<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Advisory — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/types/advisory/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 04 May 2026 21:43:56 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/types/advisory/feed.xml" rel="self" type="application/rss+xml"/><item><title>Malicious mysten-metrics Crate Exfiltrates Build Machine Data</title><link>https://feed.craftedsignal.io/briefs/2026-05-mysten-metrics-exfiltration/</link><pubDate>Mon, 04 May 2026 21:43:56 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-mysten-metrics-exfiltration/</guid><description>The `mysten-metrics` crate was removed from crates.io after it was found to contain a malicious build script that attempted to exfiltrate data from the build machine during the build process.</description><content:encoded><![CDATA[<p>On April 20, 2026, a malicious crate named <code>mysten-metrics</code> was published to crates.io. This crate contained a build script designed to exfiltrate data from the machine during the build process. The crate was identified and removed from crates.io. At the time of removal, only one version of the crate had been published, and there was no evidence of actual usage. The crate had no dependencies on crates.io, limiting the potential spread. This incident highlights the risks associated with supply chain attacks targeting software build processes and the importance of verifying the integrity of third-party dependencies.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker publishes the <code>mysten-metrics</code> crate to crates.io.</li>
<li>A developer adds <code>mysten-metrics</code> as a dependency to their project.</li>
<li>The developer builds the project using <code>cargo build</code>.</li>
<li>As part of the build process, the malicious build script within <code>mysten-metrics</code> is executed.</li>
<li>The build script collects sensitive data from the build environment (e.g., environment variables, file contents, system information).</li>
<li>The build script attempts to exfiltrate the collected data to a remote attacker-controlled server. The exact exfiltration method is not specified, but could involve HTTP/S requests or DNS tunneling.</li>
<li>The attacker receives the exfiltrated data from the compromised build machine.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The successful execution of the malicious build script could lead to the exposure of sensitive information, including API keys, credentials, source code, and other confidential data present on the build machine. This data could be used to compromise the developer&rsquo;s infrastructure, intellectual property, and customer data. Since there were no known usages, the impact was contained by its early removal.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Implement integrity checks for all third-party dependencies to identify and prevent the use of malicious packages.</li>
<li>Monitor network connections originating from build processes for suspicious outbound traffic, as this could indicate data exfiltration. Create network connection rules.</li>
<li>Implement file integrity monitoring on build machines to detect unauthorized modifications to files during the build process.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>supply-chain</category><category>malware</category><category>rust</category></item><item><title>Malicious sui-execution-cut Crate Exfiltrates Build Machine Data</title><link>https://feed.craftedsignal.io/briefs/2026-05-sui-execution-cut-exfiltration/</link><pubDate>Mon, 04 May 2026 21:42:55 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-sui-execution-cut-exfiltration/</guid><description>The `sui-execution-cut` crate on crates.io contained a build script designed to exfiltrate data from the build machine during the build process.</description><content:encoded><![CDATA[<p>On April 20, 2026, a malicious crate named <code>sui-execution-cut</code> was published to crates.io. This crate included a build script that, when executed, attempted to exfiltrate data from the machine on which the crate was being built. The crate had no dependencies and only one version was ever published. The malicious package was quickly removed from crates.io after discovery. While the crate was available for a short period, there is no evidence of actual usage, however, supply chain compromises can have a wide impact if successful, and even this low-usage crate warrants monitoring.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A developer adds the malicious <code>sui-execution-cut</code> crate as a dependency to their Rust project.</li>
<li>During the build process, the <code>cargo</code> build system executes the build script embedded within the <code>sui-execution-cut</code> crate.</li>
<li>The build script executes a series of commands designed to gather sensitive information from the build environment.</li>
<li>The script establishes an outbound network connection to a remote server controlled by the attacker.</li>
<li>The gathered data is transmitted to the attacker&rsquo;s server via HTTP POST or a similar method.</li>
<li>The attacker receives the exfiltrated data, which could include environment variables, file contents, or other sensitive information.</li>
<li>The attacker analyzes the stolen data for valuable secrets, credentials, or intellectual property.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The <code>sui-execution-cut</code> crate, if used, could have compromised developer machines by exfiltrating sensitive data during the build process. Although the crate was quickly removed and showed no signs of usage, a successful attack of this nature could lead to the exposure of secrets, credentials, and intellectual property. The lack of usage limits the impact, but the nature of supply chain attacks makes even low-usage crates a potential risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor for unexpected network connections originating from build processes, especially connections to unknown or suspicious domains. Use the &ldquo;Detect Suspicious Outbound Connections from Build Processes&rdquo; Sigma rule.</li>
<li>Implement strict dependency review processes to identify and prevent the introduction of malicious packages into your software supply chain.</li>
<li>Continuously monitor crates.io and other package repositories for reports of malicious packages and promptly remove them from your dependencies if identified.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>supply-chain</category><category>malware</category><category>rust</category></item><item><title>Kubernetes Pod Exec Sensitive File or Credential Path Access</title><link>https://feed.craftedsignal.io/briefs/2024-01-kubernetes-pod-exec-sensitive-file-access/</link><pubDate>Mon, 04 May 2026 21:42:34 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-kubernetes-pod-exec-sensitive-file-access/</guid><description>This rule detects Kubernetes pod exec sessions where the decoded command line references sensitive files or paths such as mounted service account tokens, kubelet and control-plane configuration, host identity stores, private keys, and process environment dumps, aiming to identify potential lateral movement, privilege escalation, or credential theft.</description><content:encoded><![CDATA[<p>This detection identifies Kubernetes pod exec sessions accessing sensitive files or credential paths. The goal is to detect attackers attempting to steal credentials or configuration information from within Kubernetes pods. This often occurs after initial access and may precede lateral movement, privilege escalation, or data exfiltration. The detection focuses on command lines that reference paths related to service account tokens, kubelet configuration, host identity stores, common private keys, keystore extensions, process environment dumps, and configuration files with embedded secrets. The rule is designed to catch both interactive and scripted access, and includes exclusions for benign reads of resolv.conf.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial access to a Kubernetes cluster, potentially through a compromised application or misconfigured service.</li>
<li>Attacker uses <code>kubectl exec</code> or similar tools to execute commands within a pod.</li>
<li>The executed command attempts to read sensitive files or directories within the pod&rsquo;s filesystem, such as <code>/var/run/secrets/kubernetes.io/serviceaccount/token</code> to obtain the pod&rsquo;s service account token.</li>
<li>The command may also target host-level files if the pod has hostPath mounts or runs in a privileged context, like <code>/etc/shadow</code> or <code>/etc/passwd</code> for credential access.</li>
<li>The attacker may attempt to dump process environments via <code>/proc/&lt;pid&gt;/environ</code> to extract sensitive information stored as environment variables.</li>
<li>The attacker leverages obtained credentials or configuration to move laterally to other pods or nodes within the cluster.</li>
<li>The attacker escalates privileges within the cluster by abusing stolen service account tokens or node credentials.</li>
<li>The final objective is to exfiltrate sensitive data, deploy malicious workloads, or disrupt services within the Kubernetes environment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack can lead to the compromise of sensitive data, including credentials, configuration files, and application secrets. This can enable attackers to move laterally within the Kubernetes cluster, escalate privileges, and potentially gain control over the entire environment. The severity of the impact depends on the sensitivity of the data exposed and the level of access achieved by the attacker.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM to detect sensitive file access within Kubernetes pod exec sessions.</li>
<li>Investigate any alerts triggered by the Sigma rule, focusing on the <code>Esql.access_type</code> field to prioritize incidents.</li>
<li>Review and tighten RBAC permissions for pod exec to limit access to authorized users and service accounts.</li>
<li>Implement admission controls to prevent pods from running in privileged mode or using hostPath mounts unless absolutely necessary.</li>
<li>Monitor Kubernetes audit logs for suspicious <code>kubectl exec</code> activity, including unusual command lines or access patterns.</li>
<li>Regularly rotate Kubernetes service account tokens and other sensitive credentials to minimize the impact of potential breaches.</li>
<li>Use the provided Kubernetes audit log query to proactively search for historical instances of sensitive file access.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>kubernetes</category><category>credential-access</category><category>execution</category></item><item><title>Pelican Web UI Privilege Escalation Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-pelican-privesc/</link><pubDate>Mon, 04 May 2026 21:24:50 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-pelican-privesc/</guid><description>A privilege escalation vulnerability in Pelican WebUI versions v7.21 to v7.24 allows authenticated users to gain admin privileges by manipulating database records, potentially leading to configuration modification, API token creation, and password changes.</description><content:encoded><![CDATA[<p>On April 2nd, 2026, a privilege escalation vulnerability was identified in the Pelican Web User Interface (WebUI) affecting versions v7.21 to v7.24. This vulnerability allows any authenticated user via OAuth to gain admin privileges under specific configurations, including servers with <code>Server.UIAdminUsers</code> where listed users haven&rsquo;t logged in or <code>Server.AdminGroups</code> with <code>Issuer.GroupSource</code> set to <code>internal</code> where an admin hasn&rsquo;t logged in. Successful exploitation permits attackers to modify server configurations, create API tokens, and change admin passwords. The OSDF operations team mitigated this vulnerability for core services, but mitigation may be required for other caches and origins. There is currently no evidence this attack has been exploited in services managed by OSDF operators.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the Pelican WebUI by authenticating via OIDC.</li>
<li>The attacker identifies a valid <code>Server.UIAdminUsers</code> username or <code>Server.AdminGroups</code> group name for an admin who has not yet logged into the WebUI.</li>
<li>The attacker crafts malicious database records designed to grant admin privileges upon subsequent login.</li>
<li>The attacker injects these records into the Pelican server&rsquo;s SQLite database, potentially using API endpoints or other methods to interact with the database.</li>
<li>The attacker logs out of the WebUI.</li>
<li>The attacker logs back into the WebUI.</li>
<li>The server grants the attacker admin privileges based on the manipulated database records.</li>
<li>The attacker modifies server configurations, creates persistent API tokens, or changes admin passwords.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The successful exploitation of this vulnerability poses a significant risk to Pelican servers and the wider federation they support. A compromised Director service could have high federation-wide impact, enabling denial of service and redirection to malicious registries. Registry services also have high federation-wide impact, with attackers potentially poisoning namespaces. Compromised Origins could lead to high data exposure and tampering risks by enabling unauthorized writes and changing export paths. Caches present a medium data exposure risk, as attackers could expose cached protected data.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Run the provided mitigation script (<code>mitigate-user-escalation.sh</code> from <a href="https://gist.github.com/jhiemstrawisc/8c4b2b3ec5cb2ca06537d9439dc16cc9">https://gist.github.com/jhiemstrawisc/8c4b2b3ec5cb2ca06537d9439dc16cc9</a>) to audit the database for signs of exploitation and block further exploitation.</li>
<li>Upgrade Pelican servers to a patched release (&gt;=v7.21.5, &gt;=v7.22.3, &gt;=v7.23.3, &gt;=v7.24.2).</li>
<li>If unable to upgrade immediately, disable the vulnerable configuration by commenting out <code>UIAdminUsers</code> and <code>AdminGroups</code> settings in the <code>pelican.yaml</code> configuration file.</li>
<li>Monitor process executions for the <code>mitigate-user-escalation.sh</code> script and review associated user and API token changes. Deploy the provided Sigma rule to detect potential malicious activity.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>privilege-escalation</category><category>webui</category><category>pelican</category></item><item><title>AzuraCast Liquidsoap Code Injection in Remote Relay Password</title><link>https://feed.craftedsignal.io/briefs/2024-01-azuracast-liquidsoap-injection/</link><pubDate>Mon, 04 May 2026 21:19:55 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-azuracast-liquidsoap-injection/</guid><description>AzuraCast is vulnerable to a Liquidsoap code injection vulnerability due to the incomplete migration from `cleanUpString()` to `toRawString()` in the remote relay password field, allowing a user with the `RemoteRelays` station permission to inject arbitrary Liquidsoap code by exploiting nested interpolation syntax, leading to arbitrary code execution, API key disclosure, and station disruption.</description><content:encoded><![CDATA[<p>AzuraCast versions 0.23.5 and earlier are vulnerable to a Liquidsoap code injection vulnerability in the remote relay password field. This flaw stems from an incomplete migration of user-controlled fields from the vulnerable <code>cleanUpString()</code> method to the safe <code>toRawString()</code> method. Specifically, while commit <code>ff49ef4</code> (dated 2026-03-06) addressed most fields, the remote relay password field continues to use <code>cleanUpString()</code>, which can be bypassed via nested Liquidsoap interpolation syntax (<code>#{#{EXPR}}</code>). An attacker with the <code>RemoteRelays</code> station permission can exploit this to inject arbitrary Liquidsoap code, potentially achieving remote code execution, disclosing internal API keys, reading and writing files within the Liquidsoap container, and disrupting station operation. This vulnerability allows attackers with minimal privileges to escalate their access within the AzuraCast environment.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker with <code>RemoteRelays</code> station permission crafts a malicious payload containing nested Liquidsoap interpolation syntax (<code>#{#{EXPR}}</code>).</li>
<li>The attacker sends a <code>PUT</code> request to <code>/api/station/{station_id}/remote/{id}</code> to update the remote relay&rsquo;s password, including the crafted payload in the <code>source_password</code> field.</li>
<li>The <code>mb_substr</code> function truncates the password to 100 characters, but the payload remains within this limit.</li>
<li>The <code>ConfigWriter::getOutputString()</code> function calls the vulnerable <code>cleanUpString()</code> method on the password during station configuration regeneration.</li>
<li>The <code>cleanUpString()</code> method&rsquo;s ungreedy regex fails to properly sanitize the nested interpolation, resulting in a bypass.</li>
<li>The bypassed payload is embedded within a double-quoted string in the Liquidsoap configuration file.</li>
<li>The Liquidsoap process loads the updated configuration file, triggering the evaluation of the injected Liquidsoap code.</li>
<li>The attacker achieves arbitrary code execution within the Liquidsoap process container or gains access to sensitive information, such as the internal API key.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability can lead to severe consequences, including arbitrary code execution within the Liquidsoap process container, potentially compromising the entire AzuraCast installation. The disclosure of the internal API key grants the attacker full control over the station&rsquo;s API. Furthermore, the ability to read and write files within the Liquidsoap container allows for further exploitation and persistence. The attacker can also disrupt station operation by injecting malicious configurations that crash the Liquidsoap process. The low privilege requirement (only <code>RemoteRelays</code> permission) makes this vulnerability highly accessible to malicious actors.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately replace the <code>cleanUpString()</code> method with <code>toRawString()</code> for the remote relay password field in <code>ConfigWriter.php</code>, as described in the provided fix, to prevent Liquidsoap code injection.</li>
<li>Adjust the Shoutcast suffix append logic to ensure compatibility with raw strings after applying the <code>toRawString()</code> fix in <code>ConfigWriter.php</code>.</li>
<li>Deploy the Sigma rule &ldquo;Detect AzuraCast Liquidsoap Code Injection via API&rdquo; to detect attempts to exploit this vulnerability through malicious API requests targeting the remote relay password field.</li>
<li>Monitor webserver logs for PUT requests to <code>/api/station/*/remote/*</code> containing the string <code>#{#{</code> in the request body, indicating a potential injection attempt, as shown in the PoC.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>azuracast</category><category>code-injection</category><category>liquidsoap</category><category>ghsa</category></item><item><title>Potential Direct Kubelet API Access via Process Arguments</title><link>https://feed.craftedsignal.io/briefs/2024-01-09-kubelet-access/</link><pubDate>Mon, 04 May 2026 21:18:23 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-09-kubelet-access/</guid><description>This rule detects potential direct Kubelet API access attempts on Linux by identifying process executions whose arguments contain URLs targeting Kubelet ports (10250/10255) enabling discovery and lateral movement in Kubernetes environments.</description><content:encoded><![CDATA[<p>This detection identifies potential direct Kubelet API access attempts on Linux systems. The Kubelet, acting as the primary node agent, exposes an API accessible via ports 10250 and 10255. Attackers may exploit this API to enumerate pods, fetch logs, or even attempt remote execution. This access can lead to significant breaches in Kubernetes environments, facilitating discovery, lateral movement, and ultimately, compromise of sensitive data or control over cluster resources. The detection focuses on identifying process executions where the command-line arguments contain URLs targeting these Kubelet ports, indicating a potential attempt to interact with the Kubelet API directly.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a compromised host within the Kubernetes cluster or a host with network access to the Kubelet ports.</li>
<li>The attacker uses a utility like <code>curl</code>, <code>wget</code>, <code>python</code>, or similar tools to craft an HTTP request targeting the Kubelet API on ports 10250 or 10255.</li>
<li>The request includes a path like <code>/pods</code>, <code>/runningpods</code>, <code>/metrics</code>, <code>/exec</code>, or <code>/containerLogs</code> to gather information about the cluster&rsquo;s state and configuration.</li>
<li>The attacker examines the response to identify potential targets for lateral movement, such as specific pods or containers of interest.</li>
<li>The attacker attempts to execute commands within a container using the <code>/exec</code> endpoint, potentially leveraging exposed service account tokens or other credentials.</li>
<li>The attacker uses gathered information to move laterally to other pods or nodes within the cluster, escalating privileges as they go.</li>
<li>The attacker compromises sensitive data or critical applications running within the Kubernetes cluster.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to full cluster compromise. Attackers can gain unauthorized access to sensitive data, disrupt critical applications, and move laterally to other resources within the Kubernetes environment. This could lead to significant financial losses, reputational damage, and legal liabilities. The potential impact includes data breaches, denial of service, and complete control over the Kubernetes infrastructure.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Kubelet API Access via Process Arguments</code> to your SIEM to detect suspicious process executions.</li>
<li>Restrict access to Kubelet ports 10250/10255 at the network layer to limit pod-to-node or host-to-node traffic as recommended in the overview section.</li>
<li>Harden Kubelet configuration by disabling anonymous authentication and enforcing webhook authentication/authorization as described in the overview section.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>kubernetes</category><category>kubelet</category><category>lateral-movement</category><category>discovery</category><category>execution</category><category>linux</category></item><item><title>Pillow Out-of-Bounds Write Vulnerability in PSD Processing (CVE-2026-42311)</title><link>https://feed.craftedsignal.io/briefs/2024-01-pillow-oob-write/</link><pubDate>Mon, 04 May 2026 20:20:31 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-pillow-oob-write/</guid><description>Pillow versions 10.3.0 through 12.1.1 are vulnerable to an out-of-bounds write in PSD image decoding/encoding due to an integer overflow when computing tile extent sums, potentially leading to arbitrary code execution.</description><content:encoded><![CDATA[<p>Pillow, a popular Python image processing library, is vulnerable to an out-of-bounds write vulnerability (CVE-2026-42311) when processing PSD files. Specifically, versions 10.3.0 up to 12.1.1 contain a flaw in how they handle tile extents in PSD image decoding and encoding. The vulnerability arises from an integer overflow when calculating tile extent sums, which bypasses intended bounds checks. This allows a specially crafted PSD image with malicious tile dimensions to trigger an out-of-bounds write in <code>src/decode.c</code> and <code>src/encode.c</code>. Successful exploitation could lead to memory corruption, resulting in a crash or, more critically, arbitrary code execution. The issue was initially addressed in version 12.1.1 (CVE-2026-25990) but the fix was incomplete due to the integer overflow issue. The vulnerability is resolved in Pillow version 12.2.0 by avoiding the addition of extents before comparison.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious PSD image file with specific tile dimensions designed to trigger an integer overflow.</li>
<li>The victim&rsquo;s application, using a vulnerable version of Pillow (10.3.0 - 12.1.1), attempts to process the malicious PSD file.</li>
<li>During PSD image decoding/encoding, Pillow calculates the tile extent sums.</li>
<li>Due to the crafted tile dimensions, the integer overflow occurs, causing the calculated extent sums to wrap around.</li>
<li>The wrapped-around extent sums bypass the bounds checks implemented in Pillow.</li>
<li>An out-of-bounds write operation occurs in <code>src/decode.c</code> or <code>src/encode.c</code>, corrupting memory.</li>
<li>The memory corruption leads to either a crash of the application or, in a more severe scenario, allows the attacker to inject and execute arbitrary code.</li>
<li>The attacker gains control of the affected system, potentially leading to further malicious activities like data exfiltration or lateral movement.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability can lead to denial of service (application crash) or, more critically, arbitrary code execution. If an attacker can execute code on a system, they could potentially gain complete control of the system. This could lead to data theft, system compromise, and further propagation of attacks. The vulnerability affects any application that uses the Pillow library to process PSD files, potentially impacting a wide range of software across various sectors.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Pillow to version 12.2.0 or later to remediate CVE-2026-42311, which corrects the integer overflow issue and prevents the out-of-bounds write.</li>
<li>Monitor process creations for the execution of Python scripts (<code>python.exe</code>, <code>python3</code>) that process untrusted PSD files. Deploy the Sigma rule <code>Detect Pillow PSD Processing</code> to identify potentially malicious PSD processing activity.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>pillow</category><category>oob-write</category><category>integer-overflow</category><category>psd</category><category>memory-corruption</category></item><item><title>Argo Workflows Credentials Exposed in Pod Logs</title><link>https://feed.craftedsignal.io/briefs/2024-01-09-argo-cred-leak/</link><pubDate>Mon, 04 May 2026 20:12:01 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-09-argo-cred-leak/</guid><description>Argo Workflows versions 4.0.0 to 4.0.4 log artifact repository credentials in plaintext, allowing users with read access to pod logs to extract sensitive information such as S3 access keys and GCS service account keys.</description><content:encoded><![CDATA[<p>Argo Workflows, a Kubernetes-native workflow engine, is vulnerable to credential exposure. Specifically, versions 4.0.0 through 4.0.4 inadvertently log artifact repository credentials in plaintext during artifact operations. This includes sensitive data like S3 Access Keys, Secret Keys, Session Tokens, Server-Side Customer Keys, OSS Access Keys, Secret Keys, Security Tokens, and GCS Service Account Keys. The vulnerability stems from the logging driver passing the entire ArtifactDriver struct to the structured logger. Any user with read access to workflow pod logs can extract these credentials, creating a significant security risk. This is an incomplete fix of CVE-2025-62157.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains read access to Kubernetes pod logs within the Argo Workflows namespace. This could be achieved through compromised credentials, misconfigured RBAC policies, or other Kubernetes vulnerabilities.</li>
<li>The attacker identifies a workflow that utilizes artifact storage, such as S3 or GCS.</li>
<li>The workflow executes an artifact operation (upload or download).</li>
<li>Argo Workflows logs the entire ArtifactDriver struct, including the plaintext credentials, into the pod logs.</li>
<li>The attacker queries the pod logs using <code>kubectl</code> or other Kubernetes tooling. For example: <code>kubectl -n argo logs &quot;cred-leak-test&quot; -c wait</code>.</li>
<li>The attacker extracts the plaintext credentials (e.g., S3 Access Key and Secret Key) from the log output.</li>
<li>The attacker uses the extracted credentials to access the artifact repository (e.g., S3 bucket) and potentially steal data or perform other unauthorized actions.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows unauthorized access to artifact repositories used by Argo Workflows. This can lead to data breaches, as sensitive data stored in S3 buckets, GCS buckets, or other storage solutions can be exposed. The impact is especially severe if the compromised credentials have broad permissions or if the artifact repository contains highly sensitive data. This affects Argo Workflows versions 4.0.0, 4.0.1, 4.0.2, 4.0.3, and 4.0.4.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Argo Workflows to version 4.0.5 or later to remediate the vulnerability (CVE-2026-42295).</li>
<li>Review and restrict Kubernetes RBAC permissions to limit access to pod logs, following the principle of least privilege.</li>
<li>Implement log monitoring and alerting for unusual access patterns to Kubernetes pod logs.</li>
<li>Rotate any potentially exposed artifact repository credentials (S3 access keys, GCS service account keys, etc.) if Argo Workflows versions 4.0.0-4.0.4 were in use.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>argo-workflows</category><category>credential-access</category><category>kubernetes</category></item><item><title>Argo Workflows Template Referencing Restriction Bypass</title><link>https://feed.craftedsignal.io/briefs/2026-05-argo-workflow-bypass/</link><pubDate>Mon, 04 May 2026 20:11:38 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-argo-workflow-bypass/</guid><description>Argo Workflows has an incomplete fix for CVE-2026-31892, allowing bypass of templateReferencing restrictions to modify pod specifications, leading to potential privilege escalation and security context overrides.</description><content:encoded><![CDATA[<p>Argo Workflows, a Kubernetes-native workflow engine, contains an incomplete fix for CVE-2026-31892. The initial patch blocked <code>podSpecPatch</code> modifications when <code>templateReferencing: Strict</code> was active. However, other fields within the WorkflowSpec that influence pod creation, such as <code>hostNetwork</code>, <code>serviceAccountName</code>, and <code>securityContext</code>, were not restricted. This allows a malicious user to bypass intended security controls and potentially escalate privileges within the Kubernetes cluster. Versions affected include those supporting the <code>templateReferencing</code> feature, specifically v4.0.2 and v3.7.11, which include the initial fix for CVE-2026-31892 but are still vulnerable to this bypass. This vulnerability exists because the check in <code>setExecWorkflow</code> only validates <code>HasPodSpecPatch()</code>, while other critical fields are applied directly to the pod specification. The bypass affects both <code>Strict</code> and <code>Secure</code> modes.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains <code>create Workflow</code> permission within the Argo Workflows environment.</li>
<li>Attacker crafts a Workflow manifest that references a hardened WorkflowTemplate.</li>
<li>Attacker sets <code>hostNetwork: true</code> (or other vulnerable fields like <code>securityContext</code>, <code>serviceAccountName</code>, <code>tolerations</code>, or <code>automountServiceAccountToken</code>) in the Workflow manifest.</li>
<li>The Workflow is submitted, and the <code>setExecWorkflow</code> function in the Argo controller only checks for <code>podSpecPatch</code>.</li>
<li>Due to the missing validation, the user-defined <code>hostNetwork: true</code> (or other vulnerable fields) is merged with the WorkflowTemplate specification.</li>
<li>The <code>createWorkflowPod</code> function reads the merged specification and applies the <code>hostNetwork: true</code> setting directly to the pod specification, bypassing the intended restrictions.</li>
<li>A pod is created with host networking enabled, granting the container access to the host&rsquo;s network namespace.</li>
<li>The attacker can now access sensitive information or perform actions on the network as if they were running directly on the host.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows an attacker to bypass the intended security restrictions imposed by Argo Workflows&rsquo; <code>templateReferencing</code> feature. This can lead to privilege escalation, unauthorized access to network resources, and the potential to compromise other containers or nodes within the Kubernetes cluster. The impact is most significant in clusters that rely on Argo&rsquo;s Strict mode as the primary enforcement layer, as other Kubernetes-level controls like PodSecurity admission or OPA/Gatekeeper may not be in place to mitigate these bypasses.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Argo Workflow Host Network Bypass</code> to detect workflows attempting to set <code>hostNetwork: true</code>, and tune for your environment.</li>
<li>Deploy the Sigma rule <code>Argo Workflow Service Account Override</code> to detect workflows attempting to override the service account.</li>
<li>Upgrade to a patched version of Argo Workflows that addresses CVE-2026-42296, ensuring that all WorkflowSpec fields that influence pod security posture are validated.</li>
<li>Implement Kubernetes-level controls, such as PodSecurity admission or OPA/Gatekeeper, to provide an additional layer of defense against unauthorized pod specification modifications.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>argo-workflows</category><category>kubernetes</category><category>privilege-escalation</category><category>defense-evasion</category></item><item><title>Argo Workflows Webhook Interceptor Vulnerable to Unauthenticated Memory Exhaustion (CVE-2026-42294)</title><link>https://feed.craftedsignal.io/briefs/2026-05-argo-dos/</link><pubDate>Mon, 04 May 2026 20:11:01 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-argo-dos/</guid><description>Argo Workflows is vulnerable to a denial-of-service (DoS) attack due to unbounded memory allocation in the Webhook Interceptor component.</description><content:encoded><![CDATA[<p>Argo Workflows is vulnerable to a denial-of-service (DoS) attack (CVE-2026-42294) due to unbounded memory allocation in the Webhook Interceptor. The vulnerability resides in the <code>server/auth/webhook/interceptor.go</code> component, specifically within the <code>/api/v1/events/</code> endpoint. This endpoint, intended for webhook integrations, reads the entire request body into memory without proper size limits, leading to potential memory exhaustion. An attacker can exploit this vulnerability by sending a crafted request with an extremely large body, causing the Argo Server to allocate excessive memory and potentially crash, resulting in a denial of service. Affected versions include Argo Workflows versions prior to 3.7.14 and versions 4.0.0 up to 4.0.5.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies an Argo Workflows instance with a publicly accessible <code>/api/v1/events/</code> endpoint.</li>
<li>The attacker crafts an HTTP POST request targeting the <code>/api/v1/events/</code> endpoint.</li>
<li>The attacker sets the <code>Content-Length</code> header of the request to a very large value (e.g., 1GB or more).</li>
<li>The attacker sends the malicious request with a large amount of arbitrary data as the request body.</li>
<li>The Argo Server receives the request and, within the <code>WebhookInterceptor</code>, calls <code>io.ReadAll(r.Body)</code>, allocating memory to store the entire request body.</li>
<li>Due to the large request body, the Argo Server&rsquo;s memory consumption increases significantly.</li>
<li>If the attacker sends a sufficiently large request, the Argo Server exhausts its available memory.</li>
<li>The Argo Server process crashes due to an Out-Of-Memory (OOM) error, leading to a denial of service.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability results in a denial-of-service condition, disrupting workflow execution and API access for all users of the Argo Workflows instance. The Argo Server crashes, making it unavailable until restarted. This impacts service availability and potentially causes data loss if workflows are interrupted during execution. The number of victims depends on the number of Argo Workflows instances exposed and targeted by attackers.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enforce a strict limit on webhook body size (e.g., 10MB) using <code>http.MaxBytesReader</code> or similar mechanisms within your ingress controller or reverse proxy to prevent oversized requests from reaching the Argo Server.</li>
<li>Upgrade Argo Workflows to version 3.7.14 or 4.0.5 or later to patch CVE-2026-42294 and mitigate the risk of denial-of-service attacks.</li>
<li>Monitor memory usage of the Argo Server process and set up alerts for unusually high memory consumption to detect potential exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>denial-of-service</category><category>argo-workflows</category><category>cloud</category></item><item><title>Gotenberg ExifTool Tag Blocklist Bypass via Group-Prefixed Tag Names</title><link>https://feed.craftedsignal.io/briefs/2026-05-gotenberg-exiftool-bypass/</link><pubDate>Mon, 04 May 2026 19:21:19 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-gotenberg-exiftool-bypass/</guid><description>Gotenberg is vulnerable to an ExifTool tag blocklist bypass, allowing unauthenticated attackers to rename, move, and modify permissions of files within the container by using group-prefixed tag names like 'System:FileName' or the 'FilePermissions' tag in HTTP requests.</description><content:encoded><![CDATA[<p>Gotenberg, a Docker-based server for document conversion, is susceptible to a critical vulnerability (CVE-2026-40893) that bypasses its intended security measures. Specifically, a blocklist designed to prevent arbitrary file renaming and moving via ExifTool is circumvented by using group-prefixed tag names such as <code>System:FileName</code>. This vulnerability, affecting Gotenberg version 8.30.1 and earlier, allows unauthenticated attackers to manipulate files within the container by sending crafted HTTP requests. The bypass allows for renaming files, moving files to arbitrary directories, and changing file permissions, potentially leading to service disruption or, in shared-volume deployments, impacting other services utilizing the same volumes. This vulnerability effectively negates the patch provided in GHSA-qmwh-9m9c-h36m.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a Gotenberg instance (version 8.30.1 or earlier) exposed via HTTP.</li>
<li>The attacker crafts a POST request to any Gotenberg endpoint that accepts the <code>metadata</code> field, such as <code>/forms/pdfengines/metadata/write</code>, <code>/forms/chromium/convert/html</code>, or <code>/forms/libreoffice/convert</code>.</li>
<li>The request includes a <code>files</code> parameter with a PDF file (or any other supported file type).</li>
<li>The request includes a <code>metadata</code> parameter, a JSON object containing malicious ExifTool tag names such as <code>System:FileName</code> and <code>System:Directory</code>.</li>
<li>Gotenberg&rsquo;s <code>exiftool.go</code> validates the tag names against a blocklist but fails to normalize group prefixes, allowing <code>System:FileName</code> to bypass the check that would block <code>FileName</code>.</li>
<li>ExifTool receives the <code>System:FileName</code> and <code>System:Directory</code> tags and interprets them as <code>FileName</code> and <code>Directory</code>, respectively.</li>
<li>ExifTool renames and moves the uploaded file to the attacker-specified location within the container&rsquo;s file system.</li>
<li>If Gotenberg attempts to access the file after it has been moved, the server returns a 404 error, potentially disrupting service for other users.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability (CVE-2026-40893) allows an unauthenticated attacker to manipulate files within the Gotenberg container. This includes the ability to rename files, move them to arbitrary directories, and change their permissions. This can lead to denial-of-service conditions due to missing files, or in scenarios where Gotenberg shares a Docker volume with other services, it allows for planting malicious files in those shared directories. Since no authentication is required by default, any system capable of sending HTTP requests to the Gotenberg instance can exploit this vulnerability, widening the attack surface.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the patch or upgrade to a version of Gotenberg greater than 8.30.1 to remediate CVE-2026-40893.</li>
<li>Deploy the Sigma rule <code>Detect Gotenberg ExifTool Tag Blocklist Bypass</code> to identify exploitation attempts based on the use of <code>System:</code> prefixed ExifTool tags.</li>
<li>Deploy the Sigma rule <code>Detect Gotenberg FilePermissions Tag Abuse</code> to detect abuse of the <code>FilePermissions</code> tag.</li>
<li>Monitor webserver logs for POST requests to the affected Gotenberg endpoints (<code>/forms/pdfengines/metadata/write</code>, <code>/forms/chromium/convert/html</code>, <code>/forms/libreoffice/convert</code>) containing the string <code>System:FileName</code> or <code>FilePermissions</code> in the request body.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>exiftool</category><category>file-manipulation</category><category>cve-2026-40893</category></item><item><title>Contact Form 7 WordPress Plugin Uncontrolled Resource Consumption Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-contact-form-7-resource-exhaustion/</link><pubDate>Mon, 04 May 2026 19:16:02 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-contact-form-7-resource-exhaustion/</guid><description>The Contact Form 7 WordPress plugin through version 2.6.7 is vulnerable to uncontrolled resource consumption, allowing unauthenticated attackers to exhaust server memory and crash the PHP process by supplying an arbitrarily large integer value to the REST API endpoint, leading to unbounded loop execution.</description><content:encoded><![CDATA[<p>The Contact Form 7 WordPress plugin, specifically versions up to 2.6.7, contains an uncontrolled resource consumption vulnerability (CVE-2026-25863) within the <code>Wpcf7cfMailParser</code> class. The <code>hide_hidden_mail_fields_regex_callback()</code> method is susceptible to unbounded loop execution due to reading an iteration count directly from user-supplied POST parameters via the REST API endpoint without proper validation. This allows unauthenticated attackers to send a large integer value, triggering multiple <code>preg_replace()</code> operations, leading to server memory exhaustion and crashing the PHP process. This vulnerability enables a denial-of-service condition, potentially impacting all websites using the vulnerable plugin.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a WordPress website using Contact Form 7 plugin version 2.6.7 or earlier.</li>
<li>The attacker crafts a malicious HTTP POST request targeting the WordPress REST API endpoint.</li>
<li>The POST request includes a large integer value for the iteration count parameter, which is passed directly to the <code>hide_hidden_mail_fields_regex_callback()</code> method.</li>
<li>The <code>hide_hidden_mail_fields_regex_callback()</code> method, lacking input validation, reads the attacker-controlled integer.</li>
<li>The method initiates an unbounded loop, performing <code>preg_replace()</code> operations based on the attacker-supplied iteration count.</li>
<li>Each <code>preg_replace()</code> operation consumes server memory.</li>
<li>The excessive number of iterations rapidly exhausts available server memory.</li>
<li>The PHP process crashes due to memory exhaustion, resulting in a denial-of-service condition for the website.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability leads to a denial-of-service condition. Attackers can crash the PHP process on vulnerable WordPress websites by exhausting server memory. This can result in website downtime, impacting user experience and potentially leading to data loss or corruption. While the exact number of affected websites is unknown, the widespread use of Contact Form 7 makes this vulnerability a significant threat.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the Contact Form 7 WordPress plugin to a version greater than 2.6.7 to patch CVE-2026-25863.</li>
<li>Deploy the Sigma rule <code>Detect Contact Form 7 Uncontrolled Resource Consumption Attempt</code> to your SIEM to detect malicious POST requests targeting the WordPress REST API.</li>
<li>Monitor web server logs for abnormally large POST request sizes to the WordPress REST API endpoint, as this may indicate an attempted exploitation of CVE-2026-25863.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>wordpress</category><category>resource-exhaustion</category><category>denial-of-service</category><category>cve-2026-25863</category></item><item><title>Arelle Unauthenticated Remote Code Execution Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-arelle-rce/</link><pubDate>Mon, 04 May 2026 18:16:32 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-arelle-rce/</guid><description>Arelle before 2.39.10 is vulnerable to unauthenticated remote code execution via the /rest/configure REST endpoint, allowing attackers to execute arbitrary Python code by supplying a malicious URL through the plugins parameter.</description><content:encoded><![CDATA[<p>Arelle versions prior to 2.39.10 are susceptible to an unauthenticated remote code execution (RCE) vulnerability. The vulnerability resides in the <code>/rest/configure</code> REST endpoint, which improperly handles the <code>plugins</code> query parameter. This parameter is forwarded to the plugin manager without proper authentication or authorization checks. An attacker can exploit this flaw by providing a URL pointing to a malicious Python file via the <code>plugins</code> parameter. Upon receiving this request, the Arelle webserver downloads and executes the attacker-supplied Python code within the context of the Arelle process. This grants the attacker control over the Arelle server with the same privileges as the Arelle process. This vulnerability poses a significant risk, especially in environments where Arelle servers are exposed to the internet or untrusted networks.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker sends a crafted HTTP GET request to the <code>/rest/configure</code> endpoint of the Arelle web server.</li>
<li>The request includes the <code>plugins</code> query parameter, which contains a URL pointing to a malicious Python file hosted on an attacker-controlled server.</li>
<li>The Arelle web server receives the request and, without proper authentication or authorization, forwards the <code>plugins</code> parameter to the plugin manager.</li>
<li>The plugin manager downloads the Python file from the attacker-supplied URL using standard HTTP(S) protocols.</li>
<li>The Arelle process executes the downloaded Python code using the Python interpreter.</li>
<li>The malicious Python code executes arbitrary commands on the Arelle server, potentially installing malware, creating reverse shells, or exfiltrating sensitive data.</li>
<li>The attacker gains control of the Arelle server and can perform further actions, such as accessing internal network resources.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an unauthenticated attacker to achieve remote code execution on the Arelle server. This could lead to complete compromise of the server, including sensitive data theft, malware deployment, and further lateral movement within the network. The potential impact includes data breaches, service disruption, and reputational damage. Given the severity and ease of exploitation, any Arelle instance running a version prior to 2.39.10 is at critical risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately upgrade Arelle to version 2.39.10 or later to patch CVE-2026-42796.</li>
<li>Deploy the Sigma rule &ldquo;Detect Arelle Plugin Download via REST Endpoint&rdquo; to identify exploitation attempts targeting the vulnerable <code>/rest/configure</code> endpoint.</li>
<li>Monitor web server logs for suspicious requests to the <code>/rest/configure</code> endpoint containing the <code>plugins</code> parameter.</li>
<li>Implement network segmentation to limit the potential impact of a compromised Arelle server.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>rce</category><category>arelle</category><category>vulnerability</category></item><item><title>WordPress Easy PayPal Events &amp; Tickets Plugin Information Disclosure Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-wordpress-easy-paypal-info-disclosure/</link><pubDate>Mon, 04 May 2026 18:16:29 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-wordpress-easy-paypal-info-disclosure/</guid><description>An information disclosure vulnerability in the Easy PayPal Events &amp; Tickets WordPress plugin (versions 1.3 and earlier) allows unauthenticated attackers to enumerate and retrieve all customer order records via the scan_qr.php endpoint.</description><content:encoded><![CDATA[<p>The Easy PayPal Events &amp; Tickets plugin for WordPress, versions 1.3 and earlier, contains an information disclosure vulnerability (CVE-2026-41471). This vulnerability allows unauthenticated attackers to iterate through WordPress post IDs via the <code>scan_qr.php</code> endpoint. By sequentially accessing these IDs, attackers can retrieve customer order records stored within the WordPress database. The plugin was officially closed as of March 18, 2026, meaning websites using the plugin prior to this date are vulnerable. This allows for the potential harvesting of sensitive customer data including names, addresses, and purchase histories.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a WordPress site using the vulnerable Easy PayPal Events &amp; Tickets plugin (version 1.3 or earlier).</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>scan_qr.php</code> endpoint.</li>
<li>The attacker modifies the request to iterate through sequential WordPress post IDs.</li>
<li>The server processes the request without proper authentication or authorization checks.</li>
<li>The <code>scan_qr.php</code> endpoint queries the WordPress database for order records associated with the provided post ID.</li>
<li>If a valid order record is found, the server returns the information in the HTTP response.</li>
<li>The attacker parses the HTTP response to extract customer order information.</li>
<li>The attacker repeats steps 2-7, incrementing the post ID to enumerate all order records.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows unauthenticated attackers to retrieve all customer order records stored in the WordPress database. This can lead to the disclosure of sensitive customer information, including names, email addresses, purchase history, and potentially other personal details. The number of affected victims depends on the popularity and usage of the vulnerable plugin. If the database contains financial information the impact could be severe.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule detecting requests to the scan_qr.php endpoint with iterative post IDs to identify potential exploitation attempts.</li>
<li>If still using the Easy PayPal Events &amp; Tickets plugin, remove the plugin, as it was closed as of 2026-03-18.</li>
<li>Monitor web server logs for suspicious activity targeting the <code>scan_qr.php</code> endpoint.</li>
<li>Review the WordPress access logs for requests originating from unusual IP addresses accessing the <code>scan_qr.php</code> endpoint.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>wordpress</category><category>info-disclosure</category><category>cve-2026-41471</category><category>unauthenticated</category><category>enumeration</category></item><item><title>WordPress Easy PayPal Events &amp; Tickets Plugin Authentication Bypass Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-wordpress-paypal-auth-bypass/</link><pubDate>Mon, 04 May 2026 18:16:27 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-wordpress-paypal-auth-bypass/</guid><description>An unauthenticated remote attacker can exploit a hardcoded authentication bypass vulnerability in the Easy PayPal Events &amp; Tickets plugin for WordPress (versions 1.3 and earlier) by providing 'test' as the hash parameter, allowing retrieval of sensitive order details.</description><content:encoded><![CDATA[<p>The Easy PayPal Events &amp; Tickets plugin for WordPress, version 1.3 and earlier, contains a critical hardcoded authentication bypass vulnerability (CVE-2026-32834) within its QR code scanning functionality. This flaw allows unauthenticated remote attackers to bypass hash verification by supplying the string &rsquo;test&rsquo; as the hash parameter when accessing the <code>add_wpeevent_button_qr</code> action. This bypass enables attackers to retrieve sensitive order details associated with any post ID, including PayPal transaction IDs, customer email addresses, purchase amounts, and ticket information. The vulnerable plugin was officially closed on March 18, 2026, making it imperative to identify and mitigate any remaining installations to prevent potential data breaches.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a WordPress site using the Easy PayPal Events &amp; Tickets plugin (version 1.3 or earlier).</li>
<li>Attacker crafts a malicious HTTP GET request targeting the <code>/wp-admin/admin-ajax.php</code> endpoint.</li>
<li>The request includes the <code>action</code> parameter set to <code>add_wpeevent_button_qr</code>.</li>
<li>The request includes a <code>hash</code> parameter set to the hardcoded value <code>test</code>.</li>
<li>The request includes a <code>post_id</code> parameter, either guessed or obtained through other means.</li>
<li>The vulnerable plugin bypasses authentication due to the hardcoded hash.</li>
<li>The plugin processes the request and retrieves sensitive order details associated with the provided <code>post_id</code>.</li>
<li>The attacker receives the sensitive data, including PayPal transaction IDs, customer email addresses, purchase amounts, and ticket information.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability grants unauthenticated attackers access to sensitive customer and transaction data associated with events and tickets managed through the Easy PayPal Events &amp; Tickets plugin. The leaked information, including customer email addresses and PayPal transaction IDs, can be used for further malicious activities such as phishing campaigns, identity theft, and financial fraud. The number of affected WordPress sites is unknown, but any site using a vulnerable version of the plugin is at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect WordPress Easy PayPal Events &amp; Tickets Authentication Bypass Attempt</code> to your SIEM to detect exploitation attempts targeting the vulnerable endpoint.</li>
<li>Inspect web server logs for requests to <code>/wp-admin/admin-ajax.php</code> with the <code>action</code> parameter set to <code>add_wpeevent_button_qr</code> and the <code>hash</code> parameter set to <code>test</code> to identify potential exploitation attempts.</li>
<li>Monitor network traffic for suspicious data exfiltration following the identified exploitation attempts to mitigate potential damage.</li>
<li>If the plugin is still installed, remove it immediately.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>wordpress</category><category>authentication bypass</category><category>vulnerability</category></item><item><title>BusyBox DHCPv6 Client Heap Buffer Overflow Vulnerability (CVE-2026-29004)</title><link>https://feed.craftedsignal.io/briefs/2026-05-busybox-dhcpv6-overflow/</link><pubDate>Mon, 04 May 2026 18:16:26 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-busybox-dhcpv6-overflow/</guid><description>A heap buffer overflow vulnerability in BusyBox's DHCPv6 client allows network-adjacent attackers to trigger memory corruption, denial of service, or arbitrary code execution via crafted DHCPv6 responses.</description><content:encoded><![CDATA[<p>CVE-2026-29004 is a critical heap buffer overflow vulnerability affecting BusyBox before commit 42202bf. The vulnerability resides in the DHCPv6 client (udhcpc6), specifically within the DNS_SERVERS option handler located in networking/udhcp/d6_dhcpc.c. A network-adjacent attacker can exploit this flaw by sending a malicious DHCPv6 response containing a malformed D6_OPT_DNS_SERVERS option. This manipulation leads to incorrect heap buffer allocation calculations in the option_to_env() function, causing memory corruption. Successful exploitation can result in a denial of service or, more severely, arbitrary code execution on vulnerable embedded systems lacking heap hardening. The scope of impact is potentially broad, given BusyBox&rsquo;s widespread use in embedded devices.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a target embedded system running a vulnerable version of BusyBox with the DHCPv6 client enabled.</li>
<li>The attacker crafts a malicious DHCPv6 response packet.</li>
<li>The crafted packet includes a D6_OPT_DNS_SERVERS option with a size that exceeds the expected buffer allocation.</li>
<li>The attacker transmits the crafted DHCPv6 response packet to the target system on the local network.</li>
<li>The target system&rsquo;s udhcpc6 client receives the malicious DHCPv6 response.</li>
<li>The udhcpc6 client processes the D6_OPT_DNS_SERVERS option, triggering the vulnerable option_to_env() function.</li>
<li>The option_to_env() function calculates an insufficient buffer size based on the malformed option.</li>
<li>A heap buffer overflow occurs when copying the oversized DNS server list, leading to memory corruption, denial-of-service, or arbitrary code execution.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-29004 can have severe consequences. A denial-of-service condition could disrupt the functionality of the affected embedded system. More critically, arbitrary code execution allows attackers to gain complete control over the device, potentially leading to data theft, device compromise, or use in botnet activities. Given BusyBox&rsquo;s prevalence in embedded systems, a large number of devices are potentially vulnerable.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the patch addressing CVE-2026-29004 by updating to a version of BusyBox after commit 42202bf.</li>
<li>Deploy the Sigma rule &ldquo;Detect Suspicious DHCPv6 DNS Server Option Size&rdquo; to identify potentially malicious DHCPv6 responses in network traffic.</li>
<li>Monitor network traffic for unusually large DHCPv6 DNS_SERVERS options as indicated by the Sigma rule and network connection logs.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>heap-overflow</category><category>dhcpv6</category><category>busybox</category><category>cve-2026-29004</category><category>denial-of-service</category></item><item><title>OpenMRS Module Upload Path Traversal Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-openmrs-zip-slip/</link><pubDate>Mon, 04 May 2026 17:39:31 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-openmrs-zip-slip/</guid><description>OpenMRS versions 2.7.8 and earlier, as well as versions 2.8.0 through 2.8.5, are vulnerable to a path traversal (Zip Slip) attack via the `POST /openmrs/ws/rest/v1/module` endpoint that allows authenticated attackers to achieve arbitrary file write and remote code execution.</description><content:encoded><![CDATA[<p>OpenMRS, an open-source enterprise electronic medical record system platform, is vulnerable to a path traversal (Zip Slip) vulnerability in its module upload functionality. Discovered in versions 2.7.8 and earlier, as well as versions 2.8.0 through 2.8.5, the vulnerability resides in the <code>POST /openmrs/ws/rest/v1/module</code> endpoint. An authenticated attacker with administrative privileges can exploit this flaw by uploading a specially crafted <code>.omod</code> archive containing malicious ZIP entries with directory traversal sequences. This can allow the attacker to write files outside of the intended module directory, potentially leading to arbitrary file write and remote code execution on the server. The vulnerability stems from incomplete path validation within the <code>WebModuleUtil.startModule()</code> function, an oversight compared to other extraction methods within the same codebase that are properly protected.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker authenticates to the OpenMRS instance with valid admin credentials via Basic Auth.</li>
<li>The attacker crafts a malicious <code>.omod</code> file containing a ZIP entry with a path traversal payload, such as <code>web/module/../../../../&lt;target_filename&gt;.jsp</code>.</li>
<li>The attacker sends a <code>POST</code> request to the <code>/openmrs/ws/rest/v1/module</code> endpoint, uploading the malicious <code>.omod</code> file.</li>
<li>The server receives the request and parses the uploaded <code>.omod</code> file, treating it as a ZIP archive.</li>
<li>During module loading via <code>WebModuleUtil.startModule()</code>, the server extracts entries under the <code>web/module/</code> directory.</li>
<li>Due to an incomplete check, the entry <code>web/module/../../../../&lt;target_filename&gt;.jsp</code> passes the initial validation.</li>
<li>The server attempts to write the extracted file to a path constructed by concatenating the traversed path, resulting in writing the file outside the intended <code>WEB-INF/view/module/</code> directory.</li>
<li>If the written file is a JSP script, accessing it via a browser triggers server-side execution, achieving Remote Code Execution (RCE).</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to write arbitrary files within the web application root directory of the OpenMRS instance. This can lead to remote code execution, allowing the attacker to gain complete control of the affected server. Given OpenMRS&rsquo;s use in healthcare environments, a successful attack could compromise sensitive patient data, disrupt medical operations, and damage the reputation of the affected organization. The number of potentially affected installations is unknown, but the vulnerability impacts a widely used version of the platform.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the patch or upgrade to a version of OpenMRS that includes the fix for CVE-2026-40076 to address the path traversal vulnerability.</li>
<li>Deploy the Sigma rule <code>Detect OpenMRS Malicious Module Upload</code> to identify exploitation attempts based on HTTP requests to the <code>/openmrs/ws/rest/v1/module</code> endpoint with suspicious file extensions in the query parameters.</li>
<li>Enable webserver logging to capture HTTP request data and facilitate detection and investigation efforts.</li>
<li>Monitor file creation events within the web application root directory for suspicious JSP files. Use the Sigma rule <code>Detect JSP File Creation in Web Application Root</code> as a starting point.</li>
<li>Enforce the <code>module.allow_web_admin</code> restriction consistently across all module upload entry points, including the REST API to prevent bypass.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>path-traversal</category><category>zip-slip</category><category>rce</category><category>openmrs</category><category>web-application</category></item><item><title>Quarkus Vertx HTTP Authorization Bypass via Matrix Parameters</title><link>https://feed.craftedsignal.io/briefs/2026-05-quarkus-auth-bypass/</link><pubDate>Mon, 04 May 2026 17:20:20 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-quarkus-auth-bypass/</guid><description>Quarkus Vertx HTTP versions &lt; 3.20.6.1, &gt;= 3.21.0 and &lt; 3.27.3.1, &gt;= 3.30.0 and &lt; 3.33.1.1, and &gt;= 3.34.0 and &lt; 3.35.1.1 are vulnerable to an authorization bypass where appending a semicolon and arbitrary text to the request URL allows unauthorized access to protected resources.</description><content:encoded><![CDATA[<p>A vulnerability exists in Quarkus Vertx HTTP versions &lt; 3.20.6.1, &gt;= 3.21.0 and &lt; 3.27.3.1, &gt;= 3.30.0 and &lt; 3.33.1.1, and &gt;= 3.34.0 and &lt; 3.35.1.1. The vulnerability, designated as CVE-2026-39852, allows unauthenticated or lower-privileged users to bypass HTTP path-based authorization policies. By appending a semicolon (<code>;</code>) and arbitrary text to the request URL, attackers can gain unauthorized access to protected resources. This vulnerability stems from an inconsistency in path normalization: Quarkus&rsquo;s security layer checks the raw URL path, while RESTEasy Reactive&rsquo;s routing layer strips matrix parameters before matching endpoints. This means a request like <code>/api/admin;anything</code> can bypass authorization for <code>/api/admin</code> while still routing to the protected endpoint. This issue was discovered and verified by the GitHub Security Lab.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a protected endpoint, such as <code>/api/admin</code>, that requires authentication or specific privileges.</li>
<li>The attacker crafts a malicious HTTP request targeting the protected endpoint but appends a semicolon and arbitrary text, such as <code>/api/admin;anything</code>.</li>
<li>The request is sent to the Quarkus Vertx HTTP server.</li>
<li>Quarkus&rsquo;s security layer performs an authorization check on the raw URL path <code>/api/admin;anything</code>, which may not match the intended authorization rules for <code>/api/admin</code>.</li>
<li>RESTEasy Reactive&rsquo;s routing layer strips the matrix parameters (<code>;anything</code>) from the URL, resulting in the endpoint <code>/api/admin</code> being matched.</li>
<li>The request is routed to the protected endpoint <code>/api/admin</code>, bypassing the intended authorization checks.</li>
<li>The attacker gains unauthorized access to the protected resource or functionality.</li>
<li>The attacker performs actions they would not normally be authorized to perform, such as accessing sensitive data or modifying system configurations.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability can lead to unauthorized access to sensitive data, modification of system configurations, or other malicious activities. The vulnerability affects Quarkus Vertx HTTP applications that rely on path-based authorization policies. The number of affected applications is currently unknown, but any application using the vulnerable versions of Quarkus Vertx HTTP is susceptible.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Quarkus Vertx HTTP to a patched version (&gt;= 3.20.6.1, &gt;= 3.27.3.1, &gt;= 3.33.1.1, &gt;= 3.35.1.1) to remediate CVE-2026-39852.</li>
<li>Deploy the Sigma rule <code>Detect Quarkus Authorization Bypass Attempt</code> to identify potential exploitation attempts in web server logs.</li>
<li>Monitor web server logs for requests containing semicolons in the URL path to detect potential exploitation attempts using the <code>Monitor Semicolons in URL Path</code> Sigma rule.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>authentication-bypass</category><category>authorization-bypass</category><category>web-application</category></item><item><title>Qualcomm PLC FW Buffer Overflow via Incorrect Authorization (CVE-2026-25293)</title><link>https://feed.craftedsignal.io/briefs/2026-05-plc-buffer-overflow/</link><pubDate>Mon, 04 May 2026 17:16:22 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-plc-buffer-overflow/</guid><description>CVE-2026-25293 is a critical buffer overflow vulnerability in Qualcomm PLC FW due to incorrect authorization, potentially allowing unauthorized access and control over programmable logic controllers.</description><content:encoded><![CDATA[<p>CVE-2026-25293 describes a buffer overflow vulnerability affecting Qualcomm&rsquo;s Programmable Logic Controller Firmware (PLC FW).  The root cause is an incorrect authorization mechanism within the firmware. This flaw could allow an attacker to potentially overwrite memory buffers, leading to arbitrary code execution or denial of service. The vulnerability was disclosed in Qualcomm&rsquo;s May 2026 security bulletin. Successful exploitation of this vulnerability could allow unauthorized modification of PLC configurations, potentially impacting industrial control systems and automation processes. The affected PLC FW is used in a range of industrial applications, increasing the scope and severity of this vulnerability.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable PLC FW device on the network.</li>
<li>The attacker leverages CVE-2026-25293 to bypass authorization checks.</li>
<li>A crafted network packet is sent to the PLC FW, exploiting the buffer overflow.</li>
<li>The overflowed buffer overwrites critical memory regions.</li>
<li>Attacker gains control of PLC FW execution flow.</li>
<li>Malicious code is injected into the PLC memory space.</li>
<li>The injected code executes, potentially modifying PLC logic or disrupting operations.</li>
<li>The attacker achieves unauthorized control over the PLC, leading to disruption, data manipulation, or system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-25293 could allow attackers to gain complete control over Programmable Logic Controllers (PLCs). This could lead to significant disruptions in industrial control systems, manufacturing processes, and other automated systems. The vulnerability affects Qualcomm PLC FW, potentially impacting a large number of devices across various sectors. The high CVSS score of 9.6 reflects the critical impact of this vulnerability, including the potential for complete system compromise and denial of service.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the security patches provided by Qualcomm as detailed in their May 2026 security bulletin (<a href="https://docs.qualcomm.com/product/publicresources/securitybulletin/may-2026-bulletin.html">https://docs.qualcomm.com/product/publicresources/securitybulletin/may-2026-bulletin.html</a>) to remediate CVE-2026-25293.</li>
<li>Deploy the Sigma rule &ldquo;Detect Suspicious Network Traffic to PLC Devices&rdquo; to identify potential exploitation attempts.</li>
<li>Implement strict network segmentation to limit the attack surface and prevent lateral movement to PLC devices.</li>
<li>Monitor network traffic for unexpected patterns or unauthorized access attempts to PLC devices.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>plc</category><category>buffer-overflow</category><category>industrial-control-systems</category><category>cve-2026-25293</category></item><item><title>NetBox RCE via Jinja2 Template Injection (CVE-2026-29514)</title><link>https://feed.craftedsignal.io/briefs/2026-05-netbox-rce/</link><pubDate>Mon, 04 May 2026 17:16:22 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-netbox-rce/</guid><description>NetBox versions 4.3.5 through 4.5.4 are vulnerable to remote code execution (RCE) via template injection, where authenticated users with specific permissions can inject malicious Python callables into template parameters, bypassing Jinja2 sandboxing to execute arbitrary code.</description><content:encoded><![CDATA[<p>NetBox, a widely-used infrastructure resource modeling application, is vulnerable to remote code execution (RCE) in versions 4.3.5 through 4.5.4. This vulnerability, identified as CVE-2026-29514, resides in the <code>RenderTemplateMixin.get_environment_params()</code> method. An authenticated attacker with <code>exporttemplate</code> or <code>configtemplate</code> permissions can exploit this flaw by injecting malicious Python callables into the <code>environment_params</code> field. Successful exploitation allows the attacker to bypass the Jinja2 SandboxedEnvironment, achieving arbitrary code execution as the NetBox service user. This RCE can lead to complete system compromise, data exfiltration, or denial of service. Defenders should prioritize patching and implement the detection measures outlined below.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An authenticated user logs into the NetBox web application with <code>exporttemplate</code> or <code>configtemplate</code> permissions.</li>
<li>The attacker crafts a malicious request to modify or create an export/config template.</li>
<li>Within the request, the attacker injects a Python callable, such as <code>subprocess.getoutput</code>, into the <code>environment_params</code> field. The <code>finalize</code> parameter of the Jinja2 environment is set to this callable.</li>
<li>NetBox processes the request, and the Jinja2 environment is initialized with the attacker-controlled <code>finalize</code> parameter.</li>
<li>When the template is rendered, every expression outside the sandbox&rsquo;s call interception mechanism is processed.</li>
<li>The injected callable (<code>subprocess.getoutput</code>) is invoked on the rendered expression.</li>
<li>The <code>subprocess.getoutput</code> callable executes arbitrary shell commands as the NetBox service user.</li>
<li>The attacker gains remote code execution, potentially leading to full system compromise or data exfiltration.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-29514 allows an authenticated attacker to execute arbitrary code on the NetBox server. The impact includes potential full system compromise, data exfiltration, and denial of service. Given that NetBox is often used to manage critical infrastructure information, a successful attack could have significant consequences, potentially affecting numerous organizations that rely on accurate network data.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade NetBox to a patched version (4.5.5 or later) to remediate CVE-2026-29514.</li>
<li>Implement the provided Sigma rule to detect attempts to inject malicious callables into <code>environment_params</code> via webserver logs.</li>
<li>Review and restrict <code>exporttemplate</code> and <code>configtemplate</code> permissions to only those users who require them.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>rce</category><category>template-injection</category><category>netbox</category><category>cve-2026-29514</category></item><item><title>Qualcomm Driver IOCTL Memory Corruption Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-ioctl-memory-corruption/</link><pubDate>Mon, 04 May 2026 17:16:21 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-ioctl-memory-corruption/</guid><description>A memory corruption vulnerability, CVE-2025-47408, exists in Qualcomm drivers when another driver calls an IOCTL with an invalid input/output buffer, potentially leading to code execution or denial of service.</description><content:encoded><![CDATA[<p>A memory corruption vulnerability has been identified in Qualcomm drivers, tracked as CVE-2025-47408. This vulnerability occurs when one driver makes an Input/Output Control (IOCTL) call to another driver using a malformed or invalid input/output buffer. The flaw stems from improper validation or handling of the provided buffer, leading to a memory corruption condition. Successful exploitation of this vulnerability could lead to arbitrary code execution, privilege escalation, or a denial-of-service condition. This vulnerability was disclosed in the May 2026 Qualcomm Security Bulletin. The potential impact necessitates that detection engineering teams prioritize identifying and mitigating this threat across systems utilizing affected Qualcomm components.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the system, potentially through social engineering or exploiting another vulnerability.</li>
<li>The attacker identifies a vulnerable Qualcomm driver that is susceptible to IOCTL calls with invalid buffers.</li>
<li>The attacker develops a malicious driver or application capable of making IOCTL calls.</li>
<li>The malicious driver crafts a specific IOCTL request with a purposefully malformed input/output buffer.</li>
<li>The malicious driver sends the crafted IOCTL request to the targeted Qualcomm driver.</li>
<li>The targeted Qualcomm driver receives the IOCTL request and attempts to process the invalid buffer.</li>
<li>Due to the malformed buffer, the driver&rsquo;s memory management routines are corrupted, leading to a write to an arbitrary memory location.</li>
<li>The attacker leverages the memory corruption to execute arbitrary code, escalate privileges, or cause a denial-of-service condition.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2025-47408 can have severe consequences. An attacker can gain complete control over the affected system, potentially leading to data theft, system compromise, or disruption of services. While the specific number of affected devices or sectors is not explicitly stated, the widespread use of Qualcomm components in various devices suggests a broad potential impact. If successful, this exploit could allow attackers to install persistent backdoors, steal sensitive information, or use the compromised device as a launching point for further attacks within the network.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process creations for unsigned or untrusted drivers being loaded, and deploy the first Sigma rule provided below, to identify potential malicious driver activity.</li>
<li>Enable driver verifier on test systems using Qualcomm drivers to trigger memory corruption issues and aid in reverse engineering the vulnerability.</li>
<li>Review Qualcomm&rsquo;s May 2026 Security Bulletin for specific device models and affected driver versions to prioritize patching efforts.</li>
<li>Implement the second Sigma rule to detect suspicious IOCTL calls originating from unusual processes or locations, focusing on potential exploitation attempts of CVE-2025-47408.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>memory corruption</category><category>ioctl</category><category>driver vulnerability</category><category>cve-2025-47408</category></item><item><title>Memory Corruption Vulnerability in Digital Signal Processor (CVE-2025-47407)</title><link>https://feed.craftedsignal.io/briefs/2026-05-dsp-memory-corruption/</link><pubDate>Mon, 04 May 2026 17:16:21 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-dsp-memory-corruption/</guid><description>CVE-2025-47407 describes a memory corruption vulnerability affecting the digital signal processor due to allocation failure at the kernel level, potentially leading to arbitrary code execution with elevated privileges on affected systems.</description><content:encoded><![CDATA[<p>CVE-2025-47407 is a memory corruption vulnerability reported by Qualcomm, Inc., affecting digital signal processors (DSPs). The vulnerability stems from an allocation failure at the kernel level during process creation on the DSP. This can lead to memory corruption, potentially allowing an attacker to execute arbitrary code with elevated privileges. While the exact products affected are not specified, the issue resides within Qualcomm DSPs and could impact various devices utilizing these processors. This vulnerability was published on May 4, 2026, and requires patching of the affected DSP firmware to mitigate the risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a device containing a vulnerable Qualcomm DSP.</li>
<li>The attacker triggers a process creation event on the DSP. This could involve sending a specifically crafted request to the DSP or exploiting another vulnerability to initiate the process creation.</li>
<li>During the process creation, a memory allocation failure occurs within the DSP kernel.</li>
<li>This allocation failure leads to memory corruption, where data is written to an incorrect memory location.</li>
<li>The attacker leverages the memory corruption to overwrite critical kernel data structures or code.</li>
<li>The attacker injects malicious code into the corrupted memory region.</li>
<li>The DSP executes the injected malicious code, granting the attacker control over the DSP.</li>
<li>The attacker can then use the compromised DSP to further compromise the device or network it is connected to.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2025-47407 allows an attacker to execute arbitrary code on the DSP with elevated privileges. This can lead to a complete compromise of the affected device, allowing the attacker to steal sensitive data, install malware, or use the device as a launchpad for further attacks. The vulnerability can potentially impact a wide range of devices that utilize Qualcomm DSPs.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process creation events for anomalies that may indicate a memory allocation failure, using the <code>process_creation</code> log category and filtering for processes related to the digital signal processor.</li>
<li>Apply the security patch released by Qualcomm, as referenced in the advisory URL (<a href="https://docs.qualcomm.com/product/publicresources/securitybulletin/may-2026-bulletin.html)">https://docs.qualcomm.com/product/publicresources/securitybulletin/may-2026-bulletin.html)</a>, to address the memory corruption vulnerability.</li>
<li>Deploy the Sigma rule provided below to detect potential exploitation attempts by monitoring for specific events related to process creation and memory allocation.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>memory-corruption</category><category>dsp</category><category>qualcomm</category><category>cve-2025-47407</category></item><item><title>Multi-Stage 'Code of Conduct' Phishing Campaign Leads to AiTM Token Compromise</title><link>https://feed.craftedsignal.io/briefs/2026-05-aitm-phishing/</link><pubDate>Mon, 04 May 2026 15:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-aitm-phishing/</guid><description>A widespread phishing campaign utilized 'code of conduct' lures, a multi-step attack chain, and legitimate email services to distribute authenticated messages from attacker-controlled domains, ultimately leading to adversary-in-the-middle (AiTM) token compromise, primarily targeting US-based organizations.</description><content:encoded><![CDATA[<p>Between April 14 and 16, 2026, Microsoft Defender Research observed a sophisticated, large-scale phishing campaign targeting over 35,000 users across more than 13,000 organizations in 26 countries, predominantly in the United States (92%). The campaign, which did not focus on a single vertical, impacted a range of industries, with Healthcare &amp; life sciences (19%), Financial services (18%), Professional services (11%), and Technology &amp; software (11%) being the most affected. Attackers employed code of conduct-themed lures delivered via emails that appeared as internal compliance or regulatory communications. The campaign utilized a multi-step attack chain, including CAPTCHA challenges and intermediate staging pages, to reinforce legitimacy and filter out automated defenses, ultimately leading to an adversary-in-the-middle (AiTM) phishing flow.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attack begins with phishing emails posing as internal compliance communications, using subjects like &ldquo;Internal case log issued under conduct policy&rdquo;.</li>
<li>The emails contain a PDF attachment (e.g., &ldquo;Awareness Case Log File – Tuesday 14th, April 2026.pdf&rdquo;) that claims a &ldquo;code of conduct review&rdquo; has been initiated.</li>
<li>Recipients are instructed to click a “Review Case Materials” link within the PDF.</li>
<li>Clicking the link redirects the user to one of the attacker-controlled domains (e.g., acceptable-use-policy-calendly[.]de).</li>
<li>The landing page displays a Cloudflare CAPTCHA to validate the user and impede automated analysis.</li>
<li>After CAPTCHA completion, the user is redirected to an intermediate site that informs them the requested documentation is encrypted and requires account authentication.</li>
<li>The user is presented with a legitimate-looking sign-in experience, part of an AiTM phishing flow.</li>
<li>The attackers proxy the authentication session in real time and capture authentication tokens, granting immediate account access.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>This campaign resulted in the compromise of authentication tokens, enabling attackers to gain unauthorized access to user accounts and bypass multifactor authentication. With more than 35,000 users targeted across over 13,000 organizations, the potential for widespread data breaches, financial fraud, and further malicious activities is significant. The targeting of sectors like Healthcare and Financial Services indicates a focus on high-value targets with sensitive data.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Educate users about phishing lures, especially those using social engineering tactics and enterprise-style HTML templates.</li>
<li>Deploy the Sigma rule &ldquo;Detect Suspicious PDF Opening via Uncommon Applications&rdquo; to identify unusual PDF execution paths, based on the &lsquo;file_event&rsquo; log source.</li>
<li>Configure email security settings in Microsoft Defender for Office 365 to filter out phishing emails effectively.</li>
<li>Enable network protection to leverage SmartScreen as a host-based web proxy.</li>
<li>Block access to the attacker-controlled domains, such as acceptable-use-policy-calendly[.]de, at the DNS resolver level.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>phishing</category><category>credential-theft</category><category>AiTM</category><category>token-compromise</category></item><item><title>Potential PowerShell Obfuscated Script via High Entropy</title><link>https://feed.craftedsignal.io/briefs/2026-06-high-entropy-powershell/</link><pubDate>Mon, 04 May 2026 14:49:36 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-06-high-entropy-powershell/</guid><description>This detection identifies potentially obfuscated PowerShell scripts based on high entropy and non-uniform character distributions, often used by attackers to evade signature-based detections and hinder analysis.</description><content:encoded><![CDATA[<p>Attackers frequently employ PowerShell obfuscation techniques to evade detection and hinder analysis. These techniques involve encoding, encrypting, or compressing PowerShell scripts to mask their true intent. This detection identifies PowerShell script blocks exhibiting high entropy and non-uniform character distributions, statistical characteristics often associated with obfuscated content. The rule specifically targets script blocks longer than 1000 characters with entropy bits &gt;= 5.5 and surprisal standard deviation &gt; 0.7. This detection is designed to highlight potentially malicious PowerShell activity that warrants further investigation by security analysts and incident responders. This rule was created by Elastic and last updated on May 4, 2026.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system (e.g., via phishing or exploit).</li>
<li>The attacker leverages PowerShell, a built-in Windows scripting language, to execute malicious commands.</li>
<li>The attacker uses obfuscation techniques (encoding, encryption, compression) to disguise the PowerShell script&rsquo;s true intent.</li>
<li>The obfuscated script is executed, bypassing basic signature-based detections.</li>
<li>The script may download and execute additional payloads or establish persistence.</li>
<li>The script performs malicious actions such as data exfiltration, lateral movement, or system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack using obfuscated PowerShell can lead to various negative impacts, including data breaches, system compromise, and disruption of services. The low severity reflects the need for further analysis to confirm malicious intent, given potential false positives from legitimate encoded scripts. While the exact number of affected systems and sectors is unknown, the widespread use of PowerShell makes this a potentially significant threat across many organizations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable PowerShell Script Block Logging to generate the necessary events (4104) as outlined in the setup instructions: <a href="https://ela.st/powershell-logging-setup">https://ela.st/powershell-logging-setup</a>.</li>
<li>Deploy the provided Sigma rule to your SIEM and tune the thresholds (<code>powershell.file.script_block_length</code>, <code>powershell.file.script_block_entropy_bits</code>, <code>powershell.file.script_block_surprisal_stdev</code>) based on your environment&rsquo;s baseline.</li>
<li>Investigate alerts generated by the Sigma rule, focusing on execution context (<code>user.name</code>, <code>host.name</code>), script provenance (<code>file.path</code>), and reconstructed script content (<code>powershell.file.script_block_text</code>).</li>
<li>Review the investigation guide within the rule&rsquo;s <code>note</code> section for detailed triage and analysis steps.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>defense-evasion</category><category>powershell</category><category>obfuscation</category></item><item><title>Windows Port Forwarding Rule Addition via Registry Modification</title><link>https://feed.craftedsignal.io/briefs/2026-05-port-forwarding-registry/</link><pubDate>Mon, 04 May 2026 14:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-port-forwarding-registry/</guid><description>An adversary may abuse port forwarding to bypass network segmentation restrictions by creating a new port forwarding rule through modification of the Windows registry.</description><content:encoded><![CDATA[<p>Attackers may configure port forwarding rules to bypass network segmentation restrictions, effectively using the compromised host as a jump box to access previously unreachable systems. This involves modifying the registry to redirect incoming TCP connections from a local port to another port or a remote computer. The technique is typically employed post-compromise to facilitate lateral movement and maintain unauthorized access within the network. This activity is detected by monitoring changes to the <code>HKLM\SYSTEM\*ControlSet*\Services\PortProxy\v4tov4\</code> registry subkeys.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the target system through an exploit or compromised credentials.</li>
<li>The attacker executes a command-line interface (e.g., <code>cmd.exe</code> or <code>powershell.exe</code>) with administrative privileges.</li>
<li>The attacker uses <code>reg.exe</code> or PowerShell&rsquo;s <code>Set-ItemProperty</code> cmdlet to modify the <code>HKLM\SYSTEM\CurrentControlSet\Services\PortProxy\v4tov4\</code> registry key.</li>
<li>The attacker configures a new port forwarding rule by creating a new subkey under <code>v4tov4\</code> with specific settings for the local port, remote address, and remote port.</li>
<li>The attacker sets the <code>ListenAddress</code>, <code>ListenPort</code>, <code>ConnectAddress</code>, and <code>ConnectPort</code> values within the new subkey.</li>
<li>The attacker verifies the successful creation and activation of the port forwarding rule using <code>netsh interface portproxy show v4tov4</code>.</li>
<li>The attacker leverages the newly created port forwarding rule to tunnel traffic through the compromised host, bypassing network segmentation.</li>
<li>The attacker uses the proxied connection to access internal resources and conduct further attacks, such as lateral movement or data exfiltration.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation enables attackers to bypass network segmentation restrictions, leading to unauthorized access to internal systems and data. This can facilitate lateral movement, data exfiltration, and further compromise of the network. The severity of the impact depends on the sensitivity of the accessible resources and the extent of the attacker&rsquo;s lateral movement.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon registry event logging to capture modifications to the <code>HKLM\SYSTEM\*ControlSet*\Services\PortProxy\v4tov4\</code> registry subkeys, enabling detection of malicious port forwarding rule additions.</li>
<li>Deploy the Sigma rule &ldquo;Port Forwarding Rule Addition via Registry Modification&rdquo; to your SIEM to detect suspicious registry modifications related to port forwarding.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on identifying the process execution chain and the user account that performed the action.</li>
<li>Regularly review and audit existing port forwarding rules to identify and remove any unauthorized or suspicious configurations.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>port-forwarding</category><category>registry-modification</category><category>command-and-control</category><category>defense-evasion</category><category>windows</category></item><item><title>Suspicious Zoom Child Process Execution</title><link>https://feed.craftedsignal.io/briefs/2024-11-suspicious-zoom-child-process/</link><pubDate>Mon, 04 May 2026 14:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-11-suspicious-zoom-child-process/</guid><description>A suspicious Zoom child process was detected, indicating a potential attempt to run unnoticed by masquerading as Zoom.exe or exploiting a vulnerability, resulting in the execution of cmd.exe, powershell.exe, pwsh.exe, or powershell_ise.exe.</description><content:encoded><![CDATA[<p>This detection identifies suspicious child processes spawned by Zoom.exe, potentially indicating an attempt to evade detection or exploit vulnerabilities within the Zoom application. The rule focuses on detecting instances where command interpreters like cmd.exe, PowerShell, or PowerShell ISE are launched as child processes of Zoom. This behavior can be indicative of an attacker attempting to execute malicious commands or scripts within the context of the Zoom application, potentially escalating privileges or gaining unauthorized access to system resources. It&rsquo;s crucial for defenders to investigate such occurrences, as they may signify ongoing exploitation or malicious activity leveraging Zoom as an initial access vector.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>User launches the Zoom application (Zoom.exe).</li>
<li>A vulnerability in Zoom is exploited, or the user is socially engineered into running a malicious command.</li>
<li>Zoom.exe spawns a child process, such as cmd.exe, powershell.exe, pwsh.exe, or powershell_ise.exe.</li>
<li>The spawned process executes commands or scripts, potentially downloading or executing malware.</li>
<li>The malicious script or command performs reconnaissance activities on the system.</li>
<li>The script establishes persistence by creating a scheduled task or modifying registry keys.</li>
<li>The attacker gains remote access to the compromised system.</li>
<li>The attacker performs lateral movement and data exfiltration.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation could allow attackers to execute arbitrary commands, escalate privileges, and compromise the affected system. Depending on the user&rsquo;s privileges, attackers could gain access to sensitive data, install malware, or pivot to other systems on the network. The impact ranges from data breaches to complete system compromise, potentially affecting all users within the organization who utilize the Zoom application.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Suspicious Zoom Child Process&rdquo; to your SIEM to detect command interpreters spawned by Zoom.exe. Tune the rule for your environment to minimize false positives.</li>
<li>Enable Sysmon process creation logging (Event ID 1) to capture detailed information about process executions, which is essential for the Sigma rule above.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on the command-line arguments and network connections of the spawned processes.</li>
<li>Monitor Windows Security Event Logs for process creation events related to Zoom.exe and its child processes to identify suspicious behavior.</li>
<li>Consider implementing application control policies to restrict the execution of unauthorized processes within the Zoom application context.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>execution</category><category>windows</category></item><item><title>Suspicious Windows PowerShell Arguments Detected</title><link>https://feed.craftedsignal.io/briefs/2024-09-susp-powershell-args/</link><pubDate>Mon, 04 May 2026 14:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-09-susp-powershell-args/</guid><description>This rule identifies the execution of PowerShell with suspicious argument values, often observed during malware installation, by detecting unusual PowerShell arguments indicative of abuse, focusing on patterns like encoded commands, suspicious downloads, and obfuscation techniques.</description><content:encoded><![CDATA[<p>This detection rule identifies the execution of PowerShell with suspicious argument values on Windows systems. This behavior is frequently associated with malware installation and other malicious activities. PowerShell is a powerful scripting language, and adversaries often exploit its capabilities to execute malicious scripts, download payloads, and obfuscate commands. The rule focuses on detecting patterns such as encoded commands, suspicious downloads (e.g., using WebClient or Invoke-WebRequest), and various obfuscation techniques used to evade detection. The rule is designed to work with various data sources, including Elastic Defend, Windows Security Event Logs, Sysmon, and third-party EDR solutions like CrowdStrike, Microsoft Defender XDR, and SentinelOne, enhancing its applicability across different environments.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system (e.g., through phishing or exploiting a vulnerability).</li>
<li>The attacker uses PowerShell to download a malicious payload from a remote server using commands like <code>DownloadFile</code> or <code>DownloadString</code>.</li>
<li>The downloaded payload is often encoded or obfuscated to evade detection. Common techniques include Base64 encoding, character manipulation, and compression.</li>
<li>PowerShell is then used to decode or deobfuscate the payload using methods like <code>[Convert]::FromBase64String</code> or <code>[char[]](...) -join ''</code>.</li>
<li>The deobfuscated payload is executed directly in memory using techniques like <code>iex</code> (Invoke-Expression) or <code>Reflection.Assembly.Load</code>.</li>
<li>The executed payload performs malicious actions, such as installing malware, establishing persistence, or exfiltrating data.</li>
<li>The attacker may use techniques like <code>WebClient</code> to download files from a remote URL.</li>
<li>Commands like <code>nslookup -q=txt</code> are used for command and control.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to malware installation, data theft, system compromise, and further propagation of the attack within the network. The detection of suspicious PowerShell arguments helps to identify and prevent these malicious activities before significant damage can occur. Without proper detection, attackers can maintain persistence, escalate privileges, and compromise sensitive data. The rule helps defenders identify and respond to these threats quickly, minimizing the impact of potential attacks.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rules provided in this brief to your SIEM to detect suspicious PowerShell activity.</li>
<li>Enable Sysmon process creation logging with command line arguments to ensure the necessary data is captured for the Sigma rules to function effectively.</li>
<li>Investigate any alerts generated by the Sigma rules to determine the legitimacy of the PowerShell activity and take appropriate remediation steps.</li>
<li>Continuously tune the Sigma rules based on your environment to reduce false positives and improve detection accuracy.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>powershell</category><category>malware</category><category>execution</category></item><item><title>Suspicious Execution via Windows Command Debugging Utility</title><link>https://feed.craftedsignal.io/briefs/2024-07-cdb-execution/</link><pubDate>Mon, 04 May 2026 14:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-07-cdb-execution/</guid><description>Adversaries can abuse the Windows command line debugging utility cdb.exe to execute commands or shellcode from non-standard paths, evading traditional security measures.</description><content:encoded><![CDATA[<p>The Windows command line debugging utility, cdb.exe, is a legitimate tool used for debugging applications. However, adversaries can exploit it to execute unauthorized commands or shellcode, bypassing security measures. This can be achieved by running cdb.exe from non-standard installation paths and using specific command-line arguments to execute malicious commands. The LOLBAS project documents this technique, highlighting its potential for defense evasion. This activity has been observed across various environments, necessitating detection strategies that focus on identifying anomalous executions of cdb.exe.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system.</li>
<li>The attacker copies cdb.exe to a non-standard location (outside &ldquo;Program Files&rdquo; and &ldquo;Program Files (x86)&rdquo;).</li>
<li>The attacker executes cdb.exe with the <code>-cf</code>, <code>-c</code>, or <code>-pd</code> command-line arguments.</li>
<li>These arguments are used to specify a command file or execute a direct command.</li>
<li>The command file or command directly executes malicious code, such as shellcode.</li>
<li>The malicious code performs actions such as creating new processes, modifying files, or establishing network connections.</li>
<li>These actions allow the attacker to maintain persistence or escalate privileges.</li>
<li>The ultimate goal is to evade defenses and execute arbitrary code on the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows adversaries to execute arbitrary commands and shellcode on the affected system, potentially leading to complete system compromise. This can result in data theft, installation of malware, or further propagation within the network. The technique is effective at bypassing application whitelisting and other security controls that rely on standard execution paths.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Execution via Windows Command Debugging Utility&rdquo; to your SIEM to detect suspicious cdb.exe executions (see rules section).</li>
<li>Enable process creation logging via Sysmon or Windows Security Event Logs to provide the necessary data for the Sigma rule.</li>
<li>Implement application whitelisting to prevent execution of cdb.exe from non-standard paths.</li>
<li>Monitor process command lines for the <code>-cf</code>, <code>-c</code>, and <code>-pd</code> flags when cdb.exe is executed.</li>
<li>Investigate any instances of cdb.exe running from unusual directories to determine legitimacy.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>lolbas</category><category>defense-evasion</category><category>windows</category></item><item><title>SIP Provider Modification for Defense Evasion</title><link>https://feed.craftedsignal.io/briefs/2024-01-sip-provider-modification/</link><pubDate>Mon, 04 May 2026 14:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-sip-provider-modification/</guid><description>This rule detects modifications to the registered Subject Interface Package (SIP) providers, which are used by the Windows cryptographic system to validate file signatures, potentially indicating an attempt to bypass signature validation or inject code for defense evasion.</description><content:encoded><![CDATA[<p>This detection rule identifies modifications to Subject Interface Package (SIP) providers, a critical component of the Windows cryptographic system responsible for validating file signatures. Attackers may attempt to subvert trust controls by modifying SIP providers, allowing them to bypass signature validation checks and potentially inject malicious code into trusted processes. This activity is a form of defense evasion, allowing unauthorized code execution. The rule focuses on detecting suspicious registry changes associated with SIP providers, while excluding known benign processes to minimize false positives. The rule is designed for data generated by Elastic Defend, but also supports third-party data sources like CrowdStrike, Microsoft Defender XDR, SentinelOne Cloud Funnel, and Sysmon. This activity is related to MITRE ATT&amp;CK technique T1553.003 (SIP and Trust Provider Hijacking).</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the system through various means (e.g., phishing, exploitation of vulnerabilities).</li>
<li>The attacker escalates privileges to gain necessary permissions to modify the registry.</li>
<li>The attacker modifies the registry keys associated with SIP providers, specifically targeting <code>CryptSIPDllPutSignedDataMsg</code> and <code>Trust\\FinalPolicy</code> locations.</li>
<li>The attacker changes the <code>Dll</code> value within these registry keys to point to a malicious DLL.</li>
<li>The system, upon attempting to validate a file signature, loads the malicious DLL instead of the legitimate SIP provider.</li>
<li>The malicious DLL executes arbitrary code, potentially injecting it into other processes.</li>
<li>The attacker uses the injected code to further compromise the system or network.</li>
<li>The attacker achieves their final objective, such as data exfiltration, ransomware deployment, or establishing persistence.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful modification of SIP providers allows attackers to bypass signature validation checks, leading to the execution of unsigned or malicious code. This can compromise the integrity of the system, leading to data breaches, system instability, or further propagation of malware within the network. The impact can range from individual workstation compromise to widespread organizational damage, depending on the scope of the attack.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect SIP Provider Modification via Registry</code> to your SIEM and tune it for your environment to detect suspicious registry modifications related to SIP providers.</li>
<li>Enable Sysmon registry event logging to collect the necessary data for the Sigma rules above.</li>
<li>Investigate any alerts generated by the rules, focusing on the process responsible for the registry change and the DLL being loaded, as described in the rule&rsquo;s triage section.</li>
<li>Implement application control policies to restrict the execution of unsigned or untrusted code.</li>
<li>Monitor the registry paths listed in the Sigma rules for unexpected changes.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>windows</category><category>registry-modification</category></item><item><title>Service DACL Modification via sc.exe</title><link>https://feed.craftedsignal.io/briefs/2024-07-service-dacl-modification/</link><pubDate>Mon, 04 May 2026 14:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-07-service-dacl-modification/</guid><description>Detection of service DACL modifications via `sc.exe` using the `sdset` command, potentially leading to defense evasion by denying service access to legitimate users or system accounts.</description><content:encoded><![CDATA[<p>This detection identifies the modification of Discretionary Access Control Lists (DACLs) for Windows services using the <code>sc.exe</code> utility. Attackers can leverage this technique to deny access to a service, making it unmanageable or hiding it from system administrators and users. The detection rule focuses on identifying instances where <code>sc.exe</code> is used with the <code>sdset</code> argument, specifically targeting the denial of access for key user groups such as IU, SU, BA, SY, and WD. This activity is indicative of a defense evasion attempt aimed at hindering security tools or preventing remediation. The rule is designed for data generated by Elastic Defend, but also supports integrations with third-party data sources like CrowdStrike, Microsoft Defender XDR, and SentinelOne Cloud Funnel, offering broad coverage for detecting this malicious behavior across diverse environments.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system through various means (e.g., compromised credentials, phishing).</li>
<li>The attacker elevates privileges to gain necessary permissions to modify service configurations.</li>
<li>The attacker executes <code>sc.exe</code> with the <code>sdset</code> command to modify the DACL of a targeted service.</li>
<li>The <code>sdset</code> command arguments specify the new security descriptor, denying access to specific user groups (e.g., IU, SU, BA, SY, WD).</li>
<li>The service becomes inaccessible to the targeted user groups, potentially disrupting legitimate operations or security tools.</li>
<li>The attacker may repeat this process for multiple services to further impair system functionality or evade detection.</li>
<li>The attacker leverages the disabled or hidden services to maintain persistence or carry out other malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful modification of service DACLs can lead to a denial-of-service condition for legitimate users and system administrators. This can impair the functionality of critical security tools, hinder incident response efforts, and provide attackers with a persistent foothold on the compromised system. The hiding of services can also prevent users from identifying and removing malicious services. While the number of victims is not specified in the source, organizations across various sectors are potentially vulnerable to this type of attack.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Service DACL Modification via sc.exe</code> to your SIEM to detect this specific behavior.</li>
<li>Enable Sysmon process creation logging to provide the necessary data for the Sigma rule to function effectively.</li>
<li>Investigate any instances where <code>sc.exe</code> is used with the <code>sdset</code> argument and access denial flags, focusing on the targeted user groups (IU, SU, BA, SY, WD).</li>
<li>Implement strict access controls and monitor for unauthorized attempts to modify service configurations.</li>
<li>Regularly audit service permissions to identify and remediate any unauthorized changes.</li>
<li>Review and update endpoint protection policies to prevent similar threats in the future, ensuring that all systems are equipped with the latest security patches and configurations.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>persistence</category><category>windows</category></item><item><title>Remote Desktop File Opened from Suspicious Path</title><link>https://feed.craftedsignal.io/briefs/2024-11-rdp-file-attachment/</link><pubDate>Mon, 04 May 2026 14:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-11-rdp-file-attachment/</guid><description>Adversaries may abuse RDP files delivered via phishing from suspicious locations to gain unauthorized access to systems.</description><content:encoded><![CDATA[<p>Attackers are increasingly using malicious Remote Desktop Protocol (RDP) files to gain initial access to systems. These RDP files, often delivered via spearphishing attachments, contain connection settings that, when opened, can compromise a system. This technique allows adversaries to bypass traditional security measures by leveraging a legitimate tool (mstsc.exe) with a malicious configuration file. The observed activity involves opening RDP files from suspicious locations like Downloads, temporary folders (AppData\Local\Temp), and Outlook content cache (INetCache\Content.Outlook). This campaign has been observed as recently as October 2024, where Midnight Blizzard conducted large-scale spear-phishing using RDP files. Defenders should monitor for the execution of mstsc.exe with RDP files from untrusted locations.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker crafts a spearphishing email containing a malicious RDP file as an attachment.</li>
<li>The victim receives the email and, lured by social engineering, downloads the attached RDP file to a local directory, often the Downloads folder.</li>
<li>The victim double-clicks the RDP file, initiating the execution of <code>mstsc.exe</code>.</li>
<li><code>mstsc.exe</code> reads the connection settings from the RDP file, which may include malicious configurations such as altered gateway settings or credential theft mechanisms.</li>
<li><code>mstsc.exe</code> attempts to establish a remote desktop connection based on the RDP file&rsquo;s settings.</li>
<li>If the connection is successful, the attacker gains unauthorized access to the remote system.</li>
<li>The attacker may then perform reconnaissance, move laterally, and escalate privileges within the compromised network.</li>
<li>The final objective could be data exfiltration, ransomware deployment, or establishing persistent access.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack using malicious RDP files can lead to unauthorized access to sensitive systems and data. The consequences range from data breaches and financial loss to complete system compromise and disruption of operations. The Microsoft Security blog reported a large-scale spear-phishing campaign utilizing RDP files as recently as October 2024. The targets may be across various sectors, with potentially widespread impact depending on the attacker&rsquo;s objectives and the scope of the compromised network.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Remote Desktop File Opened from Suspicious Path</code> to your SIEM and tune for your environment, focusing on the specified file paths and <code>mstsc.exe</code> execution.</li>
<li>Enable process creation logging with command-line arguments to capture the execution of <code>mstsc.exe</code> and the paths of the RDP files being opened.</li>
<li>Educate users on the risks associated with opening RDP files from untrusted sources, particularly those received as email attachments.</li>
<li>Implement strict email filtering to block or quarantine emails with RDP attachments from external sources.</li>
<li>Monitor network connections for unusual RDP traffic originating from systems where suspicious RDP files were executed.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>initial-access</category><category>rdp</category><category>phishing</category><category>windows</category></item><item><title>Potential WSUS Abuse for Lateral Movement via PsExec</title><link>https://feed.craftedsignal.io/briefs/2024-07-wsus-psexec/</link><pubDate>Mon, 04 May 2026 14:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-07-wsus-psexec/</guid><description>Adversaries may exploit Windows Server Update Services (WSUS) to execute PsExec for lateral movement within a network by abusing the trusted update mechanism to run signed binaries.</description><content:encoded><![CDATA[<p>This detection identifies potential abuse of Windows Server Update Services (WSUS) for lateral movement by executing PsExec. WSUS is designed to manage updates for Microsoft products, ensuring only signed binaries are executed. Attackers can exploit this by using WSUS to distribute and execute Microsoft-signed tools like PsExec, which can then be used to move laterally within the network. This technique leverages the trust relationship inherent in WSUS to bypass security controls. The rule focuses on detecting suspicious processes initiated by <code>wuauclt.exe</code> (the Windows Update client) executing PsExec from the SoftwareDistribution Download Install directories. Defenders should monitor WSUS activity and PsExec executions to detect and respond to this potential threat.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker compromises a system within the target network.</li>
<li>The attacker gains control over the WSUS server or performs a man-in-the-middle attack to spoof WSUS.</li>
<li>The attacker uses the compromised WSUS server to approve a malicious update containing PsExec.</li>
<li>The WSUS client (<code>wuauclt.exe</code>) on targeted machines downloads the &ldquo;approved&rdquo; update from the WSUS server, placing PsExec in the <code>C:\Windows\SoftwareDistribution\Download\Install\</code> directory.</li>
<li>The WSUS client executes PsExec.</li>
<li>PsExec is used to execute commands or transfer files to other systems on the network.</li>
<li>The attacker uses the compromised systems to gather credentials or move laterally to other high-value targets.</li>
<li>The attacker achieves their objective, such as data exfiltration or ransomware deployment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to achieve lateral movement within the network, leading to the compromise of additional systems and sensitive data. This can result in data breaches, financial loss, and reputational damage. The scope of impact depends on the level of access achieved by the attacker and the value of the compromised systems.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>WSUS PsExec Execution</code> to detect potential WSUS abuse involving PsExec execution.</li>
<li>Enable Sysmon process creation logging (Event ID 1) to gain visibility into process executions, as referenced in the <a href="https://ela.st/sysmon-event-1-setup">setup instructions</a>.</li>
<li>Implement enhanced monitoring and logging for WSUS activities to detect unauthorized changes or updates.</li>
<li>Investigate and remove any unauthorized binaries found in the <code>C:\Windows\SoftwareDistribution\Download\Install\</code> directory.</li>
<li>Review and restrict the accounts authorized to manage WSUS to prevent unauthorized modifications.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>lateral-movement</category><category>wsus</category><category>psexec</category><category>windows</category></item><item><title>Potential WPAD Spoofing via DNS Record Creation</title><link>https://feed.craftedsignal.io/briefs/2024-06-wpad-spoofing/</link><pubDate>Mon, 04 May 2026 14:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-06-wpad-spoofing/</guid><description>Detection of a Windows DNS record creation event (5137) with an ObjectDN attribute containing 'DC=wpad', which indicates a potential WPAD spoofing attack to enable privilege escalation and lateral movement.</description><content:encoded><![CDATA[<p>Web Proxy Auto-Discovery (WPAD) is a protocol that allows devices to automatically discover proxy settings, but it can be exploited by attackers to redirect traffic through malicious proxies. This detection identifies the creation of a &ldquo;wpad&rdquo; DNS record, which is a common technique used in WPAD spoofing attacks. Attackers can disable the Global Query Block List (GQBL) and create a rogue &ldquo;wpad&rdquo; record. The event code 5137 is logged when directory service changes are made, and this rule focuses on changes related to the creation of wpad records. This is important for defenders because successful WPAD spoofing can lead to credential access and lateral movement within the network.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to a system with sufficient privileges to modify DNS records, often an Active Directory account.</li>
<li>The attacker disables the Global Query Block List (GQBL) to allow the creation of unauthorized DNS records.</li>
<li>The attacker creates a new DNS record for &ldquo;wpad&rdquo; in Active Directory DNS, using event code 5137.</li>
<li>The &lsquo;ObjectDN&rsquo; attribute of the DNS record contains &ldquo;DC=wpad,*&rdquo;.</li>
<li>Clients on the network query the DNS server for the &ldquo;wpad&rdquo; record.</li>
<li>The DNS server responds with the attacker-controlled IP address.</li>
<li>Clients automatically configure their proxy settings to use the attacker&rsquo;s proxy server.</li>
<li>The attacker intercepts network traffic, potentially capturing credentials and sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful WPAD spoofing can allow attackers to intercept sensitive information, including credentials, as users browse the web. This can lead to further compromise of systems and data within the network. While the number of victims is difficult to quantify, the impact can be significant within an organization if the attack is successful. This attack targets organizations using default WPAD settings.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Audit Directory Service Changes to generate Windows Security Event Logs (event code 5137) as described in the setup instructions to ensure the rule functions correctly.</li>
<li>Deploy the Sigma rule &ldquo;Potential WPAD Spoofing via DNS Record Creation&rdquo; to your SIEM to detect suspicious &ldquo;wpad&rdquo; record creations.</li>
<li>Review Active Directory change history when the Sigma rule triggers to determine who made the changes to the DNS records and whether these changes were authorized, as outlined in the investigation guide.</li>
<li>Regularly verify the configuration of the Global Query Block List (GQBL) to ensure it has not been disabled or altered, as described in the investigation guide.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>credential-access</category><category>wpad-spoofing</category><category>windows</category></item><item><title>Potential Secure File Deletion via SDelete Utility</title><link>https://feed.craftedsignal.io/briefs/2024-01-28-sdelete-filename-rename/</link><pubDate>Mon, 04 May 2026 14:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-28-sdelete-filename-rename/</guid><description>This rule detects file name patterns generated by the use of Sysinternals SDelete utility, potentially used by attackers to delete forensic indicators and hinder data recovery efforts.</description><content:encoded><![CDATA[<p>The Sysinternals SDelete utility is a legitimate tool developed by Microsoft for securely deleting files by overwriting and renaming them multiple times. While intended for secure data disposal, adversaries can abuse SDelete to remove forensic artifacts, destroy evidence of their activities, and impede data recovery efforts after a successful ransomware attack or data theft. This activity can be used as a post-exploitation technique. This detection rule focuses on identifying file name patterns indicative of SDelete&rsquo;s operation, specifically detecting files with names resembling &ldquo;*AAA.AAA&rdquo;. The rule is designed to work with various endpoint detection and response solutions, including Elastic Defend, Microsoft Defender XDR, SentinelOne Cloud Funnel, and CrowdStrike.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the system (e.g., via phishing or exploiting a vulnerability).</li>
<li>The attacker escalates privileges to gain the necessary permissions to delete files.</li>
<li>The attacker deploys or utilizes an existing copy of the SDelete utility.</li>
<li>The attacker executes SDelete against targeted files or directories.</li>
<li>SDelete overwrites the targeted file(s) multiple times with random data.</li>
<li>SDelete renames the file(s) multiple times, often with patterns such as &ldquo;*AAA.AAA&rdquo;.</li>
<li>SDelete deletes the file(s) making recovery difficult.</li>
<li>The attacker removes SDelete or any associated tools to further cover their tracks.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this technique can result in the permanent deletion of crucial forensic artifacts, log files, or even critical data. This can severely hinder incident response efforts, making it challenging to identify the scope of the attack, the attacker&rsquo;s methods, and the compromised assets. The number of victims and affected sectors depends on the scale of the initial breach and the attacker&rsquo;s objectives.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the &ldquo;Potential Secure File Deletion via SDelete Utility&rdquo; detection rule to your SIEM and tune for your environment.</li>
<li>Investigate any alerts generated by the detection rule, focusing on the process execution chain and identifying the user account involved.</li>
<li>Review the privileges assigned to the user account to ensure the least privilege principle is followed.</li>
<li>Enable Sysmon Event ID 11 (File Create) logging to enhance visibility into file creation events.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>defense evasion</category><category>impact</category><category>windows</category></item><item><title>Potential Remote File Execution via MSIEXEC</title><link>https://feed.craftedsignal.io/briefs/2026-05-msiexec-remote-install/</link><pubDate>Mon, 04 May 2026 14:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-msiexec-remote-install/</guid><description>The rule detects the execution of the built-in Windows Installer, msiexec.exe, to install a remote package potentially abused by adversaries for initial access and defense evasion.</description><content:encoded><![CDATA[<p>The Windows Installer (msiexec.exe) is a built-in Windows component used for installing, modifying, and removing software. Adversaries may abuse msiexec.exe to launch local or network accessible MSI files, bypassing security controls and potentially leading to initial access or defense evasion. This activity is often part of a broader attack chain, used to deliver and execute malicious payloads. The detection rule provided by Elastic identifies suspicious msiexec.exe activity by monitoring process starts, network connections, and child processes. It filters out known benign signatures and paths to highlight potential misuse. This detection is designed to work with Elastic Defend data.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access via phishing (T1566) or other means to execute commands on the target system.</li>
<li>The attacker uses msiexec.exe with the <code>/V</code> parameter to initiate the installation of a remote MSI package. This allows the attacker to bypass typical execution restrictions.</li>
<li>Msiexec.exe attempts a network connection (T1105) to retrieve the remote MSI package from a malicious server.</li>
<li>Msiexec.exe spawns a child process to handle the installation of the downloaded MSI package.</li>
<li>The spawned child process executes malicious code embedded within the MSI package.</li>
<li>The malicious code performs actions such as installing malware, modifying system settings, or establishing persistence.</li>
<li>The attacker leverages the compromised system for further lateral movement or data exfiltration.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to the installation of malware, unauthorized access to sensitive data, and further compromise of the affected system and network. While this specific rule has a low risk score, it can be an early indicator of more serious attacks. It is crucial to investigate any alerts generated by this rule to determine the full scope and impact of the potential compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule provided below to your SIEM to detect suspicious usage of <code>msiexec.exe</code> to install remote packages. Tune the rule for your environment by adding exceptions for legitimate software installation processes.</li>
<li>Enable process monitoring and network connection logging on Windows endpoints to provide the necessary data for the Sigma rule to function effectively (Data Source: Elastic Defend).</li>
<li>Review the &ldquo;Possible investigation steps&rdquo; section in the Elastic rule&rsquo;s documentation to investigate potential false positives and legitimate uses of <code>msiexec.exe</code>.</li>
<li>Implement application control policies to restrict the execution of unauthorized applications, including potentially malicious MSI packages.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>msiexec</category><category>remote-file-execution</category><category>initial-access</category><category>defense-evasion</category><category>windows</category></item><item><title>Potential Pass-the-Hash (PtH) Attempt Detection</title><link>https://feed.craftedsignal.io/briefs/2024-01-potential-pth/</link><pubDate>Mon, 04 May 2026 14:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-potential-pth/</guid><description>This rule detects potential Pass-the-Hash (PtH) attempts in Windows environments by monitoring successful authentications with specific user IDs (S-1-5-21-* or S-1-12-1-*) and the `seclogo` logon process, where attackers use stolen password hashes to authenticate and move laterally across systems without needing plaintext passwords.</description><content:encoded><![CDATA[<p>Pass-the-Hash (PtH) is a technique where attackers leverage stolen password hashes to authenticate and move laterally within a Windows environment, bypassing standard system access controls. Instead of needing the plaintext password, adversaries use a hash of the password to authenticate to a remote service or server. This detection rule focuses on identifying potential PtH attempts by monitoring for successful logins using specific user IDs (S-1-5-21-* or S-1-12-1-*) and the <code>seclogo</code> logon process, which is commonly associated with credential theft and misuse. The rule aims to detect anomalous authentication patterns indicating that an attacker is using PtH to gain unauthorized access to systems. This is important because successful PtH attacks can lead to widespread compromise of sensitive data and critical infrastructure.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to a system through phishing or exploiting a vulnerability.</li>
<li>The attacker dumps password hashes from the compromised system using tools like Mimikatz.</li>
<li>The attacker identifies a target system within the network.</li>
<li>The attacker uses the stolen password hash to authenticate to the target system using the <code>seclogo</code> logon process.</li>
<li>Windows validates the hash, granting the attacker access without requiring the plaintext password.</li>
<li>The attacker successfully authenticates with the stolen credentials and a user ID matching the pattern S-1-5-21-* or S-1-12-1-*.</li>
<li>The attacker leverages their unauthorized access to move laterally to other systems or access sensitive data.</li>
<li>The attacker achieves their final objective, such as data exfiltration or deploying ransomware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful Pass-the-Hash attacks can lead to significant damage, including unauthorized access to sensitive data, lateral movement within the network, and potential data exfiltration or ransomware deployment. Organizations can experience financial losses, reputational damage, and operational disruptions. While the specific number of victims is not stated, PtH is a common technique used in many breaches, potentially affecting any organization that relies on Windows authentication.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Audit Logon to generate the necessary Windows Security Event Logs as referenced in the setup instructions <a href="https://ela.st/audit-logon">https://ela.st/audit-logon</a>.</li>
<li>Deploy the Sigma rule to your SIEM to detect potential Pass-the-Hash attempts. Tune the rule to account for legitimate uses of the <code>seclogo</code> logon process.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on correlating the successful authentication events with other security logs to identify any lateral movement or access to sensitive systems.</li>
<li>Review and update access controls and permissions for the affected accounts to ensure they adhere to the principle of least privilege after an incident, as detailed in the Response and Remediation section.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>lateral-movement</category><category>threat-detection</category><category>windows</category></item><item><title>Potential NetNTLMv1 Downgrade Attack via Registry Modification</title><link>https://feed.craftedsignal.io/briefs/2026-05-netntlmv1-downgrade/</link><pubDate>Mon, 04 May 2026 14:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-netntlmv1-downgrade/</guid><description>This brief details a registry modification attack that downgrades the system to NTLMv1 authentication, enabling NetNTLMv1 downgrade attacks, typically performed with local administrator privileges on Windows systems.</description><content:encoded><![CDATA[<p>This rule detects a specific defense evasion technique where an attacker modifies the Windows registry to force a system to use the less secure NTLMv1 authentication protocol. This is known as a NetNTLMv1 downgrade attack. The registry modification involves changing the <code>LmCompatibilityLevel</code> value, which controls the authentication level. Attackers with local administrator privileges can perform this modification to weaken the authentication mechanism, making it easier to intercept and crack credentials. The rule is designed to detect this activity by monitoring registry events from various sources, including Elastic Defend, Microsoft Defender XDR, SentinelOne Cloud Funnel, Sysmon, and Crowdstrike. It is important to monitor for this activity as it can lead to credential theft and further compromise of the system.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains local administrator privileges on a Windows system.</li>
<li>The attacker uses a registry editor or command-line tool (e.g., <code>reg.exe</code>, PowerShell) to modify the <code>LmCompatibilityLevel</code> value in the registry.</li>
<li>The attacker navigates to one of the following registry paths: <code>HKLM\System\CurrentControlSet\Control\Lsa\LmCompatibilityLevel</code> or <code>HKLM\SYSTEM\CurrentControlSet\Control\Lsa</code>.</li>
<li>The attacker sets the <code>LmCompatibilityLevel</code> value to &ldquo;0&rdquo;, &ldquo;1&rdquo;, or &ldquo;2&rdquo; (or their hexadecimal equivalents &ldquo;0x00000000&rdquo;, &ldquo;0x00000001&rdquo;, &ldquo;0x00000002&rdquo;). These values force the system to use NTLMv1.</li>
<li>The system now uses NTLMv1 for authentication attempts.</li>
<li>The attacker initiates a man-in-the-middle attack to capture NTLMv1 authentication traffic using tools like Responder or Inveigh.</li>
<li>The captured NTLMv1 hashes are cracked using brute-force or dictionary attacks, revealing the user&rsquo;s credentials.</li>
<li>The attacker uses the compromised credentials to gain unauthorized access to network resources or other systems.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful NetNTLMv1 downgrade attack can lead to the compromise of user credentials, enabling attackers to move laterally within the network, access sensitive data, and potentially escalate privileges. The impact can range from data breaches to complete system compromise, depending on the attacker&rsquo;s objectives and the compromised user&rsquo;s privileges.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Potential NetNTLMv1 Downgrade Attack&rdquo; to detect registry modifications setting <code>LmCompatibilityLevel</code> to insecure values (0, 1, 2) within the specified registry paths.</li>
<li>Enable Sysmon registry event logging to ensure the necessary data is available for the Sigma rule to function correctly.</li>
<li>Review registry event logs for unauthorized modifications of <code>LmCompatibilityLevel</code> to confirm legitimate administrative actions.</li>
<li>Implement strict access control policies to limit local administrator privileges and reduce the attack surface.</li>
<li>Monitor the references URL for updates on recommended security configurations related to NTLM authentication.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>ntlm</category><category>registry-modification</category><category>windows</category></item><item><title>Potential Evasion via Windows Filtering Platform Blocking Security Software</title><link>https://feed.craftedsignal.io/briefs/2026-05-wfp-evasion/</link><pubDate>Mon, 04 May 2026 14:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-wfp-evasion/</guid><description>Adversaries may add malicious Windows Filtering Platform (WFP) rules to prevent endpoint security solutions from sending telemetry data, impairing defenses, which this rule detects by identifying multiple WFP block events where the process name is associated with endpoint security software.</description><content:encoded><![CDATA[<p>The Windows Filtering Platform (WFP) provides APIs and system services for network filtering and packet processing. Attackers can abuse WFP by creating malicious rules to block endpoint security processes, hindering their ability to send telemetry. This can be achieved by tools like Shutter, EDRSilencer, and Nighthawk. This detection rule identifies patterns of blocked network events linked to security software processes, signaling potential evasion tactics. The rule specifically looks for blocked network events linked to processes associated with known security software, aiming to detect and alert on attempts to disable or modify security tools. This behavior is especially concerning as it allows attackers to operate with reduced visibility.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial access to the target system (e.g., via compromised credentials or exploiting a vulnerability).</li>
<li>The attacker escalates privileges to gain administrative rights, necessary to interact with the Windows Filtering Platform.</li>
<li>The attacker uses a tool or script (e.g., leveraging the <code>netsh</code> command or custom WFP API calls) to create a new WFP filter.</li>
<li>The WFP filter is configured to block network traffic originating from specific processes associated with endpoint security software (e.g., <code>elastic-agent.exe</code>, <code>sysmon.exe</code>).</li>
<li>The system begins blocking network communication from the targeted security software.</li>
<li>The attacker executes malicious commands or malware on the system, knowing that security telemetry will be suppressed.</li>
<li>The attacker moves laterally within the network, repeating the WFP filter deployment on other systems to further impair defenses.</li>
<li>The attacker achieves their final objective, such as data exfiltration or ransomware deployment, with reduced risk of detection.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack using WFP to impair defenses can lead to a significant reduction in the effectiveness of endpoint security solutions. This can result in delayed detection of malicious activities, increased dwell time for attackers, and ultimately, a higher likelihood of successful data breaches or ransomware attacks. With endpoint telemetry blocked, organizations may remain unaware of the ongoing compromise until significant damage has occurred. The number of affected systems can vary depending on the attacker&rsquo;s scope and objectives.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable and review Windows Audit Filtering Platform Connection and Packet Drop events to populate the logs required for the provided EQL rule (logs-system.security*, logs-windows.forwarded*, winlogbeat-*).</li>
<li>Deploy the provided EQL rule to your SIEM to detect suspicious WFP modifications and tune for your environment.</li>
<li>Investigate any alerts generated by the EQL rule, focusing on identifying the specific processes being blocked and the source of the WFP rule modifications.</li>
<li>Regularly review and audit WFP rules to identify any unauthorized or suspicious entries.</li>
<li>Implement strict access controls and monitoring for systems authorized to modify WFP rules.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>windows-filtering-platform</category><category>endpoint-security</category></item><item><title>Potential DLL Side-Loading via Trusted Microsoft Programs</title><link>https://feed.craftedsignal.io/briefs/2026-05-dll-side-loading/</link><pubDate>Mon, 04 May 2026 14:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-dll-side-loading/</guid><description>This rule detects potential DLL side-loading attempts by identifying instances of Windows trusted programs (WinWord.exe, EXPLORER.EXE, w3wp.exe, DISM.EXE) being started after being renamed or from a non-standard path, which is a common technique to evade defenses by side-loading a malicious DLL into the memory space of a trusted process.</description><content:encoded><![CDATA[<p>This detection rule identifies instances of Windows trusted programs such as WinWord.exe, EXPLORER.EXE, w3wp.exe, and DISM.EXE executing from unusual paths or after being renamed, which may indicate DLL side-loading. DLL side-loading is a defense evasion technique where a malicious DLL is placed in the same directory as a legitimate executable. When the executable runs, it may load the malicious DLL instead of the legitimate one, allowing the attacker to execute arbitrary code within the context of the trusted process. The detection logic focuses on process executions that deviate from standard installation paths. The targeted processes are commonly used and often whitelisted, making this a potent technique for adversaries to bypass security controls.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the system (e.g., through phishing or exploitation of a vulnerability).</li>
<li>The attacker identifies a trusted Windows program vulnerable to DLL side-loading (WinWord.exe, EXPLORER.EXE, w3wp.exe, or DISM.EXE).</li>
<li>The attacker drops a malicious DLL into a directory where the trusted program is expected to load DLLs from, often alongside a renamed or copied version of the legitimate executable.</li>
<li>Alternatively, the attacker renames the trusted program and places it in a non-standard path.</li>
<li>The attacker executes the renamed or moved trusted program from the non-standard path.</li>
<li>The trusted program loads the malicious DLL due to DLL search order hijacking.</li>
<li>The malicious DLL executes arbitrary code within the context of the trusted process.</li>
<li>The attacker achieves persistence, elevates privileges, or performs other malicious activities, potentially evading detection due to the trusted process context.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful DLL side-loading attack allows the attacker to execute arbitrary code within the context of a trusted Microsoft process. This can lead to privilege escalation, persistence, and further compromise of the system. Since the malicious code is running within a trusted process, it can bypass application whitelisting and other security controls, making it difficult to detect. This can lead to data theft, system disruption, or the installation of malware.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Potential DLL Side-Loading via Trusted Microsoft Programs&rdquo; to your SIEM to detect suspicious executions of trusted programs from non-standard paths or with modifications.</li>
<li>Enable Sysmon process creation logging (Event ID 1) to provide the necessary data for the Sigma rule to function correctly.</li>
<li>Review and tune the exclusion paths in the Sigma rule to avoid false positives from legitimate software updates, custom enterprise applications, or virtual environments.</li>
<li>Monitor process execution paths using the Sigma rule &ldquo;Potential DLL Side-Loading via Trusted Microsoft Programs&rdquo; and investigate any deviations from standard installation paths.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>execution</category><category>dll-side-loading</category><category>windows</category></item><item><title>Potential Data Exfiltration via Rclone</title><link>https://feed.craftedsignal.io/briefs/2026-05-rclone-exfiltration/</link><pubDate>Mon, 04 May 2026 14:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-rclone-exfiltration/</guid><description>Attackers are abusing the legitimate file synchronization tool rclone, often renamed to masquerade as legitimate software, to exfiltrate data to cloud storage or remote endpoints.</description><content:encoded><![CDATA[<p>Attackers are leveraging Rclone, a legitimate command-line program to manage files on cloud storage, for malicious purposes. The primary abuse case involves renaming Rclone (e.g., to TrendFileSecurityCheck.exe) to evade detection based on process name. Once renamed, attackers use Rclone&rsquo;s copy/sync functionalities with cloud backends like S3 or HTTP endpoints. They often employ <code>--include</code> filters to target specific sensitive file types for exfiltration. This activity is frequently blended with regular administrative traffic to further obfuscate the malicious intent. Defenders should be aware of this tactic, particularly when unusual processes are observed interacting with cloud storage services.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the system through an undisclosed method.</li>
<li>Rclone is downloaded or transferred to the victim machine.</li>
<li>The rclone executable is renamed to a benign-sounding name (e.g., TrendFileSecurityCheck.exe) to masquerade as a legitimate system utility.</li>
<li>The attacker configures rclone to connect to a cloud storage backend (e.g., an S3 bucket or HTTP endpoint) controlled by the attacker.</li>
<li>A command is executed using the renamed rclone executable, specifying the <code>copy</code> or <code>sync</code> command.</li>
<li>The command includes <code>--include</code> flags to filter and select specific file types (e.g., documents, source code, databases) for exfiltration.</li>
<li>Rclone transfers the targeted files from the victim machine to the attacker&rsquo;s cloud storage backend, potentially using the <code>--transfers</code> option for faster exfiltration.</li>
<li>The attacker accesses the exfiltrated data from their cloud storage.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to the exfiltration of sensitive data, including proprietary information, customer data, financial records, or intellectual property. The impact can range from reputational damage and financial losses to legal and regulatory repercussions. The scope of damage depends on the sensitivity and volume of the exfiltrated data, the number of affected systems, and the effectiveness of the attacker&rsquo;s filtering criteria.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Suspicious Rclone Usage</code> to detect renamed rclone executables executing copy/sync commands.</li>
<li>Enable Sysmon process creation logging (Event ID 1) to collect the necessary process execution data for the Sigma rules.</li>
<li>Investigate any process identified by the Sigma rule <code>Suspicious Rclone Usage</code> by examining command-line arguments for cloud backend destinations and <code>--include</code> filters.</li>
<li>Monitor network connections for unusual outbound traffic to cloud storage providers (AWS S3, Azure Blob Storage, Google Cloud Storage) from processes other than approved backup solutions.</li>
<li>Implement application control policies to restrict the execution of unauthorized or renamed executables.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>data-exfiltration</category><category>rclone</category><category>masquerading</category></item><item><title>Potential Computer Account NTLM Relay Activity</title><link>https://feed.craftedsignal.io/briefs/2024-07-computer-account-relay/</link><pubDate>Mon, 04 May 2026 14:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-07-computer-account-relay/</guid><description>Detection of potential NTLM relay attacks targeting computer accounts by identifying authentication events originating from hosts other than the account's owner, indicating possible credential theft and misuse.</description><content:encoded><![CDATA[<p>This detection rule identifies potential NTLM relay attacks targeting Windows computer accounts. The rule focuses on authentication events where a computer account (identified by a name ending in &lsquo;$&rsquo;) is used for network logon from an IP address that does not match the IP address of the host owning the account. Such activity can indicate that an attacker has captured the computer account&rsquo;s NTLM hash through forced authentication techniques and is relaying it from a different machine to gain unauthorized access to resources. The rule is designed to detect activity within the last 9 months and relies on Windows Security Event Logs for analysis.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial access to the network through various means (e.g., phishing, exploiting a vulnerability).</li>
<li>The attacker initiates a forced authentication attack (T1187) to coerce a target machine to authenticate to a system under the attacker&rsquo;s control.</li>
<li>The attacker captures the NTLM hash of a computer account, which is automatically generated for every machine joined to the domain.</li>
<li>The attacker uses the captured NTLM hash to relay authentication requests to other systems on the network. This leverages the &ldquo;Adversary-in-the-Middle&rdquo; technique (T1557), specifically &ldquo;LLMNR/NBT-NS Poisoning and SMB Relay&rdquo; (T1557.001).</li>
<li>The relay attack manifests as a network logon event (event code 4624 or 4625) where the source IP address does not match the IP address of the host that owns the computer account. The AuthenticationPackageName is NTLM.</li>
<li>The attacker gains unauthorized access to resources or performs actions on behalf of the compromised computer account.</li>
<li>The attacker may then attempt lateral movement, privilege escalation, or data exfiltration depending on the targeted resource.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful NTLM relay attacks against computer accounts can grant attackers unauthorized access to critical systems and data within the Windows domain. This could lead to privilege escalation, lateral movement, and ultimately, compromise of the entire domain. While the exact number of affected organizations is unknown, any organization relying on NTLM authentication and Active Directory is potentially vulnerable. The impact includes data breaches, system compromise, and significant disruption to business operations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Audit Logon in Windows to generate the necessary security events for this rule to function, as described in the provided setup instructions.</li>
<li>Deploy the Sigma rule below to your SIEM to detect potential computer account relay activity and tune for your environment.</li>
<li>Investigate any alerts generated by the Sigma rule by comparing the source.ip to the target server host.ip addresses to confirm it&rsquo;s indeed a remote use of the machine account.</li>
<li>Strengthen network segmentation to limit the attack surface for credential relay attacks, as recommended in the remediation steps.</li>
<li>Monitor for anomalous authentication patterns and NTLM-related activity to identify and respond to potential relay attacks.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>credential-access</category><category>threat-detection</category><category>windows</category></item><item><title>Potential Active Directory Replication Account Backdoor</title><link>https://feed.craftedsignal.io/briefs/2026-05-dcsync-backdoor/</link><pubDate>Mon, 04 May 2026 14:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-dcsync-backdoor/</guid><description>Attackers can modify Active Directory object security descriptors to grant DCSync rights to unauthorized accounts, creating a backdoor to extract credential data.</description><content:encoded><![CDATA[<p>This detection rule identifies modifications to the <code>nTSecurityDescriptor</code> attribute within Active Directory (AD) objects that grant DCSync-related permissions to a user or computer account. This technique allows attackers to create a persistent backdoor, enabling them to re-obtain access to user and computer account hashes. The modification involves assigning specific GUIDs that represent replication rights (<code>1131f6ad-9c07-11d1-f79f-00c04fc2dcd2</code>, <code>1131f6aa-9c07-11d1-f79f-00c04fc2dcd2</code>, <code>89e95b76-444d-4c62-991a-0facbeda640c</code>) to an account&rsquo;s security descriptor. This allows the attacker to then use DCSync to retrieve credentials from the domain, effectively bypassing normal authentication mechanisms.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to an account with sufficient privileges to modify Active Directory objects (e.g., Domain Admin).</li>
<li>The attacker uses AD management tools (PowerShell, ADSI Edit, etc.) to target a specific user or computer account.</li>
<li>The attacker modifies the <code>nTSecurityDescriptor</code> attribute of the targeted account.</li>
<li>The attacker grants replication rights to the targeted account by adding specific Access Control Entries (ACEs) containing the GUIDs <code>1131f6ad-9c07-11d1-f79f-00c04fc2dcd2</code>, <code>1131f6aa-9c07-11d1-f79f-00c04fc2dcd2</code>, and <code>89e95b76-444d-4c62-991a-0facbeda640c</code>.</li>
<li>The attacker uses the DCSync technique, impersonating a domain controller, to request password hashes.</li>
<li>The Active Directory server, believing the request is legitimate due to the granted replication rights, provides the attacker with the requested credential information.</li>
<li>The attacker obtains password hashes for domain users and computers.</li>
<li>The attacker uses the obtained credentials for lateral movement, privilege escalation, or data exfiltration.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to compromise the entire Active Directory domain by gaining access to sensitive credential data. This could lead to complete control over the network, including access to critical systems, sensitive data, and the ability to disrupt business operations. The modification of security descriptors creates a persistent backdoor that can be used repeatedly to harvest credentials.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Audit Directory Service Changes to generate the necessary event logs for detection (<a href="https://ela.st/audit-directory-service-changes)">https://ela.st/audit-directory-service-changes)</a>.</li>
<li>Deploy the Sigma rule provided below to detect unauthorized modifications to the <code>nTSecurityDescriptor</code> attribute. Tune the rule to exclude legitimate administrative accounts or scripts that may perform authorized modifications.</li>
<li>Monitor Windows Security Event Logs (event code 5136) for changes to the <code>nTSecurityDescriptor</code> attribute and investigate any unexpected modifications, focusing on the presence of DCSync-related GUIDs.</li>
<li>Regularly review and audit Active Directory permissions, focusing on accounts with replication rights, to ensure they are legitimate and necessary.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>credential-access</category><category>persistence</category><category>active-directory</category><category>dcsync</category></item><item><title>Potential Account Takeover - Logon from New Source IP</title><link>https://feed.craftedsignal.io/briefs/2024-01-account-takeover-new-source-ip/</link><pubDate>Mon, 04 May 2026 14:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-account-takeover-new-source-ip/</guid><description>The rule identifies a user account that normally logs in with high volume from one source IP suddenly logging in from a different source IP, potentially indicating account takeover or use of stolen credentials from a new location.</description><content:encoded><![CDATA[<p>This detection rule identifies potential account takeover activity by analyzing Windows Security Event Logs for unusual login patterns. Specifically, it looks for user accounts that typically log in with high frequency from a single source IP address but then exhibit successful logins from a different source IP address with significantly lower frequency. This pattern may indicate that an attacker has compromised the account credentials and is accessing the network from a new, potentially malicious, location. This activity is detected by analyzing Windows Security Event ID 4624 events related to successful logins. The rule is designed to trigger when a user account logs in from a new IP address after establishing a pattern of high-volume logins from a primary IP address.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access:</strong> The attacker gains access to valid user credentials through methods such as phishing, credential stuffing, or malware. (T1078)</li>
<li><strong>Successful Logon:</strong> The attacker uses the compromised credentials to successfully log in to a Windows system from a new IP address (Event ID 4624, Logon Type Network/RemoteInteractive).</li>
<li><strong>Lateral Movement (Possible):</strong> Once authenticated, the attacker may attempt to move laterally within the network to access additional resources or systems.</li>
<li><strong>Privilege Escalation (Possible):</strong> The attacker may attempt to escalate their privileges to gain administrative access to the system or domain (TA0004).</li>
<li><strong>Data Exfiltration (Possible):</strong> The attacker may attempt to exfiltrate sensitive data from the compromised system or network.</li>
<li><strong>Persistence (Possible):</strong> The attacker may attempt to establish persistence mechanisms to maintain access to the system or network over time.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful account takeover can have significant consequences, including unauthorized access to sensitive data, lateral movement within the network, privilege escalation, and data exfiltration. The rule specifically looks for logon patterns indicative of account takeover. If an account is taken over, attackers could potentially gain access to systems and data the user has rights to access.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule provided below to your SIEM and tune for your environment, paying close attention to the <code>max_logon</code> threshold.</li>
<li>Enable Audit Logon within Windows to ensure the events needed for detection are available as mentioned in the setup instructions.</li>
<li>Investigate any alerts generated by the Sigma rule by confirming with the account owner if they logged in from the new source IP.</li>
<li>Check the new source IP for reputation, geography, and whether it is expected as described in the rule&rsquo;s triage steps.</li>
<li>Correlate any generated alerts with other alerts for the same user or source IP such as logon failures, password changes, or MFA changes as part of your investigation.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>account-takeover</category><category>credential-access</category><category>windows</category></item><item><title>Local Account TokenFilter Policy Modification for Defense Evasion and Lateral Movement</title><link>https://feed.craftedsignal.io/briefs/2024-01-02-local-account-token-filter-policy-disabled/</link><pubDate>Mon, 04 May 2026 14:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-02-local-account-token-filter-policy-disabled/</guid><description>Adversaries may modify the LocalAccountTokenFilterPolicy registry key to bypass User Account Control (UAC) and gain elevated privileges remotely by granting high-integrity tokens to remote connections from local administrators, facilitating lateral movement and defense evasion.</description><content:encoded><![CDATA[<p>The LocalAccountTokenFilterPolicy is a Windows registry setting that, when enabled (set to 1), allows remote connections from local members of the Administrators group to be granted full high-integrity tokens during negotiation. This bypasses User Account Control (UAC) restrictions, allowing for elevated privileges remotely. Attackers may modify this registry setting to facilitate lateral movement within a network. This rule detects modifications to this specific registry setting, alerting on potential unauthorized changes that could lead to defense evasion and privilege escalation. The modification of this policy has been observed being leveraged in conjunction with pass-the-hash attacks.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to a system through an exploit, such as phishing or exploiting a vulnerability.</li>
<li>The attacker obtains local administrator credentials on the compromised system.</li>
<li>The attacker modifies the LocalAccountTokenFilterPolicy registry key to a value of 1. This is done to allow remote connections from local administrator accounts to receive high-integrity tokens. The registry key is typically located at <code>HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\LocalAccountTokenFilterPolicy</code>.</li>
<li>The attacker leverages a &ldquo;pass the hash&rdquo; attack (T1550.002) using the compromised local administrator credentials.</li>
<li>The attacker attempts to move laterally to other systems within the network using the &ldquo;pass the hash&rdquo; technique and the modified LocalAccountTokenFilterPolicy.</li>
<li>Due to the LocalAccountTokenFilterPolicy being enabled, the remote connection from the local administrator account receives a full high-integrity token.</li>
<li>The attacker bypasses UAC on the remote system, gaining elevated privileges.</li>
<li>The attacker performs malicious activities on the remote system, such as data exfiltration or deploying ransomware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful modification of the LocalAccountTokenFilterPolicy allows attackers to bypass User Account Control (UAC) and gain elevated privileges on remote systems, potentially leading to unauthorized access to sensitive data, lateral movement across the network, and the deployment of ransomware. The overall impact can include data breaches, financial loss, and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Local Account TokenFilter Policy Enabled</code> to your SIEM and tune for your environment to detect unauthorized modifications to the LocalAccountTokenFilterPolicy registry key.</li>
<li>Enable Sysmon registry event logging to capture modifications to the registry, which is required for the <code>Local Account TokenFilter Policy Enabled</code> Sigma rule.</li>
<li>Review the processes excluded in the rule query and ensure they are legitimate and necessary to prevent false positives.</li>
<li>Monitor registry events for changes to the <code>HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\LocalAccountTokenFilterPolicy</code> path, specifically looking for changes to the value data.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>lateral-movement</category><category>persistence</category><category>registry-modification</category></item><item><title>Enumerating Domain Trusts via DSQUERY.EXE</title><link>https://feed.craftedsignal.io/briefs/2026-05-domain-trust-discovery/</link><pubDate>Mon, 04 May 2026 14:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-domain-trust-discovery/</guid><description>Adversaries may use the `dsquery.exe` command-line utility to enumerate trust relationships for lateral movement in Windows multi-domain environments.</description><content:encoded><![CDATA[<p>The <code>dsquery.exe</code> utility is a command-line tool in Windows used to query Active Directory. Attackers may leverage <code>dsquery.exe</code> to discover domain trust relationships within a Windows environment, mapping out potential lateral movement paths. This discovery is often an early stage in reconnaissance, before an attacker attempts to move laterally to other systems. This activity can be detected across various endpoint detection platforms including Elastic Defend, CrowdStrike, Microsoft Defender XDR, and SentinelOne. This activity is not inherently malicious, as administrators also use it for legitimate purposes.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a compromised host within the target environment.</li>
<li>The attacker executes <code>dsquery.exe</code> with the argument <code>objectClass=trustedDomain</code> to enumerate domain trusts.</li>
<li>The command execution is logged by endpoint detection and response (EDR) solutions or Windows Security Event Logs.</li>
<li>The attacker parses the output of the <code>dsquery.exe</code> command to identify trusted domains and their attributes.</li>
<li>The attacker uses the discovered trust information to plan lateral movement strategies.</li>
<li>The attacker attempts to authenticate to other systems within the trusted domains using stolen credentials or other exploits.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful enumeration of domain trusts enables attackers to map out the Active Directory environment and identify potential pathways for lateral movement. While the enumeration itself is low impact, it facilitates subsequent actions like credential theft, privilege escalation, and data exfiltration. This can lead to widespread compromise across the organization, impacting numerous systems and sensitive data.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Detect Enumerating Domain Trusts via DSQUERY.EXE&rdquo; to your SIEM and tune for your environment.</li>
<li>Investigate any execution of <code>dsquery.exe</code> with the argument <code>objectClass=trustedDomain</code> to identify potentially malicious activity.</li>
<li>Monitor process execution events for <code>dsquery.exe</code> to detect suspicious command-line arguments and execution patterns.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>discovery</category><category>domain-trust</category><category>windows</category></item><item><title>Detection of VScode Remote Tunneling for Command and Control</title><link>https://feed.craftedsignal.io/briefs/2024-09-vscode-tunnel/</link><pubDate>Mon, 04 May 2026 14:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-09-vscode-tunnel/</guid><description>The rule detects the execution of the VScode portable binary with the tunnel command line option, potentially indicating an attempt to establish a remote tunnel session to Github or a remote VScode instance for unauthorized access and command and control.</description><content:encoded><![CDATA[<p>This detection focuses on identifying the misuse of Visual Studio Code&rsquo;s (VScode) remote tunnel feature to establish unauthorized access or control over systems. While the VScode remote tunnel feature is designed to allow developers to connect to remote environments seamlessly, attackers can abuse this functionality for malicious purposes. The rule specifically looks for the execution of the VScode portable binary with the &ldquo;tunnel&rdquo; command-line option, which is indicative of an attempt to establish a remote tunnel session to either GitHub or a remote VScode instance. Successful exploitation can lead to command and control capabilities, allowing attackers to remotely manage and compromise the affected system. The rule aims to detect this suspicious behavior by monitoring process execution and command-line arguments.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the target system through unspecified means.</li>
<li>The attacker downloads a portable version of Visual Studio Code (VScode) onto the compromised system.</li>
<li>The attacker executes the VScode binary with the <code>tunnel</code> command-line argument to initiate a remote tunnel session.</li>
<li>The attacker specifies additional arguments such as <code>--accept-server-license-terms</code> to bypass license agreement prompts.</li>
<li>The VScode tunnel attempts to establish a connection to a remote server, potentially a GitHub repository or a remote VScode instance controlled by the attacker.</li>
<li>If successful, the tunnel creates a persistent connection, allowing the attacker to execute commands and transfer files.</li>
<li>The attacker uses the established tunnel to remotely access the compromised system, enabling them to perform malicious activities such as data exfiltration or lateral movement.</li>
<li>The attacker maintains persistent access through the established tunnel, allowing for long-term command and control of the compromised system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to establish a persistent command and control channel, enabling them to remotely manage the compromised system. This can lead to data theft, deployment of ransomware, or further lateral movement within the network. While the number of potential victims and specific sectors targeted are not explicitly stated, the widespread use of VScode makes a wide range of organizations vulnerable.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the &ldquo;Attempt to Establish VScode Remote Tunnel&rdquo; rule to detect suspicious VScode tunnel activity in your environment.</li>
<li>Enable Sysmon process-creation logging to capture the necessary process execution data.</li>
<li>Investigate any alerts triggered by the rule, focusing on the command-line arguments and process behaviors to confirm malicious intent.</li>
<li>Monitor network connections originating from VScode processes for unusual or unauthorized connections to external servers.</li>
<li>Review and whitelist legitimate uses of VScode&rsquo;s tunnel feature by authorized developers to reduce false positives.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>command-and-control</category><category>vscode</category><category>remote-access-tools</category><category>windows</category></item><item><title>Command Shell Activity Started via RunDLL32</title><link>https://feed.craftedsignal.io/briefs/2026-05-rundll32-cmd-shell/</link><pubDate>Mon, 04 May 2026 14:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-rundll32-cmd-shell/</guid><description>This rule detects command shell activity, such as cmd.exe or powershell.exe, initiated by RunDLL32, a technique commonly abused by attackers to execute malicious code and bypass security controls.</description><content:encoded><![CDATA[<p>Attackers commonly abuse RunDLL32, a legitimate Windows utility, to execute malicious code by hosting it within DLLs. This technique allows adversaries to launch command shells like cmd.exe or PowerShell, effectively bypassing traditional security controls. Defenders should be aware of this technique because it provides a stealthy way for attackers to execute arbitrary commands, potentially leading to further compromise of the system. This activity is detected by monitoring for command shells initiated by RunDLL32, while excluding known benign patterns to reduce false positives. The detection rule was last updated on 2026/05/04 and supports multiple data sources, including Elastic Defend, Microsoft Defender XDR, and Sysmon.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the system through an exploit or social engineering.</li>
<li>The attacker uses RunDLL32.exe to execute a malicious DLL.</li>
<li>RunDLL32.exe loads the specified DLL into memory.</li>
<li>The malicious DLL contains code to execute a command shell (cmd.exe or powershell.exe).</li>
<li>RunDLL32.exe spawns a command shell process.</li>
<li>The attacker uses the command shell to execute commands for reconnaissance.</li>
<li>The attacker may use the command shell to download additional payloads.</li>
<li>The attacker leverages the command shell to perform lateral movement.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to execute arbitrary commands on the compromised system. While the rule is rated &ldquo;low&rdquo; severity, this initial access can lead to credential access (T1552) and further lateral movement within the network. Attackers can potentially gain full control of the system, leading to data theft, system disruption, or other malicious activities.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Command Shell Activity Started via RunDLL32&rdquo; to your SIEM and tune for your environment.</li>
<li>Enable Sysmon process creation logging (Event ID 1) to provide the necessary data for this detection.</li>
<li>Review the process details of RunDLL32.exe to confirm the parent-child relationship with the command shell, helping to reduce false positives.</li>
<li>Implement enhanced monitoring for rundll32.exe and related processes to detect similar activities in the future and improve response times.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>execution</category><category>command-shell</category><category>rundll32</category></item><item><title>Code Signing Policy Modification Through Built-in Tools</title><link>https://feed.craftedsignal.io/briefs/2024-01-09-code-signing-policy-modification/</link><pubDate>Mon, 04 May 2026 14:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-09-code-signing-policy-modification/</guid><description>Attackers may attempt to disable or modify code signing policies on Windows systems by using built-in tools like bcdedit.exe in order to execute unsigned or self-signed malicious code.</description><content:encoded><![CDATA[<p>Attackers may attempt to subvert trust controls by disabling or modifying the code signing policy. This allows them to execute unsigned or self-signed malicious code. This can be achieved by modifying boot configuration data (BCD) settings using the built-in bcdedit.exe utility on Windows. Disabling Driver Signature Enforcement (DSE) allows the loading of untrusted drivers, which can compromise system integrity. The rule identifies commands that can disable the Driver Signature Enforcement feature. The scope of the targeting is broad, as it can affect any Windows system where an attacker gains sufficient privileges to modify the BCD settings. This activity is detected by analyzing process execution events for specific command-line arguments used with bcdedit.exe. The detection rule was last updated on 2026-05-04.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains administrative privileges on a Windows system.</li>
<li>The attacker executes <code>bcdedit.exe</code> with arguments to disable driver signature enforcement. Example: <code>bcdedit.exe /set testsigning on</code> or <code>bcdedit.exe /set nointegritychecks on</code>.</li>
<li>The <code>bcdedit.exe</code> modifies the Boot Configuration Data (BCD) store.</li>
<li>The system is restarted to apply the changes made to the BCD.</li>
<li>The attacker loads an unsigned or self-signed malicious driver.</li>
<li>The malicious driver executes with kernel-level privileges.</li>
<li>The attacker performs malicious activities such as installing rootkits, bypassing security controls, or stealing sensitive data.</li>
<li>The attacker maintains persistence by ensuring the malicious driver is loaded on subsequent system reboots.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful modification of the code signing policy can lead to the execution of unsigned or self-signed malicious code, which can compromise the integrity and security of the system. Attackers can install rootkits, bypass security controls, or steal sensitive data. The impact can range from individual system compromise to broader network-wide attacks, depending on the attacker&rsquo;s objectives.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Code Signing Policy Modification Through Built-in Tools&rdquo; to your SIEM to detect the execution of <code>bcdedit.exe</code> with arguments used to disable code signing (process.args).</li>
<li>Enable process creation logging with command line arguments on Windows systems to ensure the Sigma rule can capture the relevant events (logsource).</li>
<li>Investigate any detected instances of code signing policy modification, as this activity is typically not legitimate and can indicate malicious activity. The rule <code>First Time Seen Driver Loaded - df0fd41e-5590-4965-ad5e-cd079ec22fa9</code> can be used to detect suspicious drivers loaded into the system after the command was executed.</li>
<li>Ensure that Driver Signature Enforcement is enabled on all systems.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>code-signing</category><category>windows</category></item><item><title>AAP Gateway Account Hijacking Vulnerability (CVE-2026-6266)</title><link>https://feed.craftedsignal.io/briefs/2026-05-aap-account-hijacking/</link><pubDate>Mon, 04 May 2026 14:16:35 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-aap-account-hijacking/</guid><description>CVE-2026-6266 allows a remote attacker to hijack user accounts in AAP gateway by manipulating the IDP-provided email during the user auto-linking process, potentially gaining unauthorized access, including administrative privileges.</description><content:encoded><![CDATA[<p>A vulnerability, tracked as CVE-2026-6266, exists in the AAP gateway. Specifically, the user auto-link strategy introduced in AAP 2.6 automatically links external Identity Provider (IDP) identities to existing AAP user accounts based on email matching without verifying email ownership. This vulnerability enables a remote attacker to potentially hijack a victim&rsquo;s account and gain unauthorized access to other accounts, including administrative accounts. The attacker achieves this by manipulating the email address provided by the IDP during the auto-linking process. This poses a significant risk to organizations using AAP for identity management, potentially leading to data breaches and system compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a target user account within the AAP gateway.</li>
<li>Attacker creates an account on a configured external Identity Provider (IDP).</li>
<li>Attacker configures the IDP account with the same email address as the target user in the AAP gateway.</li>
<li>The target user attempts to authenticate to the AAP gateway using the configured IDP.</li>
<li>The AAP gateway, running version 2.6 or later, automatically links the attacker-controlled IDP identity to the existing AAP user account based on email matching, without verifying ownership.</li>
<li>The attacker successfully authenticates to the AAP gateway using the attacker-controlled IDP account, gaining access to the target user&rsquo;s account.</li>
<li>If the hijacked account has administrative privileges, the attacker can escalate privileges and compromise the entire AAP gateway environment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-6266 can lead to unauthorized access to sensitive data and systems managed by the AAP gateway. This includes the potential compromise of administrative accounts, which could allow an attacker to gain full control over the AAP environment. The vulnerability impacts organizations using AAP 2.6 and later for identity management. The potential consequences include data breaches, service disruption, and financial loss.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the patch provided in Red Hat Security Advisory RHSA-2026:13508 to remediate CVE-2026-6266.</li>
<li>Monitor AAP gateway logs for successful authentications from unexpected IDPs to detect potential account hijacking attempts. Deploy a Sigma rule to detect this behavior.</li>
<li>Implement multi-factor authentication (MFA) for all AAP accounts to mitigate the impact of successful account hijacking, even if the IDP is compromised.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-6266</category><category>account-hijacking</category><category>authentication-bypass</category></item><item><title>Norton Secure VPN Privilege Escalation Vulnerability (CVE-2025-58074)</title><link>https://feed.craftedsignal.io/briefs/2026-05-norton-privesc/</link><pubDate>Mon, 04 May 2026 14:16:28 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-norton-privesc/</guid><description>A privilege escalation vulnerability exists in Norton Secure VPN during installation via the Microsoft Store (CVE-2025-58074), allowing a low-privilege user to replace files leading to arbitrary file deletion and potential elevation of privileges.</description><content:encoded><![CDATA[<p>CVE-2025-58074 describes a privilege escalation vulnerability affecting Norton Secure VPN when installed through the Microsoft Store. A low-privilege local user can exploit this vulnerability by manipulating files during the installation process. Successful exploitation can lead to arbitrary file deletion and, more critically, elevation of privileges on the affected system. This vulnerability poses a significant risk as it could allow an attacker to gain unauthorized access and control over a system. The vulnerability was reported by Talos and assigned a CVSS v3.1 score of 8.8 (HIGH).</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A low-privilege user initiates the installation of Norton Secure VPN from the Microsoft Store.</li>
<li>During the installation process, the user leverages their limited privileges to identify a directory or file that will be created/modified by the installer.</li>
<li>The user replaces a legitimate file or creates a junction point/mount point to a protected system directory.</li>
<li>The installer, running with elevated privileges, attempts to write data to the replaced file or the target of the junction/mount point.</li>
<li>Due to the replaced file or manipulated directory, the installer inadvertently deletes arbitrary files in a protected location or writes malicious content to a privileged location.</li>
<li>This malicious file or manipulated registry key is then executed or utilized by a privileged process.</li>
<li>The attacker gains elevated privileges on the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2025-58074 allows a low-privilege user to escalate their privileges to SYSTEM. This could lead to complete compromise of the affected system, including unauthorized access to sensitive data, installation of malware, and modification of system configurations. The impact is significant, as it bypasses standard security controls and allows for persistent and potentially undetectable access.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor for suspicious file modifications during software installations, especially those originating from the Microsoft Store. Use the &ldquo;Detect Suspicious File Replacement During Installation&rdquo; Sigma rule to detect file replacements in common installation directories.</li>
<li>Implement strict access control policies to limit the ability of low-privilege users to modify system files or directories.</li>
<li>Investigate any alerts generated by the &ldquo;Detect Insecure Junction Point Creation&rdquo; Sigma rule, which identifies the creation of junction points by non-administrator users.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>privilege-escalation</category><category>windows</category><category>vulnerability</category></item><item><title>SambaBox OS Command Injection Vulnerability (CVE-2026-3120)</title><link>https://feed.craftedsignal.io/briefs/2026-05-sambabox-code-injection/</link><pubDate>Mon, 04 May 2026 12:16:29 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-sambabox-code-injection/</guid><description>SambaBox versions 5.1 to before 5.3 are vulnerable to OS command injection via improper control of code generation (CVE-2026-3120), potentially allowing attackers with high privileges to execute arbitrary commands on the underlying system.</description><content:encoded><![CDATA[<p>CVE-2026-3120 is a critical vulnerability affecting SambaBox, a product by Profelis Information and Consulting Trade and Industry Limited Company. This vulnerability, categorized as an Improper Control of Generation of Code (&lsquo;Code Injection&rsquo;), allows for OS Command Injection. Specifically, SambaBox versions 5.1 up to (but not including) version 5.3 are affected. An attacker with high privileges can exploit this vulnerability to execute arbitrary commands on the underlying operating system, potentially leading to full system compromise. This vulnerability was reported by the Computer Emergency Response Team of the Republic of Turkey (USOM). Defenders should patch affected systems immediately or apply mitigations to prevent exploitation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker with high privileges gains access to the SambaBox management interface.</li>
<li>The attacker crafts a malicious request containing an OS command within a vulnerable input field.</li>
<li>The SambaBox application fails to properly sanitize or validate the input.</li>
<li>The application generates code incorporating the unsanitized input.</li>
<li>The generated code is executed by the underlying operating system.</li>
<li>The injected OS command is executed with the privileges of the SambaBox application.</li>
<li>The attacker gains the ability to execute arbitrary commands on the server.</li>
<li>The attacker leverages the command execution to achieve persistence, escalate privileges further, or exfiltrate sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-3120 allows an attacker to execute arbitrary commands on the SambaBox server. This could lead to complete system compromise, including data theft, modification, or destruction. The vulnerability affects SambaBox installations from version 5.1 before 5.3, potentially impacting all organizations using these versions. Given the high CVSS score of 7.2, this vulnerability poses a significant risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade SambaBox to version 5.3 or later to patch CVE-2026-3120.</li>
<li>Apply the following Sigma rule to detect potential exploitation attempts by monitoring for suspicious process execution: &ldquo;Detect SambaBox Command Injection&rdquo;.</li>
<li>Monitor web server logs for unusual requests targeting SambaBox applications, specifically looking for attempts to inject OS commands.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>code-injection</category><category>os-command-injection</category><category>cve-2026-3120</category></item><item><title>Compromised Bitwarden CLI npm Package Enables Credential Theft and Information Exfiltration</title><link>https://feed.craftedsignal.io/briefs/2026-05-bitwarden-cli-compromise/</link><pubDate>Mon, 04 May 2026 11:28:56 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-bitwarden-cli-compromise/</guid><description>A remote attacker can exploit a compromised Bitwarden CLI npm package to steal credentials and exfiltrate sensitive information.</description><content:encoded><![CDATA[<p>A compromised Bitwarden CLI npm package allows a remote, anonymous attacker to steal credentials and exfiltrate sensitive information. The specific version of the compromised package is not detailed in the advisory. This supply chain attack targets developers and users who rely on the Bitwarden CLI for managing their passwords and secrets. This attack has the potential to expose sensitive credentials, leading to unauthorized access to systems and data. Defenders need to monitor for unusual activity related to the Bitwarden CLI and its usage within their environments to mitigate this risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker compromises a Bitwarden CLI npm package through techniques such as typosquatting, account compromise, or dependency confusion.</li>
<li>Unsuspecting developers or users download and install the compromised package from the npm registry.</li>
<li>During installation, the malicious package executes malicious code injected by the attacker.</li>
<li>The malicious code collects Bitwarden credentials and other sensitive information stored in the CLI&rsquo;s configuration.</li>
<li>The compromised package establishes a covert communication channel (e.g., HTTPS) to an attacker-controlled server.</li>
<li>Stolen credentials and sensitive information are exfiltrated to the attacker&rsquo;s server.</li>
<li>The attacker uses the stolen credentials to access victim&rsquo;s Bitwarden vaults or other systems.</li>
<li>The attacker may further escalate privileges and compromise additional systems within the victim&rsquo;s environment using the stolen credentials.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation leads to the theft of sensitive credentials and information stored within Bitwarden CLI. The number of victims is currently unknown. Organizations using the compromised package could experience unauthorized access to critical systems, data breaches, and potential financial losses. The targeted sectors are broad, encompassing any organization utilizing the Bitwarden CLI for password management and secret storage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor npm package installations for unusual activity or unexpected dependencies using process creation logs and file integrity monitoring.</li>
<li>Implement strict code review processes for all third-party dependencies, especially those related to security tools like Bitwarden CLI.</li>
<li>Deploy the Sigma rule detecting suspicious network connections from the Bitwarden CLI executable to identify potential data exfiltration.</li>
<li>Enforce multi-factor authentication (MFA) on Bitwarden accounts to mitigate the impact of credential theft.</li>
<li>Regularly audit and review the permissions and access rights associated with Bitwarden CLI credentials.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>supply-chain</category><category>credential-theft</category><category>exfiltration</category><category>npm</category></item><item><title>Rancher Vulnerability Allows Remote Code Execution and File Manipulation</title><link>https://feed.craftedsignal.io/briefs/2026-05-rancher-code-execution/</link><pubDate>Mon, 04 May 2026 11:26:16 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-rancher-code-execution/</guid><description>An authenticated, remote attacker can exploit a vulnerability in Rancher to execute arbitrary program code and manipulate files, potentially leading to privilege escalation and system compromise.</description><content:encoded><![CDATA[<p>A vulnerability exists within Rancher that allows a remote, authenticated attacker to execute arbitrary code and manipulate files on the system. The specific details of the vulnerability are not provided in the source, but the impact allows for significant control over the Rancher instance. This issue affects Rancher installations and poses a severe risk, as successful exploitation can lead to complete system compromise, data breaches, and unauthorized access to managed resources. Defenders should prioritize identifying and mitigating this vulnerability to prevent potential attacks.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains valid credentials to a Rancher instance through credential harvesting or other means.</li>
<li>The attacker authenticates to the Rancher web interface or API.</li>
<li>The attacker exploits an unspecified vulnerability to inject and execute arbitrary code on the Rancher server.</li>
<li>The attacker leverages the code execution vulnerability to escalate privileges within the Rancher system.</li>
<li>The attacker uses the escalated privileges to manipulate critical Rancher configuration files.</li>
<li>The attacker uses file manipulation capabilities to inject malicious code into Rancher-managed containers or infrastructure.</li>
<li>The attacker establishes persistent access through backdoors or compromised service accounts.</li>
<li>The attacker pivots to other systems or exfiltrates sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability can lead to complete compromise of the Rancher instance, including the ability to control and manipulate all managed Kubernetes clusters and related infrastructure. This can result in significant data breaches, service disruptions, and unauthorized access to sensitive resources. The number of victims and sectors targeted are currently unknown, but the severity of the potential impact necessitates immediate attention.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule detecting suspicious Rancher process execution and tune for your environment to identify potential exploitation attempts.</li>
<li>Investigate any unauthorized file modifications within the Rancher installation directory using the provided file integrity monitoring rule.</li>
<li>Monitor Rancher access logs for unusual login patterns or suspicious API calls.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>rancher</category><category>code-execution</category><category>file-manipulation</category></item><item><title>OPNsense Multiple Vulnerabilities Leading to Remote Code Execution</title><link>https://feed.craftedsignal.io/briefs/2026-05-opnsense-rce/</link><pubDate>Mon, 04 May 2026 11:09:07 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-opnsense-rce/</guid><description>A remote, anonymous attacker can exploit multiple vulnerabilities in OPNsense to bypass security measures and execute arbitrary code, potentially leading to complete system compromise.</description><content:encoded><![CDATA[<p>Multiple unspecified vulnerabilities in OPNsense allow a remote, anonymous attacker to bypass security restrictions and achieve arbitrary code execution. The vulnerabilities stem from inadequate input validation and insufficient privilege checks within the OPNsense firewall software. While the specific vulnerable components are not detailed in the advisory, successful exploitation would grant an attacker complete control over the affected OPNsense instance. This can lead to a complete breach of the network perimeter, allowing the attacker to pivot to internal systems, intercept network traffic, or disrupt network services. Given the critical role of OPNsense as a network gateway, organizations using this software should prioritize detection and mitigation efforts.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable OPNsense instance accessible over the network.</li>
<li>The attacker crafts a malicious request targeting a specific, undisclosed vulnerable endpoint. This request exploits a flaw in input validation or authentication.</li>
<li>The vulnerable OPNsense component processes the malicious request without proper sanitization or authorization checks.</li>
<li>The injected payload bypasses security restrictions, potentially exploiting a command injection or similar vulnerability.</li>
<li>The injected payload executes arbitrary code on the OPNsense system, gaining initial access.</li>
<li>The attacker leverages the initial foothold to escalate privileges within the OPNsense system.</li>
<li>The attacker establishes persistence, ensuring continued access even after system reboots or security updates.</li>
<li>The attacker pivots to other systems within the network, using the compromised OPNsense instance as a launchpad for further attacks, or exfiltrates sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities allows a remote attacker to execute arbitrary code on the OPNsense firewall. This gives the attacker full control of the firewall, allowing them to intercept network traffic, modify firewall rules, and potentially pivot to internal networks. The impact is a complete compromise of the network perimeter, potentially affecting all systems and data behind the firewall. The number of affected organizations is currently unknown.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor OPNsense webserver logs for suspicious POST requests to unusual or sensitive endpoints, using a webserver category Sigma rule (see example below).</li>
<li>Implement network intrusion detection systems (NIDS) rules to detect exploitation attempts against OPNsense services.</li>
<li>While specific CVEs are unavailable, stay informed about OPNsense security updates and apply them immediately upon release.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>vulnerability</category><category>rce</category><category>firewall</category></item><item><title>Langflow Multiple Vulnerabilities Allow Code Execution</title><link>https://feed.craftedsignal.io/briefs/2026-05-langflow-code-exec/</link><pubDate>Mon, 04 May 2026 10:39:06 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-langflow-code-exec/</guid><description>An authenticated remote attacker can exploit multiple unspecified vulnerabilities in Langflow to achieve arbitrary code execution.</description><content:encoded><![CDATA[<p>Langflow is vulnerable to multiple security flaws that could allow a remote attacker to execute arbitrary code on the affected system. Successful exploitation of these vulnerabilities requires the attacker to be authenticated. The specific nature of these vulnerabilities is not detailed in the advisory, however the potential impact is severe, allowing for complete system compromise if successfully exploited. Defenders should prioritize identifying and mitigating installations of Langflow that are exposed to untrusted networks or users.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An authenticated attacker gains initial access to the Langflow application.</li>
<li>The attacker crafts a malicious request targeting one of the unspecified vulnerabilities.</li>
<li>The malicious request is sent to the Langflow server.</li>
<li>The Langflow server processes the request, triggering the vulnerability.</li>
<li>The vulnerability allows the attacker to inject arbitrary code into the Langflow process.</li>
<li>The injected code executes within the context of the Langflow application.</li>
<li>The attacker leverages the initial code execution to escalate privileges.</li>
<li>The attacker achieves arbitrary code execution on the underlying system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities allows a remote, authenticated attacker to execute arbitrary code on the Langflow server. This could lead to a complete compromise of the affected system, including the theft of sensitive data, the installation of malware, and the disruption of services. Given the lack of specific vulnerability details, it is difficult to estimate the precise number of potentially affected installations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor Langflow application logs for suspicious activity indicative of unauthorized access or code execution.</li>
<li>Deploy the Sigma rules provided in this brief to your SIEM to detect potential exploitation attempts.</li>
<li>Implement strict access controls for the Langflow application to minimize the attack surface.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>langflow</category><category>code-execution</category><category>web-application</category></item><item><title>Multiple Vulnerabilities in Progress Software MOVEit Automation</title><link>https://feed.craftedsignal.io/briefs/2026-05-moveit-automation-vulns/</link><pubDate>Mon, 04 May 2026 10:24:10 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-moveit-automation-vulns/</guid><description>Multiple vulnerabilities in Progress Software MOVEit Automation can be exploited by an attacker to bypass security measures or gain elevated privileges.</description><content:encoded><![CDATA[<p>Progress Software&rsquo;s MOVEit Automation is susceptible to multiple vulnerabilities that, if exploited, could allow an attacker to circumvent existing security measures and escalate privileges within the system. While specific details on the vulnerabilities are lacking, the advisory indicates a potential for significant impact on the confidentiality, integrity, and availability of systems utilizing the affected software. This is especially concerning given the role of MOVEit Automation in managing and transferring sensitive files, making it a high-value target for malicious actors seeking to exfiltrate data or disrupt business operations. Defenders should prioritize identifying and patching vulnerable instances of MOVEit Automation to mitigate the risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable MOVEit Automation instance.</li>
<li>Attacker exploits a vulnerability to gain initial access to the system. Due to lack of specifics, it is unknown how initial access occurs.</li>
<li>Attacker bypasses security measures using an unspecified exploit.</li>
<li>Attacker escalates privileges within the MOVEit Automation environment.</li>
<li>Attacker leverages escalated privileges to access sensitive data or system configurations.</li>
<li>Attacker moves laterally within the network, exploiting the compromised MOVEit Automation instance as a pivot point.</li>
<li>Attacker exfiltrates sensitive data or deploys malicious payloads to other systems on the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities could lead to unauthorized access to sensitive data, system compromise, and potential disruption of business operations. The lack of specific details makes it difficult to quantify the exact number of victims or sectors targeted. However, given the widespread use of MOVEit Automation in various industries, a successful attack could have far-reaching consequences, including financial losses, reputational damage, and regulatory penalties.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the latest security patches provided by Progress Software for MOVEit Automation to remediate the vulnerabilities.</li>
<li>Monitor MOVEit Automation logs for suspicious activity indicative of exploitation attempts.</li>
<li>Implement network segmentation to limit the potential impact of a successful attack on MOVEit Automation.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>vulnerability</category><category>privilege-escalation</category><category>defense-evasion</category></item><item><title>Totolink N300RH Buffer Overflow Vulnerability in setWanConfig</title><link>https://feed.craftedsignal.io/briefs/2026-05-totolink-n300rh-buffer-overflow/</link><pubDate>Mon, 04 May 2026 10:16:01 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-totolink-n300rh-buffer-overflow/</guid><description>A buffer overflow vulnerability exists in Totolink N300RH version 3.2.4-B20220812, specifically affecting the setWanConfig function within the /cgi-bin/cstecgi.cgi file, allowing a remote attacker to exploit it by manipulating the priDns argument in a POST request.</description><content:encoded><![CDATA[<p>A buffer overflow vulnerability has been identified in Totolink N300RH router version 3.2.4-B20220812. The vulnerability resides in the <code>setWanConfig</code> function within the <code>/cgi-bin/cstecgi.cgi</code> file, which handles POST requests. An attacker can exploit this vulnerability by manipulating the <code>priDns</code> argument in a crafted POST request. The vulnerability allows for remote exploitation, meaning an attacker does not need local access to the device. Public exploits for this vulnerability are already available, increasing the risk of exploitation. This vulnerability was published on 2026-05-04.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable Totolink N300RH router running firmware version 3.2.4-B20220812.</li>
<li>The attacker crafts a malicious POST request targeting the <code>/cgi-bin/cstecgi.cgi</code> endpoint.</li>
<li>Within the POST request, the attacker includes the <code>priDns</code> argument with a value exceeding the buffer size.</li>
<li>The <code>setWanConfig</code> function processes the <code>priDns</code> argument without proper bounds checking.</li>
<li>The oversized <code>priDns</code> value overwrites adjacent memory on the stack, potentially including control flow data.</li>
<li>The attacker gains control of the program execution flow by overwriting the return address.</li>
<li>The attacker executes arbitrary code on the router, potentially gaining a shell.</li>
<li>The attacker could then use the compromised router to perform lateral movement, exfiltrate data, or establish a persistent backdoor.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this buffer overflow vulnerability can lead to complete compromise of the Totolink N300RH router. An attacker could gain unauthorized access to the device&rsquo;s configuration, intercept network traffic, or use the router as a pivot point to attack other devices on the network. Given that public exploits are available, a wide range of attackers could potentially exploit this vulnerability. The CVSS v3.1 base score is 8.8 (HIGH).</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for POST requests to <code>/cgi-bin/cstecgi.cgi</code> with abnormally long <code>priDns</code> values to detect potential exploitation attempts using the provided Sigma rule.</li>
<li>Implement network intrusion detection system (NIDS) rules to detect and block malicious POST requests targeting <code>/cgi-bin/cstecgi.cgi</code>.</li>
<li>Contact Totolink for a security patch or firmware update to address CVE-2026-7749.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>buffer-overflow</category><category>router</category><category>cve-2026-7749</category></item><item><title>Totolink N300RH Buffer Overflow Vulnerability (CVE-2026-7750)</title><link>https://feed.craftedsignal.io/briefs/2026-05-totolink-buffer-overflow/</link><pubDate>Mon, 04 May 2026 10:16:01 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-totolink-buffer-overflow/</guid><description>A buffer overflow vulnerability exists in Totolink N300RH 3.2.4-B20220812 allowing remote attackers to execute arbitrary code by manipulating the mac_address argument in the setMacFilterRules function of the /cgi-bin/cstecgi.cgi POST request handler.</description><content:encoded><![CDATA[<p>A buffer overflow vulnerability, identified as CVE-2026-7750, affects Totolink N300RH router version 3.2.4-B20220812. The vulnerability resides in the <code>setMacFilterRules</code> function within the <code>/cgi-bin/cstecgi.cgi</code> file, which handles POST requests. Attackers can exploit this flaw by sending a specially crafted POST request with an overly long <code>mac_address</code> parameter, triggering a buffer overflow. Successful exploitation allows for arbitrary code execution on the device. The vulnerability is remotely exploitable, and a public exploit is available, increasing the risk of widespread attacks. Defenders should prioritize patching or mitigating this vulnerability to prevent potential compromise of affected devices.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable Totolink N300RH router running firmware version 3.2.4-B20220812.</li>
<li>The attacker crafts a malicious POST request targeting the <code>/cgi-bin/cstecgi.cgi</code> endpoint.</li>
<li>Within the POST request, the attacker includes the <code>mac_address</code> parameter, injecting a string longer than the buffer allocated for it.</li>
<li>The <code>setMacFilterRules</code> function processes the POST request without proper bounds checking on the <code>mac_address</code> argument.</li>
<li>The overly long <code>mac_address</code> value overflows the buffer, overwriting adjacent memory regions.</li>
<li>The attacker carefully crafts the overflow to overwrite the return address, redirecting execution flow to attacker-controlled code.</li>
<li>The injected code executes with the privileges of the web server, allowing the attacker to execute arbitrary commands.</li>
<li>The attacker gains complete control over the router, potentially using it for further malicious activities such as network pivoting, data exfiltration, or denial-of-service attacks.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7750 allows a remote attacker to execute arbitrary code on the vulnerable Totolink N300RH device. This could lead to a complete compromise of the router, allowing the attacker to control network traffic, steal sensitive information, or use the router as a bot in a larger attack. Given the public availability of the exploit, a large number of unpatched devices could be vulnerable to automated attacks, potentially impacting thousands of users.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply available patches or firmware updates provided by Totolink to address CVE-2026-7750.</li>
<li>Implement network intrusion detection system (IDS) rules to detect and block suspicious POST requests targeting the <code>/cgi-bin/cstecgi.cgi</code> endpoint with excessively long <code>mac_address</code> parameters.</li>
<li>Deploy the Sigma rules in this brief to your SIEM to detect exploitation attempts.</li>
<li>Monitor web server logs for unusual POST requests to <code>/cgi-bin/cstecgi.cgi</code>, focusing on requests with large <code>mac_address</code> values.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>buffer-overflow</category><category>router</category><category>cve</category><category>webserver</category></item><item><title>libexif Vulnerability Allows Code Execution</title><link>https://feed.craftedsignal.io/briefs/2026-05-libexif-code-execution/</link><pubDate>Mon, 04 May 2026 09:54:59 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-libexif-code-execution/</guid><description>A local attacker can exploit a vulnerability in libexif to potentially execute arbitrary code, cause a denial of service, or disclose sensitive information.</description><content:encoded><![CDATA[<p>A vulnerability exists within the libexif library that could be exploited by a local attacker. The specifics of the vulnerability are not detailed, but successful exploitation could allow the attacker to execute arbitrary code within the context of the application using the library. Alternatively, the attacker could trigger a denial-of-service condition, rendering the application unavailable, or disclose sensitive information handled by the library. The advisory lacks detail on specific versions or exploitation methods, highlighting the need for proactive detection and mitigation strategies.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains local access to a system with an application utilizing the vulnerable libexif library.</li>
<li>Attacker crafts a malicious input, such as a specially crafted image file, designed to trigger the vulnerability in libexif.</li>
<li>The vulnerable application processes the malicious input using the libexif library.</li>
<li>The vulnerability is triggered due to the processing of the malicious input.</li>
<li>Exploitation leads to arbitrary code execution within the context of the application using libexif.</li>
<li>Alternatively, the exploitation results in a denial-of-service condition, crashing or freezing the application.</li>
<li>As another alternative, the exploitation results in sensitive information disclosure.</li>
<li>Attacker leverages the achieved code execution to perform further actions, such as privilege escalation or data exfiltration, or uses the disclosed information for further attacks.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of the libexif vulnerability could lead to a range of impacts, from arbitrary code execution to denial-of-service and information disclosure. The scope of impact depends on the privileges of the application using the library and the sensitivity of the data it handles. If exploited, a local attacker could gain unauthorized access to sensitive data, disrupt critical services, or compromise the entire system.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor for suspicious processes spawned by applications utilizing libexif, using process creation logs and the provided Sigma rule.</li>
<li>Implement file integrity monitoring for the libexif library to detect unauthorized modifications.</li>
<li>Analyze applications that use libexif for potential vulnerabilities and apply necessary patches or updates when available.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>vulnerability</category><category>code-execution</category><category>denial-of-service</category></item><item><title>GNU InetUtils Multiple Vulnerabilities Allow Code Execution and Information Disclosure</title><link>https://feed.craftedsignal.io/briefs/2026-05-gnu-inetutils-vulns/</link><pubDate>Mon, 04 May 2026 09:54:58 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-gnu-inetutils-vulns/</guid><description>Multiple vulnerabilities in GNU InetUtils allow a remote attacker to execute arbitrary code and disclose sensitive information.</description><content:encoded><![CDATA[<p>GNU InetUtils is susceptible to multiple vulnerabilities that could lead to serious security breaches. These vulnerabilities could allow an attacker to execute arbitrary code on the affected system and also enable them to disclose sensitive information. The specific nature of these vulnerabilities is not detailed in the advisory, but the potential impact is significant, requiring immediate attention from system administrators to mitigate potential risks associated with vulnerable InetUtils installations. Given the lack of specific CVEs or exploitation details, organizations should prioritize identifying and patching potentially vulnerable systems.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a vulnerable InetUtils service running on a target system.</li>
<li>The attacker crafts a malicious input specifically designed to exploit a buffer overflow or similar vulnerability within a utility like <code>ftp</code>, <code>telnet</code>, or <code>rcp</code>.</li>
<li>The malicious input is sent to the vulnerable InetUtils service. This could be achieved by sending a specially crafted request to the service&rsquo;s listening port.</li>
<li>The vulnerability is triggered, leading to arbitrary code execution within the context of the InetUtils service.</li>
<li>The attacker leverages the initial code execution to escalate privileges on the system, potentially gaining root or administrator access.</li>
<li>With elevated privileges, the attacker installs persistent backdoors for future access.</li>
<li>The attacker proceeds to gather sensitive information from the compromised system, such as user credentials, configuration files, or database contents.</li>
<li>Finally, the attacker exfiltrates the stolen data to an external server under their control.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities can lead to arbitrary code execution, potentially granting an attacker complete control over the compromised system. This could result in data breaches, system downtime, and reputational damage. The advisory does not specify the number of victims or sectors targeted, but the potential impact is widespread due to the common usage of InetUtils. A successful attack could lead to the complete compromise of affected systems and networks.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Identify all systems running GNU InetUtils and determine the installed version.</li>
<li>Monitor network traffic for suspicious activity targeting InetUtils services (e.g., unusual commands or large data transfers) using network_connection logs.</li>
<li>Deploy the provided Sigma rules to your SIEM to detect potential exploitation attempts targeting InetUtils.</li>
<li>Investigate and patch any identified vulnerabilities in GNU InetUtils immediately upon patch availability from the vendor.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>inetutils</category><category>code-execution</category><category>information-disclosure</category></item><item><title>Grafana Multiple Vulnerabilities Leading to XSS and Information Disclosure</title><link>https://feed.craftedsignal.io/briefs/2026-05-grafana-vulns/</link><pubDate>Mon, 04 May 2026 09:54:33 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-grafana-vulns/</guid><description>Multiple vulnerabilities in Grafana allow a remote, anonymous attacker to conduct a Cross-Site Scripting attack or disclose information.</description><content:encoded><![CDATA[<p>Grafana is susceptible to multiple vulnerabilities that could allow unauthorized access and data compromise. A remote, anonymous attacker can exploit these weaknesses to perform Cross-Site Scripting (XSS) attacks or disclose sensitive information. This poses a risk to the confidentiality and integrity of Grafana instances and the data they manage. Defenders need to implement detection and mitigation measures to prevent potential exploitation. The specific Grafana versions affected are not specified in the advisory.</p>
<h2 id="attack-chain">Attack Chain</h2>
<p>Since the specific attack chain is not detailed in the source, a generic attack chain is provided based on common web application vulnerabilities:</p>
<ol>
<li>The attacker identifies a vulnerable Grafana instance accessible over the internet.</li>
<li>The attacker crafts a malicious HTTP request targeting a vulnerable endpoint in Grafana.</li>
<li>This request exploits a Cross-Site Scripting (XSS) vulnerability, injecting malicious JavaScript code.</li>
<li>Alternatively, the request exploits an information disclosure vulnerability to access sensitive data.</li>
<li>If XSS is successful, a user interacting with Grafana executes the injected JavaScript.</li>
<li>The malicious script can steal user credentials, session tokens, or other sensitive data.</li>
<li>The attacker uses the stolen credentials to gain unauthorized access to Grafana.</li>
<li>The attacker exfiltrates sensitive information or performs other malicious actions within the Grafana instance.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities can lead to the compromise of sensitive information, including user credentials, API keys, and internal system details. An attacker could leverage XSS to manipulate Grafana dashboards, inject malicious content, or redirect users to phishing sites. Information disclosure could expose sensitive configuration data or metrics, potentially leading to further attacks. The number of affected Grafana instances is currently unknown, but any publicly accessible instance is potentially at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Grafana Suspicious URI Activity</code> to detect potential exploitation attempts targeting Grafana instances via unusual URL patterns (log source: webserver).</li>
<li>Enable and review webserver logs for Grafana instances to identify suspicious activity, specifically cs-uri-query and cs-uri-stem (log source: webserver).</li>
<li>Implement a web application firewall (WAF) to filter out malicious requests and protect against common web application attacks, including XSS (log source: firewall).</li>
<li>Upgrade Grafana to the latest version as soon as security patches are available to address the identified vulnerabilities (affected_products: Grafana).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>grafana</category><category>xss</category><category>information-disclosure</category><category>cloud</category></item><item><title>XZ Utility Vulnerability Allows Remote Code Execution</title><link>https://feed.craftedsignal.io/briefs/2026-05-xz-code-execution/</link><pubDate>Mon, 04 May 2026 09:34:36 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-xz-code-execution/</guid><description>A remote, anonymous attacker can exploit a vulnerability in the xz utility to achieve arbitrary code execution on affected systems.</description><content:encoded><![CDATA[<p>A vulnerability exists within the xz compression utility that allows for arbitrary code execution. While the specific details of the vulnerability are not disclosed in this advisory, the potential impact is severe. An unauthenticated, remote attacker can leverage this flaw to execute code on a vulnerable system. The affected component is the xz utility, a widely used data compression tool in Linux distributions. Defenders should assume a broad potential impact, including data compromise, system instability, and potential for lateral movement within a compromised network. The lack of detailed information necessitates immediate investigation and patching.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable system running the xz utility.</li>
<li>The attacker crafts a malicious payload designed to exploit the undisclosed vulnerability within xz.</li>
<li>The attacker delivers the malicious payload to the vulnerable system. The specific delivery mechanism is not detailed (e.g., network service, malicious file).</li>
<li>The xz utility processes the malicious payload, triggering the vulnerability.</li>
<li>Due to the vulnerability, the attacker gains the ability to execute arbitrary code on the targeted system.</li>
<li>The attacker&rsquo;s code executes with the privileges of the xz process, potentially allowing for elevated privileges.</li>
<li>The attacker may then install a backdoor or other persistent mechanism to maintain access to the compromised system.</li>
<li>The attacker pivots to other systems on the network or exfiltrates sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows a remote attacker to execute arbitrary code on the targeted system. This can lead to complete system compromise, data theft, and further malicious activities within the network. Given the widespread use of the xz utility, a large number of systems are potentially vulnerable. The impact could range from disruption of services to significant data breaches.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Investigate systems running the xz utility for suspicious activity.</li>
<li>Deploy the Sigma rules provided below to detect potential exploitation attempts.</li>
<li>Monitor process execution for unexpected activity originating from the xz utility using process_creation logs.</li>
<li>Implement network monitoring to identify suspicious connections originating from systems where xz is used.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>xz</category><category>code-execution</category><category>linux</category></item><item><title>MariaDB Vulnerability Allows Denial of Service and Potential Code Execution</title><link>https://feed.craftedsignal.io/briefs/2024-01-mariadb-dos/</link><pubDate>Mon, 04 May 2026 09:34:06 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-mariadb-dos/</guid><description>A remote, authenticated attacker can exploit a vulnerability in MariaDB to perform a denial of service attack and potentially execute arbitrary program code.</description><content:encoded><![CDATA[<p>A vulnerability exists in MariaDB that allows a remote, authenticated attacker to perform a denial of service attack and potentially execute arbitrary program code. This vulnerability could be exploited by an attacker who has already gained valid credentials to the MariaDB server. Successful exploitation leads to service disruption and potential compromise of the underlying system. Defenders should implement appropriate access controls and monitoring to detect and prevent unauthorized access and exploitation attempts. This vulnerability poses a significant risk to organizations relying on MariaDB for critical services.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker obtains valid credentials for a MariaDB user, potentially through credential stuffing, phishing, or other means.</li>
<li>The attacker authenticates to the MariaDB server using the compromised credentials.</li>
<li>The attacker crafts a malicious SQL query or stored procedure designed to trigger the vulnerability.</li>
<li>The attacker executes the malicious query or stored procedure against the MariaDB server.</li>
<li>The vulnerability is triggered, leading to a denial of service condition, potentially crashing the MariaDB server process.</li>
<li>If the vulnerability allows code execution, the attacker injects malicious code into the MariaDB process.</li>
<li>The malicious code executes with the privileges of the MariaDB process.</li>
<li>The attacker gains further control of the system or performs other malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability can lead to a denial of service, disrupting services relying on MariaDB. In the event of code execution, the attacker could potentially gain complete control of the system, leading to data exfiltration, data manipulation, or further compromise of the network. The number of affected organizations is potentially large, as MariaDB is a widely used database server.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Implement strong password policies and multi-factor authentication to prevent credential compromise and unauthorized access to MariaDB servers.</li>
<li>Monitor MariaDB logs for suspicious activity, such as failed login attempts, unusual query patterns, or attempts to execute stored procedures from unexpected sources. Deploy the Sigma rule <code>DetectSuspiciousMariaDBStoredProcedureExecution</code> to detect the execution of potentially malicious stored procedures.</li>
<li>Regularly review and update access control lists to ensure that users only have the necessary privileges to perform their duties.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>mariadb</category><category>denial-of-service</category><category>code-execution</category></item><item><title>Tegsoft Online Support Application Reflected XSS Vulnerability (CVE-2025-14320)</title><link>https://feed.craftedsignal.io/briefs/2024-01-tegsoft-xss/</link><pubDate>Mon, 04 May 2026 09:15:59 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-tegsoft-xss/</guid><description>CVE-2025-14320 is a reflected cross-site scripting (XSS) vulnerability in Tegsoft Online Support Application versions V3 through 31122025, allowing attackers to inject arbitrary web scripts into user browsers.</description><content:encoded><![CDATA[<p>A reflected cross-site scripting (XSS) vulnerability, identified as CVE-2025-14320, exists within the Tegsoft Management and Information Services Trade Limited Company Online Support Application. This vulnerability affects versions V3 through 31122025. An attacker can exploit this vulnerability by injecting malicious scripts into a web page, which is then reflected back to the user, leading to potential data theft, session hijacking, or website defacement. This vulnerability was reported by the Computer Emergency Response Team of the Republic of Turkey. Successful exploitation requires tricking a user into clicking a specially crafted link.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker crafts a malicious URL containing a JavaScript payload.</li>
<li>The attacker distributes the crafted URL via email, social media, or other means.</li>
<li>Unsuspecting user clicks the malicious URL.</li>
<li>The user&rsquo;s browser sends a request to the vulnerable Tegsoft Online Support Application with the malicious script as a parameter.</li>
<li>The Tegsoft application fails to properly sanitize the input.</li>
<li>The application reflects the malicious script back to the user&rsquo;s browser within the HTML response.</li>
<li>The user&rsquo;s browser executes the malicious script.</li>
<li>The script can then perform actions such as stealing cookies, redirecting the user to a phishing site, or defacing the web page.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this reflected XSS vulnerability can lead to the execution of arbitrary JavaScript code in the context of the victim&rsquo;s browser. This can result in session hijacking, where an attacker gains unauthorized access to the user&rsquo;s account. It can also lead to data theft, where sensitive information is stolen from the user&rsquo;s browser. Furthermore, the attacker can redirect the user to a phishing website or deface the Online Support Application, potentially impacting multiple users.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply available patches or updates from Tegsoft to address CVE-2025-14320 on the Online Support Application.</li>
<li>Implement proper input validation and output encoding to prevent XSS vulnerabilities in the application based on CWE-79.</li>
<li>Deploy the provided Sigma rule to detect potential XSS attempts in web server logs.</li>
<li>Educate users about the dangers of clicking on suspicious links to mitigate the initial access vector.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>xss</category><category>reflected-xss</category><category>cve-2025-14320</category></item><item><title>Multiple Vulnerabilities in Rapid7 Velociraptor</title><link>https://feed.craftedsignal.io/briefs/2026-05-velociraptor-vulns/</link><pubDate>Mon, 04 May 2026 09:14:11 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-velociraptor-vulns/</guid><description>Multiple vulnerabilities in Rapid7 Velociraptor could allow an attacker to disclose information or cause a denial of service.</description><content:encoded><![CDATA[<p>Multiple vulnerabilities have been identified in Rapid7 Velociraptor. An attacker could potentially exploit these vulnerabilities to achieve information disclosure or to trigger a denial-of-service (DoS) condition. While specific CVEs or technical details are not provided in the advisory, the potential impact necessitates proactive monitoring and mitigation strategies to prevent exploitation. This issue was reported on 2026-05-04. Defenders should monitor for unusual activity related to Velociraptor instances, particularly activity indicative of unauthorized data access or resource exhaustion.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable instance of Rapid7 Velociraptor.</li>
<li>The attacker crafts a malicious request targeting one of the undisclosed vulnerabilities.</li>
<li>The vulnerable Velociraptor instance processes the malicious request.</li>
<li>For information disclosure, the system exposes sensitive data such as configuration details, user information, or internal system data, accessible to the attacker.</li>
<li>For Denial of Service, the vulnerable component consumes excessive resources (CPU, memory, network bandwidth).</li>
<li>Legitimate user requests to Velociraptor are delayed or fail due to resource exhaustion.</li>
<li>The attacker repeats the malicious request to sustain the Denial of Service condition.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities could lead to unauthorized disclosure of sensitive information managed by Rapid7 Velociraptor. A denial-of-service attack could disrupt monitoring operations and prevent legitimate users from accessing or utilizing the Velociraptor platform, impacting incident response capabilities. The number of affected instances and specific sectors are currently unknown.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor network traffic to Velociraptor instances for suspicious patterns and anomalies indicative of exploitation attempts (network_connection).</li>
<li>Implement rate limiting and input validation mechanisms on Velociraptor endpoints to mitigate potential DoS attacks and information disclosure vulnerabilities (webserver).</li>
<li>Monitor Velociraptor logs for error messages or unusual activity patterns that may indicate exploitation attempts (file_event).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>vulnerability</category><category>denial-of-service</category><category>information-disclosure</category></item><item><title>osrg GoBGP Integer Underflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-gobgp-integer-underflow/</link><pubDate>Mon, 04 May 2026 07:16:01 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-gobgp-integer-underflow/</guid><description>osrg GoBGP up to version 4.3.0 is vulnerable to an integer underflow in the parseRibEntry function, potentially allowing a remote attacker to cause a denial of service or other unspecified impacts; version 4.4.0 addresses this issue.</description><content:encoded><![CDATA[<p>A vulnerability exists in osrg GoBGP, specifically in versions up to 4.3.0. The flaw is located within the <code>parseRibEntry</code> function of the <code>pkg/packet/mrt/mrt.go</code> file. This integer underflow vulnerability, identified as CVE-2026-7736, can be triggered remotely by an attacker who sends malicious or unexpected data to the affected function. Successful exploitation could lead to a denial-of-service condition or other unspecified consequences. Users are advised to upgrade to version 4.4.0, which contains the patch identified as 76d911046344a3923cbe573364197aa081944592, to mitigate the risk. The vulnerability poses a risk to network infrastructure relying on the BGP protocol, potentially impacting routing stability and availability.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a vulnerable GoBGP instance running a version prior to 4.4.0.</li>
<li>The attacker crafts a malicious MRT (Multi-Threaded Routing Toolkit) message.</li>
<li>The attacker sends the crafted MRT message to the vulnerable GoBGP instance. This is typically done over a TCP connection to the BGP port (179).</li>
<li>The <code>parseRibEntry</code> function processes the malicious MRT message.</li>
<li>Due to the integer underflow vulnerability, the <code>parseRibEntry</code> function calculates an incorrect value.</li>
<li>This incorrect value leads to unexpected behavior such as a crash or resource exhaustion.</li>
<li>The GoBGP process becomes unstable or terminates.</li>
<li>This disrupts BGP routing, potentially leading to a denial-of-service condition for network services that rely on BGP.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability could allow a remote attacker to disrupt BGP routing, leading to a denial-of-service condition. The precise impact will depend on the specific network configuration and the role of the affected GoBGP instance. Systems relying on the BGP protocol for routing information could experience connectivity issues or routing instability. While the number of affected deployments is unknown, any organization utilizing GoBGP in their network infrastructure is potentially at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to GoBGP version 4.4.0 or later to remediate the integer underflow vulnerability described in CVE-2026-7736.</li>
<li>Monitor network traffic for unexpected MRT messages being sent to GoBGP instances using the Sigma rule provided below.</li>
<li>Review and harden BGP configurations to limit exposure and potential attack surface.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>cve</category><category>vulnerability</category><category>integer underflow</category><category>bgp</category></item><item><title>GoBGP AIGP Attribute Parser Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-gobgp-buffer-overflow/</link><pubDate>Mon, 04 May 2026 06:16:02 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-gobgp-buffer-overflow/</guid><description>A remote buffer overflow vulnerability exists in osrg GoBGP up to version 4.3.0 within the PathAttributeAigp.DecodeFromBytes function, allowing attackers to potentially execute arbitrary code by manipulating the AIGP Attribute Parser.</description><content:encoded><![CDATA[<p>A buffer overflow vulnerability has been identified in the osrg GoBGP software, specifically affecting versions up to 4.3.0. The vulnerability resides in the <code>PathAttributeAigp.DecodeFromBytes</code> function of the <code>pkg/packet/bgp/bgp.go</code> file, which is part of the AIGP Attribute Parser component. An attacker can remotely trigger this vulnerability by sending a crafted BGP message containing a malicious AIGP attribute. Successful exploitation could lead to arbitrary code execution on the affected system. GoBGP is an open source BGP implementation. Organizations using GoBGP for routing purposes should upgrade to version 4.4.0 or apply the provided patch (51ad1ada06cb41ce47b7066799981816f50b7ced) to mitigate this risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a GoBGP instance running a vulnerable version (&lt;= 4.3.0).</li>
<li>Attacker crafts a malicious BGP update message containing a specially crafted AIGP attribute.</li>
<li>The crafted AIGP attribute is designed to trigger a buffer overflow in the <code>PathAttributeAigp.DecodeFromBytes</code> function.</li>
<li>The attacker sends the malicious BGP update message to the vulnerable GoBGP instance over TCP port 179.</li>
<li>The GoBGP instance receives the message and attempts to parse the AIGP attribute using the vulnerable function.</li>
<li>The <code>PathAttributeAigp.DecodeFromBytes</code> function fails to properly validate the size of the input data, leading to a buffer overflow.</li>
<li>The buffer overflow overwrites adjacent memory regions, potentially including critical program data or executable code.</li>
<li>The attacker leverages the memory corruption to execute arbitrary code on the GoBGP instance, gaining control of the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows a remote attacker to execute arbitrary code on the affected GoBGP instance. This can lead to a complete compromise of the routing infrastructure, allowing the attacker to intercept, modify, or disrupt network traffic. In service provider environments, this could affect a large number of customers and cause significant network outages. Given the CVSS v3.1 score of 7.3, this is considered a high-severity vulnerability.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to GoBGP version 4.4.0 to remediate the vulnerability as mentioned in the overview.</li>
<li>Apply the patch <code>51ad1ada06cb41ce47b7066799981816f50b7ced</code> to the affected component to mitigate the vulnerability if upgrading is not immediately possible.</li>
<li>Monitor network traffic for BGP update messages with unusually large or malformed AIGP attributes, using a network intrusion detection system.</li>
<li>Deploy the Sigma rule detecting connections to port 179 from unusual sources to identify potentially malicious hosts attempting to exploit the vulnerability.</li>
<li>Review and harden BGP configuration to limit accepted peer connections to trusted sources only.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-7735</category><category>buffer-overflow</category><category>bgp</category></item><item><title>Funadmin Unrestricted File Upload Vulnerability (CVE-2026-7733)</title><link>https://feed.craftedsignal.io/briefs/2026-05-funadmin-upload/</link><pubDate>Mon, 04 May 2026 06:16:02 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-funadmin-upload/</guid><description>Funadmin versions up to 7.1.0-rc6 are vulnerable to unrestricted file uploads due to improper handling of the File argument in the UploadService::chunkUpload function, potentially leading to remote code execution.</description><content:encoded><![CDATA[<p>Funadmin, a web framework, is vulnerable to an unrestricted file upload vulnerability (CVE-2026-7733) affecting versions up to 7.1.0-rc6. The vulnerability exists within the <code>UploadService::chunkUpload</code> function in the <code>app/common/service/UploadService.php</code> file, which handles frontend chunked uploads. An attacker can manipulate the <code>File</code> argument during the upload process to bypass security checks and upload arbitrary files. The vulnerability is remotely exploitable, and an exploit has been published. Patch 59 is available to remediate this vulnerability. This issue enables attackers to upload malicious files, such as web shells or executable code, leading to potential remote code execution on the affected server.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a Funadmin instance running a vulnerable version (&lt;= 7.1.0-rc6).</li>
<li>The attacker sends a crafted HTTP request to the <code>UploadService::chunkUpload</code> endpoint.</li>
<li>The request includes a manipulated <code>File</code> argument, bypassing file type and size restrictions.</li>
<li>The vulnerable <code>UploadService::chunkUpload</code> function processes the malicious file without proper validation.</li>
<li>The malicious file is written to the server&rsquo;s file system in a publicly accessible directory.</li>
<li>The attacker accesses the uploaded file, potentially triggering execution (e.g., accessing a PHP web shell).</li>
<li>If the uploaded file is executable code (webshell), the attacker can execute arbitrary commands on the server.</li>
<li>The attacker gains control of the web server and potentially pivots to other systems within the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to upload arbitrary files to the Funadmin server. This can lead to several severe consequences, including remote code execution, web server defacement, data exfiltration, and complete system compromise. Given the ease of exploitation (an exploit is publicly available), affected systems are at high risk of being targeted. Organizations using vulnerable versions of Funadmin should apply patch 59 immediately to prevent potential attacks.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply patch 59 to all Funadmin installations running versions up to 7.1.0-rc6 as recommended by the vendor.</li>
<li>Monitor web server logs for unusual activity related to file uploads, specifically requests targeting the <code>UploadService::chunkUpload</code> endpoint (reference: Attack Chain).</li>
<li>Deploy the Sigma rule provided to detect attempts to exploit CVE-2026-7733 by monitoring for requests to the vulnerable endpoint with suspicious parameters.</li>
<li>Implement web application firewall (WAF) rules to filter out requests with malicious payloads targeting the <code>UploadService::chunkUpload</code> endpoint (reference: Attack Chain).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve</category><category>unrestricted file upload</category><category>remote code execution</category></item><item><title>Shandong Hoteam PDM Product Data Management System SQL Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-hoteam-pdm-sqli/</link><pubDate>Mon, 04 May 2026 05:16:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-hoteam-pdm-sqli/</guid><description>Shandong Hoteam Software PDM Product Data Management System up to version 8.3.9 is vulnerable to SQL injection via manipulation of the SortOrder argument in the GetQueryMachineGridOnePageData function of the /Base/BaseService.asmx/DataService file, allowing remote attackers to potentially execute arbitrary SQL commands.</description><content:encoded><![CDATA[<p>Shandong Hoteam Software&rsquo;s PDM Product Data Management System before version 8.3.10 is susceptible to a SQL injection vulnerability. The vulnerability exists in the <code>/Base/BaseService.asmx/DataService</code> file, specifically affecting the <code>GetQueryMachineGridOnePageData</code> function. By manipulating the <code>SortOrder</code> argument, a remote attacker can inject malicious SQL queries into the system. Successful exploitation could lead to unauthorized data access, modification, or even complete system compromise. Organizations using versions prior to 8.3.10 are urged to upgrade immediately to mitigate the risk. This vulnerability was reported on May 4, 2026.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable Shandong Hoteam PDM instance running a version prior to 8.3.10.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>/Base/BaseService.asmx/DataService</code> endpoint.</li>
<li>Within the HTTP request, the attacker modifies the <code>SortOrder</code> argument.</li>
<li>The <code>SortOrder</code> argument is injected with SQL code.</li>
<li>The application fails to properly sanitize the attacker-supplied SQL code.</li>
<li>The application executes the attacker-controlled SQL query against the backend database.</li>
<li>The attacker gains unauthorized access to sensitive data stored within the database.</li>
<li>The attacker exfiltrates the data or uses it for further malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability allows remote attackers to execute arbitrary SQL commands on the affected system. This can lead to unauthorized access to sensitive data, modification of data, or even complete compromise of the database server. Organizations using vulnerable versions of Shandong Hoteam PDM Product Data Management System could suffer significant data breaches, financial losses, and reputational damage. There are no specific victim counts or sector targeting available, but this could affect any organization utilizing the vulnerable PDM system.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Shandong Hoteam Software PDM Product Data Management System to version 8.3.10 or later to remediate the vulnerability as mentioned in the overview.</li>
<li>Implement the provided Sigma rule <code>Detect Hoteam PDM SQL Injection Attempt</code> to identify malicious requests targeting the vulnerable endpoint.</li>
<li>Monitor web server logs for suspicious requests containing potentially malicious SQL syntax in the <code>SortOrder</code> parameter, as described in the attack chain.</li>
<li>Implement proper input validation and sanitization techniques to prevent SQL injection vulnerabilities in web applications, mitigating similar risks in the future.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>cve-2026-7727</category><category>webserver</category></item><item><title>Totolink WA300 Buffer Overflow Vulnerability (CVE-2026-7719)</title><link>https://feed.craftedsignal.io/briefs/2024-01-totolink-wa300-buffer-overflow/</link><pubDate>Mon, 04 May 2026 02:15:58 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-totolink-wa300-buffer-overflow/</guid><description>A buffer overflow vulnerability exists in Totolink WA300 version 5.2cu.7112_B20190227 within the loginauth function of the /cgi-bin/cstecgi.cgi file, specifically affecting the POST Request Handler component, triggerable via manipulation of the http_host argument, and remotely exploitable with a publicly available exploit.</description><content:encoded><![CDATA[<p>A critical buffer overflow vulnerability, identified as CVE-2026-7719, has been discovered in Totolink WA300 version 5.2cu.7112_B20190227. This vulnerability resides within the <code>loginauth</code> function of the <code>/cgi-bin/cstecgi.cgi</code> file, affecting the POST Request Handler component. The vulnerability is triggered by manipulating the <code>http_host</code> argument in a POST request. The exploit is publicly available, increasing the risk of widespread exploitation. This vulnerability allows for remote code execution, potentially granting attackers full control over the affected device. The affected version was released in February 2019. Defenders should prioritize patching or mitigating this vulnerability to prevent potential compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable Totolink WA300 device running firmware version 5.2cu.7112_B20190227.</li>
<li>The attacker crafts a malicious HTTP POST request targeting the <code>/cgi-bin/cstecgi.cgi</code> endpoint.</li>
<li>The crafted POST request includes a specially crafted <code>http_host</code> argument designed to overflow the buffer in the <code>loginauth</code> function.</li>
<li>The vulnerable <code>loginauth</code> function processes the <code>http_host</code> argument without proper bounds checking.</li>
<li>The oversized <code>http_host</code> argument overwrites adjacent memory regions, including the return address on the stack.</li>
<li>Upon completion of the <code>loginauth</code> function, the overwritten return address is used, redirecting execution to attacker-controlled code.</li>
<li>The attacker-controlled code executes with elevated privileges, allowing the attacker to execute arbitrary commands on the device.</li>
<li>The attacker gains complete control of the device, potentially using it for malicious purposes such as botnet participation, data theft, or further network penetration.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7719 allows a remote attacker to execute arbitrary code on the vulnerable Totolink WA300 device. This can lead to complete device compromise, allowing the attacker to steal sensitive information, use the device as a botnet node, or pivot to other devices on the network. Given the public availability of the exploit, widespread exploitation is possible, potentially affecting a large number of home and small business networks using the vulnerable device.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect Totolink WA300 HTTP Host Buffer Overflow Attempt</code> to identify exploitation attempts in web server logs.</li>
<li>Monitor web server logs for POST requests to <code>/cgi-bin/cstecgi.cgi</code> with unusually long <code>http_host</code> headers.</li>
<li>Consider deploying a web application firewall (WAF) rule to filter out malicious requests targeting CVE-2026-7719.</li>
<li>Upgrade to a patched version of the firmware or replace the affected device to remediate the vulnerability.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>buffer overflow</category><category>remote code execution</category><category>cve-2026-7719</category><category>totolink</category></item><item><title>YunaiV yudao-cloud Authentication Bypass Vulnerability (CVE-2026-7710)</title><link>https://feed.craftedsignal.io/briefs/2026-05-yunai-auth-bypass/</link><pubDate>Mon, 04 May 2026 00:16:39 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-yunai-auth-bypass/</guid><description>YunaiV yudao-cloud up to version 3.8.0 is vulnerable to an authentication bypass (CVE-2026-7710) due to improper handling of the mock-token argument in the JwtAuthenticationTokenFilter.java file, allowing remote attackers to bypass authentication.</description><content:encoded><![CDATA[<p>CVE-2026-7710 is an authentication bypass vulnerability affecting YunaiV&rsquo;s yudao-cloud, specifically versions up to 3.8.0. The vulnerability resides in the <code>doFilterInternal</code> function within the <code>JwtAuthenticationTokenFilter.java</code> file of the Ruoyi-Vue-Pro component. An attacker can exploit this vulnerability by manipulating the <code>mock-token</code> argument, leading to improper authentication. This allows a remote attacker to potentially gain unauthorized access to the application. Public exploits are available, increasing the risk of exploitation. The vendor was notified but has not responded.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a YunaiV yudao-cloud instance running a vulnerable version (&lt;= 3.8.0).</li>
<li>Attacker crafts a malicious HTTP request targeting an endpoint protected by authentication.</li>
<li>The crafted request includes a manipulated <code>mock-token</code> argument designed to bypass the JWT authentication filter.</li>
<li>The <code>JwtAuthenticationTokenFilter.java</code> component processes the request and improperly validates the manipulated <code>mock-token</code>.</li>
<li>Due to the flawed authentication logic, the attacker is granted unauthorized access as an authenticated user.</li>
<li>Attacker gains access to protected resources and functionalities within the application.</li>
<li>Attacker performs privileged actions such as data modification, account takeover, or further exploitation of the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7710 allows attackers to bypass authentication and gain unauthorized access to YunaiV yudao-cloud applications. This can lead to the compromise of sensitive data, modification of application settings, and potentially full system takeover. Given the availability of public exploits, organizations using affected versions of yudao-cloud are at high risk. The CVSS v3.1 base score for this vulnerability is 7.3, indicating a high severity level.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade YunaiV yudao-cloud to a patched version that addresses CVE-2026-7710.</li>
<li>Deploy the Sigma rule <code>Detect Malicious Mock Token Argument</code> to identify exploitation attempts by monitoring web server logs for the presence of a <code>mock-token</code> argument.</li>
<li>Implement input validation on the server side to ensure that <code>mock-token</code> values conform to expected patterns.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>authentication bypass</category><category>cve-2026-7710</category><category>web application</category></item><item><title>Multiple Vulnerabilities in Mozilla Thunderbird Allow for Remote Code Execution and Data Breach</title><link>https://feed.craftedsignal.io/briefs/2026-05-thunderbird-vulns/</link><pubDate>Mon, 04 May 2026 00:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-thunderbird-vulns/</guid><description>Multiple vulnerabilities in Mozilla Thunderbird prior to versions 150.0.1 and Thunderbird ESR prior to 140.10.1 could allow a remote attacker to achieve arbitrary code execution, data confidentiality breach, and security policy bypass.</description><content:encoded><![CDATA[<p>On May 4, 2026, CERT-FR published an advisory regarding multiple vulnerabilities affecting Mozilla Thunderbird. Specifically, Thunderbird versions prior to 150.0.1 and Thunderbird ESR versions prior to 140.10.1 are vulnerable. Successful exploitation of these vulnerabilities could allow an attacker to achieve remote code execution, compromise the confidentiality of data, and bypass security policies. The advisory highlights the urgency for users and organizations utilizing affected versions to apply the necessary patches to mitigate these risks. These vulnerabilities underscore the importance of maintaining up-to-date software versions to defend against potential exploitation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a target using a vulnerable version of Mozilla Thunderbird (ESR &lt; 140.10.1 or &lt; 150.0.1).</li>
<li>Attacker crafts a malicious email or leverages a compromised website to deliver a specially crafted exploit.</li>
<li>The user opens the malicious email or visits the compromised website within Thunderbird.</li>
<li>The exploit triggers a vulnerability in Thunderbird, such as CVE-2026-7320 (or another from the listed CVEs), leading to code execution.</li>
<li>Attacker gains initial access to the user&rsquo;s system with the privileges of the Thunderbird process.</li>
<li>Attacker escalates privileges, if necessary, to gain a higher level of control over the system.</li>
<li>Attacker executes arbitrary commands to install malware, exfiltrate sensitive data, or perform other malicious actions.</li>
<li>The attacker achieves their objective, such as data theft, system compromise, or establishing a persistent foothold.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities could have severe consequences. An attacker could remotely execute arbitrary code, potentially leading to full system compromise. Sensitive data stored within Thunderbird, such as emails, contacts, and passwords, could be exposed. The security policy bypass could allow attackers to perform actions that are normally restricted, further compromising the system&rsquo;s security. This can lead to significant financial losses, reputational damage, and legal liabilities for affected organizations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately upgrade Mozilla Thunderbird to version 150.0.1 or later, or Thunderbird ESR to version 140.10.1 or later, to patch the vulnerabilities described in Mozilla security advisories mfsa2026-38 and mfsa2026-39.</li>
<li>Deploy the Sigma rule &ldquo;Detect Thunderbird Spawning Suspicious Processes&rdquo; to identify potential exploitation attempts via unusual child processes.</li>
<li>Monitor process creation events for Thunderbird spawning command interpreters or script engines using the Sigma rule &ldquo;Detect Thunderbird Running External Commands&rdquo;.</li>
<li>Review and harden email security policies to prevent the delivery of malicious emails that could exploit these vulnerabilities.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>vulnerability</category><category>rce</category><category>databreach</category><category>securitybypass</category></item><item><title>AV Stumpfl Pixera Two Media Server Code Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-pixera-code-injection/</link><pubDate>Sun, 03 May 2026 17:16:13 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-pixera-code-injection/</guid><description>A remote code injection vulnerability exists in AV Stumpfl Pixera Two Media Server versions up to 25.2 R2 due to improper handling within the Websocket API, potentially allowing unauthenticated attackers to execute arbitrary code.</description><content:encoded><![CDATA[<p>A code injection vulnerability, tracked as CVE-2026-7703, has been identified in AV Stumpfl Pixera Two Media Server impacting versions up to 25.2 R2. The vulnerability resides within an unspecified function of the Websocket API component. Successful exploitation allows a remote attacker to inject and execute arbitrary code on the affected system. Given that an exploit has been published, the risk of exploitation is elevated. Organizations using the Pixera Two Media Server should upgrade to version 25.2 R3 or later to mitigate the risk. This vulnerability poses a significant threat to media production environments relying on the affected software.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable AV Stumpfl Pixera Two Media Server instance running a version prior to 25.2 R3.</li>
<li>The attacker crafts a malicious payload designed to exploit the code injection vulnerability within the Websocket API.</li>
<li>The attacker sends the malicious payload to the Pixera Two Media Server instance via a Websocket connection.</li>
<li>The vulnerable function within the Websocket API fails to properly sanitize or validate the input.</li>
<li>The malicious payload is processed, resulting in the injection of attacker-controlled code into the server&rsquo;s process.</li>
<li>The injected code executes with the privileges of the Pixera Two Media Server process.</li>
<li>The attacker gains arbitrary code execution on the server, potentially leading to complete system compromise.</li>
<li>The attacker can then install malware, exfiltrate sensitive data, or disrupt media server operations.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7703 can result in arbitrary code execution on the AV Stumpfl Pixera Two Media Server. This could allow an attacker to gain complete control over the server, potentially disrupting media presentations, stealing sensitive data, or using the compromised server as a launchpad for further attacks within the network. The impact is significant due to the critical role media servers play in various entertainment and presentation environments.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade AV Stumpfl Pixera Two Media Server to version 25.2 R3 or later to patch CVE-2026-7703 (reference: AV Stumpfl advisory).</li>
<li>Monitor network traffic for suspicious Websocket connections originating from or targeting AV Stumpfl Pixera Two Media Servers using the &ldquo;Detect Suspicious Pixera Websocket Activity&rdquo; Sigma rule.</li>
<li>Implement network segmentation to limit the blast radius of a potential compromise of the Pixera Two Media Server.</li>
<li>Review and harden the configuration of the Pixera Two Media Server to minimize the attack surface.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>code-injection</category><category>websocket</category><category>cve-2026-7703</category></item><item><title>Tiandy Easy7 Integrated Management Platform OS Command Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-tiandy-command-injection/</link><pubDate>Sun, 03 May 2026 14:16:27 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-tiandy-command-injection/</guid><description>CVE-2026-7698 allows for remote OS command injection in Tiandy Easy7 Integrated Management Platform 7.17.0 via manipulation of the 'week' argument in the /Easy7/rest/systemInfo/updateDbBackupInfo file.</description><content:encoded><![CDATA[<p>A critical vulnerability, CVE-2026-7698, has been identified in Tiandy Easy7 Integrated Management Platform version 7.17.0. This vulnerability resides within the <code>/Easy7/rest/systemInfo/updateDbBackupInfo</code> file, specifically related to the <code>week</code> argument. Successful exploitation allows for arbitrary OS command injection. This vulnerability is remotely exploitable, meaning an attacker can trigger it over the network without needing local access. Publicly available exploit code exists, increasing the likelihood of exploitation. The vendor was notified but has not responded. Defenders should take immediate action to mitigate this risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a vulnerable Tiandy Easy7 Integrated Management Platform running version 7.17.0.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>/Easy7/rest/systemInfo/updateDbBackupInfo</code> endpoint.</li>
<li>The crafted request includes a payload within the <code>week</code> argument designed to inject OS commands.</li>
<li>The vulnerable application fails to properly sanitize or validate the <code>week</code> argument.</li>
<li>The application executes the injected OS command with the privileges of the web server.</li>
<li>The attacker gains arbitrary code execution on the server.</li>
<li>The attacker can then perform further actions such as installing malware, exfiltrating data, or pivoting to other systems on the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7698 allows an attacker to execute arbitrary commands on the affected system. This could lead to complete system compromise, data breaches, denial of service, or further lateral movement within the network. Given the publicly available exploit, organizations using Tiandy Easy7 Integrated Management Platform 7.17.0 are at immediate risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply available patches from Tiandy if they become available.</li>
<li>Monitor web server logs for requests to <code>/Easy7/rest/systemInfo/updateDbBackupInfo</code> containing suspicious characters or command injection attempts. Deploy the Sigma rule <code>Detect Suspicious Requests to updateDbBackupInfo</code> to your SIEM.</li>
<li>Implement input validation and sanitization on the <code>week</code> argument within the <code>/Easy7/rest/systemInfo/updateDbBackupInfo</code> endpoint.</li>
<li>Monitor process creation events for unusual processes spawned by the web server, using the Sigma rule <code>Detect OS Command Injection via Web Request</code>.</li>
<li>Review and restrict network access to the Tiandy Easy7 Integrated Management Platform to only authorized users and systems.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-7698</category><category>command-injection</category><category>web-application</category></item><item><title>Acrel ECEMS SQL Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-acrel-sql-injection/</link><pubDate>Sun, 03 May 2026 12:15:59 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-acrel-sql-injection/</guid><description>A SQL injection vulnerability in Acrel Electrical ECEMS Enterprise Microgrid Energy Efficiency Management System 1.3.0 allows remote attackers to execute arbitrary SQL commands by manipulating the 'fCircuitids' argument in the '/SubstationWEBV2/main/elecMaxMinAvgValue' file.</description><content:encoded><![CDATA[<p>Acrel Electrical&rsquo;s ECEMS Enterprise Microgrid Energy Efficiency Management System version 1.3.0 is vulnerable to SQL injection. The vulnerability resides in the <code>/SubstationWEBV2/main/elecMaxMinAvgValue</code> file, where manipulation of the <code>fCircuitids</code> argument allows for the injection of arbitrary SQL commands. The vulnerability, identified as CVE-2026-7694, can be exploited remotely without authentication, posing a significant risk to systems exposed to the network. The vendor was notified but did not respond, and a public exploit is available, increasing the likelihood of exploitation. This flaw allows attackers to potentially access, modify, or delete sensitive data within the ECEMS database.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies an accessible instance of Acrel ECEMS 1.3.0.</li>
<li>Attacker crafts a malicious SQL payload designed to extract sensitive information or modify the database.</li>
<li>The attacker sends a crafted HTTP request to <code>/SubstationWEBV2/main/elecMaxMinAvgValue</code> with the SQL payload embedded in the <code>fCircuitids</code> parameter.</li>
<li>The ECEMS application fails to properly sanitize the <code>fCircuitids</code> input.</li>
<li>The application executes the attacker-supplied SQL query against the database.</li>
<li>The database server processes the malicious query, potentially returning sensitive data or executing harmful commands.</li>
<li>The attacker receives the output of the injected SQL query.</li>
<li>The attacker uses the extracted information for further malicious activities, such as data exfiltration, privilege escalation, or denial of service.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability could allow an attacker to read sensitive information from the ECEMS database, modify existing data, or even gain administrative access to the system. This could lead to the compromise of energy efficiency management data, potentially impacting grid stability and financial records. Given the lack of vendor response and the availability of a public exploit, organizations using the affected software are at high risk. The impact includes potential data breaches, system outages, and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Inspect web server logs for suspicious requests to <code>/SubstationWEBV2/main/elecMaxMinAvgValue</code> containing potentially malicious SQL syntax within the <code>fCircuitids</code> parameter (see Sigma rule &ldquo;Detect Acrel ECEMS SQL Injection Attempt&rdquo;).</li>
<li>Deploy the Sigma rule &ldquo;Detect SQL Injection Error Messages&rdquo; to identify potential SQL injection attempts across all web applications.</li>
<li>Apply input validation and sanitization to all user-supplied input, especially the <code>fCircuitids</code> parameter in <code>/SubstationWEBV2/main/elecMaxMinAvgValue</code>, to prevent SQL injection.</li>
<li>Consider deploying a web application firewall (WAF) to filter out malicious requests targeting this vulnerability.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>cve-2026-7694</category><category>webserver</category></item><item><title>Microsoft Product Vulnerability CVE-2026-37555</title><link>https://feed.craftedsignal.io/briefs/2024-01-cve-2026-37555/</link><pubDate>Sun, 03 May 2026 07:52:20 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-cve-2026-37555/</guid><description>CVE-2026-37555 is a vulnerability affecting a Microsoft product, requiring further investigation upon patch release.</description><content:encoded><![CDATA[<p>On May 3, 2026, Microsoft published initial information regarding CVE-2026-37555. The advisory indicates a vulnerability exists within a Microsoft product. Due to the limited information available at this time, the specific product affected and the nature of the vulnerability are unknown. Defenders should monitor Microsoft&rsquo;s security update guide for further details as they become available. This initial brief serves as an early notification, and will be updated when more information is released.</p>
<h2 id="attack-chain">Attack Chain</h2>
<p>Due to the limited information available, a detailed attack chain cannot be constructed at this time. The following steps are a generalized potential attack chain that may be relevant depending on the specific vulnerability details released by Microsoft.</p>
<ol>
<li>Attacker identifies a vulnerable Microsoft product exposed to the network or internet.</li>
<li>Attacker crafts a malicious payload targeting the specific vulnerability (details unknown).</li>
<li>Attacker delivers the payload to the vulnerable product, potentially through a network connection or file upload.</li>
<li>The vulnerable product processes the malicious payload, triggering the vulnerability.</li>
<li>Attacker gains unauthorized access to the system, potentially achieving remote code execution.</li>
<li>Attacker establishes persistence on the compromised system.</li>
<li>Attacker performs lateral movement within the network to compromise additional systems.</li>
<li>Attacker achieves their objective, such as data exfiltration or system disruption.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The potential impact of CVE-2026-37555 is currently unknown. Depending on the nature of the vulnerability, successful exploitation could lead to remote code execution, information disclosure, denial of service, or other adverse effects. Organizations should monitor for updates from Microsoft and prioritize patching affected systems as soon as a patch is released.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor the Microsoft Security Response Center (<a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-37555">https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-37555</a>) for updated information on CVE-2026-37555.</li>
<li>When the affected product is announced, deploy the Sigma rules below to your SIEM and tune for your environment.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>vulnerability</category><category>microsoft</category><category>cve-2026-37555</category></item><item><title>Microsoft CVE-2026-30656 Information Published</title><link>https://feed.craftedsignal.io/briefs/2024-01-cve-2026-30656-info-published/</link><pubDate>Sun, 03 May 2026 07:52:20 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-cve-2026-30656-info-published/</guid><description>Microsoft published information regarding CVE-2026-30656, but the details of the vulnerability are not available.</description><content:encoded><![CDATA[<p>On May 3, 2026, Microsoft published a security update guide entry for CVE-2026-30656. At this time, no details regarding the nature of the vulnerability, affected products, or potential impact are available. Defenders should monitor Microsoft&rsquo;s security resources for updates and apply patches as they become available. Due to the limited information, creating targeted detections is currently not possible. More information is required to understand the potential attack vectors and develop effective mitigations.</p>
<h2 id="attack-chain">Attack Chain</h2>
<p>Due to the lack of details regarding CVE-2026-30656, a specific attack chain cannot be outlined at this time. The steps below represent a generic exploitation scenario:</p>
<ol>
<li>Initial Access: Attacker identifies a vulnerable system exposed to the network.</li>
<li>Exploitation: Attacker leverages CVE-2026-30656 to execute arbitrary code.</li>
<li>Privilege Escalation: Attacker escalates privileges to gain higher-level access.</li>
<li>Lateral Movement: Attacker moves laterally to other systems on the network.</li>
<li>Persistence: Attacker establishes persistent access to the compromised systems.</li>
<li>Data Exfiltration: Attacker exfiltrates sensitive data from the compromised network.</li>
<li>Impact: Attacker achieves their objective, such as data theft or system disruption.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The impact of CVE-2026-30656 is currently unknown. Depending on the affected product and the nature of the vulnerability, successful exploitation could lead to a range of outcomes, including remote code execution, denial of service, or information disclosure. Without further details, the potential damage is difficult to assess, but defenders should prioritize monitoring for updates from Microsoft and promptly apply any released patches.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor the Microsoft Security Response Center (<a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-30656">https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-30656</a>) for updates and technical details regarding CVE-2026-30656.</li>
<li>When details are released, prioritize patching affected systems based on their criticality and exposure.</li>
<li>Review existing security controls and incident response plans to ensure they are adequate for addressing potential exploitation attempts targeting Microsoft products.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>vulnerability</category><category>microsoft</category></item><item><title>Edimax BR-6428nC Buffer Overflow Vulnerability (CVE-2026-7684)</title><link>https://feed.craftedsignal.io/briefs/2026-05-edimax-br-6428nc-buffer-overflow/</link><pubDate>Sun, 03 May 2026 07:16:25 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-edimax-br-6428nc-buffer-overflow/</guid><description>A remote buffer overflow vulnerability exists in Edimax BR-6428nC devices up to version 1.16 via manipulation of the pptpDfGateway argument in the /goform/setWAN file, potentially allowing for arbitrary code execution.</description><content:encoded><![CDATA[<p>A buffer overflow vulnerability, tracked as CVE-2026-7684, affects Edimax BR-6428nC devices up to version 1.16. The vulnerability resides in the <code>/goform/setWAN</code> file, specifically within the handling of the <code>pptpDfGateway</code> argument. An unauthenticated attacker can exploit this flaw remotely by sending a crafted request to the device. Publicly available exploit code exists, increasing the risk of widespread exploitation. The vendor was notified but did not respond, suggesting that a patch is unlikely and highlighting the need for mitigation strategies.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies an Edimax BR-6428nC device running a vulnerable firmware version (&lt;= 1.16).</li>
<li>The attacker crafts a malicious HTTP POST request targeting the <code>/goform/setWAN</code> endpoint.</li>
<li>The request includes the <code>pptpDfGateway</code> parameter with a value exceeding the expected buffer size.</li>
<li>The device processes the request, and the oversized <code>pptpDfGateway</code> value overflows the buffer, overwriting adjacent memory regions.</li>
<li>The attacker carefully crafts the overflow to overwrite the return address, redirecting execution flow.</li>
<li>Execution is redirected to attacker-controlled code injected within the overflowed buffer.</li>
<li>The attacker gains arbitrary code execution on the device, potentially achieving full system control.</li>
<li>The attacker could then use this control to modify device settings, intercept network traffic, or establish a persistent backdoor.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability can allow an attacker to gain complete control of the Edimax BR-6428nC device. This could enable the attacker to intercept and modify network traffic, access sensitive information, or use the device as a point of entry for further attacks within the network. Given the public availability of exploit code, the risk of widespread exploitation is significant.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Edimax_BR_6428nC_Buffer_Overflow_setWAN</code> to detect suspicious HTTP requests targeting the vulnerable endpoint and parameter.</li>
<li>Consider blocking or rate-limiting access to the <code>/goform/setWAN</code> endpoint from untrusted networks.</li>
<li>Since the vendor is unresponsive and a patch is unlikely, network segmentation and access control policies are the best mitigation options.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>buffer overflow</category><category>cve-2026-7684</category><category>webserver</category></item><item><title>Edimax BR-6208AC Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-edimax-bo/</link><pubDate>Sun, 03 May 2026 07:16:25 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-edimax-bo/</guid><description>A buffer overflow vulnerability exists in Edimax BR-6208AC devices (&lt;= 1.02) via manipulation of the pptpDfGateway argument in the /goform/setWAN endpoint, potentially allowing remote attackers to execute arbitrary code.</description><content:encoded><![CDATA[<p>A buffer overflow vulnerability, CVE-2026-7685, has been identified in Edimax BR-6208AC routers up to version 1.02. The vulnerability resides within the <code>/goform/setWAN</code> file, specifically related to the <code>pptpDfGateway</code> argument. Successful exploitation of this flaw could allow a remote attacker to execute arbitrary code or cause a denial-of-service condition. Publicly available exploits exist, increasing the risk of widespread exploitation. The vendor was notified but has not responded. Given the ease of exploitation and the potential for significant impact, this vulnerability poses a critical threat to affected devices.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies an Edimax BR-6208AC router with firmware version 1.02 or earlier exposed to the internet.</li>
<li>The attacker crafts a malicious HTTP POST request targeting the <code>/goform/setWAN</code> endpoint.</li>
<li>Within the POST request, the attacker includes the <code>pptpDfGateway</code> argument, injecting a payload exceeding the buffer&rsquo;s expected size.</li>
<li>The router&rsquo;s web server processes the malicious request without proper input validation on the size of the <code>pptpDfGateway</code> argument.</li>
<li>The oversized payload overwrites adjacent memory regions on the stack, potentially including return addresses or other critical data.</li>
<li>When the function attempts to return, it jumps to an address controlled by the attacker, leading to arbitrary code execution.</li>
<li>The attacker executes commands to gain control of the device, potentially installing malware or modifying router settings.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability can lead to complete compromise of the Edimax BR-6208AC router. An attacker could leverage this access to perform a variety of malicious activities, including eavesdropping on network traffic, injecting malicious code into web pages served by the router, or using the router as a bot in a larger botnet. Given the availability of public exploits, unpatched devices are at immediate risk of compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect Edimax BR-6208AC setWAN Buffer Overflow Attempt</code> to identify exploitation attempts in web server logs.</li>
<li>Inspect web server logs for POST requests to <code>/goform/setWAN</code> containing unusually long <code>pptpDfGateway</code> parameters, as detected by the Sigma rule <code>Detect Long pptpDfGateway Parameter</code>.</li>
<li>Apply appropriate network segmentation to limit the blast radius of compromised devices and prevent lateral movement.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>buffer overflow</category><category>cve-2026-7685</category><category>router</category><category>webserver</category></item><item><title>NEX-Forms WordPress Plugin Vulnerable to Stored Cross-Site Scripting (CVE-2026-5063)</title><link>https://feed.craftedsignal.io/briefs/2026-05-wordpress-nex-forms-xss/</link><pubDate>Sun, 03 May 2026 06:15:57 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-wordpress-nex-forms-xss/</guid><description>The NEX-Forms WordPress plugin is vulnerable to stored XSS via POST parameter key names, allowing unauthenticated attackers to inject arbitrary web scripts.</description><content:encoded><![CDATA[<p>The NEX-Forms – Ultimate Forms Plugin for WordPress, versions up to and including 9.1.11, is susceptible to a stored Cross-Site Scripting (XSS) vulnerability (CVE-2026-5063). This flaw stems from inadequate input sanitization and output escaping within the <code>submit_nex_form()</code> function. Unauthenticated attackers can exploit this vulnerability by injecting malicious JavaScript code through POST parameter key names. Successful exploitation allows the attacker to execute arbitrary scripts in the context of a user&rsquo;s browser when they access a page containing the injected script, potentially leading to session hijacking, defacement, or redirection to malicious sites. The vulnerability was reported to Wordfence and a patch has been released.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker crafts a malicious HTTP POST request to a WordPress page that utilizes the vulnerable NEX-Forms plugin.</li>
<li>The POST request includes specially crafted parameter key names designed to inject JavaScript code.</li>
<li>The <code>submit_nex_form()</code> function processes the POST request without properly sanitizing or escaping the malicious input.</li>
<li>The injected JavaScript code is stored in the WordPress database.</li>
<li>A legitimate user accesses a page where the form data, including the malicious script, is displayed.</li>
<li>The stored JavaScript code executes within the user&rsquo;s browser in the context of the WordPress page.</li>
<li>The attacker can then perform actions such as stealing cookies, redirecting the user, or modifying the page content.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this stored XSS vulnerability allows an unauthenticated attacker to inject arbitrary JavaScript code into pages using the NEX-Forms plugin. This can lead to various malicious outcomes, including user session hijacking, website defacement, or redirection to phishing sites. As the vulnerability is stored, every user who visits a page containing the malicious script will be affected until the vulnerability is patched and the malicious input is removed. The severity is rated as HIGH with a CVSS base score of 7.2.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the NEX-Forms – Ultimate Forms Plugin for WordPress to a version beyond 9.1.11 to patch CVE-2026-5063.</li>
<li>Deploy the Sigma rule <code>Detect Suspicious NEX-Forms POST Requests</code> to identify potential exploitation attempts.</li>
<li>Monitor web server logs for suspicious POST requests containing potentially malicious JavaScript code in parameter names.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>wordpress</category><category>xss</category><category>stored-xss</category><category>cve-2026-5063</category></item><item><title>code-projects Online Hospital Management System SQL Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-online-hospital-management-sql-injection/</link><pubDate>Sat, 02 May 2026 14:16:18 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-online-hospital-management-sql-injection/</guid><description>CVE-2026-7632 is a SQL injection vulnerability in code-projects Online Hospital Management System 1.0, allowing a remote attacker to execute arbitrary SQL commands by manipulating the 'delid' argument in the '/viewappointment.php' file.</description><content:encoded><![CDATA[<p>CVE-2026-7632 is a critical security flaw affecting code-projects Online Hospital Management System version 1.0. The vulnerability lies within the <code>/viewappointment.php</code> file, where insufficient input validation allows for SQL injection via the <code>delid</code> argument. A remote attacker can exploit this vulnerability to inject arbitrary SQL queries, potentially leading to unauthorized data access, modification, or deletion. The exploit is publicly disclosed, increasing the risk of widespread exploitation. This vulnerability poses a significant threat to organizations using the affected system, as it could compromise sensitive patient data and disrupt hospital operations.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies an instance of code-projects Online Hospital Management System 1.0 running the vulnerable <code>/viewappointment.php</code> script.</li>
<li>The attacker crafts a malicious HTTP request targeting <code>/viewappointment.php</code> with a specially crafted <code>delid</code> parameter containing SQL injection payloads.</li>
<li>The application fails to properly sanitize the <code>delid</code> input, allowing the injected SQL code to be passed to the database.</li>
<li>The injected SQL code is executed against the database server.</li>
<li>The attacker retrieves sensitive data such as patient records, usernames, and passwords from the database using SQL queries like <code>UNION SELECT</code>.</li>
<li>The attacker may modify or delete data within the database.</li>
<li>The attacker could potentially escalate privileges within the application by manipulating user roles or injecting administrative accounts.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7632 can lead to severe consequences, including unauthorized access to sensitive patient data, such as medical history, personal information, and financial records. Attackers could modify or delete critical data, disrupting hospital operations and potentially impacting patient care. The vulnerability could also allow attackers to gain control of the system, leading to further malicious activities like data exfiltration or ransomware deployment. This poses a significant risk to the privacy and security of patient information.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect SQL Injection in Online Hospital Management System</code> to your SIEM to identify exploitation attempts targeting the <code>/viewappointment.php</code> endpoint.</li>
<li>Implement input validation and sanitization measures in the <code>/viewappointment.php</code> script to prevent SQL injection attacks.</li>
<li>Upgrade to a patched version of code-projects Online Hospital Management System that addresses CVE-2026-7632 (if available).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>web-application</category><category>vulnerability</category></item><item><title>WordPress WCFM Plugin Vulnerable to IDOR Leading to Account Deletion</title><link>https://feed.craftedsignal.io/briefs/2026-05-wordpress-wcfm-idor/</link><pubDate>Sat, 02 May 2026 14:16:17 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-wordpress-wcfm-idor/</guid><description>The WCFM plugin for WordPress is vulnerable to an Insecure Direct Object Reference (IDOR) that allows authenticated attackers with Vendor-level access or higher to delete arbitrary users, including administrators.</description><content:encoded><![CDATA[<p>The WCFM – Frontend Manager for WooCommerce along with Bookings Subscription Listings Compatible plugin, a popular WordPress plugin, is affected by an Insecure Direct Object Reference (IDOR) vulnerability. This flaw, present in versions up to and including 6.7.25, stems from a lack of proper validation on the <code>customerid</code> parameter within the <code>wcfm_delete_wcfm_customer</code> function. An attacker with Vendor-level privileges or higher can exploit this vulnerability to delete any user account on the WordPress instance, including those with administrative rights. This can lead to complete compromise of the affected website.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker authenticates to the WordPress site with Vendor-level access or higher.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>wcfm_delete_wcfm_customer</code> function.</li>
<li>The attacker includes the <code>customerid</code> parameter in the request, setting its value to the ID of the target user account they wish to delete.</li>
<li>Due to the missing validation on the <code>customerid</code> parameter, the application directly uses the provided ID to locate the user account.</li>
<li>The <code>wcfm_delete_wcfm_customer</code> function proceeds to delete the user account identified by the attacker-supplied <code>customerid</code>.</li>
<li>The targeted user account is successfully deleted from the WordPress instance.</li>
<li>If the deleted user account was an administrator, the attacker can effectively take control of the website.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this IDOR vulnerability allows an attacker to delete arbitrary user accounts, including those with administrative privileges. This can lead to a complete compromise of the affected WordPress website. An attacker could then deface the website, steal sensitive data, or use it to launch further attacks. Due to the popularity of the plugin, a large number of WooCommerce stores are potentially affected.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the latest available patch or upgrade to a version of the WCFM plugin greater than 6.7.25 to remediate CVE-2026-2554.</li>
<li>Monitor web server logs for suspicious requests to <code>wcfm_delete_wcfm_customer</code> with unusual <code>customerid</code> values, using the Sigma rule provided below.</li>
<li>Implement input validation on the <code>customerid</code> parameter within the <code>wcfm_delete_wcfm_customer</code> function to prevent arbitrary user deletion.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>idor</category><category>wordpress</category><category>woocommerce</category><category>account-deletion</category></item><item><title>Potential Chroot Container Escape via Mount</title><link>https://feed.craftedsignal.io/briefs/2024-01-chroot-container-escape/</link><pubDate>Sat, 02 May 2026 12:45:21 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-chroot-container-escape/</guid><description>The rule detects a potential chroot container escape via mount, which involves a user within a container mounting the host's root file system and using chroot to escape the containerized environment, indicating a privilege escalation attempt.</description><content:encoded><![CDATA[<p>This detection rule monitors for a specific sequence of commands on Linux systems that could indicate an attempt to escape a containerized environment. The attack involves first mounting a file system, typically targeting the host&rsquo;s root file system, and then using the <code>chroot</code> command to change the root directory. This combination, if successful, allows an attacker inside a container to gain unauthorized access to the host system. The rule is designed to identify this uncommon behavior pattern, which is a strong indicator of malicious activity. The rule is applicable to environments utilizing Elastic Defend, SentinelOne Cloud Funnel, and Crowdstrike FDR. The detection looks for this sequence occurring within a 5-minute timeframe.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a container, possibly through exploiting a vulnerability or misconfiguration in the application running within the container.</li>
<li>The attacker attempts to mount the host&rsquo;s root filesystem within the container using the <code>mount</code> command, often targeting <code>/dev/sd*</code> devices. This requires sufficient privileges within the container, or the exploitation of a container escape vulnerability to gain such privileges.</li>
<li>The <code>mount</code> command is executed with arguments specifying the device to mount and the mount point within the container&rsquo;s file system.</li>
<li>The attacker then executes the <code>chroot</code> command, changing the root directory of the current process to the mounted host&rsquo;s root filesystem.</li>
<li>After successfully executing <code>chroot</code>, the attacker&rsquo;s perspective shifts to the host&rsquo;s file system, allowing them to access and modify sensitive files and configurations.</li>
<li>The attacker uses their newly acquired access to install backdoors, create new user accounts with elevated privileges, or modify system configurations to establish persistence.</li>
<li>The attacker may attempt to move laterally to other containers or systems within the network, leveraging their compromised position on the host.</li>
<li>The final objective is to gain complete control over the host system and potentially the entire infrastructure, leading to data exfiltration, system disruption, or other malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful container escape can have severe consequences, potentially leading to complete compromise of the host system and the data it contains. Depending on the environment, this could affect a single server or spread to many hosts. The compromise of containerized environments can lead to data breaches, service disruption, and reputational damage. Given the sensitive nature of data often processed within containers, the impact can range from financial losses to regulatory penalties.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rules in this brief to your SIEM and tune for your environment to detect potential container escapes.</li>
<li>Enable Elastic Defend integration to collect process data, and ensure Session View data is enabled to enhance visibility as mentioned in the setup guide.</li>
<li>Review and harden container configurations to minimize privileges granted to containerized processes, reducing the attack surface for escape attempts.</li>
<li>Implement network segmentation to limit the potential for lateral movement following a successful container escape.</li>
<li>Monitor process execution logs for unusual mount and chroot command sequences within container environments using Elastic Defend, SentinelOne, and Crowdstrike logs.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>container-escape</category><category>privilege-escalation</category><category>linux</category></item><item><title>Chroot Execution in Container Context on Linux</title><link>https://feed.craftedsignal.io/briefs/2026-05-chroot-container-escape/</link><pubDate>Sat, 02 May 2026 12:45:21 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-chroot-container-escape/</guid><description>Detects suspicious chroot execution within a Linux container context, potentially indicating a container escape attempt by pivoting to an alternate root filesystem.</description><content:encoded><![CDATA[<p>This detection rule identifies instances of the <code>chroot</code> command being executed within a Linux containerized environment. It leverages process execution telemetry from Elastic Defend and Auditd Manager to detect potential container escape attempts. The rule focuses on processes where the name is <code>chroot</code> or the command-line arguments contain <code>chroot</code>. Container context is determined by identifying processes with a title matching <code>runc init</code>, a container workload entry leader, or <code>runc</code> as the parent process. Successful container escapes can allow attackers to gain unauthorized access to the host system. The technique is often combined with sensitive host mounts, which are then leveraged after the <code>chroot</code> to access files and processes outside the container.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a container, potentially through exploiting a vulnerability in the containerized application.</li>
<li>The attacker identifies sensitive host mounts within the container&rsquo;s filesystem, such as <code>/host</code>, <code>/proc/1/root</code>, or other unexpected node paths.</li>
<li>The attacker executes the <code>chroot</code> command, specifying an alternate root filesystem, typically a host-linked mount.</li>
<li>The <code>chroot</code> command redirects system calls to the new root filesystem, effectively isolating the attacker from the container&rsquo;s original environment.</li>
<li>The attacker leverages the new root filesystem to access files, directories, and processes on the host system outside the container&rsquo;s boundaries.</li>
<li>The attacker may then attempt to escalate privileges by exploiting vulnerabilities in host system services or binaries.</li>
<li>The attacker may install malware or establish persistence mechanisms on the host system.</li>
<li>The attacker uses the compromised host system to pivot to other systems on the network or to exfiltrate sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful container escape can lead to full compromise of the underlying host system, potentially impacting all containers running on the same host. This can enable attackers to access sensitive data, disrupt services, and move laterally within the network. In multi-tenant environments, a container escape can compromise the security of other tenants sharing the same infrastructure. A single successful container escape can lead to a widespread breach impacting numerous systems and applications.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Chroot Execution in Container Context</code> to your SIEM and tune for your environment.</li>
<li>Enable process execution telemetry from Elastic Defend and Auditd Manager on Linux to ensure the required data is available for detection.</li>
<li>Investigate any alerts generated by the Sigma rule to determine if the <code>chroot</code> execution was authorized and the target directory is an internal build root versus a host filesystem mount.</li>
<li>Monitor for follow-on shell execution, access to the container runtime socket, or kubelet credential paths, as these are common indicators of container escape attempts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>container-escape</category><category>privilege-escalation</category><category>linux</category><category>chroot</category></item><item><title>Salon Booking System WordPress Plugin Arbitrary File Read Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-wordpress-arbitrary-file-read/</link><pubDate>Sat, 02 May 2026 12:16:16 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-wordpress-arbitrary-file-read/</guid><description>The Salon Booking System WordPress plugin is vulnerable to arbitrary file read, allowing unauthenticated attackers to exfiltrate local files by manipulating file-field values in booking confirmation emails.</description><content:encoded><![CDATA[<p>The Salon Booking System – Free Version plugin for WordPress, versions up to and including 10.30.25, contains an arbitrary file read vulnerability. This flaw stems from the plugin&rsquo;s public booking flow, where it accepts attacker-controlled file-field values. These values are subsequently used as trusted paths when creating email attachments for booking confirmations. This allows an unauthenticated attacker to supply a path to any file accessible to the web server, triggering its inclusion as an attachment in the booking confirmation email, effectively enabling arbitrary file exfiltration. Exploitation requires no authentication and can be triggered remotely.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker accesses the public booking form of a WordPress site running the vulnerable Salon Booking System plugin.</li>
<li>The attacker crafts a malicious request to the booking form, injecting a file path (e.g., <code>/etc/passwd</code>) into a file-field parameter.</li>
<li>The plugin processes the booking request and stores the attacker-supplied file path.</li>
<li>The plugin generates a booking confirmation email.</li>
<li>The plugin uses the stored, attacker-controlled file path to attach the specified file to the confirmation email.</li>
<li>The booking confirmation email, now containing the arbitrary file as an attachment, is sent to the user who initiated the booking (which could be the attacker or an unwitting third party).</li>
<li>The attacker retrieves the email (if sent to the attacker) or intercepts it (if sent to a third party) and extracts the attached file.</li>
<li>The attacker gains unauthorized access to the contents of the exfiltrated file.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows unauthenticated attackers to read arbitrary files from the affected WordPress server. This could lead to the disclosure of sensitive information, such as configuration files, database credentials, or other confidential data. The vulnerability affects versions of the Salon Booking System plugin up to and including 10.30.25. The number of affected WordPress installations is unknown, but could be substantial given the plugin&rsquo;s popularity.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the Salon Booking System plugin to the latest version to patch CVE-2026-6320.</li>
<li>Monitor web server logs (category <code>webserver</code>, product <code>linux</code>) for suspicious requests containing absolute or relative file paths in file-field parameters, using a detection rule similar to the ones provided below.</li>
<li>Implement strict input validation and sanitization for all user-supplied data, especially file paths.</li>
<li>Review and restrict file system permissions to limit the files accessible to the web server process.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>arbitrary-file-read</category><category>wordpress</category><category>plugin-vulnerability</category><category>cve</category></item><item><title>Paid Memberships Pro Plugin Vulnerability Allows Unauthorized Stripe Webhook Modification</title><link>https://feed.craftedsignal.io/briefs/2026-05-pmpro-stripe-webhook-vuln/</link><pubDate>Sat, 02 May 2026 12:16:16 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-pmpro-stripe-webhook-vuln/</guid><description>The Paid Memberships Pro plugin for WordPress is vulnerable to unauthorized modification of Stripe webhook configurations due to missing capability checks, allowing authenticated attackers with Subscriber-level access to disrupt payment processing.</description><content:encoded><![CDATA[<p>The Paid Memberships Pro plugin, a popular WordPress plugin for managing paid subscriptions, contains a vulnerability (CVE-2026-4100) that allows authenticated attackers with minimal privileges (Subscriber-level access) to manipulate Stripe webhook configurations. This flaw exists in versions up to and including 3.6.5 due to missing capability checks on specific AJAX handlers. An attacker exploiting this vulnerability can delete, create, or rebuild the site&rsquo;s Stripe webhook, leading to significant disruptions in payment processing, subscription renewal synchronization, cancellation handling, and management of failed payments. This vulnerability puts revenue streams and customer relationships at risk for any organization using the affected plugin versions.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains Subscriber-level access to the WordPress site, either through registration or compromised credentials.</li>
<li>The attacker crafts a malicious AJAX request targeting the <code>wp_ajax_pmpro_stripe_create_webhook</code> endpoint.</li>
<li>Alternatively, the attacker crafts a malicious AJAX request to the <code>wp_ajax_pmpro_stripe_delete_webhook</code> endpoint.</li>
<li>Or, the attacker crafts a malicious AJAX request to the <code>wp_ajax_pmpro_stripe_rebuild_webhook</code> endpoint.</li>
<li>Due to missing capability checks, the server processes the request without proper authorization.</li>
<li>The Stripe webhook configuration is modified, deleted, or rebuilt based on the attacker&rsquo;s request.</li>
<li>Legitimate payment processing and subscription management processes fail due to the altered webhook configuration.</li>
<li>The attacker effectively disrupts the site&rsquo;s ability to collect payments and manage subscriptions.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to completely disrupt a WordPress site&rsquo;s payment processing and subscription management functionalities. This can result in significant financial losses due to interrupted sales and subscription renewals. Furthermore, the disruption can damage customer trust and lead to churn as users experience issues with their subscriptions. The vulnerability affects all sites using Paid Memberships Pro plugin versions up to 3.6.5.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately update the Paid Memberships Pro plugin to the latest version to patch CVE-2026-4100.</li>
<li>Monitor WordPress web server logs for POST requests to <code>/wp-admin/admin-ajax.php</code> with the <code>action</code> parameter set to <code>pmpro_stripe_create_webhook</code>, <code>pmpro_stripe_delete_webhook</code>, or <code>pmpro_stripe_rebuild_webhook</code> using the &ldquo;Detect Suspicious PMPro Stripe Webhook AJAX Requests&rdquo; Sigma rule.</li>
<li>Review user roles and permissions to minimize the number of users with Subscriber-level access as a temporary mitigation.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>wordpress</category><category>stripe</category><category>webhook</category><category>vulnerability</category><category>plugin</category></item><item><title>Geo Mashup WordPress Plugin Vulnerable to Time-Based SQL Injection (CVE-2026-4062)</title><link>https://feed.craftedsignal.io/briefs/2026-05-geo-mashup-sqli/</link><pubDate>Sat, 02 May 2026 12:16:16 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-geo-mashup-sqli/</guid><description>The Geo Mashup WordPress plugin is vulnerable to Time-Based SQL Injection due to insufficient input sanitization, allowing unauthenticated attackers to extract sensitive database information.</description><content:encoded><![CDATA[<p>The Geo Mashup plugin for WordPress, in versions up to and including 1.13.18, contains a Time-Based SQL Injection vulnerability (CVE-2026-4062). The vulnerability exists within the &lsquo;object_ids&rsquo; and &rsquo;exclude_object_ids&rsquo; parameters. Insufficient escaping of user-supplied input, specifically within the <code>IN(...)</code> and <code>NOT IN(...)</code> SQL context, coupled with inadequate preparation of the existing SQL query, allows for the injection. The <code>esc_sql()</code> function is applied but is rendered ineffective due to its inability to protect against parenthesis or SQL keyword injection within the unquoted <code>IN(...)</code> / <code>NOT IN(...)</code> context. A numeric-only sanitizer exists in <code>sanitize_query_args()</code>, but this is only applied in the AJAX code path and not in the <code>render-map.php</code> or template tag code paths. This flaw enables unauthenticated attackers to append malicious SQL queries, facilitating the extraction of sensitive information from the WordPress database through a time-based blind SQL injection technique.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies the vulnerable Geo Mashup plugin running on a WordPress site.</li>
<li>The attacker crafts a malicious HTTP request targeting an endpoint that utilizes the &lsquo;object_ids&rsquo; or &rsquo;exclude_object_ids&rsquo; parameters.</li>
<li>The attacker injects a time-based SQL injection payload into the &lsquo;object_ids&rsquo; or &rsquo;exclude_object_ids&rsquo; parameter. This payload leverages SQL functions like <code>SLEEP()</code> or <code>BENCHMARK()</code> to introduce delays based on conditional SQL logic.</li>
<li>The vulnerable code fails to properly sanitize the injected SQL code due to the ineffective <code>esc_sql()</code> function in the <code>IN</code>/<code>NOT IN</code> context.</li>
<li>The injected SQL payload is appended to the existing SQL query executed by the Geo Mashup plugin.</li>
<li>The database server executes the combined query, including the injected time-based SQL injection.</li>
<li>The attacker monitors the response time of the HTTP request. A delayed response indicates that the injected SQL logic evaluated to true.</li>
<li>By repeatedly sending requests with different SQL injection payloads, the attacker can extract sensitive information from the database one character at a time.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability can lead to the complete compromise of the WordPress database. An attacker can extract sensitive information such as user credentials, API keys, configuration details, and other confidential data. This can result in data breaches, unauthorized access to the WordPress site, and potential further attacks on connected systems. The CVSS v3.1 base score for this vulnerability is 7.5, indicating a high severity.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the Geo Mashup plugin to a version greater than 1.13.18 to remediate CVE-2026-4062.</li>
<li>Deploy the Sigma rule <code>Detect Geo Mashup Time-Based SQL Injection Attempts</code> to identify potential exploitation attempts targeting the vulnerable parameters.</li>
<li>Monitor web server logs for suspicious requests containing SQL injection payloads in the &lsquo;object_ids&rsquo; or &rsquo;exclude_object_ids&rsquo; parameters to detect exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sqli</category><category>wordpress</category><category>plugin</category></item><item><title>Geo Mashup WordPress Plugin Vulnerable to Time-Based SQL Injection (CVE-2026-4061)</title><link>https://feed.craftedsignal.io/briefs/2026-05-geo-mashup-sql-injection/</link><pubDate>Sat, 02 May 2026 12:16:16 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-geo-mashup-sql-injection/</guid><description>A time-based SQL injection vulnerability (CVE-2026-4061) exists in the Geo Mashup WordPress plugin (&lt;= 1.13.18) due to insufficient sanitization of the 'map_post_type' parameter, enabling unauthenticated attackers to extract sensitive information via time-based blind SQL injection if the Geo Search feature is enabled.</description><content:encoded><![CDATA[<p>The Geo Mashup plugin for WordPress is vulnerable to time-based SQL injection, as detailed in CVE-2026-4061. This vulnerability affects all versions of the plugin up to and including 1.13.18. The root cause lies in the <code>SearchResults</code> hook, where the <code>map_post_type</code> parameter is mishandled. Specifically, the code first calls <code>stripslashes_deep($_POST)</code>, effectively removing WordPress&rsquo;s magic quotes protection. Subsequently, the unsanitized <code>map_post_type</code> value is directly concatenated into an <code>IN(...)</code> clause without proper escaping using <code>esc_sql()</code> or <code>$wpdb-&gt;prepare()</code>. While the &lsquo;any&rsquo; branch of the code correctly applies <code>array_map('esc_sql', ...)</code>, the alternative branch lacks this crucial sanitization step. Successful exploitation requires the Geo Search feature to be enabled in the plugin&rsquo;s settings. This vulnerability allows unauthenticated attackers to inject malicious SQL queries, potentially leading to the extraction of sensitive database information through time-based blind techniques.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a WordPress site using a vulnerable version of the Geo Mashup plugin (&lt;= 1.13.18) with the Geo Search feature enabled.</li>
<li>The attacker crafts a malicious HTTP POST request targeting the <code>SearchResults</code> hook with a specially crafted <code>map_post_type</code> parameter containing SQL injection payload.</li>
<li>The vulnerable code within the Geo Mashup plugin processes the POST request, removing magic quotes using <code>stripslashes_deep($_POST)</code>.</li>
<li>The unsanitized <code>map_post_type</code> value is then concatenated directly into an SQL query within an <code>IN(...)</code> clause without proper escaping.</li>
<li>The injected SQL code executes within the database query, allowing the attacker to manipulate the query&rsquo;s behavior.</li>
<li>The attacker uses time-based SQL injection techniques (e.g., <code>IF(condition, SLEEP(5), 0)</code>) within the injected payload to infer information based on the response time.</li>
<li>By repeatedly sending modified requests and observing the response times, the attacker can extract sensitive data, character by character, from the database.</li>
<li>The attacker extracts sensitive information such as usernames, passwords, API keys, or other confidential data stored in the WordPress database.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows unauthenticated attackers to extract sensitive information from the WordPress database. The severity of the impact depends on the sensitivity of the data stored in the database, but could include exposure of user credentials, confidential business data, or other sensitive information. Because it affects any installation with the Geo Search feature enabled, a large number of websites using the Geo Mashup plugin may be vulnerable. The CVSS v3.1 base score is 7.5, indicating a high severity vulnerability.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the Geo Mashup plugin to the latest version (later than 1.13.18) to patch CVE-2026-4061.</li>
<li>Deploy the provided Sigma rule to detect potential exploitation attempts targeting the vulnerable <code>SearchResults</code> hook using a malicious <code>map_post_type</code> parameter.</li>
<li>Review web server logs for suspicious POST requests to <code>/wp-admin/admin-ajax.php</code> (common AJAX endpoint in WordPress) containing potentially malicious SQL injection payloads in the <code>map_post_type</code> parameter.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>wordpress</category><category>plugin</category></item><item><title>OS Command Injection Vulnerability in p_69_branch_monkey_mcp Preview Endpoint (CVE-2026-7590)</title><link>https://feed.craftedsignal.io/briefs/2026-05-branch-monkey-mcp-command-injection/</link><pubDate>Sat, 02 May 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-branch-monkey-mcp-command-injection/</guid><description>A remote attacker can inject OS commands by manipulating the dev_script argument in the Preview Endpoint of eyal-gor's p_69_branch_monkey_mcp (up to commit 69bc71874ce40050ef45fde5a435855f18af3373), leading to arbitrary code execution on the server.</description><content:encoded><![CDATA[<p>A critical OS command injection vulnerability, CVE-2026-7590, has been identified in the Preview Endpoint of eyal-gor&rsquo;s p_69_branch_monkey_mcp. This vulnerability affects versions up to commit 69bc71874ce40050ef45fde5a435855f18af3373. A remote attacker can exploit this flaw by manipulating the <code>dev_script</code> argument within the <code>branch_monkey_mcp/bridge_and_local_actions/routes/advanced.py</code> file.  Successful exploitation allows for arbitrary command execution on the host operating system. The exploit is publicly available, increasing the risk of widespread exploitation. The vendor has been notified but has not yet responded. The lack of versioning makes it difficult to determine the exact scope of affected installations.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable instance of p_69_branch_monkey_mcp running a web server.</li>
<li>The attacker crafts a malicious HTTP request targeting the Preview Endpoint.</li>
<li>The request includes a payload in the <code>dev_script</code> argument designed to inject OS commands via the <code>branch_monkey_mcp/bridge_and_local_actions/routes/advanced.py</code> file.</li>
<li>The web server processes the request, passing the attacker-controlled <code>dev_script</code> argument to a function that executes system commands without proper sanitization.</li>
<li>The injected OS command is executed by the server, potentially with the privileges of the web server user. For example, an attacker could inject <code>ls -la</code> to list directory contents.</li>
<li>The output of the injected command is returned to the attacker via the web server&rsquo;s response, confirming successful command execution.</li>
<li>The attacker leverages the initial command execution to escalate privileges, install persistent backdoors, or move laterally within the network, depending on the server&rsquo;s configuration and accessible resources.</li>
<li>The attacker achieves their final objective, such as data exfiltration, system compromise, or denial of service.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7590 allows a remote attacker to execute arbitrary OS commands on the affected server. This could lead to complete system compromise, including data theft, malware installation, and denial of service. The lack of version information makes it difficult to ascertain the number of vulnerable installations, but given the publicly available exploit, widespread exploitation is possible. Organizations using p_69_branch_monkey_mcp are at high risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for suspicious requests targeting the Preview Endpoint and containing potentially malicious payloads in the <code>dev_script</code> parameter as described in the attack chain. Use the &ldquo;p_69_branch_monkey_mcp_command_injection&rdquo; Sigma rule.</li>
<li>Inspect process creation events for unexpected processes spawned by the web server, indicating potential command injection. Use the &ldquo;p_69_branch_monkey_mcp_unexpected_process&rdquo; Sigma rule.</li>
<li>Implement input validation and sanitization on the <code>dev_script</code> parameter in the <code>branch_monkey_mcp/bridge_and_local_actions/routes/advanced.py</code> file to prevent command injection.</li>
<li>Although specific vulnerable versions are unavailable, immediately investigate and patch any instances of <code>p_69_branch_monkey_mcp</code> due to the public exploit availability.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>command-injection</category><category>web-application</category><category>cve</category></item><item><title>Zyosoft School App Insecure Direct Object Reference Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-zyosoft-school-app-idor/</link><pubDate>Sat, 02 May 2026 10:16:19 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-zyosoft-school-app-idor/</guid><description>Zyosoft's School App contains an Insecure Direct Object Reference vulnerability (CVE-2026-7491) that allows authenticated remote attackers to modify parameters and access or modify other users' data.</description><content:encoded><![CDATA[<p>The Zyosoft School App is susceptible to an Insecure Direct Object Reference (IDOR) vulnerability identified as CVE-2026-7491. This flaw allows authenticated remote attackers to bypass authorization controls by modifying specific parameters within the application&rsquo;s requests. By manipulating these parameters, attackers can gain unauthorized access to sensitive data belonging to other users, as well as modify that data. Successful exploitation allows unauthorized data access and modification, potentially leading to data breaches, privacy violations, and manipulation of user accounts. Defenders should prioritize identifying and mitigating this vulnerability to prevent potential abuse.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker authenticates to the Zyosoft School App using valid credentials.</li>
<li>The attacker identifies a request that includes a user-controlled parameter referencing a specific object (e.g., user ID, record number).</li>
<li>The attacker modifies the value of this parameter to reference a different object belonging to another user.</li>
<li>The attacker sends the modified request to the server.</li>
<li>The server, lacking proper authorization checks, processes the request using the attacker-supplied object reference.</li>
<li>The server returns the data associated with the targeted user&rsquo;s object to the attacker.</li>
<li>The attacker can further modify parameters to alter the data of the targeted user.</li>
<li>The attacker successfully reads or modifies the targeted user&rsquo;s data without proper authorization.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7491 allows authenticated attackers to read and modify other users&rsquo; data within the Zyosoft School App. This can lead to severe consequences, including unauthorized access to sensitive student or staff information, modification of grades or attendance records, and potential data breaches. The number of affected users depends on the app&rsquo;s deployment size, but any instance is vulnerable. This issue could affect any educational institution using the Zyosoft School App.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Inspect web server logs for requests containing unusual parameter modifications, specifically those referencing user IDs or other sensitive data fields (webserver logs).</li>
<li>Deploy the Sigma rule provided below to detect attempts to access or modify resources using potentially manipulated object references (Sigma rule).</li>
<li>Implement robust authorization checks in the Zyosoft School App to verify that users only have access to resources they are explicitly authorized to access.</li>
<li>Contact Zyosoft for a patch addressing CVE-2026-7491.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>idor</category><category>vulnerability</category><category>web application</category><category>cve-2026-7491</category></item><item><title>Sunnet CTMS/CPAS Arbitrary File Upload Vulnerability (CVE-2026-7490)</title><link>https://feed.craftedsignal.io/briefs/2026-05-sunnet-file-upload/</link><pubDate>Sat, 02 May 2026 10:16:18 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-sunnet-file-upload/</guid><description>A privileged remote attacker can exploit CVE-2026-7490 in Sunnet CTMS and CPAS to upload and execute web shell backdoors, leading to arbitrary code execution on the server.</description><content:encoded><![CDATA[<p>CVE-2026-7490 is an arbitrary file upload vulnerability found in Sunnet CTMS and CPAS. Disclosed in May 2026, this vulnerability enables a privileged attacker to upload malicious files, specifically web shell backdoors, to the affected server. This can be achieved remotely, without requiring local system access, given the attacker already possesses valid privileged credentials for the application. Successful exploitation allows the attacker to execute arbitrary code on the server, potentially leading to complete system compromise. This vulnerability poses a significant threat to organizations using these Sunnet products, as it could result in data breaches, service disruption, and other malicious activities.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains privileged access to the CTMS or CPAS application, either through credential theft, phishing, or other means.</li>
<li>Attacker identifies the file upload functionality within the application.</li>
<li>Attacker crafts a malicious file, such as a PHP web shell, designed to execute arbitrary commands on the server.</li>
<li>Attacker bypasses any client-side file type validation mechanisms.</li>
<li>Attacker uploads the malicious file to the server through the vulnerable file upload endpoint.</li>
<li>The application saves the file to a publicly accessible directory without proper sanitization or validation.</li>
<li>Attacker accesses the uploaded web shell via a web browser.</li>
<li>Attacker uses the web shell to execute arbitrary commands on the server, leading to full system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7490 allows attackers to execute arbitrary code on the affected server. This can lead to a range of malicious activities, including data theft, modification, or destruction, installation of malware, and complete system takeover. Since the vulnerability affects CTMS and CPAS, organizations in sectors utilizing these systems for content or process management are particularly at risk. The vulnerability&rsquo;s high severity allows attackers to quickly gain a foothold and potentially compromise sensitive information or disrupt business operations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply available patches or updates from Sunnet to address CVE-2026-7490.</li>
<li>Implement the Sigma rule <code>Detect Malicious File Uploads to Web Servers</code> to detect suspicious file uploads based on file extensions and content.</li>
<li>Review and harden file upload functionalities within CTMS and CPAS to prevent arbitrary file uploads.</li>
<li>Monitor web server logs for access to suspicious files in upload directories, using the <code>Web Shell Access</code> Sigma rule.</li>
<li>Restrict access to file upload functionalities to only authorized users with appropriate privileges.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>arbitrary-file-upload</category><category>web-shell</category><category>code-execution</category></item><item><title>Sunnet CTMS SQL Injection Vulnerability (CVE-2026-7489)</title><link>https://feed.craftedsignal.io/briefs/2026-05-sunnet-ctms-sqli/</link><pubDate>Sat, 02 May 2026 10:16:18 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-sunnet-ctms-sqli/</guid><description>Sunnet CTMS is vulnerable to SQL injection (CVE-2026-7489), allowing authenticated remote attackers to execute arbitrary SQL commands and compromise the database.</description><content:encoded><![CDATA[<p>A SQL Injection vulnerability, identified as CVE-2026-7489, exists in CTMS developed by Sunnet. This flaw allows authenticated remote attackers to inject arbitrary SQL commands. Successful exploitation could allow the attackers to read, modify, and delete database contents. The vulnerability was published on May 2, 2026. The scope of this vulnerability affects systems running the vulnerable CTMS software, potentially leading to data breaches and system compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker authenticates to the CTMS application.</li>
<li>The attacker identifies an endpoint vulnerable to SQL injection.</li>
<li>The attacker crafts a malicious SQL query designed to exploit the injection point, likely using tools like Burp Suite or SQLMap.</li>
<li>The attacker injects the SQL payload via a crafted HTTP request, targeting vulnerable parameters within the request.</li>
<li>The CTMS application executes the injected SQL query against the database.</li>
<li>The attacker bypasses authentication or authorization controls to gain elevated privileges within the application or database.</li>
<li>The attacker reads sensitive data from the database, such as user credentials or confidential business information.</li>
<li>The attacker modifies or deletes database entries, leading to data corruption or denial of service.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability could allow attackers to read sensitive information, modify data, or delete critical database contents. This could lead to a complete compromise of the CTMS application and its underlying database, impacting all users and data managed by the system. The severity is heightened by the potential for attackers to gain complete control over the database, leading to significant data breaches and operational disruption.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the patch or upgrade CTMS to a version that addresses CVE-2026-7489 as soon as it becomes available from Sunnet.</li>
<li>Deploy the Sigma rule &ldquo;Detect Suspicious SQL Injection Attempts&rdquo; to identify potential exploitation attempts against CTMS (see below).</li>
<li>Review web server logs for suspicious activity indicative of SQL injection attempts, specifically looking for unusual characters or SQL syntax in HTTP request parameters.</li>
<li>Implement proper input validation and sanitization techniques to prevent SQL injection vulnerabilities in CTMS and other web applications.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sqli</category><category>cve-2026-7489</category><category>web-application</category></item><item><title>TRENDnet TEW-821DAP Firmware Update Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-trendnet-buffer-overflow/</link><pubDate>Sat, 02 May 2026 08:16:28 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-trendnet-buffer-overflow/</guid><description>A buffer overflow vulnerability exists in TRENDnet TEW-821DAP version 1.12B01, allowing a remote attacker to execute arbitrary code by manipulating the 'str' argument in the auto_update_firmware function of the Firmware Update component.</description><content:encoded><![CDATA[<p>CVE-2026-7607 describes a buffer overflow vulnerability affecting TRENDnet TEW-821DAP version 1.12B01. The vulnerability resides within the auto_update_firmware function of the Firmware Update component. A remote attacker can exploit this flaw by sending a crafted request with a maliciously oversized &lsquo;str&rsquo; argument, leading to a buffer overflow. Although the CVSS score is high, the vendor has stated that the affected product reached its end-of-life 8 years ago and is no longer supported, significantly reducing the risk of widespread exploitation. This lack of support means no patches or updates will be provided, leaving vulnerable devices exposed if still in operation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable TRENDnet TEW-821DAP device running firmware version 1.12B01.</li>
<li>Attacker sends a specially crafted network packet to the device, targeting the Firmware Update component.</li>
<li>The packet includes a malicious &lsquo;str&rsquo; argument exceeding the buffer&rsquo;s allocated size in the auto_update_firmware function.</li>
<li>The device attempts to process the firmware update, copying the oversized &lsquo;str&rsquo; argument into the undersized buffer.</li>
<li>The buffer overflow overwrites adjacent memory regions, potentially including critical program data or execution pointers.</li>
<li>Attacker hijacks control of the execution flow by overwriting the return address with the address of malicious code.</li>
<li>The device executes the attacker&rsquo;s arbitrary code with the privileges of the Firmware Update component.</li>
<li>The attacker gains control of the device, potentially enabling further malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this buffer overflow vulnerability could allow an attacker to gain complete control over the affected TRENDnet TEW-821DAP device. This could lead to unauthorized network access, data theft, or the device being used as a bot in a larger attack. Given that the affected product is EOL, the number of actively exploitable devices is likely low, but any remaining devices are at significant risk since no patch will be available.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Identify and isolate any TRENDnet TEW-821DAP devices running firmware version 1.12B01 on your network. Consider decommissioning them if possible due to the end-of-life status and lack of security updates.</li>
<li>Monitor network traffic for suspicious packets targeting the Firmware Update component of TRENDnet devices. Implement intrusion detection rules to identify and block potentially malicious requests (see example Sigma rule below).</li>
<li>Since this is a buffer overflow on a network device, monitor for unusual process creation or network connections originating from TRENDnet devices.</li>
<li>Deploy the provided Sigma rule to detect attempts to exploit the vulnerability by monitoring for unusual data lengths in network traffic related to firmware updates.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>buffer-overflow</category><category>firmware-update</category><category>network-device</category></item><item><title>WordPress Widget Options Plugin Remote Code Execution Vulnerability (CVE-2026-2052)</title><link>https://feed.craftedsignal.io/briefs/2026-05-wordpress-widget-rce/</link><pubDate>Sat, 02 May 2026 08:16:27 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-wordpress-widget-rce/</guid><description>The Widget Options plugin for WordPress is vulnerable to Remote Code Execution (CVE-2026-2052) due to insufficient input sanitization in the Display Logic feature, allowing authenticated attackers with Contributor-level access and above to execute arbitrary code on the server.</description><content:encoded><![CDATA[<p>The Widget Options – Advanced Conditional Visibility for Gutenberg Blocks &amp; Classic Widgets plugin, versions 4.2.2 and earlier, contains a Remote Code Execution (RCE) vulnerability (CVE-2026-2052). This flaw stems from the plugin&rsquo;s Display Logic feature, which utilizes the <code>eval()</code> function to process user-supplied expressions. The plugin&rsquo;s implemented blocklist/allowlist is insufficient, making it bypassable through techniques involving <code>array_map</code> with string concatenation. Furthermore, the plugin lacks proper authorization enforcement on the <code>extended_widget_opts_block</code> attribute. This vulnerability allows authenticated attackers with Contributor-level access or higher to inject and execute arbitrary code on the underlying server. The vendor partially addressed this vulnerability in version 4.2.0.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker authenticates to the WordPress application as a Contributor or higher-level user.</li>
<li>The attacker navigates to the Widget Options settings within the WordPress admin panel.</li>
<li>The attacker crafts a malicious Display Logic expression designed to execute arbitrary PHP code. This involves bypassing the blocklist/allowlist using techniques such as <code>array_map</code> and string concatenation.</li>
<li>The attacker injects the malicious Display Logic expression into the <code>extended_widget_opts_block</code> attribute.</li>
<li>The WordPress application processes the widget options, including the malicious Display Logic expression. Due to the lack of proper sanitization and authorization, the <code>eval()</code> function executes the attacker-supplied PHP code.</li>
<li>The attacker&rsquo;s code executes with the permissions of the web server user, potentially allowing the attacker to read or write files, execute system commands, or compromise the entire server.</li>
<li>The attacker may establish persistence by writing a backdoor to a file on the server or by creating a new administrator account.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-2052 allows an attacker to execute arbitrary code on the WordPress server. This can lead to complete compromise of the website, including data theft, defacement, and the installation of malware. Since the vulnerability requires Contributor access or higher, the impact is significant if such accounts are compromised through other means (e.g., phishing, credential stuffing). The lack of proper input sanitization and authorization makes this a critical vulnerability.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the &ldquo;The Widget Options – Advanced Conditional Visibility for Gutenberg Blocks &amp; Classic Widgets&rdquo; plugin to the latest version to patch CVE-2026-2052.</li>
<li>Deploy the Sigma rule &ldquo;Detect WordPress Widget Options RCE Attempt&rdquo; to your SIEM to detect exploitation attempts.</li>
<li>Review user roles and permissions to minimize the number of users with Contributor or higher-level access.</li>
<li>Monitor web server logs for unusual activity, particularly requests to <code>/wp-admin/options.php</code> related to widget options.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>wordpress</category><category>rce</category><category>plugin</category></item><item><title>Gravity Forms Plugin Stored XSS Vulnerability (CVE-2026-5113)</title><link>https://feed.craftedsignal.io/briefs/2026-05-gravityforms-xss/</link><pubDate>Sat, 02 May 2026 06:16:04 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-gravityforms-xss/</guid><description>The Gravity Forms plugin for WordPress is vulnerable to stored cross-site scripting (XSS) via Consent field hidden inputs, allowing unauthenticated attackers to inject arbitrary web scripts that execute when an administrator views the entries list page.</description><content:encoded><![CDATA[<p>The Gravity Forms plugin for WordPress, a popular form builder, contains a stored cross-site scripting (XSS) vulnerability identified as CVE-2026-5113. This flaw affects versions up to and including 2.10.0. The vulnerability stems from a flawed state validation mechanism combined with insufficient output escaping within the Consent field&rsquo;s hidden inputs. An unauthenticated attacker can exploit this by injecting malicious JavaScript code into form entries. This malicious code is then executed when an authenticated administrator accesses the Entries List page within the WordPress administration panel, potentially leading to account compromise or other malicious actions performed within the administrator&rsquo;s session. Successful exploitation allows attackers to execute arbitrary web scripts in the context of an administrator&rsquo;s browser.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker crafts a malicious payload containing XSS code within a Gravity Forms Consent field. The payload leverages HTML tags like <code>&lt;svg&gt;</code> that <code>wp_kses()</code> will strip.</li>
<li>The attacker submits the crafted form entry to the WordPress site.</li>
<li>The Gravity Forms plugin&rsquo;s state validation mechanism calculates two hashes: one for the raw input and another after sanitization via <code>wp_kses()</code>.</li>
<li>Due to the nature of the XSS payload, the <code>wp_kses()</code> function strips the <code>&lt;svg&gt;</code> tag, resulting in a matching hash for the sanitized input.</li>
<li>The flawed validation logic fails to detect the malicious intent because at least one hash matches the original state, allowing the malicious raw value (containing the XSS payload) to be stored in the database.</li>
<li>An authenticated administrator logs into the WordPress administration panel.</li>
<li>The administrator navigates to the Entries List page for the affected Gravity Form.</li>
<li>The stored malicious consent label is retrieved from the database and output without proper escaping, causing the XSS payload to execute within the administrator&rsquo;s browser session.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-5113 allows unauthenticated attackers to execute arbitrary web scripts within the context of an authenticated administrator&rsquo;s browser session. This can lead to a variety of malicious outcomes, including account compromise, data theft, modification of website content, or further propagation of the attack to other administrative users. The severity of the impact depends on the privileges held by the compromised administrator account.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the Gravity Forms plugin to the latest version, which includes a fix for CVE-2026-5113.</li>
<li>Implement a Web Application Firewall (WAF) rule to filter out requests containing potentially malicious XSS payloads targeting the Gravity Forms Consent field.</li>
<li>Monitor web server logs for suspicious activity related to form submissions containing encoded or obfuscated JavaScript code. Analyze HTTP request parameters for unusual characters or patterns indicative of XSS attempts.</li>
<li>Enable output escaping on form entries to prevent stored XSS attacks.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>xss</category><category>wordpress</category><category>gravityforms</category><category>cve-2026-5113</category><category>stored-xss</category></item><item><title>WP Mail Gateway Plugin Vulnerability Leads to Privilege Escalation</title><link>https://feed.craftedsignal.io/briefs/2026-05-wp-mail-gateway-privesc/</link><pubDate>Sat, 02 May 2026 05:16:01 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-wp-mail-gateway-privesc/</guid><description>The WP Mail Gateway plugin for WordPress is vulnerable to unauthorized access due to a missing capability check, allowing authenticated attackers to modify SMTP settings and escalate privileges.</description><content:encoded><![CDATA[<p>The WP Mail Gateway plugin, a WordPress extension, contains a vulnerability (CVE-2026-6963) that allows authenticated users with minimal privileges (Subscriber level or higher) to gain administrative access. The flaw resides in the <code>wmg_save_provider_config</code> AJAX action, which lacks proper authorization checks. This omission enables attackers to manipulate SMTP settings, redirect outgoing emails, and ultimately trigger password reset emails intended for administrators. The vulnerability affects all versions of the WP Mail Gateway plugin up to and including version 1.8. Successful exploitation grants attackers complete control over the WordPress site, making it a critical security concern for any organization using the vulnerable plugin.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker logs into a WordPress site with a Subscriber-level account or higher.</li>
<li>The attacker crafts a malicious AJAX request targeting the <code>wmg_save_provider_config</code> action.</li>
<li>This request modifies the SMTP settings, redirecting outgoing emails to an attacker-controlled server.</li>
<li>The attacker initiates a password reset request for an administrator account.</li>
<li>The password reset email is intercepted by the attacker&rsquo;s server.</li>
<li>The attacker uses the password reset link to gain access to the administrator&rsquo;s account.</li>
<li>The attacker logs into the WordPress dashboard with administrator privileges.</li>
<li>The attacker can now perform any administrative action, including installing malicious plugins, modifying site content, or creating new administrator accounts.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-6963 allows an attacker to completely compromise a WordPress website.  Even low-privileged users can elevate their access to administrator, giving them full control over the site.  This can lead to data breaches, website defacement, malware deployment, and other malicious activities. The vulnerability affects all installations of the WP Mail Gateway plugin up to version 1.8, potentially impacting thousands of WordPress sites.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the WP Mail Gateway plugin to a version beyond 1.8 to patch CVE-2026-6963.</li>
<li>Monitor WordPress logs for suspicious AJAX requests targeting the <code>wmg_save_provider_config</code> action using the Sigma rule provided below. Enable webserver logging to capture HTTP POST requests.</li>
<li>Implement the provided Sigma rule to detect modifications to WordPress options related to SMTP configuration. Enable relevant logging for registry modifications.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>wordpress</category><category>privilege-escalation</category><category>plugin-vulnerability</category></item><item><title>WordPress Import and Export Users Plugin Privilege Escalation Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-wordpress-privesc/</link><pubDate>Sat, 02 May 2026 05:16:01 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-wordpress-privesc/</guid><description>A privilege escalation vulnerability exists in the Import and export users and customers plugin for WordPress (versions &lt;= 2.0.8) due to an incomplete blocklist allowing authenticated users to gain administrator privileges on subsites within a Multisite network.</description><content:encoded><![CDATA[<p>The Import and export users and customers plugin for WordPress, a plugin used to manage user data, is vulnerable to privilege escalation. This vulnerability, identified as CVE-2026-7641, affects all versions of the plugin up to and including 2.0.8. The vulnerability stems from an incomplete blocklist in the <code>save_extra_user_profile_fields()</code> function. This function fails to adequately filter meta keys for subsites within a WordPress Multisite network, allowing attackers to manipulate user roles. Successful exploitation allows authenticated attackers with Subscriber-level access or higher to escalate their privileges to Administrator on any subsite within the Multisite network. Exploitation requires the targeted WordPress instance to be part of a Multisite network and have specific settings enabled.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An administrator imports a CSV file containing multisite-prefixed capability column headers (e.g., <code>wp_2_capabilities</code>) using the affected plugin.</li>
<li>The administrator enables the &ldquo;Show fields in profile?&rdquo; option within the plugin settings. This action stores the imported column headers (including the multisite capabilities) in the <code>acui_columns</code> option.</li>
<li>A low-privileged user (e.g., Subscriber) authenticates to the WordPress subsite.</li>
<li>The attacker navigates to their user profile page (<code>/wp-admin/profile.php</code>). The plugin displays the previously imported multisite capability fields as editable options on the profile page.</li>
<li>The attacker crafts a profile update request, setting the value of the <code>wp_{subsite_id}_capabilities</code> meta key to <code>a:1:{s:13:&quot;administrator&quot;;b:1;}</code> which grants administrator privileges.</li>
<li>The attacker submits the crafted profile update to <code>/wp-admin/profile.php</code>.</li>
<li>The <code>save_extra_user_profile_fields()</code> function processes the update. Due to the incomplete blocklist, the function fails to prevent the modification of the <code>wp_{subsite_id}_capabilities</code> meta key.</li>
<li>The <code>update_user_meta()</code> function writes the attacker-controlled value directly to the user&rsquo;s metadata, granting them Administrator privileges on the specified subsite.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7641 allows an attacker to gain complete control over a WordPress subsite within a Multisite network. This can lead to unauthorized access to sensitive data, modification of website content, installation of malicious plugins or themes, and potential compromise of the entire Multisite network. Given the widespread use of WordPress and the Import and export users and customers plugin, a successful attack can have significant repercussions for affected organizations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the Import and export users and customers plugin to the latest version to patch CVE-2026-7641.</li>
<li>Apply the Sigma rule <code>WordPress Multisite Privilege Escalation via Profile Update</code> to detect exploitation attempts against <code>/wp-admin/profile.php</code>.</li>
<li>Review the <code>acui_columns</code> option in the WordPress database to identify any instances where multisite-prefixed capability column headers have been imported, and remove those fields.</li>
<li>Monitor WordPress user profile updates for unusual modifications to user capabilities using the <code>WordPress User Role Change Detection</code> rule.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>privilege-escalation</category><category>wordpress</category><category>cloud</category></item><item><title>WordPress User Registration Advanced Fields Plugin Arbitrary File Upload Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-wordpress-upload/</link><pubDate>Sat, 02 May 2026 05:16:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-wordpress-upload/</guid><description>The User Registration Advanced Fields plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation, allowing unauthenticated attackers to upload arbitrary files leading to potential remote code execution.</description><content:encoded><![CDATA[<p>The User Registration Advanced Fields plugin for WordPress, specifically versions up to and including 1.6.20, contains an arbitrary file upload vulnerability (CVE-2026-4882) due to insufficient file type validation in the <code>URAF_AJAX::method_upload</code> function. This flaw enables unauthenticated attackers to upload any file type to the affected server, which can lead to remote code execution if the uploaded file is strategically placed and executed. The vulnerability is exploitable only if a &ldquo;Profile Picture&rdquo; field is active within the registration form. This poses a significant threat to websites using the plugin, as attackers can potentially gain full control of the server.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a WordPress site using the vulnerable User Registration Advanced Fields plugin (&lt;= 1.6.20) with the &ldquo;Profile Picture&rdquo; field enabled.</li>
<li>The attacker crafts a malicious HTTP request to the <code>URAF_AJAX::method_upload</code> function, bypassing any client-side file type checks.</li>
<li>The attacker uploads a web shell (e.g., a PHP file) disguised as a legitimate file type or without any extension to evade basic detection mechanisms.</li>
<li>The vulnerable plugin saves the file to the WordPress uploads directory without proper validation.</li>
<li>The attacker identifies the exact file path of the uploaded web shell on the server.</li>
<li>The attacker sends another HTTP request directly to the uploaded web shell.</li>
<li>The web shell executes on the server, providing the attacker with remote code execution capabilities.</li>
<li>The attacker can then leverage the web shell to perform various malicious activities, such as installing malware, defacing the website, or exfiltrating sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability (CVE-2026-4882) allows unauthenticated attackers to upload arbitrary files to a vulnerable WordPress website, potentially leading to remote code execution. This can result in complete compromise of the affected website, including data theft, website defacement, and malware infections. The CVSS v3.1 base score for this vulnerability is 9.8, indicating a critical severity level. The impact includes potential damage to reputation, financial losses, and legal liabilities.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the User Registration Advanced Fields plugin to the latest version (greater than 1.6.20) to patch CVE-2026-4882.</li>
<li>Implement file type validation on the server-side, restricting allowed file extensions for profile picture uploads.</li>
<li>Monitor web server logs for suspicious file upload activity targeting the <code>URAF_AJAX::method_upload</code> function to detect potential exploitation attempts. Deploy the Sigma rule <code>Detect Suspicious WordPress File Uploads</code> to your SIEM.</li>
<li>Implement strict file permission policies to prevent uploaded files from being executed as scripts.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>wordpress</category><category>file-upload</category><category>rce</category></item><item><title>CVE-2026-31431 'Copy Fail' Linux Kernel Privilege Escalation</title><link>https://feed.craftedsignal.io/briefs/2026-05-copy-fail/</link><pubDate>Sat, 02 May 2026 03:06:08 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-copy-fail/</guid><description>The 'Copy Fail' vulnerability (CVE-2026-31431) in the Linux kernel allows a local attacker to escalate privileges to root, potentially leading to container breakout and lateral movement in cloud environments.</description><content:encoded><![CDATA[<p>CVE-2026-31431, known as &ldquo;Copy Fail,&rdquo; is a high-severity local privilege escalation vulnerability affecting the Linux kernel&rsquo;s cryptographic subsystem. The vulnerability resides within the algif_aead module of the AF_ALG (userspace crypto API) and results from improper memory handling during in-place operations. An unprivileged user can exploit this flaw to corrupt the cache of readable files, including setuid binaries, resulting in unauthorized root privilege escalation. This vulnerability impacts a wide range of Linux distributions, including Ubuntu 24.04 LTS, Amazon Linux 2023, Red Hat Enterprise Linux (RHEL 10.1), and SUSE 16, as well as other distributions like Debian, Fedora, and Arch Linux. The availability of a working proof-of-concept exploit has raised concerns about potential widespread exploitation, leading to its addition to the CISA KEV catalog.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Reconnaissance:</strong> The attacker gains limited visibility into the environment (e.g., compromised CI runner, web container) and identifies the kernel version. Kernel version information is obtained without elevated privileges.</li>
<li><strong>Script Execution:</strong> The attacker executes a compact Python script that interacts with standard kernel interfaces, without relying on networking, compilation, or third-party libraries.</li>
<li><strong>AF_ALG Abuse:</strong> The script abuses an interaction between the AF_ALG (asynchronous crypto) socket interface, the splice() system call and improper error handling during a failed copy operation.</li>
<li><strong>Kernel Page Cache Corruption:</strong> This interaction leads to a controlled 4-byte overwrite in the kernel page cache, corrupting sensitive kernel-managed data.</li>
<li><strong>Privilege Escalation:</strong> By corrupting kernel structures associated with credentials or execution context, the attacker escalates their process to UID 0.</li>
<li><strong>Boundary Breach:</strong> The system&rsquo;s privilege boundary is broken, neutralizing SELinux/AppArmor protections, and bypassing local security controls.</li>
<li><strong>Lateral Movement/Container Escape:</strong> The attacker can now use the root privileges gained to perform lateral movement or escape the container.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-31431 leads to full root privilege escalation, resulting in high impact to confidentiality, integrity, and availability. This could facilitate container breakout, multi-tenant compromise, and lateral movement within shared environments. The vulnerability&rsquo;s reliability, stealth (in-memory-only modification), and cross-platform applicability make it particularly dangerous in cloud, CI/CD, and Kubernetes environments.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Identify all instances of affected products and versions in your environment and prioritize patching (CVE-2026-31431).</li>
<li>Deploy the Sigma rule for suspicious process execution under /tmp, often used in exploit PoCs, and tune for your environment.</li>
<li>Monitor for suspicious AF_ALG socket creation events, as indicated in the Attack Chain, using the provided Sigma rule.</li>
<li>If patches are unavailable, consider implementing network isolation and access controls as interim mitigation measures.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>privilege-escalation</category><category>linux</category><category>kernel</category></item><item><title>Expanding Detection Beyond Endpoints to Counter Evolving Threats</title><link>https://feed.craftedsignal.io/briefs/2026-06-detection-beyond-endpoint/</link><pubDate>Fri, 01 May 2026 23:13:22 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-06-detection-beyond-endpoint/</guid><description>Threat actors are rapidly exfiltrating data by exploiting blind spots created by an over-reliance on endpoint data, necessitating a comprehensive security approach that incorporates cloud, identity, and network telemetry for effective threat detection and response.</description><content:encoded><![CDATA[<p>The 2026 Unit 42 Global Incident Response Report highlights that threat actors are moving 4x faster to exfiltration than in 2025, exploiting blind spots due to an over-reliance on endpoint data. The proliferation of cloud services, microservices, and remote users has expanded the attack surface beyond what any single tool can monitor. Unit 42 found that in 75% of incidents, critical evidence was present in logs but wasn&rsquo;t accessible or operationalized, allowing attackers to exploit the gaps. Organizations need to evolve their SOCs to ingest and correlate telemetry across their entire IT landscape, including IAM, cloud assets, OT/IoT, and AI workloads. Unit 42 recommends a single-pane-of-glass strategy powered by an AI-driven SOC platform like Cortex XSIAM to combat these threats.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access via Cloud Misconfiguration:</strong> The attacker gains initial access through a misconfigured cloud service access key.</li>
<li><strong>Cloud Console Manipulation:</strong> The attacker manipulates the cloud console to hide their tracks from endpoint detection.</li>
<li><strong>Pivot to Cloud-Hosted Server:</strong> From the cloud console, the attacker pivots to a cloud-hosted server to begin discovery.</li>
<li><strong>Credential Theft (Covert C2):</strong> The attacker utilizes DNS tunneling to a cloud storage location for C2 communication and steals credentials to use legitimate applications.</li>
<li><strong>Lateral Movement:</strong> The attacker moves laterally using the stolen credentials, triggering impossible travel alerts across SaaS apps.</li>
<li><strong>Rogue Asset Introduction:</strong> The attacker introduces a rogue device into the network, bypassing traditional endpoint security measures.</li>
<li><strong>Persistence:</strong> The attacker maintains persistence through the rogue device, using it for covert movement and access.</li>
<li><strong>Data Exfiltration:</strong> The attacker exfiltrates sensitive data, taking advantage of the gaps in security visibility.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Organizations are increasingly vulnerable to rapid data exfiltration due to the expanded attack surface and reliance on endpoint-centric security. The inability to correlate telemetry across diverse IT zones allows attackers to operate undetected, leading to significant data breaches, financial losses, and reputational damage. Unit 42&rsquo;s research shows that attackers are moving 4x faster to exfiltration, exacerbating the impact of successful intrusions. The attacks target cloud environments, identity systems, and networks, creating a complex threat landscape for security teams to navigate.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Ingest and correlate telemetry from all IT zones (IAM, cloud, OT/IoT, AI workloads) into a single repository, as described in the overview, to eliminate data silos and gain holistic visibility.</li>
<li>Implement User and Entity Behavior Analytics (UEBA) as mentioned in the overview, to detect anomalous behavior indicative of compromised credentials by using a centralized workbench.</li>
<li>Deploy Cortex XSIAM, as discussed in the overview, to leverage AI-driven alert stitching, ML-based incident scoring, and UEBA for automated detection, investigation, and response.</li>
<li>Implement continuous network monitoring and external attack surface management to detect and manage rogue assets, as highlighted in the attack chain.</li>
<li>Evaluate your current visibility through a formal assessment as recommended in the conclusion, to identify gaps in security coverage.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cloud-security</category><category>iam</category><category>incident-response</category><category>threat-detection</category></item></channel></rss>