<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: CVE Reports</title>
    <description>The latest articles on DEV Community by CVE Reports (@cverports).</description>
    <link>https://dev.to/cverports</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1959489%2F6e9f36b9-96a5-441a-a9b5-6993444f71d8.png</url>
      <title>DEV Community: CVE Reports</title>
      <link>https://dev.to/cverports</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/cverports"/>
    <language>en</language>
    <item>
      <title>CVE-2023-49316: CVE-2023-49316: Denial of Service via Unbounded Degree in phpseclib Binary Finite Fields</title>
      <dc:creator>CVE Reports</dc:creator>
      <pubDate>Sat, 09 May 2026 06:10:29 +0000</pubDate>
      <link>https://dev.to/cverports/cve-2023-49316-cve-2023-49316-denial-of-service-via-unbounded-degree-in-phpseclib-binary-finite-5a79</link>
      <guid>https://dev.to/cverports/cve-2023-49316-cve-2023-49316-denial-of-service-via-unbounded-degree-in-phpseclib-binary-finite-5a79</guid>
      <description>&lt;h1&gt;
  
  
  CVE-2023-49316: Denial of Service via Unbounded Degree in phpseclib Binary Finite Fields
&lt;/h1&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Vulnerability ID:&lt;/strong&gt; CVE-2023-49316&lt;br&gt;
&lt;strong&gt;CVSS Score:&lt;/strong&gt; 7.5&lt;br&gt;
&lt;strong&gt;Published:&lt;/strong&gt; 2026-05-08&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;The phpseclib cryptographic library version 3.x prior to 3.0.34 contains a Denial of Service (DoS) vulnerability in its mathematical field generation logic. When parsing maliciously crafted X.509 certificates or PKCS#8 private keys specifying Elliptic Curve parameters over a binary finite field, the library fails to validate the degree parameter. This flaw allows a remote attacker to force the PHP application to perform unbounded memory allocations, exhausting server resources and terminating the application worker process.&lt;/p&gt;

&lt;h2&gt;
  
  
  TL;DR
&lt;/h2&gt;

&lt;p&gt;phpseclib 3.x before 3.0.34 fails to bound the degree parameter when parsing Elliptic Curve keys over binary fields, allowing unauthenticated attackers to cause a fatal Out-Of-Memory (OOM) crash via a crafted ASN.1 payload.&lt;/p&gt;




&lt;h3&gt;
  
  
  ⚠️ Exploit Status: POC
&lt;/h3&gt;

&lt;h2&gt;
  
  
  Technical Details
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;CWE ID&lt;/strong&gt;: CWE-834&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Attack Vector&lt;/strong&gt;: Network&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;CVSS v3.1&lt;/strong&gt;: 7.5&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;EPSS Score&lt;/strong&gt;: 0.15%&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Impact&lt;/strong&gt;: High (Availability)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Exploit Status&lt;/strong&gt;: Proof-of-Concept&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;CISA KEV&lt;/strong&gt;: Not Listed&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Affected Systems
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;phpseclib 3.0.x&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;phpseclib&lt;/strong&gt;: &amp;gt;= 3.0.0, &amp;lt; 3.0.34 (Fixed in: &lt;code&gt;3.0.34&lt;/code&gt;)&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Code Analysis
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Commit: &lt;a href="https://github.com/phpseclib/phpseclib/commit/964d78101a70305df33f442f5490f0adb3b7e77f" rel="noopener noreferrer"&gt;964d781&lt;/a&gt;
&lt;/h3&gt;

&lt;p&gt;Add degree bounds checking to BinaryField constructor to prevent OOM denial of service&lt;/p&gt;

&lt;h2&gt;
  
  
  Exploit Details
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="https://www.usenix.org/system/files/usenixsecurity25-shi-bing.pdf" rel="noopener noreferrer"&gt;Research Paper&lt;/a&gt;: X.509DoS: Exploiting and Detecting Denial-of-Service Vulnerabilities in X.509 Certificate Parsing&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Mitigation Strategies
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Upgrade phpseclib to version 3.0.34 or later.&lt;/li&gt;
&lt;li&gt;Implement application-level exception handling for OutOfBoundsException during cryptographic material parsing.&lt;/li&gt;
&lt;li&gt;Enforce strict file size limits on endpoints accepting user-uploaded certificate files.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Remediation Steps:&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Identify the project dependencies using composer: &lt;code&gt;composer show phpseclib/phpseclib&lt;/code&gt;.&lt;/li&gt;
&lt;li&gt;Update the composer requirement to pull the latest 3.0.x patch: &lt;code&gt;composer require phpseclib/phpseclib:^3.0.34&lt;/code&gt;.&lt;/li&gt;
&lt;li&gt;Execute &lt;code&gt;composer update&lt;/code&gt;.&lt;/li&gt;
&lt;li&gt;Deploy the updated &lt;code&gt;composer.lock&lt;/code&gt; file to production environments.&lt;/li&gt;
&lt;li&gt;Audit all calls to &lt;code&gt;EC::loadFormat()&lt;/code&gt; to ensure proper &lt;code&gt;try...catch&lt;/code&gt; blocks encompass the parsing logic.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  References
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://github.com/advisories/GHSA-2f25-pfq3-c7h8" rel="noopener noreferrer"&gt;GitHub Security Advisory: GHSA-2f25-pfq3-c7h8&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/phpseclib/phpseclib/commit/964d78101a70305df33f442f5490f0adb3b7e77f" rel="noopener noreferrer"&gt;Fix Commit in phpseclib&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.usenix.org/system/files/usenixsecurity25-shi-bing.pdf" rel="noopener noreferrer"&gt;USENIX Paper: X.509DoS&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;




&lt;p&gt;&lt;em&gt;&lt;a href="https://cvereports.com/reports/CVE-2023-49316" rel="noopener noreferrer"&gt;Read the full report for CVE-2023-49316 on our website&lt;/a&gt; for more details including interactive diagrams and full exploit analysis.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>security</category>
      <category>cve</category>
      <category>cybersecurity</category>
    </item>
    <item>
      <title>GHSA-MV93-W799-CJ2W: GHSA-MV93-W799-CJ2W: Remote Code Execution via Config Section Injection in GitPython</title>
      <dc:creator>CVE Reports</dc:creator>
      <pubDate>Sat, 09 May 2026 05:40:29 +0000</pubDate>
      <link>https://dev.to/cverports/ghsa-mv93-w799-cj2w-ghsa-mv93-w799-cj2w-remote-code-execution-via-config-section-injection-in-2a11</link>
      <guid>https://dev.to/cverports/ghsa-mv93-w799-cj2w-ghsa-mv93-w799-cj2w-remote-code-execution-via-config-section-injection-in-2a11</guid>
      <description>&lt;h1&gt;
  
  
  GHSA-MV93-W799-CJ2W: Remote Code Execution via Config Section Injection in GitPython
&lt;/h1&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Vulnerability ID:&lt;/strong&gt; GHSA-MV93-W799-CJ2W&lt;br&gt;
&lt;strong&gt;CVSS Score:&lt;/strong&gt; 7.8&lt;br&gt;
&lt;strong&gt;Published:&lt;/strong&gt; 2026-05-08&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;GitPython versions prior to 3.1.50 are vulnerable to a newline injection attack in the &lt;code&gt;config_writer()&lt;/code&gt; and &lt;code&gt;set_value()&lt;/code&gt; methods. An incomplete fix for CVE-2026-44244 failed to sanitize the configuration section parameter, allowing an attacker to inject malicious Git configuration blocks such as &lt;code&gt;[core]&lt;/code&gt; and override the &lt;code&gt;hooksPath&lt;/code&gt;. This leads to unauthenticated remote code execution when subsequent Git operations trigger the injected hooks.&lt;/p&gt;

&lt;h2&gt;
  
  
  TL;DR
&lt;/h2&gt;

&lt;p&gt;Newline injection in GitPython's config_writer section parameter allows attackers to override core.hooksPath and achieve Remote Code Execution.&lt;/p&gt;




&lt;h3&gt;
  
  
  ⚠️ Exploit Status: POC
&lt;/h3&gt;

&lt;h2&gt;
  
  
  Technical Details
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;CWE ID&lt;/strong&gt;: CWE-94, CWE-150&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Attack Vector&lt;/strong&gt;: Local (via Application Input)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;CVSS Base Score&lt;/strong&gt;: 7.8 (High)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Exploit Status&lt;/strong&gt;: Proof of Concept Available&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Impact&lt;/strong&gt;: Remote Code Execution via Git Hooks&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Patched Version&lt;/strong&gt;: 3.1.50&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Affected Systems
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;GitPython pip package&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;GitPython&lt;/strong&gt;: &amp;lt; 3.1.50 (Fixed in: &lt;code&gt;3.1.50&lt;/code&gt;)&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Mitigation Strategies
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Upgrade GitPython pip package to version 3.1.50 or later.&lt;/li&gt;
&lt;li&gt;Implement application-level input validation to sanitize user input passed to GitPython API.&lt;/li&gt;
&lt;li&gt;Reject or strip newline characters (\n, \r) from configuration section variables.&lt;/li&gt;
&lt;li&gt;Monitor .git/config files for anomalous structures and unexpected hooksPath entries.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Remediation Steps:&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Identify all projects utilizing the GitPython library within the environment.&lt;/li&gt;
&lt;li&gt;Update the GitPython dependency to &amp;gt;= 3.1.50 via package manager (e.g., pip install --upgrade GitPython).&lt;/li&gt;
&lt;li&gt;Review application source code for calls to &lt;code&gt;config_writer().set_value()&lt;/code&gt; and &lt;code&gt;config_writer().add_section()&lt;/code&gt;.&lt;/li&gt;
&lt;li&gt;Ensure input passed to these methods is heavily sanitized if derived from external sources.&lt;/li&gt;
&lt;li&gt;Deploy file integrity monitoring rules to alert on modifications to repository &lt;code&gt;.git/config&lt;/code&gt; files introducing new &lt;code&gt;hooksPath&lt;/code&gt; directives.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  References
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://github.com/advisories/GHSA-MV93-W799-CJ2W" rel="noopener noreferrer"&gt;GitHub Advisory Database: GHSA-MV93-W799-CJ2W&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/gitpython-developers/GitPython/security/advisories" rel="noopener noreferrer"&gt;GitPython Security Advisories&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://advisories.gitlab.com/advisories/GHSA-mv93-w799-cj2w" rel="noopener noreferrer"&gt;GitLab Advisory Database: GHSA-mv93-w799-cj2w&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2026-44244" rel="noopener noreferrer"&gt;NVD Detail (Related CVE-2026-44244)&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;




&lt;p&gt;&lt;em&gt;&lt;a href="https://cvereports.com/reports/GHSA-MV93-W799-CJ2W" rel="noopener noreferrer"&gt;Read the full report for GHSA-MV93-W799-CJ2W on our website&lt;/a&gt; for more details including interactive diagrams and full exploit analysis.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>security</category>
      <category>cve</category>
      <category>cybersecurity</category>
      <category>ghsa</category>
    </item>
    <item>
      <title>CVE-2026-6860: CVE-2026-6860: Unbounded SNI Cache Growth in Eclipse Vert.x</title>
      <dc:creator>CVE Reports</dc:creator>
      <pubDate>Sat, 09 May 2026 05:10:28 +0000</pubDate>
      <link>https://dev.to/cverports/cve-2026-6860-cve-2026-6860-unbounded-sni-cache-growth-in-eclipse-vertx-29p5</link>
      <guid>https://dev.to/cverports/cve-2026-6860-cve-2026-6860-unbounded-sni-cache-growth-in-eclipse-vertx-29p5</guid>
      <description>&lt;h1&gt;
  
  
  CVE-2026-6860: Unbounded SNI Cache Growth in Eclipse Vert.x
&lt;/h1&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Vulnerability ID:&lt;/strong&gt; CVE-2026-6860&lt;br&gt;
&lt;strong&gt;CVSS Score:&lt;/strong&gt; 5.3&lt;br&gt;
&lt;strong&gt;Published:&lt;/strong&gt; 2026-05-09&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Eclipse Vert.x suffers from an uncontrolled resource consumption vulnerability within its Server Name Indication (SNI) processing logic. When server-side SNI is enabled alongside a wildcard TLS certificate, unauthenticated remote attackers can exhaust server memory by initiating handshakes with continuous unique hostname values, ultimately resulting in a Denial of Service (DoS).&lt;/p&gt;

&lt;h2&gt;
  
  
  TL;DR
&lt;/h2&gt;

&lt;p&gt;A flaw in the SNI caching mechanism of Eclipse Vert.x allows remote attackers to trigger out-of-memory (OOM) conditions. By sending numerous TLS ClientHello messages with uniquely generated hostnames matching a wildcard certificate, an attacker bypasses cache hits and forces the unbounded allocation of &lt;code&gt;SslContext&lt;/code&gt; objects in JVM memory.&lt;/p&gt;




&lt;h3&gt;
  
  
  ⚠️ Exploit Status: POC
&lt;/h3&gt;

&lt;h2&gt;
  
  
  Technical Details
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;CWE ID&lt;/strong&gt;: CWE-400&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Attack Vector&lt;/strong&gt;: Network&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;CVSS v4.0 Score&lt;/strong&gt;: 6.9 (Medium)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;CVSS v3.1 Score&lt;/strong&gt;: 5.3 (Medium)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Impact&lt;/strong&gt;: Denial of Service (OOM)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Exploit Status&lt;/strong&gt;: Proof of Concept&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;EPSS Percentile&lt;/strong&gt;: 6.48%&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;KEV Status&lt;/strong&gt;: Not Listed&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Affected Systems
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Eclipse Vert.x Applications&lt;/li&gt;
&lt;li&gt;Java Virtual Machine (JVM) instances running Vert.x TLS&lt;/li&gt;
&lt;li&gt;Microservices utilizing io.vertx:vertx-core for SNI termination&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;io.vertx:vertx-core&lt;/strong&gt;: &amp;gt;= 4.3.4, &amp;lt;= 4.3.8 (Fixed in: &lt;code&gt;4.3.9&lt;/code&gt;)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;io.vertx:vertx-core&lt;/strong&gt;: &amp;gt;= 4.4.0, &amp;lt;= 4.4.9 (Fixed in: &lt;code&gt;4.4.10&lt;/code&gt;)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;io.vertx:vertx-core&lt;/strong&gt;: &amp;gt;= 4.5.0, &amp;lt;= 4.5.26 (Fixed in: &lt;code&gt;4.5.27&lt;/code&gt;)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;io.vertx:vertx-core&lt;/strong&gt;: &amp;gt;= 5.0.0, &amp;lt;= 5.0.11 (Fixed in: &lt;code&gt;5.0.12&lt;/code&gt;)&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Mitigation Strategies
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Upgrade the io.vertx:vertx-core library to a patched version.&lt;/li&gt;
&lt;li&gt;Disable server-side SNI via configuration if not strictly required.&lt;/li&gt;
&lt;li&gt;Offload TLS termination to a network edge component (e.g., Nginx, HAProxy, AWS ALB).&lt;/li&gt;
&lt;li&gt;Avoid the use of wildcard certificates where strict domain matching is possible.&lt;/li&gt;
&lt;li&gt;Implement rate limiting for new TLS handshake connections per source IP address.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Remediation Steps:&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Identify all projects and microservices depending on io.vertx:vertx-core.&lt;/li&gt;
&lt;li&gt;Update dependency management files (pom.xml for Maven, build.gradle for Gradle) to specify the appropriate patched version.&lt;/li&gt;
&lt;li&gt;Recompile and execute integration test suites to verify compatibility with the new minor release.&lt;/li&gt;
&lt;li&gt;Deploy the updated application artifact to the staging environment and monitor heap usage.&lt;/li&gt;
&lt;li&gt;Promote the patched application to the production environment.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  References
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2026-6860" rel="noopener noreferrer"&gt;NVD Vulnerability Detail&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.cve.org/CVERecord?id=CVE-2026-6860" rel="noopener noreferrer"&gt;CVE.org Record&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/eclipse-vertx/vert.x/security/advisories/GHSA-3g76-f9xq-8vp6" rel="noopener noreferrer"&gt;GitHub Security Advisory GHSA-3g76-f9xq-8vp6&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/eclipse-vertx/vert.x/pull/6102" rel="noopener noreferrer"&gt;Eclipse Vert.x Pull Request #6102&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/381" rel="noopener noreferrer"&gt;GitLab Security Issue #381&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;




&lt;p&gt;&lt;em&gt;&lt;a href="https://cvereports.com/reports/CVE-2026-6860" rel="noopener noreferrer"&gt;Read the full report for CVE-2026-6860 on our website&lt;/a&gt; for more details including interactive diagrams and full exploit analysis.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>security</category>
      <category>cve</category>
      <category>cybersecurity</category>
    </item>
    <item>
      <title>GHSA-V6WJ-C83F-V46X: GHSA-v6wj-c83f-v46x: Critical OS Command Injection in @profullstack/mcp-server domain_lookup Module</title>
      <dc:creator>CVE Reports</dc:creator>
      <pubDate>Sat, 09 May 2026 04:40:29 +0000</pubDate>
      <link>https://dev.to/cverports/ghsa-v6wj-c83f-v46x-ghsa-v6wj-c83f-v46x-critical-os-command-injection-in-profullstackmcp-server-2dne</link>
      <guid>https://dev.to/cverports/ghsa-v6wj-c83f-v46x-ghsa-v6wj-c83f-v46x-critical-os-command-injection-in-profullstackmcp-server-2dne</guid>
      <description>&lt;h1&gt;
  
  
  GHSA-v6wj-c83f-v46x: Critical OS Command Injection in @profullstack/mcp-server domain_lookup Module
&lt;/h1&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Vulnerability ID:&lt;/strong&gt; GHSA-V6WJ-C83F-V46X&lt;br&gt;
&lt;strong&gt;CVSS Score:&lt;/strong&gt; 9.8&lt;br&gt;
&lt;strong&gt;Published:&lt;/strong&gt; 2026-05-09&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;A critical unauthenticated OS Command Injection vulnerability (CWE-78) exists in the &lt;code&gt;@profullstack/mcp-server&lt;/code&gt; npm package, specifically within the &lt;code&gt;domain_lookup&lt;/code&gt; module. The vulnerability allows remote attackers to execute arbitrary commands on the host system via crafted HTTP requests.&lt;/p&gt;

&lt;h2&gt;
  
  
  TL;DR
&lt;/h2&gt;

&lt;p&gt;The &lt;code&gt;@profullstack/mcp-server&lt;/code&gt; package (versions &amp;lt;= 1.4.12) is vulnerable to unauthenticated OS Command Injection. The &lt;code&gt;domain_lookup&lt;/code&gt; module unsafely concatenates user-supplied input into a shell command, enabling remote code execution.&lt;/p&gt;




&lt;h3&gt;
  
  
  ⚠️ Exploit Status: POC
&lt;/h3&gt;

&lt;h2&gt;
  
  
  Technical Details
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;CWE ID&lt;/strong&gt;: CWE-78&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Attack Vector&lt;/strong&gt;: Network&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;CVSS Score&lt;/strong&gt;: 9.8 (Critical)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Impact&lt;/strong&gt;: Arbitrary Remote Code Execution&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Exploit Status&lt;/strong&gt;: Proof of Concept Available&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Privileges Required&lt;/strong&gt;: None&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Affected Systems
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;@profullstack/mcp-server npm package&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;@profullstack/mcp-server&lt;/strong&gt;: &amp;lt;= 1.4.12&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Mitigation Strategies
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Replace child_process.exec with child_process.spawn to pass arguments safely as arrays.&lt;/li&gt;
&lt;li&gt;Implement strict regex-based input validation for domain names enforcing RFC 1035 compliance.&lt;/li&gt;
&lt;li&gt;Enforce global authentication middleware across all modular endpoints.&lt;/li&gt;
&lt;li&gt;Execute the Node.js server process under a dedicated, unprivileged user account.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Remediation Steps:&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Identify all deployments running @profullstack/mcp-server versions &amp;lt;= 1.4.12.&lt;/li&gt;
&lt;li&gt;Modify service.js to utilize child_process.spawn instead of execAsync.&lt;/li&gt;
&lt;li&gt;Implement a regex validation check (e.g., /^[a-zA-Z0-9.-]+$/) on the domains and keywords input arrays.&lt;/li&gt;
&lt;li&gt;Restart the Node.js application process.&lt;/li&gt;
&lt;li&gt;Review system logs and process trees for unauthorized executions or shell spawns indicating prior compromise.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  References
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://github.com/profullstack/mcp-server/security/advisories/GHSA-v6wj-c83f-v46x" rel="noopener noreferrer"&gt;GitHub Advisory&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://osv.dev/vulnerability/GHSA-v6wj-c83f-v46x" rel="noopener noreferrer"&gt;OSV Database&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.npmjs.com/package/@profullstack/mcp-server" rel="noopener noreferrer"&gt;NPM Package&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;




&lt;p&gt;&lt;em&gt;&lt;a href="https://cvereports.com/reports/GHSA-V6WJ-C83F-V46X" rel="noopener noreferrer"&gt;Read the full report for GHSA-V6WJ-C83F-V46X on our website&lt;/a&gt; for more details including interactive diagrams and full exploit analysis.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>security</category>
      <category>cve</category>
      <category>cybersecurity</category>
      <category>ghsa</category>
    </item>
    <item>
      <title>GHSA-QHH4-458H-XWH2: GHSA-qhh4-458h-xwh2: Credential Leakage via Origin Validation Error in cdxgen</title>
      <dc:creator>CVE Reports</dc:creator>
      <pubDate>Fri, 08 May 2026 22:10:29 +0000</pubDate>
      <link>https://dev.to/cverports/ghsa-qhh4-458h-xwh2-ghsa-qhh4-458h-xwh2-credential-leakage-via-origin-validation-error-in-cdxgen-103g</link>
      <guid>https://dev.to/cverports/ghsa-qhh4-458h-xwh2-ghsa-qhh4-458h-xwh2-credential-leakage-via-origin-validation-error-in-cdxgen-103g</guid>
      <description>&lt;h1&gt;
  
  
  GHSA-qhh4-458h-xwh2: Credential Leakage via Origin Validation Error in cdxgen
&lt;/h1&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Vulnerability ID:&lt;/strong&gt; GHSA-QHH4-458H-XWH2&lt;br&gt;
&lt;strong&gt;CVSS Score:&lt;/strong&gt; 5.3&lt;br&gt;
&lt;strong&gt;Published:&lt;/strong&gt; 2026-05-08&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;The @cyclonedx/cdxgen package is vulnerable to credential leakage due to improper Docker registry origin validation. A flaw in how registry authentication endpoints are matched against configured credentials allows arbitrary downstream registries to capture private credentials.&lt;/p&gt;

&lt;h2&gt;
  
  
  TL;DR
&lt;/h2&gt;

&lt;p&gt;Versions 9.9.5 through 12.3.2 of @cyclonedx/cdxgen leak Docker registry credentials due to an insecure substring matching implementation. Upgrading to version 12.3.3 resolves the vulnerability by introducing strict hostname normalization.&lt;/p&gt;




&lt;h3&gt;
  
  
  ⚠️ Exploit Status: POC
&lt;/h3&gt;

&lt;h2&gt;
  
  
  Technical Details
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;CWE ID&lt;/strong&gt;: CWE-346, CWE-522&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Attack Vector&lt;/strong&gt;: Network&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;CVSS v4.0&lt;/strong&gt;: 5.3 (Medium)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Impact&lt;/strong&gt;: Credential Leakage&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Exploit Status&lt;/strong&gt;: Proof of Concept&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;KEV Status&lt;/strong&gt;: Not Listed&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Affected Systems
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;macOS / Linux / Windows running Node.js and @cyclonedx/cdxgen &amp;lt; 12.3.3&lt;/li&gt;
&lt;li&gt;CI/CD pipelines utilizing vulnerable versions for SBOM generation&lt;/li&gt;
&lt;li&gt;Docker Daemon instances invoked by vulnerable cdxgen processes&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;@cyclonedx/cdxgen&lt;/strong&gt;: &amp;gt;= 9.9.5, &amp;lt; 12.3.3 (Fixed in: &lt;code&gt;12.3.3&lt;/code&gt;)&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Code Analysis
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Commit: &lt;a href="https://github.com/cdxgen/cdxgen/commit/b1e179869fd7c6032c3d483c3f7bd4d7154ec22b" rel="noopener noreferrer"&gt;b1e1798&lt;/a&gt;
&lt;/h3&gt;

&lt;p&gt;Fix: Implement strict hostname normalization and validation for Docker registry authentication mapping.&lt;/p&gt;

&lt;h2&gt;
  
  
  Mitigation Strategies
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Upgrade @cyclonedx/cdxgen to version 12.3.3 or later.&lt;/li&gt;
&lt;li&gt;Rotate Docker registry credentials used in environments that previously ran vulnerable versions.&lt;/li&gt;
&lt;li&gt;Implement strict egress network filtering on CI/CD build nodes to prevent unauthorized outbound connections.&lt;/li&gt;
&lt;li&gt;Utilize dynamic, short-lived authentication tokens instead of static configurations in ~/.docker/config.json.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Remediation Steps:&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Identify all global and local installations of @cyclonedx/cdxgen across developer machines and build servers.&lt;/li&gt;
&lt;li&gt;Execute the update command: npm install -g @cyclonedx/cdxgen@latest&lt;/li&gt;
&lt;li&gt;Verify the installed version using: cdxgen --version (Must output &amp;gt;= 12.3.3).&lt;/li&gt;
&lt;li&gt;Revoke and regenerate service account tokens used by CI/CD pipelines for internal Docker registries.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  References
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://github.com/advisories/GHSA-qhh4-458h-xwh2" rel="noopener noreferrer"&gt;GitHub Advisory: GHSA-qhh4-458h-xwh2&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/cdxgen/cdxgen" rel="noopener noreferrer"&gt;Official Repository&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/cdxgen/cdxgen/pull/3964" rel="noopener noreferrer"&gt;Fix Pull Request&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://osv.dev/vulnerability/GHSA-qhh4-458h-xwh2" rel="noopener noreferrer"&gt;OSV Advisory&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;




&lt;p&gt;&lt;em&gt;&lt;a href="https://cvereports.com/reports/GHSA-QHH4-458H-XWH2" rel="noopener noreferrer"&gt;Read the full report for GHSA-QHH4-458H-XWH2 on our website&lt;/a&gt; for more details including interactive diagrams and full exploit analysis.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>security</category>
      <category>cve</category>
      <category>cybersecurity</category>
      <category>ghsa</category>
    </item>
    <item>
      <title>CVE-2026-32689: CVE-2026-32689: Denial of Service in Phoenix Framework LongPoll Transport via NDJSON Payload Amplification</title>
      <dc:creator>CVE Reports</dc:creator>
      <pubDate>Fri, 08 May 2026 20:40:29 +0000</pubDate>
      <link>https://dev.to/cverports/cve-2026-32689-cve-2026-32689-denial-of-service-in-phoenix-framework-longpoll-transport-via-3m55</link>
      <guid>https://dev.to/cverports/cve-2026-32689-cve-2026-32689-denial-of-service-in-phoenix-framework-longpoll-transport-via-3m55</guid>
      <description>&lt;h1&gt;
  
  
  CVE-2026-32689: Denial of Service in Phoenix Framework LongPoll Transport via NDJSON Payload Amplification
&lt;/h1&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Vulnerability ID:&lt;/strong&gt; CVE-2026-32689&lt;br&gt;
&lt;strong&gt;CVSS Score:&lt;/strong&gt; 8.7&lt;br&gt;
&lt;strong&gt;Published:&lt;/strong&gt; 2026-05-08&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;The Phoenix Framework contains a high-severity Denial of Service vulnerability in its LongPoll transport mechanism. The vulnerability is caused by unbounded memory allocation when processing Newline Delimited JSON (NDJSON) payloads. Unauthenticated attackers can trigger Out-Of-Memory conditions on the host BEAM node, terminating all active sessions by forcing the server to evaluate excessive newline characters.&lt;/p&gt;

&lt;h2&gt;
  
  
  TL;DR
&lt;/h2&gt;

&lt;p&gt;Unauthenticated remote attackers can crash Phoenix Framework nodes by sending an 8MB NDJSON payload consisting entirely of newline characters to the LongPoll endpoint, triggering memory exhaustion via eager string evaluation.&lt;/p&gt;




&lt;h3&gt;
  
  
  ⚠️ Exploit Status: POC
&lt;/h3&gt;

&lt;h2&gt;
  
  
  Technical Details
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;CWE ID&lt;/strong&gt;: CWE-770&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Attack Vector&lt;/strong&gt;: Network&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;CVSS Base Score&lt;/strong&gt;: 8.7 (High)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;EPSS Score&lt;/strong&gt;: 0.00045&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Impact&lt;/strong&gt;: Denial of Service (Node Crash)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Exploit Status&lt;/strong&gt;: Unexploited / PoC Only&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;CISA KEV&lt;/strong&gt;: No&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Affected Systems
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Phoenix Framework (phoenix Hex package) &amp;lt; 1.7.22&lt;/li&gt;
&lt;li&gt;Phoenix Framework (phoenix Hex package) 1.8.x &amp;lt; 1.8.6&lt;/li&gt;
&lt;li&gt;Any Elixir application exposing Phoenix LiveView endpoints via LongPoll&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Phoenix Framework&lt;/strong&gt;: &amp;gt;= 1.7.0, &amp;lt; 1.7.22 (Fixed in: &lt;code&gt;1.7.22&lt;/code&gt;)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Phoenix Framework&lt;/strong&gt;: &amp;gt;= 1.8.0, &amp;lt; 1.8.6 (Fixed in: &lt;code&gt;1.8.6&lt;/code&gt;)&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Code Analysis
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Commit: &lt;a href="https://github.com/phoenixframework/phoenix/commit/1a67c61ff9ce0a7711662ac7354861917a7c80f7" rel="noopener noreferrer"&gt;1a67c61&lt;/a&gt;
&lt;/h3&gt;

&lt;p&gt;Server-side fix to replace String.split with String.splitter for lazy parsing.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight diff"&gt;&lt;code&gt;&lt;span class="p"&gt;Replaces String.split/2 and Enum.map with String.splitter/2 and Enum.find
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h3&gt;
  
  
  Commit: &lt;a href="https://github.com/phoenixframework/phoenix/commit/912ea181fd247c21dbcc49fb97d0053b947d81bf" rel="noopener noreferrer"&gt;912ea18&lt;/a&gt;
&lt;/h3&gt;

&lt;p&gt;Client-side fix to implement MAX_LONGPOLL_BATCH_SIZE in JavaScript.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight diff"&gt;&lt;code&gt;&lt;span class="p"&gt;Adds logic to split large longpoll message batches into chunks of 100
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h2&gt;
  
  
  Mitigation Strategies
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Upgrade Phoenix framework to patched versions (1.7.22 or 1.8.6).&lt;/li&gt;
&lt;li&gt;Disable the LongPoll transport in Phoenix.Socket configurations if WebSocket connections are sufficient.&lt;/li&gt;
&lt;li&gt;Implement network-level size restrictions or WAF rules to drop anomalous POST requests containing excessive application/x-ndjson payloads.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Remediation Steps:&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Identify the current version of the &lt;code&gt;phoenix&lt;/code&gt; Hex package running in your application environments.&lt;/li&gt;
&lt;li&gt;Update the &lt;code&gt;mix.exs&lt;/code&gt; dependencies to require at least &lt;code&gt;~&amp;gt; 1.7.22&lt;/code&gt; or &lt;code&gt;~&amp;gt; 1.8.6&lt;/code&gt;.&lt;/li&gt;
&lt;li&gt;Run &lt;code&gt;mix deps.get&lt;/code&gt; and &lt;code&gt;mix deps.compile&lt;/code&gt; to fetch and compile the updated framework code.&lt;/li&gt;
&lt;li&gt;If patching is delayed, modify the endpoint module to set &lt;code&gt;longpoll: false&lt;/code&gt; inside the socket declarations.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  References
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://github.com/phoenixframework/phoenix/security/advisories/GHSA-628h-q48j-jr6q" rel="noopener noreferrer"&gt;GitHub Advisory: GHSA-628h-q48j-jr6q&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cna.erlef.org/cves/CVE-2026-32689.html" rel="noopener noreferrer"&gt;Erlang Ecosystem Foundation CNA Record&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://osv.dev/vulnerability/EEF-CVE-2026-32689" rel="noopener noreferrer"&gt;OSV Record for EEF-CVE-2026-32689&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;




&lt;p&gt;&lt;em&gt;&lt;a href="https://cvereports.com/reports/CVE-2026-32689" rel="noopener noreferrer"&gt;Read the full report for CVE-2026-32689 on our website&lt;/a&gt; for more details including interactive diagrams and full exploit analysis.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>security</category>
      <category>cve</category>
      <category>cybersecurity</category>
    </item>
    <item>
      <title>CVE-2026-44499: CVE-2026-44499: Permanent Block Discovery Halt in Zebra via Gossip Queue Saturation</title>
      <dc:creator>CVE Reports</dc:creator>
      <pubDate>Fri, 08 May 2026 20:10:29 +0000</pubDate>
      <link>https://dev.to/cverports/cve-2026-44499-cve-2026-44499-permanent-block-discovery-halt-in-zebra-via-gossip-queue-saturation-2m3j</link>
      <guid>https://dev.to/cverports/cve-2026-44499-cve-2026-44499-permanent-block-discovery-halt-in-zebra-via-gossip-queue-saturation-2m3j</guid>
      <description>&lt;h1&gt;
  
  
  CVE-2026-44499: Permanent Block Discovery Halt in Zebra via Gossip Queue Saturation
&lt;/h1&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Vulnerability ID:&lt;/strong&gt; CVE-2026-44499&lt;br&gt;
&lt;strong&gt;CVSS Score:&lt;/strong&gt; 8.7&lt;br&gt;
&lt;strong&gt;Published:&lt;/strong&gt; 2026-05-08&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;CVE-2026-44499 is a composite Denial of Service (DoS) vulnerability affecting Zebra, the Rust implementation of a Zcash full node. By exploiting architectural flaws in the peer-to-peer (P2P) communication stack, an unauthenticated attacker can saturate internal message queues and poison the chain discovery process, permanently isolating the target node from the network.&lt;/p&gt;

&lt;h2&gt;
  
  
  TL;DR
&lt;/h2&gt;

&lt;p&gt;Unauthenticated attackers can permanently halt block discovery in Zebra nodes prior to v4.4.0 by saturating the P2P gossip queue and providing unpenalized empty responses to synchronization requests.&lt;/p&gt;




&lt;h2&gt;
  
  
  Technical Details
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;CVSS Score&lt;/strong&gt;: 8.7&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;CWE ID&lt;/strong&gt;: CWE-770&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Attack Vector&lt;/strong&gt;: Network&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Exploit Status&lt;/strong&gt;: None&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;KEV Status&lt;/strong&gt;: Not Listed&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Authentication&lt;/strong&gt;: None Required&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Affected Systems
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Zebra &amp;lt; 4.4.0&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Zebra&lt;/strong&gt;: &amp;lt; 4.4.0 (Fixed in: &lt;code&gt;4.4.0&lt;/code&gt;)&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Code Analysis
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Commit: &lt;a href="https://github.com/ZcashFoundation/zebra/commit/602c8b745c09133a8e8a956fc2ef7abd88b95fe8" rel="noopener noreferrer"&gt;602c8b7&lt;/a&gt;
&lt;/h3&gt;

&lt;p&gt;Implementation of Stall Tracking and peer penalization logic&lt;/p&gt;

&lt;h3&gt;
  
  
  Commit: &lt;a href="https://github.com/ZcashFoundation/zebra/commit/85303ea98ee3fce4f9190b6f05ce3f162f8b5ffd" rel="noopener noreferrer"&gt;85303ea&lt;/a&gt;
&lt;/h3&gt;

&lt;p&gt;Allocation hardening and size bounds enforcement&lt;/p&gt;

&lt;h2&gt;
  
  
  Mitigation Strategies
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Upgrade to Zebra version 4.4.0 or later.&lt;/li&gt;
&lt;li&gt;Implement network-level rate limiting for inbound P2P connections.&lt;/li&gt;
&lt;li&gt;Monitor node synchronization metrics for abrupt halts in block height progression.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Remediation Steps:&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Stop the affected Zebra service gracefully.&lt;/li&gt;
&lt;li&gt;Update the Zebra binary to version 4.4.0 via your package manager or by compiling from the official repository.&lt;/li&gt;
&lt;li&gt;Restart the Zebra service and monitor the logs to verify successful synchronization with the network.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  References
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://github.com/ZcashFoundation/zebra/security/advisories/GHSA-h9hm-m2xj-4rq9" rel="noopener noreferrer"&gt;GitHub Security Advisory: GHSA-h9hm-m2xj-4rq9&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.cve.org/CVERecord?id=CVE-2026-44499" rel="noopener noreferrer"&gt;CVE.org Record for CVE-2026-44499&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;




&lt;p&gt;&lt;em&gt;&lt;a href="https://cvereports.com/reports/CVE-2026-44499" rel="noopener noreferrer"&gt;Read the full report for CVE-2026-44499 on our website&lt;/a&gt; for more details including interactive diagrams and full exploit analysis.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>security</category>
      <category>cve</category>
      <category>cybersecurity</category>
    </item>
    <item>
      <title>CVE-2026-6322: CVE-2026-6322: Host Confusion via Interpretation Conflict in fast-uri</title>
      <dc:creator>CVE Reports</dc:creator>
      <pubDate>Fri, 08 May 2026 19:40:29 +0000</pubDate>
      <link>https://dev.to/cverports/cve-2026-6322-cve-2026-6322-host-confusion-via-interpretation-conflict-in-fast-uri-7a8</link>
      <guid>https://dev.to/cverports/cve-2026-6322-cve-2026-6322-host-confusion-via-interpretation-conflict-in-fast-uri-7a8</guid>
      <description>&lt;h1&gt;
  
  
  CVE-2026-6322: Host Confusion via Interpretation Conflict in fast-uri
&lt;/h1&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Vulnerability ID:&lt;/strong&gt; CVE-2026-6322&lt;br&gt;
&lt;strong&gt;CVSS Score:&lt;/strong&gt; 7.5&lt;br&gt;
&lt;strong&gt;Published:&lt;/strong&gt; 2026-05-08&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;The fast-uri library exhibits an interpretation conflict vulnerability due to improper handling of percent-encoded authority delimiters during normalization. This flaw enables attackers to bypass domain validation and perform host confusion attacks against downstream components.&lt;/p&gt;

&lt;h2&gt;
  
  
  TL;DR
&lt;/h2&gt;

&lt;p&gt;fast-uri &amp;lt;= 3.1.1 improperly decodes percent-encoded delimiters (like %40) in the host component without re-encoding them, causing downstream parsers to misinterpret the URI structure. Upgrading to 3.1.2 resolves the issue.&lt;/p&gt;




&lt;h3&gt;
  
  
  ⚠️ Exploit Status: POC
&lt;/h3&gt;

&lt;h2&gt;
  
  
  Technical Details
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;CWE ID&lt;/strong&gt;: CWE-436&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Attack Vector&lt;/strong&gt;: Network&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;CVSS v3.1&lt;/strong&gt;: 7.5 (High)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;EPSS Score&lt;/strong&gt;: 0.00029&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Impact&lt;/strong&gt;: Integrity Subversion / SSRF Bypass&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Exploit Status&lt;/strong&gt;: Proof of Concept&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;CISA KEV&lt;/strong&gt;: Not Listed&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Affected Systems
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;fast-uri&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;fast-uri&lt;/strong&gt;: &amp;lt;= 3.1.1 (Fixed in: &lt;code&gt;3.1.2&lt;/code&gt;)&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Code Analysis
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Commit: &lt;a href="https://github.com/fastify/fast-uri/commit/6c86c17c3d76fb93aa3700ec6c0fa00faeb97293" rel="noopener noreferrer"&gt;6c86c17&lt;/a&gt;
&lt;/h3&gt;

&lt;p&gt;Re-escape gen-delims in host&lt;/p&gt;

&lt;h3&gt;
  
  
  Commit: &lt;a href="https://github.com/fastify/fast-uri/commit/919dd8ea7689fcc220d0d9b71307f5095e723ef9" rel="noopener noreferrer"&gt;919dd8e&lt;/a&gt;
&lt;/h3&gt;

&lt;p&gt;Version 3.1.2 Bump&lt;/p&gt;

&lt;h2&gt;
  
  
  Exploit Details
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="https://github.com/fastify/fast-uri/security/advisories/GHSA-v39h-62p7-jpjc" rel="noopener noreferrer"&gt;GitHub Advisory&lt;/a&gt;: Technical root cause and reproduction steps mapping the SSRF bypass payload.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Mitigation Strategies
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Upgrade fast-uri to version 3.1.2 or later.&lt;/li&gt;
&lt;li&gt;Implement robust pre-validation checks rejecting URIs with percent-encoded reserved characters in the host.&lt;/li&gt;
&lt;li&gt;Unify URI parsing logic to use the exact same library for both security validation and request execution.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Remediation Steps:&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Identify all projects depending on fast-uri via package-lock.json or yarn.lock.&lt;/li&gt;
&lt;li&gt;Execute the package manager update command targeting &lt;a href="mailto:fast-uri@3.1.2"&gt;fast-uri@3.1.2&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Run regression tests on URI parsing and normalization workflows.&lt;/li&gt;
&lt;li&gt;Deploy the updated application build to production environments.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  References
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://github.com/fastify/fast-uri/security/advisories/GHSA-v39h-62p7-jpjc" rel="noopener noreferrer"&gt;GitHub Security Advisory (GHSA-v39h-62p7-jpjc)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/fastify/fast-uri/commit/6c86c17c3d76fb93aa3700ec6c0fa00faeb97293" rel="noopener noreferrer"&gt;Fix Commit: Re-escape gen-delims in host&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/fastify/fast-uri/commit/919dd8ea7689fcc220d0d9b71307f5095e723ef9" rel="noopener noreferrer"&gt;Fix Commit: Version 3.1.2 Bump&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cna.openjsf.org/security-advisories.html" rel="noopener noreferrer"&gt;OpenJS Foundation Security Advisories&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.cve.org/CVERecord?id=CVE-2026-6322" rel="noopener noreferrer"&gt;CVE.org Record&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;




&lt;p&gt;&lt;em&gt;&lt;a href="https://cvereports.com/reports/CVE-2026-6322" rel="noopener noreferrer"&gt;Read the full report for CVE-2026-6322 on our website&lt;/a&gt; for more details including interactive diagrams and full exploit analysis.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>security</category>
      <category>cve</category>
      <category>cybersecurity</category>
    </item>
    <item>
      <title>CVE-2026-43944: CVE-2026-43944: Arbitrary Local Code Execution in electerm via Malicious Deep Links</title>
      <dc:creator>CVE Reports</dc:creator>
      <pubDate>Fri, 08 May 2026 19:10:30 +0000</pubDate>
      <link>https://dev.to/cverports/cve-2026-43944-cve-2026-43944-arbitrary-local-code-execution-in-electerm-via-malicious-deep-links-eje</link>
      <guid>https://dev.to/cverports/cve-2026-43944-cve-2026-43944-arbitrary-local-code-execution-in-electerm-via-malicious-deep-links-eje</guid>
      <description>&lt;h1&gt;
  
  
  CVE-2026-43944: Arbitrary Local Code Execution in electerm via Malicious Deep Links
&lt;/h1&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Vulnerability ID:&lt;/strong&gt; CVE-2026-43944&lt;br&gt;
&lt;strong&gt;CVSS Score:&lt;/strong&gt; 9.4&lt;br&gt;
&lt;strong&gt;Published:&lt;/strong&gt; 2026-05-08&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;CVE-2026-43944 is a critical vulnerability in the electerm client that allows for arbitrary local code execution. The application insecurely parses deep link arguments and merges untrusted JSON directly into the core session configuration. This enables attackers to override internal state variables, hijacking the application's execution flow to spawn malicious local binaries.&lt;/p&gt;

&lt;h2&gt;
  
  
  TL;DR
&lt;/h2&gt;

&lt;p&gt;A critical flaw in electerm (&amp;lt; 3.8.15) allows attackers to execute arbitrary local binaries via crafted &lt;code&gt;electerm://&lt;/code&gt; URIs or CLI flags. The application insecurely merges user-provided JSON payloads into the main session configuration, enabling protocol and executable hijacking.&lt;/p&gt;




&lt;h3&gt;
  
  
  ⚠️ Exploit Status: POC
&lt;/h3&gt;

&lt;h2&gt;
  
  
  Technical Details
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;CVSS v4.0&lt;/strong&gt;: 9.4 (Critical)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;EPSS Score&lt;/strong&gt;: 0.00144 (0.14%)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;CWE IDs&lt;/strong&gt;: CWE-20, CWE-94, CWE-829&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Attack Vector&lt;/strong&gt;: Network (via URI handler)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Exploit Status&lt;/strong&gt;: Proof of Concept (PoC)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Privileges Required&lt;/strong&gt;: None&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;User Interaction&lt;/strong&gt;: Required&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Affected Systems
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;electerm 3.0.6 - 3.8.14&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;electerm&lt;/strong&gt;: &amp;gt;= 3.0.6, &amp;lt; 3.8.15 (Fixed in: &lt;code&gt;3.8.15&lt;/code&gt;)&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Code Analysis
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Commit: &lt;a href="https://github.com/electerm/electerm/commit/8a6a17951e96d715f5a231532bbd8303fe208700" rel="noopener noreferrer"&gt;8a6a179&lt;/a&gt;
&lt;/h3&gt;

&lt;p&gt;Implemented OPTS_DENY_LIST to prevent overriding 'type' and 'host' via deep links.&lt;/p&gt;

&lt;h3&gt;
  
  
  Commit: &lt;a href="https://github.com/electerm/electerm/commit/a79e06f4a1f0ac6376c3d2411ef4690fa0377742" rel="noopener noreferrer"&gt;a79e06f&lt;/a&gt;
&lt;/h3&gt;

&lt;p&gt;Added check to reject execution paths containing '..' sequence.&lt;/p&gt;

&lt;h2&gt;
  
  
  Mitigation Strategies
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Upgrade electerm to version 3.8.15 or later.&lt;/li&gt;
&lt;li&gt;Unregister the &lt;code&gt;electerm://&lt;/code&gt; protocol handler in the operating system registry or application settings.&lt;/li&gt;
&lt;li&gt;Implement Endpoint Detection and Response (EDR) rules to monitor electerm child process creation.&lt;/li&gt;
&lt;li&gt;Conduct user training to prevent interaction with untrusted deep links.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Remediation Steps:&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Identify all hosts running electerm versions between 3.0.6 and 3.8.14.&lt;/li&gt;
&lt;li&gt;Deploy the 3.8.15 update package via centralized endpoint management tools.&lt;/li&gt;
&lt;li&gt;Verify the update installation by checking the application version string.&lt;/li&gt;
&lt;li&gt;If patching is delayed, execute scripts to remove the &lt;code&gt;electerm://&lt;/code&gt; URI handler association on affected systems.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  References
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://github.com/electerm/electerm/security/advisories/GHSA-mpm8-cx2p-626q" rel="noopener noreferrer"&gt;GitHub Advisory (GHSA-mpm8-cx2p-626q)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2026-43944" rel="noopener noreferrer"&gt;NVD CVE-2026-43944 Record&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;




&lt;p&gt;&lt;em&gt;&lt;a href="https://cvereports.com/reports/CVE-2026-43944" rel="noopener noreferrer"&gt;Read the full report for CVE-2026-43944 on our website&lt;/a&gt; for more details including interactive diagrams and full exploit analysis.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>security</category>
      <category>cve</category>
      <category>cybersecurity</category>
    </item>
    <item>
      <title>GHSA-7HGR-XVRR-XPW3: GHSA-7HGR-XVRR-XPW3: Session Persistence After Password Change in Nhost hasura-auth</title>
      <dc:creator>CVE Reports</dc:creator>
      <pubDate>Fri, 08 May 2026 18:10:29 +0000</pubDate>
      <link>https://dev.to/cverports/ghsa-7hgr-xvrr-xpw3-ghsa-7hgr-xvrr-xpw3-session-persistence-after-password-change-in-nhost-1pjb</link>
      <guid>https://dev.to/cverports/ghsa-7hgr-xvrr-xpw3-ghsa-7hgr-xvrr-xpw3-session-persistence-after-password-change-in-nhost-1pjb</guid>
      <description>&lt;h1&gt;
  
  
  GHSA-7HGR-XVRR-XPW3: Session Persistence After Password Change in Nhost hasura-auth
&lt;/h1&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Vulnerability ID:&lt;/strong&gt; GHSA-7HGR-XVRR-XPW3&lt;br&gt;
&lt;strong&gt;CVSS Score:&lt;/strong&gt; 7.5&lt;br&gt;
&lt;strong&gt;Published:&lt;/strong&gt; 2026-05-08&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;A critical session management vulnerability in Nhost's authentication service allows attackers to maintain unauthorized access following a password reset. The password update operation fails to invalidate existing refresh tokens in the database, violating standard session revocation principles and rendering password changes ineffective as an incident response measure.&lt;/p&gt;

&lt;h2&gt;
  
  
  TL;DR
&lt;/h2&gt;

&lt;p&gt;Nhost's hasura-auth component fails to clear active refresh tokens upon a password change. Attackers holding stolen tokens can continue generating valid access tokens indefinitely.&lt;/p&gt;




&lt;h3&gt;
  
  
  ⚠️ Exploit Status: POC
&lt;/h3&gt;

&lt;h2&gt;
  
  
  Technical Details
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;CWE ID&lt;/strong&gt;: CWE-613: Insufficient Session Expiration&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Attack Vector&lt;/strong&gt;: Network (Requires stolen refresh token)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Estimated CVSS&lt;/strong&gt;: 7.5 (High)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Impact&lt;/strong&gt;: Persistent unauthorized access post-credential rotation&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Exploit Status&lt;/strong&gt;: Conceptually straightforward, requires prerequisite compromise&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Patch Status&lt;/strong&gt;: Fixed in PR #4192&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Affected Systems
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Nhost hasura-auth backend service&lt;/li&gt;
&lt;li&gt;Nhost nhost-js client SDK&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;hasura-auth&lt;/strong&gt;: &amp;lt; PR #4192 (Fixed in: &lt;code&gt;PR #4192&lt;/code&gt;)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;nhost-js&lt;/strong&gt;: &amp;lt; PR #4192 (Fixed in: &lt;code&gt;PR #4192&lt;/code&gt;)&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Code Analysis
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Commit: &lt;a href="https://github.com/nhost/nhost/commit/52c70664a7e92031e592b873471939b10ca18079" rel="noopener noreferrer"&gt;52c7066&lt;/a&gt;
&lt;/h3&gt;

&lt;p&gt;Atomic deletion of refresh tokens via CTE upon password update&lt;/p&gt;

&lt;h2&gt;
  
  
  Mitigation Strategies
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Upgrade the Nhost backend services to a release subsequent to PR #4192.&lt;/li&gt;
&lt;li&gt;Upgrade the nhost-js SDK to incorporate the updateSessionFromResponseMiddleware.&lt;/li&gt;
&lt;li&gt;Implement continuous monitoring on the auth.refresh_tokens table for anomalous long-lived entries.&lt;/li&gt;
&lt;li&gt;Educate users to manually terminate active sessions if native global logout is unsupported in their current deployment.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Remediation Steps:&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Review the current deployment version of hasura-auth and nhost-js.&lt;/li&gt;
&lt;li&gt;Update the backend Go service with the CTE SQL modifications to ensure atomic token deletion.&lt;/li&gt;
&lt;li&gt;Update all frontend clients leveraging the nhost-js SDK to force local storage clearing on password changes.&lt;/li&gt;
&lt;li&gt;Run a manual cleanup script targeting the auth.refresh_tokens table for any accounts modified prior to the patch application.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  References
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://github.com/advisories/GHSA-7HGR-XVRR-XPW3" rel="noopener noreferrer"&gt;GitHub Advisory: Session Persistence After Password Change&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/nhost/nhost/pull/4192" rel="noopener noreferrer"&gt;Pull Request 4192: Fix session invalidation on password change&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/nhost/nhost/commit/52c70664a7e92031e592b873471939b10ca18079" rel="noopener noreferrer"&gt;Commit 52c70664a7e92031e592b873471939b10ca18079&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;




&lt;p&gt;&lt;em&gt;&lt;a href="https://cvereports.com/reports/GHSA-7HGR-XVRR-XPW3" rel="noopener noreferrer"&gt;Read the full report for GHSA-7HGR-XVRR-XPW3 on our website&lt;/a&gt; for more details including interactive diagrams and full exploit analysis.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>security</category>
      <category>cve</category>
      <category>cybersecurity</category>
      <category>ghsa</category>
    </item>
    <item>
      <title>CVE-2026-6321: CVE-2026-6321: Path Traversal in fast-uri via Improper Normalization Order</title>
      <dc:creator>CVE Reports</dc:creator>
      <pubDate>Fri, 08 May 2026 17:40:29 +0000</pubDate>
      <link>https://dev.to/cverports/cve-2026-6321-cve-2026-6321-path-traversal-in-fast-uri-via-improper-normalization-order-3nld</link>
      <guid>https://dev.to/cverports/cve-2026-6321-cve-2026-6321-path-traversal-in-fast-uri-via-improper-normalization-order-3nld</guid>
      <description>&lt;h1&gt;
  
  
  CVE-2026-6321: Path Traversal in fast-uri via Improper Normalization Order
&lt;/h1&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Vulnerability ID:&lt;/strong&gt; CVE-2026-6321&lt;br&gt;
&lt;strong&gt;CVSS Score:&lt;/strong&gt; 7.5&lt;br&gt;
&lt;strong&gt;Published:&lt;/strong&gt; 2026-05-08&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;The fast-uri library (versions ≤ 3.1.0) contains a high-severity path traversal vulnerability due to an order-of-operations flaw during URI normalization. The library incorrectly decodes percent-encoded path separators (%2F) and dot segments (%2E) prior to applying dot-segment removal algorithms, allowing attackers to bypass path-based access controls and filters.&lt;/p&gt;

&lt;h2&gt;
  
  
  TL;DR
&lt;/h2&gt;

&lt;p&gt;fast-uri ≤ 3.1.0 decodes percent-encoded URI characters before running path normalization algorithms. This allows attackers to use payloads like %2e%2e to bypass security filters and perform path traversal attacks. Upgrade to version 3.1.1 to implement context-aware decoding.&lt;/p&gt;




&lt;h3&gt;
  
  
  ⚠️ Exploit Status: POC
&lt;/h3&gt;

&lt;h2&gt;
  
  
  Technical Details
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;CWE ID&lt;/strong&gt;: CWE-22&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Attack Vector&lt;/strong&gt;: Network&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;CVSS Score&lt;/strong&gt;: 7.5 (High)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;EPSS Score&lt;/strong&gt;: 0.00030&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Exploit Status&lt;/strong&gt;: Proof of Concept Available&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;CISA KEV&lt;/strong&gt;: Not Listed&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Affected Systems
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;fast-uri &amp;lt;= 3.1.0&lt;/li&gt;
&lt;li&gt;Node.js applications utilizing fast-uri for request validation&lt;/li&gt;
&lt;li&gt;API Gateways and proxies dependent on fast-uri for routing&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;fast-uri&lt;/strong&gt;: &amp;lt;= 3.1.0 (Fixed in: &lt;code&gt;3.1.1&lt;/code&gt;)&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Code Analysis
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Commit: &lt;a href="https://github.com/fastify/fast-uri/commit/876ce79b662c3e5015e4e7dffe6f37752ad34f35" rel="noopener noreferrer"&gt;876ce79&lt;/a&gt;
&lt;/h3&gt;

&lt;p&gt;Fix path traversal by introducing context-aware percent-encoding and path normalization.&lt;/p&gt;

&lt;h2&gt;
  
  
  Exploit Details
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="https://github.com/fastify/fast-uri/security/advisories/GHSA-q3j6-qgpj-74h6" rel="noopener noreferrer"&gt;Vulnerability Report Example Payload&lt;/a&gt;: Proof of concept payload demonstrating path filter bypass using %2e%2e.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Mitigation Strategies
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Upgrade fast-uri to version 3.1.1 or higher.&lt;/li&gt;
&lt;li&gt;Deploy WAF rules to block URIs containing percent-encoded dot (%2e) or slash (%2f) sequences.&lt;/li&gt;
&lt;li&gt;Ensure path-based authorization checks occur on the fully normalized URI, not the raw input.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Remediation Steps:&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Audit application dependencies using npm audit or yarn audit to identify instances of fast-uri &amp;lt;= 3.1.0.&lt;/li&gt;
&lt;li&gt;Update the package.json file to require fast-uri version 3.1.1.&lt;/li&gt;
&lt;li&gt;Run the package manager update command to fetch the patched library and regenerate the lockfile.&lt;/li&gt;
&lt;li&gt;Deploy the updated application and monitor logs for previously blocked traversal attempts.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  References
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://github.com/fastify/fast-uri/security/advisories/GHSA-q3j6-qgpj-74h6" rel="noopener noreferrer"&gt;Official fast-uri GitHub Advisory&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cna.openjsf.org/security-advisories.html" rel="noopener noreferrer"&gt;OpenJS Foundation Advisories&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.cve.org/CVERecord?id=CVE-2026-6321" rel="noopener noreferrer"&gt;CVE Record for CVE-2026-6321&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/fastify/fast-uri/commit/876ce79b662c3e5015e4e7dffe6f37752ad34f35" rel="noopener noreferrer"&gt;Patch Commit&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;




&lt;p&gt;&lt;em&gt;&lt;a href="https://cvereports.com/reports/CVE-2026-6321" rel="noopener noreferrer"&gt;Read the full report for CVE-2026-6321 on our website&lt;/a&gt; for more details including interactive diagrams and full exploit analysis.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>security</category>
      <category>cve</category>
      <category>cybersecurity</category>
    </item>
    <item>
      <title>GHSA-8G7G-HMWM-6RV2: GHSA-8g7g-hmwm-6rv2: Path Traversal, SSRF, and Information Exposure in n8n-mcp</title>
      <dc:creator>CVE Reports</dc:creator>
      <pubDate>Fri, 08 May 2026 17:10:29 +0000</pubDate>
      <link>https://dev.to/cverports/ghsa-8g7g-hmwm-6rv2-ghsa-8g7g-hmwm-6rv2-path-traversal-ssrf-and-information-exposure-in-n8n-mcp-1d26</link>
      <guid>https://dev.to/cverports/ghsa-8g7g-hmwm-6rv2-ghsa-8g7g-hmwm-6rv2-path-traversal-ssrf-and-information-exposure-in-n8n-mcp-1d26</guid>
      <description>&lt;h1&gt;
  
  
  GHSA-8g7g-hmwm-6rv2: Path Traversal, SSRF, and Information Exposure in n8n-mcp
&lt;/h1&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Vulnerability ID:&lt;/strong&gt; GHSA-8G7G-HMWM-6RV2&lt;br&gt;
&lt;strong&gt;CVSS Score:&lt;/strong&gt; 8.5&lt;br&gt;
&lt;strong&gt;Published:&lt;/strong&gt; 2026-05-08&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Multiple high-severity vulnerabilities were identified in the &lt;code&gt;n8n-mcp&lt;/code&gt; package prior to version 2.50.1. These vulnerabilities include a Path Traversal flaw in the API client, a Server-Side Request Forgery (SSRF) bypass via redirect-following, and an Information Exposure vulnerability in the telemetry service. Collectively, these flaws permit credential theft, internal network access, and the leakage of sensitive workflow configurations.&lt;/p&gt;

&lt;h2&gt;
  
  
  TL;DR
&lt;/h2&gt;

&lt;p&gt;Versions of n8n-mcp before 2.50.1 suffer from path traversal in API path construction, SSRF via uncontrolled redirect following, and plain-text exposure of sensitive API keys in telemetry data. The vendor patched these issues in version 2.50.1.&lt;/p&gt;




&lt;h3&gt;
  
  
  ⚠️ Exploit Status: POC
&lt;/h3&gt;

&lt;h2&gt;
  
  
  Technical Details
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Vulnerability IDs&lt;/strong&gt;: GHSA-8g7g-hmwm-6rv2, AIKIDO-2026-10739&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Primary CWEs&lt;/strong&gt;: CWE-22, CWE-918, CWE-200, CWE-212&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Attack Vector&lt;/strong&gt;: Network&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Estimated CVSS&lt;/strong&gt;: 8.5 (High)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Exploit Status&lt;/strong&gt;: Proof of Concept available&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Patched Version&lt;/strong&gt;: 2.50.1&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Affected Systems
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;n8n-mcp API Client&lt;/li&gt;
&lt;li&gt;n8n-mcp Webhook Triggers&lt;/li&gt;
&lt;li&gt;n8n-mcp Telemetry Service&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;n8n-mcp&lt;/strong&gt;: &amp;lt; 2.50.1 (Fixed in: &lt;code&gt;2.50.1&lt;/code&gt;)&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Code Analysis
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Commit: &lt;a href="https://github.com/czlonkowski/n8n-mcp/commit/1cfe9c6bddb4b1634e6e23323c18ea35fd196999" rel="noopener noreferrer"&gt;1cfe9c6&lt;/a&gt;
&lt;/h3&gt;

&lt;p&gt;Security patch addressing path traversal, SSRF, and telemetry leakage vulnerabilities in n8n-mcp.&lt;/p&gt;

&lt;h2&gt;
  
  
  Mitigation Strategies
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Upgrade the n8n-mcp package to version 2.50.1 or later.&lt;/li&gt;
&lt;li&gt;Implement egress network filtering to block connections to cloud metadata endpoints (169.254.169.254).&lt;/li&gt;
&lt;li&gt;Rotate any API keys or credentials that were stored in historical telemetry logs.&lt;/li&gt;
&lt;li&gt;Audit custom webhook handlers to ensure HTTP redirect following is explicitly disabled.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Remediation Steps:&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Identify all deployments of the n8n-mcp package within the environment.&lt;/li&gt;
&lt;li&gt;Execute package manager updates to pull version 2.50.1.&lt;/li&gt;
&lt;li&gt;Restart the affected Node.js services to apply the updated dependencies.&lt;/li&gt;
&lt;li&gt;Review historical telemetry logs and purge any entries containing unredacted workflow mutation payloads.&lt;/li&gt;
&lt;li&gt;Rotate credentials accessed by the application prior to the patch application.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  References
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://github.com/czlonkowski/n8n-mcp/security/advisories/GHSA-8g7g-hmwm-6rv2" rel="noopener noreferrer"&gt;GitHub Security Advisory: GHSA-8g7g-hmwm-6rv2&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/czlonkowski/n8n-mcp/commit/1cfe9c6bddb4b1634e6e23323c18ea35fd196999" rel="noopener noreferrer"&gt;Fix Commit&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/czlonkowski/n8n-mcp/releases/tag/v2.50.1" rel="noopener noreferrer"&gt;Release v2.50.1&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://intel.aikido.dev/" rel="noopener noreferrer"&gt;Vulnerability Intelligence (Aikido)&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;




&lt;p&gt;&lt;em&gt;&lt;a href="https://cvereports.com/reports/GHSA-8G7G-HMWM-6RV2" rel="noopener noreferrer"&gt;Read the full report for GHSA-8G7G-HMWM-6RV2 on our website&lt;/a&gt; for more details including interactive diagrams and full exploit analysis.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>security</category>
      <category>cve</category>
      <category>cybersecurity</category>
      <category>ghsa</category>
    </item>
  </channel>
</rss>
