<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Luanti — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/luanti/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 16 Apr 2026 01:16:11 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/luanti/feed.xml" rel="self" type="application/rss+xml"/><item><title>Luanti LuaJIT Sandbox Escape (CVE-2026-40959)</title><link>https://feed.craftedsignal.io/briefs/2026-04-luanti-sandbox-escape/</link><pubDate>Thu, 16 Apr 2026 01:16:11 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-luanti-sandbox-escape/</guid><description>Luanti 5 before 5.15.2, when LuaJIT is used, allows a Lua sandbox escape via a crafted mod, potentially leading to arbitrary code execution.</description><content:encoded><![CDATA[<p>CVE-2026-40959 describes a critical vulnerability in Luanti 5, specifically in versions prior to 5.15.2, when used with LuaJIT. The vulnerability allows a malicious actor to escape the Lua sandbox environment by exploiting a crafted &ldquo;mod.&rdquo; This escape could lead to unauthorized access and control over the system, potentially allowing for arbitrary code execution outside of the intended sandbox. The vulnerability was reported to MITRE and assigned a CVSS v3.1 score of 9.3, indicating a critical severity. This vulnerability poses a significant threat to systems relying on Luanti for sandboxed Lua execution.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker crafts a malicious Lua &ldquo;mod&rdquo; specifically designed to exploit the sandbox escape vulnerability in Luanti.</li>
<li>The malicious mod leverages weaknesses in the LuaJIT implementation within Luanti to bypass sandbox restrictions.</li>
<li>The crafted mod is loaded into a vulnerable Luanti 5 instance.</li>
<li>Upon execution of the malicious mod, the attacker gains the ability to execute arbitrary Lua code outside the intended sandbox.</li>
<li>The attacker can then utilize this escaped context to interact with the underlying operating system.</li>
<li>Using OS-level access, the attacker escalates privileges further.</li>
<li>The attacker installs persistent backdoors or other malicious software.</li>
<li>Finally, the attacker achieves complete system compromise, exfiltrates sensitive data, or causes other damage.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-40959 could lead to a complete compromise of systems utilizing vulnerable versions of Luanti 5 with LuaJIT. An attacker could gain unauthorized access to sensitive data, install malware, or disrupt critical services. Given the critical CVSS score of 9.3, the potential impact is high, especially in environments where Luanti is used to sandbox untrusted Lua code. The number of potential victims depends on the adoption rate of Luanti 5 and the prevalence of LuaJIT usage within those installations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Luanti to version 5.15.2 or later to patch CVE-2026-40959.</li>
<li>Monitor for the loading of unsigned or untrusted Lua mods within Luanti environments (see process_creation rule below).</li>
<li>Inspect Lua mods for suspicious code patterns indicative of sandbox escape attempts (develop custom rules based on the specific LuaJIT weaknesses exploited).</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>sandbox-escape</category><category>luanti</category><category>luajit</category><category>cve-2026-40959</category></item><item><title>Luanti 5 Improper Access Control Vulnerability (CVE-2026-40960)</title><link>https://feed.craftedsignal.io/briefs/2026-04-luanti-access/</link><pubDate>Thu, 16 Apr 2026 01:16:11 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-luanti-access/</guid><description>Luanti 5 before 5.15.2 allows unintended access to an insecure environment if a crafted mod intercepts requests when secure mods are enabled, potentially leading to unauthorized access and control.</description><content:encoded><![CDATA[<p>Luanti 5, a software package (details not provided in source), prior to version 5.15.2, suffers from an improper access control vulnerability (CVE-2026-40960). This flaw can be exploited when at least one mod is configured as either <code>secure.trusted_mods</code> or <code>secure.http_mods</code>. Under these conditions, a specially crafted malicious mod can intercept requests intended for the insecure environment or HTTP API, effectively bypassing intended security controls. The vulnerability allows the malicious mod to gain unauthorized access to sensitive resources, potentially leading to data breaches or system compromise. Organizations using affected versions of Luanti 5 are urged to upgrade to version 5.15.2 or implement mitigating controls to prevent exploitation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a Luanti 5 instance running a version prior to 5.15.2 with at least one mod configured as <code>secure.trusted_mods</code> or <code>secure.http_mods</code>.</li>
<li>The attacker crafts a malicious mod designed to intercept HTTP requests.</li>
<li>The attacker deploys the crafted mod to the Luanti 5 environment.</li>
<li>The malicious mod intercepts requests directed towards the insecure environment or HTTP API.</li>
<li>Due to the vulnerability, the malicious mod gains unauthorized access to the targeted environment or API.</li>
<li>The attacker leverages the gained access to perform unauthorized actions, such as reading sensitive data or manipulating system configurations.</li>
<li>The attacker exfiltrates sensitive data or establishes persistent access for future malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-40960 can lead to complete compromise of the insecure environment or HTTP API within Luanti 5. This could result in unauthorized access to sensitive data, modification of system configurations, or complete system takeover. The severity of the impact depends on the specific functionality and data exposed by the insecure environment, but could include data breaches, financial loss, or reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Luanti 5 to version 5.15.2 or later to patch CVE-2026-40960.</li>
<li>If upgrading is not immediately feasible, review the configuration of <code>secure.trusted_mods</code> and <code>secure.http_mods</code> and remove any untrusted or unnecessary mods.</li>
<li>Monitor Luanti 5 webserver logs for suspicious HTTP requests originating from unusual or newly deployed mods using the provided Sigma rule.</li>
<li>Implement strict access control policies for deploying and managing Luanti 5 mods to prevent unauthorized installation of malicious modules.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-40960</category><category>luanti</category><category>access-control</category></item></channel></rss>