<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>File-Read — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/file-read/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 20 Apr 2026 20:35:20 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/file-read/feed.xml" rel="self" type="application/rss+xml"/><item><title>Everest Forms Plugin Arbitrary File Read and Deletion Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-08-everest-forms-rfi-rce/</link><pubDate>Mon, 20 Apr 2026 20:35:20 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-08-everest-forms-rfi-rce/</guid><description>The Everest Forms plugin for WordPress is vulnerable to arbitrary file read and deletion, allowing unauthenticated attackers to access sensitive data or cause denial of service by manipulating the 'old_files' parameter in versions up to 3.4.4.</description><content:encoded><![CDATA[<p>The Everest Forms plugin for WordPress, versions 3.4.4 and earlier, contains an arbitrary file read and deletion vulnerability (CVE-2026-5478). This flaw stems from the plugin&rsquo;s improper handling of the <code>old_files</code> parameter within form submissions. Specifically, the plugin trusts attacker-controlled data as legitimate server-side upload state and insecurely converts URLs into local filesystem paths without adequate sanitization. This lack of input validation enables unauthenticated attackers to inject path traversal sequences, leading to the disclosure of sensitive files like <code>wp-config.php</code>, which contains database credentials and authentication salts. Furthermore, the flawed path resolution is utilized in a post-email cleanup routine, resulting in arbitrary file deletion via the <code>unlink()</code> function, potentially causing a denial-of-service condition. Successful exploitation requires a form with a file-upload or image-upload field and the &ldquo;store entry information&rdquo; feature disabled.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker crafts a malicious HTTP POST request to a WordPress page containing an Everest Forms form with a file upload field.</li>
<li>The attacker includes the <code>old_files</code> parameter in the POST data, injecting a path traversal payload (e.g., <code>../../../../wp-config.php</code>) into its value.</li>
<li>The WordPress application processes the form submission, and the Everest Forms plugin extracts the <code>old_files</code> parameter.</li>
<li>The plugin&rsquo;s flawed logic converts the attacker-supplied URL into a local file system path using regex-based string replacement without canonicalization or directory boundary enforcement.</li>
<li>The plugin attaches the resolved file (e.g., <code>/var/www/wordpress/../../../../wp-config.php</code>) to the notification email.</li>
<li>After sending the notification email, the post-email cleanup routine utilizes the same flawed path resolution to determine the file to delete.</li>
<li>The <code>unlink()</code> function is called on the resolved path, leading to the deletion of the targeted file (e.g., <code>wp-config.php</code>).</li>
<li>The attacker gains access to sensitive information (database credentials, salts) or causes a denial of service by deleting critical system files.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-5478 allows unauthenticated attackers to read arbitrary files on the WordPress server, potentially exposing sensitive information like database credentials and authentication salts stored in <code>wp-config.php</code>. This could lead to full site compromise, including data theft, defacement, or further malicious activities. Furthermore, the ability to delete arbitrary files enables attackers to cause a denial-of-service condition by removing critical system or application files. The impact is significant as it affects all versions of the Everest Forms plugin up to and including 3.4.4.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately update the Everest Forms plugin to a version higher than 3.4.4 to patch CVE-2026-5478.</li>
<li>Deploy the Sigma rule &ldquo;Detect Everest Forms Arbitrary File Read Attempt&rdquo; to identify potential exploitation attempts in web server logs.</li>
<li>Enable web server logging to capture HTTP POST requests, which are crucial for detecting path traversal attempts (cs-uri-query, cs-method in webserver logs).</li>
<li>Monitor file deletion events on the WordPress server, especially those initiated by the web server user, using a file integrity monitoring (FIM) solution (file_event logs).</li>
<li>Implement input validation and sanitization for all user-supplied data, especially file paths, to prevent path traversal vulnerabilities.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>wordpress</category><category>plugin</category><category>file-read</category><category>file-deletion</category><category>cve-2026-5478</category></item><item><title>WP Customer Area Plugin Arbitrary File Read and Deletion Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-wp-customer-area-file-read-delete/</link><pubDate>Fri, 17 Apr 2026 17:17:07 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-wp-customer-area-file-read-delete/</guid><description>The WP Customer Area plugin for WordPress is vulnerable to arbitrary file read and deletion due to insufficient file path validation, allowing authenticated attackers to read sensitive files or delete critical files leading to potential remote code execution.</description><content:encoded><![CDATA[<p>The WP Customer Area plugin, a popular WordPress plugin, is susceptible to an arbitrary file read and deletion vulnerability. This flaw, identified as CVE-2026-3464, resides within the &lsquo;ajax_attach_file&rsquo; function and stems from inadequate file path validation. All versions of the plugin up to and including 8.3.4 are affected. The vulnerability enables authenticated attackers with minimal privileges (e.g., Subscriber), granted access by an administrator, to read arbitrary files on the server, potentially exposing sensitive data. Attackers can also delete arbitrary files, which, in certain cases (such as deleting <code>wp-config.php</code>), can pave the way for remote code execution. This vulnerability poses a significant risk to WordPress websites utilizing the WP Customer Area plugin.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains authenticated access to a WordPress site with the WP Customer Area plugin enabled, with privileges granted by an administrator (e.g., as a Subscriber).</li>
<li>The attacker crafts a malicious HTTP request targeting the &lsquo;ajax_attach_file&rsquo; function.</li>
<li>The crafted request includes a manipulated file path, bypassing input validation.</li>
<li>The plugin, failing to properly sanitize the file path, attempts to read or delete the file specified in the malicious request.</li>
<li>If reading, the contents of the targeted file are returned to the attacker in the HTTP response.</li>
<li>If deleting, the targeted file is removed from the server.</li>
<li>If the attacker targets a sensitive file, such as <code>wp-config.php</code>, and successfully deletes it, the WordPress installation becomes unstable and potentially allows for re-installation and control by the attacker.</li>
<li>The attacker exploits the instability to achieve remote code execution, potentially installing a web shell or other malicious code.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability (CVE-2026-3464) allows attackers to read sensitive files, potentially including database credentials, API keys, and other confidential information. Moreover, the ability to delete arbitrary files can lead to denial-of-service conditions or, more critically, remote code execution. The number of affected websites is potentially large, given the popularity of the WP Customer Area plugin. A successful attack can result in complete compromise of the WordPress website and its underlying server.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the WP Customer Area plugin to a version greater than 8.3.4 to patch CVE-2026-3464.</li>
<li>Monitor web server logs for requests containing suspicious file paths targeting the &lsquo;ajax_attach_file&rsquo; function (see Sigma rule below).</li>
<li>Implement stricter file path validation on the web server to prevent arbitrary file access.</li>
<li>Apply the provided Sigma rules to your SIEM to detect and alert on malicious attempts to exploit this vulnerability.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>wordpress</category><category>plugin</category><category>file-read</category><category>file-deletion</category><category>rce</category></item><item><title>Unlimited Elements for Elementor WordPress Plugin Arbitrary File Read (CVE-2026-4659)</title><link>https://feed.craftedsignal.io/briefs/2026-04-wordpress-file-read/</link><pubDate>Fri, 17 Apr 2026 07:23:36 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-wordpress-file-read/</guid><description>The Unlimited Elements for Elementor plugin for WordPress is vulnerable to arbitrary file read due to insufficient path traversal sanitization, allowing authenticated attackers to read sensitive files from the WordPress host.</description><content:encoded><![CDATA[<p>The Unlimited Elements for Elementor plugin, versions 2.0.6 and earlier, contains an arbitrary file read vulnerability (CVE-2026-4659). This vulnerability stems from inadequate sanitization of path traversal sequences within the <code>URLtoRelative()</code> and <code>urlToPath()</code> functions, particularly when combined with the ability to enable debug output. The <code>URLtoRelative()</code> function inadequately strips the base URL without properly sanitizing path traversal characters (<code>../</code>). Successful exploitation allows authenticated attackers with Author-level permissions or higher to access and read arbitrary local files on the WordPress host. This can include sensitive configuration files like <code>wp-config.php</code>, potentially exposing database credentials and other sensitive information.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker authenticates to the WordPress application with Author-level or higher privileges.</li>
<li>The attacker identifies the <code>Repeater JSON/CSV URL</code> parameter within the Unlimited Elements widget settings.</li>
<li>The attacker crafts a malicious URL containing path traversal sequences (e.g., <code>http://site.com/../../../../etc/passwd</code>) in the <code>Repeater JSON/CSV URL</code> parameter.</li>
<li>The crafted URL is passed to the <code>URLtoRelative()</code> function, which removes the base URL but fails to sanitize the path traversal sequences.</li>
<li>The resulting path (e.g., <code>/../../../../etc/passwd</code>) is concatenated with the base path by the application.</li>
<li>The <code>cleanPath()</code> function normalizes directory separators, but does not remove traversal components, leaving the path vulnerable.</li>
<li>The application resolves the path, leading to access of the targeted file (e.g., <code>/etc/passwd</code>).</li>
<li>The attacker retrieves the contents of the arbitrary file, such as <code>wp-config.php</code>, potentially extracting sensitive information.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows attackers to read arbitrary files on the WordPress host. This can lead to the exposure of sensitive data, including database credentials, API keys, and other configuration settings stored in files like <code>wp-config.php</code>. The impact ranges from data leakage to potential full compromise of the WordPress installation and the underlying server, depending on the contents of the accessed files and the attacker&rsquo;s subsequent actions. The number of potentially affected WordPress sites is substantial, given the popularity of the Elementor plugin.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the Unlimited Elements for Elementor plugin to a version greater than 2.0.6 to patch CVE-2026-4659.</li>
<li>Monitor web server logs for HTTP requests containing path traversal sequences (<code>../</code>) in the URI, focusing on requests targeting WordPress plugins; use the provided Sigma rule to facilitate this detection.</li>
<li>Implement stricter input validation and sanitization for URL parameters within WordPress plugins, specifically when handling file paths, to prevent path traversal vulnerabilities.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>wordpress</category><category>file-read</category><category>path-traversal</category><category>cve-2026-4659</category></item><item><title>HashiCorp go-getter Arbitrary File Read Vulnerability (CVE-2026-4660)</title><link>https://feed.craftedsignal.io/briefs/2026-04-go-getter-file-read/</link><pubDate>Thu, 09 Apr 2026 14:16:32 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-go-getter-file-read/</guid><description>HashiCorp's go-getter library up to v1.8.5 is vulnerable to arbitrary file reads on the file system during certain git operations through a maliciously crafted URL (CVE-2026-4660), potentially allowing attackers to access sensitive information.</description><content:encoded><![CDATA[<p>HashiCorp&rsquo;s go-getter library, a tool for retrieving files or directories from various sources, is susceptible to an arbitrary file read vulnerability (CVE-2026-4660) in versions up to 1.8.5. The vulnerability stems from insufficient validation of URLs during git operations, potentially allowing a malicious actor to craft a URL that, when processed by go-getter, results in the reading of arbitrary files from the system&rsquo;s file system. This could lead to the exposure of sensitive data, configuration files, or credentials. The vulnerability has been patched in go-getter version 1.8.6, and the go-getter/v2 branch is not affected. This vulnerability allows for information disclosure, with a CVSS v3.1 score of 7.5.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker crafts a malicious URL designed to exploit the go-getter library&rsquo;s git operation handling.</li>
<li>The attacker delivers the malicious URL to a system running a vulnerable version of go-getter (&lt;= 1.8.5). The specific delivery mechanism is not defined in the source material.</li>
<li>The go-getter library processes the URL, attempting to retrieve files as instructed.</li>
<li>Due to insufficient URL validation, the go-getter library is tricked into accessing arbitrary files on the system.</li>
<li>The content of the accessed files is read by the go-getter library.</li>
<li>The attacker retrieves the contents of the file through the go-getter library.</li>
<li>The attacker gains access to potentially sensitive information contained within the accessed file.</li>
<li>The attacker leverages the disclosed information for further malicious activities, such as privilege escalation or lateral movement.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-4660 allows an attacker to read arbitrary files on the system where the vulnerable go-getter library is running. This can lead to the disclosure of sensitive information, including configuration files, credentials, source code, or other confidential data. The number of potential victims is dependent on the widespread adoption of the go-getter library across various systems and applications. The impact is significant as it allows for unauthorized access to sensitive data, potentially leading to further compromise of the affected system and network.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the go-getter library to version 1.8.6 or later to remediate CVE-2026-4660.</li>
<li>Implement input validation and sanitization on URLs processed by the go-getter library, focusing on git operations to prevent similar vulnerabilities.</li>
<li>Monitor network traffic for suspicious URL patterns that may indicate exploitation attempts targeting CVE-2026-4660. While no specific network IOCs are provided, generic webserver rules may be helpful.</li>
<li>Deploy the Sigma rule <code>Detect Go-Getter Arbitrary File Read Attempt</code> to identify potential exploitation attempts based on suspicious process command-line arguments.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-4660</category><category>file-read</category><category>go-getter</category><category>information-disclosure</category></item><item><title>Gotenberg Chromium Deny-List Bypass via Case-Insensitive URL Scheme</title><link>https://feed.craftedsignal.io/briefs/2026-04-gotenberg-file-read-bypass/</link><pubDate>Mon, 30 Mar 2026 16:16:57 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-gotenberg-file-read-bypass/</guid><description>Gotenberg versions before 8.29.0 are vulnerable to unauthenticated arbitrary file read, where a case-insensitive URL scheme bypasses the Chromium deny-list, allowing attackers to read sensitive files such as /etc/passwd by using mixed-case or uppercase URL schemes like FILE:///etc/passwd, leading to the leakage of sensitive data from the Gotenberg container and bypassing the fix for CVE-2024-21527.</description><content:encoded>&lt;p>Gotenberg, a popular Docker-based solution for converting HTML, Markdown, and Office documents to PDF, is susceptible to a critical vulnerability in versions prior to 8.29.0. This flaw allows for unauthenticated arbitrary file read due to a bypass in the Chromium deny-list. The vulnerability stems from the application&amp;rsquo;s failure to enforce case-sensitivity when validating URL schemes against the deny-list, implemented to prevent access to sensitive files. An attacker can exploit this by using…&lt;/p>
</content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>gotenberg</category><category>file-read</category><category>vulnerability</category><category>chromium</category></item><item><title>Weaver E-cology Arbitrary File Read Vulnerability (CVE-2022-50992)</title><link>https://feed.craftedsignal.io/briefs/2024-01-weaver-file-read/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-weaver-file-read/</guid><description>Unauthenticated remote attackers can exploit an arbitrary file read vulnerability (CVE-2022-50992) in Weaver E-cology 9.5 versions prior to 10.52 via the XML-RPC endpoint to access sensitive files.</description><content:encoded><![CDATA[<p>Weaver (Fanwei) E-cology 9.5 versions prior to 10.52 are vulnerable to an arbitrary file read vulnerability (CVE-2022-50992) within the XmlRpcServlet interface. This vulnerability is located at the XML-RPC endpoint and allows unauthenticated remote attackers to read arbitrary files on the system. The attack leverages the <code>WorkflowService.getAttachment</code> and <code>WorkflowService.LoadTemplateProp</code> methods, which can be accessed without authentication, to supply file paths. Successful exploitation enables attackers to retrieve sensitive files, including system configuration files and database credentials, from the compromised server. Exploitation evidence was first observed by the Shadowserver Foundation on 2022-12-14 (UTC), highlighting active exploitation of this vulnerability.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a Weaver E-cology 9.5 instance.</li>
<li>The attacker sends a crafted XML-RPC request to the XmlRpcServlet endpoint.</li>
<li>The request invokes either the <code>WorkflowService.getAttachment</code> or <code>WorkflowService.LoadTemplateProp</code> method.</li>
<li>The attacker includes a file path to a sensitive file (e.g., <code>/etc/passwd</code>, database configuration files) as a parameter in the XML-RPC request.</li>
<li>The vulnerable method processes the request without proper authentication or authorization checks.</li>
<li>The server reads the content of the specified file.</li>
<li>The server returns the file content in the XML-RPC response.</li>
<li>The attacker parses the response to extract the contents of the sensitive file, potentially gaining access to credentials or other sensitive information.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2022-50992 allows unauthenticated attackers to read arbitrary files on the Weaver E-cology server. This can lead to the disclosure of sensitive information, such as system configuration files, database credentials, and other confidential data. The CVSS v3.1 base score is 7.5, indicating a high severity vulnerability. This vulnerability can lead to full system compromise if database credentials are leaked.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Weaver E-cology instances to version 10.52 or later to remediate CVE-2022-50992.</li>
<li>Deploy the Sigma rule <code>Detect Weaver E-cology File Read via XML-RPC</code> to identify exploitation attempts targeting the vulnerable XML-RPC endpoint.</li>
<li>Monitor web server logs for suspicious requests to the XmlRpcServlet endpoint, specifically those containing <code>WorkflowService.getAttachment</code> or <code>WorkflowService.LoadTemplateProp</code>, using the provided Sigma rule.</li>
<li>Implement network segmentation to limit the blast radius of a potential compromise and restrict access to sensitive internal resources.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">threat</category><category>cve-2022-50992</category><category>file-read</category><category>vulnerability</category><category>webserver</category></item></channel></rss>