<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Webapps — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/webapps/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 08 May 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/webapps/feed.xml" rel="self" type="application/rss+xml"/><item><title>Bludit CMS 3.18.4 Remote Code Execution Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-bludit-rce/</link><pubDate>Fri, 08 May 2026 00:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-bludit-rce/</guid><description>A remote code execution vulnerability exists in Bludit CMS 3.18.4, for which a public exploit has been published, increasing the risk to unpatched systems.</description><content:encoded><![CDATA[<p>A remote code execution vulnerability has been identified in Bludit CMS version 3.18.4. The vulnerability is now considered critical due to the public availability of a working exploit (EDB-52553) on Exploit-DB. This exploit allows unauthenticated attackers to execute arbitrary code on systems running the vulnerable version of Bludit CMS. The availability of a public exploit lowers the barrier to entry for attackers, potentially leading to widespread exploitation attempts. Defenders should prioritize patching or mitigating this vulnerability to prevent potential compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a Bludit CMS 3.18.4 instance accessible over the internet.</li>
<li>Attacker crafts a malicious HTTP request containing the RCE exploit.</li>
<li>The crafted request is sent to the vulnerable Bludit CMS server.</li>
<li>The Bludit CMS processes the malicious request without proper sanitization.</li>
<li>The exploit triggers arbitrary code execution on the server.</li>
<li>Attacker executes commands to gain a persistent foothold (e.g., by writing a web shell).</li>
<li>Attacker uses the web shell to perform further reconnaissance and lateral movement.</li>
<li>Attacker achieves their objective, such as data exfiltration or defacement of the website.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows attackers to execute arbitrary code on the target system, potentially leading to full system compromise. This could result in data breaches, website defacement, or the use of the compromised server for malicious purposes such as hosting malware or participating in botnets. The impact is especially severe for publicly accessible Bludit CMS installations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Bludit CMS to a patched version that addresses this RCE vulnerability if available.</li>
<li>Deploy the Sigma rule &ldquo;Detect Bludit CMS RCE Attempt via HTTP Request&rdquo; to identify exploitation attempts in web server logs.</li>
<li>Implement web application firewall (WAF) rules to filter out malicious requests targeting the RCE vulnerability.</li>
<li>Monitor web server logs for suspicious activity, such as unusual file access or command execution patterns.</li>
<li>Apply principle of least privilege to the web server user account to limit the impact of a successful exploit.</li>
<li>Consider using a runtime application self-protection (RASP) solution to detect and block RCE attempts in real-time.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>webapps</category><category>rce</category><category>bludit</category></item><item><title>LuaJIT 2.1.1774638290 Arbitrary Code Execution Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-luajit-rce/</link><pubDate>Thu, 07 May 2026 00:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-luajit-rce/</guid><description>A public exploit has been published for LuaJIT version 2.1.1774638290, enabling arbitrary code execution on vulnerable web applications.</description><content:encoded><![CDATA[<p>A public exploit (EDB-52554) has been published on Exploit-DB targeting LuaJIT version 2.1.1774638290. This exploit allows for arbitrary code execution within web applications utilizing the vulnerable LuaJIT version. The availability of a working exploit significantly increases the risk to systems running unpatched versions of LuaJIT. Given the widespread use of LuaJIT in web applications, defenders should prioritize identifying and patching vulnerable instances to prevent potential exploitation. The exploit&rsquo;s publication on a public platform like Exploit-DB makes it accessible to a wide range of threat actors, increasing the likelihood of real-world attacks.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a web application using a vulnerable version of LuaJIT (2.1.1774638290).</li>
<li>The attacker crafts a malicious HTTP request designed to trigger the vulnerability.</li>
<li>This request contains specially crafted Lua code or data that exploits the arbitrary code execution flaw.</li>
<li>The web server processes the malicious request, and LuaJIT attempts to execute the attacker-controlled code.</li>
<li>Due to the vulnerability, the attacker&rsquo;s code executes within the context of the web application.</li>
<li>The attacker can then use this initial foothold to execute system commands, read sensitive files, or establish persistence.</li>
<li>Depending on the web application&rsquo;s permissions, the attacker might be able to compromise the entire server.</li>
<li>The final objective is typically to gain unauthorized access to data, disrupt services, or use the compromised server as a launchpad for further attacks.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to execute arbitrary code on the affected web server. This can lead to complete system compromise, data theft, denial of service, and further lateral movement within the network. The specific impact depends on the privileges of the web application and the attacker&rsquo;s objectives. Due to the ease of access to the exploit code, any web application using the vulnerable LuaJIT version is at immediate risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Identify all instances of LuaJIT version 2.1.1774638290 in your environment and prioritize patching or upgrading to a secure version.</li>
<li>Deploy the Sigma rules provided below to your SIEM to detect potential exploitation attempts targeting this vulnerability.</li>
<li>Monitor web server logs for suspicious activity, particularly HTTP requests containing unusual Lua code patterns (see Sigma rules).</li>
<li>Implement input validation and sanitization measures to prevent the injection of malicious code into LuaJIT environments.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">threat</category><category>webapps</category><category>code-execution</category><category>luajit</category></item><item><title>Ghost CMS 6.19.0 SQL Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-ghost-cms-sqli/</link><pubDate>Thu, 07 May 2026 00:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-ghost-cms-sqli/</guid><description>A SQL injection vulnerability exists in Ghost CMS 6.19.0, and a public exploit (EDB-52555) is available, increasing the risk to unpatched systems.</description><content:encoded><![CDATA[<p>A SQL injection vulnerability has been identified in Ghost CMS version 6.19.0. A public exploit (EDB-52555) is available on Exploit-DB, which significantly increases the risk to unpatched systems. The vulnerability allows for potential unauthorized access to the database, leading to data breaches or modification. Ghost CMS is a popular open-source platform for creating and managing online publications. The availability of a working exploit makes exploitation easier and more likely.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a Ghost CMS 6.19.0 instance.</li>
<li>Attacker crafts a malicious SQL query designed to exploit the SQL injection vulnerability.</li>
<li>Attacker injects the crafted SQL query into a vulnerable parameter or input field of the Ghost CMS application.</li>
<li>The application processes the malicious SQL query without proper sanitization or validation.</li>
<li>The injected SQL query is executed against the underlying database.</li>
<li>The attacker gains unauthorized access to sensitive data stored in the database, such as user credentials, posts, or configuration settings.</li>
<li>The attacker may modify data, create new administrative accounts, or extract sensitive information.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability could lead to unauthorized access to sensitive data stored in the Ghost CMS database. This could include user credentials, content, and potentially system configurations. The impact ranges from data breaches and defacement of the website to complete compromise of the Ghost CMS instance.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Ghost CMS to a patched version that addresses the SQL injection vulnerability.</li>
<li>Deploy the Sigma rules in this brief to your SIEM and tune for your environment.</li>
<li>Implement input validation and sanitization measures to prevent SQL injection attacks.</li>
<li>Monitor web server logs for suspicious activity and potential SQL injection attempts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sqli</category><category>webapps</category><category>ghostcms</category></item></channel></rss>