<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-8321 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-8321/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 11 May 2026 20:26:45 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-8321/feed.xml" rel="self" type="application/rss+xml"/><item><title>Inkeep Agents Authentication Bypass Vulnerability (CVE-2026-8321)</title><link>https://feed.craftedsignal.io/briefs/2026-05-cve-2026-8321-inkeep-auth-bypass/</link><pubDate>Mon, 11 May 2026 20:26:45 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-cve-2026-8321-inkeep-auth-bypass/</guid><description>CVE-2026-8321 is an authentication bypass vulnerability in the createDevContext function of Inkeep Agents 0.58.14, allowing remote attackers to bypass authentication via alternate channels.</description><content:encoded><![CDATA[<p>A critical authentication bypass vulnerability, identified as CVE-2026-8321, has been discovered in Inkeep Agents version 0.58.14. The flaw exists within the <code>createDevContext</code> function located in the <code>agents-api/src/middleware/runAuth.ts</code> file, which is part of the <code>runAuth</code> Middleware component. This vulnerability enables attackers to bypass authentication by manipulating requests to use an alternate channel. The vulnerability can be exploited remotely without requiring any prior authentication. Public exploits are available, increasing the risk of exploitation. The vendor has been notified but has not yet responded.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies an Inkeep Agents instance running version 0.58.14.</li>
<li>The attacker crafts a malicious request targeting the <code>createDevContext</code> function within the <code>agents-api/src/middleware/runAuth.ts</code> file.</li>
<li>The crafted request manipulates parameters to exploit the authentication bypass vulnerability.</li>
<li>The vulnerable <code>createDevContext</code> function improperly validates or skips authentication checks based on the manipulated parameters.</li>
<li>The system grants the attacker unauthorized access to protected resources or functionalities.</li>
<li>The attacker performs privileged actions, such as accessing sensitive data or modifying system configurations, due to the bypassed authentication.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-8321 allows unauthenticated remote attackers to bypass authentication mechanisms in Inkeep Agents 0.58.14. This can lead to unauthorized access to sensitive information, modification of system configurations, or execution of privileged operations. The vulnerability is remotely exploitable and has a public exploit, increasing the likelihood of widespread attacks.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for suspicious requests targeting the <code>createDevContext</code> function in <code>agents-api/src/middleware/runAuth.ts</code> (See Sigma rule <code>Detect CVE-2026-8321 Exploitation — Inkeep Agents Authentication Bypass</code>).</li>
<li>Apply any available patches or updates released by Inkeep to address CVE-2026-8321.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-8321</category><category>authentication bypass</category><category>inkeep</category></item></channel></rss>