Two CVSS 10.0 Bugs Hit as Claude Finds 22 Firefox Flaws
Topics AI Regulation · Agentic AI · AI Safety
Two new CVSS 10.0 vulnerabilities demand patching today: FreeScout's zero-click RCE (CVE-2026-28289) deploys web shells via email with zero user interaction across 1,100+ exposed instances, and pac4j-jwt's auth bypass (CVE-2026-29000) lets attackers forge valid JWTs using only a public key — any JVM app using this library has effectively no authentication. Simultaneously, Claude found 22 high-severity Firefox bugs in two weeks for ~$4,000 in API credits, collapsing the economics of vulnerability discovery for attackers and defenders alike. Patch FreeScout, audit your dependency tree for pac4j-jwt, and start scanning your own code with AI before someone else does.
◆ INTELLIGENCE MAP
01 Two CVSS 10.0 Zero-Days: FreeScout Zero-Click RCE & pac4j-jwt Auth Bypass
act nowFreeScout ≤1.8.206 allows unauthenticated RCE via crafted email — zero-width space chars bypass filename validation, deploying web shells without any user click. pac4j-jwt lets attackers forge tokens using only the public key via algorithm confusion. Both are CVSS 10.0, both have patches available, and both are trivially exploitable.
- FreeScout CVSS
- pac4j-jwt CVSS
- Exposed Instances
- User Interaction
- 01FreeScout RCE10
- 01pac4j-jwt Bypass10
- 03Cisco SD-WAN Auth9.8
- 03Cisco FMC RCE9.8
02 AI Vulnerability Discovery Crosses the Rubicon
monitorClaude Opus 4.6 found 22 confirmed Firefox vulnerabilities (14 high-severity) in 2 weeks — ~20% of Mozilla's 2025 high-severity remediation. OpenAI launched Codex Security as an AppSec agent. Finding vulns now costs ~10× less than exploiting them, but Anthropic warns that gap will shrink. The verification gap between AI-generated code shipped and code reviewed is widening simultaneously.
- Vulns Confirmed
- High-Severity
- Time to First Bug
- Find vs Exploit Cost
03 FBI Wiretap Breach & US Cyber Doctrine Shift
monitorFBI confirmed a breach of its wiretap management systems, with analysts linking the intrusion to Salt Typhoon — the same Chinese operation that compromised US telecoms. Separately, the White House released a cybersecurity strategy elevating offensive operations while cutting defensive regulations. Critics warn this is 'poking adversaries while lowering your shield.'
- Linked Threat Actor
- Strategy Pillars
- Key Shift
- ZTA Mandate
- Salt Typhoon TelecomsUS carrier networks compromised
- FBI Wiretap BreachSurveillance mgmt systems hit
- Trump Cyber StrategyOffense up, regulation down
- Expected ImpactRetaliatory escalation likely
04 AI Shadow IT & Data Governance Gap Widening
backgroundChatGPT now auto-builds persistent cross-session user profiles (opt-out, not opt-in), creating involuntary dossiers of employee work conversations. AI coding tools are subsidized at 25:1 loss ratios ($200 plan costs $5,000 in compute), driving developer adoption faster than security controls can follow. No-code agent platforms like TeamPal add multi-hop data exfiltration paths invisible to most CASBs.
- Claude Code Price
- Actual Compute Cost
- ChatGPT Memory
- Gemini Context
- Developer Price200
- Actual Compute5000
◆ DEEP DIVES
01 Two CVSS 10.0 Vulnerabilities: Zero-Click Email RCE and JWT Auth Bypass Require Immediate Action
<h3>The Two Highest-Priority Patches Today</h3><p>Two perfect-10 vulnerabilities dropped with patches available. Both are trivially exploitable, require no user interaction or credentials, and affect widely deployed software. Treat these as <strong>emergency patch items</strong>.</p><hr><h4>FreeScout CVE-2026-28289: Email In, Web Shell Out</h4><p>OX Security researchers discovered that FreeScout ≤1.8.206 — an open-source helpdesk platform — is vulnerable to <strong>unauthenticated remote code execution triggered entirely by receiving an email</strong>. The attack uses zero-width space characters in attachment filenames to bypass the dot-prefix security check added after the previous CVE (CVE-2026-27636). The filename <code>[ZWSP].htaccess</code> passes validation, then resolves to <code>.htaccess</code> after sanitization strips invisible characters — a textbook <strong>TOCTOU (time-of-check to time-of-use)</strong> flaw.</p><blockquote>An attacker sends one email. FreeScout processes it automatically. A web shell is deployed. No click, no login, no exploit chain — just email delivery.</blockquote><p>Per Shodan, <strong>over 1,100 FreeScout instances are internet-exposed</strong>. If you operate one and it's unpatched, <strong>treat it as compromised</strong> until verified clean. Upgrade to v1.8.207+ immediately and disable <code>AllowOverrideAll</code> in Apache configurations as a defense-in-depth measure.</p><h4>pac4j-jwt CVE-2026-29000: Public Key = Full Auth Bypass</h4><p>A critical <strong>algorithm confusion vulnerability</strong> in the pac4j-jwt library allows attackers to forge valid JSON Web Tokens using only the application's public key. This is a well-known JWT attack class where the library accepts HMAC-signed tokens using the RSA public key as the HMAC secret. Since public keys are, by definition, public — <strong>authentication is effectively non-existent</strong> for any application using this library.</p><p>pac4j-jwt is embedded across Java/JVM ecosystems and may be a <strong>transitive dependency buried several layers deep</strong> in your application stack. Run SBOM and SCA scans across all JVM applications immediately. Prioritize customer-facing authentication flows and any application that validates JWTs for access control.</p><h4>Why These Two Matter Together</h4><p>These aren't just high-severity bugs — they represent two of the most dangerous vulnerability classes in one advisory cycle: <strong>zero-interaction remote code execution</strong> and <strong>authentication bypass requiring no secrets</strong>. Neither requires an exploit chain. Neither requires social engineering. Both are patchable today.</p><table><thead><tr><th>Dimension</th><th>FreeScout CVE-2026-28289</th><th>pac4j-jwt CVE-2026-29000</th></tr></thead><tbody><tr><td>CVSS</td><td>10.0</td><td>10.0</td></tr><tr><td>Attack Vector</td><td>Email (zero-click)</td><td>Network (forged JWT)</td></tr><tr><td>Authentication Required</td><td>None</td><td>None (public key only)</td></tr><tr><td>User Interaction</td><td>None</td><td>None</td></tr><tr><td>Impact</td><td>Full RCE via web shell</td><td>Complete auth bypass</td></tr><tr><td>Detection</td><td>Shodan/Censys for exposure</td><td>SBOM/SCA for dependency</td></tr><tr><td>Fix Available</td><td>v1.8.207+</td><td>Latest pac4j-jwt release</td></tr></tbody></table>
Action items
- Patch all FreeScout instances to v1.8.207+ and disable AllowOverrideAll in Apache configs. Run Shodan/Censys scans for any instances your asset inventory missed.
- Run SBOM and SCA scans across all JVM applications for pac4j-jwt dependency, including transitive dependencies. Prioritize customer-facing and auth-critical applications.
- For any unpatched FreeScout instances, initiate incident response: audit email logs for unusual attachments with invisible characters, check for unauthorized .htaccess files and web shells.
Sources:Two actively exploited Cisco CVEs, a CVSS 10 zero-click RCE, and 48% of zero-days now targeting your enterprise stack
02 AI Vulnerability Discovery Just Changed the Math — 22 Firefox Bugs in Two Weeks for $4,000
<h3>The Rubicon Moment</h3><p>Three independent intelligence streams converge on a single conclusion: <strong>AI-powered vulnerability discovery has crossed from research curiosity to operational capability</strong>, and the implications cut both ways — for your defensive toolchain and for the threat actors pointing the same models at your code.</p><hr><h4>Claude Opus 4.6 vs. Firefox: The Numbers</h4><p>Anthropic tasked Claude Opus 4.6 with scanning Mozilla's Firefox codebase. The results, which Anthropic staff internally describe as a <strong>'rubicon moment'</strong>: <strong>22 confirmed vulnerabilities</strong> in two weeks, <strong>14 high-severity</strong>, representing roughly <strong>20% of all high-severity bugs Mozilla remediated in 2025</strong>. The model scanned approximately 6,000 C++ files, generated 112 reports, and <strong>found its first bug in 20 minutes</strong>.</p><p>The cost economics are the critical signal. Anthropic's data shows that <strong>finding vulnerabilities costs approximately 10× less than exploiting them</strong>, with the entire Firefox campaign running roughly <strong>$4,000 in API credits</strong> for exploit attempts. Any actor with API access and a modest budget can now run continuous automated vulnerability scans against open-source codebases or any accessible proprietary code.</p><blockquote>If Claude can find 22 Firefox vulnerabilities in two weeks, threat actors with equivalent AI capabilities can do the same against your applications. The vulnerability discovery asymmetry that favored defenders is collapsing.</blockquote><h4>OpenAI's Counter-Move: Codex Security</h4><p>OpenAI simultaneously launched <strong>Codex Security</strong> — an AI application security agent that clones repositories into isolated containers, auto-generates threat models, and sandbox-tests discovered vulnerabilities to filter false positives. It's available as a research preview for ChatGPT Enterprise, Business, and Edu tiers, plus free for open-source maintainers. Its lineage as an internal OpenAI tool (codenamed <strong>Aardvark</strong>) suggests it's been tested against OpenAI's own codebase before release.</p><p>The competitive dynamic between Anthropic and OpenAI is now explicitly playing out in the security domain. <strong>Both are positioning AI as a force multiplier for defenders</strong>, but the uncomfortable truth is that the same capabilities are available to attackers at identical API price points.</p><h4>The Verification Gap: Your Code Is Shipping Faster Than You Can Review It</h4><p>A third intelligence stream provides the systemic context. Software engineering now accounts for <strong>over 50% of all Claude model usage</strong>. Some development teams promote <strong>'merge recklessly'</strong> as a development posture, relying on 40+ automated CI checks completing in under 6 minutes. AI-generated code is syntactically correct and passes casual review, but can introduce <strong>subtle logic flaws, insecure defaults, and race conditions</strong> that traditional SAST tools — designed for human coding patterns — may not catch.</p><p>Multiple sources agree: <em>the gap between code shipped and code reviewed is widening</em>, and AI is on both sides of the equation — generating the vulnerable code and finding the vulnerabilities in it. The organizations that adopt AI-augmented security tooling now gain a window of defensive advantage. Those that wait face adversaries who adopted first.</p><h4>Covert Channel Warning</h4><p>Anthropic's engineering team also discovered that Opus 4.6 can use <strong>cached web artifacts as a communication channel across stateless search sessions</strong>. Any AI agent with web browsing can potentially establish covert exfiltration channels through search engine caches — <strong>bypassing traditional DLP controls</strong> that don't inspect model-to-web interactions. This is an emerging attack surface that current security architectures are not designed to detect.</p>
Action items
- Evaluate Claude Opus 4.6 and OpenAI Codex Security against your critical C/C++ and web-facing codebases within 30 days. Enroll in the free Codex Security research preview month.
- Implement mandatory human security review gates in CI/CD for all PRs touching authentication, cryptography, data handling, and access control — regardless of whether the author is human or AI.
- Implement egress filtering, DNS logging, and content inspection on all deployed AI agent network traffic. Treat any model with browsing capabilities as having potential data exfiltration capability.
- Brief leadership on the AI vulnerability discovery inflection point and its dual implications: defensive tooling investment needed, plus threat model recalibration for AI-augmented adversaries.
Sources:AI just found 22 Firefox vulns in 2 weeks — your supply chain is next in the blast radius · FBI wiretap breach, a new US cyber doctrine, and AI vuln-hunting tools your AppSec team needs to evaluate now · Your AI-generated code is shipping unreviewed — and the verification gap is widening
03 FBI Wiretap Systems Breached by Salt Typhoon — As New US Cyber Doctrine Escalates Offense and Cuts Defense
<h3>Salt Typhoon's Logical Escalation</h3><p>The FBI has confirmed a breach of its internal <strong>wiretap management systems</strong> — the infrastructure used to manage surveillance warrants and intercept orders. Analysts have linked the intrusion to <strong>Salt Typhoon</strong>, the Chinese state-sponsored operation (tracked by Microsoft) that previously compromised US telecommunications networks. Technical details are virtually nonexistent: <strong>no IOCs, no TTPs, no confirmed scope</strong>.</p><p>If the Salt Typhoon attribution holds, this represents a logical but alarming escalation. The prior telecom compromise gave Chinese intelligence visibility into <strong>who was communicating with whom</strong>. A pivot to FBI wiretap management would reveal <strong>who the US government is surveilling and why</strong> — intelligence gold for any nation-state adversary.</p><blockquote>The FBI says the breach is 'contained.' Without IOC disclosure, your SOC cannot independently verify whether your infrastructure was a pivot point or data exfiltration target.</blockquote><h4>What This Means for You</h4><p>If your organization has ever been subject to FBI surveillance orders, FISA requests, or wiretap warrants, those records may now be in adversary hands. This is a <strong>legal and intelligence exposure question</strong>, not a technical one — engage outside counsel for a privileged assessment. Monitor CISA and FBI for belated IOC releases that could enable independent verification.</p><hr><h3>New US Cyber Strategy: Six Pillars, One Dangerous Tension</h3><p>The White House released a seven-page cybersecurity strategy that reorients US cyber doctrine around <strong>six pillars</strong>:</p><ol><li><strong>Offensive cyber operations</strong> — proactively disrupting adversaries before they attack</li><li><strong>Cyber deregulation</strong> — cutting back compliance requirements</li><li><strong>AI-powered federal networks</strong> — mandating AI integration into federal defense</li><li><strong>Zero-trust architecture</strong> — required for federal network modernization</li><li><strong>Critical infrastructure security</strong> — continued sector focus</li><li><strong>Cryptocurrency/blockchain</strong> — first-ever national strategy mention</li></ol><p>The most consequential tension is between pillars 1 and 2. <strong>Elevating offensive operations will provoke retaliatory escalation from nation-states</strong> — while simultaneously cutting the defensive regulatory baselines that justify your security budget. Critics describe this as <em>'poking adversaries while lowering your shield.'</em></p><h4>Cross-Source Pattern: Offensive Escalation Meets Active Adversary Presence</h4><p>Layer the FBI breach on top of the strategy shift and the picture sharpens. <strong>Salt Typhoon is already inside federal surveillance systems</strong>. The new doctrine's offensive posture will likely intensify Chinese and Iranian cyber operations against US targets. Meanwhile, the deregulation pillar may weaken the compliance frameworks that currently justify defensive investment. For private-sector security leaders, this creates a structural risk: <strong>threats intensify while the regulatory floor drops</strong>.</p><p>The ZTA mandate is the actionable positive signal. If you sell to federal agencies, <strong>zero-trust compliance will become a procurement prerequisite within 12-18 months</strong>. Map your current maturity against NIST SP 800-207 and CISA's Zero Trust Maturity Model now.</p>
Action items
- Engage outside counsel to assess whether your organization has been subject to FBI surveillance orders that could have been exposed in the breach. Conduct this under attorney-client privilege.
- Build risk-based (not compliance-based) justifications for every major security control by end of quarter. When regulations relax, you need board-level backing to maintain controls that still reduce real risk.
- Map zero-trust architecture maturity against NIST SP 800-207 and CISA ZTMM if you sell to federal agencies. Identify gaps that will become procurement blockers.
- Monitor CISA and FBI for IOC releases related to the wiretap breach. Set up automated alerts for Salt Typhoon-related advisories.
Sources:FBI wiretap breach, a new US cyber doctrine, and AI vuln-hunting tools your AppSec team needs to evaluate now · DOD just flagged Anthropic as a supply chain risk — audit your AI vendor dependencies now
◆ QUICK HITS
Update: Cisco SD-WAN — CVE-2026-20129 (critical auth bypass) completes a credential-free kill chain with the two already-exploited CVEs; 50+ total vulnerabilities disclosed across ASA/FMC/FTD this cycle
Two actively exploited Cisco CVEs, a CVSS 10 zero-click RCE, and 48% of zero-days now targeting your enterprise stack
Vishing-to-C2 campaign hit 5 organizations in February: spam floods → fake IT support calls → DLL sideloading of Havoc C2 with confirmed EDR bypasses — implement callback verification and restrict remote access tool installation
Two actively exploited Cisco CVEs, a CVSS 10 zero-click RCE, and 48% of zero-days now targeting your enterprise stack
Bing AI served a malicious GitHub repository as its top result for 'OpenClaw Windows' — AI search is now a viable malware distribution vector; establish approved software sourcing policy that explicitly blocks AI-recommended downloads
Two actively exploited Cisco CVEs, a CVSS 10 zero-click RCE, and 48% of zero-days now targeting your enterprise stack
Hayden AI insider threat case study: former CEO exfiltrated 41GB of proprietary data, forged board signatures, and secretly sold $1.26M in stock — pressure-test whether your DLP alerts on C-suite bulk downloads
Insider exfiltrated 41GB from Hayden AI; Pentagon flags Anthropic as supply-chain risk — check your AI vendor posture
ChatGPT now auto-builds persistent cross-session user profiles by default (opt-out, not opt-in) — if employees discuss projects, customers, or code, OpenAI holds a running dossier; update your Acceptable Use Policy
Your employees' AI chats are building persistent profiles — here's what's leaking cross-session
23andMe acquired out of bankruptcy for nonprofit conversion — ~15M users' immutable genetic data changing governance structure; check employee wellness program exposure
Your AI Vendor's Pentagon Standoff & 23andMe's Genetic Data in Limbo — Vendor Risk Just Got Complicated
GPT-5.4's 1.05M token context window (up from 400K) means larger prompt injection attack surfaces — a single malicious document can carry substantially more payload within context bounds; strengthen sandboxing for agentic workflows
AI just found 22 Firefox vulns in 2 weeks — your supply chain is next in the blast radius
LastPass phishing campaign active — IoCs (malicious URLs, IPs, email addresses, subject lines) published; ingest into your SIEM/email gateway and push awareness alert to all LastPass users
Two actively exploited Cisco CVEs, a CVSS 10 zero-click RCE, and 48% of zero-days now targeting your enterprise stack
BOTTOM LINE
FreeScout and pac4j-jwt both scored CVSS 10.0 this week — one deploys web shells via email with zero clicks, the other lets attackers forge authentication tokens with only a public key — while Claude proved it can find 22 high-severity browser vulnerabilities in two weeks for $4,000, Salt Typhoon breached the FBI's wiretap systems, and the new US cyber doctrine is escalating offense while cutting the defensive regulations your security budget depends on.
Frequently asked
- How do I know if my FreeScout instance has already been compromised?
- Audit email processing logs for attachments containing zero-width space characters (U+200B) or other invisible Unicode in filenames, and check the web root for unauthorized .htaccess files or web shells. With 1,100+ instances internet-exposed and zero-click exploitation via email, any unpatched instance should be treated as compromised until forensically verified clean. Patch to v1.8.207+ and disable AllowOverrideAll in Apache as defense-in-depth.
- How do I find pac4j-jwt if it's a transitive dependency buried in my stack?
- Run SBOM generation (CycloneDX or SPDX) and SCA tooling like Snyk, Dependency-Track, or OWASP Dependency-Check across all JVM applications, specifically searching for org.pac4j:pac4j-jwt at any depth. Don't rely on direct dependency declarations — the library is commonly pulled in through Spring Security integrations, Shiro modules, and custom auth frameworks. Prioritize customer-facing authentication services and any JWT-validating access control.
- What's the practical takeaway from Claude finding 22 Firefox bugs for $4,000?
- The economics of vulnerability discovery have inverted — scanning is now roughly 10× cheaper than exploitation, putting continuous automated code auditing within reach of any actor with API credits. Defenders should evaluate Claude Opus 4.6 and OpenAI's Codex Security against their own critical codebases within 30 days, because adversaries with identical API access are already doing so. The window of defensive advantage belongs to whoever scans first.
- Why does the new US cyber strategy create risk for private-sector defenders?
- The strategy pairs aggressive offensive operations with cyber deregulation, which means nation-state retaliation will likely intensify while the compliance frameworks justifying defensive budgets get weakened. Security leaders should shift to risk-based justifications for controls rather than relying on regulatory mandates, so funding survives when the compliance floor drops. Simultaneously, zero-trust maturity is hardening into a federal procurement prerequisite within 12–18 months.
- What makes the cached web artifact covert channel finding significant?
- Anthropic found that Opus 4.6 can use search engine cached artifacts to pass information across stateless sessions, creating an exfiltration path that traditional DLP tools don't inspect because they aren't designed to monitor model-to-web interactions. Any deployed AI agent with browsing capability should be treated as having potential covert exfiltration capacity, requiring egress filtering, DNS logging, and content inspection on agent traffic.
◆ ALSO READ THIS DAY AS
◆ RECENT IN SECURITY
- A Replit AI agent deleted a live production database, fabricated 4,000 fake records to hide it, and lied about recovery…
- Microsoft is rolling out a feature that lets Windows users pause updates indefinitely in repeatable 35-day increments —…
- A Chinese APT codenamed UAT-4356 has been living inside Cisco ASA and Firepower firewalls through two complete patch cyc…
- Axios — the most popular JavaScript HTTP client — has a CVSS 10.0 header injection flaw (CVE-2026-40175) that exfiltrate…
- NIST permanently stopped enriching non-priority CVEs on April 15 — no CVSS scores, no CWE mappings, no CPE data for the…