CVE-2026-40685 — In Exim before 4.99.2, when JSON lookup is enabled, an
CVE-2026-40685 — In Exim before 4.99.2, when JSON lookup is enabled, an out-of-bounds heap write can occur when a JSON operator encounters malformed JSON in an untrusted header, because of an incorrect implementation of \ skipping.
What This Means For You
- If your environment is affected by CWE-684, review your exposure and prioritize patching based on your environment. Monitor vendor advisories for CVE-2026-40685 updates and patches.
Related ATT&CK Techniques
🛡️ Detection Rules
1 rule · 6 SIEM formats1 detection rule auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
Exim Out-of-Bounds Heap Write via Malformed JSON Header - CVE-2026-40685
Sigma YAML — free preview
title: Exim Out-of-Bounds Heap Write via Malformed JSON Header - CVE-2026-40685
id: scw-2026-04-30-ai-1
status: experimental
level: critical
description: |
Detects the specific condition for CVE-2026-40685 in Exim, where an out-of-bounds heap write can occur due to malformed JSON in an untrusted header when JSON lookup is enabled. This is triggered by an incorrect implementation of '\' skipping, leading to potential remote code execution.
author: SCW Feed Engine (AI-generated)
date: 2026-04-30
references:
- https://shimiscyberworld.com/posts/nvd-CVE-2026-40685/
tags:
- attack.initial_access
- attack.t1190
logsource:
category: email
detection:
selection:
Image|contains:
- 'exim'
cs-uri-query|contains:
- '\\'
condition: Image AND cs-uri-query
falsepositives:
- Legitimate administrative activity
Source: Shimi's Cyber World · License & reuse
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-40685 | vulnerability | CVE-2026-40685 |
| CWE-684 | weakness | CWE-684 |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | May 01, 2026 at 01:16 UTC |
This content was curated and summarized by Shimi's Cyber World for informational purposes. It is not copied or republished in full. All intellectual property rights remain with the original author and source.
Believe this infringes your rights? Submit a takedown request.