<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>File Upload — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/file-upload/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sat, 02 May 2026 05:16:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/file-upload/feed.xml" rel="self" type="application/rss+xml"/><item><title>WordPress User Registration Advanced Fields Plugin Arbitrary File Upload Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-wordpress-upload/</link><pubDate>Sat, 02 May 2026 05:16:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-wordpress-upload/</guid><description>The User Registration Advanced Fields plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation, allowing unauthenticated attackers to upload arbitrary files leading to potential remote code execution.</description><content:encoded><![CDATA[<p>The User Registration Advanced Fields plugin for WordPress, specifically versions up to and including 1.6.20, contains an arbitrary file upload vulnerability (CVE-2026-4882) due to insufficient file type validation in the <code>URAF_AJAX::method_upload</code> function. This flaw enables unauthenticated attackers to upload any file type to the affected server, which can lead to remote code execution if the uploaded file is strategically placed and executed. The vulnerability is exploitable only if a &ldquo;Profile Picture&rdquo; field is active within the registration form. This poses a significant threat to websites using the plugin, as attackers can potentially gain full control of the server.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a WordPress site using the vulnerable User Registration Advanced Fields plugin (&lt;= 1.6.20) with the &ldquo;Profile Picture&rdquo; field enabled.</li>
<li>The attacker crafts a malicious HTTP request to the <code>URAF_AJAX::method_upload</code> function, bypassing any client-side file type checks.</li>
<li>The attacker uploads a web shell (e.g., a PHP file) disguised as a legitimate file type or without any extension to evade basic detection mechanisms.</li>
<li>The vulnerable plugin saves the file to the WordPress uploads directory without proper validation.</li>
<li>The attacker identifies the exact file path of the uploaded web shell on the server.</li>
<li>The attacker sends another HTTP request directly to the uploaded web shell.</li>
<li>The web shell executes on the server, providing the attacker with remote code execution capabilities.</li>
<li>The attacker can then leverage the web shell to perform various malicious activities, such as installing malware, defacing the website, or exfiltrating sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability (CVE-2026-4882) allows unauthenticated attackers to upload arbitrary files to a vulnerable WordPress website, potentially leading to remote code execution. This can result in complete compromise of the affected website, including data theft, website defacement, and malware infections. The CVSS v3.1 base score for this vulnerability is 9.8, indicating a critical severity level. The impact includes potential damage to reputation, financial losses, and legal liabilities.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the User Registration Advanced Fields plugin to the latest version (greater than 1.6.20) to patch CVE-2026-4882.</li>
<li>Implement file type validation on the server-side, restricting allowed file extensions for profile picture uploads.</li>
<li>Monitor web server logs for suspicious file upload activity targeting the <code>URAF_AJAX::method_upload</code> function to detect potential exploitation attempts. Deploy the Sigma rule <code>Detect Suspicious WordPress File Uploads</code> to your SIEM.</li>
<li>Implement strict file permission policies to prevent uploaded files from being executed as scripts.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>wordpress</category><category>file-upload</category><category>rce</category></item><item><title>Xerte Online Toolkits Unauthenticated Remote Code Execution via File Upload</title><link>https://feed.craftedsignal.io/briefs/2026-04-xerte-rce/</link><pubDate>Thu, 23 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-xerte-rce/</guid><description>Xerte Online Toolkits 3.15 and earlier contain an incomplete input validation vulnerability allowing unauthenticated attackers to upload malicious PHP code with a '.php4' extension, leading to arbitrary operating system command execution on the server.</description><content:encoded><![CDATA[<p>Xerte Online Toolkits, a platform used for creating online learning materials, is vulnerable to unauthenticated remote code execution (RCE). Specifically, versions 3.15 and earlier contain an incomplete input validation vulnerability within the elFinder connector endpoint. This flaw allows an attacker to bypass existing file extension filters and upload PHP files with a &lsquo;.php4&rsquo; extension. Combined with authentication bypass and path traversal vulnerabilities, this can lead to arbitrary operating system command execution on the underlying server. This vulnerability, identified as CVE-2026-34415, poses a significant risk to organizations using affected versions of Xerte Online Toolkits, potentially allowing attackers to gain complete control of the web server.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker sends a crafted HTTP request to the elFinder connector endpoint.</li>
<li>The attacker exploits an authentication bypass vulnerability to gain unauthorized access to file upload functionality.</li>
<li>The attacker leverages a path traversal vulnerability to specify a writable directory for the uploaded file.</li>
<li>The attacker uploads a malicious PHP file disguised with a &lsquo;.php4&rsquo; extension, bypassing the incomplete input validation.</li>
<li>The server saves the malicious PHP file to the specified directory.</li>
<li>The attacker sends another HTTP request to directly access the uploaded PHP file via its URL.</li>
<li>The web server executes the PHP code within the uploaded file, granting the attacker arbitrary code execution.</li>
<li>The attacker can now execute operating system commands on the server, potentially leading to data theft, system compromise, or further malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an unauthenticated attacker to execute arbitrary operating system commands on the affected Xerte Online Toolkits server. Given the high CVSS score of 9.8, this vulnerability is considered critical. If exploited, an attacker could potentially gain full control of the server, leading to data breaches, defacement of the website, or the use of the compromised server as a launchpad for further attacks within the network. The number of potentially affected installations is currently unknown.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Xerte Online Toolkits to a patched version greater than 3.15 to remediate CVE-2026-34415.</li>
<li>Implement the Sigma rule &ldquo;Detect Suspicious PHP4 Uploads&rdquo; to identify potential exploitation attempts by monitoring web server logs for &lsquo;.php4&rsquo; file uploads.</li>
<li>Review web server access logs for unusual requests to PHP files located in unexpected directories, which may indicate exploitation attempts.</li>
<li>Monitor web server logs for requests to the elFinder connector endpoint that include suspicious parameters or file extensions.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-34415</category><category>rce</category><category>file-upload</category><category>web-application</category></item><item><title>Borg SPM 2007 Arbitrary File Upload Vulnerability (CVE-2026-6885)</title><link>https://feed.craftedsignal.io/briefs/2026-04-borg-spm-file-upload/</link><pubDate>Thu, 23 Apr 2026 10:16:18 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-borg-spm-file-upload/</guid><description>An unauthenticated remote attacker can exploit an arbitrary file upload vulnerability (CVE-2026-6885) in Borg SPM 2007 to upload and execute web shell backdoors, leading to arbitrary code execution on the server.</description><content:encoded><![CDATA[<p>Borg SPM 2007, a product by BorG Technology Corporation with sales ending in 2008, is vulnerable to arbitrary file uploads (CVE-2026-6885). This vulnerability allows unauthenticated remote attackers to upload malicious files, such as web shells, which can then be executed by the server. The attacker can then achieve arbitrary code execution, leading to a compromise of the system. Given the age of the software, it is likely running on outdated systems with fewer security controls making successful exploitation highly probable. This poses a significant risk to organizations still using this software.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a Borg SPM 2007 server exposed to the internet.</li>
<li>The attacker sends a crafted HTTP POST request to the server, exploiting the file upload vulnerability (CVE-2026-6885).</li>
<li>The POST request contains a malicious file, such as a PHP web shell, disguised with a permissible extension or without any extension check.</li>
<li>The Borg SPM 2007 server saves the uploaded file to a publicly accessible directory, without proper sanitization.</li>
<li>The attacker sends another HTTP request to access the uploaded web shell.</li>
<li>The web server executes the web shell code, granting the attacker arbitrary code execution on the server.</li>
<li>The attacker uses the web shell to gain a persistent foothold, install malware, or exfiltrate sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an unauthenticated remote attacker to execute arbitrary code on the vulnerable server. This can lead to full system compromise, data theft, and potential disruption of services. While the number of active installations is likely low due to the product&rsquo;s end-of-life status in 2008, organizations still running Borg SPM 2007 are at high risk if the system is exposed to the Internet.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Identify instances of Borg SPM 2007 running in your environment and isolate them from the network if possible.</li>
<li>Implement the provided Sigma rule to detect potential web shell uploads based on HTTP request characteristics.</li>
<li>Since no patch exists, consider immediate decommissioning or migration to a supported alternative.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>file-upload</category><category>web-shell</category><category>code-execution</category></item><item><title>FlowiseAI File Upload Validation Bypass Leads to RCE</title><link>https://feed.craftedsignal.io/briefs/2026-04-17-flowise-upload-bypass/</link><pubDate>Fri, 17 Apr 2026 14:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-17-flowise-upload-bypass/</guid><description>A file upload validation bypass vulnerability exists in FlowiseAI, where the Chatflow configuration file upload settings can be modified to allow the application/javascript MIME type, enabling an attacker to upload .js files, store malicious Node.js web shells on the server, and potentially achieve Remote Code Execution (RCE).</description><content:encoded><![CDATA[<p>FlowiseAI, a low-code platform for building AI applications, contains a file upload validation bypass vulnerability. By modifying the Chatflow configuration, specifically the <code>allowedUploadFileTypes</code> setting, an attacker can add <code>application/javascript</code> as an accepted MIME type. This bypasses previous mitigations (CVE-2025-61687) intended to prevent the upload of potentially malicious files. Although the frontend UI restricts JavaScript uploads, a direct API request can circumvent this. Successful exploitation allows attackers to persistently store Node.js web shells (e.g., shell.js) on the Flowise server. This vulnerability affects FlowiseAI versions up to 3.0.13. If executed, these web shells could grant the attacker Remote Code Execution (RCE) capabilities on the server, posing a significant risk to system integrity and data confidentiality.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable FlowiseAI instance running a version &lt;= 3.0.13.</li>
<li>The attacker authenticates to the FlowiseAI instance as an administrator or with compromised credentials.</li>
<li>The attacker crafts a malicious HTTP PUT request to the <code>/api/v1/chatflows/{CHATFLOW_ID}</code> endpoint.</li>
<li>The PUT request modifies the Chatflow configuration, specifically the <code>chatbotConfig</code> to include <code>application/javascript</code> in the <code>allowedUploadFileTypes</code>.</li>
<li>The attacker crafts a malicious HTTP POST request to the <code>/api/v1/attachments/{CHATFLOW_ID}/{CHAT_ID}</code> endpoint to upload a <code>.js</code> file (Node.js web shell), such as the <code>shell.js</code> example.</li>
<li>The server saves the malicious <code>.js</code> file to a publicly accessible directory.</li>
<li>The attacker accesses the uploaded <code>.js</code> file via a direct HTTP request.</li>
<li>The web shell executes commands specified in the URL parameters, such as <code>http://localhost:8888/?cmd=id</code>, resulting in RCE.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows attackers to upload and persistently store malicious web shells on the FlowiseAI server. Execution of these web shells grants the attacker the ability to execute arbitrary commands on the underlying system. This can lead to complete system compromise, data exfiltration, and denial of service. This vulnerability affects FlowiseAI versions up to 3.0.13.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply appropriate input validation and sanitization to prevent modification of <code>allowedUploadFileTypes</code> settings.</li>
<li>Monitor network traffic for PUT requests to <code>/api/v1/chatflows/{CHATFLOW_ID}</code> modifying <code>allowedUploadFileTypes</code> as described in the attack chain.</li>
<li>Monitor for POST requests to <code>/api/v1/attachments/{CHATFLOW_ID}/{CHAT_ID}</code> uploading <code>.js</code> files based on the attack chain.</li>
<li>Deploy the Sigma rules provided below to detect suspicious HTTP requests indicative of this attack.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>flowiseai</category><category>file-upload</category><category>rce</category><category>web-shell</category></item><item><title>Goshs File-Based ACL Authorization Bypass Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-goshs-acl-bypass/</link><pubDate>Fri, 10 Apr 2026 20:02:46 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-goshs-acl-bypass/</guid><description>Goshs is vulnerable to an authorization bypass (CVE-2026-40189) due to inconsistent enforcement of .goshs ACLs on state-changing routes, allowing an unauthenticated attacker to manipulate files within protected directories and bypass authentication barriers.</description><content:encoded><![CDATA[<p>The Goshs web server is susceptible to a critical authorization bypass (CVE-2026-40189) affecting versions up to and including 1.1.4 and v2.0.0-beta.3. The vulnerability stems from inconsistent enforcement of file-based ACLs defined by <code>.goshs</code> files. While the application correctly enforces authorization for reading and listing files, state-changing routes such as PUT, POST /upload, ?mkdir, and ?delete do not perform the same authorization checks. This allows unauthenticated attackers to upload, create, and delete files within directories that should be protected by authentication. The most severe impact arises from the ability to delete the <code>.goshs</code> file itself, thereby removing the authentication requirement and exposing previously protected content. This vulnerability undermines the intended security mechanisms of Goshs, posing a significant risk to data confidentiality, integrity, and availability.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a Goshs instance utilizing <code>.goshs</code> files for access control.</li>
<li>The attacker sends an unauthenticated PUT request to upload a file to a protected directory, bypassing ACL checks via <code>httpserver/updown.go:18-60</code>. Example: <code>PUT /protected/put-created.txt</code></li>
<li>Alternatively, the attacker sends an unauthenticated multipart POST request to <code>/upload</code> endpoint to upload a file to a protected directory, bypassing ACL checks via <code>httpserver/updown.go:63-165</code>. Example: <code>POST /protected/upload</code></li>
<li>The attacker sends an unauthenticated request with the <code>?mkdir</code> parameter to create a directory within the protected directory, bypassing ACL checks via <code>httpserver/handler.go:901-937</code>. Example: <code>/?mkdir=new_directory</code></li>
<li>The attacker sends an unauthenticated request with the <code>?delete</code> parameter targeting the <code>.goshs</code> file within the protected directory, leveraging the vulnerable route in <code>httpserver/handler.go:679-698</code>. Example: <code>/.goshs?delete</code></li>
<li>The server deletes the <code>.goshs</code> file using <code>os.RemoveAll()</code>, effectively removing the access control restrictions for the directory.</li>
<li>The attacker sends an unauthenticated request to access previously protected files, which are now accessible due to the absence of the <code>.goshs</code> file.</li>
<li>The attacker gains unauthorized access to sensitive information and can perform further malicious actions, such as deleting or modifying critical files.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows unauthenticated attackers to bypass intended access controls in Goshs deployments. This can lead to unauthorized access to sensitive files, potentially exposing confidential information. Attackers can also create, modify, or delete files within protected directories, causing data corruption or service disruption. The ability to delete the <code>.goshs</code> file directly amplifies the impact, as it permanently removes the authentication barrier, affecting all previously protected content. This vulnerability poses a significant threat to the confidentiality, integrity, and availability of Goshs-hosted data.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the vendor-supplied patch or upgrade to a version of Goshs that addresses CVE-2026-40189.</li>
<li>Deploy the Sigma rule &ldquo;Detect Goshs Unauthenticated .goshs Deletion&rdquo; to your SIEM to detect attempts to remove <code>.goshs</code> ACL files via the <code>?delete</code> parameter.</li>
<li>Deploy the Sigma rule &ldquo;Detect Goshs Unauthenticated PUT Request to Protected Directories&rdquo; to detect unauthorized file uploads to protected directories.</li>
<li>Monitor web server logs for PUT, POST, and DELETE requests targeting directories containing <code>.goshs</code> files to identify potential exploitation attempts. (Log Source: webserver)</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>authorization bypass</category><category>acl</category><category>file upload</category><category>file deletion</category><category>CVE-2026-40189</category></item><item><title>WordPress Plugin Vulnerability: Arbitrary File Upload in Gerador de Certificados – DevApps</title><link>https://feed.craftedsignal.io/briefs/2026-04-wordpress-upload/</link><pubDate>Wed, 08 Apr 2026 07:16:22 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-wordpress-upload/</guid><description>The Gerador de Certificados – DevApps WordPress plugin is vulnerable to arbitrary file uploads due to missing file type validation, potentially leading to remote code execution.</description><content:encoded><![CDATA[<p>The Gerador de Certificados – DevApps plugin for WordPress, versions up to and including 1.3.6, contains an arbitrary file upload vulnerability (CVE-2026-4808). This flaw stems from a lack of file type validation within the <code>moveUploadedFile()</code> function. Authenticated users with administrator privileges or higher can exploit this vulnerability by uploading arbitrary files to the affected server. Successful exploitation could allow an attacker to execute arbitrary code on the server, leading to a complete system compromise. This vulnerability poses a significant threat to websites using the affected plugin, potentially impacting data confidentiality, integrity, and availability.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker authenticates to the WordPress site with administrator-level privileges.</li>
<li>The attacker navigates to the Gerador de Certificados – DevApps plugin&rsquo;s upload functionality.</li>
<li>The attacker crafts a malicious file (e.g., a PHP file) with a disguised extension or no extension.</li>
<li>The attacker uploads the malicious file through the plugin&rsquo;s interface, bypassing the missing file type validation in the <code>moveUploadedFile()</code> function.</li>
<li>The plugin saves the file to a publicly accessible directory on the server.</li>
<li>The attacker identifies the location of the uploaded file.</li>
<li>The attacker sends an HTTP request to the uploaded file&rsquo;s location.</li>
<li>The server executes the malicious code within the uploaded file, granting the attacker remote code execution capabilities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows attackers with administrator privileges to upload arbitrary files to the web server. This can lead to remote code execution, potentially allowing the attacker to gain full control of the WordPress website and the underlying server. This could lead to data theft, website defacement, or use of the server for malicious purposes such as hosting phishing sites or launching attacks against other systems. The number of affected sites is potentially very large.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the Gerador de Certificados – DevApps plugin to the latest version, which includes a fix for CVE-2026-4808.</li>
<li>Implement web server configurations to prevent the execution of scripts in upload directories.</li>
<li>Enable web server logging and monitor for suspicious file uploads and access attempts to unusual file types.</li>
<li>Deploy the Sigma rule to detect attempts to access PHP files within the wp-content/uploads directory.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>wordpress</category><category>plugin</category><category>file-upload</category><category>remote-code-execution</category></item><item><title>Ninja Forms File Upload Plugin Vulnerability Leads to RCE</title><link>https://feed.craftedsignal.io/briefs/2026-04-ninja-forms-rce/</link><pubDate>Tue, 07 Apr 2026 05:16:06 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-ninja-forms-rce/</guid><description>The Ninja Forms File Uploads plugin for WordPress is vulnerable to unauthenticated arbitrary file uploads due to missing file type validation, potentially leading to remote code execution.</description><content:encoded><![CDATA[<p>The Ninja Forms - File Uploads plugin for WordPress, specifically versions up to and including 3.3.26, contains an arbitrary file upload vulnerability (CVE-2026-0740). This flaw stems from a lack of proper file type validation within the <code>NF_FU_AJAX_Controllers_Uploads::handle_upload</code> function. An unauthenticated attacker can exploit this vulnerability to upload arbitrary files to the affected WordPress server. Successful exploitation could enable remote code execution, allowing the attacker to compromise the web server and potentially the underlying network. The vulnerability was partially addressed in version 3.3.25 and fully resolved in version 3.3.27. This vulnerability poses a significant risk to organizations using the vulnerable plugin, potentially leading to data breaches, website defacement, or complete system compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker sends a crafted HTTP POST request to the WordPress server targeting the <code>wp-admin/admin-ajax.php</code> endpoint.</li>
<li>The POST request includes a malicious file disguised as a legitimate file type, exploiting the missing file type validation in the <code>NF_FU_AJAX_Controllers_Uploads::handle_upload</code> function.</li>
<li>The <code>handle_upload</code> function processes the request without properly validating the file type, allowing the malicious file to be uploaded to the server.</li>
<li>The uploaded file is stored in the WordPress uploads directory, typically located within the <code>wp-content/uploads/ninja-forms-uploads/</code> directory.</li>
<li>The attacker crafts the malicious file (e.g., a PHP script) to execute arbitrary code on the server when accessed.</li>
<li>The attacker accesses the uploaded malicious file via a direct HTTP request to the file&rsquo;s location within the uploads directory.</li>
<li>The web server executes the malicious file (e.g., a PHP script), granting the attacker the ability to execute arbitrary commands on the server.</li>
<li>The attacker leverages the executed code to gain a persistent foothold on the server, install malware, or exfiltrate sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-0740 allows unauthenticated attackers to upload arbitrary files, potentially leading to remote code execution. This can result in complete compromise of the WordPress website, including data breaches, website defacement, and installation of backdoors. The impact is significant due to the widespread use of WordPress and the Ninja Forms plugin. Even a single successful attack can lead to substantial financial losses, reputational damage, and legal liabilities. Websites utilizing versions of the Ninja Forms File Uploads plugin prior to 3.3.27 are vulnerable.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the Ninja Forms File Uploads plugin to version 3.3.27 or later to fully patch CVE-2026-0740.</li>
<li>Implement web application firewall (WAF) rules to detect and block malicious file upload attempts targeting the <code>wp-admin/admin-ajax.php</code> endpoint.</li>
<li>Monitor web server access logs for suspicious requests to the <code>wp-content/uploads/ninja-forms-uploads/</code> directory.</li>
<li>Deploy the Sigma rule &ldquo;Detect Ninja Forms Arbitrary File Upload Attempt&rdquo; to identify potential exploitation attempts in web server logs.</li>
<li>Enforce strict file type validation on all file upload forms, even after upgrading the plugin, as a defense-in-depth measure.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>wordpress</category><category>file-upload</category><category>rce</category><category>CVE-2026-0740</category></item><item><title>Brave CMS Unrestricted File Upload Leads to Remote Code Execution</title><link>https://feed.craftedsignal.io/briefs/2026-04-brave-cms-rce/</link><pubDate>Mon, 06 Apr 2026 18:16:42 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-brave-cms-rce/</guid><description>Brave CMS versions prior to 2.0.6 contain an unrestricted file upload vulnerability within the CKEditor upload functionality in the ckupload method, allowing authenticated users to upload executable PHP scripts and achieve Remote Code Execution.</description><content:encoded><![CDATA[<p>Brave CMS, an open-source content management system, is vulnerable to an unrestricted file upload vulnerability (CVE-2026-35164) in versions prior to 2.0.6. The vulnerability resides within the CKEditor upload functionality, specifically in the <code>ckupload</code> method located in <code>app/Http/Controllers/Dashboard/CkEditorController.php</code>. The application fails to properly validate the types of uploaded files, relying solely on user-provided input. This lack of validation enables an authenticated user to upload malicious PHP scripts, leading to arbitrary code execution on the server. The vulnerability was reported on April 6, 2026, and is fixed in Brave CMS version 2.0.6. Organizations using affected versions of Brave CMS are at risk of complete system compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker authenticates to the Brave CMS application as a user with upload privileges.</li>
<li>The attacker navigates to a page or functionality within the CMS that utilizes the CKEditor for content creation or editing.</li>
<li>The attacker uses the CKEditor&rsquo;s upload functionality to upload a malicious PHP script disguised as a legitimate file type (e.g., image).</li>
<li>The <code>ckupload</code> method in <code>app/Http/Controllers/Dashboard/CkEditorController.php</code> processes the uploaded file without proper validation of the file type or content.</li>
<li>The malicious PHP script is stored on the server in a publicly accessible directory.</li>
<li>The attacker crafts a request to directly access the uploaded PHP script via its URL.</li>
<li>The web server executes the PHP script, granting the attacker the ability to run arbitrary commands on the server.</li>
<li>The attacker establishes persistence, installs a web shell, and performs lateral movement within the network, escalating privileges as needed to achieve their objectives.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to execute arbitrary PHP code on the affected Brave CMS server. This can lead to complete compromise of the CMS instance, including unauthorized access to sensitive data, modification of website content, and potential lateral movement to other systems on the network. The CVSS v3.1 base score for this vulnerability is 8.8, indicating a high severity level. Organizations running vulnerable versions of Brave CMS are at risk of data breaches, website defacement, and further exploitation of their infrastructure.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Brave CMS to version 2.0.6 or later to remediate the unrestricted file upload vulnerability (CVE-2026-35164).</li>
<li>Implement server-side file validation to prevent the upload of malicious files, regardless of file extension.</li>
<li>Monitor web server logs for suspicious activity related to file uploads and execution of PHP scripts.</li>
<li>Deploy the following Sigma rule to detect attempts to access potentially malicious PHP files in the web server&rsquo;s upload directories.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-35164</category><category>rce</category><category>file-upload</category><category>brave-cms</category><category>ckeditor</category><category>php</category><category>webserver</category></item><item><title>phpBB Arbitrary File Upload Vulnerability (CVE-2019-25685)</title><link>https://feed.craftedsignal.io/briefs/2026-04-phpbb-file-upload/</link><pubDate>Sun, 05 Apr 2026 21:16:47 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-phpbb-file-upload/</guid><description>phpBB is vulnerable to arbitrary file upload (CVE-2019-25685) by exploiting the plupload functionality and phar:// stream wrapper, allowing authenticated attackers to upload crafted zip files containing serialized PHP objects that execute arbitrary code via the imagick parameter.</description><content:encoded><![CDATA[<p>CVE-2019-25685 is an arbitrary file upload vulnerability affecting phpBB. An authenticated attacker can exploit this vulnerability to upload malicious files by leveraging the plupload functionality and the phar:// stream wrapper. This allows them to upload a crafted ZIP archive that includes serialized PHP objects, leading to arbitrary code execution when these objects are deserialized via the imagick parameter within the attachment settings. Successful exploitation can result in complete server compromise, allowing the attacker to execute arbitrary commands, potentially leading to data theft, website defacement, or denial of service.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker authenticates to the phpBB application.</li>
<li>The attacker crafts a malicious ZIP archive containing serialized PHP objects designed for remote code execution. This archive is designed to be processed by the <code>phar://</code> stream wrapper.</li>
<li>The attacker uploads the crafted ZIP archive through the plupload functionality, potentially disguised as a legitimate attachment type.</li>
<li>The phpBB application processes the uploaded file. The application uses the phar:// stream wrapper to extract the contents of the uploaded ZIP file.</li>
<li>The application deserializes the malicious PHP objects, triggered by the imagick parameter in attachment settings.</li>
<li>Deserialization of the crafted PHP objects leads to arbitrary code execution on the server.</li>
<li>The attacker gains control of the web server, potentially escalating privileges.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2019-25685 allows an attacker to execute arbitrary code on the phpBB server. The attacker could gain complete control of the web server, potentially leading to data theft, website defacement, or denial of service. The impact is significant due to the potential for full system compromise. The number of victims is dependent on the number of phpBB installations exposed and targeted.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Inspect web server logs for POST requests to attachment upload endpoints containing ZIP archives and the &ldquo;phar://&rdquo; wrapper in request parameters to detect potential exploit attempts. (Log Source: webserver, Rule: phpbb_phar_upload)</li>
<li>Monitor phpBB file upload directories for the creation of unexpected files, particularly PHP scripts or other executable files. (Log Source: file_event, Rule: phpbb_suspicious_file_creation)</li>
<li>Apply available patches or updates for phpBB to address CVE-2019-25685 as soon as possible.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>phpBB</category><category>file-upload</category><category>deserialization</category><category>CVE-2019-25685</category></item><item><title>Technostrobe HI-LED-WR120-G2 Unrestricted File Upload Vulnerability (CVE-2026-5573)</title><link>https://feed.craftedsignal.io/briefs/2026-04-technostrobe-upload/</link><pubDate>Sun, 05 Apr 2026 15:16:41 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-technostrobe-upload/</guid><description>CVE-2026-5573 allows remote attackers to perform unrestricted file uploads on Technostrobe HI-LED-WR120-G2 devices by manipulating the 'cwd' argument when interacting with the /fs file.</description><content:encoded><![CDATA[<p>A critical vulnerability, CVE-2026-5573, has been identified in Technostrobe HI-LED-WR120-G2 version 5.5.0.1R6.03.30. This flaw allows unauthenticated, remote attackers to upload arbitrary files to the device due to improper handling of the &lsquo;cwd&rsquo; argument when accessing the <code>/fs</code> file. Publicly available exploits exist, increasing the risk of widespread exploitation. The vendor was notified but did not respond. This vulnerability poses a significant threat due to the potential for complete system compromise, including remote code execution and data exfiltration.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a Technostrobe HI-LED-WR120-G2 device running the vulnerable firmware version 5.5.0.1R6.03.30.</li>
<li>The attacker sends a crafted HTTP request to the <code>/fs</code> endpoint, manipulating the <code>cwd</code> argument.</li>
<li>The manipulated <code>cwd</code> argument bypasses access controls, allowing the attacker to specify an arbitrary upload directory.</li>
<li>The attacker uploads a malicious file, such as a web shell or executable, to the specified directory.</li>
<li>The attacker accesses the uploaded file via a web browser or other means.</li>
<li>If the uploaded file is executable (e.g., a web shell), the attacker executes arbitrary commands on the device with the privileges of the web server.</li>
<li>The attacker leverages the gained access to escalate privileges, install persistent backdoors, or exfiltrate sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-5573 allows attackers to gain complete control over affected Technostrobe HI-LED-WR120-G2 devices. This can lead to data breaches, system disruption, or the device being used as a foothold for further attacks within the network. The lack of vendor response and the availability of public exploits make this vulnerability particularly dangerous.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for suspicious requests to the <code>/fs</code> endpoint with unusual <code>cwd</code> parameter values. Use the provided Sigma rule to detect such activity.</li>
<li>Inspect uploaded files for malicious content. Deploy the file upload detection Sigma rule to identify potential web shells.</li>
<li>Block connections to the identified malicious URLs to prevent exploit attempts (see IOCs).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>CVE-2026-5573</category><category>file-upload</category><category>web-application</category></item><item><title>ShareFile Storage Zones Controller Unauthenticated Remote Code Execution via File Upload (CVE-2026-2701)</title><link>https://feed.craftedsignal.io/briefs/2026-04-sharefile-rce/</link><pubDate>Thu, 02 Apr 2026 14:16:27 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-sharefile-rce/</guid><description>Authenticated users can upload malicious files to a ShareFile Storage Zones Controller server and execute them, leading to remote code execution, due to improper neutralization of special elements, code generation, and unrestricted file upload.</description><content:encoded><![CDATA[<p>CVE-2026-2701 is a critical vulnerability affecting ShareFile Storage Zones Controller, allowing authenticated users to upload and execute malicious files on the server, resulting in remote code execution. The vulnerability stems from inadequate input validation and insufficient restrictions on file types during upload. Successful exploitation enables attackers to execute arbitrary code on the affected system, potentially leading to complete system compromise. While the specific versions affected are not explicitly stated in the source, the vulnerability was reported in conjunction with a security vulnerability advisory published in February 2026. Defenders should prioritize patching and implementing mitigations to prevent potential exploitation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An authenticated user logs into the ShareFile Storage Zones Controller.</li>
<li>The user navigates to the file upload functionality within the application.</li>
<li>The attacker uploads a specially crafted malicious file (e.g., a web shell or executable).</li>
<li>The application fails to properly validate the file type or content, allowing the malicious file to be stored on the server.</li>
<li>The attacker crafts a request to execute the uploaded malicious file. This may involve leveraging OS command injection (CWE-78) or code injection (CWE-94) vulnerabilities.</li>
<li>The server executes the malicious file, granting the attacker arbitrary code execution.</li>
<li>The attacker uses the gained access to move laterally, install backdoors, or exfiltrate sensitive data.</li>
<li>The attacker achieves complete control over the compromised server and potentially the entire ShareFile environment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-2701 allows attackers to execute arbitrary code on the affected ShareFile Storage Zones Controller server. This can lead to a complete compromise of the server, data exfiltration, and potential lateral movement within the network. While the exact number of victims is unknown, any organization using vulnerable versions of ShareFile Storage Zones Controller is at risk. Given the nature of ShareFile, this could expose sensitive data belonging to customers and partners.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the security patch referenced in the Progress Software Corporation advisory (<a href="https://docs.sharefile.com/en-us/storage-zones-controller/5-0/security-vulnerability-feb26">https://docs.sharefile.com/en-us/storage-zones-controller/5-0/security-vulnerability-feb26</a>) to remediate CVE-2026-2701.</li>
<li>Implement strict file type validation and sanitization on all file upload functionalities within the ShareFile Storage Zones Controller.</li>
<li>Deploy the Sigma rules provided in this brief to your SIEM to detect potential exploitation attempts.</li>
<li>Monitor web server logs for suspicious file upload activity or attempts to execute unusual file types using the provided Sigma rule targeting webserver logs.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>rce</category><category>file-upload</category><category>sharefile</category></item><item><title>Path Traversal Vulnerability in API File Upload Endpoint (CVE-2026-5027)</title><link>https://feed.craftedsignal.io/briefs/2026-03-path-traversal-api/</link><pubDate>Fri, 27 Mar 2026 15:17:04 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-path-traversal-api/</guid><description>The 'POST /api/v2/files' endpoint is vulnerable to path traversal due to improper sanitization of the 'filename' parameter, potentially allowing attackers to write files to arbitrary locations on the filesystem and achieve remote code execution.</description><content:encoded><![CDATA[<p>CVE-2026-5027 exposes a critical vulnerability in the &lsquo;POST /api/v2/files&rsquo; endpoint, where the &lsquo;filename&rsquo; parameter within multipart form data is not properly sanitized. This flaw allows an attacker to manipulate the filename by injecting path traversal sequences such as &lsquo;../&rsquo;, leading to the ability to write files to arbitrary locations on the server&rsquo;s filesystem. This vulnerability was reported by Tenable Network Security, Inc. and has a CVSS v3.1 base score of 8.8 (HIGH). Successful…</p>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>path-traversal</category><category>file-upload</category><category>cve-2026-5027</category><category>web-application</category></item><item><title>Sharp Laravel Admin Panel Unrestricted File Upload Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-06-sharp-file-upload-bypass/</link><pubDate>Wed, 25 Mar 2026 20:03:11 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-06-sharp-file-upload-bypass/</guid><description>The code16/sharp Laravel admin panel package contains a vulnerability in its file upload endpoint that allows authenticated users to bypass all file type restrictions by manipulating the validation_rule parameter, potentially leading to Remote Code Execution (RCE) if the storage disk is configured to be publicly accessible.</description><content:encoded><![CDATA[<p>The <code>code16/sharp</code> Laravel admin panel package, specifically versions before 9.20.0, is vulnerable to unrestricted file upload. An authenticated user can manipulate the <code>validation_rule</code> parameter in the <code>/api/form/upload</code> endpoint to bypass file type restrictions. This vulnerability stems from insufficient server-side validation of the client-supplied <code>validation_rule</code>, which is directly passed to the Laravel validator. Successfully exploiting this vulnerability allows an attacker to upload arbitrary files, including PHP webshells, which can lead to remote code execution (RCE) if the storage disk is publicly accessible. The vulnerability was reported by zaurgsynv and has been patched in pull request #714. Defenders should ensure their Sharp instances are updated to version 9.20.0 or later, and restrict disk access.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An authenticated user logs into the Sharp Laravel admin panel.</li>
<li>The user navigates to a section of the application that utilizes the file upload functionality.</li>
<li>The user intercepts the HTTP request sent to the <code>/api/form/upload</code> endpoint.</li>
<li>The user modifies the request body, specifically the <code>validation_rule</code> parameter, setting it to <code>validation_rule[]=file</code>.</li>
<li>The modified request is sent to the server, bypassing MIME type and file extension checks.</li>
<li>The server processes the upload request, saving the arbitrary file (e.g., a PHP webshell) to the designated storage disk.</li>
<li>If the storage disk is publicly accessible, the attacker can access the uploaded file via a web browser.</li>
<li>The attacker executes the uploaded PHP webshell, achieving remote code execution (RCE) on the server.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows attackers to upload arbitrary files, including PHP webshells, to the affected server. This can lead to Remote Code Execution (RCE) if the server&rsquo;s storage disk is misconfigured to be publicly accessible. While default configurations prevent direct execution of uploaded PHP files, compromised servers can be leveraged for lateral movement, data exfiltration, or further malicious activities. This vulnerability impacts all installations of <code>code16/sharp</code> prior to version 9.20.0.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade <code>code16/sharp</code> to version 9.20.0 or later to remediate CVE-2026-33687.</li>
<li>Ensure that the storage disk used for Sharp uploads is strictly private, as described in the Laravel filesystem documentation (<a href="https://laravel.com/docs/13.x/filesystem)">https://laravel.com/docs/13.x/filesystem)</a>.</li>
<li>Deploy the Sigma rule &ldquo;Detect Sharp File Upload Bypass Attempt&rdquo; to identify attempts to exploit this vulnerability based on the <code>validation_rule</code> parameter.</li>
<li>Monitor web server logs for suspicious file uploads to the <code>/api/form/upload</code> endpoint, correlating with user activity and file extensions.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>laravel</category><category>file-upload</category><category>rce</category><category>code16/sharp</category></item><item><title>PhreeBooks ERP 5.2.3 Arbitrary File Upload Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-03-phreebooks-file-upload/</link><pubDate>Tue, 24 Mar 2026 12:16:03 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-phreebooks-file-upload/</guid><description>PhreeBooks ERP 5.2.3 is vulnerable to arbitrary file upload in the Image Manager component, allowing authenticated attackers to upload malicious PHP files leading to remote code execution.</description><content:encoded><![CDATA[<p>PhreeBooks ERP version 5.2.3 contains a critical arbitrary file upload vulnerability within its Image Manager component. This vulnerability allows authenticated attackers to bypass security restrictions and upload malicious files to the server. By crafting specific requests to the image upload endpoint, threat actors can inject PHP files. The successful exploitation of this vulnerability allows for arbitrary code execution on the underlying system, potentially leading to full system compromise. This issue was reported and assigned CVE-2019-25630. Successful exploitation requires authentication, limiting the scope of easily exploitable targets. However, the impact of successful exploitation is severe, allowing for complete control of the affected PhreeBooks ERP instance.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker authenticates to the PhreeBooks ERP 5.2.3 application.</li>
<li>The attacker navigates to the Image Manager component.</li>
<li>The attacker crafts a malicious HTTP POST request to the <code>bizuno/image/manager</code> endpoint.</li>
<li>The request includes the <code>imgFile</code> parameter containing a PHP file disguised as an image (e.g., using a double extension like <code>evil.php.jpg</code>).</li>
<li>The server saves the uploaded file to a publicly accessible directory.</li>
<li>The attacker then accesses the uploaded PHP file via a direct HTTP request to <code>/bizunoFS.php</code>.</li>
<li>The <code>bizunoFS.php</code> script executes the malicious PHP code.</li>
<li>The attacker gains remote code execution on the server, enabling further malicious activities like data exfiltration or system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to execute arbitrary code on the PhreeBooks ERP server. This can lead to complete compromise of the server, including data exfiltration, modification of financial records, and denial of service. While the number of affected installations is unknown, the potential impact on compromised systems is significant due to the sensitive data typically managed by ERP systems. Organizations using PhreeBooks ERP 5.2.3 are vulnerable to complete data loss, financial fraud, and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply available patches or upgrade to a secure version of PhreeBooks ERP to remediate CVE-2019-25630.</li>
<li>Implement the Sigma rule <code>Phreebooks Image Upload</code> to detect suspicious requests to the <code>bizuno/image/manager</code> endpoint.</li>
<li>Monitor web server logs for access to PHP files within the image upload directories, as this can be a sign of successful exploitation via <code>bizunoFS.php</code>.</li>
<li>Implement input validation on the server side to prevent uploading files with dangerous extensions like <code>.php</code>.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>phreebooks</category><category>file-upload</category><category>rce</category></item><item><title>Census CSWeb 8.0.1 Arbitrary File Upload Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-03-census-csweb-file-upload/</link><pubDate>Tue, 24 Mar 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-census-csweb-file-upload/</guid><description>A remote, authenticated attacker can exploit an arbitrary file upload vulnerability in Census CSWeb 8.0.1 (CVE-2025-60947) to upload malicious files, potentially leading to remote code execution.</description><content:encoded>&lt;p>Census CSWeb 8.0.1 is vulnerable to an arbitrary file upload vulnerability (CVE-2025-60947). An authenticated attacker can leverage this vulnerability to upload malicious files to the server. Successful exploitation could allow the attacker to achieve remote code execution on the targeted system. The vulnerability was patched in version 8.1.0 alpha. This poses a significant risk to organizations using the affected CSWeb version, potentially leading to data breaches, system compromise, and…&lt;/p>
</content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>file-upload</category><category>remote-code-execution</category><category>web-application</category></item><item><title>Breeze Cache Plugin Arbitrary File Upload Vulnerability (CVE-2026-3844)</title><link>https://feed.craftedsignal.io/briefs/2026-04-breeze-cache-rce/</link><pubDate>Thu, 29 Feb 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-breeze-cache-rce/</guid><description>The Breeze Cache plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation, potentially leading to remote code execution.</description><content:encoded><![CDATA[<p>The Breeze Cache plugin for WordPress, in versions up to and including 2.4.4, contains an arbitrary file upload vulnerability (CVE-2026-3844). This flaw stems from the lack of file type validation within the &lsquo;fetch_gravatar_from_remote&rsquo; function. An unauthenticated attacker can exploit this vulnerability to upload arbitrary files to the affected WordPress site&rsquo;s server. Successful exploitation could lead to remote code execution on the server. It is important to note that the vulnerability can only be exploited if the &ldquo;Host Files Locally - Gravatars&rdquo; setting is enabled within the Breeze Cache plugin. This setting is disabled by default, reducing the attack surface. Defenders should prioritize identifying potentially compromised systems running vulnerable versions of Breeze Cache with the &ldquo;Host Files Locally - Gravatars&rdquo; option enabled.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a WordPress site running a vulnerable version (&lt;= 2.4.4) of the Breeze Cache plugin.</li>
<li>The attacker confirms the &ldquo;Host Files Locally - Gravatars&rdquo; option is enabled on the target WordPress site.</li>
<li>The attacker crafts a malicious HTTP request targeting the &lsquo;fetch_gravatar_from_remote&rsquo; function. This request contains a payload designed to upload an arbitrary file to the server.</li>
<li>Due to the missing file type validation, the server accepts the malicious file upload without proper sanitization. The uploaded file can be a PHP file, a web shell, or another executable type.</li>
<li>The attacker determines the location where the file has been saved by the plugin.</li>
<li>The attacker sends an HTTP request to the uploaded file&rsquo;s location, triggering its execution on the server.</li>
<li>The malicious file executes, granting the attacker remote code execution capabilities on the web server.</li>
<li>The attacker can then perform actions such as installing malware, stealing sensitive data, or further compromising the server and network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an unauthenticated attacker to upload arbitrary files to a vulnerable WordPress server. This can lead to complete compromise of the server, allowing for remote code execution. The attacker can then pivot to other systems, steal sensitive information, or cause significant disruption. While the &ldquo;Host Files Locally - Gravatars&rdquo; option is disabled by default, any instance where this option is enabled is at critical risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the Breeze Cache plugin to the latest version to patch CVE-2026-3844.</li>
<li>Disable the &ldquo;Host Files Locally - Gravatars&rdquo; setting in the Breeze Cache plugin if it is enabled.</li>
<li>Deploy the Sigma rules provided below to your SIEM to detect potential exploitation attempts.</li>
<li>Monitor web server logs for suspicious file uploads and requests to unusual file extensions using the provided Sigma rules.</li>
<li>Implement strict file upload policies and validation mechanisms on all web applications to prevent arbitrary file uploads.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>wordpress</category><category>plugin</category><category>file-upload</category><category>rce</category></item><item><title>MindsDB Unrestricted File Upload Vulnerability (CVE-2026-7711)</title><link>https://feed.craftedsignal.io/briefs/2024-01-26-mindsdb-upload/</link><pubDate>Fri, 26 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-26-mindsdb-upload/</guid><description>CVE-2026-7711 allows for remote, unrestricted file uploads in MindsDB up to version 26.01 due to insufficient validation in the `exec` function of `proc_wrapper.py`, potentially leading to code execution or data exfiltration.</description><content:encoded><![CDATA[<p>A critical vulnerability, CVE-2026-7711, exists in MindsDB, an open-source machine learning platform, up to version 26.01. This flaw resides within the <code>exec</code> function of the <code>mindsdb/integrations/handlers/byom_handler/proc_wrapper.py</code> file, a component of the Engine Handler. The vulnerability allows a remote attacker to perform unrestricted file uploads due to a lack of input validation. Public exploits are available, making exploitation more likely. Successful exploitation could lead to arbitrary code execution on the MindsDB server, potentially compromising the entire system and any data it manages. The vendor was notified but has not responded.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a MindsDB instance running a vulnerable version (&lt;= 26.01).</li>
<li>The attacker crafts a malicious request targeting the <code>exec</code> function within <code>mindsdb/integrations/handlers/byom_handler/proc_wrapper.py</code>.</li>
<li>This request includes a payload designed to bypass any existing file type or size restrictions.</li>
<li>The vulnerable <code>exec</code> function processes the request without proper validation.</li>
<li>The attacker uploads an arbitrary file, such as a web shell or a malicious executable, to a writeable directory on the server.</li>
<li>The attacker executes the uploaded file, gaining code execution on the server.</li>
<li>The attacker leverages the gained access to escalate privileges, move laterally within the network, and potentially exfiltrate sensitive data or install malware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7711 can have severe consequences. An attacker could gain complete control over the MindsDB server, potentially leading to data breaches, service disruption, or further malicious activities within the affected network. Given the nature of MindsDB as a machine learning platform, the data stored or processed by it is highly sensitive, increasing the potential damage. Without remediation, any instance running an affected version is susceptible to remote compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade MindsDB to a version greater than 26.01 to remediate CVE-2026-7711.</li>
<li>Deploy the Sigma rule &ldquo;Detect MindsDB Unrestricted Upload Attempt&rdquo; to identify exploitation attempts targeting the vulnerable <code>exec</code> function.</li>
<li>Monitor web server logs for suspicious POST requests containing file uploads to paths associated with the <code>byom_handler</code>.</li>
<li>Implement strict file upload restrictions and validation on the MindsDB server, even after patching, as a defense-in-depth measure.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve</category><category>vulnerability</category><category>file-upload</category></item><item><title>WordPress Drag and Drop File Upload Plugin Vulnerable to Arbitrary File Upload (CVE-2026-5364)</title><link>https://feed.craftedsignal.io/briefs/2024-01-wordpress-plugin-upload/</link><pubDate>Wed, 03 Jan 2024 18:23:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-wordpress-plugin-upload/</guid><description>The Drag and Drop File Upload for Contact Form 7 plugin for WordPress is vulnerable to arbitrary file upload in versions up to 1.1.3, allowing unauthenticated attackers to upload arbitrary PHP files by manipulating the file type parameter and exploiting extension sanitization vulnerabilities.</description><content:encoded><![CDATA[<p>The Drag and Drop File Upload for Contact Form 7 plugin for WordPress, in versions up to and including 1.1.3, contains an arbitrary file upload vulnerability tracked as CVE-2026-5364. The flaw stems from insufficient sanitization of file extensions during the upload process. Specifically, the plugin extracts the file extension before sanitization and allows the file type parameter to be controlled by the attacker. Furthermore, validation occurs on the unsanitized extension, while the file is saved with a sanitized extension, stripping special characters like &lsquo;$&rsquo; during the save. While an .htaccess file and name randomization are present, these restrictions may be bypassable in certain configurations or by exploiting other vulnerabilities. This vulnerability could allow unauthenticated attackers to upload arbitrary PHP files to the web server, potentially leading to remote code execution (RCE).</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a WordPress website using a vulnerable version (&lt;= 1.1.3) of the &ldquo;Drag and Drop File Upload for Contact Form 7&rdquo; plugin.</li>
<li>The attacker crafts a malicious HTTP POST request targeting the plugin&rsquo;s upload endpoint, typically <code>/wp-content/plugins/drag-and-drop-multiple-file-upload-contact-form-7/upload.php</code>.</li>
<li>The POST request includes a file with a manipulated extension, such as <code>evil.php$.jpg</code>, where <code>evil.php</code> is the malicious PHP payload and <code>$.jpg</code> is designed to be sanitized to <code>.jpg</code>.</li>
<li>The attacker modifies the <code>file type</code> parameter in the request to reflect the original manipulated file extension (<code>evil.php$.jpg</code>).</li>
<li>The plugin validates the extension against administrator-configured types but, due to the unsanitized extension and attacker control over the file type parameter, the malicious file passes validation.</li>
<li>The plugin sanitizes the extension, removing the <code>$</code> character, resulting in a file saved with the extension <code>.php</code>.</li>
<li>The attacker attempts to access the uploaded PHP file via a direct HTTP request to <code>/wp-content/uploads/&lt;random_name&gt;.php</code>.</li>
<li>If the <code>.htaccess</code> restrictions are bypassed (e.g., due to misconfiguration or another vulnerability), the web server executes the malicious PHP code, granting the attacker remote code execution.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-5364 allows unauthenticated attackers to upload and execute arbitrary PHP code on the target WordPress server. This can lead to complete compromise of the website, including defacement, data theft, and installation of backdoors. While the presence of <code>.htaccess</code> and name randomization mitigates the risk, these protections may be bypassed, especially when combined with other vulnerabilities or misconfigurations. Given the widespread use of WordPress and its plugins, this vulnerability poses a significant risk to a large number of websites. The CVSS v3.1 base score is 8.1, indicating a high severity vulnerability.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the &ldquo;Drag and Drop File Upload for Contact Form 7&rdquo; plugin to the latest version (greater than 1.1.3) to patch CVE-2026-5364.</li>
<li>Implement a Web Application Firewall (WAF) rule to inspect and block requests containing suspicious file extensions in the POST parameters targeting the plugin&rsquo;s upload endpoint (<code>/wp-content/plugins/drag-and-drop-multiple-file-upload-contact-form-7/upload.php</code>).</li>
<li>Deploy the Sigma rule <code>Detect Suspicious File Upload via Drag and Drop CF7</code> to identify exploitation attempts in web server logs (cs-uri-query).</li>
<li>Review and harden <code>.htaccess</code> configurations to ensure that PHP execution is restricted in the <code>/wp-content/uploads/</code> directory.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>wordpress</category><category>file-upload</category><category>rce</category><category>plugin</category><category>CVE-2026-5364</category></item><item><title>Weaver E-office Unauthenticated Arbitrary File Upload Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-weaver-eoffice-upload/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-weaver-eoffice-upload/</guid><description>Weaver E-office versions prior to 10.0_20221201 are vulnerable to unauthenticated arbitrary file upload in the OfficeServer.php endpoint, allowing attackers to upload PHP webshells and achieve remote code execution.</description><content:encoded><![CDATA[<p>Weaver E-office, a web-based office automation system, is vulnerable to an unauthenticated arbitrary file upload vulnerability (CVE-2022-50993) affecting versions prior to 10.0_20221201. The vulnerability exists within the <code>OfficeServer.php</code> endpoint, allowing remote attackers to upload arbitrary files without authentication. This is achieved by sending multipart POST requests with manipulated filenames and content types. The Shadowserver Foundation observed initial exploitation evidence on October 10, 2022. Successful exploitation enables attackers to upload malicious PHP webshells to the Document directory and execute them via HTTP GET requests, leading to remote code execution on the affected server as the web server user. This can compromise the confidentiality, integrity, and availability of the E-office system and the underlying server.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker sends a crafted HTTP POST request to the <code>OfficeServer.php</code> endpoint.</li>
<li>The POST request includes a multipart form with a file upload field.</li>
<li>The attacker sets an arbitrary filename for the uploaded file, typically with a <code>.php</code> extension.</li>
<li>The attacker disguises the content type of the uploaded file to bypass basic server-side checks.</li>
<li>The server saves the uploaded file (a PHP webshell) to the Document directory.</li>
<li>The attacker sends an HTTP GET request to the uploaded PHP webshell file.</li>
<li>The web server executes the PHP code within the uploaded file.</li>
<li>The attacker achieves remote code execution as the web server user, enabling further malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2022-50993 allows an unauthenticated attacker to execute arbitrary code on the affected Weaver E-office server. This can lead to complete system compromise, data theft, modification of sensitive data, and disruption of services. The vulnerability has a CVSS v3.1 base score of 9.8, indicating its critical severity. While the number of victims and specific sectors targeted are not detailed, organizations using vulnerable versions of Weaver E-office are at high risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Weaver E-office to version 10.0_20221201 or later to patch CVE-2022-50993.</li>
<li>Deploy the Sigma rule &ldquo;Detect Weaver E-office Webshell Upload&rdquo; to detect malicious PHP file uploads to the <code>OfficeServer.php</code> endpoint.</li>
<li>Monitor web server access logs for requests to the Document directory with <code>.php</code> extensions, indicative of webshell execution.</li>
<li>Implement web application firewall (WAF) rules to block suspicious POST requests to <code>OfficeServer.php</code> with arbitrary file upload attempts.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2022-50993</category><category>file-upload</category><category>webshell</category><category>rce</category><category>e-office</category></item></channel></rss>