A critical security flaw, identified as CVE-2025-52562, has been discovered in Performave Convoy, a popular KVM-based server management platform. This severe vulnerability, which has been assigned the maximum CVSS score of 10.0, allows attackers to execute arbitrary code remotely without needing any authentication. Its potential impact is devastating, placing thousands of servers at risk of total compromise. The vulnerability stems from insufficient input validation within Convoy's LocaleController component. Malicious actors can exploit this by crafting specially designed HTTP requests that manipulate the locale and namespace parameters. This manipulation enables directory traversal and the inclusion of arbitrary PHP files, granting attackers full remote code execution, exposure of sensitive environment variables, and unauthorized system access. The flaw impacts Convoy versions from 3.9.0-rc3 through 4.4.0, with a patch available in version 4.4.1. Attackers are actively bypassing existing sanitization measures by altering the locale parameter or misusing acceptable characters in the namespace field, potentially deploying payloads like reverse shells or persistent cron scripts to maintain control. To protect against this threat, immediate upgrade to Convoy 4.4.1 is crucial. Furthermore, implementing web application firewalls (WAFs) with strict input validation rules, including whitelisting locale values and tightly controlling namespace formats, is highly recommended. Security teams should also actively monitor for unusual PHP activity, suspicious cron jobs, and outbound network traffic to unknown IP addresses. Given the ongoing exploitation attempts targeting this vulnerability, prompt action is vital to prevent ransomware attacks or data breaches.
A critical security flaw in Oracle WebLogic Server has rapidly become a prime target for attackers worldwide. Identified as CVE-2026-21962, the issue carries the highest possible s...
A new Windows malware called ResokerRAT has been discovered, which allows attackers to secretly control infected systems. This malware uses Telegram instead of traditional servers ...
A vulnerability has been identified in Google Cloud’s Vertex AI platform that could allow unauthorized users to access sensitive data associated with machine learning workloads. ...