<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>CVE-2026-4562 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-4562/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 24 Mar 2026 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-4562/feed.xml" rel="self" type="application/rss+xml"/><item><title>MacCMS 2025.1000.4052 Missing Authentication Vulnerability (CVE-2026-4562)</title><link>https://feed.craftedsignal.io/briefs/2026-03-maccms-auth-bypass/</link><pubDate>Tue, 24 Mar 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-maccms-auth-bypass/</guid><description>A missing authentication vulnerability exists in MacCMS 2025.1000.4052, specifically affecting the Timming API Endpoint component in application/api/controller/Timming.php, allowing remote attackers to bypass authentication.</description><content:encoded>&lt;p>CVE-2026-4562 details a missing authentication vulnerability within MacCMS version 2025.1000.4052. The vulnerability is located in the &lt;code>application/api/controller/Timming.php&lt;/code> file, specifically within the Timming API Endpoint component. This flaw allows unauthenticated remote attackers to execute actions that should normally require authentication. The vulnerability has been publicly disclosed, increasing the risk of exploitation. Defenders should prioritize identifying and mitigating…&lt;/p>
</content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>CVE-2026-4562</category><category>authentication-bypass</category><category>web-application</category></item></channel></rss>