<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-30643 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-30643/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 01 Apr 2026 17:28:39 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-30643/feed.xml" rel="self" type="application/rss+xml"/><item><title>DedeCMS 5.7.118 Code Injection Vulnerability via Crafted Module Upload (CVE-2026-30643)</title><link>https://feed.craftedsignal.io/briefs/2026-04-dedecms-code-injection/</link><pubDate>Wed, 01 Apr 2026 17:28:39 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-dedecms-code-injection/</guid><description>DedeCMS 5.7.118 is vulnerable to remote code execution via crafted setup tag values during a module upload, as exploited by an unauthenticated attacker (CVE-2026-30643).</description><content:encoded><![CDATA[<p>DedeCMS version 5.7.118 is susceptible to a critical code injection vulnerability (CVE-2026-30643) that allows unauthenticated attackers to execute arbitrary code on the server. The vulnerability stems from improper handling of setup tag values during module uploads. Successful exploitation of this flaw enables threat actors to compromise the web server, potentially leading to data breaches, system takeover, and further malicious activities. This vulnerability requires immediate attention from organizations using DedeCMS 5.7.118. The vulnerability was reported to MITRE on April 1, 2026.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a DedeCMS 5.7.118 instance accessible over the internet.</li>
<li>The attacker crafts a malicious module package containing a specially crafted setup tag within its configuration files.</li>
<li>The attacker uploads the malicious module package to the DedeCMS instance.</li>
<li>During the module installation process, the DedeCMS application parses the module&rsquo;s configuration files, including the malicious setup tag.</li>
<li>Due to insufficient input validation, the crafted setup tag injects arbitrary code into the application&rsquo;s execution context.</li>
<li>The injected code is executed by the web server, granting the attacker control over the system.</li>
<li>The attacker can then use this initial foothold to execute system commands.</li>
<li>The attacker establishes persistence and moves laterally within the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-30643 allows unauthenticated attackers to execute arbitrary code on the target system. This could lead to complete system compromise, data theft, defacement of the website, or further propagation of malware within the network. Given the severity and ease of exploitation, any DedeCMS 5.7.118 instance exposed to the internet is at high risk. Unpatched systems are vulnerable to complete takeover.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade DedeCMS to a patched version that addresses CVE-2026-30643.</li>
<li>Implement strict input validation on all user-supplied data, especially during module uploads, to prevent code injection.</li>
<li>Deploy the provided Sigma rule <code>Detect DedeCMS Module Upload Code Injection</code> to identify exploitation attempts.</li>
<li>Monitor web server logs (category: webserver) for suspicious activity related to module installation and unusual requests.</li>
<li>Apply the CWE-94 mitigations to prevent code injection at the application level.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>dedecms</category><category>code-injection</category><category>cve-2026-30643</category></item></channel></rss>