<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Web-Application — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/web-application/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 04 May 2026 17:39:31 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/web-application/feed.xml" rel="self" type="application/rss+xml"/><item><title>OpenMRS Module Upload Path Traversal Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-openmrs-zip-slip/</link><pubDate>Mon, 04 May 2026 17:39:31 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-openmrs-zip-slip/</guid><description>OpenMRS versions 2.7.8 and earlier, as well as versions 2.8.0 through 2.8.5, are vulnerable to a path traversal (Zip Slip) attack via the `POST /openmrs/ws/rest/v1/module` endpoint that allows authenticated attackers to achieve arbitrary file write and remote code execution.</description><content:encoded><![CDATA[<p>OpenMRS, an open-source enterprise electronic medical record system platform, is vulnerable to a path traversal (Zip Slip) vulnerability in its module upload functionality. Discovered in versions 2.7.8 and earlier, as well as versions 2.8.0 through 2.8.5, the vulnerability resides in the <code>POST /openmrs/ws/rest/v1/module</code> endpoint. An authenticated attacker with administrative privileges can exploit this flaw by uploading a specially crafted <code>.omod</code> archive containing malicious ZIP entries with directory traversal sequences. This can allow the attacker to write files outside of the intended module directory, potentially leading to arbitrary file write and remote code execution on the server. The vulnerability stems from incomplete path validation within the <code>WebModuleUtil.startModule()</code> function, an oversight compared to other extraction methods within the same codebase that are properly protected.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker authenticates to the OpenMRS instance with valid admin credentials via Basic Auth.</li>
<li>The attacker crafts a malicious <code>.omod</code> file containing a ZIP entry with a path traversal payload, such as <code>web/module/../../../../&lt;target_filename&gt;.jsp</code>.</li>
<li>The attacker sends a <code>POST</code> request to the <code>/openmrs/ws/rest/v1/module</code> endpoint, uploading the malicious <code>.omod</code> file.</li>
<li>The server receives the request and parses the uploaded <code>.omod</code> file, treating it as a ZIP archive.</li>
<li>During module loading via <code>WebModuleUtil.startModule()</code>, the server extracts entries under the <code>web/module/</code> directory.</li>
<li>Due to an incomplete check, the entry <code>web/module/../../../../&lt;target_filename&gt;.jsp</code> passes the initial validation.</li>
<li>The server attempts to write the extracted file to a path constructed by concatenating the traversed path, resulting in writing the file outside the intended <code>WEB-INF/view/module/</code> directory.</li>
<li>If the written file is a JSP script, accessing it via a browser triggers server-side execution, achieving Remote Code Execution (RCE).</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to write arbitrary files within the web application root directory of the OpenMRS instance. This can lead to remote code execution, allowing the attacker to gain complete control of the affected server. Given OpenMRS&rsquo;s use in healthcare environments, a successful attack could compromise sensitive patient data, disrupt medical operations, and damage the reputation of the affected organization. The number of potentially affected installations is unknown, but the vulnerability impacts a widely used version of the platform.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the patch or upgrade to a version of OpenMRS that includes the fix for CVE-2026-40076 to address the path traversal vulnerability.</li>
<li>Deploy the Sigma rule <code>Detect OpenMRS Malicious Module Upload</code> to identify exploitation attempts based on HTTP requests to the <code>/openmrs/ws/rest/v1/module</code> endpoint with suspicious file extensions in the query parameters.</li>
<li>Enable webserver logging to capture HTTP request data and facilitate detection and investigation efforts.</li>
<li>Monitor file creation events within the web application root directory for suspicious JSP files. Use the Sigma rule <code>Detect JSP File Creation in Web Application Root</code> as a starting point.</li>
<li>Enforce the <code>module.allow_web_admin</code> restriction consistently across all module upload entry points, including the REST API to prevent bypass.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>path-traversal</category><category>zip-slip</category><category>rce</category><category>openmrs</category><category>web-application</category></item><item><title>Quarkus Vertx HTTP Authorization Bypass via Matrix Parameters</title><link>https://feed.craftedsignal.io/briefs/2026-05-quarkus-auth-bypass/</link><pubDate>Mon, 04 May 2026 17:20:20 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-quarkus-auth-bypass/</guid><description>Quarkus Vertx HTTP versions &lt; 3.20.6.1, &gt;= 3.21.0 and &lt; 3.27.3.1, &gt;= 3.30.0 and &lt; 3.33.1.1, and &gt;= 3.34.0 and &lt; 3.35.1.1 are vulnerable to an authorization bypass where appending a semicolon and arbitrary text to the request URL allows unauthorized access to protected resources.</description><content:encoded><![CDATA[<p>A vulnerability exists in Quarkus Vertx HTTP versions &lt; 3.20.6.1, &gt;= 3.21.0 and &lt; 3.27.3.1, &gt;= 3.30.0 and &lt; 3.33.1.1, and &gt;= 3.34.0 and &lt; 3.35.1.1. The vulnerability, designated as CVE-2026-39852, allows unauthenticated or lower-privileged users to bypass HTTP path-based authorization policies. By appending a semicolon (<code>;</code>) and arbitrary text to the request URL, attackers can gain unauthorized access to protected resources. This vulnerability stems from an inconsistency in path normalization: Quarkus&rsquo;s security layer checks the raw URL path, while RESTEasy Reactive&rsquo;s routing layer strips matrix parameters before matching endpoints. This means a request like <code>/api/admin;anything</code> can bypass authorization for <code>/api/admin</code> while still routing to the protected endpoint. This issue was discovered and verified by the GitHub Security Lab.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a protected endpoint, such as <code>/api/admin</code>, that requires authentication or specific privileges.</li>
<li>The attacker crafts a malicious HTTP request targeting the protected endpoint but appends a semicolon and arbitrary text, such as <code>/api/admin;anything</code>.</li>
<li>The request is sent to the Quarkus Vertx HTTP server.</li>
<li>Quarkus&rsquo;s security layer performs an authorization check on the raw URL path <code>/api/admin;anything</code>, which may not match the intended authorization rules for <code>/api/admin</code>.</li>
<li>RESTEasy Reactive&rsquo;s routing layer strips the matrix parameters (<code>;anything</code>) from the URL, resulting in the endpoint <code>/api/admin</code> being matched.</li>
<li>The request is routed to the protected endpoint <code>/api/admin</code>, bypassing the intended authorization checks.</li>
<li>The attacker gains unauthorized access to the protected resource or functionality.</li>
<li>The attacker performs actions they would not normally be authorized to perform, such as accessing sensitive data or modifying system configurations.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability can lead to unauthorized access to sensitive data, modification of system configurations, or other malicious activities. The vulnerability affects Quarkus Vertx HTTP applications that rely on path-based authorization policies. The number of affected applications is currently unknown, but any application using the vulnerable versions of Quarkus Vertx HTTP is susceptible.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Quarkus Vertx HTTP to a patched version (&gt;= 3.20.6.1, &gt;= 3.27.3.1, &gt;= 3.33.1.1, &gt;= 3.35.1.1) to remediate CVE-2026-39852.</li>
<li>Deploy the Sigma rule <code>Detect Quarkus Authorization Bypass Attempt</code> to identify potential exploitation attempts in web server logs.</li>
<li>Monitor web server logs for requests containing semicolons in the URL path to detect potential exploitation attempts using the <code>Monitor Semicolons in URL Path</code> Sigma rule.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>authentication-bypass</category><category>authorization-bypass</category><category>web-application</category></item><item><title>Langflow Multiple Vulnerabilities Allow Code Execution</title><link>https://feed.craftedsignal.io/briefs/2026-05-langflow-code-exec/</link><pubDate>Mon, 04 May 2026 10:39:06 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-langflow-code-exec/</guid><description>An authenticated remote attacker can exploit multiple unspecified vulnerabilities in Langflow to achieve arbitrary code execution.</description><content:encoded><![CDATA[<p>Langflow is vulnerable to multiple security flaws that could allow a remote attacker to execute arbitrary code on the affected system. Successful exploitation of these vulnerabilities requires the attacker to be authenticated. The specific nature of these vulnerabilities is not detailed in the advisory, however the potential impact is severe, allowing for complete system compromise if successfully exploited. Defenders should prioritize identifying and mitigating installations of Langflow that are exposed to untrusted networks or users.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An authenticated attacker gains initial access to the Langflow application.</li>
<li>The attacker crafts a malicious request targeting one of the unspecified vulnerabilities.</li>
<li>The malicious request is sent to the Langflow server.</li>
<li>The Langflow server processes the request, triggering the vulnerability.</li>
<li>The vulnerability allows the attacker to inject arbitrary code into the Langflow process.</li>
<li>The injected code executes within the context of the Langflow application.</li>
<li>The attacker leverages the initial code execution to escalate privileges.</li>
<li>The attacker achieves arbitrary code execution on the underlying system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities allows a remote, authenticated attacker to execute arbitrary code on the Langflow server. This could lead to a complete compromise of the affected system, including the theft of sensitive data, the installation of malware, and the disruption of services. Given the lack of specific vulnerability details, it is difficult to estimate the precise number of potentially affected installations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor Langflow application logs for suspicious activity indicative of unauthorized access or code execution.</li>
<li>Deploy the Sigma rules provided in this brief to your SIEM to detect potential exploitation attempts.</li>
<li>Implement strict access controls for the Langflow application to minimize the attack surface.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>langflow</category><category>code-execution</category><category>web-application</category></item><item><title>YunaiV yudao-cloud Authentication Bypass Vulnerability (CVE-2026-7710)</title><link>https://feed.craftedsignal.io/briefs/2026-05-yunai-auth-bypass/</link><pubDate>Mon, 04 May 2026 00:16:39 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-yunai-auth-bypass/</guid><description>YunaiV yudao-cloud up to version 3.8.0 is vulnerable to an authentication bypass (CVE-2026-7710) due to improper handling of the mock-token argument in the JwtAuthenticationTokenFilter.java file, allowing remote attackers to bypass authentication.</description><content:encoded><![CDATA[<p>CVE-2026-7710 is an authentication bypass vulnerability affecting YunaiV&rsquo;s yudao-cloud, specifically versions up to 3.8.0. The vulnerability resides in the <code>doFilterInternal</code> function within the <code>JwtAuthenticationTokenFilter.java</code> file of the Ruoyi-Vue-Pro component. An attacker can exploit this vulnerability by manipulating the <code>mock-token</code> argument, leading to improper authentication. This allows a remote attacker to potentially gain unauthorized access to the application. Public exploits are available, increasing the risk of exploitation. The vendor was notified but has not responded.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a YunaiV yudao-cloud instance running a vulnerable version (&lt;= 3.8.0).</li>
<li>Attacker crafts a malicious HTTP request targeting an endpoint protected by authentication.</li>
<li>The crafted request includes a manipulated <code>mock-token</code> argument designed to bypass the JWT authentication filter.</li>
<li>The <code>JwtAuthenticationTokenFilter.java</code> component processes the request and improperly validates the manipulated <code>mock-token</code>.</li>
<li>Due to the flawed authentication logic, the attacker is granted unauthorized access as an authenticated user.</li>
<li>Attacker gains access to protected resources and functionalities within the application.</li>
<li>Attacker performs privileged actions such as data modification, account takeover, or further exploitation of the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7710 allows attackers to bypass authentication and gain unauthorized access to YunaiV yudao-cloud applications. This can lead to the compromise of sensitive data, modification of application settings, and potentially full system takeover. Given the availability of public exploits, organizations using affected versions of yudao-cloud are at high risk. The CVSS v3.1 base score for this vulnerability is 7.3, indicating a high severity level.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade YunaiV yudao-cloud to a patched version that addresses CVE-2026-7710.</li>
<li>Deploy the Sigma rule <code>Detect Malicious Mock Token Argument</code> to identify exploitation attempts by monitoring web server logs for the presence of a <code>mock-token</code> argument.</li>
<li>Implement input validation on the server side to ensure that <code>mock-token</code> values conform to expected patterns.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>authentication bypass</category><category>cve-2026-7710</category><category>web application</category></item><item><title>Tiandy Easy7 Integrated Management Platform OS Command Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-tiandy-command-injection/</link><pubDate>Sun, 03 May 2026 14:16:27 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-tiandy-command-injection/</guid><description>CVE-2026-7698 allows for remote OS command injection in Tiandy Easy7 Integrated Management Platform 7.17.0 via manipulation of the 'week' argument in the /Easy7/rest/systemInfo/updateDbBackupInfo file.</description><content:encoded><![CDATA[<p>A critical vulnerability, CVE-2026-7698, has been identified in Tiandy Easy7 Integrated Management Platform version 7.17.0. This vulnerability resides within the <code>/Easy7/rest/systemInfo/updateDbBackupInfo</code> file, specifically related to the <code>week</code> argument. Successful exploitation allows for arbitrary OS command injection. This vulnerability is remotely exploitable, meaning an attacker can trigger it over the network without needing local access. Publicly available exploit code exists, increasing the likelihood of exploitation. The vendor was notified but has not responded. Defenders should take immediate action to mitigate this risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a vulnerable Tiandy Easy7 Integrated Management Platform running version 7.17.0.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>/Easy7/rest/systemInfo/updateDbBackupInfo</code> endpoint.</li>
<li>The crafted request includes a payload within the <code>week</code> argument designed to inject OS commands.</li>
<li>The vulnerable application fails to properly sanitize or validate the <code>week</code> argument.</li>
<li>The application executes the injected OS command with the privileges of the web server.</li>
<li>The attacker gains arbitrary code execution on the server.</li>
<li>The attacker can then perform further actions such as installing malware, exfiltrating data, or pivoting to other systems on the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7698 allows an attacker to execute arbitrary commands on the affected system. This could lead to complete system compromise, data breaches, denial of service, or further lateral movement within the network. Given the publicly available exploit, organizations using Tiandy Easy7 Integrated Management Platform 7.17.0 are at immediate risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply available patches from Tiandy if they become available.</li>
<li>Monitor web server logs for requests to <code>/Easy7/rest/systemInfo/updateDbBackupInfo</code> containing suspicious characters or command injection attempts. Deploy the Sigma rule <code>Detect Suspicious Requests to updateDbBackupInfo</code> to your SIEM.</li>
<li>Implement input validation and sanitization on the <code>week</code> argument within the <code>/Easy7/rest/systemInfo/updateDbBackupInfo</code> endpoint.</li>
<li>Monitor process creation events for unusual processes spawned by the web server, using the Sigma rule <code>Detect OS Command Injection via Web Request</code>.</li>
<li>Review and restrict network access to the Tiandy Easy7 Integrated Management Platform to only authorized users and systems.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-7698</category><category>command-injection</category><category>web-application</category></item><item><title>Jinher OA 1.0 SQL Injection Vulnerability (CVE-2026-7670)</title><link>https://feed.craftedsignal.io/briefs/2024-01-jinher-oa-sqli/</link><pubDate>Sat, 02 May 2026 23:16:16 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-jinher-oa-sqli/</guid><description>Jinher OA 1.0 is vulnerable to remote SQL injection via the DeptIDList parameter in the /C6/JHSoft.Web.PlanSummarize/UserSel.aspx file, potentially allowing attackers to execute arbitrary SQL queries.</description><content:encoded><![CDATA[<p>A SQL injection vulnerability, identified as CVE-2026-7670, affects Jinher OA 1.0, a web-based office automation software. The vulnerability resides within the /C6/JHSoft.Web.PlanSummarize/UserSel.aspx file, specifically in how the application handles the &lsquo;DeptIDList&rsquo; argument. An unauthenticated remote attacker can manipulate this argument to inject malicious SQL code into database queries. The vulnerability was reported to the vendor; however, there has been no response, and an exploit is publicly available. This lack of response and the availability of an exploit increases the risk to organizations using the affected Jinher OA 1.0.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a Jinher OA 1.0 instance exposed to the internet.</li>
<li>The attacker crafts a malicious HTTP GET or POST request targeting the <code>/C6/JHSoft.Web.PlanSummarize/UserSel.aspx</code> endpoint.</li>
<li>The request includes a modified <code>DeptIDList</code> parameter containing SQL injection payloads.</li>
<li>The server-side application fails to properly sanitize or validate the <code>DeptIDList</code> input.</li>
<li>The unsanitized input is passed directly into a SQL query executed against the underlying database.</li>
<li>The injected SQL code is executed by the database server, potentially allowing the attacker to bypass authentication, extract sensitive data, or modify data.</li>
<li>The attacker retrieves sensitive information, such as user credentials, internal configurations, or financial data, depending on the database structure and injected SQL commands.</li>
<li>The attacker leverages compromised data to gain further access, escalate privileges, or conduct lateral movement within the organization&rsquo;s network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability (CVE-2026-7670) can lead to unauthorized access to sensitive data, including user credentials, financial records, and internal communications. An attacker could potentially gain complete control over the affected Jinher OA 1.0 system and the underlying database. This could result in significant data breaches, financial losses, reputational damage, and disruption of business operations. Given the lack of vendor response, organizations using Jinher OA 1.0 are particularly vulnerable and should take immediate action to mitigate this risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Inspect web server logs for requests to <code>/C6/JHSoft.Web.PlanSummarize/UserSel.aspx</code> containing suspicious characters or SQL keywords within the <code>DeptIDList</code> parameter, as covered by the Sigma rule &ldquo;Detect Jinher OA SQL Injection Attempt via DeptIDList&rdquo;.</li>
<li>Apply input validation and sanitization to all user-supplied data, especially the <code>DeptIDList</code> parameter in <code>/C6/JHSoft.Web.PlanSummarize/UserSel.aspx</code>, to prevent SQL injection attacks.</li>
<li>Deploy the Sigma rule &ldquo;Detect Generic SQL Injection Attempt&rdquo; to identify broader SQL injection attempts across your web applications.</li>
<li>Given the vendor&rsquo;s lack of response, consider isolating the affected Jinher OA 1.0 instance from the network or replacing it with a more secure alternative.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>sql-injection</category><category>cve-2026-7670</category><category>web-application</category></item><item><title>InnoShop Improper Authentication Vulnerability (CVE-2026-7630)</title><link>https://feed.craftedsignal.io/briefs/2026-05-innoshop-auth-bypass/</link><pubDate>Sat, 02 May 2026 14:16:18 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-innoshop-auth-bypass/</guid><description>InnoShop version 0.7.8 and earlier contains an improper authentication vulnerability in the InstallServiceProvider::boot function (CVE-2026-7630) that allows remote attackers to bypass authentication and gain unauthorized access to the installation endpoint.</description><content:encoded><![CDATA[<p>A critical vulnerability, CVE-2026-7630, affects innocommerce InnoShop versions up to 0.7.8. The vulnerability resides in the <code>InstallServiceProvider::boot</code> function within the <code>innopacks/install/src/InstallServiceProvider.php</code> file, which governs the installation endpoint. Successful exploitation allows remote attackers to bypass authentication mechanisms, potentially leading to complete system compromise. Publicly available exploits exist, increasing the risk of active exploitation. It is crucial for administrators to apply the provided patch (identifier: <code>45758e4ec22451ab944ae2ae826b1e70f6450dc9</code>) immediately.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies an InnoShop instance running a vulnerable version (&lt;= 0.7.8).</li>
<li>The attacker crafts a malicious HTTP request targeting the installation endpoint (<code>innopacks/install/src/InstallServiceProvider.php</code>).</li>
<li>The request exploits the improper authentication in the <code>InstallServiceProvider::boot</code> function.</li>
<li>Authentication checks are bypassed due to the vulnerability.</li>
<li>The attacker gains unauthorized access to the installation process.</li>
<li>The attacker injects malicious code or configurations during the installation phase.</li>
<li>The injected code executes with elevated privileges, granting the attacker control over the InnoShop instance.</li>
<li>The attacker establishes a persistent backdoor for future access and potential data exfiltration or further malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7630 allows unauthenticated remote attackers to compromise InnoShop installations. This can lead to complete control of the web server, potentially affecting sensitive customer data, financial information, and intellectual property.  Given the ease of exploitation and publicly available exploits, unpatched InnoShop instances are at high risk of compromise.  The number of affected installations is currently unknown, but the widespread use of InnoShop in e-commerce makes this a significant threat.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately apply the patch identified by <code>45758e4ec22451ab944ae2ae826b1e70f6450dc9</code> to remediate the improper authentication vulnerability.</li>
<li>Deploy the Sigma rule &ldquo;Detect InnoShop Installation Endpoint Access&rdquo; to identify unauthorized access attempts to the installation endpoint.</li>
<li>Monitor web server logs for suspicious activity targeting the <code>innopacks/install/src/InstallServiceProvider.php</code> path, based on &ldquo;Detect InnoShop Installation Endpoint Access&rdquo; to identify post-exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>cve</category><category>authentication bypass</category><category>web application</category></item><item><title>code-projects Online Hospital Management System SQL Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-online-hospital-management-sql-injection/</link><pubDate>Sat, 02 May 2026 14:16:18 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-online-hospital-management-sql-injection/</guid><description>CVE-2026-7632 is a SQL injection vulnerability in code-projects Online Hospital Management System 1.0, allowing a remote attacker to execute arbitrary SQL commands by manipulating the 'delid' argument in the '/viewappointment.php' file.</description><content:encoded><![CDATA[<p>CVE-2026-7632 is a critical security flaw affecting code-projects Online Hospital Management System version 1.0. The vulnerability lies within the <code>/viewappointment.php</code> file, where insufficient input validation allows for SQL injection via the <code>delid</code> argument. A remote attacker can exploit this vulnerability to inject arbitrary SQL queries, potentially leading to unauthorized data access, modification, or deletion. The exploit is publicly disclosed, increasing the risk of widespread exploitation. This vulnerability poses a significant threat to organizations using the affected system, as it could compromise sensitive patient data and disrupt hospital operations.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies an instance of code-projects Online Hospital Management System 1.0 running the vulnerable <code>/viewappointment.php</code> script.</li>
<li>The attacker crafts a malicious HTTP request targeting <code>/viewappointment.php</code> with a specially crafted <code>delid</code> parameter containing SQL injection payloads.</li>
<li>The application fails to properly sanitize the <code>delid</code> input, allowing the injected SQL code to be passed to the database.</li>
<li>The injected SQL code is executed against the database server.</li>
<li>The attacker retrieves sensitive data such as patient records, usernames, and passwords from the database using SQL queries like <code>UNION SELECT</code>.</li>
<li>The attacker may modify or delete data within the database.</li>
<li>The attacker could potentially escalate privileges within the application by manipulating user roles or injecting administrative accounts.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7632 can lead to severe consequences, including unauthorized access to sensitive patient data, such as medical history, personal information, and financial records. Attackers could modify or delete critical data, disrupting hospital operations and potentially impacting patient care. The vulnerability could also allow attackers to gain control of the system, leading to further malicious activities like data exfiltration or ransomware deployment. This poses a significant risk to the privacy and security of patient information.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect SQL Injection in Online Hospital Management System</code> to your SIEM to identify exploitation attempts targeting the <code>/viewappointment.php</code> endpoint.</li>
<li>Implement input validation and sanitization measures in the <code>/viewappointment.php</code> script to prevent SQL injection attacks.</li>
<li>Upgrade to a patched version of code-projects Online Hospital Management System that addresses CVE-2026-7632 (if available).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>web-application</category><category>vulnerability</category></item><item><title>OS Command Injection Vulnerability in p_69_branch_monkey_mcp Preview Endpoint (CVE-2026-7590)</title><link>https://feed.craftedsignal.io/briefs/2026-05-branch-monkey-mcp-command-injection/</link><pubDate>Sat, 02 May 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-branch-monkey-mcp-command-injection/</guid><description>A remote attacker can inject OS commands by manipulating the dev_script argument in the Preview Endpoint of eyal-gor's p_69_branch_monkey_mcp (up to commit 69bc71874ce40050ef45fde5a435855f18af3373), leading to arbitrary code execution on the server.</description><content:encoded><![CDATA[<p>A critical OS command injection vulnerability, CVE-2026-7590, has been identified in the Preview Endpoint of eyal-gor&rsquo;s p_69_branch_monkey_mcp. This vulnerability affects versions up to commit 69bc71874ce40050ef45fde5a435855f18af3373. A remote attacker can exploit this flaw by manipulating the <code>dev_script</code> argument within the <code>branch_monkey_mcp/bridge_and_local_actions/routes/advanced.py</code> file.  Successful exploitation allows for arbitrary command execution on the host operating system. The exploit is publicly available, increasing the risk of widespread exploitation. The vendor has been notified but has not yet responded. The lack of versioning makes it difficult to determine the exact scope of affected installations.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable instance of p_69_branch_monkey_mcp running a web server.</li>
<li>The attacker crafts a malicious HTTP request targeting the Preview Endpoint.</li>
<li>The request includes a payload in the <code>dev_script</code> argument designed to inject OS commands via the <code>branch_monkey_mcp/bridge_and_local_actions/routes/advanced.py</code> file.</li>
<li>The web server processes the request, passing the attacker-controlled <code>dev_script</code> argument to a function that executes system commands without proper sanitization.</li>
<li>The injected OS command is executed by the server, potentially with the privileges of the web server user. For example, an attacker could inject <code>ls -la</code> to list directory contents.</li>
<li>The output of the injected command is returned to the attacker via the web server&rsquo;s response, confirming successful command execution.</li>
<li>The attacker leverages the initial command execution to escalate privileges, install persistent backdoors, or move laterally within the network, depending on the server&rsquo;s configuration and accessible resources.</li>
<li>The attacker achieves their final objective, such as data exfiltration, system compromise, or denial of service.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7590 allows a remote attacker to execute arbitrary OS commands on the affected server. This could lead to complete system compromise, including data theft, malware installation, and denial of service. The lack of version information makes it difficult to ascertain the number of vulnerable installations, but given the publicly available exploit, widespread exploitation is possible. Organizations using p_69_branch_monkey_mcp are at high risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for suspicious requests targeting the Preview Endpoint and containing potentially malicious payloads in the <code>dev_script</code> parameter as described in the attack chain. Use the &ldquo;p_69_branch_monkey_mcp_command_injection&rdquo; Sigma rule.</li>
<li>Inspect process creation events for unexpected processes spawned by the web server, indicating potential command injection. Use the &ldquo;p_69_branch_monkey_mcp_unexpected_process&rdquo; Sigma rule.</li>
<li>Implement input validation and sanitization on the <code>dev_script</code> parameter in the <code>branch_monkey_mcp/bridge_and_local_actions/routes/advanced.py</code> file to prevent command injection.</li>
<li>Although specific vulnerable versions are unavailable, immediately investigate and patch any instances of <code>p_69_branch_monkey_mcp</code> due to the public exploit availability.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>command-injection</category><category>web-application</category><category>cve</category></item><item><title>Zyosoft School App Insecure Direct Object Reference Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-zyosoft-school-app-idor/</link><pubDate>Sat, 02 May 2026 10:16:19 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-zyosoft-school-app-idor/</guid><description>Zyosoft's School App contains an Insecure Direct Object Reference vulnerability (CVE-2026-7491) that allows authenticated remote attackers to modify parameters and access or modify other users' data.</description><content:encoded><![CDATA[<p>The Zyosoft School App is susceptible to an Insecure Direct Object Reference (IDOR) vulnerability identified as CVE-2026-7491. This flaw allows authenticated remote attackers to bypass authorization controls by modifying specific parameters within the application&rsquo;s requests. By manipulating these parameters, attackers can gain unauthorized access to sensitive data belonging to other users, as well as modify that data. Successful exploitation allows unauthorized data access and modification, potentially leading to data breaches, privacy violations, and manipulation of user accounts. Defenders should prioritize identifying and mitigating this vulnerability to prevent potential abuse.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker authenticates to the Zyosoft School App using valid credentials.</li>
<li>The attacker identifies a request that includes a user-controlled parameter referencing a specific object (e.g., user ID, record number).</li>
<li>The attacker modifies the value of this parameter to reference a different object belonging to another user.</li>
<li>The attacker sends the modified request to the server.</li>
<li>The server, lacking proper authorization checks, processes the request using the attacker-supplied object reference.</li>
<li>The server returns the data associated with the targeted user&rsquo;s object to the attacker.</li>
<li>The attacker can further modify parameters to alter the data of the targeted user.</li>
<li>The attacker successfully reads or modifies the targeted user&rsquo;s data without proper authorization.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7491 allows authenticated attackers to read and modify other users&rsquo; data within the Zyosoft School App. This can lead to severe consequences, including unauthorized access to sensitive student or staff information, modification of grades or attendance records, and potential data breaches. The number of affected users depends on the app&rsquo;s deployment size, but any instance is vulnerable. This issue could affect any educational institution using the Zyosoft School App.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Inspect web server logs for requests containing unusual parameter modifications, specifically those referencing user IDs or other sensitive data fields (webserver logs).</li>
<li>Deploy the Sigma rule provided below to detect attempts to access or modify resources using potentially manipulated object references (Sigma rule).</li>
<li>Implement robust authorization checks in the Zyosoft School App to verify that users only have access to resources they are explicitly authorized to access.</li>
<li>Contact Zyosoft for a patch addressing CVE-2026-7491.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>idor</category><category>vulnerability</category><category>web application</category><category>cve-2026-7491</category></item><item><title>Sunnet CTMS SQL Injection Vulnerability (CVE-2026-7489)</title><link>https://feed.craftedsignal.io/briefs/2026-05-sunnet-ctms-sqli/</link><pubDate>Sat, 02 May 2026 10:16:18 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-sunnet-ctms-sqli/</guid><description>Sunnet CTMS is vulnerable to SQL injection (CVE-2026-7489), allowing authenticated remote attackers to execute arbitrary SQL commands and compromise the database.</description><content:encoded><![CDATA[<p>A SQL Injection vulnerability, identified as CVE-2026-7489, exists in CTMS developed by Sunnet. This flaw allows authenticated remote attackers to inject arbitrary SQL commands. Successful exploitation could allow the attackers to read, modify, and delete database contents. The vulnerability was published on May 2, 2026. The scope of this vulnerability affects systems running the vulnerable CTMS software, potentially leading to data breaches and system compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker authenticates to the CTMS application.</li>
<li>The attacker identifies an endpoint vulnerable to SQL injection.</li>
<li>The attacker crafts a malicious SQL query designed to exploit the injection point, likely using tools like Burp Suite or SQLMap.</li>
<li>The attacker injects the SQL payload via a crafted HTTP request, targeting vulnerable parameters within the request.</li>
<li>The CTMS application executes the injected SQL query against the database.</li>
<li>The attacker bypasses authentication or authorization controls to gain elevated privileges within the application or database.</li>
<li>The attacker reads sensitive data from the database, such as user credentials or confidential business information.</li>
<li>The attacker modifies or deletes database entries, leading to data corruption or denial of service.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability could allow attackers to read sensitive information, modify data, or delete critical database contents. This could lead to a complete compromise of the CTMS application and its underlying database, impacting all users and data managed by the system. The severity is heightened by the potential for attackers to gain complete control over the database, leading to significant data breaches and operational disruption.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the patch or upgrade CTMS to a version that addresses CVE-2026-7489 as soon as it becomes available from Sunnet.</li>
<li>Deploy the Sigma rule &ldquo;Detect Suspicious SQL Injection Attempts&rdquo; to identify potential exploitation attempts against CTMS (see below).</li>
<li>Review web server logs for suspicious activity indicative of SQL injection attempts, specifically looking for unusual characters or SQL syntax in HTTP request parameters.</li>
<li>Implement proper input validation and sanitization techniques to prevent SQL injection vulnerabilities in CTMS and other web applications.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sqli</category><category>cve-2026-7489</category><category>web-application</category></item><item><title>Flux159 mcp-game-asset-gen Path Traversal Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-mcp-game-asset-gen-path-traversal/</link><pubDate>Fri, 01 May 2026 21:16:17 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-mcp-game-asset-gen-path-traversal/</guid><description>A path traversal vulnerability exists in Flux159 mcp-game-asset-gen version 0.1.0, where manipulation of the `statusFile` argument in the `image_to_3d_async` function allows for remote exploitation.</description><content:encoded><![CDATA[<p>A path traversal vulnerability, identified as CVE-2026-7594, has been discovered in Flux159 mcp-game-asset-gen version 0.1.0. The vulnerability resides within the <code>image_to_3d_async</code> function located in the <code>src/index.ts</code> file of the MCP Interface component. Successful exploitation allows a remote attacker to manipulate the <code>statusFile</code> argument, potentially leading to unauthorized file access and modification. Public exploits are available, increasing the risk of widespread exploitation. The project maintainers were notified via an issue report, but have not yet addressed the vulnerability. This lack of response, coupled with the existence of public exploits, elevates the urgency for defenders.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable instance of mcp-game-asset-gen 0.1.0 running on a remote server.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>image_to_3d_async</code> function.</li>
<li>Within the request, the attacker manipulates the <code>statusFile</code> argument to include path traversal sequences (e.g., &ldquo;../&rdquo;).</li>
<li>The server-side application processes the request, using the attacker-controlled <code>statusFile</code> value to construct a file path.</li>
<li>Due to insufficient input validation, the path traversal sequences are not properly sanitized.</li>
<li>The application attempts to read or write to a file outside the intended directory, based on the manipulated path.</li>
<li>If successful, the attacker gains unauthorized access to sensitive files or overwrites critical system files.</li>
<li>The attacker leverages the file access to further compromise the system, potentially leading to code execution or data exfiltration.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this path traversal vulnerability could allow attackers to read sensitive files, overwrite critical system files, or even achieve remote code execution on the affected server. This could lead to data breaches, system instability, or complete server compromise. Given the availability of public exploits, organizations using mcp-game-asset-gen 0.1.0 are at immediate risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply input validation and sanitization to the <code>statusFile</code> argument within the <code>image_to_3d_async</code> function to prevent path traversal, addressing CVE-2026-7594.</li>
<li>Monitor web server logs for suspicious requests containing path traversal sequences (e.g., &ldquo;../&rdquo;) in the <code>statusFile</code> parameter using the provided Sigma rule.</li>
<li>Implement the Sigma rule targeting process creation events related to the exploitation of CVE-2026-7594.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>path-traversal</category><category>vulnerability</category><category>web-application</category></item><item><title>SQL Injection Vulnerability in itsourcecode Courier Management System</title><link>https://feed.craftedsignal.io/briefs/2026-05-courier-mgmt-sqli/</link><pubDate>Fri, 01 May 2026 20:16:24 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-courier-mgmt-sqli/</guid><description>itsourcecode Courier Management System 1.0 is vulnerable to SQL Injection via the ID parameter in /edit_staff.php, potentially allowing remote attackers to execute arbitrary SQL commands.</description><content:encoded><![CDATA[<p>itsourcecode Courier Management System 1.0 is vulnerable to a SQL injection vulnerability. The vulnerability resides in the <code>/edit_staff.php</code> file and can be exploited by manipulating the <code>ID</code> argument. This allows a remote attacker to inject malicious SQL queries, potentially leading to unauthorized data access, modification, or deletion. The exploit is publicly available, increasing the risk of exploitation. The vulnerability was reported on May 1, 2026, and affects version 1.0 of the Courier Management System.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies the <code>/edit_staff.php</code> endpoint in the Courier Management System 1.0.</li>
<li>The attacker crafts a malicious SQL injection payload within the <code>ID</code> parameter of a HTTP GET or POST request.</li>
<li>The attacker sends the crafted request to the <code>/edit_staff.php</code> endpoint.</li>
<li>The application fails to properly sanitize the <code>ID</code> parameter, allowing the SQL injection payload to be processed by the database.</li>
<li>The injected SQL query is executed against the database, potentially allowing the attacker to bypass authentication or authorization controls.</li>
<li>The attacker retrieves sensitive information from the database, such as user credentials, financial records, or other confidential data.</li>
<li>The attacker modifies data in the database, potentially altering application behavior or causing data corruption.</li>
<li>The attacker gains full control of the database server.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability could allow attackers to read, modify, or delete sensitive data within the Courier Management System database. This could lead to unauthorized access to customer information, financial data, and other confidential records. Given the public availability of the exploit, organizations using Courier Management System 1.0 are at a high risk of compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply input validation and sanitization to the <code>ID</code> parameter in <code>/edit_staff.php</code> to prevent SQL injection (CVE-2026-7592).</li>
<li>Deploy the provided Sigma rule to detect potential SQL injection attempts targeting the <code>/edit_staff.php</code> endpoint.</li>
<li>Implement a web application firewall (WAF) rule to block known SQL injection payloads (CVE-2026-7592).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>web-application</category><category>cve</category></item><item><title>SourceCodester Pharmacy Sales and Inventory System SQL Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-pharmacy-sqli/</link><pubDate>Fri, 01 May 2026 05:16:03 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-pharmacy-sqli/</guid><description>SourceCodester Pharmacy Sales and Inventory System 1.0 is vulnerable to remote SQL injection via the ID parameter in the /ajax.php?action=delete_customer endpoint, allowing attackers to potentially read, modify, or delete database information.</description><content:encoded><![CDATA[<p>On May 1, 2026, a SQL injection vulnerability, CVE-2026-7549, was disclosed in SourceCodester Pharmacy Sales and Inventory System version 1.0. The vulnerability resides in the <code>/ajax.php?action=delete_customer</code> endpoint, where the <code>ID</code> parameter is susceptible to manipulation, enabling remote attackers to inject arbitrary SQL commands. Publicly available exploit code exists, increasing the risk of exploitation. Successful exploitation can lead to unauthorized data access, modification, or deletion within the application&rsquo;s database. This vulnerability is particularly concerning due to the sensitive nature of pharmacy data, potentially impacting confidentiality, integrity, and availability.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies the vulnerable <code>/ajax.php?action=delete_customer</code> endpoint in SourceCodester Pharmacy Sales and Inventory System 1.0.</li>
<li>Attacker crafts a malicious HTTP request targeting the vulnerable endpoint.</li>
<li>The malicious request includes a manipulated <code>ID</code> parameter containing a SQL injection payload.</li>
<li>The application fails to properly sanitize the <code>ID</code> parameter before incorporating it into a SQL query.</li>
<li>The injected SQL code is executed against the application&rsquo;s database.</li>
<li>The attacker gains unauthorized access to sensitive data, such as customer information, prescription details, or inventory levels.</li>
<li>The attacker may modify or delete data within the database, potentially disrupting pharmacy operations or causing data integrity issues.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability (CVE-2026-7549) can lead to the complete compromise of the SourceCodester Pharmacy Sales and Inventory System database. Attackers could potentially exfiltrate sensitive patient data, modify prescription information, or disrupt pharmacy operations by deleting critical data. The vulnerability has a CVSS v3.1 score of 7.3 (HIGH), indicating a significant risk. The number of victims and specific sectors targeted remain unknown, but any pharmacy using the affected version is potentially at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply input validation and sanitization to all user-supplied input, especially the <code>ID</code> parameter in <code>/ajax.php?action=delete_customer</code>, to prevent SQL injection (CWE-89).</li>
<li>Deploy the Sigma rule &ldquo;Detect SQL Injection Attempts in Pharmacy Sales System&rdquo; to identify and block malicious requests targeting the vulnerable endpoint.</li>
<li>Upgrade to a patched version of SourceCodester Pharmacy Sales and Inventory System that addresses CVE-2026-7549 once available.</li>
<li>Monitor web server logs for suspicious activity, such as unusual requests to <code>/ajax.php?action=delete_customer</code>, to detect potential exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>web-application</category><category>vulnerability</category></item><item><title>SourceCodester Pharmacy Sales and Inventory System SQL Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-pharmacy-inventory-sql-injection/</link><pubDate>Fri, 01 May 2026 05:16:03 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-pharmacy-inventory-sql-injection/</guid><description>CVE-2026-7550 is an SQL injection vulnerability in SourceCodester Pharmacy Sales and Inventory System 1.0, allowing remote attackers to execute arbitrary SQL commands by manipulating the ID argument in the /ajax.php?action=save_customer endpoint.</description><content:encoded><![CDATA[<p>SourceCodester Pharmacy Sales and Inventory System 1.0 is vulnerable to SQL injection via the /ajax.php?action=save_customer endpoint. Disclosed on May 1, 2026, the vulnerability, identified as CVE-2026-7550, allows unauthenticated remote attackers to inject arbitrary SQL commands by manipulating the <code>ID</code> argument. The vulnerability exists due to insufficient input validation. Public exploit code is available, increasing the risk of exploitation. This vulnerability allows attackers to potentially read, modify, or delete sensitive data within the application&rsquo;s database.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies the vulnerable endpoint <code>/ajax.php?action=save_customer</code> within the Pharmacy Sales and Inventory System 1.0 application.</li>
<li>The attacker crafts a malicious HTTP GET or POST request targeting the <code>/ajax.php?action=save_customer</code> endpoint.</li>
<li>The crafted request includes a manipulated <code>ID</code> parameter designed to inject SQL commands.</li>
<li>The application fails to properly sanitize the input provided in the <code>ID</code> parameter.</li>
<li>The application executes the attacker-supplied SQL code against the database.</li>
<li>The attacker can retrieve sensitive information, such as customer details, product information, or administrative credentials.</li>
<li>The attacker may modify existing data, such as prices or inventory levels.</li>
<li>The attacker may gain complete control of the database, potentially leading to full system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability (CVE-2026-7550) can lead to unauthorized access to sensitive data, data modification, or complete database compromise. This could result in financial losses, reputational damage, and legal repercussions for affected organizations. Given the nature of the application, attackers could potentially access patient data or prescription information, leading to severe privacy breaches.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply input validation and sanitization to the <code>ID</code> parameter in the <code>/ajax.php?action=save_customer</code> endpoint to prevent SQL injection attacks.</li>
<li>Monitor web server logs for suspicious requests targeting the <code>/ajax.php?action=save_customer</code> endpoint with unusual <code>ID</code> parameter values. Deploy the provided Sigma rule to detect potential exploitation attempts.</li>
<li>Consider using a Web Application Firewall (WAF) to filter out malicious requests targeting this vulnerability.</li>
<li>Upgrade to a patched version of the SourceCodester Pharmacy Sales and Inventory System once available.</li>
<li>Implement regular database backups to mitigate potential data loss due to successful exploitation.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>web-application</category><category>cve-2026-7550</category></item><item><title>SourceCodester Advanced School Management System SQL Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-asms-sqli/</link><pubDate>Fri, 01 May 2026 02:16:49 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-asms-sqli/</guid><description>A SQL injection vulnerability (CVE-2026-7545) exists in SourceCodester Advanced School Management System 1.0 within the checkEmail endpoint of commonController.php, allowing remote attackers to potentially execute arbitrary SQL commands.</description><content:encoded><![CDATA[<p>SourceCodester Advanced School Management System version 1.0 is vulnerable to SQL injection in the <code>checkEmail</code> endpoint within the <code>commonController.php</code> file. This vulnerability, identified as CVE-2026-7545, allows a remote attacker to inject arbitrary SQL commands. Publicly available exploits targeting this vulnerability increase the risk of exploitation. Successful exploitation could lead to unauthorized data access, modification, or deletion within the application&rsquo;s database. Given the availability of public exploits, organizations using this software are at an elevated risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies the <code>checkEmail</code> endpoint in <code>commonController.php</code>.</li>
<li>The attacker crafts a malicious HTTP request to the <code>checkEmail</code> endpoint, injecting SQL code into the email parameter.</li>
<li>The vulnerable application fails to properly sanitize the email input.</li>
<li>The injected SQL code is passed directly to the database query.</li>
<li>The database executes the malicious SQL code.</li>
<li>The attacker gains unauthorized access to the database.</li>
<li>The attacker may then read sensitive data, modify existing data, or insert new malicious data.</li>
<li>The attacker might also use this to escalate privileges within the application.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability (CVE-2026-7545) could allow an attacker to read, modify, or delete sensitive data stored in the Advanced School Management System database. This could include student records, financial information, or administrative credentials. The availability of public exploits increases the likelihood of attacks targeting this vulnerability, potentially impacting any organization using the affected software.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply input validation and sanitization to the <code>checkEmail</code> endpoint in <code>commonController.php</code> to prevent SQL injection attacks.</li>
<li>Deploy the Sigma rule <code>Detect ASMS CheckEmail SQL Injection Attempt</code> to identify exploitation attempts in web server logs.</li>
<li>Monitor web server logs for suspicious activity related to the <code>checkEmail</code> endpoint.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sqli</category><category>vulnerability</category><category>web-application</category></item><item><title>Fujian Apex LiveBOS Path Traversal Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-livebos-path-traversal/</link><pubDate>Fri, 01 May 2026 01:16:38 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-livebos-path-traversal/</guid><description>A path traversal vulnerability exists in Fujian Apex LiveBOS version 2.0 and earlier, allowing remote attackers to read arbitrary files by manipulating the filename argument in the /feed/UploadImage.do endpoint.</description><content:encoded><![CDATA[<p>Fujian Apex LiveBOS, a live broadcasting system, is vulnerable to a path traversal attack. This vulnerability, identified as CVE-2026-7519, exists due to insufficient input validation on the filename parameter within the /feed/UploadImage.do endpoint. Versions up to and including 2.0 are affected. Publicly available exploits exist, increasing the risk of exploitation. An attacker can leverage this flaw to access sensitive files on the server, potentially leading to information disclosure or further system compromise. Upgrading to version 2.1 or applying available patches is strongly recommended.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a Fujian Apex LiveBOS instance running version 2.0 or earlier.</li>
<li>The attacker crafts a malicious HTTP request targeting the /feed/UploadImage.do endpoint.</li>
<li>The attacker manipulates the filename parameter within the request, injecting path traversal sequences (e.g., ../../).</li>
<li>The server-side application fails to properly sanitize the filename, allowing the path traversal sequence to be processed.</li>
<li>The application attempts to read a file based on the attacker-controlled path.</li>
<li>If successful, the contents of the targeted file are returned to the attacker in the HTTP response.</li>
<li>The attacker analyzes the leaked file content for sensitive information (e.g., credentials, configuration files).</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability can lead to unauthorized access to sensitive files on the LiveBOS server. This could include configuration files containing database credentials, private keys, or other confidential information. The impact ranges from information disclosure to potential full system compromise, depending on the accessed data. There are no reported victims or sectors targeted as of yet, but the public availability of the exploit increases the likelihood of exploitation.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Fujian Apex LiveBOS to version 2.1 to remediate CVE-2026-7519.</li>
<li>Deploy the Sigma rule <code>Detect LiveBOS Path Traversal Attempt</code> to identify malicious requests exploiting the vulnerability.</li>
<li>Monitor web server logs for requests containing path traversal sequences targeting the <code>/feed/UploadImage.do</code> endpoint.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>path-traversal</category><category>web-application</category><category>cve-2026-7519</category></item><item><title>SSCMS v7.4.0 SQL Injection Vulnerability in stl:sqlContent Tag</title><link>https://feed.craftedsignal.io/briefs/2026-04-sscms-sqli/</link><pubDate>Thu, 30 Apr 2026 21:16:34 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-sscms-sqli/</guid><description>SSCMS v7.4.0 is vulnerable to SQL injection via the stl:sqlContent tag's queryString attribute, allowing attackers to execute arbitrary SQL statements through crafted payloads submitted to the /api/stl/actions/dynamic endpoint.</description><content:encoded><![CDATA[<p>SSCMS v7.4.0 is susceptible to a SQL injection vulnerability (CVE-2026-7435) within the <code>stl:sqlContent</code> tag. The vulnerability arises because the <code>queryString</code> attribute is passed directly to database execution without adequate sanitization or parameterization. This flaw enables attackers to inject malicious SQL code by crafting encrypted payloads and submitting them to the <code>/api/stl/actions/dynamic</code> endpoint. Successful exploitation can lead to unauthorized access to the database, disclosure of sensitive information, authentication bypass, modification of data, or even complete compromise of the database. This vulnerability poses a significant risk to organizations using the affected SSCMS version, potentially leading to severe data breaches and system disruption.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies an SSCMS v7.4.0 instance.</li>
<li>The attacker crafts a malicious SQL injection payload, specifically targeting the <code>queryString</code> attribute within the <code>stl:sqlContent</code> tag.</li>
<li>The attacker encrypts the crafted SQL injection payload.</li>
<li>The attacker sends the encrypted payload to the <code>/api/stl/actions/dynamic</code> endpoint using an HTTP POST request.</li>
<li>The SSCMS application receives the request and processes the <code>stl:sqlContent</code> tag without proper sanitization.</li>
<li>The application executes the attacker-controlled SQL query against the database.</li>
<li>The attacker gains unauthorized access to the database, potentially extracting sensitive data or modifying existing records.</li>
<li>The attacker may escalate privileges or move laterally within the compromised system, depending on the level of access gained.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability could lead to severe consequences. An attacker could gain complete control over the SSCMS database, potentially exposing sensitive user data, confidential business information, or proprietary intellectual property. Data breaches resulting from this vulnerability could lead to significant financial losses, reputational damage, and legal liabilities. The lack of specifics about victim count or sectors targeted makes quantification difficult, but the potential impact is high for any organization using the affected software.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply any available patches or updates for SSCMS v7.4.0 to address the SQL injection vulnerability described in CVE-2026-7435.</li>
<li>Implement input validation and sanitization measures to prevent SQL injection attacks, specifically focusing on the <code>queryString</code> attribute of the <code>stl:sqlContent</code> tag.</li>
<li>Deploy the Sigma rule <code>Detect Suspicious SSCMS stl:sqlContent Requests</code> to identify potential exploitation attempts targeting the <code>/api/stl/actions/dynamic</code> endpoint.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>sqli</category><category>cve-2026-7435</category><category>web-application</category></item><item><title>Kirby CMS Missing Authorization Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-kirby-auth-bypass/</link><pubDate>Thu, 30 Apr 2026 21:03:20 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-kirby-auth-bypass/</guid><description>A missing authorization vulnerability in Kirby CMS allows authenticated users to bypass intended access restrictions on pages and files, potentially leading to unauthorized information disclosure and content modification; patched in versions 4.9.0 and 5.4.0.</description><content:encoded><![CDATA[<p>Kirby CMS versions prior to 4.9.0 and between 5.0.0 and 5.3.3 are vulnerable to a missing authorization flaw. This vulnerability impacts Kirby sites where user roles are intentionally configured with restricted access to pages or files through disabled <code>pages.access</code>, <code>pages.list</code>, <code>files.access</code>, or <code>files.list</code> permissions. The issue stems from inconsistent permission checks within the Kirby Panel and REST API, allowing authenticated users to access resources they should not be able to. Updating to versions 4.9.0, 5.4.0, or later resolves this vulnerability by implementing consistent permission checks. The vulnerability is identified as CVE-2026-42137.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An authenticated user logs into the Kirby CMS Panel or REST API.</li>
<li>The user attempts to access a page or file for which their role lacks the necessary <code>pages.access</code>/<code>files.access</code> or <code>pages.list</code>/<code>files.list</code> permissions.</li>
<li>Due to inconsistent permission checks, the user can view the page or file details via the &ldquo;changes&rdquo; dialog in the Panel, even if listing is disabled.</li>
<li>The user accesses the REST API, which, despite direct access checks, fails to properly filter collections or related models (children, drafts, files, etc.).</li>
<li>The attacker views images associated with restricted site, pages, or user resources in lists within the Panel.</li>
<li>The user exploits the incorrect permission check (using <code>pages.access</code> instead of <code>pages.list</code> or <code>files.access</code> instead of <code>files.list</code> in specific API routes).</li>
<li>The user traverses to previous or next files using direct links in the files view, even if those files should not be listable.</li>
<li>The attacker gains unauthorized access to sensitive information or modifies content due to the bypassed permission checks.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>This vulnerability allows authenticated users to bypass intended access restrictions within Kirby CMS, leading to potential unauthorized access to sensitive information and/or unauthorized content modification. The inconsistent permission checks in the Panel and REST API could result in unintended disclosure of data restricted by role-based access controls. Successful exploitation could compromise the confidentiality and integrity of the affected Kirby CMS instance. While the advisory does not list the number of victims, this flaw impacts any Kirby site with restricted roles.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to Kirby CMS version 4.9.0 or 5.4.0 (or later) to patch the vulnerability as recommended in the advisory.</li>
<li>Review user role permissions and blueprint configurations to ensure appropriate access controls are in place after patching, as described in the overview.</li>
<li>Monitor web server logs for unusual API requests to resources that should be restricted, using the rules below, to identify potential exploitation attempts.</li>
<li>Implement rate limiting on API endpoints to mitigate potential brute-force attacks attempting to exploit this or other vulnerabilities.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>authorization</category><category>cms</category><category>web-application</category></item><item><title>1024-lab smart-admin Improper Access Control Vulnerability (CVE-2026-7468)</title><link>https://feed.craftedsignal.io/briefs/2026-04-smart-admin-access-control/</link><pubDate>Thu, 30 Apr 2026 01:16:03 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-smart-admin-access-control/</guid><description>CVE-2026-7468 is an improper access control vulnerability in 1024-lab smart-admin up to version 3.30.0, affecting the /smart-admin-api/druid/index.html file, which can be exploited remotely.</description><content:encoded><![CDATA[<p>A security vulnerability, CVE-2026-7468, has been identified in 1024-lab smart-admin, specifically in versions up to 3.30.0. This flaw resides within an unspecified function of the <code>/smart-admin-api/druid/index.html</code> file, a component of the Demo Site. The vulnerability stems from improper access controls, which could allow unauthorized remote access. The public disclosure of an exploit increases the risk of exploitation. While the 1024-lab project was notified through an issue report, a response or patch has not yet been released, making systems running vulnerable versions susceptible to attack. This vulnerability allows for potential compromise of the application and sensitive data.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable instance of 1024-lab smart-admin running a version up to 3.30.0.</li>
<li>The attacker crafts a malicious request targeting the <code>/smart-admin-api/druid/index.html</code> endpoint.</li>
<li>The request exploits the improper access control vulnerability to bypass authentication or authorization checks.</li>
<li>The system incorrectly processes the request, granting the attacker unintended access to restricted resources or functionality.</li>
<li>The attacker leverages this unauthorized access to read sensitive data.</li>
<li>The attacker further exploits the vulnerability to modify data or application configurations.</li>
<li>The attacker uses the compromised application to pivot to other systems or data within the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7468 allows attackers to gain unauthorized access to sensitive data and functionality within the 1024-lab smart-admin application. The impact could range from information disclosure to complete system compromise, depending on the specific function affected and the attacker&rsquo;s objectives. As the vulnerability resides in a &lsquo;Demo Site&rsquo; component, the impact is likely to be proof-of-concept or low, but could be more significant if the application is in production.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for suspicious requests targeting the <code>/smart-admin-api/druid/index.html</code> endpoint to detect potential exploitation attempts.</li>
<li>Deploy the provided Sigma rule to detect unauthorized access attempts.</li>
<li>Apply any available patches or updates released by 1024-lab to address CVE-2026-7468.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>access-control</category><category>vulnerability</category><category>web-application</category></item><item><title>Admidio SAML Signature Validation Bypass Allows Forged AuthnRequests and LogoutRequests</title><link>https://feed.craftedsignal.io/briefs/2026-04-admidio-saml-bypass/</link><pubDate>Wed, 29 Apr 2026 21:56:13 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-admidio-saml-bypass/</guid><description>Admidio's SAML Identity Provider implementation fails to properly validate signatures on SAML AuthnRequests and LogoutRequests, enabling attackers to bypass signature enforcement, potentially disclose user attributes via forged SSO requests, and terminate user sessions via forged SLO requests.</description><content:encoded><![CDATA[<p>Admidio, a free web-based content management system for organizations and groups, contains a critical vulnerability in its SAML Single Sign-On (SSO) implementation. The <code>validateSignature()</code> method within the SAMLService class returns error strings upon signature validation failure, rather than throwing exceptions. The calling functions, <code>handleSSORequest()</code> and <code>handleSLORequest()</code>, incorrectly assume that the method throws an exception, and therefore, do not check the return value. This oversight renders the <code>smc_require_auth_signed</code> configuration option ineffective, allowing attackers to forge SAML AuthnRequests and LogoutRequests. An attacker can exploit this vulnerability to obtain sensitive user information or cause denial of service by terminating user sessions. This affects Admidio versions 5.0.8 and earlier and requires SAML SSO to be enabled.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious SAML AuthnRequest or LogoutRequest without a valid signature, impersonating a legitimate Service Provider (SP).</li>
<li>The attacker sends the forged SAML request to the Admidio instance via HTTP GET or POST to <code>modules/sso/index.php</code>.</li>
<li>The <code>receiveMessage()</code> function parses the SAML binding directly from the HTTP request, requiring no prior authentication.</li>
<li>The Entity ID is extracted from the forged request&rsquo;s Issuer element, and the corresponding client configuration is loaded.</li>
<li>The <code>validateSignature()</code> function is called, but its return value (indicating signature validity) is discarded.</li>
<li>For AuthnRequests, if the targeted user has an active session (<code>$gValidLogin</code> is true), the login form is skipped.</li>
<li>Admidio builds a SAML Response containing the user&rsquo;s attributes (login, name, email, roles) and sends it to the attacker-controlled <code>AssertionConsumerServiceURL</code>.</li>
<li>For LogoutRequests, the user&rsquo;s session is immediately terminated in the database, triggering a cascading single logout across all registered SPs.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability can lead to several critical impacts. The primary impact is the complete bypass of signature enforcement, negating the security benefits of the <code>smc_require_auth_signed</code> setting. This can lead to the disclosure of sensitive user attributes, including login name, email, and role memberships, to unauthorized parties by forging SSO requests and redirecting them to attacker-controlled endpoints. Furthermore, attackers can terminate any user&rsquo;s Admidio session by forging SLO requests, potentially causing a denial-of-service condition. This vulnerability affects all Admidio instances with SAML SSO enabled and can potentially impact all users of the system.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the recommended fix in the Admidio codebase to check the return value of <code>validateSignature()</code> and throw an exception on failure, as outlined in the advisory (<a href="https://github.com/advisories/GHSA-25cw-98hg-g3cg)">https://github.com/advisories/GHSA-25cw-98hg-g3cg)</a>.</li>
<li>Deploy the Sigma rule &ldquo;Admidio Forged SAML AuthnRequest Detection&rdquo; to detect potentially malicious SAML AuthnRequests lacking a valid signature via webserver logs.</li>
<li>Deploy the Sigma rule &ldquo;Admidio Forged SAML LogoutRequest Detection&rdquo; to detect potentially malicious SAML LogoutRequests lacking a valid signature via webserver logs.</li>
<li>Monitor webserver logs for requests to <code>/adm_program/modules/sso/index.php/saml/sso</code> and <code>/adm_program/modules/sso/index.php/saml/slo</code> without proper signature validation to detect potential exploitation attempts.</li>
<li>Upgrade to a patched version of Admidio to address CVE-2026-41669.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>saml</category><category>signature-bypass</category><category>authentication</category><category>authorization</category><category>web-application</category></item><item><title>Relative Path Traversal Vulnerability in mcpo-simple-server</title><link>https://feed.craftedsignal.io/briefs/2026-04-mcpo-simple-server-traversal/</link><pubDate>Wed, 29 Apr 2026 21:16:22 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-mcpo-simple-server-traversal/</guid><description>A relative path traversal vulnerability exists in getsimpletool mcpo-simple-server &lt;= 0.2.0, allowing remote attackers to delete arbitrary files via manipulation of the `detail` argument in the `delete_shared_prompt` function.</description><content:encoded><![CDATA[<p>A relative path traversal vulnerability, identified as CVE-2026-7404, has been discovered in getsimpletool mcpo-simple-server up to version 0.2.0. The vulnerability resides within the <code>delete_shared_prompt</code> function of the <code>src/mcpo_simple_server/services/prompt_manager/base_manager.py</code> file. By manipulating the <code>detail</code> argument, a remote attacker can traverse the file system and delete arbitrary files. The vulnerability is remotely exploitable, and proof-of-concept exploit code is publicly available. The maintainers of the getsimpletool project have been notified of this vulnerability but have not yet responded. This poses a significant risk to systems running mcpo-simple-server, as it could lead to unauthorized file deletion and potential system compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable mcpo-simple-server instance running version 0.2.0 or earlier.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>delete_shared_prompt</code> function.</li>
<li>The malicious request includes a manipulated <code>detail</code> argument containing relative path traversal sequences (e.g., <code>../</code>).</li>
<li>The server-side application processes the request and passes the manipulated <code>detail</code> argument to the <code>delete_shared_prompt</code> function.</li>
<li>The <code>delete_shared_prompt</code> function uses the attacker-controlled <code>detail</code> argument to construct a file path.</li>
<li>Due to the path traversal sequences, the resulting file path points to a location outside the intended directory.</li>
<li>The application attempts to delete the file at the attacker-specified location.</li>
<li>If permissions allow, the file is successfully deleted, leading to potential data loss or system instability.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to delete arbitrary files on the affected system. This can lead to data loss, application malfunction, or even complete system compromise, depending on the files targeted for deletion. Given the public availability of exploit code, systems running vulnerable versions of mcpo-simple-server are at immediate risk. The impact is especially severe if the targeted files are critical system files or application data.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade mcpo-simple-server to a patched version that addresses CVE-2026-7404, if available from the vendor.</li>
<li>Deploy the Sigma rule <code>Detect Mcpo-Simple-Server Path Traversal Attempt</code> to identify exploitation attempts in web server logs.</li>
<li>Implement strict input validation and sanitization on the <code>detail</code> argument of the <code>delete_shared_prompt</code> function, if patching is not immediately feasible.</li>
<li>Monitor web server logs for suspicious activity, such as requests containing path traversal sequences.</li>
<li>Restrict file system permissions to limit the impact of successful path traversal attacks.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>path-traversal</category><category>web-application</category><category>cve-2026-7404</category></item><item><title>XATABoost CMS 1.0.0 SQL Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-xataboost-sql-injection/</link><pubDate>Wed, 29 Apr 2026 20:16:25 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-xataboost-sql-injection/</guid><description>XATABoost CMS 1.0.0 is vulnerable to union-based SQL injection, allowing unauthenticated attackers to manipulate database queries by injecting SQL code through the id parameter via GET requests to news.php, enabling extraction of sensitive database information.</description><content:encoded><![CDATA[<p>XATABoost CMS 1.0.0 is susceptible to a union-based SQL injection vulnerability (CVE-2018-25300). This flaw enables unauthenticated attackers to inject malicious SQL code through the <code>id</code> parameter in <code>news.php</code> via GET requests. By crafting specific payloads, attackers can manipulate database queries to extract sensitive information. This vulnerability poses a significant risk, as it could lead to data breaches, account compromise, and further exploitation of the affected system. The targeted exploitation vector is the <code>news.php</code> file, making it a critical area for monitoring and mitigation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies the <code>news.php</code> endpoint.</li>
<li>The attacker crafts a malicious GET request targeting the <code>id</code> parameter within <code>news.php</code>. This payload contains SQL injection code.</li>
<li>The server-side application fails to properly sanitize the <code>id</code> parameter before constructing the SQL query.</li>
<li>The injected SQL code is executed against the database.</li>
<li>The attacker uses UNION clauses to extract sensitive information from other database tables.</li>
<li>The extracted data is returned as part of the HTTP response.</li>
<li>The attacker parses the HTTP response to retrieve the exfiltrated data.</li>
<li>The attacker uses the exfiltrated data for further malicious activities (e.g., privilege escalation, lateral movement).</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability can result in the unauthorized disclosure of sensitive information stored in the XATABoost CMS database. This includes user credentials, financial data, or other confidential information. The impact could range from a single compromised system to a full-scale data breach, depending on the scope and sensitivity of the data stored within the database. Without further context on affected deployments, the number of potential victims is hard to quantify, but any public-facing XATABoost CMS 1.0.0 instance is vulnerable.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect XATABoost CMS SQL Injection Attempt</code> to identify malicious GET requests targeting the <code>news.php</code> endpoint and tune for your environment.</li>
<li>Implement input validation and sanitization on the <code>id</code> parameter in the <code>news.php</code> file to prevent SQL injection attacks.</li>
<li>Upgrade to a patched version of XATABoost CMS or implement a web application firewall (WAF) rule to mitigate the vulnerability.</li>
<li>Monitor web server logs for suspicious activity related to <code>news.php</code> and unusual SQL queries.</li>
<li>Review and restrict database user permissions to minimize the impact of successful SQL injection attacks.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>web-application</category><category>cve</category></item><item><title>Path Traversal Vulnerability in mail-mcp-bridge</title><link>https://feed.craftedsignal.io/briefs/2026-04-mail-mcp-bridge-path-traversal/</link><pubDate>Wed, 29 Apr 2026 16:16:29 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-mail-mcp-bridge-path-traversal/</guid><description>A path traversal vulnerability exists in fatbobman mail-mcp-bridge version 1.3.3 and earlier, allowing a remote attacker to read arbitrary files by manipulating the message_ids argument in the src/mail_mcp_server.py file.</description><content:encoded><![CDATA[<p>A path traversal vulnerability, identified as CVE-2026-7386, has been discovered in fatbobman mail-mcp-bridge version 1.3.3 and prior. The vulnerability resides within the <code>src/mail_mcp_server.py</code> file, specifically affecting an unspecified function that handles the <code>message_ids</code> argument. A remote attacker can exploit this flaw by crafting malicious requests containing manipulated <code>message_ids</code> values. Successful exploitation allows the attacker to traverse the file system and potentially read sensitive files. An exploit is publicly available. The vulnerability is addressed in version 1.3.4, with patch <code>638b162b26532e32fa8d8047f638537dbdfe197a</code>.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable instance of mail-mcp-bridge running version 1.3.3 or earlier.</li>
<li>The attacker crafts a malicious HTTP request targeting the endpoint that processes <code>message_ids</code>.</li>
<li>Within the request, the attacker includes a <code>message_ids</code> parameter containing path traversal sequences (e.g., <code>../</code>).</li>
<li>The server-side application, without proper validation, processes the manipulated <code>message_ids</code> value.</li>
<li>The application attempts to access a file path constructed using the attacker-controlled input.</li>
<li>Due to the path traversal sequences, the application accesses a file outside the intended directory.</li>
<li>The application reads the contents of the traversed file.</li>
<li>The attacker retrieves the contents of the file, gaining access to sensitive information.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to read arbitrary files on the server. This could lead to the exposure of sensitive data such as configuration files, application source code, or user data. With a CVSS v3.1 base score of 7.3, this vulnerability poses a significant risk. The number of affected installations is unknown, but any instance of mail-mcp-bridge running a vulnerable version is susceptible to attack.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade fatbobman mail-mcp-bridge to version 1.3.4 or later to apply the patch <code>638b162b26532e32fa8d8047f638537dbdfe197a</code> that resolves CVE-2026-7386.</li>
<li>Deploy the Sigma rule &ldquo;Detect mail-mcp-bridge Path Traversal Attempt&rdquo; to identify exploitation attempts in web server logs.</li>
<li>Implement input validation on the <code>message_ids</code> parameter to prevent path traversal attacks in web applications, even after patching.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>path-traversal</category><category>vulnerability</category><category>web-application</category></item><item><title>EyouCMS SQL Injection Vulnerability (CVE-2026-7389)</title><link>https://feed.craftedsignal.io/briefs/2026-04-eyoucms-sql-injection/</link><pubDate>Wed, 29 Apr 2026 16:16:29 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-eyoucms-sql-injection/</guid><description>A remote SQL injection vulnerability (CVE-2026-7389) exists in EyouCMS versions up to 1.7.9 due to improper handling of the 'sort_asc' argument in the GetSortData function, potentially allowing attackers to execute arbitrary SQL commands.</description><content:encoded><![CDATA[<p>A security vulnerability, CVE-2026-7389, has been identified in EyouCMS, specifically affecting versions up to 1.7.9. This vulnerability stems from insufficient sanitization of user-supplied input passed to the <code>sort_asc</code> argument of the <code>GetSortData</code> function located in the <code>application/common.php</code> file. An unauthenticated, remote attacker can exploit this vulnerability to inject malicious SQL queries into the application. Publicly available exploits increase the risk of widespread exploitation. The project maintainers were notified but have not yet addressed the issue, making timely detection and mitigation critical for defenders.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies an EyouCMS instance running a vulnerable version (&lt;= 1.7.9).</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>GetSortData</code> function within <code>application/common.php</code>.</li>
<li>The crafted request includes a manipulated <code>sort_asc</code> argument containing a SQL injection payload.</li>
<li>The application processes the request without proper sanitization of the <code>sort_asc</code> parameter.</li>
<li>The unsanitized input is incorporated into a SQL query executed by the application.</li>
<li>The injected SQL code modifies the query logic, allowing the attacker to potentially bypass authentication.</li>
<li>The attacker can read sensitive data from the database, such as user credentials or configuration information.</li>
<li>The attacker may escalate privileges or gain complete control of the database server, leading to data exfiltration or service disruption.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability (CVE-2026-7389) could allow an attacker to read, modify, or delete sensitive data stored in the EyouCMS database. This could include user credentials, financial information, or other confidential data. Since an exploit is publicly available, organizations using vulnerable versions of EyouCMS are at increased risk of compromise, potentially leading to data breaches, financial loss, and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect EyouCMS SQL Injection via sort_asc Parameter</code> to identify exploitation attempts in web server logs.</li>
<li>Inspect web server logs for suspicious requests targeting <code>application/common.php</code> with unusual parameters in the <code>sort_asc</code> argument based on the Sigma rule.</li>
<li>Apply input validation and sanitization to the <code>sort_asc</code> parameter in the <code>GetSortData</code> function to prevent SQL injection.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>cve-2026-7389</category><category>web-application</category></item><item><title>Eiceblue Spire-PDF-MCP-Server Path Traversal Vulnerability (CVE-2026-7315)</title><link>https://feed.craftedsignal.io/briefs/2026-04-spire-pdf-path-traversal/</link><pubDate>Wed, 29 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-spire-pdf-path-traversal/</guid><description>A path traversal vulnerability exists in eiceblue spire-pdf-mcp-server version 0.1.1, allowing remote attackers to access arbitrary files via manipulation of the filepath argument in the get_pdf_path function.</description><content:encoded><![CDATA[<p>A path traversal vulnerability, identified as CVE-2026-7315, affects eiceblue spire-pdf-mcp-server version 0.1.1. The vulnerability resides in the <code>get_pdf_path</code> function within the <code>src/spire_pdf_mcp/server.py</code> file. By manipulating the <code>filepath</code> argument, a remote attacker can bypass directory traversal restrictions and potentially access sensitive files on the server. Public exploits are available, increasing the risk of exploitation. The vendor has been notified but has not yet provided a patch or response. This vulnerability poses a significant risk to systems running the affected software.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable instance of eiceblue spire-pdf-mcp-server 0.1.1 exposed to the network.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>get_pdf_path</code> function, embedding a path traversal sequence (e.g., <code>../</code>) within the <code>filepath</code> parameter.</li>
<li>The server receives the request and processes the <code>filepath</code> argument without proper sanitization or validation.</li>
<li>The <code>get_pdf_path</code> function constructs a file path using the attacker-controlled input, allowing the traversal of directories outside the intended PDF file storage location.</li>
<li>The server attempts to access a file outside the intended directory, based on the manipulated path.</li>
<li>If successful, the server reads the contents of the arbitrary file.</li>
<li>The server returns the contents of the file to the attacker.</li>
<li>The attacker gains unauthorized access to sensitive information, potentially including configuration files, credentials, or other confidential data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7315 allows a remote attacker to read arbitrary files on the server. This can lead to the disclosure of sensitive information, such as configuration files, credentials, or internal application code. The impact could include complete compromise of the affected system and potential lateral movement within the network. Given the availability of public exploits, the risk of widespread exploitation is elevated.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect Spire-PDF Path Traversal Attempt</code> to identify malicious requests containing path traversal sequences.</li>
<li>Monitor web server logs for HTTP requests targeting the <code>get_pdf_path</code> function with suspicious <code>filepath</code> parameters (e.g., containing &ldquo;../&rdquo;).</li>
<li>Implement strict input validation and sanitization measures for the <code>filepath</code> argument in the <code>get_pdf_path</code> function to prevent path traversal attacks.</li>
<li>Apply any available patches or updates from the vendor as soon as they are released to address CVE-2026-7315.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>path-traversal</category><category>web-application</category><category>cve</category></item><item><title>eiceblue spire-doc-mcp-server Path Traversal Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-spire-doc-mcp-server-path-traversal/</link><pubDate>Wed, 29 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-spire-doc-mcp-server-path-traversal/</guid><description>A path traversal vulnerability exists in eiceblue spire-doc-mcp-server version 1.0.0, allowing a remote attacker to access arbitrary files by manipulating the 'document_name' argument in the 'get_doc_path' function.</description><content:encoded><![CDATA[<p>A critical path traversal vulnerability has been identified in eiceblue spire-doc-mcp-server version 1.0.0. The vulnerability resides within the <code>get_doc_path</code> function of the <code>src/spire_doc_mcp/api/base.py</code> file. By manipulating the <code>document_name</code> argument, an attacker can bypass intended directory restrictions and access files outside the designated document path. This attack can be initiated remotely without authentication, posing a significant risk. Public exploits are available, increasing the likelihood of exploitation. The vendor was notified through an issue report, but has not yet responded.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker sends a crafted HTTP request to the spire-doc-mcp-server.</li>
<li>The request targets an endpoint that utilizes the vulnerable <code>get_doc_path</code> function.</li>
<li>The attacker manipulates the <code>document_name</code> parameter within the request.</li>
<li>The <code>document_name</code> parameter contains a path traversal sequence (e.g., &ldquo;../&rdquo;) designed to escape the intended directory.</li>
<li>The <code>get_doc_path</code> function fails to properly sanitize or validate the <code>document_name</code> input.</li>
<li>The application constructs a file path based on the malicious input.</li>
<li>The application attempts to read the file at the attacker-controlled path.</li>
<li>The attacker successfully retrieves the contents of an arbitrary file on the server.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this path traversal vulnerability allows an attacker to read sensitive files on the server. This could include configuration files containing credentials, source code, or other confidential data. The CVSS v3.1 score of 7.3 reflects the high severity of this issue. The lack of vendor response and availability of public exploits significantly increases the risk to organizations using vulnerable versions of spire-doc-mcp-server.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect Spire-doc-mcp-server Path Traversal Attempt</code> to your SIEM to detect exploitation attempts by monitoring web server logs for path traversal sequences.</li>
<li>Apply input validation and sanitization to the <code>document_name</code> argument in the <code>get_doc_path</code> function within <code>src/spire_doc_mcp/api/base.py</code> to prevent path traversal.</li>
<li>Monitor web server logs for HTTP requests containing path traversal sequences (e.g., &ldquo;..%2F&rdquo;, &ldquo;../&rdquo;) targeting endpoints related to document retrieval.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>path-traversal</category><category>web-application</category><category>cve-2026-7314</category></item><item><title>Elinsky execution-system-mcp Path Traversal Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-elinsky-path-traversal/</link><pubDate>Wed, 29 Apr 2026 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-elinsky-path-traversal/</guid><description>Elinsky execution-system-mcp 0.1.0 is vulnerable to path traversal via manipulation of the context argument in the _get_context_file_path function, allowing remote attackers to access sensitive files.</description><content:encoded><![CDATA[<p>A path traversal vulnerability, identified as CVE-2026-7319, affects elinsky execution-system-mcp version 0.1.0. The vulnerability resides in the <code>_get_context_file_path</code> function located within the <code>src/execution_system_mcp/server.py</code> file, which is part of the <code>add_action</code> Tool component. By manipulating the <code>context</code> argument, a remote attacker can bypass directory restrictions and access unauthorized files. The existence of a published exploit increases the risk of this vulnerability being actively exploited. Defenders should prioritize patching and implementing mitigations to prevent potential data breaches or system compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable instance of elinsky execution-system-mcp 0.1.0 running remotely.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>add_action</code> tool.</li>
<li>Within the HTTP request, the attacker injects a path traversal sequence (e.g., <code>../</code>) into the <code>context</code> argument of the <code>_get_context_file_path</code> function.</li>
<li>The <code>_get_context_file_path</code> function processes the tainted input without proper sanitization, allowing the path traversal sequence to resolve to a file outside of the intended directory.</li>
<li>The server attempts to read the file specified by the attacker-controlled path.</li>
<li>Sensitive information from the targeted file is read by the server.</li>
<li>The server returns the content of the file, or an error message indicating the file content, to the attacker.</li>
<li>The attacker obtains sensitive information, potentially leading to further exploitation, such as privilege escalation or data exfiltration.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to read arbitrary files on the server. This could lead to the disclosure of sensitive information, such as configuration files, source code, or user data. The CVSS v3.1 score of 7.3 indicates a high severity, highlighting the potential for significant impact. The lack of specifics regarding victim count and sectors targeted in the source information makes it difficult to quantify the precise scale of potential damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply any available patches or updates for elinsky execution-system-mcp to address CVE-2026-7319.</li>
<li>Implement input validation and sanitization measures to prevent path traversal attacks within the <code>_get_context_file_path</code> function.</li>
<li>Deploy the Sigma rule provided to detect exploitation attempts by monitoring for suspicious path traversal sequences in HTTP requests to the <code>add_action</code> tool.</li>
<li>Monitor web server logs for requests containing path traversal sequences such as &ldquo;../&rdquo; and ensure proper logging of access attempts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>path-traversal</category><category>web-application</category><category>cve-2026-7319</category></item><item><title>SourceCodester Pharmacy Sales and Inventory System SQL Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-pharmacy-sqli/</link><pubDate>Tue, 28 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-pharmacy-sqli/</guid><description>A remote SQL injection vulnerability exists in SourceCodester Pharmacy Sales and Inventory System 1.0 via manipulation of the ID parameter in the /ajax.php?action=delete_category endpoint, potentially leading to unauthorized data access or modification.</description><content:encoded><![CDATA[<p>A SQL injection vulnerability has been identified in SourceCodester Pharmacy Sales and Inventory System version 1.0. The vulnerability resides within the <code>/ajax.php?action=delete_category</code> endpoint, where a manipulation of the <code>ID</code> argument can lead to arbitrary SQL command execution. This allows remote attackers to potentially bypass authentication, access sensitive data, modify database contents, or even compromise the entire system. Given the availability of a published exploit, this vulnerability poses a significant risk to organizations utilizing the affected software. Successful exploitation requires no authentication.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies an instance of SourceCodester Pharmacy Sales and Inventory System 1.0.</li>
<li>Attacker crafts a malicious HTTP request targeting the <code>/ajax.php?action=delete_category</code> endpoint.</li>
<li>The attacker injects SQL code into the <code>ID</code> parameter of the request.</li>
<li>The application fails to properly sanitize the input, passing the malicious SQL code to the database.</li>
<li>The database executes the attacker-controlled SQL query.</li>
<li>Depending on the injected SQL, the attacker can read sensitive data from the database (e.g., user credentials, financial records).</li>
<li>The attacker could also modify data, such as altering inventory levels or creating unauthorized accounts.</li>
<li>Ultimately, the attacker could gain full control of the database and the application.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability could result in unauthorized access to sensitive patient data, financial records, and other confidential information stored within the Pharmacy Sales and Inventory System database. Attackers could potentially modify data, leading to incorrect inventory levels, fraudulent transactions, or even complete system compromise. This could result in significant financial losses, reputational damage, and legal repercussions for affected organizations. Given that the exploit is public, organizations using this software are at immediate risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply input validation and sanitization to the <code>ID</code> parameter within the <code>/ajax.php?action=delete_category</code> endpoint to prevent SQL injection (reference CVE-2026-7130).</li>
<li>Deploy the provided Sigma rule to detect suspicious requests to the <code>/ajax.php?action=delete_category</code> endpoint containing potential SQL injection attempts.</li>
<li>Implement regular security audits and penetration testing to identify and remediate vulnerabilities in web applications.</li>
<li>Restrict database access privileges to the minimum necessary for each user and application to limit the potential impact of a successful SQL injection attack.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sqli</category><category>web-application</category><category>cve-2026-7130</category></item><item><title>ChatGPTNextWeb NextChat Server-Side Request Forgery Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-nextchat-ssrf/</link><pubDate>Tue, 28 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-nextchat-ssrf/</guid><description>A server-side request forgery (SSRF) vulnerability in ChatGPTNextWeb NextChat up to version 2.16.1 allows remote attackers to manipulate the proxyHandler function, potentially leading to unauthorized internal resource access.</description><content:encoded><![CDATA[<p>A server-side request forgery (SSRF) vulnerability, identified as CVE-2026-7177, affects ChatGPTNextWeb NextChat up to version 2.16.1. The vulnerability resides within the <code>proxyHandler</code> function in the <code>app/api/[provider]/[...path]/route.ts</code> file. Publicly available exploits demonstrate that a remote attacker can manipulate this function to make unauthorized requests to internal resources. The project maintainers were notified, but have not yet responded to the issue, increasing the risk of widespread exploitation. This vulnerability allows attackers to potentially access sensitive information or internal services that are not intended to be exposed to the internet.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a NextChat instance running a vulnerable version (&lt;= 2.16.1).</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>app/api/[provider]/[...path]/route.ts</code> endpoint.</li>
<li>The crafted request manipulates the <code>proxyHandler</code> function parameters.</li>
<li>The <code>proxyHandler</code> function, without proper validation, forwards the manipulated request to an internal server or resource.</li>
<li>The internal server processes the request as if it originated from the NextChat server itself.</li>
<li>The internal server returns the response to the NextChat server.</li>
<li>The NextChat server forwards the response from the internal server back to the attacker.</li>
<li>The attacker gains access to potentially sensitive information or can interact with internal services due to the SSRF vulnerability.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SSRF vulnerability allows attackers to potentially access internal resources, including sensitive data or internal services not intended for public access. While the CVSS score is 7.3 (HIGH), the impact is limited to information disclosure and limited modification/availability of resources. The number of affected instances is currently unknown. If successfully exploited, attackers could potentially use the compromised NextChat instance as a proxy to further compromise the internal network.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply input validation and sanitization to the <code>proxyHandler</code> function within <code>app/api/[provider]/[...path]/route.ts</code> to prevent malicious manipulation (Reference: CVE-2026-7177).</li>
<li>Monitor web server logs for unusual requests targeting the <code>app/api</code> endpoint with potentially malicious parameters (See example Sigma rule below).</li>
<li>Implement network segmentation to restrict access from the NextChat server to only necessary internal resources (General security best practice related to SSRF).</li>
<li>Deploy the Sigma rules provided to detect exploitation attempts against NextChat instances.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>ssrf</category><category>cve-2026-7177</category><category>web-application</category></item><item><title>AgiFlow scaffold-mcp Path Traversal Vulnerability (CVE-2026-7237)</title><link>https://feed.craftedsignal.io/briefs/2024-01-agiflow-path-traversal/</link><pubDate>Tue, 28 Apr 2026 08:16:02 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-agiflow-path-traversal/</guid><description>A path traversal vulnerability (CVE-2026-7237) exists in AgiFlow scaffold-mcp versions up to 1.0.27, allowing remote attackers to write to arbitrary files by manipulating the file_path argument in the write-to-file tool.</description><content:encoded><![CDATA[<p>AgiFlow scaffold-mcp, a software component with unknown functionality, is vulnerable to a path traversal attack. This vulnerability, identified as CVE-2026-7237, affects versions up to 1.0.27. The vulnerability resides in the <code>packages/scaffold-mcp/src/server/index.ts</code> file, specifically within the &ldquo;write-to-file&rdquo; tool. An attacker can remotely exploit this flaw by manipulating the <code>file_path</code> argument, enabling them to write to arbitrary locations on the server. A patch has been released in version 1.1.0 with commit hash <code>c4d23592ae5fb59cfeefc4641e6826f8ac89b9c6</code> to address this vulnerability. The exploit is publicly available.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies an AgiFlow scaffold-mcp instance running a vulnerable version (&lt;= 1.0.27).</li>
<li>The attacker crafts a malicious request targeting the &ldquo;write-to-file&rdquo; tool.</li>
<li>The request includes a manipulated <code>file_path</code> argument containing path traversal sequences (e.g., &ldquo;../&rdquo;, &ldquo;..\&rdquo;).</li>
<li>The server-side application processes the request without proper sanitization or validation of the <code>file_path</code> argument.</li>
<li>The application attempts to write data to the attacker-controlled file path.</li>
<li>Due to the path traversal sequences, the data is written to an arbitrary location on the server&rsquo;s file system.</li>
<li>The attacker may overwrite critical system files, inject malicious code, or exfiltrate sensitive data, depending on the write permissions and targeted file location.</li>
<li>Successful exploitation leads to arbitrary code execution, data compromise, or denial of service.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7237 allows attackers to write arbitrary files to the affected system, potentially leading to code execution, data exfiltration, or denial of service. The number of affected installations is currently unknown. Due to the public availability of the exploit, organizations using AgiFlow scaffold-mcp are at immediate risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade AgiFlow scaffold-mcp to version 1.1.0 or later to remediate CVE-2026-7237, applying the patch identified by commit hash <code>c4d23592ae5fb59cfeefc4641e6826f8ac89b9c6</code>.</li>
<li>Implement input validation and sanitization on the <code>file_path</code> argument within the &ldquo;write-to-file&rdquo; tool to prevent path traversal attacks.</li>
<li>Deploy the Sigma rule &ldquo;Detect AgiFlow Scaffold-mcp Path Traversal Attempt&rdquo; to identify exploitation attempts in web server logs.</li>
<li>Monitor web server logs for suspicious requests containing path traversal sequences in the URI.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>path-traversal</category><category>cve</category><category>web-application</category></item><item><title>BrowserOperator Core Path Traversal Vulnerability (CVE-2026-7234)</title><link>https://feed.craftedsignal.io/briefs/2026-04-browseroperator-path-traversal/</link><pubDate>Tue, 28 Apr 2026 07:16:04 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-browseroperator-path-traversal/</guid><description>A path traversal vulnerability (CVE-2026-7234) exists in BrowserOperator browser-operator-core up to version 0.6.0, allowing remote attackers to read arbitrary files by manipulating the request.url argument in the startsWith function of scripts/component_server/server.js.</description><content:encoded><![CDATA[<p>A path traversal vulnerability has been identified in BrowserOperator browser-operator-core versions up to 0.6.0. The vulnerability, designated as CVE-2026-7234, resides in the <code>startsWith</code> function within the <code>scripts/component_server/server.js</code> file. By manipulating the <code>request.url</code> argument, an attacker can bypass path restrictions and potentially access sensitive files on the server. The vulnerability can be exploited remotely, and a proof-of-concept exploit is publicly available. The BrowserOperator project has been notified, but a patch has not yet been released. Successful exploitation could lead to information disclosure and unauthorized access to system resources.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable BrowserOperator browser-operator-core instance running a version prior to 0.6.0.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>component_server/server.js</code> endpoint.</li>
<li>The crafted request includes a manipulated <code>request.url</code> argument designed to bypass the <code>startsWith</code> function&rsquo;s intended path restrictions.</li>
<li>The <code>startsWith</code> function fails to properly sanitize or validate the <code>request.url</code> input.</li>
<li>The application uses the attacker-controlled <code>request.url</code> to construct a file path.</li>
<li>The application attempts to read a file based on the constructed path, traversing directories outside of the intended scope.</li>
<li>If successful, the contents of the targeted file are returned to the attacker in the HTTP response.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows a remote attacker to read arbitrary files on the server hosting the BrowserOperator browser-operator-core application. This could lead to the disclosure of sensitive information, including configuration files, credentials, or source code. The lack of response from the project maintainers increases the risk of widespread exploitation, especially given the availability of a public exploit.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Inspect webserver logs for HTTP requests containing path traversal patterns in the URL targeting the <code>component_server/server.js</code> endpoint to detect potential exploitation attempts. Deploy the Sigma rule <code>Detect BrowserOperator Path Traversal Attempt</code> to identify suspicious requests.</li>
<li>Monitor web server logs for unusual file access patterns originating from the BrowserOperator application.</li>
<li>Consider using a web application firewall (WAF) to filter out malicious requests targeting the vulnerable endpoint, mitigating the risk of CVE-2026-7234.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>path-traversal</category><category>web-application</category><category>cve-2026-7234</category></item><item><title>edvardlindelof notes-mcp Path Traversal Vulnerability (CVE-2026-7212)</title><link>https://feed.craftedsignal.io/briefs/2026-04-notes-mcp-path-traversal/</link><pubDate>Tue, 28 Apr 2026 02:16:08 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-notes-mcp-path-traversal/</guid><description>A path traversal vulnerability exists in edvardlindelof notes-mcp up to version 0.1.4, affecting the notes_mcp.py file, allowing a remote attacker to access sensitive files by manipulating the `root_dir/path` argument.</description><content:encoded><![CDATA[<p>A path traversal vulnerability, identified as CVE-2026-7212, affects edvardlindelof notes-mcp version 0.1.4 and earlier. This flaw resides within the <code>notes_mcp.py</code> file, where manipulation of the <code>root_dir/path</code> argument allows unauthorized access to files and directories outside the intended scope. The vulnerability can be exploited remotely and a proof-of-concept exploit is publicly available, increasing the risk of widespread exploitation. The vendor was notified through an issue report but has not yet responded, making timely patching unlikely. Successful exploitation could lead to sensitive data exposure, potentially compromising the entire application and server.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies an instance of <code>notes-mcp</code> running version 0.1.4 or earlier.</li>
<li>The attacker crafts a malicious HTTP request targeting the vulnerable endpoint in <code>notes_mcp.py</code>.</li>
<li>The crafted request includes a manipulated <code>root_dir/path</code> argument containing path traversal sequences (e.g., <code>../</code>) to navigate outside the intended directory.</li>
<li>The application fails to properly sanitize or validate the <code>root_dir/path</code> argument.</li>
<li>The application uses the attacker-controlled path to access files or directories on the server&rsquo;s file system.</li>
<li>The attacker retrieves sensitive data, such as configuration files, application source code, or user data, by reading arbitrary files on the server.</li>
<li>If write access is possible, the attacker may overwrite critical system files.</li>
<li>The attacker uses the exposed information to further compromise the system or gain unauthorized access to other resources.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this path traversal vulnerability can lead to unauthorized access to sensitive files and directories on the affected server. This could result in the disclosure of confidential data, such as user credentials, application source code, or internal configuration details. The vulnerability has a CVSS v3.1 score of 7.3 (HIGH), indicating a significant risk. The number of potential victims is unknown, but any system running the vulnerable version of <code>notes-mcp</code> is at risk. The project&rsquo;s lack of response to the vulnerability report suggests that a patch may not be immediately available, increasing the window of opportunity for attackers.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Inspect web server access logs for suspicious requests containing path traversal sequences like <code>../</code> in the URI targeting <code>notes_mcp.py</code> to identify potential exploitation attempts (see Sigma rule <code>Detect notes-mcp Path Traversal Attempt</code>).</li>
<li>Deploy the provided Sigma rules to your SIEM to detect exploitation attempts targeting this vulnerability.</li>
<li>Monitor network traffic for unusual file access patterns originating from the affected server after potential exploitation.</li>
<li>Since a public exploit is available, prioritize patching or mitigating this vulnerability if you are using the affected software, paying close attention to changes in request patterns and ensuring awareness of CVE-2026-7212.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>path-traversal</category><category>web-application</category><category>CVE-2026-7212</category></item><item><title>Duartium papers-mcp-server Path Traversal Vulnerability (CVE-2026-7205)</title><link>https://feed.craftedsignal.io/briefs/2026-04-duartium-path-traversal/</link><pubDate>Tue, 28 Apr 2026 01:17:16 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-duartium-path-traversal/</guid><description>A path traversal vulnerability exists in the `search_papers` function of `src/main.py` in duartium papers-mcp-server version 9ceb3812a6458ba7922ca24a7406f8807bc55598, allowing remote attackers to read arbitrary files by manipulating the `topic` argument, with a public exploit available.</description><content:encoded><![CDATA[<p>A path traversal vulnerability has been identified in duartium papers-mcp-server, specifically version 9ceb3812a6458ba7922ca24a7406f8807bc55598. The vulnerability resides within the <code>search_papers</code> function located in the <code>src/main.py</code> file. By manipulating the <code>topic</code> argument, a remote attacker can exploit this flaw to traverse the file system and potentially read sensitive files. This vulnerability, identified as CVE-2026-7205, is remotely exploitable and has a publicly available exploit, increasing the risk of widespread exploitation. The project maintainers were notified, but there has been no response or patch released, making immediate defensive measures critical for organizations using this software.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable instance of duartium papers-mcp-server version 9ceb3812a6458ba7922ca24a7406f8807bc55598.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>search_papers</code> function.</li>
<li>Within the HTTP request, the attacker injects a path traversal payload into the <code>topic</code> argument, such as &ldquo;../../etc/passwd&rdquo;.</li>
<li>The server-side application, without proper sanitization, processes the malicious <code>topic</code> argument.</li>
<li>The application attempts to read the file specified by the attacker&rsquo;s path traversal payload (e.g., /etc/passwd).</li>
<li>The server responds with the contents of the requested file, effectively leaking sensitive information to the attacker.</li>
<li>The attacker analyzes the leaked file for sensitive data, such as usernames, passwords, or configuration details.</li>
<li>The attacker uses the obtained information to further compromise the system or network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this path traversal vulnerability allows attackers to read arbitrary files on the affected server. This could lead to the disclosure of sensitive configuration files, user credentials, or source code, potentially leading to further compromise, lateral movement within the network, and data breaches. The lack of a patch and the availability of a public exploit increases the likelihood of widespread exploitation and potential damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule provided in this brief to detect exploitation attempts against the <code>search_papers</code> endpoint, focusing on path traversal payloads in the <code>topic</code> parameter.</li>
<li>Implement input validation and sanitization on the <code>topic</code> parameter within the <code>search_papers</code> function to prevent path traversal attacks.</li>
<li>Monitor web server logs for suspicious requests containing path traversal sequences like &ldquo;../&rdquo; and &ldquo;./&rdquo; in the URI query to detect potential exploitation attempts.</li>
<li>Apply rate limiting to the <code>search_papers</code> endpoint to mitigate potential brute-force path traversal attempts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>path-traversal</category><category>vulnerability</category><category>web-application</category></item><item><title>dubydu sqlite-mcp SQL Injection Vulnerability (CVE-2026-7206)</title><link>https://feed.craftedsignal.io/briefs/2026-04-sqlite-injection/</link><pubDate>Tue, 28 Apr 2026 01:16:02 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-sqlite-injection/</guid><description>A SQL injection vulnerability exists in dubydu sqlite-mcp version 0.1.0 and earlier within the extract_to_json function allowing remote exploitation through manipulation of the output_filename argument.</description><content:encoded><![CDATA[<p>A SQL injection vulnerability, identified as CVE-2026-7206, has been discovered in dubydu&rsquo;s sqlite-mcp software, affecting versions up to 0.1.0. The vulnerability resides within the <code>extract_to_json</code> function located in the <code>src/entry.py</code> file. An attacker can exploit this flaw by manipulating the <code>output_filename</code> argument, leading to the execution of arbitrary SQL commands. This vulnerability is remotely exploitable, meaning an attacker does not need local access to the system. A proof-of-concept exploit is publicly available, increasing the risk of active exploitation. Applying patch <code>a5580cb992f4f6c308c9ffe6442b2e76709db548</code> is the recommended remediation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a vulnerable instance of dubydu sqlite-mcp running a version prior to the patched version.</li>
<li>The attacker crafts a malicious request targeting the <code>extract_to_json</code> function in <code>src/entry.py</code>.</li>
<li>The attacker injects SQL code into the <code>output_filename</code> argument of the request.</li>
<li>The application processes the attacker-supplied <code>output_filename</code> argument without proper sanitization.</li>
<li>The unsanitized input is passed directly to the underlying SQLite database engine.</li>
<li>The SQLite database executes the injected SQL commands, potentially allowing the attacker to read sensitive data, modify data, or execute system commands, depending on the application&rsquo;s privileges and database configuration.</li>
<li>The attacker retrieves the results of the injected SQL query, such as extracted data or confirmation of successful command execution.</li>
<li>The attacker leverages the compromised database to achieve further objectives, such as data exfiltration or privilege escalation.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability (CVE-2026-7206) can allow an attacker to execute arbitrary SQL queries against the underlying SQLite database. This could lead to the disclosure of sensitive information, modification of data, or even complete compromise of the application and the system it resides on. The CVSS v3.1 base score is 7.3, indicating a high severity vulnerability. Given the public availability of an exploit, affected systems are at an elevated risk of attack.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the provided patch <code>a5580cb992f4f6c308c9ffe6442b2e76709db548</code> to remediate CVE-2026-7206.</li>
<li>Implement input validation and sanitization measures to prevent SQL injection attacks, focusing on the <code>output_filename</code> parameter of the <code>extract_to_json</code> function.</li>
<li>Monitor web server logs for suspicious requests targeting the <code>extract_to_json</code> function using the Sigma rule <code>Detect Suspicious sqlite-mcp Requests</code>.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>sql-injection</category><category>cve-2026-7206</category><category>web-application</category></item><item><title>SourceCodester Pharmacy Sales and Inventory System SQL Injection Vulnerability (CVE-2026-7199)</title><link>https://feed.craftedsignal.io/briefs/2026-04-pharmacy-inventory-sqli/</link><pubDate>Tue, 28 Apr 2026 00:16:26 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-pharmacy-inventory-sqli/</guid><description>A SQL injection vulnerability (CVE-2026-7199) exists in SourceCodester Pharmacy Sales and Inventory System 1.0, allowing remote attackers to execute arbitrary SQL commands by manipulating the 'ID' parameter in the `/ajax.php?action=delete_product` endpoint, potentially leading to data breach or system compromise.</description><content:encoded><![CDATA[<p>A SQL injection vulnerability has been identified in SourceCodester Pharmacy Sales and Inventory System version 1.0. This vulnerability, assigned CVE-2026-7199, affects the <code>/ajax.php?action=delete_product</code> endpoint. Attackers can remotely exploit this vulnerability by manipulating the <code>ID</code> parameter. The vulnerability was published on April 27, 2026, and the exploit is now publicly available. Successful exploitation allows attackers to execute arbitrary SQL commands, potentially leading to unauthorized data access, modification, or deletion. Due to the ease of exploitation and the sensitive nature of pharmacy data, this vulnerability poses a significant risk to organizations using the affected system.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable instance of SourceCodester Pharmacy Sales and Inventory System 1.0.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>/ajax.php?action=delete_product</code> endpoint.</li>
<li>The attacker injects SQL code into the <code>ID</code> parameter of the request.</li>
<li>The server-side application fails to properly sanitize the input, passing the malicious SQL code to the database.</li>
<li>The database executes the injected SQL code, potentially allowing the attacker to bypass authentication, access sensitive data, modify database records, or execute system commands.</li>
<li>The attacker retrieves sensitive data, such as patient information, prescription details, or financial records.</li>
<li>The attacker may escalate privileges within the application and the underlying system.</li>
<li>The attacker can then exfiltrate the compromised data or maintain persistent access to the system for future attacks.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability can lead to a complete compromise of the Pharmacy Sales and Inventory System. This can result in the theft of sensitive patient data, financial records, and other confidential information. The vulnerability allows attackers to potentially modify or delete critical data, leading to disruption of pharmacy operations, financial losses, and regulatory penalties. As the exploit is publicly available, the likelihood of widespread exploitation is high, impacting any organization using the vulnerable version of the software.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the Sigma rule <code>Detecting SQL Injection Attempts via URI</code> to identify potential exploitation attempts against the <code>/ajax.php?action=delete_product</code> endpoint.</li>
<li>Inspect web server logs for requests to <code>/ajax.php?action=delete_product</code> containing suspicious characters or SQL keywords in the <code>ID</code> parameter, as detected by the <code>Detecting SQL Injection in Pharmacy System</code> Sigma rule.</li>
<li>Implement input validation and sanitization measures to prevent SQL injection vulnerabilities in the SourceCodester Pharmacy Sales and Inventory System, mitigating the underlying issue.</li>
<li>Restrict access to the database server and sensitive data to only authorized personnel, reducing the potential impact of a successful SQL injection attack.</li>
<li>Monitor database logs for suspicious activity, such as unauthorized data access or modification, which may indicate successful exploitation of CVE-2026-7199.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>cve-2026-7199</category><category>web-application</category></item><item><title>Online Lot Reservation System SQL Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-online-lot-sqli/</link><pubDate>Mon, 27 Apr 2026 15:16:21 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-online-lot-sqli/</guid><description>CVE-2026-7131 is a SQL injection vulnerability in code-projects Online Lot Reservation System up to version 1.0, affecting the /loginuser.php component via manipulation of the email/password arguments, which could allow remote attackers to execute arbitrary SQL queries.</description><content:encoded><![CDATA[<p>A SQL injection vulnerability, identified as CVE-2026-7131, has been discovered in code-projects Online Lot Reservation System version 1.0 and earlier. This vulnerability is located in the <code>/loginuser.php</code> file and can be exploited by manipulating the <code>email</code> and <code>password</code> arguments. Successful exploitation could allow a remote attacker to execute arbitrary SQL commands, potentially leading to unauthorized data access, modification, or deletion. The vulnerability is remotely exploitable and a public exploit is available, increasing the risk of exploitation. Due to the sensitive nature of lot reservation data, organizations using this system are at risk of significant data compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a vulnerable instance of code-projects Online Lot Reservation System version 1.0.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>/loginuser.php</code> file.</li>
<li>Within the request, the attacker injects SQL code into the <code>email</code> or <code>password</code> parameters.</li>
<li>The application fails to properly sanitize the input, passing the malicious SQL code to the database.</li>
<li>The database executes the injected SQL code, treating it as a legitimate query.</li>
<li>The attacker gains unauthorized access to the database, potentially reading sensitive information such as user credentials, reservation details, or financial data.</li>
<li>The attacker may modify or delete data within the database, disrupting the system&rsquo;s functionality.</li>
<li>The attacker can potentially use the compromised database to pivot to other systems or escalate privileges within the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7131 can result in unauthorized access to sensitive data within the Online Lot Reservation System. This could include user credentials, reservation details, and financial information. The vulnerability affects systems running code-projects Online Lot Reservation System up to version 1.0. Due to the availability of a public exploit, the risk of exploitation is elevated. A successful attack could lead to data breaches, financial loss, and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply appropriate input validation and sanitization techniques to prevent SQL injection attacks within the <code>/loginuser.php</code> file.</li>
<li>Deploy the Sigma rule <code>Detect SQL Injection Attempt via Login</code> to identify potential exploitation attempts against the <code>/loginuser.php</code> endpoint.</li>
<li>Monitor web server logs for suspicious requests targeting the <code>/loginuser.php</code> file, specifically looking for SQL syntax within the <code>email</code> or <code>password</code> parameters.</li>
<li>Review and harden database access controls to limit the impact of successful SQL injection attacks.</li>
<li>Implement a web application firewall (WAF) with rules to detect and block SQL injection attempts.</li>
<li>Disable Javascript to ensure complete website functionality.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>web-application</category><category>cve</category></item><item><title>SourceCodester Pharmacy Sales and Inventory System SQL Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-pharmacy-sales-sqli/</link><pubDate>Mon, 27 Apr 2026 06:16:03 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-pharmacy-sales-sqli/</guid><description>SourceCodester Pharmacy Sales and Inventory System 1.0 is vulnerable to SQL injection by manipulating the ID argument in the /ajax.php?action=save_receiving file, allowing remote attackers to execute arbitrary SQL commands.</description><content:encoded><![CDATA[<p>SourceCodester Pharmacy Sales and Inventory System version 1.0 is susceptible to SQL injection. The vulnerability resides in the <code>/ajax.php?action=save_receiving</code> file, where manipulation of the <code>ID</code> argument can lead to arbitrary SQL command execution. This vulnerability allows remote attackers to compromise the application&rsquo;s database. The exploit is publicly available, increasing the risk of exploitation. This vulnerability allows attackers to read, modify, or delete sensitive data, potentially leading to complete system compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable instance of SourceCodester Pharmacy Sales and Inventory System version 1.0.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>/ajax.php?action=save_receiving</code> endpoint.</li>
<li>The attacker injects a SQL payload into the <code>ID</code> parameter of the request.</li>
<li>The web server processes the request and passes the injected SQL query to the database.</li>
<li>The database executes the malicious SQL query, potentially returning sensitive data to the attacker.</li>
<li>The attacker may use the SQL injection to bypass authentication, allowing them to access administrative functions.</li>
<li>The attacker may use the SQL injection to modify inventory data, manipulate sales records, or create fraudulent transactions.</li>
<li>The attacker may use the SQL injection to exfiltrate sensitive data such as customer information, financial records, and administrator credentials.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability can lead to unauthorized access to sensitive data, modification of inventory and sales records, and potentially full control of the application and underlying server. This could result in financial loss, reputational damage, and legal repercussions for affected organizations. Given the public availability of the exploit, the risk of widespread exploitation is high. The impact could include data breaches, financial fraud, and complete system compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detecting SQL Injection Attempts via URI</code> to identify malicious requests targeting the vulnerable endpoint.</li>
<li>Apply input validation and sanitization to the <code>ID</code> parameter in the <code>/ajax.php?action=save_receiving</code> file to prevent SQL injection attacks.</li>
<li>Monitor web server logs for suspicious activity, such as error messages or unusual requests targeting the <code>/ajax.php?action=save_receiving</code> endpoint (webserver log source).</li>
<li>Upgrade to a patched version of the application or implement a web application firewall (WAF) rule to block malicious requests.</li>
<li>Implement least privilege principles for database access to limit the impact of successful SQL injection attacks.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sqli</category><category>web-application</category><category>cve-2026-7088</category></item><item><title>itsourcecode Construction Management System SQL Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-construction-management-sql-injection/</link><pubDate>Mon, 27 Apr 2026 02:16:01 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-construction-management-sql-injection/</guid><description>A SQL injection vulnerability exists in itsourcecode Construction Management System version 1.0, affecting the processing of the /locations.php file, allowing a remote attacker to inject SQL commands by manipulating the 'address' argument, with a publicly available exploit.</description><content:encoded><![CDATA[<p>A SQL injection vulnerability has been identified in itsourcecode Construction Management System version 1.0. The vulnerability resides within the <code>/locations.php</code> file and is triggered by manipulating the <code>address</code> argument. This allows a remote attacker to inject arbitrary SQL commands into the application&rsquo;s database queries. This poses a significant risk as successful exploitation could lead to unauthorized data access, modification, or deletion, potentially compromising the entire system. The vulnerability has been assigned CVE-2026-7075, and a public exploit is available, increasing the likelihood of exploitation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies an instance of itsourcecode Construction Management System 1.0.</li>
<li>Attacker sends a crafted HTTP request to <code>/locations.php</code> with a malicious SQL payload embedded in the <code>address</code> parameter.</li>
<li>The application fails to properly sanitize the <code>address</code> parameter.</li>
<li>The unsanitized input is incorporated into an SQL query.</li>
<li>The database executes the attacker-controlled SQL query.</li>
<li>The attacker extracts sensitive data from the database.</li>
<li>Attacker may use the injected queries to modify or delete data.</li>
<li>The attacker compromises the confidentiality, integrity, and availability of the Construction Management System.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability (CVE-2026-7075) can lead to unauthorized access to sensitive data, including user credentials, financial records, and project details stored within the Construction Management System database. Attackers could potentially modify or delete critical data, disrupt business operations, or gain complete control over the application and its underlying infrastructure. Given the public availability of the exploit, organizations using the affected version of itsourcecode Construction Management System are at immediate risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to detect suspicious HTTP requests to <code>/locations.php</code> containing potentially malicious SQL syntax in the <code>cs-uri-query</code> (webserver logs).</li>
<li>Implement input validation and sanitization for the <code>address</code> parameter in <code>/locations.php</code> to prevent SQL injection attacks.</li>
<li>Monitor web server logs for unusual activity, especially requests targeting <code>/locations.php</code> with long or complex <code>address</code> parameters.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>web-application</category><category>cve-2026-7075</category></item><item><title>CodePanda Source canteen_management_system SQL Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-canteen-sql-injection/</link><pubDate>Mon, 27 Apr 2026 01:16:16 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-canteen-sql-injection/</guid><description>A SQL injection vulnerability exists in CodePanda Source canteen_management_system version 1.0 within the /api/login.php file by manipulating the Username argument, allowing remote attackers to execute arbitrary SQL commands.</description><content:encoded><![CDATA[<p>A SQL injection vulnerability has been identified in CodePanda Source canteen_management_system version 1.0. The vulnerability resides in the <code>/api/login.php</code> file and is triggered by manipulating the <code>Username</code> argument. This allows a remote attacker to inject arbitrary SQL commands into the application&rsquo;s database queries. Public exploits are available, increasing the risk of exploitation. Successful exploitation could lead to unauthorized data access, modification, or deletion, potentially compromising the entire application and its underlying database. The affected version is 1.0, and there are no known mitigations other than patching or taking the system offline.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a CodePanda Source canteen_management_system version 1.0 instance accessible over the network.</li>
<li>The attacker sends a crafted HTTP POST request to <code>/api/login.php</code> with a malicious SQL payload in the <code>Username</code> parameter.</li>
<li>The application fails to properly sanitize the <code>Username</code> input before incorporating it into an SQL query.</li>
<li>The injected SQL code is executed against the application&rsquo;s database.</li>
<li>The attacker uses SQL injection techniques such as <code>UNION SELECT</code> to extract sensitive data from the database.</li>
<li>The extracted data, which may include usernames, passwords, and other confidential information, is sent back to the attacker.</li>
<li>The attacker uses the compromised credentials to gain unauthorized access to the application&rsquo;s administrative interface.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability could allow attackers to read sensitive data, modify existing records, or even execute arbitrary code on the database server. This could lead to a complete compromise of the application and its underlying data. Given the nature of a canteen management system, potential data breaches could include personal information of employees or customers, financial data related to transactions, and internal operational details. The impact may be amplified if the database stores other sensitive information, leading to significant financial and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Inspect web server logs for POST requests to <code>/api/login.php</code> containing SQL syntax within the <code>Username</code> parameter to detect potential exploitation attempts (see example rule below).</li>
<li>Apply input validation and sanitization to all user-supplied input, especially the <code>Username</code> parameter in <code>/api/login.php</code>, to prevent SQL injection.</li>
<li>Monitor database logs for unusual or unauthorized SQL queries originating from the application to identify potential breaches resulting from SQL injection.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>cve-2026-7072</category><category>web-application</category></item><item><title>SQL Injection Vulnerability in code-projects Inventory Management System 1.0</title><link>https://feed.craftedsignal.io/briefs/2026-04-inventory-sql-injection/</link><pubDate>Mon, 27 Apr 2026 01:16:15 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-inventory-sql-injection/</guid><description>A SQL injection vulnerability exists in code-projects Inventory Management System 1.0 within the Login component, specifically affecting the Username argument, where a remote attacker can manipulate the Username parameter, leading to unauthorized data access or modification.</description><content:encoded><![CDATA[<p>A SQL injection vulnerability has been identified in code-projects Inventory Management System version 1.0. The vulnerability resides within the Login component and is triggered by manipulating the Username argument. Successful exploitation allows a remote attacker to inject malicious SQL queries, potentially leading to unauthorized access to sensitive data, modification of existing records, or even complete database takeover. The vulnerability, identified as CVE-2026-7070, has a CVSS v3.1 score of 7.3, indicating a high severity. Publicly available exploits exist, increasing the risk of widespread exploitation. This vulnerability poses a significant threat to organizations using the affected Inventory Management System, potentially leading to data breaches and financial losses.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a login form within the code-projects Inventory Management System 1.0.</li>
<li>The attacker crafts a malicious SQL injection payload within the Username field of the login form.</li>
<li>The attacker submits the crafted payload through an HTTP POST request to the login endpoint.</li>
<li>The application fails to properly sanitize or validate the input provided in the Username field.</li>
<li>The unsanitized input is directly incorporated into an SQL query executed against the backend database.</li>
<li>The injected SQL code modifies the intended query, allowing the attacker to bypass authentication or extract data.</li>
<li>The database server executes the modified SQL query, potentially returning sensitive information to the attacker or allowing unauthorized data manipulation.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability can have severe consequences. An attacker can gain unauthorized access to sensitive inventory data, customer information, and financial records. Data modification can lead to incorrect inventory levels, disrupted operations, and financial losses. In a worst-case scenario, the attacker could gain complete control over the database server, leading to a full system compromise. This vulnerability impacts organizations using code-projects Inventory Management System 1.0, potentially affecting their reputation, financial stability, and customer trust.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect SQL Injection Attempts in Web Logs</code> to identify potential exploitation attempts targeting the Username field in web server logs.</li>
<li>Apply input validation and sanitization to the Username field in the Login component of code-projects Inventory Management System 1.0 to mitigate CVE-2026-7070.</li>
<li>Monitor web server logs for unusual SQL syntax or error messages indicative of SQL injection attempts based on the <code>Detect SQL Injection Attempts in Web Logs</code> Sigma rule.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>web-application</category><category>vulnerability</category></item><item><title>code-projects Employee Management System SQL Injection Vulnerability (CVE-2026-7063)</title><link>https://feed.craftedsignal.io/briefs/2026-04-ems-sqli/</link><pubDate>Sun, 26 Apr 2026 23:16:21 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-ems-sqli/</guid><description>CVE-2026-7063 is a SQL Injection vulnerability in code-projects Employee Management System 1.0 via the 'pwd' parameter in /370project/process/eprocess.php, enabling remote attackers to execute arbitrary SQL commands.</description><content:encoded><![CDATA[<p>A SQL injection vulnerability, identified as CVE-2026-7063, has been discovered in code-projects Employee Management System version 1.0. The vulnerability resides within the <code>/370project/process/eprocess.php</code> file, specifically affecting the <code>pwd</code> argument. Successful exploitation allows a remote attacker to inject and execute arbitrary SQL commands against the application&rsquo;s database. Given that the exploit is publicly available, organizations using this system are at immediate risk of unauthorized data access, modification, or deletion. The affected component is the endpoint processing user input, making it a critical point of failure if not properly secured. This vulnerability poses a significant threat due to its ease of exploitation and potential for widespread data compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies an instance of code-projects Employee Management System 1.0 accessible over the network.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>/370project/process/eprocess.php</code> endpoint.</li>
<li>Within the HTTP request, the attacker manipulates the <code>pwd</code> parameter, injecting SQL code within the parameter&rsquo;s value.</li>
<li>The server-side code improperly sanitizes or validates the injected SQL code within the <code>pwd</code> parameter.</li>
<li>The application executes the attacker-controlled SQL query against the database.</li>
<li>The attacker bypasses authentication or gains elevated privileges through the successful SQL injection.</li>
<li>The attacker extracts sensitive data from the database, such as user credentials or financial records.</li>
<li>The attacker may modify or delete data within the database, leading to data corruption or denial of service.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability (CVE-2026-7063) can lead to complete compromise of the affected Employee Management System. An attacker can gain unauthorized access to sensitive employee data, including personal information, salaries, and performance reviews. The attacker could modify or delete critical data, disrupt business operations, or use the compromised system as a launchpad for further attacks within the organization&rsquo;s network. Given the public availability of the exploit, organizations failing to address this vulnerability are at a high risk of experiencing a data breach and associated financial and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Inspect web server logs for suspicious POST requests to <code>/370project/process/eprocess.php</code> containing SQL syntax in the <code>pwd</code> parameter to identify potential exploitation attempts.</li>
<li>Deploy the provided Sigma rule to detect exploitation attempts targeting the vulnerable <code>pwd</code> parameter in the <code>eprocess.php</code> file.</li>
<li>Apply input validation and sanitization to the <code>pwd</code> parameter in <code>/370project/process/eprocess.php</code> to prevent SQL injection, addressing CVE-2026-7063.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sqli</category><category>cve-2026-7063</category><category>web-application</category></item><item><title>KLiK SocialMediaWebsite SQL Injection Vulnerability (CVE-2026-7002)</title><link>https://feed.craftedsignal.io/briefs/2026-04-klik-sqli/</link><pubDate>Sun, 26 Apr 2026 14:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-klik-sqli/</guid><description>KLiK SocialMediaWebsite up to version 1.0.1 is vulnerable to SQL injection via manipulation of the c_id argument in the /includes/get_message_ajax.php file, specifically affecting the Private Message Handler component, which can be exploited remotely.</description><content:encoded><![CDATA[<p>KLiK SocialMediaWebsite version 1.0.1 and earlier is susceptible to a SQL injection vulnerability (CVE-2026-7002) affecting the Private Message Handler component. This vulnerability resides within the <code>/includes/get_message_ajax.php</code> file, and is triggered by manipulating the <code>c_id</code> argument. The attack can be launched remotely without authentication, potentially allowing unauthorized access to sensitive data within the application&rsquo;s database. Defenders should prioritize identifying and mitigating this vulnerability to prevent potential data breaches and unauthorized access to user information. The vulnerability was published on April 25, 2026.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a KLiK SocialMediaWebsite instance running version 1.0.1 or earlier.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>/includes/get_message_ajax.php</code> endpoint.</li>
<li>The attacker injects a SQL payload into the <code>c_id</code> parameter of the HTTP request.</li>
<li>The web server processes the request and passes the malicious SQL query to the database.</li>
<li>The database executes the injected SQL query without proper sanitization, leading to unintended data retrieval or modification.</li>
<li>The attacker retrieves sensitive information from the database, such as user credentials or private messages.</li>
<li>The attacker may use the stolen credentials to gain unauthorized access to user accounts.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability can lead to unauthorized access to sensitive data stored in the KLiK SocialMediaWebsite database. This could include user credentials, private messages, and other personal information. An attacker could potentially gain complete control over the application&rsquo;s data, leading to data breaches, identity theft, and other malicious activities. Given the wide use of social media platforms, a successful attack could affect a large number of users.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply any available patches or updates for KLiK SocialMediaWebsite to address CVE-2026-7002.</li>
<li>Implement proper input validation and sanitization techniques to prevent SQL injection attacks.</li>
<li>Deploy the Sigma rule to detect attempts to exploit this SQL injection vulnerability by monitoring web server logs for suspicious requests targeting <code>/includes/get_message_ajax.php</code> with potentially malicious SQL payloads in the <code>c_id</code> parameter.</li>
<li>Monitor web server logs for HTTP requests to <code>/includes/get_message_ajax.php</code> containing SQL keywords (e.g., <code>SELECT</code>, <code>UNION</code>, <code>UPDATE</code>, <code>INSERT</code>, <code>DELETE</code>) in the <code>c_id</code> parameter.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>vulnerability</category><category>web-application</category></item><item><title>PicoClaw Web Launcher Management Plane Command Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-picoclaw-cmd-injection/</link><pubDate>Sat, 25 Apr 2026 17:16:33 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-picoclaw-cmd-injection/</guid><description>PicoClaw version 0.2.4 is vulnerable to command injection via the /api/gateway/restart endpoint of the Web Launcher Management Plane, allowing a remote attacker to execute arbitrary commands by manipulating input.</description><content:encoded><![CDATA[<p>A command injection vulnerability exists in PicoClaw version 0.2.4, specifically affecting the <code>/api/gateway/restart</code> endpoint within the Web Launcher Management Plane component. This flaw allows unauthenticated remote attackers to inject and execute arbitrary commands on the underlying system. The vulnerability, identified as CVE-2026-6987, stems from improper neutralization of special elements in the input to the <code>/api/gateway/restart</code> function. The project maintainers were notified through an issue report, but as of the time of disclosure, no response or patch has been released. This vulnerability poses a significant risk, potentially leading to full system compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable PicoClaw instance running version 0.2.4.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>/api/gateway/restart</code> endpoint.</li>
<li>Within the request, the attacker injects OS commands into a parameter processed by the vulnerable function.</li>
<li>The PicoClaw application fails to properly sanitize the attacker-supplied input.</li>
<li>The application executes the injected commands with the privileges of the web server process.</li>
<li>The attacker gains arbitrary code execution on the server.</li>
<li>The attacker uses the initial foothold to escalate privileges, potentially gaining root access.</li>
<li>The attacker installs malware, exfiltrates sensitive data, or performs other malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this command injection vulnerability allows a remote attacker to execute arbitrary commands on the affected system. This could lead to complete system compromise, data theft, or denial of service. Given the nature of command injection, the attacker may be able to escalate privileges and gain full control over the server. The number of potential victims is unknown, but any PicoClaw installation running version 0.2.4 exposed to the network is at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply available patches for PicoClaw as soon as they are released to remediate CVE-2026-6987.</li>
<li>Implement input validation and sanitization on the <code>/api/gateway/restart</code> endpoint to prevent command injection.</li>
<li>Deploy the Sigma rule <code>Detect Suspicious PicoClaw Restart Requests</code> to monitor for exploitation attempts.</li>
<li>Monitor web server logs for unusual activity or suspicious commands executed via HTTP requests, correlating with requests to <code>/api/gateway/restart</code>.</li>
<li>Consider using a web application firewall (WAF) to filter malicious requests targeting the <code>/api/gateway/restart</code> endpoint.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>command-injection</category><category>vulnerability</category><category>web-application</category></item><item><title>vanna-ai vanna Improper Authorization Vulnerability (CVE-2026-6977)</title><link>https://feed.craftedsignal.io/briefs/2026-04-vanna-ai-authz-bypass/</link><pubDate>Sat, 25 Apr 2026 11:16:19 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-vanna-ai-authz-bypass/</guid><description>An improper authorization vulnerability (CVE-2026-6977) exists in vanna-ai vanna up to version 2.0.2 due to manipulation of an unknown function within the Legacy Flask API, potentially allowing remote attackers to bypass intended access restrictions.</description><content:encoded><![CDATA[<p>A security vulnerability, identified as CVE-2026-6977, has been discovered in vanna-ai vanna versions up to 2.0.2. The vulnerability resides within an unspecified function of the Legacy Flask API component. Successful exploitation of this flaw leads to improper authorization, potentially granting unauthorized access to sensitive resources or functionalities. The vulnerability is remotely exploitable and a proof-of-concept exploit is publicly available. The vendor was contacted but did not respond. This vulnerability poses a risk to systems utilizing the affected versions of vanna-ai vanna, as attackers could leverage it to bypass intended access controls.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable vanna-ai vanna instance running version 2.0.2 or earlier.</li>
<li>Attacker crafts a malicious HTTP request targeting the Legacy Flask API. The specific endpoint and parameters involved are not defined in the source material.</li>
<li>The crafted request exploits the improper authorization vulnerability (CVE-2026-6977) within the Legacy Flask API.</li>
<li>Due to the improper authorization flaw, the attacker&rsquo;s request bypasses the intended access controls.</li>
<li>The vulnerable application grants the attacker unauthorized access to resources or functionalities that should be restricted.</li>
<li>Depending on the accessed resources, the attacker may gain access to sensitive data, modify system settings, or perform other unauthorized actions.</li>
<li>The attacker may escalate privileges or move laterally within the affected system if further vulnerabilities exist or if the compromised application has elevated permissions.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-6977 allows a remote attacker to bypass authorization checks in vanna-ai vanna, potentially leading to unauthorized access to sensitive data or functionality. Given that a public exploit exists, organizations utilizing affected versions of vanna-ai vanna are at increased risk. The lack of vendor response further exacerbates the risk, as no official patch or mitigation guidance is available.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for suspicious activity targeting the Legacy Flask API in vanna-ai vanna, using a webserver category Sigma rule focused on unusual HTTP requests.</li>
<li>Apply generic hardening and input validation techniques to mitigate the impact of potential exploits targeting web applications.</li>
<li>Investigate and validate the activity from the VulDB references provided in this brief.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>vulnerability</category><category>authorization</category><category>web application</category></item><item><title>OpenClaw Cross-Site Request Forgery Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-openclaw-csrf/</link><pubDate>Fri, 24 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-openclaw-csrf/</guid><description>OpenClaw before 2026.3.31 is vulnerable to cross-site request forgery (CSRF) attacks due to missing browser-origin validation in HTTP operator endpoints when operating in trusted-proxy mode, allowing attackers to perform unauthorized actions.</description><content:encoded><![CDATA[<p>OpenClaw before version 2026.3.31 is susceptible to Cross-Site Request Forgery (CSRF) attacks. The vulnerability lies in the lack of browser-origin validation within the HTTP operator endpoints when the application operates in trusted-proxy mode. This allows an attacker to craft malicious HTTP requests originating from a user&rsquo;s browser to perform unauthorized actions within the OpenClaw application. Successful exploitation of this vulnerability enables attackers to execute privileged operations, potentially leading to data modification or unauthorized access to sensitive functionalities. This vulnerability requires the application to be deployed in trusted-proxy mode to be exploitable.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious HTML page containing a forged HTTP request targeting a vulnerable OpenClaw HTTP operator endpoint.</li>
<li>The attacker hosts the malicious HTML page on a website or delivers it through phishing.</li>
<li>A victim user, authenticated to the OpenClaw application, visits the malicious HTML page in their browser.</li>
<li>The victim&rsquo;s browser automatically sends the forged HTTP request to the vulnerable OpenClaw endpoint.</li>
<li>Because the OpenClaw application lacks proper browser-origin validation, it processes the forged request.</li>
<li>The attacker is able to perform unauthorized actions as the authenticated user.</li>
<li>The attacker can modify user configurations or exfiltrate data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this CSRF vulnerability in OpenClaw can lead to unauthorized modification of application settings, data manipulation, or even complete account takeover. While specific victim numbers are unavailable, the impact extends to any organization utilizing OpenClaw in a trusted-proxy deployment scenario. The vulnerability can potentially compromise data integrity and confidentiality, leading to significant operational disruptions.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade OpenClaw to version 2026.3.31 or later to patch CVE-2026-41347.</li>
<li>Deploy the Sigma rule below to detect suspicious HTTP requests lacking proper origin validation within your web server logs.</li>
<li>Implement proper CSRF protection mechanisms, such as synchronizer tokens, in OpenClaw&rsquo;s HTTP operator endpoints.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>csrf</category><category>web-application</category><category>vulnerability</category></item><item><title>Xerte Online Toolkits Unauthenticated Remote Code Execution via File Upload</title><link>https://feed.craftedsignal.io/briefs/2026-04-xerte-rce/</link><pubDate>Thu, 23 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-xerte-rce/</guid><description>Xerte Online Toolkits 3.15 and earlier contain an incomplete input validation vulnerability allowing unauthenticated attackers to upload malicious PHP code with a '.php4' extension, leading to arbitrary operating system command execution on the server.</description><content:encoded><![CDATA[<p>Xerte Online Toolkits, a platform used for creating online learning materials, is vulnerable to unauthenticated remote code execution (RCE). Specifically, versions 3.15 and earlier contain an incomplete input validation vulnerability within the elFinder connector endpoint. This flaw allows an attacker to bypass existing file extension filters and upload PHP files with a &lsquo;.php4&rsquo; extension. Combined with authentication bypass and path traversal vulnerabilities, this can lead to arbitrary operating system command execution on the underlying server. This vulnerability, identified as CVE-2026-34415, poses a significant risk to organizations using affected versions of Xerte Online Toolkits, potentially allowing attackers to gain complete control of the web server.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker sends a crafted HTTP request to the elFinder connector endpoint.</li>
<li>The attacker exploits an authentication bypass vulnerability to gain unauthorized access to file upload functionality.</li>
<li>The attacker leverages a path traversal vulnerability to specify a writable directory for the uploaded file.</li>
<li>The attacker uploads a malicious PHP file disguised with a &lsquo;.php4&rsquo; extension, bypassing the incomplete input validation.</li>
<li>The server saves the malicious PHP file to the specified directory.</li>
<li>The attacker sends another HTTP request to directly access the uploaded PHP file via its URL.</li>
<li>The web server executes the PHP code within the uploaded file, granting the attacker arbitrary code execution.</li>
<li>The attacker can now execute operating system commands on the server, potentially leading to data theft, system compromise, or further malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an unauthenticated attacker to execute arbitrary operating system commands on the affected Xerte Online Toolkits server. Given the high CVSS score of 9.8, this vulnerability is considered critical. If exploited, an attacker could potentially gain full control of the server, leading to data breaches, defacement of the website, or the use of the compromised server as a launchpad for further attacks within the network. The number of potentially affected installations is currently unknown.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Xerte Online Toolkits to a patched version greater than 3.15 to remediate CVE-2026-34415.</li>
<li>Implement the Sigma rule &ldquo;Detect Suspicious PHP4 Uploads&rdquo; to identify potential exploitation attempts by monitoring web server logs for &lsquo;.php4&rsquo; file uploads.</li>
<li>Review web server access logs for unusual requests to PHP files located in unexpected directories, which may indicate exploitation attempts.</li>
<li>Monitor web server logs for requests to the elFinder connector endpoint that include suspicious parameters or file extensions.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-34415</category><category>rce</category><category>file-upload</category><category>web-application</category></item><item><title>Daptin SQL Injection Vulnerability in Aggregate API</title><link>https://feed.craftedsignal.io/briefs/2026-04-daptin-sql-injection/</link><pubDate>Thu, 23 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-daptin-sql-injection/</guid><description>A SQL injection vulnerability exists in Daptin versions prior to 0.11.4 within the `/aggregate/:typename` endpoint, where the `column` and `group` query parameters are passed to `goqu.L()` without validation, allowing authenticated users to inject arbitrary SQL expressions and exfiltrate sensitive data.</description><content:encoded><![CDATA[<p>Daptin versions prior to 0.11.4 are susceptible to a SQL injection vulnerability in the <code>/aggregate/:typename</code> endpoint. The vulnerability arises because the application fails to properly validate the <code>column</code> and <code>group</code> query parameters before passing them to <code>goqu.L()</code>. This function is used to build raw SQL literal expressions, thus bypassing parameterization and allowing attackers to inject arbitrary SQL code. Any authenticated user, regardless of privilege level, can exploit this vulnerability. This poses a significant risk as it enables unauthorized data extraction, disclosure of database internals, and cross-table data exfiltration. The vulnerability was reported on 2026-04-22 and assigned CVE-2026-41422.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker authenticates to the Daptin application with valid credentials.</li>
<li>The attacker crafts a malicious HTTP GET request targeting the <code>/aggregate/:typename</code> endpoint.</li>
<li>The attacker injects a SQL payload into the <code>column</code> or <code>group</code> query parameters. For example, <code>column=(SELECT group_concat(email) FROM user_account) as leak</code>.</li>
<li>The Daptin application receives the request and passes the unvalidated <code>column</code> parameter to the <code>goqu.L()</code> function in <code>server/resource/resource_aggregate.go</code>.</li>
<li>The <code>goqu.L()</code> function constructs a raw SQL query using the attacker-controlled input, bypassing any parameterization.</li>
<li>The malicious SQL query is executed against the database.</li>
<li>The attacker retrieves the injected SQL query&rsquo;s result from the application&rsquo;s response, which contains sensitive data.</li>
<li>The attacker exfiltrates the extracted data, potentially including user credentials, internal database schema details, or other confidential information.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability allows attackers to perform unauthorized data extraction, including sensitive information like user credentials. An attacker can also disclose database internals and exfiltrate data from multiple tables, even with low-privilege access. The impact includes potential data breaches, compliance violations, and reputational damage. The vulnerability was confirmed to allow extraction of <code>user_account.email</code> values by a non-admin user.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Daptin to version 0.11.4 or later to patch the SQL injection vulnerability (CVE-2026-41422).</li>
<li>Deploy the provided Sigma rule <code>Detect Daptin Aggregate API SQL Injection</code> to identify exploitation attempts in web server logs.</li>
<li>If upgrading is not immediately feasible, implement input validation on the <code>column</code> and <code>group</code> parameters in the <code>/aggregate/:typename</code> endpoint, specifically blocking SQL keywords and functions to mitigate the risk.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>web-application</category></item><item><title>SiYuan Path Traversal via Double URL Encoding in `/export/` Endpoint</title><link>https://feed.craftedsignal.io/briefs/2026-04-siyuan-path-traversal/</link><pubDate>Wed, 22 Apr 2026 20:55:31 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-siyuan-path-traversal/</guid><description>SiYuan is vulnerable to path traversal via double URL encoding in the `/export/` endpoint, bypassing an incomplete fix for CVE-2026-30869; an authenticated attacker can exploit this vulnerability to traverse directories and read arbitrary workspace files, including the SQLite database (`siyuan.db`), kernel log, and user documents due to a redundant `url.PathUnescape()` call in `serveExport()`.</description><content:encoded><![CDATA[<p>SiYuan is vulnerable to a path traversal vulnerability (CVE-2026-30869) due to a redundant <code>url.PathUnescape()</code> call within the <code>serveExport()</code> function. The vulnerability exists in versions prior to 3.6.5. This flaw allows an authenticated attacker, including low-privilege users with Publish/Reader roles, to bypass intended security restrictions and access sensitive files stored within the SiYuan workspace. The initial fix attempted with <code>IsSensitivePath()</code> proved insufficient as it did not address the core issue of double URL decoding. An attacker can exploit this vulnerability by using double URL encoded characters in a crafted HTTP request, allowing them to read arbitrary files such as the complete SQLite document database (<code>siyuan.db</code>), kernel logs, and other critical files.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An authenticated attacker sends a GET request to the <code>/export/</code> endpoint with a double URL encoded path, such as <code>/export/%252e%252e/siyuan.db</code>.</li>
<li>The Go HTTP server decodes the initial layer of URL encoding, transforming <code>%25</code> into <code>%</code>, resulting in a path like <code>/export/%2e%2e/siyuan.db</code>.</li>
<li>The path cleaner does not recognize <code>%2e%2e</code> as directory traversal, so it passes through.</li>
<li>The <code>serveExport()</code> function then calls <code>url.PathUnescape()</code> on the path, decoding <code>%2e%2e</code> into <code>..</code>.</li>
<li>The <code>filepath.Join()</code> function concatenates the <code>exportBaseDir</code> with the now decoded path, e.g., <code>&lt;workspace&gt;/../siyuan.db</code>.</li>
<li>The <code>IsSensitivePath()</code> check fails to block the request because it doesn&rsquo;t account for the decoded path or specific database files in the <code>temp/</code> directory.</li>
<li>The attacker successfully retrieves the contents of the <code>siyuan.db</code> file, which contains the complete document database.</li>
<li>The attacker repeats the process to access other sensitive files within the workspace, such as <code>siyuan.log</code>, <code>blocktree.db</code>, and <code>asset_content.db</code>.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to exfiltrate sensitive data, including the entire SQLite document database, potentially containing all user documents, attributes, and search indexes. The attacker can also access the kernel log, which may contain internal server paths, versions, configuration details, and error messages. This information disclosure could lead to further compromise of the system. While the number of victims is unknown, any SiYuan instance running a version prior to 3.6.5 is potentially vulnerable.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade SiYuan to version 3.6.5 or later to remediate the vulnerability.</li>
<li>Deploy the provided Sigma rule <code>Detect SiYuan Path Traversal Attempt</code> to detect attempts to exploit this vulnerability by monitoring for double URL encoded characters in requests to the <code>/export/</code> endpoint.</li>
<li>Monitor web server logs for requests to the <code>/export/</code> endpoint containing <code>%252e%252e</code> to identify potential exploitation attempts.</li>
<li>Consider implementing a more robust path validation mechanism within the <code>serveExport()</code> function that properly handles URL decoding and directory traversal attempts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>path-traversal</category><category>web-application</category><category>siYuan</category></item><item><title>FreeScout Incorrect Authorization Vulnerability via Save Draft</title><link>https://feed.craftedsignal.io/briefs/2026-04-freescout-auth-bypass/</link><pubDate>Wed, 22 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-freescout-auth-bypass/</guid><description>FreeScout before 1.8.215 has an incorrect authorization vulnerability where a direct POST request to the `save_draft` AJAX path can create a draft inside a hidden conversation when `APP_SHOW_ONLY_ASSIGNED_CONVERSATIONS` is enabled, potentially allowing unauthorized access or modification of data.</description><content:encoded><![CDATA[<p>FreeScout is a self-hosted help desk and shared mailbox platform. Prior to version 1.8.215, a vulnerability exists related to authorization controls when the <code>APP_SHOW_ONLY_ASSIGNED_CONVERSATIONS</code> setting is enabled. Specifically, the <code>save_draft</code> AJAX endpoint lacks proper authorization checks. This allows an attacker to potentially bypass intended access restrictions and create drafts within conversations that they should not be able to access, leading to unauthorized modification or viewing of conversation data. This vulnerability was addressed in version 1.8.215.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a FreeScout instance running a version prior to 1.8.215 with <code>APP_SHOW_ONLY_ASSIGNED_CONVERSATIONS</code> enabled.</li>
<li>Attacker authenticates to the FreeScout instance with a valid, but unauthorized user account.</li>
<li>Attacker identifies the conversation ID of a conversation they are not assigned to and cannot normally access via the UI.</li>
<li>Attacker crafts a POST request to the <code>/index.php?m=conversations&amp;a=save_draft</code> endpoint, including the conversation ID and the draft content they wish to create.</li>
<li>The server, lacking proper authorization checks on the <code>save_draft</code> endpoint, accepts the POST request.</li>
<li>A draft is created within the targeted conversation, associated with the attacker&rsquo;s user account.</li>
<li>The attacker, or potentially other unauthorized users who later gain access to the attacker&rsquo;s account, can view or modify the drafted content, potentially exfiltrating sensitive information.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows unauthorized users to create drafts within conversations they are not assigned to. This could lead to the unauthorized viewing or modification of sensitive information contained within the conversations, potentially leading to data breaches or compliance violations. The vulnerability affects FreeScout instances running versions prior to 1.8.215 with the specific <code>APP_SHOW_ONLY_ASSIGNED_CONVERSATIONS</code> setting enabled.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade FreeScout to version 1.8.215 or later to remediate the vulnerability (references: <a href="https://github.com/freescout-help-desk/freescout/releases/tag/1.8.215)">https://github.com/freescout-help-desk/freescout/releases/tag/1.8.215)</a>.</li>
<li>Monitor web server logs for POST requests to the <code>/index.php?m=conversations&amp;a=save_draft</code> endpoint originating from unusual IP addresses or user agents using the Sigma rule provided below.</li>
<li>Implement web application firewall (WAF) rules to filter or block unauthorized POST requests to the vulnerable endpoint.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>cve</category><category>authorization</category><category>web application</category></item><item><title>Vvveb CMS 1.0.8 Remote Code Execution via Malicious Upload</title><link>https://feed.craftedsignal.io/briefs/2026-04-vvveb-rce/</link><pubDate>Tue, 21 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-vvveb-rce/</guid><description>Vvveb CMS 1.0.8 is vulnerable to remote code execution, allowing authenticated attackers to upload a PHP webshell with a .phtml extension, bypass extension restrictions, and execute arbitrary operating system commands by requesting the uploaded file.</description><content:encoded><![CDATA[<p>Vvveb CMS version 1.0.8 is susceptible to a remote code execution (RCE) vulnerability (CVE-2026-6249) due to insufficient input validation in the media upload handler. An authenticated attacker can exploit this flaw by uploading a malicious PHP webshell disguised with a <code>.phtml</code> extension, which bypasses the server&rsquo;s intended extension deny-list. The uploaded webshell is then accessible within the publicly available media directory. By crafting a specific HTTP request to access the uploaded <code>.phtml</code> file, the attacker can trigger the execution of arbitrary operating system commands on the server, leading to a complete compromise of the system. This vulnerability poses a significant threat to organizations utilizing Vvveb CMS 1.0.8, potentially enabling attackers to steal sensitive data, disrupt services, or establish a persistent foothold within the network.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker authenticates to the Vvveb CMS 1.0.8 instance.</li>
<li>The attacker accesses the media upload functionality within the CMS.</li>
<li>The attacker uploads a malicious PHP webshell file, named with a <code>.phtml</code> extension, crafted to execute operating system commands.</li>
<li>The CMS stores the uploaded <code>.phtml</code> file in the publicly accessible media directory.</li>
<li>The attacker crafts an HTTP request targeting the uploaded <code>.phtml</code> file in the media directory.</li>
<li>The web server executes the PHP code within the <code>.phtml</code> file upon receiving the attacker&rsquo;s HTTP request.</li>
<li>The PHP code executes arbitrary operating system commands, as defined by the attacker in the webshell.</li>
<li>The attacker gains complete control of the server, potentially leading to data theft, service disruption, or persistent access.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-6249 allows an attacker to execute arbitrary operating system commands on the Vvveb CMS server. This could lead to a full compromise of the system, including the theft of sensitive data stored in the CMS database, modification of website content, or the deployment of malicious software. Organizations using Vvveb CMS 1.0.8 are at risk of data breaches, financial losses, and reputational damage if this vulnerability is exploited.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Vvveb CMS to a patched version that addresses CVE-2026-6249.</li>
<li>Implement strict input validation and sanitization on all file upload functionalities to prevent the upload of malicious files.</li>
<li>Configure the web server to prevent the execution of PHP code within the media directory.</li>
<li>Deploy the Sigma rule <code>Detect Suspicious PHTML Request</code> to identify attempts to access <code>.phtml</code> files in the media directory.</li>
<li>Monitor web server logs for suspicious HTTP requests targeting unusual file extensions in media directories.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-6249</category><category>rce</category><category>web-application</category></item><item><title>Rowboatlabs Rowboat Improper Authentication Vulnerability (CVE-2026-6635)</title><link>https://feed.craftedsignal.io/briefs/2026-04-rowboat-auth-bypass/</link><pubDate>Mon, 20 Apr 2026 12:16:09 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-rowboat-auth-bypass/</guid><description>An improper authentication vulnerability in rowboatlabs rowboat &lt;=0.1.67 allows remote attackers to bypass authentication by manipulating the X-Tools-JWE argument in the tool_call function, potentially leading to unauthorized access and control.</description><content:encoded><![CDATA[<p>A critical security flaw, identified as CVE-2026-6635, has been discovered in rowboatlabs rowboat, specifically in versions up to and including 0.1.67. This vulnerability resides within the <code>tool_call</code> function located in the <code>apps/experimental/tools_webhook/app.py</code> file of the <code>tools_webhook</code> component.  The vulnerability stems from the improper handling of the <code>X-Tools-JWE</code> argument, which can be manipulated by a remote attacker to bypass authentication mechanisms. This flaw allows attackers to potentially gain unauthorized access and execute arbitrary actions within the application. Public exploits are available, increasing the urgency for mitigation. The vendor was notified but has not responded.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable instance of rowboatlabs rowboat version 0.1.67 or earlier.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>tool_call</code> function.</li>
<li>Within the HTTP request, the attacker manipulates the <code>X-Tools-JWE</code> argument with a crafted payload designed to bypass authentication checks.</li>
<li>The vulnerable <code>tool_call</code> function fails to properly validate the manipulated <code>X-Tools-JWE</code> argument.</li>
<li>The application grants the attacker unauthorized access based on the bypassed authentication.</li>
<li>The attacker leverages the unauthorized access to execute actions normally restricted to authenticated users.</li>
<li>Depending on the application&rsquo;s functionality, this could involve data exfiltration, modification, or execution of arbitrary code.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-6635 can lead to complete compromise of the rowboatlabs rowboat application. Attackers can gain unauthorized access to sensitive data, modify application settings, or even execute arbitrary code on the server. Due to the ease of exploitation with public exploits available, all instances of vulnerable rowboat versions are at immediate risk. The specific impact depends on the application&rsquo;s role and the data it handles, but potential consequences include data breaches, service disruption, and financial loss.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply appropriate input validation to <code>X-Tools-JWE</code> argument using <code>tool_call</code> function within <code>apps/experimental/tools_webhook/app.py</code> to prevent improper authentication (CVE-2026-6635).</li>
<li>Deploy the Sigma rule <code>Detect Rowboat Authentication Bypass Attempt via X-Tools-JWE Manipulation</code> to detect exploitation attempts.</li>
<li>Monitor web server logs for HTTP requests targeting the <code>tool_call</code> function with unusual <code>X-Tools-JWE</code> values.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-6635</category><category>authentication bypass</category><category>web application</category></item><item><title>Metasoft MetaCRM SQL Injection Vulnerability (CVE-2026-6629)</title><link>https://feed.craftedsignal.io/briefs/2026-04-metasoft-crm-sql-injection/</link><pubDate>Mon, 20 Apr 2026 11:16:18 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-metasoft-crm-sql-injection/</guid><description>A SQL injection vulnerability (CVE-2026-6629) exists in Metasoft MetaCRM up to version 6.4.0, allowing remote attackers to execute arbitrary SQL commands via manipulation of the sql argument in the Statement.executeUpdate function of the sql.jsp file.</description><content:encoded><![CDATA[<p>A SQL injection vulnerability, identified as CVE-2026-6629, has been discovered in Metasoft 美特软件 MetaCRM versions up to 6.4.0. The vulnerability resides within the <code>sql.jsp</code> file, specifically affecting the <code>Statement.executeUpdate</code> function of the Interface component. The vulnerability allows remote attackers to inject arbitrary SQL commands by manipulating the <code>sql</code> argument. Public exploit code is available, increasing the risk of exploitation. The vendor was notified but did not respond. This vulnerability poses a significant threat to organizations using the affected MetaCRM versions, potentially leading to data breaches, system compromise, and unauthorized access.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a Metasoft MetaCRM instance running a vulnerable version (&lt;= 6.4.0).</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>sql.jsp</code> file.</li>
<li>Within the HTTP request, the attacker manipulates the <code>sql</code> parameter to inject SQL code.</li>
<li>The crafted SQL injection payload is passed to the <code>Statement.executeUpdate</code> function.</li>
<li>The application executes the attacker-controlled SQL query against the underlying database.</li>
<li>The database server executes the malicious SQL command.</li>
<li>The attacker can read sensitive data from the database, modify existing data, or execute administrative commands.</li>
<li>The attacker gains unauthorized access to the system, potentially leading to complete system compromise or data exfiltration.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability can lead to a range of severe consequences, including unauthorized data access, data modification, and complete system compromise. Attackers could steal sensitive customer data, financial records, or intellectual property. They might also be able to modify existing data to cause financial losses or disrupt business operations. The lack of vendor response exacerbates the risk, as no official patch or mitigation is available. The CVSS score of 7.3 reflects the high potential impact of this vulnerability.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Inspect web server logs for suspicious POST requests targeting <code>sql.jsp</code> with potentially malicious SQL queries in the <code>sql</code> parameter to detect exploitation attempts. Reference the Sigma rule <code>Detect-Metasoft-MetaCRM-SQL-Injection</code>.</li>
<li>Deploy the Sigma rule <code>Detect-Metasoft-MetaCRM-SQL-Error</code> to detect SQL errors that may indicate injection attempts.</li>
<li>Apply input validation and sanitization to the <code>sql</code> parameter in <code>sql.jsp</code> to prevent SQL injection. This requires modifying the application code.</li>
<li>Monitor network traffic for unusual database activity originating from the web server, such as large data transfers or unauthorized access attempts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-6629</category><category>sql-injection</category><category>web-application</category><category>metasoft</category></item><item><title>Digiwin EasyFlow .NET SQL Injection Vulnerability (CVE-2026-5964)</title><link>https://feed.craftedsignal.io/briefs/2026-04-easyflow-sqli/</link><pubDate>Mon, 20 Apr 2026 08:16:10 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-easyflow-sqli/</guid><description>Digiwin's EasyFlow .NET is susceptible to a SQL Injection vulnerability, enabling unauthenticated remote attackers to inject arbitrary SQL commands for unauthorized database access, modification, and deletion.</description><content:encoded><![CDATA[<p>EasyFlow .NET, a product developed by Digiwin, is affected by a critical SQL Injection vulnerability (CVE-2026-5964). This flaw allows unauthenticated remote attackers to inject arbitrary SQL commands into the application&rsquo;s database queries. This can lead to the unauthorized reading, modification, or deletion of sensitive database contents. The vulnerability poses a significant risk, as it requires no prior authentication and can be exploited remotely. Public reports detailing the vulnerability were released in April 2026, and exploitation attempts are anticipated to increase. Defenders should prioritize patching and implementing detection mechanisms to mitigate potential exploitation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies an EasyFlow .NET instance exposed to the internet.</li>
<li>The attacker crafts a malicious HTTP request containing SQL injection payloads within a vulnerable parameter.</li>
<li>The EasyFlow .NET application fails to properly sanitize the input, passing the malicious SQL query to the database.</li>
<li>The database executes the injected SQL command, potentially revealing sensitive data.</li>
<li>The attacker extracts data from the database, such as user credentials or proprietary information.</li>
<li>The attacker leverages the SQL injection to modify database records, such as escalating privileges or injecting malicious code.</li>
<li>The attacker may delete data from the database, leading to denial of service or data loss.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL Injection vulnerability allows unauthenticated attackers to read, modify, and delete data within the EasyFlow .NET database. This can lead to the compromise of sensitive information, including user credentials, financial data, and proprietary business information. Modified data can disrupt business operations or facilitate further attacks. Data deletion can cause significant data loss and system instability. Due to the critical nature of the vulnerability and the ease of exploitation, organizations using EasyFlow .NET are at high risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the patch or upgrade to the latest version of EasyFlow .NET provided by Digiwin to remediate CVE-2026-5964.</li>
<li>Deploy the Sigma rule &ldquo;Detect Suspicious SQL Injection Attempts in HTTP Requests&rdquo; to identify exploitation attempts targeting web servers.</li>
<li>Implement input validation and parameterized queries to prevent SQL injection vulnerabilities in web applications.</li>
<li>Monitor web server logs for suspicious HTTP requests containing common SQL injection keywords.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>sql-injection</category><category>vulnerability</category><category>web-application</category></item><item><title>liangliangyy DjangoBlog Hardcoded Cryptographic Key Vulnerability (CVE-2026-6580)</title><link>https://feed.craftedsignal.io/briefs/2026-04-djangoblog-hardcoded-key/</link><pubDate>Sun, 19 Apr 2026 23:16:33 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-djangoblog-hardcoded-key/</guid><description>CVE-2026-6580 describes a vulnerability in liangliangyy DjangoBlog up to version 2.1.0.0 where manipulation of the 'key' argument in the Amap API Call Handler leads to the use of a hard-coded cryptographic key, enabling remote exploitation.</description><content:encoded><![CDATA[<p>A critical security vulnerability, CVE-2026-6580, has been identified in liangliangyy DjangoBlog, specifically versions up to 2.1.0.0. The flaw resides within the Amap API Call Handler in the <code>owntracks/views.py</code> file. By manipulating the <code>key</code> argument during API calls, a remote attacker can force the application to use a hard-coded cryptographic key. This vulnerability allows unauthorized access or modification of data that relies on this key for security. The exploit is publicly available, increasing the risk of widespread exploitation. The vendor has been notified but has not provided a response or patch.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable DjangoBlog instance running a version up to 2.1.0.0.</li>
<li>The attacker crafts a malicious HTTP request targeting the Amap API Call Handler (<code>owntracks/views.py</code>).</li>
<li>The crafted request includes a manipulated <code>key</code> argument.</li>
<li>The DjangoBlog application processes the request and, due to the vulnerability, uses the hard-coded cryptographic key.</li>
<li>The attacker leverages the hard-coded key to bypass authentication or authorization checks.</li>
<li>The attacker gains unauthorized access to sensitive data or functionality protected by the Amap API.</li>
<li>The attacker potentially modifies data or performs actions on behalf of legitimate users.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-6580 allows attackers to bypass authentication, potentially leading to unauthorized data access, data modification, or complete system compromise. This could affect all users of the DjangoBlog instance. Given the availability of a public exploit, unpatched systems are at high risk of being targeted.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Inspect web server logs for requests targeting <code>owntracks/views.py</code> with unusual <code>key</code> parameter values to detect potential exploitation attempts (see the Sigma rule below).</li>
<li>Apply a patch as soon as it becomes available from the vendor to remediate CVE-2026-6580.</li>
<li>Implement input validation and sanitization for the <code>key</code> parameter in the Amap API Call Handler to prevent exploitation (mitigation, not detection).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-6580</category><category>djangoblog</category><category>hardcoded-key</category><category>web-application</category></item><item><title>liangliangyy DjangoBlog Authentication Bypass Vulnerability (CVE-2026-6577)</title><link>https://feed.craftedsignal.io/briefs/2026-04-djangoblog-auth-bypass/</link><pubDate>Sun, 19 Apr 2026 20:16:28 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-djangoblog-auth-bypass/</guid><description>A critical authentication bypass vulnerability in liangliangyy DjangoBlog up to version 2.1.0.0 (CVE-2026-6577) allows remote attackers to inject arbitrary GPS data without authentication via the logtracks endpoint, potentially leading to data manipulation and unauthorized access.</description><content:encoded><![CDATA[<p>CVE-2026-6577 is an authentication bypass vulnerability affecting liangliangyy DjangoBlog versions up to 2.1.0.0. The vulnerability exists within an unknown function of the <code>owntracks/views.py</code> file related to the <code>logtracks</code> endpoint. Due to missing authentication, a remote attacker can inject arbitrary GPS data without proper authorization. This can lead to manipulation of location data, unauthorized access to location-based features, and potentially further compromise of the application. A public exploit for this vulnerability is available, increasing the risk of exploitation. This vulnerability poses a significant threat to organizations using DjangoBlog, potentially impacting data integrity and confidentiality.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a DjangoBlog instance running a vulnerable version (&lt;= 2.1.0.0).</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>/owntracks/views.py</code> <code>logtracks</code> endpoint.</li>
<li>The malicious request injects arbitrary GPS data, bypassing the authentication mechanisms.</li>
<li>The DjangoBlog application processes the crafted request without proper authentication checks.</li>
<li>The injected GPS data is stored and associated with a user or device, potentially overwriting legitimate data.</li>
<li>The attacker gains unauthorized access to location-based features or data due to the injected GPS coordinates.</li>
<li>The attacker leverages the compromised location data to perform further malicious activities, such as tracking user movements or manipulating location-based services.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-6577 allows attackers to inject arbitrary GPS data into vulnerable DjangoBlog instances. This can lead to the manipulation of user location data, potentially impacting location-based services and features. An attacker can track user movements, access restricted resources based on location, or even impersonate legitimate users. Given the availability of a public exploit, unpatched DjangoBlog instances are at high risk of compromise, potentially affecting hundreds of deployments. The lack of vendor response exacerbates the risk, as no official patch or mitigation is available.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect Suspicious GPS Data Injection</code> to your SIEM to identify exploitation attempts targeting the <code>logtracks</code> endpoint (logsource: webserver).</li>
<li>Inspect web server logs for requests to <code>/owntracks/views.py</code> with unusual parameters or patterns, potentially indicating malicious GPS data injection (logsource: webserver).</li>
<li>Monitor application logs for any anomalies related to GPS data processing or location-based services, which might be signs of successful exploitation (logsource: webserver).</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-6577</category><category>djangoblog</category><category>authentication-bypass</category><category>gps-injection</category><category>web-application</category></item><item><title>osuuu LightPicture Hardcoded Credentials Vulnerability (CVE-2026-6574)</title><link>https://feed.craftedsignal.io/briefs/2026-04-lightpicture-hardcoded-creds/</link><pubDate>Sun, 19 Apr 2026 14:16:11 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-lightpicture-hardcoded-creds/</guid><description>CVE-2026-6574 allows remote attackers to manipulate the 'key' argument in the /public/install/lp.sql file via the API Upload Endpoint in osuuu LightPicture &lt;= 1.2.2, leading to hardcoded credentials exposure.</description><content:encoded><![CDATA[<p>osuuu LightPicture, up to version 1.2.2, is vulnerable to a hardcoded credentials exposure vulnerability (CVE-2026-6574). This flaw resides within the API Upload Endpoint and is triggered when processing the <code>/public/install/lp.sql</code> file. An attacker can manipulate the <code>key</code> argument to exploit this vulnerability. The vendor has been notified about the vulnerability but has not responded. Public exploits are available, increasing the risk of exploitation. This vulnerability allows an attacker to potentially gain unauthorized access and control over the application.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies an instance of osuuu LightPicture running version 1.2.2 or earlier.</li>
<li>The attacker crafts a malicious HTTP request targeting the API Upload Endpoint.</li>
<li>The request includes a modified <code>key</code> argument within the <code>/public/install/lp.sql</code> file path.</li>
<li>The application processes the crafted request without proper sanitization.</li>
<li>Due to the manipulated <code>key</code> argument, the application exposes hardcoded credentials.</li>
<li>The attacker retrieves the exposed hardcoded credentials from the server&rsquo;s response.</li>
<li>The attacker leverages the acquired credentials to authenticate and gain unauthorized access to the application.</li>
<li>With unauthorized access, the attacker can perform malicious activities such as data theft, modification, or deletion.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-6574 can lead to complete compromise of the osuuu LightPicture application and potentially the underlying server. The vulnerability exposes hardcoded credentials, enabling attackers to bypass authentication and gain administrative privileges. The impact includes unauthorized access to sensitive data, modification of application settings, and potential disruption of service. The vulnerability affects all installations of osuuu LightPicture up to version 1.2.2.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect Suspicious LP.SQL Access</code> to identify attempts to access the vulnerable file (log source: webserver).</li>
<li>Apply input validation and sanitization to the <code>key</code> argument within the API Upload Endpoint to prevent manipulation (reference CVE-2026-6574).</li>
<li>Monitor web server logs for suspicious requests targeting the <code>/public/install/lp.sql</code> file with unusual parameters (log source: webserver).</li>
<li>If upgrading is not possible, implement a web application firewall (WAF) rule to block requests containing malicious patterns in the <code>key</code> argument (log source: firewall).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-6574</category><category>hardcoded-credentials</category><category>web-application</category></item><item><title>WeGIA SQL Injection Vulnerability (CVE-2026-40285)</title><link>https://feed.craftedsignal.io/briefs/2026-04-wegia-sqli/</link><pubDate>Sat, 18 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-wegia-sqli/</guid><description>WeGIA versions prior to 3.6.10 are vulnerable to SQL injection via the cpf_usuario POST parameter, allowing authenticated users to query the database under an arbitrary identity.</description><content:encoded><![CDATA[<p>WeGIA, a web manager for charitable institutions, is susceptible to a SQL injection vulnerability affecting versions prior to 3.6.10. This flaw, identified as CVE-2026-40285, resides in the <code>dao/memorando/UsuarioDAO.php</code> file. The vulnerability stems from the insecure handling of the <code>cpf_usuario</code> POST parameter within the <code>DespachoControle::verificarDespacho()</code> function, where the <code>extract($_REQUEST)</code> function overwrites the session-stored user identity. An attacker can then manipulate the <code>cpf_usuario</code> value, which is subsequently interpolated directly into a raw SQL query. This allows an authenticated user to execute arbitrary SQL queries with the privileges of an arbitrary user, potentially gaining unauthorized access to sensitive data. WeGIA version 3.6.10 addresses and resolves this critical vulnerability.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker authenticates to the WeGIA web application.</li>
<li>The attacker crafts a malicious HTTP POST request targeting the endpoint associated with <code>DespachoControle::verificarDespacho()</code>.</li>
<li>The crafted POST request includes the <code>cpf_usuario</code> parameter with a SQL injection payload.</li>
<li>The <code>extract($_REQUEST)</code> function processes the POST data, overwriting the legitimate session-stored user identity with the attacker-controlled <code>cpf_usuario</code> value.</li>
<li>The application constructs a raw SQL query, directly interpolating the malicious <code>cpf_usuario</code> value into the query string without proper sanitization.</li>
<li>The database executes the crafted SQL query, effectively querying the database as an arbitrary user specified by the attacker in the <code>cpf_usuario</code> parameter.</li>
<li>The application returns the results of the injected SQL query to the attacker, potentially revealing sensitive information.</li>
<li>The attacker can leverage the SQL injection to perform unauthorized data retrieval, modification, or deletion within the WeGIA application.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability (CVE-2026-40285) allows attackers to bypass authentication and access sensitive data within the WeGIA application. This could lead to the compromise of user accounts, financial records, or other confidential information managed by charitable institutions using WeGIA. The impact could range from data breaches and financial losses to reputational damage and legal repercussions for the affected organizations. The CVSS v3.1 base score of 8.8 indicates a high level of severity.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade WeGIA installations to version 3.6.10 or later to remediate CVE-2026-40285.</li>
<li>Deploy the following Sigma rule to detect exploitation attempts by monitoring for POST requests containing potentially malicious SQL injection payloads in the <code>cpf_usuario</code> parameter.</li>
<li>Implement input validation and sanitization measures for all user-supplied data, especially within the <code>DespachoControle::verificarDespacho()</code> function to prevent future SQL injection vulnerabilities.</li>
<li>Review web server logs for suspicious POST requests targeting WeGIA endpoints to identify potential exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>wegia</category><category>sql-injection</category><category>cve-2026-40285</category><category>web-application</category></item><item><title>PraisonAI Multiple Backends Vulnerable to SQL Injection via Unvalidated Table Prefix</title><link>https://feed.craftedsignal.io/briefs/2026-04-praisonai-sqli/</link><pubDate>Sat, 18 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-praisonai-sqli/</guid><description>PraisonAI is vulnerable to SQL injection across nine database backends due to unsanitized `table_prefix` parameters, and in PostgreSQL due to an unsanitized `schema` parameter, enabling arbitrary SQL execution.</description><content:encoded><![CDATA[<p>PraisonAI, a software application, contains a critical SQL injection vulnerability affecting nine of its conversation store backends, including MySQL, PostgreSQL, and others. The vulnerability stems from the improper handling of the <code>table_prefix</code> parameter, which is passed directly into SQL queries without adequate validation. Specifically, backends such as MySQL, PostgreSQL, async SQLite/MySQL/PostgreSQL, Turso, SingleStore, Supabase, and SurrealDB are affected. In addition, the PostgreSQL backend is vulnerable due to the unvalidated <code>schema</code> parameter. This flaw allows an attacker to inject arbitrary SQL commands, potentially gaining unauthorized access to sensitive data. The incomplete fix for CVE-2026-40315 only addressed the SQLite backend, leaving other backends exposed. This vulnerability exists in PraisonAI versions 4.5.148 and earlier, as well as PraisonAI Agents versions 1.6.7 and earlier.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a PraisonAI instance where the <code>table_prefix</code> or <code>schema</code> (PostgreSQL) parameter is derived from external input (e.g., API request, user-modifiable configuration).</li>
<li>The attacker crafts a malicious <code>table_prefix</code> or <code>schema</code> string containing SQL injection payload (e.g., &ldquo;x&rsquo;; DROP TABLE users; &ndash;&rdquo;).</li>
<li>The attacker injects the malicious <code>table_prefix</code> or <code>schema</code> via the vulnerable input vector.</li>
<li>The PraisonAI application receives the crafted <code>table_prefix</code> or <code>schema</code> and incorporates it into a dynamically generated SQL query without proper sanitization.</li>
<li>The application executes the malicious SQL query against the database.</li>
<li>The attacker&rsquo;s injected SQL commands are executed, potentially allowing them to read, modify, or delete data within the database.</li>
<li>The attacker gains unauthorized access to sensitive data, such as user credentials, financial information, or other confidential data.</li>
<li>The attacker may escalate privileges, compromise other systems, or perform further malicious activities within the affected environment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability enables attackers to execute arbitrary SQL commands, potentially leading to complete database compromise. The attacker can read sensitive data, modify existing records, inject malicious code, or even drop entire tables. This can result in significant data loss, financial damage, and reputational harm for affected organizations. This vulnerability is exploitable in any deployment where the <code>table_prefix</code> is derived from external input, such as in multi-tenant setups or API-driven configurations. The PostgreSQL <code>schema</code> parameter provides an additional injection point, further expanding the attack surface.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply input validation and sanitization to the <code>table_prefix</code> parameter in all database backends, mirroring the fix implemented for <code>sqlite.py</code> as described in the overview.</li>
<li>Apply input validation and sanitization to the <code>schema</code> parameter in the PostgreSQL backend, as noted in the overview.</li>
<li>Deploy the Sigma rule <code>Detect Malicious Table Prefix</code> to detect attempts to exploit this vulnerability in MySQL and PostgreSQL backends, as detailed below.</li>
<li>Upgrade PraisonAI to a version that includes proper input validation for <code>table_prefix</code> and <code>schema</code> parameters, targeting versions later than 4.5.148 for PraisonAI and later than 1.6.7 for PraisonAI Agents.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>praisonai</category><category>web-application</category></item><item><title>YesWiki Authenticated SQL Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-24-yeswiki-sqli/</link><pubDate>Sat, 18 Apr 2026 01:00:30 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-24-yeswiki-sqli/</guid><description>YesWiki is vulnerable to authenticated SQL Injection via the id_fiche parameter in the EntryManager::formatDataBeforeSave() function, allowing attackers to inject arbitrary SQL commands and potentially extract sensitive data.</description><content:encoded><![CDATA[<p>YesWiki versions 4.6.0 and earlier are vulnerable to SQL injection in the bazar module. This vulnerability exists in <code>tools/bazar/services/EntryManager.php</code> within the <code>formatDataBeforeSave()</code> function. The <code>$data['id_fiche']</code> value, derived from the <code>$_POST['id_fiche']</code> parameter, is directly concatenated into a raw SQL query without proper sanitization. An authenticated attacker can exploit this by sending a crafted POST request to the <code>/api/entries/{formId}</code> endpoint. Successful exploitation enables time-based blind SQL injection, potentially leading to complete database compromise. The vulnerability was confirmed using a Docker PoC demonstrating the ability to induce a time delay using the SLEEP() function within the injected SQL.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker authenticates to the YesWiki application as any user. This requires a valid <code>wikini_session</code> cookie.</li>
<li>Attacker crafts a POST request to <code>/api/entries/{formId}</code>, where <code>{formId}</code> is the ID of an existing bazar form.</li>
<li>The POST request includes the <code>id_fiche</code> parameter with a malicious SQL payload, such as <code>' OR SLEEP(3) OR '</code>.</li>
<li><code>ApiController::createEntry()</code> processes the request and calls <code>isEntry($_POST['id_fiche'])</code>.</li>
<li>Since the injected SQL will likely not correspond to an existing entry, the <code>create()</code> method is invoked.</li>
<li>The <code>create()</code> method calls <code>formatDataBeforeSave()</code>, which contains the SQL injection vulnerability at line 704 in <code>EntryManager.php</code>.</li>
<li>The injected SQL payload is executed by the database server via <code>dbService-&gt;loadSingle()</code>, without proper escaping or parameterization.</li>
<li>If successful, the attacker can extract sensitive information from the database, such as usernames, passwords, and other confidential data. They can also modify data within the database.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability can lead to the complete compromise of the YesWiki database. This includes the potential to access and exfiltrate sensitive data, such as user credentials, configuration details, and business-critical information. Attackers can also modify or delete data, leading to data integrity issues and service disruption. Since any authenticated user can trigger the vulnerability, the impact is widespread. The vulnerability affects composer/yeswiki/yeswiki versions 4.6.0 and earlier.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the provided patch in <code>tools/bazar/services/EntryManager.php</code> by escaping the <code>$data['id_fiche']</code> value before using it in the SQL query (see Proposed Fix in Content section).</li>
<li>Deploy the Sigma rule &ldquo;Detect YesWiki SQL Injection Attempt via API Entries&rdquo; to detect attempts to exploit this vulnerability via suspicious <code>id_fiche</code> POST data.</li>
<li>Monitor web server logs for POST requests to <code>/api/entries/*</code> with unusually long or complex <code>id_fiche</code> parameters, as this could indicate a SQL injection attempt.</li>
<li>Review and audit all database queries within the YesWiki application to identify and remediate any other potential SQL injection vulnerabilities.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>yeswiki</category><category>sql-injection</category><category>web-application</category></item><item><title>Movary SSRF Vulnerability (CVE-2026-40348)</title><link>https://feed.craftedsignal.io/briefs/2026-04-movary-ssrf/</link><pubDate>Sat, 18 Apr 2026 00:16:38 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-movary-ssrf/</guid><description>Movary versions before 0.71.1 are vulnerable to server-side request forgery (SSRF) via the `/settings/jellyfin/server-url-verify` endpoint, allowing authenticated users to probe internal network resources.</description><content:encoded><![CDATA[<p>Movary, a self-hosted web application for tracking and rating movies, is susceptible to a Server-Side Request Forgery (SSRF) vulnerability (CVE-2026-40348) in versions prior to 0.71.1. This flaw allows authenticated users to manipulate the <code>/settings/jellyfin/server-url-verify</code> endpoint to initiate server-side HTTP requests to arbitrary internal targets. The application uses the Guzzle HTTP client to send requests based on a user-supplied URL, to which <code>/system/info/public</code> is appended. The absence of input validation on the target URL allows attackers to bypass intended restrictions and access internal network resources. This vulnerability enables threat actors to perform internal reconnaissance activities such as host discovery, port scanning, and service fingerprinting. Successful exploitation can lead to further compromise by exposing internal administrative interfaces or cloud metadata endpoints.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker authenticates to the Movary web application with a valid user account.</li>
<li>The attacker crafts a malicious URL targeting an internal resource, such as <code>http://127.0.0.1/</code>.</li>
<li>The attacker sends a <code>POST</code> request to <code>/settings/jellyfin/server-url-verify</code> with the crafted URL as the <code>serverUrl</code> parameter.</li>
<li>The Movary server receives the request and appends <code>/system/info/public</code> to the user-provided URL.</li>
<li>The Movary server uses the Guzzle HTTP client to initiate an HTTP request to the modified URL (e.g., <code>http://127.0.0.1/system/info/public</code>).</li>
<li>The internal service at the targeted IP address responds to the Movary server.</li>
<li>Based on the HTTP response code and content, the attacker can infer the existence and status of internal services. This allows for port scanning and service fingerprinting.</li>
<li>The attacker leverages discovered services to escalate privileges, potentially accessing sensitive data or internal administrative panels.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of the SSRF vulnerability (CVE-2026-40348) in Movary can enable attackers to discover internal network infrastructure and identify vulnerable services. This can allow attackers to gain unauthorized access to sensitive information, pivot to other internal systems, or perform other malicious activities. Although no specific victim count is given, the impact of this vulnerability is potentially high for any organization using a vulnerable version of Movary.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Movary to version 0.71.1 or later to patch the SSRF vulnerability (CVE-2026-40348).</li>
<li>Deploy the Sigma rule <code>Detect Movary SSRF Attempt</code> to identify potential exploitation attempts in web server logs.</li>
<li>Implement network segmentation and access controls to restrict access to sensitive internal services, limiting the impact of potential SSRF attacks.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>ssrf</category><category>cve-2026-40348</category><category>movary</category><category>web-application</category></item><item><title>Movary Privilege Escalation Vulnerability (CVE-2026-40349)</title><link>https://feed.craftedsignal.io/briefs/2026-04-movary-privesc/</link><pubDate>Sat, 18 Apr 2026 00:16:38 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-movary-privesc/</guid><description>Movary versions prior to 0.71.1 allow authenticated users to escalate privileges to administrator by manipulating the `isAdmin` field via a PUT request to the `/settings/users/{userId}` endpoint, due to missing authorization checks.</description><content:encoded><![CDATA[<p>Movary is a self-hosted web application designed for users to track and rate movies they have watched. Prior to version 0.71.1, the application contains a privilege escalation vulnerability (CVE-2026-40349). An authenticated user could modify their account to gain administrative privileges without proper authorization. This is achieved by sending a PUT request to the <code>/settings/users/{userId}</code> endpoint with the <code>isAdmin</code> field set to <code>true</code>. This vulnerability exists because the application fails to implement sufficient authorization checks before updating the sensitive <code>isAdmin</code> field. Version 0.71.1 addresses this issue, mitigating the risk of unauthorized privilege escalation. The vulnerable versions expose self-hosted Movary instances to potential compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Movary instance with a valid, non-administrative user account.</li>
<li>The attacker identifies the vulnerable <code>/settings/users/{userId}</code> endpoint that manages user profile settings.</li>
<li>The attacker crafts a PUT request to <code>/settings/users/{userId}</code>, substituting <code>{userId}</code> with their own user ID.</li>
<li>The PUT request includes the parameter <code>isAdmin=true</code> within the request body, attempting to modify the user&rsquo;s privilege level.</li>
<li>The Movary server processes the PUT request without performing adequate authorization checks to verify the user&rsquo;s authority to modify the <code>isAdmin</code> field.</li>
<li>The server updates the user&rsquo;s account, setting the <code>isAdmin</code> flag to <code>true</code>, effectively granting the attacker administrative privileges.</li>
<li>The attacker logs out and back into the Movary instance.</li>
<li>Upon re-authentication, the attacker now possesses administrative privileges and can access and modify sensitive data, configurations, and potentially compromise the entire Movary instance.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to gain full administrative control over a Movary instance. This could lead to unauthorized access to user data, modification or deletion of movies and ratings, and potentially complete compromise of the server hosting the application. The number of affected instances is unknown but depends on the number of deployments running vulnerable versions of Movary. The severity is high, as it allows a low-privilege user to gain complete control over the application.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Movary instances to version 0.71.1 or later to remediate the vulnerability (references: Overview section).</li>
<li>Deploy the provided Sigma rule to detect suspicious PUT requests to <code>/settings/users/{userId}</code> attempting to modify the <code>isAdmin</code> parameter (references: Sigma rule below).</li>
<li>Implement input validation and authorization checks on the server-side to prevent unauthorized modification of sensitive user attributes (references: CVE-2026-40349 description).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>privilege-escalation</category><category>web-application</category><category>cve-2026-40349</category></item><item><title>WeGIA Stored Cross-Site Scripting Vulnerability (CVE-2026-40286)</title><link>https://feed.craftedsignal.io/briefs/2026-04-wegia-xss/</link><pubDate>Fri, 17 Apr 2026 21:16:34 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-wegia-xss/</guid><description>A stored Cross-Site Scripting (XSS) vulnerability exists in WeGIA versions prior to 3.6.10, allowing attackers to inject malicious scripts into the 'Member Name' field during member registration, leading to persistent execution upon user access.</description><content:encoded><![CDATA[<p>WeGIA, a web manager for charitable institutions, is vulnerable to Stored Cross-Site Scripting (XSS) in versions prior to 3.6.10. The vulnerability, identified as CVE-2026-40286, resides in the &lsquo;Member Registration&rsquo; function, specifically the &lsquo;Member Name&rsquo; field. Attackers can inject malicious JavaScript code into this field. Because input is not properly validated and sanitized, the injected script is then stored in the application database.  Any user accessing the profile containing the malicious script will have the script executed in their browser.  This can lead to session hijacking, credential theft, or defacement. WeGIA version 3.6.10 addresses this vulnerability by implementing proper input sanitization. This vulnerability was reported on April 17, 2026.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a vulnerable WeGIA instance running a version prior to 3.6.10.</li>
<li>The attacker accesses the &lsquo;Member Registration&rsquo; (Cadastrar Sócio) page.</li>
<li>In the &lsquo;Member Name&rsquo; (Nome Sócio) field, the attacker injects a malicious JavaScript payload (e.g., <code>&lt;script&gt;alert(&quot;XSS&quot;);&lt;/script&gt;</code>).</li>
<li>The attacker submits the registration form.</li>
<li>The WeGIA application stores the malicious payload in the database without proper sanitization.</li>
<li>A legitimate user navigates to a page displaying the compromised &lsquo;Member Name&rsquo; field, such as a member profile page.</li>
<li>The malicious JavaScript code is executed within the user&rsquo;s browser.</li>
<li>The attacker achieves their objective, such as stealing cookies or redirecting the user to a malicious website.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this XSS vulnerability could lead to a range of consequences, including account compromise, data theft, and website defacement. An attacker could steal session cookies and impersonate legitimate users, gaining unauthorized access to sensitive information.  Due to the vulnerability residing in a web application, impact is limited to the users of the application, potentially exposing sensitive information and allowing threat actors the ability to modify the application.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade WeGIA installations to version 3.6.10 or later to remediate CVE-2026-40286.</li>
<li>Implement input validation and sanitization on all user-supplied data, especially in the &lsquo;Member Name&rsquo; field, to prevent XSS attacks.</li>
<li>Deploy the Sigma rule <code>title: &quot;Detect WeGIA XSS Attempt via HTTP Request&quot;</code> to detect potential XSS payloads in HTTP requests.</li>
<li>Enable web server logging and monitor for suspicious activity, such as unusual characters or script tags in HTTP request parameters, to identify potential XSS attempts.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>xss</category><category>web-application</category><category>cve-2026-40286</category></item><item><title>Weblate Improper Privilege Management via API Endpoint (CVE-2026-34393)</title><link>https://feed.craftedsignal.io/briefs/2026-04-weblate-privilege-escalation/</link><pubDate>Thu, 16 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-weblate-privilege-escalation/</guid><description>Weblate versions prior to 5.17 are vulnerable to improper privilege management due to an API endpoint failing to properly limit the scope of edits, potentially leading to unauthorized modifications.</description><content:encoded><![CDATA[<p>Weblate, a web-based localization tool, contains an improper privilege management vulnerability (CVE-2026-34393) affecting versions prior to 5.17. The vulnerability lies in the user patching API endpoint, which doesn&rsquo;t adequately restrict the scope of edits allowed. An attacker with low privileges could potentially exploit this flaw to modify data or settings beyond their authorized permissions. This issue was reported and patched in Weblate version 5.17. Successful exploitation can lead to data integrity issues, unauthorized access to sensitive information, and potentially, complete compromise of the Weblate instance.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker authenticates to Weblate with a low-privileged user account.</li>
<li>Attacker identifies the user patching API endpoint (e.g., <code>/api/users/&lt;user_id&gt;</code>).</li>
<li>Attacker crafts a malicious API request to modify attributes of a different user account, potentially an administrator.</li>
<li>The attacker submits the request to the vulnerable API endpoint, exploiting the lack of proper scope validation.</li>
<li>The Weblate server processes the request without correctly verifying the attacker&rsquo;s authorization to modify the target user&rsquo;s attributes.</li>
<li>The target user&rsquo;s attributes are modified according to the attacker&rsquo;s request, potentially elevating the attacker&rsquo;s privileges or compromising the target user&rsquo;s account.</li>
<li>The attacker leverages the elevated privileges to access sensitive data or perform unauthorized actions within the Weblate system.</li>
<li>Attacker maintains persistent access by creating new admin accounts or backdoors within the Weblate system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-34393 can lead to significant data breaches, unauthorized modifications, and complete compromise of the Weblate instance. An attacker could gain administrative access, modify translations, and potentially inject malicious content into localized software. The number of affected installations is currently unknown, but any Weblate instance running a version prior to 5.17 is vulnerable. Organizations that rely on Weblate for their localization workflows are at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately upgrade Weblate to version 5.17 or later to patch CVE-2026-34393.</li>
<li>Monitor Weblate&rsquo;s web server logs for suspicious API requests targeting the user patching endpoint (<code>/api/users/&lt;user_id&gt;</code>) as described in the Attack Chain (use the Sigma rule provided below).</li>
<li>Review user account permissions and audit logs for any unexpected privilege escalations.</li>
<li>Implement stricter input validation and authorization checks within the Weblate application to prevent similar vulnerabilities in the future.</li>
<li>Deploy the Sigma rule provided below to your SIEM to detect exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>weblate</category><category>privilege-escalation</category><category>web-application</category></item><item><title>wger Broken Access Control in Global Gym Configuration Update Endpoint</title><link>https://feed.craftedsignal.io/briefs/2024-01-09-wger-privesc/</link><pubDate>Thu, 16 Apr 2026 01:35:16 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-09-wger-privesc/</guid><description>The wger application has a broken access control vulnerability in the global gym configuration update endpoint, allowing low-privileged authenticated users to modify installation-wide configuration settings and escalate privileges.</description><content:encoded><![CDATA[<p>The wger application exposes a global configuration edit endpoint at <code>/config/gym-config/edit</code> that is vulnerable to broken access control. The vulnerability exists because the <code>GymConfigUpdateView</code> uses the wrong mixin (<code>WgerFormMixin</code> instead of <code>WgerPermissionMixin</code>), preventing proper enforcement of the <code>config.change_gymconfig</code> permission. This allows a low-privileged authenticated user to modify the global <code>GymConfig</code> singleton (pk=1), triggering server-side side effects via the <code>GymConfig.save()</code> method. This vertical privilege escalation allows unauthorized modification of installation-wide state and bulk updates to other users’ records, violating the intended administrative trust boundary. The vulnerability affects wger versions 2.1 and earlier.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker authenticates to the wger application with a low-privileged user account.</li>
<li>The attacker navigates to the global configuration edit endpoint at <code>/config/gym-config/edit</code>.</li>
<li>The server processes the request via the <code>GymConfigUpdateView</code> which inherits from <code>WgerFormMixin</code>.</li>
<li><code>WgerFormMixin</code> attempts to perform ownership checks but fails because <code>GymConfig</code> does not implement <code>get_owner_object()</code>.</li>
<li>The application allows the attacker to modify the <code>default_gym</code> setting.</li>
<li>The attacker submits the form with a modified <code>default_gym</code> value.</li>
<li>The <code>GymConfig.save()</code> method is called, updating <code>UserProfile</code> records with a gym set to null.</li>
<li>The attacker has successfully modified installation-wide configuration, potentially bulk-updating user records and violating administrative trust boundaries.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows a low-privileged user to escalate privileges and modify global configuration settings. This could lead to unauthorized modification of user profiles and tenant assignments, affecting new registrations and existing users lacking a gym. On deployments with multiple gyms, this vulnerability can result in widespread data manipulation and a violation of the intended administrative trust boundary. The vulnerability affects wger deployments, impacting organizations that rely on the application for managing fitness and exercise data.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the recommended fix by ensuring permission enforcement runs before the form dispatch. Implement the suggested code change in <code>wger/config/views/gym_config.py</code> using the project mixin by updating the inheritance order: <code>class GymConfigUpdateView(WgerPermissionMixin, WgerFormMixin, UpdateView):</code> as described in the advisory.</li>
<li>Deploy the Sigma rule &ldquo;wger GymConfig Update by Low-Privilege User&rdquo; to detect unauthorized modification of the GymConfig object via the <code>/config/gym-config/edit</code> endpoint.</li>
<li>Monitor web server logs for POST requests to the <code>/config/gym-config/edit</code> endpoint originating from low-privileged user accounts, using the URL as an indicator.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>privilege-escalation</category><category>broken-access-control</category><category>web-application</category></item><item><title>OAuth2 Proxy Authentication Bypass via User-Agent Header</title><link>https://feed.craftedsignal.io/briefs/2026-04-oauth2-bypass/</link><pubDate>Wed, 15 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-oauth2-bypass/</guid><description>A critical authentication bypass vulnerability (CVE-2026-34457) exists in OAuth2 Proxy when used with `auth_request`-style integration and either `--ping-user-agent` is set or `--gcp-healthchecks` is enabled, allowing unauthenticated access to protected resources.</description><content:encoded><![CDATA[<p>OAuth2 Proxy is vulnerable to an authentication bypass (CVE-2026-34457) when configured with <code>auth_request</code>-style integration (e.g., nginx <code>auth_request</code>) and either the <code>--ping-user-agent</code> option is set or <code>--gcp-healthchecks</code> is enabled. This flaw allows an unauthenticated remote attacker to gain unauthorized access to protected upstream resources. The vulnerability exists because OAuth2 Proxy incorrectly treats requests with the configured health check <code>User-Agent</code> value as legitimate health checks, irrespective of the requested path. This bypasses the normal login flow, granting access without proper authentication. Versions prior to v7.15.2 are affected, alongside versions &lt;= 3.2.0. Defenders must take immediate action to remediate affected deployments.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies an OAuth2 Proxy deployment utilizing <code>auth_request</code> and either <code>--ping-user-agent</code> or <code>--gcp-healthchecks</code>.</li>
<li>Attacker determines the configured <code>--ping-user-agent</code> value or identifies that <code>--gcp-healthchecks</code> is enabled (default User-Agent: GoogleHC/1.0).</li>
<li>Attacker crafts an HTTP request to a protected resource, setting the <code>User-Agent</code> header to the configured <code>--ping-user-agent</code> value (or &ldquo;GoogleHC/1.0&rdquo; if <code>--gcp-healthchecks</code> is enabled).</li>
<li>The reverse proxy (e.g., Nginx) forwards the request to the OAuth2 Proxy&rsquo;s <code>/oauth2/auth</code> endpoint.</li>
<li>OAuth2 Proxy incorrectly interprets the request as a health check due to the matching <code>User-Agent</code> header.</li>
<li>OAuth2 Proxy responds to the reverse proxy with a 200 OK status, indicating successful authentication.</li>
<li>The reverse proxy, believing the authentication was successful, forwards the attacker&rsquo;s request to the protected upstream resource.</li>
<li>Attacker successfully accesses the protected resource without authenticating, achieving unauthorized access.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability results in complete authentication bypass, granting attackers unauthorized access to sensitive resources protected by OAuth2 Proxy. The number of affected deployments is unknown, but any organization using OAuth2 Proxy with the specified configurations is potentially at risk. This can lead to data breaches, service disruption, and other severe security incidents.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to OAuth2 Proxy version <code>v7.15.2</code> or later to patch CVE-2026-34457.</li>
<li>Disable the <code>--gcp-healthchecks</code> flag if it is enabled.</li>
<li>Remove any configured <code>--ping-user-agent</code> flag.</li>
<li>Implement reverse proxy configurations, such as the provided Nginx example, to prevent forwarding client-controlled <code>User-Agent</code> headers to the OAuth2 Proxy <code>/oauth2/auth</code> endpoint.</li>
<li>Deploy the Sigma rule &ldquo;OAuth2 Proxy Authentication Bypass Attempt&rdquo; to detect malicious requests exploiting this vulnerability.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>oauth2-proxy</category><category>authentication-bypass</category><category>web-application</category></item><item><title>manikandan580 School-management-system SQL Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-school-management-sqli/</link><pubDate>Wed, 15 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-school-management-sqli/</guid><description>A time-based blind SQL injection vulnerability in manikandan580 School-management-system 1.0 allows unauthenticated attackers to potentially execute arbitrary SQL queries and gain unauthorized access to sensitive information.</description><content:encoded><![CDATA[<p>A critical time-based blind SQL injection vulnerability, identified as CVE-2025-65135, affects version 1.0 of the manikandan580 School-management-system. This vulnerability resides in the <code>/studentms/admin/between-date-reprtsdetails.php</code> script and is exploitable through the <code>fromdate</code> POST parameter. Given the nature of the vulnerability, attackers can potentially bypass authentication and execute arbitrary SQL queries on the back-end database. Successful exploitation could lead to unauthorized access to sensitive student data, administrative credentials, and other confidential information managed by the school system. This vulnerability poses a significant risk to educational institutions utilizing the affected software.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies the <code>/studentms/admin/between-date-reprtsdetails.php</code> endpoint.</li>
<li>The attacker crafts a malicious HTTP POST request targeting the <code>/studentms/admin/between-date-reprtsdetails.php</code> endpoint.</li>
<li>The POST request includes a manipulated <code>fromdate</code> parameter containing a time-based blind SQL injection payload (e.g., <code>fromdate=1' AND SLEEP(5) -- -</code>).</li>
<li>The server-side application processes the crafted SQL query without proper sanitization.</li>
<li>The injected SQL payload executes a <code>SLEEP()</code> function or equivalent based on database type, causing a delay in the server&rsquo;s response if the injected condition is true.</li>
<li>The attacker monitors the server response time to infer the results of the injected SQL query.</li>
<li>The attacker uses the blind SQL injection technique to extract sensitive data from the database, such as usernames, passwords, and student records, character by character.</li>
<li>The attacker uses the obtained credentials to gain unauthorized administrative access to the School-management-system, leading to potential data breaches and system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2025-65135 could result in a complete compromise of the manikandan580 School-management-system. Attackers could gain access to personally identifiable information (PII) of students, financial records, and other sensitive data. This data could be used for identity theft, financial fraud, or extortion. The vulnerable system could also be used as a launchpad for further attacks against other systems within the network. Due to the potential for widespread data breaches, this vulnerability represents a critical risk for schools and educational institutions using the affected software.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply any available patches or updates released by manikandan580 to address CVE-2025-65135.</li>
<li>Implement input validation and sanitization measures to prevent SQL injection attacks on the <code>fromdate</code> POST parameter in <code>/studentms/admin/between-date-reprtsdetails.php</code>.</li>
<li>Deploy the Sigma rules provided in this brief to detect exploitation attempts targeting the vulnerable endpoint.</li>
<li>Monitor web server logs for suspicious POST requests to <code>/studentms/admin/between-date-reprtsdetails.php</code> containing SQL injection payloads.</li>
<li>Consider using a Web Application Firewall (WAF) to filter out malicious requests targeting the vulnerable application.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>sqli</category><category>cve-2025-65135</category><category>school-management-system</category><category>web-application</category></item><item><title>SQL Injection Vulnerability in anirudhkannan Grocery Store Management System 1.0 (CVE-2025-63939)</title><link>https://feed.craftedsignal.io/briefs/2026-04-grocery-store-sqli/</link><pubDate>Tue, 14 Apr 2026 16:16:33 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-grocery-store-sqli/</guid><description>A critical SQL injection vulnerability (CVE-2025-63939) exists in the anirudhkannan Grocery Store Management System 1.0, allowing unauthenticated attackers to execute arbitrary SQL queries via the sitem_name POST parameter in /Grocery/search_products_itname.php.</description><content:encoded><![CDATA[<p>CVE-2025-63939 is a SQL injection vulnerability found in anirudhkannan Grocery Store Management System version 1.0. The vulnerability resides in the <code>/Grocery/search_products_itname.php</code> script, specifically related to improper input handling of the <code>sitem_name</code> POST parameter. An unauthenticated attacker can exploit this vulnerability by injecting malicious SQL code into the <code>sitem_name</code> parameter, potentially leading to unauthorized access to the database, data exfiltration, modification, or even complete system compromise. The vulnerable software is a web application typically deployed on web servers, potentially exposing a wide range of grocery stores and related businesses to this critical flaw. This vulnerability was published on 2026-04-14.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies an instance of anirudhkannan Grocery Store Management System 1.0 running on a web server.</li>
<li>The attacker crafts a malicious HTTP POST request targeting the <code>/Grocery/search_products_itname.php</code> endpoint.</li>
<li>The crafted POST request includes the <code>sitem_name</code> parameter, containing SQL injection payload.</li>
<li>The web server receives the malicious request and passes the <code>sitem_name</code> value to the vulnerable SQL query without proper sanitization or escaping.</li>
<li>The injected SQL code is executed by the database server, allowing the attacker to manipulate the database.</li>
<li>The attacker uses SQL injection techniques (e.g., <code>UNION SELECT</code>, <code>SLEEP()</code>) to extract sensitive data, such as user credentials, product information, or financial records.</li>
<li>Depending on database privileges, the attacker could modify existing data (e.g., changing product prices, altering inventory levels) or insert new data (e.g., creating rogue administrator accounts).</li>
<li>The attacker achieves complete control over the database, potentially leading to full system compromise, data exfiltration, or denial-of-service.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2025-63939 can have severe consequences. An attacker could gain unauthorized access to sensitive customer data, including personal information, payment details, and order history. This can lead to financial losses, reputational damage, and legal liabilities for the affected grocery store. The attacker could also manipulate product information, alter pricing, or disrupt business operations. In a worst-case scenario, the attacker could gain complete control of the database server, leading to full system compromise and significant financial and operational losses. Given the widespread use of vulnerable versions, a large number of grocery stores using this software are potentially at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the necessary patches or updates provided by the vendor to address CVE-2025-63939. If a patch is unavailable, consider implementing a web application firewall (WAF) rule to filter out malicious SQL injection attempts targeting the <code>/Grocery/search_products_itname.php</code> endpoint.</li>
<li>Deploy the Sigma rule <code>Detecting SQL Injection Attempts via sitem_name Parameter</code> to your SIEM to identify potential exploitation attempts.</li>
<li>Review and harden database access controls to limit the impact of successful SQL injection attacks.</li>
<li>Monitor web server logs for suspicious POST requests to <code>/Grocery/search_products_itname.php</code> containing potentially malicious SQL syntax, as detected by <code>Detecting SQL Injection Attempts via sitem_name Parameter</code>.</li>
<li>Inspect traffic for connections to the URL <code>https://github.com/TREXNEGRO/Security-Advisories/tree/main/CVE-2025-63939</code> to identify potential reconnaissance activity.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>sql-injection</category><category>web-application</category><category>cve-2025-63939</category></item><item><title>PHPGurukul Daily Expense Tracking System SQL Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-php-gurukul-sqli/</link><pubDate>Tue, 14 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-php-gurukul-sqli/</guid><description>A remote SQL injection vulnerability exists in PHPGurukul Daily Expense Tracking System 1.1 within the /register.php file, where manipulation of the email argument allows for arbitrary SQL command execution, with a public exploit available.</description><content:encoded><![CDATA[<p>A critical security flaw has been identified in PHPGurukul Daily Expense Tracking System version 1.1. This vulnerability resides in the <code>/register.php</code> file and is triggered by manipulating the <code>email</code> argument. Successful exploitation enables remote SQL injection, potentially granting attackers unauthorized access to sensitive database information or allowing them to modify data. This vulnerability, identified as CVE-2026-6193, has a CVSS v3.1 score of 7.3, indicating a high level of severity. The existence of a publicly available exploit increases the risk of widespread exploitation. Organizations using this software should take immediate action to mitigate the risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a vulnerable instance of PHPGurukul Daily Expense Tracking System 1.1.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>/register.php</code> endpoint.</li>
<li>Within the request, the attacker injects SQL code into the <code>email</code> parameter.</li>
<li>The application fails to properly sanitize the input, passing the malicious SQL query to the database.</li>
<li>The database executes the injected SQL code, potentially allowing the attacker to read, modify, or delete data.</li>
<li>The attacker may leverage the initial SQL injection to escalate privileges within the database.</li>
<li>The attacker could potentially gain access to administrative credentials stored in the database.</li>
<li>Finally, the attacker uses the compromised credentials to gain full control over the application.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability could lead to severe consequences. Attackers could gain unauthorized access to sensitive user data, including usernames, passwords, and financial information. This could result in identity theft, financial fraud, and reputational damage for both the organization and its users. The attacker could also modify or delete data, disrupt the application&rsquo;s functionality, or even gain complete control of the server. Given the availability of a public exploit, the likelihood of attacks is significantly increased.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply any available patches or updates provided by PHPGurukul to address CVE-2026-6193.</li>
<li>Deploy the Sigma rule &ldquo;Detect Suspicious SQL Injection Attempts in PHPGurukul Registration&rdquo; to identify exploitation attempts targeting the <code>/register.php</code> endpoint.</li>
<li>Implement input validation and sanitization measures on the <code>email</code> parameter in <code>/register.php</code> to prevent SQL injection.</li>
<li>Monitor web server logs for suspicious activity, such as unusual characters or SQL syntax in the <code>email</code> parameter, which could indicate an attempted SQL injection (webserver log source).</li>
<li>Implement a Web Application Firewall (WAF) rule to block requests containing SQL injection payloads targeting <code>/register.php</code>.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sqli</category><category>cve-2026-6193</category><category>php</category><category>web-application</category></item><item><title>Pachno 1.0.6 XML External Entity Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-pachno-xxe/</link><pubDate>Tue, 14 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-pachno-xxe/</guid><description>Pachno 1.0.6 is vulnerable to XML external entity injection, allowing unauthenticated attackers to read arbitrary files by injecting malicious XML entities into wiki content due to unsafe XML parsing in the TextParser helper.</description><content:encoded><![CDATA[<p>Pachno 1.0.6 is susceptible to an XML External Entity (XXE) injection vulnerability, identified as CVE-2026-40042. This flaw resides in the TextParser helper component, where unsafe XML parsing occurs. An unauthenticated attacker can exploit this vulnerability to read arbitrary files from the server. The attack involves injecting malicious XML entities into various parts of the application, including wiki table syntax, issue descriptions, comments, and wiki articles. The vulnerability is triggered by the use of the simplexml_load_string() function without proper restrictions (LIBXML_NONET), enabling the resolution of external entities. This issue poses a significant risk as it allows unauthorized access to sensitive data stored on the server.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a Pachno 1.0.6 instance.</li>
<li>The attacker crafts a malicious XML payload containing an external entity declaration. This payload aims to read a sensitive file on the server, such as <code>/etc/passwd</code>.</li>
<li>The attacker injects the malicious XML payload into a wiki page, issue description, or comment using wiki table syntax or inline tags.</li>
<li>The application&rsquo;s TextParser helper processes the injected content using simplexml_load_string() without the LIBXML_NONET flag.</li>
<li>The XML parser attempts to resolve the external entity, initiating a request to read the specified file.</li>
<li>The targeted file&rsquo;s contents are embedded into the XML response due to the XXE vulnerability.</li>
<li>The attacker retrieves the parsed XML response, which now contains the content of the targeted file, thus achieving unauthorized file access.</li>
<li>The attacker can repeat this process to access other sensitive files, potentially gaining critical information about the system and its configuration.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this XXE vulnerability (CVE-2026-40042) in Pachno 1.0.6 allows an unauthenticated attacker to read arbitrary files from the server. The impact can range from exposing sensitive configuration files and application code to potentially gaining access to user credentials or other confidential data. This information could be used for further malicious activities, such as lateral movement within the network or data exfiltration. Given the ease of exploitation and the potential for significant data leakage, this vulnerability represents a critical risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to a patched version of Pachno that addresses CVE-2026-40042 by implementing proper XML parsing and disabling external entity resolution.</li>
<li>Implement input validation and sanitization to prevent the injection of malicious XML payloads into wiki pages, issue descriptions, and comments.</li>
<li>Monitor web server logs for requests containing XML entity declarations, which may indicate attempted exploitation of this vulnerability. See the provided Sigma rule for guidance.</li>
<li>Block the domains <code>www.vulncheck.com</code> and <code>www.zeroscience.mk</code> at the network level to prevent access to related advisory information, hindering attacker reconnaissance.</li>
<li>Deploy the Sigma rules in this brief to your SIEM and tune for your environment.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>xxe</category><category>cve-2026-40042</category><category>pachno</category><category>web-application</category></item><item><title>SQL Injection Vulnerability in Simple Content Management System 1.0</title><link>https://feed.craftedsignal.io/briefs/2026-04-simple-cms-sqli/</link><pubDate>Mon, 13 Apr 2026 15:17:49 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-simple-cms-sqli/</guid><description>A remote SQL injection vulnerability exists in code-projects Simple Content Management System 1.0, specifically affecting the /web/admin/login.php file where manipulation of the 'User' argument allows unauthenticated attackers to execute arbitrary SQL queries.</description><content:encoded><![CDATA[<p>A SQL injection vulnerability has been identified in code-projects Simple Content Management System (CMS) version 1.0. The vulnerability resides in the <code>/web/admin/login.php</code> file and stems from improper sanitization of user-supplied input within the <code>User</code> argument. An unauthenticated, remote attacker can exploit this vulnerability to inject arbitrary SQL commands, potentially leading to unauthorized data access, modification, or deletion. Publicly available exploits exist, increasing the risk of widespread exploitation. Given the simplicity of the targeted software, many small businesses or personal websites could be running vulnerable instances.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a publicly accessible instance of Simple Content Management System 1.0.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>/web/admin/login.php</code> endpoint.</li>
<li>The crafted request includes a SQL injection payload within the <code>User</code> parameter.</li>
<li>The application fails to properly sanitize the input, passing the malicious payload to the database.</li>
<li>The database executes the injected SQL commands, allowing the attacker to bypass authentication.</li>
<li>The attacker gains unauthorized administrative access to the CMS.</li>
<li>The attacker modifies the CMS content or extracts sensitive data from the database.</li>
<li>The attacker may install a web shell for persistent access and further exploitation.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability grants attackers unauthorized access to the Simple Content Management System 1.0. This can lead to sensitive data exfiltration, modification of website content (defacement), or complete takeover of the underlying server. The vulnerable software is likely used by individuals or small businesses, potentially leading to a significant impact on their online presence and data security. Given the public availability of exploits, mass exploitation is a realistic threat.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Inspect web server logs for requests to <code>/web/admin/login.php</code> containing suspicious characters or SQL keywords in the <code>User</code> parameter to detect potential exploitation attempts (see rule: &ldquo;Detect SQL Injection Attempts in Simple CMS Login&rdquo;).</li>
<li>Monitor web server logs for unusual database errors originating from <code>/web/admin/login.php</code>, which may indicate successful SQL injection (see rule: &ldquo;Detect Simple CMS SQL Injection Errors&rdquo;).</li>
<li>Implement input validation and sanitization on all user-supplied data, particularly within the <code>/web/admin/login.php</code> script, to prevent SQL injection attacks.</li>
<li>Organizations using code-projects Simple Content Management System 1.0 should consider migrating to a more secure platform or applying security patches if available from the vendor.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sqli</category><category>web-application</category><category>cve-2026-6182</category></item><item><title>SQL Injection Vulnerability in Faculty Management System</title><link>https://feed.craftedsignal.io/briefs/2026-04-faculty-mgmt-sqli/</link><pubDate>Mon, 13 Apr 2026 07:16:51 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-faculty-mgmt-sqli/</guid><description>A remote attacker can exploit an SQL injection vulnerability (CVE-2026-6167) in the code-projects Faculty Management System 1.0 by manipulating the ID argument in the /subject-print.php file, potentially leading to data exfiltration or modification.</description><content:encoded><![CDATA[<p>The code-projects Faculty Management System 1.0 is vulnerable to SQL injection (CVE-2026-6167) within the <code>/subject-print.php</code> file. The vulnerability stems from improper sanitization of the <code>ID</code> argument, allowing a remote attacker to inject arbitrary SQL commands. This exploit has been publicly disclosed, increasing the risk of widespread exploitation. Given the sensitive nature of data managed by faculty management systems, successful exploitation could lead to significant data breaches, system compromise, and disruption of academic operations. The lack of required authentication to trigger the vulnerability makes it particularly dangerous.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable instance of code-projects Faculty Management System 1.0 accessible over the internet.</li>
<li>The attacker crafts a malicious HTTP GET request targeting the <code>/subject-print.php</code> endpoint.</li>
<li>The malicious request includes a modified <code>ID</code> parameter containing SQL injection payloads. For example, <code>ID=1' OR '1'='1</code>.</li>
<li>The web server processes the request and passes the unsanitized <code>ID</code> parameter to the underlying SQL database.</li>
<li>The injected SQL code is executed by the database, potentially allowing the attacker to bypass authentication or access unauthorized data.</li>
<li>The attacker leverages the SQL injection to extract sensitive data from the database, such as usernames, passwords, student records, or financial information.</li>
<li>The attacker may use the extracted credentials to gain administrative access to the application.</li>
<li>Finally, the attacker could modify or delete data within the database, exfiltrate data, or pivot to other systems within the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability (CVE-2026-6167) in code-projects Faculty Management System 1.0 can lead to severe consequences. An attacker could potentially access and exfiltrate sensitive student and faculty data, modify grades, compromise user accounts, and disrupt academic operations. The public availability of the exploit increases the likelihood of widespread attacks targeting vulnerable systems, potentially impacting numerous educational institutions.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Inspect web server logs for suspicious HTTP requests targeting <code>/subject-print.php</code> with unusual characters or SQL keywords in the <code>ID</code> parameter to detect potential exploitation attempts. Use the provided Sigma rule to facilitate this.</li>
<li>Implement a web application firewall (WAF) rule to block requests containing SQL injection payloads targeting <code>/subject-print.php</code>.</li>
<li>Apply input validation and sanitization to the <code>ID</code> parameter in <code>/subject-print.php</code> to prevent SQL injection, effectively patching CVE-2026-6167.</li>
<li>Monitor database logs for unusual queries originating from the web application server that could indicate successful SQL injection.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>web-application</category><category>vulnerability</category></item><item><title>SQL Injection Vulnerability in Vehicle Showroom Management System 1.0</title><link>https://feed.craftedsignal.io/briefs/2026-04-vehicle-showroom-sqli/</link><pubDate>Mon, 13 Apr 2026 06:17:51 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-vehicle-showroom-sqli/</guid><description>A remote attacker can exploit an SQL injection vulnerability (CVE-2026-6165) in code-projects Vehicle Showroom Management System 1.0 by manipulating the ID parameter in /util/Login_check.php, potentially leading to unauthorized data access and modification.</description><content:encoded><![CDATA[<p>CVE-2026-6165 identifies an SQL injection vulnerability within the code-projects Vehicle Showroom Management System version 1.0. The vulnerability resides in the <code>/util/Login_check.php</code> file and can be exploited by manipulating the <code>ID</code> argument. Successful exploitation allows attackers to inject malicious SQL queries, potentially gaining unauthorized access to sensitive data, modifying database contents, or even executing arbitrary commands on the underlying server. As a publicly available exploit exists, the risk of exploitation is elevated, making it crucial for organizations using this software to implement mitigation measures. The scope of this vulnerability impacts any deployment of the affected Vehicle Showroom Management System version 1.0 exposed to network traffic.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable Vehicle Showroom Management System 1.0 instance exposed on the network.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>/util/Login_check.php</code> endpoint.</li>
<li>The attacker injects SQL code into the <code>ID</code> parameter of the HTTP request, bypassing input validation.</li>
<li>The web application processes the malicious SQL query without proper sanitization.</li>
<li>The injected SQL code is executed against the underlying database.</li>
<li>The attacker retrieves sensitive information from the database, such as user credentials or financial records.</li>
<li>The attacker may modify database entries, such as altering prices or inventory.</li>
<li>The attacker could potentially leverage the SQL injection to gain code execution on the server.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-6165 can lead to a range of severe consequences. An attacker could gain unauthorized access to sensitive customer data, including personally identifiable information (PII) and financial details. Data breaches can result in significant financial losses, reputational damage, and legal liabilities. Furthermore, the ability to modify database contents could lead to manipulated sales figures, altered inventory, or even complete disruption of business operations. The vulnerability&rsquo;s potential for remote code execution poses the highest risk, allowing attackers to establish a persistent foothold within the organization&rsquo;s infrastructure.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply appropriate input validation and sanitization techniques to the <code>ID</code> parameter in <code>/util/Login_check.php</code> to prevent SQL injection (CVE-2026-6165).</li>
<li>Deploy the provided Sigma rule to detect suspicious HTTP requests targeting <code>/util/Login_check.php</code> with potential SQL injection payloads.</li>
<li>Implement a web application firewall (WAF) to filter malicious traffic and block known SQL injection patterns.</li>
<li>Regularly audit and patch all software components to address known vulnerabilities.</li>
<li>Monitor web server logs for unusual activity and potential signs of exploitation.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sqli</category><category>web-application</category><category>cve-2026-6165</category></item><item><title>SQL Injection Vulnerability in Lost and Found Thing Management 1.0</title><link>https://feed.craftedsignal.io/briefs/2026-04-lost-found-sql-injection/</link><pubDate>Mon, 13 Apr 2026 06:16:06 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-lost-found-sql-injection/</guid><description>A remote SQL injection vulnerability (CVE-2026-6163) exists in code-projects Lost and Found Thing Management 1.0 via manipulation of the 'cat' parameter in /catageory.php, potentially allowing attackers to read, modify, or delete database information.</description><content:encoded><![CDATA[<p>A critical SQL injection vulnerability has been identified in code-projects Lost and Found Thing Management version 1.0, tracked as CVE-2026-6163. This vulnerability resides within the <code>/catageory.php</code> file and can be exploited by remotely manipulating the <code>cat</code> parameter. Due to the application&rsquo;s failure to properly sanitize user-supplied input, an attacker can inject arbitrary SQL code, potentially leading to unauthorized data access, modification, or deletion. The existence of a publicly available exploit increases the risk of widespread exploitation. Organizations using this software should take immediate action to mitigate the risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a vulnerable instance of Lost and Found Thing Management 1.0.</li>
<li>The attacker crafts a malicious HTTP GET request targeting the <code>/catageory.php</code> endpoint.</li>
<li>The crafted request includes a SQL injection payload within the <code>cat</code> parameter.</li>
<li>The web server receives the request and passes the unsanitized <code>cat</code> parameter to the application&rsquo;s database query.</li>
<li>The injected SQL code is executed within the database context.</li>
<li>Depending on the injected code, the attacker can read sensitive data, modify existing records, or delete information from the database.</li>
<li>The database server processes the malicious SQL query and returns the output.</li>
<li>The application returns the modified output to the attacker.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability (CVE-2026-6163) could allow a remote attacker to compromise the affected Lost and Found Thing Management 1.0 application. This may lead to unauthorized access to sensitive information stored within the database, such as user credentials, personal details of individuals who have lost or found items, and information about the items themselves. The attacker can potentially modify or delete records, leading to data corruption or denial of service. Due to the availability of a public exploit, the potential impact is significant for any organization running this vulnerable software.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply available patches or updates provided by the vendor (code-projects.org) to remediate the SQL injection vulnerability in <code>/catageory.php</code> as soon as they become available.</li>
<li>Implement input validation and sanitization on all user-supplied data, particularly the <code>cat</code> parameter in <code>/catageory.php</code>, to prevent SQL injection attacks.</li>
<li>Deploy the Sigma rule &ldquo;Detect Suspicious SQL Injection Attempts via URI&rdquo; to detect potential exploitation attempts against the <code>/catageory.php</code> endpoint.</li>
<li>Review and restrict database user privileges to follow the principle of least privilege, limiting the impact of successful SQL injection attacks.</li>
<li>Monitor web server logs for suspicious activity related to the <code>/catageory.php</code> endpoint, such as unusual characters or SQL keywords in the <code>cat</code> parameter.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>web-application</category><category>vulnerability</category></item><item><title>Simple ChatBox Unauthenticated SQL Injection Vulnerability (CVE-2026-6161)</title><link>https://feed.craftedsignal.io/briefs/2026-04-simple-chatbox-sql-injection/</link><pubDate>Mon, 13 Apr 2026 05:16:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-simple-chatbox-sql-injection/</guid><description>CVE-2026-6161 is an unauthenticated SQL injection vulnerability in the Simple ChatBox application (&lt;= 1.0) that can be exploited by sending a crafted HTTP request to `/chatbox/insert.php`.</description><content:encoded><![CDATA[<p>A critical SQL injection vulnerability, identified as CVE-2026-6161, has been discovered in Simple ChatBox version 1.0 and earlier. This flaw resides in the <code>/chatbox/insert.php</code> file, which is responsible for handling chat message insertion. A remote attacker can exploit this vulnerability by injecting malicious SQL code into the <code>msg</code> parameter of an HTTP request, without needing authentication. The attacker&rsquo;s malicious SQL commands are then executed against the application database. The exploit is publicly available, increasing the risk of widespread exploitation. Successful exploitation could lead to unauthorized data access, modification, or even complete database takeover. Due to the ease of exploitation and potential impact, this vulnerability poses a significant threat to systems running vulnerable versions of Simple ChatBox.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a Simple ChatBox installation running version 1.0 or earlier.</li>
<li>The attacker crafts a malicious HTTP POST request targeting the <code>/chatbox/insert.php</code> endpoint.</li>
<li>The attacker injects SQL code into the <code>msg</code> parameter of the POST request. This code could be designed to extract data, modify existing data, or insert new data into the database.</li>
<li>The web server receives the malicious HTTP request and passes the <code>msg</code> parameter to the vulnerable PHP script.</li>
<li>The <code>/chatbox/insert.php</code> script fails to properly sanitize the <code>msg</code> parameter before using it in an SQL query.</li>
<li>The injected SQL code is executed against the Simple ChatBox database, granting the attacker unauthorized access.</li>
<li>The attacker may use this access to read sensitive data, such as user credentials or private messages.</li>
<li>The attacker could also modify data to deface the chatbox or inject malicious content.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-6161 can lead to a range of severe consequences. An attacker can gain unauthorized access to the Simple ChatBox database, potentially compromising sensitive information such as user credentials, private messages, and other application data. This can result in data breaches, identity theft, and reputational damage. Furthermore, the attacker could modify or delete data, leading to data loss or service disruption. In the worst-case scenario, the attacker could gain complete control over the database server, potentially compromising other applications or systems hosted on the same server. Due to the public availability of the exploit, unpatched Simple ChatBox installations are at significant risk of being targeted.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply appropriate input validation and sanitization techniques to the <code>msg</code> parameter within the <code>/chatbox/insert.php</code> file to prevent SQL injection (reference: CVE-2026-6161).</li>
<li>Deploy the provided Sigma rule to detect suspicious HTTP requests targeting <code>/chatbox/insert.php</code> with potentially malicious SQL payloads (reference: the Sigma rule &ldquo;Detect Simple Chatbox SQL Injection Attempt&rdquo;).</li>
<li>Implement database access controls to limit the privileges of the Simple ChatBox application to the minimum required for its operation, mitigating potential damage from successful SQL injection (reference: CVE-2026-6161).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>web-application</category><category>cve-2026-6161</category></item><item><title>MyT-PM 1.5.1 SQL Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-mytpm-sqli/</link><pubDate>Sun, 12 Apr 2026 13:16:34 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-mytpm-sqli/</guid><description>MyT-PM 1.5.1 is vulnerable to SQL injection, allowing authenticated attackers to execute arbitrary SQL queries via the Charge[group_total] parameter.</description><content:encoded><![CDATA[<p>MyT-PM 1.5.1 is susceptible to an SQL injection vulnerability (CVE-2019-25713) that enables authenticated attackers to execute arbitrary SQL queries. This vulnerability exists due to insufficient input sanitization of the <code>Charge[group_total]</code> parameter. By sending specially crafted POST requests to the <code>/charge/admin</code> endpoint, an attacker can inject malicious SQL code, potentially leading to sensitive data extraction, data manipulation, or other unauthorized actions. This vulnerability poses a significant risk to organizations using MyT-PM 1.5.1 as it could compromise the integrity and confidentiality of their data.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker authenticates to the MyT-PM 1.5.1 application.</li>
<li>The attacker crafts a malicious POST request targeting the <code>/charge/admin</code> endpoint.</li>
<li>Within the POST request, the attacker injects SQL code into the <code>Charge[group_total]</code> parameter.</li>
<li>The application processes the request without properly sanitizing the <code>Charge[group_total]</code> parameter.</li>
<li>The injected SQL code is executed against the underlying database.</li>
<li>The attacker leverages the SQL injection to extract sensitive data (e.g., user credentials, financial information) using error-based, time-based blind, or stacked query payloads.</li>
<li>The attacker may further manipulate data within the database, potentially altering records or creating new entries.</li>
<li>The attacker achieves complete control over the database, potentially leading to full system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability can lead to the unauthorized disclosure of sensitive information, such as user credentials, financial records, and other confidential data stored within the MyT-PM database. Attackers may also be able to modify or delete data, leading to data integrity issues and potential disruption of business operations. This could result in financial losses, reputational damage, and legal repercussions for affected organizations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply patches or upgrade to a secure version of MyT-PM that addresses CVE-2019-25713.</li>
<li>Deploy the provided Sigma rule to detect potentially malicious requests containing SQL injection attempts targeting the <code>/charge/admin</code> endpoint and the <code>Charge[group_total]</code> parameter.</li>
<li>Implement input validation and sanitization measures to prevent SQL injection vulnerabilities in MyT-PM and other web applications.</li>
<li>Monitor web server logs for suspicious POST requests to <code>/charge/admin</code> with unusual characters or SQL keywords in the <code>Charge[group_total]</code> parameter.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>web-application</category><category>cve-2019-25713</category></item><item><title>Dolibarr ERP-CRM 8.0.4 SQL Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-dolibarr-sqli/</link><pubDate>Sun, 12 Apr 2026 13:16:34 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-dolibarr-sqli/</guid><description>Dolibarr ERP-CRM 8.0.4 is vulnerable to SQL injection via the rowid parameter in the admin dict.php endpoint, allowing attackers to execute arbitrary SQL queries and extract sensitive database information.</description><content:encoded><![CDATA[<p>Dolibarr ERP-CRM is a popular open-source enterprise resource planning and customer relationship management software. Version 8.0.4 of Dolibarr is susceptible to a critical SQL injection vulnerability (CVE-2019-25710) affecting the <code>rowid</code> parameter in the <code>admin dict.php</code> endpoint. This flaw allows unauthenticated attackers to inject malicious SQL code through the <code>rowid</code> POST parameter. Successful exploitation enables attackers to execute arbitrary SQL queries against the Dolibarr database, potentially leading to the exposure of sensitive information, modification of data, or complete compromise of the application. This vulnerability can be exploited using error-based SQL injection techniques.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable Dolibarr ERP-CRM instance running version 8.0.4.</li>
<li>The attacker crafts a malicious HTTP POST request targeting the <code>admin/dict.php</code> endpoint.</li>
<li>The request includes the <code>rowid</code> parameter containing a SQL injection payload.</li>
<li>The server-side application processes the request and executes the injected SQL code within the database query.</li>
<li>The attacker leverages error-based SQL injection techniques to extract sensitive information from the database, such as user credentials, API keys, or financial data.</li>
<li>The attacker analyzes the error messages returned by the application to refine the SQL injection payload and bypass any security measures.</li>
<li>The attacker potentially uses the extracted credentials to gain unauthorized access to other parts of the application or the underlying system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability can lead to severe consequences, including unauthorized access to sensitive data, data breaches, and complete compromise of the Dolibarr ERP-CRM system. The vulnerability allows attackers to extract sensitive database information, modify data, or potentially execute arbitrary code on the server. Given that ERP and CRM systems often contain critical business data, the impact can be significant for affected organizations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply patches or upgrade to a secure version of Dolibarr ERP-CRM to remediate CVE-2019-25710.</li>
<li>Deploy the Sigma rule <code>Detect Suspicious Dolibarr rowid Parameter SQL Injection Attempt</code> to your SIEM to identify potential exploitation attempts against the <code>admin/dict.php</code> endpoint.</li>
<li>Monitor web server logs for unusual POST requests to <code>admin/dict.php</code> with suspicious characters or SQL keywords in the <code>rowid</code> parameter to detect potential attacks.</li>
<li>Implement web application firewall (WAF) rules to filter out malicious SQL injection payloads targeting the <code>rowid</code> parameter in <code>admin/dict.php</code>.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sqli</category><category>cve-2019-25710</category><category>dolibarr</category><category>web-application</category></item><item><title>eBrigade ERP 4.5 SQL Injection Vulnerability (CVE-2019-25707)</title><link>https://feed.craftedsignal.io/briefs/2026-04-ebrigade-sql-injection/</link><pubDate>Sun, 12 Apr 2026 13:16:33 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-ebrigade-sql-injection/</guid><description>eBrigade ERP 4.5 is vulnerable to SQL injection via the 'id' parameter in pdf.php, allowing authenticated attackers to execute arbitrary SQL queries and extract sensitive database information.</description><content:encoded><![CDATA[<p>eBrigade ERP 4.5 is susceptible to an SQL injection vulnerability (CVE-2019-25707) that enables authenticated attackers to execute arbitrary SQL queries. The vulnerability is located in the pdf.php script and is triggered via the &lsquo;id&rsquo; parameter. By injecting malicious SQL code into this parameter through a GET request, an attacker can potentially extract sensitive information from the database, including table names and schema details. This vulnerability poses a significant risk to organizations using eBrigade ERP 4.5, as successful exploitation could lead to data breaches, compromised credentials, and other malicious activities. The vulnerability was published on 2026-04-12.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains valid credentials for eBrigade ERP 4.5 either through credential stuffing or some other credential compromise technique.</li>
<li>The attacker crafts a malicious SQL payload designed to extract sensitive information or manipulate the database.</li>
<li>The attacker constructs a GET request targeting the pdf.php endpoint, embedding the malicious SQL payload within the &lsquo;id&rsquo; parameter (e.g., <code>pdf.php?id=1' UNION SELECT ...</code>).</li>
<li>The server-side application fails to properly sanitize or validate the &lsquo;id&rsquo; parameter before incorporating it into an SQL query.</li>
<li>The application executes the attacker-controlled SQL query against the database.</li>
<li>The database returns the results of the injected SQL query to the application.</li>
<li>The application displays the extracted data to the attacker.</li>
<li>The attacker uses the extracted data (database schema, usernames, passwords, etc.) to further compromise the application or gain unauthorized access to other systems.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability (CVE-2019-25707) can lead to the extraction of sensitive information from the eBrigade ERP 4.5 database. This could include customer data, financial records, employee information, and other confidential data. The impact could range from data breaches and financial losses to reputational damage and legal repercussions. While the exact number of victims is unknown, any organization using eBrigade ERP 4.5 is potentially at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Inspect web server access logs for suspicious GET requests to <code>pdf.php</code> containing SQL syntax in the <code>id</code> parameter to detect exploitation attempts using the provided Sigma rule.</li>
<li>Apply input validation and sanitization to the &lsquo;id&rsquo; parameter in <code>pdf.php</code> to prevent SQL injection attacks.</li>
<li>Upgrade to a patched version of eBrigade ERP or apply the necessary security patches provided by the vendor to remediate CVE-2019-25707.</li>
<li>Monitor network traffic for unusual database activity originating from the eBrigade ERP 4.5 server.</li>
<li>Block access to the known exploit URL (<code>https://www.exploit-db.com/exploits/46117</code>) at your web proxy or firewall.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>web-application</category><category>cve-2019-25707</category></item><item><title>zhayujie chatgpt-on-wechat CowAgent Authentication Bypass Vulnerability (CVE-2026-6126)</title><link>https://feed.craftedsignal.io/briefs/2026-04-cowagent-auth-bypass/</link><pubDate>Sun, 12 Apr 2026 11:16:16 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-cowagent-auth-bypass/</guid><description>CVE-2026-6126 is an unauthenticated remote code execution vulnerability in zhayujie chatgpt-on-wechat CowAgent 2.0.4 due to missing authentication in the Administrative HTTP Endpoint.</description><content:encoded><![CDATA[<p>A critical vulnerability, CVE-2026-6126, has been discovered in zhayujie chatgpt-on-wechat CowAgent version 2.0.4. This flaw resides within an unspecified function of the Administrative HTTP Endpoint component. Successful exploitation of this vulnerability allows remote attackers to bypass authentication mechanisms, potentially leading to unauthorized access and control over the affected system. The vulnerability is due to missing authentication checks on a critical function. Publicly available exploits exist, increasing the likelihood of exploitation. The project maintainers were notified; however, there has been no response at the time of this writing. This poses a significant risk to any deployment of chatgpt-on-wechat CowAgent 2.0.4 accessible over a network.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable instance of zhayujie chatgpt-on-wechat CowAgent 2.0.4.</li>
<li>Attacker crafts a malicious HTTP request targeting the Administrative HTTP Endpoint.</li>
<li>The malicious request bypasses authentication due to the missing authentication vulnerability (CVE-2026-6126).</li>
<li>The request executes an unauthorized administrative function.</li>
<li>Attacker gains unauthorized access to sensitive data or configuration.</li>
<li>Attacker deploys a persistent backdoor for long-term access.</li>
<li>Attacker uses the backdoor to pivot to other systems or networks.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-6126 can lead to complete compromise of the chatgpt-on-wechat CowAgent instance. This may enable attackers to access sensitive data, modify configurations, or disrupt services. Given that the application integrates with WeChat, a successful attack might expose sensitive user data or allow the attacker to conduct further attacks via the compromised instance. Due to the ease of exploitation and public availability of exploit code, the risk is considered high.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply available patches or updates for zhayujie chatgpt-on-wechat CowAgent to address CVE-2026-6126 as soon as they are released.</li>
<li>Monitor web server logs for suspicious activity targeting the Administrative HTTP Endpoint using the Sigma rule provided below.</li>
<li>Implement network segmentation to limit the potential impact of a compromised CowAgent instance.</li>
<li>Deploy a web application firewall (WAF) with rules to detect and block exploit attempts targeting CVE-2026-6126.</li>
<li>Conduct regular security audits of the chatgpt-on-wechat CowAgent deployment to identify and remediate potential vulnerabilities.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>CVE-2026-6126</category><category>authentication-bypass</category><category>web-application</category></item><item><title>Chamilo LMS Session Fixation Vulnerability (CVE-2026-31940)</title><link>https://feed.craftedsignal.io/briefs/2026-04-chamilo-session-fixation/</link><pubDate>Sat, 11 Apr 2026 14:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-chamilo-session-fixation/</guid><description>Chamilo LMS versions prior to 1.11.38 and 2.0.0-RC.3 are vulnerable to session fixation due to user-controlled request parameters being used to set the PHP session ID, potentially allowing attackers to hijack user sessions.</description><content:encoded><![CDATA[<p>Chamilo LMS, a learning management system, is susceptible to a session fixation vulnerability (CVE-2026-31940) in versions prior to 1.11.38 and 2.0.0-RC.3. The vulnerability stems from the application&rsquo;s handling of user-controlled request parameters in the <code>main/lp/aicc_hacp.php</code> file. Specifically, these parameters are used directly to set the PHP session ID before the global bootstrap is loaded. This allows an attacker to potentially set a predictable session ID for a user, leading to session hijacking. The vulnerability was reported and patched, with fixes available in versions 1.11.38 and 2.0.0-RC.3. This is important for defenders to address to ensure integrity and confidentiality of user sessions.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker crafts a malicious URL or form containing a specific session ID.</li>
<li>Attacker lures a victim to access the crafted URL or form.</li>
<li>The victim&rsquo;s browser sends a request to the Chamilo LMS server with the attacker-controlled session ID.</li>
<li>The Chamilo LMS application, specifically the <code>main/lp/aicc_hacp.php</code> script, uses the attacker-provided session ID to initialize the PHP session.</li>
<li>The victim authenticates to the Chamilo LMS application.</li>
<li>The attacker uses the predetermined session ID to access the victim&rsquo;s authenticated session.</li>
<li>Attacker gains unauthorized access to the victim&rsquo;s account and associated data within the Chamilo LMS.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to hijack legitimate user sessions on a Chamilo LMS instance. This could result in unauthorized access to sensitive student or instructor data, modification of course content, or other malicious activities. The impact is high, particularly for educational institutions and organizations that rely on Chamilo LMS for their online learning platforms.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Chamilo LMS to version 1.11.38 or 2.0.0-RC.3 or later to patch CVE-2026-31940.</li>
<li>Monitor web server logs for suspicious requests to <code>main/lp/aicc_hacp.php</code> containing unusual session ID parameters. Use the provided Sigma rule to detect potential exploitation attempts.</li>
<li>Implement the &ldquo;Detect Potentially Malicious Session ID Parameter&rdquo; Sigma rule to identify exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>session-fixation</category><category>web-application</category><category>cve-2026-31940</category></item><item><title>TREK Travel Planner Missing Authorization Vulnerability (CVE-2026-40185)</title><link>https://feed.craftedsignal.io/briefs/2026-04-trek-auth-bypass/</link><pubDate>Sat, 11 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-trek-auth-bypass/</guid><description>TREK collaborative travel planner before version 2.7.2 is vulnerable to missing authorization checks on the Immich trip photo management routes, potentially allowing unauthorized access to trip photos.</description><content:encoded><![CDATA[<p>TREK is a collaborative travel planning application. Prior to version 2.7.2, a critical vulnerability existed within the application related to authorization checks. Specifically, the Immich trip photo management routes lacked proper authorization checks. This flaw, identified as CVE-2026-40185, could potentially allow unauthorized users to access and manipulate trip photos if exploited. The vulnerability was reported by GitHub, Inc. and patched in version 2.7.2 of TREK. Defenders should ensure they are running version 2.7.2 or later of the TREK application to mitigate this risk. This vulnerability affects systems running the vulnerable versions of the TREK application and could impact the confidentiality and integrity of user data.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a vulnerable TREK instance running a version prior to 2.7.2.</li>
<li>The attacker crafts a malicious HTTP request targeting the Immich trip photo management routes.</li>
<li>Due to the missing authorization checks, the attacker bypasses authentication requirements.</li>
<li>The attacker gains unauthorized access to trip photos.</li>
<li>The attacker may modify or delete trip photos, impacting data integrity.</li>
<li>The attacker could potentially use the exposed data to gather sensitive information about the trip and its participants.</li>
<li>The attacker could potentially upload malicious images to the photo storage.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-40185 can lead to unauthorized access and modification of trip photos within the TREK travel planner application. While the exact number of affected users is unknown, any TREK instance running a version prior to 2.7.2 is susceptible. This could result in a breach of confidentiality, potential data manipulation, and reputational damage for the application. Sectors that rely on collaborative travel planning may be particularly affected.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade all TREK instances to version 2.7.2 or later to remediate CVE-2026-40185.</li>
<li>Deploy the Sigma rule <code>Detect Suspicious TREK Photo Route Access</code> to detect potential exploitation attempts targeting the vulnerable photo management routes.</li>
<li>Monitor web server logs for unusual activity related to the Immich trip photo management routes.</li>
<li>Monitor network traffic for unusual patterns or connections to the TREK server that might indicate exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>cve-2026-40185</category><category>authorization-bypass</category><category>web-application</category></item><item><title>DotNetNuke.Core Stored XSS via SVG Upload</title><link>https://feed.craftedsignal.io/briefs/2026-04-dotnetnuke-xss/</link><pubDate>Sat, 11 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-dotnetnuke-xss/</guid><description>DotNetNuke.Core is vulnerable to stored cross-site scripting (XSS) where a user can upload a specially crafted SVG file containing malicious scripts, potentially targeting both authenticated and unauthenticated DNN users, with successful exploitation requiring user interaction and leading to high impact on confidentiality, integrity, and availability.</description><content:encoded><![CDATA[<p>DotNetNuke.Core versions prior to 10.2.2 are vulnerable to stored cross-site scripting (XSS). An attacker can exploit this vulnerability by uploading a malicious SVG file to the DotNetNuke server. This file contains embedded JavaScript that executes when the SVG is processed and displayed by the application. Successful exploitation requires a user to interact with the uploaded SVG file, which then triggers the malicious script execution. This poses a significant risk as the injected scripts can target both authenticated and unauthenticated users, potentially leading to session hijacking, data theft, or unauthorized actions performed on behalf of the victim. This vulnerability was published on April 10, 2026, and patched in version 10.2.2.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious SVG file containing embedded JavaScript code designed for XSS exploitation.</li>
<li>The attacker, with low privileges, uploads the malicious SVG file to the DotNetNuke server through a file upload functionality.</li>
<li>The server stores the SVG file, making it accessible to other users.</li>
<li>A user (either authenticated or unauthenticated) navigates to the location where the SVG file is stored or displayed.</li>
<li>The user&rsquo;s browser processes the SVG file, triggering the execution of the embedded JavaScript.</li>
<li>The malicious script executes within the user&rsquo;s browser session, gaining access to cookies, session tokens, and other sensitive information.</li>
<li>The attacker steals user&rsquo;s cookies and session tokens.</li>
<li>The attacker uses stolen session tokens to hijack the user&rsquo;s session, perform unauthorized actions, and potentially escalate privileges.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this XSS vulnerability allows an attacker to execute arbitrary JavaScript code within the context of a user&rsquo;s session. This can lead to sensitive information disclosure, such as stealing user credentials or session cookies. An attacker can then hijack user sessions, perform unauthorized actions on their behalf, and potentially gain elevated privileges within the DotNetNuke application. Due to the nature of stored XSS, the impact can be widespread, affecting any user who interacts with the malicious SVG file until the vulnerability is patched.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade DotNetNuke.Core to version 10.2.2 or later to patch the XSS vulnerability (reference: Affected versions).</li>
<li>Implement server-side validation to sanitize uploaded SVG files and prevent the injection of malicious scripts (reference: Description).</li>
<li>Deploy the Sigma rule provided below to detect attempts to upload SVG files containing JavaScript code (reference: Sigma rule &ldquo;Detect SVG Upload with Embedded JavaScript&rdquo;).</li>
<li>Configure web application firewalls (WAFs) to inspect and block suspicious SVG uploads based on content analysis (reference: Description).</li>
<li>Enable logging for file uploads to track potential malicious activity (reference: logsource category &ldquo;file_event&rdquo;).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>dotnetnuke</category><category>xss</category><category>svg</category><category>web-application</category></item><item><title>CouchCMS Privilege Escalation via f_k_levels_list Parameter Manipulation (CVE-2026-29002)</title><link>https://feed.craftedsignal.io/briefs/2026-04-couchcms-privesc/</link><pubDate>Sat, 11 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-couchcms-privesc/</guid><description>CouchCMS is vulnerable to privilege escalation, allowing authenticated Admin-level users to create SuperAdmin accounts by manipulating the 'f_k_levels_list' parameter during user creation, granting them full application control.</description><content:encoded><![CDATA[<p>CVE-2026-29002 identifies a privilege escalation vulnerability in CouchCMS. This flaw allows authenticated users with Admin-level privileges to elevate their access to SuperAdmin by tampering with the <code>f_k_levels_list</code> parameter during the user creation process. By modifying the value of this parameter from &ldquo;4&rdquo; to &ldquo;10&rdquo; in the HTTP request body, an attacker can bypass authorization checks, effectively circumventing restrictions on SuperAdmin account creation and privilege assignment. This vulnerability allows the attacker to gain complete control over the CouchCMS application. Successful exploitation requires valid Admin-level credentials and the ability to modify HTTP request parameters.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker obtains valid Admin-level credentials for a CouchCMS instance.</li>
<li>The attacker navigates to the user creation page within the CouchCMS admin panel.</li>
<li>The attacker intercepts the HTTP request generated when submitting the user creation form.</li>
<li>The attacker modifies the <code>f_k_levels_list</code> parameter in the HTTP request body, changing its value from &ldquo;4&rdquo; (Admin) to &ldquo;10&rdquo; (SuperAdmin).</li>
<li>The attacker submits the modified HTTP request to the CouchCMS server.</li>
<li>The CouchCMS server, due to insufficient authorization validation, creates a new user account with SuperAdmin privileges.</li>
<li>The attacker logs in with the newly created SuperAdmin account.</li>
<li>The attacker gains full control over the CouchCMS application, including the ability to modify system settings, access sensitive data, and potentially compromise the underlying server.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-29002 leads to complete compromise of the CouchCMS application. An attacker with SuperAdmin privileges can access and modify any data within the CMS, potentially defacing websites, stealing sensitive information, or disrupting services. The vulnerability affects all CouchCMS installations where user creation is enabled and accessible to Admin-level users.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the patch or upgrade to a version of CouchCMS that addresses CVE-2026-29002.</li>
<li>Deploy the Sigma rule <code>Detect CouchCMS SuperAdmin Creation via Parameter Tampering</code> to your SIEM to detect attempts to exploit this vulnerability.</li>
<li>Monitor web server logs for POST requests to the user creation endpoint with a modified <code>f_k_levels_list</code> parameter.</li>
<li>Implement strict input validation and authorization checks on the server-side to prevent unauthorized modification of user privileges.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>privilege-escalation</category><category>web-application</category><category>cve</category></item><item><title>Chamilo LMS Privilege Escalation via REST API (CVE-2026-33706)</title><link>https://feed.craftedsignal.io/briefs/2026-04-chamilo-privesc/</link><pubDate>Sat, 11 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-chamilo-privesc/</guid><description>Chamilo LMS before 1.11.38 allows authenticated users with a REST API key to escalate their privileges by modifying their user status via the update_user_from_username endpoint, potentially granting unauthorized course management capabilities.</description><content:encoded><![CDATA[<p>CVE-2026-33706 affects Chamilo LMS, a learning management system. Prior to version 1.11.38, the vulnerability allows an authenticated user, specifically a student (status=5), with a valid REST API key, to elevate their privileges. This is achieved by exploiting the <code>update_user_from_username</code> endpoint in the REST API. By sending a crafted request, a student can modify their user status to Teacher/CourseManager (status=1). This privilege escalation grants the attacker the ability to create and manage courses, access sensitive data, and potentially disrupt the learning environment. The vulnerability has been patched in version 1.11.38, so upgrading is strongly recommended. This vulnerability highlights the importance of proper access controls and input validation in web applications.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker obtains valid credentials for a student account within the Chamilo LMS.</li>
<li>Attacker generates a REST API key associated with their student account.</li>
<li>Attacker crafts a malicious HTTP POST request targeting the <code>update_user_from_username</code> endpoint.</li>
<li>The POST request includes the attacker&rsquo;s username and a modified status value (e.g., from 5 to 1) within the request body.</li>
<li>The attacker sends the crafted request to the Chamilo LMS server, authenticating with their REST API key.</li>
<li>The Chamilo LMS server, lacking proper authorization checks, updates the attacker&rsquo;s user status in the database.</li>
<li>The attacker logs out and then logs back in to the Chamilo LMS.</li>
<li>Upon re-authentication, the attacker now has Teacher/CourseManager privileges, enabling them to create and manage courses, access student data, and modify system settings.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-33706 allows a student to gain administrative control over the Chamilo LMS platform. This can lead to unauthorized course creation, modification of student grades, data theft, and disruption of the learning environment. The number of potential victims depends on the number of Chamilo LMS instances running a vulnerable version (prior to 1.11.38). If successful, an attacker could potentially compromise the entire learning platform and its users.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Chamilo LMS to version 1.11.38 or later to patch CVE-2026-33706.</li>
<li>Implement strict access control policies and regularly audit user permissions to prevent unauthorized privilege escalation.</li>
<li>Monitor web server logs for suspicious POST requests to the <code>update_user_from_username</code> endpoint (see example Sigma rule below).</li>
<li>Deploy the provided Sigma rule to detect potential exploitation attempts in real-time.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>privilege-escalation</category><category>web-application</category><category>CVE-2026-33706</category></item><item><title>Chartbrew Cross-Tenant Authorization Bypass Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-chartbrew-auth-bypass/</link><pubDate>Fri, 10 Apr 2026 20:16:21 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-chartbrew-auth-bypass/</guid><description>Chartbrew versions prior to 4.9.0 are vulnerable to a cross-tenant authorization bypass, allowing an authenticated attacker to access project data belonging to other teams.</description><content:encoded><![CDATA[<p>Chartbrew, an open-source web application used for creating charts from databases and APIs, is vulnerable to a cross-tenant authorization bypass (CVE-2026-32252) in versions prior to 4.9.0. This vulnerability resides in the GET /team/:team_id/template/generate/:project_id endpoint. Specifically, the <code>checkAccess</code> function doesn&rsquo;t await its promise and fails to validate if the <code>project_id</code> belongs to the specified <code>team_id</code> or the attacker&rsquo;s team. This allows an authenticated attacker with template generation permissions in their own team to request and receive template model data for projects belonging to other teams. Upgrading to version 4.9.0 or later resolves this issue.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker authenticates to a Chartbrew instance with valid credentials and template generation permissions within their own team.</li>
<li>Attacker identifies a valid <code>team_id</code> belonging to a victim team. This could be done through enumeration of team IDs, social engineering, or other means.</li>
<li>Attacker identifies a valid <code>project_id</code> belonging to the victim team. This may require some level of prior knowledge or reconnaissance.</li>
<li>Attacker crafts a GET request to <code>/team/:victim_team_id/template/generate/:victim_project_id</code>, replacing <code>:victim_team_id</code> and <code>:victim_project_id</code> with the identified values.</li>
<li>The Chartbrew server receives the request and calls the <code>checkAccess</code> function, but does not await the promise.</li>
<li>Due to the missing validation of the <code>project_id</code> against the <code>team_id</code> and the caller&rsquo;s team, the authorization check is bypassed.</li>
<li>The server retrieves the template model data associated with the victim&rsquo;s project.</li>
<li>The server returns the victim&rsquo;s project data to the attacker.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to gain unauthorized access to sensitive project data belonging to other teams within the Chartbrew application. This could include confidential database connection strings, API keys, data schemas, and other information that could be used to further compromise the victim&rsquo;s systems or data. The number of affected organizations depends on the adoption rate of Chartbrew instances prior to version 4.9.0.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Chartbrew to version 4.9.0 or later to patch CVE-2026-32252.</li>
<li>Implement the Sigma rule <code>Detect Chartbrew Template Generation Request</code> to identify potential exploitation attempts in web server logs.</li>
<li>Monitor web server logs for unusual requests to the <code>/team/*/template/generate/*</code> endpoint using a WAF or similar tool.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>chartbrew</category><category>authorization-bypass</category><category>web-application</category></item><item><title>Vehicle Showroom Management System SQL Injection Vulnerability (CVE-2026-6038)</title><link>https://feed.craftedsignal.io/briefs/2026-04-vehicle-showroom-sql-injection/</link><pubDate>Fri, 10 Apr 2026 09:20:18 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-vehicle-showroom-sql-injection/</guid><description>A remote SQL injection vulnerability (CVE-2026-6038) exists in the code-projects Vehicle Showroom Management System 1.0, specifically affecting the /util/RegisterCustomerFunction.php file by manipulating the BRANCH_ID argument.</description><content:encoded><![CDATA[<p>A SQL injection vulnerability, identified as CVE-2026-6038, has been discovered in version 1.0 of the code-projects Vehicle Showroom Management System. This vulnerability resides within the <code>/util/RegisterCustomerFunction.php</code> file, and can be exploited by manipulating the <code>BRANCH_ID</code> argument. The vulnerability allows for remote exploitation, meaning an attacker does not need local access to the system. Publicly available exploit code exists, increasing the likelihood of exploitation. Successful exploitation could allow an attacker to read, modify, or delete sensitive data within the application&rsquo;s database. This vulnerability was published on 2026-04-10.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable instance of Vehicle Showroom Management System 1.0.</li>
<li>Attacker crafts a malicious HTTP request targeting <code>/util/RegisterCustomerFunction.php</code>.</li>
<li>The crafted request includes a SQL injection payload within the <code>BRANCH_ID</code> parameter.</li>
<li>The application fails to properly sanitize the <code>BRANCH_ID</code> input.</li>
<li>The unsanitized input is incorporated into a SQL query executed by the application.</li>
<li>The SQL injection payload manipulates the query to extract sensitive data or modify database records.</li>
<li>The application returns the results of the manipulated query to the attacker.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-6038 can lead to unauthorized access to the Vehicle Showroom Management System&rsquo;s database. This could result in the disclosure of sensitive customer information (names, addresses, financial details), modification of vehicle inventory data, or even complete compromise of the application&rsquo;s data integrity. The impact would depend on the level of privileges the application&rsquo;s database user has and the attacker&rsquo;s objectives, but it is a high-severity vulnerability due to the ease of exploitation and potential for significant data breach or manipulation.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Inspect web server logs for suspicious POST requests to <code>/util/RegisterCustomerFunction.php</code> containing unusual characters or SQL keywords in the <code>BRANCH_ID</code> parameter using the Sigma rule &ldquo;Detect SQL Injection Attempt via BRANCH_ID Parameter&rdquo;.</li>
<li>Apply input validation and sanitization to the <code>BRANCH_ID</code> parameter within the <code>/util/RegisterCustomerFunction.php</code> file to prevent SQL injection.</li>
<li>Monitor database logs for anomalous queries originating from the Vehicle Showroom Management System&rsquo;s application user.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-6038</category><category>sql-injection</category><category>web-application</category></item><item><title>SQL Injection Vulnerability in Vehicle Showroom Management System 1.0 (CVE-2026-6036)</title><link>https://feed.craftedsignal.io/briefs/2026-04-vehicleshowroom-sqli/</link><pubDate>Fri, 10 Apr 2026 09:16:51 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-vehicleshowroom-sqli/</guid><description>A remote SQL injection vulnerability (CVE-2026-6036) exists in the Vehicle Showroom Management System 1.0 due to improper sanitization of the VEHICLE_ID parameter in /util/VehicleDetailsFunction.php, potentially allowing attackers to execute arbitrary SQL commands.</description><content:encoded><![CDATA[<p>CVE-2026-6036 is a SQL injection vulnerability affecting Vehicle Showroom Management System version 1.0. The vulnerability resides within the <code>/util/VehicleDetailsFunction.php</code> file, specifically involving the <code>VEHICLE_ID</code> parameter. An unauthenticated attacker can remotely exploit this vulnerability by injecting malicious SQL code into the <code>VEHICLE_ID</code> argument. This allows for the potential execution of arbitrary SQL commands on the underlying database, potentially leading to data breaches, modification, or complete system compromise. A public exploit exists, increasing the likelihood of exploitation. The vulnerable software is commonly used for managing vehicle inventory and showroom operations, making organizations that rely on this software potential targets.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a Vehicle Showroom Management System 1.0 instance exposed to the internet.</li>
<li>The attacker crafts a malicious HTTP request targeting <code>/util/VehicleDetailsFunction.php</code>.</li>
<li>The request includes a modified <code>VEHICLE_ID</code> parameter containing SQL injection payloads.</li>
<li>The application fails to properly sanitize the <code>VEHICLE_ID</code> input.</li>
<li>The unsanitized input is directly incorporated into an SQL query.</li>
<li>The injected SQL code is executed against the database.</li>
<li>The attacker retrieves sensitive information from the database, such as user credentials, vehicle details, or financial records.</li>
<li>The attacker uses the obtained credentials to gain unauthorized access to the system or exfiltrates the data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-6036 allows an attacker to execute arbitrary SQL queries against the Vehicle Showroom Management System&rsquo;s database. This could lead to the disclosure of sensitive customer information, modification of vehicle inventory data, or even complete compromise of the system. The vulnerability could result in significant financial losses, reputational damage, and legal liabilities for affected organizations. While the number of affected installations is unknown, Vehicle Showroom Management Systems are commonly used by dealerships and automotive businesses, making them attractive targets.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply appropriate input validation and sanitization techniques to the <code>VEHICLE_ID</code> parameter in <code>/util/VehicleDetailsFunction.php</code> to prevent SQL injection attacks.</li>
<li>Deploy the Sigma rule <code>Detect Suspicious SQL Injection Attempts in Vehicle Showroom Management System</code> to your SIEM and tune for your environment to detect exploitation attempts.</li>
<li>Monitor web server logs for suspicious requests targeting <code>/util/VehicleDetailsFunction.php</code> with potentially malicious <code>VEHICLE_ID</code> parameters.</li>
<li>Consider using a Web Application Firewall (WAF) to filter out malicious requests targeting the vulnerable endpoint.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sqli</category><category>cve-2026-6036</category><category>web-application</category></item><item><title>PraisonAI SSRF Vulnerability via Unvalidated Webhook URL</title><link>https://feed.craftedsignal.io/briefs/2024-01-praisonai-ssrf/</link><pubDate>Thu, 09 Apr 2026 22:16:35 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-praisonai-ssrf/</guid><description>PraisonAI versions prior to 4.5.128 are vulnerable to Server-Side Request Forgery (SSRF) due to a lack of URL validation on the webhook_url parameter in the /api/v1/runs endpoint, allowing unauthenticated attackers to send arbitrary POST requests from the server.</description><content:encoded><![CDATA[<p>PraisonAI, a multi-agent teams system, is susceptible to a Server-Side Request Forgery (SSRF) vulnerability affecting versions prior to 4.5.128. The vulnerability resides in the <code>/api/v1/runs</code> endpoint, which accepts a <code>webhook_url</code> parameter in the request body without proper validation. This allows an unauthenticated attacker to specify an arbitrary URL, causing the PraisonAI server to send an HTTP POST request to that URL upon job completion. This flaw enables attackers to target internal services, cloud metadata endpoints, and other network-adjacent resources, potentially leading to information disclosure, privilege escalation, or denial-of-service. Organizations using affected versions of PraisonAI should upgrade to version 4.5.128 or later to mitigate this risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a PraisonAI instance running a version prior to 4.5.128.</li>
<li>The attacker crafts a malicious HTTP POST request to the <code>/api/v1/runs</code> endpoint.</li>
<li>The crafted request includes a <code>webhook_url</code> parameter containing a URL pointing to an internal service, cloud metadata endpoint, or external attacker-controlled server.</li>
<li>The PraisonAI server receives the request and queues a job.</li>
<li>The job completes (either successfully or with an error).</li>
<li>Upon completion, the server, using <code>httpx.AsyncClient</code>, initiates an HTTP POST request to the URL specified in the <code>webhook_url</code> parameter.</li>
<li>If the <code>webhook_url</code> points to an internal service, the attacker can potentially access sensitive information or trigger actions within that service.</li>
<li>If the <code>webhook_url</code> points to a cloud metadata endpoint, the attacker can retrieve cloud credentials or configuration details.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SSRF vulnerability allows an unauthenticated attacker to force the PraisonAI server to make arbitrary HTTP POST requests. This can lead to the exposure of sensitive information from internal services or cloud metadata, potentially granting the attacker unauthorized access to systems and data. The vulnerability could also be leveraged to perform denial-of-service attacks against internal resources. While the exact number of affected organizations is unknown, any organization running a vulnerable version of PraisonAI is at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade PraisonAI instances to version 4.5.128 or later to remediate CVE-2026-40114.</li>
<li>Inspect web server logs for requests to the <code>/api/v1/runs</code> endpoint containing suspicious <code>webhook_url</code> parameters to detect potential exploitation attempts. Deploy the Sigma rule to detect suspicious webhook URLs.</li>
<li>Monitor network traffic for unexpected outbound connections originating from the PraisonAI server to internal or external destinations, as this could indicate SSRF exploitation.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>ssrf</category><category>praisonai</category><category>cve-2026-40114</category><category>web-application</category></item><item><title>AGiXT Path Traversal Vulnerability (CVE-2026-39981)</title><link>https://feed.craftedsignal.io/briefs/2026-04-agixt-path-traversal/</link><pubDate>Thu, 09 Apr 2026 18:17:02 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-agixt-path-traversal/</guid><description>AGiXT versions prior to 1.9.2 are vulnerable to path traversal (CVE-2026-39981) due to insufficient validation in the safe_join() function, allowing authenticated attackers to read, write, or delete arbitrary files.</description><content:encoded><![CDATA[<p>AGiXT, a dynamic AI Agent Automation Platform, contains a critical vulnerability (CVE-2026-39981) affecting versions prior to 1.9.2. The vulnerability lies in the <code>safe_join()</code> function within the <code>essential_abilities</code> extension. This function fails to adequately validate file paths, creating an opportunity for authenticated attackers to perform directory traversal attacks. By exploiting this flaw, an attacker can manipulate file paths to access files outside the designated agent workspace, resulting in arbitrary file read, write, or deletion capabilities on the server hosting the AGiXT instance. This issue was addressed and resolved in AGiXT version 1.9.2. This vulnerability could allow an attacker to gain complete control over the AGiXT server.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker authenticates to the AGiXT application.</li>
<li>The attacker crafts a malicious request targeting the <code>safe_join()</code> function within the <code>essential_abilities</code> extension.</li>
<li>The malicious request includes directory traversal sequences (e.g., <code>../</code>) to navigate outside the intended agent workspace.</li>
<li>The <code>safe_join()</code> function fails to properly sanitize the input, allowing the traversal sequences to take effect.</li>
<li>The attacker gains the ability to read arbitrary files on the server using the path traversal.</li>
<li>The attacker exploits the ability to write to arbitrary files to inject malicious code or overwrite existing system files.</li>
<li>The attacker leverages the write access to establish persistence, potentially by modifying system startup scripts or scheduled tasks.</li>
<li>The attacker achieves arbitrary code execution on the server hosting the AGiXT instance, potentially leading to complete system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-39981 can lead to complete compromise of the AGiXT server. An attacker could gain unauthorized access to sensitive data, modify system configurations, install malware, or disrupt services. This vulnerability has a CVSS v3.1 score of 8.8, indicating a high severity. The impact could be significant for organizations relying on AGiXT for critical operations, potentially leading to data breaches, financial losses, and reputational damage. The number of victims and specific sectors targeted are currently unknown.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade AGiXT to version 1.9.2 or later to remediate CVE-2026-39981 (references: <a href="https://github.com/Josh-XT/AGiXT/releases/tag/v1.9.2)">https://github.com/Josh-XT/AGiXT/releases/tag/v1.9.2)</a>.</li>
<li>Implement input validation and sanitization measures to prevent directory traversal attacks.</li>
<li>Monitor AGiXT application logs for suspicious file access attempts and path manipulation sequences.</li>
<li>Deploy the Sigma rules below to your SIEM to detect potential exploitation attempts targeting CVE-2026-39981.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>path-traversal</category><category>cve</category><category>agixt</category><category>web-application</category></item><item><title>PHPGurukul News Portal Project SQL Injection Vulnerability (CVE-2026-5837)</title><link>https://feed.craftedsignal.io/briefs/2026-04-phpgurukul-sql-injection/</link><pubDate>Thu, 09 Apr 2026 04:17:23 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-phpgurukul-sql-injection/</guid><description>PHPGurukul News Portal Project version 4.1 is vulnerable to SQL injection via the Comment parameter in /news-details.php, potentially allowing remote attackers to execute arbitrary SQL queries.</description><content:encoded><![CDATA[<p>CVE-2026-5837 describes a SQL injection vulnerability affecting PHPGurukul News Portal Project version 4.1. The vulnerability resides in the <code>/news-details.php</code> file and is triggered by manipulating the <code>Comment</code> argument.  Successful exploitation allows remote attackers to inject arbitrary SQL commands into the application&rsquo;s database queries. The vulnerability has a CVSS v3.1 score of 7.3, indicating a high severity. Publicly available exploits exist, increasing the risk of active exploitation. Organizations using PHPGurukul News Portal Project 4.1 are urged to investigate and mitigate this vulnerability immediately. The lack of specific patching information emphasizes the importance of proactive detection and prevention measures.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a vulnerable PHPGurukul News Portal Project 4.1 instance accessible over the internet.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>/news-details.php</code> endpoint.</li>
<li>Within the request, the <code>Comment</code> parameter is manipulated to inject SQL code. For example, the attacker might inject a payload such as <code>' OR '1'='1</code> to bypass authentication or extract data.</li>
<li>The vulnerable application processes the crafted request without proper sanitization of the <code>Comment</code> parameter.</li>
<li>The injected SQL code is embedded within a database query executed by the application.</li>
<li>The database server executes the attacker-controlled SQL query, potentially allowing the attacker to read, modify, or delete data.</li>
<li>The application returns the results of the injected SQL query to the attacker, potentially revealing sensitive information or confirming successful code execution.</li>
<li>The attacker leverages the SQL injection vulnerability to potentially gain unauthorized access to sensitive data, modify website content, or even gain control of the underlying server.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-5837 can lead to unauthorized access to sensitive information stored in the PHPGurukul News Portal Project&rsquo;s database. An attacker could potentially steal user credentials, financial data, or other confidential information. The attacker could also modify website content, inject malicious code, or even gain control of the underlying server. Given the public availability of exploits, vulnerable instances are at immediate risk of compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detecting SQL Injection in PHPGurukul News Portal</code> to identify attempts to exploit CVE-2026-5837 by monitoring for suspicious characters in the <code>cs-uri-query</code> field of web server logs.</li>
<li>Apply web application firewall (WAF) rules to block requests containing common SQL injection payloads.</li>
<li>Review and harden the <code>/news-details.php</code> page to properly sanitize the Comment input field.</li>
<li>Monitor web server logs for unusual activity, especially related to the <code>/news-details.php</code> endpoint, and correlate with other security events.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>sql-injection</category><category>web-application</category><category>php</category><category>CVE-2026-5837</category></item><item><title>code-projects Simple IT Discussion Forum SQL Injection Vulnerability (CVE-2026-5829)</title><link>https://feed.craftedsignal.io/briefs/2026-04-simple-it-forum-sql-injection/</link><pubDate>Thu, 09 Apr 2026 02:16:17 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-simple-it-forum-sql-injection/</guid><description>A remote SQL injection vulnerability (CVE-2026-5829) exists in code-projects Simple IT Discussion Forum 1.0 due to improper handling of the 'post_id' argument in the '/pages/content.php' file, allowing attackers to execute arbitrary SQL queries.</description><content:encoded><![CDATA[<p>CVE-2026-5829 is a SQL injection vulnerability affecting version 1.0 of the code-projects Simple IT Discussion Forum. The vulnerability resides in the <code>/pages/content.php</code> file and is triggered by manipulating the <code>post_id</code> argument. Successful exploitation allows a remote attacker to execute arbitrary SQL queries on the underlying database. Given the public disclosure of the exploit, instances of Simple IT Discussion Forum 1.0 are at immediate risk. This is a critical vulnerability as it potentially allows an attacker to read sensitive data, modify existing data, or even gain complete control of the application and its underlying infrastructure.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable Simple IT Discussion Forum 1.0 instance accessible over the network.</li>
<li>The attacker crafts a malicious HTTP GET or POST request targeting <code>/pages/content.php</code>.</li>
<li>The crafted request includes the <code>post_id</code> parameter containing a SQL injection payload.</li>
<li>The application fails to properly sanitize the <code>post_id</code> input.</li>
<li>The unsanitized <code>post_id</code> parameter is used in a SQL query executed against the database.</li>
<li>The SQL injection payload allows the attacker to bypass intended query logic.</li>
<li>The attacker is able to extract sensitive information from the database or modify data.</li>
<li>The attacker could potentially leverage the SQL injection to execute operating system commands via SQL Server&rsquo;s <code>xp_cmdshell</code> or similar functionality if available.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-5829 can lead to significant data breaches, data manipulation, and potential system compromise.  Attackers could gain unauthorized access to sensitive user data, including credentials and personal information. The impact ranges from defacement of the forum to complete control of the web server hosting the application. The vulnerability allows attackers to read, modify, or delete data stored in the forum&rsquo;s database.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply appropriate input validation and sanitization to the <code>post_id</code> parameter in <code>/pages/content.php</code> to prevent SQL injection attacks.</li>
<li>Deploy the Sigma rule &ldquo;Detect Suspicious SQL Injection Attempts via POST ID&rdquo; to identify potential exploitation attempts targeting the <code>post_id</code> parameter.</li>
<li>Monitor web server logs for suspicious requests containing SQL injection payloads in the <code>post_id</code> parameter.</li>
<li>Review and harden database server configurations to limit the privileges of the database user account used by the Simple IT Discussion Forum application.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>web-application</category><category>cve-2026-5829</category></item><item><title>Simple IT Discussion Forum SQL Injection Vulnerability (CVE-2026-5827)</title><link>https://feed.craftedsignal.io/briefs/2026-04-simple-it-forum-sqli/</link><pubDate>Thu, 09 Apr 2026 01:16:50 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-simple-it-forum-sqli/</guid><description>CVE-2026-5827 is a SQL injection vulnerability in code-projects Simple IT Discussion Forum 1.0, allowing remote attackers to execute arbitrary SQL commands by manipulating the 'content' argument in /question-function.php.</description><content:encoded><![CDATA[<p>A SQL injection vulnerability, identified as CVE-2026-5827, affects code-projects Simple IT Discussion Forum version 1.0. The vulnerability resides in the <code>/question-function.php</code> file and is triggered by manipulating the <code>content</code> argument. Successful exploitation allows a remote attacker to inject arbitrary SQL commands, potentially leading to data exfiltration, modification, or complete system compromise. This vulnerability is considered high risk due to its ease of exploitation and the sensitive nature of data often stored in forum databases. The exploit is publicly available, increasing the likelihood of widespread exploitation. Defenders should prioritize patching and implementing mitigations to prevent potential attacks against vulnerable Simple IT Discussion Forum instances.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable Simple IT Discussion Forum 1.0 instance.</li>
<li>The attacker crafts a malicious HTTP request targeting <code>/question-function.php</code>.</li>
<li>The crafted request includes a SQL injection payload within the <code>content</code> argument.</li>
<li>The application fails to properly sanitize the input, passing the malicious SQL query to the database.</li>
<li>The database executes the injected SQL code.</li>
<li>The attacker can extract sensitive data, such as user credentials or forum content.</li>
<li>The attacker may modify data within the database, altering forum posts or user profiles.</li>
<li>In a worst-case scenario, the attacker gains complete control of the database server.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability can have severe consequences. An attacker can gain unauthorized access to sensitive data, including user credentials, private messages, and other confidential information stored within the Simple IT Discussion Forum database. This can lead to identity theft, financial fraud, and reputational damage. Furthermore, attackers can modify or delete data, disrupt forum operations, or even gain complete control of the underlying server. Given the public availability of the exploit, unpatched instances are at significant risk of compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply any available patches or updates for code-projects Simple IT Discussion Forum 1.0 to address CVE-2026-5827.</li>
<li>Implement input validation and sanitization on the <code>/question-function.php</code> file to prevent SQL injection attacks, specifically targeting the <code>content</code> argument.</li>
<li>Deploy a web application firewall (WAF) with rules to detect and block SQL injection attempts against <code>/question-function.php</code>.</li>
<li>Monitor web server logs for suspicious activity, such as unusual characters or SQL keywords in the <code>content</code> parameter of requests to <code>/question-function.php</code>. Enable webserver logging to activate the rules below.</li>
<li>Deploy the Sigma rule to detect SQL injection attempts in web server logs.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sqli</category><category>web-application</category><category>injection</category></item><item><title>PraisonAI Unauthenticated Agent Activity Exposure (CVE-2026-39889)</title><link>https://feed.craftedsignal.io/briefs/2026-04-praisonai-unauth-access/</link><pubDate>Wed, 08 Apr 2026 21:17:01 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-praisonai-unauth-access/</guid><description>PraisonAI versions prior to 4.5.115 expose agent activity without authentication due to improperly secured A2U event stream endpoints, potentially allowing unauthorized access to sensitive agent information.</description><content:encoded><![CDATA[<p>PraisonAI, a multi-agent teams system, is vulnerable to unauthenticated information disclosure in versions prior to 4.5.115. The vulnerability, identified as CVE-2026-39889, stems from the A2U (Agent-to-User) event stream server exposing sensitive agent activity without proper authentication. The <code>create_a2u_routes()</code> function registers several endpoints, including <code>/a2u/info</code>, <code>/a2u/subscribe</code>, <code>/a2u/events/{stream_name}</code>, <code>/a2u/events/sub/{id}</code>, and <code>/a2u/health</code>, without implementing authentication checks. An attacker can exploit this flaw to gain unauthorized insight into agent operations within the PraisonAI system. This vulnerability was reported on April 8, 2026, and patched in version 4.5.115.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a PraisonAI instance running a version prior to 4.5.115.</li>
<li>The attacker sends an HTTP GET request to the <code>/a2u/info</code> endpoint.</li>
<li>The server responds with information about the available agent activity streams without requiring any authentication.</li>
<li>The attacker subscribes to a specific agent activity stream by sending an HTTP GET request to <code>/a2u/subscribe</code>.</li>
<li>The server provides the attacker with a stream ID, again without authentication.</li>
<li>The attacker then requests event data from the <code>/a2u/events/{stream_name}</code> endpoint, substituting <code>{stream_name}</code> with a valid stream name obtained from <code>/a2u/info</code>.</li>
<li>Alternatively, the attacker requests event data from the <code>/a2u/events/sub/{id}</code> endpoint, where &lsquo;{id}&rsquo; is a stream ID obtained from <code>/a2u/subscribe</code>.</li>
<li>The server streams agent activity data to the attacker, enabling them to monitor agent actions and potentially extract sensitive information. The final objective is to gain unauthorized access to agent activity data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-39889 can lead to the unauthorized disclosure of sensitive information related to agent activity within the PraisonAI system. This could include confidential data processed by the agents, internal operational details, and potentially credentials or API keys used by the agents. While the exact number of affected installations is unknown, any organization using PraisonAI versions prior to 4.5.115 is potentially vulnerable.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade PraisonAI installations to version 4.5.115 or later to remediate CVE-2026-39889.</li>
<li>Monitor web server logs for requests to the <code>/a2u/info</code>, <code>/a2u/subscribe</code>, <code>/a2u/events/{stream_name}</code>, <code>/a2u/events/sub/{id}</code>, and <code>/a2u/health</code> endpoints without prior authentication. Consider deploying the Sigma rule provided below to detect such activity.</li>
<li>Implement network access controls to restrict access to the PraisonAI server to only authorized users and systems.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-39889</category><category>information-disclosure</category><category>web-application</category></item><item><title>LORIS Directory Traversal Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-loris-traversal/</link><pubDate>Wed, 08 Apr 2026 19:25:24 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-loris-traversal/</guid><description>LORIS, a neuroimaging research data management web application, is vulnerable to directory traversal (CVE-2026-35446) due to an incorrect order of operations in the FilesDownloadHandler, allowing authenticated attackers to access unauthorized files.</description><content:encoded><![CDATA[<p>LORIS (Longitudinal Online Research and Imaging System) is a self-hosted web application designed for data and project management in neuroimaging research. Versions 24.0.0 up to, but not including, 27.0.3 and 28.0.1 contain a directory traversal vulnerability (CVE-2026-35446) in the FilesDownloadHandler. This flaw stems from an incorrect order of operations, potentially enabling an attacker to escape the intended download directories and access sensitive files. Successful exploitation requires authentication and could lead to unauthorized access to sensitive research data. Users are advised to upgrade to versions 27.0.3 or 28.0.1 to mitigate this vulnerability. This vulnerability impacts organizations utilizing LORIS for managing sensitive neuroimaging data, potentially exposing research data.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker authenticates to the LORIS web application with valid credentials.</li>
<li>The attacker crafts a malicious HTTP request to the <code>FilesDownloadHandler</code>.</li>
<li>The crafted request includes a manipulated file path designed to traverse directories outside the intended download directory.</li>
<li>The <code>FilesDownloadHandler</code> processes the request with an incorrect order of operations when validating the file path.</li>
<li>The application bypasses the intended directory restrictions due to the flawed validation process.</li>
<li>The attacker gains access to files and directories outside of the designated download directory.</li>
<li>The attacker reads sensitive data, including neuroimaging data, project files, or configuration files.</li>
<li>The attacker may exfiltrate sensitive data for malicious purposes, such as espionage or sale on the dark web.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this directory traversal vulnerability (CVE-2026-35446) in LORIS could lead to unauthorized access to sensitive neuroimaging research data. The number of affected organizations is unknown, but any organization using LORIS versions 24.0.0 to before 27.0.3 and 28.0.1 is potentially vulnerable. The impact includes data breaches, intellectual property theft, and potential compromise of patient privacy if patient data is stored within the LORIS system.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade LORIS to version 27.0.3 or 28.0.1 to remediate CVE-2026-35446, as indicated in the overview.</li>
<li>Implement the &ldquo;Detect LORIS Directory Traversal Attempt&rdquo; Sigma rule to monitor for suspicious file download requests.</li>
<li>Review web server access logs for unusual file download patterns or attempts to access files outside the intended download directories using the file_event log source to detect potential exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>directory-traversal</category><category>web-application</category><category>neuroimaging</category></item><item><title>LORIS File Traversal Vulnerability (CVE-2026-34392)</title><link>https://feed.craftedsignal.io/briefs/2026-04-loris-file-traversal/</link><pubDate>Wed, 08 Apr 2026 19:25:21 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-loris-file-traversal/</guid><description>A file traversal vulnerability (CVE-2026-34392) in LORIS versions 20.0.0 to before 27.0.3 and 28.0.1 allows an unauthenticated attacker to download arbitrary files via the static file router.</description><content:encoded><![CDATA[<p>LORIS (Longitudinal Online Research and Imaging System) is a self-hosted web application used for data and project management in neuroimaging research. A critical file traversal vulnerability, identified as CVE-2026-34392, exists within the static file router of LORIS versions 20.0.0 to before 27.0.3 and 28.0.1. This flaw allows an unauthenticated attacker to access and download unintended files by manipulating requests to the <code>/static</code>, <code>/css</code>, and <code>/js</code> endpoints. Successful exploitation of this vulnerability can lead to the exposure of sensitive data, including configuration files, source code, and potentially patient information. The vulnerability is patched in versions 27.0.3 and 28.0.1. Organizations using vulnerable versions of LORIS should upgrade immediately.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a LORIS instance running a vulnerable version (20.0.0 to before 27.0.3 or 28.0.1).</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>/static</code>, <code>/css</code>, or <code>/js</code> endpoints.</li>
<li>The crafted request includes a file traversal sequence (e.g., <code>../</code>) in the URL to navigate outside the intended directory.</li>
<li>The LORIS static file router improperly handles the traversal sequence, failing to sanitize the requested path.</li>
<li>The webserver retrieves the file specified by the attacker, potentially including sensitive configuration files or source code.</li>
<li>The webserver responds with the contents of the requested file, which may contain sensitive information.</li>
<li>The attacker downloads the file and analyzes its contents for valuable information, such as database credentials or API keys.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-34392 can have severe consequences. An attacker can gain unauthorized access to sensitive files within the LORIS application. This can lead to the exposure of configuration files containing database credentials, API keys, or other sensitive data. The exposure of source code could also facilitate the discovery of other vulnerabilities. Depending on the files exposed, this could lead to further compromise of the LORIS system and potentially the underlying infrastructure, impacting the confidentiality and integrity of the research data managed by the system.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade LORIS to version 27.0.3 or 28.0.1 or later to patch CVE-2026-34392.</li>
<li>Implement web application firewall (WAF) rules to detect and block requests containing directory traversal sequences targeting the <code>/static</code>, <code>/css</code>, and <code>/js</code> endpoints.</li>
<li>Deploy the Sigma rules provided to detect exploitation attempts in web server logs.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>file-traversal</category><category>web-application</category><category>cve-2026-34392</category></item><item><title>CoolerControl-UI Stored XSS Vulnerability (CVE-2026-5301)</title><link>https://feed.craftedsignal.io/briefs/2026-04-coolercontrol-xss/</link><pubDate>Wed, 08 Apr 2026 13:16:43 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-coolercontrol-xss/</guid><description>Unauthenticated attackers can perform a stored XSS attack against CoolerControl/coolercontrol-ui versions less than 4.0.0 by injecting malicious JavaScript into log entries, leading to potential service takeover.</description><content:encoded><![CDATA[<p>CoolerControl/coolercontrol-ui versions prior to 4.0.0 are vulnerable to a stored Cross-Site Scripting (XSS) vulnerability identified as CVE-2026-5301. This flaw resides in the log viewer component of the application. Unauthenticated attackers can exploit this vulnerability by injecting malicious JavaScript code into log entries. When a user views the log entries containing the malicious script, the script executes within their browser, potentially allowing the attacker to take over the CoolerControl service. The vulnerability was reported by GitLab Inc. and affects versions prior to the release of version 4.0.0. This is a high severity vulnerability because it allows unauthenticated attackers to perform actions as other users in the application.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a CoolerControl/coolercontrol-ui instance running a version prior to 4.0.0.</li>
<li>The attacker crafts a malicious log entry containing JavaScript code designed to execute arbitrary actions within a user&rsquo;s session, such as stealing cookies or redirecting to a phishing site.</li>
<li>The attacker injects this malicious log entry into the CoolerControl/coolercontrol-ui system. The method of injection is not specified in the source but could involve exploiting other vulnerabilities or misconfigurations in the system.</li>
<li>A user, such as an administrator, accesses the log viewer within the CoolerControl/coolercontrol-ui interface.</li>
<li>The log viewer renders the malicious log entry, causing the injected JavaScript code to execute in the user&rsquo;s browser.</li>
<li>The attacker gains control of the user&rsquo;s session or performs other malicious actions, such as stealing credentials or injecting further malicious content into the application.</li>
<li>The attacker uses the compromised session to potentially escalate privileges and gain complete control over the CoolerControl service.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-5301 can lead to a complete compromise of the CoolerControl service. An attacker could gain unauthorized access to sensitive data, modify system configurations, or use the compromised system as a launchpad for further attacks. Given the nature of XSS vulnerabilities, impact is highly dependent on the privileges of the user whose session is compromised.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade CoolerControl/coolercontrol-ui to version 4.0.0 or later to remediate CVE-2026-5301.</li>
<li>Implement input validation and output encoding on all log entries to prevent the injection of malicious scripts.</li>
<li>Deploy the Sigma rule provided below to detect potential exploitation attempts by monitoring for script execution in the context of the CoolerControl/coolercontrol-ui web application.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>xss</category><category>cve-2026-5301</category><category>web-application</category></item><item><title>ChurchCRM Stored XSS Vulnerability in Person Property Management</title><link>https://feed.craftedsignal.io/briefs/2026-04-churchcrm-xss/</link><pubDate>Wed, 08 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-churchcrm-xss/</guid><description>A stored cross-site scripting (XSS) vulnerability in ChurchCRM versions prior to 7.0.0 allows authenticated users to inject arbitrary JavaScript code via dynamically assigned person properties, leading to potential session hijacking or account compromise when other users view the affected profile.</description><content:encoded><![CDATA[<p>ChurchCRM, an open-source church management system, is vulnerable to a stored cross-site scripting (XSS) attack affecting versions prior to 7.0.0. This vulnerability resides within the Person Property Management subsystem and stems from insufficient input sanitization when handling dynamically assigned person properties. An authenticated attacker can inject malicious JavaScript code, which is then persistently stored in the database. When other users view the compromised person&rsquo;s profile or access the printable view of that profile, the injected script executes, potentially leading to session hijacking or complete account takeover. This issue impacts versions patched for CVE-2023-38766, highlighting a persistent weakness. Organizations using vulnerable versions of ChurchCRM are at risk of unauthorized access and data breaches. Users are advised to update to version 7.0.0 or later to remediate this vulnerability.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker authenticates to ChurchCRM with valid user credentials.</li>
<li>Attacker navigates to the Person Property Management section.</li>
<li>Attacker creates or modifies a dynamically assigned person property, injecting malicious JavaScript code into a property field. Example payload: <code>&lt;script&gt;alert(&quot;XSS&quot;)&lt;/script&gt;</code>.</li>
<li>The application stores the malicious payload in the database without proper sanitization.</li>
<li>A different user views the profile of the person with the compromised property.</li>
<li>The stored XSS payload is rendered within the user&rsquo;s browser, executing the injected JavaScript code.</li>
<li>The attacker&rsquo;s JavaScript code steals the user&rsquo;s session cookie or redirects the user to a phishing page.</li>
<li>The attacker uses the stolen session cookie to hijack the user&rsquo;s session and gain unauthorized access to the application, potentially escalating privileges and accessing sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this stored XSS vulnerability can lead to session hijacking and full account compromise. Attackers could gain unauthorized access to sensitive church member data, modify records, or perform administrative functions within the ChurchCRM system. The impact ranges from data theft and privacy breaches to complete disruption of church management operations. Given the potential for widespread access to sensitive personal information, organizations are strongly advised to apply the necessary updates to mitigate this risk. The CVSS v3.1 base score for this vulnerability is 8.7, indicating a high severity.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade ChurchCRM to version 7.0.0 or later to patch the vulnerability (CVE-2026-35576).</li>
<li>Deploy the provided Sigma rule to detect potential XSS attempts via crafted property values.</li>
<li>Review and audit existing dynamically assigned person properties for suspicious script tags to identify potentially compromised records.</li>
<li>Implement input validation and output encoding to prevent future XSS vulnerabilities in ChurchCRM.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>xss</category><category>web-application</category><category>churchcrm</category></item><item><title>Emmett Web Framework Path Traversal Vulnerability (CVE-2026-39847)</title><link>https://feed.craftedsignal.io/briefs/2026-04-emmett-path-traversal/</link><pubDate>Tue, 07 Apr 2026 22:16:23 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-emmett-path-traversal/</guid><description>Emmett web framework versions 2.5.0 to before 2.8.1 are vulnerable to path traversal attacks (CVE-2026-39847), allowing attackers to read arbitrary files outside the intended assets directory using manipulated URLs.</description><content:encoded><![CDATA[<p>The Emmett web framework, a full-stack Python framework, is susceptible to a path traversal vulnerability affecting versions 2.5.0 to prior to 2.8.1. Specifically, the RSGI static handler for Emmett&rsquo;s internal assets (/<strong>emmett</strong> paths) does not properly sanitize user-supplied input, leading to CVE-2026-39847. By crafting malicious URLs containing &ldquo;../&rdquo; sequences, an unauthenticated attacker can bypass directory restrictions and access sensitive files residing outside the designated assets directory. Successful exploitation allows attackers to potentially read application source code, configuration files, or other sensitive data. Emmett users are urged to upgrade to version 2.8.1 or later to remediate this vulnerability. The vulnerability was reported on April 7th, 2026.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable Emmett web application running a version between 2.5.0 and 2.8.1.</li>
<li>The attacker crafts a malicious HTTP GET request targeting a static asset under the <code>/__emmett__</code> path.</li>
<li>The crafted URL includes &ldquo;../&rdquo; sequences to traverse up the directory structure from the intended assets directory. For example: <code>/__emmett__/../../../../etc/passwd</code>.</li>
<li>The web server receives the request and passes it to the vulnerable RSGI static handler.</li>
<li>Due to the lack of input sanitization, the handler processes the &ldquo;../&rdquo; sequences, allowing the attacker to navigate outside the assets directory.</li>
<li>The handler attempts to read the file specified in the manipulated path (e.g., <code>/etc/passwd</code>).</li>
<li>The server returns the contents of the requested file in the HTTP response.</li>
<li>The attacker obtains sensitive information from the server, potentially including configuration files, source code, or credentials.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this path traversal vulnerability (CVE-2026-39847) allows an attacker to read arbitrary files on the server hosting the Emmett web application. This can lead to the exposure of sensitive information such as application source code, configuration files containing database credentials, or even system files. The impact can range from information disclosure to complete compromise of the web application and potentially the underlying server. The severity is rated as critical with a CVSS v3.1 score of 9.1.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Emmett to version 2.8.1 or later to patch CVE-2026-39847.</li>
<li>Deploy the Sigma rule &ldquo;Detect Emmett Path Traversal Attempts&rdquo; to your SIEM to identify exploitation attempts.</li>
<li>Monitor web server logs for suspicious URLs containing &ldquo;../&rdquo; sequences targeting the <code>/__emmett__</code> path to identify potential exploit attempts.</li>
<li>Implement web application firewall (WAF) rules to block requests containing path traversal sequences.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>path-traversal</category><category>web-application</category><category>emmett</category><category>cve-2026-39847</category></item><item><title>ChurchCRM Authenticated API User Authorization Bypass (CVE-2026-39331)</title><link>https://feed.craftedsignal.io/briefs/2026-04-churchcrm-auth-bypass/</link><pubDate>Tue, 07 Apr 2026 18:16:44 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-churchcrm-auth-bypass/</guid><description>An authenticated API user of ChurchCRM prior to v7.1.0 can bypass authorization checks and modify arbitrary family records by manipulating the familyId parameter in API requests, leading to privilege escalation and potential data manipulation.</description><content:encoded><![CDATA[<p>ChurchCRM is an open-source church management system. Prior to version 7.1.0, a critical vulnerability exists (CVE-2026-39331) that allows authenticated API users to bypass authorization controls and modify family records without proper privileges. This is achieved by manipulating the <code>{familyId}</code> parameter in specific API requests. The vulnerability lies in the absence of role-based access control on several key API endpoints, including <code>/family/{familyId}/verify</code>, <code>/family/{familyId}/verify/url</code>, <code>/family/{familyId}/verify/now</code>, <code>/family/{familyId}/activate/{status}</code>, and <code>/family/{familyId}/geocode</code>. This allows attackers to deactivate/reactivate families, spam verification emails, mark families as verified, and trigger geocoding actions without the necessary permissions. This vulnerability poses a significant risk to the integrity and availability of ChurchCRM data, especially in multi-tenant environments. Upgrade to version 7.1.0 to remediate this vulnerability.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker authenticates to the ChurchCRM API with valid user credentials.</li>
<li>The attacker identifies a target <code>familyId</code> that they do not have explicit modification rights for.</li>
<li>The attacker crafts a malicious API request to one of the vulnerable endpoints: <code>/family/{familyId}/verify</code>, <code>/family/{familyId}/verify/url</code>, <code>/family/{familyId}/verify/now</code>, <code>/family/{familyId}/activate/{status}</code>, or <code>/family/{familyId}/geocode</code>.</li>
<li>The attacker replaces the <code>{familyId}</code> parameter in the request URL with the target <code>familyId</code>.</li>
<li>For example, the attacker sends a POST request to <code>/family/123/activate/false</code> to deactivate family with ID 123.</li>
<li>Due to the lack of role-based access control, the server processes the request without verifying if the attacker has the necessary <code>EditRecords</code> privilege.</li>
<li>The target family&rsquo;s state is modified (e.g., deactivated, marked as verified).</li>
<li>The attacker repeats this process for other families and actions, potentially causing widespread disruption or data manipulation.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-39331 allows an attacker to escalate privileges and manipulate sensitive family data within ChurchCRM. This can lead to unauthorized deactivation of families, generation of spam verification emails, inaccurate family verification status, and resource exhaustion due to excessive geocoding requests. While specific victim counts are unknown, all ChurchCRM instances prior to version 7.1.0 are vulnerable. The consequences include reputational damage, data integrity issues, and potential disruption of church operations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately upgrade ChurchCRM to version 7.1.0 to patch CVE-2026-39331 and address the authorization bypass vulnerability.</li>
<li>Monitor web server logs for suspicious requests to the vulnerable API endpoints (<code>/family/{familyId}/verify</code>, <code>/family/{familyId}/verify/url</code>, <code>/family/{familyId}/verify/now</code>, <code>/family/{familyId}/activate/{status}</code>, <code>/family/{familyId}/geocode</code>) as detected by the Sigma rule &ldquo;ChurchCRM Family ID Manipulation&rdquo;.</li>
<li>Implement stricter input validation and role-based access controls on all API endpoints to prevent unauthorized data modification, especially those handling sensitive data like family records.</li>
<li>Review and audit existing ChurchCRM user permissions to identify and revoke any unnecessary privileges that could be exploited in conjunction with this vulnerability.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-39331</category><category>churchcrm</category><category>authorization-bypass</category><category>privilege-escalation</category><category>web-application</category></item><item><title>WeGIA Web Manager SQL Injection Vulnerability (CVE-2026-35395)</title><link>https://feed.craftedsignal.io/briefs/2026-04-wegia-sql-injection/</link><pubDate>Mon, 06 Apr 2026 21:16:21 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-wegia-sql-injection/</guid><description>WeGIA web manager versions prior to 3.6.9 are vulnerable to SQL injection, allowing authenticated users to execute arbitrary SQL commands by directly interpolating the id_memorando parameter from $_REQUEST into SQL queries without validation, as identified by CVE-2026-35395.</description><content:encoded><![CDATA[<p>WeGIA (Web gerenciador para instituições assistenciais) is a web manager for charitable institutions. Versions prior to 3.6.9 are susceptible to a critical SQL injection vulnerability (CVE-2026-35395) found in the <code>dao/memorando/DespachoDAO.php</code> file. The <code>id_memorando</code> parameter, extracted from the <code>$_REQUEST</code> array, is directly incorporated into SQL queries without any validation or sanitization. This flaw enables authenticated users with low privileges to inject arbitrary SQL commands, potentially leading to complete database compromise. Successful exploitation could result in data breaches, modification of sensitive information, and denial-of-service conditions. Defenders should prioritize upgrading to version 3.6.9 or applying provided patches immediately.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An authenticated user logs into the WeGIA web application.</li>
<li>The user navigates to a page that triggers the execution of <code>dao/memorando/DespachoDAO.php</code>.</li>
<li>The application extracts the <code>id_memorando</code> parameter from the <code>$_REQUEST</code> array using the HTTP GET or POST method.</li>
<li>The attacker crafts a malicious <code>id_memorando</code> parameter containing SQL injection payloads (e.g., <code>1; DROP TABLE users; --</code>).</li>
<li>The application directly interpolates the attacker-controlled <code>id_memorando</code> parameter into an SQL query without proper sanitization within the <code>DespachoDAO.php</code> file.</li>
<li>The database server executes the injected SQL command, allowing the attacker to manipulate database records, read sensitive data, or execute arbitrary commands.</li>
<li>The attacker may exfiltrate sensitive data from the database, such as user credentials, financial information, or confidential memorandums.</li>
<li>The attacker achieves complete database compromise, potentially leading to a full system takeover.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The SQL injection vulnerability in WeGIA versions prior to 3.6.9 poses a significant risk to charitable institutions using the software. Successful exploitation can lead to unauthorized access to sensitive donor information, financial records, and confidential communications. The potential impact includes data breaches, financial losses, reputational damage, and legal liabilities. Given the nature of the targeted institutions, this vulnerability could severely disrupt their operations and erode public trust, potentially affecting thousands of individuals. Organizations that do not apply the patch are vulnerable to data breaches.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately upgrade WeGIA to version 3.6.9 to remediate the SQL injection vulnerability described in CVE-2026-35395.</li>
<li>Implement input validation and sanitization for all user-supplied data, especially the <code>id_memorando</code> parameter in <code>DespachoDAO.php</code>, to prevent future SQL injection attacks.</li>
<li>Deploy the Sigma rule &ldquo;Detect Suspicious WeGIA SQL Injection Attempts&rdquo; to your SIEM and tune it for your environment to detect exploitation attempts.</li>
<li>Monitor web server logs for suspicious requests containing SQL injection payloads targeting the <code>dao/memorando/DespachoDAO.php</code> endpoint.</li>
<li>Restrict database access privileges to the minimum required for WeGIA to function correctly.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-35395</category><category>sql-injection</category><category>web-application</category></item></channel></rss>