Originally reported by The Hacker News, Microsoft Security, SANS ISC, MSRC Security Updates
TL;DR
CISA added FileZen CVE-2026-25108 to its KEV catalog following confirmed active exploitation of the command injection vulnerability. Separately, GitHub patched the RoguePilot flaw that allowed attackers to steal tokens via malicious Copilot instructions, while Microsoft identified a developer-targeting campaign using poisoned Next.js repositories.
CISA's addition of CVE-2026-25108 to the Known Exploited Vulnerabilities catalog indicates confirmed active exploitation in the wild, meeting the threshold for critical severity.
CISA added CVE-2026-25108 to its Known Exploited Vulnerabilities catalog, confirming active exploitation of a command injection vulnerability in FileZen. The flaw, scoring 8.7 on CVSS v4, allows authenticated users to execute operating system commands, presenting significant risk to organizations using the file transfer solution.
The inclusion in CISA's KEV catalog mandates federal agencies patch the vulnerability by the established deadline, signaling the severity of ongoing exploitation campaigns targeting this weakness.
Orcaecurity researchers disclosed RoguePilot, a vulnerability in GitHub Codespaces that enabled attackers to steal GITHUB_TOKEN credentials through malicious Copilot instructions embedded in GitHub issues. Microsoft has since patched the AI-driven attack vector following responsible disclosure.
The vulnerability demonstrated how threat actors could craft hidden instructions within repository issues to manipulate GitHub Copilot's behavior, potentially leading to unauthorized repository access and token exfiltration during development workflows.
Microsoft Security identified a sophisticated campaign targeting developers through malicious Next.js repositories. The attack chain leverages standard build workflows to establish covert remote code execution and command-and-control channels, demonstrating how routine development processes can be weaponized.
The campaign exemplifies the growing threat to developer environments, where trusted development tools and workflows become vectors for initial access and persistence.
Threat researchers observed UAC-0050, a Russia-aligned actor, targeting a European financial institution through social engineering and domain spoofing techniques. The campaign employed RMS malware and represents a potential expansion of the group's operations beyond Ukraine to entities supporting the nation.
This geographic expansion suggests evolving targeting strategies as threat actors adapt to geopolitical developments and seek new intelligence gathering opportunities.
A CYBER360 report revealed that over half of national security organizations continue relying on manual processes for sensitive data transfers. This operational security gap presents systemic risks to defense and government entities handling classified information.
The findings underscore the urgent need for automation in critical security processes, particularly as threat actors increasingly leverage advanced techniques against high-value targets.
Microsoft's Security Response Center published details for several new vulnerabilities:
CVE-2026-27199: Werkzeug safe_join() bypass affecting Windows special device namesCVE-2026-2739: bn.js infinite loop vulnerability in versions before 5.2.3CVE-2026-26960: node-tar arbitrary file read/write via hardlink manipulationCVE-2026-27211: Cloud Hypervisor host file exfiltration through QCOW backing file abuseCVE-2026-21620: TFTP path traversal vulnerabilityAdditional kernel-level fixes address WiFi driver and VDPA subsystem vulnerabilities, highlighting the breadth of security updates required across modern computing stacks.
SANS researchers highlighted the continued relevance of open redirect vulnerabilities, originally included in OWASP's 2010 Top 10 list. Despite being merged into broader categories in subsequent versions, these vulnerabilities remain prevalent and often underestimated in impact assessment.
Open redirects enable phishing campaigns and can bypass security controls, making them valuable components in multi-stage attacks against both users and applications.
Originally reported by The Hacker News, Microsoft Security, SANS ISC, MSRC Security Updates