Cyber Threat Brief — May 7 2026

⚠️ This report is AI-generated. Always validate findings.

1. Apache HTTP/2 Double-Free RCE — CVE-2026-23918

TL;DR: Double-free in Apache httpd 2.4.66 mod_http2 allows unauthenticated DoS (trivial) and RCE (public PoC) via two HTTP/2 frames on a single TCP connection. Upgrade to 2.4.67 or disable HTTP/2.

What’s New:

  • CVSS 8.8 — unauthenticated, no special headers/URLs required; one TCP connection + HEADERS + RST_STREAM triggers the bug
  • Double-free in h2_mplx.c stream cleanup: both on_frame_recv_cb and on_stream_close_cb push the same h2_stream pointer to spurge, causing use-after-free on apr_pool_destroy
  • RCE PoC chains fake h2_stream struct via mmap reuse, points pool cleanup to system(); Apache scoreboard at fixed address bypasses ASLR
  • Multiple public PoC repos on GitHub (rhasan-com, 12lie20); DoS is trivial, RCE demonstrated on x86_64
  • Fix shipped in Apache 2.4.67 (May 4, 2026); only version 2.4.66 affected

Actionable Intel

ArtifactTypeATT&CKLog SourceAction
HTTP/2 HEADERS immediately followed by RST_STREAM (non-zero error) on same streamExploit triggerT1190Web server access/error logs, WAFAlert on rapid HEADERS→RST_STREAM sequences per connection
Repeated httpd child process crashes + restartsDoS / pre-RCET1499.004Apache error_log, dmesg, process monitoringAlert on abnormal worker crash rate
Apache httpd version 2.4.66 with mod_http2 enabledAttack surfaceT1190Asset inventory, ShodanIdentify and prioritize patching; disable Protocols h2 as interim
Unexpected outbound connections from httpd processPost-exploitationT1059Netflow, EDR process telemetryHunt for httpd spawning shells or making outbound connections

Detection

SourceRuleGap
Splunk ESCUNoneNo mod_http2 crash or H2 RST_STREAM anomaly detection; need custom rule on Apache error_log crash patterns
ElasticNoneNo coverage; custom rule on process crash frequency + httpd child spawning unexpected processes
SigmaNoneNo rule for HTTP/2 stream reset abuse or Apache worker crash anomalies

Sources: The Hacker News · Hadrian · oss-security · Security Affairs


2. MetInfo CMS Unauthenticated PHP Code Injection — CVE-2026-29014

TL;DR: CVSS 9.8 unauth PHP code injection in MetInfo CMS 7.9–8.1 via WeChat API handler writes attacker-controlled PHP to a cache file and executes it. Actively exploited with APAC-focused surge since May 1.

What’s New:

  • Vulnerable endpoint: GET/POST /app/system/entrance.php?n=include&m=module&c=weixin&a=doapi — attacker input written to PHP cache file then auto-included
  • Root cause in weixinreply.class.php: no sanitization of WeChat API request data before writing to cache/weixin/Array.php
  • Prerequisite: /cache/weixin/ directory must exist (created when WeChat plugin is configured)
  • Exploitation active since April 25 (US/Singapore honeypots); major surge May 1 targeting China/Hong Kong IPs
  • Webshell payloads use custom HTTP header C for command execution: eval($_SERVER[HTTP_C])

Actionable Intel

ArtifactTypeATT&CKLog SourceAction
GET/POST to /app/system/entrance.php with params c=weixin&a=doapiExploit attemptT1190Web server access logs, WAFBlock/alert on requests to weixin doapi endpoint from external IPs
File creation: cache/weixin/Array.phpWebshell dropT1505.003FIM, EDR file creation eventsAlert on any PHP file creation in cache/weixin/ directory
HTTP requests with custom header C containing PHP codeWebshell C2T1059.004WAF, web server logs (log custom headers)Hunt for unusual HTTP headers; block requests with C: header containing eval/passthru
eval($_SERVER[HTTP_C]), passthru(, file_put_contents( in PHP filesWebshell indicatorsT1505.003FIM, grep/YARA on webrootScan cache directories for embedded PHP execution patterns

Detection

SourceRuleGap
Splunk ESCUWeb Shell Detection (generic)No MetInfo-specific rule; generic webshell rules may catch eval() in cache dirs
ElasticWebshell Activity (generic)No coverage for MetInfo cache path; custom rule needed for cache/weixin/ file creation
SigmaWebshell Creation by PHP Process (generic)No MetInfo-specific rule; adapt existing web shell creation rules to monitor cache/weixin/

Sources: The Hacker News · websec.net · Full Disclosure


Status Updates

  • CVE-2026-0300 (PAN-OS Captive Portal): CISA added to KEV on May 6 with May 9 federal deadline; still no patch (ETA May 13). Restrict User-ID Auth Portal to trusted IPs immediately. Original brief.