libsoup WebSocket Out-of-Bounds Read Vulnerability Volerion Risk Score: 8.2 Why this matters When max_incoming_payload_size is left unset (or set to 0), a remote attacker can send crafted WebSocket frames that cause the libsoup function process_frame() to read outside a buffer. This out-of-bounds read may crash applications using libsoup or leak memory contents, exposing sensitive information and setting the stage for more severe exploits. Recommended actions Configure applications to set...
11 days ago • 1 min read
OWASP Core Rule Set Multipart Request Processing Vulnerability in Rule 922110 Volerion Risk Score: 7.4 Why this matters In affected versions of the OWASP Core Rule Set (CRS), rule 922110 keeps only the last Content-Type charset it encounters when inspecting multipart requests. An attacker can therefore smuggle a malicious charset (e.g. utf-7) into an earlier part and overwrite it with a benign value later in the request, bypassing the intended WAF protection and allowing harmful payloads to...
16 days ago • 1 min read
cpp-httplib CRLF Injection Vulnerability in Header Processing Allowing SSRF Volerion Risk Score: 7.7 Why this matters cpp-httplib versions ≤ 0.29.0 fail to sanitize carriage return and line feed characters in user-supplied header values. A remote attacker can inject additional headers, alter the HTTP request body, and leverage the issue for server-side request forgery (SSRF) against back-end systems that interpret pipelined requests. Recommended actions Upgrade to cpp-httplib 0.30.0 or later,...
23 days ago • 1 min read
Parse Server Elevated Permissions Vulnerability in GitHub Actions Workflow Volerion Risk Score: 7.5 Why this matters A GitHub Actions workflow in Parse Server versions prior to 8.6.0-alpha.2 runs with elevated permissions. When triggered from a fork, the workflow can access repository secrets and obtain write access, allowing attackers to exfiltrate confidential information or inject malicious code into the project’s CI/CD pipeline. Recommended actions Upgrade Parse Server to 8.6.0-alpha.2 or...
about 1 month ago • 1 min read
cpp-httplib Untrusted HTTP Header Handling Vulnerability Allowing Header Injection and Authorization Bypass Volerion Risk Score: 7.3 Why this matters cpp-httplib versions ≤ 0.26.0 allow attackers to spoof critical metadata headers like REMOTE_ADDR and LOCAL_PORT. Downstream components that rely on these headers for logging, auditing, or IP-based access controls may trust attacker-supplied values, enabling IP spoofing, log poisoning, and unauthorized access to protected resources. Recommended...
about 2 months ago • 1 min read
cpp-httplib Untrusted Header Handling Vulnerability Leading to Log Poisoning Volerion Risk Score: 7.3 Why this matters cpp-httplib versions 0.26.0 and earlier trust attacker-supplied X-Forwarded-For and X-Real-IP headers without validation. An unauthenticated remote attacker can spoof client IP information, leading to log poisoning that undermines the integrity of audit trails and monitoring. Recommended actions Upgrade to cpp-httplib 0.27.0 or later, which disables acceptance of untrusted...
about 2 months ago • 1 min read
LearnPress WordPress LMS Plugin Sensitive Information Disclosure Vulnerability Volerion Risk Score: 7.4 Why this matters The LearnPress WordPress LMS plugin (versions ≤ 4.2.9.4) fails to enforce capability checks on the /wp-json/lp/v1/load_content_via_ajax REST endpoint. Unauthenticated attackers can invoke admin-only template callbacks and retrieve sensitive educational content—such as course curricula, quiz questions with correct answers, and other protected materials—directly via the...
2 months ago • 1 min read
ThinkPHP Remote Code Execution Vulnerability in Template File Inclusion Volerion Risk Score: 7.9 Why this matters The template file inclusion mechanism in ThinkPHP 5.0.24 can be abused to load attacker-controlled files containing PHP code. Successful exploitation leads to unauthenticated remote code execution on the web server, granting full control over the application and underlying host. Recommended actions Update ThinkPHP to a version that addresses this vulnerability. Implement strict...
2 months ago • 1 min read
ThinkPHP Arbitrary File Read Vulnerability Volerion Risk Score: 7.8 Why this matters In ThinkPHP 5.0.24, the fetch() function in Template.php improperly processes template paths. A remote attacker can supply directory-traversal sequences (e.g. ../../../../password.txt) that are passed to file_get_contents(), allowing unauthorized reading of sensitive server files such as configuration or credential stores. Recommended actions Upgrade to a non-vulnerable release of ThinkPHP. Implement strict...
2 months ago • 1 min read