<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-6574 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-6574/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sun, 19 Apr 2026 14:16:11 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-6574/feed.xml" rel="self" type="application/rss+xml"/><item><title>osuuu LightPicture Hardcoded Credentials Vulnerability (CVE-2026-6574)</title><link>https://feed.craftedsignal.io/briefs/2026-04-lightpicture-hardcoded-creds/</link><pubDate>Sun, 19 Apr 2026 14:16:11 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-lightpicture-hardcoded-creds/</guid><description>CVE-2026-6574 allows remote attackers to manipulate the 'key' argument in the /public/install/lp.sql file via the API Upload Endpoint in osuuu LightPicture &lt;= 1.2.2, leading to hardcoded credentials exposure.</description><content:encoded><![CDATA[<p>osuuu LightPicture, up to version 1.2.2, is vulnerable to a hardcoded credentials exposure vulnerability (CVE-2026-6574). This flaw resides within the API Upload Endpoint and is triggered when processing the <code>/public/install/lp.sql</code> file. An attacker can manipulate the <code>key</code> argument to exploit this vulnerability. The vendor has been notified about the vulnerability but has not responded. Public exploits are available, increasing the risk of exploitation. This vulnerability allows an attacker to potentially gain unauthorized access and control over the application.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies an instance of osuuu LightPicture running version 1.2.2 or earlier.</li>
<li>The attacker crafts a malicious HTTP request targeting the API Upload Endpoint.</li>
<li>The request includes a modified <code>key</code> argument within the <code>/public/install/lp.sql</code> file path.</li>
<li>The application processes the crafted request without proper sanitization.</li>
<li>Due to the manipulated <code>key</code> argument, the application exposes hardcoded credentials.</li>
<li>The attacker retrieves the exposed hardcoded credentials from the server&rsquo;s response.</li>
<li>The attacker leverages the acquired credentials to authenticate and gain unauthorized access to the application.</li>
<li>With unauthorized access, the attacker can perform malicious activities such as data theft, modification, or deletion.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-6574 can lead to complete compromise of the osuuu LightPicture application and potentially the underlying server. The vulnerability exposes hardcoded credentials, enabling attackers to bypass authentication and gain administrative privileges. The impact includes unauthorized access to sensitive data, modification of application settings, and potential disruption of service. The vulnerability affects all installations of osuuu LightPicture up to version 1.2.2.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect Suspicious LP.SQL Access</code> to identify attempts to access the vulnerable file (log source: webserver).</li>
<li>Apply input validation and sanitization to the <code>key</code> argument within the API Upload Endpoint to prevent manipulation (reference CVE-2026-6574).</li>
<li>Monitor web server logs for suspicious requests targeting the <code>/public/install/lp.sql</code> file with unusual parameters (log source: webserver).</li>
<li>If upgrading is not possible, implement a web application firewall (WAF) rule to block requests containing malicious patterns in the <code>key</code> argument (log source: firewall).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-6574</category><category>hardcoded-credentials</category><category>web-application</category></item></channel></rss>