<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>RCE — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/rce/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 04 May 2026 18:16:32 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/rce/feed.xml" rel="self" type="application/rss+xml"/><item><title>Arelle Unauthenticated Remote Code Execution Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-arelle-rce/</link><pubDate>Mon, 04 May 2026 18:16:32 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-arelle-rce/</guid><description>Arelle before 2.39.10 is vulnerable to unauthenticated remote code execution via the /rest/configure REST endpoint, allowing attackers to execute arbitrary Python code by supplying a malicious URL through the plugins parameter.</description><content:encoded><![CDATA[<p>Arelle versions prior to 2.39.10 are susceptible to an unauthenticated remote code execution (RCE) vulnerability. The vulnerability resides in the <code>/rest/configure</code> REST endpoint, which improperly handles the <code>plugins</code> query parameter. This parameter is forwarded to the plugin manager without proper authentication or authorization checks. An attacker can exploit this flaw by providing a URL pointing to a malicious Python file via the <code>plugins</code> parameter. Upon receiving this request, the Arelle webserver downloads and executes the attacker-supplied Python code within the context of the Arelle process. This grants the attacker control over the Arelle server with the same privileges as the Arelle process. This vulnerability poses a significant risk, especially in environments where Arelle servers are exposed to the internet or untrusted networks.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker sends a crafted HTTP GET request to the <code>/rest/configure</code> endpoint of the Arelle web server.</li>
<li>The request includes the <code>plugins</code> query parameter, which contains a URL pointing to a malicious Python file hosted on an attacker-controlled server.</li>
<li>The Arelle web server receives the request and, without proper authentication or authorization, forwards the <code>plugins</code> parameter to the plugin manager.</li>
<li>The plugin manager downloads the Python file from the attacker-supplied URL using standard HTTP(S) protocols.</li>
<li>The Arelle process executes the downloaded Python code using the Python interpreter.</li>
<li>The malicious Python code executes arbitrary commands on the Arelle server, potentially installing malware, creating reverse shells, or exfiltrating sensitive data.</li>
<li>The attacker gains control of the Arelle server and can perform further actions, such as accessing internal network resources.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an unauthenticated attacker to achieve remote code execution on the Arelle server. This could lead to complete compromise of the server, including sensitive data theft, malware deployment, and further lateral movement within the network. The potential impact includes data breaches, service disruption, and reputational damage. Given the severity and ease of exploitation, any Arelle instance running a version prior to 2.39.10 is at critical risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately upgrade Arelle to version 2.39.10 or later to patch CVE-2026-42796.</li>
<li>Deploy the Sigma rule &ldquo;Detect Arelle Plugin Download via REST Endpoint&rdquo; to identify exploitation attempts targeting the vulnerable <code>/rest/configure</code> endpoint.</li>
<li>Monitor web server logs for suspicious requests to the <code>/rest/configure</code> endpoint containing the <code>plugins</code> parameter.</li>
<li>Implement network segmentation to limit the potential impact of a compromised Arelle server.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>rce</category><category>arelle</category><category>vulnerability</category></item><item><title>OpenMRS Module Upload Path Traversal Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-openmrs-zip-slip/</link><pubDate>Mon, 04 May 2026 17:39:31 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-openmrs-zip-slip/</guid><description>OpenMRS versions 2.7.8 and earlier, as well as versions 2.8.0 through 2.8.5, are vulnerable to a path traversal (Zip Slip) attack via the `POST /openmrs/ws/rest/v1/module` endpoint that allows authenticated attackers to achieve arbitrary file write and remote code execution.</description><content:encoded><![CDATA[<p>OpenMRS, an open-source enterprise electronic medical record system platform, is vulnerable to a path traversal (Zip Slip) vulnerability in its module upload functionality. Discovered in versions 2.7.8 and earlier, as well as versions 2.8.0 through 2.8.5, the vulnerability resides in the <code>POST /openmrs/ws/rest/v1/module</code> endpoint. An authenticated attacker with administrative privileges can exploit this flaw by uploading a specially crafted <code>.omod</code> archive containing malicious ZIP entries with directory traversal sequences. This can allow the attacker to write files outside of the intended module directory, potentially leading to arbitrary file write and remote code execution on the server. The vulnerability stems from incomplete path validation within the <code>WebModuleUtil.startModule()</code> function, an oversight compared to other extraction methods within the same codebase that are properly protected.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker authenticates to the OpenMRS instance with valid admin credentials via Basic Auth.</li>
<li>The attacker crafts a malicious <code>.omod</code> file containing a ZIP entry with a path traversal payload, such as <code>web/module/../../../../&lt;target_filename&gt;.jsp</code>.</li>
<li>The attacker sends a <code>POST</code> request to the <code>/openmrs/ws/rest/v1/module</code> endpoint, uploading the malicious <code>.omod</code> file.</li>
<li>The server receives the request and parses the uploaded <code>.omod</code> file, treating it as a ZIP archive.</li>
<li>During module loading via <code>WebModuleUtil.startModule()</code>, the server extracts entries under the <code>web/module/</code> directory.</li>
<li>Due to an incomplete check, the entry <code>web/module/../../../../&lt;target_filename&gt;.jsp</code> passes the initial validation.</li>
<li>The server attempts to write the extracted file to a path constructed by concatenating the traversed path, resulting in writing the file outside the intended <code>WEB-INF/view/module/</code> directory.</li>
<li>If the written file is a JSP script, accessing it via a browser triggers server-side execution, achieving Remote Code Execution (RCE).</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to write arbitrary files within the web application root directory of the OpenMRS instance. This can lead to remote code execution, allowing the attacker to gain complete control of the affected server. Given OpenMRS&rsquo;s use in healthcare environments, a successful attack could compromise sensitive patient data, disrupt medical operations, and damage the reputation of the affected organization. The number of potentially affected installations is unknown, but the vulnerability impacts a widely used version of the platform.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the patch or upgrade to a version of OpenMRS that includes the fix for CVE-2026-40076 to address the path traversal vulnerability.</li>
<li>Deploy the Sigma rule <code>Detect OpenMRS Malicious Module Upload</code> to identify exploitation attempts based on HTTP requests to the <code>/openmrs/ws/rest/v1/module</code> endpoint with suspicious file extensions in the query parameters.</li>
<li>Enable webserver logging to capture HTTP request data and facilitate detection and investigation efforts.</li>
<li>Monitor file creation events within the web application root directory for suspicious JSP files. Use the Sigma rule <code>Detect JSP File Creation in Web Application Root</code> as a starting point.</li>
<li>Enforce the <code>module.allow_web_admin</code> restriction consistently across all module upload entry points, including the REST API to prevent bypass.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>path-traversal</category><category>zip-slip</category><category>rce</category><category>openmrs</category><category>web-application</category></item><item><title>NetBox RCE via Jinja2 Template Injection (CVE-2026-29514)</title><link>https://feed.craftedsignal.io/briefs/2026-05-netbox-rce/</link><pubDate>Mon, 04 May 2026 17:16:22 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-netbox-rce/</guid><description>NetBox versions 4.3.5 through 4.5.4 are vulnerable to remote code execution (RCE) via template injection, where authenticated users with specific permissions can inject malicious Python callables into template parameters, bypassing Jinja2 sandboxing to execute arbitrary code.</description><content:encoded><![CDATA[<p>NetBox, a widely-used infrastructure resource modeling application, is vulnerable to remote code execution (RCE) in versions 4.3.5 through 4.5.4. This vulnerability, identified as CVE-2026-29514, resides in the <code>RenderTemplateMixin.get_environment_params()</code> method. An authenticated attacker with <code>exporttemplate</code> or <code>configtemplate</code> permissions can exploit this flaw by injecting malicious Python callables into the <code>environment_params</code> field. Successful exploitation allows the attacker to bypass the Jinja2 SandboxedEnvironment, achieving arbitrary code execution as the NetBox service user. This RCE can lead to complete system compromise, data exfiltration, or denial of service. Defenders should prioritize patching and implement the detection measures outlined below.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An authenticated user logs into the NetBox web application with <code>exporttemplate</code> or <code>configtemplate</code> permissions.</li>
<li>The attacker crafts a malicious request to modify or create an export/config template.</li>
<li>Within the request, the attacker injects a Python callable, such as <code>subprocess.getoutput</code>, into the <code>environment_params</code> field. The <code>finalize</code> parameter of the Jinja2 environment is set to this callable.</li>
<li>NetBox processes the request, and the Jinja2 environment is initialized with the attacker-controlled <code>finalize</code> parameter.</li>
<li>When the template is rendered, every expression outside the sandbox&rsquo;s call interception mechanism is processed.</li>
<li>The injected callable (<code>subprocess.getoutput</code>) is invoked on the rendered expression.</li>
<li>The <code>subprocess.getoutput</code> callable executes arbitrary shell commands as the NetBox service user.</li>
<li>The attacker gains remote code execution, potentially leading to full system compromise or data exfiltration.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-29514 allows an authenticated attacker to execute arbitrary code on the NetBox server. The impact includes potential full system compromise, data exfiltration, and denial of service. Given that NetBox is often used to manage critical infrastructure information, a successful attack could have significant consequences, potentially affecting numerous organizations that rely on accurate network data.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade NetBox to a patched version (4.5.5 or later) to remediate CVE-2026-29514.</li>
<li>Implement the provided Sigma rule to detect attempts to inject malicious callables into <code>environment_params</code> via webserver logs.</li>
<li>Review and restrict <code>exporttemplate</code> and <code>configtemplate</code> permissions to only those users who require them.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>rce</category><category>template-injection</category><category>netbox</category><category>cve-2026-29514</category></item><item><title>OPNsense Multiple Vulnerabilities Leading to Remote Code Execution</title><link>https://feed.craftedsignal.io/briefs/2026-05-opnsense-rce/</link><pubDate>Mon, 04 May 2026 11:09:07 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-opnsense-rce/</guid><description>A remote, anonymous attacker can exploit multiple vulnerabilities in OPNsense to bypass security measures and execute arbitrary code, potentially leading to complete system compromise.</description><content:encoded><![CDATA[<p>Multiple unspecified vulnerabilities in OPNsense allow a remote, anonymous attacker to bypass security restrictions and achieve arbitrary code execution. The vulnerabilities stem from inadequate input validation and insufficient privilege checks within the OPNsense firewall software. While the specific vulnerable components are not detailed in the advisory, successful exploitation would grant an attacker complete control over the affected OPNsense instance. This can lead to a complete breach of the network perimeter, allowing the attacker to pivot to internal systems, intercept network traffic, or disrupt network services. Given the critical role of OPNsense as a network gateway, organizations using this software should prioritize detection and mitigation efforts.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable OPNsense instance accessible over the network.</li>
<li>The attacker crafts a malicious request targeting a specific, undisclosed vulnerable endpoint. This request exploits a flaw in input validation or authentication.</li>
<li>The vulnerable OPNsense component processes the malicious request without proper sanitization or authorization checks.</li>
<li>The injected payload bypasses security restrictions, potentially exploiting a command injection or similar vulnerability.</li>
<li>The injected payload executes arbitrary code on the OPNsense system, gaining initial access.</li>
<li>The attacker leverages the initial foothold to escalate privileges within the OPNsense system.</li>
<li>The attacker establishes persistence, ensuring continued access even after system reboots or security updates.</li>
<li>The attacker pivots to other systems within the network, using the compromised OPNsense instance as a launchpad for further attacks, or exfiltrates sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities allows a remote attacker to execute arbitrary code on the OPNsense firewall. This gives the attacker full control of the firewall, allowing them to intercept network traffic, modify firewall rules, and potentially pivot to internal networks. The impact is a complete compromise of the network perimeter, potentially affecting all systems and data behind the firewall. The number of affected organizations is currently unknown.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor OPNsense webserver logs for suspicious POST requests to unusual or sensitive endpoints, using a webserver category Sigma rule (see example below).</li>
<li>Implement network intrusion detection systems (NIDS) rules to detect exploitation attempts against OPNsense services.</li>
<li>While specific CVEs are unavailable, stay informed about OPNsense security updates and apply them immediately upon release.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>vulnerability</category><category>rce</category><category>firewall</category></item><item><title>Multiple Vulnerabilities in Mozilla Thunderbird Allow for Remote Code Execution and Data Breach</title><link>https://feed.craftedsignal.io/briefs/2026-05-thunderbird-vulns/</link><pubDate>Mon, 04 May 2026 00:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-thunderbird-vulns/</guid><description>Multiple vulnerabilities in Mozilla Thunderbird prior to versions 150.0.1 and Thunderbird ESR prior to 140.10.1 could allow a remote attacker to achieve arbitrary code execution, data confidentiality breach, and security policy bypass.</description><content:encoded><![CDATA[<p>On May 4, 2026, CERT-FR published an advisory regarding multiple vulnerabilities affecting Mozilla Thunderbird. Specifically, Thunderbird versions prior to 150.0.1 and Thunderbird ESR versions prior to 140.10.1 are vulnerable. Successful exploitation of these vulnerabilities could allow an attacker to achieve remote code execution, compromise the confidentiality of data, and bypass security policies. The advisory highlights the urgency for users and organizations utilizing affected versions to apply the necessary patches to mitigate these risks. These vulnerabilities underscore the importance of maintaining up-to-date software versions to defend against potential exploitation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a target using a vulnerable version of Mozilla Thunderbird (ESR &lt; 140.10.1 or &lt; 150.0.1).</li>
<li>Attacker crafts a malicious email or leverages a compromised website to deliver a specially crafted exploit.</li>
<li>The user opens the malicious email or visits the compromised website within Thunderbird.</li>
<li>The exploit triggers a vulnerability in Thunderbird, such as CVE-2026-7320 (or another from the listed CVEs), leading to code execution.</li>
<li>Attacker gains initial access to the user&rsquo;s system with the privileges of the Thunderbird process.</li>
<li>Attacker escalates privileges, if necessary, to gain a higher level of control over the system.</li>
<li>Attacker executes arbitrary commands to install malware, exfiltrate sensitive data, or perform other malicious actions.</li>
<li>The attacker achieves their objective, such as data theft, system compromise, or establishing a persistent foothold.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities could have severe consequences. An attacker could remotely execute arbitrary code, potentially leading to full system compromise. Sensitive data stored within Thunderbird, such as emails, contacts, and passwords, could be exposed. The security policy bypass could allow attackers to perform actions that are normally restricted, further compromising the system&rsquo;s security. This can lead to significant financial losses, reputational damage, and legal liabilities for affected organizations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately upgrade Mozilla Thunderbird to version 150.0.1 or later, or Thunderbird ESR to version 140.10.1 or later, to patch the vulnerabilities described in Mozilla security advisories mfsa2026-38 and mfsa2026-39.</li>
<li>Deploy the Sigma rule &ldquo;Detect Thunderbird Spawning Suspicious Processes&rdquo; to identify potential exploitation attempts via unusual child processes.</li>
<li>Monitor process creation events for Thunderbird spawning command interpreters or script engines using the Sigma rule &ldquo;Detect Thunderbird Running External Commands&rdquo;.</li>
<li>Review and harden email security policies to prevent the delivery of malicious emails that could exploit these vulnerabilities.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>vulnerability</category><category>rce</category><category>databreach</category><category>securitybypass</category></item><item><title>WordPress Widget Options Plugin Remote Code Execution Vulnerability (CVE-2026-2052)</title><link>https://feed.craftedsignal.io/briefs/2026-05-wordpress-widget-rce/</link><pubDate>Sat, 02 May 2026 08:16:27 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-wordpress-widget-rce/</guid><description>The Widget Options plugin for WordPress is vulnerable to Remote Code Execution (CVE-2026-2052) due to insufficient input sanitization in the Display Logic feature, allowing authenticated attackers with Contributor-level access and above to execute arbitrary code on the server.</description><content:encoded><![CDATA[<p>The Widget Options – Advanced Conditional Visibility for Gutenberg Blocks &amp; Classic Widgets plugin, versions 4.2.2 and earlier, contains a Remote Code Execution (RCE) vulnerability (CVE-2026-2052). This flaw stems from the plugin&rsquo;s Display Logic feature, which utilizes the <code>eval()</code> function to process user-supplied expressions. The plugin&rsquo;s implemented blocklist/allowlist is insufficient, making it bypassable through techniques involving <code>array_map</code> with string concatenation. Furthermore, the plugin lacks proper authorization enforcement on the <code>extended_widget_opts_block</code> attribute. This vulnerability allows authenticated attackers with Contributor-level access or higher to inject and execute arbitrary code on the underlying server. The vendor partially addressed this vulnerability in version 4.2.0.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker authenticates to the WordPress application as a Contributor or higher-level user.</li>
<li>The attacker navigates to the Widget Options settings within the WordPress admin panel.</li>
<li>The attacker crafts a malicious Display Logic expression designed to execute arbitrary PHP code. This involves bypassing the blocklist/allowlist using techniques such as <code>array_map</code> and string concatenation.</li>
<li>The attacker injects the malicious Display Logic expression into the <code>extended_widget_opts_block</code> attribute.</li>
<li>The WordPress application processes the widget options, including the malicious Display Logic expression. Due to the lack of proper sanitization and authorization, the <code>eval()</code> function executes the attacker-supplied PHP code.</li>
<li>The attacker&rsquo;s code executes with the permissions of the web server user, potentially allowing the attacker to read or write files, execute system commands, or compromise the entire server.</li>
<li>The attacker may establish persistence by writing a backdoor to a file on the server or by creating a new administrator account.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-2052 allows an attacker to execute arbitrary code on the WordPress server. This can lead to complete compromise of the website, including data theft, defacement, and the installation of malware. Since the vulnerability requires Contributor access or higher, the impact is significant if such accounts are compromised through other means (e.g., phishing, credential stuffing). The lack of proper input sanitization and authorization makes this a critical vulnerability.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the &ldquo;The Widget Options – Advanced Conditional Visibility for Gutenberg Blocks &amp; Classic Widgets&rdquo; plugin to the latest version to patch CVE-2026-2052.</li>
<li>Deploy the Sigma rule &ldquo;Detect WordPress Widget Options RCE Attempt&rdquo; to your SIEM to detect exploitation attempts.</li>
<li>Review user roles and permissions to minimize the number of users with Contributor or higher-level access.</li>
<li>Monitor web server logs for unusual activity, particularly requests to <code>/wp-admin/options.php</code> related to widget options.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>wordpress</category><category>rce</category><category>plugin</category></item><item><title>WordPress User Registration Advanced Fields Plugin Arbitrary File Upload Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-wordpress-upload/</link><pubDate>Sat, 02 May 2026 05:16:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-wordpress-upload/</guid><description>The User Registration Advanced Fields plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation, allowing unauthenticated attackers to upload arbitrary files leading to potential remote code execution.</description><content:encoded><![CDATA[<p>The User Registration Advanced Fields plugin for WordPress, specifically versions up to and including 1.6.20, contains an arbitrary file upload vulnerability (CVE-2026-4882) due to insufficient file type validation in the <code>URAF_AJAX::method_upload</code> function. This flaw enables unauthenticated attackers to upload any file type to the affected server, which can lead to remote code execution if the uploaded file is strategically placed and executed. The vulnerability is exploitable only if a &ldquo;Profile Picture&rdquo; field is active within the registration form. This poses a significant threat to websites using the plugin, as attackers can potentially gain full control of the server.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a WordPress site using the vulnerable User Registration Advanced Fields plugin (&lt;= 1.6.20) with the &ldquo;Profile Picture&rdquo; field enabled.</li>
<li>The attacker crafts a malicious HTTP request to the <code>URAF_AJAX::method_upload</code> function, bypassing any client-side file type checks.</li>
<li>The attacker uploads a web shell (e.g., a PHP file) disguised as a legitimate file type or without any extension to evade basic detection mechanisms.</li>
<li>The vulnerable plugin saves the file to the WordPress uploads directory without proper validation.</li>
<li>The attacker identifies the exact file path of the uploaded web shell on the server.</li>
<li>The attacker sends another HTTP request directly to the uploaded web shell.</li>
<li>The web shell executes on the server, providing the attacker with remote code execution capabilities.</li>
<li>The attacker can then leverage the web shell to perform various malicious activities, such as installing malware, defacing the website, or exfiltrating sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability (CVE-2026-4882) allows unauthenticated attackers to upload arbitrary files to a vulnerable WordPress website, potentially leading to remote code execution. This can result in complete compromise of the affected website, including data theft, website defacement, and malware infections. The CVSS v3.1 base score for this vulnerability is 9.8, indicating a critical severity level. The impact includes potential damage to reputation, financial losses, and legal liabilities.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the User Registration Advanced Fields plugin to the latest version (greater than 1.6.20) to patch CVE-2026-4882.</li>
<li>Implement file type validation on the server-side, restricting allowed file extensions for profile picture uploads.</li>
<li>Monitor web server logs for suspicious file upload activity targeting the <code>URAF_AJAX::method_upload</code> function to detect potential exploitation attempts. Deploy the Sigma rule <code>Detect Suspicious WordPress File Uploads</code> to your SIEM.</li>
<li>Implement strict file permission policies to prevent uploaded files from being executed as scripts.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>wordpress</category><category>file-upload</category><category>rce</category></item><item><title>HKUDS OpenHarness Remote Code Execution via /bridge Slash Command (CVE-2026-7551)</title><link>https://feed.craftedsignal.io/briefs/2026-05-openharness-rce/</link><pubDate>Thu, 30 Apr 2026 22:17:40 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-openharness-rce/</guid><description>HKUDS OpenHarness contains a remote code execution vulnerability (CVE-2026-7551) in the /bridge slash command, allowing remote attackers to execute arbitrary operating system commands by injecting malicious commands via the /bridge spawn command, leading to unauthorized shell access and data exposure.</description><content:encoded><![CDATA[<p>HKUDS OpenHarness is vulnerable to a remote code execution flaw (CVE-2026-7551) affecting the /bridge slash command. This vulnerability permits remote attackers, who are authorized by the OpenHarness configuration, to execute arbitrary operating system commands on the host system. The attack leverages the /bridge spawn command, which, when supplied with attacker-controlled command text, is processed by the bridge session manager and executed through a shared shell subprocess. This execution context grants attackers the ability to spawn shell sessions with the privileges of the OpenHarness process user, potentially exposing local files, credentials, workspace state, and repository contents. Successful exploitation results in a complete compromise of the OpenHarness instance.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies an accessible OpenHarness instance with the vulnerable /bridge slash command enabled.</li>
<li>The attacker authenticates or gains access to a communication channel (e.g., chat application) accepted by OpenHarness.</li>
<li>The attacker crafts a malicious /bridge spawn command containing OS commands to be executed.</li>
<li>The attacker sends the crafted /bridge spawn command to the OpenHarness instance via the configured communication channel.</li>
<li>OpenHarness processes the /bridge command and forwards the attacker-controlled command text to the bridge session manager.</li>
<li>The bridge session manager executes the injected OS commands through a shared shell subprocess.</li>
<li>The attacker gains a shell session with the privileges of the OpenHarness process user.</li>
<li>The attacker accesses local files, credentials, workspace state, and repository contents, potentially exfiltrating sensitive data or establishing persistence.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7551 allows attackers to execute arbitrary operating system commands on the OpenHarness server. This grants them the ability to spawn shell sessions as the OpenHarness process user, which can lead to the exposure of sensitive information such as local files, credentials, workspace state, and repository contents. The impact of this vulnerability is significant, potentially allowing for complete system compromise and data exfiltration, but the exact number of victims is currently unknown.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply available patches or updates provided by HKUDS to address CVE-2026-7551 on all OpenHarness instances.</li>
<li>Implement input validation and sanitization on the /bridge slash command to prevent the injection of malicious OS commands.</li>
<li>Monitor process creation events for suspicious shell executions originating from the OpenHarness process using the provided Sigma rule.</li>
<li>Restrict network access to the OpenHarness server to only authorized users and systems.</li>
<li>Review OpenHarness configurations to ensure that only trusted communication channels are accepted.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>rce</category><category>vulnerability</category><category>injection</category></item><item><title>Synway SMG Gateway Management Software Unauthenticated OS Command Injection</title><link>https://feed.craftedsignal.io/briefs/2026-05-synway-smg-rce/</link><pubDate>Thu, 30 Apr 2026 17:16:25 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-synway-smg-rce/</guid><description>Synway SMG Gateway Management Management Software is vulnerable to unauthenticated OS command injection via crafted POST requests to the RADIUS configuration endpoint, leading to remote code execution.</description><content:encoded><![CDATA[<p>Synway SMG Gateway Management Software is susceptible to an OS command injection vulnerability (CVE-2025-71284) within the RADIUS configuration endpoint. An unauthenticated remote attacker can exploit this flaw by sending a specially crafted POST request to <code>/en/9-2radius.php</code>. The vulnerability lies in the improper sanitization of the <code>radius_address</code> POST parameter, which is directly incorporated into a <code>sed</code> command. The Shadowserver Foundation observed the first exploitation evidence on 2025-07-11 (UTC). Successful exploitation allows the attacker to execute arbitrary shell commands on the affected system, potentially compromising the entire gateway. This vulnerability poses a significant risk to organizations using the Synway SMG Gateway, as it enables unauthenticated remote code execution.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a Synway SMG Gateway Management Software instance exposed to the network.</li>
<li>The attacker crafts a malicious POST request targeting the <code>/en/9-2radius.php</code> endpoint.</li>
<li>The POST request includes parameters such as <code>radius_address</code>, <code>radius_address2</code>, <code>shared_secret2</code>, <code>source_ip</code>, <code>timeout</code>, or <code>retry</code> along with <code>save=1</code> and <code>enable_radius=1</code>.</li>
<li>The <code>radius_address</code> parameter contains an OS command injection payload.</li>
<li>The application improperly sanitizes the <code>radius_address</code> parameter and incorporates it into a <code>sed</code> command.</li>
<li>The injected command is executed by the operating system, granting the attacker arbitrary code execution privileges.</li>
<li>The attacker establishes a reverse shell to maintain persistence and expand their foothold.</li>
<li>The attacker pivots within the network, gaining access to sensitive data or systems, and potentially establishing a long-term presence.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an unauthenticated attacker to execute arbitrary commands on the Synway SMG Gateway. This could lead to complete system compromise, data theft, disruption of services, and further propagation of attacks within the network. Given the high CVSS score (9.8), this vulnerability represents a critical threat. The number of affected systems and organizations is currently unknown.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Synway SMG Gateway Radius Command Injection Attempt&rdquo; to your SIEM to detect exploitation attempts based on suspicious POST requests to the vulnerable endpoint.</li>
<li>Apply input validation and sanitization to the <code>radius_address</code>, <code>radius_address2</code>, <code>shared_secret2</code>, <code>source_ip</code>, <code>timeout</code>, and <code>retry</code> parameters in the RADIUS configuration endpoint.</li>
<li>Monitor web server logs for POST requests to <code>/en/9-2radius.php</code> containing suspicious characters or command sequences indicative of command injection attacks to activate the &ldquo;Synway SMG Gateway Radius Command Injection Attempt&rdquo; rule.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>command-injection</category><category>rce</category><category>network</category></item><item><title>GIMP Multiple Vulnerabilities Allow Remote Code Execution</title><link>https://feed.craftedsignal.io/briefs/2026-05-gimp-rce/</link><pubDate>Thu, 30 Apr 2026 09:18:57 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-gimp-rce/</guid><description>A remote, anonymous attacker can exploit multiple unspecified vulnerabilities in GIMP to achieve arbitrary code execution on a vulnerable system.</description><content:encoded><![CDATA[<p>Multiple vulnerabilities in GIMP allow a remote, anonymous attacker to execute arbitrary code on a vulnerable system. The specific vulnerabilities are not detailed in the advisory, but the potential impact is significant, as successful exploitation could allow an attacker to gain complete control over the affected system. This threat is relevant to organizations and individuals using GIMP in their environments. Defenders should focus on detecting anomalous process execution originating from GIMP or unexpected network connections initiated by the application.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious image or file designed to exploit a vulnerability in GIMP.</li>
<li>The attacker delivers the malicious file to a target user, potentially through social engineering or a compromised website.</li>
<li>The target user opens the malicious file with GIMP.</li>
<li>GIMP parses the malicious file, triggering the unspecified vulnerability.</li>
<li>The vulnerability allows the attacker to execute arbitrary code within the context of the GIMP process.</li>
<li>The attacker leverages the initial code execution to escalate privileges or establish persistence on the system.</li>
<li>The attacker may then install malware, exfiltrate sensitive data, or perform other malicious activities.</li>
<li>The attacker achieves their objective, such as data theft, system compromise, or disruption of services.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities can lead to arbitrary code execution, potentially granting an attacker complete control over the affected system. This could result in data theft, malware installation, system compromise, or disruption of services. The advisory does not specify the number of potential victims, but given the popularity of GIMP, the impact could be widespread.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process execution for unexpected child processes spawned by GIMP to detect potential exploitation attempts. Deploy the Sigma rule <code>GIMP Suspicious Child Processes</code> to your SIEM.</li>
<li>Monitor network connections originating from GIMP for connections to unusual or malicious domains. Deploy the Sigma rule <code>GIMP Suspicious Network Connections</code> to your SIEM.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>vulnerability</category><category>rce</category><category>gimp</category></item><item><title>Multiple Vulnerabilities in Wireshark Lead to Remote Code Execution and Denial of Service</title><link>https://feed.craftedsignal.io/briefs/2026-04-wireshark-vulns/</link><pubDate>Thu, 30 Apr 2026 00:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-wireshark-vulns/</guid><description>Multiple vulnerabilities in Wireshark versions 4.4.x before 4.4.15 and 4.6.x before 4.6.5 could allow remote attackers to execute arbitrary code, cause a denial of service, or compromise data confidentiality.</description><content:encoded><![CDATA[<p>On April 30, 2026, CERT-FR published an advisory regarding multiple vulnerabilities discovered in Wireshark, a widely used network protocol analyzer. The vulnerabilities affect Wireshark versions 4.4.x prior to 4.4.15 and 4.6.x prior to 4.6.5. Successful exploitation of these vulnerabilities could lead to remote code execution (RCE), denial-of-service (DoS) conditions, and unauthorized disclosure of sensitive data. Given Wireshark&rsquo;s role in network analysis, these vulnerabilities pose a significant risk to organizations using the tool for monitoring and troubleshooting network traffic. These vulnerabilities highlight the importance of keeping software up to date, especially software that handles sensitive data.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker crafts a malicious network packet or capture file.</li>
<li>The victim opens the malicious packet or capture file in a vulnerable version of Wireshark (4.4.x before 4.4.15 or 4.6.x before 4.6.5).</li>
<li>Wireshark parses the packet or file using a vulnerable dissector.</li>
<li>The vulnerable dissector fails to properly handle the malformed data, leading to a buffer overflow or other memory corruption issue.</li>
<li>The memory corruption allows the attacker to overwrite critical program data or inject malicious code.</li>
<li>The injected code is executed within the context of the Wireshark process.</li>
<li>The attacker gains control of the Wireshark process.</li>
<li>The attacker performs unauthorized actions, such as exfiltrating sensitive data or causing a denial-of-service condition.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities can have severe consequences, including remote code execution, potentially allowing an attacker to gain complete control over the affected system. A denial-of-service condition can disrupt network analysis activities and hinder incident response efforts. Data confidentiality can be compromised if an attacker gains access to sensitive network traffic data captured by Wireshark. The impact is significant for network administrators and security professionals who rely on Wireshark for network monitoring and analysis.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately upgrade Wireshark to version 4.4.15 or 4.6.5 or later to patch the vulnerabilities (refer to the Wireshark security advisories wnpa-sec-2026-08 through wnpa-sec-2026-50).</li>
<li>Implement network access controls to limit exposure of Wireshark instances to untrusted network traffic, reducing the likelihood of processing malicious packets.</li>
<li>Deploy the Sigma rule &ldquo;Detect Wireshark opening network capture files from untrusted locations&rdquo; to identify potential exploitation attempts.</li>
<li>Monitor systems running vulnerable versions of Wireshark for suspicious activity, such as unexpected process crashes or unauthorized network connections.</li>
<li>Consider using alternative packet analysis tools or sandboxing Wireshark for analyzing potentially malicious network traffic.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>wireshark</category><category>vulnerability</category><category>rce</category><category>dos</category></item><item><title>n8n XML Node Prototype Pollution Leading to RCE</title><link>https://feed.craftedsignal.io/briefs/2024-01-n8n-rce/</link><pubDate>Wed, 29 Apr 2026 21:25:53 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-n8n-rce/</guid><description>A vulnerability in n8n allows authenticated users with workflow creation permissions to achieve remote code execution (RCE) through global prototype pollution via the XML Node in versions prior to 1.123.32, versions 2.17.0 to 2.17.4, and versions 2.18.0 to 2.18.1.</description><content:encoded><![CDATA[<p>A critical vulnerability, CVE-2026-42232, exists within the n8n workflow automation tool. This flaw allows an authenticated user, who possesses permissions to create or modify workflows, to achieve remote code execution (RCE). The attack vector involves exploiting global prototype pollution through the XML Node. Versions affected include those prior to 1.123.32, versions 2.17.0 up to but not including 2.17.4, and versions 2.18.0 up to but not including 2.18.1. Defenders should prioritize patching n8n instances due to the high potential for complete system compromise if exploited.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker authenticates to an n8n instance with workflow creation/modification privileges.</li>
<li>The attacker crafts a malicious workflow that leverages the XML Node to inject a payload designed to trigger prototype pollution.</li>
<li>The crafted XML node manipulates global object prototypes within the n8n application.</li>
<li>The attacker introduces a property into a global object prototype that can be exploited by another node.</li>
<li>The attacker adds a secondary node (e.g., Function node) that leverages the polluted prototype property.</li>
<li>The secondary node&rsquo;s execution triggers the polluted prototype, leading to arbitrary code execution.</li>
<li>The attacker executes arbitrary commands on the n8n server.</li>
<li>The attacker gains complete control of the n8n server, potentially leading to data exfiltration, lateral movement, or other malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to execute arbitrary code on the n8n server. This can lead to full system compromise, including data exfiltration, credential theft, and lateral movement within the network. Given the nature of n8n as an automation platform, successful attacks can severely impact connected systems and services. This vulnerability affects n8n users who have not upgraded to patched versions.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade n8n to version 1.123.32, 2.17.4, 2.18.1, or later to remediate CVE-2026-42232.</li>
<li>As a temporary mitigation, limit workflow creation and editing permissions to only fully trusted users as suggested in the advisory.</li>
<li>As a temporary mitigation, disable the XML node by adding <code>n8n-nodes-base.xml</code> to the <code>NODES_EXCLUDE</code> environment variable as suggested in the advisory.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>rce</category><category>prototype pollution</category><category>n8n</category></item><item><title>n8n Prototype Pollution in XML Webhook Body Parser Leads to RCE</title><link>https://feed.craftedsignal.io/briefs/2026-04-n8n-rce/</link><pubDate>Wed, 29 Apr 2026 21:25:02 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-n8n-rce/</guid><description>A prototype pollution vulnerability in n8n's XML webhook parser, exploitable by authenticated users, can lead to remote code execution on the n8n host.</description><content:encoded><![CDATA[<p>A critical vulnerability exists within the n8n workflow automation platform, specifically affecting the parsing of XML request bodies in webhook handlers. This flaw stems from the use of the <code>xml2js</code> library, which is susceptible to prototype pollution attacks. An authenticated user possessing the capability to create or modify workflows can leverage this vulnerability by sending a specially crafted XML payload. Successful exploitation results in the pollution of the JavaScript object prototype. Attackers can chain this pollution with the Git node&rsquo;s SSH operations to achieve arbitrary remote code execution (RCE) on the underlying n8n host. The vulnerability affects n8n versions prior to 1.123.32, versions 2.17.0 to 2.17.3, and versions 2.18.0 to 2.18.0.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker authenticates to the n8n instance.</li>
<li>The attacker crafts a malicious XML payload designed to exploit the prototype pollution vulnerability in the <code>xml2js</code> library.</li>
<li>The attacker creates or modifies a workflow containing a webhook node configured to receive XML data.</li>
<li>The attacker sends the crafted XML payload to the webhook endpoint.</li>
<li>The <code>xml2js</code> library parses the malicious XML, inadvertently polluting the JavaScript object prototype with attacker-controlled properties.</li>
<li>The attacker includes a Git node in the workflow.</li>
<li>The polluted prototype modifies the behavior of the Git node&rsquo;s SSH operations.</li>
<li>When the workflow executes, the Git node&rsquo;s SSH operation is hijacked due to the prototype pollution, leading to arbitrary code execution on the n8n host.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows a malicious actor to execute arbitrary code on the n8n server. This grants them complete control over the n8n instance and potentially the underlying infrastructure. The vulnerability impacts any n8n instance accessible to authenticated users who can create or modify workflows. The number of affected installations is unknown, but the potential impact is high due to the sensitive nature of workflows often managed by n8n, which can include access to other systems and data.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade n8n to version 1.123.32, 2.17.4, 2.18.1, or later to patch the vulnerability as described in the overview.</li>
<li>Deploy the Sigma rule &ldquo;Detect n8n Prototype Pollution via Crafted XML Payload&rdquo; to detect malicious XML payloads targeting the vulnerability. Enable webserver logs to activate this rule.</li>
<li>Limit workflow creation and editing permissions to trusted users to mitigate the risk of exploitation, as described in the workaround.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>prototype-pollution</category><category>rce</category><category>n8n</category></item><item><title>Hyperledger Fabric SDK Java Deserialization RCE</title><link>https://feed.craftedsignal.io/briefs/2024-01-26-fabric-deserialization/</link><pubDate>Wed, 29 Apr 2026 20:41:58 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-26-fabric-deserialization/</guid><description>The deprecated fabric-sdk-java client SDK is vulnerable to Java deserialization RCE due to the use of ObjectInputStream.readObject() without an ObjectInputFilter in Channel.java, allowing remote code execution if an attacker can supply crafted serialized Channel bytes to the client application.</description><content:encoded><![CDATA[<p>The <code>fabric-sdk-java</code> client SDK, a deprecated component of Hyperledger Fabric, contains a critical vulnerability related to insecure deserialization. Specifically, the <code>Channel.java</code> file implements <code>readObject()</code> and exposes <code>deSerializeChannel()</code> methods that call <code>ObjectInputStream.readObject()</code> on untrusted byte arrays without configuring an <code>ObjectInputFilter</code>. This omission allows an attacker to inject malicious serialized Java objects, leading to remote code execution (RCE). While <code>fabric-sdk-java</code> has been deprecated since Hyperledger Fabric v2.5 and replaced by <code>org.hyperledger.fabric:fabric-gateway</code>, organizations that have not yet migrated are still vulnerable. This issue highlights the risks associated with using deprecated software and the importance of migrating to supported versions. The vulnerability exists in versions 1.0.0 through 2.2.26.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker crafts a malicious serialized Java object using a tool like <code>ysoserial</code>. For example, <code>java -jar ysoserial.jar CommonsCollections6 &quot;touch /tmp/pwned&quot; &gt; malicious_channel.ser</code>.</li>
<li>The attacker gains the ability to supply crafted serialized Channel bytes to the client application. This could involve compromising a local channel file.</li>
<li>The attacker injects the malicious serialized data through an application that accepts Channel bytes from external sources.</li>
<li>The vulnerable <code>deSerializeChannel()</code> method in <code>Channel.java</code> is called with the attacker-controlled byte array.</li>
<li>Inside <code>deSerializeChannel()</code>, an <code>ObjectInputStream</code> is created from the byte array.</li>
<li>The <code>readObject()</code> method of <code>ObjectInputStream</code> is called without any <code>ObjectInputFilter</code>, deserializing the malicious object.</li>
<li>The deserialization process triggers the execution of a gadget chain embedded in the malicious object.</li>
<li>The gadget chain executes arbitrary code on the server, achieving RCE.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to execute arbitrary code on the server running the vulnerable <code>fabric-sdk-java</code> application. This can lead to complete system compromise, data breaches, and other malicious activities. The severity is critical due to the potential for unauthenticated remote code execution. Organizations still using the deprecated <code>fabric-sdk-java</code> are at high risk until they migrate to the supported <code>fabric-gateway</code>.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li><strong>Migrate to <code>org.hyperledger.fabric:fabric-gateway</code> immediately</strong> as the primary remediation, as it does not use Java serialization.</li>
<li>For organizations unable to migrate immediately, apply the suggested fix of adding an <code>ObjectInputFilter</code> to whitelist only expected classes as described in the advisory.</li>
<li>Implement runtime monitoring of Java deserialization to detect and prevent exploitation attempts.</li>
<li>Enable logging of deserialization events to aid in incident response.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>deserialization</category><category>rce</category><category>java</category></item><item><title>Cockpit CMS Authenticated Remote Code Execution via Code Injection</title><link>https://feed.craftedsignal.io/briefs/2026-04-cockpit-rce/</link><pubDate>Wed, 29 Apr 2026 20:16:29 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-cockpit-rce/</guid><description>Cockpit CMS is vulnerable to authenticated remote code execution via PHP code injection in the /cockpit/collections/save_collection endpoint, enabling attackers with collection management privileges to execute arbitrary commands on the server.</description><content:encoded><![CDATA[<p>Cockpit CMS is vulnerable to remote code execution due to insufficient input validation in the <code>/cockpit/collections/save_collection</code> endpoint. An authenticated attacker with collection management privileges can inject arbitrary PHP code into collection rules parameters. This vulnerability, identified as CVE-2026-34965, allows attackers to inject malicious PHP code through rule parameters. The injected code is then written directly to server-side PHP files and executed via the <code>include()</code> function, leading to arbitrary command execution on the underlying server. This poses a significant risk to organizations using Cockpit CMS, potentially leading to complete system compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker authenticates to the Cockpit CMS application with valid collection management credentials.</li>
<li>Attacker navigates to the <code>/cockpit/collections/save_collection</code> endpoint.</li>
<li>Attacker crafts a malicious request to the <code>/cockpit/collections/save_collection</code> endpoint containing PHP code within collection rules parameters.</li>
<li>The application saves the attacker-supplied PHP code into a PHP file on the server.</li>
<li>The application uses the <code>include()</code> function to execute the PHP file.</li>
<li>The injected PHP code executes arbitrary commands on the underlying server, granting the attacker control of the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to execute arbitrary commands on the underlying server. This can lead to complete system compromise, including data theft, modification, or deletion. Given the high CVSS score (8.8), this vulnerability poses a critical risk, especially for internet-facing Cockpit CMS installations. Organizations in any sector using Cockpit CMS are potentially affected.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the patch or upgrade to a version of Cockpit CMS that addresses CVE-2026-34965 to remediate the vulnerability.</li>
<li>Deploy the Sigma rule <code>Detect Suspicious Cockpit CMS Save Collection Activity</code> to identify potential exploitation attempts in web server logs.</li>
<li>Monitor web server logs for POST requests to <code>/cockpit/collections/save_collection</code> with suspicious characters or PHP code in the request body, as detected by the Sigma rule <code>Detect PHP Code Injection in Cockpit CMS Collections</code>.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>rce</category><category>code-injection</category><category>cockpit-cms</category></item><item><title>BuddyPress Xprofile Custom Fields Type 2.6.3 Remote Code Execution via Arbitrary File Deletion</title><link>https://feed.craftedsignal.io/briefs/2026-04-buddypress-rce/</link><pubDate>Wed, 29 Apr 2026 20:16:26 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-buddypress-rce/</guid><description>CVE-2018-25308 is a remote code execution vulnerability in BuddyPress Xprofile Custom Fields Type 2.6.3 that allows authenticated users to delete arbitrary files on the server by manipulating POST parameters.</description><content:encoded><![CDATA[<p>BuddyPress Xprofile Custom Fields Type 2.6.3 is vulnerable to a remote code execution vulnerability, identified as CVE-2018-25308. This flaw enables authenticated users to execute arbitrary code on the server by deleting arbitrary files. The attack involves manipulating unescaped POST parameters, specifically <code>field_hiddenfile</code> and <code>field_deleteimg</code>, during profile editing actions. Successful exploitation allows attackers to unlink files from the server, potentially disrupting services or gaining unauthorized access. This vulnerability was published on 2026-04-29 and poses a significant threat to BuddyPress installations that have not applied the necessary patches.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker authenticates to a BuddyPress site running the vulnerable Xprofile Custom Fields Type 2.6.3 plugin.</li>
<li>The attacker navigates to their profile editing page.</li>
<li>The attacker crafts a malicious HTTP POST request to the profile update endpoint.</li>
<li>Within the POST request, the <code>field_hiddenfile</code> and <code>field_deleteimg</code> parameters are manipulated to point to arbitrary files on the server.</li>
<li>The server-side script processes the crafted POST request without proper sanitization or validation of the file paths.</li>
<li>The <code>unlink()</code> function or an equivalent file deletion function is called with the attacker-controlled file paths.</li>
<li>The targeted files are deleted from the server file system.</li>
<li>The attacker can potentially delete critical system files or web application files, leading to remote code execution or denial of service.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2018-25308 allows authenticated attackers to delete arbitrary files on the server. This can lead to a denial-of-service condition if critical system files are removed. The vulnerability can also potentially lead to remote code execution if the attacker is able to delete and replace executable files or inject malicious code into configuration files. While the number of victims is unknown, all BuddyPress installations using the vulnerable plugin are susceptible.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply any available patches or updates for BuddyPress Xprofile Custom Fields Type to address CVE-2018-25308.</li>
<li>Implement input validation and sanitization on the server-side to prevent manipulation of file paths in POST parameters.</li>
<li>Monitor web server logs for suspicious POST requests targeting the profile update endpoint with unusual <code>field_hiddenfile</code> and <code>field_deleteimg</code> parameter values (reference the attack chain).</li>
<li>Deploy the Sigma rule provided to detect exploitation attempts based on the manipulation of specific POST parameters (reference the Sigma rule).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>rce</category><category>file-deletion</category><category>wordpress</category></item><item><title>AgentFlow Arbitrary Code Execution via Pipeline Path Manipulation (CVE-2026-7466)</title><link>https://feed.craftedsignal.io/briefs/2026-04-agentflow-rce/</link><pubDate>Wed, 29 Apr 2026 19:16:27 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-agentflow-rce/</guid><description>AgentFlow is vulnerable to arbitrary code execution (CVE-2026-7466) by manipulating the `pipeline_path` parameter in POST requests to `/api/runs` and `/api/runs/validate`, allowing attackers to execute arbitrary Python code.</description><content:encoded><![CDATA[<p>AgentFlow is susceptible to an arbitrary code execution vulnerability identified as CVE-2026-7466. This flaw stems from insufficient validation of the <code>pipeline_path</code> parameter within the <code>/api/runs</code> and <code>/api/runs/validate</code> endpoints. By crafting malicious POST requests and supplying a user-controlled <code>pipeline_path</code>, an attacker can induce the AgentFlow API to load and execute arbitrary Python pipeline files present on the server&rsquo;s filesystem. Successful exploitation leads to code execution within the security context of the user running AgentFlow, potentially granting the attacker full control over the affected system. This vulnerability poses a significant threat to organizations utilizing AgentFlow, as it can lead to data breaches, system compromise, and other malicious activities.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies an AgentFlow instance running a vulnerable version.</li>
<li>Attacker crafts a POST request to the <code>/api/runs</code> endpoint, including a <code>pipeline_path</code> parameter.</li>
<li>The <code>pipeline_path</code> parameter is set to the path of a malicious Python file already existing on the AgentFlow server (or uploaded previously through other means).</li>
<li>The attacker sends the malicious POST request to the <code>/api/runs</code> endpoint.</li>
<li>AgentFlow processes the request without properly validating the <code>pipeline_path</code>.</li>
<li>AgentFlow loads and executes the Python file specified in the <code>pipeline_path</code>.</li>
<li>The attacker-controlled Python code executes with the privileges of the AgentFlow process.</li>
<li>The attacker achieves arbitrary code execution, potentially leading to complete system compromise, data exfiltration, or denial of service.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7466 allows an attacker to execute arbitrary code on the AgentFlow server. This can lead to a complete compromise of the system, including the theft of sensitive data, modification of critical system files, or the installation of backdoors for persistent access. The severity of the impact depends on the privileges of the user account running AgentFlow, but in many cases, it can lead to full system administrator access.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Implement input validation and sanitization on the <code>pipeline_path</code> parameter within the <code>/api/runs</code> and <code>/api/runs/validate</code> endpoints to prevent arbitrary file loading and execution.</li>
<li>Monitor web server logs for POST requests to <code>/api/runs</code> and <code>/api/runs/validate</code> containing suspicious <code>pipeline_path</code> values (see example Sigma rule below).</li>
<li>Restrict file system permissions to limit the ability of the AgentFlow user to read and execute arbitrary Python files.</li>
<li>Apply available patches or updates for AgentFlow as soon as they are released to address this vulnerability.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-7466</category><category>rce</category><category>code-injection</category></item><item><title>Multiple Vulnerabilities in Spring Boot Allow Authorization Bypass and Potential RCE</title><link>https://feed.craftedsignal.io/briefs/2026-04-spring-boot-vulns/</link><pubDate>Wed, 29 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-spring-boot-vulns/</guid><description>Multiple vulnerabilities in Spring Boot, including CVE-2026-40976, CVE-2026-40973, and CVE-2026-40972, can allow attackers to bypass authorization, hijack sessions, or achieve remote code execution, potentially leading to data breaches and system compromise.</description><content:encoded><![CDATA[<p>A set of critical vulnerabilities has been discovered in Spring Boot, a widely used Java framework for building web applications and backend services. These vulnerabilities, including CVE-2026-40976 (CVSS 9.1), CVE-2026-40973 (CVSS 7.0), and CVE-2026-40972 (CVSS 7.5), pose a significant threat to organizations using affected versions (specifically versions before 4.0.6, 3.5.14, 3.4.16, 3.3.19, and 2.7.33). Successful exploitation could lead to unauthorized access, session hijacking, and remote code execution, impacting the confidentiality, integrity, and availability of critical business systems. The initial advisory was released by CCB Belgium on April 28, 2026, urging immediate patching.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access (CVE-2026-40976 - Authentication Bypass):</strong> An attacker sends a crafted HTTP request to a vulnerable Spring Boot application endpoint.</li>
<li><strong>Exploit Default Configuration:</strong> If the application is servlet-based, relies on the default Spring Security filter chain, depends on spring-boot-actuator-autoconfigure, and does not depend on spring-boot-health, the default web security configuration fails to enforce authorization.</li>
<li><strong>Unauthorized Access:</strong> Due to the authorization bypass, the attacker gains unauthorized access to all application endpoints without proper authentication.</li>
<li><strong>Session Hijacking (CVE-2026-40973):</strong> A local attacker exploits the vulnerability to take control of the ApplicationTemp directory.</li>
<li><strong>Code Execution (CVE-2026-40973):</strong> Once in control of the ApplicationTemp directory, the attacker can potentially execute arbitrary code within the context of the application.</li>
<li><strong>Timing Attack (CVE-2026-40972):</strong> An attacker on the same network conducts a timing attack against the DevTools remote secret.</li>
<li><strong>Remote Code Execution (CVE-2026-40972):</strong> By successfully exploiting the timing attack, the attacker can potentially achieve remote code execution on the vulnerable server.</li>
<li><strong>Impact:</strong> The attacker gains full control of the system, allowing for data exfiltration, system compromise, and operational downtime.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these Spring Boot vulnerabilities can lead to significant damage, including unauthorized access to sensitive data, complete system compromise, and extended operational downtime. The potential number of victims is vast, considering the widespread use of Spring Boot in various sectors including finance, healthcare, and e-commerce. If an attacker successfully exploits these vulnerabilities, they could steal sensitive customer data, disrupt critical business operations, or deploy ransomware, resulting in significant financial losses and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately patch Spring Boot applications to the latest versions (&gt;=4.0.6, &gt;=3.5.14, &gt;=3.4.16, &gt;=3.3.19, &gt;=2.7.33) to address CVE-2026-40976, CVE-2026-40973, and CVE-2026-40972.</li>
<li>Deploy the Sigma rule &ldquo;Detect Suspicious Access to Actuator Endpoints&rdquo; to identify potential exploitation attempts targeting CVE-2026-40976 by monitoring access to sensitive actuator endpoints.</li>
<li>Upscale monitoring and detection capabilities to identify any related suspicious activity as recommended by the CCB.</li>
<li>Investigate and remediate any potentially compromised systems following the patching process.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>spring-boot</category><category>vulnerability</category><category>rce</category><category>authentication-bypass</category><category>session-hijacking</category></item><item><title>Apache MINA Arbitrary Code Execution Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-apache-mina-rce/</link><pubDate>Mon, 27 Apr 2026 16:09:56 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-apache-mina-rce/</guid><description>A critical arbitrary code execution vulnerability (CVE-2026-41635) exists in Apache MINA versions 2.0.0 through 2.0.27, 2.1.0 through 2.1.10, and 2.2.0 through 2.2.5 due to missing class validation in the AbstractIoBuffer.resolveClass() method, potentially allowing attackers to execute arbitrary code on applications using Apache MINA.</description><content:encoded><![CDATA[<p>A critical arbitrary code execution vulnerability, CVE-2026-41635, has been identified in Apache MINA, an open-source network application framework. The vulnerability affects versions 2.0.0 through 2.0.27, 2.1.0 through 2.1.10, and 2.2.0 through 2.2.5. The flaw lies within the AbstractIoBuffer.resolveClass() method, where a branch lacks class validation, bypassing the classname allowlist. This allows remote attackers with low privileges to execute arbitrary code on systems using Apache MINA when the IoBuffer.getObject() method is called. Successful exploitation can lead to full system compromise, data exfiltration, and further attacks on interconnected systems. It is imperative that organizations using Apache MINA apply the necessary patches immediately to mitigate this critical risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable application using Apache MINA versions 2.0.0-2.0.27, 2.1.0-2.1.10, or 2.2.0-2.2.5.</li>
<li>The attacker crafts a malicious payload containing serialized Java objects designed to exploit the class validation bypass in <code>AbstractIoBuffer.resolveClass()</code>.</li>
<li>The attacker sends a network request to the vulnerable application that triggers the <code>IoBuffer.getObject()</code> method.</li>
<li>The <code>IoBuffer.getObject()</code> method deserializes the attacker-controlled data without proper class validation due to the flaw in <code>AbstractIoBuffer.resolveClass()</code>.</li>
<li>The malicious serialized object executes arbitrary code within the context of the application.</li>
<li>The attacker gains control of the application server.</li>
<li>The attacker uses their access to move laterally within the network.</li>
<li>The attacker exfiltrates sensitive data or deploys ransomware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-41635 allows attackers to execute arbitrary code on systems utilizing vulnerable versions of Apache MINA. This can lead to a full compromise of the affected system, including data exfiltration, denial of service, or further attacks on interconnected systems. The vulnerability is remotely exploitable with low privileges, increasing the potential for widespread impact across various sectors relying on Apache MINA for network communication. A successful attack poses a high risk to the confidentiality, integrity, and availability of affected systems and data.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately patch Apache MINA to the latest version to remediate CVE-2026-41635, as recommended by the vendor advisory (<a href="https://lists.apache.org/thread/1l91w1mqsb3lwfd504fs045ylxntt2tm)">https://lists.apache.org/thread/1l91w1mqsb3lwfd504fs045ylxntt2tm)</a>.</li>
<li>Implement network monitoring to detect suspicious activity related to deserialization attempts, as suggested by the CCB&rsquo;s recommendation to upscale monitoring capabilities.</li>
<li>Deploy the Sigma rule &ldquo;Detect Apache MINA Vulnerable Class Deserialization Attempt&rdquo; to identify potential exploitation attempts based on suspicious class names in network traffic.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>apache-mina</category><category>rce</category><category>deserialization</category><category>cve-2026-41635</category></item><item><title>Linksys MR9600 Command Injection Vulnerability (CVE-2026-6992)</title><link>https://feed.craftedsignal.io/briefs/2026-04-linksys-rce/</link><pubDate>Sun, 26 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-linksys-rce/</guid><description>CVE-2026-6992 is a command injection vulnerability in the Linksys MR9600 router that allows remote attackers to execute arbitrary OS commands by manipulating the 'pin' argument in the BTRequestGetSmartConnectStatus function.</description><content:encoded><![CDATA[<p>A command injection vulnerability, CVE-2026-6992, affects the Linksys MR9600 router, specifically version 2.0.6.206937. The vulnerability resides in the JNAP Action Handler component within the <code>/etc/init.d/run_central2.sh</code> script. Attackers can remotely exploit this flaw by manipulating the <code>pin</code> argument passed to the <code>BTRequestGetSmartConnectStatus</code> function. This allows for the execution of arbitrary operating system commands on the affected device. A public exploit is available, increasing the risk of exploitation. The vendor was notified but did not respond.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker sends a crafted HTTP request to the Linksys MR9600 router.</li>
<li>The request targets the JNAP Action Handler component, specifically the <code>/etc/init.d/run_central2.sh</code> script.</li>
<li>The <code>BTRequestGetSmartConnectStatus</code> function is invoked by the crafted request.</li>
<li>The attacker injects malicious OS commands within the <code>pin</code> argument of the <code>BTRequestGetSmartConnectStatus</code> function.</li>
<li>The router&rsquo;s firmware processes the request, failing to properly sanitize the <code>pin</code> argument.</li>
<li>The injected OS commands are executed with the privileges of the running process, potentially <code>root</code>.</li>
<li>The attacker gains control of the router, potentially allowing for further malicious activities, such as network traffic interception or modification of router settings.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-6992 allows a remote attacker to execute arbitrary commands on the Linksys MR9600 router. This can lead to a complete compromise of the device, allowing the attacker to monitor network traffic, change router configurations, or use the router as a foothold for further attacks within the network. Given the availability of a public exploit, the risk of widespread exploitation is high.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect CVE-2026-6992 Exploitation Attempt</code> to identify exploitation attempts in web server logs.</li>
<li>Apply the Sigma rule <code>Detect Suspicious Shell Activity via Web Request</code> to detect potential command injection attempts.</li>
<li>Monitor web server logs for requests containing suspicious characters in the <code>cs-uri-query</code> field that target <code>/etc/init.d/run_central2.sh</code> to uncover exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-6992</category><category>command-injection</category><category>router</category><category>rce</category></item><item><title>Rclone Unauthenticated Remote Code Execution Vulnerabilities</title><link>https://feed.craftedsignal.io/briefs/2026-04-rclone-rce/</link><pubDate>Sat, 25 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-rclone-rce/</guid><description>Rclone versions prior to 1.73.5 are vulnerable to two critical unauthenticated remote code execution vulnerabilities (CVE-2026-41176 and CVE-2026-41179) when the remote control API is enabled without authentication, potentially allowing attackers to execute arbitrary commands and compromise the system.</description><content:encoded><![CDATA[<p>Two critical unauthenticated remote code execution vulnerabilities, CVE-2026-41176 and CVE-2026-41179, have been discovered in Rclone versions prior to 1.73.5. Rclone is a command-line program used to manage files on cloud storage services. These vulnerabilities can be exploited if the Rclone remote control (RC) API is enabled without proper authentication (e.g., <code>--rc-user/--rc-pass/--rc-htpasswd</code>). An attacker with network access to a vulnerable Rclone instance can bypass authentication, execute arbitrary commands, and potentially gain full system compromise. As organizations increasingly rely on cloud storage, vulnerabilities in tools like Rclone can have significant impact by enabling data theft and lateral movement. The vulnerabilities were reported on April 24, 2026, with no known active exploitation as of April 23, 2026.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a target system running Rclone with the RC API enabled.</li>
<li>The attacker verifies the RC API is exposed on a reachable network address (e.g., not only localhost) and is not protected by HTTP authentication.</li>
<li>For CVE-2026-41179, the attacker sends a single crafted HTTP request to the RC endpoint, leveraging the WebDAV backend initialization process.</li>
<li>This crafted request triggers the execution of arbitrary commands on the target system without authentication.</li>
<li>For CVE-2026-41176, the attacker bypasses authentication controls to access sensitive administrative functionality.</li>
<li>The attacker manipulates Rclone configuration or invokes operational RC methods to execute arbitrary commands.</li>
<li>The attacker gains local file read/write access, potentially stealing sensitive data or uploading malicious payloads.</li>
<li>The attacker achieves full system compromise, enabling data theft, lateral movement within the network, or denial of service.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-41176 and CVE-2026-41179 can lead to full system compromise, data theft, lateral movement, or denial of service. Specifically, attackers can achieve local file read, file write, or shell access, depending on the environment. The impact includes potential exposure of sensitive cloud data and configurations, which could compromise the integrity and confidentiality of stored information. Given Rclone&rsquo;s popularity among organizations managing cloud storage, a successful attack could affect a large number of victims across various sectors.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Rclone to version 1.73.5 or later to patch CVE-2026-41176 and CVE-2026-41179 as recommended by the vendor.</li>
<li>Enable global HTTP authentication on RC servers using <code>--rc-user</code>, <code>--rc-pass</code>, or <code>--rc-htpasswd</code> to mitigate the unauthenticated access, as mentioned in the description of the vulnerabilities.</li>
<li>Implement network-level controls (e.g., firewall rules) to restrict access to RC server endpoints and the RC service, as suggested by CCB.</li>
<li>Deploy the Sigma rule &ldquo;Detect Rclone RC API Access Without Authentication&rdquo; to identify potentially vulnerable Rclone instances within your environment.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">threat</category><category>vulnerability</category><category>rce</category><category>cloud</category></item><item><title>ERB Deserialization Bypass via def_module/def_method/def_class</title><link>https://feed.craftedsignal.io/briefs/2026-04-erb-deserialization/</link><pubDate>Sat, 25 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-erb-deserialization/</guid><description>A deserialization vulnerability exists in Ruby ERB versions before 4.0.3.1, version 4.0.4, ERB versions 5.0.0 before 6.0.1.1, and ERB versions 6.0.2 before 6.0.4. The `@_init` instance variable guard in `ERB#result` and `ERB#run` can be bypassed via `ERB#def_module`, `ERB#def_method`, and `ERB#def_class`, allowing arbitrary code execution when an ERB object is reconstructed via `Marshal.load` on untrusted data.</description><content:encoded><![CDATA[<p>Ruby versions before ERB 2.2.0 implemented an <code>@_init</code> instance variable guard in <code>ERB#result</code> and <code>ERB#run</code> to prevent code execution upon deserialization via <code>Marshal.load</code>. This guard is intended to block execution when an ERB object is reconstructed from untrusted data. However, the methods <code>ERB#def_method</code>, <code>ERB#def_module</code>, and <code>ERB#def_class</code> were not given the same protection, creating a bypass. An attacker capable of triggering <code>Marshal.load</code> on untrusted data in a Ruby application with the <code>erb</code> gem loaded can exploit <code>ERB#def_module</code> (using its zero-argument, default-parameter form) as a code execution sink. This bypass impacts Ruby on Rails applications that import untrusted serialized data, Ruby tools employing <code>Marshal.load</code> for caching or IPC, and legacy Rails applications (pre-7.0) utilizing Marshal for cookie session serialization. This bypass renders the <code>@_init</code> mitigation ineffective across all ERB versions from 2.2.0 through 6.0.3. Combined with the DeprecatedInstanceVariableProxy gadget (present in all ActiveSupport versions through 7.2.3), this enables a universal RCE gadget chain for Ruby 3.2+ applications using Rails. The vulnerability is identified as CVE-2026-41316.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker crafts a malicious Ruby object containing an <code>ERB</code> instance and/or an <code>ActiveSupport::Deprecation::DeprecatedInstanceVariableProxy</code> instance.</li>
<li>The <code>ERB</code> instance has its <code>@src</code> instance variable set to a string containing malicious code with the &ldquo;end\nsystem(&lsquo;id&rsquo;)\ndef x&rdquo; payload.</li>
<li>The vulnerable application calls <code>Marshal.load</code> on the crafted object, triggering deserialization.</li>
<li>During deserialization, the <code>DeprecatedInstanceVariableProxy</code> is instantiated (if used), which then invokes the <code>ERB#def_module</code> method via <code>method_missing</code>.</li>
<li>The <code>ERB#def_module</code> method calls <code>ERB#def_method</code> without checking the <code>@_init</code> guard.</li>
<li>Inside <code>ERB#def_method</code>, the malicious code in <code>@src</code> is wrapped in a method definition and evaluated via <code>module_eval</code>.</li>
<li>The &ldquo;end\nsystem(&lsquo;id&rsquo;)\ndef x&rdquo; payload causes the <code>system('id')</code> command to execute during the <code>module_eval</code> call, bypassing the intended deserialization protection.</li>
<li>The attacker achieves arbitrary code execution on the target system, gaining the ability to perform malicious actions.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows an attacker to execute arbitrary code on the target system. This affects Ruby applications, including Ruby on Rails, which use <code>Marshal.load</code> on untrusted data. Specific impact includes potential compromise of web servers and the ability to read sensitive files, modify data, or install malware. Vulnerable applications include those using <code>Marshal.load</code> for caching, data import, or IPC, and legacy Rails applications (pre-7.0) using Marshal for cookie session serialization. This bypass renders the @_init mitigation ineffective across all ERB versions from 2.2.0 through 6.0.3.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade your erb gem to version 4.0.3.1, 4.0.4.1, 6.0.1.1, or 6.0.4 to patch the vulnerability as described in the &ldquo;Patches&rdquo; section.</li>
<li>Avoid using <code>Marshal.load</code> on untrusted data, as it is inherently unsafe. Consider using alternative serialization formats like JSON or YAML.</li>
<li>Deploy the &ldquo;Detect ERB def_module Code Execution via Deserialization&rdquo; Sigma rule to detect exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>deserialization</category><category>rce</category><category>ruby</category><category>rails</category></item><item><title>Gemini CLI Remote Code Execution via Workspace Trust and Tool Allowlisting Bypasses</title><link>https://feed.craftedsignal.io/briefs/2026-04-gemini-cli-rce/</link><pubDate>Fri, 24 Apr 2026 19:30:01 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-gemini-cli-rce/</guid><description>Gemini CLI is vulnerable to remote code execution via workspace trust and tool allowlisting bypasses, impacting headless mode and GitHub Actions workflows.</description><content:encoded><![CDATA[<p>Gemini CLI (<code>@google/gemini-cli</code>) versions prior to 0.39.1 and version 0.40.0-preview.2, along with the <code>run-gemini-cli</code> GitHub Action versions prior to 0.1.22, are susceptible to remote code execution due to insecure workspace trust handling and tool allowlisting bypasses. The vulnerability arises from the automatic trust of workspace folders in headless mode, allowing malicious environment variables within the <code>.gemini/</code> directory to be exploited. Furthermore, in <code>--yolo</code> mode, the tool allowlist was previously ignored, enabling prompt injection and code execution via commands like <code>run_shell_command</code>. This poses a risk, especially in CI/CD environments that process untrusted inputs such as pull requests. The patched version 0.39.1 enforces explicit folder trust in headless mode and properly evaluates tool allowlists under <code>--yolo</code>, mitigating these risks. This impacts all Gemini CLI GitHub Actions and requires users to review their workflows.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker submits a malicious pull request to a repository using Gemini CLI in a GitHub Actions workflow.</li>
<li>The workflow, running in headless mode, automatically trusts the workspace folder (versions prior to 0.39.1).</li>
<li>The attacker&rsquo;s pull request includes a crafted <code>.gemini/</code> directory containing malicious environment variables.</li>
<li>Gemini CLI loads the malicious environment variables, leading to code execution.</li>
<li>Alternatively, the attacker injects a malicious prompt leveraging <code>run_shell_command</code> when <code>--yolo</code> is used.</li>
<li>The <code>run_shell_command</code> executes arbitrary commands on the runner due to the bypassed tool allowlist (versions prior to 0.39.1).</li>
<li>The attacker gains control of the CI/CD runner, potentially exfiltrating secrets or injecting malicious code into the deployment pipeline.</li>
<li>Successful exploitation leads to code execution on the CI/CD runner, data exfiltration, or supply chain compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The vulnerability impacts workflows utilizing Gemini CLI in headless mode, particularly those processing untrusted inputs such as pull requests from external contributors. Successful exploitation can lead to remote code execution on the CI/CD runner, potentially enabling attackers to exfiltrate sensitive information, such as API keys and credentials, or inject malicious code into the application deployment pipeline. This can lead to a supply chain compromise. All Gemini CLI GitHub Actions are affected, requiring users to review and update their workflows.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade <code>@google/gemini-cli</code> to version 0.39.1 or later, or 0.40.0-preview.3 if using a preview version.</li>
<li>Upgrade <code>actions/google-github-actions/run-gemini-cli</code> to version 0.1.22 or later.</li>
<li>For workflows running on trusted inputs, set <code>GEMINI_TRUST_WORKSPACE: 'true'</code> in the GitHub Actions workflow.</li>
<li>For workflows processing untrusted inputs, review the hardening guidance in <a href="https://github.com/google-github-actions/run-gemini-cli">google-github-actions/run-gemini-cli</a> and set the environment variable accordingly.</li>
<li>Review and harden tool allowlists in <code>~/.gemini/settings.json</code> to restrict the commands that can be executed, especially when using the <code>--yolo</code> flag.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>rce</category><category>supply-chain</category><category>github-actions</category></item><item><title>BridgeHead FileStore Unauthenticated Remote Code Execution via Apache Axis2</title><link>https://feed.craftedsignal.io/briefs/2026-04-bridgehead-filestore-rce/</link><pubDate>Fri, 24 Apr 2026 16:16:36 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-bridgehead-filestore-rce/</guid><description>BridgeHead FileStore versions prior to 24A are vulnerable to unauthenticated remote code execution via exposed Apache Axis2 administration module with default credentials, enabling attackers to upload malicious web services and execute arbitrary OS commands.</description><content:encoded><![CDATA[<p>BridgeHead FileStore versions prior to 24A, released in early 2024, expose a critical security vulnerability. Specifically, the Apache Axis2 administration module is accessible on network endpoints with default credentials. This flaw allows unauthenticated remote attackers to execute arbitrary operating system commands. The vulnerability stems from insecure default configurations within the FileStore application and the underlying Axis2 web service framework. Successful exploitation grants complete control over the affected system, potentially leading to data breaches, system compromise, and further lateral movement within the network. This vulnerability poses a significant risk to organizations using vulnerable versions of BridgeHead FileStore.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a BridgeHead FileStore instance running a vulnerable version of the software on a network-accessible endpoint.</li>
<li>The attacker accesses the Apache Axis2 administration console, which is exposed due to a misconfiguration.</li>
<li>The attacker authenticates to the Axis2 admin console using default credentials, bypassing authentication controls.</li>
<li>The attacker uploads a malicious Java archive (WAR file) containing a web service designed to execute arbitrary commands.</li>
<li>The attacker deploys the malicious web service through the Axis2 administration interface.</li>
<li>The attacker crafts a SOAP request to the deployed malicious web service, embedding the operating system command to be executed.</li>
<li>The vulnerable FileStore instance processes the SOAP request, executing the attacker-controlled command on the host operating system.</li>
<li>The attacker gains remote code execution, achieving complete control over the compromised system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-39920 allows unauthenticated attackers to execute arbitrary OS commands on systems running vulnerable versions of BridgeHead FileStore. This can lead to complete system compromise, data breaches, denial of service, and further lateral movement within the network. While the exact number of affected organizations is unknown, the widespread use of BridgeHead FileStore in data protection and archiving scenarios makes this a critical vulnerability. The consequences of a successful attack could include the loss of sensitive data, disruption of business operations, and significant financial losses.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the update to FileStore version 24A or later to remediate the vulnerability as mentioned in the product updates page (<a href="https://www.bridgeheadsoftware.com/rapid-data-protection-product-updates/">https://www.bridgeheadsoftware.com/rapid-data-protection-product-updates/</a>).</li>
<li>Monitor web server logs for suspicious POST requests to the Axis2 administration console (<code>/axis2/servlet/AdminServlet</code>) as it is a key component of the exploitation. Use the &ldquo;Detect Axis2 Admin Access&rdquo; Sigma rule to identify unauthorized access attempts.</li>
<li>Implement network segmentation to limit the exposure of BridgeHead FileStore instances and the Axis2 administration module.</li>
<li>Review and enforce strong authentication policies for all web-based administration interfaces.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>rce</category><category>cve-2026-39920</category><category>apache axis2</category><category>default credentials</category><category>web service</category></item><item><title>OpenShell Arbitrary Code Execution Vulnerability (CVE-2026-41355)</title><link>https://feed.craftedsignal.io/briefs/2026-04-openshell-rce/</link><pubDate>Fri, 24 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-openshell-rce/</guid><description>OpenShell before 2026.3.28 is vulnerable to arbitrary code execution via mirror mode when converting untrusted sandbox files into workspace hooks, allowing attackers with mirror mode access to execute code during gateway startup.</description><content:encoded><![CDATA[<p>OpenShell, a popular start menu replacement for Windows, is vulnerable to arbitrary code execution. Specifically, versions prior to 2026.3.28 are susceptible to CVE-2026-41355, which allows attackers with &ldquo;mirror mode&rdquo; access to execute arbitrary code. This vulnerability stems from the insecure conversion of untrusted sandbox files into workspace hooks. An attacker can leverage this flaw to inject malicious code that executes during the OpenShell gateway startup process, gaining control over the host system. This poses a significant risk to systems where OpenShell is used, especially in environments where multiple users or sandboxed applications are present. Successful exploitation allows for complete system compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains low-privilege access to a system with OpenShell installed and &ldquo;mirror mode&rdquo; enabled.</li>
<li>The attacker crafts a malicious sandbox file containing embedded code.</li>
<li>The attacker leverages OpenShell&rsquo;s mirror mode to convert the untrusted sandbox file into a workspace hook.</li>
<li>OpenShell improperly handles the conversion, failing to sanitize the malicious code within the workspace hook.</li>
<li>The system restarts or the OpenShell gateway service is initialized.</li>
<li>During the gateway startup, OpenShell executes the injected malicious code from the compromised workspace hook.</li>
<li>The attacker gains arbitrary code execution within the context of the OpenShell process.</li>
<li>The attacker escalates privileges or performs other malicious actions, such as installing malware or exfiltrating data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-41355 allows an attacker to execute arbitrary code on a vulnerable system. This can lead to complete system compromise, including data theft, malware installation, and denial of service. The vulnerability is particularly dangerous in multi-user environments or systems using sandboxed applications, as it allows attackers to break out of the sandbox and gain control over the host. While the exact number of affected systems is unknown, any system running OpenShell prior to version 2026.3.28 with mirror mode enabled is potentially vulnerable.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade OpenShell to version 2026.3.28 or later to patch CVE-2026-41355.</li>
<li>Disable &ldquo;mirror mode&rdquo; in OpenShell if it is not required, reducing the attack surface.</li>
<li>Implement the Sigma rule <code>DetectSuspiciousOpenShellMirrorMode</code> to detect potential exploitation attempts by monitoring process creations related to OpenShell with specific command-line arguments.</li>
<li>Enable process creation logging to activate the <code>DetectSuspiciousOpenShellMirrorMode</code> Sigma rule.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve</category><category>rce</category><category>openshell</category></item><item><title>OpenClaw Remote Code Execution via Node Scope Gate Bypass (CVE-2026-41352)</title><link>https://feed.craftedsignal.io/briefs/2026-04-openclaw-rce/</link><pubDate>Fri, 24 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-openclaw-rce/</guid><description>OpenClaw before 2026.3.31 is vulnerable to remote code execution (CVE-2026-41352) because a device-paired node can bypass the node scope gate authentication mechanism, allowing attackers with device pairing credentials to execute arbitrary node commands.</description><content:encoded><![CDATA[<p>OpenClaw before version 2026.3.31 suffers from a remote code execution vulnerability (CVE-2026-41352). This flaw exists because a device-paired node can bypass the node scope gate authentication mechanism. An attacker who has already obtained device pairing credentials can exploit this vulnerability to execute arbitrary node commands on the host system. This occurs because the application doesn&rsquo;t perform adequate node pairing validation, allowing malicious actors to potentially gain complete control over the affected system if successfully exploited. Defenders should prioritize patching to version 2026.3.31 or later to mitigate this risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the OpenClaw system. This may involve social engineering or other means of obtaining device pairing credentials.</li>
<li>The attacker leverages the device pairing credentials to authenticate to a device-paired node.</li>
<li>The attacker attempts to execute a node command on the host system.</li>
<li>Due to the missing authorization check (CWE-862), the node scope gate authentication mechanism is bypassed.</li>
<li>The system incorrectly validates the request, failing to properly verify node pairing.</li>
<li>The attacker successfully executes an arbitrary node command on the host system.</li>
<li>The attacker escalates privileges, potentially gaining full control over the system.</li>
<li>The attacker can then perform malicious activities such as data exfiltration, system compromise, or lateral movement within the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-41352 allows an attacker with valid device pairing credentials to execute arbitrary commands on the host system. This can lead to a complete compromise of the OpenClaw system and potentially the entire network. The number of potential victims is dependent on the number of deployments of OpenClaw before version 2026.3.31. The impact includes data breaches, system downtime, and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade OpenClaw to version 2026.3.31 or later to patch CVE-2026-41352.</li>
<li>Monitor OpenClaw systems for unauthorized command execution attempts. While no specific IOCs are available, monitor for unexpected process executions originating from the OpenClaw application.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>rce</category><category>vulnerability</category><category>cve-2026-41352</category></item><item><title>Marimo Pre-Authentication Remote Code Execution Vulnerability (CVE-2026-39987)</title><link>https://feed.craftedsignal.io/briefs/2026-04-marimo-rce/</link><pubDate>Fri, 24 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-marimo-rce/</guid><description>CVE-2026-39987 is a pre-authentication remote code execution vulnerability in Marimo, enabling unauthenticated attackers to execute arbitrary system commands.</description><content:encoded><![CDATA[<p>A pre-authentication remote code execution vulnerability, CVE-2026-39987, exists within the Marimo application. This vulnerability allows an unauthenticated attacker to gain shell access and execute arbitrary system commands on the affected system. Given the nature of the vulnerability, all versions of Marimo are potentially affected unless patched or mitigated. Successful exploitation could lead to complete system compromise, data theft, or denial of service. The vulnerability was publicly disclosed in April 2026 and organizations using Marimo should take immediate action to address it.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker sends a specially crafted request to the Marimo server.</li>
<li>The Marimo application fails to properly validate or sanitize the input within the request.</li>
<li>This input is processed by the server without proper authorization checks.</li>
<li>Due to the lack of input validation, the attacker injects malicious code into the application.</li>
<li>The injected code is executed with the privileges of the Marimo process.</li>
<li>The attacker gains shell access to the underlying operating system.</li>
<li>The attacker executes arbitrary system commands, potentially installing malware or exfiltrating data.</li>
<li>The attacker establishes persistence for continued access to the compromised system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-39987 allows an unauthenticated attacker to execute arbitrary system commands on a server running Marimo. This could lead to complete compromise of the system, including data theft, malware installation, or denial of service. The number of potential victims is dependent on the number of Marimo deployments, but given the pre-authentication nature of the vulnerability, any unpatched instance is at risk. Sectors particularly at risk are those relying on Marimo for critical services or data management.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply mitigations provided by the vendor to address CVE-2026-39987 or discontinue use of the product.</li>
<li>Deploy the Sigma rule &ldquo;Detect Marimo Exploitation Attempt&rdquo; to identify potential exploitation attempts targeting CVE-2026-39987 within web server logs.</li>
<li>Monitor network traffic for suspicious outbound connections originating from Marimo servers, which could indicate successful exploitation.</li>
<li>Follow applicable BOD 22-01 guidance for cloud services if Marimo is deployed in a cloud environment.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>CVE-2026-39987</category><category>rce</category><category>vulnerability</category></item><item><title>Apache ActiveMQ Vulnerabilities Allow RCE and XSS</title><link>https://feed.craftedsignal.io/briefs/2026-04-activemq-rce-xss/</link><pubDate>Fri, 24 Apr 2026 09:09:10 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-activemq-rce-xss/</guid><description>An authenticated remote attacker can exploit multiple vulnerabilities in Apache ActiveMQ to execute arbitrary program code or perform cross-site scripting attacks.</description><content:encoded><![CDATA[<p>Multiple vulnerabilities in Apache ActiveMQ allow a remote, authenticated attacker to execute arbitrary code or perform cross-site scripting (XSS) attacks. While specific CVEs and attack vectors are not detailed in this advisory, the presence of both RCE and XSS vulnerabilities suggests a high risk to organizations using affected versions of ActiveMQ. Exploitation requires authentication, implying that attackers may need to compromise credentials or exploit other vulnerabilities to gain initial access. This combination of vulnerabilities could lead to complete system compromise, data theft, or service disruption. The lack of specific version information makes it crucial for organizations to identify and patch all potentially vulnerable ActiveMQ instances.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial Access: The attacker gains valid credentials to access the ActiveMQ management console or API, potentially through credential stuffing, phishing, or exploiting other vulnerabilities.</li>
<li>Authentication: The attacker authenticates to the ActiveMQ instance using the compromised credentials.</li>
<li>Vulnerability Exploitation (RCE): The attacker exploits a deserialization or other RCE vulnerability to inject malicious code into the ActiveMQ server. This may involve crafting a specific message or request to trigger the vulnerability.</li>
<li>Code Execution: The injected code executes within the context of the ActiveMQ server process, granting the attacker control over the system.</li>
<li>Privilege Escalation (if necessary): The attacker attempts to escalate privileges to gain root or system-level access, depending on the initial privileges of the ActiveMQ process.</li>
<li>Lateral Movement: The attacker uses the compromised ActiveMQ server as a pivot point to move laterally within the network, targeting other systems and resources.</li>
<li>Vulnerability Exploitation (XSS): Simultaneously or independently, the attacker exploits an XSS vulnerability within the ActiveMQ web console. This may involve injecting malicious JavaScript code into the console.</li>
<li>Impact: The attacker deploys ransomware, exfiltrates sensitive data, or disrupts critical services, depending on their objectives. The XSS vulnerability allows the attacker to steal administrator cookies or inject further malicious content.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities could lead to complete compromise of the ActiveMQ server, potentially affecting all connected systems and applications. The lack of specifics makes it difficult to determine the exact number of potential victims; however, given the widespread use of ActiveMQ in enterprise environments, the impact could be significant. Consequences include data breaches, service disruption, financial loss, and reputational damage. The combination of RCE and XSS vulnerabilities allows attackers to pursue a wide range of malicious objectives, from data theft to system destruction.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Identify all Apache ActiveMQ instances within your environment and determine their versions.</li>
<li>Consult the Apache ActiveMQ security advisories to identify specific vulnerabilities affecting your versions and apply the necessary patches.</li>
<li>Implement strong authentication and authorization controls to restrict access to the ActiveMQ management console and API.</li>
<li>Deploy the Sigma rule to detect potential exploitation attempts against ActiveMQ instances.</li>
<li>Review and harden the ActiveMQ configuration to minimize the attack surface and reduce the risk of exploitation.</li>
<li>Implement network segmentation to limit the impact of a successful compromise of an ActiveMQ instance.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>activemq</category><category>rce</category><category>xss</category><category>apache</category></item><item><title>Multiple Vulnerabilities in Cisco Products Allow for Remote Code Execution</title><link>https://feed.craftedsignal.io/briefs/2024-07-cisco-multiple-vulns/</link><pubDate>Fri, 24 Apr 2026 05:43:56 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-07-cisco-multiple-vulns/</guid><description>Multiple vulnerabilities in Cisco ASA, Secure Firewall Threat Defense, IOS, IOS XE, and IOS XR allow a remote attacker to bypass authentication and execute arbitrary code with administrator privileges.</description><content:encoded><![CDATA[<p>A cluster of vulnerabilities affects Cisco ASA (Adaptive Security Appliance), Cisco Secure Firewall Threat Defense, Cisco IOS, Cisco IOS XE, and Cisco IOS XR. A remote attacker, either authenticated or anonymous, can exploit these vulnerabilities to bypass authentication mechanisms and execute arbitrary code with administrator privileges. The broad scope of affected products, ranging from security appliances to core networking infrastructure, makes this a critical issue for organizations relying on Cisco technology. Successful exploitation could lead to widespread network compromise and data breaches.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable Cisco device (ASA, Firewall Threat Defense, IOS, IOS XE, or IOS XR).</li>
<li>Attacker exploits a vulnerability allowing authentication bypass.</li>
<li>Upon successful authentication bypass, the attacker gains unauthorized access to the device.</li>
<li>Attacker leverages another vulnerability on the compromised system to inject and execute arbitrary code.</li>
<li>The code executes with administrator privileges, granting the attacker full control over the device.</li>
<li>Attacker uses the compromised device as a pivot point to move laterally within the network.</li>
<li>Attacker compromises additional systems and exfiltrates sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities can lead to complete compromise of affected Cisco devices, allowing attackers to gain full administrative control. This can result in significant data breaches, service disruptions, and the potential for lateral movement within the network to compromise other critical systems. The broad range of affected Cisco products means a wide array of organizations are potentially at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rules to your SIEM and tune for your environment to detect exploitation attempts.</li>
<li>Consult Cisco&rsquo;s security advisories for specific vulnerability details and apply the appropriate patches or mitigations as soon as they become available.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cisco</category><category>vulnerability</category><category>rce</category><category>authentication-bypass</category></item><item><title>Xerte Online Toolkits Unauthenticated Remote Code Execution via File Upload</title><link>https://feed.craftedsignal.io/briefs/2026-04-xerte-rce/</link><pubDate>Thu, 23 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-xerte-rce/</guid><description>Xerte Online Toolkits 3.15 and earlier contain an incomplete input validation vulnerability allowing unauthenticated attackers to upload malicious PHP code with a '.php4' extension, leading to arbitrary operating system command execution on the server.</description><content:encoded><![CDATA[<p>Xerte Online Toolkits, a platform used for creating online learning materials, is vulnerable to unauthenticated remote code execution (RCE). Specifically, versions 3.15 and earlier contain an incomplete input validation vulnerability within the elFinder connector endpoint. This flaw allows an attacker to bypass existing file extension filters and upload PHP files with a &lsquo;.php4&rsquo; extension. Combined with authentication bypass and path traversal vulnerabilities, this can lead to arbitrary operating system command execution on the underlying server. This vulnerability, identified as CVE-2026-34415, poses a significant risk to organizations using affected versions of Xerte Online Toolkits, potentially allowing attackers to gain complete control of the web server.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker sends a crafted HTTP request to the elFinder connector endpoint.</li>
<li>The attacker exploits an authentication bypass vulnerability to gain unauthorized access to file upload functionality.</li>
<li>The attacker leverages a path traversal vulnerability to specify a writable directory for the uploaded file.</li>
<li>The attacker uploads a malicious PHP file disguised with a &lsquo;.php4&rsquo; extension, bypassing the incomplete input validation.</li>
<li>The server saves the malicious PHP file to the specified directory.</li>
<li>The attacker sends another HTTP request to directly access the uploaded PHP file via its URL.</li>
<li>The web server executes the PHP code within the uploaded file, granting the attacker arbitrary code execution.</li>
<li>The attacker can now execute operating system commands on the server, potentially leading to data theft, system compromise, or further malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an unauthenticated attacker to execute arbitrary operating system commands on the affected Xerte Online Toolkits server. Given the high CVSS score of 9.8, this vulnerability is considered critical. If exploited, an attacker could potentially gain full control of the server, leading to data breaches, defacement of the website, or the use of the compromised server as a launchpad for further attacks within the network. The number of potentially affected installations is currently unknown.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Xerte Online Toolkits to a patched version greater than 3.15 to remediate CVE-2026-34415.</li>
<li>Implement the Sigma rule &ldquo;Detect Suspicious PHP4 Uploads&rdquo; to identify potential exploitation attempts by monitoring web server logs for &lsquo;.php4&rsquo; file uploads.</li>
<li>Review web server access logs for unusual requests to PHP files located in unexpected directories, which may indicate exploitation attempts.</li>
<li>Monitor web server logs for requests to the elFinder connector endpoint that include suspicious parameters or file extensions.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-34415</category><category>rce</category><category>file-upload</category><category>web-application</category></item><item><title>Mirai Campaign Exploiting CVE-2025-29635 in D-Link Routers</title><link>https://feed.craftedsignal.io/briefs/2026-04-mirai-dlink-rce/</link><pubDate>Thu, 23 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-mirai-dlink-rce/</guid><description>A new Mirai-based malware campaign is exploiting CVE-2025-29635, a command-injection vulnerability affecting D-Link DIR-823X routers, to enlist devices into the botnet.</description><content:encoded><![CDATA[<p>A new Mirai-based malware campaign has been observed exploiting CVE-2025-29635, a high-severity command injection vulnerability affecting D-Link DIR-823X routers. Discovered by Akamai&rsquo;s SIRT in March 2026, the campaign involves attackers sending malicious POST requests to vulnerable D-Link routers to execute arbitrary commands. This vulnerability allows attackers to download and execute a shell script, ultimately leading to the deployment of Mirai-based malware. The affected D-Link routers reached end-of-life in November 2024, meaning a patch is unlikely. The same actor is also exploiting CVE-2023-1389 impacting TP-Link routers, and an RCE flaw in ZTE ZXV10 H108L routers, deploying the same Mirai payload.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker sends a POST request to the <code>/goform/set_prohibiting</code> endpoint on the D-Link DIR-823X router.</li>
<li>The POST request exploits CVE-2025-29635 to inject and execute arbitrary commands.</li>
<li>The injected commands change directories across writable paths on the router.</li>
<li>A shell script named <code>dlink.sh</code> is downloaded from an external IP address.</li>
<li>The <code>dlink.sh</code> script is executed on the compromised router.</li>
<li>The script installs a Mirai-based malware variant named &ldquo;tuxnokill&rdquo;.</li>
<li>&ldquo;tuxnokill&rdquo; establishes persistence and begins scanning for new targets.</li>
<li>The compromised device is then used to launch DDoS attacks, leveraging Mirai&rsquo;s standard capabilities, including TCP SYN/ACK/STOMP, UDP floods, and HTTP null attacks.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2025-29635 allows attackers to remotely execute arbitrary commands on vulnerable D-Link DIR-823X routers. The compromised routers are then incorporated into the Mirai botnet, increasing its size and DDoS capabilities. Given that these routers are end-of-life, many remain unpatched, potentially leading to a large number of compromised devices. This can result in network disruptions and service outages for targeted entities, as well as potential data exfiltration.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor network traffic for POST requests to the <code>/goform/set_prohibiting</code> endpoint on D-Link routers, as described in the Attack Chain, to detect potential exploitation attempts.</li>
<li>Deploy the Sigma rule <code>Detect Mirai dlink.sh Download</code> to identify attempts to download the malicious shell script.</li>
<li>If using affected D-Link DIR-823X routers, TP-Link, or ZTE ZXV10 H108L routers, upgrade to a supported device or implement network segmentation to limit potential damage.</li>
<li>Block the external IP address hosting the <code>dlink.sh</code> script if it can be reliably determined and is observed on your network.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>mirai</category><category>ddos</category><category>rce</category><category>iot</category></item><item><title>Multiple Vulnerabilities in n8n Workflow Automation Tool</title><link>https://feed.craftedsignal.io/briefs/2026-04-n8n-multiple-vulnerabilities/</link><pubDate>Thu, 23 Apr 2026 10:23:56 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-n8n-multiple-vulnerabilities/</guid><description>Multiple vulnerabilities in n8n can be exploited by an attacker to execute arbitrary code, bypass security measures, disclose sensitive information, conduct SQL injection attacks, cause denial-of-service, perform cross-site scripting, redirect users, or hijack sessions.</description><content:encoded><![CDATA[<p>Multiple vulnerabilities have been identified in n8n, a workflow automation tool. An attacker exploiting these vulnerabilities could achieve a range of malicious outcomes, including remote code execution, security bypass, information disclosure, SQL injection, denial-of-service, cross-site scripting (XSS), malicious redirection, and session hijacking. The vulnerabilities stem from insufficient input validation, insecure configurations, or design flaws within the n8n application. Successful exploitation can lead to complete compromise of the n8n instance and potentially the underlying system, depending on the permissions of the n8n process. This poses a significant risk to organizations relying on n8n for critical business processes. Defenders need to implement robust security measures to mitigate these risks.</p>
<h2 id="attack-chain">Attack Chain</h2>
<p>Given the broad range of potential vulnerabilities, a generalized attack chain is outlined below:</p>
<ol>
<li><strong>Reconnaissance:</strong> The attacker identifies a vulnerable n8n instance, potentially through Shodan or similar tools.</li>
<li><strong>Vulnerability Identification:</strong> The attacker probes the n8n instance to identify specific exploitable vulnerabilities, such as those related to SQL injection or XSS.</li>
<li><strong>Exploitation (SQL Injection):</strong> The attacker crafts malicious SQL queries through user input fields or API calls to extract sensitive data from the n8n database, such as user credentials or API keys.</li>
<li><strong>Exploitation (XSS):</strong> The attacker injects malicious JavaScript code into n8n workflows or data fields. When other users interact with the affected workflows or data, the JavaScript code executes in their browsers.</li>
<li><strong>Privilege Escalation/Lateral Movement:</strong> The attacker leverages the compromised credentials or XSS vulnerabilities to gain elevated privileges within the n8n instance or move laterally to other systems within the network.</li>
<li><strong>Remote Code Execution:</strong> The attacker exploits a vulnerability that allows for the execution of arbitrary code on the server. This could be achieved through insecure file uploads, deserialization flaws, or command injection.</li>
<li><strong>Persistence:</strong> The attacker establishes persistence by creating new n8n workflows or modifying existing ones to execute malicious code on a recurring basis.</li>
<li><strong>Impact:</strong> The attacker exfiltrates sensitive data, disrupts critical business processes by manipulating or deleting workflows, or uses the compromised system as a foothold for further attacks within the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities could result in significant damage, depending on the attacker&rsquo;s objectives. The potential impact includes data breaches, financial losses, service disruptions, and reputational damage. If sensitive data is exfiltrated, it could be used for identity theft, fraud, or other malicious purposes. Disruption of critical workflows can lead to business downtime and lost productivity. The lack of specific victim counts or sector targeting in the source data makes it difficult to quantify the impact precisely, but the broad range of potential vulnerabilities and their potential consequences warrant immediate attention.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Implement the provided Sigma rules to detect potential exploitation attempts targeting n8n instances (see &ldquo;Descriptive Detection Rule Name&rdquo; in the <code>rules</code> section).</li>
<li>Conduct regular security audits and penetration testing of n8n instances to identify and remediate vulnerabilities before they can be exploited.</li>
<li>Enforce strict input validation and sanitization measures to prevent SQL injection and XSS attacks.</li>
<li>Apply the principle of least privilege to limit the permissions of the n8n process and users.</li>
<li>Monitor network traffic for suspicious activity related to n8n instances, such as unusual API calls or connections to malicious domains.</li>
<li>Regularly review and update n8n workflows to ensure they are secure and do not contain any malicious code.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>n8n</category><category>vulnerability</category><category>sqli</category><category>xss</category><category>rce</category><category>session-hijacking</category></item><item><title>IBM Total Storage Service Console (TSSC) / TS4500 IMC Unauthenticated Remote Command Execution</title><link>https://feed.craftedsignal.io/briefs/2026-04-ibm-tssc-rce/</link><pubDate>Thu, 23 Apr 2026 00:16:46 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-ibm-tssc-rce/</guid><description>An unauthenticated user can execute arbitrary commands with normal user privileges on vulnerable IBM Total Storage Service Console (TSSC) / TS4500 IMC versions due to improper validation of user-supplied input, as identified by CVE-2026-5935.</description><content:encoded><![CDATA[<p>CVE-2026-5935 describes a critical vulnerability affecting IBM Total Storage Service Console (TSSC) / TS4500 IMC software. Specifically, versions 9.2, 9.3, 9.4, 9.5, and 9.6 are susceptible to unauthenticated remote command execution. The vulnerability stems from insufficient validation of user-supplied input, allowing an attacker to inject and execute arbitrary commands on the system. Successful exploitation grants the attacker normal user privileges. This vulnerability poses a significant risk as it allows attackers to compromise the system without authentication, potentially leading to data breaches, system disruption, or further lateral movement within the network. Defenders should prioritize patching or mitigating this vulnerability.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a vulnerable IBM Total Storage Service Console (TSSC) / TS4500 IMC instance running versions 9.2, 9.3, 9.4, 9.5, or 9.6.</li>
<li>The attacker crafts a malicious request containing an OS command injection payload. This payload is designed to exploit the improper input validation within the TSSC/IMC software.</li>
<li>The attacker sends the crafted request to the vulnerable TSSC/IMC instance, targeting a specific endpoint or function susceptible to command injection.</li>
<li>The TSSC/IMC software processes the request without proper validation, passing the malicious payload to the underlying operating system.</li>
<li>The operating system executes the injected command with the privileges of a normal user account.</li>
<li>The attacker gains the ability to execute arbitrary commands on the system, potentially allowing them to read sensitive files, modify configurations, or install malicious software.</li>
<li>The attacker may leverage their initial access to escalate privileges, move laterally within the network, or establish persistent access to the compromised system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-5935 allows an unauthenticated attacker to execute arbitrary commands on the affected IBM Total Storage Service Console (TSSC) / TS4500 IMC system. This can lead to complete system compromise, data breaches, and disruption of services. The impact could range from unauthorized access to sensitive data to the deployment of ransomware, depending on the attacker&rsquo;s objectives and the level of access achieved after exploitation. Due to the lack of authentication requirement, the vulnerability is highly critical.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the patch or upgrade to a fixed version of IBM Total Storage Service Console (TSSC) / TS4500 IMC as outlined in the IBM advisory (<a href="https://www.ibm.com/support/pages/node/7270127">https://www.ibm.com/support/pages/node/7270127</a>).</li>
<li>Deploy the Sigma rule to detect command execution via web requests targeting TSSC/IMC.</li>
<li>Implement network segmentation to limit the blast radius of a potential compromise of the TSSC/IMC system.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-5935</category><category>rce</category><category>command injection</category></item><item><title>CI4MS Backup Restore Zip Slip Vulnerability Leads to RCE</title><link>https://feed.craftedsignal.io/briefs/2024-01-09-ci4ms-zip-slip/</link><pubDate>Wed, 22 Apr 2026 17:28:39 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-09-ci4ms-zip-slip/</guid><description>The CI4MS Backup restore function is vulnerable to Zip Slip, allowing remote code execution by uploading a malicious ZIP archive that writes PHP files to the public web root due to missing validation of entry names during extraction, affecting versions prior to 0.31.5.0.</description><content:encoded><![CDATA[<p>A Zip Slip vulnerability exists in the CI4MS backup restore functionality. Authenticated users with backup creation permissions can exploit this by uploading a specially crafted ZIP archive. The vulnerability lies in the <code>Backup::restore</code> function (modules/Backup/Controllers/Backup.php), where the application extracts the uploaded ZIP without proper validation of the entry names. This allows an attacker to write files to arbitrary locations, including the public web root, leading to remote code execution (RCE). This vulnerability affects CI4MS versions prior to 0.31.5.0. By crafting a ZIP file with malicious paths, attackers can bypass intended directory restrictions.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An authenticated user with <code>create</code> role accesses the vulnerable <code>/backend/backup/restore</code> endpoint.</li>
<li>The attacker crafts a malicious ZIP archive containing a PHP file (e.g., <code>shell.php</code>) with a path traversing outside the intended extraction directory (e.g., <code>../../public/shell.php</code>).</li>
<li>The attacker uploads the malicious ZIP archive via the <code>backup_file</code> parameter in a POST request.</li>
<li>The server moves the uploaded ZIP file to <code>WRITEPATH . 'uploads/'</code> without sanitizing or validating the ZIP entry names.</li>
<li>The <code>ZipArchive::extractTo()</code> function is called on the uploaded ZIP, extracting the malicious file to the specified path <code>../../public/shell.php</code>.</li>
<li>The PHP file is written to the web root, allowing for remote code execution.</li>
<li>The attacker triggers the injected PHP code by sending a request to <code>/shell.php?c=id</code>, executing arbitrary commands on the server.</li>
<li>The attacker gains complete control over the compromised server, including access to sensitive data and the ability to further compromise the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to achieve remote code execution (RCE) on the CI4MS server. This can lead to full compromise of the installation, including the database credentials stored in <code>.env</code> and any other sensitive data handled by the site. Because the affected route is in the <code>csrfExcept</code> list, this vulnerability can be triggered cross-site against a logged-in administrator, potentially leading to drive-by RCE against site operators. The vulnerability affects versions of <code>composer/ci4-cms-erp/ci4ms</code> prior to <code>0.31.5.0</code>.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade <code>composer/ci4-cms-erp/ci4ms</code> to version 0.31.5.0 or later to patch the vulnerability as described in GHSA-xp9f-pvvc-57p4.</li>
<li>Implement server-side validation of uploaded ZIP archive entry names to prevent path traversal vulnerabilities. Specifically, validate the file paths extracted from the ZIP archive before calling <code>extractTo()</code>.</li>
<li>Deploy the Sigma rule <code>Detect CI4MS Zip Slip via Web Request</code> to identify potential exploitation attempts by monitoring HTTP requests to the vulnerable endpoint.</li>
<li>Enable web server logging and monitor for suspicious file creations, especially in web-accessible directories, after ZIP archive uploads, based on the attack chain described above.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>zip-slip</category><category>rce</category><category>code-injection</category><category>vulnerability</category></item><item><title>Critical RCE Vulnerabilities in Spinnaker</title><link>https://feed.craftedsignal.io/briefs/2026-04-spinnaker-rce/</link><pubDate>Wed, 22 Apr 2026 14:46:46 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-spinnaker-rce/</guid><description>Critical vulnerabilities CVE-2026-32613 and CVE-2026-32604 in Spinnaker allow authenticated attackers to execute arbitrary code due to insufficient input validation in expression parsing and gitrepo artifact handling, potentially leading to complete system compromise.</description><content:encoded><![CDATA[<p>Two critical remote code execution (RCE) vulnerabilities, CVE-2026-32613 and CVE-2026-32604, have been discovered in Spinnaker, an open-source multi-cloud continuous delivery platform. These vulnerabilities stem from insufficient input validation and sanitization. CVE-2026-32613 relates to expression parsing, allowing for the execution of malicious expressions via untrusted input in pipeline expressions. CVE-2026-32604 arises from improper handling of gitrepo artifact types, specifically regarding the sanitization of user-controlled input like branch names and file paths. An attacker with pipeline configuration access can exploit these flaws to achieve arbitrary code execution on the affected system. The Centre for Cybersecurity Belgium (CCB) strongly advises immediate patching and enhanced monitoring.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains access to Spinnaker pipeline configuration, either through compromised credentials or exploiting a separate authentication vulnerability.</li>
<li>For CVE-2026-32613, the attacker injects a malicious expression into a pipeline configuration, leveraging the insufficient input validation in expression parsing.</li>
<li>For CVE-2026-32604, the attacker crafts a malicious gitrepo artifact definition within a Spinnaker pipeline, specifying a branch name or file path containing injected code.</li>
<li>The Spinnaker pipeline is triggered, either manually or automatically based on configured triggers.</li>
<li>During pipeline execution, the malicious expression (CVE-2026-32613) or gitrepo artifact (CVE-2026-32604) is processed.</li>
<li>The injected code is executed within the context of the Spinnaker service, gaining the privileges of the Spinnaker process.</li>
<li>The attacker leverages the code execution to establish persistence, move laterally within the network, or exfiltrate sensitive data.</li>
<li>The final objective is achieved, such as complete system compromise, data breach, or disruption of services.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-32613 or CVE-2026-32604 allows an attacker to execute arbitrary code on the Spinnaker server, potentially leading to complete system compromise. This could result in the theft of sensitive credentials, modification of deployment pipelines, deployment of malicious code to production environments, and disruption of critical services. Given Spinnaker&rsquo;s role in continuous delivery, a successful attack can have a wide-ranging impact on the organization&rsquo;s software development lifecycle.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately patch Spinnaker to the latest version to remediate CVE-2026-32613 and CVE-2026-32604 as recommended by the CCB.</li>
<li>Upscale monitoring and detection capabilities to identify any suspicious activity related to these vulnerabilities, as suggested by the CCB.</li>
<li>Implement strict input validation and sanitization measures for all user-controlled input within Spinnaker pipeline configurations to prevent future exploitation of similar vulnerabilities.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>rce</category><category>vulnerability</category><category>spinnaker</category></item><item><title>WordPress HTTP Headers Plugin Remote Code Execution via File Path Manipulation (CVE-2026-4132)</title><link>https://feed.craftedsignal.io/briefs/2026-04-wordpress-http-headers-rce/</link><pubDate>Wed, 22 Apr 2026 09:16:24 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-wordpress-http-headers-rce/</guid><description>The HTTP Headers WordPress plugin is vulnerable to remote code execution (RCE) due to insufficient validation of the htpasswd file path and lack of sanitization of the username, allowing authenticated administrators to write arbitrary code to the server.</description><content:encoded><![CDATA[<p>The HTTP Headers plugin for WordPress, versions up to and including 1.19.2, is vulnerable to remote code execution (RCE) due to a file path manipulation vulnerability (CVE-2026-4132). This vulnerability stems from the plugin&rsquo;s insufficient validation of the &lsquo;hh_htpasswd_path&rsquo; option, which controls the location of the .htpasswd file. Furthermore, the &lsquo;hh_www_authenticate_user&rsquo; option, used for setting the username for HTTP Basic Authentication, lacks proper sanitization. This allows attackers with administrator privileges to specify an arbitrary file path for the htpasswd file and inject unsanitized content into it. By crafting a malicious username containing PHP code and setting the htpasswd path to a web-accessible directory, an attacker can execute arbitrary code on the server. This exploit requires administrator-level access to the WordPress dashboard.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker authenticates to the WordPress dashboard with administrator privileges.</li>
<li>The attacker navigates to the HTTP Headers plugin settings page.</li>
<li>The attacker modifies the &lsquo;hh_htpasswd_path&rsquo; option, setting it to a web-accessible directory (e.g., <code>/var/www/html/wp-content/uploads/.shell.php</code>).</li>
<li>The attacker modifies the &lsquo;hh_www_authenticate_user&rsquo; option, injecting PHP code into the username field (e.g., <code>&lt;?php system($_GET['cmd']); ?&gt;</code>).</li>
<li>The <code>apache_auth_credentials()</code> function uses sprintf to combine the malicious username with a SHA hash, creating a crafted htpasswd entry.</li>
<li>The <code>update_auth_credentials()</code> function then writes the crafted content, including the injected PHP code, to the attacker-controlled file path using <code>file_put_contents()</code>.</li>
<li>The attacker accesses the newly created PHP file via a web browser (e.g., <code>http://example.com/wp-content/uploads/.shell.php?cmd=id</code>).</li>
<li>The injected PHP code executes, allowing the attacker to run arbitrary commands on the server.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability grants the attacker remote code execution on the affected WordPress server. This can lead to complete compromise of the server, including data theft, website defacement, malware deployment, and further attacks against internal networks. Given the widespread use of WordPress and its plugins, a successful exploit could impact a large number of websites and organizations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately update the HTTP Headers plugin to a patched version (if available) to remediate CVE-2026-4132.</li>
<li>Monitor web server logs for requests to unusual file paths that match the &lsquo;hh_htpasswd_path&rsquo; setting specified in the plugin configuration to detect potential exploitation attempts.</li>
<li>Implement the Sigma rule to detect file creation events in web-accessible directories with PHP extensions that are triggered by the web server process.</li>
<li>Restrict access to the WordPress administrator dashboard to only trusted individuals and enforce strong password policies to prevent unauthorized access to plugin settings.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>wordpress</category><category>rce</category><category>plugin</category><category>cve-2026-4132</category></item><item><title>Insecure Deserialization Vulnerability in Telerik UI for AJAX RadFilter Control (CVE-2026-6023)</title><link>https://feed.craftedsignal.io/briefs/2026-04-telerik-rce/</link><pubDate>Wed, 22 Apr 2026 08:16:13 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-telerik-rce/</guid><description>An insecure deserialization vulnerability exists in Progress Telerik UI for AJAX's RadFilter control (versions 2024.4.1114 through 2026.1.421) allowing remote code execution via tampering with the filter state exposed to the client.</description><content:encoded><![CDATA[<p>CVE-2026-6023 exposes a critical vulnerability within the RadFilter control of Progress Telerik UI for AJAX. Affecting versions 2024.4.1114 to 2026.1.421, this flaw stems from insecure deserialization practices. The vulnerability arises when the filter state is exposed to the client, enabling malicious actors to manipulate this state. Successful exploitation grants attackers the ability to execute arbitrary code on the server. This vulnerability poses a significant risk to organizations utilizing the affected Telerik UI for AJAX versions, potentially leading to complete system compromise and data breaches. Defenders must promptly address this issue through patching or mitigation strategies.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a web application utilizing a vulnerable version of Progress Telerik UI for AJAX (2024.4.1114 - 2026.1.421) with the RadFilter control enabled.</li>
<li>The attacker observes the RadFilter control&rsquo;s behavior, specifically how filter states are serialized and exposed to the client-side, typically within the HTTP request or response.</li>
<li>The attacker intercepts the serialized filter state data, often Base64 encoded or similar, transmitted between the client and server.</li>
<li>The attacker crafts a malicious serialized payload containing instructions to execute arbitrary code on the server. This involves exploiting the insecure deserialization process.</li>
<li>The attacker replaces the original, legitimate serialized filter state with the malicious payload.</li>
<li>The attacker sends the modified request containing the malicious serialized data to the server.</li>
<li>The Telerik UI for AJAX application on the server attempts to deserialize the tampered data using the RadFilter control.</li>
<li>Due to the insecure deserialization vulnerability, the malicious payload is executed, granting the attacker remote code execution on the server. The attacker can then perform actions such as installing malware, exfiltrating sensitive data, or disrupting services.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-6023 can lead to complete compromise of the affected server. An attacker can gain remote code execution, enabling them to install malware, steal sensitive data, or disrupt critical business operations. Given the widespread use of Telerik UI in enterprise applications, this vulnerability could potentially impact a large number of organizations across various sectors. Unpatched systems are at high risk of being exploited, leading to significant financial and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately upgrade Progress Telerik UI for AJAX to a patched version outside the range of 2024.4.1114 through 2026.1.421 to remediate CVE-2026-6023.</li>
<li>Deploy the Sigma rule <code>Detect Suspicious Telerik RadFilter Deserialization Attempt</code> to identify attempts to exploit the deserialization vulnerability by monitoring for suspicious HTTP requests targeting the RadFilter control (Log source: webserver).</li>
<li>Implement input validation and sanitization on the server-side to prevent malicious data from being deserialized.</li>
<li>Monitor web server logs for unusual activity related to the RadFilter control, such as requests with abnormally large or malformed serialized data (Log source: webserver).</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-6023</category><category>telerik</category><category>deserialization</category><category>rce</category><category>webserver</category></item><item><title>WWBN AVideo Unauthenticated Remote Code Execution via test.php</title><link>https://feed.craftedsignal.io/briefs/2026-04-avideo-rce/</link><pubDate>Wed, 22 Apr 2026 00:16:28 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-avideo-rce/</guid><description>WWBN AVideo versions up to 29.0 contain an OS Command Injection vulnerability (CVE-2026-41064) in the `test.php` file, allowing unauthenticated remote code execution due to insufficient input sanitization, especially affecting `file_get_contents` and `curl` code paths.</description><content:encoded><![CDATA[<p>WWBN AVideo, an open-source video platform, is vulnerable to an unauthenticated remote code execution (RCE) flaw. This vulnerability, identified as CVE-2026-41064, exists in versions up to and including 29.0. The root cause is an incomplete fix applied to the <code>test.php</code> file. While the fix implemented <code>escapeshellarg</code> for the <code>wget</code> command, it neglected to sanitize input for the <code>file_get_contents</code> and <code>curl</code> code paths. Additionally, the URL validation regex <code>/^http/</code> is overly permissive, accepting malicious strings such as <code>httpevil[.]com</code>. Successful exploitation allows attackers to execute arbitrary commands on the server hosting the AVideo platform. The recommended remediation is to apply the updated fix detailed in commit 78bccae74634ead68aa6528d631c9ec4fd7aa536.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker sends a crafted HTTP request to the <code>test.php</code> endpoint.</li>
<li>The request includes a malicious URL, designed to exploit the insufficient input validation in the <code>file_get_contents</code> or <code>curl</code> code paths. For example, using <code>httpevil[.]com</code> to bypass the regex check <code>/^http/</code>.</li>
<li>The <code>test.php</code> script processes the request, attempting to retrieve content from the attacker-controlled URL using either <code>file_get_contents</code> or <code>curl</code>.</li>
<li>Due to the lack of proper sanitization, the malicious URL is interpreted as an OS command.</li>
<li>The server executes the attacker-supplied OS command.</li>
<li>The attacker gains arbitrary code execution on the AVideo server.</li>
<li>The attacker can then perform various malicious activities, such as installing malware, stealing sensitive data, or pivoting to other systems on the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability (CVE-2026-41064) grants unauthenticated attackers the ability to execute arbitrary code on the affected AVideo server. This can lead to complete compromise of the server, including data theft, defacement, or use as a staging ground for further attacks. Given the platform&rsquo;s use in video hosting, successful attacks could impact numerous users and content creators relying on the vulnerable AVideo instance. The vulnerable regex <code>/^http/</code> and unsanitized functions leave the server open to mass exploitation if exposed to the public internet.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the updated fix detailed in commit 78bccae74634ead68aa6528d631c9ec4fd7aa536 to fully address the input validation issue in <code>test.php</code>.</li>
<li>Deploy the Sigma rule &ldquo;Detect AVideo test.php Command Injection Attempt&rdquo; to detect exploitation attempts in web server logs.</li>
<li>Monitor web server logs for requests to <code>test.php</code> containing suspicious URLs, especially those matching the <code>httpevil[.]com</code> pattern as documented in the IOCs.</li>
<li>Implement a more robust URL validation mechanism that properly sanitizes input before passing it to <code>file_get_contents</code> or <code>curl</code>.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-41064</category><category>avideo</category><category>rce</category><category>command-injection</category></item><item><title>Vvveb CMS 1.0.8 Remote Code Execution via Malicious Upload</title><link>https://feed.craftedsignal.io/briefs/2026-04-vvveb-rce/</link><pubDate>Tue, 21 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-vvveb-rce/</guid><description>Vvveb CMS 1.0.8 is vulnerable to remote code execution, allowing authenticated attackers to upload a PHP webshell with a .phtml extension, bypass extension restrictions, and execute arbitrary operating system commands by requesting the uploaded file.</description><content:encoded><![CDATA[<p>Vvveb CMS version 1.0.8 is susceptible to a remote code execution (RCE) vulnerability (CVE-2026-6249) due to insufficient input validation in the media upload handler. An authenticated attacker can exploit this flaw by uploading a malicious PHP webshell disguised with a <code>.phtml</code> extension, which bypasses the server&rsquo;s intended extension deny-list. The uploaded webshell is then accessible within the publicly available media directory. By crafting a specific HTTP request to access the uploaded <code>.phtml</code> file, the attacker can trigger the execution of arbitrary operating system commands on the server, leading to a complete compromise of the system. This vulnerability poses a significant threat to organizations utilizing Vvveb CMS 1.0.8, potentially enabling attackers to steal sensitive data, disrupt services, or establish a persistent foothold within the network.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker authenticates to the Vvveb CMS 1.0.8 instance.</li>
<li>The attacker accesses the media upload functionality within the CMS.</li>
<li>The attacker uploads a malicious PHP webshell file, named with a <code>.phtml</code> extension, crafted to execute operating system commands.</li>
<li>The CMS stores the uploaded <code>.phtml</code> file in the publicly accessible media directory.</li>
<li>The attacker crafts an HTTP request targeting the uploaded <code>.phtml</code> file in the media directory.</li>
<li>The web server executes the PHP code within the <code>.phtml</code> file upon receiving the attacker&rsquo;s HTTP request.</li>
<li>The PHP code executes arbitrary operating system commands, as defined by the attacker in the webshell.</li>
<li>The attacker gains complete control of the server, potentially leading to data theft, service disruption, or persistent access.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-6249 allows an attacker to execute arbitrary operating system commands on the Vvveb CMS server. This could lead to a full compromise of the system, including the theft of sensitive data stored in the CMS database, modification of website content, or the deployment of malicious software. Organizations using Vvveb CMS 1.0.8 are at risk of data breaches, financial losses, and reputational damage if this vulnerability is exploited.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Vvveb CMS to a patched version that addresses CVE-2026-6249.</li>
<li>Implement strict input validation and sanitization on all file upload functionalities to prevent the upload of malicious files.</li>
<li>Configure the web server to prevent the execution of PHP code within the media directory.</li>
<li>Deploy the Sigma rule <code>Detect Suspicious PHTML Request</code> to identify attempts to access <code>.phtml</code> files in the media directory.</li>
<li>Monitor web server logs for suspicious HTTP requests targeting unusual file extensions in media directories.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-6249</category><category>rce</category><category>web-application</category></item><item><title>Dolibarr OS Command Injection via MAIN_ODT_AS_PDF Configuration</title><link>https://feed.craftedsignal.io/briefs/2026-04-dolibarr-rce/</link><pubDate>Sat, 18 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-dolibarr-rce/</guid><description>Dolibarr versions 22.0.4 and earlier are vulnerable to OS Command Injection via the MAIN_ODT_AS_PDF configuration, allowing an authenticated administrator to inject a malicious payload, leading to arbitrary operating system command execution.</description><content:encoded><![CDATA[<p>Dolibarr, a popular open-source ERP and CRM system, is susceptible to OS Command Injection (RCE) in versions up to 22.0.4. This vulnerability, identified as CVE-2026-23500, stems from insufficient validation of the <code>MAIN_ODT_AS_PDF</code> configuration setting. An attacker with administrative privileges can inject malicious commands into this setting, which are then executed by the server during ODT to PDF conversion processes. The vulnerability resides in <code>htdocs/includes/odtphp/odf.php</code>, where the application constructs a shell command using the unfiltered <code>MAIN_ODT_AS_PDF</code> value. Successful exploitation enables arbitrary command execution on the server, potentially leading to complete system compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains administrative access to the Dolibarr instance, either through credential compromise or social engineering.</li>
<li>The attacker navigates to the &ldquo;Home -&gt; Setup -&gt; Other Setup&rdquo; section of the Dolibarr administration panel.</li>
<li>The attacker modifies the <code>MAIN_ODT_AS_PDF</code> configuration constant. The injected payload includes a command separator (<code>;</code>) followed by the malicious command. The example uses <code>jodconverter; echo &lt;base64_encoded_command&gt; | base64 -d | bash</code>.</li>
<li>The attacker navigates to the &ldquo;Commerce -&gt; New proposal&rdquo; section.</li>
<li>The attacker creates a new proposal in draft status and selects an ODT template.</li>
<li>The attacker clicks the &ldquo;Generate&rdquo; button, triggering the ODT to PDF conversion process.</li>
<li>The application executes the crafted shell command, resulting in command execution.</li>
<li>In the proof of concept, the attacker establishes a reverse shell connection to their specified IP address (172.26.0.1) and port (4445), gaining interactive shell access.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows an attacker with administrator privileges to execute arbitrary commands on the underlying server as the web server user. This can lead to the compromise of sensitive data, modification of application files, and potentially full system compromise. The observed impact includes the establishment of a reverse shell, granting the attacker complete control over the Dolibarr instance. This vulnerability affects Dolibarr installations up to version 22.0.4.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Dolibarr to a patched version beyond 22.0.4 to remediate CVE-2026-23500.</li>
<li>Monitor process creation events for commands executed with suspicious arguments in <code>MAIN_ODT_AS_PDF</code> by deploying the provided Sigma rules.</li>
<li>Monitor network connections to unusual external IP addresses originating from the web server, especially following events related to document generation. Block the C2 IP address <code>172.26.0.1</code> listed in the IOC table at the network perimeter.</li>
<li>Implement strict access controls and regularly audit administrator accounts to prevent unauthorized access to the Dolibarr configuration settings.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>command-injection</category><category>rce</category><category>dolibarr</category></item><item><title>Anviz CX2 Lite and CX7 Unauthenticated Remote Code Execution via Unverified Update Packages (CVE-2026-40066)</title><link>https://feed.craftedsignal.io/briefs/2026-04-anviz-rce/</link><pubDate>Fri, 17 Apr 2026 20:16:35 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-anviz-rce/</guid><description>Anviz CX2 Lite and CX7 devices are vulnerable to unverified update packages that allow for unauthenticated remote code execution by unpacking and executing a malicious script.</description><content:encoded><![CDATA[<p>The Anviz CX2 Lite and CX7 devices are susceptible to a critical vulnerability (CVE-2026-40066) stemming from the lack of integrity checks on update packages. An attacker can upload a crafted update package to the device. The vulnerable devices then unpack the contents of this package and execute a script without proper authentication or verification. This leads to unauthenticated remote code execution, potentially allowing the attacker to gain complete control over the compromised device. The vulnerability was reported by ICS-CERT and assigned a CVSS v3.1 base score of 8.8, indicating a high severity. Successful exploitation of this vulnerability allows an attacker to perform any action on the device, including stealing data, installing malware, or using the device as a foothold for further attacks on the network.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies an Anviz CX2 Lite or CX7 device accessible on the network.</li>
<li>Attacker crafts a malicious update package containing a script designed for remote code execution.</li>
<li>The attacker uploads the malicious update package to the device&rsquo;s update interface. Due to the vulnerability, this upload may not require authentication.</li>
<li>The device unpacks the contents of the update package, including the malicious script.</li>
<li>The device executes the script without proper verification or sanitization.</li>
<li>The malicious script executes arbitrary commands on the device.</li>
<li>The attacker gains remote shell access to the device.</li>
<li>The attacker leverages the compromised device to move laterally within the network or exfiltrate sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-40066 results in unauthenticated remote code execution on the affected Anviz CX2 Lite and CX7 devices. This can lead to complete compromise of the device, allowing attackers to steal sensitive data, install malware, or use the device as a pivot point to gain access to other systems on the network. Given the potential for widespread deployment of these devices in various sectors, the impact could be significant, affecting many organizations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply any available patches or updates from Anviz to address CVE-2026-40066.</li>
<li>Monitor network traffic for suspicious activity related to Anviz devices attempting to download or install update packages, and deploy the network connection rule below.</li>
<li>Implement network segmentation to limit the potential impact of a compromised Anviz device on other systems.</li>
<li>Monitor process creation on Anviz devices for unusual or unexpected processes, and deploy the process creation rule below.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-40066</category><category>rce</category><category>iot</category></item><item><title>WP Customer Area Plugin Arbitrary File Read and Deletion Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-wp-customer-area-file-read-delete/</link><pubDate>Fri, 17 Apr 2026 17:17:07 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-wp-customer-area-file-read-delete/</guid><description>The WP Customer Area plugin for WordPress is vulnerable to arbitrary file read and deletion due to insufficient file path validation, allowing authenticated attackers to read sensitive files or delete critical files leading to potential remote code execution.</description><content:encoded><![CDATA[<p>The WP Customer Area plugin, a popular WordPress plugin, is susceptible to an arbitrary file read and deletion vulnerability. This flaw, identified as CVE-2026-3464, resides within the &lsquo;ajax_attach_file&rsquo; function and stems from inadequate file path validation. All versions of the plugin up to and including 8.3.4 are affected. The vulnerability enables authenticated attackers with minimal privileges (e.g., Subscriber), granted access by an administrator, to read arbitrary files on the server, potentially exposing sensitive data. Attackers can also delete arbitrary files, which, in certain cases (such as deleting <code>wp-config.php</code>), can pave the way for remote code execution. This vulnerability poses a significant risk to WordPress websites utilizing the WP Customer Area plugin.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains authenticated access to a WordPress site with the WP Customer Area plugin enabled, with privileges granted by an administrator (e.g., as a Subscriber).</li>
<li>The attacker crafts a malicious HTTP request targeting the &lsquo;ajax_attach_file&rsquo; function.</li>
<li>The crafted request includes a manipulated file path, bypassing input validation.</li>
<li>The plugin, failing to properly sanitize the file path, attempts to read or delete the file specified in the malicious request.</li>
<li>If reading, the contents of the targeted file are returned to the attacker in the HTTP response.</li>
<li>If deleting, the targeted file is removed from the server.</li>
<li>If the attacker targets a sensitive file, such as <code>wp-config.php</code>, and successfully deletes it, the WordPress installation becomes unstable and potentially allows for re-installation and control by the attacker.</li>
<li>The attacker exploits the instability to achieve remote code execution, potentially installing a web shell or other malicious code.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability (CVE-2026-3464) allows attackers to read sensitive files, potentially including database credentials, API keys, and other confidential information. Moreover, the ability to delete arbitrary files can lead to denial-of-service conditions or, more critically, remote code execution. The number of affected websites is potentially large, given the popularity of the WP Customer Area plugin. A successful attack can result in complete compromise of the WordPress website and its underlying server.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the WP Customer Area plugin to a version greater than 8.3.4 to patch CVE-2026-3464.</li>
<li>Monitor web server logs for requests containing suspicious file paths targeting the &lsquo;ajax_attach_file&rsquo; function (see Sigma rule below).</li>
<li>Implement stricter file path validation on the web server to prevent arbitrary file access.</li>
<li>Apply the provided Sigma rules to your SIEM to detect and alert on malicious attempts to exploit this vulnerability.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>wordpress</category><category>plugin</category><category>file-read</category><category>file-deletion</category><category>rce</category></item><item><title>FlowiseAI File Upload Validation Bypass Leads to RCE</title><link>https://feed.craftedsignal.io/briefs/2026-04-17-flowise-upload-bypass/</link><pubDate>Fri, 17 Apr 2026 14:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-17-flowise-upload-bypass/</guid><description>A file upload validation bypass vulnerability exists in FlowiseAI, where the Chatflow configuration file upload settings can be modified to allow the application/javascript MIME type, enabling an attacker to upload .js files, store malicious Node.js web shells on the server, and potentially achieve Remote Code Execution (RCE).</description><content:encoded><![CDATA[<p>FlowiseAI, a low-code platform for building AI applications, contains a file upload validation bypass vulnerability. By modifying the Chatflow configuration, specifically the <code>allowedUploadFileTypes</code> setting, an attacker can add <code>application/javascript</code> as an accepted MIME type. This bypasses previous mitigations (CVE-2025-61687) intended to prevent the upload of potentially malicious files. Although the frontend UI restricts JavaScript uploads, a direct API request can circumvent this. Successful exploitation allows attackers to persistently store Node.js web shells (e.g., shell.js) on the Flowise server. This vulnerability affects FlowiseAI versions up to 3.0.13. If executed, these web shells could grant the attacker Remote Code Execution (RCE) capabilities on the server, posing a significant risk to system integrity and data confidentiality.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable FlowiseAI instance running a version &lt;= 3.0.13.</li>
<li>The attacker authenticates to the FlowiseAI instance as an administrator or with compromised credentials.</li>
<li>The attacker crafts a malicious HTTP PUT request to the <code>/api/v1/chatflows/{CHATFLOW_ID}</code> endpoint.</li>
<li>The PUT request modifies the Chatflow configuration, specifically the <code>chatbotConfig</code> to include <code>application/javascript</code> in the <code>allowedUploadFileTypes</code>.</li>
<li>The attacker crafts a malicious HTTP POST request to the <code>/api/v1/attachments/{CHATFLOW_ID}/{CHAT_ID}</code> endpoint to upload a <code>.js</code> file (Node.js web shell), such as the <code>shell.js</code> example.</li>
<li>The server saves the malicious <code>.js</code> file to a publicly accessible directory.</li>
<li>The attacker accesses the uploaded <code>.js</code> file via a direct HTTP request.</li>
<li>The web shell executes commands specified in the URL parameters, such as <code>http://localhost:8888/?cmd=id</code>, resulting in RCE.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows attackers to upload and persistently store malicious web shells on the FlowiseAI server. Execution of these web shells grants the attacker the ability to execute arbitrary commands on the underlying system. This can lead to complete system compromise, data exfiltration, and denial of service. This vulnerability affects FlowiseAI versions up to 3.0.13.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply appropriate input validation and sanitization to prevent modification of <code>allowedUploadFileTypes</code> settings.</li>
<li>Monitor network traffic for PUT requests to <code>/api/v1/chatflows/{CHATFLOW_ID}</code> modifying <code>allowedUploadFileTypes</code> as described in the attack chain.</li>
<li>Monitor for POST requests to <code>/api/v1/attachments/{CHATFLOW_ID}/{CHAT_ID}</code> uploading <code>.js</code> files based on the attack chain.</li>
<li>Deploy the Sigma rules provided below to detect suspicious HTTP requests indicative of this attack.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>flowiseai</category><category>file-upload</category><category>rce</category><category>web-shell</category></item><item><title>Sagredo qmail Remote Code Execution Vulnerability (CVE-2026-41113)</title><link>https://feed.craftedsignal.io/briefs/2026-04-qmail-rce/</link><pubDate>Fri, 17 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-qmail-rce/</guid><description>A remote code execution vulnerability exists in Sagredo qmail versions prior to 2026.04.07 due to the use of `popen` in the `notlshosts_auto` function within `qmail-remote.c`, potentially leading to OS command injection.</description><content:encoded><![CDATA[<p>Sagredo qmail, a mail transfer agent (MTA), is vulnerable to a remote code execution (RCE) flaw, identified as CVE-2026-41113.  Specifically, versions prior to 2026.04.07 are affected. The vulnerability lies in the <code>notlshosts_auto</code> function within the <code>qmail-remote.c</code> file, where the <code>popen</code> function is used without proper sanitization, potentially allowing an attacker to inject and execute arbitrary OS commands. This vulnerability could be exploited by a remote attacker without requiring authentication, making it a critical security concern for organizations utilizing the affected qmail versions. Defenders should prioritize patching and consider implementing mitigations to prevent potential exploitation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker sends an email to a target qmail server.</li>
<li>The qmail server receives the email and processes the recipient address.</li>
<li>During the delivery process, <code>qmail-remote.c</code> is invoked to handle remote delivery.</li>
<li>The <code>notlshosts_auto</code> function is called within <code>qmail-remote.c</code> to determine if TLS should be used for the connection.</li>
<li>The <code>notlshosts_auto</code> function executes the <code>popen</code> command with a crafted input string from the email, attempting to resolve hostnames.</li>
<li>The attacker injects malicious commands into the hostname string, which are then executed by <code>popen</code> on the server.</li>
<li>The attacker gains arbitrary code execution on the qmail server.</li>
<li>The attacker can then pivot to other systems within the network or exfiltrate sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-41113 allows a remote attacker to execute arbitrary code on the vulnerable qmail server. This could lead to complete system compromise, data breaches, or denial-of-service conditions. Organizations using vulnerable versions of qmail are at risk of losing control of their email infrastructure and potentially exposing sensitive information. While the number of actively exploited instances is currently unknown, the high CVSS score (8.1) underscores the severity and potential for widespread impact.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to Sagredo qmail version 2026.04.07 or later to patch CVE-2026-41113 (reference: <a href="https://github.com/sagredo-dev/qmail/releases/tag/v2026.04.07">https://github.com/sagredo-dev/qmail/releases/tag/v2026.04.07</a>).</li>
<li>Implement network segmentation to limit the impact of a successful compromise on the qmail server.</li>
<li>Monitor qmail server logs for suspicious activity, such as unusual process execution or network connections (enable process_creation and network_connection logging).</li>
<li>Deploy the Sigma rule &ldquo;Detect Suspicious Qmail Remote Execution via popen&rdquo; to identify potential exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">threat</category><category>qmail</category><category>rce</category><category>command-injection</category><category>CVE-2026-41113</category></item><item><title>Flowise Authenticated Remote Code Execution via MCP Adapter</title><link>https://feed.craftedsignal.io/briefs/2026-04-flowise-rce/</link><pubDate>Fri, 17 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-flowise-rce/</guid><description>Flowise versions 3.0.13 and earlier are vulnerable to authenticated arbitrary command execution due to unsafe serialization of stdio commands in the MCP adapter, allowing a malicious user to execute commands on the underlying operating system.</description><content:encoded><![CDATA[<p>Flowise is an open-source low-code platform to build customized AI flow. Versions 3.0.13 and earlier contain a critical vulnerability that allows authenticated users to execute arbitrary commands on the underlying operating system. This vulnerability stems from insufficient input sanitization within the MCP (Model Composition Protocol) adapter. By adding a new MCP using stdio, an attacker can inject malicious commands, bypassing existing sanitization checks. Specifically, the vulnerability lies in the &ldquo;Custom MCP&rdquo; configuration where commands like &ldquo;npx&rdquo; can be combined with code execution arguments (e.g., &ldquo;npx -c touch /tmp/pwn&rdquo;), leading to direct code execution. This vulnerability affects both the <code>flowise</code> and <code>flowise-components</code> packages.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker authenticates to the Flowise application.</li>
<li>Attacker navigates to the Custom MCP configuration page (e.g., <code>/canvas</code>).</li>
<li>Attacker creates a new Custom MCP adapter.</li>
<li>Attacker configures the MCP adapter to use stdio.</li>
<li>Attacker injects a malicious command, such as &ldquo;npx -c touch /tmp/pwn&rdquo;, into the command or arguments fields. This bypasses <code>validateCommandInjection</code> and <code>validateArgsForLocalFileAccess</code> checks.</li>
<li>Flowise application executes the attacker-supplied command via the MCP adapter.</li>
<li>Malicious command is executed on the underlying operating system.</li>
<li>Attacker achieves arbitrary code execution on the server.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an authenticated attacker to achieve arbitrary command execution on the Flowise server. This could lead to complete system compromise, data theft, or denial of service. The vulnerability affects Flowise installations running versions 3.0.13 and earlier. The number of affected installations is currently unknown, but given the popularity of Flowise, the potential impact is significant.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Flowise and Flowise-components to a version greater than 3.0.13 to patch CVE-2026-40933.</li>
<li>Monitor process creation events for the execution of &ldquo;npx&rdquo; with the &ldquo;-c&rdquo; argument where the parent process is the Flowise application. Deploy the provided Sigma rule <code>Detect Flowise MCP Command Execution</code> to identify potential exploitation attempts.</li>
<li>Implement stricter input validation and sanitization measures within the MCP adapter configuration to prevent command injection attacks.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>flowise</category><category>rce</category><category>command-injection</category></item><item><title>Multiple Critical Vulnerabilities in CISCO ISE Leading to Remote Code Execution</title><link>https://feed.craftedsignal.io/briefs/2026-04-cisco-ise-rce/</link><pubDate>Fri, 17 Apr 2026 08:45:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-cisco-ise-rce/</guid><description>Multiple critical vulnerabilities in CISCO ISE (CVE-2026-20186, CVE-2026-20147, CVE-2026-20180) allow remote attackers with low privileges to execute arbitrary commands, potentially escalating privileges to root and causing denial-of-service.</description><content:encoded><![CDATA[<p>Cisco Identity Services Engine (ISE) versions 3.x.x (3.1.0 - 3.4.0, and 3.1.0 p1-p10, 3.2.0 p1-p7, 3.3 Patches 1-7, and 3.4 Patches 1-3) are vulnerable to three newly disclosed vulnerabilities that can lead to remote code execution. These vulnerabilities, CVE-2026-20186, CVE-2026-20147, and CVE-2026-20180, can be exploited by remote attackers with low privileges, such as having Read Only Admin credentials. Successful exploitation can result in service disruption, system takeover, and complete compromise of the ISE instance. The vulnerabilities involve command injection and path traversal due to insufficient validation of user-supplied input in HTTP request handling. There is currently no public proof-of-concept or proof-of-exploitation available.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker authenticates to CISCO ISE with low-privilege credentials (e.g., Read Only Admin).</li>
<li>Attacker crafts a malicious HTTP request targeting a vulnerable endpoint within the ISE web application.</li>
<li>The crafted request exploits CVE-2026-20186 by injecting commands to escalate privileges to root.</li>
<li>Alternatively, the attacker exploits CVE-2026-20147 by sending a crafted HTTP request to execute arbitrary commands on the underlying operating system.</li>
<li>As another option, the attacker leverages CVE-2026-20180 by exploiting insufficient validation of user-supplied input, leading to remote code execution.</li>
<li>The injected commands or executed code elevates the attacker&rsquo;s privileges to root.</li>
<li>The attacker gains full control over the ISE system, enabling them to modify configurations, access sensitive data, or install malicious software.</li>
<li>In single-node ISE deployments, successful exploitation can lead to a denial-of-service condition, disrupting network authentication and authorization services.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities allows attackers to gain complete control over the CISCO ISE system. This can lead to the compromise of sensitive network access policies, credentials, and other confidential information managed by ISE. The impact includes potential disruption of network services due to denial-of-service, unauthorized access to network resources, and the potential for lateral movement to other systems within the network. Given that ISE is a critical component for network access control, a successful attack can have widespread and severe consequences.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately patch vulnerable CISCO ISE instances to the latest version to remediate CVE-2026-20186, CVE-2026-20147, and CVE-2026-20180 (Cisco Security Advisory).</li>
<li>Implement enhanced monitoring and detection capabilities to identify suspicious activity related to these vulnerabilities (CCB Recommendation).</li>
<li>Investigate and remediate any existing compromises by reviewing system logs and configurations for unauthorized changes (CCB Recommendation).</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cisco-ise</category><category>rce</category><category>command-injection</category><category>path-traversal</category></item><item><title>JetBrains YouTrack RCE via Sandbox Bypass (CVE-2026-33392)</title><link>https://feed.craftedsignal.io/briefs/2026-04-jetbrains-rce/</link><pubDate>Fri, 17 Apr 2026 08:16:17 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-jetbrains-rce/</guid><description>A high privileged user can achieve remote code execution via sandbox bypass in JetBrains YouTrack before version 2025.3.131383, identified as CVE-2026-33392, potentially leading to complete system compromise.</description><content:encoded><![CDATA[<p>CVE-2026-33392 describes a remote code execution (RCE) vulnerability affecting JetBrains YouTrack servers before version 2025.3.131383. This vulnerability allows a high privileged user to bypass the application&rsquo;s sandbox and execute arbitrary code on the underlying system. While the specific exploitation details are not provided in the source, successful exploitation would grant the attacker complete control over the YouTrack server and potentially the entire network. Given the potential for complete system compromise, organizations using affected versions of YouTrack should prioritize patching this vulnerability.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker authenticates to the YouTrack server with a high-privileged account.</li>
<li>Attacker crafts a malicious payload designed to exploit the sandbox bypass. This payload leverages the improper neutralization of special elements used in a template engine (CWE-1336).</li>
<li>The attacker injects the malicious payload into a vulnerable field or function within YouTrack, such as a custom workflow or template.</li>
<li>The YouTrack server processes the malicious payload, failing to properly sanitize the input.</li>
<li>The injected payload bypasses the intended security sandbox restrictions.</li>
<li>Arbitrary code is executed on the YouTrack server, outside the intended sandbox environment.</li>
<li>The attacker leverages the gained code execution to install a webshell or other persistent access mechanisms.</li>
<li>The attacker uses the compromised YouTrack server as a pivot point to access other systems within the network, potentially leading to data exfiltration or further malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-33392 allows a high privileged user to execute arbitrary code on the YouTrack server. This can lead to complete system compromise, including data theft, modification, or destruction. The impact is especially significant for organizations that rely on YouTrack for critical project management and issue tracking, as a compromised server can disrupt operations, expose sensitive information, and damage reputation.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately upgrade JetBrains YouTrack to version 2025.3.131383 or later to patch CVE-2026-33392.</li>
<li>Implement the provided Sigma rule to detect potential exploitation attempts against YouTrack servers.</li>
<li>Review and restrict high-privilege user access within YouTrack to minimize the potential attack surface.</li>
<li>Monitor web server logs for suspicious activity, particularly requests containing unusual characters or patterns indicative of code injection attempts, to assist with detection of similar exploits.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-33392</category><category>rce</category><category>jetbrains</category><category>youtrack</category><category>sandbox-bypass</category></item><item><title>FlowiseAI AirtableAgent Remote Code Execution via Prompt Injection</title><link>https://feed.craftedsignal.io/briefs/2024-01-flowise-rce/</link><pubDate>Thu, 16 Apr 2026 21:43:57 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-flowise-rce/</guid><description>A remote code execution vulnerability exists in FlowiseAI's AirtableAgent.ts due to insufficient input verification when using Pandas, allowing attackers to inject malicious code into the prompt and execute arbitrary code via Pyodide.</description><content:encoded><![CDATA[<p>FlowiseAI is susceptible to a remote code execution (RCE) vulnerability within the AirtableAgent function. This function, designed to retrieve and process datasets from Airtable.com, is flawed due to the lack of input sanitization. Specifically, user-supplied input is directly incorporated into a prompt template, which is then used to generate Python code executed by Pyodide. By injecting malicious payloads into the prompt, an attacker can bypass the intended behavior of the language model and execute arbitrary Python code, leading to complete system compromise. The vulnerability resides in <code>AirtableAgent.ts</code> and is triggered when the <code>input</code> variable, containing user-supplied data, is passed to the LLMChain without proper validation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious payload containing a prompt injection designed to execute arbitrary code.</li>
<li>The attacker submits the crafted payload via the FlowiseAI application to the AirtableAgent function.</li>
<li>The payload is passed into the <code>input</code> variable without sanitization and incorporated into the prompt template within <code>systemPrompt</code>.</li>
<li>The LLMChain uses the crafted prompt, including the injected code, to generate a <code>pythonCode</code> string.</li>
<li>The generated <code>pythonCode</code> string, containing the malicious code, is passed to the <code>pyodide.runPythonAsync()</code> function.</li>
<li>Pyodide executes the malicious Python code, leading to remote code execution on the FlowiseAI server.</li>
<li>The attacker gains control of the FlowiseAI instance, potentially accessing sensitive data or pivoting to other systems on the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows for complete remote code execution on the FlowiseAI server. This could lead to the compromise of sensitive data stored within Airtable datasets, as well as the potential for lateral movement to other systems on the network. The lack of input validation opens the door to attackers using prompt injection to bypass security measures and gain unauthorized access.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply input sanitization and validation to the <code>input</code> variable within the AirtableAgent function in <code>AirtableAgent.ts</code> before it is incorporated into the prompt template.</li>
<li>Implement strict output filtering on the <code>pythonCode</code> generated by the LLMChain to prevent the execution of potentially malicious code.</li>
<li>Deploy the Sigma rule to detect prompt injection attempts targeting the AirtableAgent function.</li>
<li>Regularly audit and update FlowiseAI dependencies, including Pyodide and Pandas, to address any known security vulnerabilities.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>flowiseai</category><category>rce</category><category>prompt-injection</category><category>airtable</category></item><item><title>Apache ActiveMQ Multiple Vulnerabilities Allow Remote Code Execution</title><link>https://feed.craftedsignal.io/briefs/2026-04-activemq-vulns/</link><pubDate>Thu, 16 Apr 2026 05:29:10 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-activemq-vulns/</guid><description>An authenticated remote attacker can exploit multiple vulnerabilities in Apache ActiveMQ to manipulate files or execute arbitrary code.</description><content:encoded><![CDATA[<p>Multiple vulnerabilities in Apache ActiveMQ, a popular open-source message broker, can be exploited by an authenticated remote attacker to achieve arbitrary code execution or manipulate files. This threat affects ActiveMQ brokers, clients, and web consoles. Given ActiveMQ&rsquo;s widespread use in enterprise environments for inter-application communication, successful exploitation could lead to significant data breaches, service disruptions, and lateral movement within the affected networks. The vendor has not released information about the specific vulnerabilities being targeted, but the advisory indicates that authentication is a prerequisite for exploitation, suggesting that stolen or weak credentials could be a contributing factor.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains valid credentials for accessing the ActiveMQ broker or web console, potentially through credential stuffing, phishing, or exploiting other vulnerabilities in the application stack.</li>
<li>The attacker authenticates to the ActiveMQ broker or web console using the compromised credentials.</li>
<li>The attacker exploits a vulnerability that allows them to manipulate files on the ActiveMQ server, such as uploading malicious configuration files or modifying existing ones.</li>
<li>The attacker leverages another vulnerability that enables arbitrary code execution through the manipulated files or other mechanisms.</li>
<li>The attacker executes arbitrary code on the ActiveMQ server, potentially gaining a shell or other remote access.</li>
<li>The attacker uses the compromised ActiveMQ server as a pivot point to move laterally within the network, targeting other systems and data.</li>
<li>The attacker installs backdoors or other persistent mechanisms to maintain access to the compromised ActiveMQ server and the network.</li>
<li>The attacker exfiltrates sensitive data from the compromised systems or deploys ransomware to encrypt data and demand a ransom payment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities can lead to complete compromise of the ActiveMQ server, potential data breaches, and lateral movement within the network. Depending on the ActiveMQ server&rsquo;s role, this can severely impact business operations, lead to financial losses, and damage the organization&rsquo;s reputation. The number of potential victims is high due to the widespread use of Apache ActiveMQ across various sectors.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Review ActiveMQ access controls and enforce multi-factor authentication to mitigate credential compromise.</li>
<li>Monitor ActiveMQ logs for suspicious authentication attempts or unusual activity patterns indicative of exploitation.</li>
<li>Deploy the Sigma rule provided below to detect potential exploitation attempts against ActiveMQ servers based on unusual process execution.</li>
<li>Implement network segmentation to limit the potential impact of a compromised ActiveMQ server and prevent lateral movement.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>apache-activemq</category><category>vulnerability</category><category>rce</category></item><item><title>Weblate Project Backup Vulnerability Leads to Potential Remote Code Execution (CVE-2026-33435)</title><link>https://feed.craftedsignal.io/briefs/2026-04-weblate-rce/</link><pubDate>Wed, 15 Apr 2026 19:16:35 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-weblate-rce/</guid><description>Weblate versions before 5.17 are susceptible to remote code execution due to unfiltered Git and Mercurial configuration files in project backups, potentially allowing attackers to execute arbitrary code under specific conditions.</description><content:encoded><![CDATA[<p>Weblate, a web-based localization tool, contains a vulnerability (CVE-2026-33435) in versions prior to 5.17. The flaw stems from the project backup functionality, which fails to adequately filter Git and Mercurial configuration files. This oversight can be exploited to achieve remote code execution (RCE) under certain circumstances. The vulnerability was reported and patched in version 5.17. Mitigation steps for unpatched systems involve restricting access to the project backup feature, as it is limited to users with project creation privileges. This vulnerability poses a significant risk, as successful exploitation can lead to complete system compromise, data breaches, and further malicious activities.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains access to a Weblate account with project creation privileges.</li>
<li>The attacker creates a malicious project containing crafted Git or Mercurial configuration files.</li>
<li>The attacker triggers a project backup.</li>
<li>The backup process fails to properly sanitize the malicious configuration files.</li>
<li>The backup is stored on the server, potentially overwriting existing files.</li>
<li>The Weblate server attempts to process or utilize the tainted configuration files.</li>
<li>Due to improper sanitization, the malicious configuration files trigger command execution within the Weblate server&rsquo;s environment.</li>
<li>The attacker achieves remote code execution, gaining control over the Weblate server.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-33435 can lead to remote code execution on the Weblate server. The impact includes potential data breaches, unauthorized access to localization projects, and complete compromise of the affected system. While the exact number of affected installations is unknown, organizations using vulnerable versions of Weblate risk significant operational disruption and data loss. Sectors utilizing Weblate for localization, such as software development, content creation, and e-commerce, are at increased risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Weblate to version 5.17 or later to patch CVE-2026-33435.</li>
<li>If upgrading is not immediately feasible, restrict access to the project backup feature to only trusted users as recommended in the CVE description.</li>
<li>Monitor web server logs for unusual activity related to project backup downloads, focusing on requests to /admin/backup/ paths. Use the provided Sigma rule to detect unusual file downloads from the webserver.</li>
<li>Implement the provided Sigma rule to detect suspicious file uploads of git configuration files.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-33435</category><category>rce</category><category>weblate</category></item><item><title>SQL Server Untrusted Pointer Dereference Vulnerability (CVE-2026-33120)</title><link>https://feed.craftedsignal.io/briefs/2026-04-sql-server-rce/</link><pubDate>Wed, 15 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-sql-server-rce/</guid><description>CVE-2026-33120 is an untrusted pointer dereference vulnerability in Microsoft SQL Server that allows an authenticated attacker to achieve remote code execution over a network.</description><content:encoded><![CDATA[<p>CVE-2026-33120 is a critical vulnerability affecting Microsoft SQL Server. This vulnerability, classified as an untrusted pointer dereference, allows an authorized attacker to execute arbitrary code on the targeted system remotely. Successful exploitation requires the attacker to be authenticated to the SQL Server instance, reducing the attack surface but still posing a significant threat to internal networks. The vulnerability was reported by Microsoft and assigned a CVSS v3.1 score of 8.8, highlighting its potential for significant impact. The vulnerability poses a significant risk to organizations utilizing vulnerable SQL Server instances, as it could lead to data breaches, system compromise, and further lateral movement within the network. Defenders need to identify and patch vulnerable SQL Server instances promptly to mitigate this risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker authenticates to the targeted SQL Server instance using compromised or valid credentials.</li>
<li>Attacker crafts a malicious SQL query designed to trigger the untrusted pointer dereference.</li>
<li>The malicious query is sent to the SQL Server instance for processing.</li>
<li>SQL Server attempts to dereference a pointer controlled by the attacker due to the crafted query.</li>
<li>This dereference leads to an exception or crash within the SQL Server process.</li>
<li>The attacker leverages this crash to gain control of the execution flow.</li>
<li>The attacker injects malicious code into the SQL Server process memory.</li>
<li>The injected code is executed within the context of the SQL Server service account, granting the attacker system-level privileges and remote code execution.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-33120 allows an authenticated attacker to execute arbitrary code on the targeted SQL Server instance with system-level privileges. This can lead to complete system compromise, data breaches, denial of service, and further lateral movement within the network. The vulnerability affects all SQL Server versions prior to the patch. Given the widespread use of SQL Server in enterprise environments, a successful exploit could have significant repercussions, impacting sensitive data and critical business operations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the security update released by Microsoft to patch CVE-2026-33120 on all affected SQL Server instances immediately. Refer to the Microsoft advisory (<a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33120">https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33120</a>) for specific instructions.</li>
<li>Monitor SQL Server logs for suspicious activity, such as unexpected crashes or unusual query patterns that might indicate exploitation attempts. Create a rule based on process creation with unexpected parent processes.</li>
<li>Implement the Sigma rule <code>Detect Suspicious SQL Server Process Creation</code> to detect potential exploitation attempts based on process creation events.</li>
<li>Review and enforce the principle of least privilege for SQL Server accounts to minimize the impact of successful exploitation.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>sql-server</category><category>rce</category><category>vulnerability</category></item><item><title>Critical Remote Code Execution Vulnerability in Talend JobServer and Talend Runtime</title><link>https://feed.craftedsignal.io/briefs/2026-04-talend-rce/</link><pubDate>Wed, 15 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-talend-rce/</guid><description>CVE-2026-6264, a critical deserialization vulnerability in Talend JobServer and Runtime, allows unauthenticated remote code execution via the JMX monitoring port, leading to complete system compromise.</description><content:encoded><![CDATA[<p>A critical remote code execution vulnerability, CVE-2026-6264, has been identified in Talend JobServer and Talend Runtime, core components of the Talend data integration platform. Versions affected include Talend JobServer 7.3 (before TPS-6018) and 8.0 (before TPS-6017), as well as Talend Runtime 7.3 (before 7.3.1-R2026-01) and 8.0 (before 8.0.1.R2026-01-RT). The vulnerability stems from insecure deserialization of untrusted data through the JMX monitoring port. Successful exploitation allows an unauthenticated attacker to execute arbitrary code remotely, gain full control over affected systems, access, modify, or delete sensitive data, and disrupt services and data processing workflows. Given the wide deployment of Talend in enterprise settings, this vulnerability poses a significant risk to critical data pipelines.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a vulnerable Talend JobServer or Runtime instance with an exposed JMX monitoring port.</li>
<li>The attacker crafts a malicious serialized Java object containing arbitrary code.</li>
<li>The attacker sends the malicious serialized object to the JMX monitoring port of the target system.</li>
<li>The Talend JobServer or Runtime instance deserializes the malicious object without proper validation.</li>
<li>The deserialization process triggers the execution of the embedded malicious code within the Java Runtime Environment (JRE).</li>
<li>The attacker gains remote code execution on the compromised system.</li>
<li>The attacker leverages their initial access to escalate privileges, potentially gaining root or SYSTEM access.</li>
<li>The attacker can then access, modify, or exfiltrate sensitive data, install backdoors, or disrupt critical services.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-6264 can lead to complete system compromise, allowing attackers to execute arbitrary code, access sensitive data, and disrupt critical business processes. Given that Talend is often deployed in enterprise environments as part of critical data pipelines, a successful attack could result in widespread compromise across the enterprise, potentially impacting hundreds or thousands of systems and causing significant financial and reputational damage. The CCB has rated this as a critical vulnerability with a CVSS score of 9.8.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately patch Talend JobServer to the latest version (TPS-6018 for 7.3, TPS-6017 for 8.0) to fully mitigate the vulnerability, as described in the advisory.</li>
<li>For Talend Runtime, disable the JobServer JMX monitoring port, particularly on versions prior to R2024-07-RT, as recommended in the advisory.</li>
<li>Deploy the Sigma rule provided below to detect suspicious JMX traffic indicative of CVE-2026-6264 exploitation.</li>
<li>Increase monitoring and detection capabilities to identify any related suspicious activity, as recommended by the CCB.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>rce</category><category>deserialization</category><category>talend</category></item><item><title>Adobe ColdFusion Improper Input Validation RCE</title><link>https://feed.craftedsignal.io/briefs/2026-04-coldfusion-rce/</link><pubDate>Wed, 15 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-coldfusion-rce/</guid><description>Adobe ColdFusion versions 2023.18, 2025.6, and earlier are vulnerable to improper input validation, potentially leading to arbitrary code execution without user interaction.</description><content:encoded><![CDATA[<p>Adobe ColdFusion versions 2023.18, 2025.6, and earlier are susceptible to an improper input validation vulnerability (CVE-2026-27304). This flaw allows for arbitrary code execution within the security context of the current user. The vulnerability is exploitable remotely and requires no user interaction, increasing the potential impact. This vulnerability was disclosed on April 14, 2026. Given the severity and ease of exploitation, organizations using affected ColdFusion versions should prioritize patching and implement detection measures immediately.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a vulnerable ColdFusion server running a version prior to 2023.18 or 2025.6.</li>
<li>The attacker crafts a malicious request containing a payload designed to exploit the input validation vulnerability.</li>
<li>The crafted request is sent to a ColdFusion endpoint that processes user-supplied input.</li>
<li>Due to the improper input validation, the malicious payload is processed by the ColdFusion server.</li>
<li>The payload executes arbitrary code within the context of the ColdFusion application user.</li>
<li>The attacker gains unauthorized access to the system, potentially escalating privileges.</li>
<li>The attacker can install malware, exfiltrate sensitive data, or perform other malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to execute arbitrary code on the ColdFusion server. This can lead to complete system compromise, including data theft, malware installation, and denial of service. Given the criticality of ColdFusion in many enterprise environments, a successful attack can have significant business impact, leading to financial losses, reputational damage, and legal consequences.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the security patch provided by Adobe as outlined in APSB26-38 to remediate CVE-2026-27304 (reference: <a href="https://helpx.adobe.com/security/products/coldfusion/apsb26-38.html)">https://helpx.adobe.com/security/products/coldfusion/apsb26-38.html)</a>.</li>
<li>Monitor web server logs for suspicious POST requests targeting ColdFusion endpoints with unusually long or malformed parameters (reference: webserver log source).</li>
<li>Implement input validation rules in ColdFusion applications to prevent malicious data from being processed (reference: CWE-20).</li>
<li>Deploy the Sigma rule provided below to detect potential exploitation attempts in your web server logs.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-27304</category><category>coldfusion</category><category>rce</category><category>improper-input-validation</category></item><item><title>UniFi Play Path Traversal Vulnerability (CVE-2026-22562)</title><link>https://feed.craftedsignal.io/briefs/2026-04-unifi-path-traversal/</link><pubDate>Tue, 14 Apr 2026 14:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-unifi-path-traversal/</guid><description>A path traversal vulnerability in UniFi Play devices allows an attacker with network access to write arbitrary files, leading to remote code execution.</description><content:encoded><![CDATA[<p>CVE-2026-22562 describes a critical path traversal vulnerability affecting UniFi Play PowerAmp (version 1.0.35 and earlier) and UniFi Play Audio Port (version 1.0.24 and earlier) devices. An attacker with access to the UniFi Play network can exploit this vulnerability to write arbitrary files on the file system. This capability can then be leveraged to achieve remote code execution (RCE) on the vulnerable device. Successful exploitation requires network access to the affected UniFi Play devices, making internal networks the primary target. The vulnerability was disclosed in April 2026. Defenders should prioritize patching vulnerable devices to prevent potential compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains access to the UniFi Play network (e.g., via compromised credentials or network intrusion).</li>
<li>Attacker identifies a vulnerable UniFi Play device (PowerAmp &lt;= 1.0.35 or Audio Port &lt;= 1.0.24).</li>
<li>Attacker crafts a malicious HTTP request containing a path traversal sequence (e.g., &ldquo;../../../&rdquo;) in a file upload or download parameter.</li>
<li>The vulnerable device processes the request without proper sanitization, allowing the attacker to write a file to an arbitrary location on the file system.</li>
<li>Attacker writes a malicious script (e.g., a shell script or executable) to a location where it can be executed (e.g., a startup directory or cron job).</li>
<li>Attacker triggers the execution of the malicious script (e.g., by rebooting the device or waiting for the cron job to run).</li>
<li>The malicious script executes with the privileges of the UniFi Play device, granting the attacker remote code execution.</li>
<li>Attacker uses RCE to further compromise the device, pivot to other network assets, or establish persistence.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-22562 allows an attacker to gain complete control of the vulnerable UniFi Play device. This can lead to data exfiltration, device disruption, and further compromise of the network to which the device is connected. Given the potential for RCE, an attacker could potentially use compromised devices as entry points to other systems on the network, thus expanding their reach and increasing the overall impact of the attack. Organizations using affected UniFi Play devices are at high risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately update UniFi Play PowerAmp to version 1.0.38 or later and UniFi Play Audio Port to version 1.1.9 or later to patch CVE-2026-22562 (see Overview).</li>
<li>Monitor network traffic for suspicious HTTP requests containing path traversal sequences targeting UniFi Play devices using the provided Sigma rule (Path Traversal in URI).</li>
<li>Implement network segmentation to limit the impact of a potential compromise of a UniFi Play device.</li>
<li>Review and harden access controls to the UniFi Play network to prevent unauthorized access by potential attackers.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>path-traversal</category><category>rce</category><category>unifi</category></item><item><title>NocoBase plugin-workflow-javascript Sandbox Escape Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-nocobase-rce/</link><pubDate>Tue, 14 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-nocobase-rce/</guid><description>A remote code execution vulnerability exists in NocoBase plugin-workflow-javascript versions up to 2.0.23 due to a sandbox escape in the createSafeConsole function, allowing unauthenticated attackers to potentially execute arbitrary code on the server.</description><content:encoded><![CDATA[<p>A critical security flaw, identified as CVE-2026-6224, affects NocoBase plugin-workflow-javascript versions up to 2.0.23. This vulnerability resides in the <code>createSafeConsole</code> function within the <code>packages/plugins/@nocobase/plugin-workflow-javascript/src/server/Vm.js</code> file. By manipulating this function, an attacker can escape the intended sandbox environment. Publicly available exploits exist, increasing the risk of active exploitation. This vulnerability allows for remote, unauthenticated exploitation, making it a significant threat to systems running the affected NocoBase plugin. The vendor has not responded to vulnerability disclosure attempts.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker sends a malicious request to the NocoBase server targeting the <code>plugin-workflow-javascript</code> component.</li>
<li>The request is processed by the vulnerable <code>createSafeConsole</code> function within <code>Vm.js</code>.</li>
<li>The attacker leverages the identified manipulation technique to bypass the intended sandbox restrictions.</li>
<li>The attacker gains unauthorized access to the underlying server environment.</li>
<li>The attacker injects and executes arbitrary JavaScript code within the server context.</li>
<li>The attacker escalates privileges to gain further control of the system.</li>
<li>The attacker establishes persistence through creating new user accounts or modifying system configurations.</li>
<li>The attacker achieves arbitrary code execution on the server, leading to potential data theft, system compromise, or denial of service.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-6224 can lead to complete compromise of the NocoBase server. An attacker can gain unauthorized access to sensitive data, modify system configurations, install malware, or disrupt normal operations. Given the nature of NocoBase as a data management platform, the impact could include widespread data breaches and significant reputational damage. Because exploits are publicly available, organizations using vulnerable versions of the plugin are at immediate risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade NocoBase plugin-workflow-javascript to a patched version beyond 2.0.23 to remediate CVE-2026-6224.</li>
<li>Deploy the provided Sigma rule <code>Detect Suspicious NocoBase Workflow JavaScript Activity</code> to identify potential exploitation attempts targeting the <code>createSafeConsole</code> function.</li>
<li>Monitor web server logs for suspicious requests targeting the <code>/packages/plugins/@nocobase/plugin-workflow-javascript/src/server/Vm.js</code> path.</li>
<li>Implement strict input validation and sanitization measures to prevent malicious code injection.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">threat</category><category>nocobase</category><category>rce</category><category>sandbox-escape</category><category>cve-2026-6224</category></item><item><title>Smart Post Show WordPress Plugin PHP Object Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-smart-post-show-rce/</link><pubDate>Tue, 14 Apr 2026 06:17:10 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-smart-post-show-rce/</guid><description>The Smart Post Show WordPress plugin versions 3.0.12 and earlier are vulnerable to PHP Object Injection via deserialization of untrusted input in the import_shortcodes() function, potentially leading to remote code execution if a suitable POP chain is present.</description><content:encoded><![CDATA[<p>The Smart Post Show WordPress plugin, specifically the Post Grid, Post Carousel &amp; Slider, and List Category Posts components, contains a PHP Object Injection vulnerability. This flaw affects all versions up to and including 3.0.12. The vulnerability resides in the <code>import_shortcodes()</code> function, where the deserialization of untrusted input occurs. This vulnerability requires an authenticated attacker with administrative privileges or higher. Successful exploitation requires the presence of a suitable Property-Oriented Programming (POP) chain within another installed plugin or theme. Without a POP chain, the injected object has no immediate impact. However, with a POP chain, attackers can potentially delete arbitrary files, retrieve sensitive data, or execute arbitrary code on the server.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains administrative-level access to the WordPress dashboard, either through credential compromise or vulnerability exploitation.</li>
<li>The attacker navigates to the Smart Post Show plugin settings page within the WordPress admin panel.</li>
<li>The attacker crafts a malicious payload containing a serialized PHP object designed to trigger a POP chain.</li>
<li>The attacker injects the malicious payload into the <code>import_shortcodes()</code> function, likely through a form field or file upload.</li>
<li>The <code>import_shortcodes()</code> function deserializes the attacker-controlled input, creating the malicious PHP object.</li>
<li>If a suitable POP chain exists within other installed plugins or themes, the deserialization triggers the chain.</li>
<li>The POP chain executes a series of predefined actions based on the objects and methods involved.</li>
<li>The final objective is achieved, such as deleting arbitrary files, retrieving sensitive data, or executing arbitrary code on the server.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The PHP Object Injection vulnerability in the Smart Post Show WordPress plugin allows attackers to potentially gain remote code execution on the affected server. The impact is contingent on the existence of a POP chain within other installed plugins or themes. If successful, an attacker could potentially compromise the entire web server, leading to data breaches, defacement, or complete system takeover. Given the widespread use of WordPress and this plugin, a successful exploit could affect numerous websites across various sectors.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the Smart Post Show plugin to a version greater than 3.0.12 to patch CVE-2026-3017.</li>
<li>Deploy the Sigma rule &ldquo;Detect WordPress Plugin Deserialization Attempt&rdquo; to monitor for suspicious deserialization activity on WordPress servers.</li>
<li>Audit all installed WordPress plugins and themes for potential POP chains that could be exploited in conjunction with this vulnerability.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>wordpress</category><category>php</category><category>object-injection</category><category>rce</category></item><item><title>Adobe Acrobat and Reader CVE-2026-34621 Zero-Day Exploitation</title><link>https://feed.craftedsignal.io/briefs/2026-04-adobe-reader-rce/</link><pubDate>Mon, 13 Apr 2026 15:37:41 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-adobe-reader-rce/</guid><description>Adobe patched CVE-2026-34621, a zero-day vulnerability in Acrobat and Reader exploited since December, allowing malicious PDFs to bypass sandboxes and execute arbitrary code, potentially leading to local file theft.</description><content:encoded><![CDATA[<p>Adobe has addressed CVE-2026-34621, a zero-day vulnerability affecting Acrobat DC, Acrobat Reader DC, and Acrobat 2024 versions on both Windows and macOS. This flaw has been actively exploited in the wild since at least December, with initial discovery occurring after a malicious PDF sample named &ldquo;yummy_adobe_exploit_uwu.pdf&rdquo; was submitted for analysis. The vulnerability allows specially crafted PDF files to bypass sandbox restrictions, invoke privileged JavaScript APIs, and potentially execute arbitrary code. Successful exploitation can lead to reading and stealing arbitrary local files. The impacted versions include Acrobat DC and Reader DC versions 26.001.21367 and earlier, as well as Acrobat 2024 versions 24.001.30356 and earlier. This zero-day requires immediate patching across enterprise and personal environments.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker crafts a malicious PDF file containing JavaScript code designed to exploit CVE-2026-34621.</li>
<li>The attacker distributes the malicious PDF via email, web download, or other means.</li>
<li>The victim opens the malicious PDF in a vulnerable version of Adobe Acrobat or Reader.</li>
<li>The vulnerability allows the malicious PDF to bypass sandbox restrictions.</li>
<li>The PDF invokes privileged JavaScript APIs, such as <code>util.readFileIntoStream()</code>, to read arbitrary local files.</li>
<li>The PDF utilizes <code>RSS.addFeed()</code> to exfiltrate the stolen data to an attacker-controlled server.</li>
<li>The attacker gains access to sensitive information stored on the victim&rsquo;s machine.</li>
<li>The attacker uses the initial access for further exploitation, such as lateral movement or data exfiltration.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-34621 allows attackers to bypass sandbox restrictions within Adobe Acrobat and Reader, leading to arbitrary code execution and unauthorized access to local files. This could result in the theft of sensitive data, such as credentials, financial information, or intellectual property. Although the number of victims is currently unknown, security researcher Gi7w0rm spotted attacks in the wild that leveraged Russian-language documents with oil and gas industry lures, and the potential impact is significant, especially for organizations that handle sensitive information in PDF documents.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately update Adobe Acrobat DC and Reader DC to version 26.001.21411 or later, and Acrobat 2024 to version 24.001.30362 (Windows) or 24.001.30360 (Mac) via &lsquo;Help &gt; Check for Updates&rsquo; to remediate CVE-2026-34621.</li>
<li>Implement the &ldquo;Detect Execution of Suspicious JavaScript in PDFs&rdquo; Sigma rule to identify potential exploitation attempts within your environment.</li>
<li>Monitor file creation events for files matching the name &ldquo;yummy_adobe_exploit_uwu.pdf&rdquo; or similar filenames identified during future investigations.</li>
<li>Educate users to be cautious when opening PDF files from untrusted sources and encourage them to verify the sender&rsquo;s authenticity before opening any attachments.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">threat</category><category>adobe</category><category>acrobat</category><category>reader</category><category>rce</category><category>vulnerability</category></item><item><title>Math.js Improperly Controlled Modification of Object Attributes Leads to RCE</title><link>https://feed.craftedsignal.io/briefs/2026-04-mathjs-rce/</link><pubDate>Sat, 11 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-mathjs-rce/</guid><description>A vulnerability in math.js versions before 15.2.0 allows for arbitrary JavaScript execution through the expression parser when evaluating user-supplied expressions.</description><content:encoded><![CDATA[<p>Math.js is a popular open-source mathematics library for JavaScript. A critical vulnerability (GHSA-jvff-x2qm-6286) exists in versions prior to 15.2.0, allowing arbitrary JavaScript execution. This flaw stems from improperly controlled modification of dynamically-determined object attributes within the expression parser. Applications that utilize math.js to evaluate user-provided mathematical expressions are susceptible. The vulnerability was reported on April 10, 2026, and a patch was released in version 15.2.0. Successful exploitation could lead to complete compromise of the application&rsquo;s server-side environment, enabling data theft, system modification, or denial of service.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious mathematical expression designed to exploit the vulnerability in math.js.</li>
<li>The attacker submits the malicious expression to a vulnerable application that uses math.js for expression parsing.</li>
<li>The application&rsquo;s server-side code receives the input and passes it to the math.js <code>evaluate()</code> function.</li>
<li>The vulnerable <code>evaluate()</code> function processes the expression, leading to unintended modification of object attributes.</li>
<li>This modification triggers the execution of arbitrary JavaScript code embedded within the malicious expression.</li>
<li>The attacker&rsquo;s JavaScript code executes within the context of the server-side application, bypassing security controls.</li>
<li>The attacker gains unauthorized access to sensitive data, modifies system configurations, or installs malicious software.</li>
<li>The attacker achieves full remote code execution (RCE), compromising the entire application.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows attackers to execute arbitrary JavaScript code on the server running the vulnerable application. This can result in complete system compromise, including unauthorized data access, data modification, and denial of service. If the compromised application has access to sensitive databases or internal systems, the attacker can pivot to further compromise the internal network. The vulnerability impacts any application using math.js &lt; 15.2.0 and allows users to evaluate arbitrary expressions, with potentially widespread consequences depending on the application&rsquo;s role and permissions.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately upgrade math.js to version 15.2.0 or later to patch the vulnerability (GHSA-jvff-x2qm-6286).</li>
<li>If immediate patching is not possible, consider disabling or restricting user-provided expression evaluation functionalities.</li>
<li>Deploy the Sigma rules below to your SIEM to detect potential exploitation attempts against vulnerable math.js instances.</li>
<li>Monitor web server logs for suspicious patterns in user input indicative of expression injection attacks.</li>
<li>Implement input validation and sanitization measures to prevent malicious expressions from reaching the math.js parser.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>mathjs</category><category>rce</category><category>expression-injection</category></item><item><title>LiteLLM Remote Code Execution via Bytecode Rewriting (CVE-2026-40217)</title><link>https://feed.craftedsignal.io/briefs/2026-04-litellm-rce/</link><pubDate>Sat, 11 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-litellm-rce/</guid><description>LiteLLM through 2026-04-08 allows remote attackers to execute arbitrary code via bytecode rewriting at the /guardrails/test_custom_code URI, potentially leading to complete system compromise.</description><content:encoded><![CDATA[<p>LiteLLM, a library for simplifying interactions with Large Language Models (LLMs), is vulnerable to remote code execution (RCE) through version 2026-04-08. The vulnerability, identified as CVE-2026-40217, exists due to insufficient input validation at the <code>/guardrails/test_custom_code</code> URI. A remote attacker can exploit this flaw by rewriting bytecode, effectively injecting and executing arbitrary code on the server hosting LiteLLM. This vulnerability poses a significant risk, as it allows unauthenticated attackers with network access to the affected server to gain complete control.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a LiteLLM instance running a vulnerable version (&lt;= 2026-04-08) with the <code>/guardrails/test_custom_code</code> endpoint exposed.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>/guardrails/test_custom_code</code> URI.</li>
<li>The malicious request includes specially crafted data designed to rewrite the bytecode executed by the LiteLLM instance.</li>
<li>The LiteLLM application, due to the vulnerability, processes the attacker-supplied data without proper sanitization or validation.</li>
<li>The application rewrites its own bytecode based on the attacker&rsquo;s input.</li>
<li>The rewritten bytecode contains malicious code injected by the attacker.</li>
<li>The application executes the rewritten bytecode, effectively executing the attacker&rsquo;s injected code.</li>
<li>The attacker gains arbitrary code execution on the server, allowing them to compromise the system, install malware, or exfiltrate data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-40217 allows unauthenticated remote attackers to execute arbitrary code on systems running vulnerable versions of LiteLLM. This can lead to complete system compromise, including data theft, ransomware deployment, and denial of service. The vulnerability could affect any organization utilizing LiteLLM for LLM interaction, particularly those exposing the vulnerable endpoint to untrusted networks. The impact is rated as critical due to the ease of exploitation and the potential for widespread damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the necessary patches or upgrade to a version of LiteLLM that addresses CVE-2026-40217 immediately.</li>
<li>Implement network segmentation to restrict access to the <code>/guardrails/test_custom_code</code> endpoint, as referenced in the vulnerability description.</li>
<li>Deploy the provided Sigma rule <code>Detect LiteLLM Bytecode Rewrite Attempt</code> to identify potential exploitation attempts targeting the vulnerable endpoint.</li>
<li>Monitor web server logs for suspicious POST requests to the <code>/guardrails/test_custom_code</code> URI, using the log source specified in the Sigma rule.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>CVE-2026-40217</category><category>litellm</category><category>rce</category><category>bytecode-rewriting</category></item><item><title>Chamilo LMS Unauthenticated Remote Code Execution via Configuration Injection (CVE-2026-33618)</title><link>https://feed.craftedsignal.io/briefs/2026-04-chamilo-rce/</link><pubDate>Sat, 11 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-chamilo-rce/</guid><description>Chamilo LMS versions prior to 2.0.0-RC.3 are vulnerable to remote code execution (RCE) via eval injection, where an authenticated administrator can inject arbitrary PHP code into platform settings that is then executed when any user (including unauthenticated) requests the /platform-config/list endpoint.</description><content:encoded><![CDATA[<p>Chamilo LMS is a widely used open-source learning management system. CVE-2026-33618 affects versions prior to 2.0.0-RC.3. The vulnerability lies within the <code>PlatformConfigurationController::decodeSettingArray()</code> method, which unsafely uses PHP&rsquo;s <code>eval()</code> function to parse platform settings retrieved from the database. An attacker who has already gained administrative access to the Chamilo LMS platform can inject arbitrary PHP code into these settings. This injected code is then executed whenever <em>any</em> user, including unauthenticated users, makes a request to the <code>/platform-config/list</code> endpoint. This allows for unauthenticated remote code execution, making it a critical vulnerability for organizations using affected versions of Chamilo LMS.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains administrative access to the Chamilo LMS instance (potentially through a separate vulnerability or compromised credentials).</li>
<li>Attacker navigates to the platform configuration settings page within the Chamilo LMS admin panel.</li>
<li>Attacker injects malicious PHP code into a configurable setting field. This code is designed to execute arbitrary commands on the server.</li>
<li>The injected PHP code is saved to the Chamilo LMS database.</li>
<li>An unauthenticated user makes a request to the <code>/platform-config/list</code> endpoint.</li>
<li>The <code>PlatformConfigurationController::decodeSettingArray()</code> method is called to process the platform settings from the database.</li>
<li>The <code>eval()</code> function executes the attacker&rsquo;s injected PHP code.</li>
<li>The attacker achieves remote code execution on the Chamilo LMS server, enabling them to potentially compromise the entire system and connected networks.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-33618 allows an attacker to execute arbitrary PHP code on the Chamilo LMS server. This can lead to full system compromise, data exfiltration, defacement, or denial-of-service. Given that Chamilo LMS is used by educational institutions and organizations worldwide, a successful attack could impact thousands of users and expose sensitive student or employee data. The vulnerability&rsquo;s ease of exploitation, requiring only admin access and an unauthenticated request to a specific endpoint, makes it a highly attractive target for malicious actors.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately upgrade Chamilo LMS instances to version 2.0.0-RC.3 or later to patch CVE-2026-33618.</li>
<li>Monitor web server logs for requests to the <code>/platform-config/list</code> endpoint originating from unusual IP addresses or user agents using the Sigma rule <code>Chamilo_Suspicious_PlatformConfig_Access</code>.</li>
<li>Implement the Sigma rule <code>Chamilo_Eval_Based_Code_Execution</code> to detect potential exploitation attempts based on unusual PHP processes spawned from the web server.</li>
<li>Review and audit all Chamilo LMS administrative accounts for suspicious activity to prevent initial access to vulnerable configuration settings.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>chamilo</category><category>rce</category><category>eval-injection</category><category>cve-2026-33618</category></item><item><title>PraisonAI Remote Code Execution via Malicious Workflow YAML</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-praisonai-rce/</link><pubDate>Fri, 10 Apr 2026 19:32:48 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-praisonai-rce/</guid><description>PraisonAI is vulnerable to remote code execution; loading untrusted YAML files with `type: job` can lead to arbitrary host command execution, potentially enabling full system compromise.</description><content:encoded><![CDATA[<p>PraisonAI is vulnerable to remote code execution via specially crafted YAML files. The vulnerability stems from the <code>praisonai workflow run &lt;file.yaml&gt;</code> command, which, when processing YAML files with <code>type: job</code>, executes steps through the <code>JobWorkflowExecutor</code> class in <code>job_workflow.py</code>. This execution path supports shell command execution via <code>subprocess.run()</code>, inline Python execution via <code>exec()</code>, and arbitrary Python script execution. An attacker can leverage this to inject malicious code into a YAML file, such as <code>exploit.yaml</code>, to achieve arbitrary host command execution. Versions of <code>pip/praisonaiagents</code> up to and including 1.5.139 and <code>pip/PraisonAI</code> up to and including 4.5.138 are affected. This is especially critical in CI/CD environments or shared deployment contexts where untrusted YAML files may be processed.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious YAML file (e.g., <code>exploit.yaml</code>) containing commands to be executed.</li>
<li>The attacker gains access to a system where PraisonAI is installed and can execute the <code>praisonai</code> command.</li>
<li>The attacker executes the command <code>praisonai workflow run exploit.yaml</code>, pointing to the malicious YAML file.</li>
<li>PraisonAI parses the YAML file and identifies the <code>type: job</code> directive.</li>
<li>The <code>JobWorkflowExecutor</code> class in <code>job_workflow.py</code> is invoked to process the workflow steps.</li>
<li>Within the workflow steps, commands specified using <code>run:</code>, <code>script:</code>, or <code>python:</code> directives are executed. Specifically, <code>_exec_shell()</code> executes shell commands, <code>_exec_inline_python()</code> executes inline Python, and <code>_exec_python_script()</code> executes Python scripts.</li>
<li>The malicious code executes, performing actions such as writing files (e.g., <code>pwned.txt</code>) or executing arbitrary system commands.</li>
<li>The attacker achieves arbitrary code execution on the host system, leading to potential system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows a remote or local attacker to execute arbitrary host commands and code. This can lead to full system compromise, including data theft, modification, or destruction. In CI/CD or shared deployment contexts, this could impact multiple systems or applications. The reporter marked this as a critical severity vulnerability.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade <code>pip/praisonaiagents</code> and <code>pip/PraisonAI</code> to versions greater than 1.5.139 and 4.5.138, respectively, to patch the vulnerability as stated in the overview.</li>
<li>Implement strict input validation and sanitization for all YAML files processed by PraisonAI, paying close attention to the <code>type: job</code> directive to prevent execution of arbitrary commands and code.</li>
<li>Deploy the Sigma rule &ldquo;Detect PraisonAI Workflow Execution with Suspicious YAML&rdquo; to your SIEM to detect potential exploitation attempts, based on log source <code>process_creation</code>.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>praisonai</category><category>rce</category><category>yaml</category></item><item><title>PraisonAI UI Hardcoded Approval Mode Leads to Remote Code Execution</title><link>https://feed.craftedsignal.io/briefs/2024-01-09-praisonai-rce/</link><pubDate>Fri, 10 Apr 2026 19:25:49 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-09-praisonai-rce/</guid><description>A vulnerability in PraisonAI allows authenticated users to execute arbitrary shell commands due to a hardcoded approval setting in the Chainlit UI modules, overriding administrator configurations and bypassing intended approval gates; insufficient command sanitization allows for destructive command execution, leading to confidentiality breach, integrity compromise, and availability impact on the server.</description><content:encoded><![CDATA[<p>PraisonAI is vulnerable to remote code execution due to a misconfiguration in the Chainlit UI modules (<code>chat.py</code> and <code>code.py</code>). Specifically, the application hardcodes <code>config.approval_mode = &quot;auto&quot;</code>, effectively disabling the intended human-in-the-loop approval mechanism for ACP tool executions, even when administrators configure the application to require manual approval. This override occurs after the application loads administrator configurations from the <code>PRAISON_APPROVAL_MODE</code> environment variable. Consequently, an authenticated user, including those using default credentials, can instruct the LLM agent to execute arbitrary single-command shell operations on the server without any approval prompt, subject only to the PraisonAI process’s OS-level permissions. The vulnerability affects PraisonAI versions prior to 4.5.128.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker authenticates to the PraisonAI UI using valid credentials (default admin/admin if unchanged).</li>
<li>The attacker crafts a chat message that instructs the LLM agent to execute a shell command via the <code>acp_execute_command</code> function.</li>
<li>The LLM agent parses the message and prepares the command for execution.</li>
<li>Due to the hardcoded <code>approval_mode = &quot;auto&quot;</code> in <code>chat.py</code> or <code>code.py</code>, the command bypasses the intended approval process in <code>agent_tools.py</code>.</li>
<li>The <code>subprocess.run()</code> function in <code>action_orchestrator.py</code> executes the attacker-controlled command with <code>shell=True</code>.</li>
<li>The command executes with the permissions of the PraisonAI process.</li>
<li>The result of the command execution is returned to the attacker via the chat interface.</li>
<li>The attacker leverages this vulnerability to achieve code execution, data exfiltration, or other malicious objectives.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows an authenticated user to execute arbitrary shell commands on the server hosting PraisonAI. This can lead to:</p>
<ul>
<li><strong>Confidentiality breach:</strong> Read sensitive files accessible to the process (e.g., <code>/etc/passwd</code>, application secrets).</li>
<li><strong>Integrity compromise:</strong> Modify or delete files, install backdoors.</li>
<li><strong>Availability impact:</strong> Kill processes, consume resources, delete data.</li>
<li><strong>Administrator control undermined:</strong> The hardcoded <code>approval_mode</code> silently overrides administrator-configured settings, creating a false sense of security.</li>
<li><strong>Prompt injection vector:</strong> Malicious content could trigger command execution through auto-approved tools without direct user intent, especially through external sources like web searches or uploaded files.</li>
</ul>
<p>The vulnerable versions are PraisonAI versions prior to 4.5.128.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li><strong>Upgrade PraisonAI:</strong> Upgrade to version 4.5.128 or later to patch the vulnerability.</li>
<li><strong>Apply Code-Level Fix:</strong> If upgrading is not immediately feasible, manually remove the hardcoded override in <code>chat.py</code> and <code>code.py</code> as described in the advisory.</li>
<li><strong>Implement Allowlisting:</strong> Strengthen command sanitization by implementing an allowlist approach instead of a blocklist in the <code>_sanitize_command()</code> function as described in the advisory.</li>
<li><strong>Monitor Process Creation:</strong> Deploy the Sigma rule &ldquo;Detect Suspicious PraisonAI Command Execution&rdquo; to detect exploitation attempts.</li>
<li><strong>Monitor Network Connections:</strong> Deploy the Sigma rule &ldquo;Detect Suspicious Outbound Connection from PraisonAI&rdquo; to identify potential data exfiltration attempts.</li>
<li><strong>Review Authentication:</strong> Ensure strong passwords are in use and consider multi-factor authentication to mitigate risks from compromised credentials.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>rce</category><category>command-injection</category><category>praisonai</category></item><item><title>OpenClaw WebView JavascriptInterface Vulnerability (CVE-2026-35643)</title><link>https://feed.craftedsignal.io/briefs/2026-04-openclaw-webview-rce/</link><pubDate>Fri, 10 Apr 2026 17:17:04 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-openclaw-webview-rce/</guid><description>OpenClaw before 2026.3.22 is vulnerable to arbitrary code execution due to an unvalidated WebView JavascriptInterface, allowing attackers to inject malicious instructions by invoking the canvas bridge from untrusted pages.</description><content:encoded><![CDATA[<p>OpenClaw versions prior to 2026.3.22 are susceptible to a critical vulnerability (CVE-2026-35643) stemming from an unvalidated WebView JavascriptInterface. This flaw enables attackers to inject arbitrary instructions and execute malicious code within the context of the Android application. The vulnerability arises because untrusted web pages can exploit the canvas bridge, a component responsible for communication between the WebView and the native Android code. Successful exploitation allows an attacker to gain control over the application&rsquo;s resources and potentially the device itself. This is a severe risk for any application using OpenClaw, as it could lead to data theft, malware installation, or other malicious activities.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies an application utilizing a vulnerable version of OpenClaw (prior to 2026.3.22).</li>
<li>The attacker crafts a malicious web page containing JavaScript code designed to exploit the unvalidated WebView JavascriptInterface.</li>
<li>The victim unknowingly navigates to the attacker-controlled web page, likely through social engineering or malicious advertising.</li>
<li>The malicious JavaScript code on the page interacts with the vulnerable canvas bridge within the OpenClaw WebView.</li>
<li>The attacker injects arbitrary instructions through the canvas bridge, leveraging the lack of input validation.</li>
<li>These injected instructions are then executed within the Android application context, bypassing security restrictions.</li>
<li>The attacker gains unauthorized access to the application&rsquo;s resources, such as user data or device functionalities.</li>
<li>The attacker executes arbitrary code, potentially leading to data exfiltration, malware installation, or complete device compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The successful exploitation of CVE-2026-35643 in OpenClaw can lead to complete compromise of the Android application and potentially the device it is running on. This can result in data theft, unauthorized access to sensitive information, installation of malware, and other malicious activities. While the exact number of vulnerable applications is unknown, the widespread use of OpenClaw could potentially affect a large number of users. The vulnerability is particularly dangerous because it can be exploited remotely through a simple web page, making it easily accessible to attackers.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade OpenClaw to version 2026.3.22 or later to patch CVE-2026-35643, as mentioned in the overview.</li>
<li>Implement input validation and sanitization on all data received through the WebView JavascriptInterface to prevent arbitrary code injection.</li>
<li>Deploy the Sigma rule to detect attempts to exploit the canvas bridge within OpenClaw (see &ldquo;Detect Suspicious WebView Bridge Usage&rdquo; rule).</li>
<li>Monitor web traffic for access to untrusted URLs from applications utilizing OpenClaw to identify potential exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-35643</category><category>rce</category><category>android</category></item><item><title>Tenda F451 Router Stack-Based Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-tenda-rce/</link><pubDate>Fri, 10 Apr 2026 00:16:36 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-tenda-rce/</guid><description>A stack-based buffer overflow vulnerability in the Tenda F451 router (version 1.0.0.7) allows remote attackers to execute arbitrary code by manipulating the 'page' argument in the fromRouteStatic function of the /goform/RouteStatic file.</description><content:encoded><![CDATA[<p>A critical vulnerability, identified as CVE-2026-5989, affects the Tenda F451 router, specifically version 1.0.0.7. The vulnerability lies within the <code>fromRouteStatic</code> function of the <code>/goform/RouteStatic</code> file. By manipulating the <code>page</code> argument, a remote attacker can trigger a stack-based buffer overflow, potentially leading to arbitrary code execution. Publicly available exploit code exists, increasing the risk of exploitation. This vulnerability poses a significant threat as it allows unauthenticated remote attackers to compromise the router, potentially leading to network disruption, data theft, or use of the device in botnet activities.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable Tenda F451 router (version 1.0.0.7) exposed to the internet.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>/goform/RouteStatic</code> endpoint.</li>
<li>The request includes a <code>page</code> argument with a payload designed to overflow the stack buffer in the <code>fromRouteStatic</code> function.</li>
<li>The vulnerable <code>fromRouteStatic</code> function processes the malicious <code>page</code> argument without proper bounds checking.</li>
<li>The buffer overflow overwrites critical data on the stack, including the return address.</li>
<li>Upon function return, control is redirected to the attacker-controlled memory region.</li>
<li>The attacker executes arbitrary code injected into the overflowed buffer, such as downloading and executing a reverse shell.</li>
<li>The attacker gains remote access to the router, potentially allowing further exploitation or network compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-5989 allows an attacker to gain complete control of the Tenda F451 router. This can lead to a variety of damaging outcomes, including denial-of-service attacks against the local network, interception of network traffic, modification of router settings, and the potential use of the compromised router as a node in a botnet. Given the widespread use of Tenda routers in home and small business environments, a large number of devices could be at risk if this vulnerability is actively exploited.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for requests to <code>/goform/RouteStatic</code> containing abnormally long <code>page</code> arguments, as this is indicative of potential exploit attempts. Deploy the Sigma rule <code>Detect Tenda F451 Exploit Attempt</code> to detect these malicious requests.</li>
<li>Implement rate limiting on requests to the <code>/goform/RouteStatic</code> endpoint to mitigate potential denial-of-service attacks.</li>
<li>Since there is no patch available, consider replacing vulnerable Tenda F451 routers with more secure devices from other vendors.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">threat</category><category>tenda</category><category>router</category><category>buffer_overflow</category><category>rce</category></item><item><title>OpenClaw RCE via Build Tool Environment Variable Injection</title><link>https://feed.craftedsignal.io/briefs/2024-01-09-openclaw-rce/</link><pubDate>Thu, 09 Apr 2026 14:22:29 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-09-openclaw-rce/</guid><description>OpenClaw versions prior to 2026.4.8 are vulnerable to remote code execution (RCE) via build tool environment variable injection due to missing denylist entries for HGRCPATH, CARGO_BUILD_RUSTC_WRAPPER, RUSTC_WRAPPER, and MAKEFLAGS, allowing hostile environment variables to influence host exec commands.</description><content:encoded><![CDATA[<p>OpenClaw, a user-controlled local assistant, is vulnerable to a remote code execution (RCE) issue affecting versions prior to 2026.4.8. The vulnerability, identified as GHSA-cm8v-2vh9-cxf3, stems from missing denylist entries for environment variables that influence build tools. Specifically, HGRCPATH, CARGO_BUILD_RUSTC_WRAPPER, RUSTC_WRAPPER, and MAKEFLAGS were not properly sanitized, allowing a malicious actor to inject arbitrary commands into the build process. This can lead to the execution of untrusted code on the host system. The vulnerability was reported by @boy-hack of Tencent zhuque Lab. The fix is available in version 2026.4.8 and commit d7c3210cd6f5fdfdc1beff4c9541673e814354d5. This advisory is scoped to the OpenClaw trust model and does not assume a multi-tenant service boundary.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable OpenClaw instance running a version prior to 2026.4.8.</li>
<li>The attacker crafts malicious environment variables, such as HGRCPATH, CARGO_BUILD_RUSTC_WRAPPER, RUSTC_WRAPPER, or MAKEFLAGS, containing shell commands.</li>
<li>The attacker triggers a build process within OpenClaw that utilizes the affected environment variables. This could involve providing a specific input or interacting with OpenClaw in a way that initiates a build operation.</li>
<li>Due to the missing denylist, OpenClaw does not sanitize the malicious environment variables.</li>
<li>The build tool, influenced by the attacker-controlled environment variables, executes the injected shell commands.</li>
<li>The injected commands execute with the privileges of the OpenClaw process.</li>
<li>The attacker gains arbitrary code execution on the host system.</li>
<li>The attacker can now perform actions such as installing malware, exfiltrating data, or compromising other systems.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to execute arbitrary code on the system running OpenClaw. This could lead to complete system compromise, including data theft, malware installation, and further lateral movement within the network. Given OpenClaw&rsquo;s nature as a user-controlled local assistant, the impact is primarily on individual user systems. However, in environments where OpenClaw is deployed more broadly, the vulnerability could be leveraged to compromise multiple machines.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade OpenClaw to version 2026.4.8 or later to patch the vulnerability (see &ldquo;Affected Packages / Versions&rdquo;).</li>
<li>Monitor process creation events for unexpected processes spawned by OpenClaw or its build tool subprocesses (see rules below).</li>
<li>Implement additional input validation and sanitization measures to prevent environment variable injection in other applications.</li>
<li>Review and harden build processes to limit the influence of environment variables.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>rce</category><category>environment-variable-injection</category><category>openclaw</category></item><item><title>WAGO PLC OpenVPN Configuration Vulnerability (CVE-2024-1490)</title><link>https://feed.craftedsignal.io/briefs/2026-04-wago-plc-openvpn-rce/</link><pubDate>Thu, 09 Apr 2026 11:16:19 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-wago-plc-openvpn-rce/</guid><description>An authenticated remote attacker with high privileges can exploit the OpenVPN configuration via the web-based management interface of a WAGO PLC to achieve arbitrary command execution on the device.</description><content:encoded><![CDATA[<p>CVE-2024-1490 describes a critical vulnerability affecting WAGO Programmable Logic Controllers (PLCs). A remote attacker with existing high-privilege access to the PLC&rsquo;s web-based management interface can exploit the OpenVPN configuration. The vulnerability stems from insufficient input validation within the OpenVPN configuration settings. If the PLC&rsquo;s OpenVPN setup permits user-defined scripts, a malicious actor can inject arbitrary shell commands. Successful exploitation allows the attacker to execute arbitrary code on the underlying operating system of the WAGO PLC, potentially leading to full device compromise. This vulnerability was reported by CERT VDE and impacts WAGO PLCs that utilize a vulnerable web-based management interface and permit user-defined scripts in their OpenVPN configuration.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial high-privilege access to the WAGO PLC&rsquo;s web-based management interface.</li>
<li>The attacker navigates to the OpenVPN configuration section within the management interface.</li>
<li>The attacker identifies that the OpenVPN configuration allows for user-defined scripts.</li>
<li>The attacker crafts a malicious OpenVPN configuration file or injects malicious commands via existing configuration options. This configuration contains embedded shell commands designed for execution on the PLC.</li>
<li>The attacker uploads or applies the modified OpenVPN configuration to the WAGO PLC through the web interface.</li>
<li>The WAGO PLC processes the OpenVPN configuration, leading to the execution of the attacker-supplied shell commands.</li>
<li>The attacker achieves arbitrary code execution on the underlying operating system of the WAGO PLC.</li>
<li>The attacker can then use this initial foothold to perform further actions, such as deploying malware, exfiltrating sensitive information, or disrupting industrial processes.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2024-1490 allows an attacker to execute arbitrary code on a WAGO PLC. This can lead to complete compromise of the device, potentially affecting the industrial processes it controls. An attacker could disrupt operations, manipulate data, or use the compromised PLC as a pivot point for further attacks within the industrial network. The severity of the impact depends on the role of the compromised PLC within the industrial environment, potentially leading to significant financial losses, safety incidents, or reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Restrict access to the WAGO PLC&rsquo;s web-based management interface by enforcing strong authentication and authorization mechanisms to prevent unauthorized access (refer to CVE-2024-1490).</li>
<li>Disable or restrict the use of user-defined scripts within the OpenVPN configuration to mitigate the risk of command injection (refer to CVE-2024-1490).</li>
<li>Monitor web server logs for suspicious activity related to OpenVPN configuration changes, looking for unusual POST requests or configuration parameters (see &ldquo;rules&rdquo; section below).</li>
<li>Implement regular security audits of WAGO PLC configurations, focusing on OpenVPN settings and user-defined scripts (refer to CVE-2024-1490).</li>
<li>Review and apply the security recommendations provided by CERT VDE in their advisory, available at <a href="https://certvde.com/de/advisories/VDE-2024-008">https://certvde.com/de/advisories/VDE-2024-008</a>.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2024-1490</category><category>wago-plc</category><category>openvpn</category><category>rce</category><category>code-injection</category></item><item><title>PraisonAI Vulnerable to OS Command Injection</title><link>https://feed.craftedsignal.io/briefs/2024-02-29-praisonai-command-injection/</link><pubDate>Wed, 08 Apr 2026 21:52:10 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-02-29-praisonai-command-injection/</guid><description>PraisonAI is vulnerable to OS command injection due to the use of `subprocess.run()` with `shell=True` on user-controlled inputs, allowing attackers to inject arbitrary shell commands and potentially leading to sensitive data exfiltration or system compromise in versions prior to 4.5.121.</description><content:encoded><![CDATA[<p>PraisonAI versions prior to 4.5.121 are susceptible to OS command injection. The vulnerability stems from the application&rsquo;s use of <code>subprocess.run()</code> with the <code>shell=True</code> parameter when executing commands derived from various user-controlled inputs. These inputs include YAML workflow definitions, agent configuration files (agents.yaml), LLM-generated tool call parameters, and recipe step configurations. This configuration allows an attacker to inject arbitrary shell commands through shell metacharacters, leading to potential remote code execution and system compromise. This vulnerability is particularly concerning in automated environments like CI/CD pipelines or agent workflows, where unintended command execution can occur without direct user awareness.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious YAML workflow definition or modifies an existing one, injecting shell metacharacters into the <code>target</code> field of a <code>shell</code> step.</li>
<li>Alternatively, the attacker modifies the <code>agents.yaml</code> file, injecting malicious commands into the <code>shell_command</code> field of an agent task.</li>
<li>The attacker triggers the execution of the crafted YAML workflow or loads the modified <code>agents.yaml</code> file using PraisonAI&rsquo;s command-line interface.</li>
<li>PraisonAI parses the YAML file and extracts the attacker-controlled command string.</li>
<li>The application then passes this command string to <code>subprocess.run()</code> with <code>shell=True</code>, allowing the shell to interpret the injected metacharacters.</li>
<li>The shell executes the attacker&rsquo;s injected commands, potentially performing actions like reading sensitive files, exfiltrating data, or modifying system configurations.</li>
<li>If using agent mode, an attacker can influence the LLM&rsquo;s context to generate malicious tool calls including shell commands.</li>
<li>The attacker achieves arbitrary code execution with the privileges of the PraisonAI process, leading to system compromise or data breach.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to execute arbitrary shell commands on the affected system. This can lead to a variety of negative consequences, including unauthorized access to sensitive data (such as configuration files, credentials, or user data), modification or deletion of system files, and potentially full system compromise. In automated environments like CI/CD pipelines, this vulnerability could allow an attacker to inject malicious code into software builds, leading to supply chain attacks. The vulnerability affects versions of PraisonAI prior to 4.5.121.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Detect PraisonAI Command Injection via Workflow&rdquo; to identify attempts to exploit this vulnerability through malicious YAML workflow definitions (logsource: <code>process_creation</code>).</li>
<li>Deploy the Sigma rule &ldquo;Detect PraisonAI Command Injection via Agent Configuration&rdquo; to identify attempts to exploit this vulnerability through malicious agent configurations (logsource: <code>process_creation</code>).</li>
<li>Block the C2 domain <code>attacker.com</code> listed in the IOC table at the DNS resolver to prevent data exfiltration and command-and-control communication (type: <code>domain</code>, value: <code>attacker.com</code>).</li>
<li>Upgrade PraisonAI to version 4.5.121 or later to patch this vulnerability (Affected Packages).</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>command-injection</category><category>rce</category><category>praisonai</category></item><item><title>Red Hat Quay Deserialization Vulnerability Leads to Remote Code Execution (CVE-2026-32590)</title><link>https://feed.craftedsignal.io/briefs/2026-04-redhat-quay-rce/</link><pubDate>Wed, 08 Apr 2026 18:25:59 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-redhat-quay-rce/</guid><description>CVE-2026-32590 describes a deserialization vulnerability in Red Hat Quay's handling of resumable container image layer uploads, potentially allowing an attacker to execute arbitrary code on the Quay server by tampering with intermediate data stored in the database.</description><content:encoded><![CDATA[<p>Red Hat Quay is vulnerable to a critical deserialization flaw, identified as CVE-2026-32590. This vulnerability resides in the handling of resumable container image layer uploads. Specifically, the way Quay stores intermediate data in its database during the upload process is susceptible to tampering. An attacker with the ability to manipulate this stored data can leverage this vulnerability to inject malicious serialized objects. When Quay attempts to deserialize this tampered data, it leads to arbitrary code execution within the Quay server&rsquo;s context. This poses a significant risk to the integrity and confidentiality of the container registry. The vulnerability was reported on April 8, 2026, and affects deployments of Red Hat Quay that have not been patched. Successful exploitation allows attackers to gain full control over the Quay server, potentially leading to data breaches, service disruption, and supply chain compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains access to the Quay server&rsquo;s database or the mechanism used to store intermediate data during resumable uploads, potentially through SQL injection or other database vulnerabilities.</li>
<li>The attacker intercepts a container image layer upload request to the Quay server.</li>
<li>The attacker crafts a malicious payload containing a serialized object designed to execute arbitrary code upon deserialization.</li>
<li>The attacker injects the malicious payload into the intermediate data stored in the database associated with the targeted resumable upload.</li>
<li>The Quay server, during the process of resuming the upload, retrieves the tampered intermediate data from the database.</li>
<li>The Quay server attempts to deserialize the data, triggering the execution of the malicious code embedded within the crafted serialized object.</li>
<li>The attacker achieves arbitrary code execution on the Quay server with the privileges of the Quay application.</li>
<li>The attacker leverages the gained access to compromise the entire Quay registry, potentially exfiltrating sensitive data, injecting malicious images, or disrupting the service.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-32590 allows for arbitrary code execution on the Red Hat Quay server. This can lead to a complete compromise of the container registry, potentially affecting all container images stored within. Depending on the Quay server&rsquo;s configuration and connected systems, this could lead to further lateral movement within the network and compromise of other critical infrastructure. The severity is rated as HIGH with a CVSS score of 7.1, indicating a significant risk. If exploited, organizations could face data breaches, supply chain attacks through compromised container images, and prolonged service outages.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the patch or upgrade to a fixed version of Red Hat Quay as recommended by Red Hat to address CVE-2026-32590.</li>
<li>Implement database access controls to restrict unauthorized access and modification of the Quay database to prevent tampering with intermediate data.</li>
<li>Deploy a Web Application Firewall (WAF) to inspect and filter potentially malicious payloads in container image layer upload requests to mitigate exploitation attempts.</li>
<li>Enable robust logging and monitoring of database access and deserialization operations within the Quay server to detect suspicious activities related to this vulnerability.</li>
<li>Implement the provided Sigma rule <code>Detect Quay Deserialization Attempt</code> to identify potential exploitation attempts based on process execution and network connections.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-32590</category><category>redhat-quay</category><category>deserialization</category><category>rce</category></item><item><title>XWiki Remote Code Execution via Unprotected Velocity Scripting API</title><link>https://feed.craftedsignal.io/briefs/2026-04-xwiki-rce/</link><pubDate>Wed, 08 Apr 2026 15:00:17 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-xwiki-rce/</guid><description>XWiki is vulnerable to remote code execution due to an improperly protected scripting API, allowing users with script rights to bypass the Velocity scripting API sandbox and execute arbitrary code, leading to full instance compromise.</description><content:encoded><![CDATA[<p>XWiki versions before 17.4.8 and 17.10.1 are susceptible to remote code execution (RCE) due to an improperly protected Velocity scripting API. This vulnerability, identified as CVE-2026-33229, allows users with existing script rights to bypass the intended sandboxing mechanisms of the Velocity scripting API. By exploiting this flaw, attackers can execute arbitrary code, including potentially malicious Python scripts, on the XWiki instance. This vulnerability allows an attacker to gain complete control over the XWiki instance, compromising the confidentiality, integrity, and availability of the system and its data. The issue has been addressed in XWiki versions 17.4.8 and 17.10.1 by enforcing a requirement for programming rights to access the vulnerable API.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains script rights within the XWiki instance, either through compromised credentials or misconfigured permissions.</li>
<li>The attacker crafts a malicious request leveraging the unprotected Velocity scripting API.</li>
<li>This request bypasses the intended sandboxing of the Velocity scripting engine.</li>
<li>The attacker injects arbitrary code, such as a Python script, into the Velocity template.</li>
<li>The Velocity engine executes the injected code on the XWiki server.</li>
<li>The attacker gains arbitrary code execution privileges on the server.</li>
<li>The attacker leverages the code execution to install a web shell.</li>
<li>Using the web shell, the attacker gains complete control over the XWiki instance, enabling data theft, modification, or denial of service.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability grants attackers complete control over the XWiki instance. This can lead to the theft of sensitive data stored within the XWiki, unauthorized modification of existing data, or a complete denial of service. While the exact number of potential victims is unknown, any XWiki instance running a vulnerable version is at risk, particularly those where script rights are broadly assigned. This vulnerability has the potential to severely impact organizations relying on XWiki for critical business functions.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade XWiki instances to version 17.4.8 or 17.10.1 or later to patch CVE-2026-33229.</li>
<li>Implement the Sigma rule &ldquo;Detect Suspicious XWiki Velocity Scripting API Usage&rdquo; to identify potential exploitation attempts.</li>
<li>Review and restrict script rights assignments within XWiki to minimize the attack surface, as mentioned in the overview.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>xwiki</category><category>rce</category><category>velocity</category><category>scripting</category><category>CVE-2026-33229</category></item><item><title>Apache ActiveMQ Classic RCE via Jolokia API Exploitation</title><link>https://feed.craftedsignal.io/briefs/2026-04-activemq-rce/</link><pubDate>Wed, 08 Apr 2026 14:30:27 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-activemq-rce/</guid><description>A remote code execution vulnerability (CVE-2026-34197) in Apache ActiveMQ Classic allows authenticated attackers to invoke management operations through the Jolokia API to retrieve a remote configuration file and execute OS commands, potentially exploitable without authentication via CVE-2024-32114.</description><content:encoded><![CDATA[<p>A remote code execution vulnerability, CVE-2026-34197, has been identified in Apache ActiveMQ Classic, an open-source messaging and Integration Patterns server widely used across industries. This vulnerability, present for 13 years, allows attackers to invoke management operations through the Jolokia API and instruct the broker to retrieve a remote configuration file, leading to OS command execution. This is achieved by bypassing CVE-2022-41678, a previous bug that allowed webshell creation. Additionally, CVE-2024-32114 exposes the Jolokia API to unauthenticated users in ActiveMQ versions 6.0.0 through 6.1.1, enabling potential RCE without authentication. The vulnerability affects ActiveMQ Classic deployments and was addressed in versions 5.19.4 and 6.2.3.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies an Apache ActiveMQ Classic instance running a vulnerable version (prior to 5.19.4 or 6.2.3).</li>
<li>If the instance is running ActiveMQ 6.0.0 through 6.1.1, the attacker leverages CVE-2024-32114 to access the Jolokia API without authentication. Otherwise, the attacker authenticates to the ActiveMQ instance.</li>
<li>The attacker invokes management operations through the Jolokia API to target ActiveMQ&rsquo;s VM transport feature.</li>
<li>The attacker crafts a VM transport URI referencing a non-existent broker.</li>
<li>ActiveMQ creates the broker and accepts a parameter instructing it to load a configuration from a URL controlled by the attacker.</li>
<li>The attacker hosts a malicious Spring XML configuration file on a remote server.</li>
<li>The ActiveMQ broker retrieves and processes the malicious Spring XML configuration file.</li>
<li>The Spring XML file instantiates bean definitions that execute arbitrary OS commands, achieving remote code execution.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities could lead to complete compromise of the ActiveMQ server, potentially impacting numerous industries relying on this messaging middleware. Attackers could gain unauthorized access to sensitive data, disrupt message queues, and pivot to other systems within the network. The scope of the impact depends on the ActiveMQ deployment and the attacker&rsquo;s objectives. Unauthenticated exploitation via CVE-2024-32114 significantly broadens the attack surface.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Apache ActiveMQ Classic to versions 5.19.4 or 6.2.3 or later to address CVE-2026-34197.</li>
<li>For ActiveMQ versions 6.0.0 through 6.1.1, verify the configuration and security constraints to ensure the Jolokia API is not exposed without authentication, mitigating CVE-2024-32114.</li>
<li>Deploy the Sigma rule &ldquo;ActiveMQ Jolokia API Access&rdquo; to monitor for unauthorized access attempts to the Jolokia API.</li>
<li>Implement network segmentation to limit the blast radius in case of a successful compromise.</li>
<li>Monitor process creation events for suspicious processes spawned by the ActiveMQ Java process, leveraging the &ldquo;ActiveMQ Suspicious Process Creation&rdquo; Sigma rule.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>activemq</category><category>rce</category><category>jolokia</category><category>cve-2026-34197</category><category>cve-2024-32114</category><category>cve-2022-41678</category><category>spring-xml</category></item><item><title>Everest Forms WordPress Plugin PHP Object Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-everest-forms-rce/</link><pubDate>Wed, 08 Apr 2026 02:16:04 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-everest-forms-rce/</guid><description>The Everest Forms plugin for WordPress is vulnerable to PHP Object Injection (CVE-2026-3296) in versions up to 3.4.3, allowing unauthenticated attackers to execute arbitrary code by injecting serialized PHP objects via form fields.</description><content:encoded><![CDATA[<p>The Everest Forms plugin for WordPress, a widely used form builder, contains a critical PHP Object Injection vulnerability (CVE-2026-3296) affecting versions up to and including 3.4.3. This vulnerability stems from the insecure deserialization of user-supplied data within the <code>html-admin-page-entries-view.php</code> file. Specifically, the plugin uses PHP&rsquo;s <code>unserialize()</code> function on form entry metadata stored in the <code>wp_evf_entrymeta</code> table without specifying allowed classes, creating an exploitable condition. An unauthenticated attacker can inject malicious serialized PHP objects through any public form field. The <code>sanitize_text_field()</code> function fails to prevent these attacks because it doesn&rsquo;t strip serialization control characters. This allows attackers to execute arbitrary PHP code on the WordPress server when an administrator views form entries. This vulnerability poses a significant risk to WordPress sites using the Everest Forms plugin.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker submits a malicious serialized PHP object through a public Everest Forms form field.</li>
<li>The submitted payload bypasses the <code>sanitize_text_field()</code> function due to the function&rsquo;s failure to remove serialization control characters.</li>
<li>The crafted serialized object is stored in the <code>wp_evf_entrymeta</code> database table associated with the form entry.</li>
<li>An administrator accesses the WordPress administration panel and navigates to the Everest Forms entries section.</li>
<li>The <code>html-admin-page-entries-view.php</code> file is executed to display form entries and their associated metadata.</li>
<li>The plugin retrieves the stored serialized object from the <code>wp_evf_entrymeta</code> table.</li>
<li>The <code>unserialize()</code> function is called on the retrieved data <em>without</em> the <code>allowed_classes</code> parameter, triggering PHP Object Injection.</li>
<li>The injected PHP object is instantiated, leading to arbitrary PHP code execution on the server, potentially granting the attacker complete control over the WordPress site.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability (CVE-2026-3296) can lead to complete compromise of the WordPress website. An attacker can gain remote code execution, allowing them to inject malware, deface the site, steal sensitive data (including user credentials and financial information), or use the compromised server as part of a botnet. Given the widespread use of the Everest Forms plugin, a large number of WordPress sites are potentially vulnerable. The CVSS v3.1 base score of 9.8 reflects the critical severity of this vulnerability.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately update the Everest Forms plugin to the latest version (greater than 3.4.3) to patch CVE-2026-3296.</li>
<li>Deploy the Sigma rule <code>Detect Suspicious unserialize Call in Everest Forms</code> to identify potential exploitation attempts in web server logs.</li>
<li>Monitor web server logs for suspicious POST requests to WordPress form submission endpoints containing serialized PHP objects, as detected by the <code>Detect Suspicious Form Submission with Serialized Data</code> Sigma rule.</li>
<li>Implement a Web Application Firewall (WAF) rule to block requests containing serialized PHP objects in form submission data.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>wordpress</category><category>php</category><category>object-injection</category><category>rce</category><category>cve-2026-3296</category></item><item><title>IBM Langflow Desktop Deserialization RCE (CVE-2026-3357)</title><link>https://feed.craftedsignal.io/briefs/2026-04-langflow-rce/</link><pubDate>Wed, 08 Apr 2026 01:16:41 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-langflow-rce/</guid><description>IBM Langflow Desktop versions 1.6.0 through 1.8.2 is vulnerable to arbitrary code execution due to insecure deserialization of untrusted data, allowing an authenticated user to execute code on the system.</description><content:encoded><![CDATA[<p>IBM Langflow Desktop, a low-code platform designed to build custom LLM applications, is susceptible to a critical vulnerability (CVE-2026-3357) affecting versions 1.6.0 through 1.8.2. The flaw stems from an insecure default setting within the FAISS (Facebook AI Similarity Search) component, which permits the deserialization of untrusted data. This vulnerability allows an authenticated user to execute arbitrary code on the host system. Successful exploitation grants the attacker full control over the Langflow Desktop instance and potentially the underlying system. Due to the ease of exploitation, especially for authenticated users, defenders must prioritize patching or mitigating this issue to prevent potential breaches.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An authenticated user logs into the vulnerable IBM Langflow Desktop application (versions 1.6.0 through 1.8.2).</li>
<li>The attacker crafts malicious serialized data designed to exploit the insecure deserialization vulnerability in the FAISS component.</li>
<li>The attacker injects the malicious serialized data into the Langflow application, potentially through a manipulated API request or a crafted workflow file.</li>
<li>Langflow Desktop processes the malicious data using the vulnerable FAISS component.</li>
<li>The FAISS component deserializes the untrusted data without proper validation.</li>
<li>During deserialization, the malicious payload is executed, leading to arbitrary code execution within the context of the Langflow Desktop application.</li>
<li>The attacker gains control of the Langflow Desktop application.</li>
<li>The attacker leverages the code execution to escalate privileges, install malware, or exfiltrate sensitive data from the affected system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-3357 allows an attacker to execute arbitrary code on the system running IBM Langflow Desktop. This could lead to complete system compromise, including data theft, malware installation, and denial of service. Given the low complexity and the ability to exploit it with authentication, this vulnerability poses a significant risk to organizations using the affected versions of Langflow Desktop. The impact is amplified if the Langflow Desktop instance has access to sensitive data or critical infrastructure.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade IBM Langflow Desktop to a patched version that addresses CVE-2026-3357. Refer to IBM&rsquo;s security advisory (<a href="https://www.ibm.com/support/pages/node/7268428">https://www.ibm.com/support/pages/node/7268428</a>) for specific upgrade instructions.</li>
<li>Implement input validation and sanitization measures to prevent the deserialization of untrusted data.</li>
<li>Monitor network traffic for suspicious activity related to Langflow Desktop, such as unexpected API calls or data transfers.</li>
<li>Enable logging for Langflow Desktop and related components, and analyze logs for signs of exploitation.</li>
<li>Deploy a web application firewall (WAF) with rules to detect and block attempts to exploit deserialization vulnerabilities in web applications.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-3357</category><category>deserialization</category><category>rce</category><category>langflow</category></item><item><title>NI LabVIEW Memory Corruption Vulnerability (CVE-2026-32862)</title><link>https://feed.craftedsignal.io/briefs/2026-04-ni-labview-rce/</link><pubDate>Tue, 07 Apr 2026 20:16:24 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-ni-labview-rce/</guid><description>A memory corruption vulnerability (CVE-2026-32862) in NI LabVIEW versions 2026 Q1 (26.1.0) and prior, stemming from an out-of-bounds write in ResFileFactory::InitResourceMgr(), can lead to information disclosure or arbitrary code execution if a user opens a malicious VI file.</description><content:encoded><![CDATA[<p>A critical memory corruption vulnerability, identified as CVE-2026-32862, exists within NI LabVIEW&rsquo;s ResFileFactory::InitResourceMgr() function. This out-of-bounds write vulnerability can be exploited to achieve both information disclosure and arbitrary code execution on affected systems. The attack vector involves enticing a user to open a specially crafted VI (Virtual Instrument) file within LabVIEW. Successful exploitation of this vulnerability could allow an attacker to compromise the confidentiality, integrity, and availability of the system. The scope of this vulnerability is limited to NI LabVIEW versions 2026 Q1 (26.1.0) and all prior versions. Defenders should prioritize applying the patch provided by National Instruments to mitigate the risk posed by this vulnerability.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker crafts a malicious LabVIEW VI file (.vi) containing a payload designed to trigger the out-of-bounds write in <code>ResFileFactory::InitResourceMgr()</code>.</li>
<li>The attacker delivers the malicious VI file to a target user, potentially through social engineering or other means.</li>
<li>The user opens the malicious VI file within a vulnerable version of NI LabVIEW (2026 Q1 (26.1.0) or prior).</li>
<li>LabVIEW attempts to parse the resource data within the VI file, leading to the execution of the <code>ResFileFactory::InitResourceMgr()</code> function.</li>
<li>The crafted payload triggers the out-of-bounds write vulnerability in <code>ResFileFactory::InitResourceMgr()</code>, corrupting memory.</li>
<li>Depending on the payload, this memory corruption can lead to either information disclosure (reading sensitive data from memory) or arbitrary code execution.</li>
<li>If the attacker achieves code execution, they can gain control of the LabVIEW process.</li>
<li>The attacker can then leverage the compromised LabVIEW process to perform further actions, such as installing malware, exfiltrating data, or disrupting system operations.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-32862 allows an attacker to achieve arbitrary code execution or information disclosure on systems running vulnerable versions of NI LabVIEW. The impact of this vulnerability is significant, as it can lead to complete system compromise, data theft, and disruption of critical processes controlled by LabVIEW. The vulnerability is especially concerning for organizations that rely on LabVIEW for critical infrastructure, manufacturing, and research applications.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the security patch provided by National Instruments to address CVE-2026-32862 in NI LabVIEW versions 2026 Q1 (26.1.0) and prior.</li>
<li>Deploy the Sigma rule <code>Detect Suspicious LabVIEW File Opening</code> to identify potential exploitation attempts by monitoring process creation events related to LabVIEW and VI file opening.</li>
<li>Educate users on the risks of opening VI files from untrusted sources to prevent social engineering attacks.</li>
<li>Enable process monitoring and logging (e.g., Sysmon) to capture detailed information about process execution and file access for forensic analysis.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-32862</category><category>ni-labview</category><category>memory-corruption</category><category>rce</category></item><item><title>ChurchCRM Pre-Authentication Remote Code Execution Vulnerability (CVE-2026-39337)</title><link>https://feed.craftedsignal.io/briefs/2026-04-churchcrm-rce/</link><pubDate>Tue, 07 Apr 2026 18:16:45 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-churchcrm-rce/</guid><description>A critical pre-authentication remote code execution vulnerability in ChurchCRM versions prior to 7.1.0 allows unauthenticated attackers to inject arbitrary PHP code during the initial installation process, leading to complete server compromise.</description><content:encoded><![CDATA[<p>ChurchCRM, an open-source church management system, is vulnerable to a critical pre-authentication remote code execution (RCE) flaw, identified as CVE-2026-39337. This vulnerability affects versions prior to 7.1.0. Unauthenticated attackers can exploit the setup wizard during the initial installation process to inject arbitrary PHP code, leading to complete server compromise. The root cause lies in the insufficient sanitization of the &ldquo;$dbPassword&rdquo; variable. This vulnerability is a result of an incomplete fix for a previous vulnerability, CVE-2025-62521. Organizations using vulnerable versions of ChurchCRM are at risk of unauthorized access, data breaches, and complete system takeover. Upgrading to version 7.1.0 or later is strongly advised to mitigate this risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker sends a malicious HTTP request to the ChurchCRM setup wizard.</li>
<li>The malicious request injects arbitrary PHP code into the <code>$dbPassword</code> variable during the setup process.</li>
<li>Due to insufficient sanitization, the injected PHP code is written to the ChurchCRM configuration file.</li>
<li>The attacker triggers the execution of the configuration file, executing the injected PHP code.</li>
<li>The attacker gains arbitrary code execution on the web server.</li>
<li>The attacker escalates privileges to gain full control of the server.</li>
<li>The attacker installs a persistent backdoor for continued access.</li>
<li>The attacker may then exfiltrate sensitive data or deploy ransomware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-39337 allows an unauthenticated attacker to achieve complete server compromise. This could result in the theft of sensitive church member data, modification or destruction of data, defacement of the ChurchCRM website, or use of the server as a platform for launching further attacks. Given the critical nature of the vulnerability and the ease of exploitation, organizations are at high risk. The number of potential victims is high considering the wide usage of this CRM.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately upgrade ChurchCRM to version 7.1.0 or later to patch CVE-2026-39337.</li>
<li>Monitor web server logs for suspicious activity related to the ChurchCRM setup wizard. Deploy a Sigma rule to detect suspicious POST requests to the install endpoint.</li>
<li>Implement strong input validation and sanitization for all user-supplied data, especially during the installation process.</li>
<li>Review and harden the web server configuration to prevent unauthorized code execution.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>rce</category><category>cve-2026-39337</category><category>churchcrm</category></item><item><title>ChurchCRM Path Traversal Vulnerability Leading to Remote Code Execution</title><link>https://feed.craftedsignal.io/briefs/2026-04-churchcrm-traversal/</link><pubDate>Tue, 07 Apr 2026 18:16:41 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-churchcrm-traversal/</guid><description>A path traversal vulnerability in ChurchCRM versions prior to 6.5.3 allows authenticated administrators to upload arbitrary files, leading to remote code execution by overwriting Apache .htaccess files.</description><content:encoded><![CDATA[<p>ChurchCRM, an open-source church management system, is vulnerable to a path traversal attack affecting versions prior to 6.5.3. This vulnerability resides in the backup restore functionality, specifically within <code>src/ChurchCRM/Backup/RestoreJob.php</code>. Authenticated administrators can exploit this flaw by manipulating the <code>$rawUploadedFile['name']</code> parameter, which lacks proper sanitization. This allows for the upload of arbitrary files with attacker-controlled names to the <code>/var/www/html/tmp_attach/ChurchCRMBackups/</code> directory. Successful exploitation leads to remote code execution via overwriting Apache&rsquo;s <code>.htaccess</code> configuration files, effectively compromising the web server. Organizations using vulnerable versions of ChurchCRM are at risk of unauthorized access and control of their systems.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An authenticated administrator logs into the ChurchCRM application.</li>
<li>The administrator navigates to the backup restore functionality.</li>
<li>The attacker crafts a malicious backup archive containing a crafted <code>.htaccess</code> file.</li>
<li>The attacker uploads the malicious backup archive via the restore functionality, exploiting the path traversal vulnerability in <code>src/ChurchCRM/Backup/RestoreJob.php</code>. The <code>$rawUploadedFile['name']</code> parameter is manipulated to control the file&rsquo;s destination.</li>
<li>The malicious <code>.htaccess</code> file is written to the web server&rsquo;s document root or a sensitive directory, such as <code>/var/www/html/</code>.</li>
<li>The overwritten <code>.htaccess</code> file modifies the Apache web server&rsquo;s configuration, potentially enabling PHP execution for arbitrary file types or redirecting requests to attacker-controlled scripts.</li>
<li>The attacker accesses a file (e.g., an image or text file) which is now parsed as PHP code due to the malicious <code>.htaccess</code> configuration.</li>
<li>The attacker executes arbitrary code on the server, gaining remote code execution.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows attackers to gain complete control of the ChurchCRM web server. This can lead to data breaches, defacement of the website, and the potential to use the compromised server as a launchpad for further attacks within the network. Given the sensitive nature of data often stored in ChurchCRM systems (e.g., personal contact information, financial records), the compromise can have severe consequences for both the organization and its members. While the exact number of vulnerable installations is unknown, the widespread use of ChurchCRM makes this a significant threat.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade ChurchCRM to version 6.5.3 or later to patch the vulnerability described in CVE-2026-35573.</li>
<li>Implement strict file upload validation and sanitization to prevent path traversal vulnerabilities in other web applications.</li>
<li>Monitor web server logs for suspicious file uploads to <code>/var/www/html/tmp_attach/ChurchCRMBackups/</code> directory, looking for unexpected file extensions using the &ldquo;ChurchCRM Suspicious File Upload&rdquo; Sigma rule.</li>
<li>Implement the &ldquo;ChurchCRM .htaccess File Creation&rdquo; Sigma rule to detect the creation of .htaccess files in web directories.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>path-traversal</category><category>rce</category><category>churchcrm</category></item><item><title>Windmill CE/EE SQL Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-windmill-sqli/</link><pubDate>Tue, 07 Apr 2026 17:16:27 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-windmill-sqli/</guid><description>Windmill CE/EE versions 1.276.0 through 1.603.2 are vulnerable to SQL injection in the folder ownership management, allowing authenticated attackers to inject SQL through the owner parameter, leading to sensitive data access, token forgery, and arbitrary code execution.</description><content:encoded><![CDATA[<p>Windmill CE and EE, versions 1.276.0 through 1.603.2, are susceptible to an SQL injection vulnerability (CVE-2026-23696) affecting the folder ownership management functionality. An authenticated attacker can exploit this flaw by injecting SQL code via the <code>owner</code> parameter. Successful exploitation allows the attacker to read sensitive information, including the JWT signing secret and administrative user identifiers. This access enables them to forge administrative tokens, ultimately leading to arbitrary code execution through the workflow execution endpoints. This vulnerability poses a significant risk to organizations using affected versions of Windmill, potentially leading to data breaches and system compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker authenticates to the Windmill CE/EE instance.</li>
<li>The attacker navigates to the folder ownership management section.</li>
<li>The attacker crafts a malicious HTTP request to modify folder ownership, injecting SQL code into the <code>owner</code> parameter.</li>
<li>The application fails to properly sanitize the input, passing the malicious SQL query to the database.</li>
<li>The SQL injection allows the attacker to extract sensitive information from the database, such as the JWT signing secret and administrative user credentials.</li>
<li>The attacker uses the extracted JWT signing secret to forge an administrative token.</li>
<li>The attacker leverages the forged administrative token to authenticate to the workflow execution endpoint.</li>
<li>The attacker executes arbitrary code on the server via the workflow execution endpoint, achieving remote code execution.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-23696 can lead to complete compromise of the Windmill CE/EE instance. An attacker can gain unauthorized access to sensitive data, including credentials and internal application secrets. They can also execute arbitrary code on the server, potentially leading to data breaches, system downtime, and further lateral movement within the network. This vulnerability affects all organizations using Windmill CE/EE versions 1.276.0 through 1.603.2, and can result in significant financial and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Windmill CE/EE to version 1.603.3 or later to patch CVE-2026-23696 as per the vendor&rsquo;s release notes (<a href="https://github.com/windmill-labs/windmill/releases/tag/v1.603.3">https://github.com/windmill-labs/windmill/releases/tag/v1.603.3</a>).</li>
<li>Deploy the Sigma rule <code>Detect Suspicious Windmill Folder Ownership Modification</code> to identify potential SQL injection attempts within HTTP requests to the folder ownership management endpoint.</li>
<li>Monitor web server logs for suspicious activity, such as SQL errors or unusual characters in the <code>owner</code> parameter of requests targeting the folder ownership management endpoint (webserver log source).</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>sql-injection</category><category>rce</category><category>windmill</category></item><item><title>Fortinet FortiClient EMS Unauthenticated Remote Code Execution via CVE-2026-35616</title><link>https://feed.craftedsignal.io/briefs/2026-04-forticlient-ems-rce/</link><pubDate>Tue, 07 Apr 2026 15:08:28 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-forticlient-ems-rce/</guid><description>A critical vulnerability, CVE-2026-35616, exists in Fortinet FortiClient EMS (Endpoint Management Server) allowing unauthenticated attackers to bypass API authentication and authorization checks to execute arbitrary code or commands, potentially leading to full compromise of the EMS infrastructure.</description><content:encoded><![CDATA[<p>A critical vulnerability, CVE-2026-35616, has been identified in Fortinet FortiClient EMS versions 7.4.5 through 7.4.6. This vulnerability allows unauthenticated attackers to bypass API authentication and authorization checks, enabling them to execute arbitrary code or commands on the EMS server. FortiClient EMS is a centralized platform used to deploy, configure, and monitor FortiClient agents across an organization, making it a high-value target. The vulnerability is being actively exploited in the wild. Successful exploitation can lead to full compromise of the EMS infrastructure, impacting all managed endpoints and potentially enabling lateral movement across enterprise networks. Defenders should prioritize patching and enhance monitoring capabilities.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable FortiClient EMS instance (versions 7.4.5 through 7.4.6) exposed on the network.</li>
<li>The attacker crafts a malicious HTTP/API request targeting the unauthenticated API interface of the FortiClient EMS.</li>
<li>The crafted request bypasses authentication and authorization checks due to improper access control (CWE-284).</li>
<li>The bypassed access controls allow the attacker to execute unauthorized code or commands on the EMS server.</li>
<li>The attacker obtains control of administrative functionality on the FortiClient EMS server.</li>
<li>The attacker manipulates or exfiltrates sensitive configuration and policy data stored on the EMS.</li>
<li>The attacker deploys malicious payloads to managed endpoints via the compromised EMS server.</li>
<li>The attacker uses the compromised EMS as a foothold for further network intrusion or lateral movement.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-35616 can lead to a full compromise of the FortiClient EMS infrastructure. This includes the ability to manipulate or exfiltrate sensitive configuration and policy data, corrupt or disable endpoint protections, disrupt endpoint management services, and deploy malicious payloads to managed endpoints. The vulnerability enables lateral movement across enterprise networks. The CCB has confirmed that this vulnerability has been exploited in the wild.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the latest Fortinet patch for FortiClient EMS to remediate CVE-2026-35616 immediately.</li>
<li>Upscale monitoring and detection capabilities to identify any related suspicious activity, ensuring a swift response in case of an intrusion as recommended by the CCB.</li>
<li>Deploy the Sigma rule detecting unauthorized API access to the FortiClient EMS webserver to your SIEM and tune for your environment.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">threat</category><category>fortinet</category><category>forticlient</category><category>ems</category><category>rce</category><category>cve-2026-35616</category></item><item><title>Weaver E-cology Unauthenticated RCE via Dubbo API Debug Endpoint</title><link>https://feed.craftedsignal.io/briefs/2024-01-weaver-rce/</link><pubDate>Tue, 07 Apr 2026 13:16:45 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-weaver-rce/</guid><description>Weaver E-cology 10.0 before 20260312 is vulnerable to unauthenticated remote code execution, allowing attackers to execute arbitrary commands by crafting a POST request to the /papi/esearch/data/devops/dubboApi/debug/method endpoint.</description><content:encoded><![CDATA[<p>Weaver (Fanwei) E-cology is susceptible to an unauthenticated remote code execution (RCE) vulnerability affecting version 10.0 prior to 20260312. The vulnerability exists in the <code>/papi/esearch/data/devops/dubboApi/debug/method</code> endpoint, stemming from exposed debug functionality. Exploitation allows unauthenticated attackers to execute arbitrary commands on the underlying system. The attack involves crafting malicious POST requests with attacker-controlled <code>interfaceName</code> and <code>methodName</code> parameters. Shadowserver Foundation observed initial exploitation attempts on 2026-03-31 (UTC). Due to the ease of exploitation and lack of authentication requirement, this vulnerability presents a significant risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable Weaver E-cology 10.0 instance running a version prior to 20260312.</li>
<li>Attacker crafts a malicious HTTP POST request targeting the <code>/papi/esearch/data/devops/dubboApi/debug/method</code> endpoint.</li>
<li>The POST request includes the <code>interfaceName</code> and <code>methodName</code> parameters, which are set to values designed to invoke command execution helpers.</li>
<li>The server processes the request without authentication due to the vulnerability.</li>
<li>The application invokes the specified <code>methodName</code> within the <code>interfaceName</code>, leading to the execution of attacker-controlled code.</li>
<li>The attacker-controlled code executes commands on the server, such as establishing a reverse shell.</li>
<li>The attacker gains remote access to the server.</li>
<li>The attacker pivots within the network, potentially leading to data exfiltration, system compromise, or deployment of ransomware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows attackers to execute arbitrary commands on the affected Weaver E-cology 10.0 server. This can lead to full system compromise, data exfiltration, and disruption of services. Given the critical nature of systems often managed by E-cology, this could have significant business impact, leading to financial losses, reputational damage, and legal liabilities. There is currently no public information on the number of victims or specific sectors targeted.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade all Weaver E-cology 10.0 installations to a version equal to or greater than 20260312 to patch CVE-2026-22679.</li>
<li>Deploy the Sigma rule &ldquo;Detect Weaver E-cology Dubbo API Exploitation Attempt&rdquo; to detect exploitation attempts targeting the vulnerable endpoint.</li>
<li>Monitor web server logs for POST requests to the <code>/papi/esearch/data/devops/dubboApi/debug/method</code> endpoint with suspicious <code>interfaceName</code> and <code>methodName</code> parameters (see logsource details in the Sigma rule).</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>weaver</category><category>e-cology</category><category>rce</category><category>unauthenticated</category><category>cve-2026-22679</category></item><item><title>Remote Code Execution Vulnerability in JP1/IT Desktop Management Products (CVE-2025-65115)</title><link>https://feed.craftedsignal.io/briefs/2026-04-jp1-rce/</link><pubDate>Tue, 07 Apr 2026 06:16:40 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-jp1-rce/</guid><description>CVE-2025-65115 is a remote code execution vulnerability affecting multiple versions of JP1/IT Desktop Management and related products on Windows, potentially allowing attackers to execute arbitrary code on vulnerable systems.</description><content:encoded><![CDATA[<p>CVE-2025-65115 is a critical remote code execution vulnerability present in a range of JP1/IT Desktop Management products running on Windows. This includes JP1/IT Desktop Management 2 - Manager, JP1/IT Desktop Management 2 - Operations Director, Job Management Partner 1/IT Desktop Management 2 - Manager, JP1/IT Desktop Management - Manager, Job Management Partner 1/IT Desktop Management - Manager, JP1/NETM/DM Manager, JP1/NETM/DM Client, Job Management Partner 1/Software Distribution Manager, and Job Management Partner 1/Software Distribution Client. The vulnerability impacts specific versions, with corrected versions identified as 13-50-02 and later for some products. Exploitation of this vulnerability could allow a remote attacker to execute arbitrary code on the affected system, leading to complete system compromise. Defenders should prioritize patching vulnerable versions immediately.</p>
<h2 id="attack-chain">Attack Chain</h2>
<p>While the specific exploitation method is not detailed, the following attack chain is inferred based on the nature of remote code execution vulnerabilities:</p>
<ol>
<li>The attacker identifies a vulnerable JP1/IT Desktop Management instance running on a Windows server.</li>
<li>The attacker crafts a malicious network request targeting a specific service or endpoint within the vulnerable application.</li>
<li>This request leverages a flaw in the application&rsquo;s handling of input data (e.g., buffer overflow, improper input validation).</li>
<li>The malicious request triggers the execution of attacker-controlled code within the context of the JP1/IT Desktop Management process.</li>
<li>The attacker&rsquo;s code gains initial access to the system, potentially with elevated privileges, depending on the service account the application is running under.</li>
<li>The attacker pivots within the compromised system, establishing persistence via techniques like creating scheduled tasks or modifying registry keys.</li>
<li>The attacker may then attempt lateral movement to other systems within the network, leveraging stolen credentials or other exploits.</li>
<li>The final objective could include data exfiltration, deployment of ransomware, or disruption of services.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2025-65115 can lead to complete compromise of the affected Windows server. This could result in data breaches, service disruption, and potential lateral movement to other systems within the network. Given the nature of JP1/IT Desktop Management products, which are often used to manage and distribute software across an organization, a successful attack could have a widespread impact, affecting many endpoints within the managed environment.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately patch all instances of JP1/IT Desktop Management products to the latest versions, specifically addressing the versions outlined in CVE-2025-65115.</li>
<li>Monitor network traffic for suspicious activity targeting JP1/IT Desktop Management servers (enable <code>network_connection</code> logging).</li>
<li>Deploy the Sigma rule &ldquo;Detect Suspicious JP1 ITDM Network Connection&rdquo; to identify potentially malicious network connections related to JP1/IT Desktop Management.</li>
<li>Enable process creation logging to detect potentially malicious processes spawned by the JP1/IT Desktop Management application (enable <code>process_creation</code> logging).</li>
<li>Deploy the Sigma rule &ldquo;Detect Suspicious Process Creation from JP1 ITDM&rdquo; to identify potentially malicious processes spawned by the JP1/IT Desktop Management application.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2025-65115</category><category>rce</category><category>jp1</category><category>windows</category></item><item><title>Ninja Forms File Upload Plugin Vulnerability Leads to RCE</title><link>https://feed.craftedsignal.io/briefs/2026-04-ninja-forms-rce/</link><pubDate>Tue, 07 Apr 2026 05:16:06 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-ninja-forms-rce/</guid><description>The Ninja Forms File Uploads plugin for WordPress is vulnerable to unauthenticated arbitrary file uploads due to missing file type validation, potentially leading to remote code execution.</description><content:encoded><![CDATA[<p>The Ninja Forms - File Uploads plugin for WordPress, specifically versions up to and including 3.3.26, contains an arbitrary file upload vulnerability (CVE-2026-0740). This flaw stems from a lack of proper file type validation within the <code>NF_FU_AJAX_Controllers_Uploads::handle_upload</code> function. An unauthenticated attacker can exploit this vulnerability to upload arbitrary files to the affected WordPress server. Successful exploitation could enable remote code execution, allowing the attacker to compromise the web server and potentially the underlying network. The vulnerability was partially addressed in version 3.3.25 and fully resolved in version 3.3.27. This vulnerability poses a significant risk to organizations using the vulnerable plugin, potentially leading to data breaches, website defacement, or complete system compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker sends a crafted HTTP POST request to the WordPress server targeting the <code>wp-admin/admin-ajax.php</code> endpoint.</li>
<li>The POST request includes a malicious file disguised as a legitimate file type, exploiting the missing file type validation in the <code>NF_FU_AJAX_Controllers_Uploads::handle_upload</code> function.</li>
<li>The <code>handle_upload</code> function processes the request without properly validating the file type, allowing the malicious file to be uploaded to the server.</li>
<li>The uploaded file is stored in the WordPress uploads directory, typically located within the <code>wp-content/uploads/ninja-forms-uploads/</code> directory.</li>
<li>The attacker crafts the malicious file (e.g., a PHP script) to execute arbitrary code on the server when accessed.</li>
<li>The attacker accesses the uploaded malicious file via a direct HTTP request to the file&rsquo;s location within the uploads directory.</li>
<li>The web server executes the malicious file (e.g., a PHP script), granting the attacker the ability to execute arbitrary commands on the server.</li>
<li>The attacker leverages the executed code to gain a persistent foothold on the server, install malware, or exfiltrate sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-0740 allows unauthenticated attackers to upload arbitrary files, potentially leading to remote code execution. This can result in complete compromise of the WordPress website, including data breaches, website defacement, and installation of backdoors. The impact is significant due to the widespread use of WordPress and the Ninja Forms plugin. Even a single successful attack can lead to substantial financial losses, reputational damage, and legal liabilities. Websites utilizing versions of the Ninja Forms File Uploads plugin prior to 3.3.27 are vulnerable.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the Ninja Forms File Uploads plugin to version 3.3.27 or later to fully patch CVE-2026-0740.</li>
<li>Implement web application firewall (WAF) rules to detect and block malicious file upload attempts targeting the <code>wp-admin/admin-ajax.php</code> endpoint.</li>
<li>Monitor web server access logs for suspicious requests to the <code>wp-content/uploads/ninja-forms-uploads/</code> directory.</li>
<li>Deploy the Sigma rule &ldquo;Detect Ninja Forms Arbitrary File Upload Attempt&rdquo; to identify potential exploitation attempts in web server logs.</li>
<li>Enforce strict file type validation on all file upload forms, even after upgrading the plugin, as a defense-in-depth measure.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>wordpress</category><category>file-upload</category><category>rce</category><category>CVE-2026-0740</category></item><item><title>AWS Research and Engineering Studio (RES) RCE via FileBrowser API Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-aws-res-rce/</link><pubDate>Mon, 06 Apr 2026 22:16:25 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-aws-res-rce/</guid><description>CVE-2026-5709 is a critical vulnerability in AWS Research and Engineering Studio (RES) versions 2024.10 through 2025.12.01, allowing remote authenticated attackers to execute arbitrary commands on the cluster-manager EC2 instance through the FileBrowser API.</description><content:encoded><![CDATA[<p>CVE-2026-5709 affects AWS Research and Engineering Studio (RES), a cloud-based platform for research and engineering workflows. The vulnerability resides in the FileBrowser API and is present in versions 2024.10 through 2025.12.01. An authenticated attacker can exploit this vulnerability by sending crafted input to the FileBrowser functionality, leading to arbitrary command execution on the underlying cluster-manager EC2 instance. This could allow attackers to gain complete control over the RES environment, potentially compromising sensitive data and disrupting critical research activities. AWS recommends that users upgrade to RES version 2026.03 or apply a mitigation patch.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains valid credentials for an AWS Research and Engineering Studio (RES) account.</li>
<li>The attacker authenticates to the RES environment.</li>
<li>The attacker crafts malicious input designed to exploit the unsanitized input vulnerability in the FileBrowser API.</li>
<li>The attacker sends the crafted input to the FileBrowser API endpoint.</li>
<li>The FileBrowser API processes the input without proper sanitization.</li>
<li>The unsanitized input is executed as an operating system command on the cluster-manager EC2 instance.</li>
<li>The attacker achieves arbitrary command execution, potentially installing malware, exfiltrating data, or creating new administrative accounts.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-5709 grants the attacker the ability to execute arbitrary commands on the cluster-manager EC2 instance within the AWS Research and Engineering Studio (RES) environment. This can lead to complete compromise of the RES environment, data theft, denial of service, and potential lateral movement to other AWS resources. Due to the nature of research environments, this vulnerability could expose highly sensitive data, intellectual property, and research findings. The impact is significant due to the potential for widespread damage and disruption of critical research activities.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately upgrade AWS Research and Engineering Studio (RES) to version 2026.03 or apply the recommended mitigation patch provided by AWS to remediate CVE-2026-5709.</li>
<li>Implement the Sigma rule &ldquo;Detect Suspicious FileBrowser API Requests&rdquo; to identify potential exploitation attempts targeting the FileBrowser API.</li>
<li>Monitor web server logs for suspicious activity related to the FileBrowser API endpoint, looking for unusual characters or command injection attempts.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-5709</category><category>rce</category><category>aws</category><category>res</category></item><item><title>Brave CMS Unrestricted File Upload Leads to Remote Code Execution</title><link>https://feed.craftedsignal.io/briefs/2026-04-brave-cms-rce/</link><pubDate>Mon, 06 Apr 2026 18:16:42 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-brave-cms-rce/</guid><description>Brave CMS versions prior to 2.0.6 contain an unrestricted file upload vulnerability within the CKEditor upload functionality in the ckupload method, allowing authenticated users to upload executable PHP scripts and achieve Remote Code Execution.</description><content:encoded><![CDATA[<p>Brave CMS, an open-source content management system, is vulnerable to an unrestricted file upload vulnerability (CVE-2026-35164) in versions prior to 2.0.6. The vulnerability resides within the CKEditor upload functionality, specifically in the <code>ckupload</code> method located in <code>app/Http/Controllers/Dashboard/CkEditorController.php</code>. The application fails to properly validate the types of uploaded files, relying solely on user-provided input. This lack of validation enables an authenticated user to upload malicious PHP scripts, leading to arbitrary code execution on the server. The vulnerability was reported on April 6, 2026, and is fixed in Brave CMS version 2.0.6. Organizations using affected versions of Brave CMS are at risk of complete system compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker authenticates to the Brave CMS application as a user with upload privileges.</li>
<li>The attacker navigates to a page or functionality within the CMS that utilizes the CKEditor for content creation or editing.</li>
<li>The attacker uses the CKEditor&rsquo;s upload functionality to upload a malicious PHP script disguised as a legitimate file type (e.g., image).</li>
<li>The <code>ckupload</code> method in <code>app/Http/Controllers/Dashboard/CkEditorController.php</code> processes the uploaded file without proper validation of the file type or content.</li>
<li>The malicious PHP script is stored on the server in a publicly accessible directory.</li>
<li>The attacker crafts a request to directly access the uploaded PHP script via its URL.</li>
<li>The web server executes the PHP script, granting the attacker the ability to run arbitrary commands on the server.</li>
<li>The attacker establishes persistence, installs a web shell, and performs lateral movement within the network, escalating privileges as needed to achieve their objectives.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to execute arbitrary PHP code on the affected Brave CMS server. This can lead to complete compromise of the CMS instance, including unauthorized access to sensitive data, modification of website content, and potential lateral movement to other systems on the network. The CVSS v3.1 base score for this vulnerability is 8.8, indicating a high severity level. Organizations running vulnerable versions of Brave CMS are at risk of data breaches, website defacement, and further exploitation of their infrastructure.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Brave CMS to version 2.0.6 or later to remediate the unrestricted file upload vulnerability (CVE-2026-35164).</li>
<li>Implement server-side file validation to prevent the upload of malicious files, regardless of file extension.</li>
<li>Monitor web server logs for suspicious activity related to file uploads and execution of PHP scripts.</li>
<li>Deploy the following Sigma rule to detect attempts to access potentially malicious PHP files in the web server&rsquo;s upload directories.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-35164</category><category>rce</category><category>file-upload</category><category>brave-cms</category><category>ckeditor</category><category>php</category><category>webserver</category></item><item><title>GLPI Template Injection RCE (CVE-2026-26026)</title><link>https://feed.craftedsignal.io/briefs/2026-04-glpi-rce/</link><pubDate>Mon, 06 Apr 2026 15:17:07 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-glpi-rce/</guid><description>GLPI versions 11.0.0 to before 11.0.6 are vulnerable to remote code execution (RCE) via template injection by an authenticated administrator, allowing for arbitrary code execution on the server.</description><content:encoded><![CDATA[<p>GLPI is a widely used open-source IT asset management software. A critical vulnerability, CVE-2026-26026, affects versions 11.0.0 to 11.0.5. This vulnerability stems from a template injection flaw that can be exploited by a logged-in administrator. Successful exploitation allows the administrator to achieve remote code execution (RCE) on the underlying server. The vulnerability was reported on April 6, 2026, and has been patched in version 11.0.6. Organizations using vulnerable versions of GLPI should upgrade immediately to prevent potential compromise. The high CVSS score (9.1) reflects the severity and potential impact of this vulnerability.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains administrative access to a vulnerable GLPI instance (versions 11.0.0 - 11.0.5).</li>
<li>The attacker navigates to a section of the GLPI interface that allows for template modification.</li>
<li>The attacker crafts a malicious template containing code injection payloads.</li>
<li>The attacker saves the modified template within the GLPI system.</li>
<li>The GLPI system processes the malicious template, executing the injected code.</li>
<li>The injected code allows the attacker to execute arbitrary commands on the server.</li>
<li>The attacker establishes a reverse shell to gain persistent access.</li>
<li>The attacker pivots to other systems or exfiltrates sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-26026 can lead to complete compromise of the GLPI server. This allows an attacker to gain unauthorized access to sensitive IT asset information, customer data, and potentially other systems on the network. The impact is significant, as it allows for data breaches, service disruption, and further lateral movement within the organization&rsquo;s infrastructure. Given GLPI&rsquo;s function in managing IT assets, this can result in widespread damage across the organization.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately upgrade GLPI to version 11.0.6 or later to patch CVE-2026-26026.</li>
<li>Review and audit GLPI administrator accounts for any suspicious activity or unauthorized access attempts.</li>
<li>Deploy the Sigma rule &ldquo;Detect GLPI Template Injection Attempts&rdquo; to detect exploitation attempts in web server logs.</li>
<li>Monitor web server logs for unusual POST requests to template management endpoints containing suspicious code constructs.</li>
<li>Investigate any alerts generated by the &ldquo;Detect GLPI Template Injection RCE&rdquo; rule in your SIEM.</li>
<li>Restrict network access to the GLPI server to only authorized personnel and systems.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-26026</category><category>template-injection</category><category>rce</category><category>glpi</category></item><item><title>VA MAX 8.3.4 Remote Code Execution via changeip.php (CVE-2019-25671)</title><link>https://feed.craftedsignal.io/briefs/2026-04-va-max-rce/</link><pubDate>Sun, 05 Apr 2026 21:16:44 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-va-max-rce/</guid><description>VA MAX 8.3.4 is vulnerable to remote code execution (CVE-2019-25671), allowing authenticated attackers to execute arbitrary commands by injecting shell metacharacters into the mtu_eth0 parameter via a POST request to changeip.php.</description><content:encoded><![CDATA[<p>VA MAX 8.3.4 is susceptible to a remote code execution (RCE) vulnerability identified as CVE-2019-25671. This vulnerability allows authenticated attackers to inject shell metacharacters into the <code>mtu_eth0</code> parameter, leading to arbitrary command execution. The attack vector involves sending crafted POST requests to the <code>changeip.php</code> endpoint. Successful exploitation grants the attacker the ability to execute commands as the <code>apache</code> user. This vulnerability poses a significant risk to organizations using the affected VA MAX version, as it can lead to complete system compromise. Given the ease of exploitation and the potential for significant impact, defenders need to prioritize detection and mitigation efforts.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker authenticates to the VA MAX 8.3.4 web interface using valid credentials.</li>
<li>Attacker crafts a malicious POST request targeting the <code>changeip.php</code> endpoint.</li>
<li>The POST request includes the <code>mtu_eth0</code> parameter containing shell metacharacters and the desired command for execution.</li>
<li>The <code>changeip.php</code> script processes the <code>mtu_eth0</code> parameter without proper sanitization or validation.</li>
<li>The injected shell metacharacters are interpreted by the system, leading to command execution.</li>
<li>The attacker-supplied command is executed with the privileges of the <code>apache</code> user.</li>
<li>The attacker gains control of the system, potentially installing malware, exfiltrating data, or performing other malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2019-25671 allows an attacker to execute arbitrary commands on the affected VA MAX 8.3.4 system. This can lead to complete system compromise, data theft, and disruption of services. If VA MAX manages critical infrastructure, this vulnerability could have significant real-world consequences. Given the publicly available exploit code, the risk of widespread exploitation is high.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for POST requests to <code>changeip.php</code> containing shell metacharacters in the <code>mtu_eth0</code> parameter using the provided Sigma rule.</li>
<li>Apply appropriate input validation and sanitization to the <code>mtu_eth0</code> parameter within the <code>changeip.php</code> script.</li>
<li>Consider upgrading to a patched version of VA MAX that addresses CVE-2019-25671.</li>
<li>Implement network segmentation to limit the potential impact of a compromised VA MAX system.</li>
<li>Review and enforce strong password policies to prevent unauthorized access to the VA MAX web interface.</li>
<li>Monitor for suspicious processes spawned by the <code>apache</code> user, which could indicate successful exploitation of the RCE vulnerability using the Sigma rule <code>Detect Suspicious Processes Spawned by Apache</code>.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>rce</category><category>cve-2019-25671</category><category>web-application</category></item><item><title>Budibase Command Injection Vulnerability in Bash Automation Step</title><link>https://feed.craftedsignal.io/briefs/2026-04-budibase-cmd-injection/</link><pubDate>Sat, 04 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-budibase-cmd-injection/</guid><description>A command injection vulnerability exists in Budibase's bash automation step due to insufficient sanitization, allowing attackers with automation modification access to inject arbitrary shell commands, leading to remote code execution.</description><content:encoded><![CDATA[<p>A command injection vulnerability has been identified in Budibase versions prior to 3.33.4, specifically within the bash automation step located in <code>packages/server/src/automations/steps/bash.ts</code>. This flaw allows an attacker with permissions to create or modify automation workflows to inject arbitrary shell commands. The vulnerability stems from the usage of <code>execSync</code> to execute user-supplied commands without adequate sanitization or validation. Input is processed through <code>processStringSync</code>, enabling template interpolation that can be exploited for command injection. Successful exploitation could lead to remote code execution, complete system compromise, data exfiltration, and lateral movement within the affected infrastructure. Defenders should prioritize patching or implementing mitigations to prevent exploitation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains access to the Budibase platform with the ability to create or modify automation workflows.</li>
<li>The attacker crafts a malicious payload containing shell commands embedded within template syntax (e.g., <code>$(rm -rf /)</code>, <code>; malicious-command</code>, <code>| malicious-command</code>).</li>
<li>The attacker injects the malicious payload into the <code>inputs.code</code> field of a bash automation step.</li>
<li>The <code>processStringSync</code> function processes the user-supplied input, interpolating the template syntax and generating a command string.</li>
<li>The <code>execSync</code> function executes the crafted command string without proper sanitization.</li>
<li>The injected shell commands execute on the server with the privileges of the Budibase application.</li>
<li>The attacker achieves remote code execution, potentially gaining control of the server.</li>
<li>The attacker can then perform actions such as data exfiltration, lateral movement, or system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability can lead to severe consequences, including remote code execution (RCE) on the Budibase server. This could result in complete system compromise, allowing attackers to steal sensitive data, modify system configurations, or use the compromised system as a pivot point for further attacks within the network. While the exact number of affected organizations is unknown, any Budibase instance running a version prior to 3.33.4 is potentially vulnerable.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately disable the bash automation step in production environments to prevent further exploitation.</li>
<li>Upgrade Budibase to version 3.33.4 or later, where this vulnerability is addressed.</li>
<li>Implement the command sanitization and validation techniques outlined in the provided example fix.</li>
<li>If upgrading is not immediately feasible, implement a whitelist of allowed commands to restrict the functionality of the bash automation step.</li>
<li>Enable and review Budibase application logs for any unusual or suspicious command execution patterns (reference: Overview section).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>command-injection</category><category>rce</category><category>budibase</category></item><item><title>pyLoad Arbitrary Code Execution via Malicious Session Deserialization</title><link>https://feed.craftedsignal.io/briefs/2026-04-pyload-rce/</link><pubDate>Sat, 04 Apr 2026 06:43:37 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-pyload-rce/</guid><description>pyLoad is vulnerable to arbitrary code execution via an unprotected `storage_folder` configuration option, allowing an attacker with `SETTINGS` and `ADD` permissions to write a malicious pickle payload to the Flask session store and execute arbitrary code upon subsequent HTTP requests.</description><content:encoded><![CDATA[<p>pyLoad, a download manager, is susceptible to arbitrary code execution due to an insecure configuration option related to the storage folder. This vulnerability arises from the incomplete fix for CVE-2026-33509. Specifically, the <code>storage_folder</code> option is not included in the <code>ADMIN_ONLY_OPTIONS</code> set, which allows users with <code>SETTINGS</code> and <code>ADD</code> permissions to modify it. By redirecting downloads to the Flask filesystem session store, an attacker can plant a malicious pickle payload as a predictable session file. Subsequently, any HTTP request containing the corresponding crafted session cookie will trigger the deserialization of the payload, resulting in arbitrary code execution. This issue affects pyLoad versions up to and including 0.5.0b3. The observed exploitation involves manipulating the download directory to write malicious files into the Flask session store, ultimately leading to code execution on the host.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains a non-admin user account with both <code>SETTINGS</code> and <code>ADD</code> permissions in pyLoad.</li>
<li>The attacker uses the <code>/api/set_config_value</code> endpoint to modify the <code>storage_folder</code> option, setting its value to the Flask session store directory: <code>/tmp/pyLoad/flask</code>. This bypasses existing path restrictions.</li>
<li>The attacker calculates the target session filename by computing the MD5 hash of the string &ldquo;session:ATTACKER_SESSION_ID&rdquo;.</li>
<li>The attacker hosts a malicious pickle payload (e.g., <code>92912f771df217fb6fbfded6705dd47c</code>) on a remote server.</li>
<li>The attacker uses the <code>/api/add_package</code> endpoint to add a download package. The download link points to the hosted malicious pickle payload on the attacker&rsquo;s server: <code>http://attacker.com/92912f771df217fb6fbfded6705dd47c</code>. The <code>dest</code> parameter specifies where to store the downloaded file.</li>
<li>pyLoad downloads the malicious pickle payload and saves it to the Flask session store directory, naming it according to the MD5 hash calculated earlier.</li>
<li>The attacker crafts an HTTP request to the pyLoad server, including a cookie named <code>pyload_session_{port}</code> with the value <code>ATTACKER_SESSION_ID</code>.  The port number is derived from the pyLoad configuration.</li>
<li>Upon receiving the request with the crafted cookie, Flask attempts to load the session data from the corresponding file. The <code>cachelib</code> library deserializes the malicious pickle payload using <code>pickle.load()</code>, triggering arbitrary code execution.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows a non-admin user with SETTINGS and ADD permissions to achieve arbitrary code execution as the pyload service user. This grants the attacker the ability to execute arbitrary commands, read environment variables (potentially exposing API keys and credentials), access the filesystem (including download history and user databases), and potentially pivot to other network resources. The vulnerability requires no authentication to trigger the final stage of exploitation, increasing its severity and potential impact.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the following Sigma rule to detect attempts to modify the <code>storage_folder</code> configuration option to point to the Flask session directory (<code>/tmp/pyLoad/flask</code>): <code>Suspicious pyLoad Storage Folder Modification</code>.</li>
<li>Apply the suggested fix by adding <code>storage_folder</code> to the <code>ADMIN_ONLY_OPTIONS</code> set in the pyLoad configuration to prevent non-admin users from modifying it.</li>
<li>Block the malicious URLs used to deliver the pickle payload, specifically <code>http://attacker.com/92912f771df217fb6fbfded6705dd47c</code>, at your network perimeter.</li>
<li>Monitor for HTTP requests containing the crafted session cookie (<code>pyload_session_{port}=ATTACKER_SESSION_ID</code>), using a webserver or proxy log source, as it triggers the final stage of the attack.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>pyLoad</category><category>rce</category><category>pickle</category><category>deserialization</category><category>webserver</category></item><item><title>Budibase Unauthenticated Remote Code Execution via Webhook</title><link>https://feed.craftedsignal.io/briefs/2026-04-budibase-rce/</link><pubDate>Fri, 03 Apr 2026 16:16:41 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-budibase-rce/</guid><description>Budibase versions before 3.33.4 are susceptible to unauthenticated remote code execution, where a threat actor can trigger a Bash step within an automation via the public webhook endpoint, leading to code execution as root within the container.</description><content:encoded><![CDATA[<p>Budibase, an open-source low-code platform, is vulnerable to remote code execution (RCE) in versions prior to 3.33.4. This vulnerability, identified as CVE-2026-35216, allows an unauthenticated attacker to execute arbitrary commands on the Budibase server. The attack involves leveraging the public webhook endpoint to trigger an automation containing a Bash step. Due to the lack of authentication, malicious actors can directly interact with the webhook to initiate the execution. The process runs as root within the container, increasing the severity of the impact. Budibase patched this vulnerability in version 3.33.4. Defenders must upgrade to the latest version to mitigate this threat.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a Budibase instance running a version prior to 3.33.4.</li>
<li>The attacker locates a public webhook endpoint exposed by the Budibase instance.</li>
<li>The attacker crafts a malicious HTTP request targeting the webhook endpoint.</li>
<li>The crafted request triggers a pre-configured automation within Budibase.</li>
<li>The automation contains a Bash step that executes attacker-controlled commands.</li>
<li>The Bash script executes as root within the container.</li>
<li>The attacker gains control of the Budibase server.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-35216 allows an unauthenticated attacker to achieve remote code execution (RCE) on the affected Budibase server. Since the process executes as root within the container, the attacker gains complete control over the Budibase instance. This can lead to data breaches, service disruption, or further lateral movement within the network. Organizations using vulnerable Budibase versions are at high risk of compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Budibase to version 3.33.4 or later to patch CVE-2026-35216.</li>
<li>Monitor web server logs for suspicious POST requests to webhook endpoints associated with Budibase to detect exploitation attempts.</li>
<li>Deploy the Sigma rule provided to detect the execution of bash commands in automations triggered by webhooks.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>CVE-2026-35216</category><category>budibase</category><category>rce</category><category>webhook</category></item><item><title>Endian Firewall Command Injection Vulnerability (CVE-2026-34791)</title><link>https://feed.craftedsignal.io/briefs/2026-04-endian-firewall-rce/</link><pubDate>Thu, 02 Apr 2026 15:16:42 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-endian-firewall-rce/</guid><description>Endian Firewall version 3.3.25 and prior allows authenticated users to execute arbitrary OS commands due to an OS command injection vulnerability in the DATE parameter of the /cgi-bin/logs_proxy.cgi endpoint.</description><content:encoded><![CDATA[<p>Endian Firewall version 3.3.25 and prior is susceptible to OS command injection. This vulnerability, identified as CVE-2026-34791, allows authenticated users to execute arbitrary operating system commands. The vulnerability exists due to insufficient validation of the DATE parameter in the <code>/cgi-bin/logs_proxy.cgi</code> script. The DATE parameter&rsquo;s value is used to construct a file path that is subsequently passed to a Perl <code>open()</code> call. Due to an incomplete regular expression validation, an attacker can inject malicious commands. Successful exploitation allows the attacker to gain complete control of the affected system.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An authenticated user accesses the <code>/cgi-bin/logs_proxy.cgi</code> endpoint.</li>
<li>The attacker crafts a malicious <code>DATE</code> parameter containing OS commands to be injected.</li>
<li>The <code>/cgi-bin/logs_proxy.cgi</code> script receives the <code>DATE</code> parameter.</li>
<li>The script constructs a file path using the unvalidated <code>DATE</code> parameter.</li>
<li>The script passes the crafted file path to a Perl <code>open()</code> call.</li>
<li>The Perl <code>open()</code> function executes the injected OS commands due to the incomplete regular expression validation.</li>
<li>The attacker gains arbitrary code execution on the system.</li>
<li>The attacker can then perform actions such as installing malware, creating user accounts, or exfiltrating sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to execute arbitrary OS commands on the affected Endian Firewall system. This can lead to complete system compromise, including data theft, service disruption, and the potential to use the compromised system as a launchpad for further attacks within the network. Given that firewalls are critical security components, a compromise could have severe consequences for the entire network infrastructure, leading to widespread data breaches and significant financial losses.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply available patches or upgrade to a supported version of Endian Firewall that addresses CVE-2026-34791 (refer to Endian Firewall&rsquo;s advisory).</li>
<li>Implement the Sigma rule <code>Detect Suspicious Logs Proxy Date Parameter</code> to detect potential exploitation attempts.</li>
<li>Monitor web server logs for suspicious requests to <code>/cgi-bin/logs_proxy.cgi</code> containing unusual characters or command-like syntax in the <code>DATE</code> parameter.</li>
<li>Implement strong input validation and sanitization for all user-supplied input to prevent command injection attacks.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>command-injection</category><category>rce</category><category>vulnerability</category></item><item><title>ShareFile Storage Zones Controller Unauthenticated Remote Code Execution via File Upload (CVE-2026-2701)</title><link>https://feed.craftedsignal.io/briefs/2026-04-sharefile-rce/</link><pubDate>Thu, 02 Apr 2026 14:16:27 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-sharefile-rce/</guid><description>Authenticated users can upload malicious files to a ShareFile Storage Zones Controller server and execute them, leading to remote code execution, due to improper neutralization of special elements, code generation, and unrestricted file upload.</description><content:encoded><![CDATA[<p>CVE-2026-2701 is a critical vulnerability affecting ShareFile Storage Zones Controller, allowing authenticated users to upload and execute malicious files on the server, resulting in remote code execution. The vulnerability stems from inadequate input validation and insufficient restrictions on file types during upload. Successful exploitation enables attackers to execute arbitrary code on the affected system, potentially leading to complete system compromise. While the specific versions affected are not explicitly stated in the source, the vulnerability was reported in conjunction with a security vulnerability advisory published in February 2026. Defenders should prioritize patching and implementing mitigations to prevent potential exploitation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An authenticated user logs into the ShareFile Storage Zones Controller.</li>
<li>The user navigates to the file upload functionality within the application.</li>
<li>The attacker uploads a specially crafted malicious file (e.g., a web shell or executable).</li>
<li>The application fails to properly validate the file type or content, allowing the malicious file to be stored on the server.</li>
<li>The attacker crafts a request to execute the uploaded malicious file. This may involve leveraging OS command injection (CWE-78) or code injection (CWE-94) vulnerabilities.</li>
<li>The server executes the malicious file, granting the attacker arbitrary code execution.</li>
<li>The attacker uses the gained access to move laterally, install backdoors, or exfiltrate sensitive data.</li>
<li>The attacker achieves complete control over the compromised server and potentially the entire ShareFile environment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-2701 allows attackers to execute arbitrary code on the affected ShareFile Storage Zones Controller server. This can lead to a complete compromise of the server, data exfiltration, and potential lateral movement within the network. While the exact number of victims is unknown, any organization using vulnerable versions of ShareFile Storage Zones Controller is at risk. Given the nature of ShareFile, this could expose sensitive data belonging to customers and partners.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the security patch referenced in the Progress Software Corporation advisory (<a href="https://docs.sharefile.com/en-us/storage-zones-controller/5-0/security-vulnerability-feb26">https://docs.sharefile.com/en-us/storage-zones-controller/5-0/security-vulnerability-feb26</a>) to remediate CVE-2026-2701.</li>
<li>Implement strict file type validation and sanitization on all file upload functionalities within the ShareFile Storage Zones Controller.</li>
<li>Deploy the Sigma rules provided in this brief to your SIEM to detect potential exploitation attempts.</li>
<li>Monitor web server logs for suspicious file upload activity or attempts to execute unusual file types using the provided Sigma rule targeting webserver logs.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>rce</category><category>file-upload</category><category>sharefile</category></item><item><title>ShareFile Storage Zones Controller Unauthenticated Configuration Access and Potential RCE (CVE-2026-2699)</title><link>https://feed.craftedsignal.io/briefs/2026-04-sharefile-szc-rce/</link><pubDate>Thu, 02 Apr 2026 14:16:27 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-sharefile-szc-rce/</guid><description>An unauthenticated attacker can access restricted configuration pages in Customer Managed ShareFile Storage Zones Controller (SZC), leading to system configuration changes and potential remote code execution.</description><content:encoded><![CDATA[<p>CVE-2026-2699 affects Customer Managed ShareFile Storage Zones Controller (SZC) versions prior to the fix. The vulnerability allows an unauthenticated attacker to bypass access controls and directly access restricted configuration pages. This unauthorized access can lead to malicious actors changing system settings, potentially installing backdoors, or executing arbitrary code remotely. The vulnerability was reported to Progress Software Corporation and assigned a CVSS v3.1 base score of 9.8, categorizing it as critical. Successful exploitation of this vulnerability could have significant consequences for organizations using the affected ShareFile SZC, as it could compromise sensitive data and system integrity. Defenders should prioritize patching and detection efforts to mitigate this risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable ShareFile Storage Zones Controller (SZC) instance.</li>
<li>The attacker crafts a malicious HTTP request targeting a restricted configuration page, bypassing authentication checks.</li>
<li>The SZC processes the request without proper authorization, granting access to the restricted page.</li>
<li>The attacker modifies critical system configurations, potentially including settings related to file storage, authentication, or update mechanisms.</li>
<li>The attacker leverages the modified configurations to upload a malicious file to the SZC.</li>
<li>The uploaded file, potentially a script or executable, is then executed by the SZC.</li>
<li>The attacker achieves remote code execution, gaining control over the SZC server.</li>
<li>The attacker uses the compromised SZC to access sensitive data or pivot to other systems within the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-2699 can result in complete compromise of the ShareFile Storage Zones Controller (SZC) instance. This can lead to unauthorized access to sensitive data stored within the ShareFile environment. Attackers can also use the compromised SZC as a pivot point to access other internal systems. The affected sectors could include any organization using the vulnerable ShareFile SZC setup, potentially leading to widespread data breaches and operational disruption. Given the CVSS score of 9.8, the impact is considered critical.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately patch all Customer Managed ShareFile Storage Zones Controller (SZC) instances to the latest version as recommended in the Progress Software Corporation advisory referenced in the documentation URL within the IOCs section.</li>
<li>Deploy the Sigma rule to detect unauthorized access attempts to restricted configuration pages on ShareFile SZC servers, monitoring webserver logs for suspicious activity.</li>
<li>Review network traffic for unusual outbound connections from ShareFile SZC servers after the patch, looking for signs of potential compromise, based on network connection logs.</li>
<li>Monitor ShareFile SZC server logs for any unauthorized configuration changes based on file event logs after patching.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>sharefile</category><category>storage-zones-controller</category><category>rce</category><category>cve-2026-2699</category></item><item><title>CVE-2026-33613: Remote Code Execution in generateSrpArray Function</title><link>https://feed.craftedsignal.io/briefs/2026-04-cve-2026-33613/</link><pubDate>Thu, 02 Apr 2026 10:16:15 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-cve-2026-33613/</guid><description>CVE-2026-33613 describes a remote code execution (RCE) vulnerability due to improper neutralization of special elements used in an OS command in the generateSrpArray function, leading to full system compromise, but requires a separate method for writing arbitrary data to the user table.</description><content:encoded><![CDATA[<p>CVE-2026-33613 is a remote code execution (RCE) vulnerability affecting the <code>generateSrpArray</code> function due to improper neutralization of special elements used in an OS command. Successful exploitation allows a remote attacker to achieve full system compromise. This vulnerability is triggered by writing arbitrary data to the user table, representing a significant security risk if combined with other vulnerabilities that enable such data manipulation. The vulnerability was published on April 2, 2026, and reported by CERT VDE. Defenders should prioritize investigating any suspicious activity related to user table modifications and monitor for unexpected command execution originating from the <code>generateSrpArray</code> function. The CVSS v3.1 score is 7.2, indicating a high severity.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial access through an external vulnerability or compromised credentials.</li>
<li>Attacker leverages this access to inject arbitrary data into the user table.</li>
<li>The system processes the malicious data in the user table through the <code>generateSrpArray</code> function.</li>
<li>Due to improper neutralization of special elements, the injected data is interpreted as an OS command.</li>
<li>The <code>generateSrpArray</code> function executes the attacker-controlled OS command.</li>
<li>The attacker gains remote code execution with the privileges of the <code>generateSrpArray</code> function.</li>
<li>The attacker escalates privileges to gain full system control.</li>
<li>The attacker performs malicious activities, such as data exfiltration, installing backdoors, or causing denial of service.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-33613 leads to complete system compromise, granting the attacker full control over the affected system. This can result in data breaches, service disruption, and significant financial losses. While the number of potential victims and targeted sectors are currently unknown, any system utilizing the vulnerable <code>generateSrpArray</code> function is at risk. Given the high CVSS score (7.2), organizations should prioritize patching and mitigation efforts.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor for unusual writes or modifications to the user table using file integrity monitoring or database auditing, to identify potential exploitation attempts (file_event, registry_set).</li>
<li>Implement input validation and sanitization for any data processed by the <code>generateSrpArray</code> function to prevent OS command injection (webserver, linux/windows).</li>
<li>Deploy the provided Sigma rules to detect potential exploitation attempts and post-exploitation activity (process_creation).</li>
<li>Investigate any processes spawned by the <code>generateSrpArray</code> function, especially those with unusual command-line arguments, using endpoint detection and response (EDR) solutions.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-33613</category><category>rce</category><category>command-injection</category></item><item><title>MW WP Form WordPress Plugin Arbitrary File Move Vulnerability (CVE-2026-4347)</title><link>https://feed.craftedsignal.io/briefs/2026-04-mw-wp-form-file-move/</link><pubDate>Thu, 02 Apr 2026 06:16:23 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-mw-wp-form-file-move/</guid><description>The MW WP Form plugin for WordPress is vulnerable to arbitrary file moving due to insufficient file path validation, allowing unauthenticated attackers to move arbitrary files on the server, potentially leading to remote code execution.</description><content:encoded><![CDATA[<p>The MW WP Form plugin for WordPress is susceptible to an arbitrary file moving vulnerability identified as CVE-2026-4347. This flaw stems from a lack of proper file path validation within the &lsquo;generate_user_filepath&rsquo; and &lsquo;move_temp_file_to_upload_dir&rsquo; functions. All versions of the plugin up to and including 5.1.0 are affected. An unauthenticated attacker can exploit this vulnerability to move arbitrary files on the server, potentially overwriting or relocating critical system files. The most severe outcome is remote code execution, which can be achieved by moving files such as &lsquo;wp-config.php&rsquo; to a location where its contents are exposed. The vulnerability is only exploitable when a file upload field exists on a form and the “Saving inquiry data in database” option is enabled, narrowing the attack surface but increasing the risk for affected installations.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a WordPress site using a vulnerable version of the MW WP Form plugin (&lt;= 5.1.0) with a file upload field enabled and the &ldquo;Saving inquiry data in database&rdquo; option turned on.</li>
<li>The attacker crafts a malicious request to the WordPress site, targeting the file upload functionality of the MW WP Form plugin.</li>
<li>The attacker manipulates the file path within the request, exploiting the insufficient validation in the &lsquo;generate_user_filepath&rsquo; function to specify a target file for movement.</li>
<li>The &lsquo;move_temp_file_to_upload_dir&rsquo; function is triggered, attempting to move the uploaded file to the attacker-controlled path.</li>
<li>Due to the lack of proper validation, the targeted file (e.g., wp-config.php) is successfully moved to a new location on the server.</li>
<li>If wp-config.php is moved to a publicly accessible directory, the database credentials and other sensitive information become exposed.</li>
<li>The attacker retrieves the exposed wp-config.php file, extracting database credentials and other sensitive information.</li>
<li>Using the obtained database credentials, the attacker gains unauthorized access to the WordPress database, potentially leading to remote code execution or complete site compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-4347 allows unauthenticated attackers to move arbitrary files within the WordPress server&rsquo;s file system. This can lead to the exposure of sensitive configuration files like &lsquo;wp-config.php&rsquo;, leading to full database and site compromise. While the number of affected installations is currently unknown, a successful attack can have devastating consequences, including data theft, website defacement, and remote code execution. The impact is limited to sites using the vulnerable MW WP Form plugin with specific configuration settings enabled.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the MW WP Form plugin to the latest version (greater than 5.1.0) to patch CVE-2026-4347.</li>
<li>As a preventative measure, implement file integrity monitoring on critical files like &lsquo;wp-config.php&rsquo; to detect unauthorized modifications or movement. Use file_event logs to trigger alerts.</li>
<li>Deploy the Sigma rule &ldquo;Detect MW WP Form Arbitrary File Move Attempt&rdquo; to identify potential exploitation attempts in web server logs.</li>
<li>Review WordPress access logs for suspicious file upload requests, focusing on requests to the MW WP Form plugin&rsquo;s upload handler.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>wordpress</category><category>file-move</category><category>rce</category></item><item><title>IBM Verify Identity Access and Security Verify Access Command Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-ibm-verify-rce/</link><pubDate>Wed, 01 Apr 2026 21:16:58 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-ibm-verify-rce/</guid><description>Unauthenticated command execution is possible in IBM Verify Identity Access Container and IBM Security Verify Access Container due to improper validation of user-supplied input, allowing arbitrary command execution with lower privileges.</description><content:encoded><![CDATA[<p>IBM Verify Identity Access Container versions 11.0 through 11.0.2 and IBM Security Verify Access Container versions 10.0 through 10.0.9.1, as well as IBM Verify Identity Access 11.0 through 11.0.2 and IBM Security Verify Access 10.0 through 10.0.9.1, are vulnerable to command injection. An unauthenticated attacker can exploit this vulnerability (CVE-2026-1345) to execute arbitrary commands with lower user privileges due to insufficient input validation. This poses a significant risk as it could lead to unauthorized access, data breaches, or system compromise if successfully exploited. Defenders need to ensure systems are patched and monitor for suspicious activity.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker sends a malicious request to the vulnerable IBM Verify or Security Verify Access server.</li>
<li>The request contains crafted input designed to exploit the command injection vulnerability.</li>
<li>The server fails to properly validate the user-supplied input.</li>
<li>The malicious input is passed to an operating system command.</li>
<li>The server executes the attacker-controlled command with the privileges of the compromised user (lower user privileges).</li>
<li>The attacker gains unauthorized access to the system.</li>
<li>The attacker can then potentially escalate privileges, move laterally, or exfiltrate sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability (CVE-2026-1345) allows an unauthenticated attacker to execute arbitrary commands on the affected system with lower user privileges. While the attacker does not gain root access directly, this vulnerability can be used as a stepping stone to further compromise the system, potentially leading to data breaches, service disruption, or complete system takeover. The lack of initial authentication makes it easily exploitable.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the security patch provided by IBM as detailed in their advisory to remediate CVE-2026-1345 (<a href="https://www.ibm.com/support/pages/node/7268253)">https://www.ibm.com/support/pages/node/7268253)</a>.</li>
<li>Implement input validation and sanitization measures on all user-supplied input to prevent command injection attacks.</li>
<li>Monitor web server logs for suspicious requests and patterns that indicate command injection attempts, creating correlation rules using webserver logs.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>command-injection</category><category>rce</category><category>cve-2026-1345</category></item><item><title>Cisco Smart Software Manager On-Prem RCE via Exposed API (CVE-2026-20160)</title><link>https://feed.craftedsignal.io/briefs/2024-02-cisco-ssm-rce/</link><pubDate>Wed, 01 Apr 2026 17:28:31 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-02-cisco-ssm-rce/</guid><description>CVE-2026-20160 is a critical vulnerability in Cisco Smart Software Manager On-Prem (SSM On-Prem) that allows an unauthenticated, remote attacker to execute arbitrary commands on the underlying operating system with root privileges by sending a crafted request to an exposed API.</description><content:encoded><![CDATA[<p>CVE-2026-20160 affects Cisco Smart Software Manager On-Prem (SSM On-Prem). The vulnerability allows an unauthenticated, remote attacker to execute arbitrary commands on the underlying operating system of an affected SSM On-Prem host. This is due to the unintentional exposure of an internal service. The vulnerability was reported in April 2026. Successful exploitation allows for command execution with root-level privileges, making it a critical risk for organizations using the affected Cisco SSM On-Prem software. Defenders should apply available patches or mitigations immediately.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies an internet-facing Cisco Smart Software Manager On-Prem (SSM On-Prem) instance.</li>
<li>The attacker discovers the unintentionally exposed internal service through reconnaissance techniques such as port scanning and service enumeration.</li>
<li>The attacker crafts a malicious request specifically designed to exploit the exposed API endpoint of the internal service.</li>
<li>The attacker sends the crafted request to the vulnerable API endpoint of the exposed service.</li>
<li>The vulnerable SSM On-Prem software processes the malicious request without proper authentication or authorization checks.</li>
<li>The software executes arbitrary commands on the underlying operating system due to the exposed API.</li>
<li>The attacker gains root-level privileges on the SSM On-Prem host, allowing for full control of the system.</li>
<li>The attacker can then perform further malicious activities, such as data exfiltration, lateral movement, or installation of persistent backdoors.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-20160 allows an attacker to execute arbitrary commands on the underlying operating system with root-level privileges. This could lead to complete compromise of the affected SSM On-Prem host. The attacker could exfiltrate sensitive data, disrupt services, or use the compromised system as a launchpad for further attacks within the network. Given the critical nature of software license management performed by SSM On-Prem, a successful attack could have significant operational and financial consequences.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the security patch released by Cisco to address CVE-2026-20160 on all affected Cisco Smart Software Manager On-Prem (SSM On-Prem) instances.</li>
<li>Monitor web server logs for unusual API requests targeting Cisco Smart Software Manager On-Prem instances to detect potential exploitation attempts, using the &ldquo;Detect Cisco SSM On-Prem API Exploitation Attempt&rdquo; Sigma rule.</li>
<li>Implement network segmentation to limit the exposure of internal services and prevent unauthorized access from external networks.</li>
<li>Review access controls and authentication mechanisms for all internal services to ensure proper security configurations and prevent unintentional exposure.</li>
<li>Deploy the &ldquo;Detect Cisco SSM On-Prem Root Command Execution&rdquo; Sigma rule to detect suspicious process execution originating from the SSM On-Prem server.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-20160</category><category>cisco</category><category>ssm-on-prem</category><category>rce</category><category>webserver</category></item><item><title>Potential JAVA/JNDI Exploitation Attempt</title><link>https://feed.craftedsignal.io/briefs/2026-06-java-jndi-exploitation/</link><pubDate>Wed, 01 Apr 2026 14:24:53 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-06-java-jndi-exploitation/</guid><description>This rule detects a potential JAVA/JNDI exploitation attempt by identifying outbound network connections by JAVA to LDAP, RMI, or DNS standard ports followed by suspicious JAVA child processes such as shell interpreters and scripting languages, which may indicate a Java Naming and Directory Interface (JNDI) injection vulnerability exploitation attempt.</description><content:encoded><![CDATA[<p>This detection rule identifies potential exploitation attempts targeting Java Naming and Directory Interface (JNDI) vulnerabilities. These vulnerabilities, exemplified by CVE-2021-45046, allow attackers to perform remote code execution by injecting malicious payloads through directory services like LDAP. The rule focuses on detecting suspicious outbound network connections from Java processes to standard ports associated with LDAP (389, 1389), RMI (1099), and DNS (53, 5353), followed by the execution of suspicious child processes indicative of command execution such as shell interpreters (sh, bash, zsh) or scripting languages (python, perl). The rule aims to identify exploitation attempts similar to those seen with Log4Shell and related vulnerabilities, which have been actively exploited since late 2021. It covers Linux and macOS environments and provides a mechanism to detect ongoing exploitation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A vulnerable Java application receives malicious input containing a JNDI lookup string.</li>
<li>The Java application attempts to resolve the JNDI name, initiating an outbound network connection to an LDAP, RMI, or DNS server on ports 389, 1389, 1099, 53, or 5353.</li>
<li>The malicious LDAP/RMI/DNS server, controlled by the attacker, responds with a payload referencing a malicious Java class or remote code.</li>
<li>The Java application loads and executes the malicious code.</li>
<li>As a result of the executed code, a shell interpreter (sh, bash, zsh, etc.) or scripting language (python, perl, ruby, php, wget) is spawned as a child process of the Java application.</li>
<li>The spawned shell/script executes attacker-controlled commands for reconnaissance, privilege escalation, or lateral movement.</li>
<li>The attacker gains a foothold on the system.</li>
<li>The attacker performs actions such as data exfiltration or deploying malware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of JNDI vulnerabilities can lead to remote code execution, allowing attackers to gain complete control over affected systems. This can result in data breaches, system compromise, and further propagation of attacks within the network. The impact can range from service disruption to complete system takeover. Public exploits for vulnerabilities such as Log4Shell have been widely available, leading to widespread scanning and exploitation attempts across various industries.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Potential JAVA/JNDI Exploitation Attempt&rdquo; to your SIEM to detect suspicious Java processes initiating network connections to LDAP, RMI, or DNS ports followed by suspicious child processes.</li>
<li>Enable process creation and network connection logging on Linux and macOS endpoints to provide the necessary data for the Sigma rules to function correctly.</li>
<li>Review and whitelist legitimate Java applications that may trigger false positives due to legitimate network connections (see the &ldquo;False positive analysis&rdquo; section in the original rule&rsquo;s <code>note</code> field).</li>
<li>Implement network segmentation to limit the impact of successful exploitation by restricting lateral movement.</li>
<li>Patch vulnerable Java applications and libraries, such as Log4j, to prevent exploitation of known vulnerabilities like CVE-2021-45046.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>jndi</category><category>java</category><category>log4shell</category><category>rce</category><category>exploitation</category></item><item><title>F5 BIG-IP APM CVE-2025-53521 Reclassified as Actively Exploited Unauthenticated RCE</title><link>https://feed.craftedsignal.io/briefs/2026-04-f5-big-ip-rce/</link><pubDate>Wed, 01 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-f5-big-ip-rce/</guid><description>F5 has reclassified CVE-2025-53521, a vulnerability in BIG-IP APM, as a critical unauthenticated remote code execution vulnerability and reports it is being actively exploited in the wild.</description><content:encoded><![CDATA[<p>On March 28, 2026, F5 issued a revised security advisory regarding CVE-2025-53521, a vulnerability affecting BIG-IP APM. Initially disclosed in October 2025 and categorized as a medium-severity denial-of-service (DoS) issue, it has been reclassified as a critical remote code execution (RCE) vulnerability. F5 has confirmed that CVE-2025-53521 is now being actively exploited by unauthenticated attackers. The updated classification significantly elevates the risk associated with this vulnerability, necessitating immediate action from organizations utilizing affected BIG-IP APM instances to prevent potential system compromise and unauthorized access.</p>
<h2 id="attack-chain">Attack Chain</h2>
<p>Given the nature of an unauthenticated RCE vulnerability, the following attack chain is likely:</p>
<ol>
<li><strong>Initial Access:</strong> An unauthenticated attacker sends a specially crafted HTTP request to a vulnerable BIG-IP APM endpoint.</li>
<li><strong>Vulnerability Trigger:</strong> The malicious request exploits CVE-2025-53521, bypassing authentication checks.</li>
<li><strong>Code Execution:</strong> The successful exploit allows the attacker to execute arbitrary code on the BIG-IP APM system with the privileges of the affected service.</li>
<li><strong>Privilege Escalation (Optional):</strong> The attacker may attempt to escalate privileges to gain root or administrator access. This could involve exploiting other vulnerabilities or leveraging misconfigurations.</li>
<li><strong>System Compromise:</strong> With code execution, the attacker gains control over the BIG-IP APM system.</li>
<li><strong>Lateral Movement/Data Exfiltration/System Tampering:</strong> The attacker can use the compromised system as a pivot point to access other internal resources, exfiltrate sensitive data, or tamper with system configurations.</li>
<li><strong>Persistence:</strong> The attacker might establish persistent access by installing backdoors or creating rogue accounts.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2025-53521 can lead to complete compromise of the affected BIG-IP APM system. This can result in unauthorized access to sensitive data, disruption of critical services, and potential lateral movement to other systems within the network. Given the reclassification to critical severity and active exploitation, the potential for widespread damage is significant. Organizations in all sectors using vulnerable BIG-IP APM instances are at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately patch CVE-2025-53521 on all affected BIG-IP APM systems with the latest security updates from F5.</li>
<li>Deploy the Sigma rules provided in this brief to your SIEM to detect potential exploitation attempts.</li>
<li>Monitor web server logs for suspicious HTTP requests targeting BIG-IP APM endpoints that may indicate exploitation attempts. This can be used to refine detection rules and identify potentially compromised systems.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">threat</category><category>f5</category><category>big-ip</category><category>apm</category><category>cve-2025-53521</category><category>rce</category><category>vulnerability</category></item><item><title>CrewAI Vulnerabilities Allow Remote Code Execution</title><link>https://feed.craftedsignal.io/briefs/2026-04-crewai-rce/</link><pubDate>Wed, 01 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-crewai-rce/</guid><description>Multiple vulnerabilities in CrewAI, an open-source multi-agent orchestration framework, can be exploited by attackers through prompt injection to execute arbitrary code and perform other malicious activities, potentially leading to system compromise.</description><content:encoded><![CDATA[<p>CrewAI, an open-source multi-agent orchestration framework based on Python, is vulnerable to a chain of exploits that can lead to remote code execution. Discovered by Yarden Porat of Cyata, these vulnerabilities (CVE-2026-2275, CVE-2026-2286, CVE-2026-2287, CVE-2026-2285) are linked to the Code Interpreter tool, which allows users to execute Python code within a Docker container. Attackers can leverage prompt injection to exploit these bugs, escaping the sandbox environment and executing arbitrary code on the host machine. The vulnerabilities are due to improper default configurations and insufficient validation. Although patches are in development, mitigation involves restricting the Code Interpreter tool, disabling code execution flags, and sanitizing inputs.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker injects malicious prompts into a CrewAI agent that utilizes the Code Interpreter tool.</li>
<li>CVE-2026-2275 is exploited, causing the Code Interpreter tool to fall back to SandboxPython when Docker is inaccessible, potentially enabling arbitrary C function calls.</li>
<li>Successful exploitation of CVE-2026-2275 allows the attacker to trigger CVE-2026-2286, a server-side request forgery (SSRF) bug, by manipulating the RAG search tools with malicious URLs, potentially retrieving content from internal services.</li>
<li>CVE-2026-2287 is exploited by bypassing Docker runtime checks and falling back to an insecure sandbox setting, enabling remote code execution.</li>
<li>The attacker leverages CVE-2026-2285, an arbitrary local file read vulnerability in the JSON loader tool, to access sensitive files on the server by injecting malicious file paths.</li>
<li>The attacker chains the exploits together to escape the Docker sandbox.</li>
<li>Arbitrary code is executed on the host machine.</li>
<li>The attacker steals credentials or achieves other objectives, such as persistent access or data exfiltration.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities allows attackers to escape the sandbox environment and execute code on the host machine or read files from its file system, potentially leading to credential theft, data breaches, and complete system compromise. While the specific number of victims is unknown, any system using CrewAI with the Code Interpreter tool is potentially at risk. Targeted sectors would include organizations leveraging AI and multi-agent systems for automation and task management.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Restrict or remove the Code Interpreter tool to eliminate the primary attack vector as described in the overview.</li>
<li>Disable the code execution flag in agent configurations unless absolutely necessary, as highlighted in the overview.</li>
<li>Limit agent exposure to untrusted input and implement strict input sanitization to prevent prompt injection attacks as mentioned in the attack chain.</li>
<li>Prevent fallback to insecure sandbox modes to mitigate the risk associated with CVE-2026-2275 and CVE-2026-2287 as described in the attack chain.</li>
<li>Monitor for unexpected file access attempts that could indicate exploitation of CVE-2026-2285, using a file_event rule.</li>
<li>Implement network monitoring to detect and block potential SSRF attacks related to CVE-2026-2286 targeting internal or cloud services, using a network_connection rule.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>ai</category><category>rce</category><category>prompt-injection</category></item><item><title>XenForo RCE via Authenticated Admin User (CVE-2026-35056)</title><link>https://feed.craftedsignal.io/briefs/2026-04-xenforo-rce/</link><pubDate>Wed, 01 Apr 2026 01:16:41 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-xenforo-rce/</guid><description>XenForo before 2.3.9 and 2.2.18 allows remote code execution by authenticated, malicious admin users with admin panel access.</description><content:encoded><![CDATA[<p>CVE-2026-35056 describes a remote code execution vulnerability in XenForo versions prior to 2.3.9 and 2.2.18. This vulnerability allows an authenticated attacker with administrative privileges to execute arbitrary code on the server. The attacker must have valid administrator panel access to exploit this flaw. Successful exploitation leads to complete control over the affected XenForo instance and potentially the underlying server. Organizations using vulnerable XenForo versions are at high risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains valid administrative credentials to the XenForo panel, likely through credential theft or brute-force attack.</li>
<li>The attacker logs into the XenForo admin panel.</li>
<li>The attacker identifies an administrative function that allows for the injection of malicious code (e.g., template modification, plugin installation, or similar).</li>
<li>The attacker crafts a payload containing malicious code (e.g., PHP code) designed to execute arbitrary commands on the server.</li>
<li>The attacker injects the malicious payload into the vulnerable administrative function.</li>
<li>The attacker triggers the execution of the injected payload by accessing the modified function or by some other user interaction.</li>
<li>The malicious code executes on the server, granting the attacker initial access.</li>
<li>The attacker can then leverage this access to install a web shell, escalate privileges, move laterally, or achieve other objectives.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-35056 allows a malicious administrator to execute arbitrary code on the XenForo server. This could lead to complete system compromise, data theft, defacement of the XenForo forum, or use of the server as a launching point for further attacks. Given the potentially sensitive data stored in forum databases, this vulnerability poses a significant risk to confidentiality, integrity, and availability.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately upgrade XenForo to version 2.3.9 or 2.2.18 or later to patch CVE-2026-35056.</li>
<li>Implement strong password policies and multi-factor authentication to prevent unauthorized access to administrator accounts.</li>
<li>Monitor XenForo admin panel activity for suspicious behavior, such as unexpected template modifications or plugin installations.</li>
<li>Deploy the Sigma rule to detect command execution from the web server process.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>rce</category><category>xenforo</category><category>cve-2026-35056</category><category>code-injection</category></item><item><title>SiYuan Knowledge Management System RCE via Malicious Website</title><link>https://feed.craftedsignal.io/briefs/2026-04-siyuan-rce/</link><pubDate>Tue, 31 Mar 2026 22:17:16 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-siyuan-rce/</guid><description>SiYuan versions prior to 3.6.2 are vulnerable to remote code execution (RCE) via a malicious website exploiting a permissive CORS policy to inject a JavaScript snippet, leading to arbitrary code execution within the application's Node.js context.</description><content:encoded><![CDATA[<p>SiYuan is a personal knowledge management system. Versions prior to 3.6.2 contain a critical vulnerability (CVE-2026-34449) that allows a malicious website to execute arbitrary code on any desktop running the application. This is achieved by exploiting an overly permissive Cross-Origin Resource Sharing (CORS) policy (&ldquo;Access-Control-Allow-Origin: *&rdquo; combined with &ldquo;Access-Control-Allow-Private-Network: true&rdquo;). An attacker can inject a JavaScript snippet into the application via its API. This injected code then executes in the context of Electron&rsquo;s Node.js environment, granting the attacker full operating system access. The vulnerability is triggered simply by a user visiting a malicious website while SiYuan is running. The issue has been addressed and patched in version 3.6.2 of SiYuan. This RCE can allow attackers to steal data, install malware, or perform other malicious activities on the victim&rsquo;s machine.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Victim launches the SiYuan application on their desktop (Windows, Linux, or macOS).</li>
<li>Victim visits a malicious website in a web browser while SiYuan is running.</li>
<li>The malicious website leverages the permissive CORS policy of SiYuan.</li>
<li>The malicious website sends an API request to the running SiYuan instance.</li>
<li>This API request injects a malicious JavaScript payload into SiYuan.</li>
<li>The injected JavaScript code is stored within SiYuan&rsquo;s data.</li>
<li>The next time the user opens SiYuan&rsquo;s UI, the injected JavaScript code executes within Electron&rsquo;s Node.js context.</li>
<li>The attacker gains full OS access and can perform arbitrary actions.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-34449 allows for complete compromise of the user&rsquo;s system. The attacker can steal sensitive data, install persistent backdoors, or deploy ransomware. Given SiYuan&rsquo;s purpose as a knowledge management system, it likely holds valuable and sensitive personal or business information. The impact is significant due to the ease of exploitation requiring no user interaction beyond visiting a malicious website.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately upgrade SiYuan to version 3.6.2 or later to patch CVE-2026-34449.</li>
<li>Monitor network connections for unusual API requests originating from web browsers, as this could indicate exploitation attempts. Deploy the Sigma rule <code>title: &quot;Detect Suspicious SiYuan API Access from Web Browser&quot;</code> to detect this behavior.</li>
<li>Implement strict CORS policies for web applications to prevent unauthorized cross-origin requests.</li>
<li>Enable process creation logging and monitor for unexpected processes spawned from SiYuan, as this could be a sign of successful RCE. Deploy the Sigma rule <code>title: &quot;Detect Processes Spawned from SiYuan Indicating RCE&quot;</code> to detect this.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-34449</category><category>rce</category><category>siyuan</category><category>cors</category></item><item><title>Vim and Emacs Remote Code Execution Vulnerabilities Triggered by File Opening</title><link>https://feed.craftedsignal.io/briefs/2026-03-vim-emacs-rce/</link><pubDate>Tue, 31 Mar 2026 21:45:14 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-vim-emacs-rce/</guid><description>Vulnerabilities in Vim (&lt;=9.2.0271) and GNU Emacs allow remote code execution by opening a specially crafted file, leveraging flaws in modeline handling and Git integration, respectively.</description><content:encoded><![CDATA[<p>A researcher at Calif discovered vulnerabilities in Vim and GNU Emacs using the Claude AI assistant. The Vim vulnerability (versions 9.2.0271 and earlier) results from missing security checks in modeline handling, allowing arbitrary code execution when a specially crafted file is opened. A patch is available in version 9.2.0272. The GNU Emacs vulnerability stems from its integration with Git&rsquo;s version control (vc-git) and remains unpatched. Opening a file can trigger Git operations via <code>vc-refresh-state</code>, leading to the execution of arbitrary commands defined in a user-controlled <code>core.fsmonitor</code> program within a hidden <code>.git/config</code> file. This affects users who open files from untrusted sources.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker creates a malicious archive containing a text file and a hidden <code>.git/</code> directory.</li>
<li>The <code>.git/</code> directory includes a <code>config</code> file.</li>
<li>The <code>config</code> file contains a <code>core.fsmonitor</code> entry pointing to a malicious executable.</li>
<li>The attacker distributes the archive (e.g., via email or shared drive).</li>
<li>Victim extracts the archive on their system.</li>
<li>The victim opens the seemingly benign text file within GNU Emacs.</li>
<li>GNU Emacs&rsquo; <code>vc-git</code> integration triggers <code>vc-refresh-state</code>.</li>
<li><code>vc-refresh-state</code> causes Git to read the attacker-controlled <code>.git/config</code> file and execute the malicious <code>core.fsmonitor</code> program, achieving arbitrary code execution.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities leads to arbitrary code execution with the privileges of the user running Vim or Emacs. For Vim, all versions 9.2.0271 and earlier are affected until patched. While the Emacs vulnerability remains unpatched, it poses a significant risk to users who routinely open files from unknown or untrusted sources, potentially leading to system compromise and data breaches. The number of potential victims is substantial given the widespread use of these editors by developers and system administrators.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Vim to version 9.2.0272 or later to patch the RCE vulnerability related to modeline handling (refer to the Vim flaw and fix section).</li>
<li>Exercise extreme caution when opening files from unknown sources or downloaded online when using GNU Emacs due to the unpatched Git integration vulnerability (refer to the GNU Emacs points to Git section).</li>
<li>Deploy the Sigma rule to detect execution of git with unusual core.fsmonitor configuration to your SIEM and tune for your environment.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>rce</category><category>vim</category><category>emacs</category><category>git</category><category>modeline</category></item></channel></rss>