<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>Forem: CVE Reports</title>
    <description>The latest articles on Forem by CVE Reports (@cverports).</description>
    <link>https://forem.com/cverports</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1959489%2F6e9f36b9-96a5-441a-a9b5-6993444f71d8.png</url>
      <title>Forem: CVE Reports</title>
      <link>https://forem.com/cverports</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://forem.com/feed/cverports"/>
    <language>en</language>
    <item>
      <title>CVE-2026-39804: CVE-2026-39804: Remote Code Execution and DoS via Bandit WebSocket Permessage-Deflate Resource Exhaustion</title>
      <dc:creator>CVE Reports</dc:creator>
      <pubDate>Thu, 07 May 2026 06:10:30 +0000</pubDate>
      <link>https://forem.com/cverports/cve-2026-39804-cve-2026-39804-remote-code-execution-and-dos-via-bandit-websocket-1aod</link>
      <guid>https://forem.com/cverports/cve-2026-39804-cve-2026-39804-remote-code-execution-and-dos-via-bandit-websocket-1aod</guid>
      <description>&lt;h1&gt;
  
  
  CVE-2026-39804: Remote Code Execution and DoS via Bandit WebSocket Permessage-Deflate Resource Exhaustion
&lt;/h1&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Vulnerability ID:&lt;/strong&gt; CVE-2026-39804&lt;br&gt;
&lt;strong&gt;CVSS Score:&lt;/strong&gt; 8.2&lt;br&gt;
&lt;strong&gt;Published:&lt;/strong&gt; 2026-05-07&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;CVE-2026-39804 is a critical resource exhaustion vulnerability (CWE-770) affecting the Bandit Elixir HTTP server. By exploiting unbounded DEFLATE decompression in WebSocket frames, an unauthenticated attacker can crash the Erlang VM (BEAM) via a highly compressed decompression bomb.&lt;/p&gt;

&lt;h2&gt;
  
  
  TL;DR
&lt;/h2&gt;

&lt;p&gt;Unauthenticated remote attackers can trigger a Denial of Service (OOM crash) in the Bandit web server by sending a highly compressed WebSocket frame, exhausting BEAM memory if &lt;code&gt;permessage-deflate&lt;/code&gt; is enabled.&lt;/p&gt;




&lt;h3&gt;
  
  
  ⚠️ Exploit Status: POC
&lt;/h3&gt;

&lt;h2&gt;
  
  
  Technical Details
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;CWE ID&lt;/strong&gt;: CWE-770&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Attack Vector&lt;/strong&gt;: Network (Remote)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;CVSS v4.0 Score&lt;/strong&gt;: 8.2 (High)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;EPSS Score&lt;/strong&gt;: 0.0004 (11.83%)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Exploit Status&lt;/strong&gt;: Proof-of-Concept Available&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Impact&lt;/strong&gt;: Denial of Service (Node Crash)&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Affected Systems
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Bandit HTTP Server (mtrudel/bandit)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;bandit&lt;/strong&gt;: &amp;gt;= 0.5.9, &amp;lt; 1.11.0 (Fixed in: &lt;code&gt;1.11.0&lt;/code&gt;)&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Code Analysis
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Commit: &lt;a href="https://github.com/mtrudel/bandit/commit/8156921a51e684a951221da7bc30a70a022f722e" rel="noopener noreferrer"&gt;8156921&lt;/a&gt;
&lt;/h3&gt;

&lt;p&gt;Fix resource exhaustion in permessage-deflate via chunked decompression and ratio limits&lt;/p&gt;

&lt;h2&gt;
  
  
  Exploit Details
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="https://github.com/mtrudel/bandit/commit/8156921a51e684a951221da7bc30a70a022f722e" rel="noopener noreferrer"&gt;Test Suite PoC&lt;/a&gt;: The protocol_test.exs suite in the fix commit demonstrates the decompression bomb construction.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Mitigation Strategies
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Upgrade Bandit server to version 1.11.0 or newer.&lt;/li&gt;
&lt;li&gt;Disable &lt;code&gt;permessage-deflate&lt;/code&gt; compression globally by setting &lt;code&gt;compress: false&lt;/code&gt; in the WebSocket adapter configuration.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Remediation Steps:&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Update the &lt;code&gt;mix.exs&lt;/code&gt; dependencies to require &lt;code&gt;{:bandit, "&amp;gt;= 1.11.0"}&lt;/code&gt;.&lt;/li&gt;
&lt;li&gt;Run &lt;code&gt;mix deps.get&lt;/code&gt; and &lt;code&gt;mix deps.compile&lt;/code&gt; to fetch and build the patched version.&lt;/li&gt;
&lt;li&gt;If patching is impossible, review calls to &lt;code&gt;WebSockAdapter.upgrade/4&lt;/code&gt; and remove any &lt;code&gt;compress: true&lt;/code&gt; options.&lt;/li&gt;
&lt;li&gt;Deploy the updated application and restart the BEAM node.&lt;/li&gt;
&lt;li&gt;Verify the remediation by monitoring application memory metrics when under WebSocket load.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  References
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://github.com/mtrudel/bandit/security/advisories/GHSA-frh3-6pv6-rc8j" rel="noopener noreferrer"&gt;GHSA-frh3-6pv6-rc8j Advisory&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cna.erlef.org/cves/CVE-2026-39804.html" rel="noopener noreferrer"&gt;CNA Advisory Entry&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://osv.dev/vulnerability/EEF-CVE-2026-39804" rel="noopener noreferrer"&gt;OSV Entry&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;




&lt;p&gt;&lt;em&gt;&lt;a href="https://cvereports.com/reports/CVE-2026-39804" rel="noopener noreferrer"&gt;Read the full report for CVE-2026-39804 on our website&lt;/a&gt; for more details including interactive diagrams and full exploit analysis.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>security</category>
      <category>cve</category>
      <category>cybersecurity</category>
    </item>
    <item>
      <title>CVE-2026-42786: CVE-2026-42786: Unbounded WebSocket Fragmented Message Reassembly Denial of Service in Bandit</title>
      <dc:creator>CVE Reports</dc:creator>
      <pubDate>Thu, 07 May 2026 05:40:29 +0000</pubDate>
      <link>https://forem.com/cverports/cve-2026-42786-cve-2026-42786-unbounded-websocket-fragmented-message-reassembly-denial-of-service-4nhn</link>
      <guid>https://forem.com/cverports/cve-2026-42786-cve-2026-42786-unbounded-websocket-fragmented-message-reassembly-denial-of-service-4nhn</guid>
      <description>&lt;h1&gt;
  
  
  CVE-2026-42786: Unbounded WebSocket Fragmented Message Reassembly Denial of Service in Bandit
&lt;/h1&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Vulnerability ID:&lt;/strong&gt; CVE-2026-42786&lt;br&gt;
&lt;strong&gt;CVSS Score:&lt;/strong&gt; 8.7&lt;br&gt;
&lt;strong&gt;Published:&lt;/strong&gt; 2026-05-07&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;An unauthenticated remote denial of service vulnerability exists in the Bandit HTTP server due to unbounded resource allocation during WebSocket fragment reassembly. Attackers can trigger complete memory exhaustion by streaming continuous WebSocket frames without the finalization bit, causing the Erlang virtual machine to crash.&lt;/p&gt;

&lt;h2&gt;
  
  
  TL;DR
&lt;/h2&gt;

&lt;p&gt;Bandit &amp;lt; 1.11.0 fails to limit cumulative size of fragmented WebSocket messages, allowing unauthenticated attackers to cause an Out-of-Memory (OOM) denial of service by sending infinite continuation frames.&lt;/p&gt;




&lt;h2&gt;
  
  
  Technical Details
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;CWE ID&lt;/strong&gt;: CWE-770&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Attack Vector&lt;/strong&gt;: Network (Unauthenticated)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;CVSS 4.0 Score&lt;/strong&gt;: 8.7 (High)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;EPSS Percentile&lt;/strong&gt;: 17.28%&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Primary Impact&lt;/strong&gt;: Denial of Service (OOM)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Exploit Status&lt;/strong&gt;: None (Theoretical PoC)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;CISA KEV&lt;/strong&gt;: No&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Affected Systems
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Bandit HTTP Server (0.5.0 up to 1.11.0)&lt;/li&gt;
&lt;li&gt;Phoenix Web Applications using vulnerable Bandit instances as the web server adapter&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;bandit&lt;/strong&gt;: &amp;gt;= 0.5.0, &amp;lt; 1.11.0 (Fixed in: &lt;code&gt;1.11.0&lt;/code&gt;)&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Code Analysis
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Commit: &lt;a href="https://github.com/mtrudel/bandit/commit/21612c7c7b1ce43eccd36d3af3a2299d23513667" rel="noopener noreferrer"&gt;21612c7&lt;/a&gt;
&lt;/h3&gt;

&lt;p&gt;Fix unbounded websocket fragmented message reassembly&lt;/p&gt;

&lt;h2&gt;
  
  
  Mitigation Strategies
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Upgrade bandit package to version 1.11.0 or higher&lt;/li&gt;
&lt;li&gt;Configure web application firewall (WAF) to inspect and limit abnormal WebSocket message continuation patterns&lt;/li&gt;
&lt;li&gt;Implement connection rate limiting and maximum connection duration timeouts&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Remediation Steps:&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Update &lt;code&gt;mix.exs&lt;/code&gt; to require &lt;code&gt;bandit&lt;/code&gt; version &lt;code&gt;~&amp;gt; 1.11&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;Run &lt;code&gt;mix deps.get&lt;/code&gt; and &lt;code&gt;mix deps.compile&lt;/code&gt; to fetch and build the updated library&lt;/li&gt;
&lt;li&gt;If the application legitimately handles WebSocket messages larger than 8MB, configure &lt;code&gt;max_fragmented_message_size&lt;/code&gt; in the Bandit endpoint configuration&lt;/li&gt;
&lt;li&gt;Deploy the application and monitor WebSocket connection metrics for unexpected termination errors (Code 1009)&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  References
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2026-42786" rel="noopener noreferrer"&gt;NVD - CVE-2026-42786&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/mtrudel/bandit/security/advisories/GHSA-pf94-94m9-536p" rel="noopener noreferrer"&gt;GitHub Advisory GHSA-pf94-94m9-536p&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cna.erlef.org/cves/CVE-2026-42786.html" rel="noopener noreferrer"&gt;EEF CVE-2026-42786&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://osv.dev/vulnerability/EEF-CVE-2026-42786" rel="noopener noreferrer"&gt;OSV EEF-CVE-2026-42786&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;




&lt;p&gt;&lt;em&gt;&lt;a href="https://cvereports.com/reports/CVE-2026-42786" rel="noopener noreferrer"&gt;Read the full report for CVE-2026-42786 on our website&lt;/a&gt; for more details including interactive diagrams and full exploit analysis.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>security</category>
      <category>cve</category>
      <category>cybersecurity</category>
    </item>
    <item>
      <title>CVE-2026-20188: CVE-2026-20188: Uncontrolled Resource Consumption in Cisco CNC and NSO</title>
      <dc:creator>CVE Reports</dc:creator>
      <pubDate>Thu, 07 May 2026 05:20:29 +0000</pubDate>
      <link>https://forem.com/cverports/cve-2026-20188-cve-2026-20188-uncontrolled-resource-consumption-in-cisco-cnc-and-nso-5h2j</link>
      <guid>https://forem.com/cverports/cve-2026-20188-cve-2026-20188-uncontrolled-resource-consumption-in-cisco-cnc-and-nso-5h2j</guid>
      <description>&lt;h1&gt;
  
  
  CVE-2026-20188: Uncontrolled Resource Consumption in Cisco CNC and NSO
&lt;/h1&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Vulnerability ID:&lt;/strong&gt; CVE-2026-20188&lt;br&gt;
&lt;strong&gt;CVSS Score:&lt;/strong&gt; 7.5&lt;br&gt;
&lt;strong&gt;Published:&lt;/strong&gt; 2026-05-06&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Cisco Crosswork Network Controller (CNC) and Cisco Network Services Orchestrator (NSO) contain a high-severity denial-of-service vulnerability due to inadequate connection rate limiting. Exploitation results in resource exhaustion requiring a manual reboot for recovery.&lt;/p&gt;

&lt;h2&gt;
  
  
  TL;DR
&lt;/h2&gt;

&lt;p&gt;CVE-2026-20188 is an unauthenticated, remote denial-of-service vulnerability (CVSS 7.5) in Cisco CNC and NSO. An attacker can exhaust system connections, causing application unresponsiveness that persists until a manual system reboot.&lt;/p&gt;




&lt;h2&gt;
  
  
  Technical Details
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;CWE ID&lt;/strong&gt;: CWE-400&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Attack Vector&lt;/strong&gt;: Network&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;CVSS v3.1&lt;/strong&gt;: 7.5&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Impact&lt;/strong&gt;: Persistent Denial of Service&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Exploit Status&lt;/strong&gt;: None (Unexploited)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;KEV Status&lt;/strong&gt;: Not Listed&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Affected Systems
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Cisco Crosswork Network Controller (CNC)&lt;/li&gt;
&lt;li&gt;Cisco Network Services Orchestrator (NSO)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Cisco Crosswork Network Controller&lt;/strong&gt;: &amp;lt;= 7.1 (Fixed in: &lt;code&gt;7.2&lt;/code&gt;)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Cisco Network Services Orchestrator&lt;/strong&gt;: &amp;lt;= 6.3 (Fixed in: &lt;code&gt;6.5&lt;/code&gt;)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Cisco Network Services Orchestrator&lt;/strong&gt;: 6.4 (Fixed in: &lt;code&gt;6.4.1.3&lt;/code&gt;)&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Mitigation Strategies
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Apply vendor-provided patch upgrades&lt;/li&gt;
&lt;li&gt;Implement network-level connection rate limiting at upstream firewalls&lt;/li&gt;
&lt;li&gt;Restrict network access to management interfaces using explicit allowlists&lt;/li&gt;
&lt;li&gt;Monitor ingress ports for unusual TCP connection spikes&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Remediation Steps:&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Identify the current software version of Cisco CNC or NSO running in the environment.&lt;/li&gt;
&lt;li&gt;Download the applicable fixed release (CNC 7.2+, NSO 6.4.1.3, or NSO 6.5+).&lt;/li&gt;
&lt;li&gt;Schedule a maintenance window and provision backup snapshots.&lt;/li&gt;
&lt;li&gt;Apply the software update according to Cisco's official upgrade procedures.&lt;/li&gt;
&lt;li&gt;Verify system stability and test management interface connectivity post-upgrade.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  References
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nso-dos-7Egqyc" rel="noopener noreferrer"&gt;Cisco Security Advisory&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2026-20188" rel="noopener noreferrer"&gt;NVD Record&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.bleepingcomputer.com/news/security/new-cisco-dos-flaw-requires-manual-reboot-to-revive-devices/" rel="noopener noreferrer"&gt;BleepingComputer Technical Article&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.cve.org/CVERecord?id=CVE-2026-20188" rel="noopener noreferrer"&gt;CVE.org Details&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;




&lt;p&gt;&lt;em&gt;&lt;a href="https://cvereports.com/reports/CVE-2026-20188" rel="noopener noreferrer"&gt;Read the full report for CVE-2026-20188 on our website&lt;/a&gt; for more details including interactive diagrams and full exploit analysis.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>security</category>
      <category>cve</category>
      <category>cybersecurity</category>
    </item>
    <item>
      <title>CVE-2026-39805: CVE-2026-39805: CL.CL HTTP Request Smuggling in Bandit Web Server</title>
      <dc:creator>CVE Reports</dc:creator>
      <pubDate>Thu, 07 May 2026 05:10:29 +0000</pubDate>
      <link>https://forem.com/cverports/cve-2026-39805-cve-2026-39805-clcl-http-request-smuggling-in-bandit-web-server-39e5</link>
      <guid>https://forem.com/cverports/cve-2026-39805-cve-2026-39805-clcl-http-request-smuggling-in-bandit-web-server-39e5</guid>
      <description>&lt;h1&gt;
  
  
  CVE-2026-39805: CL.CL HTTP Request Smuggling in Bandit Web Server
&lt;/h1&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Vulnerability ID:&lt;/strong&gt; CVE-2026-39805&lt;br&gt;
&lt;strong&gt;CVSS Score:&lt;/strong&gt; 6.3&lt;br&gt;
&lt;strong&gt;Published:&lt;/strong&gt; 2026-05-07&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;The Bandit HTTP server for Elixir versions prior to 1.11.0 fails to correctly process requests containing multiple Content-Length headers. This inconsistent interpretation creates a CL.CL HTTP request smuggling vulnerability when Bandit is deployed behind a reverse proxy that parses the headers differently. Attackers exploit this desynchronization to smuggle secondary HTTP requests past edge security controls.&lt;/p&gt;

&lt;h2&gt;
  
  
  TL;DR
&lt;/h2&gt;

&lt;p&gt;Bandit &amp;lt; 1.11.0 accepts duplicate Content-Length headers and processes only the first one, violating RFC 9112. When deployed behind certain reverse proxies, this allows attackers to smuggle hidden HTTP requests to bypass frontend access controls.&lt;/p&gt;




&lt;h3&gt;
  
  
  ⚠️ Exploit Status: POC
&lt;/h3&gt;

&lt;h2&gt;
  
  
  Technical Details
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;CWE ID&lt;/strong&gt;: CWE-444&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Attack Vector&lt;/strong&gt;: Network&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;CVSS v4.0&lt;/strong&gt;: 6.3&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;EPSS Score&lt;/strong&gt;: 0.00017 (4.03%)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Impact&lt;/strong&gt;: Security Control Bypass&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Exploit Status&lt;/strong&gt;: Proof of Concept&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;KEV Status&lt;/strong&gt;: Not Listed&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Affected Systems
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Bandit (Elixir HTTP Server) &amp;lt; 1.11.0&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;bandit&lt;/strong&gt;: &amp;lt; 1.11.0 (Fixed in: &lt;code&gt;1.11.0&lt;/code&gt;)&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Code Analysis
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Commit: &lt;a href="https://github.com/mtrudel/bandit/commit/f2ca636eb6df385219957e8934e9fc6efa1630d1" rel="noopener noreferrer"&gt;f2ca636&lt;/a&gt;
&lt;/h3&gt;

&lt;p&gt;Fix HTTP request smuggling vulnerability by rejecting requests with multiple Content-Length headers&lt;/p&gt;

&lt;h2&gt;
  
  
  Exploit Details
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="https://github.com/mtrudel/bandit/commit/f2ca636eb6df385219957e8934e9fc6efa1630d1" rel="noopener noreferrer"&gt;GitHub Fix Commit&lt;/a&gt;: Proof of Concept test case embedded within the official repository patch suite.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Mitigation Strategies
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Upgrade Bandit web server to version 1.11.0&lt;/li&gt;
&lt;li&gt;Configure frontend proxies to reject requests with multiple Content-Length headers&lt;/li&gt;
&lt;li&gt;Deploy WAF rules to detect and block malformed HTTP requests&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Remediation Steps:&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Modify mix.exs to require bandit version &amp;gt;= 1.11.0&lt;/li&gt;
&lt;li&gt;Run mix deps.get to update the application dependencies&lt;/li&gt;
&lt;li&gt;Recompile the application and deploy to the target environment&lt;/li&gt;
&lt;li&gt;Validate frontend proxy configurations to ensure strict RFC 9112 compliance&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  References
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://github.com/mtrudel/bandit/security/advisories/GHSA-c67r-gc9j-2qf7" rel="noopener noreferrer"&gt;GHSA-c67r-gc9j-2qf7 Security Advisory&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cna.erlef.org/cves/CVE-2026-39805.html" rel="noopener noreferrer"&gt;Erlang Ecosystem Foundation CNA Notice&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/mtrudel/bandit/commit/f2ca636eb6df385219957e8934e9fc6efa1630d1" rel="noopener noreferrer"&gt;Bandit Fix Commit f2ca636eb6df385219957e8934e9fc6efa1630d1&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://osv.dev/vulnerability/EEF-CVE-2026-39805" rel="noopener noreferrer"&gt;OSV Entry for EEF-CVE-2026-39805&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;




&lt;p&gt;&lt;em&gt;&lt;a href="https://cvereports.com/reports/CVE-2026-39805" rel="noopener noreferrer"&gt;Read the full report for CVE-2026-39805 on our website&lt;/a&gt; for more details including interactive diagrams and full exploit analysis.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>security</category>
      <category>cve</category>
      <category>cybersecurity</category>
    </item>
    <item>
      <title>CVE-2026-39807: CVE-2026-39807: Transport-State Spoofing via Untrusted URI Scheme in Bandit HTTP Server</title>
      <dc:creator>CVE Reports</dc:creator>
      <pubDate>Thu, 07 May 2026 04:40:29 +0000</pubDate>
      <link>https://forem.com/cverports/cve-2026-39807-cve-2026-39807-transport-state-spoofing-via-untrusted-uri-scheme-in-bandit-http-5e5a</link>
      <guid>https://forem.com/cverports/cve-2026-39807-cve-2026-39807-transport-state-spoofing-via-untrusted-uri-scheme-in-bandit-http-5e5a</guid>
      <description>&lt;h1&gt;
  
  
  CVE-2026-39807: Transport-State Spoofing via Untrusted URI Scheme in Bandit HTTP Server
&lt;/h1&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Vulnerability ID:&lt;/strong&gt; CVE-2026-39807&lt;br&gt;
&lt;strong&gt;CVSS Score:&lt;/strong&gt; 6.3&lt;br&gt;
&lt;strong&gt;Published:&lt;/strong&gt; 2026-05-07&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;The Bandit HTTP server prior to version 1.11.0 contains a transport-state spoofing vulnerability. The application incorrectly prioritizes the client-supplied URI scheme over the verified transport-layer encryption status. This allows unauthenticated attackers to spoof the connection state as secure (HTTPS) over a plaintext connection, bypassing security middleware and exposing secure cookies.&lt;/p&gt;

&lt;h2&gt;
  
  
  TL;DR
&lt;/h2&gt;

&lt;p&gt;A logic flaw in the Bandit HTTP server allows attackers to forge the connection scheme. Sending an absolute-form HTTP request over a plaintext connection causes the server to treat the request as HTTPS, bypassing SSL redirects and leaking secure cookies.&lt;/p&gt;




&lt;h3&gt;
  
  
  ⚠️ Exploit Status: POC
&lt;/h3&gt;

&lt;h2&gt;
  
  
  Technical Details
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;CWE ID&lt;/strong&gt;: CWE-807&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Attack Vector&lt;/strong&gt;: Network&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;CVSS Score&lt;/strong&gt;: 6.3&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;EPSS Score&lt;/strong&gt;: 0.00018&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Impact&lt;/strong&gt;: Security feature bypass and confidentiality loss&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Exploit Status&lt;/strong&gt;: Proof of Concept&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;KEV Status&lt;/strong&gt;: Not Listed&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Affected Systems
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Bandit HTTP Server for Elixir&lt;/li&gt;
&lt;li&gt;Elixir applications utilizing Plug.Conn via Bandit&lt;/li&gt;
&lt;li&gt;Deployments exposing plaintext (non-TLS) HTTP ports&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;bandit&lt;/strong&gt;: &amp;gt;= 1.0.0, &amp;lt; 1.11.0 (Fixed in: &lt;code&gt;1.11.0&lt;/code&gt;)&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Code Analysis
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Commit: &lt;a href="https://github.com/mtrudel/bandit/commit/45feea20dea8af7ffd7245271107b695c040e667" rel="noopener noreferrer"&gt;45feea2&lt;/a&gt;
&lt;/h3&gt;

&lt;p&gt;Fix transport-state spoofing vulnerability by evaluating only adapter security state&lt;/p&gt;

&lt;h2&gt;
  
  
  Exploit Details
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="https://github.com/mtrudel/bandit/commit/45feea20dea8af7ffd7245271107b695c040e667" rel="noopener noreferrer"&gt;Commit Test Suite&lt;/a&gt;: Unit tests implementing the spoofing payload to verify the patch effectiveness.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Mitigation Strategies
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Upgrade the bandit package to a patched version&lt;/li&gt;
&lt;li&gt;Disable plaintext network listeners and enforce TLS termination at the application&lt;/li&gt;
&lt;li&gt;Deploy a reverse proxy to sanitize absolute-form HTTP request targets&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Remediation Steps:&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Update the project's mix.exs file to require bandit version 1.11.0 or later.&lt;/li&gt;
&lt;li&gt;Execute &lt;code&gt;mix deps.get&lt;/code&gt; and &lt;code&gt;mix compile&lt;/code&gt; to pull and build the updated dependency.&lt;/li&gt;
&lt;li&gt;Audit production deployments to verify whether plaintext ports are unintentionally exposed.&lt;/li&gt;
&lt;li&gt;Test downstream application behavior to ensure secure cookies and Plug.SSL correctly evaluate the patched state.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  References
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://github.com/mtrudel/bandit/security/advisories/GHSA-375f-4r2h-f99j" rel="noopener noreferrer"&gt;GitHub Security Advisory GHSA-375f-4r2h-f99j&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cna.erlef.org/cves/CVE-2026-39807.html" rel="noopener noreferrer"&gt;EEF CNA Advisory for CVE-2026-39807&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/mtrudel/bandit/commit/45feea20dea8af7ffd7245271107b695c040e667" rel="noopener noreferrer"&gt;Bandit Fix Commit 45feea20&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://osv.dev/vulnerability/EEF-CVE-2026-39807" rel="noopener noreferrer"&gt;OSV Record EEF-CVE-2026-39807&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;




&lt;p&gt;&lt;em&gt;&lt;a href="https://cvereports.com/reports/CVE-2026-39807" rel="noopener noreferrer"&gt;Read the full report for CVE-2026-39807 on our website&lt;/a&gt; for more details including interactive diagrams and full exploit analysis.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>security</category>
      <category>cve</category>
      <category>cybersecurity</category>
    </item>
    <item>
      <title>CVE-2026-42788: CVE-2026-42788: HTTP/2 Frame Size Limit Bypass and Memory Exhaustion in Bandit</title>
      <dc:creator>CVE Reports</dc:creator>
      <pubDate>Thu, 07 May 2026 04:10:29 +0000</pubDate>
      <link>https://forem.com/cverports/cve-2026-42788-cve-2026-42788-http2-frame-size-limit-bypass-and-memory-exhaustion-in-bandit-28a5</link>
      <guid>https://forem.com/cverports/cve-2026-42788-cve-2026-42788-http2-frame-size-limit-bypass-and-memory-exhaustion-in-bandit-28a5</guid>
      <description>&lt;h1&gt;
  
  
  CVE-2026-42788: HTTP/2 Frame Size Limit Bypass and Memory Exhaustion in Bandit
&lt;/h1&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Vulnerability ID:&lt;/strong&gt; CVE-2026-42788&lt;br&gt;
&lt;strong&gt;CVSS Score:&lt;/strong&gt; 6.9&lt;br&gt;
&lt;strong&gt;Published:&lt;/strong&gt; 2026-05-07&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;CVE-2026-42788 is a critical resource management vulnerability in the Bandit HTTP server for Elixir. The flaw exists within the HTTP/2 frame deserialization logic, where binary pattern matching defers size validation until after memory allocation. This allows an unauthenticated remote attacker to cause memory exhaustion and Denial of Service by transmitting oversized HTTP/2 frames.&lt;/p&gt;

&lt;h2&gt;
  
  
  TL;DR
&lt;/h2&gt;

&lt;p&gt;Unauthenticated remote attackers can trigger Denial of Service in the Bandit Elixir HTTP server via memory exhaustion by sending oversized HTTP/2 frames, bypassing size limits due to deferred buffer validation in pattern matching.&lt;/p&gt;




&lt;h2&gt;
  
  
  Technical Details
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;CWE ID&lt;/strong&gt;: CWE-770&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Attack Vector&lt;/strong&gt;: Network&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;CVSS v4.0&lt;/strong&gt;: 6.9&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;EPSS Score&lt;/strong&gt;: 0.00017&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Impact&lt;/strong&gt;: Denial of Service (DoS)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Exploit Status&lt;/strong&gt;: None&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;CISA KEV&lt;/strong&gt;: Not Listed&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Affected Systems
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;bandit (Elixir HTTP server)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;bandit&lt;/strong&gt;: 0.3.6 &amp;lt;= version &amp;lt; 1.11.0 (Fixed in: &lt;code&gt;1.11.0&lt;/code&gt;)&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Code Analysis
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Commit: &lt;a href="https://github.com/mtrudel/bandit/commit/1e8e55966da9129016b73d32f0e1df4630e3b463" rel="noopener noreferrer"&gt;1e8e559&lt;/a&gt;
&lt;/h3&gt;

&lt;p&gt;Fix for HTTP/2 frame size limit bypassed by late buffer check&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight diff"&gt;&lt;code&gt;&lt;span class="p"&gt;@@ -0,0 +1,7 @@&lt;/span&gt;
&lt;span class="gi"&gt;+def deserialize(
+      &amp;lt;&amp;lt;length::24, _type::8, _flags::8, _reserved::1, _stream_id::31, rest::binary&amp;gt;&amp;gt;,
+      max_frame_size
+    )
+    when length &amp;gt; max_frame_size do
+  {{:error, Bandit.HTTP2.Errors.frame_size_error(), "Payload size too large (RFC9113§4.2)"},
+   rest}
+end
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h2&gt;
  
  
  Mitigation Strategies
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Upgrade the bandit dependency to version 1.11.0 or later.&lt;/li&gt;
&lt;li&gt;Implement rate limiting and connection concurrency limits at the reverse proxy or WAF layer.&lt;/li&gt;
&lt;li&gt;Enforce process-level memory limits using containerization policies (e.g., cgroups, Kubernetes resource quotas).&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Remediation Steps:&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Modify the mix.exs file in the Elixir project to require bandit version &amp;gt;= 1.11.0.&lt;/li&gt;
&lt;li&gt;Execute &lt;code&gt;mix deps.get&lt;/code&gt; and &lt;code&gt;mix deps.compile&lt;/code&gt; to fetch and compile the updated dependency.&lt;/li&gt;
&lt;li&gt;Verify the update by inspecting the mix.lock file ensuring the bandit version reflects 1.11.0.&lt;/li&gt;
&lt;li&gt;Deploy the updated application build to staging, test HTTP/2 functionality, and proceed to production deployment.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  References
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://github.com/mtrudel/bandit/security/advisories/GHSA-q6v9-r226-v65f" rel="noopener noreferrer"&gt;GitHub Advisory: GHSA-q6v9-r226-v65f&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cna.erlef.org/cves/CVE-2026-42788.html" rel="noopener noreferrer"&gt;Erlang Ecosystem Foundation CNA Advisory&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://osv.dev/vulnerability/EEF-CVE-2026-42788" rel="noopener noreferrer"&gt;OSV Record: EEF-CVE-2026-42788&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.cve.org/CVERecord?id=CVE-2026-42788" rel="noopener noreferrer"&gt;CVE.org Record: CVE-2026-42788&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;




&lt;p&gt;&lt;em&gt;&lt;a href="https://cvereports.com/reports/CVE-2026-42788" rel="noopener noreferrer"&gt;Read the full report for CVE-2026-42788 on our website&lt;/a&gt; for more details including interactive diagrams and full exploit analysis.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>security</category>
      <category>cve</category>
      <category>cybersecurity</category>
    </item>
    <item>
      <title>GHSA-MMPX-JH39-WRV6: GHSA-MMPX-JH39-WRV6: Stored Cross-Site Scripting in FileBrowser Quantum via SVG Rendering</title>
      <dc:creator>CVE Reports</dc:creator>
      <pubDate>Thu, 07 May 2026 03:40:29 +0000</pubDate>
      <link>https://forem.com/cverports/ghsa-mmpx-jh39-wrv6-ghsa-mmpx-jh39-wrv6-stored-cross-site-scripting-in-filebrowser-quantum-via-25h1</link>
      <guid>https://forem.com/cverports/ghsa-mmpx-jh39-wrv6-ghsa-mmpx-jh39-wrv6-stored-cross-site-scripting-in-filebrowser-quantum-via-25h1</guid>
      <description>&lt;h1&gt;
  
  
  GHSA-MMPX-JH39-WRV6: Stored Cross-Site Scripting in FileBrowser Quantum via SVG Rendering
&lt;/h1&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Vulnerability ID:&lt;/strong&gt; GHSA-MMPX-JH39-WRV6&lt;br&gt;
&lt;strong&gt;CVSS Score:&lt;/strong&gt; 5.4&lt;br&gt;
&lt;strong&gt;Published:&lt;/strong&gt; 2026-05-07&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;FileBrowser Quantum versions prior to v1.3.1-stable and v1.3.9-beta are vulnerable to Stored Cross-Site Scripting (XSS). The vulnerability manifests when the application serves user-uploaded Scalable Vector Graphics (SVG) files with the &lt;code&gt;inline&lt;/code&gt; parameter. Due to the absence of a restrictive Content-Security-Policy (CSP) header, modern browsers execute embedded JavaScript within the application's origin context.&lt;/p&gt;

&lt;h2&gt;
  
  
  TL;DR
&lt;/h2&gt;

&lt;p&gt;FileBrowser Quantum allows Stored XSS via malicious SVG files served inline due to a missing Content-Security-Policy header. Attackers can execute arbitrary JavaScript in a victim's session.&lt;/p&gt;




&lt;h3&gt;
  
  
  ⚠️ Exploit Status: POC
&lt;/h3&gt;

&lt;h2&gt;
  
  
  Technical Details
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Vulnerability Type&lt;/strong&gt;: Stored Cross-Site Scripting (XSS)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;CWE ID&lt;/strong&gt;: CWE-79, CWE-693&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Attack Vector&lt;/strong&gt;: Network&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Authentication Status&lt;/strong&gt;: Required for upload, unauthenticated for victim execution&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Affected Component&lt;/strong&gt;: backend/http/download.go&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Exploit Availability&lt;/strong&gt;: Proof of Concept available&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Affected Systems
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;FileBrowser Quantum (github.com/gtsteffaniak/filebrowser)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;FileBrowser Quantum&lt;/strong&gt;: &amp;lt; v1.3.1-stable (Fixed in: &lt;code&gt;v1.3.1-stable&lt;/code&gt;)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;FileBrowser Quantum&lt;/strong&gt;: &amp;lt; v1.3.9-beta (Fixed in: &lt;code&gt;v1.3.9-beta&lt;/code&gt;)&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Code Analysis
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Commit: &lt;a href="https://github.com/gtsteffaniak/filebrowser/commit/6bfc3974192e954f71cc5d1cd04baaaec3b76383" rel="noopener noreferrer"&gt;6bfc397&lt;/a&gt;
&lt;/h3&gt;

&lt;p&gt;Added Content-Security-Policy header to mitigate inline SVG XSS execution.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight diff"&gt;&lt;code&gt;&lt;span class="p"&gt;func setContentDisposition(w http.ResponseWriter, r *http.Request, fileName string) {
&lt;/span&gt;    dispositionType := "attachment"
    if r.URL.Query().Get("inline") == "true" {
        dispositionType = "inline"
&lt;span class="gi"&gt;+       // Inline SVG (and similar) can execute embedded scripts when opened as a top-level document; 
+       // match upstream filebrowser mitigation.
+       w.Header().Set("Content-Security-Policy", "script-src 'none'")
&lt;/span&gt;    }
    // ...
}
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h2&gt;
  
  
  Mitigation Strategies
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Update FileBrowser Quantum to version v1.3.1-stable or v1.3.9-beta.&lt;/li&gt;
&lt;li&gt;Configure reverse proxies to enforce a strict CSP on all file rendering endpoints.&lt;/li&gt;
&lt;li&gt;Block the &lt;code&gt;?inline=true&lt;/code&gt; parameter via Web Application Firewall (WAF) if inline rendering is not required.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Remediation Steps:&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Identify the current version of FileBrowser Quantum deployed in the environment.&lt;/li&gt;
&lt;li&gt;Download the patched binary for v1.3.1-stable or v1.3.9-beta from the official repository releases.&lt;/li&gt;
&lt;li&gt;Stop the FileBrowser service.&lt;/li&gt;
&lt;li&gt;Replace the existing executable with the downloaded patched binary.&lt;/li&gt;
&lt;li&gt;Restart the service and verify that requests to file endpoints with &lt;code&gt;?inline=true&lt;/code&gt; return the &lt;code&gt;Content-Security-Policy: script-src 'none'&lt;/code&gt; header.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  References
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://github.com/advisories/GHSA-MMPX-JH39-WRV6" rel="noopener noreferrer"&gt;GitHub Advisory GHSA-mmpx-jh39-wrv6&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/gtsteffaniak/filebrowser/commit/6bfc3974192e954f71cc5d1cd04baaaec3b76383" rel="noopener noreferrer"&gt;Fix Commit in gtsteffaniak/filebrowser&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/gtsteffaniak/filebrowser/releases" rel="noopener noreferrer"&gt;Project Releases Page&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://pkg.go.dev/vuln/GHSA-mmpx-jh39-wrv6" rel="noopener noreferrer"&gt;Go Vulnerability Database Entry&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;




&lt;p&gt;&lt;em&gt;&lt;a href="https://cvereports.com/reports/GHSA-MMPX-JH39-WRV6" rel="noopener noreferrer"&gt;Read the full report for GHSA-MMPX-JH39-WRV6 on our website&lt;/a&gt; for more details including interactive diagrams and full exploit analysis.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>security</category>
      <category>cve</category>
      <category>cybersecurity</category>
      <category>ghsa</category>
    </item>
    <item>
      <title>GHSA-FPF5-4JW8-67X8: GHSA-FPF5-4JW8-67X8: Unbounded Memory Allocation in rust-zserio</title>
      <dc:creator>CVE Reports</dc:creator>
      <pubDate>Thu, 07 May 2026 02:10:29 +0000</pubDate>
      <link>https://forem.com/cverports/ghsa-fpf5-4jw8-67x8-ghsa-fpf5-4jw8-67x8-unbounded-memory-allocation-in-rust-zserio-4nem</link>
      <guid>https://forem.com/cverports/ghsa-fpf5-4jw8-67x8-ghsa-fpf5-4jw8-67x8-unbounded-memory-allocation-in-rust-zserio-4nem</guid>
      <description>&lt;h1&gt;
  
  
  GHSA-FPF5-4JW8-67X8: Unbounded Memory Allocation in rust-zserio
&lt;/h1&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Vulnerability ID:&lt;/strong&gt; GHSA-FPF5-4JW8-67X8&lt;br&gt;
&lt;strong&gt;CVSS Score:&lt;/strong&gt; 7.5&lt;br&gt;
&lt;strong&gt;Published:&lt;/strong&gt; 2026-05-07&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;A critical vulnerability exists in the rust-zserio crate regarding how auto-generated deserialization routines handle variable-length structures. By supplying a maliciously crafted Zserio bitstream with an artificially inflated size header, an attacker can force the application to request massive memory allocations, resulting in an Out-of-Memory (OOM) panic and process termination.&lt;/p&gt;

&lt;h2&gt;
  
  
  TL;DR
&lt;/h2&gt;

&lt;p&gt;Unbounded memory allocation in rust-zserio allows remote attackers to trigger an Out-of-Memory crash by providing malformed bitstreams with massive array lengths.&lt;/p&gt;




&lt;h3&gt;
  
  
  ⚠️ Exploit Status: POC
&lt;/h3&gt;

&lt;h2&gt;
  
  
  Technical Details
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;CWE&lt;/strong&gt;: CWE-770&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Attack Vector&lt;/strong&gt;: Network (Malicious Payload)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Impact&lt;/strong&gt;: Denial of Service (DoS)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Exploit Status&lt;/strong&gt;: Proof of Concept (PoC) Available&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Authentication Required&lt;/strong&gt;: None&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Remediation&lt;/strong&gt;: Code Generator Update&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Affected Systems
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Software leveraging rust-zserio versions prior to May 1, 2026&lt;/li&gt;
&lt;li&gt;Systems parsing untrusted Zserio payloads using generated Rust code&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;rust-zserio&lt;/strong&gt;: &amp;lt; 57f5fb4a2a8611d58dbcc1a9221349206dd99c3c (Fixed in: &lt;code&gt;57f5fb4a2a8611d58dbcc1a9221349206dd99c3c&lt;/code&gt;)&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Code Analysis
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Commit: &lt;a href="https://github.com/Danaozhong/rust-zserio/commit/57f5fb4a2a8611d58dbcc1a9221349206dd99c3c" rel="noopener noreferrer"&gt;57f5fb4&lt;/a&gt;
&lt;/h3&gt;

&lt;p&gt;Implemented chunked array allocation and incremental growth logic to prevent OOM.&lt;/p&gt;

&lt;h2&gt;
  
  
  Mitigation Strategies
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Update the rust-zserio crate to a version containing the fix commit.&lt;/li&gt;
&lt;li&gt;Regenerate all previously generated Rust code for Zserio decoding.&lt;/li&gt;
&lt;li&gt;Implement network-layer access controls to limit exposure of endpoints parsing Zserio structures.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Remediation Steps:&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Bump the rust-zserio dependency in Cargo.toml to the patched version.&lt;/li&gt;
&lt;li&gt;Execute the build process to trigger the internal generator.&lt;/li&gt;
&lt;li&gt;Verify that the newly generated code uses push-based loops instead of vec! macro initializations.&lt;/li&gt;
&lt;li&gt;Optionally configure the array allocation chunk size using zserio::set_array_alloc_chunk() to fine-tune memory profiles.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  References
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://github.com/advisories/GHSA-FPF5-4JW8-67X8" rel="noopener noreferrer"&gt;GitHub Advisory&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/Danaozhong/rust-zserio" rel="noopener noreferrer"&gt;Repository&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;




&lt;p&gt;&lt;em&gt;&lt;a href="https://cvereports.com/reports/GHSA-FPF5-4JW8-67X8" rel="noopener noreferrer"&gt;Read the full report for GHSA-FPF5-4JW8-67X8 on our website&lt;/a&gt; for more details including interactive diagrams and full exploit analysis.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>security</category>
      <category>cve</category>
      <category>cybersecurity</category>
      <category>ghsa</category>
    </item>
    <item>
      <title>GHSA-FC67-C4HG-Q653: CVE-2026-7461: OS Command Injection in Amazon ECS Agent for Windows via FSx Volume Credentials</title>
      <dc:creator>CVE Reports</dc:creator>
      <pubDate>Thu, 07 May 2026 01:40:29 +0000</pubDate>
      <link>https://forem.com/cverports/ghsa-fc67-c4hg-q653-cve-2026-7461-os-command-injection-in-amazon-ecs-agent-for-windows-via-fsx-34lh</link>
      <guid>https://forem.com/cverports/ghsa-fc67-c4hg-q653-cve-2026-7461-os-command-injection-in-amazon-ecs-agent-for-windows-via-fsx-34lh</guid>
      <description>&lt;h1&gt;
  
  
  CVE-2026-7461: OS Command Injection in Amazon ECS Agent for Windows via FSx Volume Credentials
&lt;/h1&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Vulnerability ID:&lt;/strong&gt; GHSA-FC67-C4HG-Q653&lt;br&gt;
&lt;strong&gt;CVSS Score:&lt;/strong&gt; 7.2&lt;br&gt;
&lt;strong&gt;Published:&lt;/strong&gt; 2026-05-07&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;A high-severity OS command injection vulnerability exists in the Amazon ECS Agent for Windows (versions 1.47.0 to 1.102.0) that permits an authenticated attacker with task definition creation privileges to execute arbitrary commands as the SYSTEM user via crafted FSx Windows File Server volume credentials.&lt;/p&gt;

&lt;h2&gt;
  
  
  TL;DR
&lt;/h2&gt;

&lt;p&gt;The Amazon ECS Agent for Windows improperly neutralizes user input when mounting FSx Windows File Server volumes. Attackers with task definition privileges can inject shell metacharacters into the username field, leading to OS command execution as SYSTEM. Administrators must upgrade to version 1.103.0.&lt;/p&gt;




&lt;h3&gt;
  
  
  ⚠️ Exploit Status: POC
&lt;/h3&gt;

&lt;h2&gt;
  
  
  Technical Details
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Vulnerability Type&lt;/strong&gt;: OS Command Injection&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;CWE ID&lt;/strong&gt;: CWE-78&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;CVSS v3.1 Base Score&lt;/strong&gt;: 7.2 (High)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Attack Vector&lt;/strong&gt;: Network&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Privileges Required&lt;/strong&gt;: High (Task Definition Registration)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Impact&lt;/strong&gt;: SYSTEM-level Arbitrary Code Execution&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Exploit Maturity&lt;/strong&gt;: Proof of Concept&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Fixed Version&lt;/strong&gt;: 1.103.0&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Affected Systems
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Amazon ECS Agent (Windows)&lt;/li&gt;
&lt;li&gt;Amazon FSx for Windows File Server Integration&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Amazon ECS Agent (Windows)&lt;/strong&gt;: &amp;gt;= 1.47.0, &amp;lt; 1.103.0 (Fixed in: &lt;code&gt;1.103.0&lt;/code&gt;)&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Mitigation Strategies
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Upgrade the Amazon ECS Agent to version 1.103.0 or later on all Windows instances.&lt;/li&gt;
&lt;li&gt;Audit and enforce least privilege IAM policies for 'ecs:RegisterTaskDefinition' and 'ecs:RunTask' actions.&lt;/li&gt;
&lt;li&gt;Implement CloudTrail monitoring to detect shell metacharacters in volume configuration credential fields.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Remediation Steps:&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Open an administrative PowerShell session on the target Windows container instance.&lt;/li&gt;
&lt;li&gt;Stop the ECS service using the command: Stop-Service -Name "ecs".&lt;/li&gt;
&lt;li&gt;Download the latest agent zip file using: Invoke-WebRequest -Uri &lt;a href="https://s3.us-east-1.amazonaws.com/amazon-ecs-agent-us-east-1/amazon-ecs-agent-latest.zip" rel="noopener noreferrer"&gt;https://s3.us-east-1.amazonaws.com/amazon-ecs-agent-us-east-1/amazon-ecs-agent-latest.zip&lt;/a&gt; -OutFile agent.zip.&lt;/li&gt;
&lt;li&gt;Extract the archive using: Expand-Archive -Path agent.zip -DestinationPath .&lt;/li&gt;
&lt;li&gt;Verify the version using: ./amazon-ecs-agent.exe -version.&lt;/li&gt;
&lt;li&gt;Restart the ECS service using: Start-Service -Name "ecs".&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  References
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://aws.amazon.com/security/security-bulletins/2026-024-aws/" rel="noopener noreferrer"&gt;AWS Security Bulletin 2026-024-aws&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/aws/amazon-ecs-agent/security/advisories/GHSA-fc67-c4hg-q653" rel="noopener noreferrer"&gt;GitHub Advisory: GHSA-fc67-c4hg-q653&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2026-7461" rel="noopener noreferrer"&gt;NVD Vulnerability Detail: CVE-2026-7461&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;




&lt;p&gt;&lt;em&gt;&lt;a href="https://cvereports.com/reports/GHSA-FC67-C4HG-Q653" rel="noopener noreferrer"&gt;Read the full report for GHSA-FC67-C4HG-Q653 on our website&lt;/a&gt; for more details including interactive diagrams and full exploit analysis.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>security</category>
      <category>cve</category>
      <category>cybersecurity</category>
    </item>
    <item>
      <title>GHSA-9G2Q-W3W2-VF7Q: GHSA-9G2Q-W3W2-VF7Q: Improper Authorization and IDOR in Kimai Timesheet Management</title>
      <dc:creator>CVE Reports</dc:creator>
      <pubDate>Wed, 06 May 2026 19:40:29 +0000</pubDate>
      <link>https://forem.com/cverports/ghsa-9g2q-w3w2-vf7q-ghsa-9g2q-w3w2-vf7q-improper-authorization-and-idor-in-kimai-timesheet-45el</link>
      <guid>https://forem.com/cverports/ghsa-9g2q-w3w2-vf7q-ghsa-9g2q-w3w2-vf7q-improper-authorization-and-idor-in-kimai-timesheet-45el</guid>
      <description>&lt;h1&gt;
  
  
  GHSA-9G2Q-W3W2-VF7Q: Improper Authorization and IDOR in Kimai Timesheet Management
&lt;/h1&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Vulnerability ID:&lt;/strong&gt; GHSA-9G2Q-W3W2-VF7Q&lt;br&gt;
&lt;strong&gt;CVSS Score:&lt;/strong&gt; N/A&lt;br&gt;
&lt;strong&gt;Published:&lt;/strong&gt; 2026-05-06&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Kimai versions prior to 2.56.0 contain an Improper Authorization vulnerability that functions as an Insecure Direct Object Reference (IDOR). The vulnerability exists in the TimesheetVoter component, which fails to verify team associations when processing authorization requests. This allows authenticated users with the ROLE_TEAMLEAD privilege to read, modify, or delete timesheets belonging to users in completely unrelated teams.&lt;/p&gt;

&lt;h2&gt;
  
  
  TL;DR
&lt;/h2&gt;

&lt;p&gt;A missing team-scope check in the TimesheetVoter allows users with the ROLE_TEAMLEAD permission to manipulate timesheets outside their managed teams via API requests.&lt;/p&gt;




&lt;h3&gt;
  
  
  ⚠️ Exploit Status: POC
&lt;/h3&gt;

&lt;h2&gt;
  
  
  Technical Details
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Advisory ID&lt;/strong&gt;: GHSA-9G2Q-W3W2-VF7Q&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;CVE ID&lt;/strong&gt;: None assigned&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Vulnerability Type&lt;/strong&gt;: Improper Authorization (IDOR)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Affected Component&lt;/strong&gt;: TimesheetVoter&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Attack Vector&lt;/strong&gt;: Network&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Privileges Required&lt;/strong&gt;: ROLE_TEAMLEAD&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;CVSS v4.0&lt;/strong&gt;: AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:P&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Affected Systems
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Kimai (Packagist)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;kimai/kimai&lt;/strong&gt;: &amp;lt; 2.56.0 (Fixed in: &lt;code&gt;2.56.0&lt;/code&gt;)&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Mitigation Strategies
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Upgrade Kimai to version 2.56.0&lt;/li&gt;
&lt;li&gt;Audit users with ROLE_TEAMLEAD&lt;/li&gt;
&lt;li&gt;Revoke global edit_other_timesheet and delete_other_timesheet permissions from ROLE_TEAMLEAD&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Remediation Steps:&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Identify current Kimai version in use.&lt;/li&gt;
&lt;li&gt;Download and deploy Kimai 2.56.0 via Composer.&lt;/li&gt;
&lt;li&gt;Review assigned roles in the Kimai administrative interface.&lt;/li&gt;
&lt;li&gt;Monitor API logs for anomalous /api/timesheets/ requests.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  References
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://github.com/advisories/GHSA-9G2Q-W3W2-VF7Q" rel="noopener noreferrer"&gt;GitHub Advisory&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.kimai.org/documentation/bughunter.html" rel="noopener noreferrer"&gt;Kimai Security Page&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/kimai/kimai" rel="noopener noreferrer"&gt;Kimai Repository&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://osv.dev/vulnerability/GHSA-9g2q-w3w2-vf7q" rel="noopener noreferrer"&gt;OSV Entry&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;




&lt;p&gt;&lt;em&gt;&lt;a href="https://cvereports.com/reports/GHSA-9G2Q-W3W2-VF7Q" rel="noopener noreferrer"&gt;Read the full report for GHSA-9G2Q-W3W2-VF7Q on our website&lt;/a&gt; for more details including interactive diagrams and full exploit analysis.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>security</category>
      <category>cve</category>
      <category>cybersecurity</category>
      <category>ghsa</category>
    </item>
    <item>
      <title>GHSA-VRQV-52X7-RM4V: GHSA-VRQV-52X7-RM4V: Information Exposure via Unrestricted Twig config() Function in Kimai</title>
      <dc:creator>CVE Reports</dc:creator>
      <pubDate>Wed, 06 May 2026 19:10:29 +0000</pubDate>
      <link>https://forem.com/cverports/ghsa-vrqv-52x7-rm4v-ghsa-vrqv-52x7-rm4v-information-exposure-via-unrestricted-twig-config-117f</link>
      <guid>https://forem.com/cverports/ghsa-vrqv-52x7-rm4v-ghsa-vrqv-52x7-rm4v-information-exposure-via-unrestricted-twig-config-117f</guid>
      <description>&lt;h1&gt;
  
  
  GHSA-VRQV-52X7-RM4V: Information Exposure via Unrestricted Twig config() Function in Kimai
&lt;/h1&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Vulnerability ID:&lt;/strong&gt; GHSA-VRQV-52X7-RM4V&lt;br&gt;
&lt;strong&gt;CVSS Score:&lt;/strong&gt; Not Provided&lt;br&gt;
&lt;strong&gt;Published:&lt;/strong&gt; 2026-05-06&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Kimai versions up to 2.55.0 suffer from an information exposure vulnerability where the custom Twig &lt;code&gt;config()&lt;/code&gt; function lacks sufficient sandbox restrictions. This flaw allows users with template upload privileges to extract sensitive server-wide configuration values, such as LDAP credentials and SAML private keys, by rendering them into exported invoices or documents.&lt;/p&gt;

&lt;h2&gt;
  
  
  TL;DR
&lt;/h2&gt;

&lt;p&gt;The Twig &lt;code&gt;config()&lt;/code&gt; function in Kimai failed to restrict access to sensitive configuration keys within sandboxed templates. Highly privileged users could exploit this to leak server secrets (LDAP/SAML) into rendered PDFs or HTML exports. The issue is resolved in version 2.56.0.&lt;/p&gt;




&lt;h3&gt;
  
  
  ⚠️ Exploit Status: POC
&lt;/h3&gt;

&lt;h2&gt;
  
  
  Technical Details
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;CWE ID&lt;/strong&gt;: CWE-200&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Attack Vector&lt;/strong&gt;: Application UI (Template Upload)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Impact&lt;/strong&gt;: Confidentiality (Secret Leakage)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Privileges Required&lt;/strong&gt;: High (ROLE_SUPER_ADMIN or upload_invoice_template)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Exploit Status&lt;/strong&gt;: Proof of Concept Known&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;KEV Status&lt;/strong&gt;: Not Listed&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Affected Systems
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Kimai (Self-Hosted)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Kimai&lt;/strong&gt;: &amp;lt;= 2.55.0 (Fixed in: &lt;code&gt;2.56.0&lt;/code&gt;)&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Mitigation Strategies
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Upgrade Kimai application to a patched release.&lt;/li&gt;
&lt;li&gt;Restrict the &lt;code&gt;upload_invoice_template&lt;/code&gt; permission strictly to trusted administrators.&lt;/li&gt;
&lt;li&gt;Audit custom invoice templates for suspicious Twig function calls.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Remediation Steps:&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Review the current installed version of Kimai.&lt;/li&gt;
&lt;li&gt;Schedule a maintenance window and back up the database and files.&lt;/li&gt;
&lt;li&gt;Update Kimai to version 2.56.0 or higher following the official documentation.&lt;/li&gt;
&lt;li&gt;Review user permissions and ensure only the System-Admin role has template management capabilities.&lt;/li&gt;
&lt;li&gt;Inspect existing custom templates under 'System -&amp;gt; Invoices -&amp;gt; Templates' for unauthorized &lt;code&gt;config()&lt;/code&gt; usage.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  References
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://github.com/advisories/GHSA-VRQV-52X7-RM4V" rel="noopener noreferrer"&gt;GitHub Advisory: GHSA-VRQV-52X7-RM4V&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.kimai.org/en/security/ghsa-vrqv-52x7-rm4v" rel="noopener noreferrer"&gt;Kimai Official Advisory&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.kimai.org/documentation/bughunter.html" rel="noopener noreferrer"&gt;Kimai Security Documentation&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/kimai/kimai/pull/5923.diff" rel="noopener noreferrer"&gt;Patch Diff&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;




&lt;p&gt;&lt;em&gt;&lt;a href="https://cvereports.com/reports/GHSA-VRQV-52X7-RM4V" rel="noopener noreferrer"&gt;Read the full report for GHSA-VRQV-52X7-RM4V on our website&lt;/a&gt; for more details including interactive diagrams and full exploit analysis.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>security</category>
      <category>cve</category>
      <category>cybersecurity</category>
      <category>ghsa</category>
    </item>
    <item>
      <title>CVE-2024-27354: CVE-2024-27354: Computational Denial of Service via Unbounded Primality Testing in phpseclib</title>
      <dc:creator>CVE Reports</dc:creator>
      <pubDate>Wed, 06 May 2026 18:10:29 +0000</pubDate>
      <link>https://forem.com/cverports/cve-2024-27354-cve-2024-27354-computational-denial-of-service-via-unbounded-primality-testing-in-2935</link>
      <guid>https://forem.com/cverports/cve-2024-27354-cve-2024-27354-computational-denial-of-service-via-unbounded-primality-testing-in-2935</guid>
      <description>&lt;h1&gt;
  
  
  CVE-2024-27354: Computational Denial of Service via Unbounded Primality Testing in phpseclib
&lt;/h1&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Vulnerability ID:&lt;/strong&gt; CVE-2024-27354&lt;br&gt;
&lt;strong&gt;CVSS Score:&lt;/strong&gt; 7.5&lt;br&gt;
&lt;strong&gt;Published:&lt;/strong&gt; 2026-05-06&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;A computational Denial of Service (DoS) vulnerability in phpseclib allows unauthenticated attackers to exhaust CPU resources by supplying malformed X.509 certificates. The vulnerability arises from missing bit-length upper bounds in the Miller-Rabin primality test implementation when evaluating explicit elliptic curve field parameters.&lt;/p&gt;

&lt;h2&gt;
  
  
  TL;DR
&lt;/h2&gt;

&lt;p&gt;phpseclib before versions 1.0.23, 2.0.47, and 3.0.36 suffers from a computational DoS flaw where parsing maliciously crafted X.509 certificates with massive explicit primes triggers an unbounded Miller-Rabin primality test, leading to CPU exhaustion.&lt;/p&gt;




&lt;h3&gt;
  
  
  ⚠️ Exploit Status: POC
&lt;/h3&gt;

&lt;h2&gt;
  
  
  Technical Details
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;CWE ID&lt;/strong&gt;: CWE-400&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Attack Vector&lt;/strong&gt;: Network&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;CVSS v3.1 Score&lt;/strong&gt;: 7.5 (High)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;EPSS Score&lt;/strong&gt;: 0.00204 (42.24%)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Impact&lt;/strong&gt;: Denial of Service (CPU Exhaustion)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Exploit Status&lt;/strong&gt;: Proof of Concept&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;CISA KEV&lt;/strong&gt;: No&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Affected Systems
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;phpseclib 1.x series&lt;/li&gt;
&lt;li&gt;phpseclib 2.x series&lt;/li&gt;
&lt;li&gt;phpseclib 3.x series&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;phpseclib&lt;/strong&gt;: 1.x &amp;lt; 1.0.23 (Fixed in: &lt;code&gt;1.0.23&lt;/code&gt;)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;phpseclib&lt;/strong&gt;: 2.x &amp;lt; 2.0.47 (Fixed in: &lt;code&gt;2.0.47&lt;/code&gt;)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;phpseclib&lt;/strong&gt;: 3.x &amp;lt; 3.0.36 (Fixed in: &lt;code&gt;3.0.36&lt;/code&gt;)&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Code Analysis
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Commit: &lt;a href="https://github.com/phpseclib/phpseclib/commit/0358eb163c55a9fd7b3848b9ecc83f6b9e49dbf5" rel="noopener noreferrer"&gt;0358eb1&lt;/a&gt;
&lt;/h3&gt;

&lt;p&gt;Fix Commit (3.0 branch) introducing the 8196-bit length check&lt;/p&gt;

&lt;h3&gt;
  
  
  Commit: &lt;a href="https://github.com/phpseclib/phpseclib/commit/ad5dbdf2129f5e0fb644637770b7f33de8ca8575" rel="noopener noreferrer"&gt;ad5dbdf&lt;/a&gt;
&lt;/h3&gt;

&lt;p&gt;Fix Commit (2.0 branch) utilizing user_error for the guardrail&lt;/p&gt;

&lt;h3&gt;
  
  
  Commit: &lt;a href="https://github.com/phpseclib/phpseclib/commit/c55b75199ec8d12cec6eadf6da99da4a3712fe56" rel="noopener noreferrer"&gt;c55b751&lt;/a&gt;
&lt;/h3&gt;

&lt;p&gt;Follow-up fix for the getLength calculation logic&lt;/p&gt;

&lt;h2&gt;
  
  
  Exploit Details
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="https://www.usenix.org/system/files/conference/usenixsecurity25/sec25cycle1-prepub-599-shi-bing.pdf" rel="noopener noreferrer"&gt;Research Paper&lt;/a&gt;: X.509DoS: Exploiting and Detecting Denial-of-Service Vulnerabilities in X.509 Certificate Parsing&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Mitigation Strategies
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Upgrade phpseclib to the latest patched version on the active release branch.&lt;/li&gt;
&lt;li&gt;Implement application-level limits on the size of uploaded X.509 certificate files.&lt;/li&gt;
&lt;li&gt;Configure standard PHP execution timeouts (&lt;code&gt;max_execution_time&lt;/code&gt;) to bound resource consumption on worker threads.&lt;/li&gt;
&lt;li&gt;Register a custom PHP error handler to convert E_USER_NOTICE into fatal exceptions if operating on the 1.x or 2.x branches.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Remediation Steps:&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Identify the current version of phpseclib utilizing Composer (&lt;code&gt;composer show phpseclib/phpseclib&lt;/code&gt;).&lt;/li&gt;
&lt;li&gt;Update the version constraint in &lt;code&gt;composer.json&lt;/code&gt; to ensure a minimum version of 1.0.23, 2.0.47, or 3.0.36.&lt;/li&gt;
&lt;li&gt;Execute &lt;code&gt;composer update phpseclib/phpseclib&lt;/code&gt; to retrieve the patched library.&lt;/li&gt;
&lt;li&gt;If utilizing the 1.x or 2.x branches, review application bootstrap code to ensure &lt;code&gt;set_error_handler&lt;/code&gt; upgrades &lt;code&gt;E_USER_NOTICE&lt;/code&gt; to a thrown exception.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  References
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://github.com/advisories/GHSA-hg35-mp25-qf6h" rel="noopener noreferrer"&gt;GitHub Advisory: GHSA-hg35-mp25-qf6h&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gist.github.com/katzj/ee72f3c2a00590812b2ea3c0c8890e0b" rel="noopener noreferrer"&gt;katzj Gist - Technical Write-up&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.usenix.org/system/files/conference/usenixsecurity25/sec25cycle1-prepub-599-shi-bing.pdf" rel="noopener noreferrer"&gt;USENIX Security '25: X.509DoS Paper&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/phpseclib/phpseclib/commit/0358eb163c55a9fd7b3848b9ecc83f6b9e49dbf5" rel="noopener noreferrer"&gt;phpseclib 3.0 Fix Commit&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/phpseclib/phpseclib/commit/ad5dbdf2129f5e0fb644637770b7f33de8ca8575" rel="noopener noreferrer"&gt;phpseclib 2.0 Fix Commit&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/phpseclib/phpseclib/commit/c55b75199ec8d12cec6eadf6da99da4a3712fe56" rel="noopener noreferrer"&gt;phpseclib getLength Fix Commit&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;




&lt;p&gt;&lt;em&gt;&lt;a href="https://cvereports.com/reports/CVE-2024-27354" rel="noopener noreferrer"&gt;Read the full report for CVE-2024-27354 on our website&lt;/a&gt; for more details including interactive diagrams and full exploit analysis.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>security</category>
      <category>cve</category>
      <category>cybersecurity</category>
    </item>
  </channel>
</rss>
