<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-6002 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-6002/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 07 May 2026 13:16:13 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-6002/feed.xml" rel="self" type="application/rss+xml"/><item><title>DivvyDrive Cross-Site Scripting (XSS) Vulnerability (CVE-2026-6002)</title><link>https://feed.craftedsignal.io/briefs/2026-05-divvy-xss/</link><pubDate>Thu, 07 May 2026 13:16:13 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-divvy-xss/</guid><description>DivvyDrive versions 4.8.2.9 before 4.8.3.2 are susceptible to cross-site scripting (XSS) due to improper neutralization of script-related HTML tags, potentially allowing an attacker to inject malicious scripts.</description><content:encoded><![CDATA[<p>DivvyDrive versions 4.8.2.9 before 4.8.3.2 are vulnerable to cross-site scripting (XSS) due to improper neutralization of script-related HTML tags. This vulnerability, identified as CVE-2026-6002, can be exploited by an attacker to inject arbitrary JavaScript code into the context of a user&rsquo;s browser session. Successful exploitation could lead to session hijacking, defacement of the web page, or redirection of the user to malicious websites. The vulnerability was reported by the Computer Emergency Response Team of the Republic of Turkey.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious URL containing a script-related HTML tag (e.g., <code>&lt;script&gt;</code>) within a parameter value.</li>
<li>A victim user clicks the malicious URL or is redirected to a page containing the crafted URL.</li>
<li>The DivvyDrive application fails to properly sanitize the input, embedding the attacker&rsquo;s script into the HTML output.</li>
<li>The victim&rsquo;s browser executes the injected script, as it is rendered as part of the trusted web page.</li>
<li>The malicious script steals the victim&rsquo;s session cookies or other sensitive information.</li>
<li>The attacker uses the stolen cookies to impersonate the victim and gain unauthorized access to their account.</li>
<li>The attacker modifies the victim&rsquo;s data or performs actions on their behalf, potentially causing damage to their data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this XSS vulnerability can lead to account compromise, data theft, and defacement of the DivvyDrive application. An attacker can steal session cookies, allowing them to impersonate legitimate users and perform unauthorized actions. The severity of the impact depends on the privileges of the compromised user and the extent to which the attacker can manipulate the application. The vulnerability affects versions 4.8.2.9 before 4.8.3.2 of DivvyDrive.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade DivvyDrive to version 4.8.3.2 or later to patch CVE-2026-6002.</li>
<li>Implement proper input validation and output encoding to prevent XSS attacks in DivvyDrive.</li>
<li>Deploy the Sigma rule &ldquo;Detect Suspicious URI containing script tag&rdquo; to identify potential XSS attempts in web server logs.</li>
<li>Monitor web server logs for suspicious URI requests containing script tags or other potentially malicious content using the provided IOC (email address).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>xss</category><category>cve-2026-6002</category><category>web-application</category></item></channel></rss>