<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Mapfish — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/vendors/mapfish/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 13 May 2026 01:37:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/vendors/mapfish/feed.xml" rel="self" type="application/rss+xml"/><item><title>Mapfish Print Remote Code Injection Vulnerability in Dynamic Table (CVE-2026-44672)</title><link>https://feed.craftedsignal.io/briefs/2026-05-mapfish-rce/</link><pubDate>Wed, 13 May 2026 01:37:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-mapfish-rce/</guid><description>An unauthenticated remote code injection vulnerability (CVE-2026-44672) exists in Mapfish Print's Dynamic table functionality, allowing attackers to execute arbitrary code on the server.</description><content:encoded><![CDATA[<p>A critical remote code injection vulnerability, tracked as CVE-2026-44672, has been identified in the Dynamic table component of Mapfish Print. This flaw allows an unauthenticated attacker to execute arbitrary code on the server. The vulnerability affects multiple versions of the <code>print-lib</code> and <code>print-servlet</code> components, specifically versions between 3.23.0 and 3.28.28, 3.29.0 and 3.30.30, 3.31.0 and 3.31.21, 3.32.0 and 3.33.14, and 3.34.0 and 4.0.3. Successful exploitation grants the attacker complete control over the affected Mapfish Print instance.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker crafts a malicious HTTP request targeting the Dynamic table functionality in Mapfish Print.</li>
<li>This request contains a payload designed to inject arbitrary code into the server-side processing logic.</li>
<li>The injected code leverages a vulnerability in how Mapfish Print handles data within the Dynamic table component.</li>
<li>Mapfish Print processes the malicious request, inadvertently executing the injected code.</li>
<li>The injected code gains access to the underlying operating system with the privileges of the Mapfish Print application.</li>
<li>The attacker uses the gained access to execute system commands.</li>
<li>The attacker deploys a reverse shell to establish a persistent connection to the compromised server.</li>
<li>The attacker pivots within the network to compromise additional systems or exfiltrate sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-44672 allows unauthenticated attackers to execute arbitrary code on systems running vulnerable versions of Mapfish Print. This can lead to complete system compromise, data theft, and disruption of services. The number of affected installations is currently unknown, but organizations using Mapfish Print for critical mapping and printing services are at high risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately upgrade Mapfish Print <code>print-lib</code> and <code>print-servlet</code> components to a patched version greater than or equal to 3.28.28, 3.30.30, 3.31.21, 3.33.14, or 4.0.3, as indicated in the advisory.</li>
<li>Deploy the Sigma rule to detect exploitation attempts targeting CVE-2026-44672 by monitoring for suspicious HTTP requests.</li>
<li>Review network traffic to Mapfish Print servers for unusual patterns or connections originating from unexpected locations.</li>
<li>Implement strict input validation and sanitization measures to prevent code injection vulnerabilities.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>remote-code-execution</category><category>code-injection</category><category>mapfish</category><category>web-application</category></item></channel></rss>