<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Heym — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/vendors/heym/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 12 May 2026 22:22:11 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/vendors/heym/feed.xml" rel="self" type="application/rss+xml"/><item><title>Heym Path Traversal Vulnerability in File Upload Endpoint (CVE-2026-45225)</title><link>https://feed.craftedsignal.io/briefs/2026-05-heym-path-traversal/</link><pubDate>Tue, 12 May 2026 22:22:11 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-heym-path-traversal/</guid><description>Heym before 0.0.21 is vulnerable to path traversal, allowing authenticated users to write attacker-controlled files to arbitrary locations by exploiting the unvalidated filename parameter in the upload_file() handler (CVE-2026-45225).</description><content:encoded><![CDATA[<p>Heym before version 0.0.21 contains a path traversal vulnerability in its file upload endpoint. This flaw allows authenticated users to write malicious files to arbitrary locations on the server. By crafting a filename containing traversal sequences (e.g., ../../), an attacker can bypass intended path restrictions and manipulate files outside of the designated upload directory. This vulnerability affects the <code>upload_file()</code> handler due to insufficient validation of the filename parameter. Successful exploitation could lead to arbitrary file write, read, or even deletion, potentially compromising the entire system.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker authenticates to the Heym application.</li>
<li>Attacker crafts a malicious filename containing path traversal sequences (e.g., <code>../../../evil.php</code>).</li>
<li>Attacker initiates a file upload request to the <code>upload_file()</code> endpoint, including the crafted filename.</li>
<li>The <code>upload_file()</code> handler receives the request but fails to properly sanitize the filename.</li>
<li>The application writes the uploaded file to a location outside the intended directory, based on the path provided in the crafted filename.</li>
<li>The attacker triggers execution of the uploaded file (e.g. if it&rsquo;s a PHP file).</li>
<li>The attacker achieves arbitrary code execution on the server.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to write, read, or delete files outside the intended storage directory. This can lead to arbitrary code execution, allowing the attacker to gain complete control over the affected system. The CVSS v3.1 base score for this vulnerability is 7.6 (High), indicating a significant risk. The potential impact includes unauthorized access to sensitive data, modification of critical system files, and complete system compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Heym to version 0.0.21 or later to patch CVE-2026-45225.</li>
<li>Implement robust filename validation and sanitization within the <code>upload_file()</code> handler to prevent path traversal attacks.</li>
<li>Deploy the Sigma rule <code>Detect Heym Path Traversal File Upload (CVE-2026-45225)</code> to detect exploitation attempts in web server logs.</li>
<li>Monitor web server logs for HTTP requests to the file upload endpoint containing suspicious filename patterns.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>path-traversal</category><category>file-upload</category><category>CVE-2026-45225</category></item><item><title>Heym Sandbox Escape Vulnerability (CVE-2026-45227)</title><link>https://feed.craftedsignal.io/briefs/2026-05-heym-sandbox-escape/</link><pubDate>Tue, 12 May 2026 22:18:20 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-heym-sandbox-escape/</guid><description>Heym before 0.0.21 is vulnerable to a sandbox escape (CVE-2026-45227) in the custom Python tool executor, allowing authenticated workflow authors to bypass restrictions and execute arbitrary host commands as the backend service user.</description><content:encoded><![CDATA[<p>Heym before version 0.0.21 contains a critical sandbox escape vulnerability, identified as CVE-2026-45227, within its custom Python tool executor. This flaw enables authenticated workflow authors to circumvent intended sandbox restrictions by leveraging object-graph introspection primitives. By exploiting this vulnerability, attackers can regain access to the unrestricted <code>__import__</code> function, enabling the import of typically blocked modules such as <code>os</code> and <code>subprocess</code>. This access further allows attackers to access inherited backend environment variables, potentially exposing sensitive information such as database credentials and encryption keys. Successful exploitation leads to arbitrary host command execution with the privileges of the backend service user, severely compromising system integrity.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An authenticated user gains access to the Heym workflow authoring interface.</li>
<li>The attacker crafts a malicious workflow using the custom Python tool executor.</li>
<li>The workflow exploits Python introspection techniques to access the unrestricted <code>__import__</code> function.</li>
<li>Using the recovered <code>__import__</code> function, the attacker imports restricted modules like <code>os</code> or <code>subprocess</code>.</li>
<li>The attacker uses the imported modules to access inherited backend environment variables.</li>
<li>The attacker extracts sensitive data like database credentials or encryption keys from environment variables.</li>
<li>The attacker crafts an arbitrary OS command using the <code>os</code> or <code>subprocess</code> modules.</li>
<li>The malicious workflow executes the arbitrary OS command on the host, running as the backend service user.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this sandbox escape vulnerability (CVE-2026-45227) in Heym allows attackers to execute arbitrary commands on the host system as the backend service user. This can lead to complete system compromise, including data theft, service disruption, and unauthorized access to sensitive information, including database credentials and encryption keys. The vulnerability affects all Heym deployments prior to version 0.0.21.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Heym to version 0.0.21 or later to patch CVE-2026-45227.</li>
<li>Deploy the Sigma rule &ldquo;Detect Heym Sandbox Escape Attempt via Import&rdquo; to monitor for attempts to import restricted modules within the Python tool executor.</li>
<li>Review and restrict access to the Heym workflow authoring interface to minimize the attack surface.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>sandbox-escape</category><category>python</category><category>code-execution</category></item><item><title>Heym Authorization Bypass Vulnerability CVE-2026-45226</title><link>https://feed.craftedsignal.io/briefs/2026-05-heym-auth-bypass/</link><pubDate>Tue, 12 May 2026 22:18:07 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-heym-auth-bypass/</guid><description>Heym before 0.0.21 contains an authorization bypass vulnerability (CVE-2026-45226) that allows authenticated users to execute arbitrary workflows by referencing victim workflow UUIDs, leading to exposure of outputs and unintended side effects.</description><content:encoded><![CDATA[<p>Heym before version 0.0.21 is vulnerable to an authorization bypass, as identified by CVE-2026-45226. This flaw allows authenticated users to bypass access controls and execute arbitrary workflows. The vulnerability stems from a lack of proper access validation when referencing workflow UUIDs. Attackers can exploit this by creating malicious workflows that reference UUIDs of victim workflows, enabling them to load and execute these workflows under attacker-controlled execution paths. This leads to potential exposure of sensitive victim workflow outputs and unintended triggering of workflow nodes with adverse side effects. This vulnerability poses a significant risk to the confidentiality and integrity of workflows within Heym environments.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker authenticates to a Heym instance.</li>
<li>The attacker identifies a victim workflow and obtains its UUID.</li>
<li>The attacker creates a new workflow containing either an &ldquo;execute&rdquo; node or an &ldquo;agent subWorkflowId&rdquo;.</li>
<li>Within the &ldquo;execute&rdquo; node or &ldquo;agent subWorkflowId&rdquo;, the attacker references the victim workflow&rsquo;s UUID.</li>
<li>The attacker executes their newly crafted workflow.</li>
<li>Due to the authorization bypass, the Heym system loads and executes the victim workflow under the attacker&rsquo;s execution context.</li>
<li>The attacker gains access to the victim workflow&rsquo;s outputs.</li>
<li>Workflow nodes within the victim workflow are triggered with unintended side effects, potentially causing further damage.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-45226 allows an attacker to execute arbitrary workflows without proper authorization. This can lead to the exposure of sensitive data contained within the victim workflows, as well as the unintended triggering of workflow nodes, potentially causing data corruption or other malicious side effects. The vulnerability affects Heym instances before version 0.0.21 and poses a risk to the confidentiality, integrity, and availability of workflow data.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Heym to version 0.0.21 or later to patch CVE-2026-45226.</li>
<li>Deploy the Sigma rule &ldquo;Detect Heym Workflow Execution with Subworkflow UUID&rdquo; to identify potentially malicious workflow executions.</li>
<li>Monitor Heym logs for unauthorized workflow executions referencing unusual or suspicious workflow UUIDs.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>authorization-bypass</category><category>workflow-execution</category><category>cve</category></item></channel></rss>