Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Hackers Exploit Qinglong RCE Vulnerabilities

Hackers Exploit Qinglong RCE Vulnerabilities

Posted on April 30, 2026 By CWS

In early 2026, the Qinglong task scheduler, a prominent open-source tool, became the target of hackers due to two critical authentication bypass vulnerabilities. These flaws allowed attackers to gain unauthorized access, leading to remote code execution and the installation of a cryptominer known as .fullgc.

Understanding the Qinglong Task Scheduler

Qinglong is widely used as a self-hosted task scheduling dashboard, supporting various scripting languages like Python 3 and JavaScript. It has garnered significant attention, particularly among developers in China, amassing over 19,000 stars on GitHub. Typically, users deploy Qinglong on cloud virtual private servers and home networks using Docker containers, making it a popular choice for automated task management.

However, vulnerabilities in the platform’s authentication system have been exploited, leading to unauthorized modifications and the deployment of malicious software.

Details of the Cryptomining Campaign

By February 7, 2026, server administrators noticed unusual activities, including CPU spikes reaching full capacity. Attackers exploited unpatched vulnerabilities to modify configuration scripts in Qinglong, downloading the .fullgc cryptominer disguised as a Java garbage collection process. This tactic delayed detection while the malware drained system resources.

The vulnerabilities resided in Qinglong versions 2.20.1 and earlier. Snyk researchers identified that these flaws resulted from discrepancies between security middleware assumptions and the Express.js framework’s routing behavior. Notably, CVE-2026-3965 and CVE-2026-4047 were the key vulnerabilities that attackers leveraged to bypass security protocols.

Response and Mitigation Efforts

The issue primarily went unnoticed within the English-speaking security community until it caused significant disruptions among developers. Between February 7 and March 1, 2026, the community reported multiple incidents of the .fullgc cryptominer causing severe server issues. On February 10, a public warning was issued, and by February 27, researchers disclosed the authentication bypass vulnerabilities as the root cause.

To combat this threat, GitHub contributors initially attempted to filter malicious inputs. However, these efforts were insufficient against the fundamental access control flaws. Eventually, the maintainers addressed the vulnerabilities by correcting the middleware’s authentication logic, urging users to update their systems promptly.

To protect their systems, operators are advised to update Docker containers, audit for hidden .fullgc files, and secure their self-hosted panels with VPNs. Staying informed through trusted cybersecurity channels is also recommended to prevent future incidents.

Cyber Security News Tags:authentication bypass, Cryptomining, Cybersecurity, Docker, Express.js, GitHub, Hacking, Qinglong, RCE, Snyk, Vulnerabilities

Post navigation

Previous Post: Linux Kernel Vulnerability Exposes Systems to Attacks
Next Post: Critical cPanel Vulnerability Exploited for Months

Related Posts

TAC Security Surpasses 10,000 Clients Milestone TAC Security Surpasses 10,000 Clients Milestone Cyber Security News
Cisco IOS and IOS XE Software Vulnerabilities Let Attackers Execute Remote Code Cisco IOS and IOS XE Software Vulnerabilities Let Attackers Execute Remote Code Cyber Security News
Beware of the New ‘Executive Award’ Campaign That Uses ClickFix to Deliver Stealerium Malware Beware of the New ‘Executive Award’ Campaign That Uses ClickFix to Deliver Stealerium Malware Cyber Security News
Jetflicks Illegal Paid Streaming Service Operators Jailed for 7 Years Jetflicks Illegal Paid Streaming Service Operators Jailed for 7 Years Cyber Security News
New Microsoft 365 Admin Feature Let Admins Control Link Creation Policies New Microsoft 365 Admin Feature Let Admins Control Link Creation Policies Cyber Security News
Russian Calisto Hackers Target NATO Research Sectors with ClickFix Malicious Code Russian Calisto Hackers Target NATO Research Sectors with ClickFix Malicious Code Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • EnOcean SmartServer Security Flaws Threaten Remote Hacks
  • KarstoRAT Malware Threatens with Extensive Control Abilities
  • Critical cPanel Vulnerability Exploited for Months
  • Hackers Exploit Qinglong RCE Vulnerabilities
  • Linux Kernel Vulnerability Exposes Systems to Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • EnOcean SmartServer Security Flaws Threaten Remote Hacks
  • KarstoRAT Malware Threatens with Extensive Control Abilities
  • Critical cPanel Vulnerability Exploited for Months
  • Hackers Exploit Qinglong RCE Vulnerabilities
  • Linux Kernel Vulnerability Exposes Systems to Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark