InfoSec Planet
A collection of diverse security content from a curated list of sources. This website also serves as a demo for "worker-planet", the software that powers it.
Update on React Server Components RCE Vulnerability (CVE-2025-55182 / CVE-2025-66478)
by Sergei Okhotin on 08/12/2025
The attack landscape has been dynamic following the disclosure of the React Server Components RCE vulnerability. New information has emerged regarding the initial Proof-of-Concept exploit, as well as improved detection methods, exploitation mechanics observed in the wild, and rapidly growing attack activity. This update summarizes the changes and observations we have made across Wallarm customers. [...]
See full content
carving emails & AI prompt injection hacking
on 08/12/2025
See full content
Substitution Cipher Based on The Voynich Manuscript
on 08/12/2025
Here’s a fun paper: “The Naibbe cipher: a substitution cipher that encrypts Latin and Italian as Voynich Manuscript-like ciphertext“:
Abstract: In this article, I investigate the hypothesis that the Voynich Manuscript (MS 408, Yale University Beinecke Library) is compatible with being a ciphertext by attempting to develop a historically plausible cipher that can replicate the man [...]
See full content
2025 in Review: A Year of Smarter, Context-Aware API Security
by Tim Erlin on 08/12/2025
As the year draws to a close, it’s worth pausing to look back on what has been an extraordinary year for Wallarm and, more importantly, for the businesses we protect.
If 2024 was about laying the groundwork (tracking API sessions to understand behavioral attacks), then 2025 was the year we built upon that foundation, turning insight into action and visibility into measurable business impact.
[...]
See full content
curl built with GnuTLS backend defaults to weak crypto parameters
on 08/12/2025
curl disclosed a bug submitted by nyymi: https://hackerone.com/reports/3407352 [...]
See full content
Just ServiceUI.exe
on 06/12/2025
See full content
I am in LOVE with these
on 06/12/2025
See full content
Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill
by BrianKrebs on 06/12/2025
A sprawling academic cheating network turbocharged by Google Ads that has generated nearly $25 million in revenue has curious ties to a Kremlin-connected oligarch whose Russian university builds drones for Russia’s war against Ukraine.
The Nerdify homepage.
The link between essay mills and Russian attack drones might seem improbable, but understanding it begins with a simple question: How do [...]
See full content
Friday Squid Blogging: Vampire Squid Genome
on 05/12/2025
The vampire squid (Vampyroteuthis infernalis) has the largest cephalopod genome ever sequenced: more than 11 billion base pairs. That’s more than twice as large as the biggest squid genomes.
It’s technically not a squid: “The vampire squid is a fascinating twig tenaciously hanging onto the cephalopod family tree. It’s neither a squid nor an octopus (nor a vampire), but rath [...]
See full content
Beginner Blue Team Training!
on 05/12/2025
See full content
HackerOne on AI-Driven Security: Community, Risk, and Innovation
on 05/12/2025
See full content
Why Baselining Helps Incident Response
on 05/12/2025
See full content
Unauthenticated GraphQL access by prepending __schema to private operations
on 05/12/2025
Enjin disclosed a bug submitted by pwnie: https://hackerone.com/reports/3452015 [...]
See full content
so malware is invisible now lol
on 05/12/2025
See full content
How to detect React2Shell with Burp Suite
on 05/12/2025
Detecting React2Shell with Burp Suite React2Shell vulnerabilities in Next.js applications are now scannable across Burp Suite, making it fast to validate your exposure and begin automated coverage usi [...]
See full content
Stored XSS Vulnerability via SVG File
on 05/12/2025
Nextcloud disclosed a bug submitted by aptroom: https://hackerone.com/reports/3357808 - Bounty: $150 [...]
See full content
Title: Use-After-Free in cURL Test Suite via Improper Cleanup of Global Handle
on 05/12/2025
curl disclosed a bug submitted by rootx1337: https://hackerone.com/reports/3452725 [...]
See full content
admin_audit does not log actions on files in a group folder
on 05/12/2025
Nextcloud disclosed a bug submitted by klipz: https://hackerone.com/reports/2890071 [...]
See full content
Deck app allowed user with "Can share" permission to modify permissions of other non-owners
on 05/12/2025
Nextcloud disclosed a bug submitted by daroo: https://hackerone.com/reports/3247499 - Bounty: $250 [...]
See full content
Calendar app allowed booking appointments without the generated token
on 05/12/2025
Nextcloud disclosed a bug submitted by daroo: https://hackerone.com/reports/3275810 [...]
See full content
Calendar attachments of local files are offered to downloaded
on 05/12/2025
Nextcloud disclosed a bug submitted by daroo: https://hackerone.com/reports/3112033 - Bounty: $100 [...]
See full content
Missing ownership check in Tables app allows moving columns into tables of other users
on 05/12/2025
Nextcloud disclosed a bug submitted by daroo: https://hackerone.com/reports/3137895 - Bounty: $250 [...]
See full content
Tables app allowed users to view columns metadata information of any table
on 05/12/2025
Nextcloud disclosed a bug submitted by daroo: https://hackerone.com/reports/3138721 - Bounty: $250 [...]
See full content
Participants were able to blindly delete poll drafts of other users by ID
on 05/12/2025
Nextcloud disclosed a bug submitted by daroo: https://hackerone.com/reports/3247386 - Bounty: $150 [...]
See full content
Approval app allows users to request approval for other users file
on 05/12/2025
Nextcloud disclosed a bug submitted by 0x0doteth: https://hackerone.com/reports/3338748 [...]
See full content
Nextcloud Tables v1 Share Enumeration Without Authorization (Regression of CVE-2024-52507)
on 05/12/2025
Nextcloud disclosed a bug submitted by 0x0doteth: https://hackerone.com/reports/3334165 [...]
See full content
New Anonymous Phone Service
on 05/12/2025
A new anonymous phone service allows you to sign up with just a zip code.
[...]
See full content
Next.js & React vulnerability will break the internet
on 05/12/2025
See full content
Intigriti insights: React2Shell CVE-2025-55182
by Eleanor Barlow on 05/12/2025
This blog explores the widespread and critical state of the React2Shell vulnerability. It provides a technical overview, suggested mitigations, and actions to safeguard people, processes, and data, as well as a review of what our team has experienced and seen off the back of this vulnerability.
Please note that as more is learnt, Intigriti continues to update reports, provide information on what o [...]
See full content
SMS Phishers Pivot to Points, Taxes, Fake Retailers
by BrianKrebs on 04/12/2025
China-based phishing groups blamed for non-stop scam SMS messages about a supposed wayward package or unpaid toll fee are promoting a new offering, just in time for the holiday shopping season: Phishing kits for mass-creating fake but convincing e-commerce websites that convert customer payment card data into mobile wallets from Apple and Google. Experts say these same phishing groups also are now [...]
See full content
Why Large Language Models (LLMs) Output Differs
on 04/12/2025
See full content
Bugcrowd Security Flash: CVE-2025-55182
on 04/12/2025
See full content
SMTP Protocol Injection via CRLF in CURLOPT_MAIL_FROM leading to Email Spoofing
on 04/12/2025
curl disclosed a bug submitted by anonymous_237: https://hackerone.com/reports/3451305 [...]
See full content
Wallarm Halts Remote Code Execution Exploits: Defense for Vulnerable React Server Component Workflows
by Sergei Okhotin on 04/12/2025
On December 3, 2025, React maintainers disclosed a critical unauthenticated remote code execution (RCE) vulnerability in React Server Components (RSC), tracked as CVE-2025-55182. A working PoC was released publicly, and Wallarm immediately began observing widespread exploitation attempts across customer environments.
What is CVE-2025-55182?
CVE-2025-55182 is an unauthenticated remote code e [...]
See full content
Live: PAPA Release | TCM Security | AI Hacking | AMA
on 04/12/2025
See full content
CVE-2025-55182 (React2Shell): Remote code execution in React Server Components and Next.js
on 04/12/2025
Learn more about the CVE-2025-55182 vulnerability affecting React Server Components and affecting Next.js. [...]
See full content
Android expands pilot for in-call scam protection for financial apps
on 03/12/2025
Posted by Aden Haussmann, Associate Product Manager and Sumeet Sharma, Play Partnerships Trust & Safety Lead
Android uses the best of Google AI and our advanced security expertise to tackle mobile scams from every angle. Over the last few years, we’ve launched industry-leading features to detect scams and protect users across phone calls, text messages and messaging app chat notifications.
The [...]
See full content
Ransomware Scam
on 03/12/2025
See full content
Attackers Don’t Need to Breach Your API -They’ll Breach the Tools That Touch It
by Tim Erlin on 03/12/2025
The API supply chain is the new security blind spot. Attackers no longer need to breach your APIs directly; they can target the third-party services that connect to them. These unmanaged dependencies are now the shortest path to your sensitive data. The recent Mixpanel incident is a stark reminder of that fact.
What Happened During the Mixpanel Incident? Why Does it Matter?
In November 202 [...]
See full content
Bugcrowd Security Flash: The HackLore Project
on 02/12/2025
See full content
Sleep tight
on 02/12/2025
See full content
Can Learning Assembly Make You a Better Pentester?
on 02/12/2025
See full content
Phishing for Passwords! (Advent of Cyber Day 02)
on 02/12/2025
See full content
Potential SQL Injection when annotating FilteredRelation on PostgreSQL
on 02/12/2025
Django disclosed a bug submitted by stackered: https://hackerone.com/reports/3417967 [...]
See full content
Like Social Media, AI Requires Difficult Choices
on 02/12/2025
In his 2020 book, “Future Politics,” British barrister Jamie Susskind wrote that the dominant question of the 20th century was “How much of our collective life should be determined by the state, and what should be left to the market and civil society?” But in the early decades of this century, Susskind suggested that we face a different question: “To what extent shoul [...]
See full content
Introducing constant-time support for LLVM to protect cryptographic code
on 02/12/2025
Trail of Bits has developed constant-time coding support for LLVM, providing developers with compiler-level guarantees that their cryptographic implementations remain secure against branching-related timing attacks. These changes are being reviewed and will be added in an upcoming release, LLVM 22. This work introduces the __builtin_ct_select family of intrinsics and supporting infrastructure that [...]
See full content
How I Hacked A Wordpress Website Using AI
on 01/12/2025
See full content
Banning VPNs
on 01/12/2025
This is crazy. Lawmakers in several US states are contemplating banning VPNs, because…think of the children!
As of this writing, Wisconsin lawmakers are escalating their war on privacy by targeting VPNs in the name of “protecting children” in A.B. 105/S.B. 130. It’s an age verification bill that requires all websites distributing material that could conceivably be deemed “s [...]
See full content
PortSwigger x TryHackMe: Supporting Advent of Cyber
on 01/12/2025
Every December, TryHackMe’s Advent of Cyber brings the security community together around a simple idea: learn something new by getting hands-on. Each day during the festive season reveals a beginner- [...]
See full content
[my.stripo.email] Blind SSRF Vulnerability in Stripo App Export via Missing Endpoints Export Email Message to Zapier
on 01/12/2025
Stripo Inc disclosed a bug submitted by odaysec: https://hackerone.com/reports/2932960 [...]
See full content
Path Traversal in file:// protocol allows Arbitrary File Read
on 01/12/2025
curl disclosed a bug submitted by quello_stanco: https://hackerone.com/reports/3445174 [...]
See full content
Heap Buffer Overflow in TFTP
on 01/12/2025
curl disclosed a bug submitted by helspy: https://hackerone.com/reports/3444904 [...]
See full content
How AI is leveraged to enhance the Intigriti platform
by Eleanor Barlow on 01/12/2025
What is Intigriti’s stance on AI?
At Intigriti, we believe AI is a powerful ally to, not a replacement of, our community of security researchers. We will use AI to empower our researchers to hunt for bugs smarter, faster, and more efficiently, while recognizing the value of human creativity and ingenuity that machines cannot replicate. By creating AI-powered tools informed by researcher and cust [...]
See full content
Bypassing Content Security Policy (CSP)
by Ayoub on 30/11/2025
Content Security Policies (CSPs) are often deployed as the last line of defense against client-side attacks such as cross-site scripting (XSS) and clickjacking. Since their first introduction in 2012, they've enabled developers to control which and what resources are allowed to load and evaluate within a given DOM context.
However, it still commonly occurs that developers rely on this countermeasu [...]
See full content
ServiceUI Trick
on 29/11/2025
See full content
NPM malware now has multiple targets!
on 29/11/2025
See full content
WE DID IT ❤️❤️❤️❤️🥲🍀🍀
on 29/11/2025
See full content
My alter ego got the best of me 😳
on 29/11/2025
See full content
Friday Squid Blogging: Flying Neon Squid Found on Israeli Beach
on 28/11/2025
A meter-long flying neon squid (Ommastrephes bartramii) was found dead on an Israeli beach. The species is rare in the Mediterranean.
As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered.
Blog moderation policy.
[...]
See full content
Prompt Injection Through Poetry
on 28/11/2025
In a new paper, “Adversarial Poetry as a Universal Single-Turn Jailbreak Mechanism in Large Language Models,” researchers found that turning LLM prompts into poetry resulted in jailbreaking the models:
Abstract: We present evidence that adversarial poetry functions as a universal single-turn jailbreak technique for Large Language Models (LLMs). Across 25 frontier proprietary and open-w [...]
See full content
Learn Cybersecurity: Advent of Cyber 2025 (TryHackMe!)
on 28/11/2025
See full content
Community!
on 27/11/2025
See full content
Cybersecurity AMA with Heath Adams
on 27/11/2025
See full content
Meet Rey, the Admin of ‘Scattered Lapsus$ Hunters’
by BrianKrebs on 26/11/2025
A prolific cybercriminal group that calls itself “Scattered LAPSUS$ Hunters” has dominated headlines this year by regularly stealing data from and publicly mass extorting dozens of major corporations. But the tables seem to have turned somewhat for “Rey,” the moniker chosen by the technical operator and public face of the hacker group: Earlier this week, Rey confirmed his r [...]
See full content
Username Validation Bypass
on 26/11/2025
Revive Adserver disclosed a bug submitted by kassem_s94: https://hackerone.com/reports/3434156 [...]
See full content
The State of Cybercrime in 2025 Part 2 (with Nick Ascoli!)
on 26/11/2025
See full content
Huawei and Chinese Surveillance
on 26/11/2025
This quote is from House of Huawei: The Secret History of China’s Most Powerful Company.
“Long before anyone had heard of Ren Zhengfei or Huawei, Wan Runnan had been China’s star entrepreneur in the 1980s, with his company, the Stone Group, touted as “China’s IBM.” Wan had believed that economic change could lead to political change. He had thrown his support be [...]
See full content
When your AI Assistant Becomes the Attacker’s Command-and-Control
by Tim Erlin on 26/11/2025
Earlier this month, Microsoft uncovered SesameOp, a new backdoor malware that abuses the OpenAI Assistants API as a covert command-and-control (C2) channel. The discovery has drawn significant attention within the cybersecurity community. Security teams can no longer focus solely on endpoint malware. Attackers are weaponizing public and legitimate AI assistant APIs and defenders must adjust.
W [...]
See full content
Infinite loop issue in the state machine of the curl project
on 26/11/2025
curl disclosed a bug submitted by kak1: https://hackerone.com/reports/3442060 [...]
See full content
runs javascript on powershell when it shouldnt
on 26/11/2025
curl disclosed a bug submitted by lim_e: https://hackerone.com/reports/3442024 [...]
See full content
November CTF Challenge: Exploiting JWT vulnerabilities to achieve RCE
by Ayoub on 26/11/2025
At Intigriti, we host monthly web-based Capture The Flag (CTF) challenges as a way to engage with the security research community. This month, we've decided to take on a challenge ourselves as a way to give back to the community. In response to one of our recent articles, we decided to focus on JSON Web Token (JWT) vulnerabilities.
This article provides a step-by-step walkthrough for solving Novem [...]
See full content
Why is RAG Dangerous?
on 25/11/2025
See full content
Trusted Installer Shell
on 25/11/2025
See full content
Keylogger Malware Analysis
on 25/11/2025
See full content
Four Ways AI Is Being Used to Strengthen Democracies Worldwide
on 25/11/2025
Democracy is colliding with the technologies of artificial intelligence. Judging from the audience reaction at the recent World Forum on Democracy in Strasbourg, the general expectation is that democracy will be the worse for it. We have another narrative. Yes, there are risks to democracy from AI, but there are also opportunities.
We have just published the book Rewiring Democracy: How AI will Tr [...]
See full content
Understanding signal-to-noise for vulnerability management success
by Eleanor Barlow on 25/11/2025
A common worry for IT and security teams is that, when operating an effective vulnerability management model, they will be flooded with potential vulnerability reports they likely don’t have the capacity to work through.
But the real issue here is not volume; it’s noise. Invalid or low-quality submissions can drain resources, cover up, or deprioritize critical signals that have real business imp [...]
See full content
The Shai-Hulud 2.0 npm worm: analysis, and what you need to know
on 25/11/2025
Learn more about the Shai-Hulud 2.0 npm worm. [...]
See full content
High resource consumption by insufficient sanitization of forum threads pagination
on 24/11/2025
Flickr disclosed a bug submitted by maskopatol: https://hackerone.com/reports/1916400 - Bounty: $479 [...]
See full content
[SFTP] TOCTOU Race Condition in Upload Resume Logic Leads to Arbitrary File Append
on 24/11/2025
curl disclosed a bug submitted by cainvsilf: https://hackerone.com/reports/3432833 [...]
See full content
Is Your Android TV Streaming Box Part of a Botnet?
by BrianKrebs on 24/11/2025
On the surface, the Superbox media streaming devices for sale at retailers like BestBuy and Walmart may seem like a steal: They offer unlimited access to more than 2,200 pay-per-view and streaming services like Netflix, ESPN and Hulu, all for a one-time fee of around $400. But security experts warn these TV boxes require intrusive software that forces the user’s network to relay Internet tra [...]
See full content
2025 Black Friday Deals
on 24/11/2025
See full content
Start 'em young
on 24/11/2025
See full content
HTML Injection in Emails on login.mtb.com via givenName parameter leads to phishing attacks
on 24/11/2025
M&T Bank Vulnerability Disclosure disclosed a bug submitted by ozgun32: https://hackerone.com/reports/3426761 [...]
See full content
Wazuh gives visibility to EVERYTHING
on 24/11/2025
See full content
Free Post Recon Course and Methodology For Bug Bounty Hunters
on 24/11/2025
See full content
IACR Nullifies Election Because of Lost Decryption Key
on 24/11/2025
The International Association of Cryptologic Research—the academic cryptography association that’s been putting conferences like Crypto (back when “crypto” meant “cryptography”) and Eurocrypt since the 1980s—had to nullify an online election when trustee Moti Yung lost his decryption key.
For this election and in accordance with the bylaws of the IACR, the [...]
See full content
I Make The BEST FREE Labs In CyberSecurity Education - Come Check Them Out!
on 23/11/2025
See full content
Arbitrary free in curl's config file parsing.
on 23/11/2025
curl disclosed a bug submitted by letshack9707: https://hackerone.com/reports/3434543 [...]
See full content
hacking twitch chat
on 23/11/2025
See full content
AI Jailbreaks That Made Me Go WTF
on 22/11/2025
See full content
Improper bot-authentication allows to impersonate any user when sending messages in a room
on 21/11/2025
Basecamp disclosed a bug submitted by stackered: https://hackerone.com/reports/3329310 - Bounty: $2000 [...]
See full content
Path traversal via archive.extract - CVE 2021-3281 incomplete patch
on 21/11/2025
Django disclosed a bug submitted by stackered: https://hackerone.com/reports/3328367 [...]
See full content
Top 5 WTF Prompt Injections
on 21/11/2025
See full content
hacker final boss
on 21/11/2025
See full content
APIs Are the Retail Engine: How to Secure Them This Black Friday
by Tim Erlin on 21/11/2025
Can you ever imagine the impact on your business if it went offline on Black Friday or Cyber Monday due to a cyberattack?
Black Friday is the biggest day in the retail calendar. It’s also the riskiest. As you gear up for huge surges in online traffic, ask yourself: have you protected the APIs on which the business runs?
The Black Friday API Boom
When you think about Black Fri [...]
See full content
Intigriti Bug Bytes #230 - November 2025 🚀
by Ayoub on 21/11/2025
Hi hackers,
Welcome to the latest edition of Bug Bytes! In this month’s issue, we’ll be featuring:
Finding an RCE using AI in GitHub
CORS exploitation cheat sheet
Scanning codebases with AI
Bypassing paywalls
SSTIs in AI models
And so much more! Let’s dive in!
Company News
Intigriti wins 2025 UK IT Industry Awards
We are thrilled to announce that Intigriti has won Security Innovation [...]
See full content
Mozilla Says It’s Finally Done With Two-Faced Onerep
by BrianKrebs on 20/11/2025
In March 2024, Mozilla said it was winding down its collaboration with Onerep — an identity protection service offered with the Firefox web browser that promises to remove users from hundreds of people-search sites — after KrebsOnSecurity revealed Onerep’s founder had created dozens of people-search services and was continuing to operate at least one of them. Sixteen months later [...]
See full content
Android Quick Share Support for AirDrop: A Secure Approach to Cross-Platform File Sharing
on 20/11/2025
Posted by Dave Kleidermacher, VP, Platforms Security & Privacy, Google
Technology should bring people closer together, not create walls. Being able to communicate and connect with friends and family should be easy regardless of the phone they use. That’s why Android has been building experiences that help you stay connected across platforms.
As part of our efforts to continue to make cross-pla [...]
See full content
Out-of-bounds read in HTTP method handling causes undefined behavior and potential crash This is sharp, Gaurav. Weve got a real memory-safety bug ins
on 20/11/2025
curl disclosed a bug submitted by gaurav_7777: https://hackerone.com/reports/3434510 [...]
See full content
AI Hacking CTF | Win Prizes!!! | AMA
on 20/11/2025
See full content