA[<p>Dgraph, a graph database, exposes sensitive information through an unauthenticated endpoint, <code>/debug/vars</code>, in versions prior to 25.3.3. The vulnerability arises because the admin token is often passed as a command-line argument using the <code>--security &quot;token=...&quot;</code> flag. This argument is exposed through the <code>/debug/vars</code> endpoint, which is enabled by default via Go&rsquo;s <code>expvar</code> package. An attacker can retrieve this token without authentication and then use it to gain administrative privileges by including it in the <code>X-Dgraph-AuthToken</code> header of subsequent requests. This is a bypass of previous attempts to mitigate similar issues via <code>/debug/pprof/cmdline</code>, which were addressed incompletely. This issue impacts deployments where the Alpha HTTP port is reachable by untrusted parties, allowing for a full authentication bypass.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker sends an unauthenticated GET request to the <code>/debug/vars</code> endpoint on the Dgraph Alpha server (e.g., <code>GET /debug/vars HTTP/1.1</code>).</li>
<li>The server responds with a JSON payload containing the <code>cmdline</code> field.</li>
<li>The attacker parses the JSON response and extracts the value of the <code>cmdline</code> field.</li>
<li>The attacker searches the <code>cmdline</code> output for the <code>--security token=...</code> argument.</li>
<li>The attacker extracts the admin token from the <code>--security</code> argument string.</li>
<li>The attacker sends a request to an admin-only endpoint (e.g., <code>GET /admin/config/cache_mb HTTP/1.1</code>).</li>
<li>The attacker includes the extracted admin token in the <code>X-Dgraph-AuthToken</code> header of the request.</li>
<li>The Dgraph Alpha server validates the token, granting the attacker administrative access.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows an unauthenticated attacker to gain complete administrative control over the Dgraph database. This includes the ability to read and modify admin configurations, and perform operational control actions. In deployments where the Alpha HTTP port is publicly accessible, this vulnerability poses a significant risk, leading to potential data breaches, service disruption, and unauthorized manipulation of the database. While the number of affected deployments is not explicitly stated, any Dgraph instance running a vulnerable version with an exposed Alpha HTTP port is at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Dgraph to version 25.3.3 or later to address the vulnerability.</li>
<li>As a temporary workaround, restrict access to the Alpha HTTP port to trusted networks only.</li>
<li>Deploy the Sigma rule below to detect unauthorized access attempts to the <code>/admin/config/cache_mb</code> endpoint using the <code>X-Dgraph-AuthToken</code> header.</li>
<li>Deploy the Sigma rule below to detect access to <code>/debug/vars</code> endpoint.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>dgraph</category><category>authentication-bypass</category><category>admin-token-disclosure</category></item><item><title>PrefectHQ Prefect Authentication Bypass Vulnerability (CVE-2026-7723)</title><link>https://feed.craftedsignal.io/briefs/2024-01-30-prefect-auth-bypass/</link><pubDate>Tue, 30 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-30-prefect-auth-bypass/</guid><description>PrefectHQ Prefect versions up to 3.6.13 are vulnerable to an authentication bypass via manipulation of the /api/events/in WebSocket endpoint, potentially allowing remote attackers to execute unauthorized actions.</description><content:encoded><![CDATA[<p>PrefectHQ Prefect, a workflow management system, is vulnerable to an authentication bypass vulnerability identified as CVE-2026-7723. The vulnerability exists in versions up to 3.6.13 and stems from a flaw within the <code>/api/events/in</code> WebSocket endpoint. A remote attacker can manipulate data sent to this endpoint, leading to a failure in authentication checks. This can allow the attacker to perform unauthorized actions within the Prefect system. The vulnerability was published on 2026-05-04 and a patch is available in version 3.6.14, specifically commit <code>0d3ab3c2d3f9f98abfafdf7b9f6d4f8ed3925e40</code>. Defenders should upgrade affected Prefect installations to version 3.6.14 or later to mitigate this risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a PrefectHQ Prefect instance running a vulnerable version (&lt;= 3.6.13) with an exposed <code>/api/events/in</code> WebSocket endpoint.</li>
<li>The attacker crafts a malicious WebSocket message specifically targeting the <code>/api/events/in</code> endpoint.</li>
<li>The attacker sends the manipulated message to the <code>/api/events/in</code> endpoint.</li>
<li>Due to the vulnerability, the authentication checks within the WebSocket endpoint fail to properly validate the attacker&rsquo;s identity.</li>
<li>The Prefect system incorrectly processes the attacker&rsquo;s request as authenticated.</li>
<li>The attacker exploits this lack of authentication to execute unauthorized actions within the Prefect system. These actions could include modifying workflows, accessing sensitive data, or disrupting operations.</li>
<li>The attacker may further leverage their access to compromise other connected systems or data stores.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7723 allows an unauthenticated remote attacker to bypass authentication mechanisms in PrefectHQ Prefect. This can lead to unauthorized access to sensitive data, modification of workflows, and disruption of critical business processes. The CVSS v3.1 base score is 7.3, indicating a high severity vulnerability. The number of affected organizations depends on the adoption rate of PrefectHQ Prefect, but any organization running a vulnerable version is at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately upgrade PrefectHQ Prefect to version 3.6.14 or later to apply the patch (<code>0d3ab3c2d3f9f98abfafdf7b9f6d4f8ed3925e40</code>) that resolves CVE-2026-7723.</li>
<li>Monitor web server logs for suspicious activity targeting the <code>/api/events/in</code> endpoint to detect potential exploitation attempts. Deploy the Sigma rule <code>Detect PrefectHQ Auth Bypass Attempt</code> to identify unusual requests to the vulnerable endpoint.</li>
<li>Implement network segmentation to limit the potential impact of a successful exploit by restricting access to sensitive resources from the Prefect server.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>CVE-2026-7723</category><category>authentication-bypass</category><category>websocket</category><category>prefecthq</category></item><item><title>CoreDNS TSIG Authentication Bypass Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-coredns-tsig-bypass/</link><pubDate>Wed, 24 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-coredns-tsig-bypass/</guid><description>CoreDNS versions prior to 1.14.3 are vulnerable to TSIG authentication bypass on gRPC, QUIC, DoH, and DoH3 transports, allowing unauthenticated network attackers to bypass authentication and potentially access TSIG-protected zone data or submit dynamic DNS updates.</description><content:encoded><![CDATA[<p>CoreDNS versions prior to 1.14.3 contain a flaw in the handling of TSIG authentication for gRPC, QUIC, DoH, and DoH3 transports. Specifically, gRPC and QUIC transports only check for the presence of a TSIG key name without verifying the HMAC, while DoH and DoH3 transports unconditionally return a successful TSIG status. This vulnerability allows unauthenticated attackers to bypass TSIG authentication, potentially enabling unauthorized zone transfers, dynamic updates, and access to other TSIG-protected resources. This issue was identified in version 1.14.2 and prior, and affects deployments where TSIG authentication is relied upon for secure DNS operations over these transports.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a CoreDNS server using gRPC, QUIC, DoH, or DoH3 with TSIG authentication enabled.</li>
<li>For gRPC/QUIC, the attacker crafts a DNS request with a valid TSIG key name but a forged or invalid HMAC value. For DoH/DoH3, the attacker crafts a DNS request with any TSIG record.</li>
<li>The attacker sends the crafted request to the CoreDNS server via the affected transport (gRPC, QUIC, DoH, or DoH3).</li>
<li>CoreDNS receives the request and processes the TSIG information. For gRPC/QUIC, CoreDNS checks if the TSIG key name exists in the configuration. For DoH/DoH3, the transport layer reports successful TSIG verification without performing actual verification.</li>
<li>The TSIG check passes due to the vulnerability: either HMAC is not validated (gRPC/QUIC) or TSIG status is unconditionally reported as valid (DoH/DoH3).</li>
<li>The request is passed to the appropriate plugin, bypassing TSIG authentication requirements.</li>
<li>The attacker gains access to TSIG-protected functionality, such as AXFR/IXFR zone transfers or dynamic DNS updates.</li>
<li>The attacker exfiltrates zone data or modifies DNS records, depending on the enabled functionality.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability can allow unauthenticated attackers to perform unauthorized actions on the affected CoreDNS server. This can lead to the exposure of sensitive zone data via AXFR/IXFR, unauthorized modification of DNS records through dynamic updates, or other bypasses of TSIG-gated plugin behavior. The DoH and DoH3 variants pose a higher risk because they do not even require a valid TSIG key name to be known. The impact depends on the specific TSIG-protected functionality enabled on the CoreDNS server and the sensitivity of the data being protected.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade CoreDNS to version 1.14.3 or later to patch CVE-2026-35579.</li>
<li>If upgrading is not immediately possible, disable gRPC, QUIC, DoH, and DoH3 listeners where TSIG authentication is required as suggested in the advisory.</li>
<li>Implement network-level access controls to restrict access to gRPC, QUIC, DoH, and DoH3 ports to trusted sources only, as recommended in the advisory.</li>
<li>Deploy the Sigma rule &ldquo;Detect CoreDNS AXFR Request over DoH with Forged TSIG&rdquo; to identify potential exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>coredns</category><category>tsig</category><category>authentication-bypass</category></item><item><title>WebPros cPanel &amp; WHM and WP2 Authentication Bypass Vulnerability (CVE-2026-41940)</title><link>https://feed.craftedsignal.io/briefs/2024-01-cpanel-auth-bypass/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-cpanel-auth-bypass/</guid><description>CVE-2026-41940 is an authentication bypass vulnerability in WebPros cPanel &amp; WHM and WP2 (WordPress Squared) that allows unauthenticated remote attackers to gain unauthorized access to the control panel.</description><content:encoded><![CDATA[<p>WebPros cPanel &amp; WHM (WebHost Manager) and WP2 (WordPress Squared) are affected by an authentication bypass vulnerability, identified as CVE-2026-41940. This flaw exists within the login flow, potentially granting unauthenticated remote attackers unauthorized access to the control panel. Successful exploitation allows attackers to bypass normal authentication mechanisms and directly access sensitive administrative functions within cPanel &amp; WHM and WP2. Defenders should apply vendor-provided mitigations or discontinue use of the product if mitigations are not available. The vulnerability was disclosed in April 2026, and mitigations should be applied by May 3, 2026.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable cPanel &amp; WHM or WP2 instance.</li>
<li>The attacker crafts a malicious HTTP request exploiting the authentication bypass vulnerability in the login flow.</li>
<li>The request is sent to the target server, bypassing authentication checks.</li>
<li>The server incorrectly processes the request, granting the attacker an authenticated session.</li>
<li>The attacker leverages the authenticated session to access administrative interfaces and settings.</li>
<li>The attacker modifies server configurations, potentially creating new administrative accounts.</li>
<li>The attacker installs malicious plugins or software through the control panel.</li>
<li>The attacker achieves full control over the web server and hosted websites.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-41940 can lead to complete compromise of the affected cPanel &amp; WHM or WP2 server. This can result in data breaches, website defacement, malware distribution, and denial-of-service attacks. The impact is significant due to the widespread use of cPanel &amp; WHM in web hosting environments. Compromised servers could be leveraged for further attacks against other systems and networks.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply mitigations provided by WebPros as detailed in their security update advisory to address CVE-2026-41940.</li>
<li>Deploy the Sigma rule &ldquo;Detect cPanel/WHM Authentication Bypass Attempt&rdquo; to identify potential exploitation attempts in web server logs.</li>
<li>If mitigations cannot be immediately applied, follow BOD 22-01 guidance for cloud services, potentially isolating the affected system until patched.</li>
<li>Consider discontinuing use of the affected product if patches or mitigations are unavailable, as advised in the original CISA KEV entry.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cpanel</category><category>whm</category><category>wp2</category><category>wordpress</category><category>authentication-bypass</category><category>cve-2026-41940</category><category>initial-access</category></item><item><title>PaperCut NG/MF Improper Authentication Vulnerability (CVE-2023-27351)</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-papercut-auth-bypass/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-papercut-auth-bypass/</guid><description>CVE-2023-27351 is an improper authentication vulnerability in PaperCut NG/MF that allows remote attackers to bypass authentication via the SecurityRequestFilter class, leading to potential ransomware deployment.</description><content:encoded><![CDATA[<p>CVE-2023-27351 is a critical improper authentication vulnerability affecting PaperCut NG/MF. The vulnerability exists within the SecurityRequestFilter class, enabling remote attackers to bypass authentication mechanisms. This bypass can lead to unauthorized access to sensitive functionalities within the PaperCut NG/MF application. Publicly available reports indicate that this vulnerability is being actively exploited, including instances of ransomware deployment following successful exploitation. Due to the ease of exploitation and the potentially severe consequences, organizations using affected versions of PaperCut NG/MF are urged to apply mitigations immediately.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable PaperCut NG/MF instance accessible over the network.</li>
<li>The attacker crafts a malicious HTTP request targeting the SecurityRequestFilter class.</li>
<li>The crafted request exploits the improper authentication vulnerability (CVE-2023-27351), bypassing normal authentication checks.</li>
<li>Upon successful authentication bypass, the attacker gains unauthorized access to the PaperCut NG/MF application with elevated privileges.</li>
<li>The attacker leverages the gained access to upload malicious scripts or binaries to the PaperCut server.</li>
<li>The attacker executes the uploaded payload, initiating the ransomware encryption process or other malicious activities.</li>
<li>Ransomware encrypts sensitive data on the PaperCut server and potentially spreads to other connected systems.</li>
<li>The attacker demands a ransom payment for the decryption key.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2023-27351 allows attackers to bypass authentication, gain unauthorized access, and potentially deploy ransomware. This can result in significant data loss, disruption of print services, and financial losses due to ransom demands and recovery efforts. The vulnerability is known to be actively exploited, increasing the risk to organizations using affected PaperCut NG/MF installations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply mitigations provided by PaperCut, referencing their knowledge base articles PO-1216 and PO-1219.</li>
<li>Deploy the Sigma rules provided below to detect potential exploitation attempts against the SecurityRequestFilter class.</li>
<li>Follow applicable BOD 22-01 guidance for cloud services if the PaperCut instance is cloud-hosted.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">threat</category><category>papercut</category><category>authentication-bypass</category><category>ransomware</category><category>cve-2023-27351</category></item><item><title>Note Mark OIDC Authentication Bypass via Hardcoded Password</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-note-mark-auth-bypass/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-note-mark-auth-bypass/</guid><description>A critical authentication bypass vulnerability in note-mark allows attackers to authenticate as any OIDC-registered user by submitting the password 'null' to the internal login endpoint due to a hardcoded bcrypt hash fallback, potentially leading to account takeover and persistent access.</description><content:encoded><![CDATA[<p>A critical authentication bypass vulnerability affects note-mark deployments configured with OIDC authentication. The vulnerability stems from the <code>IsPasswordMatch</code> function in <code>backend/db/models.go</code>, which falls back to a hardcoded <code>bcrypt(&quot;null&quot;)</code> hash when a user has no stored password. This occurs because OIDC-registered users are created with an empty password. As a result, any attacker can authenticate as an OIDC user by submitting the password &ldquo;null&rdquo; to the internal login endpoint (<code>POST /api/auth/token</code>). This issue affects note-mark version 0.19.2 and potentially earlier versions. The default configuration ships with both authentication paths side-by-side, so any site that turns on OIDC is affected, allowing for potential account takeover and data exfiltration.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a note-mark instance with OIDC enabled and internal login enabled (default configuration). The attacker can confirm this by accessing <code>/api/info</code>.</li>
<li>The attacker enumerates valid usernames via the <code>/api/users/search</code> endpoint (anonymous user search enabled by default).</li>
<li>The attacker sends a POST request to <code>/api/auth/token</code> with the target username and password &ldquo;null&rdquo;.</li>
<li>The <code>IsPasswordMatch</code> function in <code>backend/db/models.go</code> is called. Since OIDC-registered users have an empty password, the function uses the <code>nullPasswordHash</code>.</li>
<li>The <code>bcrypt.CompareHashAndPassword</code> function compares <code>nullPasswordHash</code> with the provided password &ldquo;null&rdquo;, resulting in a successful match.</li>
<li>The server issues an <code>Auth-Session-Token</code> cookie to the attacker.</li>
<li>The attacker uses the valid session cookie to access the target user&rsquo;s account via <code>/api/users/me</code> or other authenticated endpoints.</li>
<li>The attacker persists access by updating the target user&rsquo;s password via <code>PUT /api/users/me/password</code> using &ldquo;null&rdquo; as the existing password, locking out the legitimate user and gaining persistent access.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to fully take over OIDC-only user accounts on affected note-mark deployments. This includes reading private notebooks, note markdown, and uploaded assets. An attacker can also write, edit, or delete anything the compromised user owns, leading to significant data loss and confidentiality breaches. The vulnerability is especially severe due to the default configuration enabling both OIDC and internal login paths, making it easy for attackers to exploit.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the recommended fix by rejecting the login path for users with no stored password in <code>backend/services/auth.go</code> and <code>backend/services/users.go</code> as detailed in the advisory. This directly addresses the vulnerability by preventing authentication with the &ldquo;null&rdquo; password.</li>
<li>Monitor network traffic for POST requests to <code>/api/auth/token</code> with a request body containing <code>&quot;password&quot;:&quot;null&quot;</code> to identify potential exploitation attempts using the provided Sigma rule.</li>
<li>Consider disabling internal logins (<code>EnableInternalLogin</code>) if OIDC is the sole authentication method used, mitigating the risk by removing the vulnerable login path.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>authentication-bypass</category><category>credential-access</category><category>note-mark</category><category>ghsa</category></item><item><title>666ghj MiroFish REST API Authentication Bypass (CVE-2026-7042)</title><link>https://feed.craftedsignal.io/briefs/2024-01-mirofish-auth-bypass/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-mirofish-auth-bypass/</guid><description>A missing authentication vulnerability (CVE-2026-7042) exists in 666ghj MiroFish up to version 0.1.2, allowing remote attackers to bypass authentication via manipulation of the REST API Endpoint's create_app function.</description><content:encoded><![CDATA[<p>A critical authentication bypass vulnerability, tracked as CVE-2026-7042, has been identified in 666ghj MiroFish software up to version 0.1.2. The vulnerability lies within the <code>create_app</code> function of the <code>backend/app/__init__.py</code> file, which manages the REST API Endpoint. A remote attacker can exploit this flaw by manipulating specific parameters within API requests, effectively bypassing authentication mechanisms. This allows unauthorized access to sensitive functionalities and data. Public exploits are available, increasing the risk of widespread exploitation. The vendor was notified, but has not yet responded.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable MiroFish instance running version 0.1.2 or earlier.</li>
<li>The attacker crafts a malicious HTTP request targeting the REST API Endpoint.</li>
<li>The crafted request manipulates parameters intended for the <code>create_app</code> function, specifically designed to bypass authentication checks.</li>
<li>The vulnerable <code>create_app</code> function fails to properly validate the request due to the missing authentication check.</li>
<li>The application grants unauthorized access to protected resources or functionalities.</li>
<li>The attacker performs unauthorized actions, such as data exfiltration, modification, or deletion, depending on the exposed API endpoints.</li>
<li>The attacker leverages the initial access to further compromise the system or pivot to other internal resources.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7042 allows an attacker to bypass authentication controls in MiroFish applications. This can lead to unauthorized access to sensitive data, modification of application settings, or complete system compromise. The lack of authentication on the REST API endpoint can have severe implications for data confidentiality, integrity, and availability. Given the availability of a public exploit, affected organizations are at immediate risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for suspicious HTTP requests targeting the REST API Endpoint with unusual parameters, using the provided Sigma rule that detects anomalous HTTP methods in webserver logs.</li>
<li>Apply any available patches or updates from 666ghj to address CVE-2026-7042 immediately.</li>
<li>Review the affected <code>backend/app/__init__.py</code> file for authentication logic flaws and implement necessary security measures.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-7042</category><category>authentication-bypass</category><category>rest-api</category></item></channel></rss>