Back to all posts
CVE-2026-21858: Ni8mare Enables Unauthenticated RCE in n8n Webhooks
Research

CVE-2026-21858: Ni8mare Enables Unauthenticated RCE in n8n Webhooks

Executive Summary CVE-2026-21858 (Ni8mare) is a critical unauthenticated remote code execution vulnerability in n8n, a widely used workflow automation platform. The flaw is caused by content-type confusion in webhook request handling, allowing attackers to forge uploaded files, read arbitrary local files, forge administrator sessions, and ultimately execute commands on the underlying host. The vulnerability affects […]

CVE-2026-21877: Critical Remote Code Execution in n8n
Research

CVE-2026-21877: Critical Remote Code Execution in n8n

Executive Summary CVE-2026-21877 is a critical remote code execution vulnerability in n8n that allows an authenticated user to execute arbitrary code on the underlying instance. The issue affects n8n versions >= 0.123.0 and < 1.121.3 and is fixed in 1.121.3 and later. In environments where n8n automates workflows with access to internal systems, credentials, and […]

CVE-2025-68664: LangChain Serialization Injection in dumps() and load()
Research

CVE-2025-68664: LangChain Serialization Injection in dumps() and load()

Executive Summary CVE-2025-68664 is a critical serialization injection vulnerability in LangChain that affects how data is serialized using dumps() and dumpd(), and later reconstructed using load() and loads(). The issue stems from a failure to properly escape user-controlled dictionaries that contain the reserved lc key. Because this key is used internally by LangChain to represent […]

CVE-2025-14847: MongoDB zlib Compression Memory Disclosure
Research

CVE-2025-14847: MongoDB zlib Compression Memory Disclosure

Executive Summary A critical unauthenticated vulnerability (CVE-2025-14847) has been identified in MongoDB Server, affecting how the database processes zlib-compressed network traffic. Under specific conditions, a remote attacker can trigger MongoDB to return uninitialized heap memory as part of a server response. Because this data originates from process memory, it may contain fragments of previously handled […]

AI Vulnerabilities
Research

AI Vulnerabilities vs. Traditional Vulnerabilities: How the AI Attack Surface Changes Security

Artificial intelligence is rapidly becoming embedded in core engineering workflows. Organizations are integrating LLMs into customer-facing applications, code generation pipelines, triage automation, and even parts of their CI/CD and cloud-management ecosystems. But the moment AI crossed into production, a new reality emerged: AI vulnerabilities behave fundamentally differently from traditional software vulnerabilities. They don’t follow the […]

metadata spoofing
Research

CVE-2025-66570 in cpp-httplib – Critical Header Shadowing Vulnerability Explained

A critical vulnerability (CVE-2025-66570, GHSA-xm2j-vfr9-mg9m) has been identified in cpp-httplib, a popular single-header C++ HTTP/HTTPS library used in many lightweight services, internal tools, and embedded applications. Prior to version 0.27.0, cpp-httplib incorrectly accepts and processes certain reserved header names directly from client requests, including: REMOTE_ADDR,REMOTE_PORT,LOCAL_ADDR,LOCAL_PORT. Because these values are parsed before httplib injects the server’s […]

GHSA-cxm3-wv7p-598c Nx Build System Supply-Chain Compromise-3
Research

npm Supply Chain Attack: Massive Compromise of debug, chalk, and 16 Other Packages

On September 8, 2025, one of the largest npm supply chain incidents in recent history unfolded. Popular libraries like debug and chalk along with 16 other utilities were hijacked and pushed to npm with malicious code targeting cryptocurrency wallets and blockchain transactions. These packages collectively have billions of weekly downloads, making this compromise both widespread […]

GHSA-cxm3-wv7p-598c Nx Build System Supply-Chain Compromise-2
Research

CVE-2025-55190: Argo CD Project API Token Exposes Repository Credentials

A critical vulnerability was disclosed in Argo CD, a popular GitOps continuous delivery tool. This flaw allows project-level API tokens to retrieve sensitive repository credentials such as usernames and passwords, even when those tokens do not have explicit permissions to access secrets. Overview Argo CD uses project-level tokens to automate deployment workflows and manage applications.Due […]

GHSA-cxm3-wv7p-598c_ Nx Build System Supply-Chain Compromise
Research

GHSA-cxm3-wv7p-598c: Nx Build System Supply-Chain Compromise

On August 26, 2025, the popular Nx build system package was compromised in a sophisticated supply-chain attack. Malicious versions of Nx and related packages were published to npm, embedding malware that scanned developer environments for sensitive credentials and exfiltrated them. This attack stands out not only because of its impact with thousands of developers who […]

CVE_2024_12718_Path_Escape_via_Python’s_tarfile_Extraction_Filters (1)
Research

CVE‑2025‑32463: Critical Sudo “chroot” Privilege Escalation Flaw

A critical vulnerability in sudo (Changelog v1.9.14–1.9.17) allows local users to gain root access via the –chroot (-R) option. This flaw carries a CVSS 3.1 score of 9.3 (Critical). Affected Versions Platform Coverage Why This Matters This flaw originates from a change introduced in sudo 1.9.14. Path resolution began occurring within the chroot environment before the […]

Add the Upwind RSS Feed to Slack

Connect the Upwind RSS Feed to your Slack.
Follow the how-to here.