Company Details
mitre
9,312
234,635
5417
mitre.org
0
MIT_5275633
In-progress


MITRE Company CyberSecurity Posture
mitre.orgThe MITRE Corporation is working to solve some of the nation’s biggest challenges in defense, cybersecurity, healthcare, homeland security, the judiciary and transportation. MITRE is a not-for-profit corporation committed to the public interest, operating federally funded R&D centers on behalf of U.S. government sponsors. To learn more, visit www.mitre.org.
Company Details
mitre
9,312
234,635
5417
mitre.org
0
MIT_5275633
In-progress
Between 750 and 799

MITRE Global Score (TPRM)XXXX

Description: GitHub Repositories at Risk: Sysdig Uncovers Critical Workflow Vulnerabilities Sysdig researchers have identified a significant security risk in GitHub repositories, where improperly configured workflows could allow attackers to hijack projects by exploiting the `pull_request_target` event in GitHub Actions. Unlike the standard `pull_request` trigger which runs in the context of a merge commit `pull_request_target` executes in the base branch (typically the default branch) and has access to repository secrets and write permissions via the `GITHUB_TOKEN`. The vulnerability arises when maintainers use `pull_request_target` to test untrusted code from public contributors, inadvertently exposing sensitive credentials. If misconfigured, attackers could inject malicious code, exfiltrate secrets, and gain elevated privileges within the repository. Sysdig’s investigation revealed multiple affected projects, including: - Spotipy, an open-source Python library for the Spotify Web API, where researchers demonstrated the ability to execute malicious Python packages and steal the `GITHUB_TOKEN`. The flaw has since been patched. - Mitre’s cyber analytics repository, where attackers could exfiltrate the `GITHUB_TOKEN` and other secrets, potentially gaining full control. Mitre addressed the issue promptly. - Splunk’s security_content repository, where two secrets were exposed, though the extracted `GITHUB_TOKEN` had limited read-only access. Stefan Chierici, Sysdig’s threat research lead, warned that the impact depends on the privileges of the extracted token. In severe cases, attackers could modify workflows, exfiltrate additional secrets, or alter files in the main branch effectively taking over the repository. While `pull_request_target` can be used safely, its nuances require careful handling to avoid exploitation. Sysdig has reported additional vulnerable repositories and is awaiting remediation before disclosing further details. The findings underscore the need for maintainers to audit their GitHub Actions workflows for potential misconfigurations.
Description: The MITRE Corporation faced a critical funding crisis for its CVE (Common Vulnerabilities and Exposures) Program, a cornerstone of global cybersecurity infrastructure used by vendors, governments, and critical infrastructure entities to track and prioritize vulnerabilities. The U.S. federal government initially appeared unwilling to renew MITRE’s contract, risking the shutdown of the CVE program halting new vulnerability entries and eventually taking the platform offline. While historical CVE records would remain accessible via GitHub, the disruption would sever a vital resource for real-time threat intelligence, leaving organizations worldwide exposed to unpatched vulnerabilities without centralized tracking.The temporary 11-month contract extension by CISA averted immediate collapse, but the uncertainty underscored systemic risks: reliance on a single entity for a foundational cybersecurity service, potential exploitation gaps during transitions, and the broader fragility of public-private partnerships in critical infrastructure. ENISA’s parallel launch of the European Vulnerability Database further highlighted the urgency of decentralizing such dependencies, as MITRE’s near-lapse revealed how a funding lapse could cascade into global cybersecurity blind spots, delaying patch management and increasing attack surfaces for threat actors.


No incidents recorded for MITRE in 2026.
No incidents recorded for MITRE in 2026.
No incidents recorded for MITRE in 2026.
MITRE cyber incidents detection timeline including parent company and subsidiaries

The MITRE Corporation is working to solve some of the nation’s biggest challenges in defense, cybersecurity, healthcare, homeland security, the judiciary and transportation. MITRE is a not-for-profit corporation committed to the public interest, operating federally funded R&D centers on behalf of U.S. government sponsors. To learn more, visit www.mitre.org.


Our university combines top-class facilities for cutting-edge research with unique learning opportunities for 52,000 students. Whether our researchers are investigating the origins of life, matter and the universe or looking for solutions to the major challenges for our society, people lie at the he

Imagine what you could do at a world-leading university that is globally recognised for its teaching, research and innovation. The University of Edinburgh has been providing students with world-class teaching for more than 425 years, unlocking the potential of some of the world's leading thinkers

Los Alamos National Laboratory is one of the world’s most innovative multidisciplinary research institutions. We're engaged in strategic science on behalf of national security to ensure the safety and reliability of the U.S. nuclear stockpile. Our workforce specializes in a wide range of progressive

The University of Amsterdam is one of the largest comprehensive universities in Europe. With some 44,000 students, 6,000 staff, 3,000 PhD candidates, and an annual budget of more than 850 million euros, it is also one of Amsterdam’s biggest employers. There is an inseparable link between the unive
The PPD™ clinical research business of Thermo Fisher Scientific, the world leader in serving science, enables customers to accelerate innovation and drug development through patient-centered strategies and data analytics. Our services, which span multiple therapeutic areas, include early development

UCL (University College London) is London's leading multidisciplinary university, ranked 9th in the QS World University Rankings. Established in 1826 UCL opened up education in England for the first time to students of any race, class or religion and was also the first university to welcome female

The French National Centre for Scientific Research is among the world's leading research institutions. Its scientists explore the living world, matter, the Universe, and the functioning of human societies in order to meet the major challenges of today and tomorrow. Internationally recognised for the

At Utrecht University (UU), we are working towards a better world. We do this by researching complex issues beyond the borders of disciplines. We put thinkers in contact with doers, so new insights can be applied. We give students the space to develop themselves. In so doing, we make substantial con

The CEA is the French Alternative Energies and Atomic Energy Commission ("Commissariat à l'énergie atomique et aux énergies alternatives"). It is a public body established in October 1945 by General de Gaulle. A leader in research, development and innovation, the CEA mission statement has two main
.png)
Non-profit organization MITRE introduced ESTM 3.0, the latest version of its Embedded Systems Threat Matrix, a cybersecurity framework...
Cybersecurity experts have welcomed the launch of the new Global CVE Allocation System (GCVE) as a positive move toward more robust...
MITRE launched Embedded Systems Threat Matrix (ESTM), a cybersecurity framework designed for protecting critical embedded systems.
The ESTM cybersecurity framework outlines tactics and techniques for attacking embedded systems and provides tools to address cyberthreats.
McLean, Va., and Bedford, Mass., January 20, 2026 – MITRE has introduced the Embedded Systems Threat Matrix™ (ESTM), a cybersecurity...
Explore Infosecurity Magazine's most-read cybersecurity stories of 2025, from major vendor shake-ups and zero-day exploits to AI-driven...
Experts said the new partnership should focus on making AI-based systems more reliable.
According to NIST spokesperson Jennifer Huergo, the centers aim to support technology development needed to protect U.S. leadership in AI,...
NIST has expanded its partnership with MITRE and invested $20 million to launch two AI centers.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of MITRE is http://www.mitre.org/.
According to Rankiteo, MITRE’s AI-generated cybersecurity score is 772, reflecting their Fair security posture.
According to Rankiteo, MITRE currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, MITRE has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.
According to Rankiteo, MITRE is not certified under SOC 2 Type 1.
According to Rankiteo, MITRE does not hold a SOC 2 Type 2 certification.
According to Rankiteo, MITRE is not listed as GDPR compliant.
According to Rankiteo, MITRE does not currently maintain PCI DSS compliance.
According to Rankiteo, MITRE is not compliant with HIPAA regulations.
According to Rankiteo,MITRE is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
MITRE operates primarily in the Research Services industry.
MITRE employs approximately 9,312 people worldwide.
MITRE presently has no subsidiaries across any sectors.
MITRE’s official LinkedIn profile has approximately 234,635 followers.
MITRE is classified under the NAICS code 5417, which corresponds to Scientific Research and Development Services.
Yes, MITRE has an official profile on Crunchbase, which can be accessed here: https://www.crunchbase.com/organization/mitre.
Yes, MITRE maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/mitre.
As of January 23, 2026, Rankiteo reports that MITRE has experienced 2 cybersecurity incidents.
MITRE has an estimated 5,282 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Vulnerability.
Detection and Response: The company detects and responds to cybersecurity incidents through an third party assistance with enisa in contact with mitre to assess impact and next steps., and remediation measures with temporary 11-month contract extension for mitre to continue operating the cve program; historical cve records to remain available on github if funding lapses., and communication strategy with public statements by enisa and mitre; media coverage by recorded future news., and third party assistance with sysdig researchers assisted in identifying and reporting vulnerabilities, and containment measures with flaws were fixed by the respective maintainers (spotify, mitre, splunk), and remediation measures with correcting misconfigured github actions workflows to prevent secret exfiltration..
Title: Launch of European Union's Vulnerability Database and Concerns Over CVE Program Funding
Description: The European Union launched its new European Vulnerability Database (EVD), a notification platform for cybersecurity vulnerabilities, while concerns arose over the funding and future of MITRE's CVE Program. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) temporarily extended MITRE's contract for 11 months to prevent disruption, as the cybersecurity community expressed alarm over potential lapses in CVE updates. ENISA is coordinating with MITRE to assess the impact and next steps.
Date Publicly Disclosed: 2024-02-20
Type: Vulnerability Management
Title: GitHub Repositories Vulnerable to Hijacking via Insecure pull_request_target Workflows
Description: Sysdig researchers warned that developers and maintainers could leave their GitHub repositories open to hijacking due to inadequately secured workflows, specifically the misuse of the pull_request_target trigger event in GitHub Actions. This flaw allows attackers to exfiltrate secrets, including the GITHUB_TOKEN, and gain elevated privileges within repositories.
Type: Supply Chain Attack
Attack Vector: Misconfigured GitHub Actions workflows (pull_request_target)
Vulnerability Exploited: Insecure use of pull_request_target in GitHub Actions workflows
Common Attack Types: The most common types of attacks the company has faced is Vulnerability.
Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Misconfigured GitHub Actions workflows (pull_request_target).

Operational Impact: Potential disruption to global vulnerability tracking and response prioritization if CVE program funding lapses; historical records would remain available on GitHub but no new CVEs would be added.
Brand Reputation Impact: Concerns raised within the cybersecurity community about the reliability and continuity of critical vulnerability databases (CVE program).

Data Compromised: Repository secrets (e.g., GITHUB_TOKEN), potentially other sensitive data
Systems Affected: GitHub repositories with misconfigured workflows
Operational Impact: Potential repository takeover, unauthorized code modifications, and secret exfiltration
Brand Reputation Impact: Potential reputational damage for affected projects and maintainers
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Repository secrets (e.g., GITHUB_TOKEN) and potentially other sensitive data.

Entity Name: European Union Agency for Cybersecurity (ENISA)
Entity Type: Government Agency
Industry: Cybersecurity
Location: European Union

Entity Name: MITRE Corporation
Entity Type: Non-profit Organization
Industry: Cybersecurity
Location: United States
Customers Affected: Global (vendors, governments, critical infrastructure entities relying on CVE program)

Entity Name: U.S. Cybersecurity and Infrastructure Security Agency (CISA)
Entity Type: Government Agency
Industry: Cybersecurity
Location: United States

Entity Name: Spotipy (Spotify Web API Python Library)
Entity Type: Open Source Project
Industry: Technology/Software Development

Entity Name: Mitre Cyber Analytics Repository
Entity Type: Open Source Project
Industry: Cybersecurity/Defense

Entity Name: splunk/security_content
Entity Type: Open Source Project
Industry: Technology/Cybersecurity

Third Party Assistance: ENISA in contact with MITRE to assess impact and next steps.
Remediation Measures: Temporary 11-month contract extension for MITRE to continue operating the CVE program; historical CVE records to remain available on GitHub if funding lapses.
Communication Strategy: Public statements by ENISA and MITRE; media coverage by Recorded Future News.

Third Party Assistance: Sysdig researchers assisted in identifying and reporting vulnerabilities
Containment Measures: Flaws were fixed by the respective maintainers (Spotify, Mitre, Splunk)
Remediation Measures: Correcting misconfigured GitHub Actions workflows to prevent secret exfiltration
Third-Party Assistance: The company involves third-party assistance in incident response through ENISA in contact with MITRE to assess impact and next steps., Sysdig researchers assisted in identifying and reporting vulnerabilities.

Type of Data Compromised: Repository secrets (e.g., GITHUB_TOKEN), potentially other sensitive data
Sensitivity of Data: High (secrets could lead to repository takeover)
Data Exfiltration: Yes (secrets were exfiltrated in proof-of-concept attacks)
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Temporary 11-month contract extension for MITRE to continue operating the CVE program; historical CVE records to remain available on GitHub if funding lapses., Correcting misconfigured GitHub Actions workflows to prevent secret exfiltration.
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by flaws were fixed by the respective maintainers (spotify, mitre and splunk).

Lessons Learned: The incident highlights the critical dependency of the global cybersecurity ecosystem on centralized vulnerability databases like the CVE program. It underscores the need for sustainable funding models and contingency planning to ensure continuity of essential cybersecurity infrastructure. Collaboration between regional entities (e.g., ENISA) and global programs (e.g., MITRE) is vital for resilience.

Lessons Learned: Maintainers must fully understand the security implications of GitHub Actions workflows, particularly pull_request_target, and use them with caution. Misconfigurations can lead to severe security risks, including repository takeover.

Recommendations: Establish long-term funding mechanisms for critical cybersecurity utilities like the CVE program to prevent operational disruptions., Develop redundant or distributed vulnerability databases to mitigate single points of failure., Enhance transparency in contract renewals and funding allocations for foundational cybersecurity programs., Foster international cooperation to share vulnerability data and reduce reliance on any single entity., Encourage private-sector contributions to support public-good cybersecurity initiatives.Establish long-term funding mechanisms for critical cybersecurity utilities like the CVE program to prevent operational disruptions., Develop redundant or distributed vulnerability databases to mitigate single points of failure., Enhance transparency in contract renewals and funding allocations for foundational cybersecurity programs., Foster international cooperation to share vulnerability data and reduce reliance on any single entity., Encourage private-sector contributions to support public-good cybersecurity initiatives.Establish long-term funding mechanisms for critical cybersecurity utilities like the CVE program to prevent operational disruptions., Develop redundant or distributed vulnerability databases to mitigate single points of failure., Enhance transparency in contract renewals and funding allocations for foundational cybersecurity programs., Foster international cooperation to share vulnerability data and reduce reliance on any single entity., Encourage private-sector contributions to support public-good cybersecurity initiatives.Establish long-term funding mechanisms for critical cybersecurity utilities like the CVE program to prevent operational disruptions., Develop redundant or distributed vulnerability databases to mitigate single points of failure., Enhance transparency in contract renewals and funding allocations for foundational cybersecurity programs., Foster international cooperation to share vulnerability data and reduce reliance on any single entity., Encourage private-sector contributions to support public-good cybersecurity initiatives.Establish long-term funding mechanisms for critical cybersecurity utilities like the CVE program to prevent operational disruptions., Develop redundant or distributed vulnerability databases to mitigate single points of failure., Enhance transparency in contract renewals and funding allocations for foundational cybersecurity programs., Foster international cooperation to share vulnerability data and reduce reliance on any single entity., Encourage private-sector contributions to support public-good cybersecurity initiatives.

Recommendations: Audit GitHub Actions workflows for insecure use of pull_request_target, Limit GITHUB_TOKEN permissions to the minimum required, Use pull_request_target only when absolutely necessary and with proper safeguards, Monitor for unauthorized access or modifications to workflowsAudit GitHub Actions workflows for insecure use of pull_request_target, Limit GITHUB_TOKEN permissions to the minimum required, Use pull_request_target only when absolutely necessary and with proper safeguards, Monitor for unauthorized access or modifications to workflowsAudit GitHub Actions workflows for insecure use of pull_request_target, Limit GITHUB_TOKEN permissions to the minimum required, Use pull_request_target only when absolutely necessary and with proper safeguards, Monitor for unauthorized access or modifications to workflowsAudit GitHub Actions workflows for insecure use of pull_request_target, Limit GITHUB_TOKEN permissions to the minimum required, Use pull_request_target only when absolutely necessary and with proper safeguards, Monitor for unauthorized access or modifications to workflows
Key Lessons Learned: The key lessons learned from past incidents are The incident highlights the critical dependency of the global cybersecurity ecosystem on centralized vulnerability databases like the CVE program. It underscores the need for sustainable funding models and contingency planning to ensure continuity of essential cybersecurity infrastructure. Collaboration between regional entities (e.g., ENISA) and global programs (e.g., MITRE) is vital for resilience.Maintainers must fully understand the security implications of GitHub Actions workflows, particularly pull_request_target, and use them with caution. Misconfigurations can lead to severe security risks, including repository takeover.

Source: Recorded Future News
Date Accessed: 2024-02-20

Source: ENISA Public Statement
Date Accessed: 2024-02-20

Source: MITRE Spokesperson Statement
Date Accessed: 2024-01-XX

Source: U.S. CISA Announcement on MITRE Contract Extension
Date Accessed: 2024-01-XX

Source: Sysdig Research
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Recorded Future NewsDate Accessed: 2024-02-20, and Source: ENISA Public StatementDate Accessed: 2024-02-20, and Source: MITRE Spokesperson StatementDate Accessed: 2024-01-XX, and Source: U.S. CISA Announcement on MITRE Contract ExtensionDate Accessed: 2024-01-XX, and Source: Sysdig Research.

Investigation Status: Ongoing coordination between ENISA and MITRE; CVE program operations secured for 11 months via temporary contract extension.

Investigation Status: Ongoing (additional findings to be disclosed after remediation)
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Public statements by ENISA and MITRE; media coverage by Recorded Future News..

Stakeholder Advisories: Cybersecurity vendors, governments, and critical infrastructure entities advised to monitor updates from ENISA and MITRE regarding the CVE program's future.
Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: were Cybersecurity vendors, governments and and critical infrastructure entities advised to monitor updates from ENISA and MITRE regarding the CVE program's future..

Entry Point: Misconfigured GitHub Actions workflows (pull_request_target)

Root Causes: Uncertainty In Federal Funding For The Cve Program, Leading To Potential Operational Gaps., Lack Of A Backup Or Distributed System To Ensure Continuity Of Vulnerability Tracking., Dependency On A Single Non-Profit Organization (Mitre) For A Critical Global Cybersecurity Utility.,
Corrective Actions: Temporary Contract Extension By Cisa To Maintain Cve Program Operations., Enisa'S Launch Of The European Vulnerability Database As A Complementary Notification Platform., Ongoing Discussions Between Enisa And Mitre To Address Long-Term Sustainability.,

Root Causes: Misunderstanding of pull_request_target security implications, overprivileged GITHUB_TOKEN permissions, and lack of workflow audits
Corrective Actions: Fixing misconfigured workflows, reducing GITHUB_TOKEN permissions, and educating maintainers on secure workflow practices
Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as ENISA in contact with MITRE to assess impact and next steps., Sysdig researchers assisted in identifying and reporting vulnerabilities.
Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Temporary Contract Extension By Cisa To Maintain Cve Program Operations., Enisa'S Launch Of The European Vulnerability Database As A Complementary Notification Platform., Ongoing Discussions Between Enisa And Mitre To Address Long-Term Sustainability., , Fixing misconfigured workflows, reducing GITHUB_TOKEN permissions, and educating maintainers on secure workflow practices.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2024-02-20.
Most Significant Data Compromised: The most significant data compromised in an incident were Repository secrets (e.g., GITHUB_TOKEN) and potentially other sensitive data.
Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was ENISA in contact with MITRE to assess impact and next steps., Sysdig researchers assisted in identifying and reporting vulnerabilities.
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident were Flaws were fixed by the respective maintainers (Spotify, Mitre and Splunk).
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Repository secrets (e.g., GITHUB_TOKEN) and potentially other sensitive data.
Most Significant Lesson Learned: The most significant lesson learned from past incidents was The incident highlights the critical dependency of the global cybersecurity ecosystem on centralized vulnerability databases like the CVE program. It underscores the need for sustainable funding models and contingency planning to ensure continuity of essential cybersecurity infrastructure. Collaboration between regional entities (e.g., ENISA) and global programs (e.g., MITRE) is vital for resilience., Maintainers must fully understand the security implications of GitHub Actions workflows, particularly pull_request_target, and use them with caution. Misconfigurations can lead to severe security risks, including repository takeover.
Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Foster international cooperation to share vulnerability data and reduce reliance on any single entity., Use pull_request_target only when absolutely necessary and with proper safeguards, Monitor for unauthorized access or modifications to workflows, Enhance transparency in contract renewals and funding allocations for foundational cybersecurity programs., Audit GitHub Actions workflows for insecure use of pull_request_target, Limit GITHUB_TOKEN permissions to the minimum required, Develop redundant or distributed vulnerability databases to mitigate single points of failure., Establish long-term funding mechanisms for critical cybersecurity utilities like the CVE program to prevent operational disruptions. and Encourage private-sector contributions to support public-good cybersecurity initiatives..
Most Recent Source: The most recent source of information about an incident are Sysdig Research, MITRE Spokesperson Statement, Recorded Future News, U.S. CISA Announcement on MITRE Contract Extension and ENISA Public Statement.
Current Status of Most Recent Investigation: The current status of the most recent investigation is Ongoing coordination between ENISA and MITRE; CVE program operations secured for 11 months via temporary contract extension..
Most Recent Stakeholder Advisory: The most recent stakeholder advisory issued was Cybersecurity vendors, governments, and critical infrastructure entities advised to monitor updates from ENISA and MITRE regarding the CVE program's future., .
Most Recent Entry Point: The most recent entry point used by an initial access broker was an Misconfigured GitHub Actions workflows (pull_request_target).
Most Significant Root Cause: The most significant root cause identified in post-incident analysis was Uncertainty in federal funding for the CVE program, leading to potential operational gaps.Lack of a backup or distributed system to ensure continuity of vulnerability tracking.Dependency on a single non-profit organization (MITRE) for a critical global cybersecurity utility., Misunderstanding of pull_request_target security implications, overprivileged GITHUB_TOKEN permissions, and lack of workflow audits.
Most Significant Corrective Action: The most significant corrective action taken based on post-incident analysis was Temporary contract extension by CISA to maintain CVE program operations.ENISA's launch of the European Vulnerability Database as a complementary notification platform.Ongoing discussions between ENISA and MITRE to address long-term sustainability., Fixing misconfigured workflows, reducing GITHUB_TOKEN permissions, and educating maintainers on secure workflow practices.
.png)
Improper validation of specified type of input in M365 Copilot allows an unauthorized attacker to disclose information over a network.
Improper access control in Azure Front Door (AFD) allows an unauthorized attacker to elevate privileges over a network.
Azure Entra ID Elevation of Privilege Vulnerability
Moonraker is a Python web server providing API access to Klipper 3D printing firmware. In versions 0.9.3 and below, instances configured with the "ldap" component enabled are vulnerable to LDAP search filter injection techniques via the login endpoint. The 401 error response message can be used to determine whether or not a search was successful, allowing for brute force methods to discover LDAP entries on the server such as user IDs and user attributes. This issue has been fixed in version 0.10.0.
Runtipi is a Docker-based, personal homeserver orchestrator that facilitates multiple services on a single server. Versions 3.7.0 and above allow an authenticated user to execute arbitrary system commands on the host server by injecting shell metacharacters into backup filenames. The BackupManager fails to sanitize the filenames of uploaded backups. The system persists user-uploaded files directly to the host filesystem using the raw originalname provided in the request. This allows an attacker to stage a file containing shell metacharacters (e.g., $(id).tar.gz) at a predictable path, which is later referenced during the restore process. The successful storage of the file is what allows the subsequent restore command to reference and execute it. This issue has been fixed in version 4.7.0.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.