SingCERT Security Bulletin Lists Critical Vulnerabilities from NIST NVD
Summary
SingCERT published its weekly Security Bulletin summarising vulnerabilities compiled from NIST's National Vulnerability Database. The bulletin tabulates vulnerabilities by CVSSv3 base-score severity: Critical (9.0-10.0), High (7.0-8.9), Medium (4.0-6.9), and Low (0.1-3.9). Critical vulnerabilities listed include CVE-2025-15638 affecting Net::Dropbear for Perl and CVE-2026-40911 affecting WWBN AVideo; high-severity entries include CVEs affecting Flowise, Spinnaker, OpenClaw, Firebird, Doorman, Cisco ISE, and OpenRemote. Users are directed to NVD for updated CVSS entries for un-scored vulnerabilities.
What changed
SingCERT's weekly Security Bulletin aggregates newly reported vulnerabilities from NIST's National Vulnerability Database, organised by CVSSv3 base-score severity bands. The bulletin covers the Critical tier (CVSS 9.0-10.0) and High tier (CVSS 7.0-8.9) for the reporting week, listing CVE identifiers, base scores, descriptions, and links to NVD for further details.
Organisations in Singapore operating software or platforms referenced in the bulletin — including Net::Dropbear, AVideo, Flowise, Spinnaker, OpenClaw, Firebird, Doorman, Cisco ISE, and OpenRemote — should review their deployments against the listed CVE identifiers and apply available patches or mitigations referenced in NVD entries.
Archived snapshot
Apr 22, 2026GovPing captured this document from the original source. If the source has since changed or been removed, this is the text as it existed at that time.
SecurityBulletin22April2026
Generatedon22April2026
SingCERT'sSecurityBulletinsummarisesthelistofvulnerabilitiescollatedfromtheNationalInstituteofStandardsandTechnology(NIST)'sNational VulnerabilityDatabase(NVD)inthepastweek. Thevulnerabilitiesaretabledbasedonseverity,inaccordancetotheirCVSSv3basescores: vulnerabilitieswithabasescoreof9.0toCritical 10.0 vulnerabilitieswithabasescoreof7.0toHigh 8.9 vulnerabilitieswithabasescoreof4.0toMedium 6.9 vulnerabilitieswithabasescoreof0.1toLow 3.9 None vulnerabilitieswithabasescoreof0.0 ForthosevulnerabilitieswithoutassignedCVSSscores,pleasevisitNVDfortheupdatedCVSSvulnerabilityentries.
CRITICALVULNERABILITIES
CVE Base Description ReferenceNumber Score
Net::Dropbearversionsbefore0.14forPerlcontainsavulnerableversionoflibtomcrypt.Net::DropbearversionsCVE-2025-before0.14includesversionsofDropbear2019.78orearlier.Theseincludeversionsoflibtomcryptv1.18.1orearlier, 10.0 MoreDetails15638whichisaffectedbyCVE-2016-6129andCVE-2018-12437. WWBNAVideoisanopensourcevideoplatform.Inversions29.0andprior,theYPTSocketplugin'sWebSocketserver relaysattacker-suppliedJSONmessagebodiestoeveryconnectedclientwithoutsanitizingthemsgorcallback fields.Ontheclientside,plugin/YPTSocket/script.jscontainstwoeval()sinksfeddirectlybythoserelayedfields CVE-2026-(json.msg.autoEvalCodeOnHTMLatline568andjson.callbackatline95).Becausetokensaremintedfor 10.0 MoreDetails40911anonymousvisitorsandneverrevalidatedbeyonddecryption,anunauthenticatedattackercanbroadcastarbitrary JavaScriptthatexecutesintheoriginofeverycurrently-connecteduser(includingadministrators),resultingin universalaccounttakeover,sessiontheft,andprivilegedactionexecution.Commit c08694bf6264eb4decceb78c711baee2609b4efdcontainsafix. Storableversionsbefore3.05forPerlhasastackoverflow.Theretrieve_hookfunctionstoredthelengthoftheclassCVE-2017-nameintoasignedintegerbutinreadoperationstreatedthelengthasunsigned.Thisallowedanattackertocraft 10.0 MoreDetails20230datathatcouldtriggertheoverflow. Flowiseisadrag&dropuserinterfacetobuildacustomizedlargelanguagemodelflow.Priorto3.1.0,duetounsafe serializationofstdiocommandsintheMCPadapter,anauthenticatedattackercanaddanMCPstdioserverwithan arbitrarycommand,achievingcommandexecution.Thevulnerabilityliesinabugintheinputsanitizationfromthe CVE-2026-"CustomMCP"configurationinhttp://localhost:3000/canvas-whereanyusercanaddanewMCP,whendoingso- 9.9 MoreDetails40933addinganewMCPusingstdio,theusercanaddanycommand,eventhoughyourcodehaveinputsanitizationchecks suchasvalidateCommandInjectionandvalidateArgsForLocalFileAccess,andalistofpredefinedspecificsafe commands-thesecommands,forexample"npx"canbecombinedwithcodeexecutionarguments("-ctouch /tmp/pwn")thatenabledirectcodeexecutionontheunderlyingOS.Thisvulnerabilityisfixedin3.1.0. Spinnakerisanopensource,multi-cloudcontinuousdeliveryplatform.Inversionspriorto2026.1.0,2026.0.1, CVE-2026-2025.4.2,and2025.3.2,abadactorcanexecutearbitrarycommandsverysimplyontheclouddriverpods.Thiscan 9.9 MoreDetails32604exposecredentials,removefiles,orinjectresourceseasily.Versions2026.1.0,2026.0.1,2025.4.2,and2025.3.2 containapatch.Asaworkaround,disablethegitrepoartifacttypes. Spinnakerisanopensource,multi-cloudcontinuousdeliveryplatform.Echolikesomeotherservices,usesSPeL (SpringExpressionLanguage)toprocessinformation-specificallyaroundexpectedartifacts.Inversionspriorto CVE-2026-2026.1.0,2026.0.1,2025.4.2,and2025.3.2,unlikeorca,itwasNOTrestrictingthatcontexttoasetoftrusted 9.9 MoreDetails32613classes,butallowingFULLJVMaccess.Thisenabledausertousearbitraryjavaclasseswhichallowdeepaccessto thesystem.Thisenabledtheabilitytoinvokecommands,accessfiles,etc.Versions2026.1.0,2026.0.1,2025.4.2, and2025.3.2containapatch.Asaworkaround,disableechoentirely. OpenClawbefore2026.3.31containsasandboxbypassvulnerabilityallowingattackerstoescalateprivilegesviaCVE-2026-heartbeatcontextinheritanceandsenderIsOwnerparametermanipulation.Attackerscanexploitimpropercontext 9.9 MoreDetails41329validationtobypasssandboxrestrictionsandachieveunauthorizedprivilegeescalation.
externalenginepluginloaderconcatenatesauser-suppliedenginenameintoafilesystempathwithoutfilteringpath
CVE-2026- separatorsor..components.AnauthenticateduserwithCREATEFUNCTIONprivilegescanuseacraftedENGINE 9.9 MoreDetails 40342 nametoloadanarbitrarysharedlibraryfromanywhereonthefilesystemviapathtraversal.Thelibrary'sinitialization codeexecutesimmediatelyduringloading,beforeFirebirdvalidatesthemodule,achievingcodeexecutionasthe server'sOSaccount.Thisissuehasbeenfixedinversions5.0.4,4.0.7and3.0.14. ImproperaccesscontrolinDoormanv0.1.0andv1.0.2allowsanyauthenticatedusertoupdatetheirownaccountCVE-2026- roletoanon-adminprivilegedrolevia/platform/user/{username}.Therolefieldisacceptedbytheupdatemodel 9.9 MoreDetails30269 withoutamanageuserspermissioncheckforself-updates,enablingprivilegeescalationtohigh-privilegedroles. AvulnerabilityinCiscoIdentityServicesEngine(ISE)couldallowanauthenticated,remoteattackertoexecute arbitrarycommandsontheunderlyingoperatingsystemofanaffecteddevice.Toexploitthisvulnerability,the attackermusthaveatleastReadOnlyAdmincredentials.Thisvulnerabilityisduetoinsufficientvalidationofuser- CVE-2026- suppliedinput.AnattackercouldexploitthisvulnerabilitybysendingacraftedHTTPrequesttoanaffecteddevice.A 9.9 MoreDetails20186 successfulexploitcouldallowtheattackertoobtainuser-levelaccesstotheunderlyingoperatingsystemandthen elevateprivilegesto root.Insingle-nodeISEdeployments,successfulexploitationofthesevulnerabilitiescould causetheaffectedISEnodetobecomeunavailable,resultinginadenialofservice(DoS)condition.Inthatcondition, endpointsthathavenotalreadyauthenticatedwouldbeunabletoaccessthenetworkuntilthenodeisrestored. OpenRemoteisanopen-sourceIoTplatform.Versions1.21.0andbelowcontaintwointerrelatedexpressioninjection vulnerabilitiesintherulesenginethatallowarbitrarycodeexecutionontheserver.TheJavaScriptrulesengine executesuser-suppliedscriptsviaNashorn'sScriptEngine.eval()withoutsandboxing,classfiltering,oraccess restrictions,andtheauthorizationcheckinRulesResourceImplonlyrestrictsGroovyrulestosuperuserswhileleaving CVE-2026- JavaScriptrulesunrestrictedforanyuserwiththewrite:rulesrole.Additionally,theGroovyrulesenginehasa 9.9 MoreDetails39842 GroovyDenyAllFiltersecurityfilterthatisdefinedbutneverregistered,astheregistrationcodeiscommentedout, renderingtheSandboxTransformerineffectiveforsuperuser-createdGroovyrules.Anon-superuserattackerwiththe write:rulesrolecancreateJavaScriptrulesetsthatexecutewithfullJVMaccess,enablingremotecodeexecutionas root,arbitraryfileread,environmentvariabletheftincludingdatabasecredentials,andcompletemulti-tenant isolationbypasstoaccessdataacrossallrealms.Thisissuehasbeenfixedinversion1.22.0. AvulnerabilityinCiscoIdentityServicesEngine(ISE)couldallowanauthenticated,remoteattackertoexecute arbitrarycommandsontheunderlyingoperatingsystemofanaffecteddevice.Toexploitthisvulnerability,the attackermusthaveatleastReadOnlyAdmincredentials.Thisvulnerabilityisduetoinsufficientvalidationofuser- CVE-2026- suppliedinput.AnattackercouldexploitthisvulnerabilitybysendingacraftedHTTPrequesttoanaffecteddevice.A 9.9 MoreDetails20180 successfulexploitcouldallowtheattackertoobtainuser-levelaccesstotheunderlyingoperatingsystemandthen elevateprivilegesto root.Insingle-nodeISEdeployments,successfulexploitationofthesevulnerabilitiescould causetheaffectedISEnodetobecomeunavailable,resultinginadenialofservice(DoS)condition.Inthatcondition, endpointsthathavenotalreadyauthenticatedwouldbeunabletoaccessthenetworkuntilthenodeisrestored. AvulnerabilityinCiscoISEandCiscoISE-PICcouldallowanauthenticated,remoteattackertoexecutearbitrary commandsontheunderlyingoperatingsystemofanaffecteddevice.Toexploitthisvulnerability,theattackermust havevalidadministrativecredentials.Thisvulnerabilityisduetoinsufficientvalidationofuser-suppliedinput.An CVE-2026- attackercouldexploitthisvulnerabilitybysendingacraftedHTTPrequesttoanaffecteddevice.Asuccessfulexploit 9.9 MoreDetails20147 couldallowtheattackertoobtainuser-levelaccesstotheunderlyingoperatingsystemandthenelevateprivilegesto root.Insingle-nodeISEdeployments,successfulexploitationofthisvulnerabilitycouldcausetheaffectedISEnodeto becomeunavailable,resultinginadenialofservice(DoS)condition.Inthatcondition,endpointsthathavenot alreadyauthenticatedwouldbeunabletoaccessthenetworkuntilthenodeisrestored. ElectricisaPostgressyncengine.From1.1.12tobefore1.5.0,theorderbyparameterintheElectricSQL/v1/shape CVE-2026- APIisvulnerabletoerror-basedSQLinjection,allowinganyauthenticatedusertoread,write,anddestroythefull 9.9 MoreDetails40906 contentsoftheunderlyingPostgreSQLdatabasethroughcraftedORDERBYexpressions.Thisvulnerabilityisfixedin 1.5.0.
Priortocommit45d48d1f2e8e0d73e80bc1fd5310cb57f4547302,theTGAcodec'sRLEdecoderintga.chasan CVE-2026-asymmetricboundscheckvulnerability.Therun-packetpath(line297)correctlyclampstherepeatcounttothe 40494remainingbufferspace,buttheraw-packetpath(line305-311)hasnoequivalentboundscheck.Thisallowswriting upto496bytesofattacker-controlleddatapasttheendofaheapbuffer.Commit 45d48d1f2e8e0d73e80bc1fd5310cb57f4547302patchestheissue. DagAuthors,whonormallyshouldnotbeabletoexecutecodeinthewebservercontextcouldcraftXCompayloadCVE-2026-causingthewebservertoexecutearbitrarycode.SinceDagAuthorsarealreadyhighlytrusted,severityofthisissue25917isLow.UsersarerecommendedtoupgradetoApacheAirflow3.2.0,whichfixestheissue. NEMUcontainsanimplementationflawinitsRISC-VHypervisorCSRhandlingwherehenvcfg[7:4](CBIE/CBCFE/CBZE- relatedfields)isincorrectlymasked/updatedbasedonmenvcfg[7:4],soamachine-modewritetomenvcfgcanCVE-2026-implicitlymodifythehypervisor'senvironmentconfiguration.Thiscanleadtoincorrectenforcementofvirtualization29649configurationandmaycauseunexpectedtrapsordenialofservicewhenexecutingcache-blockmanagement instructionsinvirtualizedcontexts(V=1). CVE-2026-EasyFlow.NETdevelopedbyDigiwinhasaSQLInjectionvulnerability,allowingunauthenticatedremoteattackersto 5963injectarbitrarySQLcommandstoread,modify,anddeletedatabasecontents. CVE-2026-EasyFlow.NETdevelopedbyDigiwinhasaSQLInjectionvulnerability,allowingunauthenticatedremoteattackersto 5964injectarbitrarySQLcommandstoread,modify,anddeletedatabasecontents. SGLang'srerankingendpoint(/v1/rerank)achievesRemoteCodeExecution(RCE)whenamodelfilecontainingaCVE-2026-malcioustokenizer.chat_templateisloaded,astheJinja2chattemplatesarerenderedusinganunsandboxed jinja2.Environment(). Vvvebpriorto1.0.8.1containsacodeinjectionvulnerabilityintheinstallationendpointwherethesubdirPOST CVE-2026-parameteriswrittenunsanitizedintotheenv.phpconfigurationfilewithoutescapingorvalidation.Attackerscan
39918 injectarbitraryPHPcodebybreakingoutofthestringcontextinthedefinestatementtoachieveunauthenticated remotecodeexecutionasthewebserveruser.
Priortocommit36aa5c7ec8a2bb35f6fb867a1177a6f141156b02,theXWDcodecresolvespixelformatbasedon pixmap_depthbutthebyte-swapcodeusesbits_per_pixelindependently.Whenpixmap_depth=8CVE-2026-(BPP8INDEXED,1byte/pixelbuffer)but`bitsperpixel=32,thebyte-swaploopaccessesmemoryasuint32t*, 9.8 MoreDetails40492reading/writing4xtheallocatedbuffersize.ThisisadifferentvulnerabilityfromthepreviouslyreportedGHSA-3g38- x2pj-mv55(CVE-2026-27168),whichaddressedbytesperline`validation.Commit 36aa5c7ec8a2bb35f6fb867a1177a6f141156b02containsapatch.
CVE-2026- SD-330ACandAMCManagerprovidedbysilextechnology,Inc.containaheap-basedbufferoverflowvulnerabilityin 32956 processingtheredirectURLs.Arbitrarycodemaybeexecutedonthedevice. CVE-2026- NewSoftOAdevelopedbyNewSofthasanOSCommandInjectionvulnerability,allowingunauthenticatedlocal 5965 attackerstoinjectarbitraryOScommandsandexecutethemontheserver. InOpenXiangShanNEMUpriorto55295c4,whenrunningwithRVH(Hypervisorextension)enabled,aVS-modeguest CVE-2026- writetothesupervisorinterrupt-enableCSR(sie)maybehandledincorrectlyandcaninfluencemachine-level 29646 interruptenablestate(mie).Thisbreaksprivilege/virtualizationisolationandcanleadtodenialofserviceorprivilege- boundaryviolationinenvironmentsrelyingonNEMUforcorrectinterruptvirtualization. Callingthescanffamilyoffunctionswitha%mc(malloc'dcharactermatch)intheGNUCLibraryversion2.7toCVE-2026- version2.43withaformatwidthspecifierwithanexplicitwidthgreaterthan1024couldresultinaonebyteheap5450 bufferoverflow. CVE-2026- UninitializedmemoryintheAudio/Video:WebCodecscomponent.ThisvulnerabilitywasfixedinFirefox150,Firefox 6748 CVE-2026- MitigationbypassintheNetworking:Cookiescomponent.ThisvulnerabilitywasfixedinFirefox150andThunderbird 6768 150. CVE-2026- MitigationbypassintheDOM:Securitycomponent.ThisvulnerabilitywasfixedinFirefox150,FirefoxESR140.10, 6771 CrowdStrikehasreleasedsecurityupdatestoaddressacriticalunauthenticatedpathtraversalvulnerability(CVE- 2026-40050)inLogScale.Thisvulnerabilityonlyrequiresmitigationbycustomersthathostspecificversionsof LogScaleanddoesnotaffectNext-GenSIEMcustomers.ThevulnerabilityexistsinaspecificclusterAPIendpoint that,ifexposed,allowsaremoteattackertoreadarbitraryfilesfromtheserverfilesystemwithoutauthentication.CVE-2026- Next-GenSIEMcustomersarenotaffectedanddonotneedtotakeanyaction.CrowdStrikemitigatedthe40050 vulnerabilityforLogScaleSaaScustomersbydeployingnetwork-layerblockstoallclustersonApril7,2026.Wehave proactivelyreviewedalllogdataandthereisnoevidenceofexploitation.LogScaleSelf-hostedcustomersshould upgradetoapatchedversionimmediatelytoremediatethevulnerability.CrowdStrikeidentifiedthisvulnerability duringcontinuousandongoingproducttesting. goshsisaSimpleHTTPServerwritteninGo.Priorto2.0.0-beta.6,goshscontainsanSFTPauthenticationbypasswhen thedocumentedempty-usernamebasic-authsyntaxisused.Iftheserverisstartedwith-b':pass'togetherwith-sftp,CVE-2026- goshsacceptsthatconfigurationbutdoesnotinstallanySFTPpasswordhandler.Asaresult,anunauthenticated40884 networkattackercanconnecttotheSFTPserviceandaccessfileswithoutapassword.Thisvulnerabilityisfixedin 2.0.0-beta.6. CVE-2026- AnincorrectprivilegeassignmentvulnerabilityexistsinEsriPortalforArcGIS11.5inWindowsandLinuxthatallows 33518 highlyprivilegeduserstocreatedevelopercredentialsthatmaygrantmoreprivilegesthanexpected. CVE-2026- AnincorrectauthorizationvulnerabilityexistsinEsriPortalforArcGIS11.4,11.5and12.0onWindows,Linuxand 33519 Kubernetesthatdidnotcorrectlycheckpermissionsassignedtodevelopercredentials. VulnerabilityintheOracleAdvancedInboundTelephonyproductofOracleE-BusinessSuite(component:Setupand Administration).Supportedversionsthatareaffectedare12.2.3-12.2.15.Easilyexploitablevulnerabilityallows CVE-2026- unauthenticatedattackerwithnetworkaccessviaHTTPtocompromiseOracleAdvancedInboundTelephony. 34275 SuccessfulattacksofthisvulnerabilitycanresultintakeoverofOracleAdvancedInboundTelephony.CVSS3.1Base Score9.8(Confidentiality,IntegrityandAvailabilityimpacts).CVSSVector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). FastGPTisanAIAgentbuildingplatform.Inversionspriorto4.14.9.5,thepassword-basedloginendpointuses CVE-2026- TypeScripttypeassertionwithoutruntimevalidation,allowinganunauthenticatedattackertopassaMongoDBquery 40351 operatorobject(e.g.,{"$ne":""})asthepasswordfield.ThisNoSQLinjectionbypassesthepasswordcheck,enabling loginasanyuserincludingtherootadministrator.Thisissuehasbeenfixedinversion4.14.9.5. TheWebStackthemeforWordPressisvulnerabletoarbitraryfileuploadsduetomissingfiletypevalidationintheCVE-2026- ioimgupload()functioninallversionsupto,andincluding,1.2024.Thismakesitpossibleforunauthenticated1555 attackerstouploadarbitraryfilesontheaffectedsite'sserverwhichmaymakeremotecodeexecutionpossible. Thegoodoneuz/pay-uzLaravelpackage(<=2.2.24)containsacriticalvulnerabilityinthe /payment/api/editable/updateendpointthatallowsunauthenticatedattackerstooverwriteexistingPHPpayment hookfiles.TheendpointisexposedviaRoute::any()withoutauthenticationmiddleware,enablingremoteaccessCVE-2026- withoutcredentials.User-controlledinputisdirectlywrittenintoexecutablePHPfilesusingfileputcontents().These31843 filesarelaterexecutedviarequire()duringnormalpaymentprocessingworkflows,resultinginremotecode executionunderdefaultapplicationbehavior.Thepaymentsecrettokenmentionedbythevendorisunrelatedtothis endpointanddoesnotmitigatethevulnerability.
DataEaseisanopensourcedatavisualizationanalysistool.Versions2.10.20andbelowcontainaSQLinjection vulnerabilityinthedatasetexportfunctionality.TheexpressionTreeparameterinPOST /de2api/datasetTree/exportDatasetisdeserializedintoafilteringobjectandpassedtoWhereTree2Str.transFilterTreesCVE-2026-forSQLtranslation,whereuser-controlledvaluesin"like"filtertermsaredirectlyconcatenatedintoSQLfragments33082withoutsanitization.AnattackercaninjectarbitrarySQLcommandsbyescapingthestringliteralinthefiltervalue, enablingblindSQLinjectionthroughtechniquessuchastime-basedextractionofdatabaseinformation.Thisissue hasbeenfixedinversion2.10.21. TheVisaAcceptanceSolutionspluginforWordPressisvulnerabletoAuthenticationBypassinallversionsupto,and including,2.1.0.Thisisduetotheexpress_pay_product_page_pay_for_order()functionloggingusersinbasedsolely CVE-2026-onauser-suppliedbillingemailaddressduringguestcheckoutforsubscriptionproducts,withoutverifyingemail 3461ownership,requiringapassword,orvalidatingaone-timetoken.Thismakesitpossibleforunauthenticatedattackers tologinasanyexistinguser,includingadministrators,byprovidingthetargetuser'semailaddressinthe billingdetailsparameter,resultingincompleteaccounttakeoverandsitecompromise. Upsonic0.71.6containsaremotecodeexecutionvulnerabilityinitsMCPserver/taskcreationfunctionality.The applicationallowsuserstodefineMCPtaskswitharbitrarycommandandargsvalues.Althoughanallowlistexists, CVE-2026-certainallowedcommands(npm,npx)acceptargumentflagsthatenableexecutionofarbitraryOScommands. 30625MaliciouslycraftedMCPtasksmayleadtoremotecodeexecutionwiththeprivilegesoftheUpsonicprocess.In version0.72.0UpsonicaddedawarningaboutusingStdioserversbeingabletoexecutecommandsdirectlyonthe machine. Avulnerabilityintheintegrationofsinglesign-on(SSO)withControlHubinCiscoWebexServicescouldhaveallowed anunauthenticated,remoteattackertoimpersonateanyuserwithintheservice.ThisvulnerabilityexistedbecauseofCVE-2026-impropercertificatevalidation.Priortothisvulnerabilitybeingaddressed,anattackercouldhaveexploitedthis20184vulnerabilitybyconnectingtoaserviceendpointandsupplyingacraftedtoken.Asuccessfulexploitcouldhave allowedtheattackertogainunauthorizedaccesstolegitimateCiscoWebexservices. CVE-2026-SlahCMSv1.5.0andbelowwasdiscoveredtocontainaremotecodeexecution(RCE)vulnerabilityinthesession() 30993functionatconfig.php.Thisvulnerabilityisexploitableviaacraftedinput. TheBarcodeScanner(+MobileApp)-Inventorymanager,Orderfulfillmentsystem,POS(PointofSale)pluginfor WordPressisvulnerabletoprivilegeescalationviainsecuretoken-basedauthenticationinallversionsupto,and including,1.11.0.Thisisduetotheplugintrustingauser-suppliedBase64-encodeduserIDinthetokenparametertoCVE-2026-identifyusers,leakingvalidauthenticationtokensthroughthe'barcodeScannerConfigs'action,andlackingmeta-key4880restrictionsonthe'setUserMeta'action.Thismakesitpossibleforunauthenticatedattackerstoescalatetheir privilegestothatofanadministratorbyfirstspoofingtheadminuserIDtoleaktheirauthenticationtoken,thenusing thattokentoupdateanyuser's'wpcapabilities'metatogainfulladministrativeaccess. CreolabsGravitybefore0.9.6containsaheapbufferoverflowvulnerabilityinthegravityvmexecfunctionthat CVE-2026-allowsattackerstowriteout-of-boundsmemorybycraftingscriptswithmanystringliteralsatglobalscope.Attackers 40504canexploitinsufficientboundscheckingingravityfiberreassign()tocorruptheapmetadataandachievearbitrary codeexecutioninapplicationsthatevaluateuntrustedscripts. CVE-2026-MailGates/MailAuditdevelopedbyOpenfindhasaStack-basedBufferOverflowvulnerability,allowing 6350unauthenticatedremoteattackerstocontroltheprogram'sexecutionflowandexecutearbitrarycode. TheRiaxeProductCustomizerpluginforWordPressisvulnerabletoPrivilegeEscalationinallversionsupto,and including,2.1.2.ThepluginregistersanunauthenticatedAJAXaction('wpajaxnoprivinstall-imprint')thatmapsto theinkpdaddoption()function.Thisfunctionreads'option'and'optvalue'from$POST,thencallsdeleteoption()CVE-2026-followedbyaddoption()usingtheseattacker-controlledvalueswithoutanynonceverification,capabilitychecks,or3596optionnameallowlist.ThismakesitpossibleforunauthenticatedattackerstoupdatearbitraryWordPressoptions, whichcanbeleveragedforprivilegeescalationbyenablinguserregistrationandsettingthedefaultuserroleto administrator. CVE-2026-AnvizCX2LiteandCX7arevulnerabletounauthenticatedfirmwareuploads.Thiscausescraftedarchivestobe 35546accepted,enablingattackerstoplantandexecutecodeandobtainareverseshell. CVE-2026- 37339/music/viewgenre.php. CVE-2026- 37340/music/editmusic.php. CVE-2026- 37345/parking/manage_park.php.
Priortocommitc930284445ea3ff94451ccd7a57c999eca3bc979,thePSDcodeccomputesbytes-per-pixel(bpp) CVE-2026-fromrawheaderfieldschannels*depth,butthepixelbufferisallocatedbasedontheresolvedpixelformat.For 40493LABmodewithchannels=3,depth=16,bpp=(3*16+7)/8=6,buttheformatBPP40_CIE_LABallocatesonly5 bytesperpixel.Everypixelwriteovershoots,causingadeterministicheapbufferoverflowoneveryrow.Commit c930284445ea3ff94451ccd7a57c999eca3bc979containsapatch. AllpluginsbyEssentialpluginforWordPressarevulnerabletoaninjectedbackdoorinvariousversions.ThisisduetoCVE-2026-thepluginbeingsoldtoamaliciousthreatactorthatembeddedabackdoorinalloftheplugin'stheyacquired.This makesitpossibleforthethreatactortomaintainapersistentbackdoorandinjectspamintotheaffectedsites. DataEaseisanopen-sourcedatavisualizationandanalyticsplatform.Versions2.10.20andbelowcontainaSQL injectionvulnerabilityintheAPIdatasourceupdateprocess.Whenanewtabledefinitionisaddedduringa datasourceupdatevia/de2api/datasource/update,thedeTableNamefieldfromtheuser-submittedconfigurationis
passedtoDatasourceSyncManage.createEngineTable,whereitissubstitutedintoaCREATETABLEstatementCVE-2026- 33122templatewithoutanysanitizationoridentifierescaping.AnauthenticatedattackercaninjectarbitrarySQL commandsbycraftingadeTableNamethatbreaksoutofidentifierquoting,enablingerror-basedSQLinjectionthat canextractdatabaseinformation.Thisissuehasbeenfixedinversion2.10.21. CVE-2026-ASQLinjectionvulnerabilityinCodeAstroSimpleAttendanceManagementSystemv1.0allowsremote 37749unauthenticatedattackerstobypassauthenticationviatheusernameparameterinindex.php. CVE-2026-AnSQLinjectionvulnerabilityexistsinCubeCartpriorto6.6.0,whichmayallowanattackertoexecuteanarbitrary 34018SQLstatementontheproduct. CVE-2026-HeapbufferoverflowinANGLEinGoogleChromepriorto147.0.7727.101allowedaremoteattackertopotentially 9.6 MoreDetails6296performasandboxescapeviaacraftedHTMLpage.(Chromiumsecurityseverity:Critical) DgraphisanopensourcedistributedGraphQLdatabase.Versions25.3.1andpriorcontainanunauthenticated credentialdisclosurevulnerabilitywherethe/debug/pprof/cmdlineendpointisregisteredonthedefaultmuxand reachablewithoutauthentication,exposingthefullprocesscommandlineincludingtheadmintokenconfiguredvia CVE-2026-the--security"token=..."startupflag.AnattackercanretrievetheleakedtokenandreuseitintheX-Dgraph- 9.4 MoreDetails40173AuthTokenheadertogainunauthorizedaccesstoadmin-onlyendpointssuchas/admin/config/cachemb,bypassing theadminAuthHandlertokenvalidation.Thisenablesunauthorizedprivilegedadministrativeaccessincluding configurationchangesandoperationalcontrolactionsinanydeploymentwheretheAlphaHTTPportisreachableby untrustedparties.Thisissuehasbeenfixedinversion25.3.2. CVE-2026- 9.4 MoreDetails37338/music/viewuser.php. excel-mcp-serverisaModelContextProtocolserverforExcelfilemanipulation.Apathtraversalvulnerabilityexistsin excel-mcp-serverversionsuptoandincluding0.1.7.WhenrunninginSSEorStreamable-HTTPtransportmode(the documentedwaytousethisserverremotely),anunauthenticatedattackeronthenetworkcanread,write,and overwritearbitraryfilesonthehostfilesystembysupplyingcraftedfilepathargumentstoanyofthe25exposedMCP CVE-2026-toolhandlers.TheserverisintendedtoconfinefileoperationstoadirectorysetbytheEXCELFILESPATH 9.4 MoreDetails40576environmentvariable.Thefunctionresponsibleforenforcingthisboundary--getexcelpath()--failstodosodueto twoindependentflaws:itpassesabsolutepathsthroughwithoutanycheck,anditjoinsrelativepathswithout resolvingorvalidatingtheresult.Combinedwithzeroauthenticationonthedefaultnetwork-facingtransportanda defaultbindaddressof0.0.0.0(allinterfaces),thisallowstrivialremoteexploitation.Thisvulnerabilityisfixedin 0.1.8. SQLInjectionvulnerabilityinApartmentVisitorsManagementSystemApartmentVisitorsManagementSystemV1.1CVE-2026-withintheusernameparameteroftheloginpage(index.php).Thisallowsanunauthenticatedattackertomanipulate 9.4 MoreDetails39109backendSQLqueriesduringauthenticationandretrievesensitivedatabasecontents. CVE-2026-Luanti5before5.15.2,whenLuaJITisused,allowsaLuasandboxescapeviaacraftedmod. 9.3 MoreDetails40959 NovumOSisacustom32-bitoperatingsystemwritteninZigandx86Assembly.Inversionspriorto0.24,Syscall12 (JumpToUser)acceptsanarbitraryentrypointaddressfromuser-spaceregisterswithoutvalidation,allowinganyRing CVE-2026-3user-modeprocesstojumptokerneladdressesandexecutearbitrarycodeinRing0context,resultinginlocal 9.3 MoreDetails40317privilegeescalation.Thisissuehasbeenfixedinversion0.24.Ifdevelopersareunabletoimmediatelyupdate,they shouldrestrictsyscallaccessbyrunningthesysteminsingle-usermodewithoutRing3,anddisableuser-mode processesbyonlyrunningkernelshellwithnouserprocesses.Thisissuehasbeenfixedinversion0.24.
supportedversionthatisaffectedis12.2.1.4.0.Easilyexploitablevulnerabilityallowsunauthenticatedattackerwith networkaccessviaHTTPStocompromiseOracleIdentityManagerConnector.SuccessfulattacksofthisvulnerabilityCVE-2026-canresultinunauthorizedcreation,deletionormodificationaccesstocriticaldataorallOracleIdentityManager34285ConnectoraccessibledataaswellasunauthorizedaccesstocriticaldataorcompleteaccesstoallOracleIdentity ManagerConnectoraccessibledata.CVSS3.1BaseScore9.1(ConfidentialityandIntegrityimpacts).CVSSVector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N). VulnerabilityintheOracleEnterpriseManagerBasePlatformproductofOracleEnterpriseManager(component: EventManagement).Supportedversionsthatareaffectedare13.5and24.1.Easilyexploitablevulnerabilityallows highprivilegedattackerwithnetworkaccessviaHTTPtocompromiseOracleEnterpriseManagerBasePlatform. CVE-2026-WhilethevulnerabilityisinOracleEnterpriseManagerBasePlatform,attacksmaysignificantlyimpactadditional 34279products(scopechange).SuccessfulattacksofthisvulnerabilitycanresultintakeoverofOracleEnterpriseManager BasePlatform.CVSS3.1BaseScore9.1(Confidentiality,IntegrityandAvailabilityimpacts).CVSSVector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).
FreeScoutisafreeself-hostedhelpdeskandsharedmailbox.Priortoversion1.8.215,FreeScout'smoduleinstallationCVE-2026-featureextractsZIParchiveswithoutvalidatingfilepaths,allowinganauthenticatedadmintowritefilesarbitrarilyon41193theserverfilesystemviaaspeciallycraftedZIP.Version1.8.215fixesthevulnerability.
supportedversionthatisaffectedis12.2.1.4.0.Easilyexploitablevulnerabilityallowsunauthenticatedattackerwith networkaccessviaHTTPStocompromiseOracleIdentityManagerConnector.SuccessfulattacksofthisvulnerabilityCVE-2026-canresultinunauthorizedcreation,deletionormodificationaccesstocriticaldataorallOracleIdentityManager34286ConnectoraccessibledataaswellasunauthorizedaccesstocriticaldataorcompleteaccesstoallOracleIdentity ManagerConnectoraccessibledata.CVSS3.1BaseScore9.1(ConfidentialityandIntegrityimpacts).CVSSVector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N). ChurchCRMisanopen-sourcechurchmanagementsystem.Inversionspriorto7.2.0,thedatabasebackuprestore
functionalityextractsuploadedarchivecontentsandcopiesfilesfromtheImages/directoryintotheweb-accessible documentrootusingrecursiveCopyDirectory(),whichperformsnofileextensionfiltering.AnauthenticatedCVE-2026- administratorcanuploadacraftedbackuparchivecontainingaPHPwebshellinsidetheImages/directory,whichis40484 thenwrittentoapubliclyaccessiblepathandexecutableviaHTTPrequests,resultinginremotecodeexecutionas thewebserveruser.TherestoreendpointalsolacksCSRFtokenvalidation,enablingexploitationthroughcross-site requestforgerytargetinganauthenticatedadministrator.Thisissuehasbeenfixedinversion7.2.0. goshsisaSimpleHTTPServerwritteninGo.Priorto2.0.0-beta.6,goshshasanArtiPACKEDvulnerability.ArtiPACKEDCVE-2026-canleadtoleakageoftheGITHUBTOKENthroughworkflowartifacts,eventhoughthetokenisnotpresentinthe40903repositorysourcecode.Thisvulnerabilityisfixedin2.0.0-beta.6. Vendureisanopen-sourceheadlesscommerceplatform.Startinginversion1.7.4andpriortoversions2.3.4,3.5.7, and3.6.2,anunauthenticatedSQLinjectionvulnerabilityexistsintheVendureShopAPI.Auser-controlledquery stringparameterisinterpolateddirectlyintoarawSQLexpressionwithoutparameterizationorvalidation,allowingan attackertoexecutearbitrarySQLagainstthedatabase.Thisaffectsallsupporteddatabasebackends(PostgreSQL, MySQL/MariaDB,SQLite).TheAdminAPIisalsoaffected,thoughexploitationthererequiresauthentication.VersionsCVE-2026-2.3.4,3.5.7,and3.6.2containapatch.Forthosewhoareunabletoupgradeimmediately,Vendurehasmadeahotfix40887availablethatusesRequestContextService.getLanguageCodetovalidatethelanguageCodeinputatthe boundary.Thisblocksinjectionpayloadsbeforetheycanreachanyquery.Thehotfixreplacestheexisting getLanguageCodemethodinpackages/core/src/service/helpers/request-context/request-context.service.ts. Invalidvaluesaresilentlydroppedandthechannel'sdefaultlanguageisusedinstead.Thepatchedversions additionallyconvertthevulnerableSQLinterpolationtoaparameterizedqueryasdefenseindepth. Pyroscopeisanopen-sourcecontinuousprofilingdatabase.Thedatabasesupportsvariousstoragebackends, includingTencentCloudObjectStorage(COS).IfthedatabaseisconfiguredtouseTencentCOSasthestorage backend,anattackercouldextractthesecretkeyconfigurationvaluefromthePyroscopeAPI.ToexploitthisCVE-2025-vulnerability,anattackerneedsdirectaccesstothePyroscopeAPI.Wehighlyrecommendlimitingthepublicinternet41118exposureofallourdatabases,suchthattheyareonlyaccessiblebytrustedusersorinternalsystems.This vulnerabilityisfixedinversions:1.15.x:1.15.2andabove.1.16.x:1.16.1andabove.1.17.x:1.17.0andabove(i.e.all versions).ThankstoThéoCusnirforreportingthisvulnerabilitytousviaourbugbountyprogram.
supportedversionthatisaffectedis12.2.1.4.0.Easilyexploitablevulnerabilityallowsunauthenticatedattackerwith networkaccessviaHTTPStocompromiseOracleIdentityManagerConnector.SuccessfulattacksofthisvulnerabilityCVE-2026-canresultinunauthorizedcreation,deletionormodificationaccesstocriticaldataorallOracleIdentityManager34287ConnectoraccessibledataaswellasunauthorizedaccesstocriticaldataorcompleteaccesstoallOracleIdentity ManagerConnectoraccessibledata.CVSS3.1BaseScore9.1(ConfidentialityandIntegrityimpacts).CVSSVector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N). @fastify/expressv4.0.4andearliercontainsapathhandlingbugintheonRegisterfunctionthatcausesmiddleware pathstobedoubledwheninheritedbychildplugins.Whenachildpluginisregisteredwithaprefixthatmatchesa CVE-2026-middlewarepath,themiddlewarepathisprefixedasecondtime,causingittonevermatchincomingrequests.This 33807resultsincompletebypassofExpressmiddlewaresecuritycontrols,includingauthentication,authorization,andrate limiting,forallroutesdefinedwithinaffectedchildpluginscopes.Nospecialconfigurationorrequestcraftingis required.Upgradeto@fastify/expressv4.0.5orlater. CVE-2026-ImproperverificationofcryptographicsignatureinASP.NETCoreallowsanunauthorizedattackertoelevate 40372privilegesoveranetwork. HotChocolateisanopen-sourceGraphQLserver.Priortoversions12.22.7,13.9.16,14.3.1,and15.1.14,Hot Chocolate'srecursivedescentparserUtf8GraphQLParserhasnorecursiondepthlimit.AcraftedGraphQLdocument withdeeplynestedselectionsets,objectvalues,listvalues,orlisttypescantriggeraStackOverflowExceptionon payloadsassmallas40KB.BecauseStackOverflowExceptionisuncatchablein.NET(since.NET2.0),theentire workerprocessisterminatedimmediately.Allin-flightHTTPrequests,backgroundIHostedServicetasks,andopen WebSocketsubscriptionsonthatworkeraredropped.Theorchestrator(Kubernetes,IIS,etc.)mustrestartthe process.Thisoccursbeforeanyvalidationrulesrun--MaxExecutionDepth,complexityanalyzers,persistedquery allow-lists,andcustomIDocumentValidatorRuleimplementationscannotinterceptthecrashbecauseCVE-2026-Utf8GraphQLParser.Parseisinvokedbeforevalidation.TheMaxAllowedFields=2048limitdoesnothelpbecause40324thecrashingpayloadscontainveryfewfields.Thefixinversions12.22.7,13.9.16,14.3.1,and15.1.14addsa MaxAllowedRecursionDepthoptiontoParserOptionswithasafedefault,andenforcesitacrossallrecursiveparser methods(ParseSelectionSet,ParseValueLiteral,ParseObject,ParseList,ParseTypeReference,etc.).When thelimitisexceeded,acatchableSyntaxExceptionisthrowninsteadofoverflowingthestack.Thereisno application-levelworkaround.StackOverflowExceptioncannotbecaughtin.NET.Theonlymitigationistoupgrade toapatchedversion.Operatorscanreduce(butnoteliminate)riskbylimitingHTTPrequestbodysizeatthereverse proxyorloadbalancerlayer,thoughthesmallestcrashingpayload(40KB)iswellbelowmostdefaultbodysizelimits andishighlycompressible(~fewhundredbytesviagzip). ApossiblesecurityvulnerabilityhasbeenidentifiedinApacheKafka.Bydefault,thebrokerproperty sasl.oauthbearer.jwt.validator.classissettoorg.apache.kafka.common.security.oauthbearer.DefaultJwtValidator. ItacceptsanyJWTtokenwithoutvalidatingitssignature,issuer,oraudience.AnattackercangenerateaJWTtokenCVE-2026-fromanyissuerwiththepreferred_usernamesettoanyuser,andthebrokerwillacceptit.WeadvisetheKafka33557usersusingkafkav4.1.0orv4.1.1tosettheconfigsasl.oauthbearer.jwt.validator.classto org.apache.kafka.common.security.oauthbearer.BrokerJwtValidatorexplicitlytoavoidthisvulnerability.SinceKafka v4.1.2andv4.2.0andlater,theissueisfixedandwillcorrectlyvalidatetheJWTtoken. AflawwasfoundinArgoCDImageUpdater.Thisvulnerabilityallowsanattacker,withpermissionstocreateormodify anImageUpdaterresourceinamulti-tenantenvironment,tobypassnamespaceboundaries.ByexploitinginsufficientCVE-2026-validation,theattackercantriggerunauthorizedimageupdatesonapplicationsmanagedbyothertenants.This leadstocross-namespaceprivilegeescalation,impactingapplicationintegritythroughunauthorizedapplication updates.
OpenVikingpriortoversion0.3.9containsanauthenticationbypassvulnerabilityintheVikingBotOpenAPIHTTProute surfacewheretheauthenticationcheckfailsopenwhentheapikeyconfigurationvalueisunsetorempty.RemoteCVE-2026-attackerswithnetworkaccesstotheexposedservicecaninvokeprivilegedbot-controlfunctionalitywithoutproviding40525avalidX-API-Keyheader,includingsubmittingattacker-controlledprompts,creatingorusingbotsessions,and accessingdownstreamtools,integrations,secrets,ordataaccessibletothebot. AnattackerwithnetworkaccesstothePLCisabletobruteforcediscoverpasswordstogainunauthorizedaccesstoCVE-2026-systemsandservices.Thelimitedpasswordcomplexityandnopasswordinputlimitersmakesbruteforcepassword6284enumerationpossible. TheobsoletenislocalprincipalfunctionintheGNUCLibraryversion2.43andoldermayoverflowabufferinthe datasection,whichcouldallowanattackertospoofacraftedresponsetoaUDPrequestgeneratedbythisfunctionCVE-2026-andoverwriteneighboringstaticdataintherequestingapplication.NISsupportisobsoleteandhasbeendeprecated5358intheGNUCLibrarysinceversion2.26andisonlymaintainedforlegacyusage.Applicationsshouldportawayfrom NIStomoremodernidentityandaccessmanagementservices. @fastify/middieversions9.3.1andearlierdonotregisterinheritedmiddlewaredirectlyonchildpluginengine instances.WhenaFastifyapplicationregistersauthenticationmiddlewareinaparentscopeandthenregisterschildCVE-2026-pluginswith@fastify/middie,thechildscopedoesnotinherittheparentmiddleware.Thisallowsunauthenticated6270requeststoreachroutesdefinedinchildpluginscopes,bypassingauthenticationandauthorizationchecks.Upgrade to@fastify/middie9.3.2tofixthisissue.Therearenoworkarounds. VvvebCMSv1.0.8containsaremotecodeexecutionvulnerabilityinitsmediamanagementfunctionalitywherea missingreturnstatementinthefilerenamehandlerallowsauthenticatedattackerstorenamefilestoblockedCVE-2026-extensions.phpor.htaccess.Attackerscanexploitthislogicflawbyfirstuploadingatextfileandrenamingitto6257.htaccesstoinjectApachedirectivesthatregisterPHP-executableMIMEtypes,thenuploadinganotherfileand renamingitto.phptoexecutearbitraryoperatingsystemcommandsasthewww-datauser. CVE-2026-SourceCodesterPayrollManagementandInformationSystemv1.0isvulnerabletoSQLInjectioninthefile 37347/payroll/viewemployee.php. TheGrampsWebAPIisaPythonRESTAPIforthegenealogicalresearchsoftwareGramps.Versions1.6.0through 3.11.0haveapathtraversalvulnerability(ZipSlip)inthemediaarchiveimportfeature.Anauthenticateduserwith CVE-2026-owner-levelprivilegescancraftamaliciousZIPfilewithdirectory-traversalfilenamestowritearbitraryfilesoutside 40258theintendedtemporaryextractiondirectoryontheserver'slocalfilesystem.Startiginversion3.11.1,ZIPentry namesarenowvalidatedagainsttheresolvedrealpathofthetemporarydirectorybeforeextraction.Anyentry whoseresolvedpathfallsoutsidethetemporarydirectoryraisesanerrorandabortstheimport. CVE-2026-AninsecuredirectobjectreferencevulnerabilityintheUsersAPIcomponentofCraftyControllerallowsaremote, 9.0 MoreDetails5652authenticatedattackertoperformusermodificationactionsviaimproperAPIpermissionsvalidation. FreeScoutisafreeself-hostedhelpdeskandsharedmailbox.Versionspriorto1.8.213haveamassassignment vulnerabilityinthemailboxconnectionsettingsendpointsofFreeScout(connectionIncomingSave()at app/Http/Controllers/MailboxesController.php:468andconnectionOutgoingSave()atline398).Bothmethodspass $request->all()directlyto$mailbox->fill()withoutanyfieldallowlisting,allowinganauthenticatedadminto overwriteanyofthe32fieldsintheMailboxmodel's$fillablearray--includingsecurity-criticalfieldsthatdonot belongtotheconnectionsettingsform,suchasauto_bcc,out_server,out_password,signature, auto_reply_enabled,andauto_reply_message.ValidationinconnectionIncomingSave()isentirelycommented out,andthevalidatorinconnectionOutgoingSave()onlychecksvalueformatsforSMTPfieldswithoutstripping extraparameters.Anauthenticatedadminusercanexploitthisbyappendinghiddenparameters(e.g.,CVE-2026- 9.0 MoreDetailsauto_bcc=attacker@evil.com)toalegitimateconnectionsettingssaverequest.Becausetheauto_bccfieldisnot40569 displayedontheconnectionsettingsform(itonlyappearsonthegeneralmailboxsettingspage),theinjectionis invisibletootheradministratorsreviewingconnectionsettings.Onceset,everyoutgoingemailfromtheaffected mailboxissilentlyBCC'dtotheattackerviatheSendReplyToCustomerjob.Thesamemechanismallowsredirecting outgoingSMTPthroughanattacker-controlledserver,injectingtrackingpixelsorphishinglinksintoemailsignatures, andenablingattacker-craftedauto-replies--allfromasingleHTTPrequest.Thisisparticularlydangerousinmulti- adminenvironmentswhereoneadmincansilentlysurveilmailboxesmanagedbyothers,andwhenanadminsession iscompromisedviaaseparatevulnerability(e.g.,XSS),theattackergainspersistentemailexfiltrationthatsurvives sessionexpiry.Version1.8.213fixestheissue.
NovumOSisacustom32-bitoperatingsystemwritteninZigandx86Assembly.Inversionspriorto0.24,Syscall15 (MemoryMapRange)allowsRing3user-modeprocessestomaparbitraryvirtualaddressrangesintotheiraddressCVE-2026-spacewithoutvalidatingagainstforbiddenregions,includingcriticalkernelstructuressuchastheIDT,GDT,TSS,and 9.0 MoreDetails40572pagetables.Alocalattackercanexploitthistomodifykernelinterrupthandlers,resultinginprivilegeescalationfrom usermodetokernelcontext.Thisissuehasbeenfixedinversion0.24. Thymeleafisaserver-sideJavatemplateengineforwebandstandaloneenvironments.Versions3.1.3.RELEASEand priorcontainasecuritybypassvulnerabilityinthetheexpressionexecutionmechanisms.Althoughthelibrary CVE-2026-providesmechanismstopreventexpressioninjection,itfailstoproperlyneutralizespecificsyntaxpatternsthatallow 9.0 MoreDetails40478fortheexecutionofunauthorizedexpressions.Ifanapplicationdeveloperpassesunvalidateduserinputdirectlyto thetemplateengine,anunauthenticatedremoteattackercanbypassthelibrary'sprotectionstoachieveServer-Side TemplateInjection(SSTI).Thisissuehasbenfixedinversion3.1.4.RELEASE. SiYuanisanopen-sourcepersonalknowledgemanagementsystem.Inversions3.6.3andbelow,Mermaiddiagrams arerenderedwithsecurityLevelsetto"loose",andtheresultingSVGisinjectedintotheDOMviainnerHTML.This CVE-2026-allowsattacker-controlledjavascript:URLsinMermaidcodeblockstosurviveintotherenderedoutput.Ondesktop 9.0 MoreDetails40322buildsusingElectron,windowsarecreatedwithnodeIntegrationenabledandcontextIsolationdisabled,escalatingthe storedXSStoarbitrarycodeexecutionwhenavictimopensanotecontainingamaliciousMermaidblockandclicks therendereddiagramnode.Thisissuehasbeenfixedinversion3.6.4.
OpenAEVisanopensourceplatformallowingorganizationstoplan,scheduleandconductcyberadversarysimulation campaignandtests.Startinginversion1.0.0andpriortoversion2.0.13,OpenAEV'spasswordresetimplementation containsmultiplesecurityweaknessesthattogetherallowreliableaccounttakeover.Theprimaryissueisthat passwordresettokensdonotexpire.Onceatokenisgenerated,itremainsvalidindefinitely,evenifsignificanttime haspassedorifnewertokensareissuedforthesameaccount.Thisallowsanattackertoaccumulatevalidpassword resettokensovertimeandreusethematanypointinthefuturetoresetavictim'spassword.Asecondaryweakness isthatpasswordresettokensareonly8digitslong.Whilean8-digitnumerictokenprovides100,000,000possible combinations(whichissecureenough),theabilitytogeneratelargenumbersofvalidtokensdrasticallyreducesthe requirednumberofattemptstoguessavalidpasswordresettoken.Forexample,ifanattackergenerates2,000valid tokens,thebrute-forceeffortisreducedtoapproximately50,000attempts,whichisatriviallyachievablenumberof requestsforanautomatedattack.(100requestspersecondcanmathematicallyfindavalidpasswordresettokenin CVE-2026-500seconds.)Bycombiningtheseflaws,anattackercanmass-generatevalidpasswordresettokensandthenbrute- 9.0 MoreDetails24467forcethemefficientlyuntilamatchisfound,allowingtheattackertoresetthevictim'spasswordtoavalueoftheir choosing.Theoriginalpasswordisnotrequired,andtheattackcanbeperformedentirelywithoutauthentication.This vulnerabilityenablesfullaccounttakeoverthatleadstoplatformcompromise.Anunauthenticatedremoteattacker canresetthepasswordofanyregistereduseraccountandgaincompleteaccesswithoutauthentication.Because useremailaddressesareexposedtootherusersbydesign,asingleguessedorobservedemailaddressissufficient tocompromiseevenadministratoraccountswithnon-guessableemailaddresses.Thisdesignflawresultsinareliable andscalableaccounttakeovervulnerabilitythataffectsanyregistereduseraccountinthesystem.Note:The vulnerabilitydoesnotrequireOpenAEVtohavetheemailserviceconfigured.Theexploitdoesnotdependonthe targetemailaddresstobearealemailaddress.ItjustneedstoberegisteredtoOpenAEV.Successfulexploitation allowsanunauthenticatedremoteattackertoaccesssensitivedata(suchastheFindingssectionofasimulation), modifypayloadsexecutedbydeployedagentstocompromiseallhostswhereagentsareinstalled(thereforethe Scopeischanged).Usersshouldupgradetoversion2.0.13toreceiveafix. Thymeleafisaserver-sideJavatemplateengineforwebandstandaloneenvironments.Versions3.1.3.RELEASEand priorcontainasecuritybypassvulnerabilityintheexpressionexecutionmechanisms.Althoughthelibraryprovides CVE-2026-mechanismstopreventexpressioninjection,itfailstoproperlyrestrictthescopeofaccessibleobjects,allowing 9.0 MoreDetails40477specificpotentiallysensitiveobjectstobereachedfromwithinatemplate.Ifanapplicationdeveloperpasses unvalidateduserinputdirectlytothetemplateengine,anunauthenticatedremoteattackercanbypassthelibrary's protectionstoachieveServer-SideTemplateInjection(SSTI).Thisissuehasbenfixedinversion3.1.4.RELEASE.
OTHERVULNERABILITIES
CVE Base Description ReferenceNumber Score
AStoredCross-SiteScriptingvulnerabilitywasdiscoveredintheAssetsandNodesfunctionalityduetoimpropervalidationof CVE-aninputparameter.Anauthenticateduserwithcustomfieldsprivilegescandefineamaliciouscustomfieldcontaininga More2025-JavaScriptpayload.WhenthevictimviewstheAssetsorNodespages,theXSSexecutesintheirbrowsercontext,allowingthe 8.9 Details40899attackertoperformunauthorizedactionsasthevictim,suchasmodifyapplicationdata,disruptapplicationavailability,and accesslimitedsensitiveinformation. PostizisanAIsocialmediaschedulingtool.Priortoversion2.21.6,afileuploadvalidationbypassallowsanyauthenticated CVE-usertouploadarbitraryHTML,SVG,orotherexecutablefiletypestotheserverbyspoofingtheContent-Typeheader.The More2026-uploadedfilesarethenservedbynginxwithaContent-Typederivedfromtheiroriginalextension(text/html, 8.9 Details40487image/svg+xml),enablingStoredCross-SiteScripting(XSS)inthecontextoftheapplication'sorigin.Thiscanleadto sessionriding,accounttakeover,andfullcompromiseofotherusers'accounts.Version2.21.6containsafix. DataEaseisanopen-sourcedatavisualizationandanalyticsplatform.Versions2.10.20andbelowshipthelegacyvelocity- 1.7.jar,whichpullsincommons-collections-3.2.1.jarcontainingtheInvokerTransformerdeserializationgadgetchain.Quartz 2.3.2,alsobundledintheapplication,deserializesjobdataBLOBsfromtheqrtzjobdetailstableusingObjectInputStreamCVE-withnodeserializationfilterorclassallowlist.AnauthenticatedattackerwhocanwritetotheQuartzjobtable,suchas More2026- 8.8throughthepreviouslydescribedSQLinjectioninpreviewSql,canreplaceascheduledjob'sJOBDATAwithamalicious Details40901CommonsCollections6gadgetchainpayload.WhentheQuartzcrontriggerfires,thepayloadisdeserializedandexecutes arbitrarycommandsasrootinsidethecontainer,achievingfullremotecodeexecution.Thisissuehasbeenfixedinversion 2.10.21. CVE-UseafterfreeinPrerenderinGoogleChromepriorto147.0.7727.101allowedaremoteattackertoexecutearbitrarycodevia More2026- 8.8acraftedHTMLpage.(Chromiumsecurityseverity:Critical) Details6299 EmissaryisaP2Pbaseddata-drivenworkflowengine.Inversions8.42.0andbelow,Executrix.getCommand()isvulnerableto OScommandinjectionbecauseitinterpolatestemporaryfilepathsintoa/bin/sh-cshellcommandstringwithoutany escapingorinputvalidation.TheINFILEENDINGandOUTFILE_ENDINGconfigurationkeysflowdirectlyintothesepaths, CVE-allowingaplaceauthorwhocanwriteormodifya.cfgfiletoinjectarbitraryshellmetacharactersthatexecuteOScommands More2026-intheJVMprocess'ssecuritycontext.TheframeworkalreadysanitizesplaceNameviaanallowlistbeforeembeddingitinthe 8.8 Details35582sameshellstring,butappliesnoequivalentsanitizationtofileendingvalues.Noruntimeprivilegesbeyondplace configurationauthorship,andnoAPIornetworkaccess,arerequiredtoexploitthisvulnerability.Thisisaframework-level defectwithnosafemitigationavailabletodownstreamimplementors,asExecutrixprovidesneitherescapingnor documentedpreconditionsagainstmetacharactersinfileendinginputs.Thisissuehasbeenfixedinversion8.43.0.
CVE- usercanaccesstheuser-managementendpoints/settings/usersandusethemtoenumerateallusersandcreateanew More administratoraccount.Thishappensbecausetheroutedefinitionsdonotenforceadmin-onlymiddleware,andthecontroller- 8.8 Details40350 levelauthorizationcheckusesabrokenbooleancondition.Asaresult,anyuserwithavalidwebsessioncookiecanreach functionalitythatshouldberestrictedtoadministrators.Version0.71.1patchestheissue.
KissFFTbeforecommit8a8e66econtainsanintegeroverflowvulnerabilityinthekissfftndralloc()functioninkissfftndr.cCVE- MorewheretheallocationsizecalculationdimOther(dimReal+2)sizeof(kissfftscalar)overflowssigned32-bitintegerarithmetic 8.8 Detailsbeforebeingwidenedtosizet,causingmalloc()toallocateanundersizedbuffer.Attackerscantriggerheapbufferoverflow41445 byprovidingcrafteddimensionsthatcausethemultiplicationtoexceedINTMAX,allowingwritesbeyondtheallocatedbuffer regionwhenkissfftndr()processesthedata. CVE-InproductsoftheMSE6product-familybyFestoaremoteauthenticated,lowprivilegedattackercouldusefunctionsof More2023- 8.8undocumentedtestmodewhichcouldleadtoacompletelossofconfidentiality,integrityandavailability. Details3634 CVE-SD-330ACandAMCManagerprovidedbysilextechnology,Inc.containastack-basedbufferoverflowvulnerabilityin More2026- 8.8processingtheredirectURLs.Arbitrarycodemaybeexecutedonthedevice. Details32955 CVE-Weblateisawebbasedlocalizationtool.Inversionspriorto5.17,theuserpatchingAPIendpointdidn'tproperlylimitthe More2026- 8.8scopeofedits.Thisissuehasbeenfixedinversion5.17. Details34393 VvvebCMS1.0.8containsaremotecodeexecutionvulnerabilityinitsmediauploadhandlerthatallowsauthenticatedCVE-attackerstoexecutearbitraryoperatingsystemcommandsbyuploadingaPHPwebshellwitha.phtmlextension.Attackers More2026- 8.8canbypasstheextensiondeny-listanduploadmaliciousfilestothepubliclyaccessiblemediadirectory,thenrequestthefile Details6249overHTTPtoachievefullservercompromise. CVE-usercanescalatetheirownaccounttoadministratorbysendingisAdmin=truetoPUT/settings/users/{userId}fortheir More2026- 8.8ownuserID.Theendpointisintendedtoletauseredittheirownprofile,butitupdatesthesensitiveisAdminfieldwithout Details40349anyadmin-onlyauthorizationcheck.Version0.71.1patchestheissue. CVE-InOpenXiangShanNEMU,whenSmstateenisenabled,clearingmstateen0.ENVCFGdoesnotcorrectlyrestrictaccessto More2026-henvcfgandsenvcfg.Asaresult,less-privilegedcodemayreadorwritetheseCSRswithouttherequiredexception, 8.8 Details29648potentiallybypassingintendedstate-enablebasedisolationcontrolsinvirtualizedormulti-privilegeenvironments. CVE-PAC4JisvulnerabletoLDAPInjectioninmultiplemethods.Alow-privilegedremoteattackercaninjectcraftedLDAPsyntax More2026-intoID-basedsearchparameters,potentiallyresultinginunauthorizedLDAPqueriesandarbitrarydirectoryoperations.This 8.8 Details40459issuewasfixedinPAC4Jversions4.5.10,5.7.10and6.4.1 CVE-AvulnerabilitywasdeterminedinTendaF4511.0.0.7cnsvn7958.ImpactedisthefunctionfromwebExcptypemanFilterof More2026-thefile/goform/webExcptypemanFilterofthecomponenthttpd.Executingamanipulationoftheargumentpagecanleadto 8.8 Details6631bufferoverflow.Theattackmaybelaunchedremotely.Theexploithasbeenpubliclydisclosedandmaybeutilized. CVE-AvulnerabilitywasfoundinTendaF4511.0.0.7cnsvn7958.ThisissueaffectsthefunctionfromGstDhcpSetSerofthefile More2026-/goform/GstDhcpSetSerofthecomponenthttpd.Performingamanipulationoftheargumentdipsresultsinbufferoverflow. 8.8 Details6630Theattackmaybeinitiatedremotely.Theexploithasbeenmadepublicandcouldbeused. IntheWebsitemoduleofDolibarrERP&CRM22.0.4andbelow,theapplicationusesblacklist-basedfilteringtorestrictCVE-dangerousPHPfunctionsrelatedtosystemcommandexecution.AnauthenticateduserwithpermissiontoeditPHPcontent More2026- 8.8canbypassthisfiltering,resultinginfullremotecodeexecutionwiththeabilitytoexecutearbitraryoperatingsystem Details31019commandsontheserver. CVE-InDolibarrERP&CRM<=22.0.4,PHPcodedetectionandeditingpermissionenforcementintheWebsitemoduleisnot More2026-appliedconsistentlytoallinputparameters,allowinganauthenticateduserrestrictedtoHTML/JavaScripteditingtoinjectPHP 8.8 Details31018codethroughunprotectedinputsduringwebsitepagecreation. TheAcyMailingpluginforWordPressisvulnerabletoprivilegeescalationinallversionsFrom9.11.0upto,andincluding, CVE-10.8.1duetoamissingcapabilitycheckonthewp_ajax_acymailing_routerAJAXhandler.Thismakesitpossiblefor More2026-authenticatedattackers,withSubscriber-levelaccessandabove,toaccessadmin-onlycontrollers(includingconfiguration 8.8 Details3614management),enabletheautologinfeature,createamaliciousnewslettersubscriberwithaninjectedcms_idpointingto anyWordPressuser,andthenusetheautologinURLtoauthenticateasthatuser,includingadministrators. FastGPTisanAIAgentbuildingplatform.Inversionspriorto4.14.9.5,thepasswordchangeendpointisvulnerabletoNoSQL CVE-injection.Anauthenticatedattackercanbypassthe"oldpassword"verificationbyinjectingMongoDBqueryoperators.This More2026-allowsanattackerwhohasgainedalow-privilegedsessiontochangethepasswordoftheiraccount(orothersifcombined 8.8 Details40352withIDmanipulation)withoutknowingthecurrentone,leadingtofullaccounttakeoverandpersistence.Thisissuehasbeen fixedinversion4.14.9.5. CVE-OpenClawbefore2026.3.28containsanauthorizationbypassvulnerabilityinDiscordtextapprovalcommandsthatallows More2026-non-approverstoresolvependingexecapprovals.AttackerscansendDiscordtextcommandstobypassthe 8.8 Details41303channels.discord.execApprovals.approversallowlistandapprovependinghostexecutionrequests. TheLivemeshAddonsforElementorpluginforWordPressisvulnerabletoLocalFileInclusioninallversionsupto,and including,9.0.Thisisduetoinsufficientsanitizationofthetemplatenameparameterinthelae_get_template_part()CVE-function,whichusesaninadequatestr_replace()approachthatcanbebypassedusingrecursivedirectorytraversal More2026- 8.8patterns.Thismakesitpossibleforauthenticatedattackers,withContributor-levelaccessandabove,toincludeandexecute Details1620arbitraryfilesontheserver,allowingtheattackertoincludeandexecutelocalfilesviathewidget'stemplateparameter grantedtheycantrickanadministratorintoperforminganactionorinstallElementor. AvulnerabilitywasdetectedinH3CMagicB1upto100R004.AffectedbythisvulnerabilityisthefunctionCVE-SetMobileAPInfoByIdofthefile/goform/aspForm.Performingamanipulationoftheargumentparamresultsinbufferoverflow. More 8.8Remoteexploitationoftheattackispossible.Theexploitisnowpublicandmaybeused.Thevendorwascontactedearly Details
Nekoisaaself-hostedvirtualbrowserthatrunsinDockerandusesWebRTCInversions3.0.0through3.0.10and3.1.0
through3.1.1,anyauthenticatedusercanimmediatelyobtainfulladministrativecontroloftheentireNekoinstance(member management,roomsettings,broadcastcontrol,sessiontermination,etc.).Thisresultsinacompletecompromiseofthe instance.Thevulnerabilityhasbeenpatchedinv3.0.11andv3.1.2.Ifupgradingisnotimmediatelypossible,thefollowingCVE-mitigationscanreducerisk:Restrictaccesstotrustedusersonly(avoidgrantingaccountstountrustedparties);ensureall More 8.8userpasswordsarestrongandonlysharedwithtrustedindividuals;runtheinstanceonlywhenneeded;avoidleavingit Details39386continuouslyexposed;placetheinstancebehindauthenticationlayerssuchasareverseproxywithadditionalaccess controls;disableorrestrictaccesstothe/api/profileendpointiffeasible;and/ormonitorforsuspiciousprivilegechangesor unexpectedadministrativeactions.Notethatthesearetemporarymitigationsanddonotfullyeliminatethevulnerability. Upgradingisstronglyrecommended. WeGIAisawebmanagerforcharitableinstitutions.Versionspriorto3.6.10containaSQLinjectionvulnerabilityin CVE-dao/memorando/UsuarioDAO.php.ThecpfusuarioPOSTparameteroverwritesthesession-storeduseridentityvia More2026-extract($REQUEST)inDespachoControle::verificarDespacho(),andtheattacker-controlledvalueistheninterpolateddirectly 8.8 Details40285intoarawSQLquery,allowinganyauthenticatedusertoquerythedatabaseunderanarbitraryidentity.Version3.6.10fixes theissue. CVE-AvulnerabilitywasidentifiedinTendaF4511.0.0.7cnsvn7958.TheaffectedelementisthefunctionfromSafeClientFilterof More2026-thefile/goform/SafeClientFilterofthecomponenthttpd.Themanipulationoftheargumentmenufacturer/Goleadstobuffer 8.8 Details6632overflow.Remoteexploitationoftheattackispossible.Theexploitispubliclyavailableandmightbeused. CVE-UseafterfreeinCSSinGoogleChromepriorto147.0.7727.101allowedaremoteattackertoexecutearbitrarycodeinsidea More2026- 8.8sandboxviaacraftedHTMLpage.(Chromiumsecurityseverity:High) Details6300 CVE-TypeConfusioninTurbofaninGoogleChromepriorto147.0.7727.101allowedaremoteattackertoexecutearbitrarycode More2026- 8.8insideasandboxviaacraftedHTMLpage.(Chromiumsecurityseverity:High) Details6301 CVE-UseafterfreeinFileSysteminGoogleChromepriorto147.0.7727.101allowedaremoteattackertopotentiallyexploitobject More2026- 8.8corruptionviaacraftedHTMLpage.(Chromiumsecurityseverity:High) Details6360 OpenHarnesspriortocommitdd1d235containsacommandinjectionvulnerabilitythatallowsremotegatewayuserswith CVE-chataccesstoinvokesensitiveadministrativecommandsbyexploitinginsufficientdistinctionbetweenlocal-onlyandremote- More2026-safecommandsinthegatewayhandler.Attackerscanexecuteadministrativecommandssuchas/permissionsfullauto 8.8 Details40502throughremotechatsessionstochangepermissionmodesofarunningOpenHarnessinstancewithoutoperator authorization. CVE-releaseversions7.13.1.0through7.13.1.60containamissingauthenticationforcriticalfunctionvulnerability.An More2026- 8.8unauthenticatedattackerwithremoteaccesscouldpotentiallyexploitthisvulnerability,leadingtoarbitrarycommand Details26944executionwithrootprivileges.Exploitationrequiresanauthenticatedusertoperformaspecificaction. CVE-Vvvebpriorto1.0.8.1containsaprivilegeescalationvulnerabilityintheadminuserprofilesaveendpointthatallows More2026-authenticateduserstomodifyprivilegedfieldsontheirownprofile.Attackerscaninjectroleid=1intoprofilesaverequests 8.8 Details34427toescalatetoSuperAdministratorprivileges,enablingpluginuploadfunctionalityforremotecodeexecution. OWASPBLTisaQAtestingandvulnerabilitydisclosureplatformthatencompasseswebsites,apps,gitrepositories,andmore. Versionspriorto2.1.1containanRCEvulnerabilityinthe.github/workflows/regenerate-migrations.ymlworkflow.The workflowusesthepullrequesttargettriggertorunwithfullGITHUBTOKENwritepermissions,copiesattacker-controlled filesfromuntrustedpullrequestsintothetrustedrunnerworkspaceviagitshow,andthenexecutespythonmanage.pyCVE-makemigrations,whichimportsDjangomodelmodulesincludingattacker-controlledwebsite/models.pyatruntime.Any More2026- 8.8module-levelPythoncodeintheattacker'smodels.pyisexecutedduringimport,enablingarbitrarycodeexecutioninthe Details40316privilegedCIenvironmentwithaccesstoGITHUBTOKENandrepositorysecrets.Theattackistriggerablebyanyexternal contributorwhocanopenapullrequest,providedamaintainerappliestheregenerate-migrationslabel,potentiallyleadingto secretexfiltration,repositorycompromise,andsupplychainattacks.Apatchforthisissueisexpectedtobereleasedin version2.1.1. AsecurityvulnerabilityhasbeendetectedinH3CMagicB0upto100R002.ThisvulnerabilityaffectsthefunctionCVE-Edit_BasicSSIDofthefile/goform/aspForm.Suchmanipulationoftheargumentparamleadstobufferoverflow.Theattack More2026- 8.8canbeexecutedremotely.Theexploithasbeendisclosedpubliclyandmaybeused.Thevendorwascontactedearlyabout Details6560 HKUDSOpenHarnesspriortoPR#156remediationexposespluginlifecyclecommandsincluding/plugininstall,/pluginCVE-enable,/plugindisable,and/reload-pluginstoremotesendersbydefault.Attackerswhogainaccessthroughthechannel More2026- 8.8layercanremotelymanageplugintrustandactivationstate,enablingunauthorizedplugininstallationandactivationonthe Details6819system. ComposerisadependencymanagerforPHP.Versions1.0through2.2.26and2.3through2.9.5containacommandinjection vulnerabilityinthePerforce::syncCodeBase()method,whichappendsthe$sourceReferenceparametertoashellcommand withoutproperescaping,andadditionallyinthePerforce::generateP4Command()methodasinGHSA-wg36-wvj6-r67p/CVE- 2026-40176,whichinterpolatesuser-suppliedPerforceconnectionparameters(port,user,client)fromthesourceurlfield withoutproperescaping.Anattackercaninjectarbitrarycommandsthroughcraftedsourcereferenceorsourceurlvalues CVE-containingshellmetacharacters,evenifPerforceisnotinstalled.UnlikeCVE-2026-40176,thesourcereferenceandurlare More2026- 8.8providedaspartofpackagemetadata,meaninganycompromisedormaliciousComposerrepositorycanservepackage Details40261metadatadeclaringperforceasasourcetypewithmaliciousvalues.Thisvulnerabilityisexploitablewheninstallingor updatingdependenciesfromsource,includingthedefaultbehaviorwheninstallingdev-prefixedversions.Thisissuehasbeen fixedinComposer2.2.27(2.2LTS)and2.9.6(mainline).Ifdevelopersareunabletoimmediatelyupdate,theycanavoid installingdependenciesfromsourcebyusing--prefer-distorthepreferred-install:distconfigsetting,andonlyusetrusted Composerrepositoriesasaworkaround.
CVE- AnexampleofBashOperatorinAirflowdocumentationsuggestedawayofpassingdagrun.confinthewaythatcouldcause More unsanitizeduserinputtobeusedtoescalateprivilegesofUIusertoallowexecutecodeonworker.Usersshouldreviewifany 8.8 Details30898 oftheirownDAGshaveadoptedthisincorrectadvice. TheCMP-ComingSoon&MaintenancePluginbyNiteoThemespluginforWordPressisvulnerabletoarbitraryfileuploadand remotecodeexecutioninallversionsupto,andincluding,4.1.16viathe`cmpthemeupdateinstallAJAXaction.Thisisdue tothefunctiononlycheckingforthepublishpagescapability(availabletoEditorsandabove)insteadofmanageoptionsCVE- (Administratorsonly),combinedwithalackofpropervalidationontheuser-suppliedfileURLandnoverificationofthe More2026- 8.8 downloadedfile'scontentbeforeextraction.Thismakesitpossibleforauthenticatedattackers,withAdministrator-level Details6518 accessandabove,toforcetheservertodownloadandextractamaliciousZIPfilefromaremoteattacker-controlledURLinto aweb-accessibledirectory(wp-content/plugins/cmp-premium-themes/`),resultinginremotecodeexecution.Duetothelack ofanonceforEditors,theyareunabletoexploitthisvulnerability. CVE- TypeConfusioninV8inGoogleChromepriorto147.0.7727.101allowedaremoteattackertopotentiallyperformoutof More2026- 8.8 boundsmemoryaccessviaacraftedHTMLpage.(Chromiumsecurityseverity:Medium) Details6363 CVE- UseafterfreeinVideoinGoogleChromeonWindowspriorto147.0.7727.101allowedaremoteattackerwhohad More2026- compromisedtherendererprocesstoperformoutofboundsmemoryaccessviaacraftedHTMLpage.(Chromiumsecurity 8.8 Details6359 severity:High) CVE- UseafterfreeinVideoinGoogleChromepriorto147.0.7727.101allowedaremoteattackertoexecutearbitrarycodeinside More2026- 8.8 asandboxviaacraftedHTMLpage.(Chromiumsecurityseverity:High) Details6302 CVE- UseafterfreeinXRinGoogleChromeonAndroidpriorto147.0.7727.101allowedaremoteattackertoperformanoutof More2026- 8.8 boundsmemoryreadviaacraftedHTMLpage.(Chromiumsecurityseverity:Critical) Details6358 CVE- WinMatrixagentdevelopedbySimoproTechnologyhasaMissingAuthenticationvulnerability,allowingauthenticatedlocal More2026- attackerstoexecutearbitrarycodewithSYSTEMprivilegesonthelocalmachineaswellasonallhostswithinthe 8.8 Details6348 environmentwheretheagentisinstalled. CVE- UseafterfreeinCodecsinGoogleChromepriorto147.0.7727.101allowedaremoteattackertoexecutearbitrarycodeinside More2026- 8.8 asandboxviaacraftedHTMLpage.(Chromiumsecurityseverity:Medium) Details6318 CVE- UseafterfreeinCastinGoogleChromepriorto147.0.7727.101allowedaremoteattackertoexecutearbitrarycodeviaa More2026- 8.8 craftedHTMLpage.(Chromiumsecurityseverity:High) Details6317 CVE- UseafterfreeinFormsinGoogleChromepriorto147.0.7727.101allowedaremoteattackertoexecutearbitrarycodeinside More2026- 8.8 asandboxviaacraftedHTMLpage.(Chromiumsecurityseverity:High) Details6316 CVE- UseafterfreeinPermissionsinGoogleChromeonAndroidpriorto147.0.7727.101allowedaremoteattackerwhoconvinced More2026- ausertoengageinspecificUIgesturestoexecutearbitrarycodeviaacraftedHTMLpage.(Chromiumsecurityseverity: 8.8 Details6315 High) CVE- TypeConfusioninTurbofaninGoogleChromepriorto147.0.7727.101allowedaremoteattackertoexecutearbitrarycode More2026- 8.8 insideasandboxviaacraftedHTMLpage.(Chromiumsecurityseverity:High) Details6307 CVE- HeapbufferoverflowinPDFiuminGoogleChromepriorto147.0.7727.101allowedaremoteattackertoexecutearbitrary More2026- 8.8 codeinsideasandboxviaacraftedPDFfile.(Chromiumsecurityseverity:High) Details6306 CVE- HeapbufferoverflowinPDFiuminGoogleChromepriorto147.0.7727.101allowedaremoteattackertoexecutearbitrary More2026- 8.8 codeinsideasandboxviaacraftedPDFfile.(Chromiumsecurityseverity:High) Details6305 CVE- UseafterfreeinCodecsinGoogleChromepriorto147.0.7727.101allowedaremoteattackertoexecutearbitrarycodeinside More2026- 8.8 asandboxviaacraftedHTMLpage.(Chromiumsecurityseverity:High) Details6303 TheWPCustomerAreapluginforWordPressisvulnerabletoarbitraryfilereadanddeletionduetoinsufficientfilepath CVE- validationinthe'ajaxattachfile'functioninallversionsupto,andincluding,8.3.4.Thismakesitpossibleforauthenticated More2026- attackerswitharolethatanadministratorgrantsaccessto(e.g.,Subscriber)totoreadthecontentsofarbitraryfilesonthe 8.8 Details3464 server,whichcancontainsensitiveinformation,ordeletearbitraryfilesontheserver,whichcaneasilyleadtoremotecode executionwhentherightfileisdeleted(suchaswp-config.php). AvulnerabilityhasbeenfoundinH3CMagicB1upto100R004.TheaffectedelementisthefunctionSetAPWifiorLedInfoByIdCVE- ofthefile/goform/aspForm.Themanipulationoftheargumentparamleadstobufferoverflow.Itispossibletoinitiatethe More2026- 8.8 attackremotely.Theexploithasbeendisclosedtothepublicandmaybeused.Thevendorwascontactedearlyaboutthis Details6563 DataEaseisanopen-sourcedatavisualizationandanalyticsplatform.Versions2.10.20andbelowcontainaSQLinjection vulnerabilityintheAPIdatasourcesavingprocess.ThedeTableNamefieldfromtheBase64-encodeddatasourceconfiguration CVE- isusedtoconstructaDDLstatementviasimplestringreplacementwithoutanysanitizationorescapingofthetablename. More 8.8 AnauthenticatedattackercaninjectarbitrarySQLcommandsbycraftingadeTableNamethatbreaksoutofidentifier Details33121 quoting,enablingerror-basedSQLinjectionthatcanextractdatabaseinformationsuchastheMySQLversion.Thisissuehas
beenfixedinversion2.10.21. DataEaseisanopen-sourcedatavisualizationandanalyticsplatform.Versions2.10.20andbelowcontainaSQLinjection vulnerabilityinthesortparameterofthe/de2api/datasetData/enumValueObjendpoint.TheDatasetDataManageservicelayerCVE-directlytransferstheuser-suppliedsortvaluetothesortingmetadataDTO,whichispassedtoOrder2SQLObjwhereitis More 8.8incorporatedintotheSQLORDERBYclausewithoutanywhitelistvalidation,andthenexecutedviaCalciteProvider.An Details33084authenticatedattackercaninjectarbitrarySQLcommandsthroughthesortparameter,enablingtime-basedblindSQL injection.Thisissuehasbeenfixedinversion2.10.21. DataEaseisanopen-sourcedatavisualizationandanalyticsplatform.Versions2.10.20andbelowcontainaSQLinjection vulnerabilityintheorderDirectionparameterusedindataset-relatedendpointsincluding/de2api/datasetData/enumValueDs CVE-and/de2api/datasetTree/exportDataset.TheOrder2SQLObjclassdirectlyassignstherawuser-suppliedorderDirectionvalue More2026-intotheSQLquerywithoutanyvalidationorwhitelistenforcement,andthevalueisrenderedintotheORDERBYclausevia 8.8 Details33083StringTemplatebeforebeingexecutedagainstthedatabase.AnauthenticatedattackercaninjectarbitrarySQLcommands throughthesortingdirectionfield,enablingtime-basedblinddataextractionanddenialofservice.Thisissuehasbeenfixed inversion2.10.21. TheLoginasUserpluginforWordPressisvulnerabletoPrivilegeEscalationinallversionsupto,andincluding,1.0.3.Thisis duetothehandlereturntoadmin()functiontrustingaclient-controlledcookie(oclauporiginaladmin)todeterminewhichCVE-usertoauthenticateas,withoutanyserver-sideverificationthatthecookievaluewaslegitimatelysetduringanadmin- More2026- 8.8initiateduserswitch.Thismakesitpossibleforauthenticatedattackers,withSubscriber-levelaccessandabove,toescalate Details5617theirprivilegestoadministratorbysettingtheoclauporiginaladmincookietoanadministrator'suserIDandtriggeringthe "ReturntoAdmin"functionality. xrdpisanopensourceRDPserver.Inversionsthrough0.10.5,thesessionexecutioncomponentdidnotproperlyhandleanCVE-errorduringtheprivilegedropprocess.Thisimproperprivilegemanagementcouldallowanauthenticatedlocalattackerto More2026- 8.8escalateprivilegestorootandexecutearbitrarycodeonthesystem.Anadditionalexploitwouldbeneededtofacilitatethis. Details32107Thisissuehasbeenfixedinversion0.10.6. CVE-PrivilegeescalationintheDebuggercomponent.ThisvulnerabilitywasfixedinFirefox150,FirefoxESR140.10,Thunderbird More2026- 8.8 Details6769 CVE-AnvizCX2LiteandCX7arevulnerabletounverifiedupdatepackagesthatcanbeuploaded.Thedeviceunpacksand More2026- 8.8executesascriptresultinginunauthenticatedremotecodeexecution. Details40066 DataEaseisanopen-sourcedatavisualizationandanalyticsplatform.Versions2.10.20andbelowcontainaSQLinjection vulnerabilityinthe/datasource/getTableFieldendpoint.ThegetTableFiledSqlmethodinCalciteProvider.javaincorporatesthe CVE-tableNameparameterdirectlyintoSQLquerystringsusingString.formatwithoutparameterizationorsanitization.Although More2026-DatasourceServer.javavalidatesthatthetablenameexistsinthedatasource,anattackercanbypassthisbyfirstregistering 8.8 Details33207anAPIdatasourcewithamaliciousdeTableName,whichisthenreturnedbygetTablesandpassesthevalidationcheck.An authenticatedattackercanexecutearbitrarySQLcommands,enablingerror-basedextractionofsensitivedatabase information.Thisissuehasbeenfixedinversion2.10.21. CVE-AnvizCX2Liteisvulnerabletoanauthenticatedcommandinjectionviaafilenameparameterthatenablesarbitrary More2026- 8.8commandexecution(e.g.,startingtelnetd),resultinginroot‑levelaccess. Details35682 DataEaseisanopen-sourcedatavisualizationandanalyticsplatform.Versions2.10.20andbelowcontainaSQLinjection vulnerabilityinthe/de2api/datasetData/previewSqlendpoint.Theuser-suppliedSQLiswrappedinasubquerywithout CVE-validationthattheinputisasingleSELECTstatement.CombinedwiththeJDBCblocklistbypassthatallowsenabling More2026-allowMultiQueries=true,anattackercanbreakoutofthesubqueryandexecutearbitrarystackedSQLstatements,including 8.8 Details40900UPDATEandotherwriteoperations,againsttheconnecteddatabase.Anauthenticatedattackerwithaccesstovalid datasourcecredentialscanachievefullreadandwriteaccesstotheunderlyingdatabase.Thisissuehasbeenfixedinversion 2.10.21. Let'sEncryptclientandACMElibrarywritteninGo(Lego).Priorto4.34.0,thewebrootHTTP-01challengeproviderinlegoisCVE-vulnerabletoarbitraryfilewriteanddeletionviapathtraversal.AmaliciousACMEservercansupplyacraftedchallenge More2026- 8.8tokencontaining../sequences,causinglegotowriteattacker-influencedcontenttoanypathwritablebythelegoprocess. Details40611Thisvulnerabilityisfixedin4.34.0. TheCareerSectionpluginforWordPressisvulnerabletoCross-SiteRequestForgeryleadingtoPathTraversalandArbitrary CVE-FileDeletioninallversionsupto,andincluding,1.6.Thisisduetomissingnoncevalidationandinsufficientfilepath More2025-validationonthedeleteactioninthe'appformoptionspagehtml'function.Thismakesitpossibleforunauthenticated 8.8 Details14868attackerstodeletearbitraryfilesontheserverviaaforgedrequest,grantedtheycantrickasiteadministratorinto
CVE- ThreatSonarAnti-RansomwaredevelopedbyTeamT5hasanPrivilegeEscalationvulnerability.Authenticatedremote More2026- 8.8 attackerswithshellaccesscaninjectOScommandsandexecutethemwithrootprivileges. Details5967 CVE- PrivilegeescalationintheNetworkingcomponent.ThisvulnerabilitywasfixedinFirefox150,FirefoxESR140.10,Thunderbird More2026- 8.8 Details6761 CVE- PrivilegeescalationintheGraphics:WebRendercomponent.ThisvulnerabilitywasfixedinFirefox150,FirefoxESR115.35, More 8.8 FirefoxESR140.10,Thunderbird150,andThunderbird140.10. Details
VulnerabilityintheOracleHTTPServerproductofOracleFusionMiddleware(component:Core).Supportedversionsthatare
affectedare12.2.1.4.0and14.1.2.0.0.Difficulttoexploitvulnerabilityallowsunauthenticatedattackerwithnetworkaccess CVE-viaHTTPtocompromiseOracleHTTPServer.WhilethevulnerabilityisinOracleHTTPServer,attacksmaysignificantly More 8.7impactadditionalproducts(scopechange).Successfulattacksofthisvulnerabilitycanresultinunauthorizedcreation, Details34291deletionormodificationaccesstocriticaldataorallOracleHTTPServeraccessibledataaswellasunauthorizedaccessto criticaldataorcompleteaccesstoallOracleHTTPServeraccessibledata.CVSS3.1BaseScore8.7(Confidentialityand Integrityimpacts).CVSSVector:(CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N). WWBNAVideoisanopensourcevideoplatform.Inversions29.0andprior,thelocalesaveendpoint(locale/save.php) constructsafilepathbydirectlyconcatenating$_POST['flag']intothepathatline30withoutanysanitization.TheCVE-$_POST['code']parameteristhenwrittenverbatimtothatpathviafwrite()atline40.Anadminattacker(oranyuserwho More2026- 8.7canCSRFanadmin,sincenoCSRFtokenischeckedandcookiesuseSameSite=None)cantraverseoutofthelocale/ Details40909directoryandwritearbitrary.phpfilestoanywritablelocationonthefilesystem,achievingRemoteCodeExecution. Commit57f89ffbc27d37c9d9dd727212334846e78ac21afixestheissue. NoteMarkisanopen-sourcenote-takingapplication.Inversions0.19.1andprior,theassetdeliveryhandlerservesuploaded filesinlineandreliesonmagic-bytedetectionforcontenttype,whichdoesnotidentifytext-basedformatssuchasHTML, CVE-SVG,orXHTML.ThesefilesareservedwithanemptyContent-Type,noX-Content-Type-Options:nosniffheader,andinline More2026-disposition,allowingbrowserstosniffandrenderactivecontent.AnauthenticatedusercanuploadanHTMLorSVGfile 8.7 Details40262containingJavaScriptasanoteasset,andwhenavictimnavigatestotheassetURL,thescriptexecutesunderthe application'soriginwithaccesstothevictim'sauthenticatedsessionandAPIactions.Thisissuehasbeenfixedinversion 0.19.2. ApostropheCMSisanopen-sourceNode.jscontentmanagementsystem.Versions4.28.0andpriorcontainastoredcross-site scriptingvulnerabilityinSEO-relatedfields(SEOTitleandMetaDescription),whereuser-controlledinputisrenderedwithout CVE-properoutputencodingintoHTMLcontextsincluding
tags,attributes,andJSON-LDstructureddata.An More2026-attackercaninjectapayloadsuchas"> tobreakoutoftheintendedHTMLcontextand 8.7 Details35569executearbitraryJavaScriptinthebrowserofanyauthenticateduserwhoviewstheaffectedpage.Thiscanbeleveragedto performauthenticatedAPIrequests,accesssensitivedatasuchasusernames,emailaddresses,androlesviainternalAPIs, andexfiltrateittoanattacker-controlledserver.Thisissuehasbeenfixedinversion4.29.0. CVE-SlahCMSv1.5.0andbelowwasdiscoveredtocontainaSQLinjectionvulnerabilityviatheidparameterinthe More2026- 8.6vereador_ver.phpendpoint. Details30995 CVE-OpenClawbefore2026.3.28loadsthecurrentworkingdirectory.envfilebeforetrustedstate-dirconfiguration,allowing More2026-environmentvariableinjection.Attackerscanplaceamalicious.envfileinarepositoryorworkspacetooverrideruntime 8.6 Details41294configurationandsecurity-sensitiveenvironmentsettingsduringOpenClawstartup. CloudFoundryUUAisvulnerabletoabypassthatallowsanattackertoobtainatokenforanyuserandgainaccesstoUAA-CVE-protectedsystems.ThisvulnerabilityexistswhenSAML2.0bearerassertionsareenabledforaclient,astheUAAaccepts More2026- 8.6SAML2.0bearerassertionsthatareneithersignednorencrypted.ThisissueaffectsUUAfromv77.30.0tov78.7.0 Details22734(inclusive)anditaffectsCFDeploymentfromv48.7.0tov54.14.0(inclusive). WWBNAVideoisanopensourcevideoplatform.Inversions29.0andbelow,anincompleteSSRFfixinAVideo'sLiveLinksCVE-proxyaddsisSSRFSafeURL()validationbutleavesDNSTOCTOUvulnerabilitieswhereDNSrebindingbetweenvalidationand More2026- 8.6theactualHTTPrequestredirectstraffictointernalendpoints.Commit8d8fc0cadb425835b4861036d589abcea4d78ee8 Details41055containsanupdatedfix. LangChain-ChatChat0.3.1containsaremotecodeexecutionvulnerabilityinitsMCPSTDIOserverconfigurationand CVE-executionhandling.AremoteattackercanaccessthepubliclyexposedMCPmanagementinterfaceandconfigureanMCP More2026-STDIOserverwithattacker-controlledcommandsandarguments.WhentheMCPserverisstartedandMCPisenabledfor 8.6 Details30617agentexecution,subsequentagentactivitytriggersexecutionofarbitrarycommandsontheserver.Successfulexploitation allowsarbitrarycommandexecutionwithinthecontextoftheLangChain-ChatChatservice. AgentZero0.9.8containsaremotecodeexecutionvulnerabilityinitsExternalMCPServersconfigurationfeature.The CVE-applicationallowsuserstodefineMCPserversusingaJSONconfigurationcontainingarbitrarycommandandargsvalues. More2026-Thesevaluesareexecutedbytheapplicationwhentheconfigurationisappliedwithoutsufficientvalidationorrestriction.An 8.6 Details30624attackermaysupplyamaliciousMCPconfigurationtoexecutearbitraryoperatingsystemcommands,potentiallyresultingin remotecodeexecutionwiththeprivilegesoftheAgentZeroprocess. SiYuanisanopen-sourcepersonalknowledgemanagementsystem.Inversions3.6.3andprior,the CVE-/api/av/removeUnusedAttributeViewendpointconstructsafilesystempathusingtheuser-controlledidparameterwithout More2026-validationorpathboundaryenforcement.Anattackercaninjectpathtraversalsequencessuchas../intotheidvalueto 8.5 Details40318escapetheintendeddirectoryanddeletearbitrary.jsonfilesontheserver,includingglobalconfigurationfilesandworkspace metadata.Thisissuehasbeenfixedinversion3.6.4. VulnerabilityintheOracleLifeSciencesEmpiricaSignalproductofOracleLifeScienceApplications(component:Common Core).Supportedversionsthatareaffectedare9.2.1-9.2.3.Easilyexploitablevulnerabilityallowslowprivilegedattackerwith CVE-networkaccessviaHTTPtocompromiseOracleLifeSciencesEmpiricaSignal.WhilethevulnerabilityisinOracleLifeSciences More2026-EmpiricaSignal,attacksmaysignificantlyimpactadditionalproducts(scopechange).Successfulattacksofthisvulnerability 8.5 Details21997canresultinunauthorizedcreation,deletionormodificationaccesstocriticaldataorallOracleLifeSciencesEmpiricaSignal accessibledataaswellasunauthorizedreadaccesstoasubsetofOracleLifeSciencesEmpiricaSignalaccessibledata.CVSS 3.1BaseScore8.5(ConfidentialityandIntegrityimpacts).CVSSVector:(CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:N). FreeScoutisafreeself-hostedhelpdeskandsharedmailbox.Versionspriorto1.8.213haveastoredcross-sitescripting (XSS)vulnerabilityinthemailboxsignaturefeature.ThesanitizationfunctionHelper::stripDangerousTags() (app/Misc/Helper.php:568)usesanincompleteblocklistofonlyfourHTMLtags(script,form,iframe,object)and doesnotremoveeventhandlerattributes.WhenamailboxsignatureissavedviaMailboxesController::updateSave() (app/Http/Controllers/MailboxesController.php:267),HTMLelementssuchas`
,
Related changes
Get daily alerts for CSA Alerts & Advisories (Singapore)
Daily digest delivered to your inbox.
Free. Unsubscribe anytime.
Source
About this page
Every important government, regulator, and court update from around the world. One place. Real-time. Free. Our mission
Source document text, dates, docket IDs, and authority are extracted directly from CSA.
The summary, classification, recommended actions, deadlines, and penalty information are AI-generated from the original text and may contain errors. Always verify against the source document.
Classification
Who this affects
Taxonomy
Browse Categories
Get alerts for this source
We'll email you when CSA Alerts & Advisories (Singapore) publishes new changes.
Subscribed!
Optional. Filters your digest to exactly the updates that matter to you.