<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Coolercontrol — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/coolercontrol/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 08 Apr 2026 12:16:22 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/coolercontrol/feed.xml" rel="self" type="application/rss+xml"/><item><title>CoolerControl Command Injection Vulnerability (CVE-2026-5208)</title><link>https://feed.craftedsignal.io/briefs/2026-04-coolercontrol-cmd-injection/</link><pubDate>Wed, 08 Apr 2026 12:16:22 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-coolercontrol-cmd-injection/</guid><description>CoolerControl/coolercontrold versions before 4.0.0 are vulnerable to command injection, allowing authenticated attackers with high privileges to execute arbitrary code as root by injecting bash commands into alert names.</description><content:encoded><![CDATA[<p>CoolerControl/coolercontrold, a system monitoring and management tool, is susceptible to a command injection vulnerability (CVE-2026-5208) in versions prior to 4.0.0. The vulnerability stems from insufficient sanitization of user-supplied input used to create alert names. An authenticated attacker with high privileges can inject arbitrary bash commands into the alert name field. Due to the application&rsquo;s execution context, these injected commands are executed with root privileges, potentially leading to complete system compromise. The vulnerability was reported and patched in version 4.0.0. This poses a significant risk to organizations using affected versions of CoolerControl/coolercontrold, as it allows for trivial privilege escalation and arbitrary code execution.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker authenticates to the CoolerControl/coolercontrold application with high-privilege credentials.</li>
<li>Attacker navigates to the alert configuration section of the application.</li>
<li>Attacker crafts a malicious alert name containing injected bash commands (e.g., <code>test; rm -rf /;</code>).</li>
<li>Attacker saves the new alert configuration with the injected command in the alert name.</li>
<li>When the alert is triggered or processed by the application, the injected command is executed within the context of the CoolerControl/coolercontrold process.</li>
<li>Due to insufficient input validation, the operating system executes the injected command, in this example <code>rm -rf /</code> which would recursively delete every file on the system.</li>
<li>The injected commands are executed with root privileges, resulting in arbitrary code execution.</li>
<li>The attacker gains complete control of the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-5208 allows an attacker to execute arbitrary code with root privileges on the affected system. This could lead to complete system compromise, including data theft, data destruction, denial of service, and the installation of backdoors or other malicious software. Since this can be exploited via an application setting, a wide range of systems could be impacted.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade CoolerControl/coolercontrold to version 4.0.0 or later to patch CVE-2026-5208, as mentioned in the vulnerability description.</li>
<li>Deploy the Sigma rule <code>Detect Suspicious Alert Creation</code> to identify attempts to inject commands into alert names.</li>
<li>Monitor process creation events for suspicious commands executed by the CoolerControl/coolercontrold process. Enable Sysmon process-creation logging to facilitate this.</li>
<li>Review existing alert configurations for any suspicious or unexpected commands.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>command-injection</category><category>privilege-escalation</category><category>coolercontrol</category></item></channel></rss>