<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Misp — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/misp/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 30 Apr 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/misp/feed.xml" rel="self" type="application/rss+xml"/><item><title>Multiple Vulnerabilities in MISP Threat Intelligence Platform</title><link>https://feed.craftedsignal.io/briefs/2026-04-misp-vulns/</link><pubDate>Thu, 30 Apr 2026 00:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-misp-vulns/</guid><description>Multiple vulnerabilities in MISP versions prior to 2.5.37 allow attackers to perform privilege escalation, SQL injection (SQLi), and security policy bypass.</description><content:encoded><![CDATA[<p>Multiple vulnerabilities have been discovered in MISP (Malware Information Sharing Platform and Threat Sharing) versions prior to 2.5.37. These flaws could allow a remote attacker to perform a variety of malicious actions, including escalating privileges to gain unauthorized access, injecting SQL code to potentially read or modify database contents, and bypassing existing security policies to execute restricted operations. These vulnerabilities pose a significant risk to organizations using MISP for threat intelligence, potentially leading to data breaches, unauthorized access to sensitive information, or disruption of threat intelligence operations. Users should upgrade to version 2.5.37 or later as soon as possible.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a vulnerable MISP instance running a version prior to 2.5.37.</li>
<li>The attacker crafts a malicious SQL injection payload designed to exploit a SQLi vulnerability within the MISP application, potentially targeting input fields or API endpoints.</li>
<li>The attacker sends the crafted SQL injection payload to the vulnerable MISP instance through a web request or API call.</li>
<li>The MISP application improperly processes the malicious SQL payload, leading to the execution of attacker-controlled SQL commands against the underlying database.</li>
<li>The attacker exploits a privilege escalation vulnerability to gain elevated privileges within the MISP application, potentially bypassing access controls.</li>
<li>The attacker leverages the security policy bypass vulnerability to circumvent security restrictions and execute unauthorized actions within the MISP system.</li>
<li>The attacker gains unauthorized access to sensitive data stored within the MISP instance, such as threat intelligence reports, indicators of compromise (IOCs), or user credentials.</li>
<li>The attacker exfiltrates the stolen data or uses the compromised system to launch further attacks against other systems or organizations.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities could allow an attacker to gain unauthorized access to sensitive threat intelligence data stored within MISP, potentially impacting organizations relying on MISP for security operations. An attacker could steal sensitive data, modify existing intelligence, or inject false information, impacting trust in the platform. While the number of victims is not specified in the report, any organization using a vulnerable version of MISP is at risk. The severity of impact would depend on the sensitivity of the data stored within the compromised MISP instance.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade MISP to version 2.5.37 or later to remediate the vulnerabilities as per the vendor&rsquo;s security bulletin.</li>
<li>Deploy web application firewall (WAF) rules to detect and block SQL injection attempts targeting MISP, mitigating potential SQLi exploitation.</li>
<li>Monitor MISP logs (category <code>webserver</code>, product <code>linux</code>) for suspicious activity, such as unexpected SQL errors or unauthorized access attempts, to identify potential exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>misp</category><category>vulnerability</category><category>sqli</category><category>privilege-escalation</category><category>security-policy-bypass</category></item></channel></rss>