<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Php — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/php/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 15 Apr 2026 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/php/feed.xml" rel="self" type="application/rss+xml"/><item><title>Composer Command Injection via Malicious Perforce Repository</title><link>https://feed.craftedsignal.io/briefs/2026-04-composer-command-injection/</link><pubDate>Wed, 15 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-composer-command-injection/</guid><description>Composer is vulnerable to command injection via a malicious Perforce repository due to improper escaping of user-supplied Perforce connection parameters, potentially leading to arbitrary command execution in the context of the user running Composer.</description><content:encoded><![CDATA[<p>Composer, a dependency manager for PHP, is susceptible to a command injection vulnerability (CVE-2026-40176) in versions 2.0.0 before 2.2.27 and versions 2.3.0 before 2.9.6. The vulnerability resides in the <code>Perforce::generateP4Command()</code> method, which improperly escapes user-supplied Perforce connection parameters (port, user, client) when constructing shell commands. This allows an attacker who controls a repository configuration, specifically within a malicious <code>composer.json</code> file declaring a Perforce VCS repository, to inject arbitrary commands. The injected commands are executed in the context of the user running Composer, even if Perforce is not installed. This vulnerability can be exploited if Composer is run on untrusted projects with attacker-supplied <code>composer.json</code> files.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious <code>composer.json</code> file.</li>
<li>The malicious <code>composer.json</code> declares a Perforce VCS repository.</li>
<li>The <code>composer.json</code> contains injected commands within the Perforce connection parameters (port, user, client).</li>
<li>A user unknowingly executes a Composer command (e.g., <code>composer install</code>) in a directory containing the malicious <code>composer.json</code>.</li>
<li>Composer parses the <code>composer.json</code> and calls the <code>Perforce::generateP4Command()</code> method.</li>
<li>The <code>Perforce::generateP4Command()</code> method constructs a shell command using the attacker-controlled, unescaped Perforce connection parameters.</li>
<li>Composer executes the injected command via <code>proc_open</code> or similar functions.</li>
<li>The attacker achieves arbitrary command execution in the context of the user running Composer, potentially leading to sensitive information disclosure, system compromise, or further malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows attackers to execute arbitrary commands on the victim&rsquo;s system with the privileges of the user running Composer. This can lead to complete system compromise, data exfiltration, or denial of service. While the number of victims is currently unknown, any system running a vulnerable version of Composer and processing untrusted <code>composer.json</code> files is at risk. The primary attack vector involves tricking developers into running Composer on projects containing malicious <code>composer.json</code> files.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Composer to version 2.2.27 or 2.9.6 or later to patch CVE-2026-40176.</li>
<li>Carefully inspect <code>composer.json</code> files from untrusted sources before running Composer to verify Perforce-related fields contain valid values.</li>
<li>Deploy the Sigma rule to detect command execution with suspicious arguments when composer executes and tune for your environment.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>composer</category><category>command-injection</category><category>php</category></item><item><title>PHPGurukul Daily Expense Tracking System SQL Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-php-gurukul-sqli/</link><pubDate>Tue, 14 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-php-gurukul-sqli/</guid><description>A remote SQL injection vulnerability exists in PHPGurukul Daily Expense Tracking System 1.1 within the /register.php file, where manipulation of the email argument allows for arbitrary SQL command execution, with a public exploit available.</description><content:encoded><![CDATA[<p>A critical security flaw has been identified in PHPGurukul Daily Expense Tracking System version 1.1. This vulnerability resides in the <code>/register.php</code> file and is triggered by manipulating the <code>email</code> argument. Successful exploitation enables remote SQL injection, potentially granting attackers unauthorized access to sensitive database information or allowing them to modify data. This vulnerability, identified as CVE-2026-6193, has a CVSS v3.1 score of 7.3, indicating a high level of severity. The existence of a publicly available exploit increases the risk of widespread exploitation. Organizations using this software should take immediate action to mitigate the risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a vulnerable instance of PHPGurukul Daily Expense Tracking System 1.1.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>/register.php</code> endpoint.</li>
<li>Within the request, the attacker injects SQL code into the <code>email</code> parameter.</li>
<li>The application fails to properly sanitize the input, passing the malicious SQL query to the database.</li>
<li>The database executes the injected SQL code, potentially allowing the attacker to read, modify, or delete data.</li>
<li>The attacker may leverage the initial SQL injection to escalate privileges within the database.</li>
<li>The attacker could potentially gain access to administrative credentials stored in the database.</li>
<li>Finally, the attacker uses the compromised credentials to gain full control over the application.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability could lead to severe consequences. Attackers could gain unauthorized access to sensitive user data, including usernames, passwords, and financial information. This could result in identity theft, financial fraud, and reputational damage for both the organization and its users. The attacker could also modify or delete data, disrupt the application&rsquo;s functionality, or even gain complete control of the server. Given the availability of a public exploit, the likelihood of attacks is significantly increased.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply any available patches or updates provided by PHPGurukul to address CVE-2026-6193.</li>
<li>Deploy the Sigma rule &ldquo;Detect Suspicious SQL Injection Attempts in PHPGurukul Registration&rdquo; to identify exploitation attempts targeting the <code>/register.php</code> endpoint.</li>
<li>Implement input validation and sanitization measures on the <code>email</code> parameter in <code>/register.php</code> to prevent SQL injection.</li>
<li>Monitor web server logs for suspicious activity, such as unusual characters or SQL syntax in the <code>email</code> parameter, which could indicate an attempted SQL injection (webserver log source).</li>
<li>Implement a Web Application Firewall (WAF) rule to block requests containing SQL injection payloads targeting <code>/register.php</code>.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sqli</category><category>cve-2026-6193</category><category>php</category><category>web-application</category></item><item><title>Smart Post Show WordPress Plugin PHP Object Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-smart-post-show-rce/</link><pubDate>Tue, 14 Apr 2026 06:17:10 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-smart-post-show-rce/</guid><description>The Smart Post Show WordPress plugin versions 3.0.12 and earlier are vulnerable to PHP Object Injection via deserialization of untrusted input in the import_shortcodes() function, potentially leading to remote code execution if a suitable POP chain is present.</description><content:encoded><![CDATA[<p>The Smart Post Show WordPress plugin, specifically the Post Grid, Post Carousel &amp; Slider, and List Category Posts components, contains a PHP Object Injection vulnerability. This flaw affects all versions up to and including 3.0.12. The vulnerability resides in the <code>import_shortcodes()</code> function, where the deserialization of untrusted input occurs. This vulnerability requires an authenticated attacker with administrative privileges or higher. Successful exploitation requires the presence of a suitable Property-Oriented Programming (POP) chain within another installed plugin or theme. Without a POP chain, the injected object has no immediate impact. However, with a POP chain, attackers can potentially delete arbitrary files, retrieve sensitive data, or execute arbitrary code on the server.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains administrative-level access to the WordPress dashboard, either through credential compromise or vulnerability exploitation.</li>
<li>The attacker navigates to the Smart Post Show plugin settings page within the WordPress admin panel.</li>
<li>The attacker crafts a malicious payload containing a serialized PHP object designed to trigger a POP chain.</li>
<li>The attacker injects the malicious payload into the <code>import_shortcodes()</code> function, likely through a form field or file upload.</li>
<li>The <code>import_shortcodes()</code> function deserializes the attacker-controlled input, creating the malicious PHP object.</li>
<li>If a suitable POP chain exists within other installed plugins or themes, the deserialization triggers the chain.</li>
<li>The POP chain executes a series of predefined actions based on the objects and methods involved.</li>
<li>The final objective is achieved, such as deleting arbitrary files, retrieving sensitive data, or executing arbitrary code on the server.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The PHP Object Injection vulnerability in the Smart Post Show WordPress plugin allows attackers to potentially gain remote code execution on the affected server. The impact is contingent on the existence of a POP chain within other installed plugins or themes. If successful, an attacker could potentially compromise the entire web server, leading to data breaches, defacement, or complete system takeover. Given the widespread use of WordPress and this plugin, a successful exploit could affect numerous websites across various sectors.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the Smart Post Show plugin to a version greater than 3.0.12 to patch CVE-2026-3017.</li>
<li>Deploy the Sigma rule &ldquo;Detect WordPress Plugin Deserialization Attempt&rdquo; to monitor for suspicious deserialization activity on WordPress servers.</li>
<li>Audit all installed WordPress plugins and themes for potential POP chains that could be exploited in conjunction with this vulnerability.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>wordpress</category><category>php</category><category>object-injection</category><category>rce</category></item><item><title>Case Theme User WordPress Plugin Local File Inclusion Vulnerability (CVE-2025-5804)</title><link>https://feed.craftedsignal.io/briefs/2026-04-case-theme-lfi/</link><pubDate>Sat, 11 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-case-theme-lfi/</guid><description>CVE-2025-5804 is a PHP Local File Inclusion vulnerability in the Case Theme User WordPress plugin before version 1.0.4 due to improper filename control in include/require statements, potentially allowing attackers to execute arbitrary code by including malicious local files.</description><content:encoded><![CDATA[<p>A local file inclusion (LFI) vulnerability, identified as CVE-2025-5804, affects the Case Theme User WordPress plugin before version 1.0.4. The vulnerability stems from insufficient validation of filenames passed to PHP&rsquo;s <code>include</code> or <code>require</code> statements. This allows an unauthenticated attacker to potentially include arbitrary local files on the server hosting the WordPress instance. Successful exploitation could lead to sensitive information disclosure, arbitrary code execution, or denial of service. The vulnerability was reported and patched by Patchstack. Users of the Case Theme User plugin are advised to upgrade to version 1.0.4 or later to mitigate this risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a vulnerable Case Theme User plugin running on a WordPress site.</li>
<li>The attacker crafts a malicious HTTP request targeting a PHP file within the plugin that uses an <code>include</code> or <code>require</code> statement.</li>
<li>The attacker modifies a GET or POST parameter associated with the vulnerable <code>include</code> or <code>require</code> statement, injecting a path to a local file (e.g., <code>/etc/passwd</code>).</li>
<li>The web server processes the request, and the PHP interpreter attempts to include the file specified in the attacker-controlled parameter.</li>
<li>Due to the LFI vulnerability, the server includes the attacker-specified local file.</li>
<li>If the included file contains sensitive data, such as configuration files or credentials, the attacker can extract this information from the server&rsquo;s response.</li>
<li>In more advanced scenarios, the attacker might attempt to include PHP files containing malicious code, achieving remote code execution on the server.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2025-5804 can lead to a range of impacts, including sensitive information disclosure such as WordPress configuration files (wp-config.php), which contain database credentials. Arbitrary code execution is possible if the attacker can include a file containing malicious PHP code. This could allow the attacker to gain complete control of the WordPress site and the underlying server. The number of affected sites depends on the adoption rate of the vulnerable Case Theme User plugin, but given the widespread use of WordPress, the potential impact could be significant.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately update the Case Theme User WordPress plugin to version 1.0.4 or later to patch CVE-2025-5804.</li>
<li>Deploy the Sigma rule <code>Detect Case Theme User LFI Attempt</code> to your SIEM to identify potential exploitation attempts based on suspicious file paths in HTTP requests.</li>
<li>Monitor web server logs for unusual file access patterns, particularly requests containing &ldquo;..&rdquo;, &ldquo;%2e%2e&rdquo;, or other directory traversal sequences, to catch LFI attempts (see log source <code>webserver</code>).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>php</category><category>lfi</category><category>wordpress</category><category>cve-2025-5804</category></item><item><title>PHPGurukul News Portal Project SQL Injection Vulnerability (CVE-2026-5837)</title><link>https://feed.craftedsignal.io/briefs/2026-04-phpgurukul-sql-injection/</link><pubDate>Thu, 09 Apr 2026 04:17:23 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-phpgurukul-sql-injection/</guid><description>PHPGurukul News Portal Project version 4.1 is vulnerable to SQL injection via the Comment parameter in /news-details.php, potentially allowing remote attackers to execute arbitrary SQL queries.</description><content:encoded><![CDATA[<p>CVE-2026-5837 describes a SQL injection vulnerability affecting PHPGurukul News Portal Project version 4.1. The vulnerability resides in the <code>/news-details.php</code> file and is triggered by manipulating the <code>Comment</code> argument.  Successful exploitation allows remote attackers to inject arbitrary SQL commands into the application&rsquo;s database queries. The vulnerability has a CVSS v3.1 score of 7.3, indicating a high severity. Publicly available exploits exist, increasing the risk of active exploitation. Organizations using PHPGurukul News Portal Project 4.1 are urged to investigate and mitigate this vulnerability immediately. The lack of specific patching information emphasizes the importance of proactive detection and prevention measures.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a vulnerable PHPGurukul News Portal Project 4.1 instance accessible over the internet.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>/news-details.php</code> endpoint.</li>
<li>Within the request, the <code>Comment</code> parameter is manipulated to inject SQL code. For example, the attacker might inject a payload such as <code>' OR '1'='1</code> to bypass authentication or extract data.</li>
<li>The vulnerable application processes the crafted request without proper sanitization of the <code>Comment</code> parameter.</li>
<li>The injected SQL code is embedded within a database query executed by the application.</li>
<li>The database server executes the attacker-controlled SQL query, potentially allowing the attacker to read, modify, or delete data.</li>
<li>The application returns the results of the injected SQL query to the attacker, potentially revealing sensitive information or confirming successful code execution.</li>
<li>The attacker leverages the SQL injection vulnerability to potentially gain unauthorized access to sensitive data, modify website content, or even gain control of the underlying server.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-5837 can lead to unauthorized access to sensitive information stored in the PHPGurukul News Portal Project&rsquo;s database. An attacker could potentially steal user credentials, financial data, or other confidential information. The attacker could also modify website content, inject malicious code, or even gain control of the underlying server. Given the public availability of exploits, vulnerable instances are at immediate risk of compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detecting SQL Injection in PHPGurukul News Portal</code> to identify attempts to exploit CVE-2026-5837 by monitoring for suspicious characters in the <code>cs-uri-query</code> field of web server logs.</li>
<li>Apply web application firewall (WAF) rules to block requests containing common SQL injection payloads.</li>
<li>Review and harden the <code>/news-details.php</code> page to properly sanitize the Comment input field.</li>
<li>Monitor web server logs for unusual activity, especially related to the <code>/news-details.php</code> endpoint, and correlate with other security events.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>sql-injection</category><category>web-application</category><category>php</category><category>CVE-2026-5837</category></item><item><title>Everest Forms WordPress Plugin PHP Object Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-everest-forms-rce/</link><pubDate>Wed, 08 Apr 2026 02:16:04 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-everest-forms-rce/</guid><description>The Everest Forms plugin for WordPress is vulnerable to PHP Object Injection (CVE-2026-3296) in versions up to 3.4.3, allowing unauthenticated attackers to execute arbitrary code by injecting serialized PHP objects via form fields.</description><content:encoded><![CDATA[<p>The Everest Forms plugin for WordPress, a widely used form builder, contains a critical PHP Object Injection vulnerability (CVE-2026-3296) affecting versions up to and including 3.4.3. This vulnerability stems from the insecure deserialization of user-supplied data within the <code>html-admin-page-entries-view.php</code> file. Specifically, the plugin uses PHP&rsquo;s <code>unserialize()</code> function on form entry metadata stored in the <code>wp_evf_entrymeta</code> table without specifying allowed classes, creating an exploitable condition. An unauthenticated attacker can inject malicious serialized PHP objects through any public form field. The <code>sanitize_text_field()</code> function fails to prevent these attacks because it doesn&rsquo;t strip serialization control characters. This allows attackers to execute arbitrary PHP code on the WordPress server when an administrator views form entries. This vulnerability poses a significant risk to WordPress sites using the Everest Forms plugin.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker submits a malicious serialized PHP object through a public Everest Forms form field.</li>
<li>The submitted payload bypasses the <code>sanitize_text_field()</code> function due to the function&rsquo;s failure to remove serialization control characters.</li>
<li>The crafted serialized object is stored in the <code>wp_evf_entrymeta</code> database table associated with the form entry.</li>
<li>An administrator accesses the WordPress administration panel and navigates to the Everest Forms entries section.</li>
<li>The <code>html-admin-page-entries-view.php</code> file is executed to display form entries and their associated metadata.</li>
<li>The plugin retrieves the stored serialized object from the <code>wp_evf_entrymeta</code> table.</li>
<li>The <code>unserialize()</code> function is called on the retrieved data <em>without</em> the <code>allowed_classes</code> parameter, triggering PHP Object Injection.</li>
<li>The injected PHP object is instantiated, leading to arbitrary PHP code execution on the server, potentially granting the attacker complete control over the WordPress site.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability (CVE-2026-3296) can lead to complete compromise of the WordPress website. An attacker can gain remote code execution, allowing them to inject malware, deface the site, steal sensitive data (including user credentials and financial information), or use the compromised server as part of a botnet. Given the widespread use of the Everest Forms plugin, a large number of WordPress sites are potentially vulnerable. The CVSS v3.1 base score of 9.8 reflects the critical severity of this vulnerability.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately update the Everest Forms plugin to the latest version (greater than 3.4.3) to patch CVE-2026-3296.</li>
<li>Deploy the Sigma rule <code>Detect Suspicious unserialize Call in Everest Forms</code> to identify potential exploitation attempts in web server logs.</li>
<li>Monitor web server logs for suspicious POST requests to WordPress form submission endpoints containing serialized PHP objects, as detected by the <code>Detect Suspicious Form Submission with Serialized Data</code> Sigma rule.</li>
<li>Implement a Web Application Firewall (WAF) rule to block requests containing serialized PHP objects in form submission data.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>wordpress</category><category>php</category><category>object-injection</category><category>rce</category><category>cve-2026-3296</category></item><item><title>Genealogy PHP Application Broken Access Control Vulnerability (CVE-2026-39355)</title><link>https://feed.craftedsignal.io/briefs/2026-04-genealogy-acl/</link><pubDate>Tue, 07 Apr 2026 19:16:46 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-genealogy-acl/</guid><description>A critical broken access control vulnerability (CVE-2026-39355) in Genealogy PHP application versions prior to 5.9.1 allows authenticated users to transfer ownership of arbitrary teams, leading to complete takeover of team workspaces and unrestricted data access.</description><content:encoded><![CDATA[<p>Genealogy is a family tree PHP application that, prior to version 5.9.1, contained a critical broken access control vulnerability identified as CVE-2026-39355. This flaw allows any authenticated user to transfer ownership of non-personal teams to themselves without proper authorization checks. This unauthorized ownership transfer leads to complete takeover of other users’ team workspaces, granting the attacker unrestricted access to all genealogy data associated with the compromised team. This vulnerability poses a significant risk to data confidentiality and integrity within organizations using affected versions of the Genealogy application. Version 5.9.1 addresses and resolves this vulnerability.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker authenticates to the Genealogy application with valid user credentials.</li>
<li>The attacker identifies a target &ldquo;team&rdquo; within the application that is not their own.</li>
<li>The attacker crafts a malicious HTTP request to the application&rsquo;s team ownership transfer functionality, specifying the target team and the attacker&rsquo;s user ID as the new owner.</li>
<li>Due to the broken access control vulnerability (CVE-2026-39355), the application fails to validate the attacker&rsquo;s authorization to perform the ownership transfer.</li>
<li>The application incorrectly updates the team&rsquo;s ownership data, assigning ownership to the attacker.</li>
<li>The attacker now possesses full administrative control over the compromised team&rsquo;s workspace and data.</li>
<li>The attacker accesses and exfiltrates sensitive genealogy data, including family trees, personal information, and other confidential records.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-39355 allows an attacker to gain complete control over targeted teams within the Genealogy application. This leads to unauthorized access to sensitive genealogy data, potentially impacting all users and families represented within the compromised teams. The impact includes data exfiltration, modification, or deletion, potentially causing significant reputational damage and legal liabilities. While the exact number of affected installations is unknown, all organizations running versions prior to 5.9.1 are vulnerable.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately upgrade the Genealogy application to version 5.9.1 or later to patch CVE-2026-39355.</li>
<li>Monitor web server logs for suspicious POST requests to team management endpoints, specifically those related to team ownership transfer. Use the provided Sigma rule <code>Detect Suspicious Genealogy Team Ownership Transfer</code> to detect unauthorized attempts.</li>
<li>Implement strict access control policies within the Genealogy application, ensuring that users can only access and modify data related to teams they are authorized to manage.</li>
<li>Enable detailed logging for all user authentication and authorization events within the Genealogy application to facilitate incident investigation.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>broken-access-control</category><category>php</category><category>genealogy</category><category>CVE-2026-39355</category></item><item><title>Brave CMS Unrestricted File Upload Leads to Remote Code Execution</title><link>https://feed.craftedsignal.io/briefs/2026-04-brave-cms-rce/</link><pubDate>Mon, 06 Apr 2026 18:16:42 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-brave-cms-rce/</guid><description>Brave CMS versions prior to 2.0.6 contain an unrestricted file upload vulnerability within the CKEditor upload functionality in the ckupload method, allowing authenticated users to upload executable PHP scripts and achieve Remote Code Execution.</description><content:encoded><![CDATA[<p>Brave CMS, an open-source content management system, is vulnerable to an unrestricted file upload vulnerability (CVE-2026-35164) in versions prior to 2.0.6. The vulnerability resides within the CKEditor upload functionality, specifically in the <code>ckupload</code> method located in <code>app/Http/Controllers/Dashboard/CkEditorController.php</code>. The application fails to properly validate the types of uploaded files, relying solely on user-provided input. This lack of validation enables an authenticated user to upload malicious PHP scripts, leading to arbitrary code execution on the server. The vulnerability was reported on April 6, 2026, and is fixed in Brave CMS version 2.0.6. Organizations using affected versions of Brave CMS are at risk of complete system compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker authenticates to the Brave CMS application as a user with upload privileges.</li>
<li>The attacker navigates to a page or functionality within the CMS that utilizes the CKEditor for content creation or editing.</li>
<li>The attacker uses the CKEditor&rsquo;s upload functionality to upload a malicious PHP script disguised as a legitimate file type (e.g., image).</li>
<li>The <code>ckupload</code> method in <code>app/Http/Controllers/Dashboard/CkEditorController.php</code> processes the uploaded file without proper validation of the file type or content.</li>
<li>The malicious PHP script is stored on the server in a publicly accessible directory.</li>
<li>The attacker crafts a request to directly access the uploaded PHP script via its URL.</li>
<li>The web server executes the PHP script, granting the attacker the ability to run arbitrary commands on the server.</li>
<li>The attacker establishes persistence, installs a web shell, and performs lateral movement within the network, escalating privileges as needed to achieve their objectives.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to execute arbitrary PHP code on the affected Brave CMS server. This can lead to complete compromise of the CMS instance, including unauthorized access to sensitive data, modification of website content, and potential lateral movement to other systems on the network. The CVSS v3.1 base score for this vulnerability is 8.8, indicating a high severity level. Organizations running vulnerable versions of Brave CMS are at risk of data breaches, website defacement, and further exploitation of their infrastructure.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Brave CMS to version 2.0.6 or later to remediate the unrestricted file upload vulnerability (CVE-2026-35164).</li>
<li>Implement server-side file validation to prevent the upload of malicious files, regardless of file extension.</li>
<li>Monitor web server logs for suspicious activity related to file uploads and execution of PHP scripts.</li>
<li>Deploy the following Sigma rule to detect attempts to access potentially malicious PHP files in the web server&rsquo;s upload directories.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-35164</category><category>rce</category><category>file-upload</category><category>brave-cms</category><category>ckeditor</category><category>php</category><category>webserver</category></item><item><title>Auth0-PHP SDK Cookie Forging Vulnerability (CVE-2026-34236)</title><link>https://feed.craftedsignal.io/briefs/2026-04-auth0-php-cookie-forging/</link><pubDate>Wed, 01 Apr 2026 18:16:30 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-auth0-php-cookie-forging/</guid><description>Auth0-PHP SDK versions 8.0.0 to before 8.19.0 encrypt cookies with insufficient entropy, potentially allowing attackers to brute-force the encryption key and forge session cookies.</description><content:encoded><![CDATA[<p>The Auth0-PHP SDK, a PHP library for Auth0 Authentication and Management APIs, contains a vulnerability (CVE-2026-34236) affecting versions 8.0.0 to before 8.19.0. The insufficient entropy used in cookie encryption within these versions creates a significant security risk.  Attackers could potentially exploit this vulnerability by brute-forcing the encryption key used to protect session cookies. Successful exploitation would allow an attacker to forge session cookies, gaining unauthorized access to applications using the vulnerable SDK. The vulnerability was patched in version 8.19.0. Applications using Auth0-PHP within the specified range are vulnerable.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies an application using a vulnerable version of the Auth0-PHP SDK (8.0.0 &lt; v &lt; 8.19.0).</li>
<li>The application sets a session cookie encrypted using the SDK&rsquo;s insufficient entropy encryption.</li>
<li>Attacker intercepts a legitimate user&rsquo;s session cookie (e.g., via network sniffing or cross-site scripting).</li>
<li>Attacker attempts to brute-force the encryption key used to encrypt the session cookie, leveraging the weakness in the encryption algorithm.</li>
<li>Upon successful brute-forcing, the attacker decrypts the intercepted session cookie and extracts the session identifier.</li>
<li>The attacker constructs a new, forged cookie with the decrypted session identifier.</li>
<li>The attacker injects the forged cookie into their own browser session.</li>
<li>The attacker accesses the application, impersonating the legitimate user and gaining unauthorized access to their account and data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-34236 allows attackers to forge session cookies, leading to account takeover. The impact is significant, potentially affecting all applications using the vulnerable Auth0-PHP SDK versions 8.0.0 to before 8.19.0. The severity is elevated due to the potential for complete account compromise without requiring user interaction beyond the initial cookie interception. Organizations could face data breaches, financial loss, and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Auth0-PHP SDK to version 8.19.0 or later to remediate CVE-2026-34236.</li>
<li>Implement web application firewall (WAF) rules to detect and block suspicious cookie manipulation attempts.</li>
<li>Monitor web server logs for unusual patterns indicative of brute-force attacks against cookie encryption (related to webserver log source).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-34236</category><category>auth0</category><category>php</category><category>cookie-forging</category><category>session-hijacking</category></item><item><title>Protobuf PHP Library Denial of Service Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-03-protobuf-dos/</link><pubDate>Wed, 25 Mar 2026 21:04:21 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-protobuf-dos/</guid><description>A denial-of-service vulnerability exists in the Protobuf PHP library due to maliciously crafted messages with negative varints or deep recursion, leading to application crashes and impacting service availability.</description><content:encoded><![CDATA[<p>A high-severity denial-of-service (DoS) vulnerability has been identified in the Protobuf PHP library, affecting versions prior to 4.33.6. The vulnerability stems from the improper handling of maliciously structured Protocol Buffer messages. Specifically, messages containing negative varints or exhibiting deep recursion can trigger excessive resource consumption during parsing. This can lead to application crashes, thereby disrupting service availability. Patches addressing this vulnerability have been released in versions 5.34.0-RC1 and 4.33.6 of the Protobuf library. Defenders should prioritize updating vulnerable systems to these patched versions to mitigate potential exploitation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious Protocol Buffer message.</li>
<li>The message contains either negative varints or exploits deep recursion.</li>
<li>The attacker sends the malicious message to a PHP application using the vulnerable Protobuf library.</li>
<li>The PHP application attempts to parse the malicious message using the affected Protobuf library.</li>
<li>During parsing, the negative varints or deep recursion trigger excessive resource consumption, such as CPU or memory.</li>
<li>The application becomes unresponsive due to resource exhaustion.</li>
<li>The application crashes, leading to a denial of service.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability results in a denial-of-service condition, rendering affected applications unavailable. This can impact any service relying on the Protobuf PHP library to process untrusted data, such as APIs, message queues, or data storage systems. The number of affected services depends on the prevalence of the vulnerable Protobuf library within an organization&rsquo;s infrastructure. This issue can lead to significant disruption and potential data loss or corruption if applications crash while processing critical data.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the <code>composer/google/protobuf</code> package to version 4.33.6 or later to remediate the vulnerability.</li>
<li>Monitor web server logs for anomalous request patterns indicative of exploitation attempts targeting Protobuf message processing (webserver log source).</li>
<li>Implement rate limiting and input validation on services that process Protocol Buffer messages to mitigate the impact of malicious inputs (webserver log source).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>protobuf</category><category>dos</category><category>php</category></item><item><title>PhreeBooks ERP 5.2.3 Remote Code Execution Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-03-phreebooks-rce/</link><pubDate>Tue, 24 Mar 2026 12:16:07 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-phreebooks-rce/</guid><description>PhreeBooks ERP 5.2.3 is vulnerable to remote code execution, allowing authenticated attackers to upload and execute arbitrary PHP files via the image manager, leading to reverse shell connections and system command execution.</description><content:encoded><![CDATA[<p>PhreeBooks ERP version 5.2.3 is susceptible to a remote code execution (RCE) vulnerability (CVE-2019-25647) within its image manager component. This flaw enables authenticated attackers to bypass file extension restrictions and upload malicious PHP files. Successful exploitation allows attackers to execute arbitrary code on the underlying server, potentially leading to complete system compromise. The vulnerability exists because the image manager lacks adequate validation of uploaded file types, permitting the upload of PHP files disguised with allowed extensions or lacking extensions altogether. This can lead to reverse shell creation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker authenticates to the PhreeBooks ERP 5.2.3 application.</li>
<li>The attacker accesses the image manager functionality.</li>
<li>The attacker crafts a malicious PHP file designed to execute system commands or establish a reverse shell.</li>
<li>The attacker uploads the malicious PHP file through the image manager, bypassing file extension validation. This may involve renaming the file with a permitted extension or omitting the extension entirely.</li>
<li>The attacker identifies the upload location of the malicious PHP file.</li>
<li>The attacker sends an HTTP request to the uploaded PHP file&rsquo;s location on the server.</li>
<li>The web server executes the PHP code, triggering the attacker&rsquo;s malicious payload (e.g., reverse shell).</li>
<li>The attacker gains remote access to the server and can execute arbitrary system commands.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows a remote attacker to execute arbitrary code on the targeted server. This can lead to complete system compromise, including data theft, modification, or destruction. Given that PhreeBooks ERP is used to manage business operations, a successful attack could result in significant financial losses, disruption of services, and reputational damage. There is no specific information about victim count or sectors targeted available from the source.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply any available patches or updates for PhreeBooks ERP to address CVE-2019-25647.</li>
<li>Implement the Sigma rule &ldquo;Detect Suspicious PHP Upload via Image Manager&rdquo; to detect attempts to upload malicious PHP files through the image manager.</li>
<li>Monitor web server logs for requests to unusual file paths containing PHP code, as this could indicate exploitation attempts.</li>
<li>Restrict access to the image manager functionality to only authorized users.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>rce</category><category>vulnerability</category><category>php</category></item><item><title>PhpSpreadsheet SSRF and RCE Vulnerability via IOFactory::load</title><link>https://feed.craftedsignal.io/briefs/2024-01-30-phpspreadsheet-rce-ssrf/</link><pubDate>Tue, 30 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-30-phpspreadsheet-rce-ssrf/</guid><description>PhpSpreadsheet is vulnerable to Server-Side Request Forgery (SSRF) and Remote Code Execution (RCE) due to improper validation of filenames in the IOFactory::load function, exploitable via PHP wrappers like `phar://` and `ftp://`.</description><content:encoded><![CDATA[<p>PhpSpreadsheet, a widely used PHP library for reading and writing spreadsheet files, is susceptible to a critical vulnerability that can lead to both Server-Side Request Forgery (SSRF) and Remote Code Execution (RCE). The vulnerability stems from insufficient validation of the <code>$filename</code> parameter passed to the <code>IOFactory::load</code> function. When this parameter is user-controlled, attackers can leverage PHP wrappers such as <code>ftp://</code>, <code>phar://</code>, and <code>ssh2.sftp://</code> to bypass the <code>is_file</code> check, leading to malicious file inclusion or arbitrary code execution. This flaw affects versions up to and including 1.30.2, as well as versions 2.0.0 through 5.5.0. Exploitation can occur even if the specified file inside the phar archive does not exist or is not a supported file type, potentially masking the attack. Due to PhpSpreadsheet&rsquo;s widespread use in other popular libraries like <code>maatwebsite/excel</code> and <code>sonata-project/exporter</code>, the impact of this vulnerability is significant.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious phar archive (<code>exploit.xlsx</code>) containing a PHP object with a <code>__destruct</code> method that executes arbitrary code via <code>shell_exec</code>.</li>
<li>The attacker hosts the malicious phar archive on a web server or makes it accessible through other means.</li>
<li>The attacker crafts a request to a vulnerable web application using PhpSpreadsheet, providing a <code>phar://</code> URL (e.g., <code>phar://exploit.xlsx/whatever</code>) as the <code>$filename</code> parameter to <code>IOFactory::load</code>.</li>
<li><code>IOFactory::load</code> attempts to load the file specified in the <code>$filename</code> parameter, which passes through the vulnerable <code>is_file</code> check.</li>
<li>The <code>phar://</code> wrapper triggers PHP&rsquo;s phar extension, which deserializes the metadata within the <code>exploit.xlsx</code> archive.</li>
<li>Deserialization of the malicious PHP object triggers the <code>__destruct</code> method, executing the attacker&rsquo;s arbitrary code via <code>shell_exec</code>, achieving RCE. The code creates <code>/tmp/poc.txt</code> in the example.</li>
<li>Alternatively, the attacker provides an <code>ftp://</code> URL to <code>IOFactory::load</code>, pointing to an attacker-controlled FTP server.</li>
<li>The vulnerable <code>is_file</code> check allows the <code>ftp://</code> connection, leading to an SSRF vulnerability where the server running PhpSpreadsheet connects to the attacker&rsquo;s specified FTP server.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability can lead to a range of severe consequences. Remote Code Execution (RCE) allows an attacker to execute arbitrary commands on the server, potentially leading to complete system compromise. The SSRF vulnerability enables an attacker to probe internal network resources, potentially exposing sensitive information or allowing further attacks on internal systems. Given PhpSpreadsheet&rsquo;s use in numerous web applications and frameworks, a successful attack could impact a large number of users and organizations. Example impact includes attackers gaining initial access to internal applications.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the suggested mitigations by either checking for PHP wrappers in the filename before calling <code>is_file</code> or by using <code>realpath</code> to ensure a clean absolute path (see code snippets in the advisory).</li>
<li>Deploy the Sigma rule <code>Detect_PhpSpreadsheet_Phar_Wrapper</code> to detect attempts to exploit the RCE vulnerability by monitoring process creation events with command lines containing &ldquo;phar://&rdquo; and <code>php</code>.</li>
<li>Deploy the Sigma rule <code>Detect_PhpSpreadsheet_Ftp_Wrapper</code> to detect attempts to exploit the SSRF vulnerability by monitoring network connections with destination ports on FTP protocol (21) and file paths contain ftp.</li>
<li>Monitor web server logs for requests containing the <code>phar://</code> or <code>ftp://</code> schemes in the filename parameter to <code>IOFactory::load</code>.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>phpspreadsheet</category><category>ssrf</category><category>rce</category><category>php</category><category>deserialization</category></item><item><title>CI4MS Authenticated Remote Code Execution via Theme Upload</title><link>https://feed.craftedsignal.io/briefs/2024-01-30-ci4ms-rce/</link><pubDate>Tue, 30 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-30-ci4ms-rce/</guid><description>CI4MS versions 0.26.0.0 through 0.31.6.0 are vulnerable to remote code execution; an authenticated backend user with theme upload permissions can upload a crafted ZIP file containing a PHP file, which is then installed into the web-accessible public directory without filtering, allowing direct execution via HTTP.</description><content:encoded><![CDATA[<p>CI4MS versions 0.26.0.0 through 0.31.6.0 are vulnerable to authenticated remote code execution. The vulnerability lies in the theme upload feature, where any authenticated backend user with theme-upload permissions can upload a crafted ZIP file. PHP files included in the uploaded ZIP are installed into a web-accessible directory without extension or content filtering. This allows attackers to execute arbitrary PHP code on the server by directly accessing the uploaded files via HTTP requests. The vulnerability was reported on April 29, 2026 and can lead to full server compromise if exploited.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains valid credentials for a backend user account with theme upload permissions.</li>
<li>The attacker crafts a malicious ZIP archive containing a PHP file (e.g., shell.php) with code to execute system commands via a GET parameter.</li>
<li>The attacker uploads the malicious ZIP file (e.g., evil_theme.zip) through the /backend/themes/upload endpoint using a POST request with multipart/form-data.</li>
<li>The application extracts the ZIP archive to a temporary directory.</li>
<li>The application copies the PHP file from the temporary directory to the public/templates/evil/ directory using the rename() function, with no file type validation or content inspection.</li>
<li>The attacker crafts an HTTP GET request targeting the uploaded PHP file (e.g., /templates/evil/shell.php?c=id).</li>
<li>The web server executes the PHP code, running the system command specified in the &lsquo;c&rsquo; parameter.</li>
<li>The output of the executed command is returned in the HTTP response, granting the attacker remote code execution.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows the attacker to execute arbitrary PHP code on the server under the context of the web server user. This can be leveraged to achieve OS-level command execution, potentially leading to data exfiltration, lateral movement, persistence, or full server compromise. Any deployment where a backend user has been granted theme upload permission is vulnerable. While a superadmin already has full privileges, this vulnerability allows lower-privileged roles to escalate their access.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the necessary patch or upgrade to a version of CI4MS beyond 0.31.6.0 to remediate CVE-2026-41587.</li>
<li>Monitor web server logs for suspicious HTTP requests targeting newly created directories under <code>/templates/</code> with PHP file extensions to detect potential exploitation attempts. Create a rule to detect this.</li>
<li>Implement stricter file upload validation, including file extension allowlists, MIME type checking, and content inspection, to prevent the upload of malicious PHP files.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>code-execution</category><category>web-application</category><category>php</category></item><item><title>PhpSpreadsheet CPU Denial of Service via Unbounded Row Number</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-phpspreadsheet-dos/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-phpspreadsheet-dos/</guid><description>A vulnerability in PhpSpreadsheet exists where a crafted XLSX file containing a large row number can cause excessive CPU consumption due to unbounded loop iterations, leading to a denial of service.</description><content:encoded><![CDATA[<p>A vulnerability exists in PhpSpreadsheet versions 1.x through 5.6.0 where the XLSX reader does not properly validate row numbers read from XML attributes within a spreadsheet file. Specifically, the <code>ColumnAndRowAttributes::readRowAttributes()</code> method lacks a check against the maximum allowed row number (<code>AddressRange::MAX_ROW = 1,048,576</code>). An attacker can exploit this by crafting a minimal XLSX file (approximately 1.6KB) containing a <code>&lt;row r=&quot;999999999&quot;/&gt;</code> element. When processed, this inflates the <code>cachedHighestRow</code> property, causing subsequent row iteration operations to attempt nearly one billion loop cycles, thereby exhausting CPU resources and leading to a denial-of-service condition. This vulnerability can be exploited in web applications that accept user-uploaded spreadsheet files, making it a significant risk for systems using vulnerable versions of PhpSpreadsheet. The vulnerability was reported in GHSA-7c6m-4442-2x6m.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious XLSX file containing an XML <code>&lt;row&gt;</code> element with a large <code>r</code> attribute (e.g., <code>&lt;row r=&quot;999999999&quot;/&gt;</code>).</li>
<li>The attacker uploads the malicious XLSX file to a web application or system that uses PhpSpreadsheet to process spreadsheet files.</li>
<li>The PhpSpreadsheet library, specifically the <code>IOFactory::createReader('Xlsx')</code> component, is used to read the uploaded file.</li>
<li>During the parsing process, the <code>ColumnAndRowAttributes::readRowAttributes()</code> method reads the large row number from the XML attribute.</li>
<li>The large row number is then used to update the <code>cachedHighestRow</code> property in the <code>Worksheet</code> object, effectively setting it to a very high value.</li>
<li>A subsequent operation that iterates over rows using <code>getRowIterator()</code> or retrieves the highest row using <code>getHighestRow()</code> triggers a loop that iterates up to the inflated <code>cachedHighestRow</code> value.</li>
<li>The excessive number of loop iterations consumes a significant amount of CPU resources, leading to a denial-of-service condition.</li>
<li>The application becomes unresponsive or crashes due to the CPU exhaustion.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability leads to a CPU denial of service. A small, 1.6KB crafted XLSX file can trigger almost one billion iterations, causing the system to become unresponsive for an extended period (estimated at ~144 seconds per file). This impacts any application using <code>getRowIterator()</code> or <code>getHighestRow()</code> methods, making the system unavailable. Applications processing the spreadsheet may also exhaust memory if they attempt to accumulate data during the iteration process. The high amplification factor (small input leading to massive CPU consumption) makes this vulnerability particularly dangerous, especially in web applications that process user-supplied spreadsheets.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the recommended fix by adding row bounds validation in <code>readRowAttributes()</code> to check if <code>$rowIndex</code> is within the acceptable range (1 to <code>AddressRange::MAX_ROW</code>). This is the primary recommendation from the source advisory.</li>
<li>Deploy the Sigma rule <code>Detect PhpSpreadsheet Excessive Row Iteration</code> to detect processes that may be attempting to process XLSX files with extremely high row numbers, indicating a potential exploitation attempt.</li>
<li>Monitor web server logs for suspicious file uploads, specifically XLSX files with unusually small sizes, which might indicate an attempt to upload a malicious file exploiting this vulnerability.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>denial-of-service</category><category>phpspreadsheet</category><category>xlsx</category><category>php</category></item><item><title>OpenCATS PHP Code Injection Vulnerability (CVE-2026-27760)</title><link>https://feed.craftedsignal.io/briefs/2024-01-opencats-code-injection/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-opencats-code-injection/</guid><description>Unauthenticated attackers can exploit a PHP code injection vulnerability in OpenCATS versions prior to commit 3002a29 by injecting malicious PHP code into the installer's AJAX endpoint, leading to arbitrary code execution.</description><content:encoded><![CDATA[<p>CVE-2026-27760 is a critical PHP code injection vulnerability that affects OpenCATS, a web-based applicant tracking system, in versions prior to commit 3002a29. The vulnerability resides in the installer AJAX endpoint, specifically within the <code>databaseConnectivity</code> action parameter. Unauthenticated attackers can exploit this flaw by injecting arbitrary PHP code into this parameter. This injected code allows attackers to execute arbitrary commands on the server. The vulnerability is triggered during the initial setup phase, when the installation wizard is not yet complete and continues to execute on every subsequent page load. This vulnerability poses a significant risk to organizations using vulnerable versions of OpenCATS, as it can lead to complete system compromise, data theft, or denial of service.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker sends a crafted HTTP POST request to the OpenCATS installer AJAX endpoint (<code>/install/ajax.php</code>).</li>
<li>The request includes the <code>databaseConnectivity</code> action parameter.</li>
<li>The attacker injects PHP code into the <code>databaseConnectivity</code> parameter, breaking out of the <code>define()</code> string context in <code>config.php</code> with a single quote and statement separator.</li>
<li>The injected code is then processed by the server, leading to arbitrary PHP code execution within the context of the web server user.</li>
<li>The injected code persists because it&rsquo;s written to the <code>config.php</code> file.</li>
<li>Every subsequent page load executes the injected PHP code, even after the initial malicious request.</li>
<li>The attacker can use the code execution to install a web shell for persistent access.</li>
<li>With the web shell, the attacker can perform various malicious activities, including reading sensitive files, modifying the database, or pivoting to other systems on the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-27760 allows unauthenticated attackers to execute arbitrary PHP code on the affected OpenCATS server. This can lead to complete system compromise, including the theft of sensitive applicant data, modification of application settings, and the installation of backdoors for persistent access. Given that OpenCATS handles applicant data, a successful attack could result in a significant data breach and reputational damage. The vulnerability exists in the installer and persists throughout subsequent page loads as long as the installation wizard remains incomplete, making it highly impactful.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade OpenCATS to a version containing commit 3002a29 or later to remediate CVE-2026-27760.</li>
<li>Monitor web server logs for suspicious POST requests to <code>/install/ajax.php</code> containing PHP code in the <code>databaseConnectivity</code> parameter to detect exploitation attempts (see rule: &ldquo;Detect OpenCATS installer code injection attempt&rdquo;).</li>
<li>Implement a Web Application Firewall (WAF) rule to block requests containing PHP code in the <code>databaseConnectivity</code> parameter.</li>
<li>Review and restrict access to the <code>/install/</code> directory after completing the installation process to prevent accidental or malicious access to the installer.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>code-injection</category><category>php</category><category>opencats</category><category>cve-2026-27760</category></item></channel></rss>