<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Pachno — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/pachno/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 14 Apr 2026 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/pachno/feed.xml" rel="self" type="application/rss+xml"/><item><title>Pachno 1.0.6 XML External Entity Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-pachno-xxe/</link><pubDate>Tue, 14 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-pachno-xxe/</guid><description>Pachno 1.0.6 is vulnerable to XML external entity injection, allowing unauthenticated attackers to read arbitrary files by injecting malicious XML entities into wiki content due to unsafe XML parsing in the TextParser helper.</description><content:encoded><![CDATA[<p>Pachno 1.0.6 is susceptible to an XML External Entity (XXE) injection vulnerability, identified as CVE-2026-40042. This flaw resides in the TextParser helper component, where unsafe XML parsing occurs. An unauthenticated attacker can exploit this vulnerability to read arbitrary files from the server. The attack involves injecting malicious XML entities into various parts of the application, including wiki table syntax, issue descriptions, comments, and wiki articles. The vulnerability is triggered by the use of the simplexml_load_string() function without proper restrictions (LIBXML_NONET), enabling the resolution of external entities. This issue poses a significant risk as it allows unauthorized access to sensitive data stored on the server.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a Pachno 1.0.6 instance.</li>
<li>The attacker crafts a malicious XML payload containing an external entity declaration. This payload aims to read a sensitive file on the server, such as <code>/etc/passwd</code>.</li>
<li>The attacker injects the malicious XML payload into a wiki page, issue description, or comment using wiki table syntax or inline tags.</li>
<li>The application&rsquo;s TextParser helper processes the injected content using simplexml_load_string() without the LIBXML_NONET flag.</li>
<li>The XML parser attempts to resolve the external entity, initiating a request to read the specified file.</li>
<li>The targeted file&rsquo;s contents are embedded into the XML response due to the XXE vulnerability.</li>
<li>The attacker retrieves the parsed XML response, which now contains the content of the targeted file, thus achieving unauthorized file access.</li>
<li>The attacker can repeat this process to access other sensitive files, potentially gaining critical information about the system and its configuration.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this XXE vulnerability (CVE-2026-40042) in Pachno 1.0.6 allows an unauthenticated attacker to read arbitrary files from the server. The impact can range from exposing sensitive configuration files and application code to potentially gaining access to user credentials or other confidential data. This information could be used for further malicious activities, such as lateral movement within the network or data exfiltration. Given the ease of exploitation and the potential for significant data leakage, this vulnerability represents a critical risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to a patched version of Pachno that addresses CVE-2026-40042 by implementing proper XML parsing and disabling external entity resolution.</li>
<li>Implement input validation and sanitization to prevent the injection of malicious XML payloads into wiki pages, issue descriptions, and comments.</li>
<li>Monitor web server logs for requests containing XML entity declarations, which may indicate attempted exploitation of this vulnerability. See the provided Sigma rule for guidance.</li>
<li>Block the domains <code>www.vulncheck.com</code> and <code>www.zeroscience.mk</code> at the network level to prevent access to related advisory information, hindering attacker reconnaissance.</li>
<li>Deploy the Sigma rules in this brief to your SIEM and tune for your environment.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>xxe</category><category>cve-2026-40042</category><category>pachno</category><category>web-application</category></item></channel></rss>