Vulnerability Digest — April 20, 2026 · 39 Critical · 3 Exploited






Vulnerability Digest — Monday, April 20, 2026


Security Report

Monday, April 20, 2026  ·  Last 7 days  ·  Min severity: MEDIUM
Total Findings
268
Critical
39
High
111
Actively Exploited
3
CISA-KEV3
GitHub-GHSA265
Findings sorted by severity
CISA-KEV

CRITICAL
Apache ActiveMQ Improper Input Validation Vulnerability
CVE-2026-34197
pkg: Apache ActiveMQ

published: Apr 16, 2026

Apache ActiveMQ contains an improper input validation vulnerability that allows for code injection.
Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
CISA-KEV

CRITICAL
Microsoft Office Remote Code Execution
CVE-2009-0238
pkg: Microsoft Office

published: Apr 14, 2026

Microsoft Office Excel contains a remote code execution vulnerability that could allow an attacker to take complete control of an affected system if a user opens a specially crafted Excel file that includes a malformed object.
Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
CISA-KEV

CRITICAL
Microsoft SharePoint Server Improper Input Validation Vulnerability
CVE-2026-32201
pkg: Microsoft SharePoint Server

published: Apr 14, 2026

Microsoft SharePoint Server contains an improper input validation vulnerability that allows an unauthorized attacker to perform spoofing over a network.
Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
GitHub-GHSA

CRITICAL
Saltcorn: SQL Injection via Unparameterized Sync Endpoints (maxLoadedId)
GHSA-jp74-mfrx-3qvh
pkg: @saltcorn/server, @saltcorn/server, @saltcorn/server
eco: npm
published: Apr 16, 2026
## Summary
Saltcorn's mobile-sync routes (`POST /sync/load_changes` and `POST /sync/deletes`) interpolate user-controlled values directly into SQL template literals without parameterization, type-casting, or sanitization. Any authenticated user (role_id ≥ 80, the default "user" role) who has read …
GitHub-GHSA

CRITICAL
Paperclip: Cross-tenant agent API key IDOR in `/agents/:id/keys` routes allows full victim-company compromise
GHSA-3xx2-mqjm-hg9x
pkg: @paperclipai/server
eco: npm
published: Apr 16, 2026
## Summary

The `GET`, `POST`, and `DELETE` handlers under `/agents/:id/keys` in the Paperclip control-plane API only call `assertBoard(req)`, which verifies that the caller has a board-type session but does not verify that the caller has access to the company owning the target agent. A board user w…

GitHub-GHSA

CRITICAL
Paperclip: Cross-tenant agent API token minting via missing assertCompanyAccess on /api/agents/:id/keys
GHSA-47wq-cj9q-wpmp
pkg: @paperclipai/server
eco: npm
published: Apr 16, 2026
<img width="7007" height="950" alt="01-setup" src="https://github.com/user-attachments/assets/1596b8d1-8de5-4c21-b1d2-2db41b568d7e" />

> Isolated paperclip instance running in authenticated mode (default config)
> on a clean Docker image matching commit b649bd4 (2026.411.0-canary.8, post
> the 2026…

GitHub-GHSA

CRITICAL
Flowise: Authenticated RCE Via MCP Adapters
GHSA-c9gw-hvqq-f33r
pkg: flowise, flowise-components
eco: npm
published: Apr 16, 2026
### Summary
Due to unsafe serialization of stdio commands in the MCP adapter, an authenticated attacker can add an MCP stdio server with an arbitrary command, achieving command execution.

### Details
The vulnerability lies in a bug in the input sanitization from the “Custom MCP” configuration i…

CVE-2026-40933
GitHub-GHSA

CRITICAL
Expression Injection in OpenRemote
GHSA-7mqr-33rv-p3mp
pkg: io.openremote:openremote-manager
eco: maven
published: Apr 14, 2026
### Summary
The OpenRemote IoT platform's rules engine contains two interrelated critical expression injection vulnerabilities that allow an attacker to execute arbitrary code on the server, ultimately achieving full server compromise.

– Unsandboxed Nashorn JavaScript Engine: JavaScript rules are e…

CVE-2026-39842
GitHub-GHSA

CRITICAL
Remote Code Execution (RCE) via String Literal Injection into math-codegen
GHSA-p6x5-p4xf-cc4r
pkg: math-codegen
eco: npm
published: Apr 17, 2026
### Impact

String literal content passed to `cg.parse()` is injected verbatim into a `new Function()` body without sanitization. This allows an attacker to execute arbitrary system commands when user-controlled input reaches the parser. Any application exposing a math evaluation endpoint where user…

GitHub-GHSA

CRITICAL
Incomplete fix for CVE-2026-34935: Command Injection in MervinPraison/PraisonAI
GHSA-9qhq-v63v-fv3j
pkg: praisonai
eco: pip
published: Apr 17, 2026
### Summary

The fix for PraisonAI's MCP command handling does not add a command allowlist or argument validation to `parse_mcp_command()`, allowing arbitrary executables like `bash`, `python`, or `/bin/sh` with inline code execution flags to pass through to subprocess execution.

### Affected Packa…

GitHub-GHSA

CRITICAL
Paperclip: OS Command Injection via Execution Workspace cleanupCommand
GHSA-vr7g-88fq-vhq3
pkg: @paperclipai/server
eco: npm
published: Apr 16, 2026
| Field | Value |
|——-|——-|
| **Affected Software** | Paperclip AI v2026.403.0 |
| **Affected Component** | Execution Workspace lifecycle (`workspace-runtime.ts`) |
| **Affected Endpoint** | `PATCH /api/execution-workspaces/:id` |
| **Deployment Modes** | All — `local_trusted` (zero auth),…
GitHub-GHSA

CRITICAL
electerm: electerm_install_script_CommandInjection Vulnerability Report
GHSA-wxw2-rwmh-vr8f
pkg: electerm
eco: npm
published: Apr 16, 2026
### Impact
_What kind of vulnerability is it? Who is impacted?_

**Two Command Injection vulnerabilities in electerm:**

1. **macOS Installer** (`electerm_CommandInjection_02`): A command injection vulnerability exists in `github.com/elcterm/electerm/npm/install.js:150`. The `runMac()` function appe…

GitHub-GHSA

CRITICAL
UEFI Firmware Parser has a heap out-of-bounds write in tiano decompressor ReadCLen
GHSA-hm2w-vr2p-hq7w
pkg: uefi-firmware
eco: pip
published: Apr 16, 2026
`uefi-firmware` contains a heap out-of-bounds write vulnerability in the native tiano/EFI decompressor. in `uefi_firmware/compression/Tiano/Decompress.c`, `ReadCLen()` reads `Number = GetBits(Sd, CBIT)` with `CBIT = 9`, so `Number` can be as large as `511`, while the destination array `Sd->mCLen` ha…
GitHub-GHSA

CRITICAL
UEFI Firmware Parser has a stack out-of-bounds write in tiano decompressor MakeTable
GHSA-2689-5p89-6j3j
pkg: uefi-firmware
eco: pip
published: Apr 16, 2026
`uefi-firmware` contains a stack out-of-bounds write vulnerability in the native tiano/EFI decompressor. in `uefi_firmware/compression/Tiano/Decompress.c`, `MakeTable()` does not validate that bit-length values read from the compressed bitstream are within the expected range (`0..16`). a crafted fir…
GitHub-GHSA

CRITICAL
MsQuic has a Remote Elevation of Privilege Vulnerability
GHSA-gvvw-8j96-8g5r
pkg: Microsoft.Native.Quic.MsQuic.OpenSSL, Microsoft.Native.Quic.MsQuic.Schannel, Microsoft.Native.Quic.MsQuic.Schannel
eco: nuget
published: Apr 16, 2026
### Summary
Improper input validation in Microsoft QUIC allows an unauthorized attacker to elevate privileges over a network.

### Details
Improper Input Validation Integer Underflow (Wrap or Wraparound) when decoding ACK frame.

#### Patches
– Fix underflow in ACK frame parsing – 1e6e999b

### Imp…

CVE-2026-32179
GitHub-GHSA

CRITICAL
Upsonic: remote code execution vulnerability in its MCP server/task creation functionality
GHSA-cw73-5f7h-m4gv
pkg: upsonic
eco: pip
published: Apr 15, 2026
Upsonic 0.71.6 contains a remote code execution vulnerability in its MCP server/task creation functionality. The application allows users to define MCP tasks with arbitrary command and args values. Although an allowlist exists, certain allowed commands (npm, npx) accept argument flags that enable ex…
CVE-2026-30625
GitHub-GHSA

CRITICAL
goshs has an empty-username SFTP password authentication bypass
GHSA-c29w-qq4m-2gcv
pkg: github.com/patrickhener/goshs, github.com/patrickhener/goshs/v2
eco: go
published: Apr 14, 2026
### Summary
goshs contains an SFTP authentication bypass when the documented empty-username basic-auth syntax is used. If the server is started with `-b ':pass'` together with `-sftp`, goshs accepts that configuration but does not install any SFTP password handler. As a result, an unauthenticated ne…
CVE-2026-40884
GitHub-GHSA

CRITICAL
Wish has SCP Path Traversal that allows arbitrary file read/write
GHSA-xjvp-7243-rg9h
pkg: charm.land/wish/v2, github.com/charmbracelet/wish
eco: go
published: Apr 18, 2026
## Summary

The SCP middleware in `charm.land/wish/v2` is vulnerable to path traversal attacks. A malicious SCP client can read arbitrary files from the server, write arbitrary files to the server, and create directories outside the configured root directory by sending crafted filenames containing `…

GitHub-GHSA

CRITICAL
Dgraph: Unauthenticated /debug/pprof/cmdline discloses admin auth token, enabling unauthorized access to protected Alpha admin endpoints
GHSA-95mq-xwj4-r47p
pkg: github.com/dgraph-io/dgraph/v25, github.com/dgraph-io/dgraph/v24, github.com/dgraph-io/dgraph
eco: go
published: Apr 16, 2026
### Summary
An unauthenticated debug endpoint in Dgraph Alpha exposes the full process command line, including the configured admin token from `–security "token=…"`.

This does not break token validation logic directly; instead, it discloses the credential and enables unauthorized admin-level acc…

CVE-2026-40173
GitHub-GHSA

CRITICAL
excel-mcp-server has a Path Traversal issue
GHSA-j98m-w3xp-9f56
pkg: excel-mcp-server
eco: pip
published: Apr 14, 2026
## Summary

A path traversal vulnerability exists in [`excel-mcp-server`](https://github.com/haris-musa/excel-mcp-server) versions up to and including `0.1.7`. When running in SSE or Streamable-HTTP transport mode (the documented way to use this server remotely), an unauthenticated attacker on the n…

CVE-2026-40576
GitHub-GHSA

CRITICAL
Sentry: Improper authentication on SAML SSO process allows user identity linking
GHSA-ggmg-cqg6-j45g
pkg: sentry
eco: pip
published: Apr 17, 2026
### Impact
A critical vulnerability was discovered in the SAML SSO implementation of Sentry. It was reported to us via our private bug bounty program.

The vulnerability allows an attacker to take over any user account by using a malicious SAML Identity Provider and another organization on the same …

CVE-2026-27197
GitHub-GHSA

CRITICAL
Budibase: Authentication Bypass via Unanchored Regex in Public Endpoint Matcher — Unauthenticated Access to Protected Endpoints
GHSA-8783-3wgf-jggf
pkg: @budibase/backend-core
eco: npm
published: Apr 16, 2026
### Summary

The `authenticated` middleware uses unanchored regular expressions to match public (no-auth) endpoint patterns against `ctx.request.url`. Since `ctx.request.url` in Koa includes the query string, an attacker can access any protected endpoint by appending a public endpoint path as a quer…

GitHub-GHSA

CRITICAL
@fastify/middie vulnerable to middleware authentication bypass in child plugin scopes
GHSA-72c6-fx6q-fr5w
pkg: @fastify/middie
eco: npm
published: Apr 16, 2026
### Impact

`@fastify/middie` v9.3.1 and earlier incorrectly re-prefixes middleware paths when propagating them to child plugin scopes. When a child plugin is registered with a prefix that overlaps with a parent-scoped middleware path, the middleware path is modified during inheritance and silently …

CVE-2026-6270
GitHub-GHSA

CRITICAL
Official Clerk JavaScript SDKs: Middleware-based route protection bypass
GHSA-vqx2-fgx2-5wq9
pkg: @clerk/nextjs, @clerk/nuxt, @clerk/astro
eco: npm
published: Apr 16, 2026
## Summary

`createRouteMatcher` in `@clerk/nextjs`, `@clerk/nuxt`, and `@clerk/astro` can be bypassed by certain crafted requests, allowing them to skip middleware gating and reach downstream handlers.

Sessions are not compromised and no existing user can be impersonated – the bypass only affects …

GitHub-GHSA

CRITICAL
ChilliCream GraphQL Platform: Utf8GraphQLParser Stack Overflow via Deeply Nested GraphQL Documents
GHSA-qr3m-xw4c-jqw3
pkg: HotChocolate.Language, HotChocolate.Language, HotChocolate.Language
eco: nuget
published: Apr 16, 2026
### Impact

Hot Chocolate's `Utf8GraphQLParser` is a recursive descent parser with no recursion depth limit. A crafted GraphQL document with deeply nested selection sets, object values, list values, or list types can trigger a `StackOverflowException` on payloads as small as **40 KB**.

Because `Sta…

CVE-2026-40324
GitHub-GHSA

CRITICAL
Exposure of Storage Secret in Pyroscope
GHSA-m9hq-h476-h2g8
pkg: github.com/grafana/pyroscope, github.com/grafana/pyroscope
eco: go
published: Apr 15, 2026
Pyroscope is an open-source continuous profiling database. The database supports various storage backends, including Tencent Cloud Object Storage (COS).

If the database is configured to use Tencent COS as the storage backend, an attacker could extract the secret_key configuration value from the Pyr…

CVE-2025-41118
GitHub-GHSA

CRITICAL
Improper neutralization of specific syntax patterns for unauthorized expressions in Thymeleaf
GHSA-xjw8-8c5c-9r79
pkg: org.thymeleaf:thymeleaf, org.thymeleaf:thymeleaf-spring5, org.thymeleaf:thymeleaf-spring6
eco: maven
published: Apr 15, 2026
### Impact
A security bypass vulnerability exists in the expression execution mechanisms of Thymeleaf up to and including 3.1.3.RELEASE. Although the library provides mechanisms to prevent expression injection, it fails to properly neutralize specific syntax patterns that allow for the execution of …
CVE-2026-40478
GitHub-GHSA

CRITICAL
Improper restriction of the scope of accessible objects in Thymeleaf expressions
GHSA-r4v4-5mwr-2fwr
pkg: org.thymeleaf:thymeleaf, org.thymeleaf:thymeleaf-spring5, org.thymeleaf:thymeleaf-spring6
eco: maven
published: Apr 15, 2026
### Impact
A security bypass vulnerability exists in the expression execution mechanisms of Thymeleaf up to and including 3.1.3.RELEASE. Although the library provides mechanisms to prevent expression injection, it fails to properly restrict the scope of accessible objects, allowing specific potentia…
CVE-2026-40477
GitHub-GHSA

CRITICAL
OAuth2 Proxy has an Authentication Bypass via X-Forwarded-Uri Header Spoofing
GHSA-7×63-xv5r-3p2x
pkg: github.com/oauth2-proxy/oauth2-proxy/v7
eco: go
published: Apr 15, 2026
### Impact

A configuration-dependent authentication bypass exists in OAuth2 Proxy.

Deployments are affected when all of the following are true:

* OAuth2 Proxy is configured with `–reverse-proxy`
* and at least one rule is defined with `–skip_auth_routes` or the legacy `–skip-auth-regex`

OAuth…

CVE-2026-40575
GitHub-GHSA

CRITICAL
OAuth2 Proxy's Health Check User-Agent Matching Bypasses Authentication in auth_request Mode
GHSA-5hvv-m4w4-gf6v
pkg: github.com/oauth2-proxy/oauth2-proxy/v7, github.com/oauth2-proxy/oauth2-proxy
eco: go
published: Apr 14, 2026
### Impact
A configuration-dependent authentication bypass exists in OAuth2 Proxy.

Deployments are affected when all of the following are true:

– OAuth2 Proxy is used with an `auth_request`-style integration (for example, nginx `auth_request`)
– `–ping-user-agent` is set or `–gcp-healthchecks`…

CVE-2026-34457
GitHub-GHSA

CRITICAL
Zebra Vulnerable to Consensus Divergence in Transparent Sighash Hash-Type Handling
GHSA-8m29-fpq5-89jj
pkg: zebrad, zebra-script
eco: rust
published: Apr 18, 2026
# Consensus Divergence in Transparent Sighash Hash-Type Handling

## Summary

After a refactoring, Zebra failed to validate a consensus rule that restricted the possible values of sighash hash types for V5 transactions which were enabled in the NU5 network upgrade. Zebra nodes could thus accept and …

GitHub-GHSA

CRITICAL
Zebra has rk Identity Point Panic in Transaction Verification
GHSA-452v-w3gx-72wg
pkg: zebrad, zebra-chain
eco: rust
published: Apr 18, 2026
# rk Identity Point Panic in Transaction Verification

## Summary

Orchard transactions contain a `rk` field which is a randomized validating key and also an elliptic curve point. The Zcash specification allows the field to be the identity (a "zero" value), however, the `orchard` crate which is used…

GitHub-GHSA

CRITICAL
Nhost Vulnerable to Account Takeover via OAuth Email Verification Bypass
GHSA-6g38-8j4p-j3pr
pkg: github.com/nhost/nhost
eco: go
published: Apr 18, 2026
## Summary

Nhost automatically links an incoming OAuth identity to an existing Nhost account when the email addresses match. This is only safe when the email has been **verified by the OAuth provider**. Nhost's controller trusts a `profile.EmailVerified` boolean that is set by each provider adapter…

GitHub-GHSA

CRITICAL
Flowise: Airtable_Agent Code Injection Remote Code Execution Vulnerability
GHSA-v38x-c887-992f
pkg: flowise, flowise-components
eco: npm
published: Apr 18, 2026
ZDI-CAN-29412: FlowiseAI Flowise Airtable_Agent Code Injection Remote Code Execution Vulnerability

— ABSTRACT ————————————-

Trend Micro's Zero Day Initiative has identified a vulnerability affecting the following products:
Flowise – Flowise

— VULNERABILITY DETAILS ——…

GitHub-GHSA

CRITICAL
OpenClaw: Feishu webhook and card-action validation now fail closed
GHSA-xh72-v6v9-mwhc
pkg: openclaw
eco: npm
published: Apr 17, 2026
## Summary

Feishu webhook mode accepted missing `encryptKey` configuration as valid and blank card-action callback tokens as usable lifecycle tokens. Together, those fail-open paths could allow unauthenticated webhook or card-action traffic to reach command dispatch in affected deployments.

## Imp…

GitHub-GHSA

CRITICAL
Arbitrary code execution in protobufjs
GHSA-xq3m-2v4x-88gg
pkg: protobufjs, protobufjs
eco: npm
published: Apr 16, 2026
### Summary
protobufjs compiles protobuf definitions into JS functions. Attackers can manipulate these definitions to execute arbitrary JS code.

### Details
Attackers can inject arbitrary code in the "type" fields of protobuf definitions, which will then execute during object decoding using that de…

CVE-2026-41242
GitHub-GHSA

CRITICAL
Flowise: Code Injection in CSVAgent leads to Authenticated RCE
GHSA-9wc7-mj3f-74xv
pkg: flowise, flowise-components
eco: npm
published: Apr 16, 2026
### Summary
The CSVAgent allows providing a custom Pandas CSV read code. Due to lack of sanitization, an attacker can provide the following payload: `DataFrame({'foo': ['bar!']});import os;os.system('whoami')` that will get interpolated and executed by the server.

### Details
The code in question t…

GitHub-GHSA

CRITICAL
Oxia has an OIDC token audience validation bypass via SkipClientIDCheck
GHSA-fhvp-9hcj-6m33
pkg: github.com/oxia-db/oxia
eco: go
published: Apr 14, 2026
### Summary
The OIDC authentication provider unconditionally sets `SkipClientIDCheck: true` in the `go-oidc` verifier configuration, disabling the standard audience (`aud`) claim validation at the library level. This allows tokens issued for unrelated services by the same OIDC issuer to be accepted …
GitHub-GHSA

CRITICAL
Decidim has a cross-site scripting (XSS) in user name
GHSA-fc46-r95f-hq7g
pkg: decidim-core, decidim-core
eco: rubygems
published: Apr 13, 2026
### Impact
A stored code execution vulnerability in the user name field allows a low-privileged attacker to execute arbitrary code in the context of any user who passively visits a comment page, resulting in high confidentiality and integrity impact across security boundaries.

### Patches
N/A

### …

CVE-2026-23891
GitHub-GHSA

HIGH
Paperclip: Privilege Escalation via Agent-Controlled workspaceStrategy.provisionCommand Leading to OS Command Execution
GHSA-265w-rf2w-cjh4
pkg: @paperclipai/server
eco: npm
published: Apr 16, 2026
### Summary
Paperclip contains a privilege escalation vulnerability that allows an attacker with an Agent API key to execute arbitrary OS commands on the Paperclip server host.
An attacker with an agent credential can escalate privileges from the agent runtime to the Paperclip server host.
The vulne…
GitHub-GHSA

HIGH
Unsafe object property setter in mathjs
GHSA-29qv-4j9f-fjw5
pkg: mathjs
eco: npm
published: Apr 16, 2026
### Impact
This security vulnerability allowed executing arbitrary JavaScript via the expression parser of mathjs. You can be affected when you have an application where users can evaluate arbitrary expressions using the mathjs expression parser.

### Patches
The issue was introduced in mathjs `v13.…

CVE-2026-40897
GitHub-GHSA

HIGH
ACME Lego: Arbitrary File Write via Path Traversal in Webroot HTTP-01 Provider
GHSA-qqx8-2xmm-jrv8
pkg: github.com/go-acme/lego/v4, github.com/go-acme/lego/v3, github.com/go-acme/lego
eco: go
published: Apr 16, 2026
### Summary

The webroot HTTP-01 challenge provider in lego is vulnerable to arbitrary file write and deletion via path traversal. A malicious ACME server can supply a crafted challenge token containing `../` sequences, causing lego to write attacker-influenced content to any path writable by the le…

CVE-2026-40611
GitHub-GHSA

HIGH
Weblate: Privilege escalation in the user API endpoint
GHSA-3382-gw9x-477v
pkg: weblate
eco: pip
published: Apr 16, 2026
### Impact

The user patching API endpoint didn't properly limit the scope of edits.

### Patches
* https://github.com/WeblateOrg/weblate/pull/18687

### References
Thanks to @tikket1 and @DavidCarliez for reporting this via GitHub. We received two individual reports for this.

CVE-2026-34393
GitHub-GHSA

HIGH
pyLoad has Stale Session Privilege After Role/Permission Change (Privilege Revocation Bypass)
GHSA-66hx-chf7-3332
pkg: pyload-ng
eco: pip
published: Apr 14, 2026
### Summary
pyLoad caches `role` and `permission` in the session at login and continues to authorize requests using these cached values, even after an admin changes the user's role/permissions in the database.

As a result, an already logged-in user can keep old (revoked) privileges until logout/ses…

GitHub-GHSA

HIGH
Emissary has an OS Command Injection via Unvalidated IN_FILE_ENDING / OUT_FILE_ENDING in Executrix
GHSA-3p24-9x7v-7789
pkg: gov.nsa.emissary:emissary
eco: maven
published: Apr 13, 2026
### Summary

`Executrix.getCommand()` constructs shell commands by substituting temporary file paths directly into a `/bin/sh -c` string with no escaping. The `IN_FILE_ENDING` and `OUT_FILE_ENDING` configuration keys flow into those paths unmodified. A place author who sets either key to a shell met…

CVE-2026-35582
GitHub-GHSA

HIGH
Apache Airflow: Unsafe Deserialization via Legacy Serialization Keys (__type/__var) Bypass in XCom API
GHSA-mc4f-r875-v87w
pkg: apache-airflow
eco: pip
published: Apr 13, 2026
Dag Authors, who normally should not be able to execute code in the webserver context could craft XCom payload causing the webserver to execute arbitrary code. Since Dag Authors are already highly trusted, severity of this issue is Low.

Users are recommended to upgrade to Apache Airflow 3.2.0, whi…

CVE-2026-33858
GitHub-GHSA

HIGH
Keras has an untrusted deserialization vulnerability
GHSA-4f3f-g24h-fr8m
pkg: keras
eco: pip
published: Apr 13, 2026
A vulnerability in the `TFSMLayer` class of the `keras` package, version 3.13.0, allows attacker-controlled TensorFlow SavedModels to be loaded during deserialization of `.keras` models, even when `safe_mode=True`. This bypasses the security guarantees of `safe_mode` and enables arbitrary attacker-c…
CVE-2026-1462
GitHub-GHSA

HIGH
Apache Storm: Deserialization of Untrusted Data vulnerability
GHSA-jf89-3q6q-vcgr
pkg: org.apache.storm:storm-client
eco: maven
published: Apr 13, 2026
Deserialization of Untrusted Data vulnerability in Apache Storm.

Versions Affected:
before 2.8.6.

Description:
When processing topology credentials submitted via the Nimbus Thrift API, Storm deserializes the base64-encoded TGT blob using ObjectInputStream.readObject() without any class filtering …

CVE-2026-35337
GitHub-GHSA

HIGH
pretalx vulnerable to stored cross-site scripting in organizer search typeahead
GHSA-cjcx-jfp2-f7m2
pkg: pretalx
eco: pip
published: Apr 18, 2026
The organiser search in the pretalx backend rendered submission titles, speaker display names, and user names/emails into the result dropdown using `innerHTML` string interpolation. Any user who controls one of those fields (which includes any registered user whose display name is looked up by an ad…
GitHub-GHSA

HIGH
Paperclip: codex_local inherited ChatGPT/OpenAI-connected Gmail and was able to send real email
GHSA-gqqj-85qm-8qhf
pkg: paperclipai
eco: npm
published: Apr 16, 2026
### Summary

A Paperclip-managed `codex_local` runtime was able to access and use a Gmail connector that I had connected in the ChatGPT/OpenAI apps UI, even though I had not explicitly connected Gmail inside Paperclip or separately inside Codex.

In my environment this enabled mailbox access and a r…

GitHub-GHSA

HIGH
Stored XSS in SEO Fields Leads to Authenticated API Data Exposure in ApostropheCMS
GHSA-855c-r2vq-c292
pkg: apostrophe
eco: npm
published: Apr 16, 2026
## Summary

A stored cross-site scripting (XSS) vulnerability exists in SEO-related fields (SEO Title and Meta Description) in ApostropheCMS.

Improper neutralization of user-controlled input in SEO-related fields allows injection of arbitrary JavaScript into HTML contexts, resulting in stored cross…

CVE-2026-35569
GitHub-GHSA

HIGH
Note Mark has Stored XSS via Unrestricted Asset Upload
GHSA-9pr4-rf97-79qh
pkg: github.com/enchant97/note-mark/backend
eco: go
published: Apr 13, 2026
### Summary
A stored same-origin XSS vulnerability allows any authenticated user to upload an HTML, SVG, or XHTML file as a note asset and have it executed in a victim’s browser under the application’s origin. Because the application serves these files inline without a safe content type and with…
CVE-2026-40262
GitHub-GHSA

HIGH
Kyverno has SSRF via CEL http.Get/http.Post in NamespacedValidatingPolicy allows cross-namespace data access
GHSA-rggm-jjmc-3394
pkg: github.com/kyverno/kyverno
eco: go
published: Apr 14, 2026
## Summary

A Server-Side Request Forgery (SSRF) vulnerability in Kyverno's CEL HTTP library (`pkg/cel/libs/http/`) allows users with namespace-scoped policy creation permissions to make arbitrary HTTP requests from the Kyverno admission controller. This enables unauthorized access to internal servi…

CVE-2026-4789
GitHub-GHSA

HIGH
OpenTelemetry eBPF Instrumentation: Privileged Java agent injection allows arbitrary host file overwrite via untrusted TMPDIR
GHSA-8gmg-3w2q-65f4
pkg: go.opentelemetry.io/obi
eco: go
published: Apr 17, 2026
### Summary

A flaw in the Java agent injection path allows a local attacker controlling a Java workload to overwrite arbitrary host files when Java injection is enabled and OBI is running with elevated privileges. The injector trusted `TMPDIR` from the target process and used unsafe file creation s…

GitHub-GHSA

HIGH
Complete Bypass of CVE-2026-24884 Patch via Git-Delivered Symlink Poisoning in compressing
GHSA-4c3q-x735-j3r5
pkg: compressing, compressing
eco: npm
published: Apr 17, 2026
**1. Executive Summary**
This report documents a critical security research finding in the `compressing` npm package (specifically tested on the latest **v2.1.0**). The core vulnerability is a **Partial Fix Bypass** of **CVE-2026-24884**.

The current patch relies on a purely logical string validati…

CVE-2026-40931
GitHub-GHSA

HIGH
NietThijmen ShoppingCart: Command injection in the connect function
GHSA-ggmw-mjhv-75rm
pkg: github.com/NietThijmen/ShoppingCart
eco: go
published: Apr 15, 2026
Command injection in the connect function in NietThijmen ShoppingCart 0.0.2 allows an attacker to execute arbitrary shell commands and achieve remote code execution via injection of malicious payloads into the Port field
CVE-2024-53412
GitHub-GHSA

HIGH
Dagster Vulnerable to SQL Injection via Dynamic Partition Keys in Database I/O Manager Integrations
GHSA-mjw2-v2hm-wj34
pkg: dagster-duckdb, dagster-snowflake, dagster-gcp
eco: pip
published: Apr 18, 2026
### Summary

The DuckDB, Snowflake, BigQuery, and DeltaLake I/O managers constructed SQL WHERE clauses by interpolating dynamic partition key values into queries without escaping. A user with the `Add Dynamic Partitions` permission could create a partition key that injects arbitrary SQL, which would…

GitHub-GHSA

HIGH
Paperclip: Unauthenticated Access to Multiple API Endpoints in Authenticated Mode
GHSA-xfqj-r5qw-8g4j
pkg: @paperclipai/server
eco: npm
published: Apr 16, 2026
## Summary

Several API endpoints in `authenticated` mode have no authentication at all. They respond to completely unauthenticated requests with sensitive data or allow state-changing operations. No account, no session, no API key needed.

Verified against the latest version.

Discord: sagi03581

#…

GitHub-GHSA

HIGH
Flowise: Remote code execution vulnerability in AirtableAgent.ts caused by lack of input verification when using `Pandas`.
GHSA-f228-chmx-v6j6
pkg: flowise, flowise-components
eco: npm
published: Apr 16, 2026
## Description

### Summary

“AirtableAgent” is an agent function provided by FlowiseAI that retrieves search results by accessing private datasets from airtable.com. “AirtableAgent” uses Python, along with `Pyodide` and `Pandas`, to get and return results.

The user’s input is directly ap…

GitHub-GHSA

HIGH
OAuth2 Proxy has an Authentication Bypass via Fragment Confusion in skip_auth_routes and skip_auth_regex
GHSA-pxq7-h93f-9jrg
pkg: github.com/oauth2-proxy/oauth2-proxy/v7
eco: go
published: Apr 15, 2026
### Impact

A configuration-dependent authentication bypass exists in OAuth2 Proxy.

Deployments are affected when all of the following are true:

* Use of `skip_auth_routes` or the legacy `skip_auth_regex` * Use of patterns that can be widened by attacker-controlled suffixes, such as `^/foo/.*/b…

GitHub-GHSA

HIGH
Maddy Mail Server has an LDAP Filter Injection via Unsanitized Username
GHSA-5835-4gvc-32pc
pkg: github.com/foxcpp/maddy
eco: go
published: Apr 13, 2026
### Summary

The `auth.ldap` module constructs LDAP search filters and DN strings by directly interpolating user-supplied usernames via `strings.ReplaceAll()` without any LDAP filter escaping. An attacker who can reach the SMTP submission (AUTH PLAIN) or IMAP LOGIN interface can inject arbitrary LDA…

CVE-2026-40193
GitHub-GHSA

HIGH
PraisonAI: SQL Injection via unvalidated `table_prefix` in 9 conversation store backends (incomplete fix for CVE-2026-40315)
GHSA-rg3h-x3jw-7jm5
pkg: praisonai, praisonaiagents
eco: pip
published: Apr 17, 2026
The fix for [CVE-2026-40315](https://github.com/MervinPraison/PraisonAI/security/advisories/GHSA-x783-xp3g-mqhp) added input validation to `SQLiteConversationStore` only. Nine sibling backends — MySQL, PostgreSQL, async SQLite/MySQL/PostgreSQL, Turso, SingleStore, Supabase, SurrealDB — pass `tab…
GitHub-GHSA

HIGH
Dapr: Service Invocation path traversal ACL bypass
GHSA-85gx-3qv6-4463
pkg: github.com/dapr/dapr, github.com/dapr/dapr, github.com/dapr/dapr
eco: go
published: Apr 17, 2026
### Summary

A vulnerability has been found in Dapr that allows bypassing access control policies for service invocation using reserved URL characters and path traversal sequences in method paths. The ACL normalized the method path independently from the dispatch layer, so the ACL evaluated one path…

GitHub-GHSA

HIGH
HashiCorp Vault has a KVv2 Metadata and Secret Deletion Policy Bypass that leads to Denial-of-Service
GHSA-m2w4-8ggf-rj47
pkg: github.com/hashicorp/vault
eco: go
published: Apr 17, 2026
An authenticated user with access to a kvv2 path through a policy containing a glob may be able to delete secrets they were not authorized to read or write, resulting in denial-of-service. This vulnerability did not allow a malicious user to delete secrets across namespaces, nor read any secret data…
CVE-2026-3605
GitHub-GHSA

HIGH
Flowise: Improper Mass Assignment in Account Registration Enables Unauthorized Organization Association
GHSA-48m6-ch88-55mj
pkg: flowise
eco: npm
published: Apr 16, 2026
### Summary

An improper mass assignment (JSON injection) vulnerability in the account registration endpoint of Flowise Cloud allows unauthenticated attackers to inject server-managed fields and nested objects during account creation. This enables client-controlled manipulation of ownership metadata…

GitHub-GHSA

HIGH
Kyverno: ServiceAccount token leaked to external servers via apiCall service URL
GHSA-f9g8-6ppc-pqq4
pkg: github.com/kyverno/kyverno
eco: go
published: Apr 16, 2026
## Summary

Kyverno's apiCall feature in ClusterPolicy automatically attaches the admission controller's ServiceAccount token to outgoing HTTP requests. The service URL has no validation — it can point anywhere, including attacker-controlled servers. Since the admission controller SA has permissio…

GitHub-GHSA

HIGH
OmniFaces: EL injection via crafted resource name in wildcard CDN mapping
GHSA-vp6r-9m58-5xv8
pkg: org.omnifaces:omnifaces, org.omnifaces:omnifaces, org.omnifaces:omnifaces
eco: maven
published: Apr 16, 2026
### Impact

Server-side EL injection leading to Remote Code Execution (RCE). Affects applications that use `CDNResourceHandler` with a wildcard CDN mapping (e.g. `libraryName:*=https://cdn.example.com/*`). An attacker can craft a resource request
URL containing an EL expression in the resource name,…

GitHub-GHSA

HIGH
Weblate: Remote code execution during backup restoration
GHSA-558g-h753-6m33
pkg: weblate
eco: pip
published: Apr 16, 2026
### Impact
The project backup didn't filter Git and Mercurial configuration files and this could lead to remote code execution under certain circumstances.

### Patches
* https://github.com/WeblateOrg/weblate/pull/18549

### Workarounds
The project backup is only accessible to users who can create p…

CVE-2026-33435
GitHub-GHSA

HIGH
Apache Airflow: RCE by race condition in example_xcom dag
GHSA-q2hg-643c-gw8h
pkg: apache-airflow
eco: pip
published: Apr 16, 2026
The example example_xcom that was included in airflow documentation implemented unsafe pattern of reading value
from xcom in the way that could be exploited to allow UI user who had access to modify XComs to perform arbitrary
execution of code on the worker. Since the UI users are already highly tr…
CVE-2025-54550
GitHub-GHSA

HIGH
Velociraptor vulnerability in the query() plugin which allows access to all orgs with the user's current ACL token
GHSA-hv5g-26jg-pc45
pkg: www.velocidex.com/golang/velociraptor
eco: go
published: Apr 15, 2026
Velociraptor versions prior to 0.76.3 contain a vulnerability in the query() plugin which allows access to all orgs with the user's current ACL token. This allows an authenticated GUI user with access in one org, to use the query() plugin, in a notebook cell, to run VQL queries on other orgs which t…
CVE-2026-6290
GitHub-GHSA

HIGH
kyverno apicall servicecall implicit bearer token injection leaks kyverno serviceaccount token
GHSA-q93q-v844-jrqp
pkg: github.com/kyverno/kyverno
eco: go
published: Apr 14, 2026
kyverno’s apiCall servicecall helper implicitly injects `Authorization: Bearer …` using the kyverno controller serviceaccount token when a policy does not explicitly set an Authorization header. because `context.apiCall.service.url` is policy-controlled, this can send the kyverno serviceaccount …
CVE-2026-40868
GitHub-GHSA

HIGH
Flowise: Parameter Override Bypass Remote Command Execution
GHSA-cvrr-qhgw-2mm6
pkg: flowise, flowise-components
eco: npm
published: Apr 16, 2026
### Summary

Flowise is vulnerable to a critical unauthenticated remote command execution (RCE) vulnerability. It can be exploited via a parameter override bypass using the `FILE-STORAGE::` keyword combined with a `NODE_OPTIONS` environment variable injection. This allows for the execution of arbitr…

GitHub-GHSA

HIGH
Kyverno apiCall automatically forwards ServiceAccount token to external endpoints (credential leak)
GHSA-8wfp-579w-6r25
pkg: github.com/kyverno/kyverno
eco: go
published: Apr 16, 2026
### Summary
Kyverno's apiCall service mode automatically attaches the admission controller's ServiceAccount (SA) token to outbound HTTP requests. This results in unintended credential exposure when requests are sent to external or attacker-controlled endpoints.

The behavior is insecure-by-default a…

GitHub-GHSA

HIGH
Kyverno: Cross-Namespace Read Bypasses RBAC Isolation (CVE-2026-22039 Incomplete Fix)
GHSA-cvq5-hhx3-f99p
pkg: github.com/kyverno/kyverno
eco: go
published: Apr 16, 2026
### Summary

CVE-2026-22039 fixed cross-namespace privilege escalation in Kyverno's `apiCall` context by validating the `URLPath` field. However, the **ConfigMap context loader has the identical vulnerability** — the `configMap.namespace` field accepts any namespace with zero validation, allowing …

GitHub-GHSA

HIGH
Weblate: Arbitrary File Read via Symlink
GHSA-hv99-mxm5-q397
pkg: weblate
eco: pip
published: Apr 16, 2026
### Impact

The ZIP download feature didn't verify downloaded file and it could follow symlinks outside the repository.

### Patches

* https://github.com/WeblateOrg/weblate/pull/18683

### References

Thanks to @DavidCarliez for reporting this vulnerability via GitHub.

CVE-2026-34242
GitHub-GHSA

HIGH
OpenStack Keystone: LDAP identity backend does not convert enabled attribute to boolean
GHSA-pfx2-9x9m-7ghx
pkg: keystone
eco: pip
published: Apr 14, 2026
In OpenStack Keystone before 28.0.1, the LDAP identity backend does not convert the user enabled attribute to a boolean when the user_enabled_invert configuration option is False (the default). The _ldap_res_to_model method in the UserApi class only performed string-to-boolean conversion when user_e…
CVE-2026-40683
GitHub-GHSA

HIGH
Kyverno APICall SSRF Vulnerability Leading to Multi-Tenant Isolation Breach
GHSA-fmqp-4wfc-w3v7
pkg: github.com/kyverno/kyverno
eco: go
published: Apr 14, 2026
### Summary

Kyverno's APICall feature contains a Server-Side Request Forgery (SSRF) vulnerability that allows users with Policy creation permissions to access arbitrary internal resources through Kyverno's high-privilege ServiceAccount. In multi-tenant Kubernetes environments, this constitutes a cl…

GitHub-GHSA

HIGH
Kyverno has unrestricted outbound requests in Kyverno apiCall enabling SSRF
GHSA-qr4g-8hrp-c4rw
pkg: github.com/kyverno/kyverno
eco: go
published: Apr 14, 2026
### Summary
A Server-Side Request Forgery (SSRF) vulnerability in Kyverno allows authenticated users to induce the admission controller to send arbitrary HTTP requests to attacker-controlled endpoints.

When a `ClusterPolicy` uses `apiCall.service.url` with variable substitution (e.g. `{{request.obj…

GitHub-GHSA

HIGH
wger has Broken Access Control in Global Gym Configuration Update Endpoint
GHSA-xppv-4jrx-qf8m
pkg: wger
eco: pip
published: Apr 16, 2026
## Summary

wger exposes a global configuration edit endpoint at `/config/gym-config/edit` implemented by `GymConfigUpdateView`. The view declares `permission_required = 'config.change_gymconfig'` but does not enforce it because it inherits `WgerFormMixin` (ownership-only checks) instead of the proj…

CVE-2026-40474
GitHub-GHSA

HIGH
OpenRemote has XXE in Velbus Asset Import
GHSA-g24f-mgc3-jwwc
pkg: io.openremote:openremote-manager
eco: maven
published: Apr 15, 2026
### Summary
The Velbus asset import path parses attacker-controlled XML without explicit XXE hardening. An authenticated user who can call the import endpoint may trigger XML external entity processing, which can lead to server-side file disclosure and SSRF. The target file must be less than 1023 ch…
CVE-2026-40882
GitHub-GHSA

HIGH
HashiCorp Vault Vulnerable to Denial-of-Service via Unauthenticated Root Token Generation/Rekey Operations
GHSA-88v5-9hxc-f85r
pkg: github.com/hashicorp/vault
eco: go
published: Apr 17, 2026
Vault is vulnerable to a denial-of-service condition where an unauthenticated attacker can repeatedly initiate or cancel root token generation or rekey operations, occupying the single in-progress operation slot. This prevents legitimate operators from completing these workflows. This vulnerability,…
CVE-2026-5807
GitHub-GHSA

HIGH
HashiCorp Vault May Expose Tokens to Auth Plugins Due to Incorrect Header Sanitization
GHSA-72gw-fmmr-c4r4
pkg: github.com/hashicorp/vault
eco: go
published: Apr 17, 2026
If a Vault auth mount is configured to pass through the "Authorization" header, and the "Authorization" header is used to authenticate to Vault, Vault forwarded the Vault token to the auth plugin backend. Fixed in 2.0.0, 1.21.5, 1.20.10, and 1.19.16.
CVE-2026-4525
GitHub-GHSA

HIGH
Meridian: Multiple defense-in-depth gaps (collection/depth caps, telemetry, retry, fan-out)
GHSA-f5v8-v6q3-q4h6
pkg: Meridian.Mapping, Meridian.Mediator
eco: nuget
published: Apr 16, 2026
## Summary

Meridian v2.1.0 (`Meridian.Mapping` and `Meridian.Mediator`) shipped with nine defense-in-depth gaps reachable through its public APIs. Two are HIGH severity — the advertised `DefaultMaxCollectionItems` and `DefaultMaxDepth` safety caps are silently bypassed on the `IMapper.Map(source,…

GitHub-GHSA

HIGH
basic-ftp vulnerable to denial of service via unbounded memory consumption in Client.list()
GHSA-rp42-5vxx-qpwr
pkg: basic-ftp
eco: npm
published: Apr 16, 2026
### Summary
`basic-ftp@5.2.2` is vulnerable to denial of service through unbounded memory growth while processing directory listings from a remote FTP server. A malicious or compromised server can send an extremely large or never-ending listing response to `Client.list()`, causing the client process…
GitHub-GHSA

HIGH
PsiTransfer: Upload PATCH path traversal can create `config.<NODE_ENV>.js` and lead to code execution on restart
GHSA-533q-w4g6-5586
pkg: psitransfer
eco: npm
published: Apr 16, 2026
### Summary

The upload PATCH flow under `/files/:uploadId` validates the mounted request path using the still-encoded `req.path`, but the downstream tus handler later writes using the decoded `req.params.uploadId`. In deployments that use a supported custom `PSITRANSFER_UPLOAD_DIR` whose basename p…

GitHub-GHSA

HIGH
zrok: Unauthenticated DoS via unbounded memory allocation in striped session cookie parsing
GHSA-cpf9-ph2j-ccr9
pkg: github.com/openziti/zrok, github.com/openziti/zrok/v2
eco: go
published: Apr 16, 2026
**Summary**
endpoints.GetSessionCookie parses an attacker-supplied cookie chunk count and calls make([]string, count) with no upper bound before any token validation occurs. The function is reached on every request to an OAuth-protected proxy share, allowing an unauthenticated remote attacker to tri…
CVE-2026-40303
GitHub-GHSA

HIGH
SkyWalking OAP /debugging/config/dump endpoint may leak sensitive configuration information
GHSA-27h3-crw2-q36w
pkg: org.apache.skywalking:server-core
eco: maven
published: Apr 16, 2026
The SkyWalking OAP /debugging/config/dump endpoint may leak sensitive configuration information of MySQL/PostgreSQL.

This issue affects Apache SkyWalking: from 9.7.0 through 10.3.0.

Users are recommended to upgrade to version 10.4.0, which fixes the issue.

CVE-2026-30778
GitHub-GHSA

HIGH
Microsoft Security Advisory CVE-2026-26171 – .NET Denial of Service Vulnerability
GHSA-w3x6-4m5h-cxqf
pkg: System.Security.Cryptography.Xml, System.Security.Cryptography.Xml, System.Security.Cryptography.Xml
eco: nuget
published: Apr 14, 2026
## Executive Summary:

Microsoft is releasing this security advisory to provide information about a vulnerability in System.Security.Cryptography.Xml. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability.

A vulnerability exists in…

CVE-2026-26171
GitHub-GHSA

HIGH
Microsoft Security Advisory CVE-2026-33116 – .NET, .NET Framework, and Visual Studio Denial of Service Vulnerability
GHSA-37gx-xxp4-5rgx
pkg: System.Security.Cryptography.Xml, System.Security.Cryptography.Xml, System.Security.Cryptography.Xml
eco: nuget
published: Apr 14, 2026
## Executive Summary:

Microsoft is releasing this security advisory to provide information about a vulnerability in System.Security.Cryptography.Xml. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability.

A vulnerability exists in…

CVE-2026-33116
GitHub-GHSA

HIGH
Go Markdown has an Out-of-bounds Read in SmartypantsRenderer
GHSA-77fj-vx54-gvh7
pkg: github.com/gomarkdown/markdown
eco: go
published: Apr 14, 2026
### Summary

Processing a malformed input containing a `<` character that is not followed by a `>` character anywhere in the remaining text with a SmartypantsRenderer will lead to Out of Bounds read or a panic.

### Details

The `smartLeftAngle()` function in `html/smartypants.go:367-376` performs a…

CVE-2026-40890
GitHub-GHSA

HIGH
Decidim's comments API allows access to all commentable resources
GHSA-ghmh-q25g-gxxx
pkg: decidim-comments, decidim-api, decidim-comments
eco: rubygems
published: Apr 14, 2026
### Impact
The root level `commentable` field in the API allows access to all commentable resources within the platform, without any permission checks. All Decidim instances are impacted that have not secured the `/api` endpoint. The `/api` endpoint is publicly available with the default configurati…
CVE-2026-40870
GitHub-GHSA

HIGH
Decidim amendments can be accepted or rejected by anyone
GHSA-w5xj-99cg-rccm
pkg: decidim-core, decidim-core
eco: rubygems
published: Apr 14, 2026
### Impact
The vulnerability allows any registered and authenticated user to accept or reject any amendments. The impact is on any users who have created proposals where the amendments feature is enabled. This also elevates the user accepting the amendment as the author of the original proposal as p…
CVE-2026-40869
GitHub-GHSA

HIGH
free5gc UDR nudr-dr influenceData/subs-to-notify leaks SUPI in error response body without authentication
GHSA-wrwh-rpq4-87hf
pkg: github.com/free5gc/udr
eco: go
published: Apr 14, 2026
### Summary
An information disclosure vulnerability in the UDR service allows any unauthenticated attacker with access to the 5G Service Based Interface (SBI) to retrieve stored subscriber identifiers (SUPI/IMSI) with a single HTTP GET request requiring no parameters or credentials.

### Details
Th…

CVE-2026-40245
GitHub-GHSA

HIGH
ImageMagick has a heap Buffer Overflow in ImageMagick MVG decoder
GHSA-x9h5-r9v2-vcww
pkg: Magick.NET-Q16-AnyCPU, Magick.NET-Q16-HDRI-AnyCPU, Magick.NET-Q16-HDRI-OpenMP-arm64
eco: nuget
published: Apr 14, 2026
A heap buffer overflow occurs in the MVG decoder that could result in an out of bounds write when processing a crafted image.
CVE-2026-33901
GitHub-GHSA

HIGH
ImageMagick has a Stack Overflow in DestroyXMLTree()
GHSA-fwvm-ggf6-2p4x
pkg: Magick.NET-Q16-AnyCPU, Magick.NET-Q16-HDRI-AnyCPU, Magick.NET-Q16-HDRI-OpenMP-arm64
eco: nuget
published: Apr 14, 2026
Magick frees the memory of the XML tree via the `DestroyXMLTree` function; however, this process is executed recursively with no depth limit imposed. When magick processes an XML file with deeply nested structures, it will exhaust the stack memory, resulting in a Denial of Service (DoS) attack.
CVE-2026-33908
GitHub-GHSA

HIGH
@fastify/middie vulnerable to middleware bypass via deprecated ignoreDuplicateSlashes option
GHSA-v9ww-2j6r-98q6
pkg: @fastify/middie
eco: npm
published: Apr 16, 2026
### Impact

`@fastify/middie` v9.3.1 and earlier does not read the deprecated (but still functional) top-level `ignoreDuplicateSlashes` option, only reading from `routerOptions`. This creates a normalization gap: Fastify's router normalizes duplicate slashes but middie does not, allowing middleware …

CVE-2026-33804
GitHub-GHSA

HIGH
Jetty has HTTP Request Smuggling via Chunked Extension Quoted-String Parsing
GHSA-355h-qmc2-wpwf
pkg: org.eclipse.jetty:jetty-http, org.eclipse.jetty:jetty-http, org.eclipse.jetty:jetty-http
eco: maven
published: Apr 14, 2026
### Description (as reported)

Jetty incorrectly parses quoted strings in HTTP/1.1 chunked transfer encoding extension values, enabling request smuggling attacks.

### Background

This vulnerability is a new variant discovered while researching the "Funky Chunks" HTTP request smuggling techniques:
-…

CVE-2026-2332
GitHub-GHSA

HIGH
Eclipse Jetty: Early return from the JASPIAuthenticator code can potentially no clear ThreadLocal variables
GHSA-r7p8-xq5m-436c
pkg: org.eclipse.jetty.ee11:jetty-ee11-jaspi, org.eclipse.jetty.ee10:jetty-ee10-jaspi, org.eclipse.jetty.ee9:jetty-ee9-jaspi
eco: maven
published: Apr 14, 2026
### Description (as reported)

A security vulnerability has been identified in Jetty's `JaspiAuthenticator.java`.

The root cause is a failure to consistently clear authentication metadata stored in `ThreadLocal` during certain error or incomplete authentication flows.
Specifically, after a `Gr…

CVE-2026-5795
GitHub-GHSA

HIGH
Paperclip: Malicious skills able to exfiltrate and destroy all user data
GHSA-w8hx-hqjv-vjcq
pkg: @paperclipai/server
eco: npm
published: Apr 16, 2026
### Summary
An arbitrary code execution vulnerability in the workspace runtime service allows any agent to execute shell commands on the server, exposing all environment variables including API keys, JWT secrets, and database credentials.

### Details
A malicious skill can instruct the agent to expl…

GitHub-GHSA

HIGH
thin-vec: Use-After-Free and Double Free in IntoIter::drop When Element Drop Panics
GHSA-xphw-cqx3-667j
pkg: thin-vec
eco: rust
published: Apr 15, 2026
### Summary

A **Double Free / Use-After-Free (UAF)** vulnerability has been identified in the `IntoIter::drop` and `ThinVec::clear` implementations of the `thin_vec` crate.
Both vulnerabilities share the same root cause and can trigger memory corruption using only safe Rust code — no `unsafe` blo…

GitHub-GHSA

HIGH
Flowise: APIChain Prompt Injection SSRF in GET/POST API Chains
GHSA-6r77-hqx7-7vw8
pkg: flowise, flowise-components
eco: npm
published: Apr 16, 2026
### Summary
A Server-Side Request Forgery (SSRF) vulnerability exists in FlowiseAI's POST/GET API Chain components that allows unauthenticated attackers to force the server to make arbitrary HTTP requests to internal and external systems. By injecting malicious prompt templates, attackers can bypass…
GitHub-GHSA

HIGH
Flowise: SSRF Protection Bypass (TOCTOU & Default Insecure)
GHSA-2x8m-83vc-6wv4
pkg: flowise, flowise-components
eco: npm
published: Apr 16, 2026
### Summary
The core security wrappers (secureAxiosRequest and secureFetch) intended to prevent Server-Side Request Forgery (SSRF) contain multiple logic flaws. These flaws allow attackers to bypass the allow/deny lists via DNS Rebinding (Time-of-Check Time-of-Use) or by exploiting the default confi…
GitHub-GHSA

HIGH
Flowise: SSRF Protection Bypass via Unprotected Built-in HTTP Modules in Custom Function Sandbox
GHSA-xhmj-rg95-44hv
pkg: flowise, flowise-components
eco: npm
published: Apr 16, 2026
### Summary
A Server-Side Request Forgery (SSRF) protection bypass vulnerability exists in the Custom Function feature. While the application implements SSRF protection via HTTP_DENY_LIST for axios and node-fetch libraries, the built-in Node.js `http`, `https`, and `net` modules are allowed in the N…
GitHub-GHSA

HIGH
Flowise: File Upload Validation Bypass in createAttachment
GHSA-rh7v-6w34-w2rr
pkg: flowise
eco: npm
published: Apr 16, 2026
### Summary
In FlowiseAI, the Chatflow configuration file upload settings can be modified to allow the application/javascript MIME type. This lets an attacker upload .js files even though the frontend doesn’t normally allow JavaScript uploads. This enables attackers to persistently store malicious…
GitHub-GHSA

HIGH
Zarf has a Path Traversal via Malicious Package Metadata.Name — Arbitrary File Write
GHSA-pj97-4p9w-gx3q
pkg: github.com/zarf-dev/zarf
eco: go
published: Apr 14, 2026
### Impact
This vulnerability impacts users of `zarf package inspect sbom` or `zarf package inspect documentation` on untrusted packages.

### Patches
#4793, now fixed in version v0.74.2

### Workarounds
Avoid inspecting unsigned packages

## Description

The `package inspect sbom` and `package insp…

CVE-2026-40090
GitHub-GHSA

HIGH
Apache SkyWalking MCP: Server-Side Request Forgery via SW-URL Header in MCP Server
GHSA-c4hg-6933-x62x
pkg: github.com/apache/skywalking-mcp
eco: go
published: Apr 13, 2026
Server-Side Request Forgery via SW-URL Header vulnerability in Apache SkyWalking MCP.

This issue affects Apache SkyWalking MCP: 0.1.0.

Users are recommended to upgrade to version 0.2.0, which fixes this issue.

CVE-2026-34476
GitHub-GHSA

HIGH
Zebra: Cached Mempool Verification Bypasses Consensus Rules for Ahead-of-Tip Blocks
GHSA-xvj8-ph7x-65gf
pkg: zebra-consensus, zebrad
eco: rust
published: Apr 18, 2026
# CVE-2026-40880: Cached Mempool Verification Bypasses Consensus Rules for Ahead-of-Tip Blocks

## Summary

A logic error in Zebra's transaction verification cache could allow a malicious miner to induce a consensus split. By carefully submitting a transaction that is valid for height `H+1` but inva…

CVE-2026-40880
GitHub-GHSA

HIGH
OpenClaw: Webchat media embedding enforces local-root containment for tool-result files
GHSA-mr34-9552-qr95
pkg: openclaw
eco: npm
published: Apr 17, 2026
## Summary

Webchat tool-result media normalization could pass local and UNC-style file paths into the host-side media embedding path without applying the configured local-root containment policy.

## Impact

A crafted tool-result media reference could cause the host to attempt local file reads or W…

GitHub-GHSA

HIGH
OpenClaw: Matrix room control-command authorization no longer trusts DM pairing-store entries
GHSA-2gvc-4f3c-2855
pkg: openclaw
eco: npm
published: Apr 17, 2026
## Summary

Matrix room control-command authorization used the effective allowlist for room traffic, which included sender IDs learned from the Matrix DM pairing store. A sender who was allowed only for a Matrix DM could therefore authorize room control commands when they also posted in a bot room.

GitHub-GHSA

HIGH
OpenClaw: Gateway HTTP endpoints re-resolve bearer auth after SecretRef rotation
GHSA-xmxx-7p24-h892
pkg: openclaw
eco: npm
published: Apr 17, 2026
## Summary

Gateway HTTP and WebSocket handlers captured the resolved bearer-auth configuration when the server started. After a SecretRef rotation, the already-running gateway could continue accepting the old bearer token until restart.

## Impact

A bearer token that should have been revoked by Se…

GitHub-GHSA

HIGH
OpenClaw: QQBot media tags could read arbitrary local files through reply text
GHSA-66r7-m7xm-v49h
pkg: openclaw
eco: npm
published: Apr 17, 2026
## Summary

QQBot media tags could read arbitrary local files through reply text.

## Affected Packages / Versions

– Package: `openclaw`
– Ecosystem: npm
– Affected versions: `< 2026.4.10`
– Patched versions: `>= 2026.4.10`

## Impact

QQBot outbound media tags in AI reply text could reference host…

GitHub-GHSA

HIGH
OpenClaw: busybox and toybox applet execution weakened exec approval binding
GHSA-2cq5-mf3v-mx44
pkg: openclaw
eco: npm
published: Apr 17, 2026
## Summary

busybox and toybox applet execution weakened exec approval binding.

## Affected Packages / Versions

– Package: `openclaw`
– Ecosystem: npm
– Affected versions: `>= 2026.2.23 < 2026.4.12`
– Patched versions: `>= 2026.4.12`

## Impact

Opaque multi-call binaries such as `busybox` and `to…

GitHub-GHSA

HIGH
OpenClaw: Matrix profile config persistence was reachable from operator.write message tools
GHSA-7jp6-r74r-995q
pkg: openclaw
eco: npm
published: Apr 17, 2026
## Summary

Matrix profile config persistence was reachable from operator.write message tools.

## Affected Packages / Versions

– Package: `openclaw`
– Ecosystem: npm
– Affected versions: `< 2026.4.10`
– Patched versions: `>= 2026.4.10`

## Impact

Gateway `operator.write` message-tool paths could …

GitHub-GHSA

HIGH
OpenClaw: Sandboxed agents could escape exec routing via host=node override
GHSA-736r-jwj6-4w23
pkg: openclaw
eco: npm
published: Apr 17, 2026
## Summary

Sandboxed agents could escape exec routing via host=node override.

## Affected Packages / Versions

– Package: `openclaw`
– Ecosystem: npm
– Affected versions: `>= 2026.4.5 < 2026.4.10`
– Patched versions: `>= 2026.4.10`

## Impact

A sandboxed agent could request `host: "node"` and rou…

GitHub-GHSA

HIGH
OpenClaw: Workspace provider auth choices could auto-enable untrusted provider plugins
GHSA-939r-rj45-g2rj
pkg: openclaw
eco: npm
published: Apr 17, 2026
## Summary

Workspace provider auth choices could auto-enable untrusted provider plugins.

## Affected Packages / Versions

– Package: `openclaw`
– Ecosystem: npm
– Affected versions: `< 2026.4.9`
– Patched versions: `>= 2026.4.9`

## Impact

Non-interactive onboarding could select a provider auth c…

GitHub-GHSA

HIGH
OpenClaw: Sandbox browser CDP relay could expose DevTools protocol on 0.0.0.0
GHSA-525j-hqq2-66r4
pkg: openclaw
eco: npm
published: Apr 17, 2026
## Summary

Sandbox browser CDP relay could expose DevTools protocol on 0.0.0.0.

## Affected Packages / Versions

– Package: `openclaw`
– Ecosystem: npm
– Affected versions: `< 2026.4.10`
– Patched versions: `>= 2026.4.10`

## Impact

The sandbox browser CDP relay could bind too broadly, exposing C…

GitHub-GHSA

HIGH
OpenClaw: Channel setup catalog lookups could include untrusted workspace plugin shadows
GHSA-82qx-6vj7-p8m2
pkg: openclaw
eco: npm
published: Apr 17, 2026
## Summary

Channel setup catalog lookups could include untrusted workspace plugin shadows.

## Affected Packages / Versions

– Package: `openclaw`
– Ecosystem: npm
– Affected versions: `< 2026.4.10`
– Patched versions: `>= 2026.4.10`

## Impact

Channel setup could resolve a workspace plugin shadow…

GitHub-GHSA

HIGH
OpenClaw: Exec environment denylist missed high-risk interpreter startup variables
GHSA-vfp4-8×56-j7c5
pkg: openclaw
eco: npm
published: Apr 17, 2026
## Summary

Exec environment denylist missed high-risk interpreter startup variables.

## Affected Packages / Versions

– Package: `openclaw`
– Ecosystem: npm
– Affected versions: `< 2026.4.10`
– Patched versions: `>= 2026.4.10`

## Impact

The exec environment policy missed interpreter startup vari…

GitHub-GHSA

HIGH
OpenClaw: Voice-call realtime WebSocket accepted oversized frames
GHSA-vw3h-q6xq-jjm5
pkg: openclaw
eco: npm
published: Apr 17, 2026
## Summary

Voice-call realtime WebSocket accepted oversized frames.

## Affected Packages / Versions

– Package: `openclaw`
– Ecosystem: npm
– Affected versions: `>= 2026.4.9 < 2026.4.10`
– Patched versions: `>= 2026.4.10`

## Impact

The voice-call realtime WebSocket path could accept oversized fr…

GitHub-GHSA

HIGH
OpenClaw: config.get redaction bypass through sourceConfig and runtimeConfig aliases
GHSA-8372-7vhw-cm6q
pkg: openclaw
eco: npm
published: Apr 17, 2026
## Summary

config.get redaction bypass through sourceConfig and runtimeConfig aliases.

## Affected Packages / Versions

– Package: `openclaw`
– Ecosystem: npm
– Affected versions: `< 2026.4.14`
– Patched versions: `>= 2026.4.14`

## Impact

An authenticated gateway client with config read access c…

GitHub-GHSA

HIGH
Flowise: Unauthenticated TTS endpoint accepts arbitrary credential IDs — enables API credit abuse via stored credentials
GHSA-5fw2-mwhh-9947
pkg: flowise
eco: npm
published: Apr 17, 2026
### Summary

The text-to-speech generation endpoint (`POST /api/v1/text-to-speech/generate`) is whitelisted (no auth) and accepts a `credentialId` directly in the request body. When called without a `chatflowId`, the endpoint uses the provided `credentialId` to decrypt the stored credential (e.g., O…

GitHub-GHSA

HIGH
Flowise: Public chatflow endpoints return unsanitized flowData including plaintext API keys, passwords, and credential IDs
GHSA-w47f-j8rh-wx87
pkg: flowise
eco: npm
published: Apr 17, 2026
### Summary

The `GET /api/v1/public-chatflows/:id` endpoint returns the full chatflow object **without sanitization** for public chatflows. Docker validation revealed this is worse than initially assessed: the `sanitizeFlowDataForPublicEndpoint` function does NOT exist in the released v3.0.13 Docke…

GitHub-GHSA

HIGH
Flowise: Mass Assignment in DocumentStore Create Endpoint Leads to Cross-Workspace Object Takeover (IDOR)
GHSA-3prp-9gf7-4rxx
pkg: flowise
eco: npm
published: Apr 17, 2026
### Summary
A Mass Assignment vulnerability in the DocumentStore creation endpoint allows authenticated users to control the primary key (id) and internal state fields of DocumentStore entities.

Because the service uses repository.save() with a client-supplied primary key, the POST create endpoint …

GitHub-GHSA

HIGH
Bouncy Castle Uncontrolled Resource Consumption vulnerability
GHSA-cj8j-37rh-8475
pkg: org.bouncycastle:bcpg-jdk12, org.bouncycastle:bcpg-jdk14, org.bouncycastle:bcpg-jdk15
eco: maven
published: Apr 17, 2026
Allocation of resources without limits or throttling vulnerability in Legion of the Bouncy Castle Inc. BC-JAVA bcpg on all (pg modules). This issue affects BC-JAVA before 1.84.

Unbounded PGP AEAD chunk size leads to pre-auth resource exhaustion.

CVE-2026-3505
GitHub-GHSA

HIGH
PAC4J has a Cross-Site Request Forgery (CSRF) Vulnerability
GHSA-xw5c-jc7x-gf75
pkg: org.pac4j:pac4j-core, org.pac4j:pac4j-core
eco: maven
published: Apr 17, 2026
PAC4J is vulnerable to Cross-Site Request Forgery (CSRF). A malicious attacker can craft a specially designed website which, when visited by a user, will automatically submit a forged cross-site request with a token whose hash collides with the victim's legitimate CSRF token. Importantly, the attack…
CVE-2026-40458
GitHub-GHSA

HIGH
OAuth 2.1 Provider: Unprivileged users can register OAuth clients
GHSA-xr8f-h2gw-9xh6
pkg: @better-auth/oauth-provider, @better-auth/oauth-provider
eco: npm
published: Apr 16, 2026
### Summary
An authorization bypass in the OAuth provider allows any authenticated low-privilege user to create OAuth clients even when the deployment configures clientPrivileges to restrict client creation. The option contract explicitly includes a create action, but the create paths never invoke t…
GitHub-GHSA

HIGH
Angular: SSRF via protocol-relative and backslash URLs in Angular Platform-Server
GHSA-45q2-gjvg-7973
pkg: @angular/platform-server, @angular/platform-server, @angular/platform-server
eco: npm
published: Apr 16, 2026
### Impact

A [Server-Side Request Forgery (SSRF)](https://developer.mozilla.org/en-US/docs/Web/Security/Attacks/SSRF) vulnerability exists in `@angular/platform-server` due to improper handling of URLs during Server-Side Rendering (SSR).

When an attacker sends a request such as `GET /\evil.com/ HT…

GitHub-GHSA

HIGH
Flowise: resetPassword Authentication Bypass Vulnerability
GHSA-f6hc-c5jr-878p
pkg: flowise
eco: npm
published: Apr 16, 2026
ZDI-CAN-28762: Flowise AccountService resetPassword Authentication Bypass Vulnerability

— ABSTRACT ————————————-

Trend Micro's Zero Day Initiative has identified a vulnerability affecting the following products:
Flowise – Flowise

— VULNERABILITY DETAILS —————–…

GitHub-GHSA

HIGH
Flowise: Cypher Injection in GraphCypherQAChain
GHSA-28g4-38q8-3cwc
pkg: flowise, flowise-components
eco: npm
published: Apr 16, 2026
## Summary

The GraphCypherQAChain node forwards user-provided input directly into the Cypher query execution pipeline without proper sanitization. An attacker can inject arbitrary Cypher commands that are executed on the underlying Neo4j database, enabling data exfiltration, modification, or deleti…

GitHub-GHSA

HIGH
Flowise: Password Reset Link Sent Over Unsecured HTTP
GHSA-x5w6-38gp-mrqh
pkg: flowise
eco: npm
published: Apr 16, 2026
**Summary:**
The password reset functionality on [cloud.flowiseai.com](http://cloud.flowiseai.com/) sends a reset password link over the unsecured HTTP protocol instead of HTTPS. This behavior introduces the risk of a man-in-the-middle (MITM) attack, where an attacker on the same network as the user…
GitHub-GHSA

HIGH
Flowise: Unauthenticated OAuth 2.0 Access Token Disclosure via Public Chatflow in Flowise
GHSA-6f7g-v4pp-r667
pkg: flowise
eco: npm
published: Apr 16, 2026
### Summary
Flowise contains an authentication bypass vulnerability that allows an unauthenticated attacker to obtain OAuth 2.0 access tokens associated with a public chatflow.

By accessing a public chatflow configuration endpoint, an attacker can retrieve internal workflow data, including OAuth cr…

GitHub-GHSA

HIGH
Flowise: Sensitive Data Leak in public-chatbotConfig
GHSA-4jpm-cgx2-8h37
pkg: flowise
eco: npm
published: Apr 16, 2026
### Summary

`/api/v1/public-chatbotConfig/:id `ep exposes sensitive data including API keys, HTTP authorization headers and internal configuration without any authentication. An attacker with knowledge just of a chatflow UUID can retrieve credentials stored in password type fields and HTTP headers,…

GitHub-GHSA

HIGH
MCP-Framework: Unbounded memory allocation in readRequestBody allows denial of service via HTTP transport
GHSA-353c-v8x9-v7c3
pkg: mcp-framework
eco: npm
published: Apr 16, 2026
### Summary

The `readRequestBody()` function in `src/transports/http/server.ts` concatenates HTTP request body chunks into a string with no size limit, allowing a remote unauthenticated attacker to crash the server via memory exhaustion with a single large HTTP POST request.

### Details

**File:**…

CVE-2026-39313
GitHub-GHSA

HIGH
SpdyStream: DOS on CRI
GHSA-pc3f-x583-g7j2
pkg: github.com/moby/spdystream
eco: go
published: Apr 16, 2026
The SPDY/3 frame parser in spdystream does not validate
attacker-controlled counts and lengths before allocating memory. A
remote peer that can send SPDY frames to a service using spdystream can
cause the process to allocate gigabytes of memory with a small number of
malformed control frames, leadin…
CVE-2026-35469
GitHub-GHSA

HIGH
Uncontrolled resource consumption and loop with unreachable exit condition in facil.io and downstream iodine ruby gem
GHSA-2×79-gwq3-vxxm
pkg: iodine
eco: rubygems
published: Apr 14, 2026
### Summary
`fio_json_parse` can enter an infinite loop when it encounters a nested JSON value starting with `i` or `I`. The process spins in user space and pegs one CPU core at ~100% instead of returning a parse error. Because `iodine` vendors the same parser code, the issue also affects `iodine` w…
GitHub-GHSA

HIGH
MinIO has an Unauthenticated Object Write via Query-String Credential Signature Bypass in Unsigned-Trailer Uploads
GHSA-hv4r-mvr4-25vw
pkg: github.com/minio/minio
eco: go
published: Apr 14, 2026
### Impact

_What kind of vulnerability is it? Who is impacted?_

An authentication bypass vulnerability in MinIO's `STREAMING-UNSIGNED-PAYLOAD-TRAILER` code path
allows any user who knows a valid access key to write arbitrary objects to any bucket without knowing
the secret key or providing a valid…

GitHub-GHSA

HIGH
Kiota: Code Generation Literal Injection
GHSA-2hx3-vp6r-mg3f
pkg: kiota
eco: nuget
published: Apr 14, 2026
# Code Generation Literal Injection in Kiota

## Summary

Kiota versions **prior to 1.31.1** are affected by a code-generation literal injection vulnerability in multiple writer sinks (for example: serialization/deserialization keys, path/query parameter mappings, URL template metadata, enum/propert…

GitHub-GHSA

HIGH
Oxia's TLS CA certificate chain validation fails with multi-certificate PEM bundles
GHSA-7jrq-q4pq-rhm6
pkg: github.com/oxia-db/oxia
eco: go
published: Apr 14, 2026
### Summary
The `trustedCertPool()` function in the TLS configuration only parses the first PEM block from CA certificate files. When a CA bundle contains multiple certificates (e.g., intermediate + root CA), only the first certificate is loaded. This silently breaks certificate chain validation for…
GitHub-GHSA

HIGH
Oxia affected by server crash via race condition in session heartbeat handling
GHSA-5gqc-qhrj-9xw8
pkg: github.com/oxia-db/oxia
eco: go
published: Apr 14, 2026
### Summary
A race condition between session heartbeat processing and session closure can cause the server to panic with `send on closed channel`. The `heartbeat()` method uses a blocking channel send while holding a mutex, and under specific timing with concurrent `close()` calls, this can lead to …
GitHub-GHSA

HIGH
Oxia exposes bearer token in debug log messages on authentication failure
GHSA-pm7q-rjjx-979p
pkg: github.com/oxia-db/oxia
eco: go
published: Apr 14, 2026
### Summary
When OIDC authentication fails, the full bearer token is logged at DEBUG level in plaintext. If debug logging is enabled in production, JWT tokens are exposed in application logs and any connected log aggregation system.

### Impact
An attacker with access to application logs (e.g., via …

GitHub-GHSA

HIGH
goshs's public collaborator feed leaks .goshs ACL credentials and enables unauthorized access
GHSA-7h3j-592v-jcrp
pkg: github.com/patrickhener/goshs/v2
eco: go
published: Apr 14, 2026
### Summary
goshs leaks file-based ACL credentials through its public collaborator feed when the server is deployed without global basic auth. Requests to `.goshs`-protected folders are logged before authorization is enforced, and the collaborator websocket broadcasts raw request headers, including …
CVE-2026-40885
GitHub-GHSA

HIGH
SFTP root escape via prefix-based path validation in goshs
GHSA-5h6h-7rc9-3824
pkg: github.com/patrickhener/goshs, github.com/patrickhener/goshs/v2
eco: go
published: Apr 14, 2026
### Summary
goshs contains an SFTP root escape caused by prefix-based path validation. An authenticated SFTP user can read from and write to filesystem paths outside the configured SFTP root, which breaks the intended jail boundary and can expose or modify unrelated server files.

### Details
The SF…

CVE-2026-40876
GitHub-GHSA

HIGH
free5gc UDR improper path validation allows unauthenticated creation and modification of Traffic Influence Subscriptions
GHSA-jgq2-qv8v-5cmj
pkg: github.com/free5gc/udr
eco: go
published: Apr 14, 2026
### Summary
An improper path validation vulnerability in the UDR service allows any unauthenticated attacker with access to the 5G Service Based Interface (SBI) to create or overwrite Traffic Influence Subscriptions by supplying an arbitrary value in place of the expected `subs-to-notify` path segme…
CVE-2026-40248
GitHub-GHSA

HIGH
free5gc UDR improper path validation allows unauthenticated access to Traffic Influence Subscriptions
GHSA-x5r2-r74c-3w28
pkg: github.com/free5gc/udr
eco: go
published: Apr 14, 2026
### Summary
An improper path validation vulnerability in the UDR service allows any unauthenticated attacker with access to the 5G Service Based Interface (SBI) to read Traffic Influence Subscriptions by supplying an arbitrary value in place of the expected `subs-to-notify` path segment.

### Detail…

CVE-2026-40247
GitHub-GHSA

HIGH
free5gc UDR improper path validation allows unauthenticated deletion of Traffic Influence Subscriptions
GHSA-g9cw-qwhf-24jp
pkg: github.com/free5gc/udr
eco: go
published: Apr 14, 2026
### Summary
An improper path validation vulnerability in the UDR service allows any unauthenticated attacker with access to the 5G Service Based Interface (SBI) to delete Traffic Influence Subscriptions by supplying an arbitrary value in place of the expected `subs-to-notify` path segment.

### Deta…

CVE-2026-40246
GitHub-GHSA

HIGH
SP1 V6 Recursion Circuit Row-Count Binding Gap
GHSA-63×8-x938-vx33
pkg: sp1_sdk, sp1_recursion_circuit, sp1_prover
eco: rust
published: Apr 14, 2026
## Summary

A soundness vulnerability in the SP1 V6 recursive shard verifier allows a malicious prover to construct a recursive proof from a shard proof that the native verifier would reject.

– **Affected versions:** `>= 6.0.0, <= 6.0.2`
– **Not affected:** SP1 V5 (all versions)
– **Severity:** Hig…

CVE-2026-40323
GitHub-GHSA

HIGH
MinIO has an Unauthenticated Object Write via Missing Signature Verification in Unsigned-Trailer Uploads
GHSA-9c4q-hq6p-c237
pkg: github.com/minio/minio
eco: go
published: Apr 14, 2026
### Impact

_What kind of vulnerability is it? Who is impacted?_

Two authentication bypass vulnerabilities in MinIO's `STREAMING-UNSIGNED-PAYLOAD-TRAILER` code path
allow any user who knows a valid access key to write arbitrary objects to any bucket without knowing
the secret key or providing a val…

GitHub-GHSA

HIGH
In monetr, unauthenticated Stripe webhook reads attacker-sized request bodies before signature validation
GHSA-v7xq-3wx6-fqc2
pkg: github.com/monetr/monetr
eco: go
published: Apr 14, 2026
### Summary

The public Stripe webhook endpoint fully reads the request body into memory before validating the Stripe signature. A remote unauthenticated attacker can send oversized POST bodies and cause substantial memory growth, leading to denial of service.

### Details

When Stripe webhooks are …

CVE-2026-40481
GitHub-GHSA

HIGH
FITS GZIP decompression bomb in Pillow
GHSA-whj4-6x5x-4v2j
pkg: pillow
eco: pip
published: Apr 13, 2026
### Impact
Pillow did not limit the amount of GZIP-compressed data read when decoding a FITS image, making it vulnerable to decompression bomb attacks. A specially crafted FITS file could cause unbounded memory consumption, leading to denial of service (OOM crash or severe performance degradation).
CVE-2026-40192
GitHub-GHSA

HIGH
External Secrets Operator has DNS-based secret exfiltration via getHostByName in External Secrets v2 template engine
GHSA-r2pg-r6h7-crf3
pkg: github.com/external-secrets/external-secrets, github.com/external-secrets/external-secrets
eco: go
published: Apr 13, 2026
## Summary

The v2 template engine in `runtime/template/v2/template.go` imports Sprig’s `TxtFuncMap()` and removes `env` and `expandenv`, but leaves `getHostByName` available to user-controlled templates. Because ESO executes templates inside the controller process, an attacker who can create or …

CVE-2026-34984
GitHub-GHSA

MEDIUM
ImageMagick has has a stack-buffer-overflow in MNG encoder with oversized pallete
GHSA-98cp-rj9f-6v5g
pkg: Magick.NET-Q16-AnyCPU, Magick.NET-Q16-HDRI-AnyCPU, Magick.NET-Q16-HDRI-OpenMP-arm64
eco: nuget
published: Apr 14, 2026
The patch for GHSA-7h7q-j33q-hvpf was incomplete and still allows a stack buffer overflow for the multi frame images.
GitHub-GHSA

MEDIUM
Keycloak: Arbitrary code execution via Stored Cross-Site Scripting (XSS) in organization selection login page
GHSA-m32f-8vh9-2hh3
pkg: org.keycloak:keycloak-services
eco: maven
published: Apr 14, 2026
A flaw was found in Keycloak, specifically in the organization selection login page. A remote attacker with `manage-realm` or `manage-organizations` administrative privileges can exploit a Stored Cross-Site Scripting (XSS) vulnerability. This flaw occurs because the `organization.alias` is placed in…
CVE-2026-37980
GitHub-GHSA

MEDIUM
Weblate: JavaScript localization CDN add-on allows arbitrary local file read outside the repository
GHSA-mqph-7h49-hqfm
pkg: weblate
eco: pip
published: Apr 16, 2026
### Impact
The translation memory API exposed unintended endpoints, which in turn didn't do proper access control.

### Patches
* https://github.com/WeblateOrg/weblate/pull/18516

### Workarounds
The CDN add-on is not enabled by default.

### References
Thanks to @spbavarva for reporting this respon…

CVE-2026-33220
GitHub-GHSA

MEDIUM
OAuth2 Proxy has an Authorization Bypass in Email Domain Validation via Malformed Multi-@ Email Claims
GHSA-c5c4-8r6x-56w3
pkg: github.com/oauth2-proxy/oauth2-proxy/v7
eco: go
published: Apr 15, 2026
### Impact

An authorization bypass exists in OAuth2 Proxy as part of the `email_domain` enforcement option. An attacker may be able to authenticate with an email claim such as `attacker@evil.com@company.com` and satisfy an allowed domain check for `company.com`, even though the claim is not a valid…

CVE-2026-40574
GitHub-GHSA

MEDIUM
AsyncHttpClient leaks authorization credentialsto untrusted domains on cross-origin redirects
GHSA-cmxv-58fp-fm3g
pkg: org.asynchttpclient:async-http-client
eco: maven
published: Apr 14, 2026
### Impact
When redirect following is enabled (followRedirect(true)), AsyncHttpClient forwards Authorization and Proxy-Authorization headers along with Realm credentials to arbitrary redirect targets regardless of domain, scheme, or port changes. This leaks credentials on cross-domain redirects and …
CVE-2026-40490
GitHub-GHSA

MEDIUM
MailKit has STARTTLS Response Injection via unflushed stream buffer that enables SASL mechanism downgrade
GHSA-9j88-vvj5-vhgr
pkg: MailKit
eco: nuget
published: Apr 18, 2026
### Summary

A STARTTLS Response Injection vulnerability in MailKit allows a Man-in-the-Middle attacker to inject arbitrary protocol responses across the plaintext-to-TLS trust boundary, enabling SASL authentication mechanism downgrade (e.g., forcing PLAIN instead of SCRAM-SHA-256). The internal rea…

GitHub-GHSA

MEDIUM
Amazon EFS CSI Driver has mount option injection via unsanitized volumeHandle and mounttargetip fields
GHSA-mph4-q2vm-w2pw
pkg: github.com/kubernetes-sigs/aws-efs-csi-driver
eco: go
published: Apr 18, 2026
### Summary
The Amazon EFS CSI Driver is a Container Storage Interface driver that allows Kubernetes clusters to use Amazon Elastic File System. An issue exists where, under certain circumstances, unsanitized values in the volumeHandle and mounttargetip fields are passed directly to the mount comman…
CVE-2026-6437
GitHub-GHSA

MEDIUM
LangChain Text Splitters: HTMLHeaderTextSplitter.split_text_from_url SSRF Redirect Bypass
GHSA-fv5p-p927-qmxr
pkg: langchain-text-splitters
eco: pip
published: Apr 16, 2026
## Summary

`HTMLHeaderTextSplitter.split_text_from_url()` validated the initial URL using `validate_safe_url()` but then performed the fetch with `requests.get()` with redirects enabled (the default). Because redirect targets were not revalidated, a URL pointing to an attacker-controlled server cou…

GitHub-GHSA

MEDIUM
Paperclip: Arbitrary File Read via Agent-Controlled adapterConfig.instructionsFilePath
GHSA-3pw3-v88x-xj24
pkg: @paperclipai/shared
eco: npm
published: Apr 16, 2026
### Summary
Paperclip contains an arbitrary file read vulnerability that allows an attacker with an Agent API key to read files from the Paperclip server host filesystem.
The vulnerability occurs because agents are allowed to modify their own adapterConfig through the /agents/:id API endpoint.
The c…
GitHub-GHSA

MEDIUM
Apache Airlfow: Sensitive Azure Service Bus connection string (and possibly other providers) exposed to users with view access
GHSA-4g48-54q2-fg7q
pkg: apache-airflow
eco: pip
published: Apr 15, 2026
The `access_key` and `connection_string` connection properties were not marked as sensitive names in secrets masker. This means that user with read permission could see the values in Connection UI, as well as when Connection was accidently logged to logs, those values could be seen in the logs. Azur…
CVE-2026-25219
GitHub-GHSA

MEDIUM
frp has an authentication bypass in HTTP vhost routing when routeByHTTPUser is used for access control
GHSA-pq96-pwvg-vrr9
pkg: github.com/fatedier/frp
eco: go
published: Apr 14, 2026
### Summary
frp contains an authentication bypass in the HTTP vhost routing path when `routeByHTTPUser` is used as part of access control. In proxy-style requests, the routing logic uses the username from `Proxy-Authorization` to select the `routeByHTTPUser` backend, while the access control check u…
GitHub-GHSA

MEDIUM
gdown Affected by Arbitrary File Write via Path Traversal in gdown.extractall
GHSA-76hw-p97h-883f
pkg: gdown
eco: pip
published: Apr 14, 2026
### Summary
The gdown library (tested on v5.2.1) is vulnerable to a Path Traversal attack within its extractall functionality. When extracting a maliciously crafted ZIP or TAR archive, the library fails to sanitize or validate the filenames of the archive members. This allow files to be written outs…
CVE-2026-40491
GitHub-GHSA

MEDIUM
ImageMagick has an off-by-one error in MSL decoder could result in crash
GHSA-5xg3-585r-9jh5
pkg: Magick.NET-Q16-AnyCPU, Magick.NET-Q16-HDRI-AnyCPU, Magick.NET-Q16-HDRI-OpenMP-arm64
eco: nuget
published: Apr 14, 2026
An off by one error in de MSL decoder could result in a crash when a malicous msl file is read.
CVE-2026-40312
GitHub-GHSA

MEDIUM
ImageMagick has a heap buffer overflow (WRITE) in the YAML and JSON encoders.
GHSA-5592-p365-24xh
pkg: Magick.NET-Q16-AnyCPU, Magick.NET-Q16-HDRI-AnyCPU, Magick.NET-Q16-HDRI-OpenMP-arm64
eco: nuget
published: Apr 14, 2026
A crafted image could result in an out of bounds heap write when writing a yaml or json output and that could result in a crash.
CVE-2026-40169
GitHub-GHSA

MEDIUM
pretalx mail templates vulnerable to email injection via unescaped user-controlled placeholders
GHSA-jm8c-9f3j-4378
pkg: pretalx
eco: pip
published: Apr 18, 2026
An unauthenticated attacker can send arbitrary HTML-rendered emails from a pretalx instance's configured sender address by embedding malformed HTML or markdown link syntax in a user-controlled template placeholder such as the account display name. The most direct vector is the password-reset flow: t…
GitHub-GHSA

MEDIUM
goldmark vulnerable to Cross-site Scripting (XSS)
GHSA-c97m-vxhj-p7j6
pkg: github.com/yuin/goldmark/renderer/html
eco: go
published: Apr 17, 2026
Versions of the package github.com/yuin/goldmark/renderer/html before 1.7.17 are vulnerable to Cross-site Scripting (XSS) due to improper ordering of URL validation and normalization. The renderer validates link destinations using a prefix-based check (IsDangerousURL) before resolving HTML entities.…
CVE-2026-5160
GitHub-GHSA

MEDIUM
zrok: Reflected XSS in GitHub OAuth callback via unsanitized refreshInterval error rendering
GHSA-4fxq-2x3x-6xqx
pkg: github.com/openziti/zrok, github.com/openziti/zrok/v2
eco: go
published: Apr 16, 2026
**Summary**
The proxyUi template engine uses Go's text/template (which performs no HTML escaping) instead of html/template. The GitHub OAuth callback handlers in both publicProxy and dynamicProxy embed the attacker-controlled refreshInterval query parameter verbatim into an error message when time.P…
CVE-2026-40302
GitHub-GHSA

MEDIUM
sanitize-html allowedTags Bypass via Entity-Decoded Text in nonTextTags Elements
GHSA-9mrh-v2v3-xpfm
pkg: sanitize-html
eco: npm
published: Apr 16, 2026
## Summary

Commit 49d0bb7 introduced a regression in sanitize-html that bypasses `allowedTags` enforcement for text inside `nonTextTagsArray` elements (`textarea` and `option`). Entity-encoded HTML inside these elements passes through the sanitizer as decoded, unescaped HTML, allowing injection of …

CVE-2026-40186
GitHub-GHSA

MEDIUM
SpiceDB's SPICEDB_DATASTORE_CONN_URI is leaked on startup logs
GHSA-jf4f-rr2c-9m58
pkg: github.com/authzed/spicedb
eco: go
published: Apr 14, 2026
### Impact
When SpiceDB starts with log level `info`, the startup `"configuration"` log will include the full datastore DSN, including the plaintext password, inside `DatastoreConfig.URI`.

### Patches
v1.51.1

### Workarounds
Change the log level to `warn` or `error`.

CVE-2026-40091
GitHub-GHSA

MEDIUM
OpenTelemetry .NET has potential memory exhaustion via unbounded pooled-list sizing in Jaeger exporter conversion path
GHSA-38h3-2333-qx47
pkg: OpenTelemetry.Exporter.Jaeger
eco: nuget
published: Apr 18, 2026
### Summary

> [!IMPORTANT]
> There is no plan to fix this issue as `OpenTelemetry.Exporter.Jaeger` was deprecated in 2023. It is for informational purposes only.

`OpenTelemetry.Exporter.Jaeger` may allow sustained memory pressure when the internal pooled-list sizing grows based on a large observ…

CVE-2026-41078
GitHub-GHSA

MEDIUM
@fastify/static vulnerable to route guard bypass via encoded path separators
GHSA-x428-ghpx-8j92
pkg: @fastify/static
eco: npm
published: Apr 16, 2026
### Impact

`@fastify/static` v9.1.0 and earlier decodes percent-encoded path separators (`%2F`) before filesystem resolution, but Fastify's router treats them as literal characters. This creates a routing mismatch: route guards on `/admin/*` do not match `/admin%2Fsecret.html`, but @fastify/static …

CVE-2026-6414
GitHub-GHSA

MEDIUM
Junrar: Path Traversal (Zip-Slip) via Sibling Directory Name Prefix
GHSA-hf5p-q87m-crj7
pkg: com.github.junrar:junrar
eco: maven
published: Apr 16, 2026
### Summary

A path traversal vulnerability in `LocalFolderExtractor` allows an attacker to write arbitrary files with attacker-controlled content into sibling directories when a crafted RAR archive is extracted.

### Example

Given an extraction directory set to `/tmp/extract`, a crafted archive wi…

GitHub-GHSA

MEDIUM
@node-oauth/oauth2-server: PKCE code_verifier ABNF not enforced in token exchange allows brute-force redemption of intercepted authorization codes
GHSA-jhm7-29pj-4xvf
pkg: @node-oauth/oauth2-server
eco: npm
published: Apr 16, 2026
## Summary

The token exchange path accepts RFC7636-invalid `code_verifier` values (including one-character strings) for `S256` PKCE flows.
Because short/weak verifiers are accepted and failed verifier attempts do not consume the authorization code, an attacker who intercepts an authorization code…

GitHub-GHSA

MEDIUM
Note Mark has Broken Access Control on Asset Download
GHSA-p5w6-75f9-cc2p
pkg: github.com/enchant97/note-mark/backend
eco: go
published: Apr 13, 2026
### Summary
A broken access control vulnerability allows unauthenticated users to retrieve note assets directly from the asset download endpoint when they know both the note UUID and asset UUID. This exposes the full contents of private note assets without authentication, even when the associated bo…
CVE-2026-40265
GitHub-GHSA

MEDIUM
ImageMagick has a heap overflow caused by integer overflow/wraparound in viff encoder on 32-bit builds
GHSA-v67w-737x-v2c9
pkg: Magick.NET-Q16-AnyCPU, Magick.NET-Q16-HDRI-AnyCPU, Magick.NET-Q16-HDRI-x86
eco: nuget
published: Apr 13, 2026
In viff encoder contains an integer truncation/wraparound issue on 32-bit builds that could trigger an out of bounds heap write that can result in a crash.
CVE-2026-33900
GitHub-GHSA

MEDIUM
Home Assistant Command-line Interface: Handling of user-supplied Jinja2 templates
GHSA-33qf-q99x-wpm8
pkg: homeassistant-cli
eco: pip
published: Apr 16, 2026
### Impact

Up to 1.0.0 of `home-assitant-cli` (or `hass-cli` for short) an unrestricted environment was used to handle Jninja2 templates instead of a sandboxed one. The user-supplied input within Jinja2 templates was rendered locally with no restrictions. This gave users access to Python's internal…

CVE-2026-40602
GitHub-GHSA

MEDIUM
Flowise: Weak Default Token Hash Secret
GHSA-m7mq-85xj-9×33
pkg: flowise
eco: npm
published: Apr 16, 2026
**Detection Method:** Kolega.dev Deep Code Scan

| Attribute | Value |
|—|—|
| Location | packages/server/src/enterprise/utils/tempTokenUtils.ts:31-34 |
| Practical Exploitability | Medium |
| Developer Approver | faizan@kolega.ai |

### Description
The encryption key for token encryption has a …

GitHub-GHSA

MEDIUM
Flowise: Weak Default Express Session Secret
GHSA-2qqc-p94c-hxwh
pkg: flowise
eco: npm
published: Apr 16, 2026
**Detection Method:** Kolega.dev Deep Code Scan

| Attribute | Value |
|—|—|
| Location | packages/server/src/enterprise/middleware/passport/index.ts:55 |
| Practical Exploitability | High |
| Developer Approver | faizan@kolega.ai |

### Description
Express session secret has a weak default valu…

GitHub-GHSA

MEDIUM
Flowise: Weak Default JWT Secrets
GHSA-cc4f-hjpj-g9p8
pkg: flowise
eco: npm
published: Apr 16, 2026
**Detection Method:** Kolega.dev Deep Code Scan

| Attribute | Value |
|—|—|
| Severity | Critical |
| Location | packages/server/src/enterprise/middleware/passport/index.ts:29-34 |
| Practical Exploitability | High |
| Developer Approver | faizan@kolega.ai |

### Description
JWT secrets have we…

GitHub-GHSA

MEDIUM
ImageMagick has a heap-use-after-free via XMP profile could result in a crash when printing the values.
GHSA-r83h-crwp-3vm7
pkg: Magick.NET-Q16-AnyCPU, Magick.NET-Q16-HDRI-AnyCPU, Magick.NET-Q16-HDRI-OpenMP-arm64
eco: nuget
published: Apr 14, 2026
An heap use after free when reading an invalid XMP profile could result in a crash due to an heap use after free when printing the values.
CVE-2026-40311
GitHub-GHSA

MEDIUM
ImageMagick has a heap out-of-bounds write in JP2 encoder
GHSA-pwg5-6jfc-crvh
pkg: Magick.NET-Q16-AnyCPU, Magick.NET-Q16-HDRI-AnyCPU, Magick.NET-Q16-HDRI-OpenMP-arm64
eco: nuget
published: Apr 14, 2026
Heap out-of-bounds write in the JP2 encoder with when a user specifies an invalid sampling index.
CVE-2026-40310
GitHub-GHSA

MEDIUM
ImageMagick has a heap buffer overflow when encoding JXL image with a 16-bit float
GHSA-jvgr-9ph5-m8v4
pkg: Magick.NET-Q16-AnyCPU, Magick.NET-Q16-HDRI-AnyCPU, Magick.NET-Q16-HDRI-OpenMP-arm64
eco: nuget
published: Apr 14, 2026
The JXL encoder has an heap write overflow when a user specifies that the image should be encoded as 16 bit floats.
CVE-2026-40183
GitHub-GHSA

MEDIUM
ImageMagick has an out-of-bounds read in sample operation
GHSA-pcvx-ph33-r5vv
pkg: Magick.NET-Q16-AnyCPU, Magick.NET-Q16-HDRI-AnyCPU, Magick.NET-Q16-HDRI-OpenMP-arm64
eco: nuget
published: Apr 14, 2026
The -sample operation has an out of bounds read when an specific offset is set through the `sample:offset` define that could lead to an out of bounds read.
CVE-2026-33905
GitHub-GHSA

MEDIUM
ImageMagick has a Stack Overflow via Recursive FX Expression Parsing
GHSA-f4qm-vj5j-9xpw
pkg: Magick.NET-Q16-AnyCPU, Magick.NET-Q16-HDRI-AnyCPU, Magick.NET-Q16-HDRI-OpenMP-arm64
eco: nuget
published: Apr 14, 2026
A stack overflow vulnerability in ImageMagick's FX expression parser allows an attacker to crash the process by providing a deeply nested expression.
CVE-2026-33902
GitHub-GHSA

MEDIUM
Sigstore Timestamp Authority has Improper Certificate Validation in verifier
GHSA-xm5m-wgh2-rrg3
pkg: github.com/sigstore/timestamp-authority/v2
eco: go
published: Apr 14, 2026
### Authorization bypass via certificate bag manipulation in sigstore/timestamp-authority verifier

An authorization bypass vulnerability exists in sigstore/timestamp-authority verifier (timestamp-authority/v2/pkg/verification): `VerifyTimestampResponse` function correctly verifies the certificate c…

CVE-2026-39984
GitHub-GHSA

MEDIUM
Paperclip: Stored XSS via javascript: URLs in MarkdownBody — urlTransform override disables react-markdown sanitization
GHSA-fpw4-p57j-hqmq
pkg: @paperclipai/ui
eco: npm
published: Apr 16, 2026
## Summary

`MarkdownBody`, the shared component used to render every Markdown surface in the Paperclip UI (issue documents, issue comments, chat threads, approvals, agent details, export previews, etc.), passes `urlTransform={(url) => url}` to `react-markdown`. That override replaces `react-markdow…

GitHub-GHSA

MEDIUM
Authlib: Cross-site request forging when using cache
GHSA-jj8c-mmj3-mmgv
pkg: authlib
eco: pip
published: Apr 16, 2026
### Summary

There is no CSRF protection on the cache feature on most integrations clients.

### Details
In `authlib.integrations.starlette_client.OAuth`, no CSRF protection is set up when using the cache parameter. When _not_ using the cache parameter, the use of SessionMiddleware ties the client t…

GitHub-GHSA

MEDIUM
Istio: AuthorizationPolicy serviceAccounts regex injection via unescaped dots
GHSA-9gcg-w975-3rjh
pkg: istio.io/istio
eco: go
published: Apr 16, 2026
### Impact
The `serviceAccounts` and `notServiceAccounts` fields in AuthorizationPolicy incorrectly interpret dots (`.`) as a regular expression matcher. Because `.` is a valid character in a service account name, an `AuthorizationPolicy` ALLOW rule targeting SA e.g. `cert-manager.io` also matches `…
CVE-2026-39350
GitHub-GHSA

MEDIUM
ApostropheCMS: Stored XSS via CSS Custom Property Injection in @apostrophecms/color-field Escaping Style Tag Context
GHSA-97v6-998m-fp4g
pkg: apostrophe
eco: npm
published: Apr 16, 2026
## Summary

The `@apostrophecms/color-field` module bypasses color validation for values prefixed with `–` (intended for CSS custom properties), but performs no HTML sanitization on these values. When styles containing attacker-controlled color values are rendered into `<style>` tags — both in th…

CVE-2026-33889
GitHub-GHSA

MEDIUM
KubeVirt's authorization mechanism improperly truncates subresource names
GHSA-j6cv-3w8p-vrg8
pkg: kubevirt.io/kubevirt
eco: go
published: Apr 15, 2026
A flaw was found in KubeVirt's Role-Based Access Control (RBAC) evaluation logic. The authorization mechanism improperly truncates subresource names, leading to incorrect permission evaluations. This allows authenticated users with specific custom roles to gain unauthorized access to subresources, p…
CVE-2026-6383
GitHub-GHSA

MEDIUM
Apache Storm UI: Stored Cross-Site Scripting (XSS) via Unsanitized Topology Metadata
GHSA-f2hp-qw27-8wfq
pkg: org.apache.storm:storm-webapp
eco: maven
published: Apr 13, 2026
Stored Cross-Site Scripting (XSS) via Unsanitized Topology Metadata in Apache Storm UI

Versions Affected: before 2.8.6

Description: The Storm UI visualization component interpolates topology metadata including component IDs, stream names, and grouping values directly into HTML via innerHTML in p…

CVE-2026-35565
GitHub-GHSA

MEDIUM
HashiCorp Vault has Server-Side Request Forgery in ACME Challenge Validation via Attacker-Controlled DNS
GHSA-8r5m-3f66-qpr3
pkg: github.com/hashicorp/vault
eco: go
published: Apr 17, 2026
Vault’s PKI engine’s ACME validation did not reject local targets when issuing http-01 and tls-alpn-01 challenges. This may lead to these requests being sent to local network targets, potentially leading to information disclosure. Fixed in Vault Community Edition 2.0.0 and Vault Enterprise 2.0.0…
CVE-2026-5052
GitHub-GHSA

MEDIUM
@fastify/static vulnerable to path traversal in directory listing
GHSA-pr96-94w5-mx2h
pkg: @fastify/static
eco: npm
published: Apr 16, 2026
### Impact

`@fastify/static` v9.1.0 and earlier serves directory listings outside the configured static root when the `list` option is enabled. A request such as `/public/../outside/` causes `dirList.path()` to resolve a directory outside the root via `path.join()` without a containment check.

A r…

CVE-2026-6410
GitHub-GHSA

MEDIUM
Flowise: Unauthenticated Information Disclosure of OAuth Secrets (Cleartext) via GET Request
GHSA-6pcv-j4jx-m4vx
pkg: flowise
eco: npm
published: Apr 16, 2026
### Summary
I have discovered a critical Missing Authentication vulnerability on the /api/v1/loginmethod endpoint. The API allows unauthenticated users (guests) to retrieve the full SSO configuration of any organization by simply providing an organizationId. The response includes sensitive OAuth cre…
GitHub-GHSA

MEDIUM
zrok: Broken ownership check in DELETE /api/v2/unaccess allows non-admin to delete global frontend records
GHSA-3jpj-v3xr-5h6g
pkg: github.com/openziti/zrok, github.com/openziti/zrok/v2
eco: go
published: Apr 16, 2026
Summary
The unaccess handler (controller/unaccess.go) contains a logical error in its ownership guard: when a frontend record has environment_id = NULL (the marker for admin-created global frontends), the condition short-circuits to false and allows the deletion to proceed without any ownership veri…
CVE-2026-40304
GitHub-GHSA

MEDIUM
ApostropheCMS: Information Disclosure via choices/counts Query Parameters Bypassing publicApiProjection Field Restrictions
GHSA-c276-fj82-f2pq
pkg: apostrophe
eco: npm
published: Apr 16, 2026
## Summary

The `choices` and `counts` query parameters in the Apostrophe CMS REST API allow unauthenticated users to extract distinct field values for any schema field that has a registered query builder, completely bypassing `publicApiProjection` restrictions that are intended to limit which field…

CVE-2026-39857
GitHub-GHSA

MEDIUM
LangSmith SDK: Streaming token events bypass output redaction
GHSA-rr7j-v2q5-chgv
pkg: langsmith, langsmith
eco: pip
published: Apr 16, 2026
## Summary

The LangSmith SDK's output redaction controls (hideOutputs in JS, hide_outputs in Python) do not apply to streaming token events. When an LLM run produces streaming output, each chunk is recorded as a new_token event containing the raw token value. These events bypass the redaction pipel…

GitHub-GHSA

MEDIUM
Grafana Loki Path Traversal – CVE-2021-36156 Bypass
GHSA-497x-rrr9-68jp
pkg: github.com/grafana/loki/v3
eco: go
published: Apr 15, 2026
The CVE-2021-36156 fix validates the namespace parameter for path traversal sequences after a single URL decode, by double encoding, an attacker can read files at the Ruler API endpoint /loki/api/v1/rules/{namespace}

Thanks to Prasanth Sundararajan for reporting this vulnerability.

CVE-2026-21726
GitHub-GHSA

MEDIUM
python-multipart affected by Denial of Service via large multipart preamble or epilogue data
GHSA-mj87-hwqh-73pj
pkg: python-multipart
eco: pip
published: Apr 15, 2026
### Summary

A denial of service vulnerability exists when parsing crafted `multipart/form-data` requests with large preamble or epilogue sections.

### Details

Two inefficient multipart parsing paths could be abused with attacker-controlled input.

Before the first multipart boundary, the parser h…

CVE-2026-40347
GitHub-GHSA

MEDIUM
ImageMagick has a heap-Buffer-Overflow write of a single zero byte when parsing xml.
GHSA-cr67-pvmx-2pp2
pkg: Magick.NET-Q16-AnyCPU, Magick.NET-Q16-HDRI-AnyCPU, Magick.NET-Q16-HDRI-OpenMP-arm64
eco: nuget
published: Apr 13, 2026
When `Magick` parses an XML file it is possible that a single zero byte is written out of the bounds.
CVE-2026-33899
GitHub-GHSA

MEDIUM
nimiq-consensus panics via RequestMacroChain micro-block locator
GHSA-48m6-486p-9j8p
pkg: nimiq-consensus
eco: rust
published: Apr 13, 2026
### Impact
An unauthenticated p2p peer can cause the `RequestMacroChain` message handler task to panic by sending a `RequestMacroChain` message where the first locator hash that is on the victim’s main chain is a micro block hash (not a macro block hash).

In `RequestMacroChain::handle`, the hand…

CVE-2026-34069
GitHub-GHSA

MEDIUM
ImageMagick has an integer overflow in despeckle operation causing a heap buffer overflow on 32-bit builds
GHSA-26qp-ffjh-2x4v
pkg: Magick.NET-Q16-AnyCPU, Magick.NET-Q16-HDRI-AnyCPU, Magick.NET-Q16-HDRI-x86
eco: nuget
published: Apr 13, 2026
An integer overflow in the despeckle operation causes a heap buffer overflow on 32-bit builds that will result in an out of bounds write.

“`
==1551685==ERROR: AddressSanitizer: heap-buffer-overflow on address 0xea2fb818 at pc 0x56cbc42a bp 0xffc4ce48 sp 0xffc4ce38
WRITE of size 8 at 0xea2fb818 thr…

CVE-2026-34238
GitHub-GHSA

MEDIUM
Istio: SSRF via RequestAuthentication jwksUri
GHSA-fgw5-hp8f-xfhc
pkg: istio.io/istio
eco: go
published: Apr 16, 2026
### Impact

When a RequestAuthentication resource is created with a jwksUri pointing to an internal service, istiod makes an unauthenticated HTTP GET request to that URL without filtering out localhost or link local ips. This can result in sensitive data being distributed to Envoy proxies via xDS co…

GitHub-GHSA

MEDIUM
Weblate: Prefix-Based Repository Boundary Check Bypass via Symlink/Junction Path Prefix Collision
GHSA-ffgh-3jrf-8wvh
pkg: weblate
eco: pip
published: Apr 16, 2026
### Impact
Weblate repository-boundary validation relies on string prefix checks on resolved absolute paths. In multiple code paths, the check uses startswith against the repository root path. This is not path-segment aware and can be bypassed when the external path shares the same string prefix as …
CVE-2026-40256
GitHub-GHSA

MEDIUM
Weblate: SSRF via Project-Level Machinery Configuration
GHSA-xrwr-fcw6-fmq8
pkg: weblate
eco: pip
published: Apr 16, 2026
### Impact
A user with the `project.edit` permission (granted by the per-project "Administration" role) can configure machine translation service URLs pointing to arbitrary internal network addresses. During configuration validation, Weblate makes an HTTP request to the attacker-controlled URL and r…
CVE-2026-34244
GitHub-GHSA

MEDIUM
Weblate: Authenticated SSRF via redirect bypass of ALLOWED_ASSET_DOMAINS in screenshot URL uploads
GHSA-5fhx-9jwj-867m
pkg: weblate
eco: pip
published: Apr 16, 2026
### Impact
The ALLOWED_ASSET_DOMAINS setting applied only to the first issued requests and didn't restrict possible redirects.

### Patches
* https://github.com/WeblateOrg/weblate/pull/18550

### References
This issue was reported by @spbavarva via GitHub.

CVE-2026-33440
GitHub-GHSA

MEDIUM
Valtimo: Sensitive data exposure through inbox message logging in InboxHandlingService
GHSA-hfrg-mcvw-8mch
pkg: com.ritense.valtimo:inbox
eco: maven
published: Apr 16, 2026
### Summary

The `InboxHandlingService` logs the full content of every incoming inbox message at INFO level (`logger.info("Received message: {}", message)`). Inbox messages are wrappers around outbox message data, which can contain highly sensitive information such as personal data (PII), citizen id…

CVE-2026-34164
GitHub-GHSA

MEDIUM
pyLoad has a Session Cookie Security Downgrade via Untrusted X-Forwarded-Proto Header Spoofing (Global State Race Condition)
GHSA-mp82-fmj6-f22v
pkg: pyload-ng
eco: pip
published: Apr 16, 2026
## Summary

The `set_session_cookie_secure` `before_request` handler in `src/pyload/webui/app/__init__.py` reads the `X-Forwarded-Proto` header from any HTTP request without validating that the request originates from a trusted proxy, then mutates the **global** Flask configuration `SESSION_COOKIE_S…

CVE-2026-40594
GitHub-GHSA

MEDIUM
mitmproxy has an LDAP Injection
GHSA-527g-3w9m-29hv
pkg: mitmproxy
eco: pip
published: Apr 14, 2026
### Impact
In mitmproxy 12.2.1 and below, the builtin LDAP proxy authentication does not correctly sanitize the username when querying the LDAP server. This allows a malicious client to bypass authentication.

Only mitmproxy instances using the `proxyauth` option with LDAP are affected. This option …

CVE-2026-40606
GitHub-GHSA

MEDIUM
go-git: Credential leak via cross-host redirect in smart HTTP transport
GHSA-3xc5-wrhm-f963
pkg: github.com/go-git/go-git/v5, github.com/go-git/go-git/v6
eco: go
published: Apr 17, 2026
### Impact
`go-git` may leak HTTP authentication credentials when following redirects during smart-HTTP clone and fetch operations.

If a remote repository responds to the initial `/info/refs` request with a redirect to a different host, go-git updates the session endpoint to the redirected location…

GitHub-GHSA

MEDIUM
Mojic: Observable Timing Discrepancy in HMAC Verification
GHSA-wqq3-wfmp-v85g
pkg: mojic
eco: npm
published: Apr 16, 2026
### Summary
The `CipherEngine` in Mojic v2.1.3 uses a standard equality operator (`!==`) to verify the HMAC-SHA256 integrity seal during the decryption phase. This creates an Observable Timing Discrepancy (CWE-208), allowing a potential attacker to bypass the file integrity check via a timing attack…
GitHub-GHSA

MEDIUM
Paperclip: Approval decision attribution spoofing via client-controlled `decidedByUserId` in paperclip server
GHSA-p7mm-r948-4q3q
pkg: @paperclipai/server
eco: npm
published: Apr 16, 2026
## Summary

The approval-resolution endpoints (`POST /approvals/:id/approve`, `/reject`, `/request-revision`) accept a client-supplied `decidedByUserId` field in the request body and write it verbatim into the authoritative `approvals.decidedByUserId` column — without cross-checking it against the…

GitHub-GHSA

MEDIUM
Weblate: Improper access control for the translation memory in API
GHSA-mpf5-3vph-q75r
pkg: weblate
eco: pip
published: Apr 16, 2026
### Impact
The translation memory API exposed unintended endpoints, which in turn didn't do proper access control.

### Patches
* https://github.com/WeblateOrg/weblate/pull/18513

### Workarounds
Blocking access to `/api/memory/` in the HTTP server removes access to this feature.

### References
Thi…

CVE-2026-33214
GitHub-GHSA

MEDIUM
Apache PDFBox Examples: Path Traversal in PDFBox ExtractEmbeddedFiles Example Code
GHSA-gcj8-76p4-g2fq
pkg: org.apache.pdfbox:pdfbox-examples, org.apache.pdfbox:pdfbox-examples
eco: maven
published: Apr 14, 2026
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Apache PDFBox Examples.

This issue affects the
ExtractEmbeddedFiles example in Apache PDFBox: from 2.0.24 through 2.0.36, from 3.0.0 through 3.0.7.

Users are recommended to update to version 2.0.37 or…

CVE-2026-33929
GitHub-GHSA

MEDIUM
Weblate: SSRF via the webhook add-on using unprotected fetch_url()
GHSA-f8hv-g549-hwg2
pkg: weblate
eco: pip
published: Apr 16, 2026
### Impact
The webhook add-on did not utilize existing SSRF protection.

### Patches
* https://github.com/WeblateOrg/weblate/pull/18815

### Workarounds
Disabling the add-on would avoid misusing this.

### References
Thanks to @Lihfdgjr for reporting this via GitHub.

CVE-2026-39845
GitHub-GHSA

MEDIUM
Zebra Vulnerable to Denial of Service via Interrupted JSON-RPC Requests from Authenticated Clients
GHSA-29×4-r6jv-ff4w
pkg: zebra-rpc, zebrad
eco: rust
published: Apr 18, 2026
A vulnerability in Zebra's JSON-RPC HTTP middleware allows an authenticated RPC client to cause a Zebra node to crash by disconnecting before the request body is fully received. The node treats the failure to read the HTTP request body as an unrecoverable error and aborts the process instead of retu…
GitHub-GHSA

MEDIUM
Zebra: addr/addrv2 Deserialization Resource Exhaustion
GHSA-xr93-pcq3-pxf8
pkg: zebrad, zebra-network
eco: rust
published: Apr 18, 2026
# CVE-2026-40881: addr/addrv2 Deserialization Resource Exhaustion

## Summary

When deserializing `addr` or `addrv2` messages, which contain vectors of addresses, Zebra would fully deserialize them up to a maximum length (over 233,000) that was derived from the 2 MiB message size limit. This is much…

CVE-2026-40881
GitHub-GHSA

MEDIUM
OpenClaw: QMD memory_get restricts reads to canonical or indexed memory paths
GHSA-f934-5rqf-xx47
pkg: openclaw
eco: npm
published: Apr 17, 2026
## Summary

The QMD backend `memory_get` read path accepted arbitrary workspace Markdown paths that were inside the workspace but outside the canonical memory locations or indexed QMD result set.

## Impact

When the QMD backend was enabled, a caller with access to `memory_get` could read arbitrary …

GitHub-GHSA

MEDIUM
yard: Possible arbitrary path traversal and file access via yard server
GHSA-3jfp-46×4-xgfj
pkg: yard
eco: rubygems
published: Apr 17, 2026
### Impact

A path traversal vulnerability was discovered in YARD <= 0.9.41 when using yard server to serve documentation. This bug would allow unsanitized HTTP requests to access arbitrary files on the machine of a yard server host under certain conditions.

The original patch in [GHSA-xfhh-rx56-rx…

GitHub-GHSA

MEDIUM
Claude Code: Insecure System-Wide Configuration Loading Enables Local Privilege Escalation on Windows
GHSA-5cwg-9f6j-9jvx
pkg: @anthropic-ai/claude-code
eco: npm
published: Apr 17, 2026
On Windows, Claude Code loaded system-wide default configuration from `C:\ProgramData\ClaudeCode\managed-settings.json` without validating directory ownership or access permissions. Because the `ProgramData` directory is writable by non-administrative users by default and the `ClaudeCode` subdirecto…
CVE-2026-35603
GitHub-GHSA

MEDIUM
OpenClaw: CDP /json/version WebSocket URL could pivot to untrusted second-hop targets
GHSA-f7fh-qg34-x2xh
pkg: openclaw
eco: npm
published: Apr 17, 2026
## Summary

CDP /json/version WebSocket URL could pivot to untrusted second-hop targets.

## Affected Packages / Versions

– Package: `openclaw`
– Ecosystem: npm
– Affected versions: `< 2026.4.5`
– Patched versions: `>= 2026.4.5`

## Impact

A browser profile could trust a CDP `/json/version` respon…

GitHub-GHSA

MEDIUM
OpenClaw: Sender policy bypass in host media attachment reads allows unauthorized local file disclosure
GHSA-jhpv-5j76-m56h
pkg: openclaw
eco: npm
published: Apr 17, 2026
## Summary

OpenClaw's outbound host-media attachment read helper could enable host-local file reads based on global or agent-level read access without also honoring sender and group-scoped tool policy. In channel deployments that used `toolsBySender` or group policy to deny `read` for less-trusted …

GitHub-GHSA

MEDIUM
OpenClaw: Browser press/type interaction routes missed complete navigation guard coverage
GHSA-536q-mj95-h29h
pkg: openclaw
eco: npm
published: Apr 17, 2026
## Summary

Browser press/type interaction routes missed complete navigation guard coverage.

## Affected Packages / Versions

– Package: `openclaw`
– Ecosystem: npm
– Affected versions: `< 2026.4.10`
– Patched versions: `>= 2026.4.10`

## Impact

Some browser press/type style interactions could tri…

GitHub-GHSA

MEDIUM
OpenClaw: Browser interaction routes could pivot into local CDP and regain file reads
GHSA-qmwg-qprg-3j38
pkg: openclaw
eco: npm
published: Apr 17, 2026
## Summary

Browser interaction routes could pivot into local CDP and regain file reads.

## Affected Packages / Versions

– Package: `openclaw`
– Ecosystem: npm
– Affected versions: `< 2026.4.9`
– Patched versions: `>= 2026.4.9`

## Impact

Browser act/evaluate interactions could trigger navigation…

GitHub-GHSA

MEDIUM
OpenClaw: Existing-session browser interaction routes bypassed SSRF policy enforcement
GHSA-527m-976r-jf79
pkg: openclaw
eco: npm
published: Apr 17, 2026
## Summary

Existing-session browser interaction routes bypassed SSRF policy enforcement.

## Affected Packages / Versions

– Package: `openclaw`
– Ecosystem: npm
– Affected versions: `< 2026.4.10`
– Patched versions: `>= 2026.4.10`

## Impact

Existing-session browser interaction routes could conti…

GitHub-GHSA

MEDIUM
OpenClaw: Browser tabs action select and close routes bypassed SSRF policy
GHSA-rj2p-j66c-mgqh
pkg: openclaw
eco: npm
published: Apr 17, 2026
## Summary

Browser tabs action select and close routes bypassed SSRF policy.

## Affected Packages / Versions

– Package: `openclaw`
– Ecosystem: npm
– Affected versions: `< 2026.4.10`
– Patched versions: `>= 2026.4.10`

## Impact

The browser `/tabs/action` select and close branches could operate …

GitHub-GHSA

MEDIUM
OpenClaw: Nostr profile mutation routes allowed operator.write config persistence
GHSA-f3h5-h452-vp3j
pkg: openclaw
eco: npm
published: Apr 17, 2026
## Summary

Nostr profile mutation routes allowed operator.write config persistence.

## Affected Packages / Versions

– Package: `openclaw`
– Ecosystem: npm
– Affected versions: `< 2026.4.10`
– Patched versions: `>= 2026.4.10`

## Impact

Nostr plugin HTTP profile routes could persist profile confi…

GitHub-GHSA

MEDIUM
OpenClaw: screen_record outPath bypassed workspace-only filesystem guard
GHSA-jf25-7968-h2h5
pkg: openclaw
eco: npm
published: Apr 17, 2026
## Summary

screen_record outPath bypassed workspace-only filesystem guard.

## Affected Packages / Versions

– Package: `openclaw`
– Ecosystem: npm
– Affected versions: `< 2026.4.10`
– Patched versions: `>= 2026.4.10`

## Impact

The node-host screen recording tool could honor an `outPath` outside …

GitHub-GHSA

MEDIUM
OpenClaw: Browser SSRF policy default allowed private-network navigation
GHSA-53vx-pmqw-863c
pkg: openclaw
eco: npm
published: Apr 17, 2026
## Summary

Browser SSRF policy default allowed private-network navigation.

## Affected Packages / Versions

– Package: `openclaw`
– Ecosystem: npm
– Affected versions: `< 2026.4.14`
– Patched versions: `>= 2026.4.14`

## Impact

Browser SSRF protection could allow private-network navigation by def…

GitHub-GHSA

MEDIUM
OpenClaw: Browser SSRF hostname validation could be bypassed by DNS rebinding
GHSA-xq94-r468-qwgj
pkg: openclaw
eco: npm
published: Apr 17, 2026
## Summary

Browser SSRF hostname validation could be bypassed by DNS rebinding.

## Affected Packages / Versions

– Package: `openclaw`
– Ecosystem: npm
– Affected versions: `< 2026.4.10`
– Patched versions: `>= 2026.4.10`

## Impact

Browser navigation policy could validate a hostname/IP resolutio…

GitHub-GHSA

MEDIUM
OpenClaw: QQBot reply media URL handling could trigger SSRF and re-upload fetched bytes
GHSA-2767-2q9v-9326
pkg: openclaw
eco: npm
published: Apr 17, 2026
## Summary

QQBot reply media URL handling could trigger SSRF and re-upload fetched bytes.

## Affected Packages / Versions

– Package: `openclaw`
– Ecosystem: npm
– Affected versions: `< 2026.4.12`
– Patched versions: `>= 2026.4.12`

## Impact

QQBot reply media URLs could be treated as trusted med…

GitHub-GHSA

MEDIUM
OpenClaw: Workspace .env could inject OpenClaw runtime-control variables
GHSA-7wv4-cc7p-jhxc
pkg: openclaw
eco: npm
published: Apr 17, 2026
## Summary

Workspace .env could inject OpenClaw runtime-control variables.

## Affected Packages / Versions

– Package: `openclaw`
– Ecosystem: npm
– Affected versions: `< 2026.4.9`
– Patched versions: `>= 2026.4.9`

## Impact

A malicious workspace `.env` file could set OpenClaw runtime-control va…

GitHub-GHSA

MEDIUM
OpenClaw: Discord event cover images bypassed sandbox media normalization
GHSA-c9h3-5p7r-mrjh
pkg: openclaw
eco: npm
published: Apr 17, 2026
## Summary

Discord event cover images bypassed sandbox media normalization.

## Affected Packages / Versions

– Package: `openclaw`
– Ecosystem: npm
– Affected versions: `>= 2026.4.7 < 2026.4.10`
– Patched versions: `>= 2026.4.10`

## Impact

Discord event cover image parameters could bypass the sa…

GitHub-GHSA

MEDIUM
OpenClaw: Empty approver lists could grant explicit approval authorization
GHSA-49cg-279w-m73x
pkg: openclaw
eco: npm
published: Apr 17, 2026
## Summary

Empty approver lists could grant explicit approval authorization.

## Affected Packages / Versions

– Package: `openclaw`
– Ecosystem: npm
– Affected versions: `< 2026.4.12`
– Patched versions: `>= 2026.4.12`

## Impact

For helper-backed channels, an empty resolved approver list could b…

GitHub-GHSA

MEDIUM
OpenClaw: Agent hook events could enqueue trusted system events from unsanitized external input
GHSA-7g8c-cfr3-vqqr
pkg: openclaw
eco: npm
published: Apr 17, 2026
## Summary

Agent hook events could enqueue trusted system events from unsanitized external input.

## Affected Packages / Versions

– Package: `openclaw`
– Ecosystem: npm
– Affected versions: `< 2026.4.10`
– Patched versions: `>= 2026.4.10`

## Impact

Agent hook dispatch could turn externally supp…

GitHub-GHSA

MEDIUM
OpenClaw: Shell-wrapper detection missed env-argv assignment injection forms
GHSA-j6c7-3h5x-99g9
pkg: openclaw
eco: npm
published: Apr 17, 2026
## Summary

Shell-wrapper detection missed env-argv assignment injection forms.

## Affected Packages / Versions

– Package: `openclaw`
– Ecosystem: npm
– Affected versions: `>= 2026.2.22 < 2026.4.12`
– Patched versions: `>= 2026.4.12`

## Impact

Exec preflight handling missed shell-wrapper and arg…

GitHub-GHSA

MEDIUM
OpenClaw: Memory dreaming config persistence was reachable from operator.write commands
GHSA-5gjc-grvm-m88j
pkg: openclaw
eco: npm
published: Apr 17, 2026
## Summary

Memory dreaming config persistence was reachable from operator.write commands.

## Affected Packages / Versions

– Package: `openclaw`
– Ecosystem: npm
– Affected versions: `>= 2026.4.5 < 2026.4.10`
– Patched versions: `>= 2026.4.10`

## Impact

A write-scoped gateway path could toggle p…

GitHub-GHSA

MEDIUM
OpenClaw: Heartbeat owner downgrade missed local async exec completion events
GHSA-g375-h3v6-4873
pkg: openclaw
eco: npm
published: Apr 17, 2026
## Summary

Heartbeat owner downgrade missed local async exec completion events.

## Affected Packages / Versions

– Package: `openclaw`
– Ecosystem: npm
– Affected versions: `>= 2026.3.31 < 2026.4.10`
– Patched versions: `>= 2026.4.10`

## Impact

Local background exec completion text could be miss…

GitHub-GHSA

MEDIUM
OpenClaw: Heartbeat owner downgrade missed untrusted webhook wake events
GHSA-g2hm-779g-vm32
pkg: openclaw
eco: npm
published: Apr 17, 2026
## Summary

Heartbeat owner downgrade missed untrusted webhook wake events.

## Affected Packages / Versions

– Package: `openclaw`
– Ecosystem: npm
– Affected versions: `>= 2026.4.7 < 2026.4.14`
– Patched versions: `>= 2026.4.14`

## Impact

Heartbeat owner downgrade logic could skip webhook wake e…

GitHub-GHSA

MEDIUM
OpenClaw: Browser snapshot and screenshot routes could expose internal page content after navigation
GHSA-c4qm-58hj-j6pj
pkg: openclaw
eco: npm
published: Apr 17, 2026
## Summary

Browser snapshot and screenshot routes could expose internal page content after navigation.

## Affected Packages / Versions

– Package: `openclaw`
– Ecosystem: npm
– Affected versions: `< 2026.4.14`
– Patched versions: `>= 2026.4.14`

## Impact

Authenticated browser tool callers could …

GitHub-GHSA

MEDIUM
OpenClaw: Collect-mode queue batches could reuse the last sender authorization context
GHSA-jwrq-8g5x-5fhm
pkg: openclaw
eco: npm
published: Apr 17, 2026
## Summary

Collect-mode queue batches could reuse the last sender authorization context.

## Affected Packages / Versions

– Package: `openclaw`
– Ecosystem: npm
– Affected versions: `< 2026.4.14`
– Patched versions: `>= 2026.4.14`

## Impact

Collect-mode queued messages from different senders cou…

GitHub-GHSA

MEDIUM
OpenClaw: Sandbox noVNC helper route exposed interactive browser session credentials
GHSA-92jp-89mq-4374
pkg: openclaw
eco: npm
published: Apr 17, 2026
## Summary

Sandbox noVNC helper route exposed interactive browser session credentials.

## Affected Packages / Versions

– Package: `openclaw`
– Ecosystem: npm
– Affected versions: `>= 2026.2.21 < 2026.4.10`
– Patched versions: `>= 2026.4.10`

## Impact

The sandbox noVNC helper route could be reac…

GitHub-GHSA

MEDIUM
Bouncy Castle has an LDAP injection
GHSA-c3fc-8qff-9hwx
pkg: org.bouncycastle:bcprov-jdk14, org.bouncycastle:bcprov-jdk15to18, org.bouncycastle:bcprov-jdk18on
eco: maven
published: Apr 17, 2026
Improper neutralization of special elements used in an LDAP query ('LDAP injection') vulnerability in Legion of the Bouncy Castle Inc. BC-JAVA bcprov on all (prov modules). This vulnerability is associated with program files LDAPStoreHelper.

This issue affects BC-JAVA: from 1.74 before 1.84.

CVE-2026-0636
GitHub-GHSA

MEDIUM
Saltcorn: Open Redirect in `POST /auth/login` due to incomplete `is_relative_url` validation (backslash bypass)
GHSA-f3g8-9xv5-77gv
pkg: @saltcorn/server, @saltcorn/server, @saltcorn/server
eco: npm
published: Apr 16, 2026
### Summary
Saltcorn validates the post-login `dest` parameter with a string check that only blocks `:/` and `//`. Because all WHATWG-compliant browsers normalise backslashes (`\`) to forward slashes (`/`) for special schemes, a payload such as `/\evil.com/path` slips through `is_relative_url()`, is…
GitHub-GHSA

MEDIUM
pypdf: Manipulated FlateDecode image dimensions can exhaust RAM
GHSA-x284-j5p8-9c5p
pkg: pypdf
eco: pip
published: Apr 16, 2026
### Impact
An attacker who uses this vulnerability can craft a PDF which leads to the RAM being exhausted. This requires accessing an image using `/FlateDecode` with large size values.

### Patches
This has been fixed in [pypdf==6.10.2](https://github.com/py-pdf/pypdf/releases/tag/6.10.2).

### Work…

GitHub-GHSA

MEDIUM
pypdf: Possible long runtimes for wrong size values in incremental mode
GHSA-4pxv-j86v-mhcw
pkg: pypdf
eco: pip
published: Apr 16, 2026
### Impact
An attacker who uses this vulnerability can craft a PDF which leads to long runtimes. This requires loading a PDF with a large trailer `/Size` value in incremental mode.

### Patches
This has been fixed in [pypdf==6.10.2](https://github.com/py-pdf/pypdf/releases/tag/6.10.2).

### Workarou…

GitHub-GHSA

MEDIUM
pypdf: Manipulated FlateDecode predictor parameters can exhaust RAM
GHSA-7gw9-cf7v-778f
pkg: pypdf
eco: pip
published: Apr 16, 2026
### Impact
An attacker who uses this vulnerability can craft a PDF which leads to the RAM being exhausted. This requires accessing a stream compressed using `/FlateDecode` with a `/Predictor` unequal 1 and large predictor parameters.

### Patches
This has been fixed in [pypdf==6.10.2](https://github…

GitHub-GHSA

MEDIUM
Flowise Execute Flow function has an SSRF vulnerability
GHSA-9hrv-gvrv-6gf2
pkg: flowise, flowise-components
eco: npm
published: Apr 16, 2026
### Summary

The attacker provides an intranet address through the base url field configured in the Execute Flow node
→ Bypass checkDenyList / resolveAndValidate in httpSecurity.ts (not called)
→ Causes the server to initiate an HTTP request to any internal network address, read cloud metadata,…

GitHub-GHSA

MEDIUM
Flowise: SSRF Protection Bypass via Direct node-fetch / axios Usage (Patch Enforcement Failure)
GHSA-qqvm-66q4-vf5c
pkg: flowise, flowise-components
eco: npm
published: Apr 16, 2026
### Summary

Flowise introduced SSRF protections through a centralized HTTP security wrapper (`httpSecurity.ts`) that implements deny-list validation and IP pinning logic.

However, multiple tool implementations directly import and invoke raw HTTP clients (`node-fetch`, `axios`Instead of using the s…

GitHub-GHSA

MEDIUM
Flowise: Path Traversal in Vector Store basePath
GHSA-w6v6-49gh-mc9w
pkg: flowise, flowise-components
eco: npm
published: Apr 16, 2026
## Summary

The Faiss and SimpleStore (LlamaIndex) vector store implementations accept a `basePath` parameter from user-controlled input and pass it directly to filesystem write operations without any sanitization. An authenticated attacker can exploit this to write vector store data to arbitrary lo…

GitHub-GHSA

MEDIUM
Mako: Path traversal via double-slash URI prefix in TemplateLookup
GHSA-v92g-xgxw-vvmm
pkg: Mako
eco: pip
published: Apr 16, 2026
### Summary

`TemplateLookup.get_template()` is vulnerable to path traversal when a URI starts with `//` (e.g., `//../../../secret.txt`). The root cause is an inconsistency between two slash-stripping implementations:

– `Template.__init__` strips **one** leading `/` using `if`/slice
– `TemplateLook…

GitHub-GHSA

MEDIUM
Buffer Overflow in Zlib::GzipReader ungetc via large input leads to memory corruption
GHSA-g857-hhfv-j68w
pkg: zlib, zlib, zlib
eco: rubygems
published: Apr 16, 2026
### Details

A buffer overflow vulnerability exists in `Zlib::GzipReader`.

The `zstream_buffer_ungets` function prepends caller-provided bytes ahead of previously produced output but fails to guarantee the backing Ruby string has enough capacity before the memmove shifts the existing data. This can…

CVE-2026-27820
GitHub-GHSA

MEDIUM
Apache Airflow: JWT token appearing in logs
GHSA-phv5-vq5p-qhp7
pkg: apache-airflow
eco: pip
published: Apr 16, 2026
JWT Tokens used by tasks were exposed in logs. This could allow UI users to act as Dag Authors.
Users are advised to upgrade to Airflow version that contains fix.

Users are recommended to upgrade to version 3.2.0, which fixes this issue.

CVE-2026-31987
GitHub-GHSA

MEDIUM
wger has Stored XSS via Unescaped License Attribution Fields
GHSA-6f54-qjvm-wwq3
pkg: wger
eco: pip
published: Apr 16, 2026
# Stored XSS via Unescaped License Attribution Fields

## Summary

The `AbstractLicenseModel.attribution_link` property in `wger/utils/models.py` constructs HTML strings by directly interpolating user-controlled fields (`license_author`, `license_title`, `license_object_url`, `license_author_url`, `…

CVE-2026-40353
GitHub-GHSA

MEDIUM
PySpector has a Plugin Code Execution Bypass via Incomplete Static Analysis in PluginSecurity.validate_plugin_code
GHSA-vp22-38m5-r39r
pkg: pyspector
eco: pip
published: Apr 16, 2026
### Summary

The plugin security validator in PySpector uses AST-based static analysis to prevent dangerous code from being loaded as plugins. The blocklist implemented in `PluginSecurity.validate_plugin_code` is incomplete and can be bypassed using several Python constructs that are not checked. An…

GitHub-GHSA

MEDIUM
pypdf has long runtimes for wrong size values in cross-reference and object streams
GHSA-jj6c-8h6c-hppx
pkg: pypdf
eco: pip
published: Apr 15, 2026
### Impact

An attacker who uses this vulnerability can craft a PDF which leads to long runtimes. This requires cross-reference streams with wrong large `/Size` values or object streams with wrong large `/N` values.

### Patches

This has been fixed in [pypdf==6.10.1](https://github.com/py-pdf/pypdf…

GitHub-GHSA

MEDIUM
Data Sharing Framework has an Inverted Time Comparison in OIDC JWKS and Token Cache
GHSA-xmj9-7625-f634
pkg: dev.dsf:dsf-bpe-process-api-v2, dev.dsf:dsf-bpe-server
eco: maven
published: Apr 15, 2026
### Affected Components
– DSF FHIR Server with enabled [bearer-token authentication](https://dsf.dev/operations/v2.1.0/fhir/oidc.html) or [back-channel logout](https://dsf.dev/operations/v2.1.0/fhir/oidc.html).
– DSF BPE Server with enabled [bearer-token authentication](https://dsf.dev/operations/v2…
GitHub-GHSA

MEDIUM
Data Sharing Framework is Missing Session Timeout for OIDC Sessions
GHSA-gj7p-595x-qwf5
pkg: dev.dsf:dsf-common-jetty, dev.dsf:dsf-fhir-server, dev.dsf:dsf-bpe-server
eco: maven
published: Apr 15, 2026
### Affected Components
DSF FHIR Server with enabled [OIDC authentication](https://dsf.dev/operations/v2.1.0/fhir/oidc.html).
DSF BPE Server with enabled [OIDC authentication](https://dsf.dev/operations/v2.1.0/bpe/oidc.html).

### Summary
OIDC-authenticated sessions had no configured maximum inactiv…

CVE-2026-40939
GitHub-GHSA

MEDIUM
Bouncy Castle Crypto Package For Java: Use of a Broken or Risky Cryptographic Algorithm vulnerability in bcpkix modules
GHSA-wg6q-6289-32hp
pkg: org.bouncycastle:bcpkix-jdk18on, org.bouncycastle:bcpkix-jdk15to18, org.bouncycastle:bcpkix-jdk15on
eco: maven
published: Apr 15, 2026
: Use of a Broken or Risky Cryptographic Algorithm vulnerability in Legion of the Bouncy Castle Inc. BC-JAVA bcpkix on all (pkix modules).

PKIX draft CompositeVerifier accepts empty signature sequence as valid.

This issue affects BC-JAVA: from 1.49 before 1.84.

CVE-2026-5588
GitHub-GHSA

MEDIUM
Giskard has Unsandboxed Jinja2 Template Rendering in ConformityCheck
GHSA-7xjm-g8f4-rp26
pkg: giskard-checks
eco: pip
published: Apr 14, 2026
## Summary

The `ConformityCheck` class in `giskard-checks` rendered the `rule` parameter through Jinja2's default `Template()` constructor. Because the `rule` string is silently interpreted as a Jinja2 template, a developer may not realize that template expressions embedded in rule definitions are…

CVE-2026-40320
GitHub-GHSA

MEDIUM
SiYuan has incomplete fix for CVE-2026-33066: XSS
GHSA-8q5w-mmxf-48jg
pkg: github.com/siyuan-note/siyuan/kernel
eco: go
published: Apr 14, 2026
### Summary

The incomplete fix for SiYuan's bazaar README rendering enables the Lute HTML sanitizer but fails to block `<iframe>` tags, allowing stored XSS via `srcdoc` attributes containing embedded scripts that execute in the Electron context.

### Affected Package

– **Ecosystem:** Go
– **Packag…

GitHub-GHSA

MEDIUM
XWiki's REST APIs can list all pages/spaces, leading to unavailability
GHSA-mrqg-xmgm-rc5g
pkg: org.xwiki.platform:xwiki-platform-oldcore, org.xwiki.platform:xwiki-platform-oldcore, org.xwiki.platform:xwiki-platform-oldcore
eco: maven
published: Apr 14, 2026
### Impact
REST API endpoints like `/xwiki/rest/wikis/xwiki/spaces/AnnotationCode/pages/AnnotationConfig/objects/AnnotationCode.AnnotationConfig/0/properties` list all available pages as part of the metadata for database list properties, which can exhaust available resources on large wikis.

### Pat…

CVE-2026-40104
GitHub-GHSA

MEDIUM
XWiki has Reflected Cross-Site Scripting (XSS) in page history compare
GHSA-w4fj-87j5-f25c
pkg: org.xwiki.platform:xwiki-platform-web-templates, org.xwiki.platform:xwiki-platform-web-templates, org.xwiki.platform:xwiki-platform-web-templates
eco: maven
published: Apr 14, 2026
### Impact
A reflected cross-site scripting vulnerability (XSS) in the compare view between revisions of a page allows executing JavaScript code in the user's browser. If the current user is an admin, this can not only affect the current user but also the confidentiality, integrity and availability …
CVE-2026-40105
GitHub-GHSA

MEDIUM
PowerShell Command Injection in Podman HyperV Machine
GHSA-hc8w-h2mf-hp59
pkg: github.com/containers/podman/v4, github.com/containers/podman/v5
eco: go
published: Apr 14, 2026
## Summary

A command injection vulnerability exists in Podman's HyperV machine backend. The VM image path is inserted into a PowerShell double-quoted string without sanitization, allowing `$()` subexpression injection.

## Affected Code

**File**: `pkg/machine/hyperv/stubber.go:647`

“`go
resize :…

CVE-2026-33414
GitHub-GHSA

MEDIUM
goshs has CSRF in state-changing GET routes enables authenticated file deletion and directory creation
GHSA-jrq5-hg6x-j6g3
pkg: github.com/patrickhener/goshs/v2
eco: go
published: Apr 14, 2026
### Summary
goshs contains a cross-site request forgery issue in its state-changing HTTP GET routes. An external attacker can cause an already authenticated browser to trigger destructive actions such as `?delete` and `?mkdir` because goshs relies on HTTP basic auth alone and performs no CSRF, `Orig…
CVE-2026-40883
GitHub-GHSA

MEDIUM
free5gc UDR fail-open request handling in PolicyDataSubsToNotifySubsIdPut may allow unintended subscription updates after input errors
GHSA-gx38-8h33-pmxr
pkg: github.com/free5gc/udr
eco: go
published: Apr 14, 2026
### Summary
A fail-open request handling flaw in the UDR service causes the `/nudr-dr/v2/policy-data/subs-to-notify/{subsId}` PUT handler to continue processing requests even after request body retrieval or deserialization errors.

This may allow unintended modification of existing Policy Data notif…

CVE-2026-40249
GitHub-GHSA

MEDIUM
Prometheus has Stored XSS via metric names and label values in Prometheus web UI tooltips and metrics explorer
GHSA-vffh-x6r8-xx99
pkg: github.com/prometheus/prometheus, github.com/prometheus/prometheus, github.com/prometheus/prometheus
eco: go
published: Apr 13, 2026
### Impact

Stored cross-site scripting (XSS) via crafted metric names in the Prometheus web UI:

* **Old React UI + New Mantine UI:** When a user hovers over a chart tooltip on the Graph page, metric names containing HTML/JavaScript are injected into `innerHTML` without escaping, causing arbitrary …

CVE-2026-40179
GitHub-GHSA

MEDIUM
Apache Airflow: Secrets from Airflow config file logged in plain text in DAG run logs UI
GHSA-j86x-fwp2-qh7v
pkg: apache-airflow
eco: pip
published: Apr 13, 2026
Before Airflow 3.2.0, it was unclear that secure Airflow deployments require the Deployment Manager to take appropriate actions and pay attention to security details and security model of Airflow. Some assumptions the Deployment Manager could make were not clear or explicit enough, even though Airfl…
CVE-2025-66236