<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>Forem: CVE Reports</title>
    <description>The latest articles on Forem by CVE Reports (@cverports).</description>
    <link>https://forem.com/cverports</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1959489%2F6e9f36b9-96a5-441a-a9b5-6993444f71d8.png</url>
      <title>Forem: CVE Reports</title>
      <link>https://forem.com/cverports</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://forem.com/feed/cverports"/>
    <language>en</language>
    <item>
      <title>CVE-2026-39857: CVE-2026-39857: Information Disclosure via Authorization Bypass in ApostropheCMS REST API</title>
      <dc:creator>CVE Reports</dc:creator>
      <pubDate>Thu, 16 Apr 2026 21:10:20 +0000</pubDate>
      <link>https://forem.com/cverports/cve-2026-39857-cve-2026-39857-information-disclosure-via-authorization-bypass-in-apostrophecms-3f66</link>
      <guid>https://forem.com/cverports/cve-2026-39857-cve-2026-39857-information-disclosure-via-authorization-bypass-in-apostrophecms-3f66</guid>
      <description>&lt;h1&gt;
  
  
  CVE-2026-39857: Information Disclosure via Authorization Bypass in ApostropheCMS REST API
&lt;/h1&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Vulnerability ID:&lt;/strong&gt; CVE-2026-39857&lt;br&gt;
&lt;strong&gt;CVSS Score:&lt;/strong&gt; 5.3&lt;br&gt;
&lt;strong&gt;Published:&lt;/strong&gt; 2026-04-16&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;ApostropheCMS versions 4.28.0 and prior contain an authorization bypass vulnerability in the REST API's 'choices' and 'counts' query builders. These parameters execute MongoDB aggregation operations that bypass configured public API projections, permitting unauthenticated attackers to extract distinct values for restricted schema fields.&lt;/p&gt;

&lt;h2&gt;
  
  
  TL;DR
&lt;/h2&gt;

&lt;p&gt;Unauthenticated attackers can bypass API projections in ApostropheCMS &amp;lt;= 4.28.0 using the 'choices' and 'counts' parameters to exfiltrate restricted field data.&lt;/p&gt;




&lt;h3&gt;
  
  
  ⚠️ Exploit Status: POC
&lt;/h3&gt;

&lt;h2&gt;
  
  
  Technical Details
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;CWE ID&lt;/strong&gt;: CWE-863&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Attack Vector&lt;/strong&gt;: Network&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;CVSS v3.1&lt;/strong&gt;: 5.3&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;EPSS Score&lt;/strong&gt;: 0.00037&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Impact&lt;/strong&gt;: Confidentiality (Low)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Exploitation Status&lt;/strong&gt;: PoC Available&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;CISA KEV&lt;/strong&gt;: No&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Affected Systems
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;ApostropheCMS &amp;lt;= 4.28.0&lt;/li&gt;
&lt;li&gt;Node.js Applications using ApostropheCMS&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;ApostropheCMS&lt;/strong&gt;: &amp;lt;= 4.28.0 (Fixed in: &lt;code&gt;4.29.0&lt;/code&gt;)&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Code Analysis
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Commit: &lt;a href="https://github.com/apostrophecms/apostrophe/commit/6c2b548dec2e3f7a82e8e16736603f4cd17525aa" rel="noopener noreferrer"&gt;6c2b548&lt;/a&gt;
&lt;/h3&gt;

&lt;p&gt;Fix: Apply projection and viewPermission checks to distinct() queries for choices and counts endpoints&lt;/p&gt;

&lt;h2&gt;
  
  
  Exploit Details
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="https://github.com/apostrophecms/apostrophe/security/advisories/GHSA-c276-fj82-f2pq" rel="noopener noreferrer"&gt;GitHub Advisory&lt;/a&gt;: PoC exists within the official fix commit test cases.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Mitigation Strategies
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Upgrade application core components to the latest stable release.&lt;/li&gt;
&lt;li&gt;Implement strict Web Application Firewall (WAF) rules to filter specific query parameters.&lt;/li&gt;
&lt;li&gt;Audit public API endpoint projections and explicit field exclusion configurations.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Remediation Steps:&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Verify current ApostropheCMS version via package.json.&lt;/li&gt;
&lt;li&gt;Execute package manager update to install ApostropheCMS &amp;gt;= 4.29.0.&lt;/li&gt;
&lt;li&gt;Review and test piece and page type schemas for correct publicApiProjection syntax.&lt;/li&gt;
&lt;li&gt;Deploy WAF rules blocking 'choices' and 'counts' parameters on REST endpoints if patching is delayed.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  References
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://github.com/apostrophecms/apostrophe/security/advisories/GHSA-c276-fj82-f2pq" rel="noopener noreferrer"&gt;GitHub Advisory (GHSA-c276-fj82-f2pq)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/apostrophecms/apostrophe/commit/6c2b548dec2e3f7a82e8e16736603f4cd17525aa" rel="noopener noreferrer"&gt;Official Fix Commit (6c2b548)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2026-39857" rel="noopener noreferrer"&gt;NVD CVE-2026-39857 Detail&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://apostrophecms.com/" rel="noopener noreferrer"&gt;ApostropheCMS Official Site&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;




&lt;p&gt;&lt;em&gt;&lt;a href="https://cvereports.com/reports/CVE-2026-39857" rel="noopener noreferrer"&gt;Read the full report for CVE-2026-39857 on our website&lt;/a&gt; for more details including interactive diagrams and full exploit analysis.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>security</category>
      <category>cve</category>
      <category>cybersecurity</category>
    </item>
    <item>
      <title>CVE-2026-33824: CVE-2026-33824: Windows Internet Key Exchange (IKE) Service Extensions Remote Code Execution Vulnerability</title>
      <dc:creator>CVE Reports</dc:creator>
      <pubDate>Thu, 16 Apr 2026 15:20:20 +0000</pubDate>
      <link>https://forem.com/cverports/cve-2026-33824-cve-2026-33824-windows-internet-key-exchange-ike-service-extensions-remote-code-3ej7</link>
      <guid>https://forem.com/cverports/cve-2026-33824-cve-2026-33824-windows-internet-key-exchange-ike-service-extensions-remote-code-3ej7</guid>
      <description>&lt;h1&gt;
  
  
  CVE-2026-33824: Windows Internet Key Exchange (IKE) Service Extensions Remote Code Execution Vulnerability
&lt;/h1&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Vulnerability ID:&lt;/strong&gt; CVE-2026-33824&lt;br&gt;
&lt;strong&gt;CVSS Score:&lt;/strong&gt; 9.8&lt;br&gt;
&lt;strong&gt;Published:&lt;/strong&gt; 2026-04-14&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;A double-free vulnerability in the Windows IKE Extension service allows unauthenticated remote attackers to achieve arbitrary code execution with SYSTEM privileges by sending malformed IKEv2 payloads.&lt;/p&gt;

&lt;h2&gt;
  
  
  TL;DR
&lt;/h2&gt;

&lt;p&gt;CVE-2026-33824 (BlueHammer) is an actively exploited, zero-click remote code execution vulnerability in the Windows IKE service (IKEEXT). It leverages a double-free condition during SA_INIT packet parsing to bypass mitigations and execute arbitrary code as SYSTEM.&lt;/p&gt;




&lt;h3&gt;
  
  
  ⚠️ Exploit Status: ACTIVE
&lt;/h3&gt;

&lt;h2&gt;
  
  
  Technical Details
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;CWE ID&lt;/strong&gt;: CWE-415&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Attack Vector&lt;/strong&gt;: Network (UDP 500/4500)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;CVSS Score&lt;/strong&gt;: 9.8&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;EPSS Score&lt;/strong&gt;: 0.00067&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Impact&lt;/strong&gt;: Unauthenticated RCE as SYSTEM&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Exploit Status&lt;/strong&gt;: Active Exploitation&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Affected Systems
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Windows 11 (22H2, 23H2, 24H2, 25H2, 26H1)&lt;/li&gt;
&lt;li&gt;Windows 10 (1607, 1809, 21H2, 22H2)&lt;/li&gt;
&lt;li&gt;Windows Server 2016&lt;/li&gt;
&lt;li&gt;Windows Server 2019&lt;/li&gt;
&lt;li&gt;Windows Server 2022&lt;/li&gt;
&lt;li&gt;Windows Server 2025&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Windows 11&lt;/strong&gt;: 22H2, 23H2, 24H2, 25H2, 26H1 (Fixed in: &lt;code&gt;10.0.22631.6936+&lt;/code&gt;)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Windows 10&lt;/strong&gt;: 1607, 1809, 21H2, 22H2 (Fixed in: &lt;code&gt;10.0.14393.9060+&lt;/code&gt;)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Windows Server&lt;/strong&gt;: 2016, 2019, 2022, 2025 (Fixed in: &lt;code&gt;April 2026 Cumulative Update&lt;/code&gt;)&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Exploit Details
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="https://github.com/z3r0h3ro/CVE-2026-33824" rel="noopener noreferrer"&gt;GitHub&lt;/a&gt;: Mirror of the original BlueHammer PoC and exploitation analysis.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Mitigation Strategies
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Apply Microsoft April 2026 Cumulative Updates to all affected Windows endpoints and servers.&lt;/li&gt;
&lt;li&gt;Disable the 'IKE and AuthIP IPsec Keying Modules' (IKEEXT) service if IPsec or VPN functionality is not required.&lt;/li&gt;
&lt;li&gt;Implement network perimeter filtering to block inbound UDP port 500 and 4500 traffic unless strictly required for known VPN endpoints.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Remediation Steps:&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Inventory all public-facing Windows Server assets to identify active IKE/IPsec services.&lt;/li&gt;
&lt;li&gt;Deploy the April 2026 security patches targeting the specific Windows builds (e.g., 10.0.22631.6936+ for Windows 11).&lt;/li&gt;
&lt;li&gt;Reboot affected servers to ensure the patched IKEEXT.dll is loaded into memory.&lt;/li&gt;
&lt;li&gt;Verify the update installation via Windows Update logs or configuration management tooling.&lt;/li&gt;
&lt;li&gt;Review network telemetry on UDP 500/4500 for the weeks preceding the patch deployment to identify potential zero-day compromise.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  References
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33824" rel="noopener noreferrer"&gt;Microsoft Security Update Guide - CVE-2026-33824&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.cve.org/CVERecord?id=CVE-2026-33824" rel="noopener noreferrer"&gt;CVE Record for CVE-2026-33824&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.crowdstrike.com/en-us/blog/patch-tuesday-analysis-april-2026/" rel="noopener noreferrer"&gt;CrowdStrike Patch Tuesday Analysis (April 2026)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://isc.sans.edu/diary/Microsoft+Patch+Tuesday+April+2026/32898/" rel="noopener noreferrer"&gt;SANS ISC Diary - Microsoft Patch Tuesday April 2026&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/z3r0h3ro/CVE-2026-33824" rel="noopener noreferrer"&gt;GitHub Exploit Repo (Mirror/PoC)&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;




&lt;p&gt;&lt;em&gt;&lt;a href="https://cvereports.com/reports/CVE-2026-33824" rel="noopener noreferrer"&gt;Read the full report for CVE-2026-33824 on our website&lt;/a&gt; for more details including interactive diagrams and full exploit analysis.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>security</category>
      <category>cve</category>
      <category>cybersecurity</category>
    </item>
    <item>
      <title>GHSA-33R3-4WHC-44C2: GHSA-33R3-4WHC-44C2: Path Traversal and Arbitrary File Write in vite-plus/binding</title>
      <dc:creator>CVE Reports</dc:creator>
      <pubDate>Thu, 16 Apr 2026 13:40:21 +0000</pubDate>
      <link>https://forem.com/cverports/ghsa-33r3-4whc-44c2-ghsa-33r3-4whc-44c2-path-traversal-and-arbitrary-file-write-in-24a5</link>
      <guid>https://forem.com/cverports/ghsa-33r3-4whc-44c2-ghsa-33r3-4whc-44c2-path-traversal-and-arbitrary-file-write-in-24a5</guid>
      <description>&lt;h1&gt;
  
  
  GHSA-33R3-4WHC-44C2: Path Traversal and Arbitrary File Write in vite-plus/binding
&lt;/h1&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Vulnerability ID:&lt;/strong&gt; GHSA-33R3-4WHC-44C2&lt;br&gt;
&lt;strong&gt;CVSS Score:&lt;/strong&gt; 8.6&lt;br&gt;
&lt;strong&gt;Published:&lt;/strong&gt; 2026-04-16&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;A path traversal vulnerability exists in the &lt;code&gt;vite-plus/binding&lt;/code&gt; component of the &lt;code&gt;vite-plus&lt;/code&gt; npm package prior to version 0.1.17. The &lt;code&gt;downloadPackageManager()&lt;/code&gt; function fails to validate the &lt;code&gt;version&lt;/code&gt; parameter, allowing programmatic attackers to escape the &lt;code&gt;VP_HOME&lt;/code&gt; directory, overwrite arbitrary directories, and write executable shims to unintended filesystem locations.&lt;/p&gt;

&lt;h2&gt;
  
  
  TL;DR
&lt;/h2&gt;

&lt;p&gt;The &lt;code&gt;downloadPackageManager()&lt;/code&gt; function in &lt;code&gt;vite-plus/binding&lt;/code&gt; (&amp;lt; 0.1.17) is vulnerable to a path traversal attack via unvalidated version strings. This allows arbitrary file writes and directory manipulation outside the designated &lt;code&gt;VP_HOME&lt;/code&gt; directory.&lt;/p&gt;




&lt;h3&gt;
  
  
  ⚠️ Exploit Status: POC
&lt;/h3&gt;

&lt;h2&gt;
  
  
  Technical Details
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Vulnerability ID&lt;/strong&gt;: GHSA-33R3-4WHC-44C2&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;CWE ID&lt;/strong&gt;: CWE-22&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;CVSS v4.0 Score&lt;/strong&gt;: 8.6&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Attack Vector&lt;/strong&gt;: Local&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Impact&lt;/strong&gt;: High Integrity, High Availability&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Exploit Status&lt;/strong&gt;: PoC Available&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Affected Component&lt;/strong&gt;: vite-plus/binding&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Affected Systems
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;vite-plus npm package (&amp;lt; 0.1.17)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;vite-plus&lt;/strong&gt;: &amp;gt;= 0, &amp;lt; 0.1.17 (Fixed in: &lt;code&gt;0.1.17&lt;/code&gt;)&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Mitigation Strategies
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Upgrade vite-plus to version 0.1.17 or later.&lt;/li&gt;
&lt;li&gt;Implement strict semver validation for all version strings before passing them to vite-plus/binding APIs.&lt;/li&gt;
&lt;li&gt;Restrict the filesystem permissions of the Node.js process to limit the impact of successful arbitrary file writes.&lt;/li&gt;
&lt;li&gt;Monitor internal dependencies and programmatic API calls for unvalidated user input.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Remediation Steps:&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Audit the codebase for programmatic usage of &lt;code&gt;vite-plus/binding&lt;/code&gt;'s &lt;code&gt;downloadPackageManager()&lt;/code&gt;.&lt;/li&gt;
&lt;li&gt;Update package.json to require &lt;code&gt;vite-plus&lt;/code&gt; &amp;gt;= 0.1.17.&lt;/li&gt;
&lt;li&gt;Run &lt;code&gt;npm install&lt;/code&gt; or &lt;code&gt;pnpm install&lt;/code&gt; to update the dependency tree.&lt;/li&gt;
&lt;li&gt;If programmatic calls exist, implement pre-validation using the &lt;code&gt;semver&lt;/code&gt; package (&lt;code&gt;semver.valid(version)&lt;/code&gt;).&lt;/li&gt;
&lt;li&gt;Deploy the updated application to production environments.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  References
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://github.com/advisories/GHSA-33R3-4WHC-44C2" rel="noopener noreferrer"&gt;GitHub Advisory GHSA-33R3-4WHC-44C2&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/voidzero-dev/vite-plus" rel="noopener noreferrer"&gt;Official Repository: voidzero-dev/vite-plus&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://osv.dev/vulnerability/GHSA-33r3-4whc-44c2" rel="noopener noreferrer"&gt;OSV Entry&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;




&lt;p&gt;&lt;em&gt;&lt;a href="https://cvereports.com/reports/GHSA-33R3-4WHC-44C2" rel="noopener noreferrer"&gt;Read the full report for GHSA-33R3-4WHC-44C2 on our website&lt;/a&gt; for more details including interactive diagrams and full exploit analysis.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>security</category>
      <category>cve</category>
      <category>cybersecurity</category>
      <category>ghsa</category>
    </item>
    <item>
      <title>CVE-2026-33805: CVE-2026-33805: Connection Header Abuse in @fastify/reply-from and @fastify/http-proxy</title>
      <dc:creator>CVE Reports</dc:creator>
      <pubDate>Thu, 16 Apr 2026 11:40:20 +0000</pubDate>
      <link>https://forem.com/cverports/cve-2026-33805-cve-2026-33805-connection-header-abuse-in-fastifyreply-from-and-39fd</link>
      <guid>https://forem.com/cverports/cve-2026-33805-cve-2026-33805-connection-header-abuse-in-fastifyreply-from-and-39fd</guid>
      <description>&lt;h1&gt;
  
  
  CVE-2026-33805: Connection Header Abuse in @fastify/reply-from and @fastify/http-proxy
&lt;/h1&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Vulnerability ID:&lt;/strong&gt; CVE-2026-33805&lt;br&gt;
&lt;strong&gt;CVSS Score:&lt;/strong&gt; 9.0&lt;br&gt;
&lt;strong&gt;Published:&lt;/strong&gt; 2026-04-16&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;A logic flaw in the header processing pipeline of @fastify/reply-from and @fastify/http-proxy allows unauthenticated remote attackers to bypass access controls or subvert routing. By manipulating the HTTP Connection header, clients can force the proxy to remove security-critical headers injected by the developer via the rewriteRequestHeaders hook.&lt;/p&gt;

&lt;h2&gt;
  
  
  TL;DR
&lt;/h2&gt;

&lt;p&gt;A vulnerability in Fastify proxy plugins allows clients to strip proxy-injected security headers by exploiting the RFC 7230 hop-by-hop stripping mechanism, leading to authentication bypasses and header spoofing.&lt;/p&gt;




&lt;h3&gt;
  
  
  ⚠️ Exploit Status: POC
&lt;/h3&gt;

&lt;h2&gt;
  
  
  Technical Details
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;CVSS Score&lt;/strong&gt;: 9.0 (Critical)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Attack Vector&lt;/strong&gt;: Network&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;CWE ID&lt;/strong&gt;: CWE-644&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Exploit Status&lt;/strong&gt;: PoC Available&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;EPSS Score&lt;/strong&gt;: 0.00042 (12.75%)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Authentication&lt;/strong&gt;: None Required&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Affected Systems
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;@fastify/reply-from&lt;/li&gt;
&lt;li&gt;@fastify/http-proxy&lt;/li&gt;
&lt;li&gt;Node.js API Gateways&lt;/li&gt;
&lt;li&gt;Fastify Edge Proxies&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;@fastify/reply-from&lt;/strong&gt;: &amp;lt;= 12.6.1 (Fixed in: &lt;code&gt;12.6.2&lt;/code&gt;)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;@fastify/http-proxy&lt;/strong&gt;: &amp;lt;= 11.4.3 (Fixed in: &lt;code&gt;11.4.4&lt;/code&gt;)&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Code Analysis
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Commit: &lt;a href="https://github.com/fastify/fastify-reply-from/commit/c815dc430d7403f9ed44b79a01db3c218fefe10c" rel="noopener noreferrer"&gt;c815dc4&lt;/a&gt;
&lt;/h3&gt;

&lt;p&gt;Moves Connection header stripping logic before rewriteRequestHeaders invocation to prevent client-controlled deletion of proxy metadata.&lt;/p&gt;

&lt;h2&gt;
  
  
  Exploit Details
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="https://github.com/fastify/fastify-reply-from/security/advisories/GHSA-gwhp-pf74-vj37" rel="noopener noreferrer"&gt;Provided PoC&lt;/a&gt;: Proof of concept script demonstrating stripping of proxy-injected headers using the Connection header.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Mitigation Strategies
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Upgrade Fastify proxy plugins to their patched versions.&lt;/li&gt;
&lt;li&gt;Implement WAF rules to reject HTTP requests containing unexpected tokens in the Connection header.&lt;/li&gt;
&lt;li&gt;Ensure upstream services enforce strict validation of incoming headers and implement default-deny fallback logic.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Remediation Steps:&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Identify all projects utilizing @fastify/reply-from or @fastify/http-proxy via dependency auditing.&lt;/li&gt;
&lt;li&gt;Update @fastify/reply-from to &amp;gt;= 12.6.2 using package managers (e.g., npm install @fastify/&lt;a href="mailto:reply-from@12.6.2"&gt;reply-from@12.6.2&lt;/a&gt;).&lt;/li&gt;
&lt;li&gt;Update @fastify/http-proxy to &amp;gt;= 11.4.4 using package managers.&lt;/li&gt;
&lt;li&gt;Rebuild and redeploy edge proxy applications.&lt;/li&gt;
&lt;li&gt;Verify the fix by executing requests with manipulated Connection headers and confirming proxy-added headers persist.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  References
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2026-33805" rel="noopener noreferrer"&gt;NVD Vulnerability Detail&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/fastify/fastify-reply-from/security/advisories/GHSA-gwhp-pf74-vj37" rel="noopener noreferrer"&gt;GitHub Security Advisory GHSA-gwhp-pf74-vj37&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/fastify/fastify-reply-from/commit/c815dc430d7403f9ed44b79a01db3c218fefe10c" rel="noopener noreferrer"&gt;Fix Commit in fastify-reply-from&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cna.openjsf.org/security-advisories.html" rel="noopener noreferrer"&gt;OpenJS Security Bulletin&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;




&lt;p&gt;&lt;em&gt;&lt;a href="https://cvereports.com/reports/CVE-2026-33805" rel="noopener noreferrer"&gt;Read the full report for CVE-2026-33805 on our website&lt;/a&gt; for more details including interactive diagrams and full exploit analysis.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>security</category>
      <category>cve</category>
      <category>cybersecurity</category>
    </item>
    <item>
      <title>CVE-2026-33807: CVE-2026-33807: Middleware Bypass via Path Interpretation Conflict in @fastify/express</title>
      <dc:creator>CVE Reports</dc:creator>
      <pubDate>Thu, 16 Apr 2026 11:10:20 +0000</pubDate>
      <link>https://forem.com/cverports/cve-2026-33807-cve-2026-33807-middleware-bypass-via-path-interpretation-conflict-in-3hm1</link>
      <guid>https://forem.com/cverports/cve-2026-33807-cve-2026-33807-middleware-bypass-via-path-interpretation-conflict-in-3hm1</guid>
      <description>&lt;h1&gt;
  
  
  CVE-2026-33807: Middleware Bypass via Path Interpretation Conflict in @fastify/express
&lt;/h1&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Vulnerability ID:&lt;/strong&gt; CVE-2026-33807&lt;br&gt;
&lt;strong&gt;CVSS Score:&lt;/strong&gt; 9.1&lt;br&gt;
&lt;strong&gt;Published:&lt;/strong&gt; 2026-04-16&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;A critical vulnerability exists in @fastify/express versions 4.0.4 and earlier where an interpretation conflict causes middleware paths to be incorrectly calculated during plugin inheritance. This flaw allows unauthenticated remote attackers to bypass security middleware, such as authentication and authorization controls, on specific routes defined within child plugin scopes.&lt;/p&gt;

&lt;h2&gt;
  
  
  TL;DR
&lt;/h2&gt;

&lt;p&gt;@fastify/express &amp;lt;= 4.0.4 incorrectly doubles path prefixes during child plugin registration, bypassing security middleware on encapsulated child routes.&lt;/p&gt;




&lt;h3&gt;
  
  
  ⚠️ Exploit Status: POC
&lt;/h3&gt;

&lt;h2&gt;
  
  
  Technical Details
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;CWE ID&lt;/strong&gt;: CWE-436&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Attack Vector&lt;/strong&gt;: Network&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;CVSS Base Score&lt;/strong&gt;: 9.1 (Critical)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;EPSS Score&lt;/strong&gt;: 0.00052&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Exploit Status&lt;/strong&gt;: Proof-of-Concept Available&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;KEV Status&lt;/strong&gt;: Not Listed&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Affected Systems
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Node.js applications utilizing Fastify with the @fastify/express compatibility plugin&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;@fastify/express&lt;/strong&gt;: &amp;lt;= 4.0.4 (Fixed in: &lt;code&gt;4.0.5&lt;/code&gt;)&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Code Analysis
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Commit: &lt;a href="https://github.com/fastify/fastify-express/commit/c4e49b5244fcfadb38dc08e9b1808c5d759021a2" rel="noopener noreferrer"&gt;c4e49b5&lt;/a&gt;
&lt;/h3&gt;

&lt;p&gt;Fix path doubling via instance.express.use&lt;/p&gt;

&lt;h3&gt;
  
  
  Commit: &lt;a href="https://github.com/fastify/fastify-express/commit/674020f27ddc1d1709e4369cb40158d4c958d42b" rel="noopener noreferrer"&gt;674020f&lt;/a&gt;
&lt;/h3&gt;

&lt;p&gt;Introduce normalizeUrl for request path consistency&lt;/p&gt;

&lt;h2&gt;
  
  
  Exploit Details
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="https://github.com/fastify/fastify-express/security/advisories/GHSA-hrwm-hgmj-7p9c" rel="noopener noreferrer"&gt;Security Advisory&lt;/a&gt;: Proof of concept code demonstrating the middleware bypass in child scopes.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Mitigation Strategies
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Upgrade @fastify/express to version 4.0.5 or later&lt;/li&gt;
&lt;li&gt;Migrate security-critical Express middleware to Fastify-native lifecycle hooks&lt;/li&gt;
&lt;li&gt;Avoid nested prefix overlaps when utilizing legacy Express middleware&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Remediation Steps:&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Audit project dependencies for @fastify/express versions &amp;lt;= 4.0.4.&lt;/li&gt;
&lt;li&gt;Update package.json to require @fastify/express ^4.0.5.&lt;/li&gt;
&lt;li&gt;Run npm install or yarn install to update lockfiles.&lt;/li&gt;
&lt;li&gt;Execute integration tests against protected routes to verify middleware enforcement.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  References
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://github.com/fastify/fastify-express/security/advisories/GHSA-hrwm-hgmj-7p9c" rel="noopener noreferrer"&gt;GHSA-hrwm-hgmj-7p9c&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2026-33807" rel="noopener noreferrer"&gt;CVE-2026-33807 NVD Details&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cna.openjsf.org/security-advisories.html" rel="noopener noreferrer"&gt;OpenJS Foundation Advisory&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;




&lt;p&gt;&lt;em&gt;&lt;a href="https://cvereports.com/reports/CVE-2026-33807" rel="noopener noreferrer"&gt;Read the full report for CVE-2026-33807 on our website&lt;/a&gt; for more details including interactive diagrams and full exploit analysis.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>security</category>
      <category>cve</category>
      <category>cybersecurity</category>
    </item>
    <item>
      <title>CVE-2026-40175: CVE-2026-40175: Header Injection in Axios via Prototype Pollution Gadget</title>
      <dc:creator>CVE Reports</dc:creator>
      <pubDate>Thu, 16 Apr 2026 10:50:20 +0000</pubDate>
      <link>https://forem.com/cverports/cve-2026-40175-cve-2026-40175-header-injection-in-axios-via-prototype-pollution-gadget-3g1h</link>
      <guid>https://forem.com/cverports/cve-2026-40175-cve-2026-40175-header-injection-in-axios-via-prototype-pollution-gadget-3g1h</guid>
      <description>&lt;h1&gt;
  
  
  CVE-2026-40175: Header Injection in Axios via Prototype Pollution Gadget
&lt;/h1&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Vulnerability ID:&lt;/strong&gt; CVE-2026-40175&lt;br&gt;
&lt;strong&gt;CVSS Score:&lt;/strong&gt; 10.0&lt;br&gt;
&lt;strong&gt;Published:&lt;/strong&gt; 2026-04-10&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;CVE-2026-40175 is a critical Header Injection vulnerability in the Axios HTTP client library. It functions as an exploitation gadget in Prototype Pollution attack chains, enabling HTTP request smuggling and splitting. This flaw allows attackers to bypass SSRF mitigations and achieve full cloud compromise via internal service interactions.&lt;/p&gt;

&lt;h2&gt;
  
  
  TL;DR
&lt;/h2&gt;

&lt;p&gt;Axios configuration merging insecurely inherits from Object.prototype and fails to validate internal CRLF characters. Attackers use prototype pollution to inject malicious headers, smuggling secondary HTTP requests to internal endpoints like AWS IMDSv2.&lt;/p&gt;




&lt;h3&gt;
  
  
  ⚠️ Exploit Status: POC
&lt;/h3&gt;

&lt;h2&gt;
  
  
  Technical Details
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;CWE ID&lt;/strong&gt;: CWE-113 (Improper Neutralization of CRLF Sequences)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Attack Vector&lt;/strong&gt;: Network&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;CVSS&lt;/strong&gt;: 10.0 (Critical)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;EPSS&lt;/strong&gt;: 0.40%&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Impact&lt;/strong&gt;: SSRF Bypass / Remote Code Execution / Cloud Compromise&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Exploit Status&lt;/strong&gt;: Proof of Concept Available&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;KEV Status&lt;/strong&gt;: Not Listed&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Affected Systems
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Node.js Applications&lt;/li&gt;
&lt;li&gt;Cloud Infrastructure (AWS EC2 instances via IMDSv2 targeting)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;axios&lt;/strong&gt;: &amp;gt;= 1.0.0, &amp;lt; 1.15.0 (Fixed in: &lt;code&gt;1.15.0&lt;/code&gt;)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;axios&lt;/strong&gt;: &amp;lt; 0.31.0 (Fixed in: &lt;code&gt;0.31.0&lt;/code&gt;)&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Code Analysis
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Commit: &lt;a href="https://github.com/axios/axios/commit/363185461b90b1b78845dc8a99a1f103d9b122a1" rel="noopener noreferrer"&gt;3631854&lt;/a&gt;
&lt;/h3&gt;

&lt;p&gt;Fix for header injection via prototype pollution on 1.x branch&lt;/p&gt;

&lt;h3&gt;
  
  
  Commit: &lt;a href="https://github.com/axios/axios/commit/03cdfc99e8db32a390e12128208b6778492cee9c" rel="noopener noreferrer"&gt;03cdfc9&lt;/a&gt;
&lt;/h3&gt;

&lt;p&gt;Backport header sanitization to legacy 0.x branch&lt;/p&gt;

&lt;h2&gt;
  
  
  Exploit Details
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="https://github.com/0xBlackash/CVE-2026-40175" rel="noopener noreferrer"&gt;GitHub (0xBlackash)&lt;/a&gt;: Proof of Concept repository demonstrating chained attack&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://github.com/kengzzzz/CVE-2026-40175" rel="noopener noreferrer"&gt;GitHub (kengzzzz)&lt;/a&gt;: Exploit methodology and test harness&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Mitigation Strategies
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Upgrade Axios to version 1.15.0 or 0.31.0.&lt;/li&gt;
&lt;li&gt;Identify and patch Prototype Pollution sources in dependency trees.&lt;/li&gt;
&lt;li&gt;Implement application-level runtime protections like Object.freeze(Object.prototype).&lt;/li&gt;
&lt;li&gt;Deploy WAF rules to block unusual structural inputs indicating CRLF injection attempts.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Remediation Steps:&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Audit application dependencies using npm audit or Snyk to locate outdated versions of Axios.&lt;/li&gt;
&lt;li&gt;Update package.json to require Axios &amp;gt;= 1.15.0 (or &amp;gt;= 0.31.0 for 0.x branches).&lt;/li&gt;
&lt;li&gt;Execute dependency updates and verify the lockfile reflects the patched version.&lt;/li&gt;
&lt;li&gt;Run unit and integration tests to ensure strict header validation does not disrupt legitimate application functionality.&lt;/li&gt;
&lt;li&gt;Audit the dependency tree for known prototype pollution vulnerabilities in libraries like lodash, qs, or picomatch.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  References
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://github.com/axios/axios/security/advisories/GHSA-fvcv-3m26-pcqx" rel="noopener noreferrer"&gt;GHSA-fvcv-3m26-pcqx&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/axios/axios/commit/363185461b90b1b78845dc8a99a1f103d9b122a1" rel="noopener noreferrer"&gt;Commit 363185461b90b1b78845dc8a99a1f103d9b122a1&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/axios/axios/commit/03cdfc99e8db32a390e12128208b6778492cee9c" rel="noopener noreferrer"&gt;Commit 03cdfc99e8db32a390e12128208b6778492cee9c&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/0xBlackash/CVE-2026-40175" rel="noopener noreferrer"&gt;0xBlackash PoC&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/kengzzzz/CVE-2026-40175" rel="noopener noreferrer"&gt;kengzzzz PoC&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;




&lt;p&gt;&lt;em&gt;&lt;a href="https://cvereports.com/reports/CVE-2026-40175" rel="noopener noreferrer"&gt;Read the full report for CVE-2026-40175 on our website&lt;/a&gt; for more details including interactive diagrams and full exploit analysis.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>security</category>
      <category>cve</category>
      <category>cybersecurity</category>
    </item>
    <item>
      <title>CVE-2026-33808: CVE-2026-33808: Authentication Bypass via Path Normalization Drift in @fastify/express</title>
      <dc:creator>CVE Reports</dc:creator>
      <pubDate>Thu, 16 Apr 2026 10:40:20 +0000</pubDate>
      <link>https://forem.com/cverports/cve-2026-33808-cve-2026-33808-authentication-bypass-via-path-normalization-drift-in-3abi</link>
      <guid>https://forem.com/cverports/cve-2026-33808-cve-2026-33808-authentication-bypass-via-path-normalization-drift-in-3abi</guid>
      <description>&lt;h1&gt;
  
  
  CVE-2026-33808: Authentication Bypass via Path Normalization Drift in @fastify/express
&lt;/h1&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Vulnerability ID:&lt;/strong&gt; CVE-2026-33808&lt;br&gt;
&lt;strong&gt;CVSS Score:&lt;/strong&gt; 9.1&lt;br&gt;
&lt;strong&gt;Published:&lt;/strong&gt; 2026-04-16&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;An interpretation conflict (CWE-436) in @fastify/express up to version 4.0.4 allows unauthenticated attackers to bypass path-scoped middleware. By exploiting normalization drift between the Fastify router and the Express middleware engine using duplicate slashes or semicolon delimiters, attackers can access protected endpoints.&lt;/p&gt;

&lt;h2&gt;
  
  
  TL;DR
&lt;/h2&gt;

&lt;p&gt;Unauthenticated attackers can bypass Express middleware in @fastify/express &amp;lt;= 4.0.4 by exploiting URL parsing discrepancies between the Fastify router and Express middleware engine using duplicate slashes or semicolons.&lt;/p&gt;




&lt;h3&gt;
  
  
  ⚠️ Exploit Status: POC
&lt;/h3&gt;

&lt;h2&gt;
  
  
  Technical Details
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;CWE ID&lt;/strong&gt;: CWE-436&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Attack Vector&lt;/strong&gt;: Network&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;CVSS v4.0&lt;/strong&gt;: 9.1&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;EPSS Score&lt;/strong&gt;: 0.11%&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Exploit Status&lt;/strong&gt;: PoC Available&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;CISA KEV&lt;/strong&gt;: Not Listed&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Affected Systems
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;@fastify/express plugin in Node.js environments&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;@fastify/express&lt;/strong&gt;: &amp;lt;= 4.0.4 (Fixed in: &lt;code&gt;4.0.5&lt;/code&gt;)&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Code Analysis
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Commit: &lt;a href="https://github.com/fastify/fastify-express/commit/674020f27ddc1d1709e4369cb40158d4c958d42b" rel="noopener noreferrer"&gt;674020f&lt;/a&gt;
&lt;/h3&gt;

&lt;p&gt;Fix path normalization divergence by aligning the middleware execution context with the Fastify instance URL normalization configuration.&lt;/p&gt;

&lt;h2&gt;
  
  
  Mitigation Strategies
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Dependency Update&lt;/li&gt;
&lt;li&gt;Manual Request Interception&lt;/li&gt;
&lt;li&gt;WAF Rule Implementation&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Remediation Steps:&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Identify all projects utilizing @fastify/express via dependency audits (e.g., &lt;code&gt;npm audit&lt;/code&gt; or &lt;code&gt;yarn audit&lt;/code&gt;).&lt;/li&gt;
&lt;li&gt;Update the @fastify/express package to version 4.0.5 or higher.&lt;/li&gt;
&lt;li&gt;Verify the update by running integration tests against protected routes using duplicate slashes and semicolon delimiters.&lt;/li&gt;
&lt;li&gt;If patching is delayed, implement a Fastify &lt;code&gt;onRequest&lt;/code&gt; hook to sanitize &lt;code&gt;req.raw.url&lt;/code&gt; manually.&lt;/li&gt;
&lt;li&gt;Deploy WAF rules to reject HTTP requests containing multiple consecutive slashes or semicolons in the request URI.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  References
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://github.com/fastify/fastify-express/security/advisories/GHSA-6hw5-45gm-fj88" rel="noopener noreferrer"&gt;GitHub Security Advisory GHSA-6hw5-45gm-fj88&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/fastify/fastify-express/commit/674020f27ddc1d1709e4369cb40158d4c958d42b" rel="noopener noreferrer"&gt;Fix Commit 674020f2&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cna.openjsf.org/security-advisories.html" rel="noopener noreferrer"&gt;OpenJS Foundation Advisory&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;




&lt;p&gt;&lt;em&gt;&lt;a href="https://cvereports.com/reports/CVE-2026-33808" rel="noopener noreferrer"&gt;Read the full report for CVE-2026-33808 on our website&lt;/a&gt; for more details including interactive diagrams and full exploit analysis.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>security</category>
      <category>cve</category>
      <category>cybersecurity</category>
    </item>
    <item>
      <title>GHSA-VP22-38M5-R39R: CVE-2026-33139: Arbitrary Code Execution via Sandbox Bypass in PySpector Plugin Validation</title>
      <dc:creator>CVE Reports</dc:creator>
      <pubDate>Thu, 16 Apr 2026 10:10:21 +0000</pubDate>
      <link>https://forem.com/cverports/ghsa-vp22-38m5-r39r-cve-2026-33139-arbitrary-code-execution-via-sandbox-bypass-in-pyspector-4jp4</link>
      <guid>https://forem.com/cverports/ghsa-vp22-38m5-r39r-cve-2026-33139-arbitrary-code-execution-via-sandbox-bypass-in-pyspector-4jp4</guid>
      <description>&lt;h1&gt;
  
  
  CVE-2026-33139: Arbitrary Code Execution via Sandbox Bypass in PySpector Plugin Validation
&lt;/h1&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Vulnerability ID:&lt;/strong&gt; GHSA-VP22-38M5-R39R&lt;br&gt;
&lt;strong&gt;CVSS Score:&lt;/strong&gt; 7.8&lt;br&gt;
&lt;strong&gt;Published:&lt;/strong&gt; 2026-04-16&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;PySpector versions 0.1.6 and earlier contain a critical vulnerability in the plugin security validation system. An incomplete Abstract Syntax Tree (AST) analysis allows attackers to bypass the restrictive sandbox using indirect function calls. Successful exploitation leads to unauthenticated arbitrary code execution on the system running the static analysis scanner.&lt;/p&gt;

&lt;h2&gt;
  
  
  TL;DR
&lt;/h2&gt;

&lt;p&gt;A fail-open logic flaw in PySpector's AST-based security scanner allows malicious plugins to execute arbitrary code. Attackers can bypass the blocked function list by wrapping dangerous API calls in dynamically resolved functions like getattr.&lt;/p&gt;




&lt;h3&gt;
  
  
  ⚠️ Exploit Status: POC
&lt;/h3&gt;

&lt;h2&gt;
  
  
  Technical Details
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;CWE ID&lt;/strong&gt;: CWE-184 / CWE-693&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Attack Vector&lt;/strong&gt;: Local (via malicious plugin)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;CVSS v3.1&lt;/strong&gt;: 7.8&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;EPSS Score&lt;/strong&gt;: 0.00023&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Impact&lt;/strong&gt;: Arbitrary Code Execution&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Exploit Status&lt;/strong&gt;: Proof of Concept Available&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Affected Systems
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;PySpector Plugin Validation Engine&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;PySpector&lt;/strong&gt;: &amp;lt;= 0.1.6 (Fixed in: &lt;code&gt;0.1.7&lt;/code&gt;)&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Code Analysis
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Commit: &lt;a href="https://github.com/ParzivalHack/PySpector/commit/771301e17a5542544f7efa367cb61a0d6ba7f149" rel="noopener noreferrer"&gt;771301e&lt;/a&gt;
&lt;/h3&gt;

&lt;p&gt;Fix AST validation logic to handle ast.Call nodes recursively and expand dangerous calls blocklist.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight diff"&gt;&lt;code&gt;&lt;span class="p"&gt;@@ -143,6 +143,8 @@&lt;/span&gt; def validate_plugin_code(plugin_path: Path) -&amp;gt; tuple[bool, str]:
             "exec",
             "compile",
             "__import__",
&lt;span class="gi"&gt;+            "vars",
+            "getattr", 
&lt;/span&gt;             "os.system",
             "os.popen",
&lt;span class="p"&gt;@@ -184,6 +186,10 @@&lt;/span&gt; def resolve_name(node: ast.AST) -&amp;gt; Optional[str]:
                     attrs.append(base)
                     attrs.reverse()
                     return ".".join(attrs)
&lt;span class="gi"&gt;+            if isinstance(node, ast.Call):
+                inner = resolve_name(node.func)
+                if inner:
+                    return inner
&lt;/span&gt;             return None
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h2&gt;
  
  
  Exploit Details
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="https://medium.com/securitycertcommunity/cve-2026-33139-how-i-found-my-first-cve-bypassing-pyspectors-plugin-security-sandbox-ce5008e62fe2" rel="noopener noreferrer"&gt;Security Researcher Write-up&lt;/a&gt;: Proof of concept demonstrating the use of getattr and vars to execute os.system commands, completely bypassing the AST plugin scanner.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Mitigation Strategies
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Upgrade PySpector to version 0.1.7 or later.&lt;/li&gt;
&lt;li&gt;Implement a manual source code review process for all custom plugins before using the --trust flag.&lt;/li&gt;
&lt;li&gt;Execute SAST scanning pipelines in isolated, ephemeral sandbox environments to limit the blast radius of arbitrary code execution.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Remediation Steps:&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Identify all environments and CI/CD pipelines utilizing PySpector.&lt;/li&gt;
&lt;li&gt;Update the pyspector dependency to &amp;gt;=0.1.7 in requirements.txt or equivalent package managers.&lt;/li&gt;
&lt;li&gt;Audit existing installed plugins for suspicious usage of getattr, vars, or direct os/subprocess calls.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  References
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://github.com/advisories/GHSA-vp22-38m5-r39r" rel="noopener noreferrer"&gt;GitHub Global Advisory GHSA-vp22-38m5-r39r&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/ParzivalHack/PySpector/security/advisories/GHSA-v3xv-8vc3-h2m6" rel="noopener noreferrer"&gt;Vendor Advisory GHSA-v3xv-8vc3-h2m6&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://medium.com/securitycertcommunity/cve-2026-33139-how-i-found-my-first-cve-bypassing-pyspectors-plugin-security-sandbox-ce5008e62fe2" rel="noopener noreferrer"&gt;Technical Exploit Analysis by Shinigami81&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2026-33139" rel="noopener noreferrer"&gt;NVD Vulnerability Record&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/ParzivalHack/PySpector" rel="noopener noreferrer"&gt;Official PySpector Repository&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;




&lt;p&gt;&lt;em&gt;&lt;a href="https://cvereports.com/reports/GHSA-VP22-38M5-R39R" rel="noopener noreferrer"&gt;Read the full report for GHSA-VP22-38M5-R39R on our website&lt;/a&gt; for more details including interactive diagrams and full exploit analysis.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>security</category>
      <category>cve</category>
      <category>cybersecurity</category>
    </item>
    <item>
      <title>CVE-2026-33825: CVE-2026-33825: Local Privilege Escalation via TOCTOU in Microsoft Defender Signature Updates (BlueHammer)</title>
      <dc:creator>CVE Reports</dc:creator>
      <pubDate>Thu, 16 Apr 2026 10:10:20 +0000</pubDate>
      <link>https://forem.com/cverports/cve-2026-33825-cve-2026-33825-local-privilege-escalation-via-toctou-in-microsoft-defender-82o</link>
      <guid>https://forem.com/cverports/cve-2026-33825-cve-2026-33825-local-privilege-escalation-via-toctou-in-microsoft-defender-82o</guid>
      <description>&lt;h1&gt;
  
  
  CVE-2026-33825: Local Privilege Escalation via TOCTOU in Microsoft Defender Signature Updates (BlueHammer)
&lt;/h1&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Vulnerability ID:&lt;/strong&gt; CVE-2026-33825&lt;br&gt;
&lt;strong&gt;CVSS Score:&lt;/strong&gt; 7.8&lt;br&gt;
&lt;strong&gt;Published:&lt;/strong&gt; 2026-04-14&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;CVE-2026-33825, publicly referred to as BlueHammer, is a high-severity local privilege escalation vulnerability within the Microsoft Defender Antimalware Platform. The flaw stems from insufficient access control granularity and a Time-of-Check to Time-of-Use (TOCTOU) race condition during signature updates, enabling a standard user to obtain NT AUTHORITY\SYSTEM privileges.&lt;/p&gt;

&lt;h2&gt;
  
  
  TL;DR
&lt;/h2&gt;

&lt;p&gt;A TOCTOU race condition in Microsoft Defender's signature update process allows local attackers to exploit filesystem junctions and RPC calls to elevate privileges to SYSTEM. The exploit, known as BlueHammer, facilitates arbitrary file operations and credential dumping.&lt;/p&gt;




&lt;h3&gt;
  
  
  ⚠️ Exploit Status: WEAPONIZED
&lt;/h3&gt;

&lt;h2&gt;
  
  
  Technical Details
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;CWE ID&lt;/strong&gt;: CWE-1220 (Insufficient Granularity of Access Control)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Attack Vector&lt;/strong&gt;: Local (AV:L)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;CVSS v3.1&lt;/strong&gt;: 7.8 (High)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Impact&lt;/strong&gt;: Local Privilege Escalation to SYSTEM&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Exploit Status&lt;/strong&gt;: Weaponized PoC Available&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Affected Component&lt;/strong&gt;: Microsoft Defender (MpSigStub.exe)&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Affected Systems
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Microsoft Defender Antimalware Platform&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Microsoft Defender Antimalware Platform&lt;/strong&gt;: 4.0.0.0 - &amp;lt; 4.18.26030.3011 (Fixed in: &lt;code&gt;4.18.26030.3011&lt;/code&gt;)&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Exploit Details
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="https://github.com/Nightmare-Eclipse/BlueHammer" rel="noopener noreferrer"&gt;GitHub&lt;/a&gt;: Original BlueHammer PoC by Nightmare-Eclipse&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://github.com/atroubledsnake/SNEK_Blue-War-Hammer" rel="noopener noreferrer"&gt;GitHub&lt;/a&gt;: Alternative PoC documentation and refined code by atroubledsnake&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Mitigation Strategies
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Update Microsoft Defender Antimalware Platform to version 4.18.26030.3011 or later.&lt;/li&gt;
&lt;li&gt;Restrict user permissions for creating Object Manager symbolic links via Security Policy.&lt;/li&gt;
&lt;li&gt;Monitor and routinely clear unauthorized filesystem junctions in user temporary directories.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Remediation Steps:&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Verify the current Microsoft Defender Engine version using PowerShell.&lt;/li&gt;
&lt;li&gt;Deploy the April 2026 Update (Patch Tuesday) via Windows Update or WSUS.&lt;/li&gt;
&lt;li&gt;Validate the installation by checking the Engine Version property.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  References
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33825" rel="noopener noreferrer"&gt;https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33825&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-april-2026-patch-tuesday-fixes-167-flaws-2-zero-days/" rel="noopener noreferrer"&gt;https://www.bleepingcomputer.com/news/microsoft/microsoft-april-2026-patch-tuesday-fixes-167-flaws-2-zero-days/&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.automox.com/blog/bluehammer-what-you-need-to-know-and-how-to-respond" rel="noopener noreferrer"&gt;https://www.automox.com/blog/bluehammer-what-you-need-to-know-and-how-to-respond&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/Nightmare-Eclipse/BlueHammer" rel="noopener noreferrer"&gt;https://github.com/Nightmare-Eclipse/BlueHammer&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;




&lt;p&gt;&lt;em&gt;&lt;a href="https://cvereports.com/reports/CVE-2026-33825" rel="noopener noreferrer"&gt;Read the full report for CVE-2026-33825 on our website&lt;/a&gt; for more details including interactive diagrams and full exploit analysis.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>security</category>
      <category>cve</category>
      <category>cybersecurity</category>
    </item>
    <item>
      <title>GHSA-RR7J-V2Q5-CHGV: GHSA-RR7J-V2Q5-CHGV: Streaming Token Redaction Bypass in LangSmith SDK</title>
      <dc:creator>CVE Reports</dc:creator>
      <pubDate>Thu, 16 Apr 2026 08:40:20 +0000</pubDate>
      <link>https://forem.com/cverports/ghsa-rr7j-v2q5-chgv-ghsa-rr7j-v2q5-chgv-streaming-token-redaction-bypass-in-langsmith-sdk-3oae</link>
      <guid>https://forem.com/cverports/ghsa-rr7j-v2q5-chgv-ghsa-rr7j-v2q5-chgv-streaming-token-redaction-bypass-in-langsmith-sdk-3oae</guid>
      <description>&lt;h1&gt;
  
  
  GHSA-RR7J-V2Q5-CHGV: Streaming Token Redaction Bypass in LangSmith SDK
&lt;/h1&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Vulnerability ID:&lt;/strong&gt; GHSA-RR7J-V2Q5-CHGV&lt;br&gt;
&lt;strong&gt;CVSS Score:&lt;/strong&gt; 5.3&lt;br&gt;
&lt;strong&gt;Published:&lt;/strong&gt; 2026-04-16&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;The LangSmith SDK for both Python and JavaScript/TypeScript fails to apply output redaction controls to streaming token events. This oversight allows sensitive Large Language Model (LLM) outputs to bypass privacy configurations and transmit raw token data to the LangSmith backend, resulting in unintended data exposure.&lt;/p&gt;

&lt;h2&gt;
  
  
  TL;DR
&lt;/h2&gt;

&lt;p&gt;A flaw in the LangSmith SDK's telemetry processing pipeline causes streaming token events to bypass &lt;code&gt;hide_outputs&lt;/code&gt; redaction controls. Applications processing sensitive data via LLM streams transmit unredacted data to LangSmith servers despite active privacy settings.&lt;/p&gt;




&lt;h2&gt;
  
  
  Technical Details
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Vulnerability ID&lt;/strong&gt;: GHSA-RR7J-V2Q5-CHGV&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;CVSS Score&lt;/strong&gt;: 5.3 (Medium)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Attack Vector&lt;/strong&gt;: Network&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;CWE-ID&lt;/strong&gt;: CWE-212&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Exploit Status&lt;/strong&gt;: None (No Public PoC)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;KEV Status&lt;/strong&gt;: Not Listed&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Affected Systems
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;LangSmith SDK for Python&lt;/li&gt;
&lt;li&gt;LangSmith SDK for JavaScript/TypeScript&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;langsmith (npm)&lt;/strong&gt;: &amp;lt; 0.5.19 (Fixed in: &lt;code&gt;0.5.19&lt;/code&gt;)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;langsmith (PyPI)&lt;/strong&gt;: &amp;lt; 0.7.31 (Fixed in: &lt;code&gt;0.7.31&lt;/code&gt;)&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Mitigation Strategies
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Upgrade the LangSmith Python SDK via PyPI to a patched release.&lt;/li&gt;
&lt;li&gt;Upgrade the LangSmith JavaScript/TypeScript SDK via npm to a patched release.&lt;/li&gt;
&lt;li&gt;Disable streaming features on specific LLM chains that process high-sensitivity data if patching is delayed.&lt;/li&gt;
&lt;li&gt;Audit existing LangSmith project logs and event traces for historical data leaks.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Remediation Steps:&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Identify the current version of the LangSmith SDK using &lt;code&gt;pip show langsmith&lt;/code&gt; or &lt;code&gt;npm list langsmith&lt;/code&gt;.&lt;/li&gt;
&lt;li&gt;Update the &lt;code&gt;package.json&lt;/code&gt; or &lt;code&gt;requirements.txt&lt;/code&gt; to specify &lt;code&gt;langsmith &amp;gt;= 0.5.19&lt;/code&gt; (JS) or &lt;code&gt;langsmith &amp;gt;= 0.7.31&lt;/code&gt; (Python).&lt;/li&gt;
&lt;li&gt;Execute &lt;code&gt;npm install&lt;/code&gt; or &lt;code&gt;pip install --upgrade langsmith&lt;/code&gt; to apply the update.&lt;/li&gt;
&lt;li&gt;Restart the application services to ensure the newly loaded SDK library handles subsequent traces.&lt;/li&gt;
&lt;li&gt;Perform a test run with streaming enabled and verify the LangSmith events tab reflects redacted token entries.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  References
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://github.com/advisories/GHSA-rr7j-v2q5-chgv" rel="noopener noreferrer"&gt;GitHub Advisory: GHSA-rr7j-v2q5-chgv&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://osv.dev/vulnerability/GHSA-rr7j-v2q5-chgv" rel="noopener noreferrer"&gt;OSV Record: GHSA-rr7j-v2q5-chgv&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/langchain-ai/langsmith-sdk" rel="noopener noreferrer"&gt;LangSmith SDK Repository&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/langchain-ai/langsmith-sdk/security/advisories/GHSA-rr7j-v2q5-chgv" rel="noopener noreferrer"&gt;JavaScript SDK Security Advisory&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;




&lt;p&gt;&lt;em&gt;&lt;a href="https://cvereports.com/reports/GHSA-RR7J-V2Q5-CHGV" rel="noopener noreferrer"&gt;Read the full report for GHSA-RR7J-V2Q5-CHGV on our website&lt;/a&gt; for more details including interactive diagrams and full exploit analysis.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>security</category>
      <category>cve</category>
      <category>cybersecurity</category>
      <category>ghsa</category>
    </item>
    <item>
      <title>CVE-2026-20147: CVE-2026-20147: Authenticated Remote Code Execution in Cisco Identity Services Engine (ISE)</title>
      <dc:creator>CVE Reports</dc:creator>
      <pubDate>Thu, 16 Apr 2026 08:30:52 +0000</pubDate>
      <link>https://forem.com/cverports/cve-2026-20147-cve-2026-20147-authenticated-remote-code-execution-in-cisco-identity-services-1g5h</link>
      <guid>https://forem.com/cverports/cve-2026-20147-cve-2026-20147-authenticated-remote-code-execution-in-cisco-identity-services-1g5h</guid>
      <description>&lt;h1&gt;
  
  
  CVE-2026-20147: Authenticated Remote Code Execution in Cisco Identity Services Engine (ISE)
&lt;/h1&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Vulnerability ID:&lt;/strong&gt; CVE-2026-20147&lt;br&gt;
&lt;strong&gt;CVSS Score:&lt;/strong&gt; 9.9&lt;br&gt;
&lt;strong&gt;Published:&lt;/strong&gt; 2026-04-15&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;CVE-2026-20147 is a critical remote code execution vulnerability (CVSS 9.9) affecting Cisco Identity Services Engine (ISE) and ISE Passive Identity Connector (ISE-PIC). The flaw stems from improper neutralization of user-supplied input within the web management interface. Authenticated administrative users can exploit this to execute arbitrary commands, escalate to root privileges, and potentially cause a complete denial of service.&lt;/p&gt;

&lt;h2&gt;
  
  
  TL;DR
&lt;/h2&gt;

&lt;p&gt;Authenticated administrative users can execute arbitrary commands and escalate to root in Cisco ISE via crafted HTTP requests due to insufficient input validation. Single-node deployments risk complete denial of service.&lt;/p&gt;




&lt;h2&gt;
  
  
  Technical Details
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;CWE ID&lt;/strong&gt;: CWE-77&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Attack Vector&lt;/strong&gt;: Network&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Authentication Required&lt;/strong&gt;: Yes (Administrative credentials)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;CVSS v3.1 Score&lt;/strong&gt;: 9.9 (Critical)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Exploit Status&lt;/strong&gt;: Unexploited / No public PoC&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;CISA KEV&lt;/strong&gt;: Not Listed&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Impact&lt;/strong&gt;: Remote Code Execution (Root) / DoS&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Vendor Bug ID&lt;/strong&gt;: CSCws52738&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Affected Systems
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Cisco Identity Services Engine (ISE)&lt;/li&gt;
&lt;li&gt;Cisco ISE Passive Identity Connector (ISE-PIC)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Cisco Identity Services Engine (ISE)&lt;/strong&gt;: 3.1.0 &amp;lt;= 3.1.0 p10 (Fixed in: &lt;code&gt;3.1.0 Patch 11&lt;/code&gt;)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Cisco Identity Services Engine (ISE)&lt;/strong&gt;: 3.2.0 &amp;lt;= 3.2.0 p9 (Fixed in: &lt;code&gt;3.2.0 Patch 10&lt;/code&gt;)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Cisco Identity Services Engine (ISE)&lt;/strong&gt;: 3.3.0 &amp;lt;= 3.3 Patch 9 (Fixed in: &lt;code&gt;3.3 Patch 10&lt;/code&gt;)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Cisco Identity Services Engine (ISE)&lt;/strong&gt;: 3.4.0 &amp;lt;= 3.4 Patch 5 (Fixed in: &lt;code&gt;3.4 Patch 6&lt;/code&gt;)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Cisco Identity Services Engine (ISE)&lt;/strong&gt;: 3.5.0 &amp;lt;= 3.5 Patch 2 (Fixed in: &lt;code&gt;3.5 Patch 3&lt;/code&gt;)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Cisco ISE Passive Identity Connector (ISE-PIC)&lt;/strong&gt;: 3.1.0&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Cisco ISE Passive Identity Connector (ISE-PIC)&lt;/strong&gt;: 3.2.0&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Cisco ISE Passive Identity Connector (ISE-PIC)&lt;/strong&gt;: 3.3.0&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Cisco ISE Passive Identity Connector (ISE-PIC)&lt;/strong&gt;: 3.4.0&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Mitigation Strategies
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Upgrade Cisco ISE and ISE-PIC to the latest patched versions provided by the vendor.&lt;/li&gt;
&lt;li&gt;Restrict network access to the ISE web-based management interface to trusted administrative subnets.&lt;/li&gt;
&lt;li&gt;Audit and enforce the principle of least privilege for all ISE administrative accounts.&lt;/li&gt;
&lt;li&gt;Monitor administrative logs for anomalous configuration changes or system diagnostic executions.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Remediation Steps:&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Identify the current version of Cisco ISE or ISE-PIC running in the environment.&lt;/li&gt;
&lt;li&gt;Download the appropriate patch file from the official Cisco Software Central portal.&lt;/li&gt;
&lt;li&gt;Backup the current ISE configuration and system state.&lt;/li&gt;
&lt;li&gt;Apply the patch during a scheduled maintenance window.&lt;/li&gt;
&lt;li&gt;Verify successful installation and test authentication flows to ensure stability.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  References
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2026-20147" rel="noopener noreferrer"&gt;NVD Record for CVE-2026-20147&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-rce-traversal-8bYndVrZ" rel="noopener noreferrer"&gt;Cisco Security Advisory&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;




&lt;p&gt;&lt;em&gt;&lt;a href="https://cvereports.com/reports/CVE-2026-20147" rel="noopener noreferrer"&gt;Read the full report for CVE-2026-20147 on our website&lt;/a&gt; for more details including interactive diagrams and full exploit analysis.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>security</category>
      <category>cve</category>
      <category>cybersecurity</category>
    </item>
    <item>
      <title>CVE-2026-32176: CVE-2026-32176: Elevation of Privilege via SQL Injection in Microsoft SQL Server</title>
      <dc:creator>CVE Reports</dc:creator>
      <pubDate>Thu, 16 Apr 2026 08:30:51 +0000</pubDate>
      <link>https://forem.com/cverports/cve-2026-32176-cve-2026-32176-elevation-of-privilege-via-sql-injection-in-microsoft-sql-server-48o1</link>
      <guid>https://forem.com/cverports/cve-2026-32176-cve-2026-32176-elevation-of-privilege-via-sql-injection-in-microsoft-sql-server-48o1</guid>
      <description>&lt;h1&gt;
  
  
  CVE-2026-32176: Elevation of Privilege via SQL Injection in Microsoft SQL Server
&lt;/h1&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Vulnerability ID:&lt;/strong&gt; CVE-2026-32176&lt;br&gt;
&lt;strong&gt;CVSS Score:&lt;/strong&gt; 6.7&lt;br&gt;
&lt;strong&gt;Published:&lt;/strong&gt; 2026-04-14&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;CVE-2026-32176 is an elevation of privilege vulnerability in the Microsoft SQL Server engine caused by improper neutralization of special elements in dynamic SQL commands. An attacker with existing high-level privileges can exploit this flaw to execute arbitrary SQL commands within an elevated context, leading to full instance takeover.&lt;/p&gt;

&lt;h2&gt;
  
  
  TL;DR
&lt;/h2&gt;

&lt;p&gt;An authenticated, high-privileged database user can exploit an internal SQL injection flaw in SQL Server system procedures to escalate their permissions to the sysadmin level, compromising the entire database instance.&lt;/p&gt;




&lt;h2&gt;
  
  
  Technical Details
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;CWE ID&lt;/strong&gt;: CWE-89 (Improper Neutralization of Special Elements used in an SQL Command)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Attack Vector&lt;/strong&gt;: Local (AV:L) / Authenticated Database Connection&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Privileges Required&lt;/strong&gt;: High (e.g., db_owner)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;CVSS v3.1 Score&lt;/strong&gt;: 6.7 (Medium)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Impact&lt;/strong&gt;: Local Elevation of Privilege to sysadmin&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;EPSS Score&lt;/strong&gt;: 0.00072 (21.99th percentile)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Exploit Status&lt;/strong&gt;: None / Private&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;CISA KEV&lt;/strong&gt;: Not Listed&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Affected Systems
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Microsoft SQL Server 2025&lt;/li&gt;
&lt;li&gt;Microsoft SQL Server 2022&lt;/li&gt;
&lt;li&gt;Microsoft SQL Server 2019&lt;/li&gt;
&lt;li&gt;Microsoft SQL Server 2017&lt;/li&gt;
&lt;li&gt;Microsoft SQL Server 2016&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;SQL Server 2025&lt;/strong&gt;: &amp;lt; 17.0.1110.1 (GDR) (Fixed in: &lt;code&gt;17.0.1110.1&lt;/code&gt;)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;SQL Server 2022&lt;/strong&gt;: &amp;lt; 16.0.1175.1 (GDR) (Fixed in: &lt;code&gt;16.0.1175.1&lt;/code&gt;)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;SQL Server 2019&lt;/strong&gt;: &amp;lt; 15.0.2165.1 (GDR) (Fixed in: &lt;code&gt;15.0.2165.1&lt;/code&gt;)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;SQL Server 2017&lt;/strong&gt;: &amp;lt; 14.0.2105.1 (GDR) (Fixed in: &lt;code&gt;14.0.2105.1&lt;/code&gt;)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;SQL Server 2016&lt;/strong&gt;: &amp;lt; 13.0.6485.1 (GDR) (Fixed in: &lt;code&gt;13.0.6485.1&lt;/code&gt;)&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Mitigation Strategies
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Apply the official Microsoft GDR or CU updates provided in the April 2026 Patch Tuesday release.&lt;/li&gt;
&lt;li&gt;Enforce the Principle of Least Privilege by minimizing the number of users in the db_owner role.&lt;/li&gt;
&lt;li&gt;Disable the PolyBase feature using sp_configure if it is not actively utilized in the environment.&lt;/li&gt;
&lt;li&gt;Enable and monitor SQL Server Audit logs for anomalous executions of system stored procedures.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Remediation Steps:&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Identify the exact version and edition of the target SQL Server instances.&lt;/li&gt;
&lt;li&gt;Download the appropriate KB update (e.g., KB5084814 for SQL Server 2025) from the Microsoft Update Catalog.&lt;/li&gt;
&lt;li&gt;Schedule a maintenance window, as the SQL Server service will require a restart during the patching process.&lt;/li&gt;
&lt;li&gt;Apply the patch and verify the build number using 'SELECT @&lt;a class="mentioned-user" href="https://dev.to/version"&gt;@version&lt;/a&gt;' to ensure the update was successful.&lt;/li&gt;
&lt;li&gt;Review user role assignments across all user databases to ensure non-administrative users do not possess unintended high privileges.&lt;/li&gt;
&lt;/ol&gt;




&lt;p&gt;&lt;em&gt;&lt;a href="https://cvereports.com/reports/CVE-2026-32176" rel="noopener noreferrer"&gt;Read the full report for CVE-2026-32176 on our website&lt;/a&gt; for more details including interactive diagrams and full exploit analysis.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>security</category>
      <category>cve</category>
      <category>cybersecurity</category>
    </item>
  </channel>
</rss>
