<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"><channel><title>Nick Mykhailyshyn - Security Research Blog</title><description>Writeups of disclosed bugs, reverse engineering notes, and experiments in automated recon — by Nick Mykhailyshyn, offensive security engineer and bug bounty hunter.</description><link>https://whoareme.com/</link><item><title>$15k - CSPT to full account takeover, then 2FA bypass via the prototype chain</title><link>https://whoareme.com/blog/cspt-account-takeover-2fa-bypass/</link><guid isPermaLink="true">https://whoareme.com/blog/cspt-account-takeover-2fa-bypass/</guid><description>A client-side path traversal in the front-end&apos;s URL builder turned into arbitrary PUT/DELETE on the API, then chained with an inherited-property lookup bug to bypass 2FA</description><pubDate>Thu, 16 Apr 2026 00:00:00 GMT</pubDate><author>whoareme</author></item><item><title>SSRF in Ghost CMS via oEmbed (CVE-2020-8134)</title><link>https://whoareme.com/blog/ghost-cms-ssrf-cve-2020-8134/</link><guid isPermaLink="true">https://whoareme.com/blog/ghost-cms-ssrf-cve-2020-8134/</guid><description>How Ghost&apos;s embed-anything input let an authenticated publisher pivot the server into cloud metadata endpoints - and what the fix actually changed.</description><pubDate>Mon, 09 Mar 2020 00:00:00 GMT</pubDate><author>whoareme</author></item></channel></rss>