<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Brave-Cms — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/brave-cms/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 06 Apr 2026 20:16:26 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/brave-cms/feed.xml" rel="self" type="application/rss+xml"/><item><title>Brave CMS Missing Authorization Leads to Privilege Escalation</title><link>https://feed.craftedsignal.io/briefs/2026-04-brave-cms-privesc/</link><pubDate>Mon, 06 Apr 2026 20:16:26 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-brave-cms-privesc/</guid><description>Brave CMS versions prior to 2.0.6 are vulnerable to privilege escalation due to a missing authorization check in the update role endpoint, allowing any authenticated user to gain Super Admin privileges.</description><content:encoded><![CDATA[<p>Brave CMS, an open-source content management system, is susceptible to a critical vulnerability (CVE-2026-35182) affecting versions prior to 2.0.6. The vulnerability stems from a missing authorization check in the <code>/rights/update-role/{id}</code> endpoint, specifically within the <code>routes/web.php</code> file. The absence of the <code>checkUserPermissions:assign-user-roles</code> middleware on the POST route allows any authenticated user, regardless of their current role, to modify account roles. This enables malicious actors or internal users to elevate their privileges to Super Admin, granting them complete control over the CMS. This vulnerability poses a significant risk to organizations utilizing affected versions of Brave CMS, potentially leading to data breaches, system compromise, and unauthorized modifications.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Brave CMS instance with a valid, low-privilege user account (e.g., via compromised credentials or legitimate registration).</li>
<li>The attacker identifies the vulnerable endpoint <code>/rights/update-role/{id}</code> within the <code>routes/web.php</code> file.</li>
<li>The attacker crafts a POST request to <code>/rights/update-role/{id}</code>, where <code>{id}</code> is the user ID of the target account (e.g., their own or another user). The request body includes data to modify the target user&rsquo;s role to &lsquo;Super Admin&rsquo;.</li>
<li>The Brave CMS application, lacking the <code>checkUserPermissions:assign-user-roles</code> middleware, processes the request without properly validating the attacker&rsquo;s authorization to modify user roles.</li>
<li>The target user&rsquo;s role is updated to &lsquo;Super Admin&rsquo; in the CMS database.</li>
<li>The attacker, now possessing Super Admin privileges, can access all administrative functions within the Brave CMS.</li>
<li>The attacker can modify website content, install malicious plugins, create new admin accounts, and potentially gain access to the underlying server.</li>
<li>The attacker achieves full control of the Brave CMS instance, leading to potential data exfiltration, defacement, or denial-of-service.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-35182 can lead to complete compromise of the Brave CMS instance. An attacker gaining Super Admin privileges can modify or delete website content, inject malicious code, access sensitive data, and potentially pivot to other systems on the network. The impact can range from website defacement and data breaches to complete loss of control over the CMS and associated infrastructure. There is no information regarding how many victims are affected.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Brave CMS to version 2.0.6 or later to patch CVE-2026-35182.</li>
<li>Deploy the Sigma rule &ldquo;Detect Brave CMS Unauthorized Role Update&rdquo; to detect exploitation attempts in web server logs.</li>
<li>Monitor web server logs for POST requests to the <code>/rights/update-role/</code> endpoint lacking proper authorization headers or originating from unusual IP addresses.</li>
<li>Review user roles and permissions within Brave CMS to identify and remediate any unauthorized privilege escalations.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-35182</category><category>privilege-escalation</category><category>web-application</category><category>brave-cms</category></item><item><title>Brave CMS Insecure Direct Object Reference Vulnerability (CVE-2026-35183)</title><link>https://feed.craftedsignal.io/briefs/2024-01-26-brave-cms-idor/</link><pubDate>Mon, 06 Apr 2026 20:16:26 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-26-brave-cms-idor/</guid><description>Brave CMS versions prior to 2.0.6 are vulnerable to an Insecure Direct Object Reference (IDOR) vulnerability allowing authenticated users with edit permissions to delete images attached to articles owned by other users due to missing ownership verification in the deleteImage method.</description><content:encoded><![CDATA[<p>Brave CMS, an open-source content management system, is susceptible to an Insecure Direct Object Reference (IDOR) vulnerability in versions prior to 2.0.6. The vulnerability resides within the <code>deleteImage</code> method in <code>app/Http/Controllers/Dashboard/ArticleController.php</code>. This flaw allows an authenticated user with edit permissions, regardless of article ownership, to delete images associated with other users&rsquo; articles. The root cause is the lack of proper ownership validation when processing image deletion requests. An attacker can exploit this vulnerability by crafting requests with the filenames of images belonging to other users&rsquo; articles, leading to unauthorized image deletion and potential data integrity issues. This issue was resolved in version 2.0.6 of Brave CMS.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker authenticates to the Brave CMS application with an account that has edit permissions.</li>
<li>Attacker identifies the filename of an image attached to an article that they do not own. This can be achieved through inspecting the HTML source code of the article page or by querying the database directly (if accessible).</li>
<li>Attacker crafts a malicious HTTP request targeting the <code>deleteImage</code> endpoint (<code>app/Http/Controllers/Dashboard/ArticleController.php</code>).</li>
<li>The malicious request includes the filename of the target image in the URL parameters.</li>
<li>The <code>deleteImage</code> method processes the request without verifying if the authenticated user owns the article to which the image is attached.</li>
<li>The application deletes the specified image file from the server&rsquo;s file system.</li>
<li>The link to the deleted image in the target article is broken.</li>
<li>The victim user, who owns the article, notices the missing image.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this IDOR vulnerability in Brave CMS versions prior to 2.0.6 allows attackers with edit permissions to arbitrarily delete images from articles they do not own. This can lead to data integrity issues, content manipulation, and potential denial of service by removing important visual elements from the website. The impact is limited to users with edit permissions within the CMS, but can affect any article and its associated media. The CVSS v3.1 base score for this vulnerability is 7.1.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Brave CMS to version 2.0.6 or later to patch the CVE-2026-35183 vulnerability.</li>
<li>Implement the Sigma rule <code>Detect Brave CMS Image Deletion Attempt</code> to detect unauthorized image deletion attempts by monitoring HTTP requests to the <code>deleteImage</code> endpoint.</li>
<li>Review and harden access control policies within the Brave CMS application to ensure proper ownership validation for sensitive operations, such as image deletion.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>idor</category><category>brave-cms</category><category>vulnerability</category></item><item><title>Brave CMS Unrestricted File Upload Leads to Remote Code Execution</title><link>https://feed.craftedsignal.io/briefs/2026-04-brave-cms-rce/</link><pubDate>Mon, 06 Apr 2026 18:16:42 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-brave-cms-rce/</guid><description>Brave CMS versions prior to 2.0.6 contain an unrestricted file upload vulnerability within the CKEditor upload functionality in the ckupload method, allowing authenticated users to upload executable PHP scripts and achieve Remote Code Execution.</description><content:encoded><![CDATA[<p>Brave CMS, an open-source content management system, is vulnerable to an unrestricted file upload vulnerability (CVE-2026-35164) in versions prior to 2.0.6. The vulnerability resides within the CKEditor upload functionality, specifically in the <code>ckupload</code> method located in <code>app/Http/Controllers/Dashboard/CkEditorController.php</code>. The application fails to properly validate the types of uploaded files, relying solely on user-provided input. This lack of validation enables an authenticated user to upload malicious PHP scripts, leading to arbitrary code execution on the server. The vulnerability was reported on April 6, 2026, and is fixed in Brave CMS version 2.0.6. Organizations using affected versions of Brave CMS are at risk of complete system compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker authenticates to the Brave CMS application as a user with upload privileges.</li>
<li>The attacker navigates to a page or functionality within the CMS that utilizes the CKEditor for content creation or editing.</li>
<li>The attacker uses the CKEditor&rsquo;s upload functionality to upload a malicious PHP script disguised as a legitimate file type (e.g., image).</li>
<li>The <code>ckupload</code> method in <code>app/Http/Controllers/Dashboard/CkEditorController.php</code> processes the uploaded file without proper validation of the file type or content.</li>
<li>The malicious PHP script is stored on the server in a publicly accessible directory.</li>
<li>The attacker crafts a request to directly access the uploaded PHP script via its URL.</li>
<li>The web server executes the PHP script, granting the attacker the ability to run arbitrary commands on the server.</li>
<li>The attacker establishes persistence, installs a web shell, and performs lateral movement within the network, escalating privileges as needed to achieve their objectives.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to execute arbitrary PHP code on the affected Brave CMS server. This can lead to complete compromise of the CMS instance, including unauthorized access to sensitive data, modification of website content, and potential lateral movement to other systems on the network. The CVSS v3.1 base score for this vulnerability is 8.8, indicating a high severity level. Organizations running vulnerable versions of Brave CMS are at risk of data breaches, website defacement, and further exploitation of their infrastructure.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Brave CMS to version 2.0.6 or later to remediate the unrestricted file upload vulnerability (CVE-2026-35164).</li>
<li>Implement server-side file validation to prevent the upload of malicious files, regardless of file extension.</li>
<li>Monitor web server logs for suspicious activity related to file uploads and execution of PHP scripts.</li>
<li>Deploy the following Sigma rule to detect attempts to access potentially malicious PHP files in the web server&rsquo;s upload directories.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-35164</category><category>rce</category><category>file-upload</category><category>brave-cms</category><category>ckeditor</category><category>php</category><category>webserver</category></item></channel></rss>