<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Scripting — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/scripting/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 08 Apr 2026 15:00:17 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/scripting/feed.xml" rel="self" type="application/rss+xml"/><item><title>XWiki Remote Code Execution via Unprotected Velocity Scripting API</title><link>https://feed.craftedsignal.io/briefs/2026-04-xwiki-rce/</link><pubDate>Wed, 08 Apr 2026 15:00:17 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-xwiki-rce/</guid><description>XWiki is vulnerable to remote code execution due to an improperly protected scripting API, allowing users with script rights to bypass the Velocity scripting API sandbox and execute arbitrary code, leading to full instance compromise.</description><content:encoded><![CDATA[<p>XWiki versions before 17.4.8 and 17.10.1 are susceptible to remote code execution (RCE) due to an improperly protected Velocity scripting API. This vulnerability, identified as CVE-2026-33229, allows users with existing script rights to bypass the intended sandboxing mechanisms of the Velocity scripting API. By exploiting this flaw, attackers can execute arbitrary code, including potentially malicious Python scripts, on the XWiki instance. This vulnerability allows an attacker to gain complete control over the XWiki instance, compromising the confidentiality, integrity, and availability of the system and its data. The issue has been addressed in XWiki versions 17.4.8 and 17.10.1 by enforcing a requirement for programming rights to access the vulnerable API.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains script rights within the XWiki instance, either through compromised credentials or misconfigured permissions.</li>
<li>The attacker crafts a malicious request leveraging the unprotected Velocity scripting API.</li>
<li>This request bypasses the intended sandboxing of the Velocity scripting engine.</li>
<li>The attacker injects arbitrary code, such as a Python script, into the Velocity template.</li>
<li>The Velocity engine executes the injected code on the XWiki server.</li>
<li>The attacker gains arbitrary code execution privileges on the server.</li>
<li>The attacker leverages the code execution to install a web shell.</li>
<li>Using the web shell, the attacker gains complete control over the XWiki instance, enabling data theft, modification, or denial of service.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability grants attackers complete control over the XWiki instance. This can lead to the theft of sensitive data stored within the XWiki, unauthorized modification of existing data, or a complete denial of service. While the exact number of potential victims is unknown, any XWiki instance running a vulnerable version is at risk, particularly those where script rights are broadly assigned. This vulnerability has the potential to severely impact organizations relying on XWiki for critical business functions.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade XWiki instances to version 17.4.8 or 17.10.1 or later to patch CVE-2026-33229.</li>
<li>Implement the Sigma rule &ldquo;Detect Suspicious XWiki Velocity Scripting API Usage&rdquo; to identify potential exploitation attempts.</li>
<li>Review and restrict script rights assignments within XWiki to minimize the attack surface, as mentioned in the overview.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>xwiki</category><category>rce</category><category>velocity</category><category>scripting</category><category>CVE-2026-33229</category></item><item><title>Windows Script Execution from Archive File</title><link>https://feed.craftedsignal.io/briefs/2024-01-script-exec-archive/</link><pubDate>Wed, 24 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-script-exec-archive/</guid><description>This rule identifies attempts to execute Jscript/Vbscript files from an archive file, a common delivery method for malicious scripts on Windows systems.</description><content:encoded><![CDATA[<p>Attackers commonly use archive files (ZIP, RAR, 7z) to deliver malicious scripts, such as JScript and VBScript, to Windows systems. This technique allows them to bypass some initial security checks and deliver payloads that can execute arbitrary code. The &ldquo;Windows Script Execution from Archive&rdquo; detection identifies instances where Windows Script Host (wscript.exe) is launched from temporary directories containing extracted archive contents. This activity can indicate a user has opened a malicious archive, leading to potential malware execution. This detection focuses on the parent-child process relationship, where explorer.exe, winrar.exe, or 7zFM.exe spawns wscript.exe to execute scripts from the temp directory.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A user receives a malicious archive file (e.g., ZIP, RAR, 7z) via email or downloads it from a website.</li>
<li>The user opens the archive file using a file archiver tool like Explorer, WinRAR, or 7-Zip.</li>
<li>The archiver extracts the contents, including a malicious JScript (.js) or VBScript (.vbs) file, to a temporary directory, such as <code>\Users\*\AppData\Local\Temp\7z*\</code>.</li>
<li>The user (or the archiver tool) inadvertently executes the extracted script using Windows Script Host (wscript.exe).</li>
<li>Wscript.exe executes the malicious script, which may perform a variety of actions, such as downloading and executing additional payloads.</li>
<li>The script establishes persistence via registry modification, adding a run key to execute upon system startup.</li>
<li>The script connects to a command-and-control server to receive further instructions.</li>
<li>The attacker gains control of the compromised system and begins lateral movement.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack of this nature can lead to arbitrary code execution on the victim&rsquo;s machine, potentially resulting in data theft, malware installation, or complete system compromise. While the number of affected organizations is not specified, the technique is broadly applicable to any Windows environment where users handle archive files, potentially affecting numerous individuals and organizations across various sectors.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable process creation logging with command line arguments to capture the execution of wscript.exe and its arguments.</li>
<li>Deploy the Sigma rule &ldquo;Detect Script Execution from Archive&rdquo; to your SIEM to identify suspicious script execution patterns.</li>
<li>Monitor process activity for wscript.exe and other scripting engines executing from temporary directories.</li>
<li>Configure endpoint security solutions to block execution of scripts from common temporary directories.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>execution</category><category>windows</category><category>scripting</category><category>archive</category></item><item><title>Execution of a Downloaded Windows Script</title><link>https://feed.craftedsignal.io/briefs/2024-01-downloaded-script-execution/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-downloaded-script-execution/</guid><description>This rule identifies the creation and subsequent execution of a Windows script downloaded from the internet, a technique used by adversaries for initial access and execution on Windows systems.</description><content:encoded><![CDATA[<p>This detection rule identifies a common attack vector where adversaries download and execute malicious scripts on Windows systems. The rule focuses on detecting scripts (e.g., .js, .vbs, .ps1, .msi) that originate from internet sources (identified by the presence of <code>file.origin_url</code> or <code>file.origin_referrer_url</code> ) and are subsequently executed using scripting utilities. The rule specifically looks for file creations by web browsers and archive utilities (chrome.exe, msedge.exe, winrar.exe, 7zFM.exe, etc.) followed by execution of script interpreters (wscript.exe, cscript.exe, powershell.exe, mshta.exe, msiexec.exe) with command-line arguments referencing the downloaded script. This activity is often indicative of malicious intent, as legitimate scripts are typically sourced from trusted internal repositories or local file systems, and not directly downloaded and executed. The rule aims to detect suspicious parent-child process relationships (e.g., browser spawning a script interpreter) and identify potential initial access or execution attempts. The rule requires Elastic Defend and a minimum Elastic Stack version of 9.2.0.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A user browses to a malicious website or opens a compromised email containing a link.</li>
<li>The user clicks the link, which initiates a download of a malicious script file (e.g., .js, .vbs, .ps1, .msi) via a web browser (chrome.exe, msedge.exe).</li>
<li>The browser saves the downloaded script file to the user&rsquo;s Downloads folder.</li>
<li>The user, either intentionally or through social engineering, executes the downloaded script.</li>
<li>Windows executes the script using a scripting utility like wscript.exe, cscript.exe, powershell.exe, mshta.exe, or msiexec.exe.</li>
<li>The scripting utility executes the malicious code within the script, potentially establishing persistence, downloading additional payloads, or performing reconnaissance.</li>
<li>The script may attempt to elevate privileges or bypass security controls to gain further access to the system.</li>
<li>The attacker achieves their objective, such as deploying ransomware, stealing sensitive data, or establishing a remote access backdoor.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack can lead to a variety of negative outcomes, including malware infection, data theft, and system compromise. If the downloaded script is malicious, it can allow attackers to gain a foothold on the system, escalate privileges, and move laterally within the network. This can result in significant financial losses, reputational damage, and disruption of business operations. The number of victims and affected sectors can vary depending on the scale and scope of the attack.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Elastic Defend integration to collect necessary event data, as described in the <a href="https://ela.st/install-elastic-defend">setup instructions</a>.</li>
<li>Deploy the Sigma rule &ldquo;Execution of a Downloaded Windows Script&rdquo; to your SIEM and tune for your environment to detect the execution of downloaded scripts.</li>
<li>Enable Sysmon process creation logging and file creation events to provide the necessary data for the Sigma rules to function correctly.</li>
<li>Implement application whitelisting to restrict the execution of unauthorized scripts and scripting utilities to reduce the risk of similar threats in the future, as mentioned in the &ldquo;Response and remediation&rdquo; section.</li>
<li>Block known malicious domains and URLs identified in related threat intelligence feeds to prevent users from downloading malicious scripts in the first place.</li>
<li>Educate users about the dangers of downloading and executing untrusted scripts from the internet, as this is a common initial access vector.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>execution</category><category>windows</category><category>scripting</category><category>threat-detection</category></item></channel></rss>