Checkmarx Zero
banner
checkmarxzero.bsky.social
Checkmarx Zero
@checkmarxzero.bsky.social
Specializing in breaking and protecting the building blocks of modern software development. From traditional #AppSec, through #opensource #SupplyChain threats, to #LLM security. https://checkmarx.com/zero/
⏳ With EOL in March, Ingress #NGINX has 4 newly disclosed vulnerabilities:
#CVE-2026-1580, CVE-2026-24512, CVE-2026-24513, and CVE-2026-24514.

We recommend that you migrate to F5's NGINX Ingress: buff.ly/vqTJvPK
If you can’t migrate yet, update to v1.14.3.

More details on each CVE below.
GitHub - nginx/kubernetes-ingress: NGINX and NGINX Plus Ingress Controllers for Kubernetes
NGINX and NGINX Plus Ingress Controllers for Kubernetes - nginx/kubernetes-ingress
github.com
February 4, 2026 at 10:08 PM
This attempt to compromise #Solidity / #Etherium developers was particularly aggressive: it didn’t just try to exfiltrate data, it installed a Remote Access Trojan. Not to worry, we got it shut down within a day.

👉 Read about it: buff.ly/9e55Xgy
Solidity devs targeted again: Malicious VS Code extension drops ScreenConnect-based remote access trojan (RAT) - Checkmarx
A fake Solidity VS Code extension impersonated Juan Blanco and installed ScreenConnect/ConnectWise Control for remote access—takedown in 24h. IoCs + mitigation.
buff.ly
January 30, 2026 at 4:42 PM
Looking at the #LastWeekInAppSec, we see two widely-used application components with #DoS, and a nasty little path traversal in a package manager.

Details, mitigations, context for making risk-based decisions all on our blog: buff.ly/xL4NKOg

#React #NodeJS #Java #pnpm #npm #CVE #Vulnerability
Last Week in AppSec for 29. January 2026 - Checkmarx
Denial of Service in Java SE and React server, and pnpm lets a directory traversal (Zip) slip in. Last week in AppSec.
buff.ly
January 29, 2026 at 10:08 PM
Did you know Checkmarx Zero has a newsletter? Avoid the whims of The Algorithm: get an email synopsis when new Checkmarx Zero research or analysis is published on our blog, plus subscriber-exclusive content.

Visit buff.ly/Ao3m5kC and click on the "Subscribe" control at the bottom.
January 28, 2026 at 10:08 PM
Due to detailed #exploit guidance in the wild, the priority of patching this #Redis XACKDEL #vulnerability increased this week. CVE-2025-62507 buff.ly/NJvVjvS

‼️ if you haven't yet upgraded your Redis installs, you should increase the priority of that.

#CVE #ApplicationSecurity #ProductSecurity
January 27, 2026 at 3:42 PM
Yes, we heard about the #ChatMoss / #WhenSunset #VSCode extension that appears to be malicious. We reported it to the marketplace on 31. Oct 2025. It's not new, it's not news, but it is a good reminder to be cautious; marketplaces don't always remove sketchy extensions.
#Malware #SupplyChainSecurity
January 23, 2026 at 5:45 PM
As of 16. Jan 2026, this chart shows the number of #CVE submissions in "Awaiting Analysis" status in the US-NVD

Unless something changes with #NVD's capacity (which seems unlikely given NIST's current priorities), we as an industry need to find a different path. This isn't sustainable.
January 20, 2026 at 2:53 PM
This #LastWeekInAppSec is a great reminder that automation and dev tooling is part of an organizations attack surface. #Sigstore, #pnpm, and #n8n all have vulns to pay attention to, but (mostly) not panic over.

👉 should you worry? read: buff.ly/ATRNVz3

#AppSec #ProductSecurity #DevSecOps #DevOps
Last Week in AppSec for 15. January 2026 - Checkmarx
Potentially serious flaws, depending on your uses, in sigstore, n8n, and pnpm made last week in appsec all about tools in the software supply chain.
checkmarx.com
January 15, 2026 at 5:07 PM
🚨 Alert #WeKnora users! 2 High Severity #CVEs were released.
CVE-2026-22687: #SQLi in the Agent service DB query tool. Due to insufficient backend checks an attacker can use prompt‑based bypass to avoid query restrictions and obtain sensitive information from the server and DB. buff.ly/kQXicrG
January 13, 2026 at 10:08 PM
Checkmarx Zero has contributed some of our work on Lies-in-the-Loop to the OWASP foundation. Thanks to our own Ori Ron for the efforts there, and to the OWASP community for the review and process of getting this important attack pattern documented with OWASP

See: buff.ly/KNzcahw
HITL Dialog Forging (aka Lies-in-the-Loop) | OWASP Foundation
HITL Dialog Forging (aka Lies-in-the-Loop) on the main website for The OWASP Foundation. OWASP is a nonprofit foundation that works to improve the security of software.
owasp.org
January 13, 2026 at 3:42 PM
🚨 Malicious VS Code extension impersonating Solidity publishers: juanblan281.solid281 ; drops persistent remote-access kits on Windows, macOS, and Linux. If found on machines, quarantine and clean carefully. 🧵 1/3

#VSCode #Malware #AppSec #Developer #Solidity
January 9, 2026 at 6:12 PM
It's been a busy couple of weeks for #AppSec; including ongoing named vulns like React2Shell and MongoBleed, because what's a #vuln without a Brand™? Also AdonisJS, RustFS, and the Shai-Hulud that didn't happen

📑 READ more: buff.ly/xbVornQ

#JavaScript #npm #MongoDB #React #Rust
Last Week in AppSec for 08. January 2026 - Checkmarx
React2Shell keeps going, Shai-Hulud doesn't. MongoDB and RustFS have problems. AdonisJS could write arbitrary files. 08. January 2026: Last Week In AppSec
buff.ly
January 8, 2026 at 3:42 PM
🚨 CVE-2026-21877 – #RCE in #n8n via Arbitrary File Write

Authenticated users may upload crafted files that could trigger remote code execution, potentially leading to full instance compromise, affecting both self-hosted and cloud instances.

Patch version 1.121.3+.
More information:
Unrestricted Upload of File with Dangerous Type in n8n - CVE-2026-21877 - DevHub
n8n is affected by an authenticated Remote Code Execution (RCE) vulnerability. Under certain conditions, an authenticated user may be able to cause untrusted code to be executed by the n8n service.…
buff.ly
January 7, 2026 at 2:48 PM
#HuggingFace is great, but supply chain attacks against it and similar registries may mean you're potentially accepting some pretty toxic hugs from strangers. Do you know what to look for, and how to avoid adopting malicious models into your #AI workflows?

👉 buff.ly/1vNZNbv
AI Model Confusion: An LLM/AI Model Supply Chain Attack - Checkmarx
Checkmarx Zero research reveals the AI Model Confusion attack pattern against registries like Hugging Face, building on Dependency Confusion in OSS library registry. Learn what it is and how to…
checkmarx.com
January 6, 2026 at 3:42 PM
2025 wasn’t all new vulns and bad news for AppSec. It also brought real, material wins for developers and defenders: safer defaults, harder supply-chain abuse, better collaboration, and risk reductions that don’t slow teams down.
2025 Was Quietly Good for Application Security - Checkmarx
A grounded look at why 2025 was quietly good for developers and AppSec practitioners—real ecosystem changes, safer defaults, and community shifts that reduced risk without slowing teams down.
buff.ly
December 30, 2025 at 3:42 PM
🚨 Attention MongoDB users: if you have yet to update your MongoDB to its latest version - now is the time to do so as it is currently being exploited in the wild. CVE-2025-14847, dubbed "MongoBleed", is a zlib buffer overread which allows attackers to read arbitrary server memory.

#AppSec #MongoDB
December 30, 2025 at 10:30 AM
🚨CVE-2025-68613: Critical RCE in n8n via expression injection.
Auth users can craft workflow expressions that escape isolation and execute code as the n8n process risking full instance compromise.
Patch: upgrade to v1.122.0+ (1.120.4/1.121.1/1.122.0).
More info: devhub.checkmarx.com/cve-details/...
December 23, 2025 at 10:08 PM
We're working through the final stages of disclosure with several orgs who have been impacted by evolved forms of supply chain attacks targeting their LLM ecosystems on HuggingFace. 🧵

#AI #SoftwareSupplyChain #LLM #ModelConfusion #ModelJacking #SupplyChainRisk #HuggingFace
December 23, 2025 at 3:42 PM
🚨 #Windows users of #NPM systeminformation be aware of #CVE-2025-68154. The fsSize function is vulnerable to OS Command #Injection. The drive parameter is added to a PowerShell command directly, allowing arbitrary commands when user input hits fsSize(). Upgrade to v5.27.14

Details: buff.ly/xexR3dP
December 18, 2025 at 3:42 PM
The very safeguards that your AI agents put in place to make sure you know what they're executing on your machine can be turned into weapons that put your data at risk. Read at Checkmarx Zero: buff.ly/uWNTb5O 🧵1/4
Turning AI Safeguards Into Weapons with HITL Dialog Forging - Checkmarx
Human-in-the-Loop safeguards can be turned against the users of AI agents. Learn how the concepts of Lies in the Loop and HITL Dialog Forging can be turned against developers using agentic AI code…
buff.ly
December 16, 2025 at 8:06 PM
A pentesting AI agent pwned with an HTML comment on a target server? That's actually kind of funny on the one hand, but deeply concerning on the other. CVE-2025-67511 references a critical, ‼️unpatched‼️ command injection issue in the CAI pentesting agent

Details and mitigation: buff.ly/x6gPiPf 🧵 1/4
Cybersecurity AI agent is Vulnerable to Command Injection (CVE-2025-67511) - Checkmarx
Cybersecurity AI agent for pentesting becomes a threat on its own, allowing attackers to inject malicious SSH hostnames in content to execute shell commands on the agent's host.
buff.ly
December 11, 2025 at 10:08 PM
‼️ A critical issue has landed for anyone building with Elysia.js. CVE-2025-66456 allows attackers to achieve remote code execution through a prototype-pollution pathway in certain schema-validation flows. buff.ly/RCQHiLI
#ElysiaJS #CVE202566456 #RCE #AppSec #NodeSecurity #TypeScript 🧵1/5
December 11, 2025 at 3:42 PM
🏰 Zitadel identity manager has 3 serious vulns to patch that could leave organizations at serious risk, including account takeovers and reading of sensitive data.

#SupplyChainSecrity #Vulnerability #ProductSecurity #InformationSecurity #CyberSecurity #Patch #Zitadel
December 10, 2025 at 10:08 PM
Checkmarx Zero researcher Bruno Dias takes a deep dive inside Shai-Hulud's maw to examine how the world's first worm wreaked havoc on the NPM ecosystem — twice.

Read "Inside Shai-Hulud's Maw": buff.ly/N5Men7d
Inside Shai-Hulud's Maw: How The NPM Worm Exploits And Propagates - Checkmarx
How the world's first NPM worm did it's work, from exploitation to propagation in detail. Bruno Dias explores both the original Shai-Hulud worm and the "Second Coming" evolution, and breaks down each…
checkmarx.com
December 9, 2025 at 3:42 PM
🚨 CVE-2025-65959 | Open WebUI | Stored XSS via Notes PDF Download (High)
Malicious SVG/HTML in Markdown notes can execute JavaScript when downloaded as PDF, enabling session token theft. All users are at risk. Affects versions < 0.6.37.

buff.ly/EVaSAOB
buff.ly/RFK4ZIl
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') - CVE-2025-65959 - DevHub
Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.6.37, a Stored XSS vulnerability was discovered in Open-WebUI's Notes PDF download…
devhub.checkmarx.com
December 8, 2025 at 9:52 PM