<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Unauthenticated — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/unauthenticated/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 04 May 2026 18:16:29 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/unauthenticated/feed.xml" rel="self" type="application/rss+xml"/><item><title>WordPress Easy PayPal Events &amp; Tickets Plugin Information Disclosure Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-wordpress-easy-paypal-info-disclosure/</link><pubDate>Mon, 04 May 2026 18:16:29 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-wordpress-easy-paypal-info-disclosure/</guid><description>An information disclosure vulnerability in the Easy PayPal Events &amp; Tickets WordPress plugin (versions 1.3 and earlier) allows unauthenticated attackers to enumerate and retrieve all customer order records via the scan_qr.php endpoint.</description><content:encoded><![CDATA[<p>The Easy PayPal Events &amp; Tickets plugin for WordPress, versions 1.3 and earlier, contains an information disclosure vulnerability (CVE-2026-41471). This vulnerability allows unauthenticated attackers to iterate through WordPress post IDs via the <code>scan_qr.php</code> endpoint. By sequentially accessing these IDs, attackers can retrieve customer order records stored within the WordPress database. The plugin was officially closed as of March 18, 2026, meaning websites using the plugin prior to this date are vulnerable. This allows for the potential harvesting of sensitive customer data including names, addresses, and purchase histories.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a WordPress site using the vulnerable Easy PayPal Events &amp; Tickets plugin (version 1.3 or earlier).</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>scan_qr.php</code> endpoint.</li>
<li>The attacker modifies the request to iterate through sequential WordPress post IDs.</li>
<li>The server processes the request without proper authentication or authorization checks.</li>
<li>The <code>scan_qr.php</code> endpoint queries the WordPress database for order records associated with the provided post ID.</li>
<li>If a valid order record is found, the server returns the information in the HTTP response.</li>
<li>The attacker parses the HTTP response to extract customer order information.</li>
<li>The attacker repeats steps 2-7, incrementing the post ID to enumerate all order records.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows unauthenticated attackers to retrieve all customer order records stored in the WordPress database. This can lead to the disclosure of sensitive customer information, including names, email addresses, purchase history, and potentially other personal details. The number of affected victims depends on the popularity and usage of the vulnerable plugin. If the database contains financial information the impact could be severe.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule detecting requests to the scan_qr.php endpoint with iterative post IDs to identify potential exploitation attempts.</li>
<li>If still using the Easy PayPal Events &amp; Tickets plugin, remove the plugin, as it was closed as of 2026-03-18.</li>
<li>Monitor web server logs for suspicious activity targeting the <code>scan_qr.php</code> endpoint.</li>
<li>Review the WordPress access logs for requests originating from unusual IP addresses accessing the <code>scan_qr.php</code> endpoint.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>wordpress</category><category>info-disclosure</category><category>cve-2026-41471</category><category>unauthenticated</category><category>enumeration</category></item><item><title>Weaver E-cology Unauthenticated RCE via Dubbo API Debug Endpoint</title><link>https://feed.craftedsignal.io/briefs/2024-01-weaver-rce/</link><pubDate>Tue, 07 Apr 2026 13:16:45 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-weaver-rce/</guid><description>Weaver E-cology 10.0 before 20260312 is vulnerable to unauthenticated remote code execution, allowing attackers to execute arbitrary commands by crafting a POST request to the /papi/esearch/data/devops/dubboApi/debug/method endpoint.</description><content:encoded><![CDATA[<p>Weaver (Fanwei) E-cology is susceptible to an unauthenticated remote code execution (RCE) vulnerability affecting version 10.0 prior to 20260312. The vulnerability exists in the <code>/papi/esearch/data/devops/dubboApi/debug/method</code> endpoint, stemming from exposed debug functionality. Exploitation allows unauthenticated attackers to execute arbitrary commands on the underlying system. The attack involves crafting malicious POST requests with attacker-controlled <code>interfaceName</code> and <code>methodName</code> parameters. Shadowserver Foundation observed initial exploitation attempts on 2026-03-31 (UTC). Due to the ease of exploitation and lack of authentication requirement, this vulnerability presents a significant risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable Weaver E-cology 10.0 instance running a version prior to 20260312.</li>
<li>Attacker crafts a malicious HTTP POST request targeting the <code>/papi/esearch/data/devops/dubboApi/debug/method</code> endpoint.</li>
<li>The POST request includes the <code>interfaceName</code> and <code>methodName</code> parameters, which are set to values designed to invoke command execution helpers.</li>
<li>The server processes the request without authentication due to the vulnerability.</li>
<li>The application invokes the specified <code>methodName</code> within the <code>interfaceName</code>, leading to the execution of attacker-controlled code.</li>
<li>The attacker-controlled code executes commands on the server, such as establishing a reverse shell.</li>
<li>The attacker gains remote access to the server.</li>
<li>The attacker pivots within the network, potentially leading to data exfiltration, system compromise, or deployment of ransomware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows attackers to execute arbitrary commands on the affected Weaver E-cology 10.0 server. This can lead to full system compromise, data exfiltration, and disruption of services. Given the critical nature of systems often managed by E-cology, this could have significant business impact, leading to financial losses, reputational damage, and legal liabilities. There is currently no public information on the number of victims or specific sectors targeted.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade all Weaver E-cology 10.0 installations to a version equal to or greater than 20260312 to patch CVE-2026-22679.</li>
<li>Deploy the Sigma rule &ldquo;Detect Weaver E-cology Dubbo API Exploitation Attempt&rdquo; to detect exploitation attempts targeting the vulnerable endpoint.</li>
<li>Monitor web server logs for POST requests to the <code>/papi/esearch/data/devops/dubboApi/debug/method</code> endpoint with suspicious <code>interfaceName</code> and <code>methodName</code> parameters (see logsource details in the Sigma rule).</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>weaver</category><category>e-cology</category><category>rce</category><category>unauthenticated</category><category>cve-2026-22679</category></item><item><title>Brizy WordPress Plugin Unauthenticated Stored XSS Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-brizy-xss/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-brizy-xss/</guid><description>The Brizy – Page Builder plugin for WordPress is vulnerable to Unauthenticated Stored Cross-Site Scripting (XSS) in versions up to and including 2.8.11, allowing unauthenticated attackers to inject arbitrary web scripts that execute when an administrator views the form Leads page due to missing nonce verification and improper handling of file upload fields.</description><content:encoded><![CDATA[<p>The Brizy – Page Builder plugin for WordPress, a popular tool for designing website pages, contains a critical vulnerability that allows unauthenticated users to inject malicious JavaScript code. Specifically, versions up to and including 2.8.11 are affected. This vulnerability arises from a combination of factors, including the lack of nonce verification for form submissions from non-logged-in users, inadequate handling of FileUpload fields when no file is actually uploaded, and the unintended reversal of security encoding through <code>html_entity_decode()</code> before outputting data. This allows attackers to inject arbitrary web scripts that execute in the context of a logged-in administrator viewing the form&rsquo;s &ldquo;Leads&rdquo; page, potentially leading to account takeover, data theft, or further compromise of the WordPress site.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker crafts a malicious payload containing JavaScript code.</li>
<li>The attacker submits this payload through a Brizy form on the WordPress site, exploiting the missing nonce verification in the <code>submit_form()</code> function.</li>
<li>The <code>handleFileTypeFields()</code> function fails to properly sanitize or overwrite the attacker-supplied values when no file is attached to the form submission.</li>
<li>The injected payload, now stored in the WordPress database, bypasses initial <code>htmlentities()</code> encoding due to later <code>html_entity_decode()</code>.</li>
<li>An administrator logs into the WordPress dashboard and navigates to the &ldquo;Leads&rdquo; page to view form submissions.</li>
<li>The form-data.php template retrieves the stored malicious payload from the database.</li>
<li>The payload is outputted directly within the <code>href</code> attribute of an HTML element without proper escaping using <code>esc_url()</code>.</li>
<li>The injected JavaScript code executes within the administrator&rsquo;s browser, potentially performing actions such as stealing cookies or redirecting the administrator to a malicious site.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an unauthenticated attacker to execute arbitrary JavaScript code in the context of a logged-in administrator&rsquo;s browser. This could lead to a full compromise of the WordPress site, including the ability to create new administrative accounts, modify existing content, inject malware into the site&rsquo;s pages, or steal sensitive data. The impact is significant, as it requires no user interaction beyond an administrator viewing the form submissions within the Brizy plugin.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the Brizy – Page Builder plugin to the latest version to patch CVE-2026-5324.</li>
<li>Deploy the Sigma rule &ldquo;Detect Brizy WordPress Plugin XSS Attempt via HTTP Request&rdquo; to identify potential exploitation attempts in web server logs.</li>
<li>Review the <code>form-data.php</code> template and implement proper output escaping using <code>esc_url()</code> for all user-supplied data to prevent XSS, as mentioned in the vulnerability description.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>wordpress</category><category>xss</category><category>unauthenticated</category></item></channel></rss>