<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Webserver — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/webserver/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 04 May 2026 15:08:49 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/webserver/feed.xml" rel="self" type="application/rss+xml"/><item><title>Critical Authentication Bypass Vulnerability in MOVEit Automation (CVE-2026-4670)</title><link>https://feed.craftedsignal.io/briefs/2026-05-moveit-auth-bypass/</link><pubDate>Mon, 04 May 2026 15:08:49 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-moveit-auth-bypass/</guid><description>A critical authentication bypass vulnerability (CVE-2026-4670) in Progress MOVEit Automation allows an unauthenticated remote attacker to gain administrative access, potentially leading to full control over the application and sensitive file transfer workflows.</description><content:encoded><![CDATA[<p>Progress MOVEit Automation is affected by a critical authentication bypass vulnerability, CVE-2026-4670, which has a CVSS score of 9.8. Successful exploitation allows an unauthenticated remote attacker to gain administrative access to the vulnerable service. Additionally, a high severity privilege escalation vulnerability, CVE-2026-5174, exists due to improper input validation. While there is no current evidence of active exploitation in the wild, the historical targeting of Managed File Transfer (MFT) solutions, such as the 2023 Cl0p ransomware campaigns targeting MOVEit Transfer, heightens the urgency of patching this vulnerability. The affected versions of MOVEit Automation include versions prior to 2024.0.0, versions 2024.0.0 before 2024.1.8, versions 2025.0.0 before 2025.0.9, and versions 2025.1.0 before 2025.1.5. Defenders should prioritize patching to prevent potential exploitation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker sends a specially crafted request to the MOVEit Automation server, exploiting CVE-2026-4670 (authentication bypass).</li>
<li>The vulnerable MOVEit Automation software fails to properly validate the attacker&rsquo;s identity, granting them unauthorized access.</li>
<li>The attacker gains access to the MOVEit Automation application with administrative privileges.</li>
<li>The attacker leverages CVE-2026-5174 (improper input validation) to further escalate privileges within the application.</li>
<li>The attacker manipulates sensitive file transfer workflows, potentially modifying file permissions or altering transfer schedules.</li>
<li>The attacker exfiltrates sensitive data stored within MOVEit Automation.</li>
<li>Alternatively, the attacker could deploy malicious scripts or backdoors to maintain persistence and control over the system.</li>
<li>The attacker achieves complete control over the MOVEit Automation server, potentially impacting connected systems and data integrity.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-4670 allows an unauthenticated attacker to gain administrative access to Progress MOVEit Automation servers. This can lead to the compromise of sensitive data, disruption of file transfer workflows, and potential deployment of ransomware or other malicious payloads. Given the history of MOVEit products being targeted, a successful attack could have widespread impact across various sectors that rely on MOVEit for secure file transfer, potentially affecting thousands of organizations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately patch all affected MOVEit Automation installations to versions 2025.1.5 or later, 2025.0.9 or later, or 2024.1.8 or later as recommended by Progress Software to remediate CVE-2026-4670 and CVE-2026-5174.</li>
<li>Upscale monitoring and detection capabilities to identify any suspicious activity related to MOVEit Automation, as recommended by the CCB.</li>
<li>Implement the provided Sigma rule &ldquo;Detect MOVEit Automation Authentication Bypass Attempt&rdquo; to identify potential exploitation attempts targeting CVE-2026-4670 based on web server logs.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">threat</category><category>authentication-bypass</category><category>privilege-escalation</category><category>cve-2026-4670</category><category>cve-2026-5174</category><category>webserver</category></item><item><title>Totolink N300RH Buffer Overflow Vulnerability (CVE-2026-7750)</title><link>https://feed.craftedsignal.io/briefs/2026-05-totolink-buffer-overflow/</link><pubDate>Mon, 04 May 2026 10:16:01 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-totolink-buffer-overflow/</guid><description>A buffer overflow vulnerability exists in Totolink N300RH 3.2.4-B20220812 allowing remote attackers to execute arbitrary code by manipulating the mac_address argument in the setMacFilterRules function of the /cgi-bin/cstecgi.cgi POST request handler.</description><content:encoded><![CDATA[<p>A buffer overflow vulnerability, identified as CVE-2026-7750, affects Totolink N300RH router version 3.2.4-B20220812. The vulnerability resides in the <code>setMacFilterRules</code> function within the <code>/cgi-bin/cstecgi.cgi</code> file, which handles POST requests. Attackers can exploit this flaw by sending a specially crafted POST request with an overly long <code>mac_address</code> parameter, triggering a buffer overflow. Successful exploitation allows for arbitrary code execution on the device. The vulnerability is remotely exploitable, and a public exploit is available, increasing the risk of widespread attacks. Defenders should prioritize patching or mitigating this vulnerability to prevent potential compromise of affected devices.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable Totolink N300RH router running firmware version 3.2.4-B20220812.</li>
<li>The attacker crafts a malicious POST request targeting the <code>/cgi-bin/cstecgi.cgi</code> endpoint.</li>
<li>Within the POST request, the attacker includes the <code>mac_address</code> parameter, injecting a string longer than the buffer allocated for it.</li>
<li>The <code>setMacFilterRules</code> function processes the POST request without proper bounds checking on the <code>mac_address</code> argument.</li>
<li>The overly long <code>mac_address</code> value overflows the buffer, overwriting adjacent memory regions.</li>
<li>The attacker carefully crafts the overflow to overwrite the return address, redirecting execution flow to attacker-controlled code.</li>
<li>The injected code executes with the privileges of the web server, allowing the attacker to execute arbitrary commands.</li>
<li>The attacker gains complete control over the router, potentially using it for further malicious activities such as network pivoting, data exfiltration, or denial-of-service attacks.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7750 allows a remote attacker to execute arbitrary code on the vulnerable Totolink N300RH device. This could lead to a complete compromise of the router, allowing the attacker to control network traffic, steal sensitive information, or use the router as a bot in a larger attack. Given the public availability of the exploit, a large number of unpatched devices could be vulnerable to automated attacks, potentially impacting thousands of users.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply available patches or firmware updates provided by Totolink to address CVE-2026-7750.</li>
<li>Implement network intrusion detection system (IDS) rules to detect and block suspicious POST requests targeting the <code>/cgi-bin/cstecgi.cgi</code> endpoint with excessively long <code>mac_address</code> parameters.</li>
<li>Deploy the Sigma rules in this brief to your SIEM to detect exploitation attempts.</li>
<li>Monitor web server logs for unusual POST requests to <code>/cgi-bin/cstecgi.cgi</code>, focusing on requests with large <code>mac_address</code> values.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>buffer-overflow</category><category>router</category><category>cve</category><category>webserver</category></item><item><title>Shandong Hoteam PDM Product Data Management System SQL Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-hoteam-pdm-sqli/</link><pubDate>Mon, 04 May 2026 05:16:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-hoteam-pdm-sqli/</guid><description>Shandong Hoteam Software PDM Product Data Management System up to version 8.3.9 is vulnerable to SQL injection via manipulation of the SortOrder argument in the GetQueryMachineGridOnePageData function of the /Base/BaseService.asmx/DataService file, allowing remote attackers to potentially execute arbitrary SQL commands.</description><content:encoded><![CDATA[<p>Shandong Hoteam Software&rsquo;s PDM Product Data Management System before version 8.3.10 is susceptible to a SQL injection vulnerability. The vulnerability exists in the <code>/Base/BaseService.asmx/DataService</code> file, specifically affecting the <code>GetQueryMachineGridOnePageData</code> function. By manipulating the <code>SortOrder</code> argument, a remote attacker can inject malicious SQL queries into the system. Successful exploitation could lead to unauthorized data access, modification, or even complete system compromise. Organizations using versions prior to 8.3.10 are urged to upgrade immediately to mitigate the risk. This vulnerability was reported on May 4, 2026.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable Shandong Hoteam PDM instance running a version prior to 8.3.10.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>/Base/BaseService.asmx/DataService</code> endpoint.</li>
<li>Within the HTTP request, the attacker modifies the <code>SortOrder</code> argument.</li>
<li>The <code>SortOrder</code> argument is injected with SQL code.</li>
<li>The application fails to properly sanitize the attacker-supplied SQL code.</li>
<li>The application executes the attacker-controlled SQL query against the backend database.</li>
<li>The attacker gains unauthorized access to sensitive data stored within the database.</li>
<li>The attacker exfiltrates the data or uses it for further malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability allows remote attackers to execute arbitrary SQL commands on the affected system. This can lead to unauthorized access to sensitive data, modification of data, or even complete compromise of the database server. Organizations using vulnerable versions of Shandong Hoteam PDM Product Data Management System could suffer significant data breaches, financial losses, and reputational damage. There are no specific victim counts or sector targeting available, but this could affect any organization utilizing the vulnerable PDM system.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Shandong Hoteam Software PDM Product Data Management System to version 8.3.10 or later to remediate the vulnerability as mentioned in the overview.</li>
<li>Implement the provided Sigma rule <code>Detect Hoteam PDM SQL Injection Attempt</code> to identify malicious requests targeting the vulnerable endpoint.</li>
<li>Monitor web server logs for suspicious requests containing potentially malicious SQL syntax in the <code>SortOrder</code> parameter, as described in the attack chain.</li>
<li>Implement proper input validation and sanitization techniques to prevent SQL injection vulnerabilities in web applications, mitigating similar risks in the future.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>cve-2026-7727</category><category>webserver</category></item><item><title>Acrel ECEMS SQL Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-acrel-sql-injection/</link><pubDate>Sun, 03 May 2026 12:15:59 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-acrel-sql-injection/</guid><description>A SQL injection vulnerability in Acrel Electrical ECEMS Enterprise Microgrid Energy Efficiency Management System 1.3.0 allows remote attackers to execute arbitrary SQL commands by manipulating the 'fCircuitids' argument in the '/SubstationWEBV2/main/elecMaxMinAvgValue' file.</description><content:encoded><![CDATA[<p>Acrel Electrical&rsquo;s ECEMS Enterprise Microgrid Energy Efficiency Management System version 1.3.0 is vulnerable to SQL injection. The vulnerability resides in the <code>/SubstationWEBV2/main/elecMaxMinAvgValue</code> file, where manipulation of the <code>fCircuitids</code> argument allows for the injection of arbitrary SQL commands. The vulnerability, identified as CVE-2026-7694, can be exploited remotely without authentication, posing a significant risk to systems exposed to the network. The vendor was notified but did not respond, and a public exploit is available, increasing the likelihood of exploitation. This flaw allows attackers to potentially access, modify, or delete sensitive data within the ECEMS database.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies an accessible instance of Acrel ECEMS 1.3.0.</li>
<li>Attacker crafts a malicious SQL payload designed to extract sensitive information or modify the database.</li>
<li>The attacker sends a crafted HTTP request to <code>/SubstationWEBV2/main/elecMaxMinAvgValue</code> with the SQL payload embedded in the <code>fCircuitids</code> parameter.</li>
<li>The ECEMS application fails to properly sanitize the <code>fCircuitids</code> input.</li>
<li>The application executes the attacker-supplied SQL query against the database.</li>
<li>The database server processes the malicious query, potentially returning sensitive data or executing harmful commands.</li>
<li>The attacker receives the output of the injected SQL query.</li>
<li>The attacker uses the extracted information for further malicious activities, such as data exfiltration, privilege escalation, or denial of service.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability could allow an attacker to read sensitive information from the ECEMS database, modify existing data, or even gain administrative access to the system. This could lead to the compromise of energy efficiency management data, potentially impacting grid stability and financial records. Given the lack of vendor response and the availability of a public exploit, organizations using the affected software are at high risk. The impact includes potential data breaches, system outages, and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Inspect web server logs for suspicious requests to <code>/SubstationWEBV2/main/elecMaxMinAvgValue</code> containing potentially malicious SQL syntax within the <code>fCircuitids</code> parameter (see Sigma rule &ldquo;Detect Acrel ECEMS SQL Injection Attempt&rdquo;).</li>
<li>Deploy the Sigma rule &ldquo;Detect SQL Injection Error Messages&rdquo; to identify potential SQL injection attempts across all web applications.</li>
<li>Apply input validation and sanitization to all user-supplied input, especially the <code>fCircuitids</code> parameter in <code>/SubstationWEBV2/main/elecMaxMinAvgValue</code>, to prevent SQL injection.</li>
<li>Consider deploying a web application firewall (WAF) to filter out malicious requests targeting this vulnerability.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>cve-2026-7694</category><category>webserver</category></item><item><title>Edimax BR-6428nC Buffer Overflow Vulnerability (CVE-2026-7684)</title><link>https://feed.craftedsignal.io/briefs/2026-05-edimax-br-6428nc-buffer-overflow/</link><pubDate>Sun, 03 May 2026 07:16:25 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-edimax-br-6428nc-buffer-overflow/</guid><description>A remote buffer overflow vulnerability exists in Edimax BR-6428nC devices up to version 1.16 via manipulation of the pptpDfGateway argument in the /goform/setWAN file, potentially allowing for arbitrary code execution.</description><content:encoded><![CDATA[<p>A buffer overflow vulnerability, tracked as CVE-2026-7684, affects Edimax BR-6428nC devices up to version 1.16. The vulnerability resides in the <code>/goform/setWAN</code> file, specifically within the handling of the <code>pptpDfGateway</code> argument. An unauthenticated attacker can exploit this flaw remotely by sending a crafted request to the device. Publicly available exploit code exists, increasing the risk of widespread exploitation. The vendor was notified but did not respond, suggesting that a patch is unlikely and highlighting the need for mitigation strategies.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies an Edimax BR-6428nC device running a vulnerable firmware version (&lt;= 1.16).</li>
<li>The attacker crafts a malicious HTTP POST request targeting the <code>/goform/setWAN</code> endpoint.</li>
<li>The request includes the <code>pptpDfGateway</code> parameter with a value exceeding the expected buffer size.</li>
<li>The device processes the request, and the oversized <code>pptpDfGateway</code> value overflows the buffer, overwriting adjacent memory regions.</li>
<li>The attacker carefully crafts the overflow to overwrite the return address, redirecting execution flow.</li>
<li>Execution is redirected to attacker-controlled code injected within the overflowed buffer.</li>
<li>The attacker gains arbitrary code execution on the device, potentially achieving full system control.</li>
<li>The attacker could then use this control to modify device settings, intercept network traffic, or establish a persistent backdoor.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability can allow an attacker to gain complete control of the Edimax BR-6428nC device. This could enable the attacker to intercept and modify network traffic, access sensitive information, or use the device as a point of entry for further attacks within the network. Given the public availability of exploit code, the risk of widespread exploitation is significant.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Edimax_BR_6428nC_Buffer_Overflow_setWAN</code> to detect suspicious HTTP requests targeting the vulnerable endpoint and parameter.</li>
<li>Consider blocking or rate-limiting access to the <code>/goform/setWAN</code> endpoint from untrusted networks.</li>
<li>Since the vendor is unresponsive and a patch is unlikely, network segmentation and access control policies are the best mitigation options.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>buffer overflow</category><category>cve-2026-7684</category><category>webserver</category></item><item><title>Edimax BR-6208AC Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-edimax-bo/</link><pubDate>Sun, 03 May 2026 07:16:25 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-edimax-bo/</guid><description>A buffer overflow vulnerability exists in Edimax BR-6208AC devices (&lt;= 1.02) via manipulation of the pptpDfGateway argument in the /goform/setWAN endpoint, potentially allowing remote attackers to execute arbitrary code.</description><content:encoded><![CDATA[<p>A buffer overflow vulnerability, CVE-2026-7685, has been identified in Edimax BR-6208AC routers up to version 1.02. The vulnerability resides within the <code>/goform/setWAN</code> file, specifically related to the <code>pptpDfGateway</code> argument. Successful exploitation of this flaw could allow a remote attacker to execute arbitrary code or cause a denial-of-service condition. Publicly available exploits exist, increasing the risk of widespread exploitation. The vendor was notified but has not responded. Given the ease of exploitation and the potential for significant impact, this vulnerability poses a critical threat to affected devices.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies an Edimax BR-6208AC router with firmware version 1.02 or earlier exposed to the internet.</li>
<li>The attacker crafts a malicious HTTP POST request targeting the <code>/goform/setWAN</code> endpoint.</li>
<li>Within the POST request, the attacker includes the <code>pptpDfGateway</code> argument, injecting a payload exceeding the buffer&rsquo;s expected size.</li>
<li>The router&rsquo;s web server processes the malicious request without proper input validation on the size of the <code>pptpDfGateway</code> argument.</li>
<li>The oversized payload overwrites adjacent memory regions on the stack, potentially including return addresses or other critical data.</li>
<li>When the function attempts to return, it jumps to an address controlled by the attacker, leading to arbitrary code execution.</li>
<li>The attacker executes commands to gain control of the device, potentially installing malware or modifying router settings.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability can lead to complete compromise of the Edimax BR-6208AC router. An attacker could leverage this access to perform a variety of malicious activities, including eavesdropping on network traffic, injecting malicious code into web pages served by the router, or using the router as a bot in a larger botnet. Given the availability of public exploits, unpatched devices are at immediate risk of compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect Edimax BR-6208AC setWAN Buffer Overflow Attempt</code> to identify exploitation attempts in web server logs.</li>
<li>Inspect web server logs for POST requests to <code>/goform/setWAN</code> containing unusually long <code>pptpDfGateway</code> parameters, as detected by the Sigma rule <code>Detect Long pptpDfGateway Parameter</code>.</li>
<li>Apply appropriate network segmentation to limit the blast radius of compromised devices and prevent lateral movement.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>buffer overflow</category><category>cve-2026-7685</category><category>router</category><category>webserver</category></item><item><title>Sunwood-ai-labs command-executor-mcp-server OS Command Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-sunwood-command-injection/</link><pubDate>Fri, 01 May 2026 21:16:17 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-sunwood-command-injection/</guid><description>CVE-2026-7593 is an OS command injection vulnerability in Sunwood-ai-labs command-executor-mcp-server up to version 0.1.0, allowing remote attackers to execute arbitrary commands via the execute_command function in src/index.ts.</description><content:encoded><![CDATA[<p>A critical security vulnerability, identified as CVE-2026-7593, affects Sunwood-ai-labs command-executor-mcp-server versions up to 0.1.0. This vulnerability resides within the <code>execute_command</code> function of the <code>src/index.ts</code> file, a component of the MCP Interface. Successful exploitation allows a remote attacker to inject and execute arbitrary operating system commands on the server. The vulnerability has been publicly disclosed, making it a high-risk issue for systems running the affected software. The vendor was notified through an issue report but has not yet responded, potentially increasing the window of opportunity for attackers. Defenders should prioritize patching or mitigating this vulnerability to prevent unauthorized command execution and potential system compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable instance of Sunwood-ai-labs command-executor-mcp-server running version 0.1.0 or earlier.</li>
<li>The attacker crafts a malicious request targeting the <code>execute_command</code> function within the MCP Interface.</li>
<li>The malicious request includes an OS command injection payload.</li>
<li>The <code>execute_command</code> function in <code>src/index.ts</code> fails to properly sanitize or neutralize the input, passing it directly to the operating system.</li>
<li>The operating system executes the attacker-supplied command with the privileges of the server process.</li>
<li>The attacker gains arbitrary code execution on the server.</li>
<li>The attacker can then use this access to perform further actions such as escalating privileges, installing malware, or exfiltrating sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7593 allows an attacker to execute arbitrary commands on the affected server. This could lead to complete system compromise, including data theft, service disruption, or the deployment of malicious software. Given the ease of exploitation and the public availability of exploit code, organizations using the vulnerable Sunwood-ai-labs command-executor-mcp-server are at significant risk. While the exact number of affected installations is unknown, the potential impact is severe due to the possibility of full remote control over the compromised server.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply any available patches or updates from Sunwood-ai-labs to address CVE-2026-7593.</li>
<li>Implement input validation and sanitization measures within the <code>execute_command</code> function to prevent OS command injection.</li>
<li>Deploy the Sigma rule <code>Detect Suspicious Command Execution via MCP Server</code> to identify potential exploitation attempts (see below).</li>
<li>Monitor network traffic for suspicious requests targeting the MCP Interface, specifically those containing command injection payloads.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-7593</category><category>command-injection</category><category>webserver</category></item><item><title>cPanel and WHM Authentication Bypass Vulnerability (CVE-2026-41940)</title><link>https://feed.craftedsignal.io/briefs/2026-04-cpanel-auth-bypass/</link><pubDate>Wed, 29 Apr 2026 16:16:25 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-cpanel-auth-bypass/</guid><description>An authentication bypass vulnerability in cPanel and WHM versions prior to 11.110.0.97, 11.118.0.63, 11.126.0.54, 11.132.0.29, 11.134.0.20, and 11.136.0.5 allows unauthenticated remote attackers to gain unauthorized access to the control panel.</description><content:encoded><![CDATA[<p>On April 28, 2026, a critical authentication bypass vulnerability (CVE-2026-41940) was disclosed affecting cPanel and WHM. This vulnerability impacts versions prior to 11.110.0.97, 11.118.0.63, 11.126.0.54, 11.132.0.29, 11.134.0.20, and 11.136.0.5. The vulnerability exists within the login flow, allowing unauthenticated remote attackers to bypass authentication and gain unauthorized access to the control panel. Successful exploitation grants attackers complete control over the affected cPanel and WHM instances, potentially leading to data theft, server compromise, and further malicious activities. This vulnerability poses a significant risk to web hosting providers and their customers.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker sends a crafted HTTP request to the cPanel/WHM login page, exploiting the authentication bypass vulnerability.</li>
<li>The vulnerable cPanel/WHM version fails to properly validate the request, allowing the attacker to bypass the login process.</li>
<li>The attacker gains unauthorized access to the cPanel/WHM interface.</li>
<li>The attacker enumerates the server to identify valuable files, directories, and database configurations.</li>
<li>The attacker leverages the compromised cPanel/WHM access to upload malicious scripts or binaries.</li>
<li>The attacker executes uploaded payloads to establish persistent access, such as a web shell.</li>
<li>The attacker uses the web shell to perform arbitrary commands on the server, including escalating privileges.</li>
<li>The attacker exfiltrates sensitive data, defaces websites, or deploys ransomware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-41940 can lead to complete compromise of cPanel and WHM servers. This can result in data breaches, website defacement, and denial-of-service attacks. The vulnerability affects a wide range of cPanel and WHM installations, potentially impacting thousands of web hosting providers and their customers. The high CVSS score (9.8) reflects the severity of the risk and the ease with which it can be exploited.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately upgrade cPanel and WHM installations to versions 11.110.0.97, 11.118.0.63, 11.126.0.54, 11.132.0.29, 11.134.0.20, or 11.136.0.5, or later to patch CVE-2026-41940.</li>
<li>Monitor web server logs for unusual activity and unauthorized access attempts to the cPanel/WHM interface by deploying the Sigma rule <code>DetectCpanelAuthBypassAccess</code>.</li>
<li>Implement strict access control policies to limit access to cPanel/WHM administrative interfaces and monitor the user activity by deploying the Sigma rule <code>DetectCpanelAccountManipulation</code>.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cpanel</category><category>whm</category><category>authentication-bypass</category><category>CVE-2026-41940</category><category>webserver</category></item><item><title>Toowiredd chatgpt-mcp-server OS Command Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-chatgpt-mcp-server-cmd-injection/</link><pubDate>Sun, 26 Apr 2026 22:17:33 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-chatgpt-mcp-server-cmd-injection/</guid><description>Toowiredd chatgpt-mcp-server up to version 0.1.0 is vulnerable to OS command injection via the file src/services/docker.service.ts of the component MCP/HTTP, allowing for remote exploitation.</description><content:encoded><![CDATA[<p>Toowiredd chatgpt-mcp-server, specifically versions up to 0.1.0, contains an OS command injection vulnerability within the <code>src/services/docker.service.ts</code> file of the MCP/HTTP component. This flaw allows for remote exploitation, potentially enabling attackers to execute arbitrary commands on the underlying operating system. The vulnerability, identified as CVE-2026-7061, has a publicly available exploit, increasing the risk of exploitation. The project maintainers were notified via an issue report but have not yet addressed the vulnerability, making it crucial for defenders to implement mitigation and detection measures. This poses a significant risk to systems running vulnerable versions of chatgpt-mcp-server, as successful exploitation could lead to complete system compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable instance of Toowiredd chatgpt-mcp-server running version 0.1.0 or earlier.</li>
<li>The attacker crafts a malicious HTTP request targeting the MCP/HTTP component.</li>
<li>The request exploits the command injection vulnerability in <code>src/services/docker.service.ts</code>.</li>
<li>The server-side code improperly sanitizes input, allowing the attacker to inject OS commands.</li>
<li>The injected OS command is executed by the server with the privileges of the chatgpt-mcp-server process.</li>
<li>The attacker gains initial access to the system.</li>
<li>The attacker leverages the initial access to escalate privileges or move laterally within the network.</li>
<li>The attacker achieves their objective, such as data exfiltration, deploying malware, or disrupting services.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this OS command injection vulnerability (CVE-2026-7061) in Toowiredd chatgpt-mcp-server can lead to complete system compromise. Attackers can execute arbitrary commands, potentially leading to data breaches, service disruption, or the deployment of malicious software. Given the public availability of the exploit, organizations using this software are at a heightened risk of attack. The lack of a patch from the project maintainers further exacerbates the risk, making proactive detection and mitigation measures essential.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for suspicious HTTP requests targeting the MCP/HTTP component of chatgpt-mcp-server, focusing on requests that might be attempting command injection (log source: webserver, product: linux).</li>
<li>Deploy the Sigma rule &ldquo;Detect Suspicious chatgpt-mcp-server Command Injection Attempts&rdquo; to identify exploitation attempts in web server logs.</li>
<li>Restrict access to the chatgpt-mcp-server instance to minimize the attack surface.</li>
<li>Consider deploying a web application firewall (WAF) to filter out malicious requests.</li>
<li>Monitor child processes spawned by the chatgpt-mcp-server process for unexpected or malicious commands (log source: process_creation, product: linux).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-7061</category><category>command-injection</category><category>webserver</category></item><item><title>WWBN AVideo Unauthenticated Path Traversal Vulnerability (CVE-2026-41058)</title><link>https://feed.craftedsignal.io/briefs/2026-04-avideo-path-traversal/</link><pubDate>Wed, 22 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-avideo-path-traversal/</guid><description>WWBN AVideo versions 29.0 and below contain a path traversal vulnerability (CVE-2026-41058) in the CloneSite functionality, allowing unauthenticated attackers to delete arbitrary files via manipulation of the `deleteDump` parameter.</description><content:encoded><![CDATA[<p>WWBN AVideo is an open-source video platform. Versions 29.0 and below are vulnerable to a path traversal vulnerability (CVE-2026-41058) due to an incomplete fix for the <code>deleteDump</code> parameter in the CloneSite functionality. This vulnerability allows unauthenticated attackers to delete arbitrary files on the server by injecting <code>../../</code> sequences into the GET request. The vulnerability was reported on April 21, 2026, and a fix is available in commit 3c729717c26f160014a5c86b0b6accdbd613e7b2. Successful exploitation allows attackers to potentially disrupt service, delete sensitive data, or escalate privileges depending on the file permissions.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies an AVideo instance running version 29.0 or below.</li>
<li>The attacker crafts a malicious HTTP GET request targeting the CloneSite functionality.</li>
<li>The attacker injects a path traversal sequence (e.g., <code>../../</code>) into the <code>deleteDump</code> parameter of the GET request.</li>
<li>The AVideo application fails to properly sanitize the <code>deleteDump</code> parameter.</li>
<li>The <code>unlink()</code> function is called with the attacker-controlled path, allowing deletion of arbitrary files.</li>
<li>The attacker uses the vulnerability to delete critical system files or configuration files.</li>
<li>The application or server becomes unstable or inoperable.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-41058 allows unauthenticated attackers to delete arbitrary files on the AVideo server. This can lead to denial of service, data loss, or potential privilege escalation if critical system files are deleted. The vulnerability affects all AVideo instances running version 29.0 or below, potentially impacting a large number of users and organizations relying on the platform.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade AVideo instances to a version containing the fix from commit 3c729717c26f160014a5c86b0b6accdbd613e7b2 to address CVE-2026-41058.</li>
<li>Deploy the Sigma rule <code>Detect AVideo Path Traversal Attempt</code> to identify exploitation attempts in web server logs.</li>
<li>Implement web application firewall (WAF) rules to block requests containing path traversal sequences in the <code>deleteDump</code> parameter.</li>
<li>Monitor web server logs for suspicious activity related to the CloneSite functionality and the <code>deleteDump</code> parameter.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>path traversal</category><category>cve-2026-41058</category><category>avideo</category><category>webserver</category></item><item><title>Insecure Deserialization Vulnerability in Telerik UI for AJAX RadFilter Control (CVE-2026-6023)</title><link>https://feed.craftedsignal.io/briefs/2026-04-telerik-rce/</link><pubDate>Wed, 22 Apr 2026 08:16:13 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-telerik-rce/</guid><description>An insecure deserialization vulnerability exists in Progress Telerik UI for AJAX's RadFilter control (versions 2024.4.1114 through 2026.1.421) allowing remote code execution via tampering with the filter state exposed to the client.</description><content:encoded><![CDATA[<p>CVE-2026-6023 exposes a critical vulnerability within the RadFilter control of Progress Telerik UI for AJAX. Affecting versions 2024.4.1114 to 2026.1.421, this flaw stems from insecure deserialization practices. The vulnerability arises when the filter state is exposed to the client, enabling malicious actors to manipulate this state. Successful exploitation grants attackers the ability to execute arbitrary code on the server. This vulnerability poses a significant risk to organizations utilizing the affected Telerik UI for AJAX versions, potentially leading to complete system compromise and data breaches. Defenders must promptly address this issue through patching or mitigation strategies.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a web application utilizing a vulnerable version of Progress Telerik UI for AJAX (2024.4.1114 - 2026.1.421) with the RadFilter control enabled.</li>
<li>The attacker observes the RadFilter control&rsquo;s behavior, specifically how filter states are serialized and exposed to the client-side, typically within the HTTP request or response.</li>
<li>The attacker intercepts the serialized filter state data, often Base64 encoded or similar, transmitted between the client and server.</li>
<li>The attacker crafts a malicious serialized payload containing instructions to execute arbitrary code on the server. This involves exploiting the insecure deserialization process.</li>
<li>The attacker replaces the original, legitimate serialized filter state with the malicious payload.</li>
<li>The attacker sends the modified request containing the malicious serialized data to the server.</li>
<li>The Telerik UI for AJAX application on the server attempts to deserialize the tampered data using the RadFilter control.</li>
<li>Due to the insecure deserialization vulnerability, the malicious payload is executed, granting the attacker remote code execution on the server. The attacker can then perform actions such as installing malware, exfiltrating sensitive data, or disrupting services.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-6023 can lead to complete compromise of the affected server. An attacker can gain remote code execution, enabling them to install malware, steal sensitive data, or disrupt critical business operations. Given the widespread use of Telerik UI in enterprise applications, this vulnerability could potentially impact a large number of organizations across various sectors. Unpatched systems are at high risk of being exploited, leading to significant financial and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately upgrade Progress Telerik UI for AJAX to a patched version outside the range of 2024.4.1114 through 2026.1.421 to remediate CVE-2026-6023.</li>
<li>Deploy the Sigma rule <code>Detect Suspicious Telerik RadFilter Deserialization Attempt</code> to identify attempts to exploit the deserialization vulnerability by monitoring for suspicious HTTP requests targeting the RadFilter control (Log source: webserver).</li>
<li>Implement input validation and sanitization on the server-side to prevent malicious data from being deserialized.</li>
<li>Monitor web server logs for unusual activity related to the RadFilter control, such as requests with abnormally large or malformed serialized data (Log source: webserver).</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-6023</category><category>telerik</category><category>deserialization</category><category>rce</category><category>webserver</category></item><item><title>Esri Portal for ArcGIS Incorrect Authorization Vulnerability (CVE-2026-33519)</title><link>https://feed.craftedsignal.io/briefs/2026-04-esri-privesc/</link><pubDate>Tue, 21 Apr 2026 21:16:29 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-esri-privesc/</guid><description>CVE-2026-33519 is a critical vulnerability in Esri Portal for ArcGIS 11.4, 11.5, and 12.0, where incorrect authorization checks on developer credentials can lead to unauthorized privilege escalation on Windows, Linux, and Kubernetes deployments.</description><content:encoded><![CDATA[<p>CVE-2026-33519 is a critical incorrect authorization vulnerability affecting Esri Portal for ArcGIS versions 11.4, 11.5, and 12.0. This flaw exists across Windows, Linux, and Kubernetes deployments and stems from the application&rsquo;s failure to properly validate permissions assigned to developer credentials. This oversight allows attackers with malicious intent to potentially bypass intended authorization controls and escalate privileges within the ArcGIS portal. Given the widespread use of ArcGIS in critical infrastructure and mapping applications, this vulnerability poses a significant risk to organizations relying on these systems. Successful exploitation could lead to unauthorized access to sensitive data, modification of system configurations, or disruption of critical services.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the Esri Portal for ArcGIS application, potentially through compromised developer credentials or exploiting other vulnerabilities.</li>
<li>The attacker leverages developer APIs or interfaces within ArcGIS Portal.</li>
<li>The attacker attempts to perform actions that require elevated privileges but lack proper authorization checks due to the vulnerability (CVE-2026-33519).</li>
<li>The system incorrectly grants the attacker access to restricted functions or data due to the insufficient permission validation.</li>
<li>The attacker escalates privileges by exploiting the unauthorized access to modify user roles or system configurations.</li>
<li>The attacker leverages elevated privileges to access sensitive data stored within the ArcGIS Portal, such as maps, geospatial data, or user information.</li>
<li>The attacker may further compromise the system by installing malicious extensions or modifying core system files.</li>
<li>The attacker achieves complete control over the ArcGIS Portal, potentially leading to data breaches, service disruption, or further lateral movement within the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-33519 can lead to significant damage, including unauthorized access to sensitive geospatial data, modification of critical system configurations, and potential disruption of services reliant on ArcGIS Portal. Given the wide use of ArcGIS in government, utilities, and transportation sectors, a successful attack could impact essential services. The lack of proper authorization checks on developer credentials can expose organizations to data breaches, financial losses, and reputational damage. This vulnerability affects all deployments of Esri Portal for ArcGIS 11.4, 11.5, and 12.0 on Windows, Linux, and Kubernetes, potentially impacting a large number of organizations globally.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the security patch released by Esri to address CVE-2026-33519 immediately after thorough testing in a non-production environment.</li>
<li>Review and enforce strict permission controls for all developer credentials used within Esri Portal for ArcGIS to minimize the attack surface.</li>
<li>Implement the Sigma rule <code>Detect Suspicious ArcGIS Developer API Usage</code> to identify potential exploitation attempts targeting CVE-2026-33519.</li>
<li>Monitor web server logs for unusual activity related to developer API endpoints in ArcGIS Portal, looking for unauthorized access attempts.</li>
<li>Enable detailed logging for ArcGIS Portal&rsquo;s authorization and authentication mechanisms to improve visibility into potential privilege escalation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>esri</category><category>arcgis</category><category>privilege-escalation</category><category>incorrect-authorization</category><category>cve-2026-33519</category><category>webserver</category></item><item><title>Tenda F451 Router Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-tenda-f451-buffer-overflow/</link><pubDate>Mon, 20 Apr 2026 11:16:19 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-tenda-f451-buffer-overflow/</guid><description>A buffer overflow vulnerability (CVE-2026-6631) in Tenda F451 router version 1.0.0.7_cn_svn7958 allows remote attackers to execute arbitrary code by manipulating the 'page' argument in the /goform/webExcptypemanFilter component.</description><content:encoded><![CDATA[<p>CVE-2026-6631 is a critical buffer overflow vulnerability affecting Tenda F451 routers running firmware version 1.0.0.7_cn_svn7958. The vulnerability resides in the <code>fromwebExcptypemanFilter</code> function within the <code>/goform/webExcptypemanFilter</code> component of the router&rsquo;s <code>httpd</code> web server. A remote, unauthenticated attacker can exploit this vulnerability by sending a specially crafted HTTP request with an overly long &lsquo;page&rsquo; parameter. Publicly available exploits exist, increasing the risk of widespread exploitation. Successful exploitation allows attackers to execute arbitrary code on the router, potentially leading to full device compromise and network access.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable Tenda F451 router exposed to the internet.</li>
<li>Attacker crafts a malicious HTTP GET or POST request targeting <code>/goform/webExcptypemanFilter</code>.</li>
<li>The crafted request includes the <code>page</code> parameter with a payload exceeding the buffer size allocated for it.</li>
<li>The <code>httpd</code> server processes the request and passes the <code>page</code> parameter to the vulnerable <code>fromwebExcptypemanFilter</code> function.</li>
<li>Due to the lack of proper bounds checking, the overly long <code>page</code> parameter overwrites adjacent memory regions on the stack.</li>
<li>The attacker carefully designs the overflow payload to overwrite the return address on the stack with the address of malicious code injected elsewhere in memory.</li>
<li>The <code>fromwebExcptypemanFilter</code> function completes execution and attempts to return, jumping to the attacker-controlled address.</li>
<li>The attacker&rsquo;s malicious code executes with the privileges of the <code>httpd</code> server, potentially gaining full control of the router.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-6631 allows remote attackers to execute arbitrary code on vulnerable Tenda F451 routers. This can lead to complete device compromise, allowing attackers to modify router settings, intercept network traffic, or use the router as a point of entry for further attacks on the internal network. Given the widespread use of Tenda routers, a large number of devices could be vulnerable, potentially impacting both home and small business networks. The availability of public exploits further increases the likelihood of exploitation.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply available firmware updates from Tenda to patch CVE-2026-6631.</li>
<li>Monitor web server logs for suspicious requests to <code>/goform/webExcptypemanFilter</code> with unusually long <code>page</code> parameters, using the Sigma rule <code>DetectTendaF451BufferOverflow</code>.</li>
<li>Implement network intrusion detection systems (IDS) to detect and block exploit attempts targeting CVE-2026-6631.</li>
<li>Consider deploying the Sigma rule <code>DetectTendaF451SuspiciousProcess</code> to identify unexpected processes spawned by the httpd daemon.</li>
<li>If patching is not immediately feasible, consider restricting access to the router&rsquo;s web interface from the public internet to mitigate the risk of remote exploitation.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>tenda</category><category>router</category><category>buffer_overflow</category><category>cve-2026-6631</category><category>webserver</category></item><item><title>Fastify Body Schema Validation Bypass via Leading Space in Content-Type Header</title><link>https://feed.craftedsignal.io/briefs/2026-06-27-fastify-validation-bypass/</link><pubDate>Wed, 15 Apr 2026 19:26:39 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-06-27-fastify-validation-bypass/</guid><description>Fastify v5.x is vulnerable to a body schema validation bypass, allowing attackers to circumvent request body validation by prepending a single space to the Content-Type header, potentially compromising data integrity and security constraints.</description><content:encoded><![CDATA[<p>Fastify v5.x (specifically versions 5.3.2 through 5.8.4) contains a vulnerability where request body validation schemas specified via <code>schema.body.content</code> can be bypassed by prepending a single space character (<code>\x20</code>) to the <code>Content-Type</code> header. This flaw, assigned CVE-2026-33806, arises from inconsistent handling of the Content-Type header during parsing and validation.  The body is parsed correctly as JSON, but schema validation is skipped entirely. This is a regression introduced by commit <code>f3d2bcb</code> (April 18, 2025), a fix for CVE-2025-32442. This vulnerability allows attackers to send malicious payloads that bypass intended data integrity and security checks.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a Fastify application using <code>schema.body.content</code> for request body validation.</li>
<li>The attacker crafts a malicious HTTP POST request with a JSON payload designed to violate the validation schema (e.g., exceeding allowed amount or injecting invalid admin value).</li>
<li>The attacker prepends a single space character to the <code>Content-Type</code> header (e.g., <code> Content-Type: application/json</code>).</li>
<li>The Fastify server parses the <code>Content-Type</code> header using <code>lib/validation.js</code> which splits the string, resulting in an empty string content type.</li>
<li>The server fails to locate a validator associated with the empty string content type.</li>
<li>Request body validation is skipped, and the malicious payload is processed by the application.</li>
<li>The application processes the invalid data, potentially leading to unauthorized actions or data corruption.</li>
<li>The attacker achieves their objective, such as transferring an excessive amount, manipulating data, or gaining unauthorized privileges.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>This vulnerability affects Fastify applications using <code>schema.body.content</code> for request body validation. By prepending a single space to the Content-Type header, attackers can bypass these validations. Successful exploitation allows an attacker to inject malicious payloads, leading to data corruption, unauthorized access, or other security breaches. While the exact number of victims is unknown, any application within the vulnerable version range is susceptible. This vulnerability requires no authentication and has zero complexity — it is a single-character modification to an HTTP header.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the recommended fix by adding <code>trimStart()</code> before the split in <code>getEssenceMediaType</code> within the Fastify framework to address CVE-2026-33806.</li>
<li>Deploy the Sigma rule &ldquo;Detect Fastify Validation Bypass Attempt&rdquo; to your SIEM to identify attempts to exploit this vulnerability by monitoring for requests with leading spaces in the Content-Type header.</li>
<li>Upgrade Fastify to a version beyond 5.8.4 to mitigate CVE-2026-33806.</li>
<li>Review all Fastify routes that use <code>schema.body.content</code> for potential vulnerabilities related to content-type validation.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>fastify</category><category>validation-bypass</category><category>webserver</category></item><item><title>Jetty HTTP Request Smuggling via Chunked Extension Quoted-String Parsing</title><link>https://feed.craftedsignal.io/briefs/2026-04-jetty-request-smuggling/</link><pubDate>Wed, 15 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-jetty-request-smuggling/</guid><description>Jetty is vulnerable to HTTP request smuggling due to improper parsing of quoted strings in HTTP/1.1 chunked transfer encoding extension values, potentially allowing attackers to inject arbitrary HTTP requests, poison caches, and bypass security controls.</description><content:encoded><![CDATA[<p>Jetty versions 9.4.0 through 12.1.6 are vulnerable to HTTP request smuggling due to incorrect parsing of quoted strings in HTTP/1.1 chunked transfer encoding extensions. This flaw stems from Jetty&rsquo;s premature termination of chunk header parsing upon encountering a carriage return and line feed (CRLF) sequence within a quoted string, violating RFC 9112 specifications. An attacker can exploit this vulnerability to inject malicious HTTP requests into the application&rsquo;s request stream, potentially bypassing security controls, poisoning caches, and even hijacking user sessions. This issue, identified as CVE-2026-2332, poses a significant risk to applications using affected Jetty versions. The vulnerability was discovered during research into &ldquo;Funky Chunks&rdquo; HTTP request smuggling techniques and highlights the importance of rigorous adherence to RFC specifications in HTTP server implementations.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker sends a crafted HTTP POST request with chunked transfer encoding to a vulnerable Jetty server.</li>
<li>The chunk header includes a quoted string within the chunk extension, containing a CRLF sequence. For example: <code>Chunk: 1;a=&quot;\r\n</code>.</li>
<li>Jetty incorrectly parses the chunk header, terminating parsing at the CRLF within the quoted string.</li>
<li>The remaining portion of the intended chunk extension and subsequent data are interpreted as the beginning of a new HTTP request.</li>
<li>The attacker injects a malicious HTTP GET request intended to be smuggled, such as <code>GET /smuggled HTTP/1.1</code>.</li>
<li>The smuggled request is processed by the server, potentially bypassing frontend security checks.</li>
<li>The server responds to the smuggled request.</li>
<li>The attacker may use the smuggled request to poison the cache, bypass access controls, or potentially hijack user sessions by intercepting sensitive data in the smuggled response.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows attackers to inject arbitrary HTTP requests into the application&rsquo;s request stream. This can lead to several severe consequences, including: cache poisoning, where malicious content is served to legitimate users; access control bypass, enabling unauthorized access to sensitive resources; and session hijacking, allowing attackers to impersonate other users. The vulnerability impacts Jetty versions 9.4.0 through 12.1.6. The number of affected installations is currently unknown. The primary target is any web application utilizing a vulnerable version of Jetty.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to a patched version of Jetty that addresses CVE-2026-2332.</li>
<li>Deploy the Sigma rule <code>Detect Jetty HTTP Request Smuggling</code> to your SIEM and tune for your environment to detect exploitation attempts.</li>
<li>Inspect web server logs for malformed chunk headers containing CRLF sequences within quoted strings, as this indicates a potential exploitation attempt.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>request-smuggling</category><category>jetty</category><category>CVE-2026-2332</category><category>webserver</category></item><item><title>CMSsite 1.0 SQL Injection Vulnerability (CVE-2019-25697)</title><link>https://feed.craftedsignal.io/briefs/2026-04-cmssite-sqli/</link><pubDate>Sun, 12 Apr 2026 13:16:32 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-cmssite-sqli/</guid><description>CMSsite 1.0 is vulnerable to unauthenticated SQL injection (CVE-2019-25697) via the cat_id parameter in category.php, allowing attackers to extract sensitive database information.</description><content:encoded><![CDATA[<p>CMSsite 1.0 is susceptible to an SQL injection vulnerability (CVE-2019-25697) within the category.php script. This flaw allows unauthenticated, remote attackers to inject arbitrary SQL commands by manipulating the <code>cat_id</code> GET parameter. Successful exploitation could lead to the disclosure of sensitive information stored within the database, including user credentials and other application data. Given the ease of exploitation and the potential impact, this vulnerability poses a significant risk to organizations using the affected CMSsite version. The vulnerability was reported to NVD and assigned a CVSS v3.1 score of 8.2, indicating high severity.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a CMSsite 1.0 installation.</li>
<li>The attacker crafts a malicious HTTP GET request targeting <code>category.php</code>.</li>
<li>The attacker injects SQL code into the <code>cat_id</code> parameter of the GET request, for example: <code>category.php?cat_id=1' OR '1'='1</code>.</li>
<li>The web server processes the request and passes the tainted <code>cat_id</code> value to the underlying SQL database.</li>
<li>The injected SQL code manipulates the database query, potentially bypassing intended security checks.</li>
<li>The database executes the modified query, returning sensitive data to the web server.</li>
<li>The web server includes the extracted data in the HTTP response.</li>
<li>The attacker parses the HTTP response to extract sensitive information such as usernames, passwords, or other confidential data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability allows an unauthenticated attacker to read sensitive information from the CMSsite 1.0 database. This can lead to complete compromise of the application, including unauthorized access to user accounts, exposure of confidential data, and potential further attacks on the underlying system. Given the lack of required authentication, any CMSsite 1.0 instance exposed to the internet is a potential target.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply appropriate input validation and sanitization to the <code>cat_id</code> parameter in <code>category.php</code> to prevent SQL injection.</li>
<li>Deploy the Sigma rule &ldquo;Detect Suspicious GET Requests to category.php with SQL Injection Attempts&rdquo; to identify exploitation attempts in web server logs.</li>
<li>Restrict database access privileges to the minimum necessary for the application to function.</li>
<li>Consider upgrading to a more secure CMS solution or applying a patch if one becomes available.</li>
<li>Enable web server logging and monitor for unusual activity, paying close attention to GET requests targeting <code>category.php</code>.</li>
<li>Implement parameterized queries or prepared statements to prevent SQL injection vulnerabilities when interacting with the database.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sqli</category><category>cve-2019-25697</category><category>webserver</category></item><item><title>Chamilo LMS REST API Key Brute-Force Vulnerability (CVE-2026-33710)</title><link>https://feed.craftedsignal.io/briefs/2026-04-chamilo-api-key-bruteforce/</link><pubDate>Sat, 11 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-chamilo-api-key-bruteforce/</guid><description>Chamilo LMS versions prior to 1.11.38 and 2.0.0-RC.3 generate predictable REST API keys, allowing attackers with knowledge of a username and approximate key creation time to brute-force access.</description><content:encoded><![CDATA[<p>Chamilo LMS, a popular learning management system, contains a vulnerability in versions prior to 1.11.38 and 2.0.0-RC.3 related to the generation of REST API keys (CVE-2026-33710). The API keys are generated using a flawed algorithm: <code>md5(time() + (user_id * 5) - rand(10000, 10000))</code>. Due to <code>rand(10000, 10000)</code> always returning 10000, the formula simplifies to <code>md5(timestamp + user_id*5 - 10000)</code>. An attacker knowing a valid username and a rough estimate of when the API key was generated can brute-force the key due to the limited entropy. This vulnerability allows unauthorized access to the Chamilo LMS REST API. The vulnerability was reported and patched in versions 1.11.38 and 2.0.0-RC.3. This poses a significant threat to educational institutions and organizations using vulnerable versions of Chamilo LMS.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a target Chamilo LMS instance running a vulnerable version (prior to 1.11.38 or 2.0.0-RC.3).</li>
<li>Attacker obtains a valid username on the target Chamilo LMS instance through OSINT or credential stuffing.</li>
<li>Attacker estimates the API key creation time. This might be inferred from user activity or system logs.</li>
<li>Attacker crafts a script to generate potential API keys based on the predictable formula <code>md5(timestamp + user_id*5 - 10000)</code> using the known username and estimated timestamp.</li>
<li>The script iterates through a range of timestamps around the estimated creation time, generating corresponding MD5 hashes.</li>
<li>Attacker sends API requests with the generated API keys to the Chamilo LMS server.</li>
<li>The server validates the API key against the user.</li>
<li>Upon successful validation, the attacker gains unauthorized access to the Chamilo LMS REST API, potentially allowing them to modify course content, access user data, or perform other malicious actions.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-33710 can lead to unauthorized access to sensitive data within the Chamilo LMS, including user information, course materials, and grades. This could result in data breaches, academic fraud, and reputational damage for affected organizations. The vulnerability affects all organizations running vulnerable versions of Chamilo LMS; the number of victims is correlated to the number of vulnerable deployments.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Chamilo LMS installations to version 1.11.38 or 2.0.0-RC.3 or later to patch CVE-2026-33710.</li>
<li>Monitor web server logs for unusual API requests originating from unexpected IP addresses, especially those containing potentially valid API keys by deploying the provided Sigma rule.</li>
<li>Implement rate limiting on API endpoints to mitigate brute-force attempts.</li>
<li>If upgrading is not immediately feasible, consider temporarily disabling the REST API.</li>
<li>Review and audit user permissions within Chamilo LMS to minimize the impact of potential unauthorized access.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-33710</category><category>chamilo</category><category>api-key</category><category>brute-force</category><category>webserver</category></item><item><title>OpenClaw Improper Access Control Vulnerability (CVE-2026-34512)</title><link>https://feed.craftedsignal.io/briefs/2026-04-openclaw-access-control-bypass/</link><pubDate>Thu, 09 Apr 2026 22:16:29 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-openclaw-access-control-bypass/</guid><description>OpenClaw before 2026.3.25 contains an improper access control vulnerability (CVE-2026-34512) in the HTTP /sessions/:sessionKey/kill route, allowing any authenticated user to terminate arbitrary subagent sessions.</description><content:encoded><![CDATA[<p>OpenClaw versions prior to 2026.3.25 are susceptible to an improper access control vulnerability, tracked as CVE-2026-34512. This flaw resides in the <code>/sessions/:sessionKey/kill</code> HTTP route and allows any bearer-authenticated user, regardless of their assigned privileges, to execute admin-level session termination functions. The vulnerability stems from a lack of proper scope validation, enabling attackers to bypass intended ownership and operator scope restrictions. By sending crafted, authenticated requests, an attacker can leverage the <code>killSubagentRunAdmin</code> function to terminate arbitrary subagent sessions. This unauthorized session termination could disrupt legitimate operations and lead to a denial-of-service condition for affected subagents.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker authenticates to the OpenClaw application using any valid user account, obtaining a bearer token.</li>
<li>The attacker identifies a target subagent session to terminate. This could involve enumerating active sessions or targeting a specific subagent.</li>
<li>The attacker crafts an HTTP POST request to the <code>/sessions/:sessionKey/kill</code> route, replacing <code>:sessionKey</code> with the session key of the target subagent.</li>
<li>The attacker includes the bearer token in the <code>Authorization</code> header of the HTTP request.</li>
<li>The OpenClaw server receives the request and, due to the missing scope validation, executes the <code>killSubagentRunAdmin</code> function.</li>
<li>The <code>killSubagentRunAdmin</code> function terminates the targeted subagent session, regardless of the attacker&rsquo;s permissions.</li>
<li>The targeted subagent is disconnected and its operations are interrupted.</li>
<li>The attacker can repeat this process to terminate other subagent sessions, potentially causing widespread disruption.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-34512 allows any authenticated user to terminate arbitrary subagent sessions within the OpenClaw environment. This can lead to denial-of-service conditions for targeted subagents, potentially disrupting critical workflows and impacting overall system availability. While the specific number of potential victims is unknown, any OpenClaw deployment utilizing versions prior to 2026.3.25 is vulnerable. The impact is significant, as it allows low-privileged users to perform actions intended only for administrators.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade OpenClaw to version 2026.3.25 or later to patch CVE-2026-34512.</li>
<li>Deploy the Sigma rule <code>Detect OpenClaw Unauthorized Session Termination</code> to identify potential exploitation attempts.</li>
<li>Monitor web server logs for unusual activity targeting the <code>/sessions/:sessionKey/kill</code> route.</li>
<li>Implement strict access control policies and regularly review user permissions within OpenClaw to minimize the potential impact of compromised accounts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>access-control</category><category>vulnerability</category><category>webserver</category></item><item><title>Immich Stored XSS Vulnerability in 360° Panorama Viewer (CVE-2026-35455)</title><link>https://feed.craftedsignal.io/briefs/2024-01-immich-xss/</link><pubDate>Wed, 08 Apr 2026 19:25:24 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-immich-xss/</guid><description>A stored cross-site scripting (XSS) vulnerability in Immich versions before 2.7.0 allows authenticated users to inject arbitrary JavaScript via crafted equirectangular images, leading to session hijacking, data exfiltration, and unauthorized access.</description><content:encoded><![CDATA[<p>Immich, a self-hosted photo and video management solution, is vulnerable to a stored Cross-Site Scripting (XSS) attack.  Specifically, versions prior to 2.7.0 are susceptible. An authenticated attacker can exploit the 360° panorama viewer by uploading a specially crafted equirectangular image that contains malicious text. When another user views the panorama with the OCR overlay enabled, the injected text is extracted via OCR and rendered by the panorama viewer without sanitization. This leads to arbitrary JavaScript execution within the victim&rsquo;s browser. The vulnerability, identified as CVE-2026-35455, poses a significant risk, potentially leading to session hijacking (via persistent API key creation), private photo exfiltration, and unauthorized access to sensitive data like GPS location history and face biometric data. Users are advised to upgrade to version 2.7.0 or later to mitigate this risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker authenticates to an Immich instance with a valid user account.</li>
<li>The attacker crafts an equirectangular image containing malicious JavaScript code embedded within the text.</li>
<li>The attacker uploads the crafted image to the Immich server through the web interface.</li>
<li>The attacker shares or otherwise causes another user to view the uploaded panorama image.</li>
<li>The victim views the panorama image with the OCR overlay feature enabled.</li>
<li>The Immich server processes the image, and the OCR engine extracts the malicious JavaScript from the image.</li>
<li>The panorama viewer renders the OCR output via <code>innerHTML</code> without proper sanitization.</li>
<li>The malicious JavaScript executes within the victim&rsquo;s browser session, allowing the attacker to perform actions such as session hijacking, data exfiltration, or unauthorized data access.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this XSS vulnerability (CVE-2026-35455) in Immich can lead to severe consequences. An attacker can hijack user sessions by creating persistent API keys, allowing them to impersonate the victim. Furthermore, they can exfiltrate private photos and gain unauthorized access to sensitive information such as GPS location history and face biometric data stored within the Immich instance. The number of potential victims corresponds to the number of users on a vulnerable Immich instance. Given the self-hosted nature of Immich, the impact is largely dependent on the type and sensitivity of data stored within affected deployments.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Immich to version 2.7.0 or later to patch the CVE-2026-35455 vulnerability.</li>
<li>Implement input validation and sanitization for user-uploaded content, particularly images, to prevent XSS attacks. Focus on <code>webserver</code> logs for unusual POST requests.</li>
<li>Deploy the Sigma rule <code>Detect Suspicious Immich Panorama Requests</code> to identify potential exploitation attempts based on unusual URL parameters indicative of crafted panorama requests.</li>
<li>Monitor <code>webserver</code> logs for HTTP requests containing suspicious JavaScript payloads within the URL, which may indicate XSS attempts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>immich</category><category>xss</category><category>cve-2026-35455</category><category>webserver</category></item><item><title>Brave CMS Unrestricted File Upload Leads to Remote Code Execution</title><link>https://feed.craftedsignal.io/briefs/2026-04-brave-cms-rce/</link><pubDate>Mon, 06 Apr 2026 18:16:42 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-brave-cms-rce/</guid><description>Brave CMS versions prior to 2.0.6 contain an unrestricted file upload vulnerability within the CKEditor upload functionality in the ckupload method, allowing authenticated users to upload executable PHP scripts and achieve Remote Code Execution.</description><content:encoded><![CDATA[<p>Brave CMS, an open-source content management system, is vulnerable to an unrestricted file upload vulnerability (CVE-2026-35164) in versions prior to 2.0.6. The vulnerability resides within the CKEditor upload functionality, specifically in the <code>ckupload</code> method located in <code>app/Http/Controllers/Dashboard/CkEditorController.php</code>. The application fails to properly validate the types of uploaded files, relying solely on user-provided input. This lack of validation enables an authenticated user to upload malicious PHP scripts, leading to arbitrary code execution on the server. The vulnerability was reported on April 6, 2026, and is fixed in Brave CMS version 2.0.6. Organizations using affected versions of Brave CMS are at risk of complete system compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker authenticates to the Brave CMS application as a user with upload privileges.</li>
<li>The attacker navigates to a page or functionality within the CMS that utilizes the CKEditor for content creation or editing.</li>
<li>The attacker uses the CKEditor&rsquo;s upload functionality to upload a malicious PHP script disguised as a legitimate file type (e.g., image).</li>
<li>The <code>ckupload</code> method in <code>app/Http/Controllers/Dashboard/CkEditorController.php</code> processes the uploaded file without proper validation of the file type or content.</li>
<li>The malicious PHP script is stored on the server in a publicly accessible directory.</li>
<li>The attacker crafts a request to directly access the uploaded PHP script via its URL.</li>
<li>The web server executes the PHP script, granting the attacker the ability to run arbitrary commands on the server.</li>
<li>The attacker establishes persistence, installs a web shell, and performs lateral movement within the network, escalating privileges as needed to achieve their objectives.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to execute arbitrary PHP code on the affected Brave CMS server. This can lead to complete compromise of the CMS instance, including unauthorized access to sensitive data, modification of website content, and potential lateral movement to other systems on the network. The CVSS v3.1 base score for this vulnerability is 8.8, indicating a high severity level. Organizations running vulnerable versions of Brave CMS are at risk of data breaches, website defacement, and further exploitation of their infrastructure.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Brave CMS to version 2.0.6 or later to remediate the unrestricted file upload vulnerability (CVE-2026-35164).</li>
<li>Implement server-side file validation to prevent the upload of malicious files, regardless of file extension.</li>
<li>Monitor web server logs for suspicious activity related to file uploads and execution of PHP scripts.</li>
<li>Deploy the following Sigma rule to detect attempts to access potentially malicious PHP files in the web server&rsquo;s upload directories.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-35164</category><category>rce</category><category>file-upload</category><category>brave-cms</category><category>ckeditor</category><category>php</category><category>webserver</category></item><item><title>ChurchCRM Time-Based Blind SQL Injection Vulnerability (CVE-2026-34402)</title><link>https://feed.craftedsignal.io/briefs/2026-04-churchcrm-sql-injection/</link><pubDate>Mon, 06 Apr 2026 16:16:35 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-churchcrm-sql-injection/</guid><description>CVE-2026-34402 is a time-based blind SQL injection vulnerability in ChurchCRM versions prior to 7.1.0. Authenticated users with Edit Records or Manage Groups permissions can exploit the PropertyAssign.php endpoint to exfiltrate or modify database content, including user credentials, PII, and configuration secrets.</description><content:encoded><![CDATA[<p>ChurchCRM is an open-source church management system. Prior to version 7.1.0, the application suffers from a time-based blind SQL injection vulnerability (CVE-2026-34402). Authenticated users with either &ldquo;Edit Records&rdquo; or &ldquo;Manage Groups&rdquo; permissions can exploit this flaw. Successful exploitation allows attackers to exfiltrate or modify any database content, which could include user credentials, personally identifiable information (PII), and configuration secrets. The vulnerable endpoint is <code>PropertyAssign.php</code>. This vulnerability was addressed and fixed in version 7.1.0 of ChurchCRM. Defenders should prioritize patching vulnerable instances to prevent unauthorized access and data breaches.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains valid credentials for ChurchCRM, with &ldquo;Edit Records&rdquo; or &ldquo;Manage Groups&rdquo; permissions. This could be achieved through credential stuffing, password reuse, or other means.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>PropertyAssign.php</code> endpoint. This request contains a SQL injection payload within a parameter processed by the application.</li>
<li>The application processes the malicious SQL query, injecting it into the database query without proper sanitization.</li>
<li>Due to the blind nature of the SQL injection, the attacker uses time-based techniques (e.g., <code>SLEEP()</code>) to infer information about the database structure and content.</li>
<li>The attacker iterates through various SQL injection payloads, slowly extracting sensitive data such as usernames, password hashes, and other PII.</li>
<li>The attacker may modify database records to escalate privileges, create new administrative accounts, or sabotage the application&rsquo;s functionality.</li>
<li>The attacker exfiltrates the stolen data.</li>
<li>The final objective is to compromise the confidentiality, integrity, and availability of the ChurchCRM database, potentially leading to significant data breaches and reputational damage.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-34402 can have serious consequences. An attacker can gain unauthorized access to sensitive data stored within the ChurchCRM database. This includes user credentials, PII, and configuration secrets. The attacker can also modify database records, potentially disrupting church operations or causing financial harm. Given the sensitive nature of the data often stored in church management systems, the impact of this vulnerability could be substantial. The vulnerability affects ChurchCRM installations prior to version 7.1.0.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade ChurchCRM installations to version 7.1.0 or later to remediate CVE-2026-34402.</li>
<li>Deploy the Sigma rule detecting requests to PropertyAssign.php with sleep commands to your SIEM and tune for your environment.</li>
<li>Monitor web server logs for suspicious activity targeting the <code>PropertyAssign.php</code> endpoint.</li>
<li>Implement web application firewall (WAF) rules to block SQL injection attempts.</li>
<li>Review user access controls within ChurchCRM to ensure that only authorized personnel have &ldquo;Edit Records&rdquo; or &ldquo;Manage Groups&rdquo; permissions.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sqlinjection</category><category>cve-2026-34402</category><category>churchcrm</category><category>webserver</category></item><item><title>News Website Script 2.0.5 SQL Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-news-website-sqli/</link><pubDate>Sun, 05 Apr 2026 21:16:44 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-news-website-sqli/</guid><description>News Website Script 2.0.5 contains an SQL injection vulnerability (CVE-2019-25668) allowing unauthenticated attackers to extract sensitive information by injecting SQL code through the news ID parameter in GET requests.</description><content:encoded><![CDATA[<p>News Website Script version 2.0.5 is susceptible to SQL injection, as identified by CVE-2019-25668. This vulnerability allows unauthenticated remote attackers to manipulate database queries by injecting malicious SQL code via the &rsquo;news ID&rsquo; parameter. Successful exploitation grants attackers the ability to extract sensitive information directly from the application database. The vulnerability lies within the index.php/show/news/ endpoint and can be exploited via simple HTTP GET requests, making it easily accessible. The risk to organizations using this vulnerable software is significant, potentially leading to data breaches and unauthorized access to confidential information.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a vulnerable instance of News Website Script 2.0.5.</li>
<li>The attacker crafts a malicious HTTP GET request targeting the <code>/index.php/show/news/</code> endpoint.</li>
<li>The crafted GET request includes a <code>news</code> parameter containing a SQL injection payload.</li>
<li>The web server receives the malicious request and passes the SQL injection payload to the application&rsquo;s database query.</li>
<li>The database executes the injected SQL code without proper sanitization.</li>
<li>The attacker extracts sensitive data from the database, such as user credentials, financial information, or proprietary data.</li>
<li>The attacker may use the extracted information to further compromise the system or network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability (CVE-2019-25668) can lead to the complete compromise of the affected News Website Script 2.0.5 database. The impact includes unauthorized access to sensitive data, potential data breaches, and the ability for attackers to modify or delete data. The number of potential victims is dependent on the install base of the vulnerable software.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply available patches or upgrade to a secure version of News Website Script to remediate CVE-2019-25668.</li>
<li>Deploy the Sigma rule provided in this brief to detect exploitation attempts targeting the vulnerable endpoint <code>index.php/show/news/</code>.</li>
<li>Implement input validation and sanitization for all user-supplied input to prevent SQL injection attacks.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sqli</category><category>cve-2019-25668</category><category>webserver</category></item><item><title>Technostrobe HI-LED-WR120-G2 Improper Authentication Vulnerability (CVE-2026-5570)</title><link>https://feed.craftedsignal.io/briefs/2026-04-technostrobe-auth-bypass/</link><pubDate>Sun, 05 Apr 2026 14:16:17 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-technostrobe-auth-bypass/</guid><description>CVE-2026-5570 is an improper authentication vulnerability in the index_config function of the /LoginCB file of Technostrobe HI-LED-WR120-G2 version 5.5.0.1R6.03.30, allowing remote attackers to bypass authentication.</description><content:encoded><![CDATA[<p>A critical vulnerability, CVE-2026-5570, exists in Technostrobe HI-LED-WR120-G2 version 5.5.0.1R6.03.30. This vulnerability resides within the <code>index_config</code> function of the <code>/LoginCB</code> file. Successful exploitation allows remote attackers to bypass authentication mechanisms. Publicly available exploit code exists, increasing the risk of widespread exploitation. The vendor was notified but did not respond. Given the lack of vendor response and the existence of a public exploit, organizations using affected Technostrobe devices should immediately assess their exposure and implement mitigation measures.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a vulnerable Technostrobe HI-LED-WR120-G2 device running firmware version 5.5.0.1R6.03.30 accessible over the network.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>/LoginCB</code> endpoint.</li>
<li>The crafted request exploits the improper authentication flaw in the <code>index_config</code> function.</li>
<li>The vulnerable function fails to properly validate the attacker&rsquo;s identity due to the flaw.</li>
<li>The attacker gains unauthorized access to administrative functionalities.</li>
<li>The attacker modifies device configurations, potentially disrupting operations or gaining further control.</li>
<li>The attacker uses the gained access to access internal network resources.</li>
<li>The attacker uses the compromised device as a foothold for lateral movement within the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-5570 allows attackers to bypass authentication on affected Technostrobe HI-LED-WR120-G2 devices. This could lead to unauthorized access to sensitive configurations, disruption of lighting systems, and potential use of the compromised device as a pivot point for further attacks within the network. The lack of vendor response to the vulnerability exacerbates the risk, as no official patch is available.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for suspicious requests to the <code>/LoginCB</code> endpoint, specifically those attempting to manipulate the <code>index_config</code> function, to detect potential exploitation attempts related to CVE-2026-5570.</li>
<li>Deploy the Sigma rule provided below to detect unauthorized access attempts via the vulnerable endpoint.</li>
<li>Implement network segmentation to limit the impact of a compromised Technostrobe device on other network resources.</li>
<li>Consider placing the affected Technostrobe device behind a reverse proxy with strict access controls and input validation rules.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve</category><category>authentication-bypass</category><category>webserver</category></item><item><title>Tenda M3 Router Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-tenda-m3-overflow/</link><pubDate>Sun, 05 Apr 2026 13:17:14 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-tenda-m3-overflow/</guid><description>A buffer overflow vulnerability exists in Tenda M3 1.0.0.10 via manipulation of the policyType argument in the setAdvPolicyData function, allowing remote attackers to execute arbitrary code.</description><content:encoded><![CDATA[<p>A critical buffer overflow vulnerability has been identified in Tenda M3 router version 1.0.0.10. The vulnerability resides in the <code>setAdvPolicyData</code> function within the <code>/goform/setAdvPolicyData</code> file, a part of the Destination Handler component. By manipulating the <code>policyType</code> argument, a remote attacker can trigger a buffer overflow, potentially leading to arbitrary code execution. Publicly available exploit code exists, increasing the risk of exploitation. This vulnerability poses a significant threat to organizations utilizing the affected Tenda M3 router, potentially allowing attackers to gain unauthorized access to the network or disrupt services.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable Tenda M3 router exposed to the internet or reachable from their network position.</li>
<li>Attacker sends a crafted HTTP POST request to <code>/goform/setAdvPolicyData</code>.</li>
<li>The POST request includes a malicious <code>policyType</code> argument designed to overflow the buffer in the <code>setAdvPolicyData</code> function.</li>
<li>The <code>setAdvPolicyData</code> function in <code>/goform/setAdvPolicyData</code> processes the <code>policyType</code> argument without proper bounds checking.</li>
<li>The excessive data provided in the <code>policyType</code> argument overwrites adjacent memory regions.</li>
<li>The attacker carefully crafts the overflow to overwrite critical data or inject malicious code into the process&rsquo;s memory space.</li>
<li>The injected code is executed, giving the attacker control over the router.</li>
<li>The attacker can then use the compromised router as a foothold to pivot to other devices on the network, exfiltrate sensitive data, or cause denial of service.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this buffer overflow vulnerability allows a remote attacker to execute arbitrary code on the Tenda M3 router. This could lead to a complete compromise of the device, allowing the attacker to control network traffic, access sensitive information, or use the router as a launchpad for further attacks within the network. Given the severity and the existence of public exploits, vulnerable routers are at high risk of being targeted.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply any available firmware updates from Tenda to patch CVE-2026-5567.</li>
<li>Monitor web server logs for suspicious POST requests to <code>/goform/setAdvPolicyData</code> with unusually long <code>policyType</code> arguments; deploy the Sigma rule <code>Detect Suspicious PolicyType Argument Length</code> to identify this activity.</li>
<li>Implement network segmentation to limit the potential impact of a compromised router.</li>
<li>Consider using a web application firewall (WAF) to filter malicious requests targeting the affected endpoint.</li>
<li>Review and restrict access to the router&rsquo;s management interface to authorized personnel only.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-5567</category><category>buffer-overflow</category><category>tenda</category><category>router</category><category>webserver</category></item><item><title>pyLoad Arbitrary Code Execution via Malicious Session Deserialization</title><link>https://feed.craftedsignal.io/briefs/2026-04-pyload-rce/</link><pubDate>Sat, 04 Apr 2026 06:43:37 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-pyload-rce/</guid><description>pyLoad is vulnerable to arbitrary code execution via an unprotected `storage_folder` configuration option, allowing an attacker with `SETTINGS` and `ADD` permissions to write a malicious pickle payload to the Flask session store and execute arbitrary code upon subsequent HTTP requests.</description><content:encoded><![CDATA[<p>pyLoad, a download manager, is susceptible to arbitrary code execution due to an insecure configuration option related to the storage folder. This vulnerability arises from the incomplete fix for CVE-2026-33509. Specifically, the <code>storage_folder</code> option is not included in the <code>ADMIN_ONLY_OPTIONS</code> set, which allows users with <code>SETTINGS</code> and <code>ADD</code> permissions to modify it. By redirecting downloads to the Flask filesystem session store, an attacker can plant a malicious pickle payload as a predictable session file. Subsequently, any HTTP request containing the corresponding crafted session cookie will trigger the deserialization of the payload, resulting in arbitrary code execution. This issue affects pyLoad versions up to and including 0.5.0b3. The observed exploitation involves manipulating the download directory to write malicious files into the Flask session store, ultimately leading to code execution on the host.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains a non-admin user account with both <code>SETTINGS</code> and <code>ADD</code> permissions in pyLoad.</li>
<li>The attacker uses the <code>/api/set_config_value</code> endpoint to modify the <code>storage_folder</code> option, setting its value to the Flask session store directory: <code>/tmp/pyLoad/flask</code>. This bypasses existing path restrictions.</li>
<li>The attacker calculates the target session filename by computing the MD5 hash of the string &ldquo;session:ATTACKER_SESSION_ID&rdquo;.</li>
<li>The attacker hosts a malicious pickle payload (e.g., <code>92912f771df217fb6fbfded6705dd47c</code>) on a remote server.</li>
<li>The attacker uses the <code>/api/add_package</code> endpoint to add a download package. The download link points to the hosted malicious pickle payload on the attacker&rsquo;s server: <code>http://attacker.com/92912f771df217fb6fbfded6705dd47c</code>. The <code>dest</code> parameter specifies where to store the downloaded file.</li>
<li>pyLoad downloads the malicious pickle payload and saves it to the Flask session store directory, naming it according to the MD5 hash calculated earlier.</li>
<li>The attacker crafts an HTTP request to the pyLoad server, including a cookie named <code>pyload_session_{port}</code> with the value <code>ATTACKER_SESSION_ID</code>.  The port number is derived from the pyLoad configuration.</li>
<li>Upon receiving the request with the crafted cookie, Flask attempts to load the session data from the corresponding file. The <code>cachelib</code> library deserializes the malicious pickle payload using <code>pickle.load()</code>, triggering arbitrary code execution.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows a non-admin user with SETTINGS and ADD permissions to achieve arbitrary code execution as the pyload service user. This grants the attacker the ability to execute arbitrary commands, read environment variables (potentially exposing API keys and credentials), access the filesystem (including download history and user databases), and potentially pivot to other network resources. The vulnerability requires no authentication to trigger the final stage of exploitation, increasing its severity and potential impact.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the following Sigma rule to detect attempts to modify the <code>storage_folder</code> configuration option to point to the Flask session directory (<code>/tmp/pyLoad/flask</code>): <code>Suspicious pyLoad Storage Folder Modification</code>.</li>
<li>Apply the suggested fix by adding <code>storage_folder</code> to the <code>ADMIN_ONLY_OPTIONS</code> set in the pyLoad configuration to prevent non-admin users from modifying it.</li>
<li>Block the malicious URLs used to deliver the pickle payload, specifically <code>http://attacker.com/92912f771df217fb6fbfded6705dd47c</code>, at your network perimeter.</li>
<li>Monitor for HTTP requests containing the crafted session cookie (<code>pyload_session_{port}=ATTACKER_SESSION_ID</code>), using a webserver or proxy log source, as it triggers the final stage of the attack.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>pyLoad</category><category>rce</category><category>pickle</category><category>deserialization</category><category>webserver</category></item><item><title>OneUptime SAML SSO Authentication Bypass Vulnerability (CVE-2026-34840)</title><link>https://feed.craftedsignal.io/briefs/2024-01-oneuptime-auth-bypass/</link><pubDate>Thu, 02 Apr 2026 20:16:28 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-oneuptime-auth-bypass/</guid><description>OneUptime versions prior to 10.0.42 are vulnerable to an authentication bypass due to improper SAML signature validation, allowing attackers to impersonate users by prepending unsigned assertions.</description><content:encoded><![CDATA[<p>OneUptime, an open-source monitoring and observability platform, is vulnerable to an authentication bypass in versions prior to 10.0.42. The vulnerability, identified as CVE-2026-34840, resides in the SAML Single Sign-On (SSO) implementation within the <code>App/FeatureSet/Identity/Utils/SSO.ts</code> file. The flawed logic involves a decoupling of signature verification and identity extraction processes. Specifically, the <code>isSignatureValid()</code> function checks the signature of the first <code>&lt;Signature&gt;</code> element, while the <code>getEmail()</code> function extracts the email address from the first assertion element <code>assertion[0]</code>. This design allows an attacker to prepend a malicious, unsigned SAML assertion containing an arbitrary identity before a legitimate, signed assertion. This bypasses authentication, potentially granting unauthorized access to sensitive monitoring data and platform functionalities. The vulnerability has been patched in version 10.0.42.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker crafts a malicious SAML response containing an unsigned assertion with a forged identity (e.g., a privileged user&rsquo;s email).</li>
<li>The attacker prepends this malicious assertion to a valid, signed SAML assertion generated for a low-privilege account or a newly created account.</li>
<li>The combined SAML response is sent to the OneUptime platform for authentication.</li>
<li>The <code>isSignatureValid()</code> function verifies the signature of the second assertion (the originally signed, valid one), passing the signature check.</li>
<li>The <code>getEmail()</code> function extracts the email address from the first assertion (the malicious, unsigned one), effectively impersonating the forged identity.</li>
<li>OneUptime grants access based on the forged identity extracted from the malicious assertion.</li>
<li>The attacker gains unauthorized access to the OneUptime platform with the privileges of the impersonated user.</li>
<li>The attacker can then view monitoring data, modify configurations, or perform other actions allowed to the compromised account.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-34840 allows an attacker to bypass authentication and impersonate any user on the OneUptime platform. This could lead to unauthorized access to sensitive monitoring data, modification of system configurations, and potentially complete compromise of the OneUptime instance. The vulnerability has a CVSS v3.1 base score of 8.1, indicating a high severity. Organizations using vulnerable OneUptime versions are at risk of significant data breaches and operational disruption.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately upgrade OneUptime instances to version 10.0.42 or later to patch CVE-2026-34840.</li>
<li>Implement a web application firewall (WAF) rule to inspect SAML responses for multiple assertions and reject requests containing more than one assertion to prevent the attack described in the attack chain.</li>
<li>Monitor web server logs for suspicious SAML authentication requests and responses, focusing on unusual source IPs or deviations from normal authentication patterns related to the webserver log source.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>CVE-2026-34840</category><category>saml</category><category>authentication-bypass</category><category>webserver</category></item><item><title>Rack::Static Information Disclosure Vulnerability (CVE-2026-34785)</title><link>https://feed.craftedsignal.io/briefs/2026-04-rack-static-disclosure/</link><pubDate>Thu, 02 Apr 2026 17:16:24 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-rack-static-disclosure/</guid><description>Rack versions prior to 2.2.23, 3.1.21, and 3.2.6 are vulnerable to information disclosure due to improper static file serving via a prefix matching issue in Rack::Static.</description><content:encoded><![CDATA[<p>Rack, a modular Ruby web server interface, is susceptible to an information disclosure vulnerability in versions prior to 2.2.23, 3.1.21, and 3.2.6. The flaw resides in the Rack::Static middleware component, which uses a simple string prefix check to determine if a request should be served as a static file. When configured with URL prefixes, such as &ldquo;/css&rdquo;, Rack::Static incorrectly matches any request path starting with &ldquo;/css&rdquo;, potentially serving unintended files like &ldquo;/css-config.env&rdquo; or &ldquo;/css-backup.sql&rdquo;. This allows unauthorized access to sensitive files located under the static root directory. This vulnerability, identified as CVE-2026-34785, can lead to the disclosure of configuration files, database backups, and other sensitive information. The vulnerability has been patched in Rack versions 2.2.23, 3.1.21, and 3.2.6.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a Rack-based web application using a vulnerable version of Rack (prior to 2.2.23, 3.1.21, or 3.2.6).</li>
<li>The attacker identifies a static file directory configured in the Rack application, for example using a path prefix like &ldquo;/css&rdquo;.</li>
<li>The attacker crafts a malicious request targeting a sensitive file within the static directory, such as &ldquo;/css-config.env&rdquo; or &ldquo;/css-backup.sql&rdquo;, that shares the configured prefix but is not intended to be served publicly.</li>
<li>The Rack::Static middleware incorrectly matches the malicious request due to the simple string prefix check.</li>
<li>The web server serves the unintended file to the attacker.</li>
<li>The attacker gains access to sensitive information contained in the served file.</li>
<li>The attacker leverages the disclosed information to further compromise the application or infrastructure.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability (CVE-2026-34785) can lead to the disclosure of sensitive information, including configuration files, database backups, and other critical data. The impact severity is dependent on the nature of the exposed files. For example, exposure of database credentials could result in a full compromise of the application&rsquo;s data. Organizations using vulnerable Rack versions are susceptible to information breaches if they rely on Rack::Static to serve files.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Rack to version 2.2.23, 3.1.21, or 3.2.6 or later to patch CVE-2026-34785.</li>
<li>Review Rack::Static configurations to ensure appropriate restrictions are in place for serving static files.</li>
<li>Deploy the Sigma rule &ldquo;Detect Suspicious Rack Static File Access&rdquo; to identify attempts to access files with similar prefixes.</li>
<li>Monitor web server logs (category: webserver) for unusual requests with file extensions such as <code>.env</code>, <code>.sql</code>, <code>.bak</code> that fall under static directories (e.g., /css, /js, /img).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>rack</category><category>information-disclosure</category><category>CVE-2026-34785</category><category>ruby</category><category>webserver</category></item><item><title>Cisco Smart Software Manager On-Prem RCE via Exposed API (CVE-2026-20160)</title><link>https://feed.craftedsignal.io/briefs/2024-02-cisco-ssm-rce/</link><pubDate>Wed, 01 Apr 2026 17:28:31 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-02-cisco-ssm-rce/</guid><description>CVE-2026-20160 is a critical vulnerability in Cisco Smart Software Manager On-Prem (SSM On-Prem) that allows an unauthenticated, remote attacker to execute arbitrary commands on the underlying operating system with root privileges by sending a crafted request to an exposed API.</description><content:encoded><![CDATA[<p>CVE-2026-20160 affects Cisco Smart Software Manager On-Prem (SSM On-Prem). The vulnerability allows an unauthenticated, remote attacker to execute arbitrary commands on the underlying operating system of an affected SSM On-Prem host. This is due to the unintentional exposure of an internal service. The vulnerability was reported in April 2026. Successful exploitation allows for command execution with root-level privileges, making it a critical risk for organizations using the affected Cisco SSM On-Prem software. Defenders should apply available patches or mitigations immediately.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies an internet-facing Cisco Smart Software Manager On-Prem (SSM On-Prem) instance.</li>
<li>The attacker discovers the unintentionally exposed internal service through reconnaissance techniques such as port scanning and service enumeration.</li>
<li>The attacker crafts a malicious request specifically designed to exploit the exposed API endpoint of the internal service.</li>
<li>The attacker sends the crafted request to the vulnerable API endpoint of the exposed service.</li>
<li>The vulnerable SSM On-Prem software processes the malicious request without proper authentication or authorization checks.</li>
<li>The software executes arbitrary commands on the underlying operating system due to the exposed API.</li>
<li>The attacker gains root-level privileges on the SSM On-Prem host, allowing for full control of the system.</li>
<li>The attacker can then perform further malicious activities, such as data exfiltration, lateral movement, or installation of persistent backdoors.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-20160 allows an attacker to execute arbitrary commands on the underlying operating system with root-level privileges. This could lead to complete compromise of the affected SSM On-Prem host. The attacker could exfiltrate sensitive data, disrupt services, or use the compromised system as a launchpad for further attacks within the network. Given the critical nature of software license management performed by SSM On-Prem, a successful attack could have significant operational and financial consequences.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the security patch released by Cisco to address CVE-2026-20160 on all affected Cisco Smart Software Manager On-Prem (SSM On-Prem) instances.</li>
<li>Monitor web server logs for unusual API requests targeting Cisco Smart Software Manager On-Prem instances to detect potential exploitation attempts, using the &ldquo;Detect Cisco SSM On-Prem API Exploitation Attempt&rdquo; Sigma rule.</li>
<li>Implement network segmentation to limit the exposure of internal services and prevent unauthorized access from external networks.</li>
<li>Review access controls and authentication mechanisms for all internal services to ensure proper security configurations and prevent unintentional exposure.</li>
<li>Deploy the &ldquo;Detect Cisco SSM On-Prem Root Command Execution&rdquo; Sigma rule to detect suspicious process execution originating from the SSM On-Prem server.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-20160</category><category>cisco</category><category>ssm-on-prem</category><category>rce</category><category>webserver</category></item><item><title>HTTP/2 Implementations Vulnerability Enables Denial of Service</title><link>https://feed.craftedsignal.io/briefs/2026-04-http2-dos/</link><pubDate>Wed, 01 Apr 2026 09:21:36 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-http2-dos/</guid><description>A remote, anonymous attacker can exploit a vulnerability in various HTTP/2 implementations to perform a denial-of-service attack.</description><content:encoded><![CDATA[<p>A vulnerability exists in multiple HTTP/2 implementations that can be exploited by an unauthenticated, remote attacker to conduct a denial-of-service (DoS) attack. The specific details of the vulnerability aren&rsquo;t disclosed in this brief, but the generic nature of the vulnerability means a wide array of servers are possibly vulnerable. Defenders need to focus on detecting anomalous HTTP/2 traffic patterns, given the lack of a specific CVE or patch information in the original source.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker establishes an HTTP/2 connection with a vulnerable server.</li>
<li>The attacker sends a series of specially crafted HTTP/2 requests. Due to the vulnerability, these requests consume excessive server resources.</li>
<li>The server begins to experience performance degradation due to resource exhaustion (CPU, memory, or network bandwidth).</li>
<li>Legitimate user requests are delayed or dropped as the server struggles to process the malicious traffic.</li>
<li>The attacker continues to send malicious HTTP/2 requests, sustaining the resource exhaustion.</li>
<li>The server becomes unresponsive, resulting in a denial-of-service condition for legitimate users.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability leads to a denial-of-service condition, rendering affected servers and services unavailable. The number of potential victims is broad, encompassing any system utilizing a vulnerable HTTP/2 implementation. The impact ranges from temporary service outages to prolonged periods of unavailability, causing business disruption and potential financial losses.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for anomalous HTTP/2 traffic patterns, specifically focusing on request rates and resource consumption (CPU, memory, network) using the provided Sigma rule.</li>
<li>Implement rate limiting for HTTP/2 connections to mitigate the impact of excessive requests.</li>
<li>Consider deploying a Web Application Firewall (WAF) to inspect and filter HTTP/2 traffic for known malicious patterns.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>http/2</category><category>denial-of-service</category><category>webserver</category></item><item><title>Django Multiple Vulnerabilities Leading to SQL Injection, Information Disclosure, and DoS</title><link>https://feed.craftedsignal.io/briefs/2026-04-django-vulns/</link><pubDate>Wed, 01 Apr 2026 09:20:35 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-django-vulns/</guid><description>A remote, authenticated attacker can exploit multiple vulnerabilities in Django to perform SQL injections, disclose confidential information, or cause a denial-of-service condition.</description><content:encoded><![CDATA[<p>Multiple vulnerabilities have been identified in the Django web framework that could allow a remote, authenticated attacker to perform SQL injection attacks, disclose sensitive information, or cause a denial-of-service (DoS) condition. This vulnerability impacts Django-based applications, potentially exposing sensitive data and disrupting services. Defenders need to prioritize detection and mitigation strategies to prevent exploitation of these weaknesses. Specific Django versions affected are not detailed in the source, requiring a broad approach to detection across Django deployments. The lack of specific CVEs makes targeted patching difficult, emphasizing the importance of proactive monitoring for exploitation attempts.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains valid credentials to a Django-based web application through credential stuffing or other means.</li>
<li>The attacker identifies input fields within the application that are vulnerable to SQL injection, such as search boxes or form fields that directly interact with the database.</li>
<li>The attacker crafts malicious SQL queries using techniques like SQL injection within these vulnerable input fields.</li>
<li>The Django application, without proper input sanitization, executes the attacker-controlled SQL query against the underlying database.</li>
<li>Depending on the specific vulnerability and database permissions, the attacker may extract sensitive data, such as user credentials, financial information, or internal application data.</li>
<li>The attacker may also modify database records to escalate privileges or manipulate application behavior.</li>
<li>By exploiting vulnerabilities that cause excessive resource consumption, the attacker can trigger a denial-of-service condition, rendering the application unavailable to legitimate users.</li>
<li>The attacker exfiltrates the gathered information or uses the compromised application for further malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these Django vulnerabilities can lead to significant data breaches, compromising sensitive user data and intellectual property. Affected organizations could face financial losses due to regulatory fines, legal liabilities, and reputational damage. A denial-of-service condition can disrupt business operations and damage customer trust. The number of affected organizations is potentially large, given the widespread use of the Django framework in web application development.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule to detect potential SQL injection attempts targeting Django applications, focusing on <code>webserver</code> logs and HTTP request parameters.</li>
<li>Implement strong input validation and sanitization measures within Django applications to prevent SQL injection vulnerabilities (reference: overview).</li>
<li>Monitor web server logs for unusual activity patterns, such as large numbers of requests from a single IP address, which could indicate a denial-of-service attack (reference: attack chain step 7).</li>
<li>Regularly audit Django applications for security vulnerabilities and apply necessary patches and updates (reference: overview).</li>
<li>Consider using a web application firewall (WAF) to filter out malicious requests and protect against common web application attacks (reference: overview).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>django</category><category>sql-injection</category><category>information-disclosure</category><category>denial-of-service</category><category>web-application</category><category>webserver</category></item><item><title>baserCMS OS Command Injection Vulnerability (CVE-2026-21861)</title><link>https://feed.craftedsignal.io/briefs/2026-04-basercms-command-injection/</link><pubDate>Tue, 31 Mar 2026 01:19:59 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-basercms-command-injection/</guid><description>baserCMS versions prior to 5.2.3 are vulnerable to OS command injection, allowing an authenticated administrator to execute arbitrary commands on the server via maliciously crafted input to the core update functionality.</description><content:encoded>&lt;p>baserCMS, a website development framework, is susceptible to an OS command injection vulnerability (CVE-2026-21861) in versions prior to 5.2.3. This flaw resides within the core update functionality, where user-controlled input is directly passed to the &lt;code>exec()&lt;/code> function without proper sanitization or validation. A successful exploit allows an authenticated administrator to execute arbitrary operating system commands on the underlying server. The vulnerability was reported on March 30, 2026…&lt;/p>
</content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-21861</category><category>command-injection</category><category>webserver</category></item><item><title>baserCMS OS Command Injection Vulnerability (CVE-2026-30877)</title><link>https://feed.craftedsignal.io/briefs/2026-03-basercms-cmd-injection/</link><pubDate>Tue, 31 Mar 2026 01:16:35 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-basercms-cmd-injection/</guid><description>baserCMS prior to version 5.2.3 contains an OS command injection vulnerability in the update functionality, allowing authenticated administrators to execute arbitrary OS commands on the server.</description><content:encoded>&lt;p>baserCMS is a website development framework. Prior to version 5.2.3, a critical OS command injection vulnerability exists within the update functionality. This flaw allows an attacker, authenticated as an administrator, to inject and execute arbitrary operating system commands on the server hosting baserCMS. The commands are executed with the privileges of the user account running the baserCMS application, potentially leading to complete system compromise. This vulnerability was reported on…&lt;/p>
</content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>basercms</category><category>command-injection</category><category>webserver</category></item><item><title>baserCMS Pre-Auth Arbitrary Code Execution via Zip Upload (CVE-2025-32957)</title><link>https://feed.craftedsignal.io/briefs/2026-03-basercms-rce/</link><pubDate>Tue, 31 Mar 2026 01:16:34 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-basercms-rce/</guid><description>baserCMS versions prior to 5.2.3 are vulnerable to arbitrary code execution via a crafted zip file upload through the restore function, leading to unauthenticated remote command execution on the webserver.</description><content:encoded><![CDATA[<p>baserCMS, a website development framework, contains an arbitrary code execution vulnerability in versions prior to 5.2.3. The vulnerability, identified as CVE-2025-32957, lies within the application&rsquo;s restore function. This function allows users, including potentially unauthenticated users depending on configuration, to upload a .zip file. The uploaded archive is automatically extracted by the application. A PHP file within the extracted archive is then included using <code>require_once</code> without…</p>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>basercms</category><category>rce</category><category>cve-2025-32957</category><category>webserver</category></item><item><title>Multiple Vulnerabilities in NGINX and NGINX Plus</title><link>https://feed.craftedsignal.io/briefs/2026-03-nginx-vulns/</link><pubDate>Mon, 30 Mar 2026 10:14:08 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-nginx-vulns/</guid><description>Multiple vulnerabilities in NGINX Plus and NGINX can be exploited by an attacker to perform a denial of service attack, manipulate data, bypass security measures, and potentially execute arbitrary program code, leading to significant impact.</description><content:encoded><![CDATA[<p>Multiple vulnerabilities have been identified in NGINX and NGINX Plus, potentially allowing attackers to perform a range of malicious activities. These include launching denial-of-service (DoS) attacks to disrupt service availability, manipulating sensitive data, bypassing existing security measures, and, in the worst-case scenario, achieving arbitrary code execution on the affected system. Defenders should be aware that although no specific CVEs or attack campaigns are mentioned, the broad range of potential impacts makes patching and detection critical. The scope of these vulnerabilities extends to any organization utilizing NGINX or NGINX Plus as part of their infrastructure.</p>
<h2 id="attack-chain">Attack Chain</h2>
<p>Since the specific vulnerabilities are not detailed, the following attack chain represents a generalized exploitation scenario:</p>
<ol>
<li><strong>Vulnerability Discovery:</strong> The attacker identifies a vulnerable version of NGINX or NGINX Plus through reconnaissance.</li>
<li><strong>Exploit Development/Acquisition:</strong> The attacker develops a custom exploit or obtains one from public or private sources targeting the identified vulnerability (e.g., buffer overflow, integer overflow, or configuration flaw).</li>
<li><strong>Target Selection:</strong> The attacker identifies a vulnerable NGINX instance exposed to the network.</li>
<li><strong>Initial Exploitation:</strong> The attacker sends a specially crafted request to the targeted NGINX server, triggering the vulnerability. This might involve manipulating HTTP headers, crafting specific URL parameters, or exploiting flaws in request handling.</li>
<li><strong>Privilege Escalation (if needed):</strong> Depending on the vulnerability, the attacker may need to escalate privileges to gain full control of the system. This could involve exploiting additional vulnerabilities or misconfigurations.</li>
<li><strong>Data Manipulation/Security Bypass/DoS:</strong> The attacker leverages the exploited vulnerability to manipulate data served by NGINX, bypass authentication or authorization mechanisms, or initiate a denial-of-service attack by consuming excessive resources.</li>
<li><strong>Arbitrary Code Execution (Potential):</strong> If the vulnerability allows, the attacker executes arbitrary code on the NGINX server, potentially installing malware, establishing persistence, or using the compromised server as a pivot point for further attacks.</li>
<li><strong>Lateral Movement/Exfiltration (Potential):</strong> After gaining a foothold, the attacker may attempt to move laterally within the network, compromising other systems and exfiltrating sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities can lead to significant damage. A denial-of-service attack can disrupt critical services, causing financial losses and reputational damage. Data manipulation can compromise the integrity of information served by NGINX, leading to incorrect decisions or further attacks. Bypassing security measures can grant unauthorized access to sensitive resources. Arbitrary code execution allows the attacker to take complete control of the server, potentially leading to data theft, system compromise, and further attacks on internal infrastructure. The exact number of potential victims is unknown, but it could be extensive given the widespread use of NGINX and NGINX Plus.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade NGINX and NGINX Plus to the latest patched versions to remediate known vulnerabilities.</li>
<li>Implement the &ldquo;Detect Suspicious Nginx Configuration Changes&rdquo; Sigma rule to detect unauthorized modifications to the Nginx configuration.</li>
<li>Deploy the &ldquo;Detect Nginx DoS Attempts&rdquo; Sigma rule to monitor for suspicious traffic patterns indicative of a denial-of-service attack against Nginx.</li>
<li>Implement strict access controls to limit exposure of NGINX servers to untrusted networks.</li>
<li>Regularly review NGINX configuration files for misconfigurations and security vulnerabilities.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>nginx</category><category>vulnerability</category><category>denial-of-service</category><category>code-execution</category><category>webserver</category><category>linux</category></item><item><title>CVE-2026-2328 Unauthenticated Path Traversal Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-03-path-traversal/</link><pubDate>Mon, 30 Mar 2026 08:16:17 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-path-traversal/</guid><description>CVE-2026-2328 describes a vulnerability where an unauthenticated remote attacker can exploit insufficient input validation to access backend components beyond their intended scope via path traversal, leading to the exposure of sensitive information.</description><content:encoded>&lt;p>CVE-2026-2328 is a critical vulnerability that allows an unauthenticated remote attacker to perform path traversal attacks due to insufficient input validation. This flaw enables unauthorized access to backend components, potentially exposing sensitive information. The vulnerability was published on March 30, 2026, and assigned a CVSS v3.1 score of 7.5. The vulnerability stems from inadequate input sanitization, permitting attackers to manipulate file paths and access restricted areas of the…&lt;/p>
</content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>path-traversal</category><category>vulnerability</category><category>webserver</category></item><item><title>Undertow HTTP Request Smuggling Vulnerability (CVE-2026-28367)</title><link>https://feed.craftedsignal.io/briefs/2026-03-undertow-smuggling/</link><pubDate>Fri, 27 Mar 2026 17:16:27 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-undertow-smuggling/</guid><description>A remote attacker can exploit CVE-2026-28367 in Undertow by sending '\r\r\r' as a header block terminator, leading to request smuggling on vulnerable proxy servers.</description><content:encoded>&lt;p>CVE-2026-28367 is a request smuggling vulnerability found in Undertow, a flexible performant server-side Java web server. The vulnerability arises from improper handling of HTTP header block terminators. Specifically, a remote attacker can send &lt;code>\r\r\r&lt;/code> as a header block terminator, which can be misinterpreted by certain proxy servers. This allows the attacker to potentially smuggle malicious requests, bypassing security controls and gaining unauthorized access to resources or manipulating…&lt;/p>
</content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve</category><category>request-smuggling</category><category>undertow</category><category>webserver</category></item><item><title>Shenzhen Ruiming Technology Streamax Crocus bis SQL Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-03-streamax-sql-injection/</link><pubDate>Fri, 27 Mar 2026 04:16:08 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-streamax-sql-injection/</guid><description>A SQL injection vulnerability (CVE-2026-4910) exists in Shenzhen Ruiming Technology Streamax Crocus bis 1.3.44 via the /RemoteFormat.do endpoint, allowing remote attackers to execute arbitrary SQL commands by manipulating the State argument.</description><content:encoded><![CDATA[<p>A SQL injection vulnerability, identified as CVE-2026-4910, affects Shenzhen Ruiming Technology Streamax Crocus bis version 1.3.44. The vulnerability is located within the <code>/RemoteFormat.do</code> file, specifically the <code>Endpoint</code> component. By manipulating the <code>State</code> argument, a remote attacker can inject arbitrary SQL commands. Publicly available exploits exist, increasing the risk of exploitation. The vendor was notified but did not respond. Successful exploitation could lead to unauthorized data…</p>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-4910</category><category>sql-injection</category><category>streamax</category><category>webserver</category></item><item><title>SiYuan Arbitrary Document Reading Vulnerability in Publishing Service</title><link>https://feed.craftedsignal.io/briefs/2026-06-siyuan-arbitrary-doc-read/</link><pubDate>Wed, 25 Mar 2026 19:37:18 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-06-siyuan-arbitrary-doc-read/</guid><description>SiYuan is vulnerable to arbitrary document reading via the publishing service, allowing attackers to retrieve document IDs and view the content of all documents, including encrypted or prohibited ones, by exploiting the `/api/file/readDir` and `/api/block/getChildBlocks` interfaces.</description><content:encoded><![CDATA[<p>SiYuan, a note-taking application, is susceptible to an arbitrary document reading vulnerability within its publishing service. This flaw allows an unauthenticated attacker to bypass access controls and retrieve the content of any document, regardless of encryption or access restrictions. The vulnerability stems from inadequate authorization checks when accessing document content through specific API endpoints. The issue was reported on March 25, 2026, and is tracked as CVE-2026-33669. The vulnerable package is <code>go/github.com/siyuan-note/siyuan/kernel</code>, specifically versions equal to or older than <code>0.0.0-20260317012524-fe4523fff2c8</code>. This vulnerability poses a significant risk to organizations and individuals using SiYuan for sensitive data storage, potentially leading to unauthorized access and data breaches.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a SiYuan instance with the publishing service enabled.</li>
<li>The attacker sends a request to the <code>/api/file/readDir</code> endpoint to retrieve a list of document IDs. This endpoint lacks proper authorization checks.</li>
<li>The SiYuan server responds with a list of document IDs available within the publishing service.</li>
<li>The attacker selects a target document ID from the list obtained in the previous step.</li>
<li>The attacker sends a POST request to the <code>/api/block/getChildBlocks</code> endpoint, providing the target document ID in the request body. This endpoint is intended to retrieve child blocks of a specific document.</li>
<li>Due to insufficient access control, the server processes the request and returns the content of the requested document, even if it is encrypted or restricted.</li>
<li>The attacker parses the JSON response to extract the document content, which is typically formatted in Markdown.</li>
<li>The attacker can repeat steps 4-7 to obtain the content of other documents.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The arbitrary document reading vulnerability allows unauthorized access to potentially sensitive information stored within SiYuan. Successful exploitation could lead to the disclosure of confidential documents, intellectual property, personal data, or other restricted content. The impact is significant, as it bypasses intended security measures such as encryption and access controls. While specific victim numbers are unknown, any organization or individual utilizing the affected SiYuan version with the publishing service enabled is potentially at risk. The CVE is rated critical.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade SiYuan to a patched version that addresses CVE-2026-33669.</li>
<li>Deploy the Sigma rule &ldquo;SiYuan Arbitrary Document Access via getChildBlocks&rdquo; to detect potential exploitation attempts targeting the <code>/api/block/getChildBlocks</code> endpoint in your web server logs.</li>
<li>Monitor web server logs for suspicious activity, specifically POST requests to <code>/api/block/getChildBlocks</code> with unusual document IDs or request patterns.</li>
<li>Implement rate limiting on the <code>/api/file/readDir</code> and <code>/api/block/getChildBlocks</code> endpoints to mitigate potential abuse.</li>
<li>Enable webserver logging and ensure all SiYuan instances are monitored by the logging solution.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>siyuan</category><category>arbitrary-document-access</category><category>vulnerability</category><category>webserver</category></item><item><title>Apache CXF Vulnerability Allows DoS and Information Disclosure</title><link>https://feed.craftedsignal.io/briefs/2026-03-apache-cxf-dos-info-disclosure/</link><pubDate>Wed, 25 Mar 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-apache-cxf-dos-info-disclosure/</guid><description>An anonymous remote attacker can exploit a vulnerability in Apache CXF to perform a denial of service attack and disclose sensitive information.</description><content:encoded><![CDATA[<p>A vulnerability exists in Apache CXF that could allow an anonymous, remote attacker to conduct a denial of service (DoS) attack and disclose sensitive information. The specific versions affected are not detailed in this advisory. The attacker exploits an unspecified weakness within Apache CXF&rsquo;s processing capabilities. Successful exploitation leads to service disruption and potentially exposes confidential data handled by the affected Apache CXF instance. This vulnerability poses a significant risk to organizations relying on Apache CXF for their services, potentially impacting availability and data security.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable Apache CXF endpoint exposed to the internet.</li>
<li>The attacker crafts a malicious request specifically designed to exploit the unspecified vulnerability in Apache CXF.</li>
<li>The malicious request is sent to the vulnerable Apache CXF endpoint.</li>
<li>Apache CXF processes the malicious request, triggering the vulnerability.</li>
<li>The vulnerability leads to excessive resource consumption on the server, causing a denial of service.</li>
<li>The vulnerability also allows the attacker to potentially access sensitive information processed by Apache CXF, leading to data disclosure.</li>
<li>The attacker may then attempt to further exploit the disclosed information or use the disrupted service as part of a larger attack campaign.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability can lead to a complete denial of service, rendering applications relying on Apache CXF unavailable. The information disclosure aspect can expose sensitive data, potentially leading to further compromise, reputational damage, and legal repercussions. The number of potential victims is broad, encompassing any organization using vulnerable versions of Apache CXF.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Implement rate limiting on Apache CXF endpoints to mitigate potential DoS attacks (Log Source: Webserver).</li>
<li>Monitor Apache CXF logs for unusual request patterns that may indicate exploitation attempts (Log Source: Webserver).</li>
<li>Deploy the Sigma rule <code>Detect Suspicious Apache CXF Request</code> to identify potential exploitation attempts (Sigma Rule).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>apache-cxf</category><category>denial-of-service</category><category>information-disclosure</category><category>webserver</category></item><item><title>Red Hat JBoss Enterprise Application Platform Multiple Vulnerabilities</title><link>https://feed.craftedsignal.io/briefs/2026-03-jboss-vulns/</link><pubDate>Wed, 25 Mar 2026 10:23:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-jboss-vulns/</guid><description>An anonymous remote attacker can exploit multiple vulnerabilities in Red Hat JBoss Enterprise Application Platform to cause a denial-of-service condition, manipulate data, and conduct further attacks such as cache poisoning and session hijacking.</description><content:encoded><![CDATA[<p>Multiple vulnerabilities exist within the Red Hat JBoss Enterprise Application Platform. An unauthenticated, remote attacker can exploit these flaws to trigger a denial-of-service (DoS) condition, manipulate sensitive data, and facilitate subsequent attacks, including cache poisoning and session hijacking. The vulnerabilities exist in the Undertow component. While specific CVEs are not listed in the advisory, the impact could be significant, leading to service disruption and potential data compromise. Defenders should focus on patching and monitoring for suspicious activity targeting JBoss instances.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable JBoss Enterprise Application Platform instance running an outdated version of Undertow.</li>
<li>The attacker sends a specially crafted HTTP request designed to exploit a specific vulnerability within Undertow&rsquo;s request processing logic.</li>
<li>If the vulnerability leads to a DoS, the server&rsquo;s resources are exhausted, causing it to become unresponsive to legitimate requests.</li>
<li>If the vulnerability allows data manipulation, the attacker modifies application data via HTTP requests.</li>
<li>For cache poisoning, the attacker crafts a request that, when cached by the application or a proxy, serves malicious content to other users.</li>
<li>For session hijacking, the attacker exploits a vulnerability that allows them to steal or forge user session IDs.</li>
<li>The attacker uses the hijacked session to impersonate a legitimate user and gain unauthorized access to sensitive resources.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities can lead to significant disruption of services relying on the JBoss Enterprise Application Platform. This includes denial-of-service conditions, potentially impacting business operations and user experience. Data manipulation could lead to data corruption or unauthorized modification of sensitive information. Cache poisoning can spread malicious content to a wide range of users. Session hijacking allows attackers to gain unauthorized access, potentially leading to data breaches or further malicious activity.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Examine web server logs for abnormal HTTP requests that could indicate exploitation attempts (see example Sigma rule for detecting suspicious HTTP methods).</li>
<li>Monitor network traffic for unusual patterns that may indicate denial-of-service attacks targeting JBoss servers.</li>
<li>Implement a Web Application Firewall (WAF) to filter out malicious requests and protect against common web exploits.</li>
<li>Apply the latest patches and updates for Red Hat JBoss Enterprise Application Platform, focusing on the Undertow component, to remediate the underlying vulnerabilities.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>jboss</category><category>undertow</category><category>denial-of-service</category><category>cache-poisoning</category><category>session-hijacking</category><category>webserver</category></item><item><title>Craft CMS Authenticated Remote Code Execution via Malicious Attached Behavior</title><link>https://feed.craftedsignal.io/briefs/2024-01-18-craftcms-rce/</link><pubDate>Tue, 24 Mar 2026 16:50:42 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-18-craftcms-rce/</guid><description>A remote code execution vulnerability exists in Craft CMS versions 5.6.0 through 5.9.12, where any authenticated user with control panel access can exploit the vulnerability by injecting malicious behavior via the `fieldLayouts` parameter in `ElementIndexesController::actionFilterHud()` due to the unsanitized parameter being passed to `FieldLayout::createFromConfig()`.</description><content:encoded><![CDATA[<p>Craft CMS versions 5.6.0 through 5.9.12 are susceptible to a remote code execution (RCE) vulnerability (CVE-2026-33157) that bypasses previous security measures implemented to prevent similar attacks. The vulnerability stems from the <code>ElementIndexesController::actionFilterHud()</code> function, where the <code>fieldLayouts</code> parameter is passed directly to <code>FieldLayout::createFromConfig()</code> without proper sanitization. Any authenticated user with control panel access (<code>accessCp</code> permission) can exploit this flaw by injecting malicious behaviors into the <code>fieldLayouts</code> configuration. This oversight allows attackers to execute arbitrary code on the server, potentially leading to complete system compromise. Defenders need to implement mitigations to detect and prevent exploitation of this vulnerability.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An authenticated user with control panel access crafts a malicious HTTP request.</li>
<li>The request includes a <code>fieldLayouts</code> array with a configuration containing <code>&quot;as &lt;name&gt;&quot;</code> prefixed keys within the request body to the <code>/admin/element-indexes/filter-hud</code> endpoint.</li>
<li><code>ElementIndexesController::actionFilterHud()</code> receives the <code>fieldLayouts</code> parameter.</li>
<li>The <code>fieldLayouts</code> parameter is passed to <code>FieldLayout::createFromConfig($config)</code> without sanitization.</li>
<li><code>FieldLayout::createFromConfig($config)</code> invokes <code>Model::__construct($config)</code>, which processes each key in the configuration.</li>
<li>The <code>&quot;as rce&quot;</code> key triggers <code>Component::__set(&quot;as rce&quot;, $value)</code>, which leads to the instantiation of <code>AttributeTypecastBehavior</code> and its attachment to the FieldLayout via <code>Yii::createObject($value)</code>.</li>
<li>An <code>&quot;on *&quot;</code> key registers a wildcard event handler. Subsequently, <code>parent::__construct()</code> is called followed by <code>init()</code> -&gt; <code>setTabs([])</code> -&gt; <code>getAvailableNativeFields()</code> -&gt; <code>trigger(EVENT_DEFINE_NATIVE_FIELDS)</code>.</li>
<li>The wildcard handler fires, triggering <code>AttributeTypecastBehavior::beforeSave()</code> -&gt; <code>typecastAttributes()</code>. The vulnerability results in <code>$this-&gt;owner-&gt;typecastBeforeSave</code> being resolved via <code>Component::__get()</code> which returns the command string from the behavior&rsquo;s own property, finally reaching <code>call_user_func([ConsoleProcessus::class, 'execute'], $command)</code> -&gt; <code>shell_exec($command)</code> enabling remote code execution.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The vulnerability allows any authenticated user with control panel access to execute arbitrary code on the Craft CMS server. Successful exploitation can lead to complete system compromise, including data theft, modification, or destruction. This RCE vulnerability can have significant impacts on organizations using affected versions of Craft CMS (5.6.0 through 5.9.12).</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule to detect exploitation attempts by monitoring for HTTP requests to <code>/admin/element-indexes/filter-hud</code> with the <code>fieldLayouts</code> parameter in the request body (see Sigma rule &ldquo;Craft CMS RCE Attempt via ElementIndexesController&rdquo;).</li>
<li>Apply available patches or upgrade to a non-vulnerable version of Craft CMS (versions prior to 5.6.0 or later than 5.9.12).</li>
<li>Restrict access to the control panel to only trusted users with a legitimate need, reducing the attack surface.</li>
<li>Review and audit existing Craft CMS configurations for any suspicious behavior or event injections.</li>
<li>Monitor web server logs for unusual activity related to the <code>ElementIndexesController</code> and <code>FieldLayout</code> components, focusing on POST requests containing potentially malicious configurations (see Sigma rule &ldquo;Craft CMS RCE - AttributeTypecastBehavior&rdquo;).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>craftcms</category><category>rce</category><category>vulnerability</category><category>webserver</category></item><item><title>Census CSWeb 8.0.1 Configuration File Disclosure Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-03-census-csweb-config-disclosure/</link><pubDate>Tue, 24 Mar 2026 14:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-census-csweb-config-disclosure/</guid><description>Census CSWeb 8.0.1 is vulnerable to unauthenticated remote configuration file disclosure via HTTP requests to the `/app/config` path, potentially exposing sensitive secrets; fixed in 8.1.0 alpha.</description><content:encoded><![CDATA[<p>Census CSWeb version 8.0.1 is susceptible to a critical vulnerability (CVE-2025-60949) that allows unauthenticated remote attackers to access sensitive configuration files. This exposure occurs because the <code>/app/config</code> directory is reachable via HTTP in certain deployments. By sending a specially crafted request to this path, an attacker can potentially obtain sensitive information, such as API keys, database credentials, and other secrets stored within the configuration files. This vulnerability was publicly disclosed on March 23, 2026, and a fix is available in version 8.1.0 alpha. Exploitation of this vulnerability can lead to significant data breaches and compromise of the affected system. Defenders should prioritize identifying and patching vulnerable instances.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a target running Census CSWeb 8.0.1.</li>
<li>The attacker sends an HTTP GET request to <code>/app/config</code> directory or specific files within that directory.</li>
<li>The vulnerable server processes the request without proper authentication or access controls.</li>
<li>The server responds with the contents of the configuration files, potentially containing sensitive information.</li>
<li>The attacker parses the configuration files to extract sensitive data, such as API keys, database credentials, or internal IP addresses.</li>
<li>The attacker uses the extracted credentials to gain unauthorized access to databases, APIs, or other systems.</li>
<li>The attacker escalates privileges within the compromised systems.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2025-60949 can lead to the exposure of sensitive information, including API keys, database credentials, and other secrets. This can allow attackers to gain unauthorized access to critical systems, leading to data breaches, financial loss, and reputational damage. The vulnerability affects all deployments of Census CSWeb 8.0.1 where the <code>/app/config</code> directory is exposed via HTTP.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to Census CSWeb version 8.1.0 alpha or later to patch CVE-2025-60949.</li>
<li>Implement access controls to restrict access to the <code>/app/config</code> directory to authorized personnel only.</li>
<li>Deploy the Sigma rule &ldquo;Detect Unauthenticated Access to Configuration Files&rdquo; to identify potential exploitation attempts.</li>
<li>Monitor web server logs for requests to <code>/app/config</code> to detect unauthorized access attempts.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2025-60949</category><category>information-disclosure</category><category>webserver</category></item><item><title>Out-of-bounds Read Vulnerability in fabiangreffrath woof (CVE-2026-4750)</title><link>https://feed.craftedsignal.io/briefs/2026-03-woof-oob-read/</link><pubDate>Tue, 24 Mar 2026 06:16:23 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-woof-oob-read/</guid><description>CVE-2026-4750 is a critical out-of-bounds read vulnerability affecting fabiangreffrath woof versions before 15.3.0, potentially leading to information disclosure or denial of service.</description><content:encoded>&lt;p>An out-of-bounds read vulnerability exists in fabiangreffrath woof, a web server for simple file sharing. This vulnerability, identified as CVE-2026-4750, affects woof versions prior to 15.3.0. The vulnerability was reported by the Government Technology Agency of Singapore Cyber Security Group (GovTech CSG). An attacker could potentially exploit this vulnerability to read sensitive information from the server&amp;rsquo;s memory or cause a denial-of-service condition. This poses a risk to organizations…&lt;/p>
</content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-4750</category><category>out-of-bounds read</category><category>webserver</category><category>woof</category></item><item><title>DefaultFuction Jeson-Customer-Relationship-Management-System Server-Side Request Forgery Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-03-jeson-crm-ssrf/</link><pubDate>Tue, 24 Mar 2026 03:16:06 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-jeson-crm-ssrf/</guid><description>A server-side request forgery (SSRF) vulnerability exists in the DefaultFuction Jeson-Customer-Relationship-Management-System's API Module, specifically affecting the /api/System.php file, allowing remote attackers to manipulate the 'url' argument and potentially access internal resources.</description><content:encoded><![CDATA[<p>A server-side request forgery (SSRF) vulnerability, identified as CVE-2026-4623, has been discovered in DefaultFuction Jeson-Customer-Relationship-Management-System up to version 1b4679c4d06b90d31dd521c2b000bfdec5a36e00. The vulnerability resides within the API Module, specifically in the /api/System.php file. An attacker can remotely manipulate the &lsquo;url&rsquo; argument, causing the server to make requests to unintended locations. Due to the product&rsquo;s continuous delivery with rolling releases, specific version details are unavailable. A patch to address the vulnerability is identified as f76e7123fe093b8675f88ec8f71725b0dd186310/98bd4eb07fa19d4f2c5228de6395580013c97476. This vulnerability poses a significant risk as it allows attackers to potentially access internal resources, bypass security controls, and potentially escalate privileges.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies an instance of DefaultFuction Jeson-Customer-Relationship-Management-System running version &lt;= 1b4679c4d06b90d31dd521c2b000bfdec5a36e00.</li>
<li>Attacker crafts a malicious HTTP request targeting the <code>/api/System.php</code> endpoint.</li>
<li>The crafted request includes the <code>url</code> parameter, modified to point to an internal resource or external server controlled by the attacker.</li>
<li>The server-side application processes the malicious request without proper validation of the <code>url</code> parameter.</li>
<li>The application initiates an HTTP request to the attacker-controlled URL or internal resource specified in the <code>url</code> parameter.</li>
<li>The server receives the response from the attacker-controlled server or internal resource.</li>
<li>The application may process the response, potentially exposing sensitive information or allowing further exploitation.</li>
<li>If successful, the attacker gains access to sensitive information, internal resources, or the ability to perform actions on behalf of the server.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SSRF vulnerability (CVE-2026-4623) can lead to the exposure of sensitive internal data, such as configuration files, database credentials, or API keys. It may also allow attackers to bypass security controls, access internal services not intended for public access, and potentially escalate privileges within the application or the underlying infrastructure. Due to lack of information on the specific scope of usage for this CRM, the total number of potential victims is unclear. Organizations utilizing this vulnerable CRM are at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the patch identified as f76e7123fe093b8675f88ec8f71725b0dd186310/98bd4eb07fa19d4f2c5228de6395580013c97476 to mitigate the CVE-2026-4623 vulnerability.</li>
<li>Deploy the Sigma rule &ldquo;Detect Jeson CRM System.php SSRF Attempt&rdquo; to your SIEM to detect exploitation attempts against the <code>/api/System.php</code> endpoint.</li>
<li>Implement strict input validation and sanitization on the <code>url</code> parameter within the <code>/api/System.php</code> endpoint to prevent malicious URL manipulation.</li>
<li>Monitor web server logs for suspicious requests to the <code>/api/System.php</code> endpoint, specifically those containing unusual or unexpected URLs in the <code>url</code> parameter, to identify potential exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>ssrf</category><category>cve-2026-4623</category><category>jeson-crm</category><category>webserver</category></item><item><title>AVideo Unauthenticated Server-Side Request Forgery Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-24-avideo-ssrf/</link><pubDate>Mon, 23 Mar 2026 17:16:51 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-24-avideo-ssrf/</guid><description>AVideo versions up to 26.0 are vulnerable to an unauthenticated server-side request forgery (SSRF) vulnerability in the `plugin/Live/test.php` endpoint, allowing attackers to make the server send arbitrary HTTP requests, potentially exposing internal resources and cloud metadata.</description><content:encoded><![CDATA[<p>AVideo, an open-source video platform, is affected by a critical unauthenticated Server-Side Request Forgery (SSRF) vulnerability (CVE-2026-33502) in versions up to and including 26.0. The vulnerability exists within the <code>plugin/Live/test.php</code> file. An attacker can exploit this flaw to force the AVideo server to make HTTP requests to arbitrary URLs.  Successful exploitation allows attackers to probe internal network services, potentially accessing sensitive internal HTTP resources, cloud metadata endpoints, and other protected assets. The patch for this vulnerability is included in commit 1e6cf03e93b5a5318204b010ea28440b0d9a5ab3. This vulnerability poses a significant risk, as it does not require authentication and can lead to the exposure of sensitive information and potential compromise of internal infrastructure.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies an AVideo instance running a vulnerable version (&lt;= 26.0).</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>plugin/Live/test.php</code> endpoint.</li>
<li>The crafted request includes a URL parameter pointing to an internal resource (e.g., <code>http://localhost/admin</code>).</li>
<li>The AVideo server, without proper validation, processes the request and sends an HTTP request to the attacker-specified URL.</li>
<li>The server receives the HTTP response from the internal resource.</li>
<li>The server may return the content of the internal resource to the attacker, depending on the AVideo application logic.</li>
<li>The attacker analyzes the returned content, potentially gaining access to sensitive information like configuration files, API keys, or internal service endpoints.</li>
<li>The attacker leverages the exposed information to further compromise the AVideo instance or the internal network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SSRF vulnerability (CVE-2026-33502) can lead to the exposure of sensitive internal resources, including configuration files, API keys, and cloud metadata.  This can enable attackers to gain unauthorized access to internal systems, escalate privileges, and potentially compromise the entire infrastructure. The number of affected AVideo instances is currently unknown, but given its open-source nature, it is potentially widespread across various sectors. A successful attack can lead to data breaches, service disruption, and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade AVideo instances to a patched version containing commit 1e6cf03e93b5a5318204b010ea28440b0d9a5ab3 to remediate CVE-2026-33502.</li>
<li>Deploy the Sigma rule <code>Detect AVideo SSRF Attempt via plugin Live Test</code> to identify potential exploitation attempts targeting the vulnerable endpoint.</li>
<li>Implement network segmentation to restrict access to internal resources and mitigate the impact of successful SSRF exploitation.</li>
<li>Review webserver logs for suspicious requests to <code>plugin/Live/test.php</code> with unusual URL parameters (log source: webserver).</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>ssrf</category><category>avideo</category><category>cve-2026-33502</category><category>webserver</category></item><item><title>Traefik ForwardAuth Authentication Bypass via X-Forwarded-Prefix Spoofing</title><link>https://feed.craftedsignal.io/briefs/2024-07-traefik-auth-bypass/</link><pubDate>Wed, 03 Jul 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-07-traefik-auth-bypass/</guid><description>A high-severity authentication bypass vulnerability exists in Traefik's `ForwardAuth` middleware when `trustForwardHeader=false` is configured and Traefik is deployed behind a trusted upstream proxy; Traefik fails to sanitize the `X-Forwarded-Prefix` header, allowing attackers to spoof a trusted prefix value and gain unauthorized access to protected backend routes.</description><content:encoded><![CDATA[<p>A critical authentication bypass vulnerability impacts Traefik instances utilizing the <code>ForwardAuth</code> middleware with <code>trustForwardHeader=false</code>, when deployed behind a trusted upstream proxy. This vulnerability arises from Traefik&rsquo;s failure to properly sanitize the <code>X-Forwarded-Prefix</code> header. Although Traefik correctly rebuilds other <code>X-Forwarded-*</code> headers like <code>X-Forwarded-For</code> and <code>X-Forwarded-Host</code>, it does not strip or rebuild <code>X-Forwarded-Prefix</code>. An attacker can inject a malicious <code>X-Forwarded-Prefix</code> value, which is then passed to the authentication service in the subrequest. If the authentication service relies on the <code>X-Forwarded-Prefix</code> header for authorization decisions, an attacker can bypass access controls and reach protected backend routes. This issue affects Traefik versions v2.11.x before v2.11.43, v3.6.x before v3.6.14, and v3.7.0-rc.1.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker sends a request with a crafted <code>X-Forwarded-Prefix</code> header (e.g., <code>X-Forwarded-Prefix: /admin</code>) to a trusted upstream proxy (e.g., nginx).</li>
<li>The trusted proxy forwards the request to the Traefik instance.</li>
<li>Traefik&rsquo;s <code>StripPrefix</code> middleware processes the request, stripping a configured prefix (e.g., <code>/forbidden</code>) and appending it to the <code>X-Forwarded-Prefix</code> header using <code>Header.Add</code>.</li>
<li>The <code>ForwardAuth</code> middleware creates a subrequest to the authentication service, copying all incoming headers, including the attacker-controlled <code>X-Forwarded-Prefix</code> and the <code>StripPrefix</code>-added value.</li>
<li>The authentication service receives the subrequest with the concatenated <code>X-Forwarded-Prefix</code> values, where the attacker&rsquo;s value appears first (e.g., <code>X-Forwarded-Prefix: /admin, /forbidden</code>).</li>
<li>The authentication service incorrectly uses the attacker-supplied <code>/admin</code> prefix to make authorization decisions.</li>
<li>The authentication service authorizes the request due to the spoofed prefix.</li>
<li>Traefik forwards the request to the protected backend route, granting the attacker unauthorized access.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows unauthenticated attackers to bypass access controls and gain unauthorized access to protected backend routes. This can lead to data breaches, unauthorized modification of resources, and other security compromises. The impact is especially severe in environments where <code>StripPrefix</code> is used before <code>ForwardAuth</code>, and where the authentication service relies heavily on the <code>X-Forwarded-Prefix</code> header for authorization decisions. The number of affected deployments is unknown but likely significant, given Traefik&rsquo;s popularity as a reverse proxy and load balancer.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to Traefik version v2.11.43, v3.6.14, or v3.7.0-rc.2 or later to patch the vulnerability.</li>
<li>As a workaround, if upgrading is not immediately feasible, configure your authentication service to validate and sanitize the <code>X-Forwarded-Prefix</code> header, ensuring it only trusts values originating from the trusted proxy.</li>
<li>Implement the following Sigma rule to detect suspicious requests with the <code>X-Forwarded-Prefix</code> header targeting the <code>/forbidden</code> path, indicating potential exploitation attempts.</li>
<li>Review and harden your Traefik configuration to ensure that the <code>trustForwardHeader</code> parameter is appropriately set based on your deployment environment and trust relationships.</li>
<li>Monitor Traefik access logs for suspicious activity, especially requests with unusual <code>X-Forwarded-Prefix</code> values, using the <code>webserver</code> log source.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>traefik</category><category>authentication-bypass</category><category>webserver</category></item><item><title>BigSweetPotatoStudio HyperChat AI Proxy Middleware Server-Side Request Forgery</title><link>https://feed.craftedsignal.io/briefs/2024-01-23-hyperchat-ssrf/</link><pubDate>Tue, 23 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-23-hyperchat-ssrf/</guid><description>A server-side request forgery (SSRF) vulnerability exists in BigSweetPotatoStudio HyperChat up to version 2.0.0-alpha.63, allowing a remote attacker to manipulate the 'baseurl' argument in the 'fetch' function of the AI Proxy Middleware component to make arbitrary HTTP requests.</description><content:encoded><![CDATA[<p>A server-side request forgery (SSRF) vulnerability, identified as CVE-2026-7223, affects BigSweetPotatoStudio HyperChat up to version 2.0.0-alpha.63. The vulnerability resides in the &lsquo;fetch&rsquo; function within the AI Proxy Middleware located at <code>packages/core/src/http/aiProxyMiddleware.mts</code>. By manipulating the <code>baseurl</code> argument, a remote attacker can force the server to make arbitrary HTTP requests to internal or external resources. This issue allows attackers to potentially access sensitive information, bypass security controls, or perform other malicious actions. The vulnerability is remotely exploitable, and a public exploit is available, increasing the risk of widespread exploitation. The project maintainers were notified but have not responded.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies an instance of BigSweetPotatoStudio HyperChat running version 2.0.0-alpha.63 or earlier.</li>
<li>The attacker crafts a malicious HTTP request targeting the AI Proxy Middleware component.</li>
<li>The crafted request includes a manipulated <code>baseurl</code> argument within the request to the <code>fetch</code> function, pointing to an internal resource (e.g., <code>http://localhost:8080/admin</code>) or an external server controlled by the attacker.</li>
<li>The HyperChat server, without proper validation of the <code>baseurl</code>, uses it to make an HTTP request.</li>
<li>If the <code>baseurl</code> points to an internal resource, the server retrieves the content of that resource and sends it back to the attacker.</li>
<li>If the <code>baseurl</code> points to an external server, the server makes a request to the attacker&rsquo;s server, potentially leaking sensitive information in the request headers or body.</li>
<li>The attacker analyzes the response from the server to gather sensitive information or identify further attack vectors.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SSRF vulnerability (CVE-2026-7223) can allow an attacker to read sensitive internal data, such as configuration files or API keys, potentially leading to full system compromise. The attacker could also use the vulnerable server as a proxy to scan internal networks or attack other internal systems. Due to the public availability of the exploit, organizations using vulnerable versions of HyperChat are at increased risk of being targeted. The CVSS v3.1 base score for this vulnerability is 7.3, indicating a high severity.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply appropriate input validation and sanitization to the <code>baseurl</code> argument in the AI Proxy Middleware to prevent manipulation, addressing CVE-2026-7223.</li>
<li>Implement network segmentation to restrict access from the HyperChat server to only necessary internal resources.</li>
<li>Deploy the Sigma rule &ldquo;HyperChat SSRF Attempt&rdquo; to detect attempts to exploit the vulnerability via HTTP request patterns.</li>
<li>Monitor web server logs for suspicious outbound connections originating from the HyperChat server, correlating with user input.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>ssrf</category><category>vulnerability</category><category>webserver</category></item><item><title>Weaver E-cology Arbitrary File Read Vulnerability (CVE-2022-50992)</title><link>https://feed.craftedsignal.io/briefs/2024-01-weaver-file-read/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-weaver-file-read/</guid><description>Unauthenticated remote attackers can exploit an arbitrary file read vulnerability (CVE-2022-50992) in Weaver E-cology 9.5 versions prior to 10.52 via the XML-RPC endpoint to access sensitive files.</description><content:encoded><![CDATA[<p>Weaver (Fanwei) E-cology 9.5 versions prior to 10.52 are vulnerable to an arbitrary file read vulnerability (CVE-2022-50992) within the XmlRpcServlet interface. This vulnerability is located at the XML-RPC endpoint and allows unauthenticated remote attackers to read arbitrary files on the system. The attack leverages the <code>WorkflowService.getAttachment</code> and <code>WorkflowService.LoadTemplateProp</code> methods, which can be accessed without authentication, to supply file paths. Successful exploitation enables attackers to retrieve sensitive files, including system configuration files and database credentials, from the compromised server. Exploitation evidence was first observed by the Shadowserver Foundation on 2022-12-14 (UTC), highlighting active exploitation of this vulnerability.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a Weaver E-cology 9.5 instance.</li>
<li>The attacker sends a crafted XML-RPC request to the XmlRpcServlet endpoint.</li>
<li>The request invokes either the <code>WorkflowService.getAttachment</code> or <code>WorkflowService.LoadTemplateProp</code> method.</li>
<li>The attacker includes a file path to a sensitive file (e.g., <code>/etc/passwd</code>, database configuration files) as a parameter in the XML-RPC request.</li>
<li>The vulnerable method processes the request without proper authentication or authorization checks.</li>
<li>The server reads the content of the specified file.</li>
<li>The server returns the file content in the XML-RPC response.</li>
<li>The attacker parses the response to extract the contents of the sensitive file, potentially gaining access to credentials or other sensitive information.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2022-50992 allows unauthenticated attackers to read arbitrary files on the Weaver E-cology server. This can lead to the disclosure of sensitive information, such as system configuration files, database credentials, and other confidential data. The CVSS v3.1 base score is 7.5, indicating a high severity vulnerability. This vulnerability can lead to full system compromise if database credentials are leaked.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Weaver E-cology instances to version 10.52 or later to remediate CVE-2022-50992.</li>
<li>Deploy the Sigma rule <code>Detect Weaver E-cology File Read via XML-RPC</code> to identify exploitation attempts targeting the vulnerable XML-RPC endpoint.</li>
<li>Monitor web server logs for suspicious requests to the XmlRpcServlet endpoint, specifically those containing <code>WorkflowService.getAttachment</code> or <code>WorkflowService.LoadTemplateProp</code>, using the provided Sigma rule.</li>
<li>Implement network segmentation to limit the blast radius of a potential compromise and restrict access to sensitive internal resources.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">threat</category><category>cve-2022-50992</category><category>file-read</category><category>vulnerability</category><category>webserver</category></item><item><title>pygeoapi Path Traversal Vulnerability in STAC FileSystemProvider</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-pygeoapi-path-traversal/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-pygeoapi-path-traversal/</guid><description>A path traversal vulnerability exists in pygeoapi versions 0.23.0 to 0.23.2 within the STAC FileSystemProvider plugin, allowing unauthenticated access to directories when deployed without a URL-normalizing proxy.</description><content:encoded><![CDATA[<p>A path traversal vulnerability has been identified in pygeoapi versions 0.23.0, 0.23.1, and 0.23.2, specifically within the STAC (Spatially Aware Catalog) FileSystemProvider plugin. This flaw allows unauthenticated attackers to access unauthorized directories by manipulating URL paths, particularly when pygeoapi is deployed without a proxy or web front end that normalizes URLs containing <code>..</code> sequences. The vulnerability arises from improper handling of raw string path concatenation, making systems with STAC collection-based resources in their configuration susceptible to unauthorized file system access. This issue was resolved in version 0.23.3.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious HTTP request targeting a pygeoapi instance configured with a STAC collection resource.</li>
<li>The crafted request includes a URL containing path traversal sequences (e.g., <code>../</code>) to navigate the file system.</li>
<li>pygeoapi&rsquo;s STAC FileSystemProvider plugin receives the request and attempts to resolve the file path.</li>
<li>Due to the raw string path concatenation vulnerability, the path traversal sequences are not properly sanitized.</li>
<li>The application constructs an incorrect file path, allowing access to files and directories outside of the intended STAC collection directory.</li>
<li>The attacker retrieves sensitive information or configuration files located in the exposed directories.</li>
<li>The attacker could potentially use the exposed information to further compromise the system.</li>
<li>The final objective is unauthorized access to sensitive data and potentially system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The path traversal vulnerability in pygeoapi allows unauthorized access to directories and files, potentially exposing sensitive data, configuration files, or even source code. The impact depends on the data stored in the exposed directories. Successful exploitation can lead to information disclosure, privilege escalation, and further system compromise. Organizations using vulnerable pygeoapi versions are at risk until they upgrade to version 0.23.3 or implement the recommended workaround.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to pygeoapi version 0.23.3 to patch the vulnerability as detailed in the advisory (<a href="https://github.com/advisories/GHSA-f6pr-83pg-ghh6">https://github.com/advisories/GHSA-f6pr-83pg-ghh6</a>).</li>
<li>As an immediate mitigation, disable STAC collection-based resources in the pygeoapi configuration as described in the advisory (<a href="https://github.com/advisories/GHSA-f6pr-83pg-ghh6">https://github.com/advisories/GHSA-f6pr-83pg-ghh6</a>).</li>
<li>Deploy the Sigma rule &ldquo;pygeoapi Path Traversal Attempt&rdquo; to detect exploitation attempts in web server logs.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>path-traversal</category><category>vulnerability</category><category>webserver</category></item><item><title>AzuraCast Path Traversal Leads to Remote Code Execution</title><link>https://feed.craftedsignal.io/briefs/2024-01-azuracast-rce/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-azuracast-rce/</guid><description>AzuraCast is vulnerable to path traversal in the Flow.js media upload endpoint, allowing authenticated users with media permissions to write arbitrary files, leading to remote code execution via PHP webshell upload.</description><content:encoded><![CDATA[<p>AzuraCast, a self-hosted web radio management suite, is susceptible to a critical path traversal vulnerability (CVE-2026-42605) in its Flow.js media upload endpoint (<code>/api/station/{station_id}/files/upload</code>). This flaw allows an authenticated user with media management permissions, such as a DJ or station manager, to bypass file storage directory restrictions. By manipulating the <code>currentDirectory</code> parameter during file uploads, attackers can write arbitrary files to locations outside the intended media directory. The vulnerability is present in versions up to and including 0.23.5, and exploitation leads to remote code execution via PHP webshell upload, potentially resulting in full server compromise. The default local filesystem storage backend is required for exploitation; S3 or remote storage is not vulnerable.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker authenticates to the AzuraCast web interface with a valid user account that has the <code>StationPermissions::Media</code> permission (e.g., DJ or Station Manager).</li>
<li>The attacker crafts a malicious HTTP POST request to the <code>/api/station/{station_id}/files/upload</code> endpoint, targeting a station that uses local storage.</li>
<li>The request includes a <code>currentDirectory</code> parameter containing path traversal sequences (e.g., <code>../../../../../var/azuracast/www/public</code>).</li>
<li>The request also includes a PHP webshell file (<code>shell.php</code>) as the <code>file_data</code> parameter.</li>
<li>The server-side code in <code>FlowUploadAction.php</code> concatenates the unsanitized <code>currentDirectory</code> value with the sanitized filename.</li>
<li>The server attempts to process the uploaded file, but the <code>.php</code> extension triggers a <code>CannotProcessMediaException</code>.</li>
<li>The <code>finally</code> block in <code>MediaProcessor.php</code> executes, calling <code>LocalFilesystem::upload()</code> to copy the file to the concatenated path, bypassing normal path sanitization due to <code>PathPrefixer::prefixPath()</code>.</li>
<li>The webshell is written to the web root, allowing the attacker to execute arbitrary commands by accessing the webshell via HTTP.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to execute arbitrary code on the AzuraCast server. This can lead to full server compromise, including reading sensitive configuration files (database credentials, API keys), accessing all station data, modifying application code, and potentially escalating privileges to root. A DJ-level user, the lowest privileged role with media access, can achieve the equivalent of full system administrator access, resulting in data exfiltration and complete control over the AzuraCast instance.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the vendor-provided patch by sanitizing the <code>currentDirectory</code> parameter in <code>FlowUploadAction.php</code> using <code>UploadedFile::filterClientPath()</code> to prevent path traversal.</li>
<li>Implement path normalization in <code>LocalFilesystem::upload()</code> to prevent traversal even after concatenation, as described in the advisory.</li>
<li>Deploy the Sigma rule &ldquo;Detect AzuraCast Webshell Upload via Path Traversal&rdquo; to identify exploitation attempts based on suspicious <code>currentDirectory</code> parameters.</li>
<li>Monitor web server logs for access to unusual PHP files in the web root directory, such as <code>shell.php</code> as described in the PoC.</li>
<li>Ensure that AzuraCast instances do not grant excessive permissions to users; minimize the number of accounts with <code>StationPermissions::Media</code>.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>path-traversal</category><category>rce</category><category>azuracast</category><category>webserver</category></item></channel></rss>