CVE-2026-40255 — All AdonisJS Applications That Use Response.Redirect().Back( Vulnerability

CVE-2026-40255 — All AdonisJS Applications That Use Response.Redirect().Back( Vulnerability

Image via images.unsplash.com

CVE-2026-40255 — AdonisJS HTTP Server is a package for handling HTTP requests in the AdonisJS framework. In @adonisjs/http-server versions prior to 7.8.1 and 8.0.0-next.0 through 8.1.3, and @adonisjs/core versions prior to 7.4.0, the response.redirect().back() method reads the Referer header from th

What This Means For You

  • If your environment is affected by CWE-601, review your exposure and prioritize patching based on your environment. Monitor vendor advisories for CVE-2026-40255 updates and patches.

Related ATT&CK Techniques

🛡️ Detection Rules

7 rules · 6 SIEM formats

7 auto-generated detection rules for this incident, mapped to MITRE ATT&CK. Available in Sigma, Splunk SPL, Sentinel KQL, Elastic Lucene, QRadar AQL, and Wazuh.

high T1190 Initial Access

Web Application Exploitation Attempt — CVE-2026-40255

Sigma YAML — free preview
✓ Sigma 🔒 Splunk SPL 🔒 Sentinel KQL 🔒 Elastic 🔒 QRadar AQL 🔒 Wazuh

Want this in your SIEM's native format? Get Splunk SPL, Sentinel KQL, Elastic, QRadar AQL, or Wazuh — ready to paste.

7 Sigma rules mapped to the ATT&CK techniques from this breach — pick your SIEM and get a ready-to-paste query.

Get All SIEM Formats →

Indicators of Compromise

IDTypeIndicator
CVE-2026-40255 vulnerability CVE-2026-40255
CWE-601 weakness CWE-601
Source & Attribution
Source PlatformNVD
ChannelNational Vulnerability Database
PublishedApril 17, 2026 at 02:16 UTC

This content was curated and summarized by Shimi's Cyber World for informational purposes. It is not copied or republished in full. All intellectual property rights remain with the original author and source.

Believe this infringes your rights? Submit a takedown request.

Related Posts

CVE-2026-40265 — Note Mark is an open-source note-taking application. In

CVE-2026-40265 — Note Mark is an open-source note-taking application. In versions 0.19.1 and prior, the asset download endpoint at /api/notes/{noteID}/assets/{assetID} is registered without authentication middleware,...

vulnerabilityCVEmedium-severitycwe-862
/SCW Vulnerability Desk /MEDIUM /⚑ 2 IOCs

Note Mark XSS: Magic Bytes Fail, Sessions Exposed

CVE-2026-40262 — Note Mark is an open-source note-taking application. In versions 0.19.1 and prior, the asset delivery handler serves uploaded files inline and relies on...

vulnerabilityCVEhigh-severitycwe-79cwe-434
/SCW Vulnerability Desk /HIGH /⚑ 4 IOCs

Cloud Foundry UAA Bypass: Unsigned SAML Exposes Identity Tokens

CVE-2026-22734 — Cloud Foundry UUA is vulnerable to a bypass that allows an attacker to obtain a token for any user and gain access to UAA-protected...

vulnerabilityCVEhigh-severitycwe-290
/SCW Vulnerability Desk /HIGH /⚑ 4 IOCs