<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-41455 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-41455/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 02 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-41455/feed.xml" rel="self" type="application/rss+xml"/><item><title>WeKan SSRF Vulnerability in Webhook Integration</title><link>https://feed.craftedsignal.io/briefs/2024-01-02-wekan-ssrf/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-02-wekan-ssrf/</guid><description>WeKan before 8.35 is vulnerable to server-side request forgery (SSRF), allowing attackers with integration modification privileges to set webhook URLs to internal network addresses, leading to unauthorized HTTP POST requests and potential comment manipulation.</description><content:encoded><![CDATA[<p>WeKan, a popular open-source kanban board application, is susceptible to a server-side request forgery (SSRF) vulnerability in versions prior to 8.35. This flaw resides in the handling of webhook integration URLs, where insufficient validation allows attackers to specify arbitrary internal network addresses as webhook targets. An attacker with the ability to create or modify integrations within WeKan can exploit this vulnerability. By crafting a malicious webhook URL, they can force the WeKan server to issue HTTP POST requests to attacker-controlled internal targets, potentially exposing sensitive internal resources and data. This vulnerability can also be chained with another flaw to overwrite arbitrary comment text without authorization checks, increasing the potential for data manipulation and unauthorized access.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains access to a WeKan account with privileges to create or modify integrations.</li>
<li>The attacker navigates to the webhook integration settings within a WeKan board.</li>
<li>The attacker enters a malicious URL pointing to an internal server (e.g., <code>http://internal.example.com/admin</code>) in the webhook URL field.</li>
<li>The attacker triggers an event on the WeKan board (e.g., creating a new card, moving a card).</li>
<li>The WeKan server, without proper validation, sends an HTTP POST request to the attacker-specified internal URL.</li>
<li>The internal server receives the request, potentially revealing sensitive information about the WeKan board and its contents.</li>
<li>The attacker exploits response handling to overwrite arbitrary comment text without authorization checks.</li>
<li>The attacker gains unauthorized access to internal resources or sensitive data through the SSRF vulnerability.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SSRF vulnerability allows attackers to potentially access internal network resources that are otherwise inaccessible from the outside. This could lead to the disclosure of sensitive information, such as internal application configurations, database credentials, or other confidential data. Furthermore, the ability to overwrite arbitrary comment text can be used to deface WeKan boards, spread misinformation, or disrupt normal operations. The CVSS v3.1 base score for this vulnerability is 8.5, indicating a high severity risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade WeKan to version 8.35 or later to remediate CVE-2026-41455.</li>
<li>Implement network segmentation to limit the impact of potential SSRF attacks.</li>
<li>Deploy the Sigma rule <code>DetectSuspiciousWekanWebhookUrls</code> to identify attempts to exploit this vulnerability by monitoring for requests to internal IP addresses or unusual domains.</li>
<li>Enable web server logging for the WeKan instance to capture details of outgoing HTTP requests.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>ssrf</category><category>wekan</category><category>cve-2026-41455</category></item></channel></rss>