SingCERT Security Bulletin Summarizes NIST Vulnerability Database
Summary
The Cyber Security Agency of Singapore (CSA) SingCERT published a security bulletin summarizing critical vulnerabilities from NIST's National Vulnerability Database. The bulletin categorizes CVEs by CVSSv3 base scores, listing vulnerabilities scoring 9.0-10.0 (Critical), 7.0-8.9 (High), 4.0-6.9 (Medium), and 0.1-3.9 (Low). Critical vulnerabilities include Axios prototype pollution (CVE-2026-40175, score 10.0), Sonicverse SSRF (CVE-2026-40089, score 9.9), SAP SQL injection (CVE-2026-27681, score 9.9), Axios proxy bypass (CVE-2025-62718, score 9.9), and PraisonAI sandbox escape (CVE-2026-39888, score 9.9).
What changed
SingCERT published a security bulletin summarizing vulnerabilities from NIST's National Vulnerability Database. The bulletin organizes CVEs by severity using CVSSv3 base scores and provides technical descriptions of critical vulnerabilities affecting widely-used software including Axios (prototype pollution/RCE), Sonicverse (SSRF), SAP Business Planning/Warehouse (SQL injection), and PraisonAI (sandbox escape).
Organizations using affected software versions should prioritize reviewing patches: Axios fixed in 1.15.0 and 0.3.1/0.31.0; Sonicverse patched in commit cb1ddbac; PraisonAI fixed in 1.5.115. Organizations should monitor NVD for updated CVSS scores on unrated vulnerabilities and ensure security teams assess exposure across their technology environments.
What to do next
- Review critical vulnerabilities listed in the bulletin
- Check NVD for complete CVSS vulnerability entries and patches
- Update affected software to fixed versions as specified
Archived snapshot
Apr 15, 2026GovPing captured this document from the original source. If the source has since changed or been removed, this is the text as it existed at that time.
SecurityBulletin15April2026
Generatedon15April2026
SingCERT'sSecurityBulletinsummarisesthelistofvulnerabilitiescollatedfromtheNationalInstituteofStandardsandTechnology(NIST)'sNational VulnerabilityDatabase(NVD)inthepastweek. Thevulnerabilitiesaretabledbasedonseverity,inaccordancetotheirCVSSv3basescores: vulnerabilitieswithabasescoreof9.0toCritical 10.0 vulnerabilitieswithabasescoreof7.0toHigh 8.9 vulnerabilitieswithabasescoreof4.0toMedium 6.9 vulnerabilitieswithabasescoreof0.1toLow 3.9 None vulnerabilitieswithabasescoreof0.0 ForthosevulnerabilitieswithoutassignedCVSSscores,pleasevisitNVDfortheupdatedCVSSvulnerabilityentries.
CRITICALVULNERABILITIES
CVE Base Description ReferenceNumber Score
AxiosisapromisebasedHTTPclientforthebrowserandNode.js.Priorto1.15.0and0.3.1,theAxioslibraryis CVE-2026-vulnerabletoaspecific"Gadget"attackchainthatallowsPrototypePollutioninanythird-partydependencyto 10.0 MoreDetails40175beescalatedintoRemoteCodeExecution(RCE)orFullCloudCompromise(viaAWSIMDSv2bypass).This vulnerabilityisfixedin1.15.0and0.3.1. SonicverseisaSelf-hostedDockerComposestackforliveradiostreaming.TheSonicverseRadioAudio StreamingStackdashboardcontainsaServer-SideRequestForgery(SSRF)vulnerabilityinitsAPIclient (apps/dashboard/lib/api.ts).Installationscreatedusingtheprovidedinstall.shscript(includingtheone‑liner CVE-2026-bash<(curl-fsSLhttps://sonicverse.short.gy/install-audiostack))areaffected.Inthesedeployments,the 9.9 MoreDetails40089dashboardacceptsuser-controlledURLsandpassesthemdirectlytoaserver-sideHTTPclientwithout sufficientvalidation.AnauthenticatedoperatorcanabusethistomakearbitraryHTTPrequestsfromthe dashboardbackendtointernalorexternalsystems.Thisvulnerabilityisfixedwithcommit cb1ddbacafcb441549fe87d3eeabdb6a085325e4. DuetoinsufficientauthorizationchecksinSAPBusinessPlanningandConsolidationandSAPBusinessCVE-2026-Warehouse,anauthenticatedusercanexecutecraftedSQLstatementstoread,modify,anddeletedatabase 9.9 MoreDetails27681data.Thisleadstoahighimpactontheconfidentiality,integrity,andavailabilityofthesystem. AxiosisapromisebasedHTTPclientforthebrowserandNode.js.Priorto1.15.0and0.31.0,Axiosdoesnot correctlyhandlehostnamenormalizationwhencheckingNOPROXYrules.Requeststoloopbackaddresseslike localhost.(withatrailingdot)or[::1](IPv6literal)skipNOPROXYmatchingandgothroughtheconfiguredCVE-2025-proxy.Thisgoesagainstwhatdevelopersexpectandletsattackersforcerequeststhroughaproxy,evenif 9.9 MoreDetails62718NOPROXYissetuptoprotectloopbackorinternalservices.Thisissueleadstothepossibilityofproxybypass andSSRFvulnerabilitiesallowingattackerstoreachsensitiveloopbackorinternalservicesdespitethe configuredprotections.Thisvulnerabilityisfixedin1.15.0and0.31.0. PraisonAIisamulti-agentteamssystem.Priorto1.5.115,executecode()inpraisonaiagents.tools.pythontools defaultstosandboxmode="sandbox",whichrunsusercodeinasubprocesswrappedwitharestricted builtinsdictandanAST-basedblocklist.TheASTblocklistembeddedinsidethesubprocesswrapper (blockedattrsofpythontools.py)containsonly11attributenames--astrictsubsetofthe30+namesCVE-2026-blockedinthedirect-executionpath.Thefourattributesthatformaframe-traversalchainoutofthesandbox 9.9 MoreDetails39888areallabsentfromthesubprocesslist(traceback,tbframe,fback,andf_builtins).Chainingthese attributesthroughacaughtexceptionexposestherealPythonbuiltinsdictofthesubprocesswrapperframe, fromwhichexeccanberetrievedandcalledunderanon-blockedvariablename--bypassingeveryremaining securitylayer.Thisvulnerabilityisfixedin1.5.115. CVE-2026-Anauthenticatedarbitraryfileuploadvulnerabilityinthe/admin/tinymce/uploadendpointofWebkulKrayin 9.9 MoreDetails38526CRMv2.2.xallowsattackerstoexecutearbitrarycodeviauploadingacraftedPHPfile. InJujuversionspriorto2.9.57and3.6.21,anauthorizationissueexistsintheControllerfacade.An
CVE-2026- authenticatedusercancalltheCloudSpecAPImethodtoextractthecloudcredentialsusedtobootstrapthe 9.9 MoreDetails controller.Thisallowsalow-privilegedusertoaccesssensitivecredentials.ThisissueisresolvedinJuju versions2.9.57and3.6.21. Jellyfinisanopensourceselfhostedmediaserver.Versionspriorto10.11.7containavulnerabilitychaininthe subtitleuploadendpoint(POST/Videos/{itemId}/Subtitles),wheretheFormatfieldisnotvalidated,allowing pathtraversalviathefileextensionandenablingarbitraryfilewrite.Thisarbitraryfilewritecanbechained CVE-2026- intoarbitraryfilereadvia.strmfiles,databaseextraction,adminprivilegeescalation,andultimatelyremote 9.9 MoreDetails35031 codeexecutionasrootviald.so.preload.Exploitationrequiresanadministratoraccountorauserthathasbeen explicitlygrantedthe"UploadSubtitles"permission.Thisissuehasbeenfixedinversion10.11.7.Ifusersare unabletoupgradeimmediately,theycangrantnon-administratorusersSubtitleuploadpermissionstoreduce attacksurface. AsecurityvulnerabilityhasbeendetectedinTotolinkA7100RU7.4cu.2313b20191024.Affectedisthefunction CVE-2026- setWiFiAclRulesofthefile/cgi-bin/cstecgi.cgiofthecomponentCGIHandler.Themanipulationoftheargument 5978 modeleadstooscommandinjection.Theattackcanbeinitiatedremotely.Theexploithasbeendisclosed publiclyandmaybeused. AvulnerabilitywasdetectedinTotolinkA7100RU7.4cu.2313b20191024.Theaffectedelementisthefunction CVE-2026- setVpnAccountCfgofthefile/cgi-bin/cstecgi.cgiofthecomponentCGIHandler.Themanipulationofthe 6029 argumentUserresultsinoscommandinjection.Theattackmaybelaunchedremotely.Theexploitisnow publicandmaybeused. AsecurityvulnerabilityhasbeendetectedinTotolinkA7100RU7.4cu.2313b20191024.Impactedisthe CVE-2026- functionsetPptpServerCfgofthefile/cgi-bin/cstecgi.cgiofthecomponentCGIHandler.Themanipulationofthe 6028 argumentenableleadstooscommandinjection.Theattackmaybeinitiatedremotely.Theexploithasbeen disclosedpubliclyandmaybeused. AsecurityflawhasbeendiscoveredinTotolinkA7100RU7.4cu.2313b20191024.Thisaffectsthefunction CVE-2026- setStorageCfgofthefile/cgi-bin/cstecgi.cgiofthecomponentCGIHandler.Performingamanipulationofthe 5976 argumentsambaEnabledresultsinoscommandinjection.Itispossibletoinitiatetheattackremotely.The exploithasbeenreleasedtothepublicandmaybeusedforattacks. AweaknesshasbeenidentifiedinTotolinkA7100RU7.4cu.2313b20191024.Thisissueaffectsthefunction CVE-2026- setUrlFilterRulesofthefile/cgi-bin/cstecgi.cgiofthecomponentCGIHandler.Executingamanipulationofthe 6027 argumentenablecanleadtooscommandinjection.Theattackcanbelaunchedremotely.Theexploithas beenmadeavailabletothepublicandcouldbeusedforattacks. AsecurityflawhasbeendiscoveredinTotolinkA7100RU7.4cu.2313b20191024.Thisvulnerabilityaffectsthe functionsetPortalConfWeChatofthefile/cgi-bin/cstecgi.cgiofthecomponentCGIHandler.PerformingaCVE-2026- manipulationoftheargumentenableresultsinoscommandinjection.Theattackcanbeinitiatedremotely.6026 Theexploithasbeenreleasedtothepublicandmaybeusedforattacks. AvulnerabilitywasidentifiedinTotolinkA7100RU7.4cu.2313_b20191024.Thisaffectsthefunction CVE-2026- setSyslogCfgofthefile/cgi-bin/cstecgi.cgiofthecomponentCGIHandler.Suchmanipulationoftheargument 6025 enableleadstooscommandinjection.Itispossibletolaunchtheattackremotely.Theexploitispublicly
AweaknesshasbeenidentifiedinTotolinkA7100RU7.4cu.2313b20191024.Thisimpactsthefunction CVE-2026-setWiFiBasicCfgofthefile/cgi-bin/cstecgi.cgiofthecomponentCGIHandler.Executingamanipulationofthe 5977argumentwifiOffcanleadtooscommandinjection.Itispossibletolaunchtheattackremotely.Theexploithas beenmadeavailabletothepublicandcouldbeusedforattacks. AUseofDefaultPasswordvulnerabilityintheJuniperNetworksSupportInsights(JSI)VirtualLightweight Collector(vLWC)allowsanunauthenticated,network-basedattackertotakefullcontrolofthedevice.vLWCCVE-2026-softwareimagesshipwithaninitialpasswordforahighprivilegedaccount.Achangeofthispasswordisnot33784enforcedduringtheprovisioningofthesoftware,whichcanmakefullaccesstothesystembyunauthorized actorspossible.ThisissueaffectsallversionsofvLWCbefore3.0.94. AsecurityflawhasbeendiscoveredinTotolinkA7100RU7.4cu.2313b20191024.Theaffectedelementisthe CVE-2026-functionsetWizardCfgofthefile/cgi-bin/cstecgi.cgiofthecomponentCGIHandler.Performingamanipulation 6154oftheargumentwizardresultsinoscommandinjection.Theattackmaybeinitiatedremotely.Theexploithas beenreleasedtothepublicandmaybeusedforattacks. AsecurityvulnerabilityhasbeendetectedinTotolinkA7100RU7.4cu.2313b20191024.Theaffectedelement CVE-2026-isthefunctionsetAdvancedInfoShowofthefile/cgi-bin/cstecgi.cgiofthecomponentCGIHandler.The 5996manipulationoftheargumentttyserverleadstooscommandinjection.Itispossibletoinitiatetheattack remotely.Theexploithasbeendisclosedpubliclyandmaybeused. AweaknesshasbeenidentifiedinTotolinkA7100RU7.4cu.2313b20191024.Impactedisthefunction CVE-2026-setMiniuiHomeInfoShowofthefile/cgi-bin/cstecgi.cgiofthecomponentCGIHandler.Executingamanipulation 5995oftheargumentlaninfocanleadtooscommandinjection.Theattackmaybeperformedfromremote.The exploithasbeenmadeavailabletothepublicandcouldbeusedforattacks. CVE-2026-Arithmeticoverinductionvariablesinloopswerenotcorrectlycheckedforunderfloworoverflow.Asaresult, 27143thecompilerwouldallowforinvalidindexingtooccuratruntime,potentiallyleadingtomemorycorruption.
AsecurityflawhasbeendiscoveredinTotolinkA7100RU7.4cu.2313b20191024.Thisissueaffectsthe CVE-2026-functionsetTelnetCfgofthefile/cgi-bin/cstecgi.cgiofthecomponentCGIHandler.Performingamanipulation oftheargumenttelnetenabledresultsinoscommandinjection.Theattackispossibletobecarriedout remotely.Theexploithasbeenreleasedtothepublicandmaybeusedforattacks. AvulnerabilitywasidentifiedinTotolinkA7100RU7.4cu.2313_b20191024.Thisvulnerabilityaffectsthe CVE-2026-functionsetWiFiGuestCfgofthefile/cgi-bin/cstecgi.cgiofthecomponentCGIHandler.Suchmanipulationofthe 5993argumentwifiOffleadstooscommandinjection.Theattackcanbeexecutedremotely.Theexploitispublicly
SmartSlider3Proversion3.5.1.35forWordPressandJoomlacontainsamulti-stageremoteaccesstoolkit injectedthroughacompromisedupdatesystemthatallowsunauthenticatedattackerstoexecutearbitrary CVE-2026-codeandcommands.Attackerscantriggerpre-authenticationremoteshellexecutionviaHTTPheaders, 34424establishauthenticatedbackdoorsacceptingarbitraryPHPcodeorOScommands,createhiddenadministrator accounts,exfiltratecredentialsandaccesskeys,andmaintainpersistencethroughmultipleinjectionpoints includingmust-usepluginsandcorefilemodifications. AvulnerabilitywasdetectedinTotolinkA7100RU7.4cu.2313b20191024.Theimpactedelementisthe CVE-2026-functionsetLoginPasswordCfgofthefile/cgi-bin/cstecgi.cgiofthecomponentCGIHandler.Themanipulationof 5997theargumentadmpassresultsinoscommandinjection.Itispossibletolaunchtheattackremotely.The exploitisnowpublicandmaybeused. CVE-2026-FalkorDBBrowser1.9.3containsanunauthenticatedpathtraversalvulnerabilityinthefileuploadAPIthat 6057allowsremoteattackerstowritearbitraryfilesandachieveremotecodeexecution. CVE-2025-owntone-server2ca10d9isvulnerabletoBufferOverflowduetolackofrecursivechecking. 9.8 MoreDetails44560 AflawhasbeenfoundinTotolinkA7100RU7.4cu.2313b20191024.Theimpactedelementisthefunction CVE-2026-setAccessDeviceCfgofthefile/cgi-bin/cstecgi.cgiofthecomponentCGIHandler.Thismanipulationofthe 6138argumentmaccausesoscommandinjection.Theattackcanbeinitiatedremotely.Theexploithasbeen publishedandmaybeused. AvulnerabilityhasbeenfoundinTotolinkA7100RU7.4cu.2313b20191024.Thisvulnerabilityaffectsthe CVE-2026-functionsetDiagnosisCfgofthefile/cgi-bin/cstecgi.cgiofthecomponentCGIHandler.Themanipulationofthe 6116argumentipleadstooscommandinjection.Remoteexploitationoftheattackispossible.Theexploithasbeen disclosedtothepublicandmaybeused. AflawhasbeenfoundinTotolinkA7100RU7.4cu.2313b20191024.ThisaffectsthefunctionsetAppCfgofthe CVE-2026-file/cgi-bin/cstecgi.cgiofthecomponentCGIHandler.Executingamanipulationoftheargumentenablecan 6115leadtooscommandinjection.Theattackmaybelaunchedremotely.Theexploithasbeenpublishedandmay beused. AvulnerabilitywasdetectedinTotolinkA7100RU7.4cu.2313b20191024.Affectedbythisissueisthefunction CVE-2026-setNetworkCfgofthefile/cgi-bin/cstecgi.cgiofthecomponentCGIHandler.Performingamanipulationofthe 6114argumentprotoresultsinoscommandinjection.Theattackmaybeinitiatedremotely.Theexploitisnow publicandmaybeused. AsecurityvulnerabilityhasbeendetectedinTotolinkA7100RU7.4cu.2313b20191024.Affectedbythis CVE-2026-vulnerabilityisthefunctionsetTtyServiceCfgofthefile/cgi-bin/cstecgi.cgiofthecomponentCGIHandler.Such 6113manipulationoftheargumentttyEnableleadstooscommandinjection.Theattackcanbelaunchedremotely. Theexploithasbeendisclosedpubliclyandmaybeused. AweaknesshasbeenidentifiedinTotolinkA7100RU7.4cu.2313b20191024.Affectedisthefunction CVE-2026-setRadvdCfgofthefile/cgi-bin/cstecgi.cgiofthecomponentCGIHandler.Thismanipulationoftheargument 6112maxRtrAdvIntervalcausesoscommandinjection.Theattackcanbeinitiatedremotely.Theexploithasbeen madeavailabletothepublicandcouldbeusedforattacks. AvulnerabilitywasdeterminedinTotolinkA7100RU7.4cu.2313b20191024.Affectedbythisissueisthe CVE-2026-functionsetLedCfgofthefile/cgi-bin/cstecgi.cgiofthecomponentCGIHandler.Thismanipulationofthe 6132argumentenablecausesoscommandinjection.Remoteexploitationoftheattackispossible.Theexploithas beenpubliclydisclosedandmaybeutilized. goshsisaSimpleHTTPServerwritteninGo.Priorto2.0.0-beta.4,goshsenforcesthedocumentedper-folder .goshsACL/basic-authmechanismfordirectorylistingsandfilereads,butitdoesnotenforcethesame authorizationchecksforstate-changingroutes.AnunauthenticatedattackercanuploadfileswithPUT,uploadCVE-2026-fileswithmultipartPOST/upload,createdirectorieswith?mkdir,anddeletefileswith?deleteinsidea.goshs-40189protecteddirectory.Bydeletingthe.goshsfileitself,theattackercanremovethefolder'sauthpolicyandthen accesspreviouslyprotectedcontentwithoutcredentials.Thisresultsinacriticalauthorizationbypassaffecting confidentiality,integrity,andavailability.Thisvulnerabilityisfixedin2.0.0-beta.4. AvulnerabilityhasbeenfoundinTotolinkA7100RU7.4cu.2313b20191024.Thisaffectsthefunction CVE-2026-UploadOpenVpnCertofthefile/cgi-bin/cstecgi.cgiofthecomponentCGIHandler.Suchmanipulationofthe argumentFileNameleadstooscommandinjection.Theattackcanbelaunchedremotely.Theexploithasbeen disclosedtothepublicandmaybeused. AvulnerabilitywasidentifiedinTotolinkA7100RU7.4cu.2313b20191024.Theimpactedelementisthe
CVE-2026- functionsetDmzCfgofthefile/cgi-bin/cstecgi.cgiofthecomponentCGIHandler.Suchmanipulationofthe argumentwanIdxleadstooscommandinjection.Theattackmaybeperformedfromremote.Theexploitis publiclyavailableandmightbeused. AvulnerabilitywasfoundinTotolinkA7100RU7.4cu.2313b20191024.Thisimpactsthefunction CVE-2026- UploadFirmwareFileofthefile/cgi-bin/cstecgi.cgiofthecomponentCGIHandler.Performingamanipulationof 6140 theargumentFileNameresultsinoscommandinjection.Theattackmaybeinitiatedremotely.Theexploithas beenmadepublicandcouldbeused. AnissuewasdiscoveredinBMCControl-M/MFT9.0.20through9.0.22.AsetofdefaultdebugusercredentialsisCVE-2026- hardcodedincleartextwithintheapplicationpackage.Ifleftunchanged,thesecredentialscanbeeasily23781 obtainedandmayallowunauthorizedaccesstotheMFTAPIdebuginterface. CVE-2026- SourceCodesterEngineersOnlinePortalv1.0isvulnerabletoSQLInjectioninupdatepassword.phpviathe 36236 newpasswordparameter. ASQLinjectionvulnerabilitywasfoundinthescheduleSubList.phpfileofitsourcecodeOnlineStudentCVE-2026- EnrollmentSystemv1.0.Thereasonforthisissueisthatthe'subjcode'parameterisdirectlyembeddedinto36235 theSQLqueryviastringinterpolationwithoutanysanitizationorvalidation. CVE-2026- itsourcecodeOnlineStudentEnrollmentSystemv1.0isvulnerabletoSQLInjectioninnewCourse.phpviathe 36234 'coursename'parameter. ASQLinjectionvulnerabilitywasfoundintheassignInstructorSubjects.phpfileofitsourcecodeOnlineStudentCVE-2026- EnrollmentSystemv1.0.Thereasonforthisissueisthatattackerscaninjectmaliciouscodeviatheparameter36233 "subjcode"anduseitdirectlyinSQLquerieswithouttheneedforappropriatecleaningorvalidation. ASQLinjectionvulnerabilitywasfoundintheinstructorClasses.phpfileofitsourcecodeOnlineStudentCVE-2026- EnrollmentSystemv1.0.Thereasonforthisissueisthatthe'classId'parameterfrom$GET['classId']is36232 directlyconcatenatedintotheSQLquerywithoutanysanitizationorvalidation. CVE-2026- PHP-MYSQL-User-Login-Systemv1.0wasdiscoveredtocontainaSQLinjectionvulnerabilityviatheusername 29861 parameteratlogin.php. AsecurityvulnerabilityhasbeendetectedinTotolinkA7100RU7.4cu.2313b20191024.Thisaffectsthe CVE-2026- functionsetIpQosRulesofthefile/cgi-bin/cstecgi.cgiofthecomponentCGIHandler.Themanipulationofthe 6156 argumentCommentleadstooscommandinjection.Remoteexploitationoftheattackispossible.Theexploit hasbeendisclosedpubliclyandmaybeused. AweaknesshasbeenidentifiedinTotolinkA7100RU7.4cu.2313.Theimpactedelementisthefunction CVE-2026- setWanCfgofthefile/cgi-bin/cstecgi.cgiofthecomponentCGIHandler.Executingamanipulationofthe 6155 argumentpppoeServiceNamecanleadtooscommandinjection.Theattackmaybelaunchedremotely.The exploithasbeenmadeavailabletothepublicandcouldbeusedforattacks. AvulnerabilitywasfoundinTotolinkA7100RU7.4cu.2313b20191024.Affectedbythisvulnerabilityisthe CVE-2026- functionsetTracerouteCfgofthefile/cgi-bin/cstecgi.cgiofthecomponentCGIHandler.Themanipulationofthe 6131 argumentcommandresultsinoscommandinjection.Theattackmaybelaunchedremotely.Theexploithas beenmadepublicandcouldbeused. RaceinMediainGoogleChromeonAndroidpriorto147.0.7727.55allowedaremoteattackerwhohadCVE-2026- compromisedtherendererprocesstocorruptmediastreammetadataviaacraftedHTMLpage.(Chromium5902 securityseverity:Low) PraisonAIisamulti-agentteamssystem.Inversionsbelow4.5.139ofPraisonAIand1.5.140ofpraisonaiagents, theworkflowengineisvulnerabletoarbitrarycommandandcodeexecutionthroughuntrustedYAMLfiles. Whenpraisonaiworkflowrun loadsaYAMLfilewithtype:job,theJobWorkflowExecutorin jobworkflow.pyprocessesstepsthatsupportrun:(shellcommandsviasubprocess.run()),script:(inlinePython viaexec()),andpython:(arbitraryPythonscriptexecution)--allwithoutanyvalidation,sandboxing,oruserCVE-2026- confirmation.Theaffectedcodepathsincludeactionrun()inworkflow.pyandexecshell(),40288 execinlinepython(),andexecpythonscript()injobworkflow.py.Anattackerwhocansupplyorinfluencea workflowYAMLfile(particularlyinCIpipelines,sharedrepositories,ormulti-tenantdeploymentenvironments) canachievefullarbitrarycommandexecutiononthehostsystem,compromisingthemachineandany accessibledataorcredentials.Thisissuehasbeenfixedinversions4.5.139ofPraisonAIand1.5.140of praisonaiagents. CVE-2025- Improperinputhandlingin/Grocery/searchproductsitname.php,inanirudhkannanGroceryStore 63939 ManagementSystem1.0,allowsSQLinjectionviathesitemnamePOSTparameter. PraisonAIisamulti-agentteamssystem.Priorto4.5.115,theAgentService.loadAgentFromFilemethoduses thejs-yamllibrarytoparseYAMLfileswithoutdisablingdangeroustags(suchas!!js/functionandCVE-2026- !!js/undefined).ThisallowsanattackertocraftamaliciousYAMLfilethat,whenparsed,executesarbitrary39890 JavaScriptcode.Anattackercanexploitthisvulnerabilitybyuploadingamaliciousagentdefinitionfileviathe APIendpoint,leadingtoremotecodeexecution(RCE)ontheserver.Thisvulnerabilityisfixedin4.5.115. CVE-2025- Inmanikandan580School-management-system1.0,atime-basedblindSQLinjectionvulnerabilityexistsin 65135 /studentms/admin/between-date-reprtsdetails.phpthroughthefromdatePOSTparameter. TheProSolutionWPClientpluginforWordPressisvulnerabletoarbitraryfileuploadsduetomissingfiletype
CVE-2026- validationinthe'proSolfileUploadProcess'functioninallversionsupto,andincluding,1.9.9.Thismakesit possibleforunauthenticatedattackerstouploadarbitraryfilesontheaffectedsite'sserverwhichmaymake remotecodeexecutionpossible. CVE-2025- TendaAC615.03.05.16multiisvulnerabletoBufferOverflowintheformSetCfmfunctionviathefuncname, 52221 funcpara1,andfuncpara2parameters. Aimproperneutralizationofspecialelementsusedinanoscommand('oscommandinjection')vulnerabilityinCVE-2026- FortinetFortiSandbox4.4.0through4.4.8mayallowattackertoexecuteunauthorizedcodeorcommandsvia39808 XWikiPlatformisagenericwikiplatformofferingruntimeservicesforapplicationsbuiltontopofit.Priorto 17.4.8and17.10.1,animproperlyprotectedscriptingAPIallowsanyuserwithscriptrighttobypassthe CVE-2026- sandboxingoftheVelocityscriptingAPIandexecute,e.g.,arbitraryPythonscripts,allowingfullaccesstothe 33229 XWikiinstanceandtherebycompromisingtheconfidentiality,integrityandavailabilityofthewholeinstance. Notethatscriptrightalreadyconstitutesahighlevelofaccessthatwedon'trecommendgivingtountrusted users.Thisvulnerabilityisfixedin17.4.8and17.10.1. CVE-2026- Avulnerabilitywasidentifiedinstata-mcppriortov1.13.0whereinsufficientvalidationofuser-suppliedStata 31040 do-filecontentcanleadtocommandexecution. CVE-2026- Apathtraversal:'../filedir'vulnerabilityinFortinetFortiSandbox5.0.0through5.0.5,FortiSandbox4.4.0 39813 through4.4.8mayallowattackertoescalationofprivilegevia CVE-2026- DoublefreeinWindowsIKEExtensionallowsanunauthorizedattackertoexecutecodeoveranetwork. 9.833824 TheDSGVOGoogleWebFontsGDPRpluginforWordPressisvulnerabletoarbitraryfileuploadduetomissing filetypevalidationintheDSGVOGWPdownloadGoogleFonts()functioninallversionsupto,andincluding,1.1. Thefunctionisexposedviaawp_ajax_nopriv_hook,requiringnoauthentication.Itfetchesauser-suppliedCVE-2026- URLasaCSSfile,extractsURLsfromitscontent,anddownloadsthosefilestoapubliclyaccessibledirectory3535 withoutvalidatingthefiletype.Thismakesitpossibleforunauthenticatedattackerstouploadarbitraryfiles includingPHPwebshells,leadingtoremotecodeexecution.Theexploitrequiresthesitetouseoneofa handfulofspecificthemes(twentyfifteen,twentyseventeen,twentysixteen,storefront,salient,orshapely). TheUsersmanager-PNpluginforWordPressisvulnerabletoPrivilegeEscalationviaArbitraryUserMeta Updateinallversionsuptoandincluding1.1.15.Thisisduetoaflawedauthorizationlogiccheckinthe userspnajaxnoprivserver()functionwithinthe'userspnformsave'case.Theconditionalonlyblocks unauthenticateduserswhentheuseridisempty,butwhenanon-emptyuseridissupplied,executionCVE-2026- bypassesthischeckentirelyandproceedstoupdatearbitraryusermetaviaupdateusermeta()withoutany4003 authenticationorauthorizationverification.Additionally,thenoncerequiredforthisAJAXendpoint('userspn- nonce')isexposedtoallvisitorsviawplocalizescriptonthepublicwpenqueuescriptshook,renderingthe noncecheckineffectiveasasecuritycontrol.Thismakesitpossibleforunauthenticatedattackerstoupdate arbitraryusermetadataforanyuseraccount,includingtheuserspnsecrettokenfield. TheEverestFormspluginforWordPressisvulnerabletoPHPObjectInjectioninallversionsupto,and including,3.4.3viadeserializationofuntrustedinputfromformentrymetadata.Thisisduetothehtml-admin- page-entries-view.phpfilecallingPHP'snativeunserialize()onstoredentrymetavalueswithoutpassingthe CVE-2026- allowedclassesparameter.ThismakesitpossibleforunauthenticatedattackerstoinjectaserializedPHP 3296 objectpayloadthroughanypublicEverestFormsformfield.Thepayloadsurvivessanitizetextfield() sanitization(serializationcontrolcharactersarenotstripped)andisstoredinthewpevfentrymetadatabase table.Whenanadministratorviewsentriesorviewsanindividualentry,theunsafeunserialize()callprocesses thestoreddatawithoutclassrestrictions. TheQuickPlaygroundpluginforWordPressisvulnerabletoRemoteCodeExecutioninallversionsupto,and CVE-2026- including,1.3.1.ThisisduetoinsufficientauthorizationchecksonRESTAPIendpointsthatexposeasynccode 1830 andallowarbitraryfileuploads.Thismakesitpossibleforunauthenticatedattackerstoretrievethesynccode, uploadPHPfileswithpathtraversal,andachieveremotecodeexecutionontheserver. AvulnerabilitywasidentifiedinTotolinkA7100RU7.4cu.2313b20191024.Thisaffectsthefunction CVE-2026- setVpnPassCfgofthefile/cgi-bin/cstecgi.cgiofthecomponentCGIHandler.Themanipulationoftheargument 5850 pptpPassThruleadstooscommandinjection.Remoteexploitationoftheattackispossible.Theexploitis publiclyavailableandmightbeused. AsecurityflawhasbeendiscoveredinTotolinkA7100RU7.4cu.2313b20191024.Thisimpactsthefunction CVE-2026- setUPnPCfgofthefile/cgi-bin/cstecgi.cgiofthecomponentCGIHandler.Themanipulationoftheargument 5851 enableresultsinoscommandinjection.Theattackcanbeexecutedremotely.Theexploithasbeenreleasedto thepublicandmaybeusedforattacks. AweaknesshasbeenidentifiedinTotolinkA7100RU7.4cu.2313_b20191024.Affectedisthefunction CVE-2026- setIptvCfgofthefile/cgi-bin/cstecgi.cgiofthecomponentCGIHandler.Thismanipulationoftheargument 5852 igmpVercausesoscommandinjection.Theattackispossibletobecarriedoutremotely.Theexploithasbeen madeavailabletothepublicandcouldbeusedforattacks. CVE-2025- Anattackercouldusedataobtainedbysniffingthenetworktraffictoforgepacketsinordertomakearbitrary 13926 requeststoContemporaryControlsBASC20T.
TotaraLMSv19.1.5andbeforeisvulnerabletoIncorrectAccessControl.TheloginpagecodecanbeCVE-2026-manipulatedtorevealtheloginform.Anattackercanchainthatwithmissingrate-limitontheloginformto31282launchabruteforceattack. CVE-2026-AnissuewasdiscoveredinToToLinkA3300Rfirmwarev17.0.0cu.557B20221024allowingattackerstoexecute 31170arbitrarycommandsviathestun-passparameterto/cgi-bin/cstecgi.cgi. CVE-2026-InTotaraLMSv19.1.5andbefore,theforgotpasswordAPIdoesnotimplementratelimitingforthetargetemail 31283address.whichcanbeusedforanEmailBombingattack. AsecurityvulnerabilityhasbeendetectedinTotolinkA7100RU7.4cu.2313b20191024.Affectedbythisissue CVE-2026-isthefunctionsetPasswordCfgofthefile/cgi-bin/cstecgi.cgiofthecomponentCGIHandler.Suchmanipulation 6195oftheargumentadmpassleadstooscommandinjection.Theattackcanbeexecutedremotely.Theexploit hasbeendisclosedpubliclyandmaybeused. Pachno1.0.6containsanXMLexternalentityinjectionvulnerabilitythatallowsunauthenticatedattackersto CVE-2026-readarbitraryfilesbyexploitingunsafeXMLparsingintheTextParserhelper.Attackerscaninjectmalicious 40042XMLentitiesthroughwikitablesyntaxandinlinetagsinissuedescriptions,comments,andwikiarticlesto triggerentityresolutionviasimplexmlloadstring()withoutLIBXMLNONETrestrictions. Pachno1.0.6containsadeserializationvulnerabilitythatallowsunauthenticatedattackerstoexecutearbitrary CVE-2026-codebyinjectingmaliciousserializedobjectsintocachefiles.AttackerscanwritePHPobjectpayloadstoworld- 40044writablecachefileswithpredictablenamesinthecachedirectory,whichareunserializedduringframework bootstrapbeforeauthenticationchecksoccur. AheapbufferoverflowvulnerabilityexistsduringthedecodingofPALETTECOLORDICOMimages.Pixel CVE-2026-lengthvalidationuses32-bitmultiplicationforwidthandheightcalculations.Ifthesevaluesoverflow,the 5443validationcheckincorrectlysucceeds,allowingthedecodertoreadandwritetomemorybeyondallocated buffers. AheapbufferoverflowvulnerabilityexistsintheDICOMimagedecoder.Dimensionfieldsareencodedusing CVE-2026-ValueRepresentation(VR)UnsignedLong(UL),insteadoftheexpectedVRUnsignedShort(US),whichallows 5442extremelylargedimensionstobeprocessed.Thiscausesanintegeroverflowduringframesizecalculationand resultsinout-of-boundsmemoryaccessduringimagedecoding. AmaliciousactorwithaccesstotheUniFiPlaynetworkcouldexploitaPathTraversalvulnerabilityfoundinthe devicefirmwaretowritefilesonthesystemthatcouldbeusedforaremotecodeexecution(RCE).AffectedCVE-2026-Products:UniFiPlayPowerAmp(Version1.0.35andearlier)UniFiPlayAudioPort(Version1.0.24andearlier)22562Mitigation:UpdateUniFiPlayPowerAmptoVersion1.0.38orlaterUpdateUniFiPlayAudioPorttoVersion1.1.9 orlater AseriesofImproperInputValidationvulnerabilitiescouldallowaCommandInjectionbyamaliciousactorwith CVE-2026-accesstotheUniFiPlaynetwork.AffectedProducts:UniFiPlayPowerAmp(Version1.0.35andearlier)UniFi 22563PlayAudioPort(Version1.0.24andearlier)Mitigation:UpdateUniFiPlayPowerAmptoVersion1.0.38orlater UpdateUniFiPlayAudioPorttoVersion1.1.9orlater AnImproperAccessControlvulnerabilitycouldallowamaliciousactorwithaccesstotheUniFiPlaynetworkto CVE-2026-enableSSHtomakeunauthorizedchangestothesystem.AffectedProducts:UniFiPlayPowerAmp(Version 225641.0.35andearlier)UniFiPlayAudioPort(Version1.0.24andearlier)Mitigation:UpdateUniFiPlayPowerAmpto Version1.0.38orlaterUpdateUniFiPlayAudioPorttoVersion1.1.9orlater AcriticalvulnerabilityintheTalendJobServerandTalendRuntimeallowsunauthenticatedremotecode executionviatheJMXmonitoringport.TheattackvectoristheJMXmonitoringportoftheTalendJobServer. CVE-2026-ThevulnerabilitycanbemitigatedfortheTalendJobServerbyrequiringTLSclientauthenticationforthe 6264monitoringport;however,thepatchmustbeappliedforfullmitigation.ForTalendESBRuntime,the vulnerabilitycanbemitigatedbydisablingtheJobServerJMXmonitoringport,whichisdisabledbydefaultfrom theR2024-07-RTpatch. AvulnerabilitywasdetectedinTotolinkA7100RU7.4cu.2313b20191024.Affectedbythisissueisthefunction CVE-2026-setWiFiEasyCfgofthefile/cgi-bin/cstecgi.cgiofthecomponentCGIHandler.Performingamanipulationofthe 5854argumentmergeresultsinoscommandinjection.Itispossibletoinitiatetheattackremotely.Theexploitis nowpublicandmaybeused. AsecurityvulnerabilityhasbeendetectedinTotolinkA7100RU7.4cu.2313_b20191024.Affectedbythis CVE-2026-vulnerabilityisthefunctionsetIpv6LanCfgofthefile/cgi-bin/cstecgi.cgiofthecomponentCGIHandler.Such 5853manipulationoftheargumentaddrPrefixLenleadstooscommandinjection.Theattackmaybeperformedfrom remote.Theexploithasbeendisclosedpubliclyandmaybeused. CFImageHostingScript1.6.5allowsunauthenticatedattackerstodownloadanddecodetheapplicationCVE-2019-databasebyaccessingtheimgdb.dbfileintheupload/datadirectory.AttackerscanextractdeleteIDsstoredin25709plaintextfromthedeserializeddatabaseandusethemtodeleteallpicturesviathedparameter. AdobeConnectversions2025.3,12.10andearlierareaffectedbyaDeserializationofUntrustedDataCVE-2026-vulnerabilitythatcouldresultinarbitrarycodeexecutioninthecontextofthecurrentuser.Exploitationofthis 9.6 MoreDetails27303issuedoesnotrequireuserinteraction.Scopeischanged. NuGetGalleryisapackagerepositorythatpowersnuget.org.AsecurityvulnerabilityexistsintheNuGetGallery
backendjob'shandlingof.nuspecfileswithinNuGetpackages.Anattackercansupplyacraftednuspecfile withmaliciousmetadata,leadingtocrosspackagemetadatainjectionthatmayresultinremotecodeCVE-2026- 9.6 MoreDetailsexecution(RCE)and/orarbitraryblobwritesduetoinsufficientinputvalidation.TheissueisexploitableviaURI39399 fragmentinjectionusingunsanitizedpackageidentifiers,allowinganattackertocontroltheresolvedblobpath. Thisenableswritestoarbitraryblobswithinthestoragecontainer,notlimitedto.nupkgfiles,resultingin potentialtamperingofexistingcontent.Thisissuehasbeenpatchedincommit 0e80f87628349207cdcaf55358491f8a6f1ca276. UseafterfreeinPrivateAIinGoogleChromepriorto147.0.7727.55allowedaremoteattackerwhoconvincedaCVE-2026-usertoengageinspecificUIgesturestopotentiallyperformasandboxescapeviaacraftedHTMLpage. 9.6 MoreDetails5874 Chartbrewisanopen-sourcewebapplicationthatcanconnectdirectlytodatabasesandAPIsandusethedata tocreatecharts.Priorto4.8.5,ChartbrewallowsauthenticateduserstocreateAPIdataconnectionswithCVE-2026-arbitraryURLs.TheserverfetchestheseURLsusingrequest-promisewithoutanyIPaddressvalidation, 9.6 MoreDetails30232enablingServer-SideRequestForgeryattacksagainstinternalnetworksandcloudmetadataendpoints.This vulnerabilityisfixedin4.8.5. CVE-2026-Cross-SiteRequestForgery(CSRF)vulnerabilityinpriyanshumittalBluestreetbluestreetallowsCrossSite 9.6 MoreDetails39617RequestForgery.ThisissueaffectsBluestreet:fromn/athrough<=1.7.3. PraisonAIisamulti-agentteamssystem.Priorto4.5.121,theexecute_commandfunctionandworkflowshell CVE-2026-executionareexposedtouser-controlledinputviaagentworkflows,YAMLdefinitions,andLLM-generatedtool 9.6 MoreDetails40088calls,allowingattackerstoinjectarbitraryshellcommandsthroughshellmetacharacters.Thisvulnerabilityis fixedin4.5.121. CVE-2026-Cross-SiteRequestForgery(CSRF)vulnerabilityinpriyanshumittalBusiprofbusiprofallowsUploadaWebShell 9.6 MoreDetails39619toaWebServer.ThisissueaffectsBusiprof:fromn/athrough<=2.5.2. CVE-2026-Cross-SiteRequestForgery(CSRF)vulnerabilityinpriyanshumittalAppointmentappointmentallowsUploada 9.6 MoreDetails39620WebShelltoaWebServer.ThisissueaffectsAppointment:fromn/athrough<=3.5.5. CVE-2026-Cross-SiteRequestForgery(CSRF)vulnerabilityinmndpsingh287ThemeEditortheme-editorallowsCode 9.639640Injection.ThisissueaffectsThemeEditor:fromn/athrough<=3.2.
ChamiloLMSisalearningmanagementsystem.Priorto1.11.38and2.0.0-RC.3,thedefaultpasswordreset CVE-2026-mechanismgeneratestokensusingsha1($email)withnorandomcomponent,noexpiration,andnorate 9.4 MoreDetails33707limiting.Anattackerwhoknowsauser'semailcancomputetheresettokenandchangethevictim'spassword withoutauthentication.Thisvulnerabilityisfixedin1.11.38and2.0.0-RC.3. ColdFusionversions2023.18,2025.6andearlierareaffectedbyanImproperInputValidationvulnerabilitythatCVE-2026-couldresultinarbitrarycodeexecutioninthecontextofthecurrentuser.Exploitationofthisissuedoesnot 9.3 MoreDetails27304requireuserinteraction. CVE-2026-SandboxEscapeVulnerabilityinTerrariumallowsarbitrarycodeexecutionwithrootprivilegesonahost 9.3 MoreDetails5752processviaJavaScriptprototypechaintraversal. AdobeConnectversions2025.3,12.10andearlierareaffectedbyaDeserializationofUntrustedDataCVE-2026-vulnerabilitythatcouldresultinarbitrarycodeexecutioninthecontextofthecurrentuser.Exploitationofthis 9.3 MoreDetails34615issuedoesnotrequireuserinteraction.Scopeischanged. AdobeConnectversions2025.3,12.10andearlierareaffectedbyaDOM-basedCross-SiteScripting(XSS) CVE-2026-vulnerability.AnattackercouldexploitthisissuebymanipulatingtheDOMenvironmenttoexecutemalicious 9.3 MoreDetails27246JavaScriptwithinthecontextofthevictim'sbrowser.Exploitationofthisissuerequiresuserinteractioninthat avictimmustvisitacraftedwebpage.Scopeischanged. AdobeConnectversions2025.3,12.10andearlierareaffectedbyareflectedCross-SiteScripting(XSS)CVE-2026-vulnerability.IfanattackerisabletoconvinceavictimtovisitaURLreferencingavulnerablepage,malicious 9.3 MoreDetails27245JavaScriptcontentmaybeexecutedwithinthecontextofthevictim'sbrowser.Scopeischanged. AdobeConnectversions2025.3,12.10andearlierareaffectedbyareflectedCross-SiteScripting(XSS)CVE-2026-vulnerability.IfanattackerisabletoconvinceavictimtovisitaURLreferencingavulnerablepage,malicious 9.3 MoreDetails27243JavaScriptcontentmaybeexecutedwithinthecontextofthevictim'sbrowser.Scopeischanged. Areflectedcross-sitescripting(XSS)vulnerabilityexistsinRukovoditelCRMversion3.6.4andearlierinthe ZadarmatelephonyAPIendpoint(/api/tel/zadarma.php).Theapplicationdirectlyreflectsuser-suppliedinput fromthe'zdecho'GETparameterintotheHTTPresponsewithoutpropersanitization,outputencoding,or CVE-2026-content-typerestrictions.Thevulnerablecodeis:if(isset($GET['zdecho']))exit($GET['zd_echo']);An 9.3 MoreDetails31845unauthenticatedattackercanexploitthisissuebycraftingamaliciousURLcontainingJavaScriptpayloads. Whenavictimvisitsthelink,thepayloadexecutesinthecontextoftheapplicationwithinthevictim'sbrowser, potentiallyleadingtosessionhijacking,credentialtheft,phishing,oraccounttakeover.Theissueisfixedin version3.7,whichintroducesproperinputvalidationandoutputencodingtopreventscriptinjection. IBMVerifyIdentityAccessContainer11.0through11.0.2andIBMSecurityVerifyAccessContainer10.0 CVE-2026-through10.0.9.1andIBMVerifyIdentityAccess11.0through11.0.2andIBMSecurityVerifyAccess10.0 9.3 MoreDetailsthrough10.0.9.1couldallowalocallyauthenticatedusertoescalatetheirprivilegestorootduetoexecution
withunnecessaryprivilegesthanrequired. PraisonAIisamulti-agentteamssystem.Priorto4.5.128,PraisonAItreatsremotelyfetchedtemplatefilesasCVE-2026-trustedexecutablecodewithoutintegrityverification,originvalidation,oruserconfirmation,enablingsupply 9.3 MoreDetails40154chainattacksthroughmalicioustemplates.Thisvulnerabilityisfixedin4.5.128. InCanonicalLXDbefore6.8,thebackupimportpathvalidatesprojectrestrictionsagainstbackup/index.yamlin thesuppliedtararchivebutcreatestheinstancefrombackup/container/backup.yaml,aseparatefileinthe CVE-2026-samearchivethatisnevercheckedagainstprojectrestrictions.Anauthenticatedremoteattackerwith 9.1 MoreDetails34178instance-creationpermissioninarestrictedprojectcancraftabackuparchivewherebackup.yamlcarries restrictedsettingssuchassecurity.privileged=trueorraw.lxcdirectives,bypassingallprojectrestriction enforcementandallowingfullhostcompromise. ChamiloLMSisalearningmanagementsystem.Priorto1.11.38and2.0.0-RC.3,ChamiloLMScontainsanOS CommandInjectionvulnerabilityinthefilemovefunction.Themove()functioninfileManage.lib.phppasses user-controlledpathvaluesdirectlyintoexec()shellcommandswithoutusingescapeshellarg().Whenauser movesadocumentviadocument.php,themovetoPOSTparameter--whichonlypassesthrough Security::removeXSS()(anHTML-onlyfilter)--isconcatenateddirectlyintoshellcommandssuchasexec("mvCVE-2026-$source$target").Bydefault,Chamiloallowsallauthenticateduserstocreatecourses 9.1 MoreDetails32892(allowuserstocreatecourses=true).Anyuserwhoisateacherinacourse(includingself-createdcourses) canmovedocuments,makingthisvulnerabilityexploitablebyanyauthenticateduser.Theattackermustfirst placeadirectorywithshellmetacharactersinitsnameonthefilesystem(achievableviaCourseBackup Import),thenmoveadocumentintothatdirectorytotriggerarbitrarycommandexecutionasthewebserver user(www-data).Thisvulnerabilityisfixedin1.11.38and2.0.0-RC.3. OAuth2ProxyisareverseproxythatprovidesauthenticationusingOAuth2providers.Versionspriorto7.15.2 containaconfiguration-dependentauthenticationbypassindeploymentswhereOAuth2Proxyisusedwithan authrequest-styleintegration(suchasnginxauthrequest)andeither--ping-user-agentissetor--gcp- CVE-2026-healthchecksisenabled.Inaffectedconfigurations,OAuth2Proxytreatsanyrequestwiththeconfiguredhealth 9.1 MoreDetails34457checkUser-Agentvalueasasuccessfulhealthcheckregardlessoftherequestedpath,allowingan unauthenticatedremoteattackertobypassauthenticationandaccessprotectedupstreamresources. Deploymentsthatdonotuseauthrequest-stylesubrequestsorthatdonotenable--ping-user-agent/--gcp- healthchecksarenotaffected.Thisissueisfixedin7.15.2. CLIENTCERTauthenticationdoesnotfailasexpectedforsomescenarioswhensoftfailisdisabledvulnerability inApacheTomcat,ApacheTomcatNative.ThisissueaffectsApacheTomcat:from11.0.0-M1through11.0.18, CVE-2026-from10.1.0-M7through10.1.52,from9.0.83through9.0.115;ApacheTomcatNative:from1.1.23through 9.1 MoreDetails291451.1.34,from1.2.0through1.2.39,from1.3.0through1.3.6,from2.0.0through2.0.13.Usersare recommendedtoupgradetoversionTomcatNative1.3.7or2.0.14andTomcat11.0.20,10.1.53and9.0.116, whichfixtheissue. Solstice::Sessionversionsthrough1440forPerlgeneratessessionidsinsecurely.ThegenerateSessionID methodreturnsanMD5digestseededbytheepochtime,arandomhashreference,acalltothebuilt-inrand() functionandtheprocessid.ThesamemethodisusedinthegenerateIDmethodinSolstice::Subsession,CVE-2026-whichispartofthesamedistribution.Theepochtimemaybeguessed,ifitisnotleakedintheHTTPDate 9.1 MoreDetails5085header.Stringifiedhashrefenceswillcontainpredictablecontent.Thebuilt-inrand()functionisseededby16- bitsandisunsuitableforsecuritypurposes.Theprocessidcomesfromasmallsetofnumbers.Predictable sessionidscouldallowanattackertogainaccesstosystems. V2Board1.6.1through1.7.4andXboardthrough0.1.9exposeauthenticationtokensinHTTPresponsebodies oftheloginWithMailLinkendpointwhentheloginwithmaillinkenablefeatureisactive.UnauthenticatedCVE-2026-attackerscanPOSTtotheloginWithMailLinkendpointwithaknownemailaddresstoreceivethefull 9.1 MoreDetails39912authenticationURLintheresponse,thenexchangethetokenatthetoken2Loginendpointtoobtainavalid bearertokenwithcompleteaccountaccessincludingadminprivileges. OpenCTIisanopensourceplatformformanagingcyberthreatintelligenceknowledgeandobservables.Prior CVE-2026-to6.9.5,thesafeEjs.tsfiledoesnotproperlysanitizeEJStemplates.UserswiththeManagecustomization 9.1 MoreDetails39980capabilitycanrunarbitraryJavaScriptinthecontextoftheOpenCTIplatformprocessduringnotifiertemplate execution.Thisvulnerabilityisfixedin6.9.5. omaisapackagemanagerforAOSCOS.Priorto1.25.2,oma-topicsisresponsibleforfetchingmetadatafor testingrepositories(topics)named"TopicManifests"({mirror}/debs/manifest/topics.json)fromremote repositoryservers,registeringthemasAPTsourceentries.However,thenamefieldinsaidmetadatawerenotCVE-2026-checkedfortransliteration.Inthiscase,amaliciouspartymaysupplyamalformedTopicManifest,whichmay 9.1 MoreDetails39958causemaliciousAPTsourceentriestobeaddedto/etc/apt/sources.list.d/atm.listasoma-topicsfinishes fetchingandregisteringmetadata.Thisvulnerabilityisfixedin1.25.2.
CVE-2026- ADynamic-linkLibraryInjectionvulnerabilityinOSGeoProjectMapServerbeforev8.0allowsattackersto 9.1 MoreDetails30479 executearbitrarycodeviaacraftedexecutable. Anout-of-boundsreadvulnerabilityexistsintheDecodeLookupTablefunctionwithin DicomImageDecoder.cpp.Thelookup-tabledecodinglogicusedforPALETTECOLORimagesdoesnotCVE-2026- validatepixelindicesagainstthelookuptablesize.Craftedimagescontainingindiceslargerthanthepalette 9.1 MoreDetails sizecausethedecodertoreadbeyondallocatedlookuptablememoryandexposeheapcontentsintheoutput image.
InCanonicalLXDversions4.12through6.7,thedoCertificateUpdatefunctioninlxd/certificates.godoesnotCVE-2026- 9.1 MoreDetailsvalidatetheTypefieldwhenhandlingPUT/PATCHrequeststo/1.0/certificates/{fingerprint}forrestrictedTLS34179certificateusers,allowingaremoteauthenticatedattackertoescalateprivilegestoclusteradmin. CVE-2025-Jizhicmsv2.5.4isvulnerabletoServer-SideRequestForgery(SSRF)inUserEvaluation,Message,andComment 9.1 MoreDetails50228modules. CVE-2023-QD20230821isvulnerabletoServer-siderequestforgery(SSRF)viaacraftedrequest 9.1 MoreDetails46945 AServer-SideRequestForgery(SSRF)vulnerabilityexistsinthePrintFormatfunctionalityofERPNextv16.0.1 andFrappeFrameworkv16.1.1,whereuser-suppliedHTMLisinsufficientlysanitizedbeforebeingrenderedinto PDF.WhengeneratingPDFsfromuser-controlledHTMLcontent,theapplicationallowstheinclusionofHTMLCVE-2026-elementssuchas
CVE-2026- Improperneutralizationofescape,meta,orcontrolsequencesinMicrosoftPowerAppsallowsanauthorized 9.0 MoreDetails26149 attackertobypassasecurityfeatureoveranetwork.
OTHERVULNERABILITIES
CVE Base Description ReferenceNumber Score
CVE- CrossSiteRequestForgeryvulnerabilityinPhpbbphbb3v.3.3.15allowsalocalattackertoexecutearbitrarycodevia More2025- 8.8 theloginfunctionandtheauthenticationmechanism Details70810 AvulnerabilitywasfoundinTendaAC915.03.02.13.TheaffectedelementisthefunctiondecodePwdofthefileCVE- /goform/WizardHandleofthecomponentPOSTRequestHandler.PerformingamanipulationoftheargumentWANS More2026- 8.8 resultsinstack-basedbufferoverflow.Theattackcanbeinitiatedremotely.Theexploithasbeenmadepublicand Details6016 couldbeused. CVE- AflawhasbeenfoundinTendaF4511.0.0.7.AffectedbythisvulnerabilityisthefunctionWrlclientSetofthefile More2026- /goform/WrlclientSetofthecomponenthttpd.ThismanipulationoftheargumentGOcausesstack-basedbuffer 8.8 Details6121 overflow.Theattackmaybeinitiatedremotely.Theexploithasbeenpublishedandmaybeused. CVE- AvulnerabilitywasdetectedinTendaF4511.0.0.7.AffectedisthefunctionfromDhcpListClientofthefile More2026- /goform/DhcpListClientofthecomponenthttpd.Themanipulationoftheargumentpageresultsinstack-basedbuffer 8.8 Details6120 overflow.Theattackcanbelaunchedremotely.Theexploitisnowpublicandmaybeused. TheBuddyPressGroupblogpluginforWordPressisvulnerabletoPrivilegeEscalationinallversionsupto,and including,1.9.3.Thisisduetothegroupblogsettingshandleracceptingthegroupblog-blogid,default-member, andgroupblog-silent-addparametersfromuserinputwithoutproperauthorizationchecks.Thegroupblog-blogid CVE- parameterallowsanygroupadmin(includingSubscriberswhocreatetheirowngroup)toassociatetheirgroupwith More2026- anyblogontheMultisitenetwork,includingthemainsite(blogID1).Thedefault-memberparameteracceptsany 8.8 Details5144 WordPressrole,includingadministrator,withoutvalidationagainstawhitelist.Whencombinedwithgroupblog- silent-add,anyuserwhojoinstheattacker'sgroupisautomaticallyaddedtothetargetedblogwiththeinjectedrole. Thismakesitpossibleforauthenticatedattackers,withSubscriber-levelaccessandabove,toescalateanyuser (includingthemselvesviaasecondaccount)toAdministratoronthemainsiteoftheMultisitenetwork. CVE- InsufficientlyprotectedcredentialsinAzureLogicAppsallowsanauthorizedattackertoelevateprivilegesovera More2026- 8.8 network. Details32171 ChamiloLMSisalearningmanagementsystem.Priorto.0.0-RC.3,the CVE- PlatformConfigurationController::decodeSettingArray()methodusesPHP'seval()toparseplatformsettingsfromthe More2026- database.Anattackerwithadminaccess(obtainableviaAdvisory1)caninjectarbitraryPHPcodeintothesettings, 8.8 Details33618 whichisthenexecutedwhenanyuser(includingunauthenticated)requests/platform-config/list.Thisvulnerabilityis fixedin2.0.0-RC.3. CVE- OpenClawbefore2026.3.25containsaprivilegeescalationvulnerabilityingateway-authenticatedpluginHTTProutes More2026- thatincorrectlymintoperator.adminruntimescoperegardlessofcaller-grantedscopes.Attackerscanexploitthis 8.8 Details35669 scopeboundarybypasstogainelevatedprivilegesandperformunauthorizedadministrativeactions. CVE- OpenClawbefore2026.3.22containsanallowlistbypassvulnerabilityinsystem.runapprovalsthatfailstounwrap More2026- /usr/bin/timewrappers.Attackerscanbypassexecutablebindingrestrictionsbyusinganunregisteredtimewrapper 8.8 Details35666 toreuseapprovalstateforinnercommands. CVE- OpenClawbefore2026.3.25containsaprivilegeescalationvulnerabilityallowingnon-adminoperatorstoself-request More2026- broaderscopesduringbackendreconnect.Attackerscanbypasspairingrequirementstoreconnectas 8.8 Details35663 operator.admin,gainingunauthorizedadministrativeprivileges. CVE- OpenClawbefore2026.3.22containsanunvalidatedWebViewJavascriptInterfacevulnerabilityallowingattackersto More2026- injectarbitraryinstructions.Untrustedpagescaninvokethecanvasbridgetoexecutemaliciouscodewithinthe 8.8 Details35643 Androidapplicationcontext. AnissuewasdiscoveredinBMCControl-M/MFT9.0.20through9.0.22.ASQLinjectionvulnerabilityintheMFTAPI'sCVE- debuginterfaceallowsanauthenticatedattackertoinjectmaliciousqueriesduetoimproperinputvalidationand More2026- 8.8 unsafedynamicSQLhandling.Successfulexploitationcanenablearbitraryfileread/writeoperationsandpotentially Details23780 leadtoremotecodeexecution. CVE- LiteLLMthrough2026-04-08allowsremoteattackerstoexecutearbitrarycodeviabytecoderewritingatthe More2026- 8.8 /guardrails/testcustomcodeURI. Details40217 AvulnerabilityhasbeenfoundinTendaAC915.03.02.13.ImpactedisthefunctionformQuickIndexofthefileCVE- /goform/QuickIndexofthecomponentPOSTRequestHandler.SuchmanipulationoftheargumentPPPOEPassword More 8.8 leadstostack-basedbufferoverflow.Itispossibletolaunchtheattackremotely.Theexploithasbeendisclosedto Details thepublicandmaybeused. CVE- UseafterfreeinWebRTCinGoogleChromepriorto147.0.7727.55allowedaremoteattackertoexecutearbitrary More
codeinsideasandboxviaacraftedHTMLpage.(Chromiumsecurityseverity:High) 8.8 Details
PraisonAIisamulti-agentteamssystem.Priorto4.5.115,thecreateagentcentrictools()functionreturnstools(likeCVE-acpcreatefile)thatprocessfilecontentusingtemplaterendering.Whenuserinputfromagent.start()ispassed More 8.8directlyintothesetoolswithoutescaping,templateexpressionsintheinputareexecutedratherthantreatedas Details39891literaltext.Thisvulnerabilityisfixedin4.5.115. AflawhasbeenfoundinD-LinkDIR-5131.10.ThisissueaffectsthefunctionformAdvanceSetupofthefileCVE-/goform/formAdvanceSetupofthecomponentPOSTRequestHandler.Thismanipulationoftheargumentwebpage More2026- 8.8causesbufferoverflow.Itispossibletoinitiatetheattackremotely.Theexploithasbeenpublishedandmaybeused. Details6014 AvulnerabilitywasdetectedinD-LinkDIR-5131.10.ThisvulnerabilityaffectsthefunctionformSetRouteofthefileCVE-/goform/formSetRouteofthecomponentPOSTRequestHandler.ThemanipulationoftheargumentcurTimeresultsin More2026- 8.8bufferoverflow.Theattackmaybeperformedfromremote.Theexploitisnowpublicandmaybeused.This Details6013 AsecurityvulnerabilityhasbeendetectedinD-LinkDIR-5131.10.ThisaffectsthefunctionformSetPasswordoftheCVE-file/goform/formSetPasswordofthecomponentPOSTRequestHandler.ThemanipulationoftheargumentcurTime More2026- 8.8leadstobufferoverflow.Theattackispossibletobecarriedoutremotely.Theexploithasbeendisclosedpubliclyand Details6012maybeused.Thisvulnerabilityonlyaffectsproductsthatarenolongersupportedbythemaintainer. CVE-AvulnerabilitywasdeterminedinTendaF4511.0.0.7.ThisaffectsthefunctionfromP2pListFilterofthefile More2026-/goform/P2pListFilter.Thismanipulationoftheargumentpagecausesstack-basedbufferoverflow.Remote 8.8 Details5992exploitationoftheattackispossible.Theexploithasbeenpubliclydisclosedandmaybeutilized. CVE-AvulnerabilitywasfoundinTendaF4511.0.0.7.AffectedbythisissueisthefunctionformWrlExtraSetofthefile More2026-/goform/WrlExtraSet.ThemanipulationoftheargumentGOresultsinstack-basedbufferoverflow.Theattackmaybe 8.8 Details5991launchedremotely.Theexploithasbeenmadepublicandcouldbeused. CVE-AvulnerabilityhasbeenfoundinTendaF4511.0.0.7.AffectedbythisvulnerabilityisthefunctionfromSafeEmailFilter More2026-ofthefile/goform/SafeEmailFilter.Themanipulationoftheargumentpageleadstostack-basedbufferoverflow.The 8.8 Details5990attackmaybeinitiatedremotely.Theexploithasbeendisclosedtothepublicandmaybeused. CVE-AflawhasbeenfoundinTendaF4511.0.0.7.AffectedisthefunctionfromRouteStaticofthefile/goform/RouteStatic. More2026-Executingamanipulationoftheargumentpagecanleadtostack-basedbufferoverflow.Theattackcanbelaunched 8.8 Details5989remotely.Theexploithasbeenpublishedandmaybeused. CVE-IntegersizetruncationinWindowsAdvancedRasterizationPlatform(WARP)allowsanunauthorizedattackerto More2026- 8.8 Details26178 CVE-AvulnerabilitywasdetectedinTendaF4511.0.0.7.ThisimpactsthefunctionformWrlsafesetofthefile More2026-/goform/AdvSetWrlsafeset.Performingamanipulationoftheargumentmitssidresultsinstack-basedbufferoverflow. 8.8 Details5988Theattackcanbeinitiatedremotely.Theexploitisnowpublicandmaybeused. CVE-HeapbufferoverflowinWebMLinGoogleChromepriorto147.0.7727.55allowedaremoteattackertoexecute More2026- 8.8arbitrarycodeviaacraftedHTMLpage.(Chromiumsecurityseverity:Critical) Details5858 CVE-AvulnerabilityhasbeenfoundinTendaF4511.0.0.7.AffectedbythisissueisthefunctionfrmL7ProtFormofthefile More2026-/goform/L7Protofthecomponenthttpd.Suchmanipulationoftheargumentpageleadstostack-basedbuffer 8.8 Details6122overflow.Theattackmaybelaunchedremotely.Theexploithasbeendisclosedtothepublicandmaybeused. CVE-AvulnerabilitywasfoundinTendaF4511.0.0.7.ThisaffectsthefunctionfromAddressNatofthefile More2026-/goform/addressNatofthecomponenthttpd.Performingamanipulationoftheargumententrysresultsinstack-based 8.8 Details6123bufferoverflow.Remoteexploitationoftheattackispossible.Theexploithasbeenmadepublicandcouldbeused. AvulnerabilitywasdeterminedinTendaF4511.0.0.7.ThisvulnerabilityaffectsthefunctionfromSafeMacFilteroftheCVE-file/goform/SafeMacFilterofthecomponenthttpd.Executingamanipulationoftheargumentpage/menufacturercan More2026- 8.8leadtostack-basedbufferoverflow.Theattackcanbeexecutedremotely.Theexploithasbeenpubliclydisclosed Details6124andmaybeutilized. CVE-AvulnerabilitywasidentifiedinTendaF4511.0.0.7cnsvn7958.ThisaffectsthefunctionfromSafeUrlFilterofthefile More2026-/goform/SafeUrlFilter.Suchmanipulationoftheargumentpageleadstostack-basedbufferoverflow.Theattackcan 8.8 Details6133beexecutedremotely.Theexploitispubliclyavailableandmightbeused. CVE- More2026- 8.8 Details26167 CVE-Aimproperneutralizationofspecialelementsusedinansqlcommand('sqlinjection')vulnerabilityinFortinet MoreFortiDDoS-F7.2.1through7.2.2mayallowattackertoexecuteunauthorizedcodeorcommandsviasendingcrafted 8.8 Details39815HTTPrequests CVE-ABrokenObject-LevelAuthorization(BOLA)inthe/Settings/UserController.phpendpointofWebkulKrayinCRMv2.2.x More allowsauthenticatedattackerstoarbitrarilyresetuserpasswordsandperformafullaccounttakeoverviasupplyinga 8.8 Details
38529 craftedHTTPrequest. CVE- AvulnerabilityhasbeenidentifiedinRUGGEDCOMCROSSBOWSecureAccessManagerPrimary(SAM-P)(Allversions More <V5.8).UserAdministratorsareallowedtoadministergroupstheybelongto.ThiscouldallowanauthenticatedUser 8.8 Details27668 Administratortoescalatetheirownprivilegesandgrantthemselvesaccesstoanydevicegroupatanyaccesslevel. CVE- AvulnerabilityhasbeenidentifiedinSINECNMS(Allversions<V4.0SP3).Affectedproductsdonotproperlyvalidate More2026- userauthorizationwhenprocessingpasswordresetrequests.Thiscouldallowanauthenticatedremoteattackerto 8.8 Details25654 bypassauthorizationchecks,leadingtotheabilitytoresetthepasswordofanyarbitraryuseraccount. CVE- AvulnerabilitywasdeterminedinTendaF4561.0.0.5.Theaffectedelementisthefunctionformwebtypelibraryofthe More2026- file/goform/webtypelibrary.Thismanipulationoftheargumentmenufacturer/Gocausesstack-basedbufferoverflow. 8.8 Details6200 Theattackcanbeinitiatedremotely.Theexploithasbeenpubliclydisclosedandmaybeutilized. CVE- AvulnerabilitywasfoundinTendaF4561.0.0.5.Impactedisthefunctionfromqossettingofthefile More2026- /goform/qossetting.Themanipulationoftheargumentpageresultsinstack-basedbufferoverflow.Itispossibleto 8.8 Details6199 launchtheattackremotely.Theexploithasbeenmadepublicandcouldbeused. CVE- AvulnerabilityhasbeenfoundinTendaF4561.0.0.5.ThisissueaffectsthefunctionfromNatStaticSettingofthefile More2026- /goform/NatStaticSetting.Themanipulationoftheargumentpageleadstostack-basedbufferoverflow.Itispossible 8.8 Details6198 toinitiatetheattackremotely.Theexploithasbeendisclosedtothepublicandmaybeused. CVE- AflawhasbeenfoundinTendaF4561.0.0.5.ThisvulnerabilityaffectsthefunctionformWrlsafesetofthefile More2026- /goform/AdvSetWrlsafeset.Executingamanipulationoftheargumentmitssidcanleadtostack-basedbuffer 8.8 Details6197 overflow.Theattackmaybeperformedfromremote.Theexploithasbeenpublishedandmaybeused. CVE- Pachno1.0.6containsanunrestrictedfileuploadvulnerabilitythatallowsauthenticateduserstouploadarbitraryfile More2026- typesbybypassingineffectiveextensionfilteringtothe/uploadfileendpoint.Attackerscanuploadexecutablefiles 8.8 Details40040 .php5scriptstoweb-accessibledirectoriesandexecutethemtoachieveremotecodeexecutionontheserver. CVE- AvulnerabilitywasdetectedinTendaF4561.0.0.5.ThisaffectsthefunctionfromexeCommandofthefile More2026- /goform/exeCommand.Performingamanipulationoftheargumentcmdinputresultsinstack-basedbufferoverflow. 8.8 Details6196 Theattackispossibletobecarriedoutremotely.Theexploitisnowpublicandmaybeused. AweaknesshasbeenidentifiedinTotolinkA3002MUB20211125.1046.AffectedbythisvulnerabilityisthefunctionCVE- sub410188ofthefile/boafrm/formWlanSetupofthecomponentHTTPRequestHandler.Thismanipulationofthe More2026- 8.8 argumentwan-urlcausesstack-basedbufferoverflow.Remoteexploitationoftheattackispossible.Theexploithas Details6194 beenmadeavailabletothepublicandcouldbeusedforattacks. CVE- AsecurityvulnerabilityhasbeendetectedinUTTHiPER1200GWupto2.5.3-170306.Thisvulnerabilityaffectsthe More2026- functionstrcpyofthefile/goform/formNatStaticMap.ThemanipulationoftheargumentNatBindleadstobuffer 8.8 Details6186 overflow.Theattackispossibletobecarriedoutremotely.Theexploithasbeendisclosedpubliclyandmaybeused. CVE- DagAuthors,whonormallyshouldnotbeabletoexecutecodeinthewebservercontextcouldcraftXCompayload More2026- causingthewebservertoexecutearbitrarycode.SinceDagAuthorsarealreadyhighlytrusted,severityofthisissue 8.8 Details33858 isLow.UsersarerecommendedtoupgradetoApacheAirflow3.2.0,whichresolvesthisissue. DeserializationofUntrustedDatavulnerabilityinApacheStorm.VersionsAffected:before2.8.6.Description:When processingtopologycredentialssubmittedviatheNimbusThriftAPI,Stormdeserializesthebase64-encodedTGTblob usingObjectInputStream.readObject()withoutanyclassfilteringorvalidation.Anauthenticateduserwithtopology CVE- submissionrightscouldsupplyacraftedserializedobjectinthe"TGT"credentialfield,leadingtoremotecode More2026- executioninboththeNimbusandWorkerJVMs.Mitigation:2.xusersshouldupgradeto2.8.6.Userswhocannot 8.8 Details35337 upgradeimmediatelyshouldmonkey-patchanObjectInputFilterallow-listto ClientAuthUtils.deserializeKerberosTicket()restrictingdeserializedclassesto javax.security.auth.kerberos.KerberosTicketanditsknowndependencies.Aguideonhowtodothisisavailableinthe releasenotesof2.8.6.Credit:ThisissuewasdiscoveredbyK. CVE- AflawhasbeenfoundinTOTOLINKA7000Rupto9.1.0u.6115.Theaffectedelementisthefunction More2026- setWiFiEasyGuestCfgofthefile/cgi-bin/cstecgi.cgi.Thismanipulationoftheargumentssid5gcausesstack-based 8.8 Details6168 bufferoverflow.Remoteexploitationoftheattackispossible.Theexploithasbeenpublishedandmaybeused. CVE- AvulnerabilitywasdetectedinTotolinkA800R4.1.2cu.5137B20200730.Thisimpactsthefunction More2026- setAppEasyWizardConfiginthelibrary/lib/cstemodules/app.so.ThemanipulationoftheargumentapcliSsidresultsin 8.8 Details6157 bufferoverflow.Theattackcanbeexecutedremotely.Theexploitisnowpublicandmaybeused. TheAdvancedMembersforACFpluginforWordPressisvulnerabletoarbitraryfiledeletionduetoinsufficientfile CVE- pathvalidationinthecreatecropfunctioninallversionsupto,andincluding,1.2.5.Thismakesitpossiblefor More2026- authenticatedattackers,withSubscriber-levelaccessandabove,todeletearbitraryfilesontheserver,whichcan 8.8 Details3243 easilyleadtoremotecodeexecutionwhentherightfileisdeleted(suchaswp-config.php).Thevulnerabilitywas partiallypatchedinversion1.2.5. CVE- AvulnerabilitywasdetectedinTendaF4511.0.0.7cnsvn7958.TheaffectedelementisthefunctionfromAdvSetWan More2026- ofthefile/goform/AdvSetWan.Themanipulationoftheargumentwanmode/PPPOEPasswordresultsinstack-based 8.8 Details bufferoverflow.Itispossibletolaunchtheattackremotely.Theexploitisnowpublicandmaybeused. CVE- AsecurityvulnerabilityhasbeendetectedinTendaF4511.0.0.7cn_svn7958.ImpactedisthefunctionfrmL7ImForm More ofthefile/goform/L7Im.Themanipulationoftheargumentpageleadstostack-basedbufferoverflow.Itispossibleto 8.8 Details initiatetheattackremotely.Theexploithasbeendisclosedpubliclyandmaybeused.
AweaknesshasbeenidentifiedinTendaF4511.0.0.7cnsvn7958.ThisissueaffectsthefunctionfromSetIpBindofCVE-thefile/goform/SetIpBind.Executingamanipulationoftheargumentpagecanleadtostack-basedbufferoverflow. More 8.8Theattackmaybeperformedfromremote.Theexploithasbeenmadeavailabletothepublicandcouldbeusedfor Details attacks. AsecurityflawhasbeendiscoveredinTendaF4511.0.0.7cnsvn7958.ThisvulnerabilityaffectsthefunctionCVE-fromqossettingofthefile/goform/qossetting.Performingamanipulationoftheargumentqosresultsinstack-based More2026- 8.8bufferoverflow.Theattackispossibletobecarriedoutremotely.Theexploithasbeenreleasedtothepublicand Details6134maybeusedforattacks. CVE- More2026-UseafterfreeinRemoteDesktopClientallowsanunauthorizedattackertoexecutecodeoveranetwork. 8.8 Details32157 CVE-IntegeroverflowinWebMLinGoogleChromepriorto147.0.7727.55allowedaremoteattackertopotentiallyexploit More2026- 8.8heapcorruptionviaacraftedHTMLpage.(Chromiumsecurityseverity:Critical) Details5859 CVE-ProtectionmechanismfailureinWindowsShellallowsanunauthorizedattackertobypassasecurityfeatureovera More2026- 8.8network. Details32225 CVE-UseafterfreeinV8inGoogleChromepriorto147.0.7727.55allowedaremoteattackertoexecutearbitrarycode More2026- 8.8 Details5861 CVE-IntegeroverflowinWebRTCinGoogleChromepriorto147.0.7727.55allowedaremoteattackertoperformanoutof More2026- 8.8boundsmemorywriteviaacraftedHTMLpage.(Chromiumsecurityseverity:Low) Details5912 AflawhasbeenfoundinD-LinkDIR-605L2.13B01.AffectedbythisissueisthefunctionformSetMACFilterofthefileCVE-/goform/formSetMACFilterofthecomponentPOSTRequestHandler.ThismanipulationoftheargumentcurTime More2026- 8.8causesbufferoverflow.Theattackmaybeinitiatedremotely.Theexploithasbeenpublishedandmaybeused.This Details5980 CVE-InappropriateimplementationinV8inGoogleChromepriorto147.0.7727.55allowedaremoteattackertoexecute More2026- 8.8arbitrarycodeinsideasandboxviaacraftedHTMLpage.(Chromiumsecurityseverity:High) Details5862 CVE-UseafterfreeinV8inGoogleChromepriorto147.0.7727.55allowedanattackerwhoconvincedausertoinstalla More2026-maliciousextensiontopotentiallyexploitheapcorruptionviaacraftedChromeExtension.(Chromiumsecurity 8.8 Details5904 ChamiloLMSisanopen-sourcelearningmanagementsystem.Inversionspriorto2.0.0-RC.3,anOSCommand Injectionvulnerabilityexistsinthemain/inc/ajax/gradebook.ajax.phpendpointwithintheexportallcertificates action,wherethecoursecoderetrievedfromthesessionvariable$SESSION['cid']viaapigetcourseid()isCVE-concatenateddirectlyintoashellexec()commandstringwithoutsanitizationorescapingusingescapeshellarg().If More2026- 8.8anattackercanmanipulateorpoisontheirsessiondatatoinjectshellmetacharactersintothecidvariable,theycan Details35196achievearbitrarycommandexecutionontheunderlyingserver.Successfulexploitationgrantsfullaccesstoread systemfilesandcredentials,alterstheapplicationanddatabase,ordisruptsserveravailability.Thisissuehasbeen fixedinversion2.0.0-RC.3. ChamiloLMSisanopen-sourcelearningmanagementsystem.Inversionspriorto2.0.0-RC.3,aninsecuredirect objectmodificationvulnerabilityinthePUT/api/users/{id}endpointallowsanyauthenticateduserwith CVE-ROLESTUDENTtoescalatetheirprivilegestoROLEADMINbymodifyingtherolesfieldontheirownuserrecord.The More2026-APIPlatformsecurityexpressionisgranted('EDIT',object)onlyverifiesrecordownership,andtherolesfieldis 8.8 Details40291includedinthewritableserializationgroup,enablinganyusertosetarbitraryrolessuchasROLEADMIN.Successful exploitationgrantsfulladministrativecontroloftheplatform,includingaccesstoallcourses,userdata,grades,and administrativesettings.Thisissuehasbeenfixedinversion2.0.0-RC.3. CVE-IntegeroverflowinMediainGoogleChromepriorto147.0.7727.55allowedaremoteattackertopotentiallyexploit More2026- 8.8heapcorruptionviaacraftedvideofile.(Chromiumsecurityseverity:Low) Details5908 CVE-IntegeroverflowinMediainGoogleChromepriorto147.0.7727.55allowedaremoteattackertopotentiallyexploit More2026- 8.8heapcorruptionviaacraftedvideofile.(Chromiumsecurityseverity:Low) Details5909 CVE-IntegeroverflowinMediainGoogleChromepriorto147.0.7727.55allowedaremoteattackertopotentiallyexploit More2026- 8.8heapcorruptionviaacraftedvideofile.(Chromiumsecurityseverity:Low) Details5910 TheProductFeedPROforWooCommercebyAdTribes-ProductFeedsforWooCommercepluginforWordPressis vulnerabletoCross-SiteRequestForgeryinversions13.4.6through13.5.2.1.Thisisduetomissingorincorrectnonce validationontheajaxmigratetocustomposttype,ajaxadtclearcustomattributesproductmetakeys,CVE- Moreajaxupdatefileurltolowercase,ajaxuselegacyfiltersandrules,andajaxfixduplicate_feedfunctions.This 8.8
3499 makesitpossibleforunauthenticatedattackerstotriggerfeedmigration,clearcustom-attributetransientcaches, Details rewritefeedfileURLstolowercase,togglelegacyfilterandrulesettings,anddeleteduplicatedfeedpostsviaa forgedrequestgrantedtheycantrickasiteadministratorintoperforminganactionsuchasclickingonalink.
CVE- TypeConfusioninCSSinGoogleChromepriorto147.0.7727.55allowedanattackerwhoconvincedausertoinstalla More2026- maliciousextensiontopotentiallyexploitheapcorruptionviaacraftedChromeExtension.(Chromiumsecurity 8.8 Details5914 OpenClawbefore2026.3.22containsaprivilegeescalationvulnerabilityintheControlUIthatallowsunauthenticatedCVE- sessionstoretainself-declaredprivilegedscopeswithoutdeviceidentityverification.Attackerscanexploitthe More2026- 8.8 device-lessallowpathinthetrusted-proxymechanismtomaintainelevatedpermissionsbydeclaringarbitrary Details35638 scopes,bypassingdeviceidentityrequirements. AvulnerabilitywasdetectedinD-LinkDIR-6451.01/1.02/1.03.ImpactedisthefunctionhedwigcgimainofthefileCVE- /cgi-bin/hedwig.cgi.Themanipulationresultsinstack-basedbufferoverflow.Theattackcanbelaunchedremotely. More2026- 8.8 Theexploitisnowpublicandmaybeused.Thisvulnerabilityonlyaffectsproductsthatarenolongersupportedby Details5815 themaintainer. TheVertexAddonsforElementorpluginforWordPressisvulnerabletoMissingAuthorizationinallversionsuptoand including1.6.4.Thisisduetoimproperauthorizationenforcementintheactivaterequiredplugins()function. CVE- Specifically,thecurrentusercan('installplugins')capabilitycheckdoesnotterminateexecutionwhenitfails--it More2026- onlysetsanerrormessagevariablewhileallowingtheplugininstallationandactivationcodetoexecute.Theerror 8.8 Details4326 responseisonlysentaftertheinstallationandactivationhavealreadycompleted.Thismakesitpossiblefor authenticatedattackers,withSubscriber-levelaccessandabove,toinstallandactivatearbitrarypluginsfromthe WordPress. CVE- AvulnerabilitywasidentifiedinTendaAC1515.03.05.18.ThisaffectsthefunctionwebsGetVarofthefile More2026- /goform/SysToolChangePwd.SuchmanipulationoftheargumentoldPwd/newPwd/cfmPwdleadstostack-basedbuffer 8.8 Details5830 overflow.Theattackcanbeexecutedremotely.Theexploitispubliclyavailableandmightbeused. CVE- SWIGfilenamescontaining'cgo'andwell-craftedpayloadscouldleadtocodesmugglingandarbitrarycode More2026- 8.8 executionatbuildtimeduetotrustlayerbypass. Details27140 AGiXTisadynamicAIAgentAutomationPlatform.Priorto1.9.2,thesafejoin()functionintheessentialabilitiesCVE- extensionfailstovalidatethatresolvedfilepathsremainwithinthedesignatedagentworkspace.Anauthenticated More2026- 8.8 attackercanusedirectorytraversalsequencestoread,write,ordeletearbitraryfilesontheserverhostingtheAGiXT Details39981 instance.Thisvulnerabilityisfixedin1.9.2. CVE- IBMLangflowDesktop1.6.0through1.8.2Langflowcouldallowanauthenticatedusertoexecutearbitrarycodeon More2026- thesystem,causedbyaninsecuredefaultsettingwhichpermitsthedeserializationofuntrusteddataintheFAISS 8.8 Details3357 component. HashgraphGuardianthroughversion3.5.0containsanunsandboxedJavaScriptexecutionvulnerabilityintheCustom LogicpolicyblockworkerthatallowsauthenticatedStandardRegistryuserstoexecutearbitrarycodebypassingCVE- user-suppliedJavaScriptexpressionsdirectlytotheNode.jsFunction()constructorwithoutisolation.Attackerscan More2026- 8.8 importnativeNode.jsmodulestoreadarbitraryfilesfromthecontainerfilesystem,accessprocessenvironment Details39911 variablescontainingsensitivecredentialssuchasRSAprivatekeys,JWTsigningkeys,andAPItokens,andforgevalid authenticationtokensforanyuserincludingadministrators. CVE- ADynamic-linkLibraryInjectionvulnerabilityinGatewayGeoMapServerforWindowsversion5allowsattackersto More2026- 8.8 escalateprivilegesviaacraftedexecutable. Details30478 CVE- AnissuewasdiscoveredinKiamobefore8.4allowingauthenticatedadministrativeattackerstoexecutearbitraryPHP More2025- 8.8 codeontheserver. Details70364 AMissingAuthorizationvulnerabilityintheCLIofJuniperNetworksJunosOSonMXSeriesallowsalocal, authenticateduserwithlowprivilegestoexecutespecificcommandswhichwillleadtoacompletecompromiseof CVE- manageddevices.Anyuserloggedin,withoutrequiringspecificprivileges,canissue'requestcsds'CLIoperational More2026- commands.ThesecommandsareonlymeanttobeexecutedbyhighprivilegedorusersdesignatedforJuniper 8.8 Details33785 DeviceManager(JDM)/ConnectedSecurityDistributedServices(CSDS)operationsastheywillimpactallaspectsof thedevicesmanagedviatherespectiveMX.ThisissueaffectsJunosOSonMXSeries:24.4releasesbefore24.4R2- S3,25.2releasesbefore25.2R2.ThisissuedoesnotaffectJunosOSreleasesbefore24.4. AvulnerabilitywasdetectedinD-LinkDIR-605L2.13B01.AffectedbythisvulnerabilityisthefunctionformVirtualServCVE- ofthefile/goform/formVirtualServofthecomponentPOSTRequestHandler.Themanipulationoftheargument More2026- 8.8 curTimeresultsinbufferoverflow.Theattackcanbelaunchedremotely.Theexploitisnowpublicandmaybeused. Details5979 CVE- IntegeroverflowinSkiainGoogleChromepriorto147.0.7727.55allowedaremoteattackertoexecutearbitrarycode More 8.8 Details AvulnerabilityhasbeenfoundinD-LinkDIR-605L2.13B01.ThisaffectsthefunctionformAdvFirewallofthefileCVE-
/goform/formAdvFirewallofthecomponentPOSTRequestHandler.SuchmanipulationoftheargumentcurTimeleads More 8.8 tobufferoverflow.Theattackmaybelaunchedremotely.Theexploithasbeendisclosedtothepublicandmaybe Details used.Thisvulnerabilityonlyaffectsproductsthatarenolongersupportedbythemaintainer. CVE-InappropriateimplementationinV8inGoogleChromepriorto147.0.7727.55allowedaremoteattackertoexecute More 8.8arbitrarycodeinsideasandboxviaacraftedHTMLpage.(Chromiumsecurityseverity:High) Details5863 CVE- More2026-UntrustedpointerdereferenceinSQLServerallowsanauthorizedattackertoexecutecodeoveranetwork. 8.8 Details33120 AvulnerabilitywasidentifiedinD-LinkDIR-605L2.13B01.ImpactedisthefunctionformSetLogofthefileCVE-/goform/formSetLogofthecomponentPOSTRequestHandler.ThemanipulationoftheargumentcurTimeleadsto More2026- 8.8bufferoverflow.Theattackispossibletobecarriedoutremotely.Theexploitispubliclyavailableandmightbeused. Details5984 CVE-TypeConfusioninV8inGoogleChromepriorto147.0.7727.55allowedaremoteattackertoexecutearbitrarycode More2026- 8.8 Details5865 CVE-UseafterfreeinMediainGoogleChromepriorto147.0.7727.55allowedaremoteattackertoexecutearbitrarycode More2026- 8.8 Details5866 AvulnerabilitywasdeterminedinD-LinkDIR-605L2.13B01.ThisissueaffectsthefunctionformSetDDNSofthefileCVE-/goform/formSetDDNSofthecomponentPOSTRequestHandler.ExecutingamanipulationoftheargumentcurTime More2026- 8.8canleadtobufferoverflow.Theattackcanbeexecutedremotely.Theexploithasbeenpubliclydisclosedandmaybe Details5983utilized.Thisvulnerabilityonlyaffectsproductsthatarenolongersupportedbythemaintainer. CVE-HeapbufferoverflowinANGLEinGoogleChromeonMacpriorto147.0.7727.55allowedaremoteattackertoexecute More2026- 8.8arbitrarycodeinsideasandboxviaacraftedHTMLpage.(Chromiumsecurityseverity:High) Details5868 AvulnerabilitywasfoundinD-LinkDIR-605L2.13B01.ThisvulnerabilityaffectsthefunctionformAdvNetworkoftheCVE-file/goform/formAdvNetworkofthecomponentPOSTRequestHandler.Performingamanipulationoftheargument More2026- 8.8curTimeresultsinbufferoverflow.Remoteexploitationoftheattackispossible.Theexploithasbeenmadepublic Details5982andcouldbeused.Thisvulnerabilityonlyaffectsproductsthatarenolongersupportedbythemaintainer. CVE-TypeConfusioninV8inGoogleChromepriorto147.0.7727.55allowedaremoteattackertoexecutearbitrarycode More2026- 8.8 Details5871 CVE-UseafterfreeinBlinkinGoogleChromepriorto147.0.7727.55allowedaremoteattackertoexecutearbitrarycode More2026- 8.8 Details5872 CVE-OutofboundsreadandwriteinV8inGoogleChromepriorto147.0.7727.55allowedaremoteattackertoexecute More2026- 8.8arbitrarycodeinsideasandboxviaacraftedHTMLpage.(Chromiumsecurityseverity:High) Details5873 CVE-Cross-SiteRequestForgery(CSRF)vulnerabilityinspicethemesSpicePressspicepressallowsUploadaWebShelltoa More2026- 8.8WebServer.ThisissueaffectsSpicePress:fromn/athrough<=2.3.2.5. Details39621 CVE-UseafterfreeinNavigationinGoogleChromepriorto147.0.7727.55allowedaremoteattackertoexecutearbitrary More2026- 8.8codeinsideasandboxviaacraftedHTMLpage.(Chromiumsecurityseverity:Medium) Details5877 CVE-InsufficientvalidationofuntrustedinputinANGLEinGoogleChromeonMacpriorto147.0.7727.55allowedaremote More2026- 8.8attackertoexecutearbitrarycodeinsideasandboxviaacraftedHTMLpage.(Chromiumsecurityseverity:Medium) Details5879 openITCOCKPITisanopensourcemonitoringtoolbuiltfordifferentmonitoringengines.openITCOCKPITCommunity Editionpriortoversion5.5.2containsacommandinjectionvulnerabilitythatallowsanauthenticateduserwithCVE-permissiontoaddormodifyhoststoexecutearbitraryOScommandsonthemonitoringbackend.Thevulnerability More2026- 8.8arisesbecauseuser-controlledhostattributes(specificallythehostaddress)areexpandedintomonitoringcommand Details24893templateswithoutvalidation,escaping,orquoting.Thesetemplatesarelaterexecutedbythemonitoringengine (Nagios/Icinga)viaashell,resultinginremotecodeexecution.Version5.5.2patchestheissue. CVE-InsufficientvalidationofuntrustedinputinMediainGoogleChromepriorto147.0.7727.55allowedaremoteattacker More2026-whohadcompromisedtherendererprocesstoexecutearbitrarycodeinsideasandboxviaacraftedHTMLpage. 8.8 Details5884 OpenClawbefore2026.3.22containsaprivilegeescalationvulnerabilityinthedevice.pair.approvemethodthatCVE- allowsanoperator.pairingapprovertoapprovependingdevicerequestswithbroaderoperatorscopesthanthe More 8.8approveractuallyholds.Attackerscanexploitinsufficientscopevalidationtoescalateprivilegestooperator.admin Details35639 andachieveremotecodeexecutionontheNodeinfrastructure.
CVE- project-managementforneuroimagingresearch.Fromtobefore27.0.3and28.0.1,thehelpeditormoduleofLORIS More didnotproperlysanitizesomeusersuppliedvariableswhichcouldresultinareflectedcross-sitescriptingattackifa 8.7 Details35169 useristrickedintofollowinganinvalidlink.Thesameinputvectorcouldalsoallowanattackertodownloadarbitrary markdownfilesonanunpatchedserver.Thisvulnerabilityisfixedin27.0.3and28.0.1. CVE- ImproperinputvalidationinWindowsHelloallowsanunauthorizedattackertobypassasecurityfeatureovera More2026- 8.7 network. Details27928 AKeyExchangewithoutEntityAuthenticationvulnerabilityintheSSHimplementationofJuniperNetworksApstra CVE- allowsaunauthenticated,MITMattackertoimpersonatemanageddevices.DuetoinsufficientSSHhostkeyvalidation More2025- anattackercanperformamachine-in-the-middleattackontheSSHconnectionsfromApstratomanageddevices, 8.7 Details13914 enablinganattackertoimpersonateamanageddeviceandcaptureusercredentials.Thisissueaffectsallversions ofApstrabefore6.1.1. AdobeConnectversions2025.3,12.10andearlierareaffectedbyaCross-SiteScripting(XSS)vulnerabilitythatcould CVE- resultinprivilegeescalation.Alow-privilegedattackercouldexploitthisvulnerabilitytoinjectmaliciousscriptsintoa More2026- webpage,potentiallygainingelevatedaccessorcontroloverthevictim'saccountorsession.Exploitationofthis 8.7 Details34617 issuerequiresuserinteractioninthatavictimmustvisitamaliciouslycraftedURLorinteractwithacompromised webpage.Scopeischanged. ChamiloLMSisanopen-sourcelearningmanagementsystem.Inversionspriorto2.0.0-RC.3,thePENS(Package ExchangeNotificationServices)pluginendpointatpublic/plugin/Pens/pens.phpisaccessiblewithoutauthentication andacceptsauser-controlledpackage-urlparameterthattheserverfetchesusingcurlwithoutfilteringprivateorCVE- internalIPaddresses,enablingunauthenticatedServer-SideRequestForgery(SSRF).Anattackercanexploitthisto More2026- 8.6 probeinternalnetworkservices,accesscloudmetadataendpoints(suchas169.254.169.254)tostealIAMcredentials Details34160 andsensitiveinstancemetadata,ortriggerstate-changingoperationsoninternalservicesviathereceiptandalerts callbackparameters.NoauthenticationisrequiredtoexploiteitherSSRFvector,significantlyincreasingtheattack surface.Thisissuehasbeenfixedinversion2.0.0-RC.3. AcrobatReaderversions26.001.21411,24.001.30360,24.001.30362andearlierareaffectedbyanImproperlyCVE- ControlledModificationofObjectPrototypeAttributes('PrototypePollution')vulnerabilitythatcouldresultinarbitrary More2026- 8.6 codeexecutioninthecontextofthecurrentuser.Exploitationofthisissuerequiresuserinteractioninthatavictim Details34622 mustopenamaliciousfile. AcrobatReaderversions24.001.30356,26.001.21367andearlierareaffectedbyanImproperlyControlledCVE- ModificationofObjectPrototypeAttributes('PrototypePollution')vulnerabilitythatcouldresultinarbitrarycode More2026- 8.6 executioninthecontextofthecurrentuser.Exploitationofthisissuerequiresuserinteractioninthatavictimmust Details34621 openamaliciousfile. ColdFusionversions2023.18,2025.6andearlierareaffectedbyanImproperLimitationofaPathnametoaRestrictedCVE- Directory('PathTraversal')vulnerabilitythatcouldleadtoarbitraryfilesystemread.Anattackercouldexploitthis More2026- 8.6 vulnerabilitytoaccesssensitivefilesanddirectoriesoutsidetheintendedaccessscope.Exploitationofthisissuedoes Details27305 notrequireuserinteraction. CVE- Alow-privilegedremoteattackercansendModbuspacketstomanipulateregistervaluesthatareinputstothe More2026- 8.6 odorantinjectionlogicsuchthattoomuchortoolittleodorantisinjectedintoagasline. Details4436 PraisonAIisamulti-agentteamssystem.Priorto4.5.128,PraisonAI'sAST-basedPythonsandboxcanbebypassed usingtype.getattributetrampoline,allowingarbitrarycodeexecutionwhenrunninguntrustedagentcode.The _executecodedirectfunctioninpraisonaiagents/tools/pythontools.pyusesASTfilteringtoblockdangerousPythonCVE- attributeslikesubclasses,globals,andbases.However,thefilteronlychecksast.Attributenodes,allowing More2026- 8.6 abypass.ThesandboxreliesonAST-basedfilteringofattributeaccessbutfailstoaccountfordynamicattribute Details40158 resolutionviabuilt-inmethodssuchastype.getattribute,resultinginincompleteenforcementofsecurityrestrictions. Thestring'subclasses'isanast.Constant,notanast.Attribute,soitisnevercheckedagainsttheblockedlist.This vulnerabilityisfixedin4.5.128. basic-ftpisanFTPclientforNode.js.Priorto5.2.1,basic-ftpallowsFTPcommandinjectionviaCRLFsequences(\r\n) infilepathparameterspassedtohigh-levelpathAPIssuchascd(),remove(),rename(),uploadFrom(),downloadTo(),CVE- list(),andremoveDir().Thelibrary'sprotectWhitespace()helperonlyhandlesleadingspacesandreturnsotherpaths More2026- 8.6 unchanged,whileFtpContext.send()writestheresultingcommandstringdirectlytothecontrolsocketwith\r\n Details39983 appended.Thisletsattacker-controlledpathstringssplitoneintendedFTPcommandintomultiplecommands.This vulnerabilityisfixedin5.2.1. AdobeFramemakerversions2022.8andearlierareaffectedbyanUntrustedSearchPathvulnerabilitythatmight CVE- allowattackerstoexecutearbitrarycodeinthecontextofthecurrentuser.Iftheapplicationusesasearchpathto More2026- locatecriticalresourcessuchasprograms,thenanattackercouldmodifythatsearchpathtopointtoamalicious 8.6 Details27290 program,whichthetargetedapplicationwouldthenexecute.Exploitationofthisissuedoesnotrequireuser interaction. CVE- TheProductFilterforWooCommercebyWBWWordPresspluginbefore3.1.3doesnotsanitizeandescapea More 8.6 parameterbeforeusingitinaSQLstatement,allowingunauthenticateduserstoperformSQLinjectionattacks Details
Rapid7Velociraptorversionspriorto0.76.2containanimproperinputvalidationvulnerabilityintheclientmonitoring CVE-messagehandlerontheVelociraptorserver(primarilyLinux)thatallowsanauthenticatedremoteattackertowriteto More 8.5arbitraryinternalserverqueuesviaacraftedmonitoringmessagewithamaliciousqueuename.Theserverhandler Detailsthatreceivesclientmonitoringmessagesdoesnotsufficientlyvalidatethequeuenamesuppliedbytheclient, allowingarogueclienttowritearbitrarymessagestoprivilegedinternalqueues.Thismayleadtoremotecode executionontheVelociraptorserver.Rapid7HostedVelociraptorinstancesarenotaffectedbythisvulnerability. CVE-AServer-SideRequestForgery(SSRF)inthe/settings/webhooks/createcomponentofWebkulKrayinCRMv2.2.x More2026- 8.5allowsattackerstoscaninternalresourcesviasupplyingacraftedPOSTrequest. Details38527 n8n-MCPisaModelContextProtocol(MCP)serverthatprovidesAIassistantswithcomprehensiveaccesston8nnode documentation,properties,andoperations.Priorto2.47.4,anauthenticatedServer-SideRequestForgeryinn8n-mcp allowsacallerholdingavalidAUTHTOKENtocausetheservertoissueHTTPrequeststoarbitraryURLssupplied CVE-throughmulti-tenantHTTPheaders.ResponsebodiesarereflectedbackthroughJSON-RPC,soanattackercanread More2026-thecontentsofanyURLtheservercanreach--includingcloudinstancemetadataendpoints(AWSIMDS,GCP,Azure, 8.5 Details39974Alibaba,Oracle),internalnetworkservices,andanyotherhosttheserverprocesshasnetworkaccessto.Theprimary at-riskdeploymentsaremulti-tenantHTTPinstallationswheremorethanoneoperatorcanpresentavalid AUTHTOKEN,orwhereatokenissharedwithless-trustedclients.Single-tenantstdiodeploymentsandHTTP deploymentswithoutmulti-tenantheadersarenotaffected.Thisvulnerabilityisfixedin2.47.4. Directusisareal-timeAPIandAppdashboardformanagingSQLdatabasecontent.Priorto11.17.0,thePATCHCVE-/files/{id}endpointacceptsauser-controlledfilenamediskparameter.Bysettingthisvaluetomatchthestorage More2026- 8.5pathofanotheruser'sfile,anattackercanoverwritethatfile'scontentwhilemanipulatingmetadatafieldssuchas Details39942uploadedbytoobscurethetampering.Thisvulnerabilityisfixedin11.17.0. Anattackercancontrolaserver-sideHTTPrequestbysupplyingacraftedURL,causingtheservertoinitiaterequestsCVE-toarbitrarydestinations.Thisbehaviormaybeexploitedtoprobeinternalnetworkservices,accessotherwise More2026- 8.5unreachableendpoints(e.g.,cloudmetadataservices),orbypassnetworkaccesscontrols,potentiallyleadingto Details5936sensitiveinformationdisclosureandfurthercompromiseoftheinternalenvironment. CVE-GitLabhasremediatedanissueinGitLabCE/EEaffectingallversionsfrom16.9.6before18.8.9,18.9before18.9.5, More2026-and18.10before18.10.3thatcouldhaveallowedanauthenticatedusertoinvokeunintendedserver-sidemethods 8.5 Details5173throughwebsocketconnectionsduetoimproperaccesscontrol. CVE-Aflawwasfoundinodh-dashboardinRedHatOpenshiftAI.Thisvulnerabilityintheodh-dashboardcomponentof More2026-RedHatOpenShiftAI(RHOAI)allowsforthedisclosureofKubernetesServiceAccounttokensthroughaNodeJS 8.5 Details5483endpoint.ThiscouldenableanattackertogainunauthorizedaccesstoKubernetesresources. CVE-IBMVerifyIdentityAccessContainer11.0through11.0.2andIBMSecurityVerifyAccessContainer10.0through More2026-10.0.9.1andIBMVerifyIdentityAccess11.0through11.0.2andIBMSecurityVerifyAccess10.0through10.0.9.1 8.5 Details1342couldallowalocallyauthenticatedusertoexecutemaliciousscriptsfromoutsideofitscontrolsphere. CVE-ImproperNeutralizationofSpecialElementsusedinanSQLCommand('SQLInjection')vulnerabilityinNSquared More2026-SimplyScheduleAppointmentssimply-schedule-appointmentsallowsBlindSQLInjection.ThisissueaffectsSimply 8.5 Details39495ScheduleAppointments:fromn/athrough<=1.6.9.27. CVE-ImproperNeutralizationofSpecialElementsusedinanSQLCommand('SQLInjection')vulnerabilityinSyedBalkhi More2026-UserFeedbackuserfeedback-liteallowsBlindSQLInjection.ThisissueaffectsUserFeedback:fromn/athrough<= 8.5 Details394751.10.1. CVE-HTML5VideoPlayer1.2.5containsalocalbufferoverflowvulnerabilitythatallowsattackerstoexecutearbitrarycode More2019-bysupplyinganoversizedkeycodestring.Attackerscancraftamaliciouspayloadexceeding997bytesandpasteit 8.4 Details25689intotheKEYCODEfieldintheHelpRegisterdialogtotriggercodeexecutionandspawnacalculatorprocess. FaleemiDesktopSoftware1.8containsalocalbufferoverflowvulnerabilityintheSystemSetupdialogthatallowsCVE-attackerstobypassDEPprotectionsthroughstructuredexceptionhandlingexploitation.Attackerscaninjectacrafted More2019- 8.4payloadintotheSavePathforSnapshotandRecordfilefieldtotriggerabufferoverflowandexecutearbitrarycode Details25691viaROPchaingadgets. PraisonAIisamulti-agentteamssystem.Priorto4.5.128,deploy.pyconstructsasinglecomma-delimitedstringfor thegcloudrundeploy--set-env-varsargumentbydirectlyinterpolatingopenaimodel,openaikey,andopenaibaseCVE-withoutvalidatingthatthesevaluesdonotcontaincommas.gcloudusesacommaasthekey-valuepairseparatorfor More2026- 8.4--set-env-vars.AcommainanyofthethreevaluescausesgcloudtoparsethetrailingtextasadditionalKEY=VALUE Details40113definitions,injectingarbitraryenvironmentvariablesintothedeployedCloudRunservice.Thisvulnerabilityisfixedin 4.5.128. PraisonAIisamulti-agentteamssystem.Versions4.5.138andbelowarevulnerabletoarbitrarycodeexecution throughautomatic,unsanitizedimportofatools.pyfilefromthecurrentworkingdirectory.Componentsincluding call.py(importtoolsfromfile()),toolresolver.py(loadlocaltools()),andCLItool-loadingpathsblindlyimportCVE-./tools.pyatstartupwithoutanyvalidation,sandboxing,oruserconfirmation.Anattackerwhocanplaceamalicious More2026- 8.4tools.pyinthedirectorywherePraisonAIislaunched(suchasthroughasharedproject,clonedrepository,orwritable Details40287workspace)achievesimmediatearbitraryPythoncodeexecutioninthehostenvironment.Thiscompromisesthefull PraisonAIprocess,thehostsystem,andanyconnecteddataorcredentials.Thisissuehasbeenfixedinversion 4.5.139. CVE-
UseafterfreeinMicrosoftOfficeWordallowsanunauthorizedattackertoexecutecodelocally. 8.4 More 33115 Details CVE- MoreUntrustedpointerdereferenceinMicrosoftOfficeWordallowsanunauthorizedattackertoexecutecodelocally. 8.4 Details33114 CVE-Heap-basedbufferoverflowinMicrosoftGraphicsComponentallowsanunauthorizedattackertoexecutecode More2026- 8.4locally. Details32221 CVE-ColdFusionversions2023.18,2025.6andearlierareaffectedbyanImproperInputValidationvulnerabilitythatcould More2026-resultinarbitrarycodeexecutioninthecontextofthecurrentuser.Attackerrequireselevatedprivileges.Exploitation 8.4 Details27306ofthisissuerequiresuserinteractioninthatavictimmustopenamaliciousfile. CVE-AcceptanceofextraneousuntrusteddatawithtrusteddatainWindowsCOMallowsanunauthorizedattackerto More2026- 8.4 Details32162 NitroPDFProforWindows14.41.1.4containsaheapuse-after-freevulnerabilityintheimplementationofthe CVE-JavaScriptmethodthis.mailDoc().Duringexecution,aninternalXIDobjectisallocatedandthenfreedprematurely, More2025-afterwhichthefreedpointerisstillpassedintoUIandlogginghelperfunctions.Becausethefreedmemoryregion 8.4 Details69627maycontainunpredictableheapdataorremnantsofattacker-controlledJavaScriptstrings,downstreamroutinessuch aswcscmp()mayprocessinvalidorstalepointers.Thiscanresultinaccessviolationsandnon-deterministiccrashes. CVE- More2026-UseafterfreeinMicrosoftOfficeallowsanunauthorizedattackertoexecutecodelocally. 8.4 Details32190 RGui3.5.0containsalocalbufferoverflowvulnerabilityintheGUIpreferencesdialogthatallowsattackerstobypassCVE-DEPprotectionsthroughstructuredexceptionhandlingexploitation.Attackerscancraftmaliciousinputinthe More2018- 8.4Languageformenusandmessagesfieldtotriggerastack-basedbufferoverflow,executeaROPchainforVirtualAlloc Details25258allocation,andachievearbitrarycodeexecution. CVE-Concurrentexecutionusingsharedresourcewithimpropersynchronization('racecondition')inMicrosoftBrokering More2026- 8.4FileSystemallowsanunauthorizedattackertoelevateprivilegeslocally. Details32091 R3.4.4containsalocalbufferoverflowvulnerabilitythatallowsattackerstoexecutearbitrarycodebyinjectingCVE-maliciousinputintotheGUIPreferenceslanguagefield.Attackerscancraftapayloadwitha292-byteoffsetandJMP More2019- 8.4ESPinstructiontoexecutecommandslikecalc.exewhenthepayloadispastedintotheLanguageformenusand Details25695messagesfield. CVE-EasyVideotoiPodConverter1.6.20containsalocalbufferoverflowvulnerabilityintheuserregistrationfieldthat More2019-allowslocalattackerstooverwritethestructuredexceptionhandler.Attackerscaninputacraftedpayloadexceeding 8.4 Details25701996bytesintheusernamefieldtotriggerSEHoverwriteandexecutearbitrarycodewithuserprivileges. CVE-IBMTivoliNetcoolImpact7.1.0.0through7.1.0.37storessensitiveinformationinlogfilesthatcouldbereadbya More2026- 8.4localuser. Details4788 EchoMirage3.1containsastackbufferoverflowvulnerabilitythatallowslocalattackerstocrashtheapplicationorCVE-executearbitrarycodebysupplyinganoversizedstringintheRulesactionfield.Attackerscancreateamalicioustext More2019- 8.4filewithacraftedpayloadexceedingbufferboundariesandpasteitintotheactionfieldthroughtheRulesdialogto Details25705triggertheoverflowandoverwritethereturnaddress. CVE-ChamiloLMSisalearningmanagementsystem.Priorto1.11.38,thereisapathtraversalin More2026-main/exercise/savescores.phpleadingtoarbitraryfilefeletion.Userinputfrom$REQUEST['test']isconcatenated 8.3 Details31939directlyintofilesystempathwithoutcanonicalizationortraversalchecks.Thisvulnerabilityisfixedin1.11.38. InvenTreeisanOpenSourceInventoryManagementSystem.From0.16.0tobefore1.2.7,anyauthenticated CVE-InvenTreeusercancreateavalidAPItokenattributedtoanyotheruserinthesystem--includingadministratorsand More2026-superusers--bysupplyingthetarget'suserIDintheuserfieldofaPOST/api/user/tokens/request.Thereturned 8.3 Details35478tokenisimmediatelyusableforfullAPIauthenticationasthetargetuser,fromanynetworklocation,withnofurther interactionrequired.Thisvulnerabilityisfixedin1.2.7and1.3.0. Vikunjaisanopen-sourceself-hostedtaskmanagementplatform.Priorto2.3.0,theCanUpdatecheckat pkg/models/projectpermissions.go:139-148onlyrequiresCanWriteonthenewparentprojectwhenchanging parentprojectid.However,Vikunja'spermissionmodelusesarecursiveCTEthatwalksuptheprojecthierarchytoCVE- Morecomputepermissions.Movingaprojectunderadifferentparentchangesthepermissioninheritancechain.Whena2026- 8.3 DetailsuserhasinheritedWriteaccess(fromaparentprojectshare)andreparentsthechildprojectundertheirownproject35595 tree,theCTEresolvestheirownershipofthenewparentasAdmin(permissionlevel2)onthemovedproject.This vulnerabilityisfixedin2.3.0. kcpisaKubernetes-likecontrolplaneforform-factorsanduse-casesbeyondKubernetesandcontainerworkloads.CVE-Priorto0.30.3and0.29.3,thecacheserverisdirectlyexposedbytherootshardandhasnoauthenticationor More 8.2authorizationinplace.Thisallowsanyonewhocanaccesstherootshardtoreadandwritetothecacheserver.This Details
vulnerabilityisfixedin0.30.3and0.29.3.39429 CVE-CommandinjectioninalertsinCoolerControl/coolercontrold<4.0.0allowsauthenticatedattackerstoexecute More 8.2arbitrarycodeasrootviainjectedbashcommandsinalertnames Details WordPressadivahaTravelPlugin2.3containsatime-basedblindSQLinjectionvulnerabilitythatallowsCVE-unauthenticatedattackerstomanipulatedatabasequeriesbyinjectingSQLcodethroughthe'pid'GETparameter. More2023- 8.2Attackerscansendrequeststothe/mobile-app/v3/endpointwithcrafted'pid'valuesusingXOR-basedpayloadsto Details54359extractsensitivedatabaseinformationorcausedenialofservice. PostizisanAIsocialmediaschedulingtool.Priorto2.21.5,the/api/public/streamendpointisvulnerabletoSSRF.CVE-AlthoughtheapplicationvalidatestheinitiallysuppliedURLandblocksdirectprivate/internalhosts,itdoesnotre- More2026- 8.2validatethefinaldestinationafterHTTPredirects.Asaresult,anattackercansupplyapublicHTTPSURLthatpasses Details40168validationandthenredirectstheserver-siderequesttoaninternalresource. CVE-CMSsite1.0containsanSQLinjectionvulnerabilitythatallowsunauthenticatedattackerstomanipulatedatabase More2019-queriesbyinjectingSQLcodethroughthecatidparameter.AttackerscansendGETrequeststocategory.phpwith 8.2 Details25697maliciouscatidvaluestoextractsensitivedatabaseinformationincludingusernamesandcredentials. Saltcornisanextensible,opensource,no-codedatabaseapplicationbuilder.Priorto1.4.5,1.5.5,and1.6.0-beta.4, CVE-thePOST/sync/offlinechangesendpointallowsanunauthenticatedattackertocreatearbitrarydirectoriesandwrite More2026-achanges.jsonfilewithattacker-controlledJSONcontentanywhereontheserverfilesystem.TheGET 8.2 Details40163/sync/uploadfinishedendpointallowsanunauthenticatedattackertolistarbitrarydirectorycontentsandread specificJSONfiles.Thisvulnerabilityisfixedin1.4.5,1.5.5,and1.6.0-beta.4. CVE-DolibarrERP-CRM8.0.4containsanSQLinjectionvulnerabilityintherowidparameteroftheadmindict.phpendpoint More2019-thatallowsattackerstoexecutearbitrarySQLqueries.AttackerscaninjectmaliciousSQLcodethroughtherowid 8.2 Details25710POSTparametertoextractsensitivedatabaseinformationusingerror-basedSQLinjectiontechniques. OPNsenseisaFreeBSDbasedfirewallandroutingplatform.Priorto26.1.6,OPNsense'sLDAPauthentication connectorpassestheloginusernamedirectlyintoanLDAPsearchfilterwithoutcallingldapescape().An CVE-unauthenticatedattackercaninjectLDAPfiltermetacharactersintotheusernamefieldoftheWebGUIloginpageto More2026-enumeratevalidLDAPusernamesintheconfigureddirectory.WhentheLDAPserverconfigurationincludesan 8.2 Details34578ExtendedQuerytorestrictlogintomembersofaspecificgroup,thesameinjectioncanbeusedtobypassthatgroup membershiprestrictionandauthenticateasanyLDAPuserwhosepasswordisknown,regardlessofgroup membership.Thisvulnerabilityisfixedin26.1.6. jqisacommand-lineJSONprocessor.Anintegeroverflowvulnerabilityexiststhroughversion1.8.1withinthe jvpstringappend()andjvpstringcopyreplacebadfunctions,whereconcatenatingstringswithacombinedlength exceeding2^31bytescausesa32-bitunsignedintegeroverflowinthebufferallocationsizecalculation,resultingin CVE-adrasticallyundersizedheapbuffer.Subsequentmemorycopyoperationsthenwritethefullstringdataintothis More2026-undersizedbuffer,causingaheapbufferoverflowclassifiedasCWE-190(IntegerOverflow)leadingtoCWE-122 8.2 Details32316(Heap-basedBufferOverflow).Anysystemevaluatinguntrustedjqqueriesisaffected,asanattackercancrashthe processorpotentiallyachievefurtherexploitationthroughheapcorruptionbycraftingqueriesthatproduce extremelylargestrings.Therootcauseistheabsenceofstringsizeboundschecking,unlikearraysandobjectswhich alreadyhavesizelimits.Theissuehasbeenaddressedincommite47e56d226519635768e6aab2f38f0ab037c09e5. Aheap-basedbufferoverflowvulnerabilityinFortinetFortiAnalyzerCloud7.6.2through7.6.4,FortiManagerCloudCVE-7.6.2through7.6.4mayallowaremoteunauthenticatedattackertoexecutearbitrarycodeorcommandsvia More2026- 8.1specificallycraftedrequests.Successfulexploitationwouldrequirealargeamountofeffortinpreparationbecauseof Details22828ASLRandnetworksegmentation CVE-Concurrentexecutionusingsharedresourcewithimpropersynchronization('racecondition')inWindowsTCP/IP More2026- 8.1allowsanunauthorizedattackertoexecutecodeoveranetwork. Details33827 Anissuewasdiscoveredinmusllibc0.7.10through1.2.6.Stack-basedmemorycorruptioncanoccurduringqsortofCVE-verylargearrays,duetoincorrectlyimplementeddouble-wordprimitives.Thenumberofelementsmustexceed More2026- 8.1aboutsevenmillion,i.e.,the32ndLeonardonumberon32-bitplatforms(orthe64thLeonardonumberon64-bit Details40200platforms,whichisnotpractical). CVE- More2025- 8.1inCactusThemesVideoProallowsPHPLocalFileInclusion.ThisissueaffectsVideoPro:fromn/athrough2.3.8.1. Details58913 TheMWWPFormpluginforWordPressisvulnerabletoArbitraryFileMove/Readinallversionsuptoandincluding 5.1.1.Thisisduetoinsufficientvalidationofthe$nameparameter(uploadfieldkey)passedtothe generateuserfiledirpath()function,whichusesWordPress'spathjoin()--afunctionthatreturnsabsolutepaths unchanged,discardingtheintendedbasedirectory.Theattacker-controlledkeyisinjectedviathemwfuploadfiles[] POSTparameter,whichisloadedintotheplugin'sDatamodelviasetrequestvaliables().Duringformprocessing, CVE-regenerateuploadfilekeys()iteratesoverthesekeysandcallsgenerateuserfilepath()withtheattacker-supplied More 8.1keyasthe$nameargument--thekeysurvivesvalidationbecausethetargetedfile(e.g.,wp-config.php)genuinely Details existsattheabsolutepath.Thegetattachments()methodthenre-readsthesamesurvivingkeysandpassesthe resolvedfilepathtomovetempfiletouploaddir(),whichcallsrename()tomovethefileintotheuploadsfolder. Thismakesitpossibleforunauthenticatedattackerstomovearbitraryfilesontheserver,whichcaneasilyleadto
remotecodeexecutionwhentherightfileismoved(suchaswp-config.php).Thevulnerabilityisonlyexploitableifa fileuploadfieldisaddedtotheformandthe"Savinginquirydataindatabase"optionisenabled. CVE-AplaintextstorageofapasswordvulnerabilityinSynologySSLVPNClientbefore1.4.5-0684allowsremoteattackers Moretoaccessorinfluencetheuser'sPINcodeduetoinsecurestorage.ThismayleadtounauthorizedVPNconfiguration 8.1 Details47961andpotentialinterceptionofsubsequentVPNtrafficwhencombinedwithuserinteraction. OpenClawbefore2026.3.23containsaninsufficientaccesscontrolvulnerabilityintheGatewayagent/resetendpointCVE-thatallowscallerswithoperator.writepermissiontoresetadminsessions.Attackerswithoperator.writeprivilegescan More2026- 8.1invoke/resetor/newmessageswithanexplicitsessionKeytobypassoperator.adminrequirementsandreset Details35660arbitrarysessions. OpenClawbefore2026.3.24containsanincorrectauthorizationvulnerabilityinthePOST/reset-profileendpointthatCVE-allowsauthenticatedcallerswithoperator.writeaccesstobrowser.requesttobypassprofilemutationrestrictions. More2026- 8.1AttackerscaninvokePOST/reset-profilethroughthebrowser.requestsurfacetostoptherunningbrowser,close Details35653Playwrightconnections,andmoveprofiledirectoriestoTrash,crossingintendedprivilegeboundaries. ThePerfmatterspluginforWordPressisvulnerabletoarbitraryfileoverwriteviapathtraversalinallversionsupto, andincluding,2.5.9.ThisisduetothePMCS::action_handler()methodprocessingthebulkaction CVE-activate/deactivatehandlerswithoutanyauthorizationcheckornonceverification.The$_GET['snippets'][] More2026-valuesarepassedunsanitizedtoSnippet::activate()/Snippet::deactivate()whichcallSnippet::update()then 8.1 Details4351file_put_contents()withthetraversedpath.Thismakesitpossibleforauthenticatedattackers,withSubscriber-level accessandabove,tooverwritearbitraryfilesontheserverwithafixedPHPdocblockcontent,potentiallycausing denialofservicebycorruptingcriticalfileslike.htaccessorindex.php. CVE-ABrokenObject-LevelAuthorization(BOLA)inthe/Contact/Persons/PersonController.phpendpointofWebkulKrayin More2026-CRMv2.2.xallowsauthenticatedattackerstoarbitrarilyread,modify,andpermanentlydeleteanycontactownedby 8.1 Details38532otherusersviasupplyingacraftedGETrequest. simple-gitenablesrunningnativeGitcommandsfromJavaScript.Versionsuptoandincluding3.31.1allowexecution ofarbitrarycommandsthroughGitoptionmanipulation,bypassingsafetychecksmeanttoblockdangerousoptions CVE-like-uand--upload-pack.TheflawstemsfromanincompletefixforCVE-2022-25860,asGit'sflexibleoptionparsing More2026-allowsnumerouscharactercombinations(e.g.,-vu,-4u,-nu)tocircumventtheregular-expression-basedblocklistin 8.1 Details28291theunsafeoperationsplugin.DuetothevirtuallyinfinitenumberofvalidoptionvariantsthatGitaccepts,acomplete blocklist-basedmitigationmaybeinfeasiblewithoutfullyemulatingGit'soptionparsingbehavior.Thisissuehasbeen fixedinversion3.32.0. OpenClawbefore2026.3.25containsaprivilegeescalationvulnerabilityinthegatewaypluginsubagentfallbackCVE-deleteSessionfunctionthatusesasyntheticoperator.adminruntimescope.Attackerscanexploitthisbytriggering More2026- 8.1sessiondeletionwithoutarequest-scopedclienttoexecuteprivilegedoperationswithunintendedadministrative Details35645scope. CVE-OutofboundsreadinBlinkinGoogleChromepriorto147.0.7727.55allowedaremoteattackertoperformanoutof More2026- 8.1boundsmemoryreadviaacraftedHTMLpage.(Chromiumsecurityseverity:Low) Details5913 CVE-InsufficientdatavalidationinMediainGoogleChromepriorto147.0.7727.55allowedaremoteattackertoperform More2026- 8.1anoutofboundsmemoryreadviaacraftedvideofile.(Chromiumsecurityseverity:Low) Details5907 nimiq-blockchainprovidespersistentblockstorageforNimiq'sRustimplementation.In1.3.0andearlier,block timestampvalidationenforcesthattimestamp>=parent.timestampfornon-skipblocksandtimestamp==CVE-parent.timestamp+MINPRODUCERTIMEOUTforskipblocks,butthereisnovisibleupperboundcheckagainstthe More2026- 8.1wallclock.Amaliciousblock-producingvalidatorcansetblocktimestampsarbitrarilyfarinthefuture.Thisdirectly Details40093affectsrewardcalculationsviaPolicy::supplyat()andbatchdelay()inblockchain/src/reward.rs,inflatingthe monetarysupplybeyondtheintendedemissionschedule.
authorizationandthemesupport.Priorto0.31.4.0,theinstallrouteguardinci4msreliessolelyonavolatilecacheCVE-check(cache('settings'))combinedwith.envfileexistencetoblockpost-installationaccesstothesetupwizard.When More2026- 8.1thedatabaseistemporarilyunreachableduringacachemiss(TTLexpiryoradmin-triggeredcacheclear),theguard Details39393failsopen,allowinganunauthenticatedattackertooverwritethe.envfilewithattacker-controlleddatabase credentials,achievingfullapplicationtakeover.Thisvulnerabilityisfixedin0.31.4.0. CVE-ABrokenObject-LevelAuthorization(BOLA)inthe/Controllers/Lead/LeadController.phpendpointofWebkulKrayin More2026-CRMv2.2.xallowsauthenticatedattackerstoarbitrarilyread,modify,andpermanentlydeleteanyleadownedby 8.1 Details38530otherusersviasupplyingacraftedGETrequest. CVE-InsufficientvalidationofuntrustedinputinWebMLinGoogleChromepriorto147.0.7727.55allowedaremote More 2026- 8.1attackertoperformanoutofboundsmemorywriteviaacraftedHTMLpage.(Chromiumsecurityseverity:Low) Details 5915 OpenClawbefore2026.3.25containsanimproperaccesscontrolvulnerabilityintheHTTP/sessions/:sessionKey/killCVE-routethatallowsanybearer-authenticatedusertoinvokeadmin-levelsessionterminationfunctionswithoutproper More 8.1scopevalidation.Attackerscanexploitthisbysendingauthenticatedrequeststokillarbitrarysubagentsessionsvia Details34512thekillSubagentRunAdminfunction,bypassingownershipandoperatorscoperestrictions.
BSVRubySDKistheRubySDKfortheBSVblockchain.From0.3.1tobefore0.8.2, BSV::Wallet::WalletClient#acquirecertificatepersistscertificaterecordstostoragewithoutverifyingthecertifier'sCVE-signatureoverthecertificatecontents.Inacquisitionprotocol:'direct',thecallersuppliesallcertificatefields More 8.1(includingsignature:)andtherecordiswrittentostorageverbatim.Inacquisitionprotocol:'issuance',theclient Details40070POSTstoacertifierURLandwriteswhateversignaturetheresponsebodycontains,alsowithoutverification.An attackerwhocanreacheitherAPI(orwhocontrolsacertifierendpointtargetedbytheissuancepath)canforge identitycertificatesthatsubsequentlyappearauthentictolistcertificatesandprove_certificate. CVE-IntegeroverflowvulnerabilityinSamsungOpenSourceEscargotallowsOverflowBuffers.ThisissueaffectsEscargot: More2026- 8.197e8115ab1110bc502b4b5e4a0c689a71520d335. Details25208 CVE-InMesabefore25.3.6and26before26.0.1,out-of-boundsmemoryaccesscanoccurinWebGPUbecausetheamount More2026- 8.1ofto-be-allocateddatadependsonanuntrustedparty,andisthenusedforalloca. Details40393 ImproperLimitationofaPathnametoaRestrictedDirectory(CWE-22)inLogstashcanleadtoarbitraryfilewriteand potentiallyremotecodeexecutionviaRelativePathTraversal(CAPEC-139).ThearchiveextractionutilitiesusedbyCVE-Logstashdonotproperlyvalidatefilepathswithincompressedarchives.Anattackerwhocanserveaspecially More2026- 8.1craftedarchivetoLogstashthroughacompromisedorattacker-controlledupdateendpointcanwritearbitraryfilesto Details33466thehostfilesystemwiththeprivilegesoftheLogstashprocess.Incertainconfigurationswhereautomaticpipeline reloadingisenabled,thiscanbeescalatedtoremotecodeexecution.
authorizationandthemesupport.Priorto0.31.4.0,theInstall::index()controllerreadsthehostPOSTparameter CVE-withoutanyvalidationandpassesitdirectlyintoupdateEnvSettings(),whichwritesitintothe.envfilevia More2026-pregreplace().Becausenewlinecharactersinthevaluearenotstripped,anattackercaninjectarbitrary 8.1 Details39394configurationdirectivesintothe.envfile.TheinstallrouteshaveCSRFprotectionexplicitlydisabled,andthe InstallFiltercanbebypassedwhencache('settings')isempty(cacheexpiryorfreshdeployment).Thisvulnerabilityis fixedin0.31.4.0. nanobotisapersonalAIassistant.Versionspriorto0.1.5containaCross-SiteWebSocketHijacking(CSWSH) vulnerabilityexistsinthebridge'sWebSocketserverinbridge/src/server.ts,resultingfromanincompleteremediation ofCVE-2026-2577.Theoriginalfixchangedthebindingfrom0.0.0.0to127.0.0.1andaddedanoptional CVE-BRIDGETOKENparameter,buttokenauthenticationisdisabledbydefaultandtheserverdoesnotvalidatetheOrigin More2026-headerduringtheWebSockethandshake.BecausebrowsersdonotenforcetheSame-OriginPolicyonWebSockets 8.0 Details35589unlesstheserverexplicitlydeniescross-originconnections,anywebsitevisitedbyauserrunningthebridgecan establishaWebSocketconnectiontows://127.0.0.1:3001/andgainfullaccesstothebridgeAPI.Thisallowsan attackertohijacktheWhatsAppsession,readincomingmessages,stealauthenticationQRcodes,andsend messagesonbehalfoftheuser.Thisissuehasbeefixedinversion0.1.5. CVE-ImproperinputvalidationinWindowsActiveDirectoryallowsanauthorizedattackertoexecutecodeoveranadjacent More2026- 8.0network. Details33826 CVE-ImproperauthorizationinWindowsKerberosallowsanauthorizedattackertoelevateprivilegesoveranadjacent More2026- 8.0network. Details27912 CVE-TotaraLMSv19.1.5andbeforeisvulnerabletoHTLMInjection.AnattackercaninjectmaliciousHTLMcodeina More2026-messageandsendittoalltheusersintheapplication,resultinginexecutingthecodeandmayleadtosession 8.0 Details31281hijackingandexecutingcommandsonthevictim'sbrowser. AnOScommandinjectionvulnerabilityinthednsmasqmoduleofTP-LinkArcherAX53v1.0allowsanauthenticatedCVE-adjacentattackertoexecutearbitrarycodewhenaspeciallycraftedconfigurationfileisprocessedduetoinsufficient More2026- 8.0inputvalidation.Successfulexploitationmayallowtheattackertomodifydeviceconfiguration,accesssensitive Details30818information,orfurthercompromisesystemintegrity.ThisissueaffectsAX53v1.0:before1.7.1Build20260213. AnOScommandinjectionvulnerabilityintheOpenVPNmoduleofTP-LinkArcherAX53v1.0allowsanauthenticated CVE-adjacentattackertoexecutesystemcommandswhenaspeciallycraftedconfigurationfileisprocesseddueto More2026-insufficientinputvalidation.Successfulexploitationmayallowmodificationofconfigurationfiles,disclosureof 8.0 Details30815sensitiveinformation,orfurthercompromiseofdeviceintegrity.ThisissueaffectsAX53v1.0:before1.7.1Build 20260213. Astack-basedbufferoverflowinthetmpServermoduleofTP-LinkArcherAX53v1.0allowsanauthenticatedadjacent CVE-attackertotriggerasegmentationfaultandpotentiallyexecutearbitrarycodeviaaspeciallycraftedconfiguration More2026-file.Successfulexploitationmaycauseacrashandcouldallowarbitrarycodeexecution,enablingmodificationof 8.0 Details30814devicestate,exposureofsensitivedata,orfurthercompromiseofdeviceintegrity.ThisissueaffectsAX53v1.0: before1.7.1Build20260213. PraisonAIisamulti-agentteamssystem.Priorto4.5.128,thegateway's/api/approval/allow-listendpointpermits unauthenticatedmodificationofthetoolapprovalallowlistwhennoauthtokenisconfigured(thedefault).ByaddingCVE- Moredangeroustoolnames(e.g.,shellexec,file_write)totheallowlist,anattackercancausetheExecApprovalManagerto 7.9 Detailsauto-approveallfutureagentinvocationsofthosetools,bypassingthehuman-in-the-loopsafetymechanismthatthe40149 approvalsystemisspecificallydesignedtoenforce.Thisvulnerabilityisfixedin4.5.128.
CVE- More UseafterfreeinMicrosoftOfficeExcelallowsanunauthorizedattackertoexecutecodelocally. 7.8 Details 32189 OpenClawbefore2026.3.24containsanarbitrarycodeexecutionvulnerabilityinlocalpluginandhookinstallationCVE- thatallowsattackerstoexecutemaliciouscodebycraftinga.npmrcfilewithagitexecutableoverride.Duringnpm More2026- 7.8 installexecutioninthestagedpackagedirectory,attackerscanleveragegitdependenciestotriggerexecutionof Details35641 arbitraryprogramsspecifiedintheattacker-controlled.npmrcconfigurationfile. CVE- ImproperhandlingofinsufficientpermissionsorprivilegesinWindowsInstallerallowsanauthorizedattackerto More2026- 7.8 Details27910 CVE- More2026- 7.8 Details32159 CVE- More2026- 7.8 Details32160 CVE- DeserializationofuntrusteddatainMicrosoftHighPerformanceComputePack(HPC)allowsanauthorizedattackerto More2026- 7.8 Details32184 CVE- Improperneutralizationofspecialelementsusedinacommand('commandinjection')inWindowsSnippingTool More2026- 7.8 allowsanunauthorizedattackertoexecutecodelocally. Details32183 CVE- Concurrentexecutionusingsharedresourcewithimpropersynchronization('racecondition')inWindowsUser More2026- 7.8 InterfaceCoreallowsanauthorizedattackertoelevateprivilegeslocally. Details32164 PraisonAIisamulti-agentteamssystem.Priorto4.5.128,PraisonAIautomaticallyloadsafilenamedtools.pyfromthe currentworkingdirectorytodiscoverandregistercustomagenttools.Thisloadingprocessuses importlib.util.specfromfilelocationandimmediatelyexecutesmodule-levelcodeviaspec.loader.execmodule() withoutexplicituserconsent,validation,orsandboxing.Thetools.pyfileisloadedimplicitly,evenwhenitisnotCVE- referencedinconfigurationfilesorexplicitlyrequestedbytheuser.Asaresult,merelyplacingafilenamedtools.py More2026- 7.8 intheworkingdirectoryissufficienttotriggercodeexecution.Thisbehaviorviolatestheexpectedsecurityboundary Details40156 betweenuser-controlledprojectfiles(e.g.,YAMLconfigurations)andexecutablecode,asuntrustedcontentinthe workingdirectoryistreatedastrustedandexecutedautomatically.Ifanattackercanplaceamalicioustools.pyfile intoadirectorywhereauserorautomatedsystem(e.g.,CI/CDpipeline)runspraisonai,arbitrarycodeexecution occursimmediatelyuponstartup,beforeanyagentlogicbegins.Thisvulnerabilityisfixedin4.5.128. CVE- More2026- UseafterfreeinWindowsUserInterfaceCoreallowsanauthorizedattackertoelevateprivilegeslocally. 7.8 Details32165 CVE- More2026- ImproperinputvalidationinAzureMonitorAgentallowsanauthorizedattackertoelevateprivilegeslocally. 7.8 Details32168 Fleetisopensourcedevicemanagementsoftware.Priorto4.81.1,theOrbitagent'sFileVaultdiskencryptionkey CVE- rotationflowoncollectsalocaluser'spasswordviaaGUIdialogandinterpolatesitdirectlyintoaTcl/expectscript More2026- executedviaexec.Command("expect","-c",script).BecausethepasswordisinsertedintoTclbrace-quotedsend 7.8 Details27806 {%s},apasswordcontaining}terminatestheliteralandinjectsarbitraryTclcommands.SinceOrbitrunsasroot,this allowsalocalunprivilegedusertoescalatetorootprivileges.Thisvulnerabilityisfixedin4.81.1. CVE- Concurrentexecutionusingsharedresourcewithimpropersynchronization('racecondition')inWindowsUser More2026- 7.8 InterfaceCoreallowsanauthorizedattackertoelevateprivilegeslocally. Details32163 MemProcFSbefore5.17containsmultipleunsafelibrary-loadingpatternsthatenableDLLandshared-libraryhijackingCVE- acrosssixattacksurfaces,includingbare-nameLoadLibraryUanddlopencallswithoutpathqualificationforvmmpyc, More2026- 7.8 libMSCompression,andpluginDLLs.AnattackerwhoplacesamaliciousDLLorsharedlibraryintheworkingdirectory Details40031 ormanipulatesLDLIBRARYPATHcanachievearbitrarycodeexecutionwhenMemProcFSloads. CVE- More2026- DeserializationofuntrusteddatainAzureMonitorAgentallowsanauthorizedattackertoelevateprivilegeslocally. 7.8 Details32192 CVE- More2026- UseafterfreeinMicrosoftOfficeExcelallowsanunauthorizedattackertoexecutecodelocally. 7.8 Details32197 CVE- More inarbitrarycodeexecutioninthecontextofthecurrentuser.Exploitationofthisissuerequiresuserinteractionin 7.8 Details
34630 thatavictimmustopenamaliciousfile. InCopyversions20.5.2,21.2andearlierareaffectedbyanout-of-boundsreadvulnerabilitywhenparsingacraftedCVE- file,whichcouldresultinareadpasttheendofanallocatedmemorystructure.Anattackercouldleveragethis More 7.8 vulnerabilitytoexecutecodeinthecontextofthecurrentuser.Exploitationofthisissuerequiresuserinteractionin Details27287 OpenClawbefore2026.3.25containsaprivilegeescalationvulnerabilitywheresilentlocalshared-authreconnectsCVE- auto-approvescope-upgraderequests,wideningpaireddevicepermissionsfromoperator.readtooperator.admin. More2026- 7.8 Attackerscanexploitthisbytriggeringlocalreconnectiontosilentlyescalateprivilegesandachieveremotecode Details35625 executiononthenode. AnExecutionwithUnnecessaryPrivilegesvulnerabilityintheUserInterface(UI)ofJuniperNetworksJunosOSand JunosOSEvolvedallowsalocal,low-privilegedattackertogainrootprivileges,thuscompromisingthesystem.When aconfigurationthatallowsunsignedPythonopscriptsispresentonthedevice,anon-rootuserisabletoexecuteCVE- maliciousopscriptsasaroot-equivalentuser,leadingtoprivilegeescalation.ThisissueaffectsJunosOS:All More2026- 7.8 versionsbefore22.4R3-S7,from23.2before23.2R2-S4,from23.4before23.4R2-S6,from24.2before24.2R1- Details33793 S2,24.2R2,from24.4before24.4R1-S2,24.4R2;JunosOSEvolved:Allversionsbefore22.4R3-S7-EVO,from 23.2before23.2R2-S4-EVO,from23.4before23.4R2-S6-EVO,from24.2before24.2R2-EVO,from24.4before 24.4R1-S1-EVO,24.4R2-EVO. AMissingAuthenticationforCriticalFunctionvulnerabilityintheFlexiblePICConcentrators(FPCs)ofJuniperNetworks JunosOSEvolvedonPTXSeriesallowsalocal,authenticatedattackerwithlowprivilegestogaindirectaccesstoFPCs CVE- installedinthedevice.AlocaluserwithlowprivilegescangaindirectaccesstotheinstalledFPCsasahighprivileged More2026- user,whichcanpotentiallyleadtoafullcompromiseoftheaffectedcomponent.ThisissueaffectsJunosOSEvolved 7.8 Details33788 onPTX10004,PTX10008,PTX100016,withJNP10K-LC1201orJNP10K-LC1202:Allversionsbefore21.2R3-S8-EVO, 21.4-EVOversionsbefore21.4R3-S7-EVO,22.2-EVOversionsbefore22.2R3-S4-EVO,22.3-EVOversionsbefore 22.3R3-S3-EVO,22.4-EVOversionsbefore22.4R3-S2-EVO,23.2-EVOversionsbefore23.2R2-EVO. CVE- InCopyversions20.5.2,21.2andearlierareaffectedbyanout-of-boundswritevulnerabilitythatcouldresultin More2026- 7.8 Details34631 CVE- AdobeFramemakerversions2022.8andearlierareaffectedbyaUseAfterFreevulnerabilitythatcouldresultin More2026- 7.8 Details27292 CVE- More2026- ASDA-SoftStack-basedBufferOverflowVulnerability 7.8 Details5726 CVE- AdobeFramemakerversions2022.8andearlierareaffectedbyaHeap-basedBufferOverflowvulnerabilitythatcould More2026- resultinarbitrarycodeexecutioninthecontextofthecurrentuser.Exploitationofthisissuerequiresuserinteraction 7.8 Details27293 AdobeFramemakerversions2022.8andearlierareaffectedbyanout-of-boundsreadvulnerabilitywhenparsingaCVE- More2026- 7.8 Details27294 CVE- AdobeFramemakerversions2022.8andearlierareaffectedbyanout-of-boundswritevulnerabilitythatcouldresult More2026- 7.8 Details27295 HDF5issoftwareformanagingdata.In1.14.1-2andearlier,aheap-use-after-freewasfoundintheh5dumphelperCVE- utility.Anattackerwhocansupplyamalicioush5filecantriggeraheapuse-after-free.Thefreedobjectisreferenced More2026- 7.8 inamemmovecallfromH5Tconv_struct.TheoriginalobjectwasallocatedbyH5Dtypeinfoinitphase3andfreed Details34734 byH5D_typeinfoterm. CVE- Thepstrip64.sysdriverinEnTechTaiwanPowerStrip<=3.90.736allowslocaluserstoescalateprivilegestoSYSTEM More2026- viaacraftedIOCTLrequestenablingunprivilegeduserstomaparbitraryphysicalmemoryintotheiraddressspace 7.8 Details29923 andmodifycriticalkernelstructures. WasmtimeisaruntimeforWebAssembly.From32.0.0tobefore36.0.7,42.0.2,and43.0.1,Wasmtime'sCranelift compilationbackendcontainsabugonaarch64whenperformingacertainshapeofheapaccesseswhichmeansthat thewrongaddressisaccessed.WhencombinedwithexplicitboundschecksaguestWebAssemblymodulethiscan createasituationwheretherearetwodivergingcomputationsforthesameaddress:onefortheaddresstobounds- checkandonefortheaddresstoload.Thisdifferenceinaddressbeingoperatedonmeansthataguestmodulecan passaboundscheckbutthenloadadifferentaddress.Combinedtogetherthisenablesanarbitraryread/write primitiveforguestWebAssemblywhenaccesssinghostmemory.Thisisasandboxescapeasguestsareableto read/writearbitraryhostmemory.Thisvulnerabilityhasafewingredients,allofwhichmustbemet,forthissituation CVE- tooccurandbypassthesandboxrestrictions.Thismiscompiledshapeofloadonlyoccurson64-bitWebAssembly More2026- 7.8 linearmemories,orwhenConfig::wasm_memory64isenabled.32-bitWebAssemblyisnotaffected.Spectre Details34971 mitigationsorsignals-based-trapsmustbedisabled.Whenspectremitigationsareenabledthentheoffendingshape ofloadisnotgenerated.Whensignals-based-trapsaredisabledthenspectremitigationsarealsoautomatically disabled.ThespecificbuginCraneliftisamiscompileofaloadoftheshapeload(iadd(base,ishl(index,amt)))where amtisaconstant.Theamtvalueismaskedincorrectlytotestifit'sacertainvalue,andthisincorrectmaskmeans
thatCraneliftcanpattern-matchthisloweringruleduringinstructionselectionerroneously,divergingfrom WebAssembly'sandCranelift'ssemantics.Thisincorrectloweringwould,forexample,loadanaddressmuchfurther awaythanintendedasthecorrectaddress'scomputationwouldhavewrappedaroundtoasmallervalueinsetad. Thisvulnerabilityisfixedin36.0.7,42.0.2,and43.0.1. CVE-AdobeFramemakerversions2022.8andearlierareaffectedbyanIntegerUnderflow(WraporWraparound) More2026-vulnerabilitythatcouldresultinarbitrarycodeexecutioninthecontextofthecurrentuser.Exploitationofthisissue 7.8 Details27296requiresuserinteractioninthatavictimmustopenamaliciousfile. CVE-AdobeFramemakerversions2022.8andearlierareaffectedbyanIntegerUnderflow(WraporWraparound) More2026-vulnerabilitythatcouldresultinarbitrarycodeexecutioninthecontextofthecurrentuser.Exploitationofthisissue 7.8 Details27297requiresuserinteractioninthatavictimmustopenamaliciousfile. CVE-AdobeFramemakerversions2022.8andearlierareaffectedbyanAccessofResourceUsingIncompatibleType More2026-('TypeConfusion')vulnerabilitythatcouldresultinarbitrarycodeexecutioninthecontextofthecurrentuser. 7.8 Details27298 libsixelisaSIXELencoder/decoderimplementationderivedfromkmiya'ssixel.Inversions1.8.7andprior,whenbuilt withthe--with-gdk-pixbuf2option,ause-after-freevulnerabilityexistsinloadwithgdkpixbuf()inloader.c.The cleanuppathmanuallyfreesthesixelframetobjectanditsinternalbufferswithoutconsultingthereferencecount, eventhoughtheobjectwascreatedviatherefcountedconstructorsixelframenew()andexposedtothepublic CVE-callback.Acallbackthatcallssixelframeref(frame)toretainalogicallyvalidreferencewillholdadanglingpointer More2026-aftersixelhelperloadimagefile()returns,andanysubsequentaccesstotheframeoritsfieldstriggersause-after- 7.8 Details33023freeconfirmedbyAddressSanitizer.Therootcauseisaconsistencyfailurebetweentwocleanupstrategiesinthe samecodebase:sixelframeunref()isusedinloadwithbuiltin()butrawfree()isusedinloadwithgdkpixbuf().An attackersupplyingacraftedimagetoanyapplicationbuiltagainstlibsixelwithgdk-pixbuf2supportcantriggerthis reliably,potentiallyleadingtoinformationdisclosure,memorycorruption,orcodeexecution.Thisissuehasbeen
osslsigncodeisatoolthatimplementsAuthenticodesigningandtimestamping.Priorto2.12,Astackbufferoverflow vulnerabilityexistsinosslsigncodeinseveralsignatureverificationpaths.DuringverificationofaPKCS#7signature, thecodecopiesthedigestvaluefromaparsedSpcIndirectDataContentstructureintoafixed-sizestackbufferCVE-(mdbuf[EVPMAXMD_SIZE],64bytes)withoutvalidatingthatthesourcelengthfitswithinthedestinationbuffer.This More2026- 7.8patternispresentintheverificationhandlersforPE,MSI,CAB,andscriptfiles.Anattackercancraftamalicious Details39853signedfilewithanoversizeddigestfieldinSpcIndirectDataContent.Whenauserverifiessuchafilewithosslsigncode verify,theunboundedmemcpycanoverflowthestackbufferandcorruptadjacentstackstate.Thisvulnerabilityis fixedin2.12. CVE-Illustratorversions30.2,29.8.5andearlierareaffectedbyanout-of-boundswritevulnerabilitythatcouldresultin More2026- 7.8 Details34618 CVE- More2026- 7.8 Details27313 CVE- More2026- 7.8 Details27312 CVE- More2026-UntrustedpointerdereferenceinWindowsWin32K-ICOMPallowsanauthorizedattackertoelevateprivilegeslocally. 7.8 Details32222 CVE- More2026-UseafterfreeinMicrosoftOfficeExcelallowsanunauthorizedattackertoexecutecodelocally. 7.8 Details32198 CVE- More2026-UseafterfreeinMicrosoftOfficeExcelallowsanunauthorizedattackertoexecutecodelocally. 7.8 Details32199 CVE- More2026-UseafterfreeinMicrosoftOfficePowerPointallowsanunauthorizedattackertoexecutecodelocally. 7.8 Details32200 CVE-SamsungMagicINFO9ServerIncorrectDefaultPermissionsLocalPrivilegeEscalationVulnerabilityThisissueaffects More2026- 7.8MagicINFO9Server:lessthan21.1091.1. Details25203 parseusbsbefore1.9containsanOScommandinjectionvulnerabilityinparseUSBs.pywhereLNKfilepathsareCVE-passedunsanitizedintoanos.popen()shellcommand,allowingarbitrarycommandexecutionviacrafted.lnk More 7.8filenamescontainingshellmetacharacters.Anattackercancrafta.lnkfilenamewithembeddedshellmetacharacters Details40029thatexecutearbitrarycommandsontheforensicexaminer'smachineduringUSBartifactparsing. parseusbsbefore1.9containsanOScommandinjectionvulnerabilitywherethevolumelistingpathargument(-vCVE-
flag)ispassedunsanitizedintoanos.popen()shellcommandwithls,allowingarbitrarycommandinjectionviacrafted More 7.8 volumepathargumentscontainingshellmetacharacters.Anattackercanprovideacraftedvolumepathviathe-v Details40030 flagthatinjectsarbitrarycommandsduringvolumecontentenumeration. CVE- More Details32155 UAC(Unix-likeArtifactsCollector)before3.3.0-rc1containsacommandinjectionvulnerabilityintheplaceholder substitutionandcommandexecutionpipelinewheretheruncommand()functionpassesconstructedcommandCVE-stringsdirectlytoevalwithoutpropersanitization.Attackerscaninjectshellmetacharactersorcommand More2026- 7.8substitutionsthroughattacker-controlledinputsincluding%line%valuesfromforeachiteratorsand%user%/ Details40032%user_home%valuesderivedfromsystemfilestoachievearbitrarycommandexecutionwiththeprivilegesofthe UACprocess. CVE- More2026-UseafterfreeinMicrosoftOfficeWordallowsanunauthorizedattackertoexecutecodelocally. 7.8 Details33095 CVE- More2026- 7.8 Details27311 CVE-UseafterfreeinWindowsContainerIsolationFSFilterDriverallowsanauthorizedattackertoelevateprivileges More2026- 7.8locally. Details33098 CVE- More2026-UseafterfreeinWindowsPrintSpoolerComponentsallowsanauthorizedattackertoelevateprivilegeslocally. 7.8 Details33101 CVE-InsufficientgranularityofaccesscontrolinMicrosoftDefenderallowsanauthorizedattackertoelevateprivileges More2026- 7.8locally. Details33825 CVE- More2026-couldresultinarbitrarycodeexecutioninthecontextofthecurrentuser.Exploitationofthisissuerequiresuser 7.8 Details34627interactioninthatavictimmustopenamaliciousfile. CVE- More2026-couldresultinarbitrarycodeexecutioninthecontextofthecurrentuser.Exploitationofthisissuerequiresuser 7.8 Details34628interactioninthatavictimmustopenamaliciousfile. CVE- More2026-couldresultinarbitrarycodeexecutioninthecontextofthecurrentuser.Exploitationofthisissuerequiresuser 7.8 Details34629interactioninthatavictimmustopenamaliciousfile. PhotoshopDesktopversions27.4andearlierareaffectedbyanout-of-boundsreadvulnerabilitywhenparsingaCVE- More2026- 7.8 Details27289 CVE- More2026- 7.8 Details27310 CVE- More2026- 7.8 Details32158 CVE-Concurrentexecutionusingsharedresourcewithimpropersynchronization('racecondition')inWindowsUser More2026- 7.8InterfaceCoreallowsanauthorizedattackertoelevateprivilegeslocally. Details27911 CVE- More2026-Out-of-boundsreadinWindowsStorageSpacesControllerallowsanauthorizedattackertoelevateprivilegeslocally. 7.8 Details32076 CVE-InDesignDesktopversions20.5.2,21.2andearlierareaffectedbyanout-of-boundswritevulnerabilitythatcould More 2026-resultinarbitrarycodeexecutioninthecontextofthecurrentuser.Exploitationofthisissuerequiresuserinteraction 7.8 Details 27291 CVE- MoreDoublefreeinWindowsKernelallowsanauthorizedattackertoelevateprivilegeslocally. 7.8 Details26179 CVE-UntrustedpointerdereferenceinWindowsUniversalPlugandPlay(UPnP)DeviceHostallowsanauthorizedattacker More 7.8
27919 toelevateprivilegeslocally. Details CVE- Out-of-boundsreadinWindowsEncryptingFileSystem(EFS)allowsanauthorizedattackertoelevateprivileges More 7.8 locally. Details26153 CVE- Concurrentexecutionusingsharedresourcewithimpropersynchronization('racecondition')inWindowsShellallows More2026- 7.8 anauthorizedattackertoelevateprivilegeslocally. Details27918 CVE- Concurrentexecutionusingsharedresourcewithimpropersynchronization('racecondition')inWindowsSpeech More2026- 7.8 BrokeredApiallowsanauthorizedattackertoelevateprivilegeslocally. Details32090 CVE- UseafterfreeinWindowsUniversalPlugandPlay(UPnP)DeviceHostallowsanauthorizedattackertoelevate More2026- 7.8 Details27916 CVE- Heap-basedbufferoverflowinWindowsClientSideCachingdriver(csc.sys)allowsanauthorizedattackertoelevate More2026- 7.8 Details26176 CVE- More2026- couldresultinarbitrarycodeexecutioninthecontextofthecurrentuser.Exploitationofthisissuerequiresuser 7.8 Details27238 interactioninthatavictimmustopenamaliciousfile. CVE- InDesignDesktopversions20.5.2,21.2andearlierareaffectedbyaUseAfterFreevulnerabilitythatcouldresultin More2026- 7.8 Details27283 InDesignDesktopversions20.5.2,21.2andearlierareaffectedbyanout-of-boundsreadvulnerabilitywhenparsingaCVE- More2026- 7.8 Details27284 CVE- More2026- 7.8 Details26172 CVE- UseafterfreeinWindowsUniversalPlugandPlay(UPnP)DeviceHostallowsanauthorizedattackertoelevate More2026- 7.8 Details27915 CVE- More2026- Heap-basedbufferoverflowinWindowsKernelallowsanauthorizedattackertoelevateprivilegeslocally. 7.8 Details26180 CVE- More2026- ImproperinputvalidationinMicrosoftPowerShellallowsanauthorizedattackertoelevateprivilegeslocally. 7.8 Details26170 CVE- Concurrentexecutionusingsharedresourcewithimpropersynchronization('racecondition')inWindowsAncillary More2026- 7.8 FunctionDriverforWinSockallowsanauthorizedattackertoelevateprivilegeslocally. Details26168 CVE- More2026- ImproperaccesscontrolinMicrosoftManagementConsoleallowsanauthorizedattackertoelevateprivilegeslocally. 7.8 Details27914 CVE- More2026- DoublefreeinWindowsKernelallowsanauthorizedattackertoelevateprivilegeslocally. 7.8 Details26163 CVE- Accessofresourceusingincompatibletype('typeconfusion')inWindowsOLEallowsanauthorizedattackerto More2026- 7.8 Details26162 CVE- UntrustedpointerdereferenceinWindowsSensorDataServiceallowsanauthorizedattackertoelevateprivileges More2026- 7.8 locally. Details26161 CVE- MissingauthenticationforcriticalfunctioninWindowsRemoteDesktopLicensingServiceallowsanauthorized More2026- 7.8 attackertoelevateprivilegeslocally. Details26160 CVE- MissingauthenticationforcriticalfunctioninWindowsRemoteDesktopLicensingServiceallowsanauthorized More 7.8 attackertoelevateprivilegeslocally. Details26159
CVE- More Heap-basedbufferoverflowinWindowsHyper-Vallowsanunauthorizedattackertoexecutecodelocally. 7.8 Details26156 CVE- Concurrentexecutionusingsharedresourcewithimpropersynchronization('racecondition')inWindows More2026- 7.8 ManagementServicesallowsanauthorizedattackertoelevateprivilegeslocally. Details20930 CVE- More2026- UseafterfreeinMicrosoftOfficeWordallowsanunauthorizedattackertoexecutecodelocally. 7.8 Details23657 CVE- UntrustedpointerdereferenceinWindowsUniversalPlugandPlay(UPnP)DeviceHostallowsanauthorizedattacker More2026- 7.8 toelevateprivilegeslocally. Details27920 CVE- More2026- ImproperinputvalidationinMicrosoftPowerShellallowsanunauthorizedattackertobypassasecurityfeaturelocally. 7.8 Details26143 CVE- More2026- Bufferover-readinWindowsProjectedFileSystemallowsanauthorizedattackertoelevateprivilegeslocally. 7.8 Details26184 DellElasticCloudStorage,version3.8.1.7andprior,andDellObjectScale,versionspriorto4.1.0.3andversionCVE- 4.2.0.0,containsanInsertionofSensitiveInformationintoLogFilevulnerability.Alowprivilegedattackerwithlocal More2026- 7.8 accesscouldpotentiallyexploitthisvulnerability,leadingtosecretexposure.Theattackermaybeabletousethe Details28261 exposedsecrettoaccessthevulnerablesystemwithprivilegesofthecompromisedaccount. CVE- Integerunderflow(wraporwraparound)inWindowsStorageSpacesControllerallowsanauthorizedattackerto More2026- 7.8 Details27907 CVE- More2026- Details27923 CVE- More2026- Details32152 CVE- Concurrentexecutionusingsharedresourcewithimpropersynchronization('racecondition')inWindowsProjected More2026- 7.8 FileSystemallowsanauthorizedattackertoelevateprivilegeslocally. Details27927 CVE- More2026- DoublefreeinWindowsProjectedFileSystemallowsanauthorizedattackertoelevateprivilegeslocally. 7.8 Details32069 CVE- More2026- DoublefreeinWindowsProjectedFileSystemallowsanauthorizedattackertoelevateprivilegeslocally. 7.8 Details32074 CVE- UntrustedpointerdereferenceinWindowsUniversalPlugandPlay(UPnP)DeviceHostallowsanauthorizedattacker More2026- 7.8 toelevateprivilegeslocally. Details32077 CVE- More2026- UseafterfreeinWindowsProjectedFileSystemallowsanauthorizedattackertoelevateprivilegeslocally. 7.8 Details32078 CVE- More2026- UseafterfreeinMicrosoftWindowsSpeechallowsanauthorizedattackertoelevateprivilegeslocally. 7.8 Details32153 CVE- More2026- ImproperaccesscontrolinWindowsRPCAPIallowsanauthorizedattackertoelevateprivilegeslocally. 7.8 Details26183 CVE- More2026- UseafterfreeinMicrosoftWindowsSearchComponentallowsanauthorizedattackertoelevateprivilegeslocally. 7.8 Details27909 CVE- More Details32154
CVE- UseafterfreeinWindowsSpeechBrokeredApiallowsanauthorizedattackertoelevateprivilegeslocally. 7.8 More Details 32089 CVE- More UseafterfreeinMicrosoftBrokeringFileSystemallowsanauthorizedattackertoelevateprivilegeslocally. 7.8 Details26181 CVE- More2026- Details27924 CVE- project-managementforneuroimagingresearch.From24.0.0tobefore27.0.3and28.0.1,anincorrectorderof More2026- 7.7 operationsintheFilesDownloadHandlercouldresultinanattackerescapingtheintendeddownloaddirectories.This Details35446 ColdFusionversions2023.18,2025.6andearlierareaffectedbyanImproperLimitationofaPathnametoaRestrictedCVE- Directory('PathTraversal')vulnerabilitythatcouldresultinaSecurityfeaturebypass.Anattackercouldleveragethis More2026- 7.7 vulnerabilitytoaccessunauthorizedfilesordirectoriesoutsidetheintendedrestrictions.Exploitationofthisissue Details34619 doesnotrequireuserinteraction. InOpenStackKeystonebefore28.0.1,theLDAPidentitybackenddoesnotconverttheuserenabledattributetoa booleanwhentheuserenabledinvertconfigurationoptionisFalse(thedefault).Theldaprestomodelmethodin CVE- theUserApiclassonlyperformedstring-to-booleanconversionwhenuserenabledinvertwasTrue.WhenFalse,the More2026- rawstringvaluefromLDAP(e.g.,"FALSE")wasuseddirectly.Sincenon-emptystringsaretruthyinPython,users 7.7 Details40683 markedasdisabledinLDAPweretreatedasenabledbyKeystone,allowingthemtoauthenticateandperformactions. AlldeploymentsusingtheLDAPidentitybackendwithoutuserenabledinvert=Trueoruserenabledemulationare affected. CVE- More2026- ImproperinputvalidationinWindowsBitLockerallowsanunauthorizedattackertobypassasecurityfeaturelocally. 7.7 Details27913 Planeisananopen-sourceprojectmanagementtool.From0.28.0tobefore1.3.0,theremediationofGHSA-jcc6-f9v6- f7jwisincompletewhichcouldleadtothesamefullreadServer-SideRequestForgerywhenanormalhtmlpageCVE- containsalinktagwithanhrefthatredirectstoaprivateIPaddressissuppliedtoAddlinkbyanauthenticated More2026- 7.7 attackerwithlowprivileges.RedirectsforthemainpageURLarevalidated,butnotthefaviconfetchpath. Details39843 fetchandencodefavicon()stillusesrequests.get(faviconurl,...)withthedefaultredirect-following.This vulnerabilityisfixedin1.3.0. Chartbrewisanopen-sourcewebapplicationthatcanconnectdirectlytodatabasesandAPIsandusethedatato createcharts.Priorto4.9.0,across-tenantauthorizationbypassexistsinChartbrewinGET CVE- /team/:teamid/template/generate/:projectid.TheGEThandlercallscheckAccess(req,"updateAny","chart")without More2026- awaitingthereturnedpromise,anditdoesnotverifythatthesuppliedprojectidbelongstoreq.params.teamidorto 7.7 Details32252 thecaller'steam.Asaresult,anauthenticatedattackerwithvalidtemplate-generationpermissionsintheirownteam canrequestthetemplatemodelforaprojectbelongingtoanotherteamandreceivevictimprojectdata.This vulnerabilityisfixedin4.9.0. CVE- PermissionbypassvulnerabilityintheLBSmodule.Impact:Successfulexploitationofthisvulnerabilitymayaffect More2026- 7.7 Details34853 CVE- goshsisaSimpleHTTPServerwritteninGo.From1.0.7tobefore2.0.0-beta.4,theSFTPcommandrenamesanitizes More2026- onlythesourcepathandnotthedestination,soitispossibletowriteoutsideoftherootdirectoryoftheSFTP.This 7.7 Details40188 vulnerabilityisfixedin2.0.0-beta.4. PraisonAIAgentsisamulti-agentteamssystem.Priorto1.5.128,thewebcrawl()functionin CVE- praisonaiagents/tools/webcrawltools.pyacceptsarbitraryURLsfromAIagentswithzerovalidation.Noscheme More2026- allowlisting,hostname/IPblocklisting,orprivatenetworkchecksareappliedbeforefetching.Thisallowsanattacker 7.7 Details40150 (orpromptinjectionincrawledcontent)toforcetheagenttofetchcloudmetadataendpoints,internalservices,or localfilesviafile://URLs.Thisvulnerabilityisfixedin1.5.128. OpenClawbefore2026.3.24containsapathtraversalvulnerabilityinsandboxenforcementallowingsandboxed CVE- agentstoreadarbitraryfilesfromotheragents'workspacesviaunnormalizedmediaUrlorfileUrlparameterkeys. More2026- AttackerscanexploitincompleteparametervalidationinnormalizeSandboxMediaParamsandmissing 7.7 Details35668 mediaLocalRootscontexttoaccesssensitivefilesincludingAPIkeysandconfigurationdataoutsidedesignated sandboxroots. ChamiloLMSisalearningmanagementsystem.Priorto1.11.38and2.0.0-RC.3,ChamiloLMScontainsaServer-Side RequestForgery(SSRF)vulnerabilityintheSocialWallfeature.TheendpointreadurlwithopengraphacceptsaURLCVE- fromtheuserviathesocialwallnewmsg_mainPOSTparameterandperformstwoserver-sideHTTPrequeststothat More2026- 7.7 URLwithoutvalidatingwhetherthetargetisaninternalorexternalresource.Thisallowsanauthenticatedattackerto Details31941 forcetheservertomakearbitraryHTTPrequeststointernalservices,scaninternalports,andaccesscloudinstance metadata.Thisvulnerabilityisfixedin1.11.38and2.0.0-RC.3. ExecutionwithUnnecessaryPrivileges(CWE-250)inKibana'sFleetplugindebugroutehandlerscanleadreadingCVE-
indexdatabeyondtheirdirectElasticsearchRBACscopeviaPrivilegeAbuse(CAPEC-122).Thisrequiresan More 7.7 authenticatedKibanauserwithFleetsub-featureprivileges(suchasagents,agentpolicies,andsettings Details management). IncorrectAuthorization(CWE-863)inKibanacanleadtoinformationdisclosureviaPrivilegeAbuse(CAPEC-122).A CVE-userwithlimitedFleetprivilegescanexploitaninternalAPIendpointtoretrievesensitiveconfigurationdata, More2026-includingprivatekeysandauthenticationtokens,thatshouldonlybeaccessibletouserswithhigher-levelsettings 7.7 Details33461privileges.Theendpointcomposesitsresponsebyfetchingfullconfigurationobjectsandreturningthemdirectly, bypassingtheauthorizationchecksenforcedbythededicatedsettingsAPIs. CVE-ImproperNeutralizationofSpecialElementsusedinanSQLCommand('SQLInjection')vulnerabilityinRealMag777 More2026- 7.6FOXwoocommerce-currency-switcherallowsBlindSQLInjection.ThisissueaffectsFOX:fromn/athrough<=1.4.5. Details39497 CVE-ImproperNeutralizationofSpecialElementsusedinanSQLCommand('SQLInjection')vulnerabilityinWPMUDEV- More2026-YourAll-in-OneWordPressPlatformBrokenLinkCheckerbroken-link-checkerallowsBlindSQLInjection.Thisissue 7.6 Details39466affectsBrokenLinkChecker:fromn/athrough<=2.4.7. CVE-ImproperNeutralizationofSpecialElementsusedinanSQLCommand('SQLInjection')vulnerabilityinameliabooking More2026- 7.6AmeliaameliabookingallowsBlindSQLInjection.ThisissueaffectsAmelia:fromn/athrough<=2.1.1. Details39487 CVE-ImproperNeutralizationofSpecialElementsusedinanSQLCommand('SQLInjection')vulnerabilityinBrainstorm More2026- 7.6ForceOttoKitsuretriggersallowsBlindSQLInjection.ThisissueaffectsOttoKit:fromn/athrough<=1.1.20. Details39479 CVE-ImproperNeutralizationofSpecialElementsusedinanSQLCommand('SQLInjection')vulnerabilityinYayCommerce More2026- 7.6YayMailyaymailallowsBlindSQLInjection.ThisissueaffectsYayMail:fromn/athrough<=4.3.3. Details39496 CVE-StoredXSSinlogviewerinCoolerControl/coolercontrol-ui<4.0.0allowsunauthenticatedattackerstotakeoverthe More2026- 7.6serviceviamaliciousJavaScriptinpoisonedlogentries Details5301 AnImproperCheckforUnusualorExceptionalConditionsvulnerabilityintheflowdaemon(flowd)ofJuniperNetworks JunosOSonSRXSeriesallowsanattackersendingaspecific,malformedICMPv6packettocausethesrxpfeprocess tocrashandrestart.Continuedreceiptandprocessingofthesepacketswillrepeatedlycrashthesrxpfeprocessand CVE-sustaintheDenialofService(DoS)condition.DuringNAT64translation,receiptofaspecific,malformedICMPv6 More2026-packetdestinedtothedevicewillcausethesrxpfeprocesstocrashandrestart.Thisissuecannotbetriggeredusing 7.5 Details33790IPv4norotherIPv6traffic.ThisissueaffectsJunosOSonSRXSeries:allversionsbefore21.2R3-S10,allversionsof 21.3,from21.4before21.4R3-S12,allversionsof22.1,from22.2before22.2R3-S8,allversionsof22.4,from 22.4before22.4R3-S9,from23.2before23.2R2-S6,from23.4before23.4R2-S7,from24.2before24.2R2-S3,* from24.4before24.4R2-S3,from25.2before25.2R1-S2,25.2R2. AnImproperValidationofSyntacticCorrectnessofInputvulnerabilityintheIPseclibraryusedbykmdandikedof JuniperNetworksJunosOSonSRXSeriesandMXSeriesallowsanunauthenticated,network-basedattackertocause acompleteDenial-of-Service(DoS).IfanaffecteddevicereceivesaspecificallymalformedfirstISAKMPpacketfromCVE-theinitiator,thekmd/ikedprocesswillcrashandrestart,whichmomentarilypreventsnewsecurityassociations(SAs) More2026- 7.5forfrombeingestablished.Repeatedexploitationofthisvulnerabilitycausesacompleteinabilitytoestablishnew Details33778VPNconnections.ThisissueaffectsJunosOSonSRXSeriesandMXSeries:allversionsbefore22.4R3-S9,23.2 versionbefore23.2R2-S6,23.4versionbefore23.4R2-S7,24.2versionsbefore24.2R2-S4,24.4versionsbefore 24.4R2-S3,*25.2versionsbefore25.2R1-S2,25.2R2. jqisacommand-lineJSONprocessor.Beforecommit0c7d133c3c7e37c00b6d46b658a02244fdd3c784,jqused MurmurHash3withahardcoded,publiclyvisibleseed(0x432A9843)forallJSONobjecthashtableoperations,which allowedanattackertoprecomputekeycollisionsoffline.BysupplyingacraftedJSONobject(~100KB)whereallkeysCVE-hashedtothesamebucket,hashtablelookupsdegradedfromO(1)toO(n),turninganyjqexpressionintoanO(n²) More2026- 7.5operationandcausingsignificantCPUexhaustion.ThisaffectedcommonjqusecasessuchasCI/CDpipelines,web Details40164services,anddataprocessingscripts,andwasfarmorepracticaltoexploitthanexistingheapoverflowissuessinceit requiredonlyasmallpayload.Thisissuehasbeenpatchedincommit 0c7d133c3c7e37c00b6d46b658a02244fdd3c784. CVE- More2026-Out-of-boundsreadinWindowsHTTP.sysallowsanunauthorizedattackertodenyserviceoveranetwork. 7.5 Details33096
both7.1.2-19and6.9.13-44,MagickfreesthememoryoftheXMLtreeviatheDestroyXMLTree()function;however,CVE-thisprocessisexecutedrecursivelywithnodepthlimitimposed.WhenMagickprocessesanXMLfilewithdeeply More2026- 7.5nestedstructures,itwillexhaustthestackmemory,resultinginaDenialofService(DoS)attack.Thisissuehasbeen Details33908fixedinversions6.9.13-44and7.1.2-19.
AnImproperAccessControlvulnerabilitycouldallowamaliciousactorwithaccesstotheUniFiPlaynetworktoobtainCVE-UniFiPlayWiFicredentials.AffectedProducts:UniFiPlayPowerAmp(Version1.0.35andearlier)UniFiPlayAudioPort More 7.5(Version1.0.24andearlier)Mitigation:UpdateUniFiPlayPowerAmptoVersion1.0.38orlaterUpdateUniFiPlayAudio Details22566PorttoVersion1.1.9orlater
IntegerOverfloworWraparoundvulnerabilityinApacheActiveMQ,ApacheActiveMQAll,ApacheActiveMQMQTT.The fixfor"CVE-2025-66168:MQTTcontrolpacketremaininglengthfieldisnotproperlyvalidated"wasonlyappliedtoCVE-5.19.2(andfuture5.19.x)releasesbutwasmissedforall6.0.0+versions.ThisissueaffectsApacheActiveMQ:from More 7.56.0.0before6.2.4;ApacheActiveMQAll:from6.0.0before6.2.4;ApacheActiveMQMQTT:from6.0.0before6.2.4. Details40046Usersarerecommendedtoupgradetoversion6.2.4ora5.19.xversionstartingwith5.19.2orlater(currentlylatest is5.19.5),whichfixestheissue. CVE- More2026-inkutethemesKuteShopkuteshopallowsPHPLocalFileInclusion.ThisissueaffectsKuteShop:fromn/athrough<= 7.5 Details396114.2.9. CVE-Unfurlbefore2026.04containsanunboundedzlibdecompressionvulnerabilityinparsecompressed.pythatallows More2026-remoteattackerstocausedenialofservice.AttackerscansubmithighlycompressedpayloadsviaURLparametersto 7.5 Details40036the/json/visjsendpointthatexpandtogigabytes,exhaustingservermemoryandcrashingtheservice. AnImproperInputValidationvulnerabilitycouldallowamaliciousactorwithaccesstotheUniFiPlaynetworktocauseCVE-thedevicetostopresponding.AffectedProducts:UniFiPlayPowerAmp(Version1.0.35andearlier)UniFiPlayAudio More2026- 7.5Port(Version1.0.24andearlier)Mitigation:UpdateUniFiPlayPowerAmptoVersion1.0.38orlaterUpdateUniFiPlay Details22565AudioPorttoVersion1.1.9orlater CVE- More2026-both7.1.2-19and6.9.13-44,aheapbufferoverflowoccursintheMVGdecoderthatcouldresultinanoutofbounds 7.5 Details33901writewhenprocessingacraftedimage.Thisissuehasbeenfixedinversions6.9.13-44and7.1.2-19. UseofGETRequestMethodWithSensitiveQueryStringsvulnerabilityinApacheOpenMeetings.TheRESTloginCVE-endpointusesHTTPGETmethodwithusernameandpasswordpassedasqueryparameters.Pleasecheckreferences More2026- 7.5regardingpossibleimpactThisissueaffectsApacheOpenMeetings:from3.1.3before9.0.0.Usersarerecommended Details34020toupgradetoversion9.0.0,whichfixestheissue. nimiq/core-rs-albatrossisaRustimplementationoftheNimiqProof-of-StakeprotocolbasedontheAlbatross consensusalgorithm.Priortoversion1.3.0,anuntrustedpeercouldcrashavalidatorbypublishingasignedCVE-tendermintproposalmessagewheresigner==validators.numvalidators().ProposalSender::senduses>insteadof More2026- 7.5>=forthesignerboundscheck,sotheequalitycasepassesandreaches Details32605validators.getvalidatorbyslotband(signer),whichpanicswithanout-of-boundsindexbeforeanysignature verificationruns.Thisissuehasbeenfixedinversion1.3.0. UseofHard-codedCryptographicKeyvulnerabilityinApacheOpenMeetings.Theremember-mecookieencryption CVE-keyissettodefaultvalueinopenmeetings.propertiesandnotbeingauto-rotated.IncaseOMadminhasn'tchanged More2026-thedefaultencryptionkey,anattackerwhohasstolenacookiefromalogged-inusercangetfullusercredentials. 7.5 Details33266ThisissueaffectsApacheOpenMeetings:from6.1.0before9.0.0.Usersarerecommendedtoupgradetoversion 9.0.0,whichfixestheissue. CVE-Stack-basedbufferoverflowin.NETandVisualStudioallowsanunauthorizedattackertodenyserviceovera More2026- 7.5network. Details32203 AmemoryexhaustionvulnerabilityexistsintheHTTPserverduetounboundeduseoftheContent-Lengthheader.CVE-Theserverallocatesmemorydirectlybasedontheattackersuppliedheadervaluewithoutenforcinganupperlimit.A More2026- 7.5craftedHTTPrequestcontaininganextremelylargeContent-Lengthvaluecantriggerexcessivememoryallocation Details5440andservertermination,evenwithoutsendingarequestbody. TheTutorLMS-eLearningandonlinecoursesolutionpluginforWordPressisvulnerabletoanInsecureDirectObject Referenceinallversionsupto,andincluding,3.9.7.Thisisduetomissingauthenticationandauthorizationchecksin thepay_incomplete_order()function.Thefunctionacceptsanattacker-controlledorder_idparameterandusesitCVE-tolookuporderdata,thenwritesbillingfieldstotheorderowner'sprofile($order_data->user_id)withoutverifying More2026- 7.5therequester'sidentityorownership.BecausetheTutornonce(_tutor_nonce)isexposedonpublicfrontendpages, Details3360thismakesitpossibleforunauthenticatedattackerstooverwritethebillingprofile(name,email,phone,address)of anyuserwhohasanincompletemanualorder,bysendingacraftedPOSTrequestwithaguessedorenumerated order_id. CVE- More2026-inCreatives_PlanetEmphiresemphiresallowsPHPLocalFileInclusion.ThisissueaffectsEmphires:fromn/athrough 7.5 Details39677<=3.9. AmemoryexhaustionvulnerabilityexistsinZIParchiveprocessing.OrthancautomaticallyextractsZIParchives CVE-uploadedtocertainendpointsandtrustsmetadatafieldsdescribingtheuncompressedsizeofarchivedfiles.An More 2026-attackercancraftasmallZIParchivecontainingaforgedsizevalue,causingtheservertoallocateextremelylarge 7.5 Details 5439buffersduringextraction.
CVE- More2026- 7.5 inApusThemeFreeiofreeioallowsPHPLocalFileInclusion.ThisissueaffectsFreeio:fromn/athrough<=1.3.21. Details39679 CVE- More 7.5 inApusThemeHomeohomeoallowsPHPLocalFileInclusion.ThisissueaffectsHomeo:fromn/athrough<=1.2.59. Details39681
AgzipdecompressionbombvulnerabilityexistswhenOrthancprocessesHTTPrequestwithContent-Encoding:gzip.CVE-Theserverdoesnotenforcelimitsondecompressedsizeandallocatesmemorybasedonattacker-controlled More 7.5compressionmetadata.Aspeciallycraftedgzippayloadcantriggerexcessivememoryallocationandexhaustsystem Details memory. PraisonAIisamulti-agentteamssystem.Priorto4.5.115,theA2U(Agent-to-User)eventstreamserverinPraisonAICVE-exposesallagentactivitywithoutauthentication.Thecreatea2uroutes()functionregistersthefollowingendpoints More2026- 7.5withNOauthenticationchecks:/a2u/info,/a2u/subscribe,/a2u/events/{streamname},/a2u/events/sub/{id},and Details39889/a2u/health.Thisvulnerabilityisfixedin4.5.115. AnExposureofSensitiveInformationtoanUnauthorizedActorvulnerabilityexistsinApacheDolphinScheduler.This vulnerabilitymayallowunauthorizedactorstoaccesssensitiveinformation,includingdatabasecredentials.Thisissue affectsApacheDolphinSchedulerversions3.1..Usersarerecommendedtoupgradeto:version≥3.2.0ifusing CVE-3.1.xAsatemporaryworkaround,userswhocannotupgradeimmediatelymayrestricttheexposedmanagement More2025-endpointsbysettingthefollowingenvironmentvariable:``` 7.5 Details62188MANAGEMENTENDPOINTSWEBEXPOSUREINCLUDE=health,metrics,prometheusAlternatively,addthefollowing configurationtotheapplication.yamlfile:management:endpoints:web:exposure:include: health,metrics,prometheus``ThisissuehasbeenreportedasCVE-2023-48796: https://cveprocess.apache.org/cve5/CVE-2023-48796 FrontMCPisaTypeScript-firstframeworkfortheModelContextProtocol(MCP).Priorto2.3.0,themcp-from-openapi libraryuses@apidevtools/json-schema-ref-parsertodereference$refpointersinOpenAPIspecificationswithoutCVE-configuringanyURLrestrictionsorcustomresolvers.AmaliciousOpenAPIspecificationcontaining$refvalues More2026- 7.5pointingtointernalnetworkaddresses,cloudmetadataendpoints,orlocalfileswillcausethelibrarytofetchthose Details39885resourcesduringtheinitialize()call.ThisenablesServer-SideRequestForgery(SSRF)andlocalfilereadattackswhen processinguntrustedOpenAPIspecifications.Thisvulnerabilityisfixedin2.3.0. Anout-of-boundsreadvulnerabilityexistsinDicomStreamReaderduringDICOMmeta-headerparsing.WhenCVE-processingmalformedmetadatastructures,theparsermayreadbeyondtheboundsoftheallocatedmetadata More2026- 7.5buffer.Althoughthisissuedoesnottypicallycrashtheserverorexposedatadirectlytotheattacker,itreflects Details5437insufficientinputvalidationintheparsinglogic. WhenconfiguringSSLbundlesinSpringCloudGatewaybyusingtheconfigurationpropertyspring.ssl.bundle,the configurationwassilentlyignoredandthedefaultSSLconfigurationwasusedinstead.Note:The4.2.xbranchisnoCVE-longerunderopensourcesupport.IfyouareusingSpringCloudGateway4.2.0andarenotanenterprisecustomer, More2026- 7.5youcanupgradetoanySpringCloudGateway4.2.xreleasenewerthan4.2.0availableonMavenCenteral Details22750https://repo1.maven.org/maven2/org/springframework/cloud/spring-cloud-gateway/.Ideallyifyouarenotan enterprisecustomer,youshouldbeupgradingto5.0.2or5.1.1whicharethecurrentsupportedopensourcereleases. Aflawwasfoundingnutls.Aremote,unauthenticatedattackercanexploitthisvulnerabilitybysendingaspeciallyCVE-craftedClientHellomessagewithaninvalidPre-SharedKey(PSK)bindervalueduringtheTLShandshake.Thiscan More2026- 7.5leadtoaNULLpointerdereference,causingtheservertocrashandresultinginaremoteDenialofService(DoS) Details1584condition. TheJetEnginepluginforWordPressisvulnerabletoSQLInjectionviatheCustomContentType(CCT)RESTAPIsearch endpointinallversionsupto,andincluding,3.8.6.1.Thisisduetothecctsearchparameterbeinginterpolated CVE-directlyintoaSQLquerystringviasprintf()withoutsanitizationoruseof$wpdb->prepare().WordPressREST More2026-API'swpunslash()callon$GETstripsthewpmagic_quotes()`protection,allowingsingle-quote-basedinjection. 7.5 Details4352ThismakesitpossibleforunauthenticatedattackerstoappendadditionalSQLqueriesintoalreadyexistingqueries thatcanbeusedtoextractsensitiveinformationfromthedatabase.TheCustomContentTypesmodulemustbe enabledwithatleastoneCCTconfiguredwithapublicRESTGETendpointforexploitation. CVE-Loopwithunreachableexitcondition('infiniteloop')in.NET,.NETFramework,VisualStudioallowsanunauthorized More2026- 7.5attackertodenyserviceoveranetwork. Details33116 CVE-ImproperEncodingorEscapingofOutputvulnerabilityintheJsonAccessLogValvecomponentofApacheTomcat.This More2026-issueaffectsApacheTomcat:from11.0.0-M1through11.0.20,from10.1.0-M1through10.1.53,from9.0.40through 7.5 Details344839.0.116.Usersarerecommendedtoupgradetoversion11.0.21,10.1.54or9.0.117,whichfixtheissue. CVE-Concurrentexecutionusingsharedresourcewithimpropersynchronization('racecondition')in.NETFramework More2026- 7.5allowsanunauthorizedattackertodenyserviceoveranetwork. Details23666 CVE-ColdFusionversions2023.18,2025.6andearlierareaffectedbyanImproperInputValidationvulnerabilitythatcould More2026-resultinaSecurityfeaturebypass.Anattackercouldleveragethisvulnerabilitytobypasssecuritymeasuresandgain 7.5 Details27282unauthorizedaccess.Exploitationofthisissuerequiresuserinteraction. CVE- More2026-inUnThemeOrganicFoodorganicfoodallowsPHPLocalFileInclusion.ThisissueaffectsOrganicFood:fromn/athrough 7.5 Details39684<=3.6.4. CVE-WhenverifyingacertificatechaincontainingexcludedDNSconstraints,theseconstraintsarenotcorrectlyappliedto MorewildcardDNSSANswhichuseadifferentcasethantheconstraint.Thisonlyaffectsvalidationofotherwisetrusted 7.5 Details33810certificatechains,issuedbyarootCAintheVerifyOptions.RootsCertPool,orinthesystemcertificatepool.
CVE- More Uncontrolledresourceconsumptionin.NETallowsanunauthorizedattackertodenyserviceoveranetwork. 7.5 Details26171 CVE- GitLabhasremediatedanissueinGitLabCE/EEaffectingallversionsfrom13.0before18.8.9,18.9before18.9.5,and More 18.10before18.10.3thatcouldhaveallowedanunauthenticatedusertocausedenialofservicebysendingrepeated 7.5 Details12664 GraphQLqueries. CVE- GitLabhasremediatedanissueinGitLabCE/EEaffectingallversionsfrom12.10before18.8.9,18.9before18.9.5, More2026- and18.10before18.10.3thatcouldhaveallowedanunauthenticatedusertocausedenialofserviceduetoimproper 7.5 Details1092 inputvalidationofJSONpayloads. PraisonAIisamulti-agentteamssystem.Priorto4.5.128,the/media-streamWebSocketendpointinPraisonAI'scall CVE- moduleacceptsconnectionsfromanyclientwithoutauthenticationorTwiliosignaturevalidation.Eachconnection More2026- opensanauthenticatedsessiontoOpenAI'sRealtimeAPIusingtheserver'sAPIkey.Therearenolimitsonconcurrent 7.5 Details40116 connections,messagerate,ormessagesize,allowinganunauthenticatedattackertoexhaustserverresourcesand drainthevictim'sOpenAIAPIcredits.Thisvulnerabilityisfixedin4.5.128. CVE- More2026- 7.5 inkutethemesBiolifebiolifeallowsPHPLocalFileInclusion.ThisissueaffectsBiolife:fromn/athrough<=3.2.3. Details39623 InsertionofSensitiveInformationintoLogFilevulnerabilityinthecloudmembershipforclusteringcomponentofCVE- ApacheTomcatexposedtheKubernetesbearertoken.ThisissueaffectsApacheTomcat:from11.0.0-M1through More2026- 7.5 11.0.20,from10.1.0-M1through10.1.53,from9.0.13through9.0.116.Usersarerecommendedtoupgradeto Details34487 version11.0.21,10.1.54or9.0.117,whichfixtheissue. CVE- MissingEncryptionofSensitiveDatavulnerabilityinApacheTomcatduetothefixforCVE-2026-29146allowingthe More2026- bypassoftheEncryptInterceptor.ThisissueaffectsApacheTomcat:11.0.20,10.1.53,9.0.116.Usersare 7.5 Details34486 recommendedtoupgradetoversion11.0.21,10.1.54or9.0.117,whichfixtheissue. PaddingOraclevulnerabilityinApacheTomcat'sEncryptInterceptorwithdefaultconfiguration.ThisissueaffectsCVE- ApacheTomcat:from11.0.0-M1through11.0.18,from10.0.0-M1through10.1.52,from9.0.13through9..115,from More2026- 7.5 8.5.38through8.5.100,from7.0.100through7.0.109.Usersarerecommendedtoupgradetoversion11.0.19, Details29146 10.1.53and9.0.116,whichfixestheissue. Anout-of-boundswriteissueinthevirtioPCItransportinAmazonFirecracker1.13.0through1.14.3and1.15.0on x86_64andaarch64mightallowalocalguestuserwithrootprivilegestocrashtheFirecrackerVMMprocessorCVE- potentiallyexecutearbitrarycodeonthehostviamodificationofvirtioqueueconfigurationregistersafterdevice More2026- 7.5 activation.Achievingcodeexecutiononthehostrequiresadditionalpreconditions,suchastheuseofacustomguest Details5747 kernelorspecificsnapshotconfigurations.Toremediatethis,usersshouldupgradetoFirecracker1.14.4or1.15.1 andlater. CVE- ConfiguredcipherpreferenceordernotpreservedvulnerabilityinApacheTomcat.ThisissueaffectsApacheTomcat: More2026- from11.0.16through11.0.18,from10.1.51through10.1.52,from9.0.114through9.0.115.Usersarerecommended 7.5 Details29129 toupgradetoversion11.0.20,10.1.53or9.0.116,whichfixtheissue. InconsistentInterpretationofHTTPRequests('HTTPRequest/ResponseSmuggling')vulnerabilityinApacheTomcat CVE- viainvalidchunkextension.ThisissueaffectsApacheTomcat:from11.0.0-M1through11.0.18,from10.1.0-M1 More2026- through10.1.52,from9.0.0.M1through9.0.115,from8.5.0through8.5.100,from7.0.0through7.0.109.Other, 7.5 Details24880 unsupportedversionsmayalsobeaffected.Usersarerecommendedtoupgradetoversion11.0.20,10.1.52or 9.0.116,whichfixtheissue. WasmtimeisaruntimeforWebAssembly.From25.0.0tobefore36.0.7,42.0.2,and43.0.1,Wasmtime'sWinch compilerbackendcontainsabugwheretranslatingthetable.growoperatorcausestheresulttobeincorrectlytyped. For32-bittablesthismeansthattheresultoftheoperator,internallyinWinch,istaggedasa64-bitvalueinsteadof a32-bitvalue.ThisinvalidinternalrepresentationofWinch'scompilerstatecompoundsintofurtherissuesdepending onhowthevalueisconsumed.Theprimaryconsequenceofthisbugisthatbytesinthehost'saddressspacecanbe stored/readfrom.Thisisonlyapplicabletothe16bytesbeforelinearmemory,however,astheonlysignificantreturnCVE- valueoftable.growthatcanbemisinterpretedis-1.Thebytesbeforelinearmemoryare,bydefault,unmapped More2026- 7.5 memory.Wasmtimewilldetectthisfaultandaborttheprocess,however,becausewasmshouldnotbeabletoaccess Details35186 thesebytes.OverallthisthisbuginWinchrepresentsaDoSvectorbycrashingthehostprocess,acorrectnessissue withinWinch,andapossibleleakofupto16-bytesbeforelinearmemory.Wasmtime'sdefaultcompilerisCranelift, notWinch,andWasmtime'sdefaultsettingsaretoplaceguardpagesbeforelinearmemory.Thismeansthat Wasmtime'sdefaultconfigurationisnotaffectedbythisissue,andwhenexplicitlychoosingWinchWasmtime's otherwisedefaultconfigurationleadstoaDoS.Disablingguardpagesbeforelinearmemoryisrequiredtopossibly leakupto16-bytesofhostdata.Thisvulnerabilityisfixedin36.0.7,42.0.2,and43.0.1. CVE- IfonesideoftheTLSconnectionsendsmultiplekeyupdatemessagespost-handshakeinasinglerecord,the More2026- connectioncandeadlock,causinguncontrolledconsumptionofresources.Thiscanleadtoadenialofservice.This 7.5 Details32283 onlyaffectsTLS1.3. AimproperauthenticationvulnerabilityinFortinetFortiSOARPaaS7.6.0through7.6.3,FortiSOARPaaS7.5.0through CVE- 7.5.2,FortiSOARon-premise7.6.0through7.6.3,FortiSOARon-premise7.5.0through7.5.2mayallowan More unauthenticatedattackertobypassauthenticationviareplayingcaptured2FArequest.Theattackrequiresbeingable 7.5 Details23708 tointerceptanddecryptauthenticationtrafficandprecisetimingtoreplaytherequestbeforetokenexpiration,which
raisestheattackcomplexity. CVE-CleartextTransmissionofSensitiveInformationvulnerabilityinApacheAPISIX.Thiscanoccurduetossl_verifyin Moreopenid-connectpluginconfigurationbeingsettofalsebydefault.ThisissueaffectsApacheAPISIX:from0.7through 7.5 Details319233.15.0.Usersarerecommendedtoupgradetoversion3.16.0,whichfixestheissue. CVE-Validatingcertificatechainswhichusepoliciesisunexpectedlyinefficientwhencertificatesinthechaincontainavery More2026-largenumberofpolicymappings,possiblycausingdenialofservice.Thisonlyaffectsvalidationofotherwisetrusted 7.5 Details32281certificatechains,issuedbyarootCAintheVerifyOptions.RootsCertPool,orinthesystemcertificatepool. CVE-TheActivityPubWordPresspluginbefore8.0.2doesnotproperlyfilterpoststobedisplayed,allowedunauthenticated More2026- 7.5userstoaccessdrafts/scheduled/pendingposts Details4338 BSVRubySDKistheRubySDKfortheBSVblockchain.From0.1.0tobefore0.8.2,BSV::Network::ARC'sfailure CVE-detectiononlyrecognisesREJECTEDandDOUBLESPENDATTEMPTED.ARCresponseswithtxStatusvaluesof More2026-INVALID,MALFORMED,MINEDINSTALEBLOCK,oranyORPHAN-containingextraInfo/txStatusaresilentlytreatedas 7.5 Details40069successfulbroadcasts.Applicationsthatgateactionsonbroadcastersuccessaretrickedintotrustingtransactions thatwereneveracceptedbythenetwork.Thisvulnerabilityisfixedin0.8.2. CVE-Duringchainbuilding,theamountofworkthatisdoneisnotcorrectlylimitedwhenalargenumberofintermediate More2026-certificatesarepassedinVerifyOptions.Intermediates,whichcanleadtoadenialofservice.Thisaffectsbothdirect 7.5 Details32280usersofcrypto/x509andusersofcrypto/tls. CVE- More2026-inkutethemesBoutiquekute-boutiqueallowsPHPLocalFileInclusion.ThisissueaffectsBoutique:fromn/athrough 7.5 Details39613<=2.3.3. CVE-ImproperinputvalidationinWindowsServerUpdateServiceallowsanunauthorizedattackertoperformtampering More2026- 7.5overanetwork. Details26154 CVE-NullpointerdereferenceinWindowsLocalSecurityAuthoritySubsystemService(LSASS)allowsanunauthorized More2026- 7.5attackertodenyserviceoveranetwork. Details32071 CVE-AbufferoverflowvulnerabilityexistsinD-LinkDI-800316.07.26A1duetoimproperhandlingofmultipleparameters More2025-inthe/urlrule.aspendpoint.AnattackercanexploitthisvulnerabilitybysendingacraftedHTTPGETrequestwith 7.5 Details50661parametersname,en,ips,u,time,act,rpri,andlog. CVE-AbufferoverflowvulnerabilityexistsinD-LinkDI-800316.07.26A1duetoinadequatevalidationofinputsizeinthe More2025- 7.5routesstaticparameterinthe/router.aspendpoint. Details50650 CVE-AbufferoverflowvulnerabilityexistsinD-LinkDI-800316.07.26A1duetoimproperhandlingofthenameandmem More2025- 7.5parametersinthe/timegroup.aspendpoint. Details50653 CVE-AbufferoverflowvulnerabilityexistsinD-LinkDI-800316.07.26A1duetoimpropervalidationoftheidparameterin More2025- 7.5the/thdmember.aspendpoint. Details50654 CVE-AbufferoverflowvulnerabilityexistsinD-LinkDI-800316.07.26A1duetoimproperhandlingofthenameparameter More2025- 7.5inthe/thdgroup.aspendpoint. Details50655 CVE-AbufferoverflowvulnerabilityexistsinD-LinkDI-800316.07.26A1duetoimproperhandlingofthepidparameterin More2025- 7.5the/trace.aspendpoint. Details50657 CVE-AbufferoverflowvulnerabilityexistsinD-LinkDI-800316.07.26A1duetoimproperhandlingofthecustomerror More2025- 7.5parameterinthe/user.aspendpoint. Details50659 CVE-AbufferoverflowvulnerabilityexistsinD-LinkDI-800316.07.26A1duetoimproperhandlingofthenameparameter More2025- 7.5inthe/urlmember.aspendpoint. Details50660 CVE- AbufferoverflowvulnerabilityexistsinD-LinkDI-800316.07.26A1duetoimproperhandlingofthenameparameter More2025- 7.5inthe/urlgroup.aspendpoint. Details50662 CVE-AbufferoverflowvulnerabilityexistsinD-LinkDI-800316.07.26A1duetoimproperhandlingofthenameparameter More 7.5inthe/usbpaswd.aspendpoint. Details50663 CVE-AbufferoverflowvulnerabilityexistsinD-LinkDI-800316.07.26A1duetoimproperhandlingofparametersinthe More/user_group.aspendpoint.TheattackercanexploitthisvulnerabilitybysendingacraftedHTTPGETrequestwith 7.5
50664 parametersname,mem,pri,andattr. Details CVE- AbufferoverflowvulnerabilityexistsinD-LinkDI-800316.07.26A1duetoimproperhandlingofinputparametersin More the/webkeyword.aspendpoint.AnattackercanexploitthisvulnerabilitybysendingacraftedHTTPGETrequestvia 7.5 Details50665 thename,en,time,memgb2312,andmemutf8parameters. CVE- AbufferoverflowvulnerabilityexistsinD-LinkDI-800316.07.26A1duetoimproperhandlingofmultipleparameters More2025- inthe/webpost.aspendpoint.AnattackercanexploitthisvulnerabilitybysendingacraftedHTTPGETrequestin 7.5 Details50666 parameterssuchasname,en,userid,log,andtime. CVE- AbufferoverflowvulnerabilityexistsinD-LinkDI-800316.07.26A1duetoimproperhandlingoftheifaceparameterin More2025- 7.5 the/wanlinedetection.aspendpoint. Details50667 CVE- AbufferoverflowvulnerabilityexistsinD-LinkDI-800316.07.26A1duetoimproperhandlingofthesparameterinthe More2025- 7.5 /weblistopt.aspendpoint. Details50668 CVE- AbufferoverflowvulnerabilityexistsinD-LinkDI-800316.07.26A1andDI-8003G19.12.10A1duetoimproper More2025- 7.5 handlingofthewanpingparameterinthe/wanping.aspendpoint. Details50669 CVE- AbufferoverflowvulnerabilityexistsinD-LinkDI-800316.07.26A1duetoimproperhandlingofparametersinthe More2025- /xwglbwr.aspendpoint.AnattackercanexploitthisvulnerabilitybysendingacraftedHTTPGETrequestinthename, 7.5 Details50670 qq,andtimeparameters. CVE- AbufferoverflowvulnerabilityexistsinD-LinkDI-800316.07.26A1duetoimproperhandlingofparametersinthe More2025- /xwglref.aspendpoint.AnattackercanexploitthisvulnerabilitybysendingacraftedHTTPGETrequestwith 7.5 Details50671 excessivelylongstringsinparametersname,en,userid,shibiename,time,act,log,andrpri. CVE- AbufferoverflowvulnerabilityexistsinD-LinkDI-800316.07.26A1duetoimproperhandlingofparametersinthe More2025- 7.5 /yyxzdlink.aspendpoint. Details50672 ChamiloLMSisalearningmanagementsystem.Priorto1.11.38and2.0.0-RC.3,anunrestrictedfileupload CVE- vulnerabilityintheexercisesounduploadfunctionallowsanauthenticatedteachertouploadaPHPwebshellby More2026- spoofingtheContent-Typeheadertoaudio/mpeg.Theuploadedfileretainsitsoriginal.phpextensionandisplacedin 7.5 Details32931 aweb-accessibledirectory,enablingRemoteCodeExecutionasthewebserveruser(www-data).Thisvulnerabilityis fixedin1.11.38and2.0.0-RC.3. CVE- ChamiloLMSisalearningmanagementsystem.Priorto1.11.38and2.0.0-RC.3,inmain/lp/aicchacp.php,user- More2026- controlledrequestparametersaredirectlyusedtosetthePHPsessionIDbeforeloadingglobalbootstrap.Thisleads 7.5 Details31940 tosessionfixation.Thisvulnerabilityisfixedin1.11.38and2.0.0-RC.3. CVE- AnissueinD-LinkDI-800316.07.26A1relatedtoimproperhandlingoftheidparameterinthe/saveparmusb.asp More2025- 7.5 endpoint. Details50652 CVE- AbufferoverflowvulnerabilityexistsinD-LinkDI-800316.07.26A1duetoimproperinputvalidationinthevlanname More2025- 7.5 parameterinthe/shutset.aspendpoint. Details50649 CVE- project-managementforneuroimagingresearch.Priorto27.0.3and28.0.1,aSQLinjectionhasbeenidentifiedin More2026- 7.5 somecodesectionsfortheMRIfeedbackpopupwindowoftheimagingbrowser.AttackerscanuseSQLingestionto Details33350 access/alterdataontheserver.Thisvulnerabilityisfixedin27.0.3and28.0.1. CVE- AbufferoverflowvulnerabilityexistsinD-LinkDI-800316.07.26A1duetoinadequateinputvalidationinthe/tggl.asp More2025- 7.5 endpoint. Details50648 AcrossDR-810containsanunauthenticatedfiledisclosurevulnerabilitythatallowsremoteattackerstodownloadtheCVE- rom-0backupfilecontainingsensitiveinformationbysendingasimpleGETrequest.Attackerscanaccesstherom-0 More2019- 7.5 endpointwithoutauthenticationtoretrieveanddecompressthebackupfile,exposingrouterpasswordsandother Details25706 sensitiveconfigurationdata. WCAPF-WooCommerceAjaxProductFilterpluginisvulnerabletotime-basedSQLInjectionviathe'post-author' CVE- parameterinallversionsupto,andincluding,4.2.3duetoinsufficientescapingontheusersuppliedparameterand More 2026- lackofsufficientpreparationontheexistingSQLquery.Thismakesitpossibleforunauthenticatedattackersto 7.5 Details 3396 appendadditionalSQLqueriesintoalreadyexistingqueriesthatcanbeusedtoextractsensitiveinformationfromthe database. CVE- HashiCorp'sgo-getterlibraryuptov1.8.5mayallowarbitraryfilereadsonthefilesystemduringcertaingit More operationsthroughamaliciouslycraftedURL.Thisvulnerability,CVE-2026-4660,isfixedingo-getterv1.8.6.This 7.5 Details vulnerabilitydoesnotaffectthego-getter/v2branchandpackage. HonoisaWebapplicationframeworkthatprovidessupportforanyJavaScriptruntime.Priorto4.12.12,apathCVE-
traversalissueintoSSG()allowsfilestobewrittenoutsidetheconfiguredoutputdirectoryduringstaticsite More 7.5 generation.WhenusingdynamicrouteparametersviassgParams,speciallycraftedvaluescancausegeneratedfile Details39408 pathstoescapetheintendedoutputdirectory.Thisvulnerabilityisfixedin4.12.12. CVE- MoreinMikado-ThemesMikadoCoremikado-coreallowsPHPLocalFileInclusion.ThisissueaffectsMikadoCore:fromn/a 7.5 Details39538through<=1.6. OpenAirInterfaceVersion2.2.0hasaBufferOverflowvulnerabilityinprocessingUplinkNASTransportcontainingCVE-AuthenticationResponsecontainingaNASPDUwithoversizeresponse(Forexample100byte).Theresponseis More2026- 7.5decodedbyAMFandpassedtotheAUSFcomponentforverification.AUSFcrashesonreceivingthisoversize Details30075response.ThiscanprohibitusersfromfurtherregistrationandverificationandcancauseDenialofServices(DoS). CVE-OpenAirInterfacev2.2.0acceptsSecurityModeCompletewithoutanyintegrityprotection.Configurationhas More2026-supportedintegrityNIA1andNIA2.ButifanUEsendsinitialregistrationrequestwithonlysecuritycapabilityIA0, 7.5 Details30080OpenAirInterfaceacceptsandproceeds.Thisdowngradesecuritycontextcanleadtothepossibilityofreplayattack. Net::CIDR::Liteversionsbefore0.23forPerldoesnotvalidateIPv6groupcount,whichmayallowIPACLbypass. packipv6()doesnotcheckthatuncompressedIPv6addresses(without::)haveexactly8hexgroups.Inputslike "abcd","1:2:3",or"1:2:3:4:5:6:7"areacceptedandproducepackedvaluesofwronglength(3,7,or15bytesinstead CVE-of17).Thepackedvaluesareusedinternallyformaskandcomparisonoperations.find()andbinfind()usePerlstring More2026-comparison(lt/gt)onthesevalues,andcomparingstringsofdifferentlengthsgiveswrongresults.Thiscancause 7.5 Details40198find()toincorrectlyreportanaddressasinsideoroutsidearange.Example:my$cidr=Net::CIDR::Lite->new("::/8"); $cidr->find("1:2:3");#invalidinput,incorrectlyreturnstrueThisisthesameclassofinputvalidationissueasCVE- 2021-47154(IPv4leadingzeros)previouslyfixedinthismodule.SeealsoCVE-2026-40199,arelatedissueinthe samefunctionaffectingIPv4mappedIPv6addresses. CVE-D-LinkDI-8300v16.07.26A1wasdiscoveredtocontainabufferoverflowviatheipparameterintheippositionasp More2025- 7.5function.ThisvulnerabilityallowsattackerstocauseaDenialofService(DoS)viaacraftedinput. Details45057 CVE-D-LinkDI-8300v16.07.26A1wasdiscoveredtocontainabufferoverflowviathefxparameterinthejingxasp More2025- 7.5function.ThisvulnerabilityallowsattackerstocauseaDenialofService(DoS)viaacraftedinput. Details45058 CVE-D-LinkDI-8300v16.07.26A1wasdiscoveredtocontainabufferoverflowviathefnparameterinthetgfilehtm More2025- 7.5function.ThisvulnerabilityallowsattackerstocauseaDenialofService(DoS)viaacraftedinput. Details45059 D-LinkDI-8003v16.07.26A1,DI-8500v16.07.26A1;DI-8003Gv17.12.21A1,DI-8200Gv17.12.20A1,DI-8200 CVE-v16.07.26A1,DI-8400v16.07.26A1,DI-8004wv16.07.26A1,DI-8100v16.07.26A1,andDI-8100Gv17.12.20A1were More2025-discoveredtocontainabufferoverflowviatherden,rdauth,rdacct,httphadmin,httphadminpwd,rdkey,and 7.5 Details52222rdipparametersintheradiusaspfunction.ThisvulnerabilityallowsattackerstocauseaDenialofService(DoS)via acraftedrequest. ChamiloLMSisalearningmanagementsystem.Priorto1.11.38and2.0.0-RC.3,RESTAPIkeysaregeneratedusingCVE-md5(time()+(userid5)-rand(10000,10000)).Therand(10000,10000)callalwaysreturnsexactly10000(min== More2026- 7.5max),makingtheformulaeffectivelymd5(timestamp+user_id5-10000).Anattackerwhoknowsausernameand Details33710approximatekeycreationtimecanbrute-forcetheAPIkey.Thisvulnerabilityisfixedin1.11.38and2.0.0-RC.3. Saleorisane-commerceplatform.From2.0.0tobefore3.23.0a3,3.22.47,3.21.54,and3.20.118,Saleorsupports CVE-querybatchingbysubmittingmultipleGraphQLoperationsinasingleHTTPrequestasaJSONarraybutwasn't More2026-enforcinganyupperlimitonthenumberofoperations.Thisallowedanunauthenticatedattackertosendasingle 7.5 Details33756HTTPrequestmanyoperations(bypassingtheperquerycomplexitylimit)toexhaustresources.Thisvulnerabilityis fixedin3.23.0a3,3.22.47,3.21.54,and3.20.118. CVE-Improperneutralizationofspecialelementsin.NETallowsanunauthorizedattackertoperformspoofingovera More2026- 7.5network. Details32178 CVE-AbufferoverflowvulnerabilityexistsinD-LinkDI-800316.07.26A1duetoimpropervalidationofuserinputinthe More2025- 7.5qj.aspendpoint. Details50644 CVE-AvulnerabilityhasbeendiscoveredinD-LinkDI-800316.07.26A1,whichcanleadtoabufferoverflowwhenthes More2025-parameterinthepppoelistopt.aspendpointismanipulated.Bysendingacraftedrequestwithanexcessivelylarge 7.5 Details50645valueforthesparameter,anattackercantriggerabufferoverflowcondition. CVE-AbufferoverflowvulnerabilityexistsinD-LinkDI-800316.07.26A1duetoinsufficientinputvalidationonthename More2025- 7.5parameterinthe/qostypeasp.aspendpoint. Details50646 CVE-AbufferoverflowvulnerabilityexistsinD-LinkDI-800316.07.26A1,specificallyinthehandlingofthewansparameter More 7.5intheqos.aspendpoint. Details50647 CVE- ImproperControlofFilenameforInclude/RequireStatementinPHPProgram('PHPRemoteFileInclusion')vulnerability More
inthemeStekLabtechCOlabtechcoallowsPHPLocalFileInclusion.ThisissueaffectsLabtechCO:fromn/athrough<= 7.5 Details 395448.3. CVE-AbufferoverflowvulnerabilityexistsinD-LinkDI-800316.07.26A1duetoimproperhandlingofthehttplanport More 7.5parameterinthe/webgl.aspendpoint. Details50673 LiquidJSisaShopify/GitHubPagescompatibletemplateengineinpureJavaScript.Priorto10.25.3,liquidjs10.25.0CVE-documentsrootasconstrainingfilenamespassedtorenderFile()andparseFile(),buttop-levelfileloadsdonot More2026- 7.5enforcethatboundary.ALiquidinstanceconfiguredwithanemptytemporarydirectoryasrootcanreturnthe Details39859contentsofarbitraryfiles.Thisvulnerabilityisfixedin10.25.3. LiquidJSisaShopify/GitHubPagescompatibletemplateengineinpureJavaScript.Priorto10.25.3,for{%include %},{%render%},and{%layout%},LiquidJScheckswhetherthecandidatepathisinsidetheconfiguredpartialsor layoutsrootsbeforereadingit.Thatcheckispath-based,notrealpath-based.Becauseofthat,afilelike CVE-partials/link.liquidpassesthedirectorycontainmentcheckaslongasitspathnameisundertheallowedroot.If More2026-link.liquidisactuallyasymlinktoafileoutsidetheallowedroot,thefilesystemfollowsthesymlinkwhenthefileis 7.5 Details35525openedandLiquidJSrenderstheexternaltarget.Sotherestrictionisappliedtothepathstringthatwasrequested, nottothefilethatisactuallyread.Thismattersinenvironmentswhereanattackercanplacetemplatesorotherwise influencefilesunderatrustedtemplateroot,includinguploadedthemes,extractedarchives,mountedcontent,or repository-controlledtemplatetrees.Thisvulnerabilityisfixedin10.25.3. OpenClawbefore2026.3.22containsanenvironmentvariableoverridehandlingvulnerabilitythatallowsattackerstoCVE-bypassthesharedhostenvironmentpolicythroughinconsistentsanitizationpaths.Attackerscansupplyblockedor More2026- 7.5malformedoverridekeysthatslipthroughinconsistentvalidationtoexecutearbitrarycodewithunintended Details35650environmentvariables. CVE-Zammadisawebbasedopensourcehelpdesk/customersupportsystem.Priorto7.0.1and6.5.4,unauthenticated More2026-remoteattackerswereabletoaccessthegettingstartedendpointtogetaccesstosensitiveinternalentitydata,even 7.5 Details34723afterthesystemsetupwascompleted.Thisvulnerabilityisfixedin7.0.1and6.5.4. NitroPDFProforWindows14.41.1.4containsaNULLpointerdereferencevulnerabilityintheJavaScript implementationofapp.alert().Whenapp.alert()iscalledwithmorethanoneargumentandthefirstargumentCVE-evaluatestonull(forexample,app.alert(app.activeDocs,true)whenapp.activeDocsisnull),theengineroutesthe More2025- 7.5callthroughafallbackpathintendedfornon-stringarguments.Inthispath,jsValueToString()isinvokedonthenull Details69624valueandreturnsaninvalidstringpointer,whichisthenpassedtoJSGetStringChars()withoutvalidation. DereferencingthispointerleadstoanaccessviolationandapplicationcrashwhenopeningacraftedPDF. CVE-Saleorisane-commerceplatform.From2.0.0tobefore3.23.0a3,3.22.47,3.21.54,and3.20.118,amaliciousactor More2026-canincludemanyGraphQLmutationsorqueriesinasingleAPIcallusingaliasesorchainingmultiplemutations, 7.5 Details35401resultinginresourceexhaustion.Thisvulnerabilityisfixedin3.23.0a3,3.22.47,3.21.54,and3.20.118. AdenialofservicevulnerabilityexistsinReactServerComponents,affectingthefollowingpackages:react-server- CVE-dom-parcel,react-server-dom-turbopackandreact-server-dom-webpack(versions19.0.0through19.0.4,19.1.0 More2026-through19.1.5,and19.2.0through19.2.4).ThevulnerabilityistriggeredbysendingspeciallycraftedHTTPrequests 7.5 Details23869toServerFunctionendpoints.ThepayloadoftheHTTPrequestcausesexcessiveCPUusageforuptoaminuteending inathrownerrorthatiscatchable. CVE-AnissuewasdiscoveredinBMCControl-M/MFT9.0.20through9.0.22.AnAPImanagementendpointallows More2026-unauthenticateduserstoobtainbothanAPIidentifieranditscorrespondingsecretvalue.Withtheseexposedsecrets, 7.5 Details23782anattackercouldinvokeprivilegedAPIoperations,potentiallyleadingtounauthorizedaccess. CVE-NASM'sdisasm()functioncontainsastackbasedbufferoverflowwhenformattingdisassemblyoutput,allowingan More2026- 7.5attackertriggeredout-of-boundswritewhenslenexceedsthebuffercapacity. Details6069 KamailioisanopensourceimplementationofaSIPSignalingServer.Priorto6.1.1,6.0.6,and5.8.8,anout-of-boundsCVE-accessinthecoreofKamailio(formerlyOpenSERandSER)allowsremoteattackerstocauseadenialofservice More2026- 7.5(processcrash)viaaspeciallycrafteddatapacketsentoverTCP.TheissueimpactsKamailioinstanceshavingTCPor Details39863TLSlisteners.Thisvulnerabilityisfixedin5.1.1,6.0.6,and5.8.8. CVE-Aheapbufferoverflowintheavbprintfinalize()functionofFFmpegv8.0.1allowsattackerstocauseaDenialof More2026- 7.5Service(DoS)viaacraftedinput. Details30999 CVE-project-managementforneuroimagingresearch.From20.0.0tobefore27.0.3and28.0.1,abuginthestaticfile More 2026- 7.5routercanallowanattackertotraverseoutsideoftheintendeddirectory,allowingunintendedfilestobedownloaded Details 34392throughthestatic,css,andjsendpoints.Thisvulnerabilityisfixedin27.0.3and28.0.1. CVE-AheapbufferoverflowvulnerabilityexistsintheNetwideAssembler(NASM)duetoalackofboundscheckinginthe More2026-objdirective()function.Thisvulnerabilitycanbeexploitedbyauserassemblingamalicious.asmfile,potentially 7.5 Detailsleadingtoheapmemorycorruption,denialofservice(crash),andarbitrarycodeexecution. DenialofServiceviaOutofMemoryvulnerabilityinApacheActiveMQClient,ApacheActiveMQBroker,Apache ActiveMQ.ActiveMQNIOSSLtransportsdonotcorrectlyhandleTLSv1.3handshakeKeyUpdatestriggeredbyclients.
ThismakesitpossibleforaclienttorapidlytriggerupdateswhichcausesthebrokertoexhaustallitsmemoryintheCVE- More 7.5SSLengineleadingtoDoS.Note:TLSversionsbeforeTLSv1.3(suchasTLSv1.2)arebrokenbutarenotvulnerableto Details OOM.PreviousTLSversionsrequireafullhandshakerenegotiationwhichcausesaconnectiontohangbutnotOOM.39304 Thisisfixedaswell.ThisissueaffectsApacheActiveMQClient:before5.19.4,from6.0.0before6.2.4;Apache ActiveMQBroker:before5.19.4,from6.0.0before6.2.4;ApacheActiveMQ:before5.19.4,from6.0.0before6.2.4. Usersarerecommendedtoupgradetoversion6.2.4or5.19.5,whichfixestheissue. CVE- More2025-inCaseThemesCaseThemeUserallowsPHPLocalFileInclusion.ThisissueaffectsCaseThemeUser:fromn/abefore 7.5 Details58041.0.4. CVE-Animproperresourcedeallocationandclosurevulnerabilityinthetools/zmqsend.ccomponentofFFmpegv8.0.1 More2026- 7.5allowsattackerstocauseaDenialofService(DoS)viasupplyingacraftedinputfile. Details30998 CVE-Anout-of-boundsreadinthereadglobalparam()function(libavcodec/av1dec.c)ofFFmpegv8.0.1allowsattackers More2026- 7.5tocauseaDenialofService(DoS)viaacraftedinput. Details30997 CVE-ANULLpointerdereferenceinNitroPDFProforWindowsv14.41.1.4allowsattackerstocauseaDenialofService More2025- 7.5(DoS)viaacraftedXFApacket. Details66769 InEclipseJetty,theHTTP/1.1parserisvulnerabletorequestsmugglingwhenchunkextensionsareused,similarto the"funkychunks"techniquesoutlinedhere:https://w4ke.info/2025/06/18/funky-chunks.htmlCVE-https://w4ke.info/2025/10/29/funky-chunks-2.htmlJettyterminateschunkextensionparsingat\r\ninsidequoted More2026- 7.4stringsinsteadoftreatingthisasanerror.POST/HTTP/1.1Host:localhostTransfer-Encoding:chunked1;ext="valX0 Details2332GET/smuggledHTTP/1.1...Notehowthechunkextensiondoesnotclosethedoublequotes,anditisabletoinjecta smuggledrequest. CVE-UseafterfreeinWindowsUniversalPlugandPlay(UPnP)DeviceHostallowsanunauthorizedattackertoexecute More2026- 7.4codelocally. Details32156 Vikunjaisanopen-sourceself-hostedtaskmanagementplatform.Priorto2.3.0,theOIDCcallbackhandlerissuesaCVE-fullJWTtokenwithoutcheckingwhetherthematcheduserhasTOTPtwo-factorauthenticationenabled.Whenalocal More2026- 7.4userwithTOTPenrolledismatchedviatheOIDCemailfallbackmechanism,thesecondfactoriscompletelyskipped. Details34727Thisvulnerabilityisfixedin2.3.0. CVE-Out-of-boundswritevulnerabilityinSamsungOpenSourceEscargotallowsOverflowBuffers.Thisissueaffects More2026- 7.4 Details25207 AWeakPasswordRequirementsvulnerabilityinthepasswordmanagementfunctionofJuniperNetworksCTPOS mightallowanunauthenticated,network-basedattackertoexploitweakpasswordsoflocalaccountsandpotentially CVE-takefullcontrolofthedevice.Thepasswordmanagementmenuenablestheadministratortosetpassword More2026-complexityrequirements,butthesesettingsarenotsaved.Theissuecanbeverifiedwiththemenuoption"Show 7.4 Details33771passwordrequirements".Failuretoenforcetheintendedrequirementscanleadtoweakpasswordsbeingused,which significantlyincreasesthelikelihoodthatanattackercanguesstheseandsubsequentlyattainunauthorizedaccess. ThisissueaffectsCTPOSversions9.2R1and9.2R2. CVE-Heap-basedbufferoverflowvulnerabilityinSamsungOpenSourceEscargotallowsout-of-boundswrite.Thisissue More2026- 7.4affectsEscargot:commithash97e8115ab1110bc502b4b5e4a0c689a71520d335. Details25205 PraisonAIAgentsisamulti-agentteamssystem.Priorto1.5.128,theexecutecommandfunctioninshelltools.pycalls os.path.expandvars()oneverycommandargumentatline64,manuallyre-implementingshell-levelenvironmentCVE-variableexpansiondespiteusingshell=False(line88)forsecurity.Thisallowsexfiltrationofsecretsstoredin More2026- 7.4environmentvariables(databasecredentials,APIkeys,cloudaccesskeys).Theapprovalsystemdisplaysthe Details40153unexpanded$VARreferencestohumanreviewers,creatingadeceptiveapprovalwherethedisplayedcommand differsfromwhatactuallyexecutes.Thisvulnerabilityisfixedin1.5.128. InEclipseJetty,theclassJASPIAuthenticatorinitiatestheauthenticationchecks,whichsettwoThreadLocalvariable.CVE-Uponreturningfromtheinitialchecks,thereareconditionsthatcauseanearlyreturnfromtheJASPIAuthenticator More2026- 7.4codewithoutclearingthoseThreadLocals.AsubsequentrequestusingthesamethreadinheritstheThreadLocal Details5795values,leadingtoabrokenaccesscontrolandprivilegeescalation. AnImproperInputValidationvulnerabilityinJuniperNetworksJunosOSandJunosOSEvolvedallowsan unauthenticated,adjacentattacker,sendingaspecificgenuineBGPpacketinanalreadyestablishedBGPsessionto resetonlythatsessioncausingaDenialofService(DoS).AnattackerrepeatedlysendingthepacketwillsustaintheCVE- MoreDenialofService(DoS).ThisissueaffectsJunosOS:25.2versionsbefore25.2R2Thisissuedoesn'tnotaffected2026- 7.4 DetailsJunosOSversionsbefore25.2R1.ThisissueaffectsJunosOSEvolved:25.2-EVOversionsbefore25.2R2-EVOThis33797 issuedoesn'tnotaffectedJunosOSEvolvedversionsbefore25.2R1-EVO.eBGPandiBGPareaffected.IPv4andIPv6 areaffected. CVE-OpenClawbefore2026.3.25containsaserver-siderequestforgeryvulnerabilityinmultiplechannelextensionsthat MorefailtoproperlyguardconfiguredbaseURLsagainstSSRFattacks.Attackerscanexploitunprotectedfetch()calls 7.4
35629 againstconfiguredendpointstorebindrequeststoblockedinternaldestinationsandaccessrestrictedresources. Details libsixelisaSIXELencoder/decoderimplementationderivedfromkmiya'ssixel.Versions1.8.7andpriorcontainause- after-freevulnerabilityinsixelencoderencodebytes()becausesixelframeinit()storesthecaller-ownedpixelbuffer pointerdirectlyinframe->pixelswithoutmakingadefensivecopy.Whenaresizeoperationistriggered,CVE- sixelframeconvertto_rgb888()unconditionallyfreesthiscaller-ownedbufferandreplacesitwithanewinternal More2026- 7.3 allocation,leavingthecallerwithadanglingpointer.Anysubsequentaccesstotheoriginalbufferbythecaller Details33021 constitutesause-after-free,confirmedbyAddressSanitizer.Anattackerwhocontrolsincomingframescantriggerthis bugrepeatedlyandpredictably,resultinginareliablecrashwithpotentialforcodeexecution.Thisissuehasbeen
AvulnerabilitywasdetectedinFoundationAgentsMetaGPTupto0.8.1.ThisaffectsthefunctionchecksolutionoftheCVE-componentHumanEvalBenchmark/MBPPBenchmark.Performingamanipulationresultsincodeinjection.Theattack More2026- 7.3maybeinitiatedremotely.Theexploitisnowpublicandmaybeused.Theprojectwasinformedoftheproblemearly Details5970throughapullrequestbuthasnotreactedyet. Avulnerabilitywasidentifiedintushar-2223HotelManagementSystemupto bb1f3b3666124b888f1e4bcf51b6fba9fbb01d15.AffectedbythisvulnerabilityisanunknownfunctionalityofthefileCVE-/admin/roomdelete.php.ThemanipulationoftheargumentIDleadstosqlinjection.Remoteexploitationoftheattack More2026- 7.3ispossible.Theexploitispubliclyavailableandmightbeused.Thisproductfollowsarollingreleaseapproachfor Details6142continuousdelivery,soversiondetailsforaffectedorupdatedreleasesarenotprovided.Theprojectwasinformedof theproblemearlythroughanissuereportbuthasnotrespondedyet. CVE-AsecurityvulnerabilityhasbeendetectedinPHPGurukulOnlineCourseRegistration3.1.Thisissueaffectssome More2026-unknownprocessingofthefile/admin/checkavailability.php.Themanipulationoftheargumentregnoleadstosql 7.3 Details5814injection.Theattackcanbeinitiatedremotely.Theexploithasbeendisclosedpubliclyandmaybeused. CVE-AweaknesshasbeenidentifiedinPHPGurukulOnlineCourseRegistration3.1.Thisvulnerabilityaffectsunknowncode More2026-ofthefile/checkavailability.php.Executingamanipulationoftheargumentcidcanleadtosqlinjection.Itispossible 7.3 Details5813tolaunchtheattackremotely.Theexploithasbeenmadeavailabletothepublicandcouldbeusedforattacks. CVE-AvulnerabilitywasfoundinPHPGurukulNewsPortalProject4.1.Thisaffectsanunknownpartofthefile/news- More2026-details.php.ThemanipulationoftheargumentCommentresultsinsqlinjection.Theattackcanbelaunched 7.3 Details5837remotely.Theexploithasbeenmadepublicandcouldbeused. CVE-Avulnerabilitywasidentifiedincode-projectsVehicleShowroomManagementSystem1.0.Thisimpactsanunknown More2026-functionofthefile/util/RegisterCustomerFunction.php.SuchmanipulationoftheargumentBRANCHIDleadstosql 7.3 Details6038injection.Theattackmaybeperformedfromremote.Theexploitispubliclyavailableandmightbeused. CVE-Avulnerabilitywasfoundincode-projectsVehicleShowroomManagementSystem1.0.Thisvulnerabilityaffects More2026-unknowncodeofthefile/util/PaymentStatusFunction.php.ThemanipulationoftheargumentCUSTOMERIDresultsin 7.3 Details6151sqlinjection.Itispossibletolaunchtheattackremotely.Theexploithasbeenmadepublicandcouldbeused. AflawhasbeenfoundinFoundationAgentsMetaGPTupto0.8.1.Thisvulnerabilityaffectsthefunction CVE-ActionNode.xmlfillofthefilemetagpt/actions/actionnode.pyofthecomponentXMLHandler.Executinga More2026-manipulationcanleadtoimproperneutralizationofdirectivesindynamicallyevaluatedcode.Theattackmaybe 7.3 Details5971launchedremotely.Theexploithasbeenpublishedandmaybeused.Theprojectwasinformedoftheproblemearly throughapullrequestbuthasnotreactedyet. CVE-Asecurityvulnerabilityhasbeendetectedincode-projectsSimpleLaundrySystem1.0.Thisaffectsanunknownpart More2026-ofthefile/userchecklogin.php.Suchmanipulationoftheargumentuseridleadstosqlinjection.Itispossibleto 7.3 Details5824launchtheattackremotely.Theexploithasbeendisclosedpubliclyandmaybeused. Aflawhasbeenfoundincode-projectsVehicleShowroomManagementSystem1.0.AffectedbythisissueissomeCVE-unknownfunctionalityofthefile/util/BookVehicleFunction.php.ExecutingamanipulationoftheargumentBRANCHID More2026- 7.3canleadtosqlinjection.Theattackmaybeperformedfromremote.Theexploithasbeenpublishedandmaybe Details6149used. CVE-Avulnerabilityhasbeenfoundincode-projectsSimpleITDiscussionForum1.0.Thisaffectsanunknownfunctionof More2026-thefile/add-category-function.php.SuchmanipulationoftheargumentCategoryleadstosqlinjection.Theattackcan 7.3 Details6031beexecutedremotely.Theexploithasbeendisclosedtothepublicandmaybeused. Avulnerabilitywasdetectedincode-projectsVehicleShowroomManagementSystem1.0.AffectedbythisCVE-vulnerabilityisanunknownfunctionalityofthefile/util/MonthTotalReportUpdateFunction.php.Performinga More2026- 7.3manipulationoftheargumentBRANCHIDresultsinsqlinjection.Theattackispossibletobecarriedoutremotely. Details6148Theexploitisnowpublicandmaybeused. Aweaknesshasbeenidentifiedinzhayujiechatgpt-on-wechatCowAgent2.0.4.Theaffectedelementisanunknown CVE-functionofthecomponentAdministrativeHTTPEndpoint.Thismanipulationcausesmissingauthentication.Itis More2026- 7.3possibletoinitiatetheattackremotely.Theexploithasbeenmadeavailabletothepublicandcouldbeusedfor Details6126attacks.Theprojectwasinformedoftheproblemearlythroughanissuereportbuthasnotrespondedyet. CVE-AflawhasbeenfoundinTotolinkN300RH6.1c.1353B20190305.AffectedisthefunctionsetUpgradeUbootofthefile Moreupgrade.so.ThismanipulationoftheargumentFileNamecausesoscommandinjection.Theattackispossibletobe 7.3 Detailscarriedoutremotely.Theexploithasbeenpublishedandmaybeused. CVE- AvulnerabilitywasdeterminedinTendai61.0.0.7(2204).Affectedbythisissueisthefunction
R7WebsSecurityHandlerfunctionofthecomponentHTTPHandler.Thismanipulationcausespathtraversal.Itis 7.3 More possibletoinitiatetheattackremotely.Theexploithasbeenpubliclydisclosedandmaybeutilized. Details Asecurityvulnerabilityhasbeendetectedinperfreego-fastdfs-webupto1.3.7.ThisaffectsanunknownpartoftheCVE-filesrc/main/java/com/perfree/controller/InstallController.javaofthecomponentdoInstallInterface.Themanipulation More 7.3leadstoimproperauthorization.Theattackmaybeinitiatedremotely.Theexploithasbeendisclosedpubliclyand Details6105maybeused.Thevendorwascontactedearlyaboutthisdisclosurebutdidnotrespondinanyway. CVE-Avulnerabilityhasbeenfoundincode-projectsSimpleITDiscussionForum1.0.Impactedisanunknownfunctionof More2026-thefile/question-function.php.Themanipulationoftheargumentcontentleadstosqlinjection.Theattackmaybe 7.3 Details5827initiatedremotely.Theexploithasbeendisclosedtothepublicandmaybeused. CVE-Avulnerabilitywasdeterminedincode-projectsVehicleShowroomManagementSystem1.0.Thisissueaffectssome More2026-unknownprocessingofthefile/util/StaffAddingFunction.php.ThismanipulationoftheargumentSTAFFIDcausessql 7.3 Details6152injection.Theattackcanbeinitiatedremotely.Theexploithasbeenpubliclydisclosedandmaybeutilized. AvulnerabilitywasidentifiedinFoundationAgentsMetaGPTupto0.8.1.ThisaffectsthefunctiongeneratethoughtsCVE-ofthefilemetagpt/strategy/tot.pyofthecomponentTree-of-ThoughtSolver.Themanipulationleadstocode More2026- 7.3injection.Itispossibletoinitiatetheattackremotely.Theexploitispubliclyavailableandmightbeused.Theproject Details6110wasinformedoftheproblemearlythroughanissuereportbuthasnotrespondedyet. CVE-Avulnerabilitywasfoundincode-projectsSimpleITDiscussionForum1.0.Theaffectedelementisanunknown More2026-functionofthefile/functions/addcomment.php.Themanipulationoftheargumentpostidresultsinsqlinjection.The 7.3 Details5828attackmaybelaunchedremotely.Theexploithasbeenmadepublicandcouldbeused. CVE- More2026- 7.3 Details34856 CVE-Avulnerabilitywasdeterminedincode-projectsSimpleITDiscussionForum1.0.Theimpactedelementisanunknown More2026-functionofthefile/pages/content.php.Thismanipulationoftheargumentpostidcausessqlinjection.Remote 7.3 Details5829exploitationoftheattackispossible.Theexploithasbeenpubliclydisclosedandmaybeutilized. CVE-Asecurityvulnerabilityhasbeendetectedincode-projectsSimpleITDiscussionForum1.0.Thisvulnerabilityaffects More2026-unknowncodeofthefile/topic-details.php.Themanipulationoftheargumentpostidleadstosqlinjection.The 7.3 Details5961attackmaybeinitiatedremotely.Theexploithasbeendisclosedpubliclyandmaybeused. CVE-AvulnerabilitywasdetectedinTendaCH221.0.0.6(468).Thisissueaffectsthefunction More2026-R7WebsSecurityHandlerfunctionofthecomponenthttpd.Themanipulationresultsinpathtraversal.Theattackmay 7.3 Details5962belaunchedremotely.Theexploitisnowpublicandmaybeused. CVE-Avulnerabilitywasdeterminedincode-projectsSimpleChatBoxupto1.0.Thisaffectsanunknownpartofthefile More2026-/chatbox/insert.phpofthecomponentEndpoint.Executingamanipulationoftheargumentmsgcanleadtosql 7.3 Details6161injection.Itispossibletolaunchtheattackremotely.Theexploithasbeenpubliclydisclosedandmaybeutilized. Aweaknesshasbeenidentifiedinatototoapi-lab-mcpupto0.2.1.Thisaffectsthefunction CVE-analyzeapispec/generatetestscenarios/testhttpendpointofthefilesrc/mcp/http-server.tsofthecomponent More2026-HTTPInterface.Thismanipulationoftheargumentsource/urlcausesserver-siderequestforgery.Theattackis 7.3 Details5832possibletobecarriedoutremotely.Theexploithasbeenmadeavailabletothepublicandcouldbeusedforattacks. Theprojectwasinformedoftheproblemearlythroughanissuereportbuthasnotrespondedyet. CVE-Avulnerabilitywasidentifiedincode-projectsVehicleShowroomManagementSystem1.0.Impactedisanunknown More2026-functionofthefile/util/StaffDetailsFunction.php.SuchmanipulationoftheargumentSTAFFIDleadstosqlinjection. 7.3 Details6153Theattackcanbelaunchedremotely.Theexploitispubliclyavailableandmightbeused. Avulnerabilitywasidentifiedinidachevmcp-javadcupto1.2.4.ImpactedisanunknownfunctionofthecomponentCVE-HTTPInterface.SuchmanipulationoftheargumentjarFilePathleadstooscommandinjection.Itispossibletolaunch More2026- 7.3theattackremotely.Theexploitispubliclyavailableandmightbeused.Theprojectwasinformedoftheproblem Details5802earlythroughanissuereportbuthasnotrespondedyet. CVE-Avulnerabilitywasdetectedincode-projectsSimpleITDiscussionForum1.0.Impactedisanunknownfunctionofthe More2026-file/delete-category.php.Performingamanipulationoftheargumentcatidresultsinsqlinjection.Itispossibleto 7.3 Details6004initiatetheattackremotely.Theexploitisnowpublicandmaybeused. CVE-AsecurityflawhasbeendiscoveredinPHPGurukulDailyExpenseTrackingSystem1.1.Affectedisanunknown More2026-functionofthefile/register.php.Themanipulationoftheargumentemailresultsinsqlinjection.Theattackmaybe 7.3 Details6193launchedremotely.Theexploithasbeenreleasedtothepublicandmaybeusedforattacks. CVE-Avulnerabilitywasidentifiedincode-projectsLostandFoundThingManagement1.0.Affectedbythisissueissome More2026-unknownfunctionalityofthefile/catageory.php.Suchmanipulationoftheargumentcatleadstosqlinjection.Itis 7.3 Details6163possibletolaunchtheattackremotely.Theexploitispubliclyavailableandmightbeused. CVE-Avulnerabilitywasdetectedincode-projectsFacultyManagementSystem1.0.Impactedisanunknownfunctionof Morethefile/subject-print.php.ThemanipulationoftheargumentIDresultsinsqlinjection.Theattackmaybelaunched 7.3 Detailsremotely.Theexploitisnowpublicandmaybeused. Asecurityvulnerabilityhasbeendetectedincode-projectsVehicleShowroomManagementSystem1.0.Thisissue
affectssomeunknownprocessingofthefile/util/UpdateVehicleFunction.php.Themanipulationoftheargument MoreCVE- 7.3VEHICLEIDleadstosqlinjection.Theattackmaybeinitiatedremotely.Theexploithasbeendisclosedpubliclyand Details maybeused. CVE- More2026-ImproperinputvalidationinWindowsHyper-Vallowsanauthorizedattackertoexecutecodelocally. 7.3 Details32149 Aweaknesshasbeenidentifiedincode-projectsVehicleShowroomManagementSystem1.0.ThisvulnerabilityCVE-affectsunknowncodeofthefile/util/Logincheck.php.ExecutingamanipulationoftheargumentIDcanleadtosql More2026- 7.3injection.Theattackcanbelaunchedremotely.Theexploithasbeenmadeavailabletothepublicandcouldbeused Details6165forattacks. Aflawhasbeenfoundinchatboxaichatboxupto1.20.0.ThisimpactsthefunctionStdioClientTransportofthefile src/main/mcp/ipc-stdio-transport.tsofthecomponentModelContextProtocolServerManagementSystem.ExecutingCVE- Moreamanipulationoftheargumentargs/envcanleadtooscommandinjection.Theattackcanbelaunchedremotely.2026- 7.3 DetailsTheexploithasbeenpublishedandmaybeused.Theprojectwasinformedoftheproblemearlythroughanissue6130 reportbuthasnotrespondedyet. AvulnerabilityhasbeenidentifiedinSINECNMS(Allversions<V4.0SP3withUMC).TheaffectedapplicationcontainsCVE-anauthenticationweaknessduetoinsufficientvalidationofuseridentityintheUMCcomponent.Thiscouldallowan More2026- 7.3unauthenticatedremoteattackertobypassauthenticationandgainunauthorizedaccesstotheapplication.(ZDI-CAN- Details2403227564) CVE-Avulnerabilitywasidentifiedincode-projectsSimpleContentManagementSystem1.0.Affectedbythisvulnerability More2026-isanunknownfunctionalityofthefile/web/admin/login.php.SuchmanipulationoftheargumentUserleadstosql 7.3 Details6182injection.Theattackmaybelaunchedremotely.Theexploitispubliclyavailableandmightbeused. CVE-OpenClawbefore2026.3.22performsciteexpansionbeforecompletingchannelandDMauthorizationchecks, More2026-allowingciteworkandcontenthandlingpriortofinalauthdecisions.Attackerscanexploitthistimingvulnerabilityto 7.3 Details35637accessormanipulatecontentbeforeproperauthorizationvalidationoccurs. Avulnerabilitywasdetectedinzhayujiechatgpt-on-wechatCowAgentupto2.0.4.ThisaffectsanunknownfunctionofCVE-thecomponentAgentModeService.Performingamanipulationresultsinmissingauthentication.Theattackcanbe More2026- 7.3initiatedremotely.Theexploitisnowpublicandmaybeused.Theprojectwasinformedoftheproblemearlythrough Details6129anissuereportbuthasnotrespondedyet. Asecurityflawhasbeendiscoveredincode-projectsSimpleContentManagementSystem1.0.AffectedbythisissueCVE-issomeunknownfunctionalityofthefile/web/index.php.PerformingamanipulationoftheargumentIDresultsinsql More2026- 7.3injection.Remoteexploitationoftheattackispossible.Theexploithasbeenreleasedtothepublicandmaybeused Details6183forattacks. CVE-Asecurityflawhasbeendiscoveredincode-projectsSimpleITDiscussionForum1.0.Theaffectedelementisan More2026-unknownfunctionofthefile/crud.php.ThemanipulationoftheargumentuserIdresultsinsqlinjection.Theattack 7.3 Details5985maybeperformedfromremote.Theexploithasbeenreleasedtothepublicandmaybeusedforattacks. CVE-Avulnerabilitywasfoundincode-projectsVehicleShowroomManagementSystem1.0.Theimpactedelementisan More2026-unknownfunctionofthefile/util/VehicleDetailsFunction.php.ThemanipulationoftheargumentVEHICLEIDresultsin 7.3 Details6036sqlinjection.Theattackcanbeexecutedremotely.Theexploithasbeenmadepublicandcouldbeused. Asecurityflawhasbeendiscoveredinnocobaseplugin-workflow-javascriptupto2.0.23.Thisissueaffectsthe CVE-functioncreateSafeConsoleofthefilepackages/plugins/@nocobase/plugin-workflow-javascript/src/server/Vm.js. More2026-Performingamanipulationresultsinsandboxissue.Theattackcanbeinitiatedremotely.Theexploithasbeen 7.3 Details6224releasedtothepublicandmaybeusedforattacks.Thevendorwascontactedearlyaboutthisdisclosurebutdidnot respondinanyway. AUNIXSymbolicLink(Symlink)FollowingvulnerabilityintheCLIofJuniperNetworksJunosOSallowsalocal, authenticatedattackerwithlowprivilegestoescalatetheirprivilegestorootwhichwillleadtoacompleteCVE-compromiseofthesystem.Whenafterauserhasperformedaspecific'filelink...'CLIoperation,anotheruser More2026- 7.3commits(unrelatedconfigurationchanges),thefirstusercanloginasroot.ThisissueaffectsJunosOS:allversions Details21916before23.2R2-S7,23.4versionsbefore23.4R2-S6,24.2versionsbefore24.2R2-S3,24.4versionsbefore24.4R2- S2,*25.2versionsbefore25.2R2.Thisissuedoesnotaffectversions25.4R1orlater. CVE-Avulnerabilitywasdeterminedincode-projectsVehicleShowroomManagementSystem1.0.Thisaffectsanunknown More2026-functionofthefile/util/AddVehicleFunction.php.ThismanipulationoftheargumentBRANCHIDcausessqlinjection. 7.3 Details6037Theattackispossibletobecarriedoutremotely.Theexploithasbeenpubliclydisclosedandmaybeutilized. CVE-AvulnerabilitywasdetectedinSourceCodesterPharmacySalesandInventorySystem1.0.Thisissueaffectssome More2026-unknownprocessingofthefile/ajax.php?action=chkprodavailability.ThemanipulationoftheargumentIDresultsin 7.3 Details6187sqlinjection.Theattackmaybeperformedfromremote.Theexploitisnowpublicandmaybeused. CVE-Asecurityflawhasbeendiscoveredincode-projectsLostandFoundThingManagement1.0.Thisaffectsanunknown Morepartofthefile/addcat.php.Performingamanipulationoftheargumentcataresultsinsqlinjection.Theattackcanbe 7.3 Detailsinitiatedremotely.Theexploithasbeenreleasedtothepublicandmaybeusedforattacks. Aweaknesshasbeenidentifiedincode-projectsEasyBlogSiteupto1.0.TheimpactedelementisanunknownCVE-functionofthefile/users/contactus.php.ExecutingamanipulationoftheargumentNamecanleadtosqlinjection. More
Theattackcanbelaunchedremotely.Theexploithasbeenmadeavailabletothepublicandcouldbeusedfor Details 7.3 attacks. Asecurityvulnerabilityhasbeendetectedindecolua9routerupto0.3.47.TheimpactedelementisanunknownCVE-functionofthefile/apiofthecomponentAdministrativeAPIEndpoint.Themanipulationleadstoauthorization More 7.3bypass.Theattackispossibletobecarriedoutremotely.Theexploithasbeendisclosedpubliclyandmaybeused. Details5842Upgradingtoversion0.3.75issufficienttoresolvethisissue.Itissuggestedtoupgradetheaffectedcomponent. AvulnerabilityhasbeenfoundinFoundationAgentsMetaGPTupto0.8.1.Thisissueaffectsthefunction CVE-Terminal.runcommandinthelibrarymetagpt/tools/libs/terminal.py.Themanipulationleadstooscommandinjection. More2026-Remoteexploitationoftheattackispossible.Theexploithasbeendisclosedtothepublicandmaybeused.The 7.3 Details5972identifierofthepatchisd04ffc8dc67903e8b327f78ec121df5e190ffc7b.Applyingapatchistherecommendedaction tofixthisissue. AvulnerabilitywasfoundinFoundationAgentsMetaGPTupto0.8.1.ImpactedisthefunctiongetmimetypeoftheCVE-filemetagpt/utils/common.py.Themanipulationresultsinoscommandinjection.Theattackcanbeexecuted More2026- 7.3remotely.Theexploithasbeenmadepublicandcouldbeused.Theprojectwasinformedoftheproblemearly Details5973throughapullrequestbuthasnotreactedyet. CVE-AvulnerabilityhasbeenfoundinSourceCodesterPharmacySalesandInventorySystem1.0.Theaffectedelementis More2026-anunknownfunctionofthefile/ajax.php?action=login.SuchmanipulationoftheargumentUsernameleadstosql 7.3 Details6189injection.Itispossibletolaunchtheattackremotely.Theexploithasbeendisclosedtothepublicandmaybeused. CVE- More2026-SourcecodesterOnlineThesisArchivingSystemv1.0isvulneraletoSQLinjectioninthefile/otas/viewarchive.php. 7.3 Details36948 ALEAPP(AndroidLogsEventsAndProtobufParser)through3.4.0containsapathtraversalvulnerabilityinthe CVE-NQVault.pyartifactparserthatusesattacker-controlledfilenamefromvaluesfromadatabasedirectlyasthe More2026-outputfilename,allowingarbitraryfilewritesoutsidethereportoutputdirectory.Anattackercanembedapath 7.3 Details40027traversalpayloadsuchas../../../outsidewritten.bininthedatabasetowritefilestoarbitrarylocations,potentially achievingcodeexecutionbyoverwritingexecutablefilesorconfiguration. AvulnerabilitywasdeterminedinFoundationAgentsMetaGPTupto0.8.1.TheaffectedelementisthefunctionCVE-Bash.runinthelibrarymetagpt/tools/libs/terminal.py.Thismanipulationcausesoscommandinjection.Theattackis More2026- 7.3possibletobecarriedoutremotely.Theprojectwasinformedoftheproblemearlythroughapullrequestbuthasnot Details5974reactedyet. CVE-AvulnerabilitywasdeterminedinTendai121.0.0.11(3862).Theimpactedelementisanunknownfunctionofthe More2026-componentHTTPHandler.Executingamanipulationcanleadtopathtraversal.Theattackmaybelaunched 7.3 Details5849remotely.Theexploithasbeenpubliclydisclosedandmaybeutilized. immichisahighperformanceself-hostedphotoandvideomanagementsolution.Priorto2.7.0,sStoredCross-Site Scripting(XSS)inthe360°panoramaviewerallowsanyauthenticatedusertoexecutearbitraryJavaScriptintheCVE-browserofanyotheruserwhoviewsthemaliciouspanoramawiththeOCRoverlayenabled.Theattackeruploadsan More2026- 7.3equirectangularimagecontainingcraftedtext;OCRextractsit,andthepanoramaviewerrendersitviainnerHTML Details35455withoutsanitization.Thisenablessessionhijacking(viapersistentAPIkeycreation),privatephotoexfiltration,and accesstoGPSlocationhistoryandfacebiometricdata.Thisvulnerabilityisfixedin2.7.0. CVE-AflawhasbeenfoundinSourceCodesterPharmacySalesandInventorySystem1.0.Impactedisanunknownfunction More2026-ofthefile/ajax.php?action=delete_sales.ThismanipulationoftheargumentIDcausessqlinjection.Itispossibleto 7.3 Details6188initiatetheattackremotely.Theexploithasbeenpublishedandmaybeused. CVE-AweaknesshasbeenidentifiedinTendai31.0.0.6(2204).Theaffectedelementisthefunction More2026-R7WebsSecurityHandlerofthecomponentHTTPHandler.Executingamanipulationcanleadtopathtraversal.The 7.3 Details5841attackcanbeexecutedremotely.Theexploithasbeenmadeavailabletothepublicandcouldbeusedforattacks. CVE-AnobservableresponsediscrepancyvulnerabilityintheSonicWallSMA1000seriesappliancesallowsaremote More2026- 7.2attackertoenumerateSSLVPNusercredentials. Details4113 CVE-ImproperhandlingofUnicodeencodinginSonicWallSMA1000seriesappliancesallowsaremoteauthenticated More2026- 7.2SSLVPNusertobypassWorkplace/ConnectTunnelTOTPauthentication. Details4116 Animproperneutralizationofspecialelementsusedinansqlcommand('sqlinjection')vulnerabilityinFortinet FortiAnalyzer7.6.0through7.6.4,FortiAnalyzer7.4.0through7.4.8,FortiAnalyzer7.2allversions,FortiAnalyzer7.0 allversions,FortiAnalyzerCloud7.6.0through7.6.4,FortiAnalyzerCloud7.4.0through7.4.8,FortiAnalyzerCloud7.2CVE- Moreallversions,FortiAnalyzerCloud7.0allversions,FortiManager7.6.0through7.6.4,FortiManager7.4.0through7.4.8,2025- 7.2 DetailsFortiManager7.2allversions,FortiManager7.0allversions,FortiManagerCloud7.6.0through7.6.4,FortiManager61848Cloud7.4.0through7.4.8,FortiManagerCloud7.2allversions,FortiManagerCloud7.0allversionsmayallowa privilegedauthenticatedattackertoexecuteunauthorizedcodeorcommandsviaJSONRPCAPI BoidCMSisanopen-source,PHP-basedflat-fileCMSforbuildingsimplewebsitesandblogs,usingJSONasits database.Versionspriorto2.1.3arevulnerabletoacriticalLocalFileInclusion(LFI)attackviathetplparameter, whichcanleadtoRemoteCodeExecution(RCE).Theapplicationfailstosanitizethetpl(template)parameterduring
CVE- pagecreationandupdates.Thisparameterispasseddirectlytoarequireonce()statementwithoutpathvalidation. More 7.2 Anauthenticatedadministratorcanexploitthisbyinjectingpathtraversalsequences(../)intothetplvaluetoescape Details 39387 theintendedthemedirectoryandincludearbitraryfiles--specifically,filesfromtheserver'smedia/directory.When combinedwiththefileuploadfunctionality,thisbecomesafullRCEchain:anattackercanfirstuploadafilewith embeddedPHPcode(e.g.,disguisedasimagedata),thenusethepathtraversalvulnerabilitytoincludethatfilevia requireonce(),executingtheembeddedcodewithwebserverprivileges.Thisissuehasbeenfixedinversion2.1.3. TheOptimole-OptimizeImages|ConvertWebP&AVIF|CDN&LazyLoad|ImageOptimizationpluginforWordPress isvulnerabletoStoredCross-SiteScriptinginallversionsupto,andincluding,4.2.2.Thisisduetoinsufficientinput sanitizationandoutputescapingontheuser-supplied's'parameter(srcsetdescriptor)intheunauthenticated/wp- json/optimole/v1/optimizationsRESTendpoint.TheendpointvalidatesrequestsusinganHMACsignatureandCVE- timestamp,butthesevaluesareexposeddirectlyinthefrontendHTMLmakingthemaccessibletoanyvisitor.The More2026- 7.2 pluginusessanitizetextfield()onthedescriptorvalueofrest.php,whichstripsHTMLtagsbutdoesnotescape Details5217 doublequotes.Thepoisoneddescriptoristhenstoredviatransients(backedbytheWordPressoptionstable)and laterretrievedandinjectedverbatimintothesrcsetattributeoftagreplacer.phpwithoutproperescaping.This makesitpossibleforunauthenticatedattackerstoinjectarbitrarywebscriptsintopagesthatwillexecutewhenevera useraccessestheinjectedpage. Pachno1.0.6containsastoredcross-sitescriptingvulnerabilitythatallowsattackerstoexecutearbitraryHTMLand CVE- scriptcodebyinjectingmaliciouspayloadsintoPOSTparameters.Attackerscaninjectscriptsthroughthevalue, More2026- commentbody,articlecontent,description,andmessageparametersacrossmultiplecontrollers,whicharestoredin 7.2 Details40038 thedatabaseandexecutedinusers'browsersessionsduetoimpropersanitizationviaRequest::getRawParameter() orRequest::getParameter()calls. CouchCMScontainsaprivilegeescalationvulnerabilitythatallowsauthenticatedAdmin-leveluserstocreateCVE- SuperAdminaccountsbytamperingwiththefklevelslistparameterinusercreationrequests.Attackerscanmodify More2026- 7.2 theparametervaluefrom4to10intheHTTPrequestbodytobypassauthorizationvalidationandgainfull Details29002 applicationcontrol,circumventingrestrictionsonSuperAdminaccountcreationandprivilegeassignment. ChamiloLMSisanopen-sourcelearningmanagementsystem.Inversion2.0-RC.2,thefile public/main/inc/ajax/install.ajax.phpisaccessiblewithoutauthenticationonfullyinstalledinstancesbecause,unlike otherAJAXendpoints,itdoesnotincludetheglobal.inc.phpfilethatperformsauthenticationandinstallation- CVE- completedchecks.ItstestmaileractionacceptsanarbitrarySymfonyMailerDSNstringfromPOSTdataandusesit More2026- toconnecttoanattacker-specifiedSMTPserver,enablingServer-SideRequestForgery(SSRF)intointernalnetworks 7.2 Details33715 viatheSMTPprotocol.AnunauthenticatedattackercanalsoabusethistoweaponizetheChamiloserverasanopen emailrelayforphishingandspamcampaigns,withemailsappearingtooriginatefromtheserver'sIPaddress. Additionally,errorresponsesfromfailedSMTPconnectionsmaydiscloseinformationaboutinternalnetworktopology andrunningservices.Thisissuehasbeenfixedinversion2.0.0-RC.3. TheFormMakerby10WebpluginforWordPressisvulnerabletoStoredCross-SiteScriptingviatheMatrixfield(Text CVE- Boxinputtype)informsubmissionsinallversionsupto,andincluding,1.15.40.Thisisduetoinsufficientinput More2026- sanitization(`sanitizetextfieldstripstagsbutnotquotes)andmissingoutputescapingwhenrenderingsubmission 7.2 Details4388 dataintheadminSubmissionsview.ThismakesitpossibleforunauthenticatedattackerstoinjectarbitraryJavaScript throughaformsubmissionthatexecutesinthebrowserofanadministratorwhoviewsthesubmissiondetails. TheBackWPuppluginforWordPressisvulnerabletoLocalFileInclusionviatheblocknameparameterofthe/wp- json/backwpup/v1/getblockRESTendpointinallversionsupto,andincluding,5.6.6duetoanon-recursive CVE-str_replace()sanitizationofpathtraversalsequences.Thismakesitpossibleforauthenticatedattackers,with More2026- Administrator-levelaccessandabove,toincludearbitraryPHPfilesontheserverviacraftedtraversalsequences 7.2 Details6227 (e.g.,....//),whichcanbeleveragedtoreadsensitivefilessuchaswp-config.php`orachieveremotecode
executionincertainconfigurations.Administratorshavetheabilitytograntindividualuserspermissiontohandle backups,whichmaythenallowlower-leveluserstoexploitthisvulnerability. TheSmartPostShow-PostGrid,PostCarousel&Slider,andListCategoryPostspluginforWordPressisvulnerableto PHPObjectInjectioninallversionsupto,andincluding,3.0.12viadeserializationofuntrustedinputinthe CVE-importshortcodes()function.Thismakesitpossibleforauthenticatedattackers,withAdministrator-levelaccessand More2026-above,toinjectaPHPObject.NoknownPOPchainispresentinthevulnerablesoftware,whichmeansthis 7.2 Details3017vulnerabilityhasnoimpactunlessanotherpluginorthemecontainingaPOPchainisinstalledonthesite.IfaPOP chainispresentviaanadditionalpluginorthemeinstalledonthetargetsystem,itmayallowtheattackertoperform actionslikedeletearbitraryfiles,retrievesensitivedata,orexecutecodedependingonthePOPchainpresent. PraisonAIisamulti-agentteamssystem.Priorto4.5.128,the/api/v1/runsendpointacceptsanarbitrarywebhookurl intherequestbodywithnoURLvalidation.Whenasubmittedjobcompletes(successorfailure),theservermakesanCVE- MoreHTTPPOSTrequesttothisURLusinghttpx.AsyncClient.Anunauthenticatedattackercanusethistomaketheserver2026- 7.2 DetailssendPOSTrequeststoarbitraryinternalorexternaldestinations,enablingSSRFagainstcloudmetadataservices,40114 internalAPIs,andothernetwork-adjacentservices.Thisvulnerabilityisfixedin4.5.128. ArcaneisaninterfaceformanagingDockercontainers,images,networks,andvolumes.Priorto1.17.3,the CVE-/api/templates/fetchendpointacceptsacaller-suppliedurlparameterandperformsaserver-sideHTTPGETrequestto More2026-thatURLwithoutauthenticationandwithoutURLschemeorhostvalidation.Theserver'sresponseisreturneddirectly 7.2 Details40242tothecaller.type.ThisconstitutesanunauthenticatedSSRFvulnerabilityaffectinganypubliclyreachableArcane instance.Thisvulnerabilityisfixedin1.17.3. CVE-Aout-of-boundswritevulnerabilityinFortinetFortiWeb8.0.0through8.0.3,FortiWeb7.6.0through7.6.6,FortiWeb More 7.27.4.0through7.4.11mayallowattackertoexecuteunauthorizedcodeorcommandsvia Details40688
InvenTreeisanOpenSourceInventoryManagementSystem.Priorto1.2.7and1.3.0,anon-staffauthenticateduserCVE-canelevatetheiraccounttoastafflevelviaaPOSTrequestagainsttheiruseraccountendpoint.Thewrite More 7.2permissionsontheAPIendpointareimproperlyconfigured,allowinganyusertochangetheirstaffstatus.This Details35476vulnerabilityisfixedin1.2.7and1.3.0. AvulnerabilitywasfoundinD-LinkDIR-8821.01B02.Impactedisthefunctionsprintfofthefileprog.cgioftheCVE-componentHNAP1SetNetworkSettingsHandler.ThemanipulationoftheargumentIPAddressresultsinoscommand More2026- 7.2injection.Theattackmaybeperformedfromremote.Theexploithasbeenmadepublicandcouldbeused.This Details5844 CVE-AnauthenticatedremoteattackerwithhighprivilegescanexploittheOpenVPNconfigurationviatheweb-based More2024-managementinterfaceofaWAGOPLC.Ifuser-definedscriptsarepermitted,OpenVPNmayallowtheexecutionof 7.2 Details1490arbitraryshellcommandsenablingtheattackertorunarbitrarycommandsonthedevice. TheGeradordeCertificados-DevAppspluginforWordPressisvulnerabletoarbitraryfileuploadsduetomissingfileCVE-typevalidationinthemoveUploadedFile()functioninallversionsupto,andincluding,1.3.6.Thismakesitpossible More2026- 7.2forauthenticatedattackers,withAdministrator-levelaccessandabove,touploadarbitraryfilesontheaffectedsite's Details4808serverwhichmaymakeremotecodeexecutionpossible. CVE-IBMVerifyIdentityAccessContainer11.0through11.0.2andIBMSecurityVerifyAccessContainer10.0through More2026-10.0.9.1andIBMVerifyIdentityAccess11.0through11.0.2andIBMSecurityVerifyAccess10.0through10.0.9.1 7.2 Details1343allowsanattackertocontactinternalauthenticationendpointswhichareprotectedbytheReverseProxy. CVE- More2026-Out-of-boundsreadinMicrosoftOfficeExcelallowsanunauthorizedattackertodiscloseinformationlocally. 7.1 Details32188 ChamiloLMSisalearningmanagementsystem.Priorto1.11.38and2.0.0-RC.3,anInsecureDirectObjectReferenceCVE-(IDOR)vulnerabilityinthegradebookresultviewpageallowsanyauthenticatedteachertodeleteanystudent'sgrade More2026- 7.1resultacrosstheentireplatformbymanipulatingthedeletemarkorresultdeleteGETparameters.Noownershipor Details32894course-scopeverificationisperformed.Thisvulnerabilityisfixedin1.11.38and2.0.0-RC.3. ChamiloLMSisalearningmanagementsystem.Priorto1.11.38and2.0.0-RC.3,anInsecureDirectObjectReferenceCVE-(IDOR)vulnerabilityinthegradebookevaluationeditpageallowsanyauthenticatedteachertoviewandmodifythe More2026- 7.1settings(name,maxscore,weight)ofevaluationsbelongingtoanyothercoursebymanipulatingtheeditevalGET Details32930parameter.Thisvulnerabilityisfixedin1.11.38and2.0.0-RC.3. Bugsinkisaself-hostederrortrackingtool.In2.1.0,anauthenticatedfilewritevulnerabilitywasidentifiedinBugsinkCVE-2.1.0intheartifactbundleassemblyflow.Auserwithavalidauthenticationtokencouldcausetheapplicationto More2026- 7.1writeattacker-controlledcontenttoafilesystemlocationwritablebytheBugsinkprocess.Thisvulnerabilityisfixedin Details401622.1.1. ChamiloLMSisalearningmanagementsystem.Priorto1.11.38and2.0.0-RC.3,ChamiloLMScontainsanInsecure DirectObjectReference(IDOR)vulnerabilityintheLearningPathprogresssavingendpoint.Thefile CVE-lpajaxsaveitem.phpacceptsauid(userID)parameterdirectlyfrom$REQUESTandusesittoloadandmodify More2026-anotheruser'sLearningPathprogress--includingscore,status,completion,andtime--withoutverifyingthatthe 7.1 Details33702requestingusermatchesthetargetuserID.Anyauthenticateduserenrolledinacoursecanoverwriteanotheruser's LearningPathprogressbysimplychangingtheuidparameterintherequest.Thisvulnerabilityisfixedin1.11.38and 2.0.0-RC.3. ChamiloLMSisalearningmanagementsystem.Priorto1.11.38,anyauthenticateduserwithaRESTAPIkeycanCVE-modifytheirownstatusfieldviatheupdateuserfromusernameendpoint.Astudent(status=5)canchangetheir More2026- 7.1statustoTeacher/CourseManager(status=1),gainingcoursecreationandmanagementprivileges.Thisvulnerability Details33706isfixedin1.11.38. libsixelisaSIXELencoder/decoderimplementationderivedfromkmiya'ssixel.Versions1.8.7andpriorcontainan integeroverflowleadingtoanout-of-boundsheapreadinthe--cropoptionhandlingofimg2sixel,wherepositive coordinatesuptoINTMAXareacceptedwithoutoverflow-safeboundschecking.Insixelencoderdoclip(),theCVE-expressionclipw+clipxoverflowstoalargenegativevaluewhenclipxisINTMAX,causingtheboundsguardto More2026- 7.1beskippedentirely,andtheunclampedcoordinateispassedthroughsixelframeclip()toclip(),whichcomputesa Details33019sourcepointerfarbeyondtheimagebufferandpassesittomemmove().Anattackersupplyingaspeciallycrafted cropargumentwithanyvalidimagecantriggeranout-of-boundsreadintheheap,resultinginareliablecrashand potentialinformationdisclosure.Thisissuehasbeenfixedinversion1.8.7-r1. libsixelisaSIXELencoder/decoderimplementationderivedfromkmiya'ssixel.Versions1.8.7andpriorcontainan integeroverflowwhichleadstoaheapbufferoverflowviasixelframeconverttorgb888()inframe.c,where allocationsizeandpointeroffsetcomputationsforpalettisedimages(PAL1,PAL2,PAL4)areperformedusingint arithmeticbeforecastingtosizet.ForimageswhosepixelcountexceedsINTMAX/4,theoverflowproducesanCVE- Moreundersizedheapallocationfortheconversionbufferandanegativepointeroffsetforthenormalizationsub-buffer,2026- 7.1 Detailsafterwhichsixelhelpernormalize_pixelformat()writesthefullimagedatastartingfromtheinvalidpointer,causing33020 massiveheapcorruptionconfirmedbyASAN.AnattackerprovidingaspeciallycraftedlargepalettisedPNGcan corrupttheheapofthevictimprocess,resultinginareliablecrashandpotentialarbitrarycodeexecution.Thisissue hasbeenfixedinversion1.8.7-r1. Tmds.DBusprovides.NETlibrariesforworkingwithD-Busfrom.NET.Tmds.DBusandTmds.DBus.Protocolare vulnerabletomaliciousD-Buspeers.Apeeronthesamebuscanspoofsignalsbyimpersonatingtheownerofawell-CVE-
knownname,exhaustsystemresourcesorcausefiledescriptorspilloverbysendingmessageswithanexcessive More 7.1 numberofUnixfiledescriptors,andcrashtheapplicationbysendingmalformedmessagebodiesthatcause Details39959 unhandledexceptionsontheSynchronizationContext.ThisvulnerabilityisfixedinTmds.DBus0.92.0and Tmds.DBus.Protocol0.92.0and0.21.3. MyT-PM1.5.1containsanSQLinjectionvulnerabilitythatallowsauthenticatedattackerstoexecutearbitrarySQLCVE-queriesbyinjectingmaliciouscodethroughtheCharge[grouptotal]parameter.AttackerscansubmitcraftedPOST More2019- 7.1requeststothe/charge/adminendpointwitherror-based,time-basedblind,orstackedquerypayloadstoextract Details25713sensitivedatabaseinformationormanipulatedata. ChamiloLMSisalearningmanagementsystem.Priorto1.11.38,anyauthenticateduser(includingstudents)can CVE-writearbitrarycontenttofilesontheserverviatheBigUploadendpoint.Thekeyparametercontrolsthefilenameand More2026-therawPOSTbodybecomesthefilecontent.While.phpextensionsarefilteredto.phps,the.phtextensionpasses 7.1 Details33704throughunmodified.OnApacheconfigurationswhere.phtishandledasPHP,thisleadstoRemoteCodeExecution. Thisvulnerabilityisfixedin1.11.38. LaravelPassportprovidesOAuth2serversupporttoLaravel.From13.0.0tobefore13.7.1,thereisanAuthentication CVE-Bypassforclientcredentialstokens.theleague/oauth2-serverlibrarysetstheJWTsubclaimtotheclientidentifier More2026-(sincethere'snouser).ThetokenguardthenpassesthisvaluetoretrieveById()withoutvalidatingit'sactuallyauser 7.1 Details39976identifier,potentiallyresolvinganunrelatedrealuser.Anymachine-to-machinetokencaninadvertentlyauthenticate asanactualuser.Thisvulnerabilityisfixedin13.7.1. TheZTEZXEDMiEMSproducthasapasswordresetvulnerabilityforanyuser.BecausethemanagementofthecloudCVE-EMSportaldoesnotproperlycontrolaccesstotheuserlistacquisitionfunction,attackerscanreadalluserlist More2026- 7.1informationthroughtheuserlistinterface.Attackerscanresetthepasswordsofobtaineduserinformation,causing Details40436riskssuchasunauthorizedoperations. ImpressCMS1.3.11containsatime-basedblindSQLinjectionvulnerabilitythatallowsauthenticatedattackerstoCVE-manipulatedatabasequeriesbyinjectingSQLcodethroughthe'bid'parameter.AttackerscansendPOSTrequeststo More2019- 7.1theadmin.phpendpointwithmalicious'bid'valuescontainingSQLcommandstoextractsensitivedatabase Details25703information. NewsbullHaberScript1.0.0containsmultipleSQLinjectionvulnerabilitiesinthesearchparameterthatallow CVE-authenticatedattackerstoextractdatabaseinformationthroughtime-based,blind,andboolean-basedinjection More2019-techniques.AttackerscaninjectmaliciousSQLcodethroughthesearchparameterinendpointslike 7.1 Details25699/admin/comment/records,/admin/category/records,/admin/news/records,and/admin/menu/childstomanipulate databasequeriesandretrievesensitivedata. ResourceSpace8.6containsanSQLinjectionvulnerabilitythatallowsauthenticatedattackerstoexecutearbitraryCVE-SQLqueriesbyinjectingmaliciouscodethroughthekeywordsparameterincollectionedit.php.Attackerscansubmit More2019- 7.1POSTrequestswithcraftedSQLpayloadsinthekeywordsfieldtoextractsensitivedatabaseinformationincluding Details25693schemanames,usercredentials,andotherconfidentialdata. CVE-TREKisacollaborativetravelplanner.Priorto2.7.2,TREKwasmissingauthorizationchecksontheImmichtripphoto More2026- 7.1managementroutes.Thisvulnerabilityisfixedin2.7.2. Details40185 CVE-AdiantiFramework5.5.0and5.6.0containsanSQLinjectionvulnerabilitythatallowsauthenticatedusersto More2018-manipulatedatabasequeriesbyinjectingSQLcodethroughthenamefieldinSystemProfileForm.Attackerscan 7.1 Details25257submitcraftedSQLstatementsintheprofileeditendpointtomodifyusercredentialsandgainadministrativeaccess. CVE-AflawwasfoundinRedHatQuay'shandlingofresumablecontainerimagelayeruploads.Theuploadprocessstores More2026-intermediatedatainthedatabaseusingaformatthat,iftamperedwith,couldallowanattackertoexecutearbitrary 7.1 Details32590codeontheQuayserver. ChamiloLMSisanopen-sourcelearningmanagementsystem.Inversionspriorto2.0.0-RC.3,the /api/courserelusersendpointisvulnerabletoInsecureDirectObjectReference(IDOR),allowinganauthenticated attackertomodifytheuserparameterintherequestbodytoenrollanyarbitraryuserintoanycoursewithoutproperCVE-authorizationchecks.Thebackendtruststheuser-suppliedinputfortheuserfieldandperformsnoserver-side More2026- 7.1verificationthattherequesterownsthereferenceduserIDorhaspermissiontoactonbehalfofotherusers.This Details34602enablesunauthorizedmanipulationofuser-courserelationships,potentiallygrantingunintendedaccesstocourse materials,bypassingenrollmentcontrols,andcompromisingplatformintegrity.Thisissuehasbeenfixedinversion 2.0.0-RC.3. AflawwasfoundinRedHatQuay'scontainerimageuploadprocess.AnauthenticateduserwithpushaccesstoanyCVE-repositoryontheregistrycaninterferewithimageuploadsinprogressbyotherusers,includingthoseinrepositories More2026- 7.1theydonothaveaccessto.Thiscouldallowtheattackertoread,modify,orcancelanotheruser'sin-progressimage Details32589upload. ThewpForoForumpluginforWordPressisvulnerabletoArbitraryFileDeletioninversionsuptoandincluding3.0.2. Thisisduetoatwo-steplogicflaw:thetopicadd()andtopicedit()actionhandlersacceptarbitraryuser-supplied data[*]arraysfrom$REQUESTandstorethemaspostmetawithoutrestrictingwhichfieldsmaycontainarrayvalues. Because'body'isincludedintheallowedtopicfieldslist,anattackercansupplydata[body][fileurl]withanarbitrary CVE-filepath(e.g.,wp-config.phporanabsoluteserverpath).Thispoisonedfileurlispersistedtotheplugin'scustom Morepostmetadatabasetable.Subsequently,whentheattackersubmitswpftcfdelete[]=bodyonatopiceditrequest,the 7.1 Detailsaddfile()methodretrievesthestoredpostmetarecord,extractstheattacker-controlledfileurl,passesitthrough wpforofixuploaddir()whichonlyrewriteslegitimatewpforouploadpathsandreturnsallotherpathsunchanged,
andthencallswpdeletefile()ontheunvalidatedpath.Thismakesitpossibleforauthenticatedattackers,with subscriber-levelaccessandabove,todeletearbitraryfileswritablebythePHPprocessontheserver,including criticalfilessuchaswp-config. eBrigadeERP4.5containsanSQLinjectionvulnerabilitythatallowsauthenticatedattackerstoexecutearbitrarySQLCVE-queriesbyinjectingmaliciouscodethroughthe'id'parameter.AttackerscansendGETrequeststopdf.phpwith More2019- 7.1craftedSQLpayloadsinthe'id'parametertoextractsensitivedatabaseinformationincludingtablenamesand Details25707schemadetails. CVE-Thecompilerismeanttounwrappointerswhicharetheoperandsofamemorymove;ano-opinterfaceconversion More2026-preventedthecompilerfrommakingthecorrectdeterminationaboutnon-overlappingmoves,potentiallyleadingto 7.1 Details27144memorycorruptionatruntime. Anout-of-boundsreadvulnerabilityexistsintheDecodePsmctRle1functionofDicomImageDecoder.cpp.The CVE-PMSCT_RLE1decompressionroutine,whichdecodestheproprietaryPhilipsCompressionformat,doesnotproperly More2026-validateescapemarkersplacedneartheendofthecompresseddatastream.Acraftedsequenceattheendofthe 7.1 Details5441buffercancausethedecodertoreadbeyondtheallocatedmemoryregionandleakheapdataintotherendered imageoutput. OpenClawthrough2026.2.22containsasymlinktraversalvulnerabilityinagents.createandagents.updatehandlersCVE-thatusefs.appendFileonIDENTITY.mdwithoutsymlinkcontainmentchecks.Attackerswithworkspaceaccesscan More2026- 7.1plantsymlinkstoappendattacker-controlledcontenttoarbitraryfiles,enablingremotecodeexecutionviacrontab Details35632injectionorunauthorizedaccessviaSSHkeymanipulation. CVE-KrayinCRMv2.2.xwasdiscoveredtocontainaSQLinjectionvulnerabilityviatherotten_leadparameterat More2026- 7.1/Lead/LeadDataGrid.php. Details38528 CVE-Cross-SiteRequestForgery(CSRF)vulnerabilityinDotstoreExtraFeesPluginforWooCommercewoo-conditional- More2026-product-fees-for-checkoutallowsCrossSiteRequestForgery.ThisissueaffectsExtraFeesPluginforWooCommerce: 7.1 Details39671fromn/athrough<=4.3.3. DuetoamissingauthorizationcheckinSAPERPandSAPS/4HANA(PrivateCloudandOn-Premise),anauthenticated CVE-attackercouldexecuteaparticularABAPreporttooverwriteanyexistingeight?characterexecutableABAPreport More2026-withoutauthorization.Iftheoverwrittenreportissubsequentlyexecuted,theintendedfunctionalitycouldbecome 7.1 Details34256unavailable.Successfulexploitationimpactsavailability,withalimitedimpactonintegrityconfinedtotheaffected report,whileconfidentialityremainsunaffected. AmaliciouslycraftedHTMLpayloadinanassemblyvariantname,whendisplayedduringthedeleteconfirmationCVE-dialogandclickedbyauser,cantriggeraStoredCross-siteScripting(XSS)vulnerabilityintheAutodeskFusion More2026- 7.1desktopapplication.Amaliciousactormayleveragethisvulnerabilitytoreadlocalfilesorexecutearbitrarycodein Details4369thecontextofthecurrentprocess. AheapbufferoverflowvulnerabilityexistsinthePAMimageparsinglogic.WhenOrthancprocessesacraftedPAMCVE-imageembeddedinaDICOMfile,imagedimensionsaremultipliedusing32-bitunsignedarithmetic.Speciallychosen More2026- 7.1valuescancauseanintegeroverflowduringbuffersizecalculation,resultingintheallocationofasmallbuffer Details5444followedbyamuchlargerwriteoperationduringpixelprocessing. CVE-AmaliciouslycraftedHTMLpayload,storedinadesignnameandexportedtoCSV,cantriggeraStoredCross-site More2026-Scripting(XSS)vulnerabilityintheAutodeskFusiondesktopapplication.Amaliciousactormayleveragethis 7.1 Details4345vulnerabilitytoreadlocalfilesorexecutearbitrarycodeinthecontextofthecurrentprocess. AmaliciouslycraftedHTMLpayloadinacomponentname,whendisplayedduringthedeleteconfirmationdialogandCVE-clickedbyauser,cantriggeraStoredCross-siteScripting(XSS)vulnerabilityintheAutodeskFusiondesktop More2026- 7.1application.Amaliciousactormayleveragethisvulnerabilitytoreadlocalfilesorexecutearbitrarycodeinthe Details4344contextofthecurrentprocess. AvulnerabilityhasbeenidentifiedinIndustrialEdgeManagementProV1(Allversions>=V1.7.6<V1.15.17), IndustrialEdgeManagementProV2(Allversions>=V2.0.0<V2.1.1),IndustrialEdgeManagementVirtual(All versions>=V2.2.0<V2.8.0).Affectedmanagementsystemsdonotproperlyenforceuserauthenticationonremote CVE-connectionstodevices.Thiscouldfacilitateanunauthenticatedremoteattackertocircumventauthenticationand More2026- 7.1impersonatealegitimateuser.Successfulexploitationrequiresthattheattackerhasidentifiedtheheaderandport Details33892usedforremoteconnectionstodevicesandthattheremoteconnectionfeatureisenabledforthedevice.Exploitation allowstheattackertotunneltothedevice.Securityfeaturesonthisdeviceitself(e.g.appspecificauthentication)are notaffected. CVE-InsufficientuiwarningofdangerousoperationsinWindowsRemoteDesktopallowsanunauthorizedattackerto More2026- 7.1performspoofingoveranetwork. Details26151 TheGravitySMTPpluginforWordPressisvulnerabletoMissingAuthorizationinversionsupto,andincluding,2.1.4.CVE-Thisisduetothepluginnotproperlyverifyingthatauserisauthorizedtoperformanaction.Thismakesitpossible More 7.1forauthenticatedattackers,withsubscriber-levelaccessandabove,touninstallanddeactivatethepluginanddelete Details pluginoptions.NOTE:ThisvulnerabilityisalsoexploitableviaaCross-SiteRequestForgeryvector. CVE-Server-SideRequestForgeryviaSW-URLHeadervulnerabilityinApacheSkyWalkingMCP.ThisissueaffectsApache More 7.1
34476 SkyWalkingMCP:0.1.0.Usersarerecommendedtoupgradetoversion0.2.0,whichfixesthisissue. Details CVE- ImproperNeutralizationofInputDuringWebPageGeneration('Cross-siteScripting')vulnerabilityinZootemplate More 7.1 CeratoallowsReflectedXSS.ThisissueaffectsCerato:fromn/athrough2.2.18. Details58920 TheSleuthKitthrough4.14.0containsapathtraversalvulnerabilityintskrecoverthatallowsanattackertowrite CVE- filestoarbitrarylocationsoutsidetheintendedrecoverydirectoryviacraftedfilenamesordirectorypathswithpath More2026- traversalsequencesinafilesystemimage.Anattackercancraftamaliciousfilesystemimagewithembedded/../ 7.1 Details40024 sequencesinfilenamesthat,whenprocessedbytskrecover,writesfilesoutsidetheoutputdirectory,potentially achievingcodeexecutionbyoverwritingshellconfigurationorcronentries. CVE- Concurrentexecutionusingsharedresourcewithimpropersynchronization('racecondition')inWindowsWin32K- More2026- 7.0 GRFXallowsanauthorizedattackertoelevateprivilegeslocally. Details33104 CVE- Concurrentexecutionusingsharedresourcewithimpropersynchronization('racecondition')inWindowsSSDP More2026- 7.0 Serviceallowsanauthorizedattackertoelevateprivilegeslocally. Details32083 CVE- Concurrentexecutionusingsharedresourcewithimpropersynchronization('racecondition')inWindowsSSDP More2026- 7.0 Serviceallowsanauthorizedattackertoelevateprivilegeslocally. Details32082 CVE- More2026- UseafterfreeinWindowsWalletServiceallowsanauthorizedattackertoelevateprivilegeslocally. 7.0 Details32080 CVE- More2026- Stack-basedbufferoverflowinWindowsKernelallowsanauthorizedattackertoelevateprivilegeslocally. 7.0 Details32195 CVE- UseafterfreeinWindowsAncillaryFunctionDriverforWinSockallowsanauthorizedattackertoelevateprivileges More2026- 7.0 locally. Details33100 CVE- UseafterfreeinWindowsAncillaryFunctionDriverforWinSockallowsanauthorizedattackertoelevateprivileges More2026- 7.0 locally. Details32073 CVE- Concurrentexecutionusingsharedresourcewithimpropersynchronization('racecondition')inFunctionDiscovery More2026- 7.0 Service(fdwsd.dll)allowsanauthorizedattackertoelevateprivilegeslocally. Details32086 CVE- Heap-basedbufferoverflowinFunctionDiscoveryService(fdwsd.dll)allowsanauthorizedattackertoelevate More2026- 7.0 Details32087 CVE- Concurrentexecutionusingsharedresourcewithimpropersynchronization('racecondition')inFunctionDiscovery More2026- 7.0 Service(fdwsd.dll)allowsanauthorizedattackertoelevateprivilegeslocally. Details32093 CVE- UseafterfreeinWindowsAncillaryFunctionDriverforWinSockallowsanauthorizedattackertoelevateprivileges More2026- 7.0 locally. Details33099 CVE- More2026- UseafterfreeinWindowsServerUpdateServiceallowsanauthorizedattackertoelevateprivilegeslocally. 7.0 Details32224 libsixelisaSIXELencoder/decoderimplementationderivedfromkmiya'ssixel.Versions1.8.7andpriorcontainaUse- After-Freevulnerabilityviatheloadgif()functioninfromgif.c,whereasinglesixelframetobjectisreusedacrossall framesofananimatedGIFandgifinitframe()unconditionallyfreesandreallocatesframe->pixelsbetweenframes CVE- withoutconsultingtheobject'sreferencecount.BecausethepublicAPIexplicitlyprovidessixelframeref()toretaina More2026- frameandsixelframegetpixels()toaccesstherawpixelbuffer,acallbackfollowingthisdocumentedusagepattern 7.0 Details33018 willholdadanglingpointerafterthesecondframeisdecoded,resultinginaheapuse-after-freeconfirmedbyASAN. Anyapplicationusingsixelhelperloadimagefile()withamulti-framecallbacktoprocessuser-suppliedanimated GIFsisaffected,withareliablecrashastheminimumimpactandpotentialforcodeexecution.Thisissuehasbeen
CVE- OpenTelemetry-GoistheGoimplementationofOpenTelemetry.From1.15.0to1.42.0,thefixforCVE-2026-24051 More2026- changedtheDarwinioregcommandtouseanabsolutepathbutlefttheBSDkenvcommandusingabarename, 7.0 Details39883 allowingthesamePATHhijackingattackonBSDandSolarisplatforms.Thisvulnerabilityisfixedin1.43.0. CVE- Concurrentexecutionusingsharedresourcewithimpropersynchronization('racecondition')inFunctionDiscovery More 7.0 Service(fdwsd.dll)allowsanauthorizedattackertoelevateprivilegeslocally. Details32150
CVE- More DoublefreeinMicrosoftBrokeringFileSystemallowsanauthorizedattackertoelevateprivilegeslocally. 7.0 Details32219 CVE- UseafterfreeinWindowsUniversalPlugandPlay(UPnP)DeviceHostallowsanauthorizedattackertoelevate More2026- 7.0 Details32075 CVE- Concurrentexecutionusingsharedresourcewithimpropersynchronization('racecondition')inWindowsTCP/IP More2026- 7.0 allowsanauthorizedattackertoelevateprivilegeslocally. Details27921 CVE- More2026- UseafterfreeinWindowsCommonLogFileSystemDriverallowsanauthorizedattackertoelevateprivilegeslocally. 7.0 Details32070 CVE- More2026- UseafterfreeinWindowsTDITranslationDriver(tdx.sys)allowsanauthorizedattackertoelevateprivilegeslocally. 7.0 Details27908 CVE- Concurrentexecutionusingsharedresourcewithimpropersynchronization('racecondition')inApplockerFilterDriver More2026- 7.0 (applockerfltr.sys)allowsanauthorizedattackertoelevateprivilegeslocally. Details25184 CVE- InsecurestorageofsensitiveinformationinWindowsCryptographicServicesallowsanauthorizedattackertoelevate More2026- 7.0 Details26152 CVE- More2026- UseafterfreeinWindowsShellallowsanauthorizedattackertoelevateprivilegeslocally. 7.0 Details26165 CVE- More2026- DoublefreeinWindowsShellallowsanauthorizedattackertoelevateprivilegeslocally. 7.0 Details26166 CVE- Concurrentexecutionusingsharedresourcewithimpropersynchronization('racecondition')inWindowsAncillary More2026- 7.0 FunctionDriverforWinSockallowsanauthorizedattackertoelevateprivilegeslocally. Details26173 CVE- Concurrentexecutionusingsharedresourcewithimpropersynchronization('racecondition')inWindowsServer More2026- 7.0 UpdateServiceallowsanauthorizedattackertoelevateprivilegeslocally. Details26174 CVE- UseafterfreeinWindowsAncillaryFunctionDriverforWinSockallowsanauthorizedattackertoelevateprivileges More2026- 7.0 locally. Details26177 CVE- Concurrentexecutionusingsharedresourcewithimpropersynchronization('racecondition')inWindowsSSDP More2026- 7.0 Serviceallowsanauthorizedattackertoelevateprivilegeslocally. Details32068 CVE- UseafterfreeinWindowsAncillaryFunctionDriverforWinSockallowsanauthorizedattackertoelevateprivileges More2026- 7.0 locally. Details26182 CVE- UseafterfreeinWindowsWFPNDISLightweightFilterDriver(wfplwfs.sys)allowsanauthorizedattackertoelevate More2026- 7.0 Details27917 CVE- Concurrentexecutionusingsharedresourcewithimpropersynchronization('racecondition')inWindowsCloudFiles More 2026- 7.0 MiniFilterDriverallowsanauthorizedattackertoelevateprivilegeslocally. Details 27926 CVE- Time-of-checktime-of-use(toctou)raceconditioninWindowsLUAFVallowsanauthorizedattackertoelevate More2026- 7.0 Details27929 CVE- UseafterfreeinWindowsAncillaryFunctionDriverforWinSockallowsanauthorizedattackertoelevateprivileges More2026- 7.0 locally. Details27922 CVE- Vulnerabilityofimproperpermissioncontrolinthethemesettingmodule.Impact:Successfulexploitationofthis More 6.9 vulnerabilitymayaffectserviceconfidentiality. Details28553 AflawwasfoundinKeycloak,specificallyintheorganizationselectionloginpage.Aremoteattackerwithmanage- realmormanage-organizationsadministrativeprivilegescanexploitaStoredCross-SiteScripting(XSS)
vulnerability.Thisflawoccursbecausetheorganization.aliasisplacedintoaninlineJavaScriptonclickhandler, MoreCVE- 6.9 allowingacraftedJavaScriptpayloadtoexecuteinauser'sbrowserwhentheyviewtheloginpage.Successful Details exploitationenablesarbitraryJavaScriptexecution,potentiallyleadingtosessiontheft,unauthorizedaccountactions,37980 orfurtherattacksagainstusersoftheaffectedrealm. CVE-Accessofresourceusingincompatibletype('typeconfusion')vulnerabilityinSamsungOpenSourceEscargotallows More2026- 6.9PointerManipulation.ThisissueaffectsEscargot:97e8115ab1110bc502b4b5e4a0c689a71520d335. Details40446 CVE-IncorrectprivilegeassignmentinBluetoothinMaintenancemodepriortoSMRApr-2026Release1allowsphysical More2026- 6.8attackerstobypassExtendUnlock. Details21011 ApolloMCPServerisaModelContextProtocolserverthatexposesGraphQLoperationsasMCPtools.Priortoversion 1.7.0,theApolloMCPServerdidnotvalidatetheHostheaderonincomingHTTPrequestswhenusing StreamableHTTPtransport.InconfigurationswhereanHTTP-basedMCPserverisrunonlocalhostwithoutadditional authenticationornetwork-levelcontrols,thiscouldpotentiallyallowamaliciouswebsite--visitedbyauserrunningCVE-theserverlocally--touseDNSrebindingtechniquestobypasssame-originpolicyrestrictionsandissuerequeststo More2026- 6.8thelocalMCPserver.Ifsuccessfullyexploited,thiscouldallowanattackertoinvoketoolsoraccessresources Details35577exposedbytheMCPserveronbehalfofthelocaluser.ThisissueislimitedtoHTTP-basedtransportmodes (StreamableHTTP).Itdoesnotaffectserversusingstdiotransport.Thepracticalriskisfurtherreducedin deploymentsthatuseauthentication,network-levelaccesscontrols,orarenotboundtolocalhost.Thisvulnerabilityis fixedin1.7.0. CVE-TheFormMakerby10WebWordPresspluginbefore1.15.38doesnotproperlyprepareSQLquerieswhenthe"MySQL More2025- 6.8Mapping"featureisinuse,whichcouldmakeSQLInjectionattackspossibleincertaincontexts. Details15441 CVE-Heap-basedbufferoverflowinWindowsUSBPrintDriverallowsanunauthorizedattackertoelevateprivilegeswitha More2026- 6.8physicalattack. Details32223 CVE-RateLimitingforattemptingauserloginisnotbeingproperlyenforced,makingHCLDevOpsVelocitysusceptibleto More2025- 6.8brute-forceattackspasttheunsuccessfulloginattemptlimit.Thisvulnerabilityisfixedin5.1.7. Details31991 CVE-ImpropercheckforexceptionalconditionsinDeviceCarepriortoSMRApr-2026Release1allowsphysicalattackers More2026- 6.8tobypassKnoxGuard. Details21007 CVE-Boundary-unlimitedvulnerabilityintheapplicationreadmodule.Impact:Successfulexploitationofthisvulnerability More2026- 6.8mayaffectavailability. Details34864 CVE-RaceinV8inGoogleChromepriorto147.0.7727.55allowedaremoteattackertopotentiallyexploitheapcorruption More2026- 6.8viaacraftedHTMLpage.(Chromiumsecurityseverity:Medium) Details5893 AivenOperatorallowsyoutoprovisionandmanageAivenServicesfromyourKubernetescluster.From0.31.0to before0.37.0,adeveloperwithcreatepermissiononClickhouseUserCRDsintheirownnamespacecanexfiltrate secretsfromanyothernamespace--productiondatabasecredentials,APIkeys,servicetokens--withasingleCVE-kubectlapply.Theoperatorreadsthevictim'ssecretusingitsClusterRoleandwritesthepasswordintoanewsecret More2026- 6.8intheattacker'snamespace.Theoperatoractsasaconfuseddeputy:itsServiceAccounthascluster-widesecret Details39961read/write(aiven-operator-roleClusterRole),andittrustsuser-suppliednamespacevaluesin spec.connInfoSecretSource.namespacewithoutvalidation.Noadmissionwebhookenforcesthisboundary--the ServiceUserwebhookreturnsnil,andnoClickhouseUserwebhookexists.Thisvulnerabilityisfixedin0.37.0. CVE-RelianceonuntrustedinputsinasecuritydecisioninWindowsBootLoaderallowsanauthorizedattackertobypassa More2026- 6.7securityfeaturelocally. Details0390 CVE-ArelativepathtraversalvulnerabilityinFortinetFortiWeb8.0.0through8.0.2,FortiWeb7.6.0through7.6.6,FortiWeb More2026-7.4.1through7.4.12,FortiWeb7.2.7through7.2.12,FortiWeb7.0.10through7.0.12mayallowattackertoexecute 6.7 Details39814unauthorizedcodeorcommandsvia CVE-Aimproperneutralizationofspecialelementsusedinansqlcommand('sqlinjection')vulnerabilityinFortinet More2026-FortiClientEMS7.4.0through7.4.5,FortiClientEMS7.2.0through7.2.12,FortiClientEMS7.0allversionsmayallow 6.7 Details39809attackertoexecuteunauthorizedcodeorcommandsviasendingcraftedrequests Aimproperlimitationofapathnametoarestricteddirectory('pathtraversal')vulnerabilityinFortinetFortiSandboxCVE-5.0.0through5.0.5,FortiSandbox4.4.0through4.4.8,FortiSandbox4.2allversions,FortiSandboxCloud5.0.4, More2026- 6.7FortiSandboxPaaS5.0.4mayallowaprivilegedattackerwithsuper-adminprofileandCLIaccesstodeletean Details25691arbitrarydirectoryviaHTTPcraftedrequests. APermissiveListofAllowedInputvulnerabilityintheCLIofJuniperNetworksSupportInsights(JSI)VirtualLightweight CVE-Collector(vLWC)allowsalocal,highprivilegedattackertoescalatetheirprivilegestoroot.TheCLImenuaccepts Moreinputwithoutcarefullyvalidatingit,whichallowsforshellcommandinjection.Theseshellcommandsareexecuted 6.7
21915 withrootpermissionsandcanbeusedtogaincompletecontrolofthesystem.ThisissueaffectsallJSIvLWCversions Details before3.0.94. CVE- Insystemd259before260,thereislocalprivilegeescalationinsystemd-machinedbecausevarlinkcanbeusedto More 6.7 reachtherootnamespace. Details40224 CVE- Improperneutralizationofspecialelementsusedinansqlcommand('sqlinjection')inSQLServerallowsan More2026- 6.7 authorizedattackertoelevateprivilegeslocally. Details32176 CVE- Improperneutralizationofspecialelementsusedinansqlcommand('sqlinjection')inSQLServerallowsan More2026- 6.7 authorizedattackertoelevateprivilegeslocally. Details32167 CVE- More2026- 6.7 authorizationandthemesupport.Priorto0.31.4.0,Thisvulnerabilityisfixedin0.31.4.0. Details39389 AMissingAuthenticationforCriticalFunctionvulnerabilityincommandprocessingofJuniperNetworksJunosOS allowsaprivilegedlocalattackertogainaccesstoLinux-basedlinecardsasroot.Thisissueaffectssystemsrunning CVE- JunosOSusingLinux-basedlinecards.Affectedlinecardsinclude:MPC7,MPC8,MPC9,MPC10,MPC11LC2101, More2025- LC2103LC480,LC4800,LC9600MX304(built-inFPC)MX-SPC3SRX5K-SPC3EX9200-40XSFPC3-PTX-U2, 6.7 Details30650 FPC3-PTX-U3FPC3-SFF-PTXLC1101,LC1102,LC1104,LC1105ThisissueaffectsJunosOS:allversionsbefore 22.4R3-S8,from23.2before23.2R2-S6,from23.4before23.4R2-S6,from24.2before24.2R2-S3,from24.4 before24.4R2,from25.2before25.2R2. Aflawwasfoundinlibcap.AlocalunprivilegedusercanexploitaTime-of-check-to-time-of-use(TOCTOU)raceCVE- conditioninthecap_set_file()function.Thisallowsanattackerwithwriteaccesstoaparentdirectorytoredirectfile More2026- 6.7 capabilityupdatestoanattacker-controlledfile.Bydoingso,capabilitiescanbeinjectedintoorstrippedfrom Details4878 unintendedexecutables,leadingtoprivilegeescalation. CVE- BluetoothACPIDriversprovidedbyDynabookInc.containastack-basedbufferoverflowvulnerability.Anattacker More2026- 6.7 mayexecutearbitrarycodebymodifyingcertainregistryvalues. Details35553 CVE- Out-of-boundswritevulnerabilityinthefilesystem.Impact:Successfulexploitationofthisvulnerabilitymayaffect More2026- 6.7 Details34863 CVE- Out-of-boundsreadvulnerabilityinSamsungOpenSourceEscargotallowsResourceLeakExposure.Thisissueaffects More2026- 6.7 Details25206 AnOSCommandInjectionvulnerabilityintheCLIprocessingofJuniperNetworksJunosOSandJunosOSEvolved allowsalocal,high-privilegedattackerexecutingspecific,craftedCLIcommandstoinjectarbitraryshellcommands asroot,leadingtoacompletecompromiseofthesystem.Certain'setsystem'commands,whenexecutedwith CVE- craftedarguments,arenotproperlysanitized,allowingforarbitraryshellinjection.Theseshellcommandsare More2026- executedasroot,potentiallyallowingforcompletecontrolofthevulnerablesystem.Thisissueaffects:JunosOS:all 6.7 Details33791 versionsbefore22.4R3-S8,from23.2before23.2R2-S5,from23.4before23.4R2-S7,from24.2before24.2R2- S2,from24.4before24.4R2,from25.2before25.2R2;JunosOSEvolved:allversionsbefore22.4R3-S8-EVO, *from23.2before23.2R2-S5-EVO,from23.4before23.4R2-S7-EVO,from24.2before24.2R2-S2-EVO,from 24.4before24.4R2-EVO,*from25.2before25.2R1-S1-EVO,25.2R2-EVO. InvenTreeisanOpenSourceInventoryManagementSystem.Priorto1.2.7and1.3.0,anyuserswhohavestaff CVE- accesspermissionscaninstallpluginsviatheAPI,withoutrequiring"superuser"accountaccess.Thislevelof More2026- permissionrequirementisoutofalignmentwithotherpluginactions(suchasuninstalling)whichdorequire 6.6 Details35479 superuseraccess.Thevulnerabilityallowsstaffusers(whomaybeconsideredtohavealowerleveloftrustthana superuseraccount)toinstallarbitrary(andpotentiallyharmful)plugins.Thisvulnerabilityisfixedin1.2.7and1.3.0. CVE- DellPowerScaleOneFS,versions9.5.0.0through9.10.1.6andversions9.11.0.0through9.13.0.1,containsan More2026- incorrectprivilegeassignmentvulnerability.Alowprivilegedattackerwithlocalaccesscouldpotentiallyexploitthis 6.6 Details27102 vulnerability,leadingtoelevationofprivileges. Aneval()injectionvulnerabilityintheRapid7InsightAgentbeaconinglogicforLinuxversionscouldtheoreticallyCVE- allowanattackertoachieveremotecodeexecutionasrootviaacraftedbeaconresponse.BecausetheAgentuses More2026- 6.6 mutualTLS(mTLS)toverifycommandsfromtheRapid7Platform,itisunlikelythattheeval()functioncouldbe Details4837 exploitedremotelywithoutprior,highlyprivilegedaccesstothebackendplatform. UseofDefaultCryptographicKeyinthehardwareforsomeIntel(R)Pentium(R)ProcessorSilverSeries,Intel(R) Celeron(R)ProcessorJSeries,Intel(R)Celeron(R)ProcessorNSeriesmayallowanescalationofprivilege.Hardware CVE- reverseengineeradversarywithaprivilegedusercombinedwithahighcomplexityattackmayenableescalationof More privilege.Thisresultmaypotentiallyoccurviaphysicalaccesswhenattackrequirementsarepresentwithspecial 6.6 Details20709 internalknowledgeandrequiresnouserinteraction.Thepotentialvulnerabilitymayimpacttheconfidentiality(high), integrity(none)andavailability(none)ofthevulnerablesystem,resultinginsubsequentsystemconfidentiality (high),integrity(high)andavailability(none)impacts.
CVE- InsufficientpolicyenforcementinPWAsinGoogleChromepriorto147.0.7727.55allowedaremoteattackerwhohad More 6.6 compromisedtherendererprocesstoinstallaPWAwithoutuserconsentviaacraftedHTMLpage.(Chromium Details securityseverity:Medium) CVE- ImproperinputvalidationinRetailModepriortoSMRApr-2026Release1allowslocalattackerstotriggerprivileged More 6.6 functions. Details21010 AsecurityflawhasbeendiscoveredinGL.iNetGL-RM1,GL-RM10,GL-RM10RCandGL-RM1PE1.8.1.Affectedbythis issueissomeunknownfunctionalityofthecomponentFactoryResetHandler.PerformingamanipulationresultsinCVE- improperauthentication.Theattackcanbeinitiatedremotely.Thecomplexityofanattackisratherhigh.The More2026- 6.6 exploitationisknowntobedifficult.Upgradingtoversion1.8.2canresolvethisissue.Itisadvisabletoupgradethe Details5959 affectedcomponent.Thevendorwascontactedearly,respondedinaveryprofessionalmannerandquicklyreleased afixedversionoftheaffectedproduct. TheUserRegistration&Membership-Free&PaidMemberships,Subscriptions,ContentRestriction,UserProfile, CustomUserRegistration&LoginBuilderpluginforWordPressisvulnerabletoSQLInjectionviatheCVE- 'membershipids[]'parameterinallversionsupto,andincluding,5.1.2duetoinsufficientescapingontheuser More2026- 6.5 suppliedparameterandlackofsufficientpreparationontheexistingSQLquery.Thismakesitpossiblefor Details1865 authenticatedattackers,withSubscriber-levelaccessandabove,toappendadditionalSQLqueriesintoalready existingqueriesthatcanbeusedtoextractsensitiveinformationfromthedatabase. CVE- MissingAuthorizationvulnerabilityinAAWebServant12StepMeetingList12-step-meeting-listallowsExploiting More2026- IncorrectlyConfiguredAccessControlSecurityLevels.Thisissueaffects12StepMeetingList:fromn/athrough<= 6.5 Details39569 3.19.9. CVE- DuetomissingauthorizationchecksintheSAPS/4HANAODataService(ManageReferenceEquipment),anattacker More2026- couldupdateanddeletechildentitiesviaODataserviceswithoutproperauthorization.Thisvulnerabilityhasahigh 6.5 Details27677 impactonintegrity,whileconfidentialityandavailabilityarenotimpacted. TheLifterLMSpluginforWordPressisvulnerabletoSQLInjectionviathe'order'parameterinallversionsupto,and CVE- including,9.2.1.Thisisduetoinsufficientescapingontheusersuppliedparameterandlackofsufficientpreparation More2026- ontheexistingSQLquery.Thismakesitpossibleforauthenticatedattackers,withInstructor-levelaccessandabove 6.5 Details5207 whohavetheeditpostcapabilityonthequiz,toappendadditionalSQLqueriesintoalreadyexistingqueriesthatcan beusedtoextractsensitiveinformationfromthedatabase. CVE- Out-of-boundsreadvulnerabilityinSamsungOpenSourceEscargotallowsResourceLeakExposure.Thisissueaffects More2026- 6.5 Details25209 CVE- ImproperNeutralizationofInputDuringWebPageGeneration('Cross-siteScripting')vulnerabilityinRonaldHuereca More2026- CustomQueryBlockspost-type-archive-mappingallowsDOM-BasedXSS.ThisissueaffectsCustomQueryBlocks:from 6.5 Details39575 n/athrough<=5.5.0. CVE- UseafterfreeinWindowsUniversalPlugandPlay(UPnP)DeviceHostallowsanunauthorizedattackertodisclose More2026- 6.5 informationoveranadjacentnetwork. Details27925 ApacheAirflowversions3.0.0through3.1.8DagRunwaitendpointreturnsXComresultvalueseventouserswhoonly haveDAGRunreadpermissions,suchastheViewerrole.ThisbehaviorconflictswiththeFABRBACmodel,which CVE- treatsXComasaseparateprotectedresource,andwiththesecuritymodeldocumentationthatdefinestheViewer More2026- roleasread-only.AirflowusestheFABAuthManagertomanageaccesscontrolonaper-resourcebasis.TheViewer 6.5 Details34538 roleisintendedtoberead-onlybydefault,andthesecuritymodeldocumentationdefinesViewerusersasthosewho caninspectDAGswithoutaccessingsensitiveexecutionresults.UsersarerecommendedtoupgradetoApache Airflow3.2.0whichresolvesthisissue. CVE- Pachno1.0.6containsanopenredirectionvulnerabilitythatallowsattackerstoredirectuserstoarbitraryexternal More2026- websitesbymanipulatingthereturntoparameter.AttackerscancraftmaliciousloginURLswithunvalidated 6.5 Details40039 returntovaluestoconductphishingattacksandstealusercredentials. CVE- DuetomissingauthorizationchecksintheSAPS/4HANAbackendODataService(ManageReferenceStructures),an More2026- 6.5 Details27678 vulnerabilityhasahighimpactonintegrity,whileconfidentialityandavailabilityarenotimpacted. CVE- TheYMLforYandexMarketWordPresspluginbefore5.0.26isvulnerabletoRemoteCodeExecutionviathefeed More2025- 6.5 generationprocess. Details14545 Pachno1.0.6containsanauthenticationbypassvulnerabilityintherunSwitchUser()actionthatallowsauthenticatedCVE- low-privilegeuserstoescalateprivilegesbymanipulatingtheoriginalusernamecookie.Attackerscansettheclient- More2026- 6.5 controlledoriginalusernamecookietoanyvalueandrequestaswitchtouserID1toobtainsessiontokensor Details40043 passwordhashesbelongingtoadministratoraccounts. TheYITHWooCommerceWishlistWordPresspluginbefore4.13.0doesnotproperlyvalidatewishlistownershipintheCVE- save_title()AJAXhandlerbeforeallowingwishlistrenamingoperations.Thefunctiononlychecksforavalidnonce, More 6.5 whichispubliclyexposedinthepagesourceofthe/wishlist/page,makingitpossibleforunauthenticatedattackers Details torenameanywishlistbelongingtoanyuseronthesite.
Net::CIDR::Liteversionsbefore0.23forPerlmishandlesIPv4mappedIPv6addresses,whichmayallowIPACLbypass. packipv6()includesthesentinelbytefrompackipv4()whenbuildingthepackedrepresentationofIPv4mapped addresseslike::ffff:192.168.1.1.Thisproducesan18bytevalueinsteadof17bytes,misaligningtheIPv4partoftheCVE-address.Thewronglengthcausesincorrectresultsinmaskoperations(bitwiseANDtruncatestotheshorteroperand) More 6.5andinfind()/binfind()whichusePerlstringcomparison(lt/gt).Thiscancausefind()toincorrectlymatchormiss Details40199addresses.Example:my$cidr=Net::CIDR::Lite->new("::ffff:192.168.1.0/120");$cidr->find("::ffff:192.168.2.0");# incorrectlyreturnstrueThisistriggeredbyvalidRFC4291IPv4mappedaddresses(::ffff:x.x.x.x).SeealsoCVE-2026- 40198,arelatedissueinthesamefunctionaffectingmalformedIPv6addresses. ChamiloLMSisanopen-sourcelearningmanagementsystem.Inversionspriorto2.0.0-RC.3,thenotebookmodule containsanInsecureDirectObjectReference(IDOR)vulnerabilitythatallowsanyauthenticatedstudenttoreadthe CVE-privatecoursenotesofanyotheruserontheplatformbymanipulatingthenotebookidparameterintheeditnote More2026-action.TheapplicationfetchesthenotecontentusingonlythesuppliedintegerIDwithoutverifyingthatthe 6.5 Details34370requestinguserownsthenote,andthefulltitleandHTMLbodyarerenderedintheeditformandreturnedtothe attacker'sbrowser.Whileownershipchecksexistinthewritepaths(updateNote()anddeletenote()),theyare entirelyabsentfromthereadpath(getnoteinformation()).Thisissuehasbeenfixedinversion2.0.0-RC.3. Aflawwasfoundinmirror-registry.AuthenticateduserscanexploitthelogexportfeaturebyprovidingaspeciallyCVE-craftedwebaddress(URL).Thisallowstheapplication'sbackendtomakearbitraryrequeststointernalnetwork More2026- 6.5resources,avulnerabilityknownasServer-SideRequestForgery(SSRF).Thiscouldleadtounauthorizedaccessto Details2377sensitiveinformationorotherinternalsystems. CVE-InsufficientvalidationofuntrustedinputinWebSocketsinGoogleChromepriorto147.0.7727.55allowedaremote More2026-attackerwhohadcompromisedtherendererprocesstobypasssameoriginpolicyviaacraftedHTMLpage. 6.5 Details5919(Chromiumsecurityseverity:Low) PraisonAIisamulti-agentteamssystem.Priorto4.5.128,thesafeextractall()functioninPraisonAI'sreciperegistry CVE-validatesarchivemembersagainstpathtraversalattacksbutperformsnochecksonindividualmembersizes, More2026-cumulativeextractedsize,ormembercountbeforecallingtar.extractall().Anattackercanpublishamaliciousrecipe 6.5 Details40148bundlecontaininghighlycompressibledata(e.g.,10GBofzeroscompressingto~10MB)thatexhauststhevictim's diskwhenpulledviaLocalRegistry.pull()orHttpRegistry.pull().Thisvulnerabilityisfixedin4.5.128. CVE-DuetomissingauthorizationchecksintheSAPS/4HANAfrontendODataService(ManageReferenceStructures),an More2026- 6.5 Details27679vulnerabilityhasahighimpactonintegrity,whileconfidentialityandavailabilityarenotimpacted. CVE-VariousstoredXSSvulnerabilitiesinthemaps-andiconrenderinglogicinPhocaMapscomponent5.0.0-6.0.2have More2026- 6.5beendiscovered. Details23900 CVE-OpenClawbefore2026.3.31(patchedin2026.4.8)containsarequestbodyreplayvulnerabilityinfetchWithSsrFGuard More2026-thatallowsunsaferequestbodiestoberesentacrosscross-originredirects.Attackerscanexploitthisbytriggering 6.5 Details40037redirectstoexfiltratesensitiverequestdataorheaderstounintendedorigins. Directusisareal-timeAPIandAppdashboardformanagingSQLdatabasecontent.Priorto11.17.0,Directusstores CVE-revisionrecords(indirectusrevisions)wheneveritemsarecreatedorupdated.Duetotherevisionsnapshotcodenot More2026-consistentlycallingtheprepareDeltasanitizationpipeline,sensitivefields(includingusertokens,two-factor 6.5 Details39943authenticationsecrets,externalauthidentifiers,authdata,storedcredentials,andAIproviderAPIkeys)couldbe storedinplaintextwithinrevisionrecords.Thisvulnerabilityisfixedin11.17.0. CVE-DuetoamissingauthorizationcheckinSAPBusinessAnalyticsandSAPContentManagement,anauthenticateduser More2026-couldmakeunauthorizedcallstocertainremotefunctionmodules,potentiallyaccessingsensitiveinformationbeyond 6.5 Details34261theirintendedpermissions.Thisvulnerabilityaffectsconfidentiality,withnoimpactonintegrityandavailability. CVE-Cross-SiteRequestForgery(CSRF)vulnerabilityinThemeGoodsGrandBloggrandblogallowsCrossSiteRequest More2026- 6.5Forgery.ThisissueaffectsGrandBlog:fromn/athrough<=3.1. Details39632 DuringauthorizationchecksinSAPHumanCapitalManagementforSAPS/4HANA,thesystemreturnsspecificCVE-messages.Duetothis,anauthenticateduserwithlowprivilegescouldguessandenumeratethecontentshown, More2026- 6.5beyondtheirauthorizedscope.Thisleadstodisclosureofsensitiveinformationcausingahighimpacton Details34264confidentiality,whileintegrityandavailabilityareunaffected. CVE-Cross-SiteRequestForgery(CSRF)vulnerabilityinThemeGoodsGrandCarRentalgrandcarrentalallowsCrossSite More2026- 6.5RequestForgery.ThisissueaffectsGrandCarRental:fromn/athrough<=3.6.9. Details39633 AvulnerabilityexistsinthecommandhandlingoftheIEC61850communicationstackincludedintheproduct revisionslistedasaffectedinthisCVE.AnattackerwithaccesstoIEC61850networkscouldexploitthevulnerability byusingaspeciallycrafted61850packet,forcingthecommunicationinterfacesofthePM877,CI850andCI868 modulesintofaultmodeorcausingunavailabilityoftheS+Operations61850connectivity,resultinginadenial-of-CVE-servicesituation.TheSystem800xAIEC61850Connectisnotaffected.Note:Thisvulnerabilitydoesnotimpacton More2025- 6.5theoverallavailabilityandfunctionalityoftheS+Operationsnode,onlythe61850communicationfunction.This Details issueaffectsAC800M(System800xA):from6.0.0xthrough6.0.0303.0,from6.1.0xthrough6.1.0031.0,from6.1.1x through6.1.1004.0,from6.1.1xthrough6.1.1202.0,from6.2.0xthrough6.2.0006.0;SymphonyPlusSDSeries:A0, A1,A2.003,A3.005,A4.001,B0.005;SymphonyPlusMR(MelodyRack):from3.10through3.52;S+Operations: 2.1,2.2,2.3,3.3.
CVE- More MicrosoftLocalSecurityAuthoritySubsystemServiceInformationDisclosureVulnerability 6.5 Details26155 CVE- AmissingauthenticationforcriticalfunctionvulnerabilityinFortinetFortiOS7.6.0through7.6.3,FortiOS7.4.0 More2025- through7.4.8,FortiOS7.2.0through7.2.11,FortiOS7.0.0through7.0.17,FortiOS6.4allversions,FortiOS6.2.9 6.5 Details53847 through6.2.17allowsattackertoexecuteunauthorizedcodeorcommandsviaspeciallycraftedpackets. CVE- ImproperNeutralizationofInputDuringWebPageGeneration('Cross-siteScripting')vulnerabilityinbozdozLeaflet More2026- 6.5 Mapleaflet-mapallowsStoredXSS.ThisissueaffectsLeafletMap:fromn/athrough<=3.4.4. Details39646 CVE- Side-channelinformationleakageinNavigationinGoogleChromepriorto147.0.7727.55allowedaremoteattacker More2026- 6.5 toleakcross-origindataviaacraftedHTMLpage.(Chromiumsecurityseverity:Medium) Details5876 CVE- ChamiloLMSisalearningmanagementsystem.Priorto2.0.0-RC.3,anyauthenticateduser(including More2026- ROLESTUDENT)canenumerateallplatformusersandaccesspersonalinformation(email,phone,roles)viaGET 6.5 Details33736 /api/users,includingadministratoraccounts.Thisvulnerabilityisfixedin2.0.0-RC.3. UncontrolledResourceConsumption(CWE-400)inKibanacanleadtodenialofserviceviaExcessiveAllocationCVE- (CAPEC-130).Anauthenticateduserwithaccesstotheautomaticimportfeaturecansubmitspeciallycrafted More2026- 6.5 requestswithexcessivelylargeinputvalues.Whenmultiplesuchrequestsaresentconcurrently,thebackend Details33459 servicesbecomeunstable,resultinginservicedisruptionanddeploymentunavailabilityforallusers. CVE- ChamiloLMSisalearningmanagementsystem.Priorto1.11.38,thegetuserinfofrom_usernameRESTAPIendpoint More2026- returnspersonalinformation(email,firstname,lastname,userID,activestatus)ofanyusertoanyauthenticated 6.5 Details33708 user,includingstudents.Thereisnoauthorizationcheck.Thisvulnerabilityisfixedin1.11.38. CVE- ExposureofsensitiveinformationinSSharepriortoSMRApr-2026Release1allowsadjacentattackertoaccess More2026- 6.5 sensitiveinformation. Details21008 OpenClawbefore2026.3.24containsaprivilegeescalationvulnerabilitywherethe/allowlistcommandfailstore-CVE- validategatewayclientscopesforinternalcallers,allowingoperator.write-scopedclientstomutatechannel More2026- 6.5 authorizationpolicy.Attackerscanexploitchat.sendtobuildaninternalcommand-authorizedcontextandpersist Details35621 channelallowFromandgroupAllowFrompolicychangesreservedforoperator.adminscope. CVE- ImproperNeutralizationofInputDuringWebPageGeneration('Cross-siteScripting')vulnerabilityinuicoreUiCore More2026- 6.5 Elementsuicore-elementsallowsStoredXSS.ThisissueaffectsUiCoreElements:fromn/athrough<=1.3.14. Details39708 CVE- OpenClawbefore2026.3.22containsasettingsreconciliationvulnerabilitythatallowsattackerstobypassintended More2026- deny-allrevocationsbyexploitingemptyallowlisthandling.Thevulnerabilitytreatsexplicitemptyallowlistsasunset 6.5 Details35649 duringreconciliation,silentlyundoingintendedaccesscontroldenialsandrestoringpreviouslyrevokedpermissions. CVE- OpenClawbefore2026.3.22containsanauthorizationbypassvulnerabilityininteractivecallbackdispatchthatallows More2026- non-allowlistedsenderstoexecuteactionhandlers.Attackerscanbypasssenderauthorizationchecksbydispatching 6.5 Details35652 callbacksbeforenormalsecurityvalidationcompletes,enablingunauthorizedactions. Vikunjaisanopen-sourceself-hostedtaskmanagementplatform.Priorto2.3.0,theaddRepeatIntervalToTime CVE- functionusesanO(n)loopthatadvancesadatebythetask'sRepeatAfterdurationuntilitexceedsthecurrenttime. More2026- Bycreatingarepeatingtaskwitha1-secondintervalandaduedatefarinthepast,anattackertriggersbillionsof 6.5 Details35599 loopiterations,consumingCPUandholdingadatabaseconnectionforminutesperrequest.Thisvulnerabilityisfixed in2.3.0. OpenClawbefore2026.3.22containsanauthenticationbypassvulnerabilityintheX-Forwarded-ForheaderCVE- processingwhentrustedProxiesisconfigured,allowingattackerstospoofloopbackhops.Remoteattackerscaninject More2026- 6.5 forgedforwardingheaderstobypasscanvasauthenticationandrate-limitingprotectionsbymasqueradingas Details35656 loopbackclients. CVE- OpenClawbefore2026.3.25containsanauthorizationbypassvulnerabilityintheHTTP/sessions/:sessionKey/history More2026- routethatskipsoperator.readscopevalidation.Attackerscanaccesssessionhistorywithoutproperoperatorread 6.5 Details35657 permissionsbysendingHTTPrequeststothevulnerableendpoint. CVE- OpenClawbefore2026.3.2containsafilesystemboundarybypassvulnerabilityintheimagetoolthatfailstohonor More2026- tools.fs.workspaceOnlyrestrictions.Attackerscantraversesandboxbridgemountsoutsidetheworkspacetoread 6.5 Details35658 filesthatotherfilesystemtoolswouldreject.
project-managementforneuroimagingresearch.From15.10tobefore27.0.3and28.0.1,thereisapotentialforaCVE-cross-sitescriptingattackinthesurvey_accountsmoduleifauserprovidesaninvalidvisitlabel.Whilethedatais More2026- 6.5properlyJSONencoded,theContent-Typeheaderisnotsetcausingthewebbrowsertointerpretthepayloadas Details35403HTML,openingthepossibilityofacross-sitescriptingifauseristrickedintofollowinganinvalidlink.This
CVE- ImproperNeutralizationofInputDuringWebPageGeneration('Cross-siteScripting')vulnerabilityinElfsightElfsight
WhatsAppChatCCelfsight-whatsapp-chatallowsDOM-BasedXSS.ThisissueaffectsElfsightWhatsAppChatCC:from 6.5 More 39696n/athrough<=1.2.0. Details Jellyfinisanopensourceselfhostedmediaserver.Versionspriorto10.11.7containadenialofservicevulnerability intheSyncPlaygroupcreationendpoint(POST/SyncPlay/New),whereanauthenticatedusercancreategroupswithCVE-namesofunlimitedsizeduetoinsufficientinputvalidation.Bysendinglargepayloadscombinedwitharbitrarygroup More2026- 6.5IDs,anattackercanlockouttheendpointforotherclientsattemptingtojoinSyncPlaygroupsandsignificantly Details35034increasethememoryusageoftheJellyfinprocess,potentiallyleadingtoanout-of-memorycrash.Thisissuehasbeen fixedinversion10.11.7. Vikunjaisanopen-sourceself-hostedtaskmanagementplatform.Priorto2.3.0,Vikunja'slinkshareauthentication CVE-(GetLinkShareFromClaimsinpkg/models/linksharing.go)constructsauthorizationobjectsentirelyfromJWTclaims More2026-withoutanyserver-sidedatabasevalidation.Whenaprojectownerdeletesalinkshareordowngradesits 6.5 Details35594permissions,allpreviouslyissuedJWTscontinuetogranttheoriginalpermissionlevelforupto72hours(thedefault service.jwtttl).Thisvulnerabilityisfixedin2.3.0. Saleorisane-commerceplatform.From2.10.0tobefore3.23.0a3,3.22.47,3.21.54,and3.20.118,abusiness-logic andauthorizationflawwasfoundintheaccountemailchangeworkflow,theconfirmationflowdidnotverifythattheCVE-emailchangeconfirmationtokenwasissuedforthegivenauthenticateduser.Asaresult,avalidemail-changetoken More2026- 6.5generatedforoneaccountcanbereplayedwhileauthenticatedasadifferentaccount.Thesecondaccount'semail Details35407addressisthenupdatedtothetoken'snewemail,eventhoughthattokenwasneverissuedforthataccount.This vulnerabilityisfixedin3.23.0a3,3.22.47,3.21.54,and3.20.118. AcleartexttransmissionofsensitiveinformationvulnerabilityinFortinetFortiSOARPaaS7.6.0through7.6.3,CVE-FortiSOARPaaS7.5.0through7.5.2,FortiSOARPaaS7.4allversions,FortiSOARPaaS7.3allversions,FortiSOARon- More2026- 6.5premise7.6.0through7.6.2,FortiSOARon-premise7.5.0through7.5.1,FortiSOARon-premise7.4allversions, Details22155FortiSOARon-premise7.3allversionsmayallowattackertoinformationdisclosurevia CVE-ImproperNeutralizationofInputDuringWebPageGeneration('Cross-siteScripting')vulnerabilityinJoshKohlbach More2026-AdvancedCouponsforWooCommerceCouponsadvanced-coupons-for-woocommerce-freeallowsDOM-Based 6.5 Details39508XSS.ThisissueaffectsAdvancedCouponsforWooCommerceCoupons:fromn/athrough<=4.7.1.1. CVE-ImproperNeutralizationofInputDuringWebPageGeneration('Cross-siteScripting')vulnerabilityinHidekazu More2026-IshikawaVKAllinOneExpansionUnitvk-all-in-one-expansion-unitallowsStoredXSS.ThisissueaffectsVKAllinOne 6.5 Details39483ExpansionUnit:fromn/athrough<=9.113.3. CVE-ImproperNeutralizationofInputDuringWebPageGeneration('Cross-siteScripting')vulnerabilityinAWPLifeBlog More2026- 6.5Filterblog-filterallowsDOM-BasedXSS.ThisissueaffectsBlogFilter:fromn/athrough<=1.7.6. Details39517 Animproperlimitationofapathnametoarestricteddirectory('pathtraversal')vulnerabilityinFortinetFortiSOAR CVE-PaaS7.6.0through7.6.3,FortiSOARPaaS7.5allversions,FortiSOARPaaS7.4allversions,FortiSOARPaaS7.3all More2026-versions,FortiSOARon-premise7.6.0through7.6.3,FortiSOARon-premise7.5allversions,FortiSOARon-premise7.4 6.5 Details22573allversions,FortiSOARon-premise7.3allversionsmayallowanauthenticatedremoteattackertoperformpath traversalattackviaFileContentExtractionactions. CVE-ImproperNeutralizationofInputDuringWebPageGeneration('Cross-siteScripting')vulnerabilityinPublishPressPost More2026- 6.5Expiratorpost-expiratorallowsDOM-BasedXSS.ThisissueaffectsPostExpirator:fromn/athrough<=4.9.4. Details39482 CVE-Cross-SiteRequestForgery(CSRF)vulnerabilityinSkywarriorBlackfyreblackfyreallowsCrossSiteRequest More2026- 6.5Forgery.ThisissueaffectsBlackfyre:fromn/athrough<=2.5.4. Details39641 CLIENTCERTauthenticationdoesnotfailasexpectedforsomescenarioswhensoftfailisdisabledandFFMisusedinCVE- ApacheTomcat.ThisissueaffectsApacheTomcat:from11.0.0-M14through11.0.20,from10.1.22through10.1.53, More2026- 6.5from9.0.92through9.0.116.Usersarerecommendedtoupgradetoversion11.0.21,10.1.54or9.0.117,whichfixes Details34500 theissue. CVE-NASMcontainsaheapuseafterfreevulnerabilityinresponsefile(-@)processingwhereadanglingpointertofreed More2026-memoryisstoredintheglobaldependfileandlaterdereferenced,astheresponse-filebufferisfreedbeforethe 6.5 Details6068pointerisused,allowingfordatacorruptionorunexpectedbehavior. CVE-ExposureofsensitiveinformationtoanunauthorizedactorinWindowsShellallowsanauthorizedattackertodisclose More2026- 6.5informationoveranetwork. Details32151 CVE-GitLabhasremediatedanissueinGitLabEEaffectingallversionsfrom18.2before18.8.9,18.9before18.9.5,and More2026-18.10before18.10.3thatcouldhaveallowedanauthenticatedusertocausedenialofservicetotheGitLabinstance 6.5 Details1101duetoimproperinputvalidationinGraphQLqueries. ChamiloLMSisalearningmanagementsystem.Priorto2.0.0-RC.3,anInsecureDirectObjectReference(IDOR)CVE-vulnerabilityintheRESTAPIstatsendpointallowsanyauthenticateduser(includinglow-privilegestudentswith More 6.5ROLE_USER)toreadanyotheruser'slearningprogress,certificates,andgradebookscoresforanycourse,without Details33141enrollmentorsupervisoryrelationship.Thisvulnerabilityisfixedin2.0.0-RC.3. CVE-
6.5ImproperinputvalidationinMicrosoftOfficeSharePointallowsanunauthorizedattackertoperformspoofingovera More 32201network. Details CVE-ImproperNeutralizationofInputDuringWebPageGeneration('Cross-siteScripting')vulnerabilityinManojKumarMK MoreGoogleDirectionsgoogle-distance-calculatorallowsDOM-BasedXSS.ThisissueaffectsMKGoogleDirections:fromn/a6.5 Details39674through<=3.1.1. TandoorRecipesisanapplicationformanagingrecipes,planningmeals,andbuildingshoppinglists.Priorto2.6.5,aCVE-criticalDenialofService(DoS)vulnerabilitywasintherecipeimportfunctionality.Thisvulnerabilityallowsan More2026-6.5authenticatedusertocrashtheserverormakeasignificantlydegradeitsperformancebyuploadingalargesizeZIP Details27460file(ZIPBomb).Thisvulnerabilityisfixedin2.6.5. AfilesordirectoriesaccessibletoexternalpartiesvulnerabilityinSynologySSLVPNClientbefore1.4.5-0684allowsCVE-remoteattackerstoaccessfileswithintheinstallationdirectoryviaalocalHTTPserverboundtotheloopback More2021-6.5interface.Byleveraginguserinteractionwithacraftedwebpage,attackersmayretrievesensitivefilessuchas Details47960configurationfiles,certificates,andlogs,leadingtoinformationdisclosure. CVE-ImproperNeutralizationofInputDuringWebPageGeneration('Cross-siteScripting')vulnerabilityinlivemesh More2026-LivemeshAddonsforElementoraddons-for-elementorallowsStoredXSS.ThisissueaffectsLivemeshAddonsfor6.5 Details39636Elementor:fromn/athrough<=9.0. CVE-ImproperNeutralizationofInputDuringWebPageGeneration('Cross-siteScripting')vulnerabilityinThemesflat More2026-themesflat-addons-for-elementorthemesflat-addons-for-elementorallowsStoredXSS.Thisissueaffectsthemesflat-6.5 Details39500addons-for-elementor:fromn/athrough<=2.3.2. AnImproperCheckforUnusualorExceptionalConditionsvulnerabilityinthepacketforwardingengine(pfe)ofJuniper NetworksJunosOSonspecificEXandQFXSeriesdevicesallowanunauthenticated,adjacentattackertocausea CVE-completeDenialofService(DoS).OnEX4k,andQFX5kplatformsconfiguredasservice-provideredgedevices,ifL2PT More2026-isenabledontheUNIandVSTPisenabledonNNIinVXLANscenarios,receivingVSTPBPDUsonUNIleadstopacket6.5 Details33781bufferallocationfailures,resultinginthedevicetonotpasstrafficanymoreuntilitismanuallyrecoveredwitha restart.ThisissueaffectsJunosOS:24.4releasesbefore24.4R2,25.2releasesbefore25.2R1-S1,25.2R2.This issuedoesnotaffectJunosOSreleasesbefore24.4R1. OpenClawbefore2026.3.22containsaninformationdisclosurevulnerabilitythatallowsattackerswithoperator.readCVE-scopetoexposecredentialsembeddedinchannelbaseUrlandhttpUrlfields.Attackerscanaccessgatewaysnapshots More2026-6.5viaconfig.getandchannels.statusendpointstoretrievesensitiveauthenticationinformationfromURLuserinfo Details35644components. TheWPBlockadepluginforWordPressisvulnerabletoMissingAuthorizationinallversionsuptoandincluding 0.9.14.Thepluginregistersanadminpostactionhook'wp-blockade-shortcode-render'thatmapstothe rendershortcodepreview()function.Thisfunctionlacksanycapabilitycheck(currentusercan())andnonce verification,allowinganyauthenticatedusertoexecutearbitraryWordPressshortcodes.Thefunctiontakesauser-CVE- Moresupplied'shortcode'parameterfrom$GET,passesitthroughstripslashes(),anddirectlyexecutesitvia2026-6.5 Detailsdoshortcode().Thismakesitpossibleforauthenticatedattackers,withSubscriber-levelaccessandabove,to3480 executearbitraryshortcodes,whichcouldleadtoinformationdisclosure,privilegeescalation,orotherimpacts dependingonwhatshortcodesareregisteredonthesite(e.g.,shortcodesfromotherpluginsthatdisplaysensitive data,performactions,orincludefiles). AnImproperFollowingofaCertificate'sChainofTrustvulnerabilityinJ-WebofJuniperNetworksJunosOSonSRX SeriesallowsaPITMtointerceptthecommunicationofthedeviceandgetaccesstoconfidentialinformationand CVE-potentiallymodifyit.WhenanSRXdeviceisprovisionedtoconnecttoSecurityDirector(SD)cloud,itdoesn'tperform More2026-sufficientverificationofthereceivedservercertificate.ThisallowsaPITMtointerceptthecommunicationbetween6.5 Details33779theSRXandSDcloudandaccesscredentialsandothersensitiveinformation.ThisissueaffectsJunosOS:all versionsbefore22.4R3-S9,23.2versionsbefore23.2R2-S6,23.4versionsbefore23.4R2-S7,24.2versionsbefore 24.2R2-S3,24.4versionsbefore24.4R2-S2,25.2versionsbefore25.2R1-S2,25.2R2. AMissingReleaseofMemoryafterEffectiveLifetimevulnerabilityintheLayer2AddressLearningDaemon(l2ald)of JuniperNetworksJunosOSandJunosOSEvolvedallowsanadjacent,unauthenticatedattackertocauseamemory leakultimatelyleadingtoaDenialofService(DoS).InanEVPN-MPLSscenario,routeslearnedfromremotemulti- homedProviderEdge(PE)devicesareprogrammedasESIroutes.Duetoalogicissueinthel2aldmemoryCVE-management,memoryallocatedfortheseroutesisnotreleasedwhenthereischurnfortheseroutes.Asaresult, More2026-6.5memoryleaksinthel2aldprocesswhichwillultimatelyleadtoacrashandrestartofl2ald.Usethefollowing Details33780commandtomonitorthememoryconsumptionbyl2ald:user@device>showsystemprocessextensive|match "PID|l2ald"Thisissueaffects:JunosOS:allversionsbefore22.4R3-S5,23.2versionsbefore23.2R2-S3,23.4 versionsbefore23.4R2-S4,24.2versionsbefore24.2R2;JunosOSEvolved:allversionsbefore22.4R3-S5-EVO, 23.2versionsbefore23.2R2-S3-EVO,23.4versionsbefore23.4R2-S4-EVO,24.2versionsbefore24.2R2-EVO. CVE-UninitializedUseinWebCodecsinGoogleChromepriorto147.0.7727.55allowedaremoteattackertoobtain More2026-potentiallysensitiveinformationfromprocessmemoryviaacraftedHTMLpage.(Chromiumsecurityseverity:6.5 Details5888Medium) OpenClawversions2026.3.11through2026.3.24containasessionisolationbypassvulnerabilitywhereCVE-sessionstatusresolvessessionIdtocanonicalsessionkeysbeforeenforcingvisibilitychecks.Sandboxedchild More6.5sessionscanexploitthistoaccessparentorsiblingsessionsthatshouldbeblockedbyexplicitsessionKey Details35636restrictions.
ABufferCopywithoutCheckingSizeofInput('ClassicBufferOverflow')vulnerabilityintheadvancedforwarding toolkit(evo-aftmand/evo-pfemand)ofJuniperNetworksJunosOSEvolvedonPTXSeriesorQFX5000Seriesallowsan unauthenticated,adjacentattackertocauseaDenialofService(DoS).Anattackersendingcraftedmulticastpackets willcauselinecardsrunningevo-aftmand/evo-pfemandtocrashandrestartornon-linecarddevicestocrashandCVE- Morerestart.ContinuedreceiptandprocessingofthesepacketswillsustaintheDenialofService(DoS)condition.This 6.5 DetailsissueaffectsJunosOSEvolvedPTXSeries:Allversionsbefore22.4R3-S8-EVO,from23.2before23.2R2-S5-EVO,59969from23.4before23.4R2-EVO,from24.2before24.2R2-EVO,from24.4before24.4R2-EVO.Thisissueaffects JunosOSEvolvedonQFX5000Series:22.2-EVOversionbefore22.2R3-S7-EVO,22.4-EVOversionbefore22.4R3- S7-EVO,23.2-EVOversionsbefore23.2R2-S4-EVO,23.4-EVOversionsbefore23.4R2-S5-EVO,24.2-EVOversions before24.2R2-S1-EVO,24.4-EVOversionsbefore24.4R1-S3-EVO,24.4R2-EVO.ThisissuedoesnotaffectJunosOS EvolvedonQFX5000Seriesversionsbefore:21.2R2-S1-EVO,21.2R3-EVO,21.3R2-EVO,21.4R1-EVO,and22.1R1-EVO. AMissingReleaseofMemoryafterEffectiveLifetimevulnerabilityintheDHCPdaemon(jdhcpd)ofJuniperNetworks JunosOSonMXSeries,allowsanadjacent,unauthenticatedattackertocauseamemoryleak,thatwilleventually causeacompleteDenial-of-Service(DoS).InaDHCPv6overPPPoE,orDHCPv6overVLANwithActiveleasequeryorCVE-Bulkleasequeryscenario,everysubscriberlogoutwillleakasmallamountofmemory.Whenallavailablememory More2026- 6.5hasbeenexhausted,jdhcpdwillcrashandrestartwhichcausesacompleteserviceimpactuntiltheprocesshas Details33782recovered.Thememoryusageofjdhcpdcanbemonitoredwith:user@host>showsystemprocessesextensive| matchjdhcpdThisissueaffectsJunosOS:allversionsbefore22.4R3-S1,23.2versionsbefore23.2R2,23.4 versionsbefore23.4R2. CVE-OpenClawbefore2026.3.22failstoenforceoperator.adminscopeonmutatinginternalACPchatcommands,allowing More2026-unauthorizedmodifications.Attackerswithoutadminprivilegescanexecutemutatingcontrol-planeactionsby 6.5 Details35631directlyinvokingaffectedACPcommandstobypassauthorizationgates. AFunctionCallWithIncorrectArgumentTypevulnerabilityinthesensorinterfaceofJuniperNetworksJunosOS EvolvedonPTXSeriesallowsanetwork-based,authenticatedattackerwithlowprivilegestocauseacompleteDenial ofService(DoS).IfcoloredSRTEpolicytunnelsareprovisionedviaPCEP,andgRPCisusedtomonitortrafficinthese CVE-tunnels,evo-aftmandcrashesanddoesn'trestartwhichleadstoacompleteandpersistentserviceimpact.The More2026-systemhastobemanuallyrestartedtorecover.TheissueisseenonlywhentheOriginatorASNfieldinPCEPcontains 6.5 Details33783avaluelargerthan65,535(32-bitASN).TheissueisnotreproduciblewhenSRTEpolicytunnelsarestatically configured.ThisissueaffectsJunosOSEvolvedonPTXSeries:allversionsbefore22.4R3-S9-EVO,23.2versions before23.2R2-S6-EVO,23.4versionsbefore23.4R2-S7-EVO,24.2versionsbefore24.2R2-S4-EVO,24.4versions before24.4R2-S2-EVO,25.2versionsbefore25.2R1-S2-EVO,25.2R2-EVO. CVE-ImproperNeutralizationofInputDuringWebPageGeneration('Cross-siteScripting')vulnerabilityintagDivtagDiv More2026- 6.5Composertd-composerallowsStoredXSS.ThisissueaffectstagDivComposer:fromn/athrough<=5.4.3. Details39692 CVE-MissingAuthorizationvulnerabilityinredpixelstudiosRPSIncludeContentrps-include-contentallowsExploiting More2026-IncorrectlyConfiguredAccessControlSecurityLevels.ThisissueaffectsRPSIncludeContent:fromn/athrough<= 6.5 Details396391.2.2. CVE-OpenClawbefore2026.3.22performscryptographicanddispatchoperationsoninboundNostrdirectmessages More2026-beforeenforcingsenderandpairingpolicyvalidation.Attackerscantriggerunauthorizedpre-authentication 6.5 Details35627computationbysendingcraftedDMmessages,enablingdenialofservicethroughresourceexhaustion. TheTheGermanizedforWooCommercepluginforWordPressisvulnerabletoarbitraryshortcodeexecutionviaCVE-'accountholder'parameterinallversionsupto,andincluding,3.20.5.Thisisduetothesoftwareallowingusersto More2026- 6.5executeanactionthatdoesnotproperlyvalidateavaluebeforerunningdoshortcode.Thismakesitpossiblefor Details2582unauthenticatedattackerstoexecutearbitraryshortcodes. CVE-PolicybypassinLocalNetworkAccessinGoogleChromepriorto147.0.7727.55allowedaremoteattackertobypass More2026- 6.5navigationrestrictionsviaacraftedHTMLpage.(Chromiumsecurityseverity:Medium) Details5881 OpenClawbefore2026.3.23containsareplayidentityvulnerabilityinPlivoV2signatureverificationthatallows CVE-attackerstobypassreplayprotectionbymodifyingqueryparameters.Theverificationpathderivesreplaykeysfrom More2026- 6.5thefullURLincludingquerystringsinsteadofthecanonicalizedbaseURL,enablingattackerstomintnewverified Details35618requestkeysthroughunsignedquery-onlychangestosignedrequests.
TheBEAR-BulkEditorandProductsManagerProfessionalforWooCommercebyPluginus.NetpluginforWordPressis CVE-vulnerabletoCross-SiteRequestForgeryinallversionsupto,andincluding,1.1.5.Thisisduetomissingnonce More2026-validationonthewooberedrawtable_row()function.Thismakesitpossibleforunauthenticatedattackerstoupdate 6.5 Details1672WooCommerceproductdataincludingprices,descriptions,andotherproductfieldsviaaforgedrequestgrantedthey cantrickasiteadministratororshopmanagerintoperforminganactionsuchasclickingonalink. CVE-PolicybypassinIFrameSandboxinGoogleChromepriorto147.0.7727.55allowedaremoteattackerwhoconvinceda More2026-usertoengageinspecificUIgesturestobypassnavigationrestrictionsviaacraftedHTMLpage.(Chromiumsecurity 6.5 Details5903 CVE-ImproperNeutralizationofInputDuringWebPageGeneration('Cross-siteScripting')vulnerabilityinwpbitsWPBITS MoreAddonsForElementorPageBuilderwpbits-addons-for-elementorallowsStoredXSS.ThisissueaffectsWPBITSAddons 6.5 Details39703ForElementorPageBuilder:fromn/athrough<=1.8.1. CVE- InsufficientpolicyenforcementinDevToolsinGoogleChromepriorto147.0.7727.55allowedanattackerwho
convincedausertoinstallamaliciousextensiontobypassenterprisehostrestrictionsforcookiemodificationviaa 6.5 More craftedChromeExtension.(Chromiumsecurityseverity:Low) Details CVE-InsufficientvalidationofuntrustedinputinWebMLinGoogleChromeonWindowspriorto147.0.7727.55alloweda MoreremoteattackertoobtainpotentiallysensitiveinformationfromprocessmemoryviaacraftedHTMLpage. 6.5 Details5885 DockyardisaDockercontainermanagementapp.Priorto1.1.0,DockercontainerstartandstopoperationsareCVE-performedthroughGETrequestswithoutCSRFprotection.Aremoteattackercancausealogged-inadministrator's More2026- 6.5browsertorequest/apps/action.php?action=stop&name= or/apps/action.php?action=start&name= Details39848,whichstartsorstopsthetargetcontainer.Thisvulnerabilityisfixedin1.1.0. AnImproperCheckforUnusualorExceptionalConditionsvulnerabilityinthepacketforwardingengine(pfe)ofJuniper NetworksJunosOSonMXSeriesallowsanunauthenticated,network-basedattackertobypasstheconfiguredfirewall filterandaccessthecontrol-planeofthedevice.OnMXplatformswithMPC10,MPC11,LC4800orLC9600linecards, andMX304,firewallfiltersappliedonaloopbackinterfacelo0.n(wherenisanon-0number)don'tgetexecutedwhen CVE-lo0.nisintheglobalVRF/defaultrouting-instance.Anaffectedconfigurationwouldbe:user@host#show More2026-configurationinterfaceslo0|displaysetsetinterfaceslo0unit1familyinetfilterinput whereafirewall 6.5 Details33774filterisappliedtoanon-0loopbackinterface,butthatloopbackinterfaceisnotreferredtoinanyrouting-instance(RI) configuration,whichimpliesthatit'susedinthedefaultRI.TheissuecanbeobservedwiththeCLIcommand: user@device>showfirewallcounterfilter notshowinganymatches.ThisissueaffectsJunosOSonMX Series:allversionsbefore23.2R2-S6,23.4versionsbefore23.4R2-S7,24.2versionsbefore24.2R2,24.4 versionsbefore24.4R2. CVE-ImproperNeutralizationofInputDuringWebPageGeneration('Cross-siteScripting')vulnerabilityinWealcoder More2026-AnimationAddonsforElementoranimation-addons-for-elementorallowsDOM-BasedXSS.ThisissueaffectsAnimation 6.5 Details39702AddonsforElementor:fromn/athrough<=2.6.1. AMissingReleaseofMemoryafterEffectiveLifetimevulnerabilityintheBroadBandEdgesubscribermanagement daemon(bbe-smgd)ofJuniperNetworksJunosOSonMXSeriesallowsanadjacent,unauthenticatedattackertocause aDenialofService(DoS).Iftheauthenticationpacket-typeoptionisconfiguredandareceivedpacketdoesnot matchthatpackettype,thememoryleakoccurs.Whenallmemoryavailabletobbe-smgdhasbeenconsumed,noCVE-newsubscriberswillbeabletologin.Thememoryutilizationofbbe-smgdcanbemonitoredwiththefollowingshow More2026- 6.5command:user@host>showsystemprocessesextensive|matchbbe-smgdThebelowlogmessagecanbeobserved Details33775whenthislimithasbeenreached:bbesmgd[]:%DAEMON-3-SMDDPROFRSMONERROR:Resource unavailability,Reason:DaemonHeapMemoryexhaustionThisissueaffectsJunosOSonMXSeries:allversions before22.4R3-S8,23.2versionsbefore23.2R2-S5,23.4versionsbefore23.4R2-S6,24.2versionsbefore24.2R2- S2,24.4versionsbefore24.4R2,25.2versionsbefore25.2R2. CVE-IncorrectsecurityUIinPermissionsinGoogleChromeonWindowspriorto147.0.7727.55allowedaremoteattacker More2026- 6.5toperformdomainspoofingviaacraftedHTMLpage.(Chromiumsecurityseverity:Low) Details5905 CVE-ImproperNeutralizationofInputDuringWebPageGeneration('Cross-siteScripting')vulnerabilityintelepathyHello More2026-BarPopupBuilderhellobarallowsDOM-BasedXSS.ThisissueaffectsHelloBarPopupBuilder:fromn/athrough<= 6.5 Details396661.5.1. AnIncorrectSynchronizationvulnerabilityinthemanagementdaemon(mgd)ofJuniperNetworksJunosOSandJunos OSEvolvedallowsanetwork-basedattackerwithlowprivilegestocauseacompleteDenial-of-Service(DoS)ofthe managementplane.WhenNETCONFsessionsarequicklyestablishedanddisconnected,alockingissuecausesmgd processestohanginanunusablestate.Whenthemaximumnumberofmgdprocesseshasbeenreached,nonew loginsarepossible.Thisleadstotheinabilitytomanagethedeviceandrequiresapower-cycletorecover.Thisissue canbemonitoredbycheckingformgdprocessesinlockfstateintheoutputof'showsystemprocessesextensive': CVE-user@host>showsystemprocessesextensive|matchmgd root200501M4640Klockf10:010.00% More2026- 6.5mgdIfthesystemstillcanbeaccessed(eitherviatheCLIorasroot,whichmightstillbepossibleaslastresortasthis Details21919won'tinvokemgd),mgdprocessesinthisstatecanbekilledwith'requestsystemprocessterminate 'fromthe CLIorwith'kill-9 'fromtheshell.Thisissueaffects:JunosOS:23.4versionsbefore23.4R2-S4,24.2 versionsbefore24.2R2-S1,24.4versionsbefore24.4R1-S3,24.4R2;ThisissuedoesnotaffectJunosOSversions before23.4R1;JunosOSEvolved:23.4versionsbefore23.4R2-S5-EVO,24.2versionsbefore24.2R2-S1-EVO, 24.4versionsbefore24.4R1-S3-EVO,24.4R2-EVO.ThisissuedoesnotaffectJunosOSEvolvedversionsbefore 23.4R1-EVO; CVE-ImproperNeutralizationofInputDuringWebPageGeneration('Cross-siteScripting')vulnerabilityinVladimirPrelovac More2026-SEOFriendlyImagesseo-imageallowsDOM-BasedXSS.ThisissueaffectsSEOFriendlyImages:fromn/athrough<= 6.5 Details396653.0.5. TheTableOn-WordPressPostsTableFilterablepluginforWordPressisvulnerabletoStoredCross-SiteScriptingvia the'tableonbutton'shortcodeinallversionsuptoandincluding1.0.4.4.Thisisduetoinsufficientinputsanitization andoutputescapingonuser-suppliedshortcodeattributessuchas'class','helplink','popuptitle',and'helptitle'.CVE-Thedoshortcodebutton()functionextractstheseattributeswithoutsanitizationandpassesthemto More2026- 6.4TABLEONHELPER::drawhtmlitem(),whichconcatenatesattributevaluesintoHTMLusingsinglequoteswithout Details escaping(line29:$item.="{$key}='{$value}'").Thismakesitpossibleforauthenticatedattackers,with Contributor-levelaccessandabove,toinjectarbitrarywebscriptsinpagesthatwillexecutewheneverauser
AcontainerprivilegeescalationflawwasfoundincertainMulticlusterEngineforKubernetesimages.ThisissuestemsCVE- Morefromthe/etc/passwdfilebeingcreatedwithgroup-writablepermissionsduringbuildtime.Incertainconditions,an 6.4 Detailsattackerwhocanexecutecommandswithinanaffectedcontainer,evenasanon-rootuser,canleveragetheir57851membershipintherootgrouptomodifythe/etc/passwdfile.Thiscouldallowtheattackertoaddanewuserwithany arbitraryUID,includingUID0,leadingtofullrootprivilegeswithinthecontainer. TheListcategorypostspluginforWordPressisvulnerabletoStoredCross-SiteScriptingviatheplugin's'catlist'CVE-shortcodeinallversionsupto,andincluding,0.94.0duetoinsufficientinputsanitizationandoutputescapingonuser More2026- 6.4suppliedattributes.Thismakesitpossibleforauthenticatedattackers,withcontributor-levelaccessandabove,to Details3005injectarbitrarywebscriptsinpagesthatwillexecutewheneverauseraccessesaninjectedpage. TheLatePoint-CalendarBookingPluginforAppointmentsandEventspluginforWordPressisvulnerabletoStored CVE-Cross-SiteScriptingviathe'buttoncaption'parameterinthe[latepointresources]shortcodeinversionsuptoand More2026-including5.3.0.Thisisduetoinsufficientoutputescapingwhenthe'items'parameterissetto'bundles'.Thismakes 6.4 Details4785itpossibleforauthenticatedattackers,withcontributor-levelaccessandabove,toinjectarbitrarywebscriptsin pagesthatwillexecutewheneverauseraccessesaninjectedpage. TheColumnsbyBestWebSoftpluginforWordPressisvulnerabletoStoredCross-SiteScriptingviathe'id'shortcode attributeofthe[printclmns]shortcodeinallversionsuptoandincluding1.0.3.Thisisduetoinsufficientinput sanitizationandoutputescapingonthe'id'attribute.Theshortcodereceivesthe'id'parameterviashortcodeatts() CVE-atline596anddirectlyembedsitintoHTMLoutputatline731(inadividattribute)andintoinlineCSSatlines672- More2026-729withoutanyescapingorsanitization.WhiletheSQLqueryuses%dtocastthevaluetoanintegerfordatabase 6.4 Details3618lookup,theoriginalunsanitizedstringvalueof$idisstillusedintheHTML/CSSoutput.Thismakesitpossiblefor authenticatedattackers,withContributor-levelaccessandabove,toinjectarbitrarywebscriptsinpagesthatwill executewheneverauseraccessesaninjectedpage.Theattackrequiresthatatleastonecolumnexistsintheplugin (createdbyanadmin),astheSQLquerymustreturnresultsfortheoutputbranchtobereached. TheWPVisitorStatistics(RealTimeTraffic)pluginforWordPressisvulnerabletoStoredCross-SiteScriptingviathe CVE-plugin's'wsm_showDayStatsGraph'shortcodeinallversionsupto,andincluding,8.4duetoinsufficientinput More2026-sanitizationandoutputescapingonusersuppliedattributes.Thismakesitpossibleforauthenticatedattackers,with 6.4 Details4303contributor-levelaccessandabove,toinjectarbitrarywebscriptsinpagesthatwillexecutewheneverauser
CVE- Innspawninsystemd233through259before260,anescape-to-hostactioncanoccurviaacraftedoptionalconfig More2026- 6.4 file. Details40226 TheThePlusAddonsforElementor-AddonsforElementor,PageTemplates,Widgets,MegaMenu,WooCommerce CVE- pluginforWordPressisvulnerabletoStoredCross-SiteScriptingviatheplugin'sProgressBarshortcodeinallversions More2026- upto,andincluding,6.4.9duetoinsufficientinputsanitizationandoutputescapingonusersuppliedattributes.This 6.4 Details3311 makesitpossibleforauthenticatedattackers,withcontributor-levelaccessandabove,toinjectarbitrarywebscripts inpagesthatwillexecutewheneverauseraccessesaninjectedpage. TheExtensionsforLeafletMappluginforWordPressisvulnerabletoStoredCross-SiteScriptingviathe'elevation-CVE- track'shortcodeinallversionsupto,andincluding,4.14.Thisisduetoinsufficientinputsanitizationandoutput More2026- 6.4 escapingonusersuppliedattributes.Thismakesitpossibleforauthenticatedattackers,withContributor-levelaccess Details5451 TheDownloadManagerpluginforWordPressisvulnerabletoStoredCross-SiteScriptingviathe'sid'parameterofthe 'wpdmmembers'shortcodeinversionsuptoandincluding3.3.52.Thisisduetoinsufficientinputsanitizationand CVE- outputescapingontheuser-supplied'sid'shortcodeattribute.Thesidparameterisextractedwithoutsanitizationin More2026- themembers()functionandstoredviaupdatepostmeta(),thenechoeddirectlyintoanHTMLidattributeinthe 6.4 Details5357 members.phptemplatewithoutapplyingescattr().Thismakesitpossibleforauthenticatedattackers,with contributor-levelaccessandabove,toinjectarbitrarywebscriptsinpagesthatwillexecutewheneverauser accessestheinjectedpage. ThePageBuilder:PagelayerpluginforWordPressisvulnerabletoStoredCross-SiteScriptingviatheButtonwidget's CustomAttributesfieldinallversionsupto,andincluding,2.0.8.ThisisduetoanincompleteeventhandlerblocklistCVE- More inthe'pagelayerxsscontent'XSSfilteringfunction,whichblockscommon,butnotall,eventhandlers.Thismakesit2026- 6.4 Details possibleforauthenticatedattackers,withContributor-levelaccessandabove,toinjectarbitrarywebscriptsinpages2509 thatwillexecutewheneverauseraccessesaninjectedpage. TheLearnPress-WordPressLMSPluginpluginforWordPressisvulnerabletoStoredCross-SiteScriptingviathe'skin' attributeofthelearnpresscoursesshortcodeinallversionsuptoandincluding4.3.3.ThisisduetoinsufficientinputCVE- sanitizationandoutputescapingonthe'skin'shortcodeattribute.Theattributevalueisuseddirectlyinansprintf() More2026- 6.4 callthatgeneratesHTML(classattributeanddata-layoutattribute)withoutanyescattr()escaping.Thismakesit Details4333 possibleforauthenticatedattackers,withContributor-levelaccessandabove,toinjectarbitrarywebscriptsinpages thatwillexecutewheneverauseraccessesaninjectedpage. TheInvestipluginforWordPressisvulnerabletoStoredCross-SiteScriptingviathe'investi-announcements- accordion'shortcode's'maximum-num-years'attributeinallversionsupto,andincluding,1.0.26.Thisisdueto CVE- insufficientinputsanitizationandoutputescapingonuser-suppliedshortcodeattributes.Specifically,the'maximum- More num-years'attributevalueisreaddirectlyfromshortcodeattributesandinterpolatedintoadouble-quotedHTML 6.4 Details attributewithoutanyescaping(noescattr(),htmlspecialchars(),orsimilar).Thismakesitpossibleforauthenticated attackers,withContributor-levelaccessandabove,toinjectarbitrarywebscriptsinpagesthatwillexecutewhenever auseraccessesaninjectedpage.
TheRoboGallerypluginforWordPressisvulnerabletoStoredCross-SiteScriptingviathe'LoadingLabel'settinginall versionsupto,andincluding,5.1.3.Thepluginusesacustom|***...***|markerpatterninitsfixJsFunction() methodtoembedrawJavaScriptfunctionreferenceswithinJSON-encodedconfigurationobjects.Whenagallery's optionsarerenderedonthefrontend,json_encode()wrapsallstringvaluesindoublequotes.ThefixJsFunction() methodthenstripsthe"|***and***|"sequences,effectivelyconvertingaJSONstringvalueintorawJavaScript CVE-code.TheLoadingLabelfield(storedasrbs_gallery_LoadingWordpostmeta)isanrbstexttypefieldthatis More2026-sanitizedwith`sanitizetextfield()onsave.WhilethisstripsHTMLtags,itdoesnotstripthe|...|markers 6.4 Details4300sincetheycontainnoHTML.Whenauserinputs|alert(document.domain)|`,thevaluepassesthrough sanitizationintact,isstoredinpostmeta,andislaterretrievedandoutputwithinaninline`
Named provisions
Related changes
Get daily alerts for CSA Alerts & Advisories (Singapore)
Daily digest delivered to your inbox.
Free. Unsubscribe anytime.
Source
About this page
Every important government, regulator, and court update from around the world. One place. Real-time. Free. Our mission
Source document text, dates, docket IDs, and authority are extracted directly from CSA.
The summary, classification, recommended actions, deadlines, and penalty information are AI-generated from the original text and may contain errors. Always verify against the source document.
Classification
Who this affects
Taxonomy
Browse Categories
Get alerts for this source
We'll email you when CSA Alerts & Advisories (Singapore) publishes new changes.
Subscribed!
Optional. Filters your digest to exactly the updates that matter to you.