<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Foreman — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/foreman/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 26 Mar 2026 13:16:27 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/foreman/feed.xml" rel="self" type="application/rss+xml"/><item><title>Foreman WebSocket Proxy Command Injection Vulnerability (CVE-2026-1961)</title><link>https://feed.craftedsignal.io/briefs/2026-03-foreman-rce/</link><pubDate>Thu, 26 Mar 2026 13:16:27 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-foreman-rce/</guid><description>A command injection vulnerability exists in Foreman's WebSocket proxy, enabling remote code execution on the Foreman server via a malicious compute resource server when a user accesses VM VNC console functionality.</description><content:encoded>&lt;p>CVE-2026-1961 identifies a critical command injection vulnerability within the Foreman application, specifically affecting the WebSocket proxy implementation. This flaw stems from the use of unsanitized hostname values obtained from compute resource providers during the construction of shell commands. An attacker who controls a malicious compute resource server can exploit this vulnerability to execute arbitrary code on the Foreman server. This is achieved when a user interacts with the VM VNC…&lt;/p>
</content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>command-injection</category><category>rce</category><category>foreman</category></item></channel></rss>