π Our researcher a1exdandy has uncovered vulnerabilities in GD32 microcontrollers (GigaDevice) that bypass protection mechanisms, allowing memory extraction.
The article π https://swarm.ptsecurity.com/gigavulnerability-readout-protection-bypass-on-gigadevice-gd32-mcus/
The article π https://swarm.ptsecurity.com/gigavulnerability-readout-protection-bypass-on-gigadevice-gd32-mcus/
π28
π₯ The "impossible" XXE in PHP? Not so impossible anymore.
Our researcher Aleksandr Zhurnakov discovered an interesting combination of PHP wrappers and a feature of XML parsing in libxml2 to exploit it.
Read: https://swarm.ptsecurity.com/impossible-xxe-in-php/
Our researcher Aleksandr Zhurnakov discovered an interesting combination of PHP wrappers and a feature of XML parsing in libxml2 to exploit it.
Read: https://swarm.ptsecurity.com/impossible-xxe-in-php/
π54
Next.js and the corrupt middleware: the authorizing artifact
π€ by Rachid Allam & Yasser Allam
Researchers have discovered a critical vulnerability in Next.js, a popular framework for building web applications. The flaw allows attackers to bypass middleware responsible for request processing, including authentication and path rewrites.
By adding the
Many versions of Next.js are affected, making this a widespread security concern.
π Contents:
β The Next.js middleware
β The authorizing artifact artifact: old code, 0ld treasure
β’ Execution order and
β The authorizing artifact: nostalgia has its charm, but living in the moment is better
β’ /src directory
β’ Max recursion depth
β Exploits
β’ Authorization/Rewrite bypass
β’ CSP bypass
β’ DoS via Cache-Poisoning (what?)
β’ Clarification
β Security Advisory - CVE-2025-29927
β Disclaimer
β Conclusion
https://zhero-web-sec.github.io/research-and-things/nextjs-and-the-corrupt-middleware
π€ by Rachid Allam & Yasser Allam
Researchers have discovered a critical vulnerability in Next.js, a popular framework for building web applications. The flaw allows attackers to bypass middleware responsible for request processing, including authentication and path rewrites.
By adding the
x-middleware-subrequest header with a specific value, an attacker can completely ignore middleware execution, gaining unauthorized access to protected resources. Additionally, the vulnerability can be exploited for denial-of-service (DoS) attacks by poisoning the cache, leading to service disruption.Many versions of Next.js are affected, making this a widespread security concern.
π Contents:
β The Next.js middleware
β The authorizing artifact artifact: old code, 0ld treasure
β’ Execution order and
middlewareInfo.nameβ The authorizing artifact: nostalgia has its charm, but living in the moment is better
β’ /src directory
β’ Max recursion depth
β Exploits
β’ Authorization/Rewrite bypass
β’ CSP bypass
β’ DoS via Cache-Poisoning (what?)
β’ Clarification
β Security Advisory - CVE-2025-29927
β Disclaimer
β Conclusion
https://zhero-web-sec.github.io/research-and-things/nextjs-and-the-corrupt-middleware
π28
Don't Call That "Protected" Method: Dissecting an N-Day vBulletin RCE
π€ by Egidio Romano
The article analyzes a critical Unauthenticated Remote Code Execution vulnerability (CVE-2025-48827) in vBulletin, which becomes exploitable when running on PHP 8.1 or newer.
The vulnerability stems from vBulletinβs misuse of
π Contents:
β The Vulnerability
β The vBulletin Vulnerability
β Exploiting vBulletin: Path to Pre-Auth RCE
β Conclusion
https://karmainsecurity.com/dont-call-that-protected-method-vbulletin-rce
π€ by Egidio Romano
The article analyzes a critical Unauthenticated Remote Code Execution vulnerability (CVE-2025-48827) in vBulletin, which becomes exploitable when running on PHP 8.1 or newer.
The vulnerability stems from vBulletinβs misuse of
ReflectionMethod::invoke(), which in PHP 8.1+ no longer blocks access to protected methods by default. As a result, attackers can remotely trigger sensitive internal functions originally meant to be inaccessible and achieve code execution on the server.π Contents:
β The Vulnerability
β The vBulletin Vulnerability
β Exploiting vBulletin: Path to Pre-Auth RCE
β Conclusion
https://karmainsecurity.com/dont-call-that-protected-method-vbulletin-rce
π17
This media is not supported in your browser
VIEW IN TELEGRAM
β οΈ We've reproduced CVE-2025-49113 in Roundcube.
This vulnerability allows authenticated users to execute arbitrary commands via PHP object deserialization.
If you're running Roundcube β update immediately!
This vulnerability allows authenticated users to execute arbitrary commands via PHP object deserialization.
If you're running Roundcube β update immediately!
π67π2
π§ Our researcher Sergey Tarasov discovered a vulnerability (CVE-2025-49689) in NTFS on MS Windows.
The article dives into the exploitation path, file system internals, VHD format, and more.
π Read the article: https://swarm.ptsecurity.com/buried-in-the-log-exploiting-a-20-years-old-ntfs-vulnerability/
The article dives into the exploitation path, file system internals, VHD format, and more.
π Read the article: https://swarm.ptsecurity.com/buried-in-the-log-exploiting-a-20-years-old-ntfs-vulnerability/
π31
π Read the new article "Daemon Ex Plist: LPE via MacOS Daemons" by our researcher Egor Filatov.
This research reveals a vulnerability affecting popular apps like Mozilla VPN, Tunnelblick & more.
https://swarm.ptsecurity.com/daemon-ex-plist-lpe-via-macos-daemons/
This research reveals a vulnerability affecting popular apps like Mozilla VPN, Tunnelblick & more.
https://swarm.ptsecurity.com/daemon-ex-plist-lpe-via-macos-daemons/
π22π1
π Our researcher has discovered LPE in VMWare Tools (CVE-2025-22230 & CVE-2025-22247) via VGAuth!
Write-up by the one who broke it: Sergey Bliznyuk
https://swarm.ptsecurity.com/the-guest-who-could-exploiting-lpe-in-vmware-tools/
Write-up by the one who broke it: Sergey Bliznyuk
https://swarm.ptsecurity.com/the-guest-who-could-exploiting-lpe-in-vmware-tools/
π43
π¨ We've launched dbugs.ptsecurity.com, a new home for vulnerabilities. More than CVEs. More than MITRE.
β Trends & Insights
β AI-generated, multi-source vulnerability descriptions
β Researcher credits
Explore now: https://dbugs.ptsecurity.com
β Trends & Insights
β AI-generated, multi-source vulnerability descriptions
β Researcher credits
Explore now: https://dbugs.ptsecurity.com
π76π3
π± New article by our researcher Artem Kulakov: Injection for an athlete.
Read about a vulnerability discovered in the Garmin Connect mobile application:
https://swarm.ptsecurity.com/injection-for-an-athlete/
Read about a vulnerability discovered in the Garmin Connect mobile application:
https://swarm.ptsecurity.com/injection-for-an-athlete/
π25π1
π A new article from our researchers Aleksey Solovev, Nikita Sveshnikov and Vladimir Razov β "Blind trust: what is hidden behind the process of creating your PDF file?".
https://swarm.ptsecurity.com/blind-trust-what-is-hidden-behind-the-process-of-creating-your-pdf-file/
https://swarm.ptsecurity.com/blind-trust-what-is-hidden-behind-the-process-of-creating-your-pdf-file/
π28π2
This media is not supported in your browser
VIEW IN TELEGRAM
π Microsoft fixed an authenticated RCE in Windows Telephony Service (CVE-2026-20931), discovered by our researcher Sergey Bliznyuk.
Read the write-up: https://swarm.ptsecurity.com/whos-on-the-line-exploiting-rce-in-windows-telephony-service/
Read the write-up: https://swarm.ptsecurity.com/whos-on-the-line-exploiting-rce-in-windows-telephony-service/
π54π1
π Two of our research articles are nominated for PortSwigger's Top 10 Web Hacking Techniques of 2025!
1οΈβ£ Impossible XXE in PHP
2οΈβ£ Blind trust: what is hidden behind the process of creating your PDF file?
Last day to vote if you found them useful!
https://portswigger.net/polls/top-10-web-hacking-techniques-2025
1οΈβ£ Impossible XXE in PHP
2οΈβ£ Blind trust: what is hidden behind the process of creating your PDF file?
Last day to vote if you found them useful!
https://portswigger.net/polls/top-10-web-hacking-techniques-2025
portswigger.net
Top 10 web hacking techniques of 2025
Welcome to the community vote for the Top 10 Web Hacking Techniques of 2025.
π51π1
This media is not supported in your browser
VIEW IN TELEGRAM
π¨ Our researcher Alexander Zhurnakov identified two vulnerabilities in Dell Wyse Management Suite prior to version 5.5.
In certain configurations, they can be chained to achieve unauthenticated remote code execution.
Upgrade now β https://www.dell.com/support/kbdoc/en-us/000429141/dsa-2026-103
In certain configurations, they can be chained to achieve unauthenticated remote code execution.
Upgrade now β https://www.dell.com/support/kbdoc/en-us/000429141/dsa-2026-103
π40
π Attack arithmetic: how an integer overflow in PostgreSQL libpq leads to denial of service.
Our researcher Aleksey Solovev discovered the vulnerability CVE-2025-12818, which may cause a product using the libpq PostgreSQL library to crash.
https://swarm.ptsecurity.com/attack-arithmetic-how-an-integer-overflow-in-postgresql-libpq-leads-to-denial-of-service/
Our researcher Aleksey Solovev discovered the vulnerability CVE-2025-12818, which may cause a product using the libpq PostgreSQL library to crash.
https://swarm.ptsecurity.com/attack-arithmetic-how-an-integer-overflow-in-postgresql-libpq-leads-to-denial-of-service/
π20π1
Two bugs. One chain. Full RCE.
New research by Aleksandr Zhurnakov on Dell Wyse Management Suite shows how business logic flaws can be chained into complete system compromise.
Read the full writeup!
https://swarm.ptsecurity.com/business-logic-and-chains-unauthenticated-rce-in-dell-wyse-management-suite/
New research by Aleksandr Zhurnakov on Dell Wyse Management Suite shows how business logic flaws can be chained into complete system compromise.
Read the full writeup!
https://swarm.ptsecurity.com/business-logic-and-chains-unauthenticated-rce-in-dell-wyse-management-suite/
π26
π₯ Read the new article by our researcher Timofey Duditsky.
The write-up dives into the AMD Platform Configuration Blobs mechanism, shows how it works, and reveals the vulnerability CVE-2025-54502.
https://swarm.ptsecurity.com/slowburn-looking-through-amd-platform-configuration-blobs-infrastructure/
The write-up dives into the AMD Platform Configuration Blobs mechanism, shows how it works, and reveals the vulnerability CVE-2025-54502.
https://swarm.ptsecurity.com/slowburn-looking-through-amd-platform-configuration-blobs-infrastructure/
π21
π§βπ Our researcher Mikhail Sukhov shares his knowledge and experience in analyzing FreeIPA environments.
He also introduces his new tool, IPAHound πͺ
Go βn see the details β‘οΈ https://swarm.ptsecurity.com/thinking-in-graphs-with-ipahound/
He also introduces his new tool, IPAHound πͺ
Go βn see the details β‘οΈ https://swarm.ptsecurity.com/thinking-in-graphs-with-ipahound/
π43
π PHP JPEG bugs: how image parsing leads to memory corruption.
Our researcher Nikita Sveshnikov discovered two JPEG-related memory-safety bugs in PHPβs ext/standard: CVE-2025-14177 in getimagesize and a heap buffer overflow in iptcembed.
https://swarm.ptsecurity.com/hack-the-elephant-one-bite-at-a-time-jpeg-related-memory-safety-bugs-in-php/
Our researcher Nikita Sveshnikov discovered two JPEG-related memory-safety bugs in PHPβs ext/standard: CVE-2025-14177 in getimagesize and a heap buffer overflow in iptcembed.
https://swarm.ptsecurity.com/hack-the-elephant-one-bite-at-a-time-jpeg-related-memory-safety-bugs-in-php/
π25π2