<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-33503 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-33503/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 26 Mar 2026 18:16:30 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-33503/feed.xml" rel="self" type="application/rss+xml"/><item><title>Ory Kratos SQL Injection Vulnerability in ListCourierMessages API</title><link>https://feed.craftedsignal.io/briefs/2024-01-ory-kratos-sqli/</link><pubDate>Thu, 26 Mar 2026 18:16:30 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-ory-kratos-sqli/</guid><description>A SQL injection vulnerability exists in the ListCourierMessages Admin API of Ory Kratos versions prior to 26.2.0 due to flaws in its pagination implementation, allowing attackers to craft malicious tokens if the pagination secret is known or the default secret is used.</description><content:encoded><![CDATA[<p>Ory Kratos, an identity, user management, and authentication system for cloud services, is vulnerable to SQL injection in versions prior to 26.2.0. The vulnerability resides within the ListCourierMessages Admin API and stems from flaws in its pagination implementation. The pagination tokens are encrypted using a secret configured in <code>secrets.pagination</code>. Attackers who obtain this secret can forge malicious tokens, leading to SQL injection attacks. Critically, if this configuration value remains unset, Kratos defaults to a publicly known pagination encryption secret. This allows attackers to manually generate valid malicious pagination tokens for vulnerable installations. Defenders should immediately configure a custom value for <code>secrets.pagination</code> using a cryptographically secure random secret and upgrade Kratos to version 26.2.0 or later.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies an Ory Kratos instance running a version prior to 26.2.0.</li>
<li>Attacker checks the Kratos configuration to determine if <code>secrets.pagination</code> is set.</li>
<li>If <code>secrets.pagination</code> is not set, the attacker leverages the publicly known default pagination encryption secret.</li>
<li>The attacker crafts a malicious pagination token containing SQL injection payloads. This token exploits the vulnerable pagination logic in the <code>ListCourierMessages</code> API.</li>
<li>Attacker sends a request to the <code>/admin/courier/messages</code> endpoint with the crafted pagination token in the <code>page_token</code> parameter.</li>
<li>The Kratos application processes the malicious token, leading to the execution of arbitrary SQL queries against the underlying database.</li>
<li>The SQL injection allows the attacker to potentially read, modify, or delete sensitive data within the Kratos database, including user credentials, configuration settings, or other confidential information.</li>
<li>The attacker may use the compromised data for further attacks, such as account takeover or privilege escalation.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability can lead to complete compromise of the Ory Kratos instance. This can result in unauthorized access to user accounts, disclosure of sensitive information, and potential data manipulation or deletion. The severity is high due to the potential for significant data breach and service disruption impacting all users managed by the compromised Kratos instance. The number of victims depends on the size and user base of the affected Ory Kratos deployment.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately configure a custom value for <code>secrets.pagination</code> by generating a cryptographically secure random secret within your Ory Kratos configuration (reference: Overview section).</li>
<li>Upgrade Ory Kratos to version 26.2.0 or later to patch the SQL injection vulnerability (reference: Overview section).</li>
<li>Monitor web server logs for suspicious requests to the <code>/admin/courier/messages</code> endpoint containing unusually long or malformed <code>page_token</code> parameters (create a custom rule based on this behavior).</li>
<li>Implement a Web Application Firewall (WAF) rule to block requests with suspicious SQL syntax in the <code>page_token</code> parameter targeting the <code>/admin/courier/messages</code> endpoint.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>ory-kratos</category><category>sql-injection</category><category>cve-2026-33503</category><category>cloud</category></item></channel></rss>