<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Genealogy — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/genealogy/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 07 Apr 2026 19:16:46 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/genealogy/feed.xml" rel="self" type="application/rss+xml"/><item><title>Genealogy PHP Application Broken Access Control Vulnerability (CVE-2026-39355)</title><link>https://feed.craftedsignal.io/briefs/2026-04-genealogy-acl/</link><pubDate>Tue, 07 Apr 2026 19:16:46 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-genealogy-acl/</guid><description>A critical broken access control vulnerability (CVE-2026-39355) in Genealogy PHP application versions prior to 5.9.1 allows authenticated users to transfer ownership of arbitrary teams, leading to complete takeover of team workspaces and unrestricted data access.</description><content:encoded><![CDATA[<p>Genealogy is a family tree PHP application that, prior to version 5.9.1, contained a critical broken access control vulnerability identified as CVE-2026-39355. This flaw allows any authenticated user to transfer ownership of non-personal teams to themselves without proper authorization checks. This unauthorized ownership transfer leads to complete takeover of other users’ team workspaces, granting the attacker unrestricted access to all genealogy data associated with the compromised team. This vulnerability poses a significant risk to data confidentiality and integrity within organizations using affected versions of the Genealogy application. Version 5.9.1 addresses and resolves this vulnerability.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker authenticates to the Genealogy application with valid user credentials.</li>
<li>The attacker identifies a target &ldquo;team&rdquo; within the application that is not their own.</li>
<li>The attacker crafts a malicious HTTP request to the application&rsquo;s team ownership transfer functionality, specifying the target team and the attacker&rsquo;s user ID as the new owner.</li>
<li>Due to the broken access control vulnerability (CVE-2026-39355), the application fails to validate the attacker&rsquo;s authorization to perform the ownership transfer.</li>
<li>The application incorrectly updates the team&rsquo;s ownership data, assigning ownership to the attacker.</li>
<li>The attacker now possesses full administrative control over the compromised team&rsquo;s workspace and data.</li>
<li>The attacker accesses and exfiltrates sensitive genealogy data, including family trees, personal information, and other confidential records.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-39355 allows an attacker to gain complete control over targeted teams within the Genealogy application. This leads to unauthorized access to sensitive genealogy data, potentially impacting all users and families represented within the compromised teams. The impact includes data exfiltration, modification, or deletion, potentially causing significant reputational damage and legal liabilities. While the exact number of affected installations is unknown, all organizations running versions prior to 5.9.1 are vulnerable.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately upgrade the Genealogy application to version 5.9.1 or later to patch CVE-2026-39355.</li>
<li>Monitor web server logs for suspicious POST requests to team management endpoints, specifically those related to team ownership transfer. Use the provided Sigma rule <code>Detect Suspicious Genealogy Team Ownership Transfer</code> to detect unauthorized attempts.</li>
<li>Implement strict access control policies within the Genealogy application, ensuring that users can only access and modify data related to teams they are authorized to manage.</li>
<li>Enable detailed logging for all user authentication and authorization events within the Genealogy application to facilitate incident investigation.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>broken-access-control</category><category>php</category><category>genealogy</category><category>CVE-2026-39355</category></item></channel></rss>