<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Hardcoded-Credentials — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/hardcoded-credentials/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sun, 19 Apr 2026 14:16:11 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/hardcoded-credentials/feed.xml" rel="self" type="application/rss+xml"/><item><title>osuuu LightPicture Hardcoded Credentials Vulnerability (CVE-2026-6574)</title><link>https://feed.craftedsignal.io/briefs/2026-04-lightpicture-hardcoded-creds/</link><pubDate>Sun, 19 Apr 2026 14:16:11 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-lightpicture-hardcoded-creds/</guid><description>CVE-2026-6574 allows remote attackers to manipulate the 'key' argument in the /public/install/lp.sql file via the API Upload Endpoint in osuuu LightPicture &lt;= 1.2.2, leading to hardcoded credentials exposure.</description><content:encoded><![CDATA[<p>osuuu LightPicture, up to version 1.2.2, is vulnerable to a hardcoded credentials exposure vulnerability (CVE-2026-6574). This flaw resides within the API Upload Endpoint and is triggered when processing the <code>/public/install/lp.sql</code> file. An attacker can manipulate the <code>key</code> argument to exploit this vulnerability. The vendor has been notified about the vulnerability but has not responded. Public exploits are available, increasing the risk of exploitation. This vulnerability allows an attacker to potentially gain unauthorized access and control over the application.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies an instance of osuuu LightPicture running version 1.2.2 or earlier.</li>
<li>The attacker crafts a malicious HTTP request targeting the API Upload Endpoint.</li>
<li>The request includes a modified <code>key</code> argument within the <code>/public/install/lp.sql</code> file path.</li>
<li>The application processes the crafted request without proper sanitization.</li>
<li>Due to the manipulated <code>key</code> argument, the application exposes hardcoded credentials.</li>
<li>The attacker retrieves the exposed hardcoded credentials from the server&rsquo;s response.</li>
<li>The attacker leverages the acquired credentials to authenticate and gain unauthorized access to the application.</li>
<li>With unauthorized access, the attacker can perform malicious activities such as data theft, modification, or deletion.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-6574 can lead to complete compromise of the osuuu LightPicture application and potentially the underlying server. The vulnerability exposes hardcoded credentials, enabling attackers to bypass authentication and gain administrative privileges. The impact includes unauthorized access to sensitive data, modification of application settings, and potential disruption of service. The vulnerability affects all installations of osuuu LightPicture up to version 1.2.2.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect Suspicious LP.SQL Access</code> to identify attempts to access the vulnerable file (log source: webserver).</li>
<li>Apply input validation and sanitization to the <code>key</code> argument within the API Upload Endpoint to prevent manipulation (reference CVE-2026-6574).</li>
<li>Monitor web server logs for suspicious requests targeting the <code>/public/install/lp.sql</code> file with unusual parameters (log source: webserver).</li>
<li>If upgrading is not possible, implement a web application firewall (WAF) rule to block requests containing malicious patterns in the <code>key</code> argument (log source: firewall).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-6574</category><category>hardcoded-credentials</category><category>web-application</category></item><item><title>Hardcoded Storage Credentials in Mobile App and Device Firmware (CVE-2025-10681)</title><link>https://feed.craftedsignal.io/briefs/2026-04-hardcoded-credentials/</link><pubDate>Fri, 03 Apr 2026 21:17:08 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-hardcoded-credentials/</guid><description>CVE-2025-10681 describes a vulnerability where hardcoded storage credentials in a mobile app and device firmware, with inadequate permission limits and lack of expiration, could lead to unauthorized access to production storage containers.</description><content:encoded><![CDATA[<p>CVE-2025-10681 exposes a critical vulnerability stemming from the presence of hardcoded storage credentials within a mobile application and its corresponding device firmware. These credentials, unfortunately, lack sufficient restrictions on end-user permissions and are not configured to expire after a reasonable period. The affected systems are not explicitly mentioned, but the advisory was published by ICS-CERT implying the vulnerability exists within an Industrial Control System or similar operational technology environment. This flaw allows a malicious actor to bypass standard authentication mechanisms and directly access sensitive data stored within production storage containers, potentially causing significant data breaches and operational disruption. Defenders should prioritize identifying devices using default credentials, especially in OT environments where a compromise could have physical consequences.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains access to the mobile application or device firmware through reverse engineering or by acquiring a compromised device.</li>
<li>Attacker extracts the hardcoded storage credentials from the mobile app or firmware.</li>
<li>Attacker leverages the extracted credentials to authenticate directly with the production storage container.</li>
<li>Due to the lack of adequate permission restrictions, the attacker gains read/write access to sensitive data within the storage container.</li>
<li>Attacker accesses sensitive data like configurations, process data, or customer data.</li>
<li>Attacker modifies sensitive data like configurations causing a denial of service, or operational disruption.</li>
<li>Attacker gains complete control over the storage container and potentially linked resources.</li>
<li>The attacker exfiltrates sensitive data or uses it to further compromise the ICS/OT environment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2025-10681 could lead to unauthorized access to critical production data, system configurations, and potentially other sensitive information. Depending on the scope of the storage container&rsquo;s access, attackers could disrupt industrial processes, steal intellectual property, or hold data for ransom. Since this vulnerability relates to ICS/OT environments, compromise of production data could lead to equipment damage, environmental hazards, or safety issues.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Implement the detection rule <code>Detect Hardcoded Credentials in Mobile App/Firmware Unpacking</code> to detect attempts to unpack or analyze application binaries or firmware images that may contain hardcoded credentials (logsource: file_event, process_creation).</li>
<li>Examine network traffic for authentication attempts to storage resources using unusual user agents or originating from unusual IP addresses that might indicate credential compromise, using the detection rule <code>Detect Unusual Authentication to Storage Resources</code>. (logsource: network_connection)</li>
<li>Review and update mobile application and device firmware development practices to eliminate the use of hardcoded credentials, referencing CWE-798 (Use of Hard-coded Credentials).</li>
<li>Monitor file access and modifications to production storage containers, looking for unusual activity that might indicate unauthorized access following exploitation of CVE-2025-10681 (logsource: file_event).</li>
<li>Use vulnerability scanning tools to identify devices and applications vulnerable to CVE-2025-10681.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2025-10681</category><category>hardcoded-credentials</category><category>ics-cert</category><category>ot</category></item><item><title>GoHarbor Harbor v2.15.0 and Below Vulnerable to Hardcoded Credentials</title><link>https://feed.craftedsignal.io/briefs/2026-03-goharbor-hardcoded-creds/</link><pubDate>Wed, 25 Mar 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-goharbor-hardcoded-creds/</guid><description>GoHarbor Harbor version 2.15.0 and below is vulnerable to the use of hard-coded credentials, allowing an attacker to use the default password and gain unauthorized access to the web UI.</description><content:encoded><![CDATA[<p>GoHarbor Harbor, a popular open-source cloud native registry, is susceptible to a critical vulnerability (CVE-2026-4404) in versions 2.15.0 and below. This flaw stems from the use of hardcoded credentials, specifically a default password, which, if unchanged, allows unauthorized access to the web UI. An attacker exploiting this vulnerability can bypass authentication and potentially gain full control over the Harbor instance. This poses a significant risk to organizations using affected Harbor versions, as it can lead to data breaches, container image tampering, and other malicious activities. The vulnerability was reported in March 2026, and defenders should prioritize upgrading or mitigating affected instances.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a GoHarbor Harbor instance running version 2.15.0 or below.</li>
<li>Attacker accesses the web UI login page of the Harbor instance.</li>
<li>Attacker enters the default username (&ldquo;admin&rdquo;) and password (&ldquo;Harbor12345&rdquo;), as documented in the official GoHarbor documentation.</li>
<li>The Harbor instance authenticates the attacker due to the use of default credentials.</li>
<li>Attacker gains access to the Harbor web UI with administrator privileges.</li>
<li>Attacker can now manage container images, repositories, and users within the Harbor instance.</li>
<li>Attacker may pull sensitive images, inject malicious code into existing images, or create new malicious images.</li>
<li>The attacker uses the now compromised Harbor instance to distribute malicious container images throughout the organization&rsquo;s infrastructure, leading to widespread compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to gain complete control over a GoHarbor Harbor instance. This can lead to the compromise of container images, potentially injecting malware into the software supply chain. The impact could range from data exfiltration and service disruption to full system compromise, depending on the privileges associated with the Harbor instance. Given the widespread use of GoHarbor in cloud-native environments, this vulnerability presents a significant risk to numerous organizations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately upgrade GoHarbor Harbor instances to a version greater than 2.15.0 to remediate CVE-2026-4404.</li>
<li>If upgrading is not immediately feasible, change the default &ldquo;admin&rdquo; password (&ldquo;Harbor12345&rdquo;) to a strong, unique password as outlined in the GoHarbor documentation.</li>
<li>Deploy the provided Sigma rule to detect login attempts using the default credentials against the Harbor web UI based on webserver logs.</li>
<li>Regularly review and update credentials for all services and applications to prevent the exploitation of default or hardcoded passwords.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>vulnerability</category><category>hardcoded-credentials</category><category>goharbor</category></item><item><title>AstrBotDevs AstrBot Vulnerability Leads to Hardcoded Credentials (CVE-2026-7579)</title><link>https://feed.craftedsignal.io/briefs/2024-01-astrbot-hardcoded-credentials/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-astrbot-hardcoded-credentials/</guid><description>CVE-2026-7579 describes a vulnerability in AstrBotDevs AstrBot up to version 4.16.0 where improper handling of the `auth.py` file in the dashboard component leads to hardcoded credentials being exposed, enabling remote exploitation.</description><content:encoded><![CDATA[<p>A critical security vulnerability, CVE-2026-7579, has been identified in AstrBotDevs AstrBot, affecting versions up to 4.16.0. The vulnerability lies within the Dashboard component, specifically in the <code>astrbot/dashboard/routes/auth.py</code> file. An unspecified processing flaw allows attackers to retrieve or leverage hardcoded credentials. The vulnerability can be exploited remotely and has been publicly disclosed, increasing the risk of exploitation. The vendor was notified, but did not respond to the disclosure. Successful exploitation could lead to unauthorized access to sensitive information or control over the AstrBot application.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable AstrBot instance running a version up to 4.16.0.</li>
<li>Attacker sends a crafted request to the <code>astrbot/dashboard/routes/auth.py</code> endpoint.</li>
<li>The vulnerable code in <code>auth.py</code> processes the request improperly, exposing hardcoded credentials.</li>
<li>Attacker extracts the hardcoded credentials from the response.</li>
<li>Attacker uses the hardcoded credentials to authenticate to the AstrBot dashboard.</li>
<li>Attacker gains unauthorized access to administrative functions within the AstrBot application.</li>
<li>Attacker uses the compromised access to modify bot configurations or access user data.</li>
<li>Attacker leverages compromised bot to conduct malicious activity such as spam or data theft.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7579 allows a remote attacker to obtain hardcoded credentials, leading to complete control over the AstrBot application. This can result in unauthorized access to sensitive data, modification of bot configurations, and potential misuse of the bot for malicious purposes. The lack of vendor response exacerbates the risk, leaving users vulnerable to potential attacks.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade AstrBot to a patched version beyond 4.16.0 if a patch becomes available from AstrBotDevs to remediate CVE-2026-7579.</li>
<li>Monitor web server logs for suspicious requests targeting the <code>astrbot/dashboard/routes/auth.py</code> endpoint as described in the Attack Chain.</li>
<li>Deploy the Sigma rule detecting access to the vulnerable <code>auth.py</code> route to identify potential exploitation attempts.</li>
<li>Implement strong authentication and authorization mechanisms to protect the AstrBot dashboard, mitigating the impact of hardcoded credentials.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve</category><category>hardcoded-credentials</category><category>web-application</category></item></channel></rss>