<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: CVE Reports</title>
    <description>The latest articles on DEV Community by CVE Reports (@cverports).</description>
    <link>https://dev.to/cverports</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1959489%2F6e9f36b9-96a5-441a-a9b5-6993444f71d8.png</url>
      <title>DEV Community: CVE Reports</title>
      <link>https://dev.to/cverports</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/cverports"/>
    <language>en</language>
    <item>
      <title>GHSA-H39G-6X3C-7FQ9: GHSA-h39g-6x3c-7fq9: Path Confinement Bypass in Zio SubFileSystem</title>
      <dc:creator>CVE Reports</dc:creator>
      <pubDate>Mon, 20 Apr 2026 03:40:20 +0000</pubDate>
      <link>https://dev.to/cverports/ghsa-h39g-6x3c-7fq9-ghsa-h39g-6x3c-7fq9-path-confinement-bypass-in-zio-subfilesystem-8n8</link>
      <guid>https://dev.to/cverports/ghsa-h39g-6x3c-7fq9-ghsa-h39g-6x3c-7fq9-path-confinement-bypass-in-zio-subfilesystem-8n8</guid>
      <description>&lt;h1&gt;
  
  
  GHSA-h39g-6x3c-7fq9: Path Confinement Bypass in Zio SubFileSystem
&lt;/h1&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Vulnerability ID:&lt;/strong&gt; GHSA-H39G-6X3C-7FQ9&lt;br&gt;
&lt;strong&gt;CVSS Score:&lt;/strong&gt; 5.9&lt;br&gt;
&lt;strong&gt;Published:&lt;/strong&gt; 2026-04-18&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;The Zio library for .NET contains a path confinement bypass vulnerability allowing attackers to escape the SubFileSystem restricted directory structure. An attacker can use trailing slashes and traversal segments to read and write files in the parent filesystem.&lt;/p&gt;

&lt;h2&gt;
  
  
  TL;DR
&lt;/h2&gt;

&lt;p&gt;Zio versions prior to 0.22.2 suffer from a path traversal vulnerability in SubFileSystem, enabling attackers to escape the directory sandbox.&lt;/p&gt;




&lt;h3&gt;
  
  
  ⚠️ Exploit Status: POC
&lt;/h3&gt;

&lt;h2&gt;
  
  
  Technical Details
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;CWE&lt;/strong&gt;: CWE-22&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;CVSS Score&lt;/strong&gt;: 5.9&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Attack Vector&lt;/strong&gt;: Network&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Impact&lt;/strong&gt;: Confidentiality (Low), Integrity (Low)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Exploit Status&lt;/strong&gt;: Proof of Concept&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Fixed Version&lt;/strong&gt;: 0.22.2&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Affected Systems
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;.NET applications utilizing the Zio library&lt;/li&gt;
&lt;li&gt;Zio SubFileSystem components processing user-supplied paths&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Zio&lt;/strong&gt;: &amp;lt; 0.22.2 (Fixed in: &lt;code&gt;0.22.2&lt;/code&gt;)&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Code Analysis
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Commit: &lt;a href="https://github.com/xoofx/zio/commit/c8c2f5328e50c1e7ab8c5c405fe70e0bd35f4782" rel="noopener noreferrer"&gt;c8c2f53&lt;/a&gt;
&lt;/h3&gt;

&lt;p&gt;Remove early return optimization in UPath and add perimeter validation in SubFileSystem to prevent traversal&lt;/p&gt;

&lt;h2&gt;
  
  
  Mitigation Strategies
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Update Zio library to version 0.22.2&lt;/li&gt;
&lt;li&gt;Implement manual path sanitization for user inputs before passing them to file system operations&lt;/li&gt;
&lt;li&gt;Apply least privilege principles to the parent filesystem mapping&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Remediation Steps:&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Identify all projects depending on the Zio library&lt;/li&gt;
&lt;li&gt;Update the NuGet package reference for Zio to version 0.22.2&lt;/li&gt;
&lt;li&gt;Compile and deploy the updated application code&lt;/li&gt;
&lt;li&gt;Verify logging mechanisms to detect anomalies in path resolution&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  References
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://github.com/advisories/GHSA-h39g-6x3c-7fq9" rel="noopener noreferrer"&gt;GitHub Advisory GHSA-h39g-6x3c-7fq9&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://osv.dev/vulnerability/GHSA-h39g-6x3c-7fq9" rel="noopener noreferrer"&gt;OSV Record&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.nuget.org/packages/Zio/" rel="noopener noreferrer"&gt;Zio NuGet Package&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;




&lt;p&gt;&lt;em&gt;&lt;a href="https://cvereports.com/reports/GHSA-H39G-6X3C-7FQ9" rel="noopener noreferrer"&gt;Read the full report for GHSA-H39G-6X3C-7FQ9 on our website&lt;/a&gt; for more details including interactive diagrams and full exploit analysis.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>security</category>
      <category>cve</category>
      <category>cybersecurity</category>
      <category>ghsa</category>
    </item>
    <item>
      <title>GHSA-QRR6-MG7R-M243: GHSA-QRR6-MG7R-M243: Argument Injection and Remote Code Execution in PHPUnit JobRunner</title>
      <dc:creator>CVE Reports</dc:creator>
      <pubDate>Mon, 20 Apr 2026 02:40:20 +0000</pubDate>
      <link>https://dev.to/cverports/ghsa-qrr6-mg7r-m243-ghsa-qrr6-mg7r-m243-argument-injection-and-remote-code-execution-in-phpunit-3kd5</link>
      <guid>https://dev.to/cverports/ghsa-qrr6-mg7r-m243-ghsa-qrr6-mg7r-m243-argument-injection-and-remote-code-execution-in-phpunit-3kd5</guid>
      <description>&lt;h1&gt;
  
  
  GHSA-QRR6-MG7R-M243: Argument Injection and Remote Code Execution in PHPUnit JobRunner
&lt;/h1&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Vulnerability ID:&lt;/strong&gt; GHSA-QRR6-MG7R-M243&lt;br&gt;
&lt;strong&gt;CVSS Score:&lt;/strong&gt; 7.8&lt;br&gt;
&lt;strong&gt;Published:&lt;/strong&gt; 2026-04-18&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;An argument injection vulnerability exists in PHPUnit's JobRunner component due to improper neutralization of metacharacters in PHP INI configuration values. This flaw allows an attacker to inject arbitrary INI directives during process forking, potentially leading to remote code execution within the context of continuous integration environments or testing workers.&lt;/p&gt;

&lt;h2&gt;
  
  
  TL;DR
&lt;/h2&gt;

&lt;p&gt;PHPUnit versions prior to 13.1.6 fail to properly escape INI settings passed to child processes via the command line. Attackers who control configuration values can inject newlines to execute arbitrary files via injected INI directives.&lt;/p&gt;




&lt;h3&gt;
  
  
  ⚠️ Exploit Status: POC
&lt;/h3&gt;

&lt;h2&gt;
  
  
  Technical Details
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;CWE ID&lt;/strong&gt;: CWE-88 (Argument Injection or Modification)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Attack Vector&lt;/strong&gt;: Local / CI Configuration&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;CVSS Score&lt;/strong&gt;: 7.8 (High)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Exploit Status&lt;/strong&gt;: Proof of Concept available&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Impact&lt;/strong&gt;: Remote Code Execution&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Affected Component&lt;/strong&gt;: phpunit/phpunit (JobRunner)&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Affected Systems
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;PHPUnit JobRunner Component&lt;/li&gt;
&lt;li&gt;Continuous Integration Pipelines executing PHPUnit&lt;/li&gt;
&lt;li&gt;Automated Testing Workers with process isolation enabled&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;PHPUnit 13&lt;/strong&gt;: &amp;lt; 13.1.6 (Fixed in: &lt;code&gt;13.1.6&lt;/code&gt;)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;PHPUnit 12&lt;/strong&gt;: &amp;lt; 12.x&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;PHPUnit 11&lt;/strong&gt;: &amp;lt; 11.x&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Mitigation Strategies
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Upgrade PHPUnit to a secure version (13.1.6 or higher).&lt;/li&gt;
&lt;li&gt;Implement strict code review requirements for modifications to phpunit.xml.&lt;/li&gt;
&lt;li&gt;Enforce least-privilege principles for CI/CD runners and ephemeral build containers.&lt;/li&gt;
&lt;li&gt;Integrate SAST tooling to scan for vulnerable composer.lock dependencies.&lt;/li&gt;
&lt;li&gt;Sanitize environment variables injected into the CI pipeline.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Remediation Steps:&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Identify all projects utilizing phpunit/phpunit via dependency analysis tools.&lt;/li&gt;
&lt;li&gt;Update the composer.json file to require phpunit/phpunit ^13.1.6.&lt;/li&gt;
&lt;li&gt;Execute composer update phpunit/phpunit to fetch the patched version.&lt;/li&gt;
&lt;li&gt;Commit the updated composer.lock file to the repository.&lt;/li&gt;
&lt;li&gt;Verify the pipeline execution to ensure compatibility with the updated testing framework.&lt;/li&gt;
&lt;/ol&gt;




&lt;p&gt;&lt;em&gt;&lt;a href="https://cvereports.com/reports/GHSA-QRR6-MG7R-M243" rel="noopener noreferrer"&gt;Read the full report for GHSA-QRR6-MG7R-M243 on our website&lt;/a&gt; for more details including interactive diagrams and full exploit analysis.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>security</category>
      <category>cve</category>
      <category>cybersecurity</category>
      <category>ghsa</category>
    </item>
    <item>
      <title>GHSA-6G38-8J4P-J3PR: GHSA-6G38-8J4P-J3PR: Account Takeover via OAuth Email Verification Bypass in Nhost</title>
      <dc:creator>CVE Reports</dc:creator>
      <pubDate>Mon, 20 Apr 2026 01:40:20 +0000</pubDate>
      <link>https://dev.to/cverports/ghsa-6g38-8j4p-j3pr-ghsa-6g38-8j4p-j3pr-account-takeover-via-oauth-email-verification-bypass-in-2i1</link>
      <guid>https://dev.to/cverports/ghsa-6g38-8j4p-j3pr-ghsa-6g38-8j4p-j3pr-account-takeover-via-oauth-email-verification-bypass-in-2i1</guid>
      <description>&lt;h1&gt;
  
  
  GHSA-6G38-8J4P-J3PR: Account Takeover via OAuth Email Verification Bypass in Nhost
&lt;/h1&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Vulnerability ID:&lt;/strong&gt; GHSA-6G38-8J4P-J3PR&lt;br&gt;
&lt;strong&gt;CVSS Score:&lt;/strong&gt; 9.3&lt;br&gt;
&lt;strong&gt;Published:&lt;/strong&gt; 2026-04-18&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Nhost is vulnerable to a critical Improper Authentication flaw (CWE-287) that permits full account takeover. The vulnerability exists in the OAuth authentication flow, where multiple provider adapters fail to enforce email verification checks before automatically linking incoming external identities to existing local accounts.&lt;/p&gt;

&lt;h2&gt;
  
  
  TL;DR
&lt;/h2&gt;

&lt;p&gt;A logic flaw in Nhost's OAuth implementation allows attackers to take over existing accounts by registering an unverified matching email address on third-party identity providers like Discord or Bitbucket.&lt;/p&gt;




&lt;h3&gt;
  
  
  ⚠️ Exploit Status: POC
&lt;/h3&gt;

&lt;h2&gt;
  
  
  Technical Details
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;CWE ID&lt;/strong&gt;: CWE-287&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Attack Vector&lt;/strong&gt;: Network&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;CVSS v4.0&lt;/strong&gt;: 9.3&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Impact&lt;/strong&gt;: Complete Account Takeover&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Exploit Status&lt;/strong&gt;: Proof of Concept&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Authentication Required&lt;/strong&gt;: None&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Affected Systems
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Nhost Authentication Service&lt;/li&gt;
&lt;li&gt;Discord OAuth Adapter&lt;/li&gt;
&lt;li&gt;Bitbucket OAuth Adapter&lt;/li&gt;
&lt;li&gt;AzureAD OAuth Adapter&lt;/li&gt;
&lt;li&gt;EntraID OAuth Adapter&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;github.com/nhost/nhost&lt;/strong&gt;: &amp;lt; 0.0.0-20260417112436-ec8dab3f2cf4 (Fixed in: &lt;code&gt;0.0.0-20260417112436-ec8dab3f2cf4&lt;/code&gt;)&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Code Analysis
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Commit: &lt;a href="https://github.com/nhost/nhost/commit/ec8dab3f2cf46e1131ddaf893d56c37aa00380b2" rel="noopener noreferrer"&gt;ec8dab3&lt;/a&gt;
&lt;/h3&gt;

&lt;p&gt;Fix OAuth email verification bypass and introduce strict verification checks.&lt;/p&gt;

&lt;h2&gt;
  
  
  Mitigation Strategies
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Software Update&lt;/li&gt;
&lt;li&gt;Configuration Change&lt;/li&gt;
&lt;li&gt;Code Audit&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Remediation Steps:&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Update the github.com/nhost/nhost package to a version containing commit ec8dab3f2cf46e1131ddaf893d56c37aa00380b2.&lt;/li&gt;
&lt;li&gt;If patching is not possible, disable the Discord, Bitbucket, AzureAD, and EntraID OAuth login methods in the Nhost configuration.&lt;/li&gt;
&lt;li&gt;Audit any custom-built OAuth provider adapters to ensure they correctly parse and enforce the external provider's email verification boolean flag.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  References
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://github.com/advisories/GHSA-6G38-8J4P-J3PR" rel="noopener noreferrer"&gt;GitHub Advisory GHSA-6G38-8J4P-J3PR&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/nhost/nhost/pull/4162" rel="noopener noreferrer"&gt;Official Fix Pull Request&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/nhost/nhost/commit/ec8dab3f2cf46e1131ddaf893d56c37aa00380b2" rel="noopener noreferrer"&gt;Fix Commit (ec8dab3)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://osv.dev/vulnerability/GHSA-6g38-8j4p-j3pr" rel="noopener noreferrer"&gt;OSV Advisory Entry&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;




&lt;p&gt;&lt;em&gt;&lt;a href="https://cvereports.com/reports/GHSA-6G38-8J4P-J3PR" rel="noopener noreferrer"&gt;Read the full report for GHSA-6G38-8J4P-J3PR on our website&lt;/a&gt; for more details including interactive diagrams and full exploit analysis.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>security</category>
      <category>cve</category>
      <category>cybersecurity</category>
      <category>ghsa</category>
    </item>
    <item>
      <title>GHSA-F58V-P6J9-24C2: GHSA-f58v-p6j9-24c2: Authenticated SQL Injection in YesWiki Bazar Module</title>
      <dc:creator>CVE Reports</dc:creator>
      <pubDate>Mon, 20 Apr 2026 01:10:20 +0000</pubDate>
      <link>https://dev.to/cverports/ghsa-f58v-p6j9-24c2-ghsa-f58v-p6j9-24c2-authenticated-sql-injection-in-yeswiki-bazar-module-g0o</link>
      <guid>https://dev.to/cverports/ghsa-f58v-p6j9-24c2-ghsa-f58v-p6j9-24c2-authenticated-sql-injection-in-yeswiki-bazar-module-g0o</guid>
      <description>&lt;h1&gt;
  
  
  GHSA-f58v-p6j9-24c2: Authenticated SQL Injection in YesWiki Bazar Module
&lt;/h1&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Vulnerability ID:&lt;/strong&gt; GHSA-F58V-P6J9-24C2&lt;br&gt;
&lt;strong&gt;CVSS Score:&lt;/strong&gt; 8.8&lt;br&gt;
&lt;strong&gt;Published:&lt;/strong&gt; 2026-04-18&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;An authenticated SQL Injection vulnerability exists in the Bazar module of YesWiki. The flaw allows authenticated attackers to execute arbitrary SQL commands via the &lt;code&gt;id_fiche&lt;/code&gt; parameter, potentially resulting in full database compromise.&lt;/p&gt;

&lt;h2&gt;
  
  
  TL;DR
&lt;/h2&gt;

&lt;p&gt;YesWiki versions prior to 4.6.1 contain a high-severity SQL Injection vulnerability (CWE-89) in the &lt;code&gt;EntryManager&lt;/code&gt; service. An authenticated attacker can append raw SQL to the &lt;code&gt;id_fiche&lt;/code&gt; parameter, enabling data exfiltration and database modification.&lt;/p&gt;




&lt;h3&gt;
  
  
  ⚠️ Exploit Status: POC
&lt;/h3&gt;

&lt;h2&gt;
  
  
  Technical Details
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;CWE ID&lt;/strong&gt;: CWE-89&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Attack Vector&lt;/strong&gt;: Network&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;CVSS Score&lt;/strong&gt;: 8.8&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Privileges Required&lt;/strong&gt;: Low&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Exploit Status&lt;/strong&gt;: PoC Available&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;KEV Status&lt;/strong&gt;: Not Listed&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Affected Systems
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;YesWiki (Bazar module) installations prior to version 4.6.1&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;yeswiki/yeswiki&lt;/strong&gt;: &amp;lt; 4.6.1 (Fixed in: &lt;code&gt;4.6.1&lt;/code&gt;)&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Exploit Details
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="https://github.com/YesWiki/yeswiki/security/advisories/GHSA-f58v-p6j9-24c2" rel="noopener noreferrer"&gt;GitHub Security Advisory&lt;/a&gt;: Advisory documenting the time-based blind and error-based SQL injection vectors.&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://raw.githubusercontent.com/n0z0/cve-evidence/main/2026-04/20260401_133905_2bc5340f9be9_yeswiki_sqli_sleep3_confirmed_20260401_133745.png" rel="noopener noreferrer"&gt;PoC Evidence Image&lt;/a&gt;: Image confirming the SLEEP(3) payload execution.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Mitigation Strategies
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Update YesWiki to the latest patched version.&lt;/li&gt;
&lt;li&gt;Deploy Web Application Firewall (WAF) rules to detect and block SQL injection payloads targeting the &lt;code&gt;/api/entries/&lt;/code&gt; endpoint.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Remediation Steps:&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Verify the current version of the YesWiki installation.&lt;/li&gt;
&lt;li&gt;Download YesWiki version 4.6.1 or later.&lt;/li&gt;
&lt;li&gt;Backup the existing YesWiki directory and database.&lt;/li&gt;
&lt;li&gt;Apply the update by replacing the core files according to the YesWiki upgrade documentation.&lt;/li&gt;
&lt;li&gt;Verify the application functions properly and test the patch by submitting a benign payload.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  References
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://github.com/YesWiki/yeswiki/security/advisories/GHSA-f58v-p6j9-24c2" rel="noopener noreferrer"&gt;GitHub Security Advisory: GHSA-f58v-p6j9-24c2&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://osv.dev/vulnerability/GHSA-f58v-p6j9-24c2" rel="noopener noreferrer"&gt;OSV Entry for GHSA-f58v-p6j9-24c2&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/YesWiki/yeswiki" rel="noopener noreferrer"&gt;YesWiki Source Code Repository&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;




&lt;p&gt;&lt;em&gt;&lt;a href="https://cvereports.com/reports/GHSA-F58V-P6J9-24C2" rel="noopener noreferrer"&gt;Read the full report for GHSA-F58V-P6J9-24C2 on our website&lt;/a&gt; for more details including interactive diagrams and full exploit analysis.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>security</category>
      <category>cve</category>
      <category>cybersecurity</category>
      <category>ghsa</category>
    </item>
    <item>
      <title>CVE-2026-6437: CVE-2026-6437: Mount Option Injection in Amazon EFS CSI Driver</title>
      <dc:creator>CVE Reports</dc:creator>
      <pubDate>Mon, 20 Apr 2026 00:40:22 +0000</pubDate>
      <link>https://dev.to/cverports/cve-2026-6437-cve-2026-6437-mount-option-injection-in-amazon-efs-csi-driver-1dhe</link>
      <guid>https://dev.to/cverports/cve-2026-6437-cve-2026-6437-mount-option-injection-in-amazon-efs-csi-driver-1dhe</guid>
      <description>&lt;h1&gt;
  
  
  CVE-2026-6437: Mount Option Injection in Amazon EFS CSI Driver
&lt;/h1&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Vulnerability ID:&lt;/strong&gt; CVE-2026-6437&lt;br&gt;
&lt;strong&gt;CVSS Score:&lt;/strong&gt; 6.5&lt;br&gt;
&lt;strong&gt;Published:&lt;/strong&gt; 2026-04-18&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;The Amazon EFS CSI Driver contains an argument injection vulnerability (CWE-88) in versions prior to v3.0.1. Unsanitized values in the volumeHandle and mounttargetip fields allow authenticated users with PersistentVolume creation permissions to inject arbitrary mount options.&lt;/p&gt;

&lt;h2&gt;
  
  
  TL;DR
&lt;/h2&gt;

&lt;p&gt;Authenticated Kubernetes users can bypass mount restrictions by injecting arbitrary comma-separated mount options via unsanitized PersistentVolume fields in the AWS EFS CSI Driver.&lt;/p&gt;




&lt;h2&gt;
  
  
  Technical Details
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;CWE ID&lt;/strong&gt;: CWE-88: Argument Injection&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Attack Vector&lt;/strong&gt;: Network&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;CVSS v3.1 Score&lt;/strong&gt;: 6.5 (Medium)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;EPSS Score&lt;/strong&gt;: 0.00029 (8.06%)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Privileges Required&lt;/strong&gt;: High (PersistentVolume Creation)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Exploit Status&lt;/strong&gt;: Unexploited / PoC available&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;CISA KEV&lt;/strong&gt;: Not Listed&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Affected Systems
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Amazon EFS CSI Driver (aws-efs-csi-driver) versions &amp;lt; 3.0.1&lt;/li&gt;
&lt;li&gt;Kubernetes clusters utilizing the vulnerable AWS EFS CSI driver&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;aws-efs-csi-driver&lt;/strong&gt;: &amp;lt; 3.0.1 (Fixed in: &lt;code&gt;3.0.1&lt;/code&gt;)&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Code Analysis
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Commit: &lt;a href="https://github.com/kubernetes-sigs/aws-efs-csi-driver/commit/51806c22c5754bfbdeca6910f15571a07921b784" rel="noopener noreferrer"&gt;51806c2&lt;/a&gt;
&lt;/h3&gt;

&lt;p&gt;Fix argument injection in mount options by adding strict net.ParseIP validation to mounttargetip field.&lt;/p&gt;

&lt;h2&gt;
  
  
  Mitigation Strategies
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Upgrade the Amazon EFS CSI Driver daemonset to v3.0.1 or higher.&lt;/li&gt;
&lt;li&gt;Restrict Kubernetes RBAC permissions for PersistentVolume and StorageClass creation.&lt;/li&gt;
&lt;li&gt;Deploy OPA Gatekeeper or Kyverno policies to validate and sanitize volume attributes.&lt;/li&gt;
&lt;li&gt;Monitor Kubernetes audit logs for irregular characters in volume provisioning requests.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Remediation Steps:&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Identify the current version of the aws-efs-csi-driver deployed in the cluster.&lt;/li&gt;
&lt;li&gt;Review RBAC roles to ensure only cluster-admin equivalents can create PersistentVolumes.&lt;/li&gt;
&lt;li&gt;Apply the v3.0.1 (or latest) release manifests or update the corresponding Helm chart.&lt;/li&gt;
&lt;li&gt;Verify the daemonset rollout across all worker nodes is complete.&lt;/li&gt;
&lt;li&gt;Test volume provisioning to confirm the updated driver maintains operational functionality.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  References
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2026-6437" rel="noopener noreferrer"&gt;NVD Detail: CVE-2026-6437&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://aws.amazon.com/security/security-bulletins/2026-016-aws/" rel="noopener noreferrer"&gt;AWS Security Bulletin 2026-016&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/kubernetes-sigs/aws-efs-csi-driver/security/advisories/GHSA-mph4-q2vm-w2pw" rel="noopener noreferrer"&gt;GitHub Security Advisory: GHSA-mph4-q2vm-w2pw&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/kubernetes-sigs/aws-efs-csi-driver/commit/51806c22c5754bfbdeca6910f15571a07921b784" rel="noopener noreferrer"&gt;Fix Commit 51806c22c5754bfbdeca6910f15571a07921b784&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/kubernetes-sigs/aws-efs-csi-driver/releases/tag/v3.0.1" rel="noopener noreferrer"&gt;Release v3.0.1&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;




&lt;p&gt;&lt;em&gt;&lt;a href="https://cvereports.com/reports/CVE-2026-6437" rel="noopener noreferrer"&gt;Read the full report for CVE-2026-6437 on our website&lt;/a&gt; for more details including interactive diagrams and full exploit analysis.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>security</category>
      <category>cve</category>
      <category>cybersecurity</category>
    </item>
    <item>
      <title>GHSA-MJW2-V2HM-WJ34: GHSA-MJW2-V2HM-WJ34: SQL Injection in Dagster Dynamic Partitions</title>
      <dc:creator>CVE Reports</dc:creator>
      <pubDate>Mon, 20 Apr 2026 00:10:20 +0000</pubDate>
      <link>https://dev.to/cverports/ghsa-mjw2-v2hm-wj34-ghsa-mjw2-v2hm-wj34-sql-injection-in-dagster-dynamic-partitions-2eh3</link>
      <guid>https://dev.to/cverports/ghsa-mjw2-v2hm-wj34-ghsa-mjw2-v2hm-wj34-sql-injection-in-dagster-dynamic-partitions-2eh3</guid>
      <description>&lt;h1&gt;
  
  
  GHSA-MJW2-V2HM-WJ34: SQL Injection in Dagster Dynamic Partitions
&lt;/h1&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Vulnerability ID:&lt;/strong&gt; GHSA-MJW2-V2HM-WJ34&lt;br&gt;
&lt;strong&gt;CVSS Score:&lt;/strong&gt; 8.3&lt;br&gt;
&lt;strong&gt;Published:&lt;/strong&gt; 2026-04-18&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;A high-severity SQL injection vulnerability in Dagster's database I/O manager integrations allows users with dynamic partition creation privileges to execute arbitrary SQL commands. This flaw affects the DuckDB, Snowflake, BigQuery, and DeltaLake integrations due to improper sanitization of dynamic partition keys.&lt;/p&gt;

&lt;h2&gt;
  
  
  TL;DR
&lt;/h2&gt;

&lt;p&gt;Dagster I/O managers fail to sanitize dynamic partition keys, enabling SQL injection via unescaped string literals. Upgrading to Dagster 1.13.1 and integration packages 0.29.1 resolves the issue, or users can apply a manual runtime monkey patch.&lt;/p&gt;




&lt;h3&gt;
  
  
  ⚠️ Exploit Status: POC
&lt;/h3&gt;

&lt;h2&gt;
  
  
  Technical Details
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;CWE ID&lt;/strong&gt;: CWE-89&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;CVSS Score&lt;/strong&gt;: 8.3 (High)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Attack Vector&lt;/strong&gt;: Network (API/UI)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Authentication Required&lt;/strong&gt;: Low (Requires API Access)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Impact Context&lt;/strong&gt;: I/O Manager Database Scope&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Patch Status&lt;/strong&gt;: Available (1.13.1 / 0.29.1)&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Affected Systems
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Dagster Core&lt;/li&gt;
&lt;li&gt;dagster-duckdb&lt;/li&gt;
&lt;li&gt;dagster-snowflake&lt;/li&gt;
&lt;li&gt;dagster-gcp&lt;/li&gt;
&lt;li&gt;dagster-deltalake&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;dagster&lt;/strong&gt;: &amp;gt;= 1.1.21, &amp;lt; 1.13.1 (Fixed in: &lt;code&gt;1.13.1&lt;/code&gt;)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;dagster-duckdb&lt;/strong&gt;: &amp;gt;= 0.17.21, &amp;lt; 0.29.1 (Fixed in: &lt;code&gt;0.29.1&lt;/code&gt;)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;dagster-snowflake&lt;/strong&gt;: &amp;gt;= 0.17.21, &amp;lt; 0.29.1 (Fixed in: &lt;code&gt;0.29.1&lt;/code&gt;)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;dagster-gcp&lt;/strong&gt;: &amp;gt;= 0.17.21, &amp;lt; 0.29.1 (Fixed in: &lt;code&gt;0.29.1&lt;/code&gt;)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;dagster-deltalake&lt;/strong&gt;: &amp;lt; 0.29.1 (Fixed in: &lt;code&gt;0.29.1&lt;/code&gt;)&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Mitigation Strategies
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Upgrade the core dagster package to &amp;gt;= 1.13.1&lt;/li&gt;
&lt;li&gt;Upgrade affected integration packages (duckdb, snowflake, gcp, deltalake) to &amp;gt;= 0.29.1&lt;/li&gt;
&lt;li&gt;Implement runtime monkey patch in definitions.py if upgrading is delayed&lt;/li&gt;
&lt;li&gt;Restrict 'Add Dynamic Partitions' permissions via RBAC in Dagster+&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Remediation Steps:&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Identify all deployed Dagster environments using dynamic partitions and the affected I/O managers.&lt;/li&gt;
&lt;li&gt;Update the project dependencies: pip install dagster&amp;gt;=1.13.1 dagster-gcp&amp;gt;=0.29.1 (or other relevant integrations).&lt;/li&gt;
&lt;li&gt;Re-deploy the Dagster code locations and webserver instances.&lt;/li&gt;
&lt;li&gt;If patching is delayed, copy the provided workaround snippet matching your specific database backend and insert it at the top of definitions.py.&lt;/li&gt;
&lt;li&gt;Restart the Dagster processes to apply the monkey patch.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  References
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://github.com/advisories/GHSA-mjw2-v2hm-wj34" rel="noopener noreferrer"&gt;GitHub Advisory: GHSA-mjw2-v2hm-wj34&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gist.github.com/gibsondan/6d0c483f8499a8b1cd460cddc9fd8f72" rel="noopener noreferrer"&gt;Official Workaround Gist&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://osv.dev/vulnerability/GHSA-mjw2-v2hm-wj34" rel="noopener noreferrer"&gt;OSV Record&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://docs.dagster.io/about/changelog" rel="noopener noreferrer"&gt;Dagster Changelog&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/dagster-io/dagster" rel="noopener noreferrer"&gt;Dagster Repository&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;




&lt;p&gt;&lt;em&gt;&lt;a href="https://cvereports.com/reports/GHSA-MJW2-V2HM-WJ34" rel="noopener noreferrer"&gt;Read the full report for GHSA-MJW2-V2HM-WJ34 on our website&lt;/a&gt; for more details including interactive diagrams and full exploit analysis.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>security</category>
      <category>cve</category>
      <category>cybersecurity</category>
      <category>ghsa</category>
    </item>
    <item>
      <title>GHSA-XJVP-7243-RG9H: GHSA-xjvp-7243-rg9h: Critical Path Traversal in Wish SCP Middleware Allows Arbitrary File Read/Write</title>
      <dc:creator>CVE Reports</dc:creator>
      <pubDate>Sun, 19 Apr 2026 22:40:20 +0000</pubDate>
      <link>https://dev.to/cverports/ghsa-xjvp-7243-rg9h-ghsa-xjvp-7243-rg9h-critical-path-traversal-in-wish-scp-middleware-allows-300g</link>
      <guid>https://dev.to/cverports/ghsa-xjvp-7243-rg9h-ghsa-xjvp-7243-rg9h-critical-path-traversal-in-wish-scp-middleware-allows-300g</guid>
      <description>&lt;h1&gt;
  
  
  GHSA-xjvp-7243-rg9h: Critical Path Traversal in Wish SCP Middleware Allows Arbitrary File Read/Write
&lt;/h1&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Vulnerability ID:&lt;/strong&gt; GHSA-XJVP-7243-RG9H&lt;br&gt;
&lt;strong&gt;CVSS Score:&lt;/strong&gt; 9.6&lt;br&gt;
&lt;strong&gt;Published:&lt;/strong&gt; 2026-04-18&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;A critical path traversal vulnerability in the SCP middleware of the Wish Go library (GHSA-xjvp-7243-rg9h) permits attackers to read and write arbitrary files outside the configured root directory. The flaw originates from insufficient path sanitization in the &lt;code&gt;fileSystemHandler.prefixed()&lt;/code&gt; method, enabling severe impacts including remote code execution if critical system files are overwritten. Exploitation requires authentication unless the target server explicitly runs without authentication protocols.&lt;/p&gt;

&lt;h2&gt;
  
  
  TL;DR
&lt;/h2&gt;

&lt;p&gt;A path traversal flaw in the Wish SCP middleware allows arbitrary file read and write operations outside the designated root directory via crafted SCP requests.&lt;/p&gt;




&lt;h3&gt;
  
  
  ⚠️ Exploit Status: POC
&lt;/h3&gt;

&lt;h2&gt;
  
  
  Technical Details
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Advisory ID&lt;/strong&gt;: GHSA-xjvp-7243-rg9h&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;CVSS Score&lt;/strong&gt;: 9.6&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Attack Vector&lt;/strong&gt;: Network&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;CWE ID&lt;/strong&gt;: CWE-22&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Impact&lt;/strong&gt;: Arbitrary File Read/Write&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Exploit Status&lt;/strong&gt;: Proof-of-Concept Available&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Affected Systems
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Custom SSH Servers built with charm.land/wish/v2 &amp;lt;= 2.0.0&lt;/li&gt;
&lt;li&gt;Custom SSH Servers built with github.com/charmbracelet/wish &amp;lt;= 1.4.7&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;charm.land/wish/v2&lt;/strong&gt;: &amp;lt;= 2.0.0 (Fixed in: &lt;code&gt;2.0.1&lt;/code&gt;)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;github.com/charmbracelet/wish&lt;/strong&gt;: &amp;lt;= 1.4.7 (Fixed in: &lt;code&gt;None&lt;/code&gt;)&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Mitigation Strategies
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Dependency Upgrade&lt;/li&gt;
&lt;li&gt;Service Disablement&lt;/li&gt;
&lt;li&gt;Defense-in-Depth Isolation&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Remediation Steps:&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Update go.mod to use charm.land/wish/v2 v2.0.1 or higher.&lt;/li&gt;
&lt;li&gt;Execute &lt;code&gt;go mod tidy&lt;/code&gt; to download the patched dependencies.&lt;/li&gt;
&lt;li&gt;Recompile the Go application.&lt;/li&gt;
&lt;li&gt;Restart the custom SSH server service.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  References
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://github.com/advisories/GHSA-xjvp-7243-rg9h" rel="noopener noreferrer"&gt;GitHub Advisory: GHSA-xjvp-7243-rg9h&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://osv.dev/vulnerability/GHSA-xjvp-7243-rg9h" rel="noopener noreferrer"&gt;OSV Record&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/charmbracelet/wish" rel="noopener noreferrer"&gt;Project Repository&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;




&lt;p&gt;&lt;em&gt;&lt;a href="https://cvereports.com/reports/GHSA-XJVP-7243-RG9H" rel="noopener noreferrer"&gt;Read the full report for GHSA-XJVP-7243-RG9H on our website&lt;/a&gt; for more details including interactive diagrams and full exploit analysis.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>security</category>
      <category>cve</category>
      <category>cybersecurity</category>
      <category>ghsa</category>
    </item>
    <item>
      <title>GHSA-JM8C-9F3J-4378: GHSA-jm8c-9f3j-4378: Unauthenticated Email Content Injection in Pretalx Template Engine</title>
      <dc:creator>CVE Reports</dc:creator>
      <pubDate>Sun, 19 Apr 2026 22:10:20 +0000</pubDate>
      <link>https://dev.to/cverports/ghsa-jm8c-9f3j-4378-ghsa-jm8c-9f3j-4378-unauthenticated-email-content-injection-in-pretalx-4f82</link>
      <guid>https://dev.to/cverports/ghsa-jm8c-9f3j-4378-ghsa-jm8c-9f3j-4378-unauthenticated-email-content-injection-in-pretalx-4f82</guid>
      <description>&lt;h1&gt;
  
  
  GHSA-jm8c-9f3j-4378: Unauthenticated Email Content Injection in Pretalx Template Engine
&lt;/h1&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Vulnerability ID:&lt;/strong&gt; GHSA-JM8C-9F3J-4378&lt;br&gt;
&lt;strong&gt;CVSS Score:&lt;/strong&gt; 6.1&lt;br&gt;
&lt;strong&gt;Published:&lt;/strong&gt; 2026-04-18&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Pretalx versions prior to 2026.1.0 contain a template injection vulnerability allowing unauthenticated attackers to embed malformed HTML and Markdown into system-generated emails. By exploiting unsanitized placeholders in the mail generation engine, attackers can spoof trusted communications that pass SPF, DKIM, and DMARC validations.&lt;/p&gt;

&lt;h2&gt;
  
  
  TL;DR
&lt;/h2&gt;

&lt;p&gt;Unauthenticated attackers can inject malicious links into official Pretalx emails by manipulating user-controlled profile fields, bypassing email sender reputation checks.&lt;/p&gt;




&lt;h3&gt;
  
  
  ⚠️ Exploit Status: POC
&lt;/h3&gt;

&lt;h2&gt;
  
  
  Technical Details
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Vulnerability Type&lt;/strong&gt;: Email Content Injection&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Primary CWE&lt;/strong&gt;: CWE-1336&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Attack Vector&lt;/strong&gt;: Network&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Privileges Required&lt;/strong&gt;: None&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;User Interaction&lt;/strong&gt;: Required&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;CVSS v3.1 Score&lt;/strong&gt;: 6.1&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Exploit Status&lt;/strong&gt;: Proof of Concept&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Affected Systems
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;pretalx (PyPI)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;pretalx&lt;/strong&gt;: &amp;lt; 2026.1.0 (Fixed in: &lt;code&gt;2026.1.0&lt;/code&gt;)&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Mitigation Strategies
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Upgrade the Pretalx application to the latest stable release containing the security patch.&lt;/li&gt;
&lt;li&gt;Apply localized template escaping filters to user-controlled variables if immediate upgrade is not possible.&lt;/li&gt;
&lt;li&gt;Implement registration endpoint monitoring to detect anomalous payload signatures in profile fields.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Remediation Steps:&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Verify the current running version of Pretalx via the administration dashboard or application environment.&lt;/li&gt;
&lt;li&gt;Pull the latest pretalx package version (2026.1.0 or newer) from PyPI.&lt;/li&gt;
&lt;li&gt;Execute the deployment upgrade sequence, ensuring all static files and database migrations are applied.&lt;/li&gt;
&lt;li&gt;Review user databases for accounts created with HTML or Markdown syntax in the name fields to identify previous exploitation attempts.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  References
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://github.com/advisories/GHSA-jm8c-9f3j-4378" rel="noopener noreferrer"&gt;GitHub Security Advisory GHSA-jm8c-9f3j-4378&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://osv.dev/vulnerability/GHSA-jm8c-9f3j-4378" rel="noopener noreferrer"&gt;OSV Record GHSA-jm8c-9f3j-4378&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://db.gcve.eu/" rel="noopener noreferrer"&gt;Vulnerability Database GCVE&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;




&lt;p&gt;&lt;em&gt;&lt;a href="https://cvereports.com/reports/GHSA-JM8C-9F3J-4378" rel="noopener noreferrer"&gt;Read the full report for GHSA-JM8C-9F3J-4378 on our website&lt;/a&gt; for more details including interactive diagrams and full exploit analysis.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>security</category>
      <category>cve</category>
      <category>cybersecurity</category>
      <category>ghsa</category>
    </item>
    <item>
      <title>GHSA-CJCX-JFP2-F7M2: GHSA-CJCX-JFP2-F7M2: High-Severity Stored XSS in Pretalx Organizer Search Interface</title>
      <dc:creator>CVE Reports</dc:creator>
      <pubDate>Sun, 19 Apr 2026 17:40:20 +0000</pubDate>
      <link>https://dev.to/cverports/ghsa-cjcx-jfp2-f7m2-ghsa-cjcx-jfp2-f7m2-high-severity-stored-xss-in-pretalx-organizer-search-1djb</link>
      <guid>https://dev.to/cverports/ghsa-cjcx-jfp2-f7m2-ghsa-cjcx-jfp2-f7m2-high-severity-stored-xss-in-pretalx-organizer-search-1djb</guid>
      <description>&lt;h1&gt;
  
  
  GHSA-CJCX-JFP2-F7M2: High-Severity Stored XSS in Pretalx Organizer Search Interface
&lt;/h1&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Vulnerability ID:&lt;/strong&gt; GHSA-CJCX-JFP2-F7M2&lt;br&gt;
&lt;strong&gt;CVSS Score:&lt;/strong&gt; 8.7&lt;br&gt;
&lt;strong&gt;Published:&lt;/strong&gt; 2026-04-18&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Pretalx versions prior to 2026.1.0 contain a high-severity stored Cross-Site Scripting (XSS) vulnerability within the organizer-facing search interface. Low-privileged users, such as speakers or proposal submitters, can inject malicious JavaScript into their profiles or submissions. When an organizer searches for these records, the application insecurely renders the results using &lt;code&gt;innerHTML&lt;/code&gt;, leading to arbitrary script execution in the organizer's browser.&lt;/p&gt;

&lt;h2&gt;
  
  
  TL;DR
&lt;/h2&gt;

&lt;p&gt;A stored XSS vulnerability in the Pretalx search typeahead feature allows low-privileged users to execute arbitrary JavaScript in the context of administrative organizer accounts, enabling session hijacking and unauthorized administrative actions.&lt;/p&gt;




&lt;h3&gt;
  
  
  ⚠️ Exploit Status: POC
&lt;/h3&gt;

&lt;h2&gt;
  
  
  Technical Details
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Vulnerability Type&lt;/strong&gt;: Stored Cross-Site Scripting (XSS)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;CWE ID&lt;/strong&gt;: CWE-79&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;CVSS Score&lt;/strong&gt;: 8.7 (High)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Attack Vector&lt;/strong&gt;: Network&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Privileges Required&lt;/strong&gt;: Low (Submitter/Speaker)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;User Interaction&lt;/strong&gt;: Required (Organizer must search)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Exploit Status&lt;/strong&gt;: Proof of Concept Available&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Affected Systems
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Pretalx (Organizer Backend Interface)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;pretalx&lt;/strong&gt;: &amp;lt; 2026.1.0 (Fixed in: &lt;code&gt;2026.1.0&lt;/code&gt;)&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Mitigation Strategies
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Upgrade Pretalx to version 2026.1.0 or higher.&lt;/li&gt;
&lt;li&gt;Apply manual patch to frontend JavaScript files replacing innerHTML with textContent.&lt;/li&gt;
&lt;li&gt;Implement Web Application Firewall (WAF) rules to detect and block common XSS payloads in profile update and proposal submission endpoints.&lt;/li&gt;
&lt;li&gt;Avoid utilizing the organizer backend search feature until a patch is applied.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Remediation Steps:&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Verify current Pretalx version using the application dashboard or package manager.&lt;/li&gt;
&lt;li&gt;Schedule a maintenance window for the application upgrade.&lt;/li&gt;
&lt;li&gt;Upgrade the Pretalx package via pip: &lt;code&gt;pip install --upgrade pretalx&amp;gt;=2026.1.0&lt;/code&gt;.&lt;/li&gt;
&lt;li&gt;Run database migrations and re-collect static files as per the Pretalx upgrade documentation.&lt;/li&gt;
&lt;li&gt;Restart the application server to apply changes.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  References
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://github.com/advisories/GHSA-CJCX-JFP2-F7M2" rel="noopener noreferrer"&gt;GitHub Advisory: GHSA-CJCX-JFP2-F7M2&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://osv.dev/vulnerability/GHSA-cjcx-jfp2-f7m2" rel="noopener noreferrer"&gt;OSV Record&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/pretalx/pretalx" rel="noopener noreferrer"&gt;Project Repository&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://docs.pretalx.org/legal/security/" rel="noopener noreferrer"&gt;Official Security Support&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;




&lt;p&gt;&lt;em&gt;&lt;a href="https://cvereports.com/reports/GHSA-CJCX-JFP2-F7M2" rel="noopener noreferrer"&gt;Read the full report for GHSA-CJCX-JFP2-F7M2 on our website&lt;/a&gt; for more details including interactive diagrams and full exploit analysis.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>security</category>
      <category>cve</category>
      <category>cybersecurity</category>
      <category>ghsa</category>
    </item>
    <item>
      <title>GHSA-9J88-VVJ5-VHGR: GHSA-9j88-vvj5-vhgr: STARTTLS Response Injection and SASL Downgrade in MailKit</title>
      <dc:creator>CVE Reports</dc:creator>
      <pubDate>Sun, 19 Apr 2026 16:40:20 +0000</pubDate>
      <link>https://dev.to/cverports/ghsa-9j88-vvj5-vhgr-ghsa-9j88-vvj5-vhgr-starttls-response-injection-and-sasl-downgrade-in-mailkit-3c3f</link>
      <guid>https://dev.to/cverports/ghsa-9j88-vvj5-vhgr-ghsa-9j88-vvj5-vhgr-starttls-response-injection-and-sasl-downgrade-in-mailkit-3c3f</guid>
      <description>&lt;h1&gt;
  
  
  GHSA-9j88-vvj5-vhgr: STARTTLS Response Injection and SASL Downgrade in MailKit
&lt;/h1&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Vulnerability ID:&lt;/strong&gt; GHSA-9J88-VVJ5-VHGR&lt;br&gt;
&lt;strong&gt;CVSS Score:&lt;/strong&gt; 6.5&lt;br&gt;
&lt;strong&gt;Published:&lt;/strong&gt; 2026-04-18&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;MailKit versions prior to 4.16.0 contain a STARTTLS response injection vulnerability. A network-positioned attacker can inject plaintext protocol responses into the client's internal read buffer before the TLS handshake completes, causing the client to process the injected data post-TLS. This flaw typically facilitates SASL mechanism downgrades.&lt;/p&gt;

&lt;h2&gt;
  
  
  TL;DR
&lt;/h2&gt;

&lt;p&gt;A flaw in MailKit's stream handling allows a Man-in-the-Middle attacker to inject malicious protocol data during the STARTTLS upgrade. The unflushed internal buffer causes the client to process this unencrypted data as a legitimate post-TLS response, enabling authentication downgrades.&lt;/p&gt;




&lt;h3&gt;
  
  
  ⚠️ Exploit Status: POC
&lt;/h3&gt;

&lt;h2&gt;
  
  
  Technical Details
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;CWE ID&lt;/strong&gt;: CWE-74&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Attack Vector&lt;/strong&gt;: Network (MitM)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;CVSS Score&lt;/strong&gt;: 6.5&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Impact&lt;/strong&gt;: Integrity (High) - SASL Downgrade&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Exploit Status&lt;/strong&gt;: Proof-of-Concept&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Affected Systems
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;MailKit &amp;lt; 4.16.0&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;MailKit&lt;/strong&gt;: &amp;lt; 4.16.0 (Fixed in: &lt;code&gt;4.16.0&lt;/code&gt;)&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Mitigation Strategies
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Update MailKit to version 4.16.0 or newer.&lt;/li&gt;
&lt;li&gt;Enforce implicit TLS (SslOnConnect) on dedicated secure ports (465, 993, 995) instead of relying on STARTTLS.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Remediation Steps:&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Identify projects referencing MailKit via csproj or packages.config.&lt;/li&gt;
&lt;li&gt;Update the NuGet package reference to version 4.16.0 or higher.&lt;/li&gt;
&lt;li&gt;Recompile and deploy the application.&lt;/li&gt;
&lt;li&gt;Audit network configurations to ensure implicit TLS is preferred over explicit STARTTLS.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  References
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://github.com/advisories/GHSA-9J88-VVJ5-VHGR" rel="noopener noreferrer"&gt;GitHub Advisory: GHSA-9j88-vvj5-vhgr&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://osv.dev/vulnerability/GHSA-9j88-vvj5-vhgr" rel="noopener noreferrer"&gt;OSV Record&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/jstedfast/MailKit" rel="noopener noreferrer"&gt;MailKit Repository&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/jstedfast/MailKit/security/advisories/GHSA-9j88-vvj5-vhgr" rel="noopener noreferrer"&gt;Vendor Security Advisory&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;




&lt;p&gt;&lt;em&gt;&lt;a href="https://cvereports.com/reports/GHSA-9J88-VVJ5-VHGR" rel="noopener noreferrer"&gt;Read the full report for GHSA-9J88-VVJ5-VHGR on our website&lt;/a&gt; for more details including interactive diagrams and full exploit analysis.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>security</category>
      <category>cve</category>
      <category>cybersecurity</category>
      <category>ghsa</category>
    </item>
    <item>
      <title>GHSA-452V-W3GX-72WG: GHSA-452v-w3gx-72wg: Remote Denial of Service via Identity Point Panic in Zebra Zcash Node</title>
      <dc:creator>CVE Reports</dc:creator>
      <pubDate>Sun, 19 Apr 2026 14:10:20 +0000</pubDate>
      <link>https://dev.to/cverports/ghsa-452v-w3gx-72wg-ghsa-452v-w3gx-72wg-remote-denial-of-service-via-identity-point-panic-in-50ak</link>
      <guid>https://dev.to/cverports/ghsa-452v-w3gx-72wg-ghsa-452v-w3gx-72wg-remote-denial-of-service-via-identity-point-panic-in-50ak</guid>
      <description>&lt;h1&gt;
  
  
  GHSA-452v-w3gx-72wg: Remote Denial of Service via Identity Point Panic in Zebra Zcash Node
&lt;/h1&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Vulnerability ID:&lt;/strong&gt; GHSA-452V-W3GX-72WG&lt;br&gt;
&lt;strong&gt;CVSS Score:&lt;/strong&gt; 8.7&lt;br&gt;
&lt;strong&gt;Published:&lt;/strong&gt; 2026-04-18&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;The Zebra Zcash node implementation is vulnerable to a critical remote denial-of-service attack due to a logic error in Orchard transaction verification. An unhandled exception occurs when processing the randomized validating key (&lt;code&gt;rk&lt;/code&gt;) if it is set to the Pallas curve identity point.&lt;/p&gt;

&lt;h2&gt;
  
  
  TL;DR
&lt;/h2&gt;

&lt;p&gt;An unauthenticated remote attacker can crash a vulnerable Zebra node by broadcasting a crafted Orchard transaction where the &lt;code&gt;rk&lt;/code&gt; field is the identity point. This triggers an &lt;code&gt;.unwrap()&lt;/code&gt; panic in the underlying &lt;code&gt;orchard&lt;/code&gt; crate, leading to immediate process termination.&lt;/p&gt;




&lt;h2&gt;
  
  
  Technical Details
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;CWE ID&lt;/strong&gt;: CWE-248&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Attack Vector&lt;/strong&gt;: Network&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;CVSS 4.0&lt;/strong&gt;: 8.7&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Impact&lt;/strong&gt;: Denial of Service&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Exploit Status&lt;/strong&gt;: none&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;KEV Status&lt;/strong&gt;: Not Listed&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Affected Systems
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Zebra (zebrad)&lt;/li&gt;
&lt;li&gt;Zebra (zebra-chain)&lt;/li&gt;
&lt;li&gt;Zcash network nodes&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Zebra&lt;/strong&gt;: &amp;lt; 4.3.1 (Fixed in: &lt;code&gt;4.3.1&lt;/code&gt;)&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Mitigation Strategies
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Upgrade all Zebra nodes to version 4.3.1 or later.&lt;/li&gt;
&lt;li&gt;Monitor process logs for panics related to the &lt;code&gt;orchard&lt;/code&gt; crate or &lt;code&gt;circuits.rs&lt;/code&gt;.&lt;/li&gt;
&lt;li&gt;Adhere to the updated Zcash protocol specification regarding the rejection of identity &lt;code&gt;rk&lt;/code&gt; values.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Remediation Steps:&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Stop the running &lt;code&gt;zebrad&lt;/code&gt; service.&lt;/li&gt;
&lt;li&gt;Download or compile Zebra version 4.3.1.&lt;/li&gt;
&lt;li&gt;Restart the &lt;code&gt;zebrad&lt;/code&gt; service with the updated binary.&lt;/li&gt;
&lt;li&gt;Verify that the node resumes syncing and processing transactions correctly.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  References
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://github.com/advisories/GHSA-452v-w3gx-72wg" rel="noopener noreferrer"&gt;GitHub Security Advisory GHSA-452v-w3gx-72wg&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/ZcashFoundation/zebra/releases/tag/v4.3.1" rel="noopener noreferrer"&gt;Official Zebra Release v4.3.1&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://forum.zcashcommunity.com/t/zebra-4-3-1-critical-security-fixes-dockerized-mining-and-ci-hardening/55389" rel="noopener noreferrer"&gt;Zcash Community Forum Announcement&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://osv.dev/vulnerability/GHSA-452v-w3gx-72wg" rel="noopener noreferrer"&gt;OSV Record&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;




&lt;p&gt;&lt;em&gt;&lt;a href="https://cvereports.com/reports/GHSA-452V-W3GX-72WG" rel="noopener noreferrer"&gt;Read the full report for GHSA-452V-W3GX-72WG on our website&lt;/a&gt; for more details including interactive diagrams and full exploit analysis.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>security</category>
      <category>cve</category>
      <category>cybersecurity</category>
      <category>ghsa</category>
    </item>
    <item>
      <title>GHSA-29X4-R6JV-FF4W: GHSA-29X4-R6JV-FF4W: Denial of Service via Interrupted JSON-RPC Requests in Zebra zebra-rpc</title>
      <dc:creator>CVE Reports</dc:creator>
      <pubDate>Sun, 19 Apr 2026 13:40:20 +0000</pubDate>
      <link>https://dev.to/cverports/ghsa-29x4-r6jv-ff4w-ghsa-29x4-r6jv-ff4w-denial-of-service-via-interrupted-json-rpc-requests-in-50gi</link>
      <guid>https://dev.to/cverports/ghsa-29x4-r6jv-ff4w-ghsa-29x4-r6jv-ff4w-denial-of-service-via-interrupted-json-rpc-requests-in-50gi</guid>
      <description>&lt;h1&gt;
  
  
  GHSA-29X4-R6JV-FF4W: Denial of Service via Interrupted JSON-RPC Requests in Zebra zebra-rpc
&lt;/h1&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Vulnerability ID:&lt;/strong&gt; GHSA-29X4-R6JV-FF4W&lt;br&gt;
&lt;strong&gt;CVSS Score:&lt;/strong&gt; 6.5&lt;br&gt;
&lt;strong&gt;Published:&lt;/strong&gt; 2026-04-18&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;A Denial of Service (DoS) vulnerability exists in the Zebra Zcash node's JSON-RPC interface. An authenticated attacker can crash the node daemon by abruptly terminating an HTTP request during the payload transmission phase, exploiting unhandled I/O errors in the zebra-rpc crate.&lt;/p&gt;

&lt;h2&gt;
  
  
  TL;DR
&lt;/h2&gt;

&lt;p&gt;Zebra nodes prior to version 4.3.1 are vulnerable to a persistent DoS attack. Authenticated clients sending partial HTTP requests followed by a TCP RST can trigger an unhandled panic in the RPC middleware.&lt;/p&gt;




&lt;h2&gt;
  
  
  Technical Details
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Advisory ID&lt;/strong&gt;: GHSA-29X4-R6JV-FF4W&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;CWE Class&lt;/strong&gt;: CWE-248 (Uncaught Exception)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Attack Vector&lt;/strong&gt;: Network&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Authentication Required&lt;/strong&gt;: Yes&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Base CVSS Score&lt;/strong&gt;: 6.5&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Exploit Status&lt;/strong&gt;: None&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Patched Version&lt;/strong&gt;: 4.3.1&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Affected Systems
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;zebra-rpc crate&lt;/li&gt;
&lt;li&gt;zebrad node daemon&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;zebra-rpc&lt;/strong&gt;: &amp;lt; 4.3.1 (Fixed in: &lt;code&gt;4.3.1&lt;/code&gt;)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;zebrad&lt;/strong&gt;: &amp;lt; 4.3.1 (Fixed in: &lt;code&gt;4.3.1&lt;/code&gt;)&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Mitigation Strategies
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Upgrade the Zebra daemon to version 4.3.1 or higher.&lt;/li&gt;
&lt;li&gt;Restrict JSON-RPC port access to trusted loopback interfaces.&lt;/li&gt;
&lt;li&gt;Enforce strict firewall rules preventing external connections to port 8232 or 18232.&lt;/li&gt;
&lt;li&gt;Implement process managers (e.g., systemd) configured to automatically restart the node upon unexpected termination.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Remediation Steps:&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Verify current node version with &lt;code&gt;zebrad --version&lt;/code&gt;.&lt;/li&gt;
&lt;li&gt;Download the Zebra v4.3.1 release binaries or fetch the latest source code from the main repository.&lt;/li&gt;
&lt;li&gt;Stop the running Zebra daemon.&lt;/li&gt;
&lt;li&gt;Replace the existing &lt;code&gt;zebrad&lt;/code&gt; binary with the v4.3.1 build.&lt;/li&gt;
&lt;li&gt;Restart the node and verify that the daemon synchronizes properly with the network.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  References
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://github.com/advisories/GHSA-29X4-R6JV-FF4W" rel="noopener noreferrer"&gt;GitHub Advisory: GHSA-29X4-R6JV-FF4W&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://forum.zcashcommunity.com/t/zebra-4-3-1-critical-security-fixes-dockerized-mining-and-ci-hardening/55389" rel="noopener noreferrer"&gt;Zcash Community Announcement&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://osv.dev/vulnerability/GHSA-29x4-r6jv-ff4w" rel="noopener noreferrer"&gt;OSV Record&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;




&lt;p&gt;&lt;em&gt;&lt;a href="https://cvereports.com/reports/GHSA-29X4-R6JV-FF4W" rel="noopener noreferrer"&gt;Read the full report for GHSA-29X4-R6JV-FF4W on our website&lt;/a&gt; for more details including interactive diagrams and full exploit analysis.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>security</category>
      <category>cve</category>
      <category>cybersecurity</category>
      <category>ghsa</category>
    </item>
  </channel>
</rss>
