On this page
On this page
- 0. TL;DR
- 1. Active Threats, Trending Actors, Notable Incidents & Disclosures
- 2. Trending Vulnerabilities
- 3. Research & Investigative Reporting
- 4. Updates to Prior Coverage
- 5. Deep Dive — n8n prototype-pollution chain (CVE-2026-42231 et al.): authenticated-to-RCE on a workflow-automation platform that Swiss/EU agencies increasingly stand up as their integration bus
- 6. Action Items
- 7. Verification Notes
Tags (25)
Regions (7)
References (34)
- CVE-2026-42231 ×2
- CVE-2020-17103 ×2
- CVE-2026-41702
- CVE-2026-42232
- CVE-2026-44789
- CVE-2026-44790
- CVE-2026-44791
- CVE-2026-46351
- CVE-2026-46353
- CVE-2026-46404
- CVE-2025-29927 ×3
- CVE-2025-48703 ×3
- CVE-2025-55182 ×3
- CVE-2025-9501 ×3
- CVE-2026-1357 ×3
- ARWINI (Lower Saxony statutory-prescription audit body) — data exfiltration confirmed by LKA
- BigBlueButton bbb-web — three CVEs (sessionToken, checksum bypass, SSRF) on EU edu/gov virtual-classroom platform
- CISA / Nightwing contractor — AWS GovCloud admin keys + plaintext creds + Artifactory exposed in public GitHub for ~6 months
- 7-Eleven confirms ShinyHunters breach of 600K+ Salesforce franchise-application records (campaign same as Instructure / Vimeo / Wynn / Vercel / Medtronic)
- INTERPOL Operation Ramz — first MENA-region cybercrime sweep: 201 arrests, 53 servers, first Algerian PhaaS takedown (Oct 2025–Feb 2026)
- Fast16 — Symantec/Carbon Black confirm contemporaneous-with-Stuxnet nuclear-simulation sabotage; LS-DYNA/AUTODYN hook engine targeting 30 g/cm³ density threshold; Zetter corrects 'pre-Stuxnet' framing
- UPDATE: TeamPCP / Shai-Hulud — first copycat wave (OX Security npm packages w/ Phantom Bot + SSH/cloud stealers); Checkmarx Jenkins plugin trojanised (third in three months); SentinelLabs PCPJack rival worm
- UPDATE: Grafana Labs CoinbaseCartel — victim confirms source-code-only theft via Pwn-Request, no customer data, ransom rejected on FBI guidance
- UPDATE: Chaotic Eclipse Windows zero-days — MiniPlasma is third PoC (cldflt.sys CfAbortHydration, claimed CVE-2020-17103 regression on fully patched Win11)
- BleepingComputer
- BSI Germany — CERT-Bund WID (RSS)
- GitHub Advisory Database
- heise Security
- Help Net Security
- Krebs on Security
- SANS Internet Storm Center
- Security Affairs
- SecurityWeek
- OX Security Blog
0. TL;DR
- ARWINI prescription-review body (Lower Saxony) — investigators confirm data exfiltration, ~70,000 GDPR Art. 9 patient records likely affected; Kairos ransomware group claims theft of 2.87 TB (Deutsches Ärzteblatt, 2026-05-18; Heise Security, 2026-05-18). Statutory health-insurance auditor for KVN/AOK; Polizeidirektion Hannover is the investigating authority; data offered for sale on Kairos leak site.
- BigBlueButton ≥ 3.0.21 / 3.0.23 fix three flaws in widely-deployed EU academic & government virtual-classroom platform (BBB GHSA-7959-pf2v-xc4h, 2026-05-17). Weak
sessionTokenrandomness (CVE-2026-46351, CVSS 8.1),presentationUploadExternalUrlchecksum bypass (CVE-2026-46353, CVSS 8.1), SSRF in presentation URL validation (CVE-2026-46404, CVSS 6.8); BSI corroborated 2026-05-18. - n8n self-hosted automation — five chained critical CVEs (all CVSS 9.4) covering authenticated-to-RCE via xml2js + Git-node SSH plus a separate Git-node arbitrary file read (n8n GHSA-q5f4-99jv-pgg5, 2026-05-18). Patches split across two trains:
-42231/-42232in 1.123.32 / 2.17.4 / 2.18.1;-44789/-44790/-44791in 1.123.43 / 2.20.7 / 2.22.1. Apply the later train. See deep dive. - 7-Eleven confirms ShinyHunters breach of 600,000+ Salesforce franchise-application records (SecurityWeek, 2026-05-18). Part of the broader ShinyHunters Salesforce-targeting campaign with co-victims Instructure, Vimeo, Wynn Resorts, Vercel, Medtronic — phishing / OAuth / misconfiguration, not Salesforce-product vulnerabilities.
- CISA contractor (Nightwing) exposed AWS GovCloud admin keys and internal credentials for ~6 months via public GitHub repo (Krebs on Security, 2026-05-18). GitGuardian found credentials to three GovCloud accounts, plaintext passwords for dozens of internal CISA systems, and the LZ-DSO Artifactory build-package repo; keys validated live 48h after takedown.
- TeamPCP/Shai-Hulud copycat wave begins — first imitator drops Phantom Bot DDoS and SSH/cloud-credential stealers in four typosquatted npm packages (OX Security, 2026-05-17).
chalk-tempalteis a direct clone of the leaked Shai-Hulud worm source code that Datadog Security Labs analysed on 2026-05-13.
1. Active Threats, Trending Actors, Notable Incidents & Disclosures
ARWINI (Lower Saxony statutory-prescription audit body) — investigators confirm data exfiltration after 4 May intrusion; Kairos ransomware group claims 2.87 TB; ~70,000 GDPR Art. 9 records in scope
Investigators confirmed on 2026-05-18 that the cyberattack on ARWINI — the Arbeitsgemeinschaft Wirtschaftlichkeitsprüfung Niedersachsen e.V., which audits prescription cost-effectiveness for statutory-health-insurance (GKV) patients in Lower Saxony via data exchange with Kassenärztliche Vereinigung Niedersachsen (KVN), AOK and other insurers — resulted in confirmed exfiltration of personal data (Deutsches Ärzteblatt, 2026-05-18; Heise Security, 2026-05-18). Intrusion signs were detected on ARWINI servers on 2026-05-04 and all systems were shut down on the same day; ARWINI's own statement, cited by Borns IT Blog on 2026-05-16, said particularly sensitive personal data (besondere Kategorien — GDPR Art. 9) are likely affected, with health and billing data on ≥70,000 patients in scope (Borns IT Blog, 2026-05-16). The Polizeidirektion Hannover is the investigating authority; the Landesbeauftragter für Datenschutz Niedersachsen (LfD) and BSI have been notified under the GDPR 72-hour rule and the German KRITIS / NIS2UmsuCG framework. Heise reports the Kairos ransomware group has claimed the attack and is threatening to sell approximately 2.87 TB of stolen data on its leak site, with attackers' leak-site claim dated 2026-05-11. The technical pattern is consistent with double-extortion ransomware now in the operator-leak-site phase.
Why it matters to us: GKV bodies and their mandated third-party auditors are NIS2 entities; the supply-chain relationship between KVN/AOK and ARWINI is precisely the data-processor scope hit by NMDL/IGJ in the Netherlands (covered 2026-05-14). Defender pattern: any GKV / AHV / cantonal health-insurance data-exchange counterparty should be inventoried as an in-scope critical-supplier under §8b BSI-Gesetz / NIS2UmsuCG, with breach-notification playbooks rehearsed for the 72-hour GDPR clock from a third party's detection event, not just one's own. Monitor for downstream phishing using GKV billing-data lures targeting affected patient cohorts.
BigBlueButton bbb-web < 3.0.21 / < 3.0.23 — three flaws in EU education and government virtual-classroom platform: weak session-token randomness, API checksum bypass, SSRF
BigBlueButton (BBB) — the de facto open-source virtual classroom platform deployed across German DFN, Swiss SWITCH, and pan-European GÉANT academic networks, including cantonal school deployments — published three GitHub Security Advisories on 2026-05-17 covering distinct flaws in its bbb-web component, all in versions before 3.0.21 (two of three) and 3.0.23 (one). CVE-2026-46351 (CVSS 8.1) is a CWE-330 weakness: the sessionToken is generated with insufficiently random values, letting an authenticated low-privilege attacker who shares or has observed a meeting determine other participants' session tokens and impersonate any conference user (BBB GHSA-7959-pf2v-xc4h, 2026-05-17). CVE-2026-46353 (CVSS 8.1) is a CWE-284 access-control bypass in the presentationUploadExternalUrl endpoint: by supplying specific URL parameters an attacker can bypass checksum validation and send valid API requests to restricted endpoints without proper authentication, with high confidentiality + integrity impact (BBB GHSA-43hc-5g2m-cqff, 2026-05-17). CVE-2026-46404 (CVSS 6.8) is a CWE-918 SSRF in presentation URL validation: insufficient redirect-following checks allow a high-privilege authenticated attacker to reach RFC1918 and link-local (169.254.0.0/16) addresses from the BBB server context (BBB GHSA-xqm3-6q7q-4v5h, 2026-05-17). BSI's WID-SEC-2026-1568 corroborated on 2026-05-18 (BSI WID-SEC-2026-1568, 2026-05-18).
Why it matters to us: BBB is operated at scale by Swiss cantonal Volksschule deployments, German Länder ministries of education and university IT, EU national-research-and-education networks (NRENs). The combination of session-token prediction + checksum bypass would let a low-privilege classroom participant impersonate other students and teachers or send arbitrary authenticated API calls; SSRF on the server gives a presenter-role lateral-movement primitive into RFC1918 networks (KVM hosts, internal LDAP, SIS endpoints). Upgrade bbb-web to ≥ 3.0.21 for the first two CVEs and ≥ 3.0.23 for the SSRF; monitor bbb-web logs for anomalous joins using close-by sessionTokens and for API calls to presentationUploadExternalUrl carrying unexpected URL parameters; alert on egress from the BBB server process to RFC1918 / 169.254/16 ranges. MITRE T1212 (Exploitation for Credential Access) covers the session-token-prediction primitive; the SSRF maps to T1190 (Exploit Public-Facing Application) chained with internal-network reach.
CISA contractor (Nightwing) exposed AWS GovCloud admin keys and internal credentials in public GitHub repo for ~6 months
A Nightwing government contractor used a public GitHub repository named "Private-CISA" as a personal sync mechanism between work and home machines, exposing highly-privileged credentials for CISA / DHS infrastructure from approximately 2025-11-13 to 2026-05-15 — about six months (Krebs on Security, 2026-05-18; Gizmodo, 2026-05-19). GitGuardian researcher Guillaume Valadon surfaced the repository on 2026-05-15. Exposed material included administrative credentials for three Amazon AWS GovCloud accounts, plaintext usernames and passwords (AWS-Workspace-Firefox-Passwords.csv) for dozens of internal CISA systems, SSH keys and cloud tokens, and credentials to CISA's internal Artifactory code-package repository ("LZ-DSO" — Landing Zone DevSecOps). The contractor had deliberately disabled GitHub's default push-protection secret scanning. Independent researcher Philippe Caturegli (Seralys) validated AWS keys against live GovCloud accounts at high privilege and confirmed the keys remained valid for at least 48 hours after the repository was taken down. CISA acknowledged a ~one-third workforce reduction from buyouts and resignations under the Trump administration may have weakened oversight of contractor behaviour.
Why it matters to us: Caturegli identified the Artifactory access as the highest-impact exposure — write access to a national cybersecurity agency's build-package repo would enable backdoor insertion into anything CISA built or deployed (T1195.002 Supply Chain Compromise: Compromise Software Supply Chain). The transferable lesson for EU/CH national CERT operators is independent of US politics: contractors and integrators with write access to NCSC / BSI / ANSSI build pipelines must be subject to organisation-level GitHub push-protection that administrators cannot disable, mandatory short-lived OIDC role assumption (no long-lived AWS keys), Artifactory access-log SIEM integration with off-hours bulk-download anomaly detection, and quarterly secret-scanning sweeps of contractor personal repos under contract. T1552.001 (Credentials In Files) / T1552.004 (Private Keys).
7-Eleven confirms ShinyHunters breach of 600,000+ Salesforce franchise-application records — same campaign as Instructure, Vimeo, Wynn Resorts, Vercel, Medtronic
7-Eleven, Inc. confirmed on 2026-05-18 that an unauthorised third party accessed systems storing franchisee documents on 2026-04-08, in a breach claimed by ShinyHunters on or around 2026-04-17 (SecurityWeek, 2026-05-18; Security Affairs, 2026-05-18). ShinyHunters listed over 600,000 Salesforce CRM records covering personal and corporate data from franchise applications, initially demanding a ransom with a 2026-04-21 deadline and then offering the data for sale at $250,000 on a hacker forum. 7-Eleven filed a Maine Attorney General notification dated 2026-05-01 confirming 24 months of IDX identity-theft protection for affected individuals (Maine AG breach notification, 2026-05-01). The Maine filing lists only 2 Maine residents but the ShinyHunters claim covers 600,000+ records globally. SecurityWeek attributes the broader campaign — Instructure (Canvas), Vimeo, Wynn Resorts (21,000 employees), Vercel and Medtronic among confirmed co-victims — not to Salesforce-product vulnerabilities but to phishing, third-party-integration abuse, and customer-side misconfiguration of Salesforce Connected Apps.
Why it matters to us: ShinyHunters is the same actor that hit Instructure last week, with the broader Salesforce-targeting campaign continuing across sectors. The campaign vector is identity-side rather than Salesforce-product-side — Connected App OAuth grant abuse, phishing of admin sessions, mis-scoped third-party SaaS integrations. EU/CH public-sector and finance tenants using Salesforce for partner / supplier / case-management data should audit Connected App OAuth grants (particularly to third-party AI SaaS integrations), enable Salesforce Event Monitoring with alerts on bulk Report Export events and high-volume SOQL API calls, enforce IP-range / Trusted-IP session policies, and consider Salesforce Shield field-level encryption for PII. T1078.004 (Cloud Accounts), T1530 (Data from Cloud Storage Object), T1567.002 (Exfiltration to Cloud Storage).
INTERPOL Operation Ramz — 13-country MENA cybercrime sweep: 201 arrests, 53 servers seized, Algerian PhaaS server takedown
INTERPOL announced on 2026-05-18 the completion of Operation Ramz — described as the first cyber operation of its scale coordinated by INTERPOL specifically targeting the MENA region — running October 2025 through 2026-02-28 across 13 countries (Algeria, Bahrain, Egypt, Iraq, Jordan, Lebanon, Libya, Morocco, Oman, Palestine, Qatar, Tunisia, UAE) (INTERPOL, 2026-05-18; The Hacker News, 2026-05-18; Help Net Security, 2026-05-18). Outcomes: 201 arrests, 382 further suspects identified, 3,867 victims, 53 servers seized, ~8,000 intelligence data points disseminated. Algerian authorities dismantled a phishing-as-a-service operation, seizing a server, computer and hard drives containing phishing software and scripts. Moroccan police seized devices with banking data and phishing tooling; Omani investigators identified a residential server with active malware infection. Jordanian police rescued 15 human-trafficking victims who had been coerced into running cybercrime operations — the same forced-labour-to-cyber-scam pipeline documented in Southeast Asian fraud compounds. Industry partners: Group-IB, Kaspersky, Shadowserver Foundation, Team Cymru, TrendAI. The operation is partially funded by the EU and Council of Europe under the CyberSouth+ project.
Why it matters to us: MENA-based PhaaS kits routinely target EU banking customers and EU payment rails (SEPA-Inst flagging, IBAN-based phishing lures); the disruption reduces commodity-kit availability and the Shadowserver / Group-IB intelligence shared via the operation will surface in NCSC / BSI / NCSC-CH advisories over the coming weeks. The trafficking-to-scam pipeline confirmed in Jordan is the same operator model EUROPOL has been mapping for fraud-compound disruption.
2. Trending Vulnerabilities
CVE-2026-42231 / -42232 / -44789 / -44790 / -44791 — n8n self-hosted automation: chained prototype-pollution and injection flaws enabling authenticated-to-RCE plus a Git-node arbitrary file read
n8n published five Critical security advisories on 2026-05-18, two on 2026-05-18 (-42231, -42232) and a follow-on cluster of three (-44789, -44790, -44791) released against later branches (n8n GHSA-q5f4-99jv-pgg5, 2026-05-18; The Hacker News, 2026-05-18). CVE-2026-42231 (CVSS 4.0: 9.4, CWE-1321) is the root cause: a prototype-pollution primitive reachable via crafted XML supplied to the xml2js library used by the n8n webhook handler. Once the global JavaScript object prototype is polluted, the chain pivots into the n8n Git node's SSH operations to achieve RCE on the n8n host by an authenticated user with workflow create / modify permission. CVE-2026-42232 (GHSA-hqr4-h3xv-9m3r, "XML Node Prototype Pollution to RCE") is a companion XML-Node prototype-pollution flaw exercising the same primitive in a second sink. The follow-on advisories: CVE-2026-44789 (GHSA-c8xv-5998-g76h, "HTTP Request Node Pagination Prototype Pollution to RCE"); CVE-2026-44790 (GHSA-57g9-58c2-xjg3, "Arbitrary File Read via Git Node" — a file-read primitive, not the SSH RCE chain); CVE-2026-44791 (GHSA-wrwr-h859-xh2r, "XML Node Prototype Pollution Patch Bypass"). Patched versions split between two branch trains: -42231 and -42232 in n8n 1.123.32 / 2.17.4 / 2.18.1; -44789, -44790 and -44791 in 1.123.43 / 2.20.7 / 2.22.1. No in-the-wild exploitation reported at the time of writing. Inclusion gate: CVSS 9.4 ≥ 9.0 (PD §2 inclusion gate via the CVSS 9.0–10.0 ENISA EUVD threshold).
CVE Summary Table
| CVE | Product | CVSS | EPSS | KEV | Exploited | Patch | Source |
|---|---|---|---|---|---|---|---|
| CVE-2026-42231 | n8n (xml2js webhook prototype pollution → Git-node SSH RCE chain) | 9.4 | n/a | No | No (no public ITW) | 1.123.32 / 2.17.4 / 2.18.1 | n8n GHSA-q5f4-99jv-pgg5 |
| CVE-2026-42232 | n8n (XML Node Prototype Pollution to RCE) | 9.4 | n/a | No | No | 1.123.32 / 2.17.4 / 2.18.1 | n8n GHSA-hqr4-h3xv-9m3r |
| CVE-2026-44789 | n8n (HTTP Request Node Pagination — prototype pollution to RCE) | 9.4 | n/a | No | No | 1.123.43 / 2.20.7 / 2.22.1 | n8n GHSA-c8xv-5998-g76h |
| CVE-2026-44790 | n8n (Arbitrary File Read via Git Node — file-read primitive) | 9.4 | n/a | No | No | 1.123.43 / 2.20.7 / 2.22.1 | n8n GHSA-57g9-58c2-xjg3 |
| CVE-2026-44791 | n8n (XML Node Prototype Pollution Patch Bypass) | 9.4 | n/a | No | No | 1.123.43 / 2.20.7 / 2.22.1 | n8n GHSA-wrwr-h859-xh2r |
3. Research & Investigative Reporting
Symantec / Carbon Black document Fast16 hook engine targeting LS-DYNA/AUTODYN nuclear-simulation codes; Kim Zetter corrects "pre-Stuxnet" framing to contemporaneous-and-simulation-sabotage
Background. Fast16 — a Lua-based sabotage framework — was first disclosed by SentinelOne at LABScon 2026 in April 2026 and originally framed as a Stuxnet predecessor by approximately two years. Earlier reporting also speculated that the malware operated against physical centrifuge equipment. Both framings now appear incorrect on closer expert review.
Broadcom's Symantec and Carbon Black teams published a technical analysis on 2026-05-18 documenting the framework's operating envelope and target selection (Broadcom Security, 2026-05-18; The Hacker News, 2026-05-18). The architecture: a service binary embedding an early Lua 5.0 VM; a boot-start filesystem driver intercepting executable code as it is read from disk; and a rule-driven hook engine rewriting specific instruction sequences inside narrowly targeted simulation applications. The hook engine selectively intercepts execution inside LS-DYNA and AUTODYN — the canonical high-explosive simulation codes used for weapons design — and activates only when the simulated material density exceeds 30 g/cm³, the threshold reachable only under implosion shock-compression conditions relevant to weapons-grade uranium. Kim Zetter's investigative analysis on 2026-05-16 separately corrected the historical framing of the campaign (Kim Zetter / ZERO DAY, 2026-05-16): Fast16 was contemporaneous with Stuxnet, not a predecessor, and was engineered to feed false output to weapons engineers rather than to physically alter nuclear infrastructure. Defender relevance is narrow but specific: Broadcom appears to describe the first publicly-documented use of a filesystem-driver-level instruction-rewriting hook engine to corrupt scientific-simulation output — a sabotage technique class distinct from data exfiltration, ransomware, or DoS. Operators of national-laboratory research-computing environments, defence-related HPC clusters, and reactor-physics-modelling labs should add filesystem-driver-load monitoring (Sysmon EID 6, Windows boot-start driver enumeration) and integrity checking of long-running simulation binaries to their threat models.
4. Updates to Prior Coverage
UPDATE: TeamPCP / Shai-Hulud — first copycat wave (Phantom Bot + SSH/cloud stealers), Checkmarx Jenkins plugin trojanised again, PCPJack rival worm hits exposed cloud services
UPDATE (originally covered 2026-05-13, 2026-05-15): Three concurrent developments show the TeamPCP / Shai-Hulud campaign has entered an open-source-imitator phase following Datadog Security Labs' 2026-05-13 analysis of the leaked Shai-Hulud worm source code. First, OX Security disclosed on 2026-05-17 four malicious npm packages published by
deadcode09284814—chalk-tempalte,@deadcode09284814/axios-util,axois-utils, andcolor-style-utils— combined weekly downloads ~3,000 (OX Security, 2026-05-17; The Hacker News, 2026-05-18).chalk-tempalteis a near-unmodified clone of the leaked Shai-Hulud worm with a modified C2 server and a new attacker-controlled key embedded in the code — the two primary sources disagree on whether this is a public or private key (see § 7);axois-utilsbundles "Phantom Bot," a Golang HTTP/TCP/UDP/Reset-flood DDoS tool with Windows Startup folder and Linux scheduled-task persistence that survives package removal; the other two harvest SSH keys, cloud-provider credentials (AWS/GCP/Azure), and cryptocurrency wallet data.Second, SANS ISC synthesised a 2026-05-18 campaign update confirming that Checkmarx officially acknowledged on 2026-05-11 that its Jenkins AST Scanner plugin had been trojanised — version
2026.5.09, compromise window 2026-05-09 01:25 UTC to 2026-05-10 08:47 UTC — making this TeamPCP's third confirmed Checkmarx intrusion in three months (SANS Internet Storm Center, 2026-05-18; Checkmarx, 2026-05-12). Hundreds of Jenkins controllers installed the malicious plugin before removal; remediated builds2.0.13-848and2.0.13-847are safe. CxSAST on-premise was unaffected; the cloud-integratedcheckmarx/ast-github-action,checkmarx/kics-github-action, and VS Code extensions were all trojaned.Third, SentinelLabs disclosed on 2026-05-07 — also folded into the SANS ISC summary — "PCPJack," a rival cloud worm that scans for exposed Docker, Kubernetes, Redis, MongoDB and RayML services and chains five CVEs (CVE-2025-29927 Next.js middleware auth bypass; CVE-2025-55182 Next.js Server Actions deserialization; CVE-2026-1357 WPVivid arbitrary file upload; CVE-2025-9501 W3 Total Cache RCE; CVE-2025-48703 CentOS Web Panel command injection) for initial access, then explicitly kills TeamPCP processes and removes TeamPCP artefacts before harvesting credentials — assessed by SentinelLabs with moderate confidence as possibly a former TeamPCP affiliate. Defender takeaway for the Swiss/EU public-sector SOC: developer endpoints and CI/CD runners with installed Checkmarx plugin should be audited for plugin versions outside the known-safe SHA range during the 2026-05-09 → 2026-05-10 window;
npm auditand SBOM scans should flag thedeadcode09284814author/scope; egress from CI runners to*.lhr.lifehostnames is a high-fidelity hunt pivot for the npm worm wave; Docker/Kubernetes/Redis/MongoDB endpoints exposed to the internet should be inventoried and removed from public exposure (PCPJack's scan list). MITRE T1195.002 (Supply Chain Compromise), T1552.001 (Credentials in Files), T1041 (Exfiltration over C2 Channel).
UPDATE: Grafana Labs CoinbaseCartel breach — victim confirms source-code-only theft, no customer data, ransom rejected
UPDATE (originally covered 2026-W21): Grafana Labs issued an official 2026-05-18 confirmation of the GitHub Pwn-Request breach previously reported in the 2026-W21 weekly summary (SecurityWeek, 2026-05-18; BleepingComputer, 2026-05-18; The Register, 2026-05-18). The material new disclosures in the 2026-05-18 confirmation: Grafana explicitly states (a) only source code was accessed — "no personal or customer information was stolen"; (b) the incident has not impacted customer systems or operations; (c) the ransom was refused. The technical-mechanism details (
pull_request_targetworkflow misconfiguration, forked-PR injection of acurlcommand, harvested write-scoped GitHub token, canary-token detection) were previously reported in the 2026-W21 weekly summary citing THN's earlier coverage (The Hacker News, 2026-05-17); they are repeated here as context for defenders who did not catch the weekly. CoinbaseCartel is assessed by THN as an offshoot of the ShinyHunters / Scattered Spider / LAPSUS$ ecosystem and has accumulated ~170 victims since September 2025.Defender takeaway: Grafana OSS is the de facto monitoring/observability platform in EU/CH public-sector SOC and NOC environments; defenders should monitor non-official Grafana plugin updates and unsigned Grafana agent builds for the next 30 days as a potential supply-chain trojanisation follow-on. The Pwn-Request attack pattern is the same class of CI/CD misconfiguration covered by SentinelOne's Living off the Pipeline taxonomy (referenced 2026-05-16); audit every
pull_request_targetworkflow to ensure no privileged steps run on untrusted-fork code, setpermissions: read-allat workflow level and elevate only as needed, and separate privilege-requiring steps into a secondworkflow_runworkflow gated on merged code. MITRE T1195.002 / T1552.004 / T1567.
UPDATE: Chaotic Eclipse Windows zero-days — MiniPlasma is third PoC in series; cldflt.sys CfAbortHydration path, claimed re-exploitable CVE-2020-17103 regression
UPDATE (originally covered 2026-05-15): Researcher "Chaotic Eclipse" / "Nightmare Eclipse" released a third unpatched Windows LPE PoC on 2026-05-17 — MiniPlasma — extending the YellowKey and GreenPlasma series covered in the 2026-05-15 daily (BleepingComputer, 2026-05-17; The Hacker News, 2026-05-18). The material new technical detail: MiniPlasma targets the
cldflt.sysCloud Filter Mini Filter Driver — specifically theHsmOsBlockPlaceholderAccessroutine — and abuses the undocumentedCfAbortHydrationAPI to create arbitrary registry keys in the.DEFAULTuser hive without proper ACL checks, escalating from standard user to SYSTEM. The flaw was originally reported by Google Project Zero (James Forshaw) in September 2020 and nominally patched in December 2020 as CVE-2020-17103; Chaotic Eclipse asserts the exact same code path remains exploitable on fully-patched Windows 11 with May 2026 cumulative updates applied. Will Dormann independently confirmed the PoC opens a SYSTEMcmd.exereliably on Windows 11 Pro fully patched. The exploit reportedly fails on the latest Insider Preview Canary builds, suggesting Microsoft has a fix in the pipeline but has not yet released an out-of-band patch. ThreatLocker published two registry-path hunt pivots:\Registry\User\Software\Policies\Microsoft\CloudFiles\BlockedApps*and\Registry\User\.DEFAULT\Volatile Environment*.Defender takeaway: the proliferation of unpatched LPEs from one researcher signals an extended period of
SYSTEM-shell availability for any attacker that lands user-level execution on Windows endpoints. Sysmon EID 13 (RegistryEvent / SetValue) on the.DEFAULThive from non-SYSTEMprocesses is the primary hunt pivot; Sysmon EID 6 driver-load monitoring catches related driver-abuse paths. Hardening: BitLocker PIN mitigates the companion YellowKey BitLocker bypass; disabling Cloud Files / OneDrive integration removes the MiniPlasma attack surface but is not practical in most environments. MITRE T1068 (Exploitation for Privilege Escalation).
Changes since first coverage(1 prior appearance)
- 2026-05-182026-W21
5. Deep Dive — n8n prototype-pollution chain (CVE-2026-42231 et al.): authenticated-to-RCE on a workflow-automation platform that Swiss/EU agencies increasingly stand up as their integration bus
n8n is an open-source / fair-code workflow automation platform — visual flow editor, hundreds of "nodes" wrapping SaaS APIs, file processing, code execution, Git operations and HTTP calls — increasingly deployed by Swiss/EU public-sector teams as a low-code integration bus, by federal data offices for pipeline orchestration, and by university research groups as a lab automation glue layer. n8n disclosed five Critical CVEs at CVSS 9.4 each on 2026-05-18, split across two patch trains: the primary chain (-42231 / -42232) and a follow-on cluster (-44789 / -44790 / -44791) addressing additional prototype-pollution and file-read primitives (n8n GHSA-q5f4-99jv-pgg5, 2026-05-18; The Hacker News, 2026-05-18).
Vulnerability class and component. The root flaw, CVE-2026-42231 (GHSA-q5f4-99jv-pgg5, CWE-1321 Prototype Pollution), is a prototype-pollution primitive reachable via crafted XML supplied to the xml2js library used by n8n's webhook handler to parse XML request bodies. By embedding __proto__ / constructor.prototype payloads into the parsed XML, an authenticated user with permission to create or modify workflows can pollute the global JavaScript object prototype on the n8n process. The advisory's stated chain pivots into the n8n Git node's SSH operations: once the prototype is polluted, the Git node's SSH invocation path consumes attacker-controlled values and achieves RCE on the n8n host. CVE-2026-42232 (GHSA-hqr4-h3xv-9m3r, "XML Node Prototype Pollution to RCE") is a companion XML-Node prototype-pollution flaw exercising the same primitive in a second sink. The follow-on advisories address additional sinks: CVE-2026-44789 (GHSA-c8xv-5998-g76h) is "HTTP Request Node Pagination Prototype Pollution to RCE" — a second prototype-pollution path through the pagination logic; CVE-2026-44790 (GHSA-57g9-58c2-xjg3) is "Arbitrary File Read via Git Node" — a separate file-read primitive distinct from the RCE chain; CVE-2026-44791 (GHSA-wrwr-h859-xh2r) is "XML Node Prototype Pollution Patch Bypass" — a regression / bypass of the initial xml2js fix. The vendor's published CVSS vector for CVE-2026-42231 is CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H = 9.4 — network attack, low complexity, low privileges required (a workflow editor account), no user interaction, high confidentiality / integrity / availability impact on both the n8n host and subsequent systems.
Exploitation prerequisites. Authenticated access to the n8n instance at the workflow-editor role or higher, plus reachability to a webhook endpoint that accepts XML content-type bodies. n8n self-hosted deployments commonly expose webhook endpoints to the public internet (the Webhook Trigger node is the canonical way to ingest events) — so any compromised editor credential, or any internal user account on an unrestricted n8n instance, is the entry point. Patched versions: the primary chain (-42231, -42232) is fixed in n8n 1.123.32 / 2.17.4 / 2.18.1; the follow-on cluster (-44789, -44790, -44791) is fixed in 1.123.43 / 2.20.7 / 2.22.1. Operators must apply the later branch train to cover the full chain; applying only the initial fixes leaves the pagination prototype-pollution path, the Git-node arbitrary file read, and the XML-node patch-bypass exposed. Upgrade is the only remediation; no workaround.
Kill chain and ATT&CK mapping. T1190 Exploit Public-Facing Application — webhook handler as the initial-access exposure for the prototype pollution. T1059.007 Command and Scripting Interpreter: JavaScript — prototype-pollution primitive lives in the JS runtime. T1068 Exploitation for Privilege Escalation — pollution-to-Git-SSH-chain crosses from editor-role workflow context to host-process command execution. T1611 Escape to Host is relevant for the (common) Docker-deployed n8n: RCE on the n8n container can pivot to host depending on socket / mount exposure.
Hunt and detection concepts. Inspect n8n webhook HTTP request bodies (or upstream WAF logs) for XML content-type payloads containing __proto__, constructor.prototype, or prototype literal strings as XML element / attribute names — most legitimate XML payloads do not contain those tokens. From an EDR perspective, the high-confidence signal is the n8n process (Node.js node parent) spawning unexpected ssh or git child processes outside of approved Git node workflows; correlate with the user identity that triggered the workflow at the same timestamp. Container deployments should monitor n8n container egress to unfamiliar SSH hosts and unexpected ssh-keygen / ~/.ssh/known_hosts modifications. n8n's own audit log retains workflow create/modify events for the editor account — pivot from any spike in workflow modifications back to the originating account.
Hardening. Apply the vendor patch (n8n 1.123.32 / 2.17.4 / 2.18.1) — that is the only remediation. Beyond patch: enforce SSO / MFA on the n8n editor role; restrict workflow creation/modification to a small administrative group; place the n8n webhook surface behind an authenticated reverse proxy with WAF coverage for prototype-pollution literals; disable the Git node if not required; for container deployments, run n8n as a non-root user with no Docker socket access and a read-only root filesystem.
Why this matters for Swiss/EU public-sector defenders. n8n is a fast-growing automation substrate inside agencies that have replaced bespoke ETL with low-code orchestration. A single editor-role credential — typically a federated SSO account — yields RCE on the host that holds connection strings to every system the n8n instance integrates with: SharePoint, M365 Graph, Salesforce, internal databases, GitHub Actions tokens, OpenAI / Azure OpenAI keys. Expect downstream national-CERT advisories (ANSSI / BSI / NCSC-CH) to amplify the patch urgency in the coming days.
6. Action Items
(Derived from this brief's content only. Generic advice does not belong here.)
Patch self-hosted n8n now — apply the later train
1.123.43/2.20.7/2.22.1which covers all five CVSS 9.4 CVEs in the cluster. The earlier patch (1.123.32/2.17.4/2.18.1) addresses only-42231/-42232and leaves the follow-on cluster (-44789pagination prototype pollution,-44790Git-node arbitrary file read,-44791XML-node patch bypass) exposed. See § 2 entry and § 5 deep dive in this brief. Additional: enforce SSO+MFA on the editor role, restrict workflow create/modify to a small admin group, disable Git node if not required.Upgrade BigBlueButton to
≥ 3.0.21(CVE-2026-46351, CVE-2026-46353) and≥ 3.0.23(CVE-2026-46404) across cantonal Volksschule, university and Länder e-learning deployments. Auditbbb-weblogs for anomalous joins using predicted sessionTokens, API calls topresentationUploadExternalUrlwith unexpected URL parameters, and egress from the BBB server process to RFC1918 / 169.254/16 addresses.Audit every
pull_request_targetGitHub Actions workflow on agency / OSS-component repositories for write-scoped tokens reachable from external forked-PR code. Setpermissions: read-allat workflow level; separate privileged steps into a secondworkflow_run-gated workflow that runs only on merged code; requireCODEOWNERSapproval before CI on external PRs. Grafana Labs (§ 4 UPDATE in this brief) is the second high-profile Pwn-Request loss this week.Audit Checkmarx Jenkins AST plugin installations across CI/CD estate for any version installed during 2026-05-09 01:25 UTC → 2026-05-10 08:47 UTC; flag version
2026.5.09. Inventorycheckmarx/ast-github-actionandcheckmarx/kics-github-actionconsumers; remediated builds are2.0.13-848/2.0.13-847. CxSAST on-premise is unaffected; the trojanised surfaces are the Marketplace plugins and GitHub Actions. See § 4 TeamPCP/Shai-Hulud UPDATE in this brief.Scan internal npm caches and lockfiles for packages by
deadcode09284814(chalk-tempalte,@deadcode09284814/axios-util,axois-utils,color-style-utils); inspect.vscode/tasks.jsonand~/.claude/settings.jsonon developer endpoints for injected persistence hooks. Block egress from CI runners and developer workstations to*.lhr.lifeand other suspicious tunnel-provider domains used as commodity C2 channels.Audit Salesforce Connected App OAuth grants and Event Monitoring across public-sector Salesforce tenants — particularly third-party AI / RPA SaaS integrations. Alert on bulk
Report Exportevents and high-volume SOQL API calls; enforce IP-range / Trusted-IP session policies; consider Salesforce Shield field-level encryption for partner/supplier PII. The ShinyHunters Salesforce-targeting pattern hitting 7-Eleven, Instructure, Vimeo, Wynn Resorts, Vercel, Medtronic is identity-side, not Salesforce-product-side.Hunt for MiniPlasma / Chaotic Eclipse Windows LPE PoC use via Sysmon EID 13 (RegistryEvent / SetValue) on the
.DEFAULTuser hive from non-SYSTEMprocesses; pivot on registry keys under\Registry\User\Software\Policies\Microsoft\CloudFiles\BlockedApps*and\Registry\User\.DEFAULT\Volatile Environment*(ThreatLocker hunt guidance). No vendor patch yet; mitigations are limited.Inventory GKV / cantonal health-insurance and prescription-audit data-processor relationships as in-scope NIS2 / KRITIS critical suppliers; rehearse the 72-hour GDPR Art. 33 breach-notification clock starting from a third-party's detection event, not your own. ARWINI (§ 1 in this brief) follows the NMDL/IGJ Netherlands pattern from 2026-05-14.
7. Verification Notes
- Items dropped — CVE-2026-41702 (VMware Fusion 25H2 macOS, TOCTOU SETUID race condition, CVSS 7.8, Broadcom VMSA-2026-0003 dated 2026-05-14): dropped from § 2 — did not clear § 2 inclusion gates (no in-the-wild exploitation, not CISA KEV, not ENISA EUVD
exploited=true, CVSS < 9.0, local-only attack vector on developer-workstation product, not pre-auth-RCE-on-edge-software). - Single-source items — none in this run.
- Reduced-confidence items — ARWINI (S2) MULTI-SOURCE but no direct ARWINI press release retrieved; investigating-authority statement (Polizeidirektion Hannover) reported via Deutsches Ärzteblatt and Heise Security; ARWINI's own quote on Art. 9 data scope is via Borns IT Blog citing the ARWINI statement, not the statement page itself.
- Contradictions — chalk-tempalte attacker-key descriptor: OX Security (blog post) describes the embedded key as a "public key"; The Hacker News (article), reporting on the same OX research, describes it as a "private key". Brief reports the attacker-controlled-key fact without taking a side on the key-type modifier; defenders cross-checking the brief should expect both descriptors in coverage.
- Stalled sub-agents — none. All four Phase-1 sub-agents returned within wall-clock budget (S1 504s · S2 482s · S3 219s · S4 590s).
- Verification — five iterations ran with model rotation (Opus / Sonnet / Opus / Sonnet / Opus); each iteration's findings were applied as remediations before the next spawn. Iteration 5 (final, Opus) returned NEEDS_FIXES with two residual findings (truth=1, editorial=1): F1 (CVE-2026-42232 component attribution) — applied post-cap, the brief now describes it as "XML Node Prototype Pollution to RCE" matching the cited GHSA title; F2 (per-GHSA permalink specificity) — applied post-cap, CVE Summary Table rows now link to each specific GHSA permalink instead of the advisories listing index. Per v2.50 cap-breach policy the brief publishes after the cap regardless;
verification_residual_count = 2reflects the iteration-5 verdict, not the post-cap state of the brief. - Models reported — main agent Claude Opus 4.7 (
claude-opus-4-7); all four research sub-agents Claude Sonnet 4.6 (claude-sonnet-4-6). - Coverage gaps: bright-talk-dbir (403 on Verizon DBIR 2026 webinar URL); verizon-dbir-2026 (full PDF not yet available at run time — landing-page summary only); anssi-fr (no in-window advisories — newest 2026-05-13); bsi-de (only updates to already-covered advisories in window); cert-eu (RSS empty for in-window — newest item 2026-05-06); inside-it-ch (known 403, no bridge subcommand); heise-sec (TollBit-gated per-article URLs — used RSS summary + WebSearch corroboration); sophos-xops (rotation-priority empty — no in-window content); trendmicro-research (rotation-priority SPA shell with no RSS); databreaches-net (rotation-priority 403, Wayback empty); dark-reading (article 403 on Iran ATG fuel-tank campaign expansion — corroborated via WebSearch summaries but freshest CNN/Security-Magazine primary is dated outside the 36 h window so the item was dropped); sec-disclosures-edgar (no Item 1.05 8-K filings in window); ico-uk (no enforcement actions in window — newest action 2026-05-11 outside window).