WhisperX tag archive

#web security

This page collects WhisperX intelligence signals tagged #web security. It is designed for humans, search engines, and AI agents: each item links to a canonical source-backed record with sector, source, timestamp, credibility, and exportable structured data.

Latest Signals (20)

The Lab Β· 2026-03-25 13:27:26 Β· GitHub Issues

1. Critical File Path Manipulation Vulnerability Exposed in Test Application

A critical security flaw has been confirmed in a test application, exposing its internal configuration to potential attackers. The vulnerability, classified with a severity of CRITICAL, allows for file path manipulation attacks. A test payload containing the path `../WEB-INF/web.xml` was successfully submitted to the a...

The Lab Β· 2026-03-25 15:27:33 Β· GitHub Issues

2. πŸ”’ HIGH-Severity XSS Vulnerability Exposed in JavaScript File: Direct innerHTML Assignment Poses Active Risk

A high-severity Cross-Site Scripting (XSS) vulnerability has been identified within a single JavaScript file, posing a direct risk of client-side script injection. The flaw is classified under CWE-79 and OWASP A03:2021 - Injection, with an 80% confidence rating. The core issue is a direct, unescaped assignment of user ...

The Lab Β· 2026-03-26 13:27:31 Β· GitHub Issues

3. Critical File Path Manipulation Vulnerability Exposed in Test Application, WEB-INF/web.xml Accessed

A critical file path manipulation vulnerability has been confirmed in a staging environment, allowing unauthorized access to a sensitive server configuration file. The attack succeeded by submitting a simple payload containing '../WEB-INF/web.xml' through a user-controllable parameter, which the server then processed a...

The Lab Β· 2026-03-26 21:27:20 Β· GitHub Issues

4. Astro Vercel Integration Exposes Critical Path Traversal Vulnerability (CVE-2026-33768)

A critical security flaw in the `@astrojs/vercel` integration allows unauthenticated attackers to rewrite internal server request paths, potentially leading to path traversal attacks. The vulnerability, tracked as CVE-2026-33768, stems from the serverless entrypoint reading the `x-astro-path` header and `x_astro_path` ...

The Lab Β· 2026-03-27 02:27:00 Β· GitHub Issues

5. Bokeh Server Security Flaw: CVE-2026-21883 Exposes Deployed Instances to WebSocket Hijacking

A critical security vulnerability, CVE-2026-21883, has been disclosed in the Bokeh data visualization library, exposing deployed server instances to Cross-Site WebSocket Hijacking (CSWSH). The flaw, which prompted an automated dependency update from version 2.4.3 to 3.8.2, allows attackers to hijack WebSocket connectio...

The Lab Β· 2026-03-27 17:27:31 Β· GitHub Issues

6. CVE-2026-28368: Undertow μ›Ή μ„œλ²„μ˜ 헀더 νŒŒμ‹± 취약점, μ£Όμš” Red Hat μ œν’ˆκ΅°μ— 영ν–₯

Red Hat의 핡심 μ—”ν„°ν”„λΌμ΄μ¦ˆ μ œν’ˆκ΅°μ„ 기반으둜 ν•˜λŠ” μˆ˜λ§Žμ€ μ‹œμŠ€ν…œμ— μ‹¬κ°ν•œ λ³΄μ•ˆ μœ„ν˜‘μ΄ μ œκΈ°λ˜μ—ˆλ‹€. CVE-2026-28368둜 μ‹λ³„λœ 이 취약점은 Undertow μ›Ή μ„œλ²„μ˜ 일관성 μ—†λŠ” HTTP 헀더 νŒŒμ‹± λ‘œμ§μ—μ„œ λΉ„λ‘―λ˜λ©°, μš”μ²­ λ°€μˆ˜(Request Smuggling) 곡격을 κ°€λŠ₯ν•˜κ²Œ ν•  수 μžˆλ‹€. CVSS 8.7점의 높은 μœ„ν—˜ 등급은 원격 κ³΅κ²©μžκ°€ μ•…μ˜μ μΈ μš”μ²­μ„ 톡해 λ°±μ—”λ“œ μ‹œμŠ€ν…œμ˜ λ™μž‘μ„ λ³€μ‘°ν•˜κ±°λ‚˜ λ‹€λ₯Έ 곡격을 μœ„ν•œ λ°œνŒμ„ λ§ˆλ ¨ν•  수 μžˆμŒμ„ μ‹œμ‚¬ν•œλ‹€. 이 μ·¨μ•½μ μ˜ 영ν–₯은 κ΄‘λ²”μœ„ν•˜λ‹€. Red Hat Enterprise Linux 8, 9, 10을 λΉ„λ‘―ν•΄,...

The Lab Β· 2026-03-27 17:27:33 Β· GitHub Issues

7. CVE-2026-28367: Undertow μ›Ή μ„œλ²„μ˜ '\r\r\r' 헀더 λ°€μˆ˜ 취약점, μ£Όμš” Red Hat μ œν’ˆκ΅°μ— 영ν–₯

Red Hat의 핡심 μ›Ή μ„œλ²„ 엔진인 Undertowμ—μ„œ HTTP μš”μ²­ λ°€μˆ˜(Request Smuggling) 취약점이 곡개적으둜 식별됐닀. CVE-2026-28367둜 μ§€μ •λœ 이 취약점은 κ³΅κ²©μžκ°€ 비정상적인 `\r\r\r` 헀더 블둝 μ’…λ£Œ 문자λ₯Ό μ‚¬μš©ν•΄ ν”„λ‘ νŠΈμ—”λ“œ μ„œλ²„μ™€ λ°±μ—”λ“œ Undertow μ„œλ²„ κ°„μ˜ μš”μ²­ 해석을 λΆˆμΌμΉ˜μ‹œμΌœ, ν•˜λ‚˜μ˜ μš”μ²­μ„ 두 개둜 λΆ„λ¦¬ν•˜κ±°λ‚˜ μˆ¨κ²¨μ§„ μš”μ²­μ„ μ£Όμž…ν•  수 μžˆλŠ” μœ„ν—˜μ„ μ΄ˆλž˜ν•œλ‹€. CVSS 8.7의 높은 심각도 μ μˆ˜λŠ” 원격 μ½”λ“œ μ‹€ν–‰μ΄λ‚˜ λ―Όκ°ν•œ 데이터 λ…ΈμΆœκ³Ό 같은 μ‹¬κ°ν•œ 곡격 경둜λ₯Ό 열어놓을 κ°€λŠ₯성을 μ‹œμ‚¬ν•œλ‹€. 이 취약점은 Undert...

The Lab Β· 2026-03-28 03:26:57 Β· GitHub Issues

8. CVE-2026-33870: Netty HTTP Codec Vulnerability Exposes Servers to Request Smuggling Attacks

A critical security flaw, designated CVE-2026-33870, has been disclosed in the widely-used `io.netty:netty-codec-http` library. The vulnerability, classified as an 'Inconsistent Interpretation of HTTP Requests' or HTTP request/response smuggling (CWE-444), allows attackers to bypass security controls and potentially po...

The Lab Β· 2026-03-28 11:27:09 Β· GitHub Issues

9. Catroweb Apache Configuration Exposes Children's Platform to Critical Security Vulnerabilities

A critical security gap has been identified in the Apache web server configuration for Catroweb, a children's platform. The configuration file (`docker/apache/catroweb.conf`) lacks any standard security headers, leaving the site vulnerable to a range of common web attacks. This absence is particularly significant given...

The Lab Β· 2026-03-29 05:27:07 Β· GitHub Issues

10. Express.js CVE-2024-43796: Medium-Severity Open Redirect Vulnerability in Versions < 4.20.0

A medium-severity vulnerability in the widely-used Express.js web framework exposes applications to potential open redirect attacks. Tracked as CVE-2024-43796, the flaw exists in all versions of Express prior to 4.20.0. The core risk is that passing any untrusted user inputβ€”even after it has been sanitizedβ€”to the `resp...

The Lab Β· 2026-03-29 15:27:03 Β· GitHub Issues

11. SEC-012: Critical XSS Vulnerability in Dashboard via Unescaped Single Quotes in Inline Handlers

A critical cross-site scripting (XSS) vulnerability has been identified in the platform's dashboard, exposing users to potential session hijacking and data theft. The flaw resides in multiple inline `onclick` handlers that fail to properly escape single quotes, allowing attackers to inject and execute arbitrary JavaScr...

The Lab Β· 2026-03-29 18:26:56 Β· GitHub Issues

12. CSRF Vulnerability in Sessions Helper Exposes Ruby on Rails App to Session Hijacking

A security scan has flagged a medium-severity Cross-Site Request Forgery (CSRF) vulnerability within a Ruby on Rails application, pinpointing a critical misconfiguration in session management. The flaw resides in the `app/helpers/sessions_helper.rb` file, where two permanent cookies are being set without essential secu...

The Lab Β· 2026-03-29 20:26:54 Β· GitHub Issues

13. CSRF Vulnerability in Ruby on Rails Session Helper Exposes User Authentication

A security scan has flagged a Cross-Site Request Forgery (CSRF) vulnerability within a core authentication file of a Ruby on Rails application. The issue, classified with medium severity, centers on the `app/helpers/sessions_helper.rb` file, where two instances of cookie creation lack essential security flags. Specific...

The Lab Β· 2026-03-30 17:27:24 Β· GitHub Issues

14. GitHub Issue: MCP Endpoint Probe Lacks Critical CORS Misconfiguration Detection

A significant security gap has been identified in the `mcp probe` tool. The current verification process for MCP (Model Context Protocol) endpoints performs no analysis of Cross-Origin Resource Sharing (CORS) policies, leaving a critical vulnerability unaddressed. This omission is explicitly noted in the project's TODO...

The Lab Β· 2026-03-30 23:27:09 Β· GitHub Issues

15. Nuxt Security Flaw CVE-2024-34343: navigateTo Function Fails to Block javascript: Protocol

A critical security vulnerability in the Nuxt framework, tracked as CVE-2024-34343, exposes applications to potential cross-site scripting (XSS) attacks. The flaw resides in the `navigateTo` function, which is designed to block the `javascript:` protocol but fails to correctly utilize the APIs provided by the underlyin...

The Lab Β· 2026-03-31 02:26:58 Β· GitHub Issues

16. πŸ”’ GitHub Codebase Exposed: High-Severity XSS Vulnerability in Core JavaScript File

A high-severity Cross-Site Scripting (XSS) vulnerability has been identified within a core JavaScript file of a GitHub-hosted project, posing a direct risk of client-side script injection. The flaw, classified under CWE-79 and OWASP A03:2021 - Injection, carries an 80% confidence rating and is located in a single, crit...

The Lab Β· 2026-03-31 02:27:03 Β· GitHub Issues

17. πŸ”’ XSS Vulnerability in Development Config Exposes Potential Client-Side Attack Vector

A high-severity Cross-Site Scripting (XSS) vulnerability has been identified within a critical development environment configuration file. The flaw, classified under CWE-79 and OWASP A03:2021 - Injection, resides in a single instance where user input is rendered directly into HTML without proper sanitization. This crea...

The Lab Β· 2026-03-31 06:27:21 Β· GitHub Issues

18. CVE-2024-47764: Medium-Severity Cookie Parsing Flaw Exposes Node.js Servers to Manipulation

A newly disclosed vulnerability in a foundational Node.js library opens a subtle but exploitable path for attackers to manipulate cookie data on web servers. CVE-2024-47764, rated with medium severity, targets the widely used `cookie` library, a core component for parsing and serializing HTTP cookies. The flaw allows a...

The Lab Β· 2026-04-01 08:26:58 Β· GitHub Issues

19. Magix CMS 4 Exposed Installer Allows Unauthenticated Admin Takeover

A critical security flaw in Magix CMS 4 leaves the software's installation workflow fully accessible after deployment, enabling any unauthenticated attacker to completely hijack the website. The vulnerability stems from the installer entry point failing to properly block access once the CMS is configured, allowing remo...

The Lab Β· 2026-04-01 12:27:18 Β· GitHub Issues

20. CVE-2026-33870: Netty HTTP Codec Vulnerability Exposes Servers to Request Smuggling Attacks

A critical vulnerability in a widely-used Java networking library opens a direct path for attackers to bypass security controls and poison web caches. Tracked as CVE-2026-33870, the flaw resides in the `io.netty:netty-codec-http` library, specifically version 4.2.9.Final. The core issue is an 'Inconsistent Interpretati...