<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>MantisBT — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/vendors/mantisbt/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 11 May 2026 19:40:12 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/vendors/mantisbt/feed.xml" rel="self" type="application/rss+xml"/><item><title>MantisBT Private Bugnote Attachment Content Leak via REST API</title><link>https://feed.craftedsignal.io/briefs/2026-05-mantisbt-auth-bypass/</link><pubDate>Mon, 11 May 2026 19:40:12 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-mantisbt-auth-bypass/</guid><description>MantisBT is vulnerable to a missing authorization check in its file visibility function, allowing authenticated users with REPORTER or higher access to download attachments on private bugnotes they should not be able to access through the REST API and SOAP API, affecting versions 2.23.0 to 2.28.1.</description><content:encoded><![CDATA[<p>MantisBT versions 2.23.0 through 2.28.1 are susceptible to an authorization bypass vulnerability (CVE-2026-42071) affecting the REST and SOAP APIs. A missing authorization check in the file visibility function allows any authenticated user with REPORTER access level or higher to download attachments on private bugnotes. These private bugnotes are intended for internal developer discussions, and their attachments (logs, screenshots, patches) should be equally protected. This issue was discovered and responsibly reported by multiple security researchers, including Vishal Shukla, Tristan Madani (@TristanInSec) from Talence Security, and Tang Cheuk Hei (@siunam321). The web UI is not affected by this vulnerability.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker authenticates to the MantisBT instance with REPORTER or higher access.</li>
<li>The attacker identifies the ID of a bug issue.</li>
<li>The attacker uses the REST API endpoint <code>GET /api/rest/issues/{id}/files</code> or the SOAP API endpoint <code>mc_issue_attachment_get</code> to request attachments associated with the issue.</li>
<li>The API endpoint fails to properly validate whether the authenticated user has permission to access attachments associated with private bugnotes within that issue.</li>
<li>The attacker receives a list of attachment metadata, including file names and download URLs, associated with private bugnotes.</li>
<li>The attacker uses the download URLs to retrieve the contents of attachments on private bugnotes.</li>
<li>The attacker gains access to sensitive information contained within the attachments, such as logs, screenshots, or patches related to internal development discussions.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows low-privileged authenticated users (REPORTER+) to access sensitive information intended for internal developer discussion, potentially leading to information disclosure. Attachments may contain sensitive data such as logs, screenshots, or patches, compromising the confidentiality of internal development processes. The number of affected installations is unknown, but all MantisBT instances running versions 2.23.0 to 2.28.1 are potentially vulnerable.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade MantisBT to a patched version beyond 2.28.1 to address CVE-2026-42071.</li>
<li>Deploy the Sigma rules provided below to your SIEM to detect potential exploitation attempts targeting the vulnerable REST API endpoint.</li>
<li>Monitor web server logs for unusual activity targeting the <code>/api/rest/issues/{id}/files</code> endpoint to identify potential exploit attempts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>credential-access</category><category>authorization-bypass</category><category>rest-api</category></item><item><title>MantisBT Content Security Policy Bypass via Attachment Upload (CVE-2026-40597)</title><link>https://feed.craftedsignal.io/briefs/2026-05-mantisbt-csp-bypass/</link><pubDate>Mon, 11 May 2026 19:35:30 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-mantisbt-csp-bypass/</guid><description>A content security policy bypass vulnerability, CVE-2026-40597, exists in MantisBT versions 2.28.1 and earlier, allowing an attacker to bypass the _script-src_ directive by uploading a crafted attachment that, when downloaded, executes as JavaScript due to MIME type sniffing, given a pre-existing XSS / HTML injection vulnerability.</description><content:encoded><![CDATA[<p>MantisBT, a web-based bug tracking system, is vulnerable to a content security policy (CSP) bypass. Specifically, the vulnerability, identified as CVE-2026-40597, allows an attacker to circumvent the CSP&rsquo;s <code>script-src</code> directive. This is achieved by uploading a specially crafted attachment to a MantisBT issue. The vulnerability exists in MantisBT versions 2.28.1 and earlier. An attacker must first inject HTML or XSS. When the attachment is accessed via the <code>file_download.php</code> link, PHP&rsquo;s finfo mechanism incorrectly identifies it as a valid JavaScript MIME type. Because of this, the browser executes the payload within the context of the MantisBT application. This can lead to Cross-Site Scripting (XSS) attacks.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies or exploits an existing XSS or HTML injection vulnerability in MantisBT.</li>
<li>Attacker crafts a malicious payload designed to execute JavaScript code within the browser, and ensures that it will be sniffed as JavaScript by PHP&rsquo;s <code>finfo</code>.</li>
<li>Attacker uploads the crafted payload as an attachment to a MantisBT issue using the standard attachment upload functionality.</li>
<li>MantisBT stores the attachment, associating it with the specific issue.</li>
<li>A user (victim) accesses the issue containing the malicious attachment.</li>
<li>The user clicks the <code>file_download.php</code> link associated with the uploaded attachment.</li>
<li>The webserver serves the attachment via <code>file_download.php</code>. PHP&rsquo;s <code>finfo</code> incorrectly identifies the MIME type of the file as a valid JavaScript MIME type.</li>
<li>The browser imports the attachment as a <code>&lt;script&gt;</code> tag and executes the attacker-controlled JavaScript code within the security context of the MantisBT domain, leading to XSS.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability, in conjunction with a pre-existing XSS or HTML injection, allows an attacker to execute arbitrary JavaScript code in the context of the MantisBT application. This can lead to session hijacking, defacement of the MantisBT interface, sensitive information theft, or other malicious actions performed on behalf of the victim user. Given the wide use of MantisBT in software development and IT support organizations, a successful attack could impact a significant number of users.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade MantisBT to a patched version beyond 2.28.1 as indicated in the advisory (<a href="https://github.com/advisories/GHSA-9c3j-xm6v-j7j3)">https://github.com/advisories/GHSA-9c3j-xm6v-j7j3)</a>.</li>
<li>Deploy the Sigma rule <code>Detect MantisBT CSP Bypass via JavaScript MIME Sniffing</code> to detect attempts to exploit CVE-2026-40597.</li>
<li>Review and harden input validation and output encoding mechanisms to prevent XSS vulnerabilities, which are a prerequisite for exploiting CVE-2026-40597.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>csp-bypass</category><category>xss</category><category>attachment</category><category>mime-sniffing</category></item></channel></rss>