diff --git a/.appsec-tests/vpatch-CVE-2026-1357/CVE-2026-1357.yaml b/.appsec-tests/vpatch-CVE-2026-1357/CVE-2026-1357.yaml new file mode 100644 index 00000000000..1620e60cf8c --- /dev/null +++ b/.appsec-tests/vpatch-CVE-2026-1357/CVE-2026-1357.yaml @@ -0,0 +1,21 @@ +## autogenerated on 2026-04-15 13:15:20 +id: CVE-2026-1357 +info: + name: CVE-2026-1357 + author: crowdsec + severity: info + description: CVE-2026-1357 testing + tags: appsec-testing +http: + - raw: + - | + POST / HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/x-www-form-urlencoded + + wpvivid_action=send_to_site&wpvivid_content=MDAzQUJDMDAwMDAwMDAwMDAwMDExMDUGpYqxgOo0%2FZM3%2BLE%2B23CYS%2BI8Sbr6wwwU6dJweFxMk%2BOogH3GIpPZZMrm72oUS3vnrlf0AXv1vmGVBIbLo3QcQs%2B4JU7cLQw1kWByCFlYkpHcBuzxjEbVtT8VSdFgb6NLW6cpP4BdWT8bJx%2F%2FAOO09m3EFtf2sOcE%2BJjFJAew%2BELondwDkz3u5mssxGaQrlvWgaIlmPwz3FZx8dWC%2FHy7k4P3S5IJ7JV0tefjHJKCOzjPHngkZENu1uI2LmE6JaeF7XdXJCcmFOrNex4yJgIO0raawogHW457fM4wXKDnrM3bwxeLn5KwvAgadaTj4F9zWHxnjBmpa%2BtIaohISVcA5%2BGv6cAA95rzOoXBGUaI + cookie-reuse: true + matchers: + - type: status + status: + - 403 diff --git a/.appsec-tests/vpatch-CVE-2026-1357/config.yaml b/.appsec-tests/vpatch-CVE-2026-1357/config.yaml new file mode 100644 index 00000000000..d996b92df2e --- /dev/null +++ b/.appsec-tests/vpatch-CVE-2026-1357/config.yaml @@ -0,0 +1,5 @@ +## autogenerated on 2026-04-15 13:15:20 +appsec-rules: + - ./appsec-rules/crowdsecurity/base-config.yaml + - ./appsec-rules/crowdsecurity/vpatch-CVE-2026-1357.yaml +nuclei_template: CVE-2026-1357.yaml diff --git a/appsec-rules/crowdsecurity/vpatch-CVE-2026-1357.yaml b/appsec-rules/crowdsecurity/vpatch-CVE-2026-1357.yaml new file mode 100644 index 00000000000..d9275699436 --- /dev/null +++ b/appsec-rules/crowdsecurity/vpatch-CVE-2026-1357.yaml @@ -0,0 +1,40 @@ +## autogenerated on 2026-04-15 13:15:20 +name: crowdsecurity/vpatch-CVE-2026-1357 +description: 'Detects unauthenticated arbitrary file upload in WPvivid Backup & Migration plugin via wpvivid_action=send_to_site.' +rules: + - and: + - zones: + - URI + transform: + - lowercase + match: + type: equals + value: / + - zones: + - BODY_ARGS + variables: + - wpvivid_action + transform: + - lowercase + match: + type: equals + value: send_to_site + - zones: + - FILENAMES + transform: + - lowercase + match: + type: contains + value: .php + +labels: + type: exploit + service: http + confidence: 3 + spoofable: 0 + behavior: 'http:exploit' + label: 'WPvivid Backup & Migration - File Upload' + classification: + - cve.CVE-2026-1357 + - attack.T1190 + - cwe.CWE-434 diff --git a/collections/crowdsecurity/appsec-virtual-patching.yaml b/collections/crowdsecurity/appsec-virtual-patching.yaml index e67dbb0c51b..edeea9ab73f 100644 --- a/collections/crowdsecurity/appsec-virtual-patching.yaml +++ b/collections/crowdsecurity/appsec-virtual-patching.yaml @@ -157,6 +157,7 @@ appsec-rules: - crowdsecurity/vpatch-CVE-2020-10987 - crowdsecurity/vpatch-CVE-2025-55182 - crowdsecurity/vpatch-CVE-2024-6235 +- crowdsecurity/vpatch-CVE-2026-1357 - crowdsecurity/vpatch-CVE-2021-34427 - crowdsecurity/vpatch-CVE-2018-13317 - crowdsecurity/vpatch-CVE-2025-9316