{"description":"Trending threats, MITRE ATT\u0026CK coverage, and detection metadata — refreshed continuously.","feed_url":"https://feed.craftedsignal.io/vendors/sunnet/","home_page_url":"https://feed.craftedsignal.io/","items":[{"_cs_actors":[],"_cs_cves":[{"cvss":7.2,"id":"CVE-2026-7490"}],"_cs_exploited":false,"_cs_products":["CTMS","CPAS"],"_cs_severities":["high"],"_cs_tags":["arbitrary-file-upload","web-shell","code-execution"],"_cs_type":"advisory","_cs_vendors":["Sunnet"],"content_html":"\u003cp\u003eCVE-2026-7490 is an arbitrary file upload vulnerability found in Sunnet CTMS and CPAS. Disclosed in May 2026, this vulnerability enables a privileged attacker to upload malicious files, specifically web shell backdoors, to the affected server. This can be achieved remotely, without requiring local system access, given the attacker already possesses valid privileged credentials for the application. Successful exploitation allows the attacker to execute arbitrary code on the server, potentially leading to complete system compromise. This vulnerability poses a significant threat to organizations using these Sunnet products, as it could result in data breaches, service disruption, and other malicious activities.\u003c/p\u003e\n\u003ch2 id=\"attack-chain\"\u003eAttack Chain\u003c/h2\u003e\n\u003col\u003e\n\u003cli\u003eAttacker gains privileged access to the CTMS or CPAS application, either through credential theft, phishing, or other means.\u003c/li\u003e\n\u003cli\u003eAttacker identifies the file upload functionality within the application.\u003c/li\u003e\n\u003cli\u003eAttacker crafts a malicious file, such as a PHP web shell, designed to execute arbitrary commands on the server.\u003c/li\u003e\n\u003cli\u003eAttacker bypasses any client-side file type validation mechanisms.\u003c/li\u003e\n\u003cli\u003eAttacker uploads the malicious file to the server through the vulnerable file upload endpoint.\u003c/li\u003e\n\u003cli\u003eThe application saves the file to a publicly accessible directory without proper sanitization or validation.\u003c/li\u003e\n\u003cli\u003eAttacker accesses the uploaded web shell via a web browser.\u003c/li\u003e\n\u003cli\u003eAttacker uses the web shell to execute arbitrary commands on the server, leading to full system compromise.\u003c/li\u003e\n\u003c/ol\u003e\n\u003ch2 id=\"impact\"\u003eImpact\u003c/h2\u003e\n\u003cp\u003eSuccessful exploitation of CVE-2026-7490 allows attackers to execute arbitrary code on the affected server. This can lead to a range of malicious activities, including data theft, modification, or destruction, installation of malware, and complete system takeover. Since the vulnerability affects CTMS and CPAS, organizations in sectors utilizing these systems for content or process management are particularly at risk. The vulnerability\u0026rsquo;s high severity allows attackers to quickly gain a foothold and potentially compromise sensitive information or disrupt business operations.\u003c/p\u003e\n\u003ch2 id=\"recommendation\"\u003eRecommendation\u003c/h2\u003e\n\u003cul\u003e\n\u003cli\u003eApply available patches or updates from Sunnet to address CVE-2026-7490.\u003c/li\u003e\n\u003cli\u003eImplement the Sigma rule \u003ccode\u003eDetect Malicious File Uploads to Web Servers\u003c/code\u003e to detect suspicious file uploads based on file extensions and content.\u003c/li\u003e\n\u003cli\u003eReview and harden file upload functionalities within CTMS and CPAS to prevent arbitrary file uploads.\u003c/li\u003e\n\u003cli\u003eMonitor web server logs for access to suspicious files in upload directories, using the \u003ccode\u003eWeb Shell Access\u003c/code\u003e Sigma rule.\u003c/li\u003e\n\u003cli\u003eRestrict access to file upload functionalities to only authorized users with appropriate privileges.\u003c/li\u003e\n\u003c/ul\u003e\n","date_modified":"2026-05-02T10:16:18Z","date_published":"2026-05-02T10:16:18Z","id":"/briefs/2026-05-sunnet-file-upload/","summary":"A privileged remote attacker can exploit CVE-2026-7490 in Sunnet CTMS and CPAS to upload and execute web shell backdoors, leading to arbitrary code execution on the server.","title":"Sunnet CTMS/CPAS Arbitrary File Upload Vulnerability (CVE-2026-7490)","url":"https://feed.craftedsignal.io/briefs/2026-05-sunnet-file-upload/"},{"_cs_actors":[],"_cs_cves":[{"cvss":8.8,"id":"CVE-2026-7489"}],"_cs_exploited":false,"_cs_products":["CTMS"],"_cs_severities":["high"],"_cs_tags":["sqli","cve-2026-7489","web-application"],"_cs_type":"advisory","_cs_vendors":["Sunnet"],"content_html":"\u003cp\u003eA SQL Injection vulnerability, identified as CVE-2026-7489, exists in CTMS developed by Sunnet. This flaw allows authenticated remote attackers to inject arbitrary SQL commands. Successful exploitation could allow the attackers to read, modify, and delete database contents. The vulnerability was published on May 2, 2026. The scope of this vulnerability affects systems running the vulnerable CTMS software, potentially leading to data breaches and system compromise.\u003c/p\u003e\n\u003ch2 id=\"attack-chain\"\u003eAttack Chain\u003c/h2\u003e\n\u003col\u003e\n\u003cli\u003eThe attacker authenticates to the CTMS application.\u003c/li\u003e\n\u003cli\u003eThe attacker identifies an endpoint vulnerable to SQL injection.\u003c/li\u003e\n\u003cli\u003eThe attacker crafts a malicious SQL query designed to exploit the injection point, likely using tools like Burp Suite or SQLMap.\u003c/li\u003e\n\u003cli\u003eThe attacker injects the SQL payload via a crafted HTTP request, targeting vulnerable parameters within the request.\u003c/li\u003e\n\u003cli\u003eThe CTMS application executes the injected SQL query against the database.\u003c/li\u003e\n\u003cli\u003eThe attacker bypasses authentication or authorization controls to gain elevated privileges within the application or database.\u003c/li\u003e\n\u003cli\u003eThe attacker reads sensitive data from the database, such as user credentials or confidential business information.\u003c/li\u003e\n\u003cli\u003eThe attacker modifies or deletes database entries, leading to data corruption or denial of service.\u003c/li\u003e\n\u003c/ol\u003e\n\u003ch2 id=\"impact\"\u003eImpact\u003c/h2\u003e\n\u003cp\u003eSuccessful exploitation of this SQL injection vulnerability could allow attackers to read sensitive information, modify data, or delete critical database contents. This could lead to a complete compromise of the CTMS application and its underlying database, impacting all users and data managed by the system. The severity is heightened by the potential for attackers to gain complete control over the database, leading to significant data breaches and operational disruption.\u003c/p\u003e\n\u003ch2 id=\"recommendation\"\u003eRecommendation\u003c/h2\u003e\n\u003cul\u003e\n\u003cli\u003eApply the patch or upgrade CTMS to a version that addresses CVE-2026-7489 as soon as it becomes available from Sunnet.\u003c/li\u003e\n\u003cli\u003eDeploy the Sigma rule \u0026ldquo;Detect Suspicious SQL Injection Attempts\u0026rdquo; to identify potential exploitation attempts against CTMS (see below).\u003c/li\u003e\n\u003cli\u003eReview web server logs for suspicious activity indicative of SQL injection attempts, specifically looking for unusual characters or SQL syntax in HTTP request parameters.\u003c/li\u003e\n\u003cli\u003eImplement proper input validation and sanitization techniques to prevent SQL injection vulnerabilities in CTMS and other web applications.\u003c/li\u003e\n\u003c/ul\u003e\n","date_modified":"2026-05-02T10:16:18Z","date_published":"2026-05-02T10:16:18Z","id":"/briefs/2026-05-sunnet-ctms-sqli/","summary":"Sunnet CTMS is vulnerable to SQL injection (CVE-2026-7489), allowing authenticated remote attackers to execute arbitrary SQL commands and compromise the database.","title":"Sunnet CTMS SQL Injection Vulnerability (CVE-2026-7489)","url":"https://feed.craftedsignal.io/briefs/2026-05-sunnet-ctms-sqli/"}],"language":"en","title":"CraftedSignal Threat Feed — Sunnet","version":"https://jsonfeed.org/version/1.1"}