<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>YetAnotherForum.NET — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/vendors/yetanotherforum.net/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 05 May 2026 20:31:36 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/vendors/yetanotherforum.net/feed.xml" rel="self" type="application/rss+xml"/><item><title>YAFNET Unauthenticated Stored XSS via User-Agent Header</title><link>https://feed.craftedsignal.io/briefs/2024-01-02-yafnet-xss/</link><pubDate>Tue, 05 May 2026 20:31:36 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-02-yafnet-xss/</guid><description>YAFNET is vulnerable to an unauthenticated stored second-order XSS vulnerability in the admin event log, triggered by a reflected `User-Agent` header, allowing an attacker to execute arbitrary JavaScript in an administrator's session.</description><content:encoded><![CDATA[<p>YAFNET is vulnerable to a stored (second-order) cross-site scripting (XSS) vulnerability. An unauthenticated attacker can inject malicious JavaScript code into the <code>User-Agent</code> header of an HTTP request. This input is then logged into the <code>EventLog.Description</code> column of the database whenever an error occurs on the server. The admin event log page deserializes the JSON and displays the <code>UserAgent</code> value without proper encoding. When an administrator views the event log page, the injected JavaScript is executed in the administrator&rsquo;s browser session, potentially leading to account takeover or other malicious activities. This vulnerability affects YAFNET.Core versions 4.0.0-beta01 through 4.0.4 and versions up to 3.2.11. The vulnerability was reported on 2026-05-05 and assigned CVE-2026-43938.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker sends a malicious HTTP request to the <code>/api/Attachments/GetAttachment</code> endpoint with a crafted <code>User-Agent</code> header containing XSS payload (e.g., <code>&lt;img src=x onerror=alert('XSS')&gt;</code>).</li>
<li>The YAFNET application encounters an error when processing the request, triggering an exception.</li>
<li>The <code>YAFNET.Core/Logger/DbLogger.cs</code> captures the request&rsquo;s <code>User-Agent</code> header.</li>
<li>The <code>User-Agent</code> string is serialized into a JSON object using <code>JsonConvert</code> and stored in the <code>EventLog.Description</code> column of the <code>dbo.EventLog</code> table in the database.</li>
<li>An administrator navigates to the <code>/Admin/EventLog</code> page.</li>
<li>The <code>YetAnotherForum.NET/Pages/Admin/EventLog.cshtml.cs</code> deserializes the JSON from the <code>EventLog.Description</code> column.</li>
<li>The <code>FormatStackTrace()</code> function extracts the <code>UserAgent</code> value from the deserialized JSON.</li>
<li>The <code>EventLog.cshtml</code> Razor view uses <code>@Html.Raw</code> to render the <code>UserAgent</code> value directly into the HTML, without proper encoding, resulting in the execution of the attacker-controlled JavaScript in the administrator&rsquo;s browser.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful XSS attack can allow an unauthenticated attacker to execute arbitrary JavaScript code in the context of an administrator&rsquo;s session. This can lead to a complete forum takeover, including creating new administrative accounts, modifying site-wide settings, and exfiltrating user data from admin-only endpoints. Due to the unauthenticated nature of the vulnerability, it is readily exploitable at scale and may be automated.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the patch or upgrade to a version of YAFNET.Core later than 4.0.4 or greater than 3.2.11 to remediate the XSS vulnerability described in CVE-2026-43938.</li>
<li>Deploy the Sigma rule &ldquo;Detect YAFNET XSS in Event Log&rdquo; to your SIEM to identify potential exploitation attempts targeting the <code>User-Agent</code> header.</li>
<li>Monitor web server logs for requests to <code>/api/Attachments/GetAttachment</code> with suspicious <code>User-Agent</code> headers.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>xss</category><category>web-application</category><category>injection</category></item></channel></rss>