<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Missing-Authorization — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/missing-authorization/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 23 Apr 2026 10:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/missing-authorization/feed.xml" rel="self" type="application/rss+xml"/><item><title>WeKan Missing Authorization Vulnerability in Integration REST API</title><link>https://feed.craftedsignal.io/briefs/2026-04-wekan-missing-auth/</link><pubDate>Thu, 23 Apr 2026 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-wekan-missing-auth/</guid><description>WeKan before 8.35 contains a missing authorization vulnerability in the Integration REST API endpoints, allowing authenticated board members to perform administrative actions without proper privilege verification, potentially leading to unauthorized data access and modification.</description><content:encoded><![CDATA[<p>WeKan, a collaborative Kanban board application, is vulnerable to a missing authorization issue in versions prior to 8.35. This flaw resides within the Integration REST API endpoints, where authenticated board members can execute administrative actions without sufficient privilege validation.  An attacker, if they are an authenticated user, can exploit this vulnerability to enumerate integrations, including webhook URLs, create new integrations, modify or delete existing integrations, and manage integration activities. The root cause is insufficient authorization checks within the JsonRoutes REST handlers. Successful exploitation can lead to unauthorized access to sensitive information and modification of board configurations.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains valid credentials for a WeKan board member account.</li>
<li>The attacker authenticates to the WeKan application via the standard login procedure.</li>
<li>The attacker sends a crafted HTTP request to the <code>/api/integration</code> endpoint without proper administrative privileges.</li>
<li>Due to missing authorization checks, the request is processed, and the attacker is able to enumerate existing integrations, including sensitive webhook URLs.</li>
<li>The attacker crafts another HTTP request to the <code>/api/integration</code> endpoint to create a new, malicious integration (e.g., a webhook that sends data to an external attacker-controlled server).</li>
<li>The attacker modifies existing integrations to redirect data flow to attacker-controlled endpoints.</li>
<li>The attacker deletes legitimate integrations, disrupting board functionality.</li>
<li>The attacker manages integration activities, potentially triggering malicious actions or gaining further information.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to perform administrative actions on WeKan boards without proper authorization. This can lead to the exposure of sensitive webhook URLs, unauthorized modification or deletion of integrations, and the creation of malicious integrations for data exfiltration or disruption. The CVSS v3.1 score of 8.3 indicates a high severity vulnerability with significant potential for data compromise and system impact. The number of affected WeKan installations is currently unknown, but organizations using WeKan for project management and collaboration are at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade WeKan to version 8.35 or later to patch CVE-2026-41454, addressing the missing authorization vulnerability as detailed in the <a href="#references">reference links</a>.</li>
<li>Deploy the Sigma rule &ldquo;Detect WeKan Integration API Abuse&rdquo; to identify potential exploitation attempts against the Integration REST API endpoints, monitoring webserver logs for unusual API requests.</li>
<li>Review and restrict access rights for WeKan board members, ensuring that only authorized personnel have administrative privileges to minimize the attack surface as outlined in the <a href="#overview">overview</a>.</li>
<li>Monitor webserver logs for requests to <code>/api/integration</code> with methods like POST, PUT, and DELETE originating from non-admin users.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>wekan</category><category>missing-authorization</category><category>rest-api</category><category>privilege-escalation</category></item><item><title>Gravity SMTP Plugin Missing Authorization Vulnerability (CVE-2026-4162)</title><link>https://feed.craftedsignal.io/briefs/2026-04-gravity-smtp-auth-bypass/</link><pubDate>Fri, 10 Apr 2026 10:16:04 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-gravity-smtp-auth-bypass/</guid><description>The Gravity SMTP plugin for WordPress is vulnerable to Missing Authorization, allowing authenticated attackers with subscriber-level access or higher to uninstall/deactivate the plugin and delete plugin options, and is also exploitable via Cross-Site Request Forgery.</description><content:encoded><![CDATA[<p>The Gravity SMTP plugin, a WordPress extension facilitating email sending through SMTP, contains a missing authorization vulnerability (CVE-2026-4162) affecting versions 2.1.4 and earlier. This flaw allows authenticated users with minimal subscriber-level permissions to perform administrative actions such as uninstalling and deactivating the plugin, as well as deleting its associated options. The vulnerability stems from the plugin failing to properly validate user authorization before executing sensitive functions. Additionally, the vulnerability can be exploited via a Cross-Site Request Forgery (CSRF) attack. Patches have been released in Gravity SMTP version 2.1.5 to address this security concern. Exploitation of this vulnerability allows low-privileged users to disrupt email functionality and potentially compromise WordPress configurations.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker authenticates to the WordPress site with subscriber-level or higher privileges.</li>
<li>The attacker crafts a malicious HTTP request to uninstall the Gravity SMTP plugin, leveraging the missing authorization vulnerability. This request targets the WordPress plugin management endpoint.</li>
<li>Alternatively, the attacker crafts a CSRF attack that tricks a privileged user into triggering the malicious HTTP request to uninstall the plugin.</li>
<li>The WordPress server receives the crafted request without proper authorization checks.</li>
<li>The plugin&rsquo;s uninstall function is executed, removing the Gravity SMTP plugin from the WordPress installation.</li>
<li>The attacker crafts another HTTP request to delete Gravity SMTP plugin options.</li>
<li>The WordPress server processes the request, and the plugin options are deleted from the database.</li>
<li>The Gravity SMTP plugin is uninstalled and deactivated, and its settings are removed, disrupting the email functionality of the WordPress site.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-4162 allows attackers with low-level privileges on a WordPress site to disable email functionality and manipulate plugin settings. While the number of affected installations remains unknown, the impact can be significant for organizations heavily reliant on WordPress for communication or critical business processes, potentially leading to disruption of services, loss of email functionality, and unauthorized access to sensitive data or configurations. The CVSS v3.1 score of 7.1 indicates a high severity, considering the ease of exploitation and the potential for widespread disruption.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the Gravity SMTP plugin to version 2.1.5 or later to patch CVE-2026-4162.</li>
<li>Monitor WordPress access logs for unauthorized requests targeting the plugin management endpoints to detect potential exploitation attempts. Deploy the Sigma rule <code>Detect WordPress Plugin Uninstall via Missing Auth</code> to identify suspicious activity.</li>
<li>Implement CSRF protection mechanisms within WordPress plugins to mitigate the risk of CSRF-based exploitation.</li>
<li>Review WordPress user roles and permissions to minimize the attack surface and restrict access to sensitive functionalities.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>wordpress</category><category>missing-authorization</category><category>plugin</category><category>cve-2026-4162</category></item><item><title>SimpleHelp Missing Authorization Vulnerability Leads to Privilege Escalation</title><link>https://feed.craftedsignal.io/briefs/2024-06-simplehelp-privesc/</link><pubDate>Tue, 25 Jun 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-06-simplehelp-privesc/</guid><description>A missing authorization vulnerability in SimpleHelp (CVE-2024-57726) allows low-privileged technicians to create API keys with excessive permissions, potentially escalating privileges to the server admin role.</description><content:encoded><![CDATA[<p>CVE-2024-57726 affects SimpleHelp, a remote support software solution. This vulnerability stems from a missing authorization check, allowing low-privileged technicians to create API keys with elevated permissions beyond their intended scope. Specifically, these API keys can be manipulated to grant server admin privileges, potentially enabling unauthorized access to sensitive data and critical system configurations. The vulnerability impacts SimpleHelp versions 5.5.7 and earlier. Successful exploitation allows attackers to bypass intended access controls, gain complete control over the SimpleHelp server, and potentially pivot to other systems within the network. This vulnerability was disclosed in January 2025, and organizations using affected SimpleHelp versions are at risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A low-privileged technician logs into the SimpleHelp console with their existing credentials.</li>
<li>The technician leverages the missing authorization vulnerability to create a new API key.</li>
<li>During API key creation, the attacker manipulates the request to assign excessive permissions beyond their authorized access level.</li>
<li>The attacker uses the newly created API key to authenticate against the SimpleHelp API.</li>
<li>The attacker leverages the elevated permissions granted by the manipulated API key to access administrative functions.</li>
<li>The attacker escalates their privileges to the server admin role, granting them complete control over the SimpleHelp server.</li>
<li>The attacker uses the server admin role to access sensitive data, modify system configurations, or create new administrative accounts.</li>
<li>The attacker potentially pivots to other systems within the network using the compromised SimpleHelp server as a stepping stone.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2024-57726 allows low-privileged technicians, or malicious actors who have compromised technician accounts, to escalate their privileges to the server admin role in SimpleHelp. This grants them complete control over the SimpleHelp server, potentially leading to data breaches, system downtime, and further compromise of the network. The vulnerability affects organizations using SimpleHelp versions 5.5.7 and earlier. The number of victims and specific sectors targeted remain unknown, but the potential impact is significant due to the sensitive nature of remote support software.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply mitigations provided by SimpleHelp to patch the missing authorization vulnerability in SimpleHelp versions 5.5.7 and earlier (reference: <a href="https://simple-help.com/kb---security-vulnerabilities-01-2025#security-vulnerabilities-in-simplehelp-5-5-7-and-earlier)">https://simple-help.com/kb---security-vulnerabilities-01-2025#security-vulnerabilities-in-simplehelp-5-5-7-and-earlier)</a>.</li>
<li>Deploy the Sigma rule <code>Detect Suspicious SimpleHelp API Key Creation</code> to identify attempts to create API keys with excessive permissions.</li>
<li>Follow applicable BOD 22-01 guidance for cloud services or discontinue use of SimpleHelp if mitigations are unavailable.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>privilege-escalation</category><category>missing-authorization</category><category>cloud</category></item></channel></rss>