<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-32968 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-32968/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 23 Mar 2026 12:16:08 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-32968/feed.xml" rel="self" type="application/rss+xml"/><item><title>Joomla com_mb24sysapi Module Unauthenticated RCE (CVE-2026-32968)</title><link>https://feed.craftedsignal.io/briefs/2026-03-joomla-rce/</link><pubDate>Mon, 23 Mar 2026 12:16:08 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-joomla-rce/</guid><description>An unauthenticated remote attacker can exploit an OS command injection vulnerability (CVE-2026-32968) in the com_mb24sysapi module of Joomla, leading to remote code execution and full system compromise.</description><content:encoded>&lt;p>CVE-2026-32968 describes a critical remote code execution (RCE) vulnerability affecting the com_mb24sysapi module in Joomla. The vulnerability stems from improper neutralization of special elements within OS commands, allowing an unauthenticated remote attacker to inject arbitrary commands. Successful exploitation of this vulnerability can lead to complete compromise of the affected system. This vulnerability is identified as a variant of CVE-2020-10383, suggesting a similar underlying flaw…&lt;/p>
</content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-32968</category><category>joomla</category><category>rce</category><category>command-injection</category></item></channel></rss>