<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-40185 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-40185/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sat, 11 Apr 2026 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-40185/feed.xml" rel="self" type="application/rss+xml"/><item><title>TREK Travel Planner Missing Authorization Vulnerability (CVE-2026-40185)</title><link>https://feed.craftedsignal.io/briefs/2026-04-trek-auth-bypass/</link><pubDate>Sat, 11 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-trek-auth-bypass/</guid><description>TREK collaborative travel planner before version 2.7.2 is vulnerable to missing authorization checks on the Immich trip photo management routes, potentially allowing unauthorized access to trip photos.</description><content:encoded><![CDATA[<p>TREK is a collaborative travel planning application. Prior to version 2.7.2, a critical vulnerability existed within the application related to authorization checks. Specifically, the Immich trip photo management routes lacked proper authorization checks. This flaw, identified as CVE-2026-40185, could potentially allow unauthorized users to access and manipulate trip photos if exploited. The vulnerability was reported by GitHub, Inc. and patched in version 2.7.2 of TREK. Defenders should ensure they are running version 2.7.2 or later of the TREK application to mitigate this risk. This vulnerability affects systems running the vulnerable versions of the TREK application and could impact the confidentiality and integrity of user data.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a vulnerable TREK instance running a version prior to 2.7.2.</li>
<li>The attacker crafts a malicious HTTP request targeting the Immich trip photo management routes.</li>
<li>Due to the missing authorization checks, the attacker bypasses authentication requirements.</li>
<li>The attacker gains unauthorized access to trip photos.</li>
<li>The attacker may modify or delete trip photos, impacting data integrity.</li>
<li>The attacker could potentially use the exposed data to gather sensitive information about the trip and its participants.</li>
<li>The attacker could potentially upload malicious images to the photo storage.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-40185 can lead to unauthorized access and modification of trip photos within the TREK travel planner application. While the exact number of affected users is unknown, any TREK instance running a version prior to 2.7.2 is susceptible. This could result in a breach of confidentiality, potential data manipulation, and reputational damage for the application. Sectors that rely on collaborative travel planning may be particularly affected.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade all TREK instances to version 2.7.2 or later to remediate CVE-2026-40185.</li>
<li>Deploy the Sigma rule <code>Detect Suspicious TREK Photo Route Access</code> to detect potential exploitation attempts targeting the vulnerable photo management routes.</li>
<li>Monitor web server logs for unusual activity related to the Immich trip photo management routes.</li>
<li>Monitor network traffic for unusual patterns or connections to the TREK server that might indicate exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>cve-2026-40185</category><category>authorization-bypass</category><category>web-application</category></item></channel></rss>