A critical security flaw, identified as CVE-2025-52562, has been discovered in Performave Convoy, a popular KVM-based server management platform. This severe vulnerability, which has been assigned the maximum CVSS score of 10.0, allows attackers to execute arbitrary code remotely without needing any authentication. Its potential impact is devastating, placing thousands of servers at risk of total compromise. The vulnerability stems from insufficient input validation within Convoy's LocaleController component. Malicious actors can exploit this by crafting specially designed HTTP requests that manipulate the locale and namespace parameters. This manipulation enables directory traversal and the inclusion of arbitrary PHP files, granting attackers full remote code execution, exposure of sensitive environment variables, and unauthorized system access. The flaw impacts Convoy versions from 3.9.0-rc3 through 4.4.0, with a patch available in version 4.4.1. Attackers are actively bypassing existing sanitization measures by altering the locale parameter or misusing acceptable characters in the namespace field, potentially deploying payloads like reverse shells or persistent cron scripts to maintain control. To protect against this threat, immediate upgrade to Convoy 4.4.1 is crucial. Furthermore, implementing web application firewalls (WAFs) with strict input validation rules, including whitelisting locale values and tightly controlling namespace formats, is highly recommended. Security teams should also actively monitor for unusual PHP activity, suspicious cron jobs, and outbound network traffic to unknown IP addresses. Given the ongoing exploitation attempts targeting this vulnerability, prompt action is vital to prevent ransomware attacks or data breaches.
Security researchers have identified a new variant of the SparkCat malware circulating on both the Apple App Store and Google Play Store, more than a year after its initial discove...
The European Union’s cybersecurity agency, CERT-EU, has attributed a significant cloud breach involving the European Commission to the TeamPCP threat group. The attack targeted t...
Microsoft has rolled out automatic updates for unmanaged Windows 11 24H2 Home and Pro edition devices to Windows 11 25H2, also known as the Windows 11 2025 Update. This transition ...