<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-35182 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-35182/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 06 Apr 2026 20:16:26 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-35182/feed.xml" rel="self" type="application/rss+xml"/><item><title>Brave CMS Missing Authorization Leads to Privilege Escalation</title><link>https://feed.craftedsignal.io/briefs/2026-04-brave-cms-privesc/</link><pubDate>Mon, 06 Apr 2026 20:16:26 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-brave-cms-privesc/</guid><description>Brave CMS versions prior to 2.0.6 are vulnerable to privilege escalation due to a missing authorization check in the update role endpoint, allowing any authenticated user to gain Super Admin privileges.</description><content:encoded><![CDATA[<p>Brave CMS, an open-source content management system, is susceptible to a critical vulnerability (CVE-2026-35182) affecting versions prior to 2.0.6. The vulnerability stems from a missing authorization check in the <code>/rights/update-role/{id}</code> endpoint, specifically within the <code>routes/web.php</code> file. The absence of the <code>checkUserPermissions:assign-user-roles</code> middleware on the POST route allows any authenticated user, regardless of their current role, to modify account roles. This enables malicious actors or internal users to elevate their privileges to Super Admin, granting them complete control over the CMS. This vulnerability poses a significant risk to organizations utilizing affected versions of Brave CMS, potentially leading to data breaches, system compromise, and unauthorized modifications.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Brave CMS instance with a valid, low-privilege user account (e.g., via compromised credentials or legitimate registration).</li>
<li>The attacker identifies the vulnerable endpoint <code>/rights/update-role/{id}</code> within the <code>routes/web.php</code> file.</li>
<li>The attacker crafts a POST request to <code>/rights/update-role/{id}</code>, where <code>{id}</code> is the user ID of the target account (e.g., their own or another user). The request body includes data to modify the target user&rsquo;s role to &lsquo;Super Admin&rsquo;.</li>
<li>The Brave CMS application, lacking the <code>checkUserPermissions:assign-user-roles</code> middleware, processes the request without properly validating the attacker&rsquo;s authorization to modify user roles.</li>
<li>The target user&rsquo;s role is updated to &lsquo;Super Admin&rsquo; in the CMS database.</li>
<li>The attacker, now possessing Super Admin privileges, can access all administrative functions within the Brave CMS.</li>
<li>The attacker can modify website content, install malicious plugins, create new admin accounts, and potentially gain access to the underlying server.</li>
<li>The attacker achieves full control of the Brave CMS instance, leading to potential data exfiltration, defacement, or denial-of-service.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-35182 can lead to complete compromise of the Brave CMS instance. An attacker gaining Super Admin privileges can modify or delete website content, inject malicious code, access sensitive data, and potentially pivot to other systems on the network. The impact can range from website defacement and data breaches to complete loss of control over the CMS and associated infrastructure. There is no information regarding how many victims are affected.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Brave CMS to version 2.0.6 or later to patch CVE-2026-35182.</li>
<li>Deploy the Sigma rule &ldquo;Detect Brave CMS Unauthorized Role Update&rdquo; to detect exploitation attempts in web server logs.</li>
<li>Monitor web server logs for POST requests to the <code>/rights/update-role/</code> endpoint lacking proper authorization headers or originating from unusual IP addresses.</li>
<li>Review user roles and permissions within Brave CMS to identify and remediate any unauthorized privilege escalations.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-35182</category><category>privilege-escalation</category><category>web-application</category><category>brave-cms</category></item></channel></rss>