Cyber Threat Brief — March 21 2026

⚠️ This report is AI-generated. Always validate findings.

Previous brief: Cyber Threat Brief — March 20 2026


1. Langflow Unauthenticated RCE — CVE-2026-33017

TL;DR: Critical (CVSS 9.3) unauthenticated RCE in Langflow AI pipeline platform via exec() on an unauthed endpoint — exploited in the wild within 20 hours of disclosure with no public PoC. Sysdig observed 6 attacker IPs conducting credential harvesting and data exfiltration through C2 at 173.212.205[.]251:8443.

What’s New:

  • Sysdig published detailed analysis on March 20 documenting three exploitation phases: mass scanning, active recon, and data exfiltration
  • 6 unique source IPs exploiting within 48 hours — attackers reverse-engineered exploits from advisory alone (no public PoC)
  • C2 server confirmed at 173.212.205[.]251:8443; callback validation via oastify.com, interact.sh, dnslog.cn
  • Exfil targets: /etc/passwd, .env files, database configs, cloud credentials
  • All versions through 1.8.1 affected

Actionable Intel

ArtifactTypeATT&CKLog SourceAction
POST /api/v1/build_public_tmp/{flow_id}/flow with data paramNetwork / ExploitT1190WAF, web server logsAlert on POST to this endpoint from external sources
C2 IP 173.212.205[.]251:8443IOC / NetworkT1071.001Firewall, proxy, NetFlowBlock and alert on outbound connections
DNS to oastify.com, interact.sh, dnslog.cnIOC / NetworkT1071.001DNS logs, proxyAlert on queries to these callback services from servers
Unexpected child processes from Langflow workersTTP / ExecutionT1059.006EDR process telemetryMonitor Langflow workers for anomalous process spawning
Bulk reads of .env, DB configs, cloud credsTTP / CollectionT1552.001File access monitoring, EDRAlert on config file access from Langflow process context

Detection

SourceRuleGap
Splunk ESCUWeb Shell Indicator, Suspicious Process Spawned by Web ServerNo Langflow-specific or AI/ML platform exploitation rules
ElasticWeb Shell Detection: Script Process Child of Common Web Processes, Suspicious Python Child ProcessNo Langflow-specific rules
SigmaWebshell Detection via Process Execution, Suspicious Python Script ExecutionNo AI/ML platform exploitation signatures

Sources: Sysdig · The Hacker News · SecurityWeek


2. Craft CMS Unauthenticated RCE — CVE-2025-32432

TL;DR: CISA added this CVSS 10.0 Craft CMS RCE to KEV on March 20, confirming active exploitation. Three-stage attack chain (session file poisoning → __class bypass → PHP execution) requires no authentication; multiple public PoCs exist and hundreds of servers were previously compromised.

What’s New:

  • Added to CISA KEV March 20 — confirms ongoing exploitation against unpatched instances
  • BOD 22-01 federal remediation deadline applies (typically 3 weeks from addition)
  • Three-stage exploit chain well-documented with multiple public PoCs
  • All versions from 3.0.0-RC1 through 5.6.16 affected; patched in April 2025

Actionable Intel

ArtifactTypeATT&CKLog SourceAction
POST to actions/assets/generate-transform with __class in bodyNetwork / ExploitT1190WAF, web server logsAlert on __class string in POST body to this endpoint
PHP payloads in storage/runtime/sessions/File / PersistenceT1505.003FIM, EDRMonitor session dir for anomalous PHP content
PHP execution from session storage pathsTTP / ExecutionT1059.004EDR process telemetryAlert on PHP spawning from session storage dirs
Anomalous outbound connections from CMS workersNetworkT1071.001Firewall, proxyBaseline and alert on post-exploitation C2

Detection

SourceRuleGap
Splunk ESCUW3WP Spawning Shell, Web Shell IndicatorNo Craft CMS-specific __class deserialization or session poisoning detection
ElasticWeb Shell Detection: Script Process Child of Common Web ProcessesPost-exploitation only; no exploit-phase detection
SigmaIIS/Apache Suspicious POST Request, Webshell Detection via File CreationNo Craft CMS-specific rules

Sources: CISA · Craft CMS · OPSWAT


3. Laravel Livewire Unauthenticated RCE — CVE-2025-54068

TL;DR: CISA added this CVSS 9.2 Livewire v3 RCE to KEV on March 20, confirming active exploitation. Attackers exploit a hydration bypass to inject GuzzleHttp\Psr7\FnStream objects that trigger RCE via __destruct — no authentication or APP_KEY required.

What’s New:

  • Added to CISA KEV March 20 — confirms active exploitation of unpatched instances
  • Public PoC available demonstrating hydration bypass and GuzzleHttp gadget chain
  • No authentication or APP_KEY knowledge required — bypasses APP_KEY requirement entirely
  • Only Livewire v3 affected (3.0.0-beta.1 through 3.6.3); patched in 3.6.4
  • BOD 22-01 federal remediation deadline applies

Actionable Intel

ArtifactTypeATT&CKLog SourceAction
Livewire update requests with GuzzleHttp\Psr7\FnStream refsNetwork / ExploitT1190WAF, web server logsAlert on serialized PHP object refs to GuzzleHttp/FnStream
Malformed synthetic tuples in Livewire update payloadsNetwork / ExploitT1190WAF, application logsInspect /livewire/update for anomalous property payloads
PHP __destruct chains from web contextTTP / ExecutionT1059.004EDR, app logsMonitor for unexpected process spawning from PHP-FPM/web workers
Oversized POST requests to /livewire/updateNetworkT1190WAF, web proxyBaseline normal payload sizes; alert on anomalies

Detection

SourceRuleGap
Splunk ESCUW3WP Spawning Shell, Linux PHP Process Spawning ShellNo Laravel/Livewire deserialization or PHP gadget chain rules
ElasticWeb Shell Detection, PHP Deserialization Attack DetectedModerate — has some PHP deserialization coverage
SigmaSuspicious PHP Child Process, Web Server Spawning Suspicious ProcessNo Laravel/Livewire-specific rules

Sources: CISA · Synacktiv · Security Online


CISA KEV Update — March 20, 2026

Five CVEs added. Two covered above (CVE-2025-32432, CVE-2025-54068). Remaining three are Apple client-side vulnerabilities (CVE-2025-31277, CVE-2025-43510, CVE-2025-43520) — buffer overflow and locking bugs. Action: Ensure Apple fleet patched to latest OS via MDM; detection is patch compliance monitoring.


Previously Covered — Status Updates

  • CVE-2026-20131 (Cisco FMC): Public PoC repo appeared on GitHub (p3Nt3st3r-sTAr/CVE-2026-20131-POC); assume increased exploitation risk for unpatched instances. March 19 brief.
  • PolyShell (Magento): No new developments. Exploit circulating; no production patch available. March 20 brief.