Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»Hackers exploit RCE flaws in Qinglong task scheduler for cryptomining
    Cybersecurity

    Hackers exploit RCE flaws in Qinglong task scheduler for cryptomining

    adminBy adminApril 30, 2026No Comments3 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    Hackers exploit RCE flaws in Qinglong task scheduler for cryptomining
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Hackers exploit RCE flaws in Qinglong task scheduler for cryptomining

    Hackers are exploiting two authentication bypass vulnerabilities in the Qinglong open-source task scheduling tool to deploy cryptominers on developers’ servers.

    Exploitation started in early February, before the security issues were disclosed publicly at the end of the month, according to researchers at cloud-native application security company Snyk.

    Qinglong is a self-hosted open-source time management platform popular among Chinese developers. It has been forked more than 3,200 times and has over 19,000 stars on GitHub.

    image

    The two security problems impact Qinglong versions 2.20.1 and older and can be chained to achieve remote code execution:

    • CVE-2026-3965: A misconfigured rewrite rule maps ‘/open/*’ requests to ‘/api/*’, unintentionally exposing protected admin endpoints through an unauthenticated path
    • CVE-2026-4047: The authentication check treats paths as case-sensitive (/api/), while the router matches them case-insensitively, allowing requests like ‘/aPi/…’ to bypass authentication and reach protected endpoints.

    The root cause in both flaws is a mismatch between middleware authorization logic and Express.js routing behavior.

    “Both vulnerabilities stem from a mismatch between the security middleware’s assumptions and the framework’s behavior,” Snyk researchers explain.

    “The auth layer assumed certain URL patterns would always be handled one way, while Express.js treated them differently.”

    Snyk reports that attackers have been targeting these two flaws on publicly exposed Qinglong panels to deploy cryptominers since February 7.

    This activity was first spotted by Qinglong users, who reported about a rogue hidden process named ‘.fullgc’ utilizing between 85% and 100% of their CPU power.

    The name deliberately mimics “Full GC,” an innocuous but resource-intensive process, to evade detection.

    According to Snyk, the attackers exploited the flaws to modify Qinglong’s config.sh and injected shell commands that downloaded a miner to ‘/ql/data/db/.fullgc,’ and executed it in the background.

    The remote resource located at ‘file.551911.xyz’ hosted multiple variants of the binary, including for Linux x86_64, ARM64, and macOS.

    The attacks continued with multiple confirmed infections across various setups, including behind Nginx and SSL, while the Qinglong maintainers only responded to the situation on March 1.

    The maintainer acknowledged the vulnerability and urged users to install the latest update. However, the mitigation in pull release #2924 focused on blocking command injection patterns, which Snyk says was insufficient.

    The researchers report that the effective fix came in PR #2941, which corrected the authentication bypass in the middleware.


    article image

    AI chained four zero-days into one exploit that bypassed both renderer and OS sandboxes. A wave of new exploits is coming.

    At the Autonomous Validation Summit (May 12 & 14), see how autonomous, context-rich validation finds what’s exploitable, proves controls hold, and closes the remediation loop.

    Claim Your Spot

    CryptoMining exploit Flaws hackers Qinglong RCE scheduler task
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous Article38 Vulnerabilities Found in OpenEMR Medical Software
    Next Article Searchers just want you to be helpful
    admin
    • Website

    Related Posts

    38 Vulnerabilities Found in OpenEMR Medical Software

    April 30, 2026

    AI Finds 38 Security Flaws in OpenEMR

    April 30, 2026

    What to Look for in an Exposure Management Platform (And What Most of Them Get Wrong)

    April 30, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    Searchers just want you to be helpful

    April 30, 2026

    Hackers exploit RCE flaws in Qinglong task scheduler for cryptomining

    April 30, 2026

    38 Vulnerabilities Found in OpenEMR Medical Software

    April 30, 2026

    How To Show Up For AI

    April 30, 2026
    Categories
    • Blogging (70)
    • Cybersecurity (1,594)
    • Privacy & Online Earning (190)
    • SEO & Digital Marketing (983)
    • Tech Tools & Mobile / Apps (1,796)
    • WiFi / Internet & Networking (253)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    Searchers just want you to be helpful

    April 30, 2026

    Hackers exploit RCE flaws in Qinglong task scheduler for cryptomining

    April 30, 2026

    38 Vulnerabilities Found in OpenEMR Medical Software

    April 30, 2026
    Most Popular
    • Searchers just want you to be helpful
    • Hackers exploit RCE flaws in Qinglong task scheduler for cryptomining
    • 38 Vulnerabilities Found in OpenEMR Medical Software
    • How To Show Up For AI
    • AI Finds 38 Security Flaws in OpenEMR
    • What to Look for in an Exposure Management Platform (And What Most of Them Get Wrong)
    • 4 signals that now define visibility in AI search
    • Common SEO issues & how to fix them
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.