<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Authorization — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/authorization/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 30 Apr 2026 21:03:20 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/authorization/feed.xml" rel="self" type="application/rss+xml"/><item><title>Kirby CMS Missing Authorization Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-kirby-auth-bypass/</link><pubDate>Thu, 30 Apr 2026 21:03:20 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-kirby-auth-bypass/</guid><description>A missing authorization vulnerability in Kirby CMS allows authenticated users to bypass intended access restrictions on pages and files, potentially leading to unauthorized information disclosure and content modification; patched in versions 4.9.0 and 5.4.0.</description><content:encoded><![CDATA[<p>Kirby CMS versions prior to 4.9.0 and between 5.0.0 and 5.3.3 are vulnerable to a missing authorization flaw. This vulnerability impacts Kirby sites where user roles are intentionally configured with restricted access to pages or files through disabled <code>pages.access</code>, <code>pages.list</code>, <code>files.access</code>, or <code>files.list</code> permissions. The issue stems from inconsistent permission checks within the Kirby Panel and REST API, allowing authenticated users to access resources they should not be able to. Updating to versions 4.9.0, 5.4.0, or later resolves this vulnerability by implementing consistent permission checks. The vulnerability is identified as CVE-2026-42137.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An authenticated user logs into the Kirby CMS Panel or REST API.</li>
<li>The user attempts to access a page or file for which their role lacks the necessary <code>pages.access</code>/<code>files.access</code> or <code>pages.list</code>/<code>files.list</code> permissions.</li>
<li>Due to inconsistent permission checks, the user can view the page or file details via the &ldquo;changes&rdquo; dialog in the Panel, even if listing is disabled.</li>
<li>The user accesses the REST API, which, despite direct access checks, fails to properly filter collections or related models (children, drafts, files, etc.).</li>
<li>The attacker views images associated with restricted site, pages, or user resources in lists within the Panel.</li>
<li>The user exploits the incorrect permission check (using <code>pages.access</code> instead of <code>pages.list</code> or <code>files.access</code> instead of <code>files.list</code> in specific API routes).</li>
<li>The user traverses to previous or next files using direct links in the files view, even if those files should not be listable.</li>
<li>The attacker gains unauthorized access to sensitive information or modifies content due to the bypassed permission checks.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>This vulnerability allows authenticated users to bypass intended access restrictions within Kirby CMS, leading to potential unauthorized access to sensitive information and/or unauthorized content modification. The inconsistent permission checks in the Panel and REST API could result in unintended disclosure of data restricted by role-based access controls. Successful exploitation could compromise the confidentiality and integrity of the affected Kirby CMS instance. While the advisory does not list the number of victims, this flaw impacts any Kirby site with restricted roles.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to Kirby CMS version 4.9.0 or 5.4.0 (or later) to patch the vulnerability as recommended in the advisory.</li>
<li>Review user role permissions and blueprint configurations to ensure appropriate access controls are in place after patching, as described in the overview.</li>
<li>Monitor web server logs for unusual API requests to resources that should be restricted, using the rules below, to identify potential exploitation attempts.</li>
<li>Implement rate limiting on API endpoints to mitigate potential brute-force attacks attempting to exploit this or other vulnerabilities.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>authorization</category><category>cms</category><category>web-application</category></item><item><title>Clerk Authorization Bypass Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-clerk-auth-bypass/</link><pubDate>Thu, 30 Apr 2026 18:20:02 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-clerk-auth-bypass/</guid><description>Clerk has an authorization bypass vulnerability in multiple packages where the `has()` and `auth.protect()` predicates can incorrectly return true, potentially allowing unauthorized actions.</description><content:encoded><![CDATA[<p>A critical authorization bypass vulnerability has been identified in Clerk&rsquo;s authorization predicates (<code>has()</code> and <code>auth.protect()</code>) across multiple SDKs, including <code>@clerk/shared</code>, <code>@clerk/nextjs</code>, and <code>@clerk/backend</code>. This flaw, reported on April 18, 2026, and patched on April 22, 2026, can lead to incorrect authorization decisions when combining multiple authorization dimensions (e.g., reverification with role). Specifically, the predicates may return <code>true</code> even if the user does not satisfy all required conditions, potentially allowing unauthorized access to gated actions. A secondary bypass exists in <code>@clerk/nextjs</code>, where <code>auth.protect()</code> silently discards authorization parameters under certain conditions. The vulnerability affects applications using specific combinations of authorization checks, emphasizing the need for immediate patching.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies an application utilizing affected Clerk packages and vulnerable authorization checks.</li>
<li>The attacker targets an endpoint protected by a combined authorization check (e.g., requiring a specific role and reverification).</li>
<li>The attacker crafts a request that satisfies one, but not all, of the authorization conditions.</li>
<li>Due to the bypass vulnerability, the <code>has()</code> or <code>auth.protect()</code> predicate incorrectly returns <code>true</code>.</li>
<li>The application grants the attacker access to the protected resource or functionality.</li>
<li>In the case of the <code>@clerk/nextjs</code> bypass, the attacker might exploit the silent discarding of authorization parameters when <code>unauthenticatedUrl</code>, <code>unauthorizedUrl</code>, or <code>token</code> are also present in the <code>auth.protect()</code> call, effectively bypassing authorization.</li>
<li>The attacker performs unauthorized actions, such as modifying data or accessing restricted areas of the application.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability could lead to unauthorized access to sensitive resources and functionalities within applications using Clerk for authentication and authorization. This could result in data breaches, privilege escalation, and other security incidents. The vulnerability affects a wide range of Clerk packages, potentially impacting a significant number of applications relying on Clerk for access control. Immediate patching is crucial to mitigate the risk of exploitation.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to the latest patch release of the consuming app&rsquo;s framework package as specified in the advisory to remediate CVE-2026-42349.</li>
<li>If immediate upgrade is not feasible, implement the suggested workaround of splitting combined <code>has()</code> or <code>auth.protect()</code> calls into sequential single-condition checks as described in the advisory.</li>
<li>Deploy the Sigma rule <code>ClerkAuthProtectBypass</code> to detect potential exploitation attempts by monitoring for calls to <code>auth.protect</code> that include <code>unauthenticatedUrl</code>, <code>unauthorizedUrl</code>, or <code>token</code> parameters.</li>
<li>Deploy the Sigma rule <code>ClerkCombinedAuthCheckBypass</code> to identify suspicious process creation events that may indicate unauthorized access due to the authorization bypass.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>authorization</category><category>bypass</category><category>clerk</category><category>cve-2026-42349</category></item><item><title>Admidio SAML Signature Validation Bypass Allows Forged AuthnRequests and LogoutRequests</title><link>https://feed.craftedsignal.io/briefs/2026-04-admidio-saml-bypass/</link><pubDate>Wed, 29 Apr 2026 21:56:13 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-admidio-saml-bypass/</guid><description>Admidio's SAML Identity Provider implementation fails to properly validate signatures on SAML AuthnRequests and LogoutRequests, enabling attackers to bypass signature enforcement, potentially disclose user attributes via forged SSO requests, and terminate user sessions via forged SLO requests.</description><content:encoded><![CDATA[<p>Admidio, a free web-based content management system for organizations and groups, contains a critical vulnerability in its SAML Single Sign-On (SSO) implementation. The <code>validateSignature()</code> method within the SAMLService class returns error strings upon signature validation failure, rather than throwing exceptions. The calling functions, <code>handleSSORequest()</code> and <code>handleSLORequest()</code>, incorrectly assume that the method throws an exception, and therefore, do not check the return value. This oversight renders the <code>smc_require_auth_signed</code> configuration option ineffective, allowing attackers to forge SAML AuthnRequests and LogoutRequests. An attacker can exploit this vulnerability to obtain sensitive user information or cause denial of service by terminating user sessions. This affects Admidio versions 5.0.8 and earlier and requires SAML SSO to be enabled.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious SAML AuthnRequest or LogoutRequest without a valid signature, impersonating a legitimate Service Provider (SP).</li>
<li>The attacker sends the forged SAML request to the Admidio instance via HTTP GET or POST to <code>modules/sso/index.php</code>.</li>
<li>The <code>receiveMessage()</code> function parses the SAML binding directly from the HTTP request, requiring no prior authentication.</li>
<li>The Entity ID is extracted from the forged request&rsquo;s Issuer element, and the corresponding client configuration is loaded.</li>
<li>The <code>validateSignature()</code> function is called, but its return value (indicating signature validity) is discarded.</li>
<li>For AuthnRequests, if the targeted user has an active session (<code>$gValidLogin</code> is true), the login form is skipped.</li>
<li>Admidio builds a SAML Response containing the user&rsquo;s attributes (login, name, email, roles) and sends it to the attacker-controlled <code>AssertionConsumerServiceURL</code>.</li>
<li>For LogoutRequests, the user&rsquo;s session is immediately terminated in the database, triggering a cascading single logout across all registered SPs.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability can lead to several critical impacts. The primary impact is the complete bypass of signature enforcement, negating the security benefits of the <code>smc_require_auth_signed</code> setting. This can lead to the disclosure of sensitive user attributes, including login name, email, and role memberships, to unauthorized parties by forging SSO requests and redirecting them to attacker-controlled endpoints. Furthermore, attackers can terminate any user&rsquo;s Admidio session by forging SLO requests, potentially causing a denial-of-service condition. This vulnerability affects all Admidio instances with SAML SSO enabled and can potentially impact all users of the system.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the recommended fix in the Admidio codebase to check the return value of <code>validateSignature()</code> and throw an exception on failure, as outlined in the advisory (<a href="https://github.com/advisories/GHSA-25cw-98hg-g3cg)">https://github.com/advisories/GHSA-25cw-98hg-g3cg)</a>.</li>
<li>Deploy the Sigma rule &ldquo;Admidio Forged SAML AuthnRequest Detection&rdquo; to detect potentially malicious SAML AuthnRequests lacking a valid signature via webserver logs.</li>
<li>Deploy the Sigma rule &ldquo;Admidio Forged SAML LogoutRequest Detection&rdquo; to detect potentially malicious SAML LogoutRequests lacking a valid signature via webserver logs.</li>
<li>Monitor webserver logs for requests to <code>/adm_program/modules/sso/index.php/saml/sso</code> and <code>/adm_program/modules/sso/index.php/saml/slo</code> without proper signature validation to detect potential exploitation attempts.</li>
<li>Upgrade to a patched version of Admidio to address CVE-2026-41669.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>saml</category><category>signature-bypass</category><category>authentication</category><category>authorization</category><category>web-application</category></item><item><title>vanna-ai vanna Improper Authorization Vulnerability (CVE-2026-6977)</title><link>https://feed.craftedsignal.io/briefs/2026-04-vanna-ai-authz-bypass/</link><pubDate>Sat, 25 Apr 2026 11:16:19 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-vanna-ai-authz-bypass/</guid><description>An improper authorization vulnerability (CVE-2026-6977) exists in vanna-ai vanna up to version 2.0.2 due to manipulation of an unknown function within the Legacy Flask API, potentially allowing remote attackers to bypass intended access restrictions.</description><content:encoded><![CDATA[<p>A security vulnerability, identified as CVE-2026-6977, has been discovered in vanna-ai vanna versions up to 2.0.2. The vulnerability resides within an unspecified function of the Legacy Flask API component. Successful exploitation of this flaw leads to improper authorization, potentially granting unauthorized access to sensitive resources or functionalities. The vulnerability is remotely exploitable and a proof-of-concept exploit is publicly available. The vendor was contacted but did not respond. This vulnerability poses a risk to systems utilizing the affected versions of vanna-ai vanna, as attackers could leverage it to bypass intended access controls.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable vanna-ai vanna instance running version 2.0.2 or earlier.</li>
<li>Attacker crafts a malicious HTTP request targeting the Legacy Flask API. The specific endpoint and parameters involved are not defined in the source material.</li>
<li>The crafted request exploits the improper authorization vulnerability (CVE-2026-6977) within the Legacy Flask API.</li>
<li>Due to the improper authorization flaw, the attacker&rsquo;s request bypasses the intended access controls.</li>
<li>The vulnerable application grants the attacker unauthorized access to resources or functionalities that should be restricted.</li>
<li>Depending on the accessed resources, the attacker may gain access to sensitive data, modify system settings, or perform other unauthorized actions.</li>
<li>The attacker may escalate privileges or move laterally within the affected system if further vulnerabilities exist or if the compromised application has elevated permissions.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-6977 allows a remote attacker to bypass authorization checks in vanna-ai vanna, potentially leading to unauthorized access to sensitive data or functionality. Given that a public exploit exists, organizations utilizing affected versions of vanna-ai vanna are at increased risk. The lack of vendor response further exacerbates the risk, as no official patch or mitigation guidance is available.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for suspicious activity targeting the Legacy Flask API in vanna-ai vanna, using a webserver category Sigma rule focused on unusual HTTP requests.</li>
<li>Apply generic hardening and input validation techniques to mitigate the impact of potential exploits targeting web applications.</li>
<li>Investigate and validate the activity from the VulDB references provided in this brief.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>vulnerability</category><category>authorization</category><category>web application</category></item><item><title>FreeScout Incorrect Authorization Vulnerability via Save Draft</title><link>https://feed.craftedsignal.io/briefs/2026-04-freescout-auth-bypass/</link><pubDate>Wed, 22 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-freescout-auth-bypass/</guid><description>FreeScout before 1.8.215 has an incorrect authorization vulnerability where a direct POST request to the `save_draft` AJAX path can create a draft inside a hidden conversation when `APP_SHOW_ONLY_ASSIGNED_CONVERSATIONS` is enabled, potentially allowing unauthorized access or modification of data.</description><content:encoded><![CDATA[<p>FreeScout is a self-hosted help desk and shared mailbox platform. Prior to version 1.8.215, a vulnerability exists related to authorization controls when the <code>APP_SHOW_ONLY_ASSIGNED_CONVERSATIONS</code> setting is enabled. Specifically, the <code>save_draft</code> AJAX endpoint lacks proper authorization checks. This allows an attacker to potentially bypass intended access restrictions and create drafts within conversations that they should not be able to access, leading to unauthorized modification or viewing of conversation data. This vulnerability was addressed in version 1.8.215.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a FreeScout instance running a version prior to 1.8.215 with <code>APP_SHOW_ONLY_ASSIGNED_CONVERSATIONS</code> enabled.</li>
<li>Attacker authenticates to the FreeScout instance with a valid, but unauthorized user account.</li>
<li>Attacker identifies the conversation ID of a conversation they are not assigned to and cannot normally access via the UI.</li>
<li>Attacker crafts a POST request to the <code>/index.php?m=conversations&amp;a=save_draft</code> endpoint, including the conversation ID and the draft content they wish to create.</li>
<li>The server, lacking proper authorization checks on the <code>save_draft</code> endpoint, accepts the POST request.</li>
<li>A draft is created within the targeted conversation, associated with the attacker&rsquo;s user account.</li>
<li>The attacker, or potentially other unauthorized users who later gain access to the attacker&rsquo;s account, can view or modify the drafted content, potentially exfiltrating sensitive information.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows unauthorized users to create drafts within conversations they are not assigned to. This could lead to the unauthorized viewing or modification of sensitive information contained within the conversations, potentially leading to data breaches or compliance violations. The vulnerability affects FreeScout instances running versions prior to 1.8.215 with the specific <code>APP_SHOW_ONLY_ASSIGNED_CONVERSATIONS</code> setting enabled.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade FreeScout to version 1.8.215 or later to remediate the vulnerability (references: <a href="https://github.com/freescout-help-desk/freescout/releases/tag/1.8.215)">https://github.com/freescout-help-desk/freescout/releases/tag/1.8.215)</a>.</li>
<li>Monitor web server logs for POST requests to the <code>/index.php?m=conversations&amp;a=save_draft</code> endpoint originating from unusual IP addresses or user agents using the Sigma rule provided below.</li>
<li>Implement web application firewall (WAF) rules to filter or block unauthorized POST requests to the vulnerable endpoint.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>cve</category><category>authorization</category><category>web application</category></item><item><title>FreeScout Incorrect Authorization Vulnerability (CVE-2026-41189)</title><link>https://feed.craftedsignal.io/briefs/2026-04-freescout-authz-bypass/</link><pubDate>Wed, 22 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-freescout-authz-bypass/</guid><description>FreeScout versions before 1.8.215 are vulnerable to an incorrect authorization issue where users without conversation access can edit customer threads due to a flaw in the `ThreadPolicy::edit()` function.</description><content:encoded><![CDATA[<p>FreeScout, a self-hosted help desk and shared mailbox platform, is affected by an authorization bypass vulnerability. Specifically, versions prior to 1.8.215 fail to properly restrict access to customer threads within conversations. The vulnerability resides in the <code>ThreadPolicy::edit()</code> function, which checks mailbox access but neglects to enforce the <code>ConversationPolicy</code>&rsquo;s assigned-only restriction.  This allows a user who should not have access to a conversation to still load and modify customer-authored threads contained within that conversation. Upgrading to version 1.8.215 resolves this vulnerability. This allows unauthorized modification of customer communications, potentially leading to data breaches or manipulated customer service interactions.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains access to a FreeScout user account with limited privileges.</li>
<li>Attacker attempts to access a conversation thread for which they lack explicit authorization.</li>
<li>The application&rsquo;s <code>ThreadPolicy::edit()</code> function is invoked to authorize the edit action.</li>
<li>The <code>ThreadPolicy::edit()</code> function incorrectly authorizes the action by only checking mailbox access, bypassing the <code>ConversationPolicy</code>&rsquo;s assigned-only restriction.</li>
<li>The attacker successfully loads the customer-authored thread, gaining unauthorized access.</li>
<li>Attacker modifies the content of the customer-authored thread.</li>
<li>The modified thread is saved, altering the conversation history.</li>
<li>The change impacts communications with the customer.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>This vulnerability (CVE-2026-41189) allows unauthorized users to modify customer communications within the FreeScout help desk platform.  Successful exploitation can lead to data integrity issues, potentially impacting all customer conversations within the affected FreeScout instance. The severity is heightened by the potential for attackers to manipulate sensitive information, leading to reputational damage, legal ramifications, and loss of customer trust.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade FreeScout to version 1.8.215 or later to patch CVE-2026-41189.</li>
<li>Monitor FreeScout web server logs for unauthorized access attempts using the provided Sigma rule.</li>
<li>Review user access controls and ensure that the principle of least privilege is enforced to limit the impact of potential compromises.</li>
<li>Implement the provided Sigma rule to detect potential unauthorized thread editing attempts based on HTTP request patterns.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>freescout</category><category>authorization</category><category>vulnerability</category></item><item><title>Better Auth OAuth Provider Authorization Bypass Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-better-auth-oauth-bypass/</link><pubDate>Fri, 17 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-better-auth-oauth-bypass/</guid><description>An authorization bypass vulnerability exists in Better Auth's OAuth provider, allowing low-privilege users to create OAuth clients despite configured clientPrivileges, potentially leading to unauthorized client registration and increased phishing risks.</description><content:encoded><![CDATA[<p>An authorization bypass vulnerability affects the OAuth provider component of Better Auth, specifically versions 1.4.8-beta.7 through 1.6.4 and 1.7.0-beta.0 through 1.7.0-beta.1. This flaw allows any authenticated, low-privilege user to create OAuth clients, bypassing the intended restrictions set by the <code>clientPrivileges</code> configuration. The vulnerability stems from the client creation endpoints (<code>adminCreateOAuthClient</code> and <code>createOAuthClient</code>) not enforcing the <code>clientPrivileges</code> check before creating new OAuth clients. This bypass allows attackers to register OAuth clients with attacker-controlled redirect URIs and metadata, potentially leading to phishing attacks and abuse of trust assumptions in OAuth/OIDC flows. Defenders should implement detections to identify unauthorized OAuth client creation attempts.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker authenticates to the Better Auth application with a low-privilege account.</li>
<li>The attacker crafts a POST request to either <code>/api/auth/oauth2/create-client</code> or a custom endpoint that routes to <code>adminCreateOAuthClient</code>.</li>
<li>The attacker includes parameters for <code>client_name</code>, <code>redirect_uris</code>, and other client metadata within the POST request body.</li>
<li>The <code>createOAuthClientEndpoint</code> function is called without first performing a <code>clientPrivileges</code> authorization check.</li>
<li>A new OAuth client is created and persisted in the system.</li>
<li>The attacker now controls a registered OAuth client with attacker-defined redirect URIs.</li>
<li>The attacker can potentially use this client for phishing attacks or to bypass consent flows if <code>skip_consent</code> is enabled (if <code>adminCreateOAuthClient</code> is exposed).</li>
<li>The attacker exploits the newly created OAuth client to gain unauthorized access to resources or user data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>This vulnerability allows unauthorized users to create OAuth clients, potentially leading to several negative consequences. Attackers can register clients with malicious redirect URIs, which can be used in phishing campaigns to steal user credentials or OAuth tokens. In scenarios where the <code>adminCreateOAuthClient</code> endpoint is exposed, attackers can create clients that bypass user consent, further increasing the risk of successful attacks. The impact is significant because it breaks the intended access control mechanism of the <code>clientPrivileges</code> configuration, affecting applications that rely on it to restrict client registration. Successful exploitation can lead to unauthorized access to user data, compromised accounts, and damaged trust in the application.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for POST requests to the <code>/api/auth/oauth2/create-client</code> endpoint, especially from users who should not have client creation privileges. Implement the &ldquo;Detect Unauthorized OAuth Client Creation Attempt&rdquo; Sigma rule below, using webserver logs (category: &ldquo;webserver&rdquo;, product: &ldquo;linux&rdquo;).</li>
<li>Apply the necessary patches to upgrade <code>@better-auth/oauth-provider</code> to a version that addresses this vulnerability (&gt;= 1.6.5 or &gt;= 1.7.0-beta.2).</li>
<li>Audit your application&rsquo;s OAuth client registration process to ensure that the <code>clientPrivileges</code> check is enforced correctly.</li>
<li>If using <code>adminCreateOAuthClient</code>, ensure it is not exposed to low-privilege authenticated users to prevent the <code>skip_consent</code> bypass.</li>
<li>Deploy the &ldquo;Detect OAuth Client Creation with Skip Consent&rdquo; Sigma rule if your deployment exposes the admin client creation endpoint.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>oauth</category><category>authorization</category><category>bypass</category><category>privilege-escalation</category><category>defense-evasion</category></item><item><title>Vault Token Leak via Authorization Header Forwarding</title><link>https://feed.craftedsignal.io/briefs/2026-04-vault-token-leak/</link><pubDate>Fri, 17 Apr 2026 04:16:09 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-vault-token-leak/</guid><description>Vault instances configured to pass through the 'Authorization' header may forward Vault tokens to auth plugin backends when the header is used for authentication, potentially leading to token compromise; this vulnerability is tracked as CVE-2026-4525 and patched in versions 2.0.0, 1.21.5, 1.20.10, and 1.19.16.</description><content:encoded><![CDATA[<p>CVE-2026-4525 describes a vulnerability in HashiCorp Vault where an improperly sanitized &ldquo;Authorization&rdquo; header can lead to token exposure. Specifically, if a Vault auth mount is configured to pass through the &ldquo;Authorization&rdquo; header, and that header is used to authenticate with Vault, the Vault token itself is inadvertently forwarded to the auth plugin backend. This unintended token forwarding could allow malicious actors to gain unauthorized access if they can intercept or control the auth plugin backend. This issue affects Vault versions prior to 2.0.0, 1.21.5, 1.20.10, and 1.19.16 and was reported by HashiCorp. The vulnerability was patched in the aforementioned versions. Exploitation would require specific Vault configuration and the ability to influence the authentication process via the Authorization header.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a Vault instance with an auth mount configured to pass through the &ldquo;Authorization&rdquo; header.</li>
<li>The attacker crafts a malicious request to Vault, including a valid &ldquo;Authorization&rdquo; header for authentication purposes.</li>
<li>Vault processes the request and, due to the vulnerability, forwards the Vault token contained in the &ldquo;Authorization&rdquo; header to the configured auth plugin backend.</li>
<li>The attacker intercepts the forwarded Vault token, either by compromising the auth plugin backend or through network monitoring.</li>
<li>The attacker uses the stolen Vault token to authenticate directly to Vault, bypassing normal authentication procedures.</li>
<li>The attacker gains unauthorized access to sensitive data and secrets stored within Vault.</li>
<li>The attacker escalates privileges within the Vault environment by leveraging the compromised token&rsquo;s permissions.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-4525 allows an attacker to steal Vault tokens, potentially granting them complete control over the Vault instance and access to all stored secrets. The severity is high due to the potential for complete compromise of sensitive data. The impact depends on the scope of secrets managed by the compromised Vault instance; in some cases, this could lead to a complete breach of the affected organization&rsquo;s infrastructure. The vulnerability affects all organizations using vulnerable versions of Vault with auth mounts configured to pass through the &ldquo;Authorization&rdquo; header.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Vault instances to versions 2.0.0, 1.21.5, 1.20.10, or 1.19.16 or later to remediate CVE-2026-4525.</li>
<li>Review Vault auth mount configurations to ensure that the &ldquo;Authorization&rdquo; header is not being passed through unnecessarily.</li>
<li>Monitor network traffic for unauthorized access attempts using stolen Vault tokens after applying the patch.</li>
<li>Implement the provided Sigma rule targeting the usage of specific auth paths after a potential compromise.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>vault</category><category>token-leak</category><category>authorization</category><category>cve-2026-4525</category></item><item><title>Juju CloudSpec API Authorization Bypass (CVE-2026-5412)</title><link>https://feed.craftedsignal.io/briefs/2026-04-juju-auth-bypass/</link><pubDate>Fri, 10 Apr 2026 13:16:45 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-juju-auth-bypass/</guid><description>CVE-2026-5412 describes an authorization issue in Juju versions prior to 2.9.57 and 3.6.21, where a low-privileged authenticated user can call the CloudSpec API method to extract cloud credentials used to bootstrap the controller, leading to sensitive credential exposure.</description><content:encoded><![CDATA[<p>CVE-2026-5412 identifies an authorization bypass vulnerability affecting Juju, an open-source service orchestration tool. Specifically, versions prior to 2.9.57 and 3.6.21 are susceptible. An authenticated user with low privileges can exploit this vulnerability by invoking the CloudSpec API method. This method, intended for controller bootstrapping, inadvertently exposes sensitive cloud credentials when accessed by unauthorized users. Successful exploitation grants access to the credentials used to manage the cloud environment where Juju is deployed. This poses a significant risk, potentially allowing attackers to compromise the entire cloud infrastructure managed by the vulnerable Juju controller. Defenders should prioritize patching vulnerable Juju deployments.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker authenticates to the Juju controller with a low-privileged account.</li>
<li>The attacker crafts a malicious API request to the <code>CloudSpec</code> method.</li>
<li>The Juju controller, lacking proper authorization checks, processes the request.</li>
<li>The <code>CloudSpec</code> method retrieves the cloud credentials used for bootstrapping.</li>
<li>The controller returns the cloud credentials to the attacker.</li>
<li>Attacker obtains the sensitive cloud credentials, such as AWS access keys or Azure service principal secrets.</li>
<li>The attacker uses the stolen cloud credentials to access and control cloud resources.</li>
<li>Attacker achieves complete compromise of the cloud environment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-5412 allows a low-privileged, authenticated attacker to steal cloud credentials. This can lead to complete compromise of the cloud infrastructure managed by the vulnerable Juju controller. The impact includes unauthorized access to data, potential data breaches, denial of service, and the ability to deploy malicious workloads within the cloud environment. The severity is heightened by the ease of exploitation and the high value of the exposed cloud credentials.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Juju controllers to versions 2.9.57 or 3.6.21 to remediate CVE-2026-5412.</li>
<li>Implement the Sigma rule &ldquo;Detect Juju CloudSpec API Access&rdquo; to detect unauthorized calls to the CloudSpec API method in Juju environments.</li>
<li>Monitor Juju controller logs for suspicious API requests originating from low-privileged accounts.</li>
<li>Review and enforce strict access control policies within the cloud environment to limit the impact of compromised credentials.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>vulnerability</category><category>authorization</category><category>cloud</category></item><item><title>Unauthenticated Access to kcp Cache Server</title><link>https://feed.craftedsignal.io/briefs/2026-04-kcp-cache-unauth/</link><pubDate>Wed, 08 Apr 2026 15:04:22 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-kcp-cache-unauth/</guid><description>The kcp cache server is exposed without authentication, allowing unauthorized read access to sensitive data and a race condition for write access that could lead to temporary privilege escalation.</description><content:encoded><![CDATA[<p>The kcp (Kubernetes Cluster Platform) cache server, responsible for replicating resources, is directly exposed by the root shard without any authentication or authorization checks. This vulnerability allows anyone with network access to the root shard to read replicated resources and potentially write to the cache server, creating a race condition. The lack of authentication in the preHandlerChainMux, specifically identified in <code>pkg/server/config.go</code> at line 514-518, causes the cache server to be proxied before authentication or authorization can take place. This impacts kcp versions prior to v0.29.3 and between v0.30.0 and v0.30.3. This vulnerability allows unauthorized access to sensitive information, including RBAC rules, cluster topology, API surfaces, admission control policies, and tenancy configurations.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains network access to the kcp root shard, typically through exposed ports or external URLs.</li>
<li>Attacker crafts an HTTP request targeting the <code>/services/cache/*</code> endpoint without any authentication headers.</li>
<li>The request bypasses authentication and authorization checks due to the flawed preHandlerChainMux configuration.</li>
<li>The attacker reads replicated resources from the cache, such as clusterroles, clusterrolebindings, logicalclusters, apiexports, and validatingwebhookconfigurations.</li>
<li>(Optional) The attacker attempts to inject a malicious ClusterRole and ClusterRoleBinding via a POST request to the cache server.</li>
<li>The cache etcd watch fires, notifying the authorization informer and replication controller in parallel.</li>
<li>The authorization informer updates its in-memory store, briefly granting the attacker the injected RBAC rules.</li>
<li>The replication controller eventually reconciles and deletes the injected object, but a small window of opportunity exists for privilege escalation.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows unauthorized access to critical cluster information, potentially exposing RBAC configurations, API endpoints, and internal infrastructure details. An attacker can read replicated resources, including cluster roles, cluster role bindings, logical clusters, shards, API exports, API resource schemas, mutating webhook configurations, validating webhook configurations, validating admission policies, and workspace types. While injected objects are quickly cleaned up, a brief race condition allows for temporary privilege escalation. This affects kcp deployments where the root shard is network-reachable by untrusted clients, including Helm chart deployments, Operator deployments with external URLs set, and deployments with a reachable &ndash;shard-external-url.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Implement network-level access control to restrict access to the <code>/services/cache/*</code> paths at the load balancer, reverse proxy, or firewall level as described in the <strong>Workarounds</strong> section of the advisory.</li>
<li>Deploy the cache server separately with its own kubeconfig (<code>--cache-server-kubeconfig</code>) and restrict network access to it, mitigating direct exposure to the root shard as per the <strong>Workarounds</strong> section.</li>
<li>Upgrade to kcp version v0.29.3 or v0.30.3 or later to patch the vulnerability as per <strong>CVE-2026-39429</strong>.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>kcp</category><category>kubernetes</category><category>cache</category><category>authentication</category><category>authorization</category><category>privilege-escalation</category></item><item><title>fast-jwt Library Vulnerability Allows crit Header Validation Bypass</title><link>https://feed.craftedsignal.io/briefs/2026-04-fast-jwt-crit-validation-bypass/</link><pubDate>Fri, 03 Apr 2026 22:01:25 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-fast-jwt-crit-validation-bypass/</guid><description>The fast-jwt library fails to validate the 'crit' header, allowing attackers to bypass security policies and potentially achieve split-brain verification in mixed-library environments.</description><content:encoded><![CDATA[<p>The <code>fast-jwt</code> library, versions 6.1.0 and below, exhibits a critical vulnerability where it does not properly validate the <code>crit</code> (Critical) Header Parameter as defined in RFC 7515. This oversight allows JWS tokens containing unrecognized extensions within the <code>crit</code> array to be accepted instead of being rejected as mandated by the RFC. The vulnerability, identified as CVE-2026-35042, can lead to significant security implications, especially in environments utilizing a mix of JWT verification libraries. This flaw enables attackers to potentially bypass security policies and token binding protections, creating a window for unauthorized access or actions.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker crafts a JWT with a <code>crit</code> header containing an extension (e.g., &ldquo;x-custom-policy&rdquo;) that <code>fast-jwt</code> does not support.</li>
<li>The attacker includes this unsupported extension header (e.g., <code>&quot;x-custom-policy&quot;: &quot;require-mfa&quot;</code>) in the JWT header.</li>
<li>The attacker signs the JWT using a valid signing key and algorithm (e.g., HS256).</li>
<li>The attacker presents the crafted JWT to a system or application using the vulnerable <code>fast-jwt</code> library for verification.</li>
<li>The <code>fast-jwt</code> library incorrectly accepts the token without validating the <code>crit</code> header extensions.</li>
<li>The application logic proceeds based on the accepted (but invalid) JWT, potentially granting unauthorized access or privileges.</li>
<li>If other JWT libraries are used in the same environment that <em>do</em> properly validate the <code>crit</code> header, a &ldquo;split-brain&rdquo; verification scenario can occur, with some systems rejecting the token while others accept it.</li>
<li>The ultimate objective is to bypass intended security policies, such as multi-factor authentication or token binding requirements, gaining unauthorized access or control.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability (CVE-2026-35042) can lead to several critical consequences. First, in mixed-library environments, it creates a split-brain verification scenario where different systems interpret the same token differently. Second, it allows attackers to bypass security policies enforced through the <code>crit</code> header, such as mandatory multi-factor authentication. Finally, it can circumvent token binding mechanisms (RFC 7800 <code>cnf</code> confirmation), weakening overall authentication security. The full impact analysis is described in CVE-2025-59420. This vulnerability affects applications using <code>fast-jwt</code> version 6.1.0 and earlier.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the <code>fast-jwt</code> library to a version greater than 6.1.0 to remediate CVE-2026-35042.</li>
<li>Deploy the Sigma rule &ldquo;Detect fast-jwt crit Header Bypass Attempt&rdquo; to identify attempts to exploit this vulnerability in your environment.</li>
<li>If a mixed-library JWT verification environment exists, evaluate and standardize on a single JWT library that correctly handles the <code>crit</code> header parameter.</li>
<li>Review existing JWT usage to identify instances where the <code>crit</code> header is used for security policy enforcement and ensure that appropriate validation is in place.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>jwt</category><category>vulnerability</category><category>authentication</category><category>authorization</category></item><item><title>Keycloak Redirect URI Bypass Vulnerability (CVE-2026-3872)</title><link>https://feed.craftedsignal.io/briefs/2026-04-keycloak-redirect-bypass/</link><pubDate>Thu, 02 Apr 2026 13:16:26 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-keycloak-redirect-bypass/</guid><description>CVE-2026-3872 is a vulnerability in Keycloak that allows an attacker controlling a path on the same web server to bypass URI redirect validation using a wildcard, potentially leading to access token theft and information disclosure.</description><content:encoded><![CDATA[<p>CVE-2026-3872 is a security flaw found in Keycloak, a popular open-source identity and access management solution. This vulnerability allows a malicious actor who has control over another path on the same web server hosting Keycloak to circumvent the allowed path restrictions in redirect URIs that use a wildcard. By exploiting this weakness, an attacker can potentially redirect a user to a malicious site after authentication, intercept the access token, and gain unauthorized access to the user&rsquo;s resources. The vulnerability could lead to the disclosure of sensitive information and potentially compromise user accounts. This was published on April 2, 2026, and has a CVSS v3.1 score of 7.3.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains control of a path on the same web server hosting the Keycloak instance. This could be achieved through various means, such as exploiting a separate vulnerability in another application hosted on the server.</li>
<li>The attacker crafts a malicious URL that exploits the wildcard redirect URI validation flaw in Keycloak. The crafted URL includes a redirect URI that bypasses the intended restrictions.</li>
<li>A legitimate user initiates an authentication request to Keycloak, potentially through a vulnerable application relying on Keycloak for authentication.</li>
<li>Keycloak processes the authentication request and, due to the vulnerability, accepts the attacker&rsquo;s crafted redirect URI as valid.</li>
<li>Keycloak redirects the user to the attacker-controlled URL after successful authentication.</li>
<li>The attacker&rsquo;s server captures the access token from the redirect URI.</li>
<li>The attacker uses the stolen access token to impersonate the user and access protected resources.</li>
<li>The attacker gains unauthorized access to sensitive information or performs actions on behalf of the user, leading to information disclosure or other malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-3872 can lead to the theft of access tokens, enabling unauthorized access to user accounts and sensitive data. This could result in the compromise of user privacy, financial loss, or reputational damage for organizations relying on affected Keycloak instances. The impact is significant because Keycloak is used across various sectors to secure web applications and APIs.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the security patches or updates provided by Red Hat for Keycloak to address CVE-2026-3872. Refer to the Red Hat advisory linked in the references for specific instructions.</li>
<li>Deploy the provided Sigma rule to detect exploitation attempts of CVE-2026-3872 based on suspicious redirect URIs in web server logs.</li>
<li>Review and harden the configuration of redirect URIs in Keycloak, avoiding the use of wildcards where possible and implementing stricter validation rules.</li>
<li>Monitor web server logs for suspicious activity related to redirect URIs, looking for unusual patterns or attempts to access unauthorized resources.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>keycloak</category><category>redirect-uri-bypass</category><category>cve-2026-3872</category><category>authentication</category><category>authorization</category></item><item><title>Keycloak Authorization Code Forging Vulnerability (CVE-2026-4282)</title><link>https://feed.craftedsignal.io/briefs/2026-04-keycloak-privesc/</link><pubDate>Thu, 02 Apr 2026 13:16:26 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-keycloak-privesc/</guid><description>An unauthenticated attacker can exploit CVE-2026-4282 in Keycloak's SingleUseObjectProvider to forge authorization codes, leading to privilege escalation and the creation of admin-capable access tokens.</description><content:encoded><![CDATA[<p>CVE-2026-4282 identifies a critical vulnerability within the Keycloak authentication server, specifically affecting the SingleUseObjectProvider. This component, responsible for managing single-use key-value pairs, suffers from a lack of sufficient type and namespace isolation. The absence of proper isolation mechanisms allows a remote, unauthenticated attacker to manipulate the system by forging authorization codes. Successful exploitation allows for the creation of access tokens with administrative privileges. The vulnerability was published on April 2, 2026.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker sends a crafted request to the Keycloak server to initiate the authorization flow.</li>
<li>The attacker leverages the lack of type and namespace isolation in the SingleUseObjectProvider.</li>
<li>The attacker forges a valid authorization code using the vulnerability.</li>
<li>The attacker presents the forged authorization code to the token endpoint.</li>
<li>Keycloak validates the forged code due to the flawed SingleUseObjectProvider logic.</li>
<li>The attacker receives an access token with elevated (admin) privileges.</li>
<li>The attacker uses the admin-capable access token to perform administrative actions.</li>
<li>The attacker gains full control over Keycloak resources and user data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-4282 allows a remote attacker to gain full administrative control over a Keycloak instance. This can lead to the compromise of all applications and services relying on Keycloak for authentication and authorization. The impact includes data breaches, account takeovers, and the potential for widespread service disruption. Given Keycloak&rsquo;s prevalence in securing web applications and APIs, the vulnerability poses a significant risk to organizations using affected versions.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the patch or upgrade to a version of Keycloak that resolves CVE-2026-4282 as soon as it becomes available from Red Hat.</li>
<li>Monitor Keycloak logs (webserver category, linux product) for suspicious requests to the authorization and token endpoints indicative of authorization code forging attempts.</li>
<li>Implement stricter input validation and sanitization on the authorization code parameter to mitigate the vulnerability.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>keycloak</category><category>privilege-escalation</category><category>authorization</category></item><item><title>GitLab Jira Connect Authentication Bypass Vulnerability (CVE-2026-2370)</title><link>https://feed.craftedsignal.io/briefs/2026-03-gitlab-jira-connect-auth-bypass/</link><pubDate>Mon, 30 Mar 2026 00:16:01 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-gitlab-jira-connect-auth-bypass/</guid><description>GitLab CE/EE versions 14.3 before 18.8.7, 18.9 before 18.9.3, and 18.10 before 18.10.1 are vulnerable to improper authorization checks in Jira Connect installations, allowing an authenticated user with minimal workspace permissions to obtain installation credentials and impersonate the GitLab application.</description><content:encoded>&lt;p>GitLab has addressed a critical vulnerability, CVE-2026-2370, affecting GitLab CE/EE installations with Jira Connect enabled.  This vulnerability impacts versions 14.3 up to 18.8.7, 18.9 before 18.9.3, and 18.10 before 18.10.1. The vulnerability stems from improper authorization checks, which enable an authenticated user with minimal workspace permissions within Jira to potentially obtain GitLab installation credentials. This, in turn, allows the attacker to impersonate the GitLab application…&lt;/p>
</content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>gitlab</category><category>jira</category><category>authentication</category><category>authorization</category><category>cve-2026-2370</category></item><item><title>OpenClaw Gateway Plugin Subagent Admin Scope Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-openclaw-admin-scope/</link><pubDate>Sun, 29 Mar 2026 15:50:41 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-openclaw-admin-scope/</guid><description>The openclaw package versions 2026.3.24 and earlier are vulnerable due to the gateway plugin subagent fallback `deleteSession` function dispatching `sessions.delete` with a synthetic `operator.admin` runtime scope, potentially leading to unauthorized session deletion.</description><content:encoded><![CDATA[<p>The <code>openclaw</code> package, specifically versions up to and including 2026.3.24, contains a vulnerability within the gateway plugin subagent fallback mechanism. The <code>deleteSession</code> function, when invoked without a request-scoped client, incorrectly dispatched <code>sessions.delete</code> utilizing a synthetic <code>operator.admin</code> runtime scope. This means that under certain conditions, session deletion operations were being performed with elevated privileges, potentially leading to unauthorized session management. This vulnerability was present in the code up to version 2026.3.24 and has been patched in version 2026.3.25. Defenders should ensure they are running version 2026.3.25 or later to mitigate this risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A request is made to the gateway plugin that triggers the <code>deleteSession</code> function.</li>
<li>The <code>deleteSession</code> function checks for a request-scoped client.</li>
<li>If no request-scoped client exists, the code falls back to a default mechanism.</li>
<li>The vulnerable code path then incorrectly creates a synthetic <code>operator.admin</code> runtime scope.</li>
<li>The <code>sessions.delete</code> function is dispatched with the elevated <code>operator.admin</code> scope.</li>
<li>Session deletion occurs with the privileges of the synthetic admin operator.</li>
<li>An attacker could potentially trigger this code path to delete sessions they should not have access to.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability could lead to unauthorized session deletion within the <code>openclaw</code> application. While the exact impact depends on the specific deployment and usage of <code>openclaw</code>, the ability to delete arbitrary sessions could disrupt service availability or allow an attacker to invalidate legitimate user sessions. If an attacker can reliably trigger this vulnerability, it could lead to denial-of-service or other forms of service disruption.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the <code>openclaw</code> package to version 2026.3.25 or later to remediate the vulnerability described in the overview.</li>
<li>Review the <code>openclaw</code> codebase and audit the usage of <code>deleteSession</code> to identify any potential misuse or unexpected invocations.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>openclaw</category><category>vulnerability</category><category>authorization</category></item><item><title>OpenClaw Session Sandbox Escape Vulnerability (CVE-2026-32918)</title><link>https://feed.craftedsignal.io/briefs/2026-03-openclaw-sandbox-escape/</link><pubDate>Sun, 29 Mar 2026 13:17:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-openclaw-sandbox-escape/</guid><description>OpenClaw before 2026.3.11 contains a session sandbox escape vulnerability in the session_status tool, allowing sandboxed subagents to access and modify session data outside their intended scope.</description><content:encoded><![CDATA[<p>CVE-2026-32918 affects OpenClaw versions prior to 2026.3.11. The vulnerability resides in the <code>session_status</code> tool, which is intended to manage sandboxed subagents. However, a flaw allows these sandboxed agents to bypass their intended restrictions and access session data belonging to parent or sibling sessions. An attacker can exploit this by supplying arbitrary <code>sessionKey</code> values, enabling them to read and modify sensitive session data, including persisted model overrides, far beyond the…</p>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>openclaw</category><category>sandbox-escape</category><category>authorization</category></item><item><title>Moby Authorization Plugin Bypass via Oversized Request Bodies</title><link>https://feed.craftedsignal.io/briefs/2026-04-moby-authz-bypass/</link><pubDate>Fri, 27 Mar 2026 17:44:58 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-moby-authz-bypass/</guid><description>A vulnerability in Moby allows attackers to bypass authorization plugins by crafting API requests with oversized bodies, causing the Docker daemon to forward the request without the body to the plugin, potentially leading to unauthorized actions.</description><content:encoded><![CDATA[<p>A vulnerability exists in Moby (Docker) that can be exploited to bypass authorization plugins (AuthZ) when processing API requests. This vulnerability occurs because the Docker daemon may forward a request to an authorization plugin without the request body if the body is oversized. This incomplete fix for CVE-2024-41110 allows an attacker to craft a specific API request that triggers this behavior. This could lead to an AuthZ plugin making incorrect authorization decisions, potentially allowing unauthorized actions to be performed. This affects deployments that rely on AuthZ plugins that inspect the request body for access control. The vulnerable packages include <code>go/github.com/moby/moby</code> (versions prior to 29.3.1), <code>go/github.com/docker/docker</code> (versions prior to 29.3.1), and <code>go/github.com/moby/moby/v2</code> (versions prior to 2.0.0-beta.8).</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a Docker environment utilizing an AuthZ plugin that relies on request body inspection for authorization.</li>
<li>Attacker crafts a malicious Docker API request targeting a sensitive resource or action.</li>
<li>The attacker inflates the request body to exceed a size threshold that triggers the bypass behavior.</li>
<li>The Docker daemon receives the oversized API request.</li>
<li>Due to the vulnerability, the Docker daemon forwards the request to the AuthZ plugin without the request body.</li>
<li>The AuthZ plugin, lacking the request body, makes an authorization decision based on incomplete information.</li>
<li>The AuthZ plugin, unable to properly validate the request, grants access to the sensitive resource or action.</li>
<li>The attacker successfully executes the unauthorized action, bypassing the intended security controls.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>This vulnerability primarily impacts Docker environments that utilize authorization plugins and rely on request body inspection for access control decisions. If exploited successfully, an attacker can bypass the intended authorization mechanisms, potentially leading to unauthorized access to sensitive resources, data breaches, or other malicious activities within the containerized environment. The severity is high for affected installations, however, the base likelihood of exploitation is low, and only impacts those using AuthZ plugins.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to Moby version 29.3.1 or later to address the vulnerability. This resolves the incomplete fix for CVE-2024-41110 and prevents the AuthZ bypass.</li>
<li>For environments where immediate upgrades are not possible, avoid using AuthZ plugins that rely on request body inspection for security decisions as described in the overview.</li>
<li>Restrict access to the Docker API to trusted parties following the principle of least privilege to reduce the attack surface.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>docker</category><category>authz</category><category>authorization</category><category>bypass</category><category>cve-2026-34040</category></item><item><title>Unscoped API Keys in AI Agent Frameworks</title><link>https://feed.craftedsignal.io/briefs/2026-03-ai-agent-auth/</link><pubDate>Mon, 16 Mar 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-ai-agent-auth/</guid><description>A research report auditing popular AI agent projects found that 93% rely on unscoped API keys as the only authentication mechanism, leading to potential credential exposure, privilege escalation, and lateral movement within multi-agent systems.</description><content:encoded><![CDATA[<p>A recent audit of 30 popular AI agent frameworks, including OpenClaw, AutoGen, CrewAI, LangGraph, MetaGPT, and AutoGPT, reveals a widespread lack of robust authorization mechanisms. The report, published in March 2026, highlights that 93% of these frameworks rely solely on unscoped API keys for authentication. This means that any agent with access to the API key has full privileges, creating significant security risks. Furthermore, none of the frameworks provide per-agent cryptographic identity or revocation capabilities. In multi-agent systems, child agents inherit the full credentials of their parent agents, with no option for scope narrowing. This lack of granular control and isolation can lead to significant security breaches, including credential exposure and privilege escalation, as demonstrated by the 21,000 exposed OpenClaw instances leaking credentials and the 1.5 million API tokens exposed in the Moltbook breach.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains access to an unscoped API key, either through exposed instances like the 21,000 OpenClaw instances or breaches like the Moltbook incident affecting 1.5 million tokens.</li>
<li>The attacker leverages the unscoped API key to authenticate to the AI agent framework.</li>
<li>The attacker uses the API key to control an AI agent, potentially injecting malicious goals or code.</li>
<li>In multi-agent systems, the attacker exploits the inherited privileges of child agents to gain broader access.</li>
<li>The attacker leverages the agent&rsquo;s capabilities to access sensitive data or perform unauthorized actions.</li>
<li>The attacker escalates privileges by exploiting vulnerabilities within the agent framework or underlying system.</li>
<li>The attacker uses the compromised agent to move laterally within the system or network.</li>
<li>The attacker achieves their objective, which could include data theft, system disruption, or further compromise of the environment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The widespread use of unscoped API keys and lack of proper authorization in AI agent frameworks creates a significant security risk. Successful exploitation can lead to data breaches, system compromise, and reputational damage. The report cites real-world incidents, including 21,000 exposed OpenClaw instances leaking credentials and 1.5 million API tokens exposed in the Moltbook breach, demonstrating the potential for widespread impact. The lack of per-agent revocation means that if one agent is compromised, the API key for all agents must be rotated, causing significant disruption.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Implement network monitoring to detect unusual traffic patterns originating from AI agent servers. Analyze outbound connections for connections to unusual or malicious domains (grantex.dev).</li>
<li>Audit the configuration of AI agent frameworks to identify instances using unscoped API keys. Prioritize upgrading or replacing frameworks that lack proper authorization controls.</li>
<li>Deploy the Sigma rule for detecting API key usage in command-line arguments or environment variables to identify potential credential exposure.</li>
<li>Monitor for access to sensitive data or resources by AI agents and implement least-privilege access controls.</li>
<li>Implement regular security audits and penetration testing of AI agent frameworks to identify and address vulnerabilities.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>ai-agent</category><category>api-key</category><category>authorization</category><category>credential-theft</category></item><item><title>Argo Workflows ConfigMap Sync Service Missing Authorization Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-05-argo-configmap-auth-bypass/</link><pubDate>Fri, 03 May 2024 16:23:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-05-argo-configmap-auth-bypass/</guid><description>The Sync Service's ConfigMap-backed provider in Argo Workflows performs zero authorization checks on all CRUD operations, allowing any authenticated user to create, read, update, and delete Kubernetes ConfigMaps containing synchronization limits, potentially leading to denial of service, workflow disruption, information disclosure, or arbitrary ConfigMap manipulation in Argo Workflows versions v4.0.0 to v4.0.4.</description><content:encoded><![CDATA[<p>Argo Workflows, a Kubernetes-native workflow engine, is vulnerable to an authorization bypass in its Sync Service&rsquo;s ConfigMap-backed provider. This vulnerability, present in versions 4.0.0 through 4.0.4, stems from a lack of authorization checks on CRUD operations performed on ConfigMaps. This means that any authenticated user, even with a fake Bearer token, can create, read, update, and delete Kubernetes ConfigMaps used for synchronization limits. This flaw allows attackers to potentially disrupt workflow execution, access sensitive configuration data, or even manipulate ConfigMaps in namespaces accessible to the server&rsquo;s service account. The vulnerability was reported on May 4, 2026, and poses a significant risk to Argo Workflows deployments.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains network access to the Argo Server.</li>
<li>Attacker authenticates to the Argo Server using any valid or even a &ldquo;fake&rdquo; Bearer token (e.g., <code>fake-token</code>).</li>
<li>Attacker crafts a POST request to the <code>/api/v1/sync/default</code> endpoint to create a new Sync Limit ConfigMap with specified parameters like namespace, ConfigMap name, key, and limit.</li>
<li>The Argo Server&rsquo;s <code>configMapSyncProvider.createSyncLimit</code> function executes without performing any authorization checks.</li>
<li>The function uses the Kubernetes client to create a ConfigMap in the specified namespace based on the attacker&rsquo;s input.</li>
<li>Attacker can subsequently send GET, PUT, or DELETE requests to <code>/api/v1/sync/default/{key}</code> to read, update, or delete existing Sync Limit ConfigMaps without authorization.</li>
<li>The Argo Server processes these requests, modifying the ConfigMaps accordingly, due to the missing <code>auth.CanI</code> checks.</li>
<li>The attacker disrupts workflow execution, gains access to sensitive configuration data, or manipulates ConfigMaps, leading to denial of service or other malicious outcomes.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker with network access to the Argo Server and valid or fake authentication credentials to perform several malicious actions. They can cause a denial of service by setting sync limits to zero or a very low number, effectively blocking parallel workflow execution. Attackers can also disrupt running workflows by modifying existing sync limits. Furthermore, they can gain access to sensitive information by reading ConfigMap data or manipulate ConfigMaps in any namespace accessible to the server&rsquo;s service account. This could lead to complete compromise of the Argo Workflows environment.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to Argo Workflows version 4.0.5 or later to patch CVE-2026-42297 and mitigate the missing authorization checks.</li>
<li>Monitor access logs on the Argo Server for unexpected API calls to the <code>/api/v1/sync</code> endpoints, especially POST, PUT, and DELETE requests, which could indicate unauthorized ConfigMap manipulation. Use the rule <code>Argo Workflows ConfigMap Sync Service Modification</code> to detect unauthorized modifications.</li>
<li>Implement network segmentation and access controls to limit network access to the Argo Server, reducing the attack surface.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>argo-workflows</category><category>kubernetes</category><category>configmap</category><category>authorization</category><category>vulnerability</category></item><item><title>Kirby CMS Missing Authorization Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-kirby-auth-bypass/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-kirby-auth-bypass/</guid><description>Kirby CMS versions before 4.9.0 and between 5.0.0 and 5.3.3 contain a missing authorization vulnerability, allowing authenticated Panel users to access site model, user, and role information without proper permission checks, potentially leading to unauthorized information disclosure.</description><content:encoded><![CDATA[<p>Kirby CMS, a file-based content management system, has a missing authorization flaw that allows authenticated users to access sensitive site, user, and role information without the necessary permissions. This vulnerability affects installations where there are potentially untrusted authenticated users. The issue stems from the lack of permission settings controlling access to the site model, users, and user roles. Specifically, the permissions <code>site.access</code>, <code>user.access</code>, <code>users.access</code>, <code>user.list</code>, and <code>users.list</code> were missing. This vulnerability was reported by @HuajiHD and patched in Kirby versions 4.9.0 and 5.4.0. Sites that explicitly intend all authenticated users to have read access to all site, user, and role information are not affected.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker obtains valid credentials for a user account with access to the Kirby Panel.</li>
<li>The attacker authenticates to the Kirby Panel using their credentials.</li>
<li>The attacker crafts a request to access the site model data. This could involve accessing specific API endpoints related to site configuration.</li>
<li>The attacker sends a request to list all users within the Kirby CMS.</li>
<li>The system, lacking proper authorization checks, returns the requested site model and user list data to the attacker.</li>
<li>The attacker sends a request to list existing roles, their names, descriptions, and configured permissions.</li>
<li>The system returns the requested role information, again bypassing intended permission restrictions.</li>
<li>The attacker gains unauthorized knowledge of the site structure, user accounts, and role permissions, which can be used to escalate privileges or further compromise the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker with low-privilege Panel access to enumerate users, roles, and site configurations. This information can be used to identify privileged accounts, understand the site&rsquo;s structure, and potentially escalate privileges by exploiting other vulnerabilities or misconfigurations. This impacts all Kirby sites using versions &lt;= 4.8.0 and versions &gt;= 5.0.0 and &lt;= 5.3.3 where authenticated users are not fully trusted.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to Kirby version 4.9.0 or 5.4.0 or later to patch the vulnerability as described in the advisory.</li>
<li>Review user roles and permissions after upgrading to ensure appropriate access controls are in place.</li>
<li>Monitor web server logs for suspicious requests targeting user and role enumeration endpoints after deploying the below rules.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>authorization</category><category>privilege-escalation</category><category>web-application</category></item><item><title>ChatGPTNextWeb NextChat Improper Authorization Vulnerability (CVE-2026-7644)</title><link>https://feed.craftedsignal.io/briefs/2024-01-nextchat-auth-bypass/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-nextchat-auth-bypass/</guid><description>CVE-2026-7644 is an improper authorization vulnerability in the addMcpServer function of ChatGPTNextWeb NextChat version 2.16.1 and earlier, allowing for potential remote exploitation following public disclosure of the exploit.</description><content:encoded><![CDATA[<p>A vulnerability, CVE-2026-7644, affects ChatGPTNextWeb NextChat up to version 2.16.1. The flaw exists within the <code>addMcpServer</code> function located in the <code>app/mcp/actions.ts</code> file. This vulnerability allows for improper authorization, potentially enabling unauthorized actions. The exploit has been publicly disclosed, increasing the risk of exploitation. The vendor was notified, but there has been no response as of the time of this writing. This vulnerability allows for remote exploitation, meaning an attacker does not need local access to the system to exploit it. Defenders should prioritize patching or mitigating this vulnerability to prevent unauthorized access and potential data breaches.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a ChatGPTNextWeb NextChat instance running version 2.16.1 or earlier.</li>
<li>Attacker sends a crafted request to the <code>addMcpServer</code> function in <code>app/mcp/actions.ts</code>.</li>
<li>The application fails to properly authorize the request due to the vulnerability in <code>addMcpServer</code>.</li>
<li>The attacker bypasses authorization checks.</li>
<li>The attacker successfully adds a malicious MCP server configuration.</li>
<li>The application uses the malicious MCP server configuration, potentially leading to further unauthorized actions.</li>
<li>Attacker gains unauthorized access to sensitive data or functionality.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7644 could lead to unauthorized access to a NextChat instance. An attacker could potentially manipulate MCP server configurations, leading to further compromise of the application and associated data. Since the exploit is publicly available, the risk of exploitation is significantly elevated, potentially affecting all unpatched instances of NextChat version 2.16.1 or earlier.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade ChatGPTNextWeb NextChat to a version higher than 2.16.1 to patch CVE-2026-7644.</li>
<li>Monitor web server logs for suspicious requests targeting the <code>addMcpServer</code> function in <code>app/mcp/actions.ts</code>.</li>
<li>Deploy the Sigma rule to detect unauthorized calls to the <code>addMcpServer</code> function.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>authorization</category><category>cve-2026-7644</category><category>web-application</category></item></channel></rss>