Vulnerability Digest — May 11, 2026 · 99 Critical · 3 Exploited






Vulnerability Digest — Monday, May 11, 2026


Security Report

Monday, May 11, 2026  ·  Last 7 days  ·  Min severity: MEDIUM
Total Findings
557
Critical
99
High
259
Actively Exploited
3
CISA-KEV3
NVD179
GitHub-GHSA375
Findings sorted by severity
CISA-KEV

CRITICAL
BerriAI LiteLLM SQL Injection Vulnerability
CVE-2026-42208
pkg: BerriAI LiteLLM

published: May 8, 2026

BerriAI LiteLLM contains a SQL injection vulnerability that allows an attacker to read data from the proxy's database and potentially modify it, leading to unauthorised access to the proxy and the credentials it manages.
Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
CISA-KEV

CRITICAL
Ivanti Endpoint Manager Mobile (EPMM) Improper Input Validation Vulnerability
CVE-2026-6973
pkg: Ivanti Endpoint Manager Mobile (EPMM)

published: May 7, 2026

Ivanti Endpoint Manager Mobile (EPMM) contains an improper input validation vulnerability that allows a remotely authenticated user with administrative access to achieve remote code execution.
Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
CISA-KEV

CRITICAL
Palo Alto Networks PAN-OS Out-of-bounds Write Vulnerability
CVE-2026-0300
pkg: Palo Alto Networks PAN-OS

published: May 6, 2026

Palo Alto Networks PAN-OS contains an out-of-bounds write vulnerability in the User-ID Authentication Portal (aka Captive Portal) service that can allow an unauthenticated attacker to execute arbitrary code with root privileges on the PA-Series and VM-Series firewalls by sending specially crafted pa…
Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. Until the vendor releases an official fix, the following workaround should be implemented: – Restrict User-ID Authentication Portal access to only trusted zones. – Disable User-ID Authentication Portal if not required.
NVD

CRITICAL
CVE-2026-42298
CVE-2026-42298
pkg: docker

published: May 8, 2026

Postiz is an AI social media scheduling tool. Prior to commit da44801, a "Pwn Request" vulnerability in the Build and Publish PR Docker Image workflow (.github/workflows/pr-docker-build.yml) allows any unauthenticated user to execute arbitrary code during the Docker build process and exfiltrate a hi…
CWE: CWE-94
GitHub-GHSA

CRITICAL
free5GC's NEF nnef-pfdmanagement API is unauthenticated; forged bearer tokens can read PFD data and create/delete PFD subscriptions
GHSA-rwww-x45w-p52w
pkg: github.com/free5gc/nef
eco: go
published: May 8, 2026
### Summary
free5GC's NEF mounts the `nnef-pfdmanagement` route group without inbound OAuth2/bearer-token authorization. A network attacker who can reach NEF on the SBI can use a forged or arbitrary bearer token (e.g. `Authorization: Bearer not-a-real-token`) to read PFD application data via `GET /a…
CVE-2026-44330
GitHub-GHSA

CRITICAL
free5GC's SMF UPI management interface lacks auth middleware; unauthenticated topology read/write requests reach handlers
GHSA-3258-qmv8-frp3
pkg: github.com/free5gc/smf
eco: go
published: May 8, 2026
### Summary
free5GC's SMF mounts the `UPI` management route group without OAuth2/bearer-token authorization middleware. A network attacker who can reach SMF on the SBI can hit `UPI` endpoints with no `Authorization` header at all, and the requests reach the SMF business handlers. In the running Dock…
CVE-2026-44329
GitHub-GHSA

CRITICAL
free5GC's NEF nnef-oam route group is unauthenticated; no-token requests reach the OAM handler
GHSA-cmpj-2x3g-m7g3
pkg: github.com/free5gc/nef
eco: go
published: May 8, 2026
### Summary
free5GC's NEF mounts the `nnef-oam` route group without inbound OAuth2/bearer-token authorization. A network attacker who can reach NEF on the SBI can hit the OAM route with no `Authorization` header at all and the handler returns `200 OK`. The current OAM handler is a stub that returns …
CVE-2026-44327
GitHub-GHSA

CRITICAL
Note Mark has a JWT Secret Weakness that allows Full Account Takeover via Token Forgery
GHSA-q6mh-rqwh-g786
pkg: github.com/enchant97/note-mark/backend
eco: go
published: May 7, 2026
#### Summary

No minimum length or entropy is enforced on the `JWT_SECRET` configuration value. The application accepts any base64-decodable secret regardless of size, including secrets as short as 1 byte.

HS256 secrets below 32 bytes are brute-forceable offline, allowing attackers to recover the s…

CVE-2026-44523
NVD

CRITICAL
CVE-2026-33587
CVE-2026-33587
pkg: lfnovo open-notebook

published: May 7, 2026

Lack of user input sanitisation in Open Notebook v1.8.3 allows the application user to execute Python code (and subsequently OS commands) on the docker container via Server-Side Template Injection (SSTI) for user-created transformations.
CWE: CWE-20
GitHub-GHSA

CRITICAL
vm2: Mutable Proxies for Host Intrinsic Prototypes Allows Sandbox Escape
GHSA-vwrp-x96c-mhwq
pkg: vm2
eco: npm
published: May 7, 2026
### Summary
vm2's bridge exposes mutable proxies for real host-realm intrinsic prototypes and then forwards sandbox writes into the underlying host objects with otherReflectSet() and otherReflectDefineProperty(), which lets attacker-controlled JavaScript running in a default VM or inherited NodeVM m…
CVE-2026-44005
GitHub-GHSA

CRITICAL
vm2 Access to Host Object Enables Sandbox Escape
GHSA-47×8-96vw-5wg6
pkg: vm2
eco: npm
published: May 7, 2026
### Summary

It is possible to obtain the host `Object`, https://github.com/patriksimek/vm2/commit/ebcfe94ad2f864f0bc35e78cff1d921107cfd160 added some protections, but the implementation is incomplete.

### Details

There are various ways to use the host `Object`, to escape the sandbox, one example …

CVE-2026-43997
GitHub-GHSA

CRITICAL
vm2 has a Sandbox Escape Vulnerability
GHSA-qcp4-v2jj-fjx8
pkg: vm2
eco: npm
published: May 7, 2026
### Summary

It is possible to reach `BaseHandler.getPrototypeOf`, which can be used to get arbitrary prototypes

### Details

https://github.com/patriksimek/vm2/blob/408fc855f1cc1bbc2985b029465ee0e732ada433/lib/bridge.js#L655-L658

`BaseHandler` can be reached via `util.inspect` (same as https://gi…

CVE-2026-44006
NVD

CRITICAL
CVE-2026-40281
CVE-2026-40281
pkg: docker

published: May 6, 2026

Gotenberg is a Docker-powered stateless API for PDF files. In versions 8.30.1 and earlier, the metadata write endpoint validates metadata keys for control characters but leaves metadata values unsanitized. A newline character in a metadata value splits the ExifTool stdin line into two separate argum…
CWE: CWE-88
NVD

CRITICAL
CVE-2026-42454
CVE-2026-42454
pkg: docker

published: May 8, 2026

Termix is a web-based server management platform with SSH terminal, tunneling, and file editing capabilities. Prior to version 2.1.0, all Docker container management endpoints in Termix interpolate the containerId URL path parameter and WebSocket message field directly into shell commands executed v…
CWE: CWE-78
GitHub-GHSA

CRITICAL
vm2 has a NodeVM builtin allowlist bypass via `module` builtin's `Module._load` that allows sandbox escape
GHSA-947f-4v7f-x2v8
pkg: vm2
eco: npm
published: May 7, 2026
## Summary
NodeVM's `builtin` allowlist can be bypassed when the `module` builtin is allowed (including via the `'*'` wildcard). The `module` builtin exposes Node's `Module._load()`, which loads any module by name directly in the host context, completely bypassing vm2's builtin restriction. This all…
CVE-2026-43999
GitHub-GHSA

CRITICAL
Fleet: Helm impersonation bypass of `RESTClientGetter` retains `cluster-admin` during template rendering
GHSA-765j-qfrp-hm3j
pkg: github.com/rancher/fleet, github.com/rancher/fleet, github.com/rancher/fleet
eco: go
published: May 7, 2026
### Impact

Fleet's Helm deployer did not fully apply ServiceAccount impersonation in two code paths, allowing a tenant with git push access to a Fleet-monitored repository to read secrets from any namespace on every downstream cluster targeted by their `GitRepo`.

**Helm `lookup` bypass:** The Helm…

CVE-2026-41050
GitHub-GHSA

CRITICAL
wger: cross-tenant password reset and plaintext disclosure via gym=None bypass
GHSA-mhc8-p3jx-84mm
pkg: wger
eco: pip
published: May 6, 2026
### Summary

The `reset_user_password` and `gym_permissions_user_edit` views in wger perform a gym-scope authorization check using Python object comparison (`!=`) that evaluates `None != None` as `False`, silently bypassing the guard when both the attacker and victim have no gym assignment (`gym=Non…

CVE-2026-43948
GitHub-GHSA

CRITICAL
Rucio has SQL Injection in FilterEngine PostgreSQL Query Builder via DID Search API
GHSA-6j7p-qjhg-9947
pkg: rucio, rucio, rucio
eco: pip
published: May 6, 2026
### Summary

A SQL injection vulnerability in `FilterEngine.create_postgres_query` allows any authenticated Rucio user to execute arbitrary SQL against the configured PostgreSQL metadata database through the DID search endpoint (`GET /dids/<scope>/dids/search`). When the external metadata plugin `po…

CVE-2026-29090
GitHub-GHSA

CRITICAL
Rucio has SQL Injection in FilterEngine Oracle JSON Path via DID Search API
GHSA-vjr5-c9qv-hgm3
pkg: rucio, rucio, rucio
eco: pip
published: May 6, 2026
### Summary

A SQL injection vulnerability in the Oracle path of `FilterEngine.create_sqla_query` allows any authenticated Rucio user to execute arbitrary SQL against the backend database through the DID search endpoint (`GET /dids/<scope>/dids/search`). Attacker-controlled filter keys and values ar…

CVE-2026-29080
GitHub-GHSA

CRITICAL
Apache Polaris has an Improper Input Validation Issue
GHSA-vxgg-mqx2-3w59
pkg: org.apache.polaris:polaris-core
eco: maven
published: May 4, 2026
Apache Polaris accepts literal `*` characters in namespace and table names. When it later builds temporary S3 access policies for delegated table access, those same characters appear to be reused unescaped in S3 IAM resource patterns and `s3:prefix` conditions.

In S3 IAM policy matching, `*` is tre…

CVE-2026-42810
GitHub-GHSA

CRITICAL
Apache Polaris has an Improper Input Validation Issue
GHSA-8ggj-j522-h5qf
pkg: org.apache.polaris:polaris-runtime-service
eco: maven
published: May 4, 2026
Apache Polaris can issue broad temporary ("vended") storage credentials during staged table creation before the effective table location has been validated or durably reserved. Those temporary credentials are meant to limit the scope of accessible table data and metadata, but this scope limitation b…
CVE-2026-42809
GitHub-GHSA

CRITICAL
Apache Polaris has an Improper Input Validation issue
GHSA-w76p-3cgp-qfcm
pkg: org.apache.polaris:polaris-runtime-service
eco: maven
published: May 4, 2026
In Apache Iceberg, the table's metadata files are control files: they tell readers which data files belong to the table and which table version to read.

`write.metadata.path` is an optional table property that tells Polaris where to write those metadata files. For a table already registered in a Po…

CVE-2026-42812
GitHub-GHSA

CRITICAL
Apache Polaris has an Improper Input Validation issue
GHSA-fc3h-c6h7-r83j
pkg: org.apache.polaris:polaris-core
eco: maven
published: May 4, 2026
In plain terms, Apache Polaris is supposed to issue short-lived GCS credentials that only work for one table's files, but a crafted namespace or table name can cause those credentials to work across the configured bucket instead.

Apache Polaris builds Google Cloud Storage downscoped credentials by …

CVE-2026-42811
NVD

CRITICAL
CVE-2026-42811
CVE-2026-42811
pkg: express

published: May 4, 2026

In plain terms, Apache Polaris is supposed to issue short-lived GCS credentials
that
only work for one table's files, but a crafted namespace or table name can
cause those credentials to work across the configured bucket instead.

Apache Polaris builds Google Cloud Storage downscoped credentials by…

CWE: CWE-20, CWE-917
GitHub-GHSA

CRITICAL
@profullstack/mcp-server vulnerable to OS Command Injection in domain_lookup Module
GHSA-v6wj-c83f-v46x
pkg: @profullstack/mcp-server
eco: npm
published: May 9, 2026
<html>
<body>
<!–StartFragment–><html><head></head><body><h1>Security Advisory: OS Command Injection in <code>profullstack/mcp-server</code> <code>domain_lookup</code> Module</h1>

Field | Value
— | —
Project | profullstack/mcp-server
Repository | https://github.com/profullstack/mcp-server
Affec…

GitHub-GHSA

CRITICAL
Electerm runWidget has a path traversal that leads to arbitrary code execution
GHSA-f77v-9vpc-6pjm
pkg: electerm
eco: npm
published: May 8, 2026
### Impact
The `runWidget` function in `src/app/widgets/load-widget.js` constructs a file path by directly concatenating user‑supplied widget identifiers without any sanitisation:

“`javascript
const file = `widget-${widgetId}.js`
const widget = require(path.join(__dirname, file))
“`

Because `r…

CVE-2026-43940
GitHub-GHSA

CRITICAL
vm2 has Sandbox Breakout Through Null Proto Exception
GHSA-9vg3-4rfj-wgcm
pkg: vm2
eco: npm
published: May 8, 2026
### Summary

VM2 suffers from a sandbox breakout vulnerability. This allows attackers to write code which can escape from the VM2 sandbox and execute arbitrary commands on the host system.

### Details

In `handleException` due to “// SECURITY (post-GHSA-mpf8 hardening): use `from` (not `ensureThis…

CVE-2026-44009
GitHub-GHSA

CRITICAL
vm2 has sandbox breakout via `neutralizeArraySpeciesBatch`
GHSA-9qj6-qjgg-37qq
pkg: vm2
eco: npm
published: May 8, 2026
### Summary

VM2 suffers from a sandbox breakout vulnerability. This allows attackers to write code which can escape from the VM2 sandbox and execute arbitrary commands on the host system.

### Details

The new method `neutralizeArraySpeciesBatch` works with objects from the other side but can call …

CVE-2026-44008
NVD

CRITICAL
CVE-2026-43402
CVE-2026-43402
pkg: node

published: May 8, 2026

In the Linux kernel, the following vulnerability has been resolved:

kthread: consolidate kthread exit paths to prevent use-after-free

Guillaume reported crashes via corrupted RCU callback function pointers
during KUnit testing. The crash was traced back to the pidfs rhashtable
conversion which rep…

NVD

CRITICAL
CVE-2026-41507
CVE-2026-41507
pkg: express

published: May 8, 2026

math-codegen generates code from mathematical expressions. Prior to version 0.4.3, string literal content passed to cg.parse() is injected verbatim into a new Function() body without sanitization. This allows an attacker to execute arbitrary system commands when user-controlled input reaches the par…
CWE: CWE-94
NVD

CRITICAL
CVE-2026-41497
CVE-2026-41497
pkg: praison praisonai

published: May 8, 2026

PraisonAI is a multi-agent teams system. Prior to version 4.6.9, the fix for PraisonAI's MCP command handling does not add a command allowlist or argument validation to parse_mcp_command(), allowing arbitrary executables like bash, python, or /bin/sh with inline code execution flags to pass through …
CWE: CWE-77, CWE-78
NVD

CRITICAL
CVE-2023-46453
CVE-2023-46453
pkg: express

published: May 8, 2026

Certain GL.iNet devices with 4.x firmware allow authentication bypass (resulting in administrative control of the device) via a username that is both a valid SQL statement and a valid regular expression. For example, this affects version 4.3.7 on GL-MT3000 GL-AR300M GL-B1300 GL-AX1800 GL-AR750S GL-M…
CWE: CWE-89
GitHub-GHSA

CRITICAL
Gotenberg has Unauthenticated RCE via ExifTool Metadata Key Injection
GHSA-rqgh-gxv4-6657
pkg: github.com/gotenberg/gotenberg/v8
eco: go
published: May 7, 2026
# Unauthenticated RCE in Gotenberg via Metadata Key Newline Injection

## Summary

Gotenberg's `/forms/pdfengines/metadata/write` HTTP endpoint accepts a JSON metadata object and passes its keys directly to ExifTool via the go-exiftool library. No validation is performed on key characters. A `\n` em…

CVE-2026-42589
NVD

CRITICAL
CVE-2026-41930
CVE-2026-41930
pkg: docker

published: May 6, 2026

Vvveb before version 1.0.8.2 contains a hard-coded credentials vulnerability in its docker-compose-apache.yaml configuration that allows unauthenticated attackers to access the bundled phpMyAdmin container with pre-configured database credentials. Attackers can connect to the phpMyAdmin port to gain…
CWE: CWE-306
GitHub-GHSA

CRITICAL
Nginx-UI is Vulnerable to Unauthenticated Remote Code Execution via Backup Restore
GHSA-4pvg-prr3-9cxr
pkg: github.com/0xJacky/nginx-ui
eco: go
published: May 6, 2026
**Product:** nginx-ui
**Repository:** `0xJacky/nginx-ui` (branch: `dev`)
**Vulnerability Class:** Authentication Bypass → Arbitrary File Write → OS Command Injection
**Affected Component:** `POST /api/restore`

## 1. Vulnerability Summary

nginx-ui exposes a backup restore endpoint (`POST /…

CVE-2026-42238
NVD

CRITICAL
CVE-2026-43186
CVE-2026-43186
pkg: node

published: May 6, 2026

In the Linux kernel, the following vulnerability has been resolved:

ipv6: ioam: fix heap buffer overflow in __ioam6_fill_trace_data()

On the receive path, __ioam6_fill_trace_data() uses trace->nodelen
to decide how much data to write for each node. It trusts this field
as-is from the incoming pack…

NVD

CRITICAL
CVE-2026-35579
CVE-2026-35579
pkg: coredns.io coredns

published: May 5, 2026

CoreDNS is a DNS server written in Go. In versions prior to 1.14.3, the gRPC, QUIC, DoH, and DoH3 transport implementations incorrectly handle TSIG authentication. For gRPC and QUIC, the server checks whether the TSIG key name exists in the configuration but never calls dns.TsigVerify() to validate …
CWE: CWE-287
NVD

CRITICAL
CVE-2026-38428
CVE-2026-38428
pkg: kestra kestra

published: May 5, 2026

Kestra v1.3.3 and before is vulnerable to SQL Injection. The vulnerability occurs because user-controlled input from a GET parameter is directly concatenated into an SQL query without proper sanitization or parameterization. As a result, attackers can inject arbitrary SQL expressions into the databa…
CWE: CWE-89
NVD

CRITICAL
CVE-2026-38431
CVE-2026-38431
pkg: frappe erpnext

published: May 5, 2026

ERPNext v15.103.1 and before is vulnerable to Server-Side Template Injection (SSTI). An attacker with permission to create or edit email templates can inject template expressions that are executed on the server when the template is rendered.
CWE: CWE-94
GitHub-GHSA

CRITICAL
VM2 Has a WASM Sandbox Escape (Node 25 only)
GHSA-ffh4-j6h5-pg66
pkg: vm2
eco: npm
published: May 5, 2026
## Summary

Full sandbox escape with arbitrary code execution. Attacker code inside `VM.run()` obtains host process object and runs host commands with zero host cooperation.

## Details

**Confirmed on:** vm2 3.10.4, Node.js v25.6.1 (x64 Linux)
**Trigger:** Attacker-controlled code passed to `VM.run…

CVE-2026-26956
GitHub-GHSA

CRITICAL
VM2 Has a Sandbox Escape Issue via SuppressedError
GHSA-55hx-c926-fr95
pkg: vm2
eco: npm
published: May 5, 2026
In vm2 v3.10.4 on Node.js v24.13.0, `SuppressedError` allows attackers to escape the sandbox and run arbitrary code.

### PoC
“`js
const { VM } = require("vm2");

const vm = new VM();

vm.run(`
const ds = new DisposableStack();
ds.defer(() => { throw null; });
ds.defer(() => {
const e = Error();

CVE-2026-26332
GitHub-GHSA

CRITICAL
VM2 Has Sandbox Breakout Through Inspect Function
GHSA-v37h-5mfm-c47c
pkg: vm2
eco: npm
published: May 5, 2026
### Summary

VM2 suffers from a sandbox breakout vulnerability through the `inspect` function. This allows attackers to write code which can escape from the VM2 sandbox and execute arbitrary commands on the host system.

### Details

The node `inspect` method allows to log details of objects. To get…

CVE-2026-24781
GitHub-GHSA

CRITICAL
VM2 Has Sandbox Breakout Through Promise Species
GHSA-qvjj-29qf-hp7p
pkg: vm2
eco: npm
published: May 5, 2026
### Summary

The fix for https://github.com/patriksimek/vm2/security/advisories/GHSA-cchq-frgv-rjh5 is insufficient and can be circumvented allowing attackers to write code which can escape from the VM2 sandbox and execute arbitrary commands on the host system.

### Details

The fix for https://gith…

CVE-2026-24120
NVD

CRITICAL
CVE-2026-43067
CVE-2026-43067
pkg: linux

published: May 5, 2026

In the Linux kernel, the following vulnerability has been resolved:

ext4: handle wraparound when searching for blocks for indirect mapped blocks

Commit 4865c768b563 ("ext4: always allocate blocks only from groups
inode can use") restricts what blocks will be allocated for indirect
block based file…

NVD

CRITICAL
CVE-2026-42238
CVE-2026-42238
pkg: nginxui nginx_ui

published: May 4, 2026

Nginx UI is a web user interface for the Nginx web server. Prior to version 2.3.8, nginx-ui exposes a backup restore endpoint (POST /api/restore) that is completely unauthenticated during the first 10 minutes after process startup on any fresh installation. An unauthenticated remote attacker can upl…
CWE: CWE-94
NVD

CRITICAL
CVE-2026-42233
CVE-2026-42233
pkg: n8n n8n

published: May 4, 2026

n8n is an open source workflow automation platform. Prior to versions 1.123.32, 2.17.4, and 2.18.1, a flaw in the Oracle Database node's select operation allowed user-controlled input passed into the Limit field via expressions to be interpolated directly into the SQL query without sanitization or p…
CWE: CWE-89
GitHub-GHSA

CRITICAL
Apache OpenNLP ExtensionLoader Vulnerable to Arbitrary Class Instantiation via Model Manifest
GHSA-cx4m-2p55-rw7j
pkg: org.apache.opennlp:opennlp-tools, org.apache.opennlp:opennlp-tools
eco: maven
published: May 4, 2026
Arbitrary Class Instantiation via Model Manifest in Apache OpenNLP ExtensionLoader

Versions Affected: before 2.5.9, before 3.0.0-M3

Description: 

The ExtensionLoader.instantiateExtension(Class, String) method loads a class by its fully-qualified name via Class.forName() and invokes its…

CVE-2026-42027
NVD

CRITICAL
CVE-2026-42796
CVE-2026-42796
pkg: python

published: May 4, 2026

Arelle before 2.39.10 contains an unauthenticated remote code execution vulnerability in the /rest/configure REST endpoint that accepts a plugins query parameter and forwards it to the plugin manager without authentication or authorization. Attackers can supply a URL to a malicious Python file throu…
CWE: CWE-306
NVD

CRITICAL
CVE-2026-42076
CVE-2026-42076
pkg: curl

published: May 4, 2026

Evolver is a GEP-powered self-evolving engine for AI agents. Prior to version 1.69.3, a command injection vulnerability in the _extractLLM() function allows attackers to execute arbitrary shell commands on the server. The function constructs a curl command using string concatenation and passes it to…
CWE: CWE-78
NVD

CRITICAL
CVE-2026-26956
CVE-2026-26956
pkg: vm2_project vm2

published: May 4, 2026

vm2 is an open source vm/sandbox for Node.js. In version 3.10.4, vm2 is vulnerable to full sandbox escape with arbitrary code execution. Attacker code inside VM.run() obtains host process object and runs host commands with zero host cooperation. This issue has been patched in version 3.10.5.
CWE: CWE-693
NVD

CRITICAL
CVE-2026-26332
CVE-2026-26332
pkg: vm2_project vm2

published: May 4, 2026

vm2 is an open source vm/sandbox for Node.js. Prior to version 3.11.0, SuppressedError allows attackers to escape the sandbox and run arbitrary code. This issue has been patched in version 3.11.0.
CWE: CWE-94, CWE-693
NVD

CRITICAL
CVE-2026-24781
CVE-2026-24781
pkg: vm2_project vm2

published: May 4, 2026

vm2 is an open source vm/sandbox for Node.js. Prior to version 3.11.0, VM2 suffers from a sandbox breakout vulnerability through the inspect function. This allows attackers to write code which can escape from the VM2 sandbox and execute arbitrary commands on the host system. This issue has been patc…
CWE: CWE-94, CWE-693
NVD

CRITICAL
CVE-2026-24120
CVE-2026-24120
pkg: vm2_project vm2

published: May 4, 2026

vm2 is an open source vm/sandbox for Node.js. Prior to version 3.10.5, the fix for CVE-2023-37466 is insufficient and can be circumvented allowing attackers to write code which can escape from the VM2 sandbox and execute arbitrary commands on the host system. This issue has been patched in version 3…
CWE: CWE-94, CWE-693
NVD

CRITICAL
CVE-2026-24118
CVE-2026-24118
pkg: vm2_project vm2

published: May 4, 2026

vm2 is an open source vm/sandbox for Node.js. Prior to version 3.11.0, VM2 suffers from a sandbox breakout vulnerability. This allows attackers to write code which can escape from the VM2 sandbox and execute arbitrary commands on the host system. This issue has been patched in version 3.11.0.
CWE: CWE-94, CWE-693
GitHub-GHSA

CRITICAL
Cline Kanban Server has a Cross-Origin WebSocket Hijacking Vulnerability
GHSA-5c57-rqjx-35g2
pkg: cline
eco: npm
published: May 8, 2026
## Summary

The `kanban` npm package (used by the `cline` CLI) starts a WebSocket server on `127.0.0.1:3484` with no Origin header validation. Any website a developer visits can silently connect to the kanban server via WebSocket and:

1. Leak sensitive data in real-time: workspace filesystem paths,…

CVE-2026-44211
NVD

CRITICAL
CVE-2026-44336
CVE-2026-44336
pkg: praison praisonai

published: May 8, 2026

PraisonAI is a multi-agent teams system. Prior to version 4.6.34, PraisonAI's MCP (Model Context Protocol) server (praisonai mcp serve) registers four file-handling tools by default — praisonai.rules.create, praisonai.rules.show, praisonai.rules.delete, and praisonai.workflow.show. Each accepts a …
CWE: CWE-20, CWE-22, CWE-94, CWE-829, CWE-913
NVD

CRITICAL
CVE-2026-42880
CVE-2026-42880
pkg: kubernetes

published: May 7, 2026

Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. From versions 3.2.0 to before 3.2.11 and 3.3.0 to before 3.3.9, there is a missing authorization and data-masking gap in Argo CD's ServerSideDiff endpoint that allows an attacker with read-only access to extract plaintext Kube…
CWE: CWE-200, CWE-212
GitHub-GHSA

CRITICAL
ArgoCD ServerSideDiff is vulnerable to Kubernetes Secret Extraction
GHSA-3v3m-wc6v-x4x3
pkg: github.com/argoproj/argo-cd/v3, github.com/argoproj/argo-cd/v3
eco: go
published: May 7, 2026
### Summary
There is a missing authorization and data-masking gap in Argo CD's ServerSideDiff endpoint that allows an attacker with read-only access to extract plaintext Kubernetes Secret data from etcd via the Kubernetes API server's Server-Side Apply dry-run mechanism.

### Details
Argo CD masks S…

CVE-2026-42880
NVD

CRITICAL
CVE-2026-7910
CVE-2026-7910
pkg: google chrome, apple macos, linux linux_kernel

published: May 6, 2026

Use after free in Views in Google Chrome prior to 148.0.7778.96 allowed a remote attacker who had compromised the renderer process to bypass site isolation via a crafted HTML page. (Chromium security severity: High)
CWE: CWE-416
NVD

CRITICAL
CVE-2026-7908
CVE-2026-7908
pkg: google chrome, apple macos, linux linux_kernel

published: May 6, 2026

Use after free in Fullscreen in Google Chrome prior to 148.0.7778.96 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)
CWE: CWE-416
NVD

CRITICAL
CVE-2026-42235
CVE-2026-42235
pkg: n8n n8n

published: May 4, 2026

n8n is an open source workflow automation platform. Prior to versions 1.123.32, 2.17.4, and 2.18.1, an unauthenticated attacker could register a malicious MCP OAuth client with a crafted client_name. If a victim user authorized the OAuth consent dialog and a second user subsequently revoked that acc…
CWE: CWE-79, CWE-87
NVD

CRITICAL
CVE-2026-42088
CVE-2026-42088
pkg: docker

published: May 4, 2026

OpenC3 COSMOS provides the functionality needed to send commands to and receive data from one or more embedded systems. Prior to version 7.0.0-rc3, the Script Runner widget allows users to execute Python and Ruby scripts directly from the openc3-COSMOS-script-runner-api container. Because all the do…
CWE: CWE-250
NVD

CRITICAL
CVE-2026-42090
CVE-2026-42090
pkg: node

published: May 4, 2026

Notesnook is a note-taking app focused on user privacy & ease of use. Prior to Notesnook Web/Desktop version 3.3.15 and prior to Notesnook iOS/Android version 3.3.20, a stored XSS vulnerability in the note export flow can be escalated to remote code execution in the desktop app. The root cause is th…
CWE: CWE-79, CWE-94
GitHub-GHSA

CRITICAL
free5GC's NEF 3gpp-traffic-influence API is unauthenticated; missing or forged bearer tokens can create, read, patch, and delete subscriptions
GHSA-3p28-73q7-45xp
pkg: github.com/free5gc/nef
eco: go
published: May 8, 2026
### Summary
free5GC's NEF mounts the `3gpp-traffic-influence` API without inbound OAuth2/bearer-token authorization. A network attacker who can reach NEF on the SBI can create, read, patch, and delete traffic-influence subscriptions either with no `Authorization` header at all, or with a forged bear…
CVE-2026-44326
GitHub-GHSA

CRITICAL
free5GC's NEF 3gpp-pfd-management API is unauthenticated; forged bearer tokens can create, read, and delete PFD transactions
GHSA-5f62-53r8-qrqf
pkg: github.com/free5gc/nef
eco: go
published: May 8, 2026
### Summary
free5GC's NEF mounts the `3gpp-pfd-management` API without inbound OAuth2/bearer-token authorization. A network attacker who can reach NEF on the SBI can create, read, and delete PFD-management transaction state with a forged or arbitrary bearer token (e.g. `Authorization: Bearer not-a-r…
CVE-2026-44315
GitHub-GHSA

CRITICAL
Gotenberg vulnerable to unauthenticated SSRF via default deny-list bypass in downloadFrom and webhook
GHSA-4vmc-gm8v-m35h
pkg: github.com/gotenberg/gotenberg/v8
eco: go
published: May 7, 2026
### Summary
The default deny-lists used by Gotenberg's `downloadFrom` feature and `webhook` feature are bypassable. Because the filter is regex-based and case-sensitive, an unauthenticated attacker can supply URLs such as `http://[::ffff:127.0.0.1]:…` and reach loopback or private HTTP services th…
CVE-2026-42596
GitHub-GHSA

CRITICAL
S3-Proxy has Security Issues in its Resource Path Matching Implementation
GHSA-rfgq-wgg8-662p
pkg: github.com/oxyno-zeta/s3-proxy
eco: go
published: May 5, 2026
## Background

The original concern is functional: a resource pattern should treat a percent-encoded segment like some%2Fvalue as a single opaque token rather than splitting it into two path segments at the decoded /. Investigation into why %2F was being decoded and how routes matched against the re…

CVE-2026-42882
GitHub-GHSA

CRITICAL
Compromised version of intercom-client published to npm
GHSA-54pg-9963-v8vg
pkg: intercom-client
eco: npm
published: May 7, 2026
### Impact

On April 30, 2026, version 7.0.4 of intercom-client was published to npm using credentials obtained from a compromised developer account. This version was not produced by Intercom's build pipeline.

The malicious version contained an obfuscated JavaScript payload that executed during pac…

NVD

CRITICAL
CVE-2026-42560
CVE-2026-42560
pkg: oauth

published: May 9, 2026

auth provides authentication via oauth2, direct and email. From versions 1.18.0 to before 1.25.2 and 2.0.0 to before 2.1.2, the Patreon OAuth provider maps every authenticated Patreon account to the same local user.ID, instead of deriving a unique ID from the Patreon account returned by Patreon. In …
CWE: CWE-287
GitHub-GHSA

CRITICAL
Open WebUI has an LDAP Empty Password Authentication Bypass
GHSA-2r4p-jpmg-48f4
pkg: open-webui
eco: pip
published: May 8, 2026
# LDAP Empty Password Authentication Bypass

## Affected Component

LDAP authentication endpoint:
– `backend/open_webui/routers/auths.py` (lines 468-477, user bind with empty password)
– `backend/open_webui/models/auths.py` (lines 58-60, `LdapForm` model)

## Affected Versions

Current main branch (…

CVE-2026-44551
NVD

CRITICAL
CVE-2026-44497
CVE-2026-44497
pkg: zfnd zebra-script, zfnd zebrad

published: May 8, 2026

ZEBRA is a Zcash node written entirely in Rust. Prior to zebrad version 4.4.0 and prior to zebra-script version 6.0.0, the fix for CVE-2026-41583 introduced a separate issue due to insufficient error handling of the case where the sighash type is invalid, during sighash computation. Instead of retur…
CWE: CWE-347
NVD

CRITICAL
CVE-2026-41583
CVE-2026-41583
pkg: zfnd zebra-script, zfnd zebrad

published: May 8, 2026

ZEBRA is a Zcash node written entirely in Rust. Prior to zebrad version 4.3.1 and prior to zebra-script version 5.0.2, after a refactoring, Zebra failed to validate a consensus rule that restricted the possible values of sighash hash types for V5 transactions which were enabled in the NU5 network up…
CWE: CWE-573
GitHub-GHSA

CRITICAL
vm2 NodeVM `nesting: true` bypasses `require: false` allowing sandbox escape and arbitrary OS command execution
GHSA-8hg8-63c5-gwmx
pkg: vm2
eco: npm
published: May 7, 2026
### Summary

When a `NodeVM` is created with `nesting: true`, sandbox code can unconditionally `require('vm2')` regardless of the outer VM's `require` configuration — including `require: false`. With access to `vm2`, the sandbox constructs a new inner `NodeVM` with its own unrestricted `require` s…

CVE-2026-44007
GitHub-GHSA

CRITICAL
FileBrowser Public Share DELETE API Path Traversal Allows Unauthenticated Arbitrary File Deletion
GHSA-fwj3-42wh-8673
pkg: github.com/gtsteffaniak/filebrowser
eco: go
published: May 7, 2026
### **Summary**

Attacker-controlled path input is joined with a trusted base path prior to sanitization, allowing traversal sequences (e.g., ../) to escape the intended shared directory. As a result, an unauthenticated attacker possessing a valid public share hash with delete permissions enabled ca…

CVE-2026-44542
GitHub-GHSA

CRITICAL
Axonflow fixed bugs by implementing multi-tenant isolation and access-control hardening
GHSA-9h64-2846-7x7f
pkg: github.com/getaxonflow/axonflow
eco: go
published: May 6, 2026
## Summary

Eight independently-filed bug fixes in the v7.1.3 → v7.5.0 release window collectively close a set of multi-tenant isolation, access-control, and policy-enforcement defects in the AxonFlow platform. They are filed as a single consolidated advisory because the recommended remediation is…

GitHub-GHSA

CRITICAL
fast-jwt: JWT auth bypass due to empty HMAC secret accepted by async key resolver
GHSA-gmvf-9v4p-v8jc
pkg: fast-jwt
eco: npm
published: May 6, 2026
### Summary

A critical authentication-bypass vulnerability in `fast-jwt`'s async key-resolver flow allows any unauthenticated attacker to forge arbitrary JWTs that are accepted as authentic. When the application's key resolver returns an empty string (`''`), for example via the common `keys[decoded…

CVE-2026-44351
GitHub-GHSA

CRITICAL
Valtimo has SpEL injection via StandardEvaluationContext that allows Remote Code Execution by admin users
GHSA-j7j9-5253-f7vh
pkg: com.ritense.valtimo:document, com.ritense.valtimo:case, com.ritense.valtimo:contract
eco: maven
published: May 6, 2026
### Summary

Multiple classes evaluate Spring Expression Language (SpEL) expressions from user-supplied input using `StandardEvaluationContext`, which provides unrestricted access to Java types and methods. An authenticated user with the ADMIN role can achieve Remote Code Execution and credential ex…

CVE-2026-42555
NVD

CRITICAL
CVE-2026-43083
CVE-2026-43083
pkg: linux

published: May 6, 2026

In the Linux kernel, the following vulnerability has been resolved:

net: ioam6: fix OOB and missing lock

When trace->type.bit6 is set:

if (trace->type.bit6) {

queue = skb_get_tx_queue(dev, skb);
qdisc = rcu_dereference(queue->qdisc);

This code can lead to an out-o…

NVD

CRITICAL
CVE-2026-43071
CVE-2026-43071
pkg: linux

published: May 5, 2026

In the Linux kernel, the following vulnerability has been resolved:

dcache: Limit the minimal number of bucket to two

There is an OOB read problem on dentry_hashtable when user sets
'dhash_entries=1':
BUG: unable to handle page fault for address: ffff888b30b774b0
#PF: supervisor read access in…

NVD

CRITICAL
CVE-2026-36356
CVE-2026-36356
pkg: go

published: May 5, 2026

The GoAhead web server on MeiG Smart FORGE_SLT711 devices (firmware MDM9607.LE.1.0-00110-STD.PROD-1) allows unauthenticated OS command injection via the /action/SetRemoteAccessCfg endpoint.
CWE: CWE-78, CWE-306
GitHub-GHSA

CRITICAL
OpenMRS has Stored Velocity SSTI to RCE via ConceptReferenceRange
GHSA-xj4f-8jjg-vx4q
pkg: org.openmrs.api:openmrs-api, org.openmrs.api:openmrs-api
eco: maven
published: May 4, 2026
### Impact

The `ConceptReferenceRangeUtility.evaluateCriteria()` method in OpenMRS Core
evaluates database-stored criteria strings as Apache Velocity templates without any sandbox configuration. The `VelocityEngine` is initialized with only logging properties and no`SecureUberspector`, leaving the …

CVE-2026-41258
GitHub-GHSA

CRITICAL
Apache OpenNLP DictionaryEntryPersistor Vulnerable to XML External Entity (XXE) via Unsanitized Dictionary Parsing
GHSA-4v8g-86×5-3vrc
pkg: org.apache.opennlp:opennlp-tools, org.apache.opennlp:opennlp-tools
eco: maven
published: May 4, 2026
XML External Entity (XXE) via Unsanitized Dictionary Parsing in Apache OpenNLP DictionaryEntryPersistor

Versions Affected: before 2.5.9, before 3.0.0-M3

Description: The DictionaryEntryPersistor class initializes a static SAXParserFactory at class-load time without enabling FEATURE_SECURE_PROCES…

CVE-2026-40682
GitHub-GHSA

CRITICAL
ArcadeDB vulnerable to cross-database authorization bypass and unsecured newly-created databases
GHSA-fxc7-fm93-6q77
pkg: com.arcadedb:arcadedb-server
eco: maven
published: May 5, 2026
### Impact
Authenticated users and API tokens scoped to a specific database could read, write, and mutate schema on any other database on the same server. Two distinct defects contributed: (1) ServerSecurityUser.getDatabaseUser() returned a DB user with an uninitialized fileAccessMap, which requestA…
CVE-2026-44221
GitHub-GHSA

CRITICAL
Sandboxed Thymeleaf expressions vulnerable to improper recognition of unauthorized syntax patterns
GHSA-c9ph-gxww-7744
pkg: org.thymeleaf:thymeleaf, org.thymeleaf:thymeleaf-spring5, org.thymeleaf:thymeleaf-spring6
eco: maven
published: May 4, 2026
### Impact

A security bypass vulnerability exists in the expression execution mechanisms of Thymeleaf up to and including 3.1.4.RELEASE. Although the library provides mechanisms to avoid the execution of potentially dangerous expressions in some specific sandboxed (restricted) contexts, it fails to…

CVE-2026-41901
GitHub-GHSA

CRITICAL
OpenMRS Module Upload Vulnerable to Path Traversal (Zip Slip)
GHSA-78fc-9688-w8xw
pkg: org.openmrs.web:openmrs-web, org.openmrs.web:openmrs-web
eco: maven
published: May 4, 2026
## Affected Versions

version ≤ 2.7.8 (latest version at time of disclosure)

https://github.com/openmrs/openmrs-core

## Impact

The endpoint `POST /openmrs/ws/rest/v1/module` is vulnerable to a path traversal (Zip Slip) attack. An authenticated attacker can upload a crafted `.omod` archive conta…

CVE-2026-40076
GitHub-GHSA

CRITICAL
SiYuan: Electron Renderer RCE via decodeURIComponent-driven tooltip XSS in aria-label sink (incomplete fix for CVE-2026-34585)
GHSA-25rp-h46x-2hjm
pkg: github.com/siyuan-note/siyuan/kernel
eco: go
published: May 8, 2026
## Summary

The tooltip mouseover handler in `app/src/block/popover.ts` reads `aria-label` via `getAttribute` and passes it through `decodeURIComponent` before assigning to `messageElement.innerHTML` in `app/src/dialog/tooltip.ts:41`. The encoder used at the producer side, `escapeAriaLabel` in `app/…

CVE-2026-44588
GitHub-GHSA

CRITICAL
Electerm users can run dangrous code through link or command line
GHSA-mpm8-cx2p-626q
pkg: electerm
eco: npm
published: May 8, 2026
### Impact
_Arbitrary local code execution via deep links, CLI `–opts`, or crafted shortcuts. Affected users: electerm installs that accept protocol URLs or CLI options (affected versions listed in the original report). Exploit requires clicking a crafted `electerm://…` link or opening a crafted …
CVE-2026-43944
GitHub-GHSA

CRITICAL
Zebra v4.4.0 still accepts V5 SIGHASH_SINGLE without a corresponding output
GHSA-pvmv-cwg8-v6c8
pkg: zebrad, zebra-script
eco: rust
published: May 8, 2026
# Consensus Divergence in V5 Transparent SIGHASH_SINGLE With No Corresponding Output

## Summary

Zebra failed to enforce a ZIP-244 consensus rule for V5 transparent transactions: when an input is signed with `SIGHASH_SINGLE` and there is no transparent output at the same index as that input, valida…

GitHub-GHSA

CRITICAL
SiYuan Affected by Stored XSS via Attribute View Name to Electron Renderer RCE
GHSA-2h64-c999-c9r6
pkg: github.com/siyuan-note/siyuan/kernel
eco: go
published: May 8, 2026
## Summary

The kernel stores Attribute View (AV / database) names without any HTML escape, then a render template uses raw `strings.ReplaceAll(tpl, "${avName}", nodeAvName)` to embed the name in HTML before pushing to all clients via WebSocket. Three independent client paths (`render.ts:120` → `o…

CVE-2026-44670
GitHub-GHSA

CRITICAL
Zebra's Transparent SIGHASH_SINGLE Handling Diverges from zcashd for Corresponding Outputs
GHSA-cwfq-rfcr-8hmp
pkg: zebrad
eco: rust
published: May 7, 2026
# `Zebra` Transparent `SIGHASH_SINGLE` Corresponding-Output Handling Diverges From `zcashd`

### Summary
For V5+ transparent spends, `Zebra` and `zcashd` disagree on the same consensus rule: `SIGHASH_SINGLE` must fail when the input index has no corresponding output. `zcashd` treats this as consensu…

GitHub-GHSA

CRITICAL
Zebra has Consensus Divergence in Transparent Sighash Hash-Type Handling due to Stale Buffer
GHSA-gq4h-3grw-2rhv
pkg: zebra-script, zebrad
eco: rust
published: May 7, 2026
# CVE-2026-44497: Consensus Divergence in Transparent Sighash Hash-Type Handling due to Stale Buffer

## Summary

The fix for https://github.com/ZcashFoundation/zebra/security/advisories/GHSA-8m29-fpq5-89jj introduced a separate issue due to insuficient error handling of the case where the sighash t…

CVE-2026-44497
GitHub-GHSA

CRITICAL
Zebra's Block Validator Undercounts Coinbase and P2SH Sigops
GHSA-jv4h-j224-23cc
pkg: zebrad
eco: rust
published: May 7, 2026
Zebra's block validator undercounts transparent signature operations against the 20000-sigop block limit (`MAX_BLOCK_SIGOPS`), allowing it to accept blocks that `zcashd` rejects with `bad-blk-sigops`. A miner who produces such a block can split the network: Zebra nodes follow the offending chain whi…
CVE-2026-44498
GitHub-GHSA

CRITICAL
Compromise of PyTorch Lightning PyPi Package Versions
GHSA-w37p-236h-pfx3
pkg: pytorch-lightning, pytorch-lightning
eco: pip
published: May 7, 2026
# Security Advisory: Compromise of PyTorch Lightning PyPI Package Versions

**Published:** 2026-04-30
**Last Updated:** 2026-04-30

Lightning AI has identified a security incident affecting certain versions of a PyPI package.

## What happened

Lightning AI has determined that one or more releas…

CVE-2026-44484
GitHub-GHSA

CRITICAL
misp-modules website – Missing CSRF protection in the website home blueprint
GHSA-j4rh-7jcr-qm69
pkg: misp-modules
eco: pip
published: May 6, 2026
A Cross-Site Request Forgery vulnerability in the MISP Modules website allowed an attacker to cause an authenticated user to submit unintended requests to the home endpoint. The vulnerability was due to the home blueprint being exempted from CSRF protection. This could allow modification of session …
CVE-2026-44364
GitHub-GHSA

CRITICAL
DevGuard has an unauthenticated identity assertion via `X-Admin-Token` header
GHSA-2g9v-7mr5-fgjg
pkg: github.com/l3montree-dev/devguard
eco: go
published: May 5, 2026
### Impact
The `SessionMiddleware` accepts a client-supplied `X-Admin-Token` HTTP request header and uses its raw string value as the authenticated `userID` when no Kratos session cookie is present. An unauthenticated attacker who knows or can guess a target user's Kratos identity UUID can issue req…
CVE-2026-42300
GitHub-GHSA

CRITICAL
MagicMirror vulnerable to unauthenticated SSRF via /cors endpoint
GHSA-ph6f-2cvq-79hq
pkg: magicmirror
eco: npm
published: May 5, 2026
### Summary

An unauthenticated Server-Side Request Forgery (SSRF) vulnerability in the `/cors` endpoint allows any remote attacker to force the MagicMirror² server to perform arbitrary HTTP requests to internal networks, cloud metadata services, and localhost services. The endpoint also expands en…

CVE-2026-42281
GitHub-GHSA

CRITICAL
django-s3file is vulnerable to relative path traversal
GHSA-67qg-7284-2277
pkg: django-s3file
eco: pip
published: May 5, 2026
### Impact
`S3FileMiddleware` is vulnerable to relative path traversal attacks, where an attacker can use a modified request to escape pre-signed upload locations and have the Django application load files from random locations into `request.FILES`

Depending on how files are handled, this may lead …

CVE-2026-42196
GitHub-GHSA

CRITICAL
`mysten-metrics` was removed from crates.io for malicious code
GHSA-g38r-8gmr-ghrf
pkg: mysten-metrics
eco: rust
published: May 4, 2026
`mysten-metrics` included a build script that attempted to exfiltrate data from the build machine.

The malicious crate had 1 version published on 2026-04-20 and had no evidence of actual usage. This crate had no dependencies on crates.io.

GitHub-GHSA

CRITICAL
`sui-execution-cut` was removed from crates.io for malicious code
GHSA-qprh-m6p3-hwxc
pkg: sui-execution-cut
eco: rust
published: May 4, 2026
`sui-execution-cut` included a build script that attempted to exfiltrate data from the build machine.

The malicious crate had 1 version published on 2026-04-20 and had no evidence of actual usage. This crate had no dependencies on crates.io.

GitHub-GHSA

HIGH
Electerm Security Vulnerability: RCE via malicious SSH server filename in openFileWithEditor
GHSA-q4p8-8j9m-8hxj
pkg: electerm
eco: npm
published: May 8, 2026
### Impact

A code execution (RCE) vulnerability exists in electerm's SFTP open with system editor or "Edit with custom editor" feature. When a user opts to edit a file using open with system editor or open with a custom editor, the filename is passed directly into a command line without sanitizatio…

CVE-2026-43943
GitHub-GHSA

HIGH
Electerm has an unvalidated shell.openExternal that allows arbitrary protocol execution via terminal link click
GHSA-fwf6-j56g-m97c
pkg: electerm
eco: npm
published: May 8, 2026
### Impact

Electerm's terminal hyperlink handler passes any URL clicked in the terminal directly to `shell.openExternal` without any protocol validation.

When a user connects to a malicious SSH server, the attacker can print a crafted URI in the terminal output. If the victim clicks the link, `she…

CVE-2026-43941
NVD

HIGH
CVE-2026-42215
CVE-2026-42215
pkg: python

published: May 7, 2026

GitPython is a python library used to interact with Git repositories. From version 3.1.30 to before version 3.1.47, GitPython blocks dangerous Git options such as –upload-pack and –receive-pack by default, but the equivalent Python kwargs upload_pack and receive_pack bypass that check. If an appli…
CWE: CWE-78
NVD

HIGH
CVE-2025-63705
CVE-2025-63705
pkg: node

published: May 7, 2026

NPM package node-ts-ocr 1.0.15 is vulnerable to OS Command Injection via the invokeImageOcr function in src/index.js.
CWE: CWE-78
NVD

HIGH
CVE-2026-41139
CVE-2026-41139
pkg: mathjs mathjs

published: May 7, 2026

Math.js is an extensive math library for JavaScript and Node.js. From version 13.1.0 to before version 15.2.0, arbitrary JavaScript can be executed via the expression parser of mathjs. This issue has been patched in version 15.2.0.
CWE: CWE-915
GitHub-GHSA

HIGH
Diffusers has a `trust_remote_code` bypass via `custom_pipeline` and local custom components
GHSA-98h9-4798-4q5v
pkg: diffusers
eco: pip
published: May 7, 2026
### Impact

A `trust_remote_code` bypass in `DiffusionPipeline.from_pretrained` allows arbitrary remote code execution despite the user passing `trust_remote_code=False` (or omitting it, which is the default). The vulnerability has three variants, all sharing the same root cause — the `trust_remot…

CVE-2026-44513
GitHub-GHSA

HIGH
Diffusers has a `trust_remote_code` bypass via `custom_pipeline` and local custom components
GHSA-j7w6-vpvq-j3gm
pkg: diffusers
eco: pip
published: May 7, 2026
## Background

This vulnerability is found in the `DiffusionPipeline.from_pretrained` flow, which is used to load a pipeline from the HuggingFace Hub.

This function accepts an optional `custom_pipeline` keyword argument: the name of a Python file in the repo that contains a custom class inheriting …

CVE-2026-44827
GitHub-GHSA

HIGH
rmcp Streamable HTTP server transport has a DNS rebinding vulnerability
GHSA-89vp-x53w-74fx
pkg: rmcp
eco: rust
published: May 6, 2026
## Summary

Prior to version 1.4.0, the `rmcp` crate's Streamable HTTP server transport (`crates/rmcp/src/transport/streamable_http_server/`) did not validate the incoming `Host` header. This allowed a malicious public website, via a DNS rebinding attack, to send authenticated requests to an MCP ser…

CVE-2026-42559
NVD

HIGH
CVE-2026-8000
CVE-2026-8000
pkg: google chrome, apple macos, linux linux_kernel

published: May 6, 2026

Insufficient validation of untrusted input in ChromeDriver in Google Chrome on Windows prior to 148.0.7778.96 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: Low)
CWE: CWE-20
NVD

HIGH
CVE-2026-7973
CVE-2026-7973
pkg: google chrome, microsoft windows

published: May 6, 2026

Integer overflow in Dawn in Google Chrome on Windows prior to 148.0.7778.96 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Medium)
CWE: CWE-472
NVD

HIGH
CVE-2026-7928
CVE-2026-7928
pkg: google chrome, microsoft windows

published: May 6, 2026

Use after free in WebRTC in Google Chrome on Windows prior to 148.0.7778.96 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)
CWE: CWE-416
NVD

HIGH
CVE-2026-7907
CVE-2026-7907
pkg: google chrome, apple macos, linux linux_kernel

published: May 6, 2026

Use after free in DOM in Google Chrome prior to 148.0.7778.96 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)
CWE: CWE-416
NVD

HIGH
CVE-2026-7906
CVE-2026-7906
pkg: google chrome, apple macos, linux linux_kernel

published: May 6, 2026

Use after free in SVG in Google Chrome prior to 148.0.7778.96 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)
CWE: CWE-416
NVD

HIGH
CVE-2026-7903
CVE-2026-7903
pkg: google chrome, apple macos, microsoft windows

published: May 6, 2026

Integer overflow in ANGLE in Google Chrome on Mac,Windows prior to 148.0.7778.96 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
CWE: CWE-472
NVD

HIGH
CVE-2026-7902
CVE-2026-7902
pkg: google chrome, apple macos, linux linux_kernel

published: May 6, 2026

Out of bounds memory access in V8 in Google Chrome prior to 148.0.7778.96 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)
CWE: CWE-787, CWE-125
NVD

HIGH
CVE-2026-7901
CVE-2026-7901
pkg: google chrome, apple macos

published: May 6, 2026

Use after free in ANGLE in Google Chrome on Mac prior to 148.0.7778.96 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)
CWE: CWE-416
NVD

HIGH
CVE-2026-7899
CVE-2026-7899
pkg: google chrome, apple macos, linux linux_kernel

published: May 6, 2026

Out of bounds read and write in V8 in Google Chrome prior to 148.0.7778.96 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)
CWE: CWE-125, CWE-787
NVD

HIGH
CVE-2026-7898
CVE-2026-7898
pkg: google chrome, linux linux_kernel

published: May 6, 2026

Use after free in Chromoting in Google Chrome on Linux prior to 148.0.7778.96 allowed a remote attacker to execute arbitrary code via malicious network traffic. (Chromium security severity: Critical)
CWE: CWE-416
NVD

HIGH
CVE-2026-7896
CVE-2026-7896
pkg: google chrome, apple macos, linux linux_kernel

published: May 6, 2026

Integer overflow in Blink in Google Chrome prior to 148.0.7778.96 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical)
CWE: CWE-472
NVD

HIGH
CVE-2026-42503
CVE-2026-42503
pkg: go

published: May 6, 2026

gopls by default communicates via pipe. However, -port and -listen flags are supported as means of debugging.
If -listen is given a value without an explicit host (e.g. :8080), or -port is used, gopls will listen on 0.0.0.0. 
As a result, users might inadvertently cause gopls to bind 0.0.0.0.
This…
CWE: CWE-1327
NVD

HIGH
CVE-2026-43158
CVE-2026-43158
pkg: go

published: May 6, 2026

In the Linux kernel, the following vulnerability has been resolved:

xfs: fix freemap adjustments when adding xattrs to leaf blocks

xfs/592 and xfs/794 both trip this assertion in the leaf block freemap
adjustment code after ~20 minutes of running on my test VMs:

ASSERT(ichdr->firstused >= ichdr-…

GitHub-GHSA

HIGH
@evomap/evolver: Path Traversal in `evolver fetch` default-branch `safeId` allows Hub-controlled overwrite of project files (RCE)
GHSA-cfcj-hqpf-hccf
pkg: @evomap/evolver
eco: npm
published: May 5, 2026
## Summary

The `evolver fetch` subcommand in `index.js` writes Hub-supplied `bundled_files[]` into a directory derived from a Hub-supplied `skill_id`. When `–out` is not used, the path-sanitizing regex permits `.` characters, allowing a `skill_id` of `..` to escape the `skills/` subdirectory and r…

GitHub-GHSA

HIGH
Hysteria: A specially constructed quic package can crash the server OOM when the sniff is enabled
GHSA-9fw6-xgg2-mq9q
pkg: github.com/apernet/hysteria/core/v2
eco: go
published: May 5, 2026
### Summary

A specially constructed quic package can crash the server OOM when the sniff is enabled.

### Details

When the server has sniff enabled, a valid connection can request the server to forward UDP traffic and construct a huge crypto length. The server will allocate memory according to thi…

GitHub-GHSA

HIGH
JupyterHub has an Extension Manager API/GUI Policy Discrepancy, allowing 3rd party (malicious) extensions install via POST request
GHSA-37w4-hwhx-4rc4
pkg: jupyterlab
eco: pip
published: May 5, 2026
The allow-list of extensions that can be installed from PyPI Extension Manager (`allowed_extensions_uris`) is not correctly enforced by JupyterLab prior to 4.5.X. The PyPI Extension Manager was not contained to packages listed on the default PyPI index.

This has security implications for deployment…

CVE-2026-42266
GitHub-GHSA

HIGH
YAFNET: Pre-Handler Authorization Bypass on Admin Pages Enables Blind SQL Execution via `/Admin/RunSql`
GHSA-xhw7-j96h-c3g5
pkg: YAFNET.Core
eco: nuget
published: May 5, 2026
**Issue Details:**
YAFNET's only admin authorization gate is `PageSecurityCheckAttribute`, implemented as a `ResultFilterAttribute` that runs *after* the page handler completes rather than before it. No other gate exists. Any admin `OnPost…` handler therefore executes its side effects before the f…
CVE-2026-43937
NVD

HIGH
CVE-2026-34464
CVE-2026-34464
pkg: sandboxie-plus sandboxie

published: May 5, 2026

Sandboxie-Plus is an open source sandbox-based isolation software for Windows. In versions 1.17.2 and earlier, NamedPipeServer::OpenHandler copies the server field from NAMED_PIPE_OPEN_REQ into a fixed WCHAR pipename[160] stack buffer using wcscat without verifying null termination. The handler only…
CWE: CWE-121, CWE-170
NVD

HIGH
CVE-2026-34459
CVE-2026-34459
pkg: sandboxie-plus sandboxie

published: May 5, 2026

Sandboxie-Plus is an open source sandbox-based isolation software for Windows. In versions 1.17.2 and earlier, the SbieSvc proxy service's GetRawInputDeviceInfoSlave handler contains two vulnerabilities that can be chained for sandbox escape. First, when a sandboxed process sends an IPC request with…
CWE: CWE-121
NVD

HIGH
CVE-2026-34458
CVE-2026-34458
pkg: sandboxie-plus sandboxie

published: May 5, 2026

Sandboxie-Plus is an open source sandbox-based isolation software for Windows. In versions 1.17.2 and earlier, an INI injection vulnerability allows any standard local user to bypass configuration restrictions (EditAdminOnly and ConfigPassword) and inject arbitrary directives into the global Sandbox…
CWE: CWE-93
GitHub-GHSA

HIGH
OpenClaw's gateway config mutation guard allowed unsafe model-driven config writes
GHSA-cwj3-vqpp-pmxr
pkg: openclaw
eco: npm
published: May 5, 2026
## Summary

The agent-facing `gateway` tool protects `config.apply` and `config.patch` with a model-to-operator trust boundary. That guard used a hand-maintained denylist of protected config paths. The config schema outgrew that denylist, leaving sensitive subtrees writable through model-driven gate…

NVD

HIGH
CVE-2026-42434
CVE-2026-42434
pkg: node

published: May 5, 2026

OpenClaw versions 2026.4.5 before 2026.4.10 contain a sandbox escape vulnerability allowing sandboxed agents to override exec routing by specifying host=node. Attackers can bypass sandbox boundaries and route execution to remote nodes instead of intended sandbox paths.
CWE: CWE-863
NVD

HIGH
CVE-2026-42237
CVE-2026-42237
pkg: n8n n8n

published: May 4, 2026

n8n is an open source workflow automation platform. Prior to versions 1.123.32, 2.17.4, and 2.18.1, the fix for GHSA-f3f2-mcxc-pwjx did not cover the Snowflake node or the legacy MySQL v1 node. Both nodes construct SQL queries by directly interpolating user-controlled table names, column names, and …
CWE: CWE-89
NVD

HIGH
CVE-2026-42234
CVE-2026-42234
pkg: n8n n8n

published: May 4, 2026

n8n is an open source workflow automation platform. Prior to versions 1.123.32, 2.17.4, and 2.18.1, an authenticated user with permission to create or modify workflows containing a Python Code Node could escape the sandbox and achieve arbitrary code execution on the task runner container. This issue…
CWE: CWE-94
NVD

HIGH
CVE-2026-42232
CVE-2026-42232
pkg: n8n n8n

published: May 4, 2026

n8n is an open source workflow automation platform. Prior to versions 1.123.32, 2.17.4, and 2.18.1, an authenticated user with permission to create or modify workflows could achieve global prototype pollution via the XML Node leading to RCE when combined with other nodes exploiting the prototype pol…
CWE: CWE-1321
NVD

HIGH
CVE-2026-42231
CVE-2026-42231
pkg: n8n n8n

published: May 4, 2026

n8n is an open source workflow automation platform. Prior to versions 1.123.32, 2.17.4, and 2.18.1, a flaw in the xml2js library used to parse XML request bodies in n8n's webhook handler allowed prototype pollution via a crafted XML payload. An authenticated user with permission to create or modify …
CWE: CWE-1321
NVD

HIGH
CVE-2026-42229
CVE-2026-42229
pkg: n8n n8n

published: May 4, 2026

n8n is an open source workflow automation platform. Prior to versions 1.123.32, 2.17.4, and 2.18.1, a flaw in the SeaTable node's row:search and row:get operations allowed user-controlled input to be concatenated directly into SQL query strings without escaping or parameterization. In workflows wher…
CWE: CWE-89
NVD

HIGH
CVE-2026-29514
CVE-2026-29514
pkg: express

published: May 4, 2026

NetBox versions 4.3.5 through 4.5.4 contain a remote code execution vulnerability in the RenderTemplateMixin.get_environment_params() method that allows authenticated users with exporttemplate or configtemplate permissions to execute arbitrary code by specifying malicious Python callables in the env…
CWE: CWE-183
GitHub-GHSA

HIGH
Open WebUI: Redis Cache Keys tool_servers and terminal_servers Missing Instance Prefix Enable Cross-Instance Cache Poisoning
GHSA-3x8w-4f7p-xxc2
pkg: open-webui
eco: pip
published: May 8, 2026
# Redis Cache Keys tool_servers and terminal_servers Missing Instance Prefix Enable Cross-Instance Cache Poisoning

## Affected Component

Tool server and terminal server Redis cache:
– `backend/open_webui/utils/tools.py` (line 841, tool_servers SET)
– `backend/open_webui/utils/tools.py` (line 850, …

CVE-2026-44552
GitHub-GHSA

HIGH
netbox-data-flows has stored XSS in ObjectAlias names rendered inside DataFlow tables
GHSA-v7qw-hx66-4w9x
pkg: netbox-data-flows
eco: pip
published: May 7, 2026
### Summary
An authenticated user who can create or edit `ObjectAlias` objects can store arbitrary HTML/JavaScript in an alias name. That payload is later rendered unescaped in `DataFlow` table views, causing a stored XSS when another user views the affected page.

### Details
The issue is caused by…

NVD

HIGH
CVE-2026-42352
CVE-2026-42352
pkg: python

published: May 8, 2026

pygeoapi is a Python server implementation of the OGC API suite of standards. From version 0.23.0 to before version 0.23.3, OGC API process execution requests can use the subscriber object to requests to internal HTTP services. This issue has been patched in version 0.23.3.
CWE: CWE-918
NVD

HIGH
CVE-2026-41690
CVE-2026-41690
pkg: express

published: May 8, 2026

18next-http-middleware is a middleware to be used with Node.js web frameworks like express or Fastify and also for Deno. Versions prior to 3.9.3 allow an unauthenticated HTTP client to pollute Object.prototype in the Node.js process hosting the middleware, via two unvalidated entry points that reach…
CWE: CWE-22, CWE-1321
NVD

HIGH
CVE-2026-41683
CVE-2026-41683
pkg: express

published: May 8, 2026

i18next-http-middleware is a middleware to be used with Node.js web frameworks like express or Fastify and also for Deno. Prior to version 3.9.3, i18next-http-middleware wrote user-controlled language values into the Content-Language response header after passing them through utils.escape(), which i…
CWE: CWE-79, CWE-113
NVD

HIGH
CVE-2026-42047
CVE-2026-42047
pkg: express

published: May 7, 2026

Inngest is a platform for running event-driven and scheduled background functions with queueing, retries, and step orchestration. Versions 3.22.0 through 3.53.1 contain a vulnerability that allows unauthenticated remote attackers to exfiltrate environment variables from the host process via the serv…
CWE: CWE-200, CWE-497
GitHub-GHSA

HIGH
vm2 has a Sandbox Escape via Promise Constructor Unhandled Rejection (Process Crash DoS)
GHSA-hw58-p9xv-2mjh
pkg: vm2
eco: npm
published: May 7, 2026
### Summary
A sandbox escape vulnerability in vm2 v3.10.5 allows any sandboxed code to crash the host Node.js process via a single Promise constructor that triggers an unhandled rejection propagating to the host. The fix for CVE-2026-22709 (v3.10.2) only sanitized the `onRejected` callback in `.then…
CVE-2026-44001
GitHub-GHSA

HIGH
Harvester's SUSE Virtualization Registration Client Vulnerable to MITM and DOS
GHSA-pgh9-mpwc-8jjf
pkg: github.com/harvester/harvester
eco: go
published: May 6, 2026
### Impact

A vulnerability has been identified in the [SUSE Virtualization (Harvester) Rancher integration mechanism](https://docs.harvesterhci.io/v1.7/rancher/rancher-integration) where by default the registration client uses an insecure TLS option that fails to verify the remote server’s certi…

CVE-2025-71261
GitHub-GHSA

HIGH
PPTAgent: Arbitrary Code Execution via Python eval() of LLM-Generated Code with Builtins in Scope
GHSA-89g2-xw5c-v95p
pkg: pptagent
eco: pip
published: May 5, 2026
## Summary

> This vulnerability has been fixed in https://github.com/icip-cas/PPTAgent/commit/418491a9a1c02d9d93194b5973bb58df35cf9d00.

`CodeExecutor.execute_actions` (pptagent/apis.py:126-205) processes LLM-generated slide editing actions using Python's `eval()`:

“`python
# pptagent/apis.py:18…

CVE-2026-42079
GitHub-GHSA

HIGH
Inngest TypeScript SDK exposes environment variables via serve() handler on unhandled HTTP methods
GHSA-2jf5-6wwv-vhxx
pkg: inngest
eco: npm
published: May 5, 2026
# Summary

A vulnerability in the Inngest TypeScript SDK versions `3.22.0` through `3.53.1` allows unauthenticated remote attackers to exfiltrate environment variables from the host process via the `serve()` HTTP handler.

The `serve()` handler implements `GET`, `POST`, and `PUT` methods. Requests u…

CVE-2026-42047
NVD

HIGH
CVE-2026-42079
CVE-2026-42079
pkg: python

published: May 4, 2026

PPTAgent is an agentic framework for reflective PowerPoint generation. Prior to commit 418491a, PPTAgent is vulnerable to arbitrary code execution via Python eval() of LLM-generated code with builtins in scope. This issue has been patched via commit 418491a.
CWE: CWE-95
NVD

HIGH
CVE-2026-42449
CVE-2026-42449
pkg: node

published: May 7, 2026

n8n-MCP is an MCP server that provides AI assistants access to n8n node documentation, properties, and operations. In versions 2.47.4 through 2.47.13, the SDK embedder path (N8NDocumentationMCPServer constructor, getN8nApiClient(), and validateInstanceContext()), the synchronous URL validator in SSR…
CWE: CWE-918
GitHub-GHSA

HIGH
vm2 has a NodeVM require.root bypass via symlink traversal that allows sandbox escape
GHSA-cp6g-6699-wx9c
pkg: vm2
eco: npm
published: May 7, 2026
## Summary
NodeVM's `require.root` path restriction can be bypassed using filesystem symlinks, allowing sandboxed code to load modules from outside the allowed root directory in host context. Because path validation uses `path.resolve()` (which does not dereference symlinks) but module loading uses …
CVE-2026-43998
GitHub-GHSA

HIGH
Rancher Extensions have arbitrary file access via path traversal
GHSA-5v3h-x4wf-5c35
pkg: github.com/rancher/rancher, github.com/rancher/rancher, github.com/rancher/rancher
eco: go
published: May 7, 2026
### Impact

A vulnerability has been identified in [Rancher's Extensions](https://ranchermanager.docs.rancher.com/integrations-in-rancher/rancher-extensions) where malicious code can be injected in Rancher through a path traversal in the `compressedEndpoint` field inside a `UIPlugin` deployment. A m…

CVE-2026-25705
GitHub-GHSA

HIGH
PraisonAI has unauthenticated RCE via `tool_override.py` (CVE-2026-40287 patch bypass)
GHSA-xcmw-grxf-wjhj
pkg: praisonai
eco: pip
published: May 6, 2026
## TL;DR

CVE-2026-40287's fix gated `tools.py` auto-import behind `PRAISONAI_ALLOW_LOCAL_TOOLS=true` in **two** files (`tool_resolver.py`, `api/call.py`). A **third** import sink in `praisonai/templates/tool_override.py` was missed and remains unguarded. It is reached by the recipe runner on every …

CVE-2026-44334
GitHub-GHSA

HIGH
Velocity.js has a Prototype Pollution vulnerability through #set path assignment
GHSA-j658-c2gf-x6pq
pkg: velocityjs
eco: npm
published: May 9, 2026
### Summary
A prototype pollution vulnerability was discovered in Velocity.js <= 2.1.5. This issue occurs during the processing of #set directives in Velocity templates. If an application renders a template controlled by an attacker, it is possible to modify Object.prototype, potentially leading to …
CVE-2026-44966
GitHub-GHSA

HIGH
n8n-mcp affected by path traversal, redirect-following SSRF, and telemetry payload exposure
GHSA-8g7g-hmwm-6rv2
pkg: n8n-mcp
eco: npm
published: May 8, 2026
## Impact

`n8n-mcp` versions before 2.50.1 contained three independently-reported issues affecting deployments that run the n8n API integration:

1. **Caller-supplied identifiers were not validated before being used as URL path segments** by the n8n API client. An authenticated MCP caller passing a…

NVD

HIGH
CVE-2026-41422
CVE-2026-41422
pkg: express

published: May 7, 2026

Daptin is a GraphQL/JSON-API headless CMS. Prior to version 0.11.4, the /aggregate/:typename endpoint accepted column and group query parameters that were passed verbatim to goqu.L() — a raw SQL literal expression builder — without any validation. This bypassed all parameterization and allowed a…
CWE: CWE-89
NVD

HIGH
CVE-2026-7917
CVE-2026-7917
pkg: google chrome, microsoft windows

published: May 6, 2026

Use after free in Fullscreen in Google Chrome on Windows prior to 148.0.7778.96 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)
CWE: CWE-416
NVD

HIGH
CVE-2026-7914
CVE-2026-7914
pkg: google chrome, microsoft windows

published: May 6, 2026

Type Confusion in Accessibility in Google Chrome on Windows prior to 148.0.7778.96 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)
CWE: CWE-843
NVD

HIGH
CVE-2026-7911
CVE-2026-7911
pkg: google chrome, microsoft windows

published: May 6, 2026

Use after free in Aura in Google Chrome on Windows prior to 148.0.7778.96 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)
CWE: CWE-416
NVD

HIGH
CVE-2026-7905
CVE-2026-7905
pkg: google chrome, google android

published: May 6, 2026

Insufficient validation of untrusted input in Media in Google Chrome on Android prior to 148.0.7778.96 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)
CWE: CWE-20
NVD

HIGH
CVE-2026-7900
CVE-2026-7900
pkg: google chrome, apple macos, linux linux_kernel

published: May 6, 2026

Heap buffer overflow in ANGLE in Google Chrome prior to 148.0.7778.96 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)
CWE: CWE-122
GitHub-GHSA

HIGH
LangChain vulnerable to unsafe deserialization of attacker-controlled objects through overly broad `load()` allowlists
GHSA-pjwx-r37v-7724
pkg: langchain-core, langchain-core
eco: pip
published: May 8, 2026
LangChain contains older runtime code paths that deserialize run inputs, run outputs, or other application-controlled payloads using overly broad object allowlists. These paths may call `load()` with `allowed_objects="all"`. This does not enable arbitrary Python object deserialization, but it does a…
CVE-2026-44843
GitHub-GHSA

HIGH
free5GC's SMF UPI DELETE /upi/v1/upNodesLinks/{ref} panics on AN-node deletion via nil UPF dereference; unauthenticated, state-mutating
GHSA-p9mg-74mg-cwwr
pkg: github.com/free5gc/smf
eco: go
published: May 8, 2026
### Summary
free5GC's SMF mounts the `UPI` management route group without inbound OAuth2 middleware (same root cause as the broader UPI auth gap reported in free5gc/free5gc#887). On top of that, the `DELETE /upi/v1/upNodesLinks/{upNodeRef}` handler unconditionally dereferences `upNode.UPF` after the…
CVE-2026-44328
GitHub-GHSA

HIGH
@babel/plugin-transform-modules-systemjs generates arbitrary code when compiling malicious input
GHSA-fv7c-fp4j-7gwp
pkg: @babel/plugin-transform-modules-systemjs, @babel/plugin-transform-modules-systemjs
eco: npm
published: May 8, 2026
### Impact

Using Babel to compile code that was specifically crafted by an attacker can cause Babel to generate output code that executes arbitrary code.

Known affected plugins are:
– `@babel/plugin-transform-modules-systemjs`
– `@babel/preset-env` when using the [`modules: "systemjs"` option](htt…

CVE-2026-44728
NVD

HIGH
CVE-2026-42353
CVE-2026-42353
pkg: express

published: May 8, 2026

i18next-http-middleware is a middleware to be used with Node.js web frameworks like express or Fastify and also for Deno. Prior to version 3.9.3, i18next-http-middleware passes the user-controlled lng and ns values from getResourcesHandler directly into i18next.services.backendConnector.load(languag…
CWE: CWE-22, CWE-918
GitHub-GHSA

HIGH
Free5GC PCF: Missing authentication middleware in Npcf_SMPolicyControl allows access to SM policy handlers and disclosure of subscriber SUPI
GHSA-6rgm-gr97-x3j5
pkg: github.com/free5gc/pcf
eco: go
published: May 7, 2026
### Summary
PCF Npcf_SMPolicyControl missing authentication middleware allows unauthenticated access to SM policy handlers and disclosure of subscriber SUPI
### Details
In `NewServer()`, the `smPolicyGroup` route group is created and routes are applied without attaching the router authorization midd…
CVE-2026-42083
GitHub-GHSA

HIGH
Gotenberg has a Server-Side Request Forgery (SSRF) Issue
GHSA-rm4c-xj6x-49mw
pkg: github.com/gotenberg/gotenberg/v8
eco: go
published: May 7, 2026
### Summary

The SSRF hardening shipped in v8.31.0 only covers outbound URLs that Gotenberg's Go code handles — Chromium asset fetches, webhook delivery, and download-from. The LibreOffice conversion endpoint (`/forms/libreoffice/convert`) passes uploaded documents directly to LibreOffice without …

CVE-2026-42591
GitHub-GHSA

HIGH
Gotenberg's ExifTool group-prefix syntax bypasses dangerous-tag blocklist
GHSA-7v3r-m9c8-r855
pkg: github.com/gotenberg/gotenberg/v8
eco: go
published: May 7, 2026
**Summary**

The ExifTool metadata write blocklist in Gotenberg v8 can be bypassed using ExifTool's group-prefix syntax, enabling arbitrary file rename, move, hardlink, and symlink creation on the server. This is a bypass of the fix for GHSA-qmwh-9m9c-h36m.

**Details**

The blocklist in `pkg/module…

CVE-2026-42590
NVD

HIGH
CVE-2026-39852
CVE-2026-39852
pkg: quarkus quarkus

published: May 5, 2026

Quarkus is a Java framework for building cloud-native applications. In versions prior to 3.20.6.1, 3.27.3.1, 3.33.1.1, 3.35.1.1, 3.34.7, and 3.35.2, a path normalization inconsistency between the security layer and the routing layer allows unauthenticated or lower-privileged users to bypass HTTP pat…
CWE: CWE-863
GitHub-GHSA

HIGH
open-websearch has SSRF in `fetchWebContent` MCP tool: bracketed IPv6 literals and non-resolving hostname check bypass `isPrivateOrLocalHostname`
GHSA-v228-72c7-fx8j
pkg: open-websearch
eco: npm
published: May 5, 2026
### Summary
`src/utils/urlSafety.ts` exposes `isPublicHttpUrl` / `assertPublicHttpUrl`, used to gate the MCP `fetchWebContent` tool against private-network targets. The check has two defects that together allow **non-blind SSRF with the response body returned to the caller**:

1. **Bracketed IPv6 li…

CVE-2026-42260
GitHub-GHSA

HIGH
ssrfcheck Vulnerable to Server-Side Request Forgery (SSRF) and Incomplete List of Disallowed Inputs
GHSA-j4rj-2jr5-m439
pkg: ssrfcheck
eco: npm
published: May 5, 2026
### Summary

`ssrfcheck` v1.3.0 (latest) fails to block Server-Side Request Forgery attacks when the target private IP address is encoded as an IPv4-mapped IPv6 address (e.g. `http://[::ffff:127.0.0.1]/`). The WHATWG URL parser built into Node.js silently normalizes the IPv4 notation inside the brac…

CVE-2026-43929
GitHub-GHSA

HIGH
exiftool-vendored vulnerable to argument injection via newline characters in tag names
GHSA-cw26-7653-2rp5
pkg: exiftool-vendored
eco: npm
published: May 5, 2026
### Impact

`exiftool-vendored` starts ExifTool in `-stay_open True -@ -` mode, where arguments are read from stdin one per line. In affected versions, several caller-supplied strings were interpolated into ExifTool arguments without rejecting line delimiters. A newline or carriage return inside one…

CVE-2026-43893
GitHub-GHSA

HIGH
Quarkus has Authentication/Authorization bypasses
GHSA-rc95-pcm8-65v9
pkg: io.quarkus:quarkus-vertx-http, io.quarkus:quarkus-vertx-http, io.quarkus:quarkus-vertx-http
eco: maven
published: May 4, 2026
Quarkus version 3.32.4 is vulnerable to an authorization bypass issue (GHSL-2026-099), in which semicolons (matrix parameters) in HTTP requests can be used to bypass security constraints, potentially allowing unauthorized access to protected resources.

Unauthenticated or lower-privileged users can …

CVE-2026-39852
NVD

HIGH
CVE-2026-42296
CVE-2026-42296
pkg: kubernetes

published: May 9, 2026

Argo Workflows is an open source container-native workflow engine for orchestrating parallel jobs on Kubernetes. Prior to versions 3.7.14 and 4.0.5, a user with create Workflow permission can bypass templateReferencing: Strict to get host network access, switch service accounts, override pod securit…
CWE: CWE-863
GitHub-GHSA

HIGH
epa4all-client has a VAU Signature bypass
GHSA-g8r3-5hwf-qp96
pkg: com.oviva.telematik:epa4all-client
eco: maven
published: May 8, 2026
### Impact
In SignedPublicKeysTrustValidatorImpl.isTrusted(), the ECDSA signature verification at line 45 discards the boolean return value of Signature.verify(). The method performs certificate chain validation, OCSP check, and signature algorithm setup, but never checks whether the signature actua…
CVE-2026-44900
NVD

HIGH
CVE-2026-42452
CVE-2026-42452
pkg: jwt

published: May 8, 2026

Termix is a web-based server management platform with SSH terminal, tunneling, and file editing capabilities. Prior to version 2.1.0, /users/login issues a temporary JWT (temp_token) for TOTP-enabled accounts. That token carries a pendingTOTP state and should only be valid for the second-factor flow…
CWE: CWE-304
GitHub-GHSA

HIGH
Open WebUI has Knowledge Base Destruction and RAG Poisoning via Unauthorized Collection Overwrite
GHSA-7r82-qhg4-6wvj
pkg: open-webui
eco: pip
published: May 8, 2026
# Knowledge Base Destruction and RAG Poisoning via Unauthorized Collection Overwrite

## Affected Component

Retrieval web/YouTube processing endpoints:
– `backend/open_webui/routers/retrieval.py` (lines 1810-1837, `process_web`)
– `backend/open_webui/routers/retrieval.py` (the parallel `process_you…

CVE-2026-44554
GitHub-GHSA

HIGH
Open WebUI: Stale Admin Role in Socket.IO Session Pool Enables Post-Demotion Cross-User Note Access
GHSA-45m8-cpm2-3v65
pkg: open-webui
eco: pip
published: May 8, 2026
# Stale Admin Role in Socket.IO Session Pool Enables Post-Demotion Cross-User Note Access

## Affected Component

Socket.IO session state and role-check callsites:
– `backend/open_webui/socket/main.py` (lines 330-351, `connect` handler — role snapshotted into SESSION_POOL)
– `backend/open_webui/so…

CVE-2026-44553
NVD

HIGH
CVE-2026-41883
CVE-2026-41883
pkg: express

published: May 8, 2026

OmniFaces is a utility library for Faces. Prior to versions 1.14.2, 2.7.32, 3.14.16, 4.7.5, and 5.2.3, there is a server-side EL injection leading to Remote Code Execution (RCE). This affects applications that use CDNResourceHandler with a wildcard CDN mapping (e.g. libraryName:*=https://cdn.example…
CWE: CWE-917
NVD

HIGH
CVE-2026-42239
CVE-2026-42239
pkg: jwt

published: May 7, 2026

Budibase is an open-source low-code platform. Prior to version 3.35.10, the budibase:auth cookie containing the JWT session token is set with httpOnly: false at packages/backend-core/src/utils/utils.ts:218. JavaScript can read this cookie via document.cookie. This means every XSS becomes a full acco…
CWE: CWE-1004
NVD

HIGH
CVE-2026-42284
CVE-2026-42284
pkg: gitpython_project gitpython

published: May 7, 2026

GitPython is a python library used to interact with Git repositories. Prior to version 3.1.47, _clone() validates multi_options as the original list, then executes shlex.split(" ".join(multi_options)). A string like "–branch main –config core.hooksPath=/x" passes validation (starts with –branch),…
CWE: CWE-88
NVD

HIGH
CVE-2026-33588
CVE-2026-33588
pkg: lfnovo open-notebook

published: May 7, 2026

Lack of user input validation in the file upload functionality of Open Notebook v1.8.3 allows the application user to create or modify files on the docker container via path traversal.
CWE: CWE-20
GitHub-GHSA

HIGH
opentelemetry-collector-contrib's azureauthextension Authenticate method does not validate bearer tokens, allowing auth bypass via replay
GHSA-pjv4-3c63-699f
pkg: github.com/open-telemetry/opentelemetry-collector-contrib/extension/azureauthextension
eco: go
published: May 6, 2026
### Summary

A server-side authentication bypass in `azureauthextension` allows any party who holds a single valid Azure access token for *any scope the collector's configured identity can mint for* to authenticate to any OpenTelemetry receiver that uses `auth: azure_auth`. The extension's `Authenti…

CVE-2026-42602
GitHub-GHSA

HIGH
Lemur: LDAP Filter Injection enables post-authentication privilege escalation
GHSA-3r34-vq8m-39gh
pkg: lemur
eco: pip
published: May 6, 2026
## Description

### Overview

Lemur's LDAP authentication module (`lemur/auth/ldap.py`) constructs LDAP search filters using unsanitized user input via Python string interpolation. An authenticated LDAP user can inject LDAP filter metacharacters through the username field to manipulate group members…

CVE-2026-44304
GitHub-GHSA

HIGH
Nginx-UI: Unauthenticated first-boot instance claim via POST /api/install allows remote bootstrap takeover
GHSA-mxqh-q9h6-v8pq
pkg: github.com/0xJacky/nginx-ui
eco: go
published: May 6, 2026
## Summary

An unauthenticated bootstrap takeover exists in `nginx-ui` during the initial installation window exposed by `POST /api/install`.

When the instance is still uninitialized, `POST /api/install` is reachable without authentication and accepts attacker-controlled bootstrap data. The handler…

CVE-2026-42222
GitHub-GHSA

HIGH
Nginx-UI: Unauthenticated First-Run Installer Allows Remote Initial Admin Claim
GHSA-h27v-ph7w-m9fp
pkg: github.com/0xJacky/Nginx-UI
eco: go
published: May 6, 2026
### Summary
An unauthenticated network attacker can claim the initial administrator account on a fresh `nginx-ui` instance during the first-run setup window. The public `/api/install` endpoint is reachable without authentication, and the request-encryption flow only protects payload confidentiality …
CVE-2026-42221
GitHub-GHSA

HIGH
PyLoad vulnerable to Path Traversal via Package Folder Name in set_package_data
GHSA-838g-gr43-qqg9
pkg: pyload-ng
eco: pip
published: May 5, 2026
### Summary
No sanitization of package folder name allows writing files anywhere outside the intended download directory.

#### Affected Component
– `src/pyload/core/api/__init__.py`
– Function: `set_package_data()`

### Details
When passing a folder name in the `set_package_data()` API function cal…

CVE-2026-42315
GitHub-GHSA

HIGH
@evomap/evolver's validator sandbox allowlist permits `npm`/`npx`, yielding RCE from Hub-delivered validation tasks via lifecycle scripts
GHSA-jxh8-jh77-xh6g
pkg: @evomap/evolver
eco: npm
published: May 5, 2026
## Summary

The validator-mode sandbox executor (`src/gep/validator/sandboxExecutor.js`) places `npm` and `npx` in its hard executable allowlist. Because `npm install <pkg>` and `npx -y -p <pkg> <bin>` execute arbitrary code by design (preinstall/install/postinstall lifecycle scripts and remote-pack…

GitHub-GHSA

HIGH
YAFNET has Unauthenticated Stored Second-Order XSS in Admin Event Log via Reflected `User-Agent` Header
GHSA-33gv-fc78-qgf5
pkg: YAFNET.Core, YAFNET.Core
eco: nuget
published: May 5, 2026
**Description:**
Stored (second-order) Cross-Site Scripting (XSS) occurs when attacker-controlled input is persisted through one component of an application and later rendered, without proper sanitization or contextual output encoding, by a completely different component — often one that implicitl…
CVE-2026-43938
GitHub-GHSA

HIGH
@tdurieux/anonymous_github Vulnerable to XSS via Unsanitized GitHub Repository Content Rendering in Anonymous GitHub Origin
GHSA-g485-8j3v-p6x8
pkg: @tdurieux/anonymous_github
eco: npm
published: May 5, 2026
### Summary

Anonymous GitHub fetches repository content (e.g., markdown files) from GitHub's API and renders it without sanitization. On the client side, markdown is parsed with `marked` (with `sanitize: false`) and injected into the DOM via `$sce.trustAsHtml()` + `ng-bind-html`, bypassing AngularJ…

NVD

HIGH
CVE-2026-42222
CVE-2026-42222
pkg: nginxui nginx_ui

published: May 4, 2026

Nginx UI is a web user interface for the Nginx web server. In version 2.3.5, an unauthenticated bootstrap takeover exists in nginx-ui during the initial installation window exposed by POST /api/install. At time of publication no public patches are available.
CWE: CWE-284, CWE-306
NVD

HIGH
CVE-2026-42221
CVE-2026-42221
pkg: nginxui nginx_ui

published: May 4, 2026

Nginx UI is a web user interface for the Nginx web server. From version 2.0.0 to before version 2.3.8, an unauthenticated network attacker can claim the initial administrator account on a fresh nginx-ui instance during the first-run setup window. The public /api/install endpoint is reachable without…
CWE: CWE-306
GitHub-GHSA

HIGH
Ech0's OAuth redirect URI validation ignores path component, enables exchange-code theft
GHSA-p64j-f4x9-wq66
pkg: github.com/lin-snow/Ech0
eco: go
published: May 7, 2026
## Summary

`parseAndValidateClientRedirect` at `internal/service/auth/auth.go:448` validates OAuth client-redirect URIs by comparing only scheme and host against the admin-configured allowlist. Path, query, and fragment are ignored. The initiator at `/oauth/:provider/login` embeds the caller-suppli…

NVD

HIGH
CVE-2026-42301
CVE-2026-42301
pkg: python

published: May 9, 2026

pyp2spec generates working Fedora RPM spec file for Python projects. Prior to version 0.14.1, pyp2spec was writing PyPI package metadata (e.g. the summary field) into the generated spec file without escaping RPM macro directives. When a packager then runs rpmbuild, those directives get evaluated, so…
CWE: CWE-20, CWE-94
NVD

HIGH
CVE-2026-8148
CVE-2026-8148
pkg: windows

published: May 8, 2026

NAVER MYBOX Explorer for Windows before 3.0.11.160 allows a local attacker to escalate privileges to NT AUTHORITY\SYSTEM via registry manipulation due to improper privilege checks.
CWE: CWE-266
NVD

HIGH
CVE-2022-26522
CVE-2022-26522
pkg: windows

published: May 8, 2026

The socket connection handler in aswArPot.sys in the Avast and AVG Windows Anti Rootkit driver before 22.1 allows local attackers to execute arbitrary code in kernel mode or cause a denial of service (memory corruption and OS crash) due to a double fetch vulnerability at aswArPot+0xc4a3.
CWE: CWE-367
NVD

HIGH
CVE-2026-44244
CVE-2026-44244
pkg: python

published: May 7, 2026

GitPython is a python library used to interact with Git repositories. Prior to version 3.1.49, GitConfigParser.set_value() passes values to Python's configparser without validating for newlines. GitPython's own _write() converts embedded newlines into indented continuation lines (e.g. \n becomes \n\…
CWE: CWE-94
GitHub-GHSA

HIGH
gix-fs: Symlink prefix-reuse allows worktree escape during checkout
GHSA-f89h-2fjh-2r9q
pkg: gix-fs
eco: rust
published: May 7, 2026
### Summary

A malicious tree can be constructed that will, when checked out with gitoxide, permit writing an attacker-controlled symlink into any existing directory the user has write access to.

### Details

During checkout, all symlink index entries are deferred and created after regular files us…

CVE-2026-44471
GitHub-GHSA

HIGH
GitPython: Newline injection in config_writer().set_value() enables RCE via core.hooksPath
GHSA-v87r-6q3f-2j67
pkg: GitPython
eco: pip
published: May 6, 2026
`GitConfigParser.set_value()` passes values to Python's `configparser` without validating for newlines. GitPython's own `_write()` converts embedded newlines into indented continuation lines (e.g. `\n` becomes `\n\t`), but Git still accepts an indented `[core]` stanza as a section header — so the …
CVE-2026-44244
NVD

HIGH
CVE-2026-7994
CVE-2026-7994
pkg: google chrome, microsoft windows

published: May 6, 2026

Inappropriate implementation in Chromoting in Google Chrome on Windows prior to 148.0.7778.96 allowed a local attacker to perform OS-level privilege escalation via a malicious file. (Chromium security severity: Medium)
CWE: CWE-269
NVD

HIGH
CVE-2026-7990
CVE-2026-7990
pkg: google chrome, microsoft windows

published: May 6, 2026

Insufficient validation of untrusted input in Updater in Google Chrome on Windows prior to 148.0.7778.96 allowed a local attacker to perform OS-level privilege escalation via a malicious file. (Chromium security severity: Medium)
CWE: CWE-20
NVD

HIGH
CVE-2026-7925
CVE-2026-7925
pkg: google chrome, microsoft windows

published: May 6, 2026

Use after free in Chromoting in Google Chrome on Windows prior to 148.0.7778.96 allowed a local attacker to perform OS-level privilege escalation via a malicious file. (Chromium security severity: High)
CWE: CWE-416
NVD

HIGH
CVE-2026-7913
CVE-2026-7913
pkg: google chrome, google android

published: May 6, 2026

Insufficient policy enforcement in DevTools in Google Chrome on Android prior to 148.0.7778.96 allowed a local attacker to perform privilege escalation via a malicious file. (Chromium security severity: High)
CWE: CWE-693
NVD

HIGH
CVE-2026-43236
CVE-2026-43236
pkg: node

published: May 6, 2026

In the Linux kernel, the following vulnerability has been resolved:

drm/atmel-hlcdc: fix use-after-free of drm_crtc_commit after release

The atmel_hlcdc_plane_atomic_duplicate_state() callback was copying
the atmel_hlcdc_plane state structure without properly duplicating the
drm_plane_state. In pa…

NVD

HIGH
CVE-2026-43211
CVE-2026-43211
pkg: go

published: May 6, 2026

In the Linux kernel, the following vulnerability has been resolved:

PCI: Fix pci_slot_trylock() error handling

Commit a4e772898f8b ("PCI: Add missing bridge lock to pci_bus_lock()")
delegates the bridge device's pci_dev_trylock() to pci_bus_trylock() in
pci_slot_trylock(), but it forgets to remove…

NVD

HIGH
CVE-2026-43178
CVE-2026-43178
pkg: go

published: May 6, 2026

In the Linux kernel, the following vulnerability has been resolved:

procfs: fix possible double mmput() in do_procmap_query()

When user provides incorrectly sized buffer for build ID for PROCMAP_QUERY
we return with -ENAMETOOLONG error. After recent changes this condition
happens later, after we …

NVD

HIGH
CVE-2026-43150
CVE-2026-43150
pkg: node

published: May 6, 2026

In the Linux kernel, the following vulnerability has been resolved:

perf/arm-cmn: Reject unsupported hardware configurations

So far we've been fairly lax about accepting both unknown CMN models
(at least with a warning), and unknown revisions of those which we
do know, as although things do freque…

NVD

HIGH
CVE-2026-43116
CVE-2026-43116
pkg: linux linux_kernel

published: May 6, 2026

In the Linux kernel, the following vulnerability has been resolved:

netfilter: ctnetlink: ensure safe access to master conntrack

Holding reference on the expectation is not sufficient, the master
conntrack object can just go away, making exp->master invalid.

To access exp->master safely:

– Grab …

CWE: CWE-362
NVD

HIGH
CVE-2026-43106
CVE-2026-43106
pkg: linux

published: May 6, 2026

In the Linux kernel, the following vulnerability has been resolved:

cachefiles: fix incorrect dentry refcount in cachefiles_cull()

The patch mentioned below changed cachefiles_bury_object() to expect 2
references to the 'rep' dentry. Three of the callers were changed to
use start_removing_dentry(…

NVD

HIGH
CVE-2026-43093
CVE-2026-43093
pkg: linux

published: May 6, 2026

In the Linux kernel, the following vulnerability has been resolved:

xsk: tighten UMEM headroom validation to account for tailroom and min frame

The current headroom validation in xdp_umem_reg() could leave us with
insufficient space dedicated to even receive minimum-sized ethernet
frame. Furthermo…

NVD

HIGH
CVE-2026-43091
CVE-2026-43091
pkg: linux

published: May 6, 2026

In the Linux kernel, the following vulnerability has been resolved:

xfrm: Wait for RCU readers during policy netns exit

xfrm_policy_fini() frees the policy_bydst hash tables after flushing the
policy work items and deleting all policies, but it does not wait for
concurrent RCU readers to leave the…

NVD

HIGH
CVE-2026-43084
CVE-2026-43084
pkg: linux

published: May 6, 2026

In the Linux kernel, the following vulnerability has been resolved:

netfilter: nfnetlink_queue: make hash table per queue

Sharing a global hash table among all queues is tempting, but
it can cause crash:

BUG: KASAN: slab-use-after-free in nfqnl_recv_verdict+0x11ac/0x15e0 [nfnetlink_queue]
[..]
n…

NVD

HIGH
CVE-2026-43078
CVE-2026-43078
pkg: linux

published: May 6, 2026

In the Linux kernel, the following vulnerability has been resolved:

crypto: af_alg – Fix page reassignment overflow in af_alg_pull_tsgl

When page reassignment was added to af_alg_pull_tsgl the original
loop wasn't updated so it may try to reassign one more page than
necessary.

Add the check to th…

NVD

HIGH
CVE-2026-43076
CVE-2026-43076
pkg: linux

published: May 6, 2026

In the Linux kernel, the following vulnerability has been resolved:

ocfs2: validate inline data i_size during inode read

When reading an inode from disk, ocfs2_validate_inode_block() performs
various sanity checks but does not validate the size of inline data. If
the filesystem is corrupted, an i…

NVD

HIGH
CVE-2026-43075
CVE-2026-43075
pkg: linux

published: May 6, 2026

In the Linux kernel, the following vulnerability has been resolved:

ocfs2: fix out-of-bounds write in ocfs2_write_end_inline

KASAN reports a use-after-free write of 4086 bytes in
ocfs2_write_end_inline, called from ocfs2_write_end_nolock during a
copy_file_range splice fallback on a corrupted ocfs…

NVD

HIGH
CVE-2026-43074
CVE-2026-43074
pkg: linux

published: May 6, 2026

In the Linux kernel, the following vulnerability has been resolved:

eventpoll: defer struct eventpoll free to RCU grace period

In certain situations, ep_free() in eventpoll.c will kfree the epi->ep
eventpoll struct while it still being used by another concurrent thread.
Defer the kfree() to an RCU…

NVD

HIGH
CVE-2026-34462
CVE-2026-34462
pkg: sandboxie-plus sandboxie

published: May 5, 2026

Sandboxie-Plus is an open source sandbox-based isolation software for Windows. In versions 1.17.2 and earlier, several ProcessServer handlers (KillAllHandler, SuspendAllHandler, and RunSandboxedHandler) copy a WCHAR boxname[34] field from request structures into WCHAR[40] stack buffers using wcscpy …
CWE: CWE-121, CWE-170
NVD

HIGH
CVE-2026-34461
CVE-2026-34461
pkg: sandboxie-plus sandboxie

published: May 5, 2026

Sandboxie-Plus is an open source sandbox-based isolation software for Windows. In versions 1.17.2 and earlier, the SbieIniServer RunSbieCtrl handler contains a stack buffer overflow. The MSGID_SBIE_INI_RUN_SBIE_CTRL message is handled before normal sandbox and impersonation checks, and for non-sandb…
CWE: CWE-121
GitHub-GHSA

HIGH
gitoxide: CommandForbiddenInModulesConfiguration Bypass in gix_submodule::File::update() Enables Arbitrary Command Execution via .gitmodules
GHSA-f26g-jm89-4g65
pkg: gix
eco: rust
published: May 5, 2026
### Summary

[`gix_submodule::File::update()`](https://github.com/GitoxideLabs/gitoxide/blob/main/gix-submodule/src/access.rs#L168) is the API that gates whether an attacker-supplied `.gitmodules` file may set `update = !<shell command>`. The function is designed to return `Err(CommandForbiddenInMod…

GitHub-GHSA

HIGH
OpenClaw vulnerable to arbitrary code execution via attacker-controlled setup-api.js loaded from cwd during env-key resolution
GHSA-r39h-4c2p-3jxp
pkg: openclaw
eco: npm
published: May 5, 2026
## Summary

OpenClaw's bundled plugin setup resolver could fall back to `process.cwd()` while resolving provider setup metadata. If a user ran an OpenClaw command from an attacker-controlled repository containing `extensions/<plugin>/setup-api.js`, OpenClaw could load and execute that JavaScript dur…

NVD

HIGH
CVE-2026-43070
CVE-2026-43070
pkg: linux

published: May 5, 2026

In the Linux kernel, the following vulnerability has been resolved:

bpf: Reset register ID for BPF_END value tracking

When a register undergoes a BPF_END (byte swap) operation, its scalar
value is mutated in-place. If this register previously shared a scalar ID
with another register (e.g., after a…

NVD

HIGH
CVE-2026-43063
CVE-2026-43063
pkg: linux

published: May 5, 2026

In the Linux kernel, the following vulnerability has been resolved:

xfs: don't irele after failing to iget in xfs_attri_recover_work

xlog_recovery_iget* never set @ip to a valid pointer if they return
an error, so this irele will walk off a dangling pointer. Fix that.

NVD

HIGH
CVE-2026-43060
CVE-2026-43060
pkg: linux

published: May 5, 2026

In the Linux kernel, the following vulnerability has been resolved:

netfilter: nft_ct: drop pending enqueued packets on removal

Packets sitting in nfqueue might hold a reference to:

– templates that specify the conntrack zone, because a percpu area is
used and module removal is possible.
– conn…

NVD

HIGH
CVE-2026-7791
CVE-2026-7791
pkg: windows

published: May 4, 2026

Improper privilege management in the log rotation mechanism of the Skylight Workspace Config Service in Amazon WorkSpaces for Windows before 2.6.2034.0 allows a local non-admin authenticated user to place arbitrary files into arbitrary locations bypassing file system permission protections, leading …
CWE: CWE-367
GitHub-GHSA

HIGH
Ech0 has Server-Side Request Forgery (SSRF) via Connect Handler fetchPeerConnectInfo
GHSA-8mc6-xjpr-h98x
pkg: github.com/lin-snow/ech0
eco: go
published: May 7, 2026
## Summary
The `fetchPeerConnectInfo` function in `internal/service/connect/connect.go:214-239` uses `httpUtil.SendRequest` (no SSRF protection) instead of `SendSafeRequest` (which has `ValidatePublicHTTPURL` with private IP blocking). This allows authenticated users to make the server request arbit…
NVD

HIGH
CVE-2026-41905
CVE-2026-41905
pkg: curl

published: May 7, 2026

FreeScout is a free help desk and shared inbox built with PHP's Laravel framework. Prior to version 1.8.217, Helper::sanitizeRemoteUrl() in app/Misc/Helper.php follows HTTP redirects via curlGetLastRedirectedUrl() but then re-validates the original URL instead of the final redirect destination. An a…
CWE: CWE-918
NVD

HIGH
CVE-2026-41688
CVE-2026-41688
pkg: curl

published: May 7, 2026

Wallos is an open-source, self-hostable personal subscription tracker. In versions 4.8.4 and prior, the incomplete SSRF fix in Wallos validates webhook URLs via gethostbyname() but passes the original hostname to cURL without CURLOPT_RESOLVE pinning on 10 of 11 outbound HTTP endpoints, leaving a DNS…
CWE: CWE-918
GitHub-GHSA

HIGH
DevSpace UI Server WebSocket CheckOrigin does not validate source
GHSA-hqwm-7x7x-8379
pkg: github.com/loft-sh/devspace
eco: go
published: May 6, 2026
### Description

DevSpace's UI server WebSocket accepts connections from all origins by default, and therefore several endpoints are exposed via this WebSocket. When a developer runs the DevSpace UI and at the same time uses a browser to access the internet, a malicious website they visit can use th…

CVE-2026-42283
GitHub-GHSA

HIGH
OpenStack Ironic has an Incorrect Resource Transfer Between Spheres
GHSA-54w4-233h-x86g
pkg: ironic-python-agent, ironic-python-agent, ironic-python-agent
eco: pip
published: May 5, 2026
An issue was discovered in idrac in OpenStack Ironic before 35.0.1. During import, a user invoking molds can request authorization to be sent to a remote endpoint. The credential forwarded is a time-limited Keystone token (which provides access to all OpenStack services Ironic is authorized for); or…
CVE-2026-42997
GitHub-GHSA

HIGH
Open WebUI's Base Model Routing Bypasses Access Control via Model Chaining
GHSA-9vvh-qmjx-p4q8
pkg: open-webui
eco: pip
published: May 8, 2026
# Base Model Routing Bypasses Access Control via Model Chaining

## Affected Component

Model chaining via `base_model_id`:
– `backend/open_webui/routers/models.py` (lines 170-214, `create_new_model`)
– `backend/open_webui/routers/models.py` (lines 254-308, `import_models`)
– `backend/open_webui/mai…

CVE-2026-44555
GitHub-GHSA

HIGH
MikroORM has SQL injection via runtime-controlled identifiers and JSON-path keys
GHSA-cfw5-68c4-ffqp
pkg: @mikro-orm/sql, @mikro-orm/knex
eco: npm
published: May 8, 2026
## Summary

MikroORM's identifier-quoting helper (`Platform.quoteIdentifier` and the postgres/mssql overrides) and its JSON-path emitters (`Platform.getSearchJsonPropertyKey`, `quoteJsonKey`) did not properly escape characters that delimit the SQL identifier or string-literal context they emit into.…

CVE-2026-44680
NVD

HIGH
CVE-2026-42351
CVE-2026-42351
pkg: python

published: May 8, 2026

pygeoapi is a Python server implementation of the OGC API suite of standards. From version 0.23.0 to before version 0.23.3, a raw string path concatenation vulnerability in pygeoapi's STAC FileSystemProvider plugin can allow for requests to STAC collection based collections to expose directories wit…
CWE: CWE-22
GitHub-GHSA

HIGH
free5GC NRF: type-confusion panic in POST /oauth2/token structured-form parser via Reflect.Set on incompatible types
GHSA-f8qv-7x5w-qr48
pkg: github.com/free5gc/nrf
eco: go
published: May 8, 2026
### Summary
free5GC's NRF root SBI endpoint `POST /oauth2/token` contains a parser-level type-confusion bug family. The handler in `NFs/nrf/internal/sbi/api_accesstoken.go` reflects over `models.NrfAccessTokenAccessTokenReq`, special-cases only plain `string` and `NrfNfManagementNfType` fields, and …
CVE-2026-44325
GitHub-GHSA

HIGH
free5GC's NEF 3gpp-pfd-management PATCH applications/{appId} panics on UDR access failure due to nil ProblemDetails dereference
GHSA-j59f-x285-69jx
pkg: github.com/free5gc/nef
eco: go
published: May 8, 2026
### Summary
free5GC's NEF `PATCH /3gpp-pfd-management/v1/{afId}/transactions/{transId}/applications/{appId}` handler panics with a nil-pointer dereference when the upstream UDR call fails AND the consumer wrapper returns `err != nil` together with a nil `*ProblemDetails`. The handler's `errPfdData !…
CVE-2026-44322
GitHub-GHSA

HIGH
free5GC's SMF UPI POST /upi/v1/upNodesLinks exits the SMF process on overlapping UE pools (unauthenticated, reachable Fatalf)
GHSA-44qj-cghf-9p97
pkg: github.com/free5gc/smf
eco: go
published: May 8, 2026
### Summary
free5GC's SMF mounts the `UPI` management route group without inbound OAuth2 middleware (same root cause as free5gc/free5gc#887). The `POST /upi/v1/upNodesLinks` create-or-update handler accepts attacker-controlled JSON and passes it directly into `UpNodesFromConfiguration()`, which call…
CVE-2026-44321
GitHub-GHSA

HIGH
free5GC's NEF crashes via logger.Fatal on PFD notification delivery failure (attacker-controlled notifyUri)
GHSA-rxrq-fv76-26pr
pkg: github.com/free5gc/nef
eco: go
published: May 8, 2026
### Summary
free5GC's NEF terminates the entire process when a stored PFD-subscription `notifyUri` cannot be reached. In `PfdChangeNotifier.FlushNotifications()`, the notifier calls `NnefPFDmanagementNotify(…)` and on any delivery error invokes `logger.PFDManageLog.Fatal(err)`, which is `os.Exit(1…
CVE-2026-44319
GitHub-GHSA

HIGH
free5GC's PCF npcf-smpolicycontrol POST /sm-policies panics on downstream UDR/OpenAPI 404 via nil pointer dereference
GHSA-wr8j-6chw-gm6p
pkg: github.com/free5gc/pcf
eco: go
published: May 8, 2026
### Summary
free5GC's PCF `POST /npcf-smpolicycontrol/v1/sm-policies` handler (`HandleCreateSmPolicyRequest`) panics with a nil-pointer dereference when a downstream OpenAPI consumer call (UDR lookup) returns `404 Not Found` and the consumer wrapper returns `err != nil` together with a nil response …
CVE-2026-44316
GitHub-GHSA

HIGH
banks has Critical Remote Code Execution (RCE) via Jinja2 SSTI
GHSA-gphh-9q3h-jgpp
pkg: banks
eco: pip
published: May 8, 2026
## Summary

`banks <= 2.4.1` uses `jinja2.Environment()` (unsandboxed) to render prompt templates. Applications that pass user-supplied strings as the template argument to `Prompt()` are vulnerable to Server-Side Template Injection (SSTI), which can lead to Remote Code Execution (RCE) on the host sy…

CVE-2026-44209
GitHub-GHSA

HIGH
fast-uri vulnerable to host confusion via percent-encoded authority delimiters
GHSA-v39h-62p7-jpjc
pkg: fast-uri
eco: npm
published: May 8, 2026
### Impact

`fast-uri` v3.1.1 and earlier decodes percent-encoded authority delimiters (`%40` as `@`, `%3A` as `:`) inside the host component and serializes them back as raw characters. This changes the URI structure, turning a hostname into userinfo plus a different host.

For example, `http://trus…

CVE-2026-6322
GitHub-GHSA

HIGH
bitcoinj has a ScriptExecution P2PKH/P2WPKH Verification Bypass
GHSA-hfcf-v2f8-x9pc
pkg: org.bitcoinj:bitcoinj-core
eco: maven
published: May 8, 2026
### Summary
`ScriptExecution.correctlySpends()` contains two fast-path verification bugs for standard `P2PKH` and native `P2WPKH` spends in `core/src/main/java/org/bitcoinj/script/ScriptExecution.java`.

In both branches, bitcoinj verifies an attacker-controlled signature/public-key pair but fails t…

CVE-2026-44714
GitHub-GHSA

HIGH
fast-uri vulnerable to path traversal via percent-encoded dot segments
GHSA-q3j6-qgpj-74h6
pkg: fast-uri
eco: npm
published: May 8, 2026
### Impact

`fast-uri` v3.1.0 and earlier decodes percent-encoded path separators (`%2F`) and dot segments (`%2E`) before applying dot-segment removal in `normalize()` and `equal()`. This makes encoded path data behave like real `/` and `..`, so distinct URIs collapse onto the same normalized path.

CVE-2026-6321
GitHub-GHSA

HIGH
@fastify/accepts-serializer Vulnerable to Denial of Service via Unbounded Accept Header Cache Growth
GHSA-qxhc-wx3p-2wmg
pkg: @fastify/accepts-serializer
eco: npm
published: May 8, 2026
### Impact

`@fastify/accepts-serializer` cached serializer-selection results keyed by the request `Accept` header without a size limit or eviction policy. A remote unauthenticated client could send many distinct but matching `Accept` header variants to make the cache grow unbounded. Under sustained…

CVE-2026-7768
GitHub-GHSA

HIGH
ZITADEL has LDAP Filter Injection in Login Flow
GHSA-rxvx-hhpj-q6px
pkg: github.com/zitadel/zitadel, github.com/zitadel/zitadel, github.com/zitadel/zitadel
eco: go
published: May 8, 2026
## Summary

A vulnerability was discovered in Zitadel's LDAP identity provider implementation, which fails to properly escape user-provided usernames before incorporating them into LDAP search filters. This allows unauthenticated attackers to perform LDAP Filter Injection during the login process.

CVE-2026-44671
NVD

HIGH
CVE-2026-44498
CVE-2026-44498
pkg: zfnd zebrad

published: May 8, 2026

ZEBRA is a Zcash node written entirely in Rust. Prior to version 4.4.0, Zebra's block validator undercounts transparent signature operations against the 20000-sigop block limit (MAX_BLOCK_SIGOPS), allowing it to accept blocks that zcashd rejects with bad-blk-sigops. A miner who produces such a block…
CWE: CWE-682
NVD

HIGH
CVE-2026-41584
CVE-2026-41584
pkg: zfnd zebra-chain, zfnd zebrad

published: May 8, 2026

ZEBRA is a Zcash node written entirely in Rust. Prior to zebrad version 4.3.1 and prior to zebra-chain version 6.0.2, Orchard transactions contain a rk field which is a randomized validating key and also an elliptic curve point. The Zcash specification allows the field to be the identity (a "zero" v…
CWE: CWE-617
NVD

HIGH
CVE-2024-46508
CVE-2024-46508
pkg: yeti-platform yeti

published: May 8, 2026

yeti-platform yeti before 2.1.12 allows attackers to generate valid JWT tokens is the secret is not changed (by setting YETI_AUTH_SECRET_KEY to a value other than SECRET).
CWE: CWE-798
NVD

HIGH
CVE-2026-39836
CVE-2026-39836
pkg: windows

published: May 7, 2026

The Dial and LookupPort functions panic on Windows when provided with an input containing a NUL (0).
GitHub-GHSA

HIGH
vm2 Sandbox Access to Host Buffer.alloc Allows timeout Bypass Resulting in Memory Exhaustion
GHSA-6785-pvv7-mvg7
pkg: vm2
eco: npm
published: May 7, 2026
### Summary
Sandboxed code can call `Buffer.alloc()` with an arbitrary size to allocate memory directly on the host heap. Because `Buffer.alloc` is a synchronous C++ native call, vm2's `timeout` option cannot interrupt it. A single request can exhaust host memory and crash the process with a `FATAL …
CVE-2026-44004
NVD

HIGH
CVE-2026-41640
CVE-2026-41640
pkg: node

published: May 7, 2026

NocoBase is an AI-powered no-code/low-code platform for building business applications and enterprise solutions. Prior to version 2.0.39, the queryParentSQL() function in the core database package constructs a recursive CTE query by joining nodeIds with string concatenation instead of using paramete…
CWE: CWE-89
GitHub-GHSA

HIGH
Talos Linux has a local privilege escalation from untrusted workloads
GHSA-m38g-vww2-mvgx
pkg: github.com/siderolabs/talos
eco: go
published: May 7, 2026
### Summary

A vulnerability in the Linux kernel's algif_aead subsystem (CVE-2026-31431, "copy.fail") allows an unprivileged container workload to corrupt arbitrary file page-cache pages via the AF_ALG crypto interface and splice(). On Talos Linux, this vulnerability can be chained into a complete n…

GitHub-GHSA

HIGH
rust-zserio has Unbounded Memory Allocation
GHSA-fpf5-4jw8-67×8
pkg: rust-zserio
eco: rust
published: May 7, 2026
### Impact

When deserializing arrays, strings or bytes (blob) types zserio first reads the size of the variable, and then allocates sufficient memory to load data. Since the size is always trusted this can be abused by creating a data file with a large size value, causing the zserio runtime to allo…

GitHub-GHSA

HIGH
Gotenberg has an unauthenticated denial of service via echo.Context pool reuse in webhook async goroutine
GHSA-r33j-c622-r6qp
pkg: github.com/gotenberg/gotenberg/v8
eco: go
published: May 7, 2026
## Summary

The webhook middleware spawns a goroutine that holds a reference to the request's `echo.Context` after the synchronous handler returns `ErrAsyncProcess` and Echo recycles the context back to its `sync.Pool`. When a concurrent request claims the recycled context, `c.Reset()` clears the st…

CVE-2026-42594
GitHub-GHSA

HIGH
Netty: HttpContentDecompressor maxAllocation bypass when Content-Encoding set to br/zstd/snappy leads to decompression bomb DoS
GHSA-f6hv-jmp6-3vwv
pkg: io.netty:netty-codec-http, io.netty:netty-codec-http2, io.netty:netty-codec-http
eco: maven
published: May 7, 2026
## Summary

`HttpContentDecompressor` accepts a `maxAllocation` parameter to limit decompression buffer size and prevent decompression bomb attacks. This limit is correctly enforced for gzip and deflate encodings via `ZlibDecoder`, but is silently ignored when the content encoding is `br` (Brotli), …

CVE-2026-42587
GitHub-GHSA

HIGH
Netty Lz4FrameDecoder is vulnerable to resource exhaustion
GHSA-mj4r-2hfc-f8p6
pkg: io.netty:netty-codec-compression, io.netty:netty-codec
eco: maven
published: May 7, 2026
### Summary
Lz4FrameDecoder allocates a ByteBuf of size `decompressedLength` (up to 32 MB per block) before LZ4 runs. A peer only needs a 21-byte header plus `compressedLength` payload bytes – 22 bytes if `compressedLength == 1` – to force that allocation.

### Details
io.netty.handler.codec.compres…

CVE-2026-42583
GitHub-GHSA

HIGH
Netty HTTP/3 QPACK literal unbounded allocation
GHSA-2c5c-chwr-9hqw
pkg: io.netty:netty-codec-http3
eco: maven
published: May 7, 2026
### Summary
When Netty decodes HTTP/3 headers, it sometimes runs `new byte[length]` using a length from the wire before checking that many bytes are really there. A small malicious header can claim a huge length (on the order of a gigabyte).

### Details
When decoding header blocks, the non-Huffman …

CVE-2026-42582
GitHub-GHSA

HIGH
Netty has a DNS Codec Input Validation Bypass (Encoder + Decoder)
GHSA-cm33-6792-r9fm
pkg: io.netty:netty-codec-dns, io.netty:netty-codec-dns
eco: maven
published: May 7, 2026
# Security Vulnerability Report: DNS Codec Input Validation Bypass in Netty (Encoder + Decoder)

## 1. Vulnerability Summary

| Field | Value |
|——-|——-|
| **Product** | Netty |
| **Version** | 4.2.12.Final (and all prior versions with codec-dns) |
| **Component** | `io.netty.handler.codec.d…

CVE-2026-42579
GitHub-GHSA

HIGH
Netty epoll transport denial of service via RST on half-closed TCP connection
GHSA-rwm7-x88c-3g2p
pkg: io.netty:netty-transport-native-epoll
eco: maven
published: May 6, 2026
## Summary

Netty's epoll transport fails to detect and close TCP connections that receive a RST after being half-closed, leading to stale channels that are never cleaned up and, in some code paths, a 100% CPU busy-loop in the event loop thread.

## Affected versions

All versions of 4.2.x `netty-tr…

CVE-2026-42577
GitHub-GHSA

HIGH
Nerdbank.MessagePack: Attacker-controlled stackalloc in DateTime decoding causes process-terminating StackOverflowException
GHSA-2cwq-pwfr-wcw3
pkg: Nerdbank.MessagePack
eco: nuget
published: May 6, 2026
### Summary

Nerdbank.MessagePack contains an uncontrolled stack allocation vulnerability in DateTime decoding. A malicious MessagePack payload can declare an oversized timestamp extension length, causing the reader to allocate an attacker-controlled number of bytes on the stack. This can trigger a …

CVE-2026-44375
GitHub-GHSA

HIGH
python-multipart has Denial of Service via unbounded multipart part headers
GHSA-pp6c-gr5w-3c5g
pkg: python-multipart
eco: pip
published: May 6, 2026
### Summary

`python-multipart` has a denial of service vulnerability in multipart part header parsing. When parsing `multipart/form-data`, `MultipartParser` previously had no limit on the number of part headers or the size of an individual part header. An attacker could send a request with either m…

CVE-2026-42561
GitHub-GHSA

HIGH
Granian vulnerable to unauthenticated DoS via WebSocket subprotocol header panic
GHSA-vrg7-482j-p6f6
pkg: granian
eco: pip
published: May 6, 2026
### Summary

Granian aborts a worker process when an unauthenticated client sends a WebSocket upgrade request whose `Sec-WebSocket-Protocol` header contains non-ASCII bytes.

The crash happens in Granian's WebSocket scope construction path, before the ASGI application is invoked.

This is a single-r…

CVE-2026-42544
GitHub-GHSA

HIGH
Snappier has an infinite loop during SnappyStream decompression with malformed framed input
GHSA-pggp-6c3x-2xmx
pkg: Snappier
eco: nuget
published: May 6, 2026
### Summary
`Snappier.SnappyStream` enters an uncatchable infinite loop when decompressing a malformed framed-format Snappy stream as small as 15 bytes.

### Details
The hang manifests as a userspace busy loop with SnappyStreamDecompressor.Decompress repeatedly calling Crc32CAlgorithm.Append. The ex…

CVE-2026-44302
GitHub-GHSA

HIGH
Micronaut has unbounded `formattersCache` in `TimeConverterRegistrar` that Allows Memory Exhaustion via `Accept-Language` Header
GHSA-8hjv-92q9-g4xj
pkg: io.micronaut:micronaut-context
eco: maven
published: May 6, 2026
## Summary

`TimeConverterRegistrar` caches `DateTimeFormatter` instances in an unbounded `ConcurrentHashMap<String, DateTimeFormatter>` whose key is derived from the `@Format` annotation pattern concatenated with the locale from the HTTP `Accept-Language` header. Because `Locale.forLanguageTag()` a…

CVE-2026-44241
GitHub-GHSA

HIGH
basic-ftp allows a malicious FTP server to cause client-side denial of service via unbounded multiline control response buffering
GHSA-rpmf-866q-6p89
pkg: basic-ftp
eco: npm
published: May 6, 2026
## Summary

`basic-ftp` is vulnerable to client-side denial of service when parsing FTP control-channel multiline responses.

A malicious or compromised FTP server can send an unterminated multiline response during the initial FTP banner phase, before authentication. The client keeps appending attac…

CVE-2026-44240
NVD

HIGH
CVE-2026-7948
CVE-2026-7948
pkg: google chrome, microsoft windows

published: May 6, 2026

Race in Chromoting in Google Chrome on Windows prior to 148.0.7778.96 allowed a local attacker to perform privilege escalation via a malicious file. (Chromium security severity: Medium)
CWE: CWE-362
NVD

HIGH
CVE-2026-7897
CVE-2026-7897
pkg: google chrome, apple iphone_os

published: May 6, 2026

Use after free in Mobile in Google Chrome on iOS prior to 148.0.7778.96 allowed a remote attacker who convinced a user to engage in specific UI gestures to execute arbitrary code via a crafted HTML page. (Chromium security severity: Critical)
CWE: CWE-416
GitHub-GHSA

HIGH
Nokogiri CSS selector tokenizer has regular expression backtracking
GHSA-c4rq-3m3g-8wgx
pkg: nokogiri
eco: rubygems
published: May 6, 2026
## Summary

Nokogiri's CSS selector tokenizer contains regular expressions whose construction may result in exponential regex backtracking on adversarial selectors. Three ReDoS vectors are addressed in this release:

1. String-literal tokenization on certain unterminated quoted-string input.
2. Stri…

NVD

HIGH
CVE-2026-23870
CVE-2026-23870
pkg: react

published: May 6, 2026

A denial of service vulnerability could be triggered by sending specially crafted HTTP requests to server function endpoints, this could lead to server crashes, out-of-memory exceptions or excessive CPU usage; affecting the following packages: react-server-dom-webpack, react-server-dom-parcel, react…
NVD

HIGH
CVE-2026-43226
CVE-2026-43226
pkg: linux linux_kernel

published: May 6, 2026

In the Linux kernel, the following vulnerability has been resolved:

net/rds: No shortcut out of RDS_CONN_ERROR

RDS connections carry a state "rds_conn_path::cp_state"
and transitions from one state to another and are conditional
upon an expected state: "rds_conn_path_transition."

There is one exc…

NVD

HIGH
CVE-2026-43164
CVE-2026-43164
pkg: go

published: May 6, 2026

In the Linux kernel, the following vulnerability has been resolved:

udplite: Fix null-ptr-deref in __udp_enqueue_schedule_skb().

syzbot reported null-ptr-deref of udp_sk(sk)->udp_prod_queue. [0]

Since the cited commit, udp_lib_init_sock() can fail, as can
udp_init_sock() and udpv6_init_sock().

L…

NVD

HIGH
CVE-2026-43101
CVE-2026-43101
pkg: linux

published: May 6, 2026

In the Linux kernel, the following vulnerability has been resolved:

ipv6: ioam: fix potential NULL dereferences in __ioam6_fill_trace_data()

We need to check __in6_dev_get() for possible NULL value, as
suggested by Yiming Qian.

Also add skb_dst_dev_rcu() instead of skb_dst_dev(),
and two missing …

NVD

HIGH
CVE-2026-43099
CVE-2026-43099
pkg: linux

published: May 6, 2026

In the Linux kernel, the following vulnerability has been resolved:

ipv4: icmp: fix null-ptr-deref in icmp_build_probe()

ipv6_stub->ipv6_dev_find() may return ERR_PTR(-EAFNOSUPPORT) when the
IPv6 stack is not active (CONFIG_IPV6=m and not loaded), and passing
this error pointer to dev_hold() will …

GitHub-GHSA

HIGH
Mongoose's Improper Sanitization of $nor in sanitizeFilter May Allow NoSQL Injection
GHSA-wpg9-53fq-2r8h
pkg: mongoose, mongoose, mongoose
eco: npm
published: May 5, 2026
### Impact

This vulnerability allows bypassing Mongoose’s sanitizeFilter query sanitization mechanism via the `$nor` operator.

When sanitizeFilter is enabled, Mongoose wraps query operators in `$eq` to neutralize them. However, prior to the fix, `$nor` was not included in the set of logical oper…

CVE-2026-42334
GitHub-GHSA

HIGH
changedetection.io has an Arbitrary Local File Read via a crafted backup restore
GHSA-8757-69j2-hx56
pkg: changedetection.io
eco: pip
published: May 5, 2026
### Details
The vulnerability is caused by trusting attacker-controlled snapshot paths restored from backup files.

The vulnerable flow starts in the backup restore logic. When a backup ZIP is restored, the application extracts the archive and copies each restored watch UUID directory directly into …

CVE-2026-43891
GitHub-GHSA

HIGH
Twisted has a Denial of Service (DoS) in twisted.names via Crafted DNS Compression Pointer Chains
GHSA-grgv-6hw6-v9g4
pkg: Twisted
eco: pip
published: May 5, 2026
### Details

The twisted.names module is vulnerable to a Denial of Service (DoS) attack via resource exhaustion during DNS name decompression. A remote, unauthenticated attacker can exploit this by sending a crafted TCP DNS packet containing deeply chained compression pointers. This flaw bypasses pr…

CVE-2026-42304
GitHub-GHSA

HIGH
GoBGP has a panic in AdjRib.Update via malformed BGP Update message (Nil Pointer Dereference)
GHSA-p3w2-64xm-833j
pkg: github.com/osrg/gobgp/v4
eco: go
published: May 5, 2026
### Summary
Remote Denial of Service (DoS) via Nil Pointer Dereference in BGP Update Processing
An unauthenticated remote BGP peer can trigger a fatal panic in GoBGP by sending a specially crafted BGP UPDATE message. When the server receives a message with inconsistent attribute lengths, it improper…
CVE-2026-42285
GitHub-GHSA

HIGH
ssrfcheck: SSRF Bypass Caused by Failure to Classify Reserved IP Address Space as Invalid
GHSA-p4hc-9pjh-55c8
pkg: ssrfcheck
eco: npm
published: May 5, 2026
# SSRF Bypass in `ssrfcheck` – fails to classify reserved IP address space as invalid

`ssrfcheck` is an npm package that serves to provide protection from SSRF by validating URLs or hostname inputs.

Resources:
* Project's GitHub code repository: https://github.com/felippe-regazio/ssrfcheck
* Pr…

CVE-2025-8267
NVD

HIGH
CVE-2026-40280
CVE-2026-40280
pkg: thecodingmachine gotenberg

published: May 5, 2026

Gotenberg is an API-based document conversion tool. In versions 8.30.1 and earlier, the default private-IP deny-lists for the –webhook-deny-list and –api-download-from-deny-list flags use a case-sensitive regular expression (^https?://) to match URL schemes. Because Go's net/url.Parse() normalizes…
CWE: CWE-918
NVD

HIGH
CVE-2026-32934
CVE-2026-32934
pkg: coredns.io coredns

published: May 5, 2026

CoreDNS is a DNS server that chains plugins. In versions prior to 1.14.3, the DNS-over-QUIC (DoQ) server can be driven into unbounded goroutine and memory growth by a remote client that opens many QUIC streams and sends only 1 byte per stream. When the worker pool is full, CoreDNS still spawns a gor…
CWE: CWE-770
GitHub-GHSA

HIGH
pgjdbc: Unbounded PBKDF2 iterations in SCRAM authentication allows CPU exhaustion DoS
GHSA-98qh-xjc8-98pq
pkg: org.postgresql:postgresql
eco: maven
published: May 5, 2026
## Summary
pgjdbc is vulnerable to a client-side denial of service during SCRAM-SHA-256 authentication.

### Impact
A malicious server can instruct the driver to perform SCRAM authentication with a very large iteration count.
With a large enough value, the client spends an unbounded amount of CPU ti…

CVE-2026-42198
GitHub-GHSA

HIGH
Prometheus: Remote read endpoint allows denial of service via crafted snappy payload
GHSA-8rm2-7qqf-34qm
pkg: github.com/prometheus/prometheus
eco: go
published: May 5, 2026
### Impact

The remote read endpoint (`/api/v1/read`) does not validate the declared decoded length in a snappy-compressed request body before allocating memory.
An unauthenticated attacker can send a small payload that causes a huge heap allocation per request. Under concurrent load this can exhaus…

CVE-2026-42154
GitHub-GHSA

HIGH
Prometheus Azure AD remote write OAuth client secret exposed via config API
GHSA-wg65-39gg-5wfj
pkg: github.com/prometheus/prometheus
eco: go
published: May 5, 2026
### Impact

Users who use Azure AD remote write with OAuth authentication are impacted.

The `client_secret` field in the Azure AD remote write OAuth configuration (`storage/remote/azuread`) was typed as `string` instead of `Secret`. Prometheus redacts fields of type `Secret` when serving the config…

CVE-2026-42151
NVD

HIGH
CVE-2026-30923
CVE-2026-30923
pkg: owasp modsecurity

published: May 5, 2026

ModSecurity is an open source, cross platform web application firewall (WAF) engine for Apache, IIS and Nginx. Libmodsecurity is one component of the ModSecurity v3 project. A segmentation fault occurs when a rule using the t:hexDecode transformation inspects a query string parameter containing a si…
CWE: CWE-125
NVD

HIGH
CVE-2026-7776
CVE-2026-7776
pkg: tls

published: May 4, 2026

Boundary Community Edition and Boundary Enterprise (“Boundary”) workers are vulnerable to a denial-of-service condition during node enrollment TLS handshakes. An attacker with network access to the worker authentication listener may open a connection and delay or withhold the client certificate …
CWE: CWE-770
NVD

HIGH
CVE-2026-7768
CVE-2026-7768
pkg: node

published: May 4, 2026

@fastify/accepts-serializer cached serializer-selection results keyed by the request Accept header without a size limit or eviction policy. A remote unauthenticated client could send many distinct but matching Accept header variants to make the cache grow unbounded, eventually exhausting the Node.js…
CWE: CWE-770
NVD

HIGH
CVE-2026-42236
CVE-2026-42236
pkg: n8n n8n

published: May 4, 2026

n8n is an open source workflow automation platform. Prior to versions 1.123.32, 2.17.4, and 2.18.1, the MCP OAuth client registration endpoint accepted unauthenticated requests and stored client data without adequate resource controls. An unauthenticated remote attacker could exhaust server memory r…
CWE: CWE-770
NVD

HIGH
CVE-2026-42226
CVE-2026-42226
pkg: n8n n8n

published: May 4, 2026

n8n is an open source workflow automation platform. Prior to versions 1.123.33 and 2.17.5, the dynamic-node-parameters endpoints did not verify whether the authenticated caller was authorized to use a supplied credential reference. An authenticated user with access to a shared workflow could supply …
CWE: CWE-862
NVD

HIGH
CVE-2026-42151
CVE-2026-42151
pkg: oauth

published: May 4, 2026

Prometheus is an open-source monitoring system and time series database. Prior to versions 3.5.3 and 3.11.3, the client_secret field in the Azure AD remote write OAuth configuration (storage/remote/azuread) was typed as string instead of Secret. Prometheus redacts fields of type Secret when serving …
CWE: CWE-200, CWE-312
GitHub-GHSA

HIGH
Apache OpenNLP AbstractModelReader has an OOM Denial of Service via Unbounded Array Allocation
GHSA-659w-93r5-9j6m
pkg: org.apache.opennlp:opennlp-tools, org.apache.opennlp:opennlp-tools
eco: maven
published: May 4, 2026
OOM Denial of Service via Unbounded Array Allocation in Apache OpenNLP AbstractModelReader 

Versions Affected: 

Before 2.5.9

Before 3.0.0-M3 

Description:

The AbstractModelReader methods getOutcomes(), getOutcomePatterns(), and getPredicates() each read a 32-bit signed integer count field f…

CVE-2026-42440
GitHub-GHSA

HIGH
OpenMRS ModuleResourcesServlet has Path Traversal that Leads to Arbitrary File Read
GHSA-jjgj-cx3q-pw4w
pkg: org.openmrs.web:openmrs-web, org.openmrs.web:openmrs-web
eco: maven
published: May 4, 2026
## Affected Versions

version ≤ 2.7.8 (latest version at time of disclosure)

https://github.com/openmrs/openmrs-core

## Impact

The `/openmrs/moduleResources/{moduleid}` endpoint in OpenMRS Core is vulnerable to a path traversal attack. The `ModuleResourcesServlet` does not properly validate use…

CVE-2026-40075
NVD

HIGH
CVE-2026-37461
CVE-2026-37461
pkg: go

published: May 4, 2026

An out-of-bounds read in the ParseIP6Extended function (/bgp/bgp.go) of gobgp v4.3.0 allows attackers to cause a Denial of Service (DoS) via supplying a crafted BGP UPDATE message.
CWE: CWE-125
NVD

HIGH
CVE-2026-34354
CVE-2026-34354
pkg: windows

published: May 8, 2026

Akamai Guardicore Platform Agent (GPA) and Zero Trust Client on Linux and macOS allow TOCTOU-based local privilege escalation. The GPA service creates an IPC socket in the world-writable /tmp directory. It accepts unauthenticated IPC control messages. This enables a TOCTOU vulnerability in the Handl…
CWE: CWE-367
NVD

HIGH
CVE-2026-42264
CVE-2026-42264
pkg: axios

published: May 8, 2026

Axios is a promise based HTTP client for the browser and Node.js. From version 1.0.0 to before version 1.15.2, fFive config properties (auth, baseURL, socketPath, beforeRedirect, and insecureHTTPParser) in the HTTP adapter are read via direct property access without hasOwnProperty guards, making the…
CWE: CWE-1321
NVD

HIGH
CVE-2026-40213
CVE-2026-40213
pkg: node

published: May 7, 2026

OpenStack Cyborg before 16.0.1 uses rule:allow (check_str='@') as the default policy for multiple API endpoints. This unconditionally authorizes any request carrying a valid Keystone token regardless of roles, project membership, or scope. An authenticated user with zero role assignments can complet…
CWE: CWE-863
GitHub-GHSA

HIGH
ech0's acess tokens with expiry=never cannot be revoked: logout panics, delete does not blacklist JTI
GHSA-fpw6-hrg5-q5x5
pkg: github.com/lin-snow/Ech0
eco: go
published: May 7, 2026
## Summary

Access tokens created with the "never expire" option have no `exp` JWT claim. Three independent revocation mechanisms fail for this token type. Logout at `internal/handler/auth/auth.go:154` and `:163` dereferences `claims.ExpiresAt.Time`, panicking on the nil field so the token never hit…

GitHub-GHSA

HIGH
katalyst-koi: Session cookies can be replayed after user logout
GHSA-4cx3-3c38-j9vv
pkg: katalyst-koi, katalyst-koi
eco: rubygems
published: May 7, 2026
### Impact

Admin session cookies were not invalidated when an admin user logged out. An attacker with access to a valid admin session cookie could continue to access admin functionality after logout, until the cookie expired or session secrets were rotated.

This affects applications using Koi admi…

CVE-2026-44511
GitHub-GHSA

HIGH
wger: CSV/TSV formula injection in gym member export (first_name/last_name)
GHSA-xq9m-hmp9-fw87
pkg: wger
eco: pip
published: May 6, 2026
### Summary

The gym member TSV export endpoint in wger writes `first_name` and `last_name` profile fields verbatim to TSV cells with no formula-prefix sanitization. Any gym member (including newly self-registered users) can pre-load a spreadsheet formula into their own profile. When a gym admin lat…

GitHub-GHSA

HIGH
Axios: Prototype Pollution Gadgets – Response Tampering, Data Exfiltration, and Request Hijacking
GHSA-pf86-5×62-jrwf
pkg: axios, axios
eco: npm
published: May 5, 2026
## Summary

When `Object.prototype` has been polluted by any co-dependency with keys that axios reads without a `hasOwnProperty` guard, an attacker can (a) silently intercept and modify every JSON response before the application sees it, or (b) fully hijack the underlying HTTP transport, gaining acc…

CVE-2026-42033
GitHub-GHSA

HIGH
Axios: Header Injection via Prototype Pollution
GHSA-6chq-wfr3-2hj9
pkg: axios, axios
eco: npm
published: May 5, 2026
### Summary

A prototype pollution gadget exists in the Axios HTTP adapter (lib/adapters/http.js) that allows an attacker to inject arbitrary HTTP headers into outgoing requests. The vulnerability exploits duck-type checking of the data payload, where if Object.prototype is polluted with getHeaders,…

CVE-2026-42035
GitHub-GHSA

HIGH
Axios has prototype pollution read-side gadgets in HTTP adapter that allow credential injection and request hijacking
GHSA-q8qp-cvcw-x6jj
pkg: axios
eco: npm
published: May 5, 2026
## Summary

Five config properties in the HTTP adapter are read via direct property access without `hasOwnProperty` guards, making them exploitable as prototype pollution gadgets. When `Object.prototype` is polluted by another dependency in the same process, axios silently picks up these polluted va…

CVE-2026-42264
GitHub-GHSA

HIGH
smallbitvec: Integer overflow in safe API leads to heap buffer overflow
GHSA-97wc-2hqc-cjgr
pkg: smallbitvec
eco: rust
published: May 9, 2026
### Summary
An integer overflow in the internal capacity calculation of `smallbitvec` can lead to an undersized heap allocation, resulting in a heap buffer overflow through safe APIs only. This allows memory corruption without requiring `unsafe` code from the caller.

### Details
The issue originate…

CVE-2026-44983
GitHub-GHSA

HIGH
free5GC's NEF nnef-callback route group is unauthenticated; forged callback requests are accepted into the processing path
GHSA-wqfh-gq79-j8mf
pkg: github.com/free5gc/nef
eco: go
published: May 8, 2026
### Summary
free5GC's NEF mounts the `nnef-callback` route group without inbound OAuth2/bearer-token authorization. A forged or arbitrary bearer token (e.g. `Authorization: Bearer not-a-real-token`) is enough to reach the SMF-callback handler — the callback body is parsed and dispatched into NEF bu…
CVE-2026-44320
GitHub-GHSA

HIGH
Open WebUI Vulnerable to Arbitrary File Upload and Path Traversal
GHSA-9pgh-j74g-qj6m
pkg: open-webui
eco: pip
published: May 8, 2026
# **CONFIDENTIAL**

# KL-CAN-2024-002

## Vulnerability Details

| # | Field | Value |
|—|——-|——-|
| 1 | **Discoverer** | Jaggar Henry & Sean Segreti of KoreLogic, Inc. |
| 2 | **Date Submitted** | 2024.03.12 |
| 3 | **Title** | Open WebUI Arbitrary File Upload + Path Traversal |
| 5 | **A…

CVE-2026-44566
GitHub-GHSA

HIGH
Open WebUI has Improper Authorization Control
GHSA-4vg5-rp28-gvjf
pkg: open-webui
eco: pip
published: May 8, 2026
# **CONFIDENTIAL**

# Vulnerability Disclosure Analysis Documentation

## Vulnerability Details

| # | Field | Value |
|—|——-|——-|
| 1 | **Discoverer** | Taylor Pennington of KoreLogic, Inc. |
| 2 | **Date Submitted** | June 11, 2024 |
| 3 | **Title** | Open WebUI Improper Authorizati…

CVE-2026-44567
GitHub-GHSA

HIGH
Open WebUI has stored XSS in Excel file preview
GHSA-jwf8-pv5p-vhmc
pkg: open-webui
eco: pip
published: May 8, 2026
### Summary
Excel file attachments are previewed in an unsafe way. A crafted XLSX file payload can be used to cause the [sheetjs](https://git.sheetjs.com/sheetjs/sheetjs) function [sheet_to_html](https://git.sheetjs.com/sheetjs/sheetjs/src/commit/66cf8d2117d271f89e4f47b5fed35a3e1ea93f67/bits/79_html…
CVE-2026-44549
GitHub-GHSA

HIGH
open-webui Vulnerable to Stored XSS via Model Description
GHSA-gf5m-wcrh-7928
pkg: open-webui, open-webui
eco: npm
published: May 8, 2026
> [!IMPORTANT]
> Relationship to CVE-2024-7990

> CVE-2024-7990 (issued by huntr.dev, March 2025) describes a stored XSS in the same field — the model description — but exploits a different bypass mechanism: a second-order injection through the sanitizeResponseContent function's video-tag place…

CVE-2026-44721
NVD

HIGH
CVE-2025-55449
CVE-2025-55449
pkg: jwt

published: May 8, 2026

AstrBotDevs AstrBot 3.5.15 has Advanced_System_for_Text_Response_and_Bot_Operations_Tool as the hardcoded private key used to sign a JWT.
CWE: CWE-321
GitHub-GHSA

HIGH
Netty has HttpClientCodec response desynchronization
GHSA-57rv-r2g8-2cj3
pkg: io.netty:netty-codec-http, io.netty:netty-codec-http
eco: maven
published: May 7, 2026
### Summary
If HttpClientCodec is configured, there are use cases when a response body from one request, can be parsed as another's.

### Details
HttpClientCodec pairs each inbound response with an outbound request by `queue.poll()` once per response, including for `1xx`. If the client pipelines GE…

CVE-2026-42584
GitHub-GHSA

HIGH
YAFNET has Stored XSS in Forum Thread Posts/Replies that Allows Arbitrary JavaScript Execution for All Thread Viewers
GHSA-8rq5-wwpp-fmj2
pkg: YAFNET.Core, YAFNET.Core
eco: nuget
published: May 5, 2026
**Description:**
Stored Cross-Site Scripting (XSS) occurs when user-supplied input is persisted by the application and later rendered in another user's browser without proper sanitization or contextual output encoding. When the vulnerable sink is a high-traffic surface such as a public forum thread,…
CVE-2026-43939
GitHub-GHSA

HIGH
Apache Thrift vulnerable to Path Traversal, HTTP Request/Response Splitting, Uncontrolled Resource Consumption
GHSA-526f-jxpj-jmg2
pkg: thrift
eco: npm
published: May 5, 2026
Origin Validation Error, Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal'), Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Request/Response Splitting'), Uncontrolled Resource Consumption vulnerability in Apache Thrift.

This issue affects Apache Thrift:…

CVE-2026-43870
GitHub-GHSA

HIGH
Apache Thrift has an Improper Validation of Certificate with Host Mismatch Vulnerability
GHSA-7pwc-h2j2-rjgj
pkg: org.apache.thrift:libthrift
eco: maven
published: May 5, 2026
Improper Validation of Certificate with Host Mismatch vulnerability in Apache Thrift.

This issue affects Apache Thrift: before 0.23.0.

Users are recommended to upgrade to version [0.23.0](https://github.com/apache/thrift/releases/tag/v0.23.0), which fixes the issue.

CVE-2026-43869
NVD

HIGH
CVE-2026-7810
CVE-2026-7810
pkg: python

published: May 5, 2026

A flaw has been found in UsamaK98 python-notebook-mcp up to a05a232815809a7e425b5fa7be26e0d4369894c2. Impacted is the function create_notebook/read_notebook/edit_cell/add_cell of the file server.py. This manipulation causes path traversal. It is possible to initiate the attack remotely. The exploit …
CWE: CWE-22
GitHub-GHSA

HIGH
Amazon ECS Container Agent (Windows) is vulnerable to Information Disclosure
GHSA-fc67-c4hg-q653
pkg: github.com/aws/amazon-ecs-agent
eco: go
published: May 7, 2026
### Summary
[Amazon Elastic Container Service (Amazon ECS)](https://docs.aws.amazon.com/AmazonECS/latest/developerguide/Welcome.html) is a fully managed container orchestration service that enables customers to deploy, manage, and scale containerized applications. An issue exists where, under certai…
NVD

HIGH
CVE-2026-39383
CVE-2026-39383
pkg: thecodingmachine gotenberg

published: May 5, 2026

Gotenberg is an API-based document conversion tool. In version 8.29.1, an unauthenticated attacker with network access can force the server to make outbound HTTP POST requests to arbitrary internal or external destinations by supplying a crafted URL in the Gotenberg-Webhook-Url request header. The F…
CWE: CWE-918
GitHub-GHSA

HIGH
Axios: Incomplete Fix for CVE-2025-62718 — NO_PROXY Protection Bypassed via RFC 1122 Loopback Subnet (127.0.0.0/8) in Axios 1.15.0
GHSA-pmwg-cvhr-8vh7
pkg: axios, axios
eco: npm
published: May 5, 2026
**1. Executive Summary**
This report documents an **incomplete security patch** for the previously disclosed vulnerability **GHSA-3p68-rc4w-qgx5 (CVE-2025-62718)**, which affects the `NO_PROXY` hostname resolution logic in the Axios HTTP library.

**Background — The Original Vulnerability**
The or…

CVE-2026-42043
GitHub-GHSA

HIGH
Open WebUI's responses passthrough endpoint lacks access control authorization
GHSA-hp5m-24vp-vq2q
pkg: open-webui
eco: pip
published: May 8, 2026
## Summary

The /responses endpoint in the OpenAI router accepts any authenticated user and forwards requests directly to upstream LLM providers without enforcing per-model access control. While the primary chat completion endpoint (generate_chat_completion) checks model ownership, group membership,…

CVE-2026-44556
GitHub-GHSA

HIGH
Microsoft APM CLI's plugin.json component paths escape plugin root and copy arbitrary host files during install
GHSA-xhrw-5qxx-jpwr
pkg: apm-cli
eco: pip
published: May 7, 2026
### Summary
Microsoft APM normalizes marketplace plugins by copying plugin components referenced in `plugin.json` into `.apm/`. The manifest fields `agents`, `skills`, `commands`, and `hooks` are attacker-controlled, but the implementation does not enforce that those paths remain inside the plugin d…
CVE-2026-44641
NVD

HIGH
CVE-2026-44243
CVE-2026-44243
pkg: gitpython_project gitpython

published: May 7, 2026

GitPython is a python library used to interact with Git repositories. Prior to version 3.1.48, a vulnerability in GitPython allows attackers who can supply a crafted reference path to an application using GitPython to write, overwrite, move, or delete files outside the repository’s .git directory …
CWE: CWE-22
GitHub-GHSA

HIGH
GitPython reference APIs has a path traversal vulnerability that allows arbitrary file write and delete outside the repository
GHSA-7545-fcxq-7j24
pkg: GitPython
eco: pip
published: May 6, 2026
## 🧾 Summary

A vulnerability in **GitPython** allows **attackers who can supply a crafted reference path to an application using GitPython** to **write, overwrite, move, or delete files outside the repository’s `.git` directory** via **insufficient validation of reference paths in reference cr…

CVE-2026-44243
GitHub-GHSA

HIGH
Auth.js SDK has Improper Permission Checking
GHSA-8qjv-jj2q-x832
pkg: auth0-js
eco: npm
published: May 6, 2026
### Description
Under specific preconditions, the Auth0.js SDK may improperly return user profile information using a valid access token when a specifically crafted invalid ID token is provided.

### Am I Affected?
Users are affected if they meet each of the following preconditions:
– Applications b…

CVE-2026-42280
NVD

HIGH
CVE-2026-43062
CVE-2026-43062
pkg: linux

published: May 5, 2026

In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: L2CAP: Fix type confusion in l2cap_ecred_reconf_rsp()

l2cap_ecred_reconf_rsp() casts the incoming data to struct
l2cap_ecred_conn_rsp (the ECRED *connection* response, 8 bytes with
result at offset 6) instead of struct …

GitHub-GHSA

HIGH
Apache Atlas has a Code Injection Vulnerability
GHSA-35xx-9xrg-gwhf
pkg: org.apache.atlas:apache-atlas
eco: maven
published: May 4, 2026
### Description:
Improper Control of Generation of Code ('Code Injection') vulnerability in Apache Atlas.

Apache Atlas exposes a DSL search endpoint that accepts user-supplied query strings. Attacker can alter Gremlin traversal logic within grammar-allowed characters to access unintended data.

##…

CVE-2026-40563
GitHub-GHSA

HIGH
GitPython: Newline injection in config_writer() section parameter bypasses CVE-2026-42215 patch, enabling RCE via core.hooksPath
GHSA-mv93-w799-cj2w
pkg: GitPython
eco: pip
published: May 8, 2026
Summary

The patch for CVE-2026-42215 (GitPython 3.1.49) validates newlines only in the value parameter of set_value(). The section and option parameters are passed to configparser without any newline validation. An attacker who controls the section argument can inject \n to write arbitrary section …

NVD

HIGH
CVE-2026-34596
CVE-2026-34596
pkg: sandboxie-plus sandboxie

published: May 5, 2026

Sandboxie-Plus is an open source sandbox-based isolation software for Windows. In versions 1.17.2 and earlier, a Time-of-Check-to-Time-of-Use (TOCTOU) race condition exists during addon installation. When a user installs an addon through the SandMan interface, UpdUtil.exe is spawned as SYSTEM by Sbi…
CWE: CWE-367
GitHub-GHSA

HIGH
awslabs/tough is Missing Delegated Metadata Validation
GHSA-4v58-8p28-2rq3
pkg: tough, tuftool
eco: rust
published: May 5, 2026
### Summary
Missing expiration, hash, and length enforcement in delegated metadata validation in awslabs/tough before tough-v0.22.0 allows remote authenticated users with delegated signing authority to bypass TUF specification integrity checks for delegated targets metadata and poison the local meta…
CVE-2026-6967
GitHub-GHSA

HIGH
awslabs/tough Delegated Roles have a Signature Threshold Bypass
GHSA-8m7c-8m39-rv4x
pkg: tough, tuftool
eco: rust
published: May 5, 2026
### Summary
Improper verification of cryptographic signature uniqueness in delegated role validation in awslabs/tough before tough-v0.22.0 allows remote authenticated users to bypass the TUF signature threshold requirement by duplicating a valid signature, causing the client to accept forged delegat…
CVE-2026-6966
GitHub-GHSA

HIGH
@yoda.digital/gitlab-mcp-server's SSE transport has no authentication and wildcard CORS, exposing all 86 GitLab tools
GHSA-8jr5-6gvj-rfpf
pkg: @yoda.digital/gitlab-mcp-server
eco: npm
published: May 9, 2026
## SSE Transport Has No Authentication and Wildcard CORS, Exposing All 86 GitLab Tools Including Destructive Operations

A review of `mcp-gitlab-server` at commit `80a7b4cf3fba6b55389c0ef491a48190f7c8996a` uncovered that the SSE HTTP transport — advertised in the README and comparison table as a d…

CVE-2026-44895
GitHub-GHSA

HIGH
Zebra has Permanent Block Discovery Halt via Gossip Queue Saturation and Syncer Poisoning
GHSA-h9hm-m2xj-4rq9
pkg: zebrad
eco: rust
published: May 8, 2026
## Summary

A composite denial-of-service vulnerability in Zebra's block discovery pipeline allows an unauthenticated remote attacker to permanently halt all new block discovery on a targeted node. The attack exploits three independent weaknesses in the gossip, syncer, and download subsystems — al…

CVE-2026-44499
GitHub-GHSA

HIGH
n8n-mcp webhook and API client paths has an authenticated SSRF
GHSA-cmrh-wvq6-wm9r
pkg: n8n-mcp
eco: npm
published: May 8, 2026
### Summary

Authenticated Server-Side Request Forgery affecting the webhook trigger tools, the n8n API client (`N8N_API_URL`), and per-request URLs supplied via the `x-n8n-url` header in multi-tenant HTTP mode.

### Impact

A caller with access to the MCP session can drive HTTP requests from the n8…

CVE-2026-44694
GitHub-GHSA

HIGH
gmaps-mcp's unauthenticated HTTP transport allows unlimited Google Maps API calls at operator expense
GHSA-52cq-7v8r-62c6
pkg: gmaps-mcp
eco: pip
published: May 8, 2026
## Unauthenticated HTTP Transport Allows Unlimited Google Maps API Calls at Operator Expense

The `gmaps-mcp` codebase was reviewed at commit `e671db68c804c9e67d51582d3280839ffa65f127` and three issues worth flagging were discovered — one high-severity, one medium, one structural. There were no pr…

GitHub-GHSA

HIGH
fast-xml-builder allows attribute values with unwanted quotes to bypass malicious or unwanted attributes
GHSA-5wm8-gmm8-39j9
pkg: fast-xml-builder
eco: npm
published: May 8, 2026
# Summary
When an input data has quotes in attribute values but process entities is not enabled, it breaks the attribute value into multiple attributes. This gives the room for an attacker to insert unwanted attributes to the XML/HTML.

## Detail

Malicious Input
“`
{
a: {
"@_attr": '…

CVE-2026-44665
GitHub-GHSA

HIGH
mcp-ssh-tool has file transfer path policy bypass and bearer token comparison hardening
GHSA-j7h9-2jh7-g967
pkg: mcp-ssh-tool
eco: npm
published: May 7, 2026
## Summary

`mcp-ssh-tool` has released version `2.1.1` with security hardening for transfer path authorization and HTTP bearer authentication.

The release addresses:

– insufficient local path policy enforcement in transfer-related filesystem handling
– incomplete canonicalization and segment-boun…

GitHub-GHSA

HIGH
Note Mark: Arbitrary File Write via Path Traversal in Asset Names Leads to Remote Code Execution
GHSA-g49p-4qxj-88v3
pkg: github.com/enchant97/note-mark/backend
eco: go
published: May 7, 2026
### Description

The Note Mark application allows authenticated users to upload assets to notes via `POST /api/notes/{noteID}/assets`, where the asset filename is provided through the `X-Name` HTTP request header. This value is stored directly in the database without any sanitization or validation -…

CVE-2026-44522
GitHub-GHSA

HIGH
Cinny vulnerable to access token disclosure via invalidated emoji pack avatar URL in service worker
GHSA-j944-w549-3453
pkg: cinny
eco: npm
published: May 7, 2026
### Impact
A remote authenticated attacker who shares a room with a victim and has permissions to create room emotes (for example in a DM) can cause the victim's client to send their Matrix access token to an attacker-controlled server. This occurs when the victim opens the emoji or sticker picker f…
CVE-2026-42553
GitHub-GHSA

HIGH
hickory-proto: NSEC3 closest-encloser proof validation enters unbounded loop on cross-zone responses
GHSA-3v94-mw7p-v465
pkg: hickory-proto, hickory-net
eco: rust
published: May 7, 2026
The NSEC3 closest-encloser proof validation in `hickory-proto`'s (0.25.0-alpha.3 … 0.25.2) and `hickory-net`'s (0.26.0-alpha.1 .. 0.26.0) `DnssecDnsHandle` walks from the QNAME up to the SOA owner name, building a list of candidate encloser names. The iterator used assumes the QNAME is a descenda…
GitHub-GHSA

HIGH
Free5GC UDM has Improper Input Validation and Generation of Error Messages Containing Sensitive Information
GHSA-585v-hcgf-jhfr
pkg: github.com/free5gc/udm
eco: go
published: May 7, 2026
## Summary

The free5GC UDM component fails to validate the `supi` path parameter in six GET handlers of the `nudm-sdm` (Subscriber Data Management) service. An unauthenticated attacker can inject control characters into the SUPI parameter, causing UDM to forward a malformed request to UDR and retur…

CVE-2026-42459
GitHub-GHSA

HIGH
Aegra has cross-user run injection in /threads/{thread_id}/runs (IDOR)
GHSA-m98r-6667-4wq7
pkg: aegra-api
eco: pip
published: May 7, 2026
## Impact

Aegra deployments running 0.9.0 through 0.9.6 with multiple authenticated users on a shared instance are vulnerable to a cross-tenant IDOR. Any authenticated user (User A), given another user's `thread_id` (User B), can:

– Execute graph runs against User B's thread via `POST /threads/{th…

CVE-2026-44504
GitHub-GHSA

HIGH
Kiota abstractions RedirectHandler leaks Cookie/Proxy-Authorization headers on cross-host redirect
GHSA-7j59-v9qr-6fq9
pkg: com.microsoft.kiota:microsoft-kiota-abstractions, Microsoft.Kiota.Abstractions, microsoft-kiota-http
eco: npm
published: May 7, 2026
### Summary
The RedirectHandler middleware in microsoft/kiota-java (com.microsoft.kiota:microsoft-kiota-http-okHttp v1.9.0) and other Kiota libraries fails to strip sensitive HTTP headers when following 3xx redirects to a different host or scheme.

This vulnerability is present in the RedirectHandl…

CVE-2026-44503
GitHub-GHSA

HIGH
ldap3_proto has LDAP Filter stack exhaustion
GHSA-qcxq-75wr-5cm8
pkg: ldap3_proto
eco: rust
published: May 6, 2026
### Impact
LDAP queries are not validated for depth, which can cause the parser (both PEG and ASN) to exhaust the stack. This *may* cause a denial of service in applications that process queries.

### Workarounds
N/A

### Resources
Related to GHSA-r5fr-9gmv-jggh

GitHub-GHSA

HIGH
scim_proton and kanidm_proto have an authenticated process abort via SCIM filter stack exhaustion
GHSA-r5fr-9gmv-jggh
pkg: scim_proto, kanidm_proto
eco: rust
published: May 6, 2026
### Summary

A single unauthenticated `GET` to any `/scim/v1/…` endpoint with a `?filter=` query string of a few thousand nested parentheses (≈ 4–12 KB) drives the recursive-descent PEG parser past the worker thread's stack guard page. Rust responds to stack overflow with `std::process::abort(…

GitHub-GHSA

HIGH
Keras vulnerable to DoS via Malicious .keras Model (HDF5 Shape Bomb Causes Petabyte Allocation in KerasFileEditor)
GHSA-mgx6-5cf9-rr43
pkg: keras, keras
eco: pip
published: May 6, 2026
### Summary
Keras’s model loader (KerasFileEditor) unsafely loads user-supplied .keras model files containing HDF5-based weight files without performing any validation on HDF5 dataset metadata. An attacker can craft a .keras archive containing a valid model.weights.h5 file whose dataset declares a…
CVE-2026-0897
GitHub-GHSA

HIGH
Daptin fuzzy search injects unvalidated column name into raw SQL
GHSA-pwqg-q8pg-pp6r
pkg: github.com/daptin/daptin
eco: go
published: May 6, 2026
## Summary

`processFuzzySearch` in `server/resource/resource_findallpaginated.go:1484` splits the user-supplied `column` parameter by comma and interpolates each segment directly into `goqu.L(fmt.Sprintf("LOWER(%s) LIKE ?", prefix+col))` raw SQL with no column whitelist check. The entry point is `G…

CVE-2026-44349
GitHub-GHSA

HIGH
PraisonAI has an SSRF bypass
GHSA-q9pw-vmhh-384g
pkg: praisonaiagents
eco: pip
published: May 6, 2026
### Summary
The URL checking logic in PraisonAI has a logical flaw that could be bypassed by attackers, leading to SSRF attacks.

### Details
The current PraisonAI project uses _validate_url to validate the input URL. The main logic is to perform security checks on the host portion of the URL extrac…

CVE-2026-44335
GitHub-GHSA

HIGH
Mako vulnerable to path traversal via backslash URI on Windows in TemplateLookup
GHSA-2h4p-vjrc-8xpq
pkg: Mako
eco: pip
published: May 6, 2026
## Summary

On Windows, a URI using backslash traversal (e.g. `\..\..\ secret.txt`) bypasses the directory traversal check in `Template.__init__` and the `posixpath`-based normalization in `TemplateLookup.get_template()`, allowing reads of files outside the configured template directory.

## Detail…

CVE-2026-44307
GitHub-GHSA

HIGH
JupyterLab's command linker attributes in HTML enable one-click command execution from untrusted content
GHSA-mqcg-5×36-vfcg
pkg: jupyterlab, notebook
eco: pip
published: May 6, 2026
JupyterLab's HTML sanitizer allowlists `data-commandlinker-command` and `data-commandlinker-args` on `button` elements, while `CommandLinker` listens for all click events on `document.body` and executes the named command without checking whether the element came from trusted JupyterLab UI. A noteboo…
CVE-2026-42557
GitHub-GHSA

HIGH
Mezo: ERC-20 bridgeOut burn can be erased by a stale StateDB overwrite leading to full L1 bridge drain
GHSA-6447-269v-g68m
pkg: github.com/mezo-org/mezod
eco: go
published: May 6, 2026
**Note: the fixed version of the validator client has been deployed for some time.**

### Impact

Potential full drain of L1 bridge without changing bridged balance on Mezo.

## Brief/Intro

A malicious user can steal all ERC-20 tokens locked in the L1 bridge by repeatedly calling the `bridgeOut` pr…

GitHub-GHSA

HIGH
dssrf: every IPv6 category bypasses is_url_safe
GHSA-8p33-q827-ghj5
pkg: dssrf
eco: npm
published: May 6, 2026
A vulnerability in dssrf allows an attacker to bypass its SSRF protections by supplying one of the following IPv6 addresses, resulting in a successful SSRF. This contradicts dssrf documentation, which incorrectly claims that IPv6 is disabled entirely. See below:

“`rust
Input Category
http://[::1]/…

CVE-2026-44232
GitHub-GHSA

HIGH
QuantumNous/new-api has an SSRF Filter Bypass via 0.0.0.0
GHSA-v5c3-6wvc-pc2q
pkg: github.com/QuantumNous/new-api
eco: go
published: May 6, 2026
# SSRF Filter Bypass via `0.0.0.0`

### Summary

The SSRF protection introduced in v0.9.0.5 (CVE-2025-59146) and hardened in v0.9.6 (CVE-2025-62155) does not block the unspecified address `0.0.0.0`. A regular (non-admin) user holding any valid API token can send a multimodal request to `/v1/chat/co…

CVE-2026-42339
GitHub-GHSA

HIGH
Duplicate Advisory: Mistune has a ReDoS in LINK_TITLE_RE that allows denial of service via crafted Markdown input
GHSA-hjph-f4mc-wx4c
pkg: mistune
eco: pip
published: May 6, 2026
### Duplicate Advisory
This advisory has been withdrawn because it is a duplicate of GHSA-8mp2-v27r-99xp. This link is maintained to preserve external references.

### Original Description

### Summary
**Denial-of-Service (DoS)** vulnerability in the Mistune Markdown parser. The issue occurs when pr…

GitHub-GHSA

HIGH
Mistune has a ReDoS in LINK_TITLE_RE that allows denial of service via crafted Markdown input
GHSA-8mp2-v27r-99xp
pkg: mistune
eco: pip
published: May 6, 2026
### Summary

A ReDoS (Regular Expression Denial of Service) vulnerability in `LINK_TITLE_RE` allows an attacker who can supply Markdown for parsing to cause denial of service. A crafted 58-byte Markdown document blocks the parser for approximately 6 seconds (measured on Apple M2, Python 3.14.3), wit…

CVE-2026-33079
GitHub-GHSA

HIGH
jdbi3-freemarker Vulnerable to Improper Neutralization of Special Elements Used in FreeMarker Template Engine
GHSA-mggx-p7jf-jgw4
pkg: org.jdbi:jdbi3-freemarker
eco: maven
published: May 5, 2026
# Summary

**Description**

An Improper Neutralization of Special Elements Used in a Template Engine (CWE-1336) vulnerability in Jdbi allows arbitrary command execution when an application using `jdbi3-freemarker` permits attacker-influenced text to reach `FreemarkerEngine.parse()` as template sourc…

GitHub-GHSA

HIGH
authd: Primary group ID is incorrectly set to value of UID
GHSA-fg3j-5w9g-hmg7
pkg: github.com/canonical/authd
eco: go
published: May 5, 2026
authd 0.6.0 contains [a bug](https://github.com/canonical/authd/issues/1482) which can lead to an incorrect primary group ID.

It affects users whose primary group ID (i.e. the GID in the user record) differs from their UID. There are two ways which can lead to this:

1. The user was created with au…

CVE-2026-6970
GitHub-GHSA

HIGH
rust-openssl has undefined behavior in X509Ref::ocsp_responders for certificates with non-UTF-8 OCSP URLs
GHSA-xp3w-r5p5-63rr
pkg: openssl
eco: rust
published: May 5, 2026
`X509Ref::ocsp_responders` returns OCSP responder URLs from a certificate's AIA extension as `OpensslString`, whose `Deref<Target = str>` wraps the raw bytes with `str::from_utf8_unchecked`. OpenSSL does not enforce that the underlying IA5String is ASCII, so a certificate with non-UTF-8 bytes in its…
CVE-2026-42327
GitHub-GHSA

HIGH
RustFS: ListServiceAccount authorizes against wrong admin action, enabling cross-user enumeration and root service account takeover
GHSA-mm2q-qcmx-gw4w
pkg: rustfs
eco: rust
published: May 5, 2026
## Summary

`ListServiceAccount` (`GET /rustfs/admin/v3/list-service-accounts?user=<other>`) authorizes cross-user requests against `UpdateServiceAccountAdminAction` instead of `ListServiceAccountsAdminAction` at `rustfs/src/admin/handlers/service_account.rs:936`. The handler accepts the **wrong** a…

GitHub-GHSA

HIGH
link-preview-js vulnerable to IPv6 and internal loopback attacks
GHSA-4gp8-rjrq-ch6q
pkg: link-preview-js
eco: npm
published: May 5, 2026
### Impact
The library did not check for IPv6 loopback attacks. There was also a DNS attack, where an address could be resolved into an internal IP. This could cause internal data leaks.

### Patches
Problem has been patched in version 4.0.1. However, it cannot be completely solved by the package al…

CVE-2026-43897
GitHub-GHSA

HIGH
gix and gitoxide: unvalidated submodule name traverses out of .git/modules and redirects state() / open() to another repository
GHSA-fr8x-3vfx-f45h
pkg: gitoxide, gix
eco: rust
published: May 5, 2026
## **Summary**
attachments:
[pocs.zip](https://github.com/user-attachments/files/26431422/pocs.zip)

Submodule names coming from `.gitmodules` are exposed as unvalidated names and are later reused to derive the submodule git directory as:

“`
<superproject common_dir>/modules/<submodule name>
“`

GitHub-GHSA

HIGH
gix and gitoxide's symlinked .gitmodules are followed and parsed from outside of the repository
GHSA-pg4w-g64p-qwhj
pkg: gitoxide, gix
eco: rust
published: May 5, 2026
## Summary
attachments:
[pocs.zip](https://github.com/user-attachments/files/26431422/pocs.zip)

When `Repository::submodules()` loads submodule metadata, it prefers the worktree `.gitmodules` file if that path exists. In the current implementation, the path is read with `std::fs::read()`, which fo…

GitHub-GHSA

HIGH
gix-pack has multiple DoS vectors: unchecked indexing panics and uncapped OOM allocations from crafted pack data
GHSA-x494-mj8g-cj27
pkg: gix-pack
eco: rust
published: May 5, 2026
### Summary

Multiple denial-of-service vectors in `gix-pack`: unchecked array indexing causes panics on crafted delta data, and uncapped attacker-controlled size headers enable OOM process kills. Both are triggered by malicious pack data received during clone/fetch.

### Details

**Bug 1: Unchecked…

GitHub-GHSA

HIGH
gix's submodule name validation bypass + trust inheritance flaw enables path traversal and credential disclosure
GHSA-p3hw-mv63-rf9w
pkg: gix, gix-validate
eco: rust
published: May 5, 2026
### Summary

Submodule name validation bypass plus missing validation in production code paths allows path traversal via crafted `.gitmodules`. Combined with a trust inheritance flaw in `Submodule::open()`, this enables reading arbitrary git repository configs (including credentials) from traversed …

GitHub-GHSA

HIGH
Diesel's SQLite backend has possible UTF-8 corruption
GHSA-h5x4-m2qf-r4f2
pkg: diesel
eco: rust
published: May 5, 2026
Diesel uses the `sqlite3_value_text` function to receive strings from SQLite while deserializing query results. We misinterpreted the corresponding [SQLite](https://sqlite.org/c3ref/value_blob.html) documentation that this function always returns a UTF-8 encoded string values as `*const c_char`. Bas…
GitHub-GHSA

HIGH
Network-AI missing authentication on MCP HTTP endpoint, which allows unauthenticated privileged tool calls
GHSA-fj4g-2p96-q6m3
pkg: network-ai
eco: npm
published: May 5, 2026
# Security Advisory: Missing Authentication for Critical Function in `Jovancoding/Network-AI`

| Field | Value |
|—|—|
| Project | `Jovancoding/Network-AI` |
| Repository | https://github.com/Jovancoding/Network-AI |
| Affected commit | `c344f2053eb0d49395988f803bf92f2a86b2a0d0` |
| Affected tes…

CVE-2026-42856
GitHub-GHSA

HIGH
net-imap vulnerable to STARTTLS stripping via invalid response timing
GHSA-vcgp-9326-pqcp
pkg: net-imap, net-imap, net-imap
eco: rubygems
published: May 4, 2026
### Summary

A man-in-the-middle attacker can cause `Net::IMAP#starttls` to return "successfully", without starting TLS.

### Details

When using `Net::IMAP#starttls` to upgrade a plaintext connection to use TLS, a man-in-the-middle attacker can inject a tagged `OK` response with an easily predictab…

CVE-2026-42246
GitHub-GHSA

MEDIUM
Axios: unbounded recursion in toFormData causes DoS via deeply nested request data
GHSA-62hf-57xw-28j9
pkg: axios, axios
eco: npm
published: May 5, 2026
### Summary
toFormData recursively walks nested objects with no depth limit, so a deeply nested value passed as request data crashes the Node.js process with a RangeError.

### Details
lib/helpers/toFormData.js:210 defines an inner `build(value, path)` that recurses into every object/array child (li…

CVE-2026-42039
GitHub-GHSA

MEDIUM
Volcano's webhook server vulnerable to OOM due to unbounded HTTP request body size
GHSA-8wxp-xxp2-rcgx
pkg: volcano.sh/volcano, volcano.sh/volcano, volcano.sh/volcano
eco: go
published: May 8, 2026
### Impact
The Volcano webhook server does not enforce a size limit on incoming HTTP request bodies. Any in-cluster pod that can reach the webhook endpoint may send an arbitrarily large request body, potentially causing the webhook server to be killed by OOM. All Volcano deployments with the webhook…
CVE-2026-44247
NVD

MEDIUM
CVE-2026-42194
CVE-2026-42194
pkg: curl

published: May 7, 2026

Admidio is an open-source user management solution. Prior to version 5.0.9, the incomplete SSRF fix in Admidio's fetch_metadata.php validates the resolved IP address but passes the original hostname-based URL to curl_init(), leaving a DNS rebinding TOCTOU window that allows redirecting requests to i…
CWE: CWE-918
GitHub-GHSA

MEDIUM
Netty Redis Codec Encoder has a CRLF Injection Issue
GHSA-rgrr-p7gp-5xj7
pkg: io.netty:netty-codec-redis, io.netty:netty-codec-redis
eco: maven
published: May 7, 2026
# Security Vulnerability Report: CRLF Injection in Netty Redis Codec Encoder

## 1. Vulnerability Summary

| Field | Value |
|——-|——-|
| **Product** | Netty |
| **Version** | 4.2.12.Final (and all prior versions with codec-redis) |
| **Component** | `io.netty.handler.codec.redis.RedisEncoder…

CVE-2026-42586
GitHub-GHSA

MEDIUM
Lemur: LDAP Authentication Globally Disables TLS Certificate Verification When LDAP_USE_TLS Is Enabled
GHSA-vr7c-r5gj-j3w5
pkg: lemur
eco: pip
published: May 6, 2026
## Description

### Overview

When LDAP TLS is enabled (`LDAP_USE_TLS = True`), Lemur's LDAP authentication module unconditionally disables TLS certificate verification at the **global** `ldap` module level. This allows a man-in-the-middle attacker positioned between Lemur and the LDAP server to int…

CVE-2026-44305
GitHub-GHSA

MEDIUM
wireshark-mcp vulnerable to arbitrary file write via export_objects when WIRESHARK_MCP_ALLOWED_DIRS is not configured
GHSA-3r68-x3xc-rxpg
pkg: wireshark-mcp
eco: pip
published: May 5, 2026
## Description

### Impact

`wireshark-mcp` exposes a `wireshark_export_objects` MCP tool that accepts an attacker-controlled `dest_dir` parameter and passes it to tshark's `–export-objects` flag with **no mandatory path restriction**.

The path sandbox (`_allowed_dirs`) is `None` by default and on…

CVE-2026-43901
GitHub-GHSA

MEDIUM
gix-transport: HTTP credentials leaked to redirected host in curl backend
GHSA-9857-6mw7-fq2m
pkg: gix-transport
eco: rust
published: May 5, 2026
## Summary

The curl-based HTTP transport in `gix-transport` sends user credentials (passwords, tokens) to an attacker-controlled server after an HTTP redirect. When a server responds with a 302 redirect during the initial `GET /info/refs`, gitoxide records the redirected base URL and rewrites all s…

GitHub-GHSA

MEDIUM
Axios: no_proxy bypass via IP alias allows SSRF
GHSA-m7pr-hjqh-92cm
pkg: axios, axios
eco: npm
published: May 5, 2026
The fix for no_proxy hostname normalization bypass (#10661) is incomplete.When no_proxy=localhost is set, requests to 127.0.0.1 and [::1] still route through the proxy instead of bypassing it.

The shouldBypassProxy() function does pure string matching — it does not
resolve IP aliases or loopback…

CVE-2026-42038
GitHub-GHSA

MEDIUM
view_component: Preview Route Can Dispatch Inherited Helper Methods
GHSA-7f3r-gwc9-2995
pkg: view_component
eco: rubygems
published: May 8, 2026
### Summary

The preview route derives an example name from the URL and calls it with `public_send`. The code does not verify that the requested method is one of the preview examples explicitly defined by the preview class.

As a result, inherited public methods on `ViewComponent::Preview` are route…

CVE-2026-44836
GitHub-GHSA

MEDIUM
free5GC's UDR nudr-dr DELETE amf-subscriptions panics on missing UE state via nil interface type assertion (single authenticated request)
GHSA-jqfc-gwj5-3w63
pkg: github.com/free5gc/udr
eco: go
published: May 8, 2026
### Summary
free5GC's UDR `nudr-dr` `DELETE /subscription-data/{ueId}/{servingPlmnId}/ee-subscriptions/{subsId}/amf-subscriptions` handler panics on a single authenticated request against a fresh UDR instance when the supplied `ueId` does not exist in `UESubsCollection`. The processor checks `value,…
CVE-2026-44324
GitHub-GHSA

MEDIUM
free5GC's BSF concurrent PUT /nbsf-management/v1/subscriptions/{subId} crashes the BSF process via concurrent map read/write on Subscriptions
GHSA-27ph-8q4f-h7m7
pkg: github.com/free5gc/bsf
eco: go
published: May 8, 2026
### Summary
free5GC's BSF `PUT /nbsf-management/v1/subscriptions/{subId}` handler has an unsynchronized write on the global `Subscriptions` map. The handler first reads the map under `RLock()` via `BSFContext.GetSubscription(subId)`, but if the subscription does not exist, `ReplaceIndividualSubcript…
CVE-2026-44318
GitHub-GHSA

MEDIUM
free5GC's PCF npcf-policyauthorization POST /app-sessions panics on suppFeat=1 with missing AfRoutReq via nil pointer dereference
GHSA-wwqh-7jm5-gj7w
pkg: github.com/free5gc/pcf
eco: go
published: May 8, 2026
### Summary
free5GC's PCF `POST /npcf-policyauthorization/v1/app-sessions` handler panics on a single authenticated request whose `ascReqData.suppFeat == "1"` (enabling traffic-routing feature negotiation) and whose `medComponents` entries supply an `afAppId` but NO `AfRoutReq`. The create path then…
CVE-2026-44317
GitHub-GHSA

MEDIUM
OpenTelemetry.Exporter.Instana bypasses TLS certificate validation when a proxy is configured
GHSA-wfr5-454p-mjc2
pkg: OpenTelemetry.Exporter.Instana
eco: nuget
published: May 8, 2026
### Summary

The `OpenTelemetry.Exporter.Instana` NuGet package does not validate HTTPS/TLS certificates are valid when sending telemetry to a configured Instana back-end when a proxy is configured using the `INSTANA_ENDPOINT_PROXY` environment variable.

If a network attacker can Man-in-the-Middle …

CVE-2026-44213
GitHub-GHSA

MEDIUM
Wagtail has improper permission handling when copying pages
GHSA-67rv-mg8q-5pf3
pkg: wagtail, wagtail
eco: pip
published: May 8, 2026
### Impact

A CMS user with limited access to pages could copy a page they don't have access to to an area of the site they do. Once copied, they'd be able to view its contents, and potentially publish it. Permissions were correctly checked for the copy destination, but not for the source page.

###…

CVE-2026-44200
GitHub-GHSA

MEDIUM
Wagtail has improper permission handling when deleting form submissions
GHSA-pwm3-7fv4-g6xx
pkg: wagtail, wagtail
eco: pip
published: May 8, 2026
### Impact

A CMS user with limited access to form pages could delete submissions to form pages they don't have access to by crafting a form submission to delete submissions on a page they do have access to for submissions they don't.

The vulnerability is not exploitable by an ordinary site visito…

CVE-2026-44199
GitHub-GHSA

MEDIUM
Wagtail has improper permission handling when comparing revisions
GHSA-c6wj-9vcj-75pj
pkg: wagtail, wagtail
eco: pip
published: May 8, 2026
### Impact

A CMS user without the ability to edit a page could access revisions of the page through the revision compare view if they knew the primary key of two revisions. This could potentially result in disclosure of sensitive information.

### Patches

Patched versions have been released as Wag…

CVE-2026-44197
GitHub-GHSA

MEDIUM
Open WebUI has Unauthorized File and Knowledge Base Content Access via RAG Vector Search
GHSA-h36f-rqpx-j5wx
pkg: open-webui
eco: pip
published: May 8, 2026
# Unauthorized File and Knowledge Base Content Access via RAG Vector Search

## Affected Component

RAG source resolution in chat completion pipeline:
– `backend/open_webui/retrieval/utils.py` (lines 963-965, 1063-1068, 1126-1131 in `get_sources_from_items`)

## Affected Versions

Current main branc…

CVE-2026-44560
GitHub-GHSA

MEDIUM
Open WebUI's Model Import Overwrites Any Model Without Ownership Check
GHSA-mqq6-cqcx-38vg
pkg: open-webui
eco: pip
published: May 8, 2026
# Model Import Overwrites Any Model Without Ownership Check

## Affected Component

Model import endpoint:
– `backend/open_webui/routers/models.py` (lines 254-308, `import_models`)

## Affected Versions

Current main branch (commit `6fdd19bf1`) and likely all versions with model import functionality…

CVE-2026-44562
GitHub-GHSA

MEDIUM
Electerm's full process.env exposed to renderer via window.pre.env
GHSA-37j4-88rp-2f6h
pkg: electerm
eco: npm
published: May 8, 2026
### Impact

The `getConstants()` IPC handler in `src/app/lib/ipc-sync.js` serialises the entire `process.env` object and sends it to the renderer. The data is stored as `window.pre.env` and is accessible from any JavaScript running in the renderer (e.g., via the DevTools console or a compromised web…

CVE-2026-43942
NVD

MEDIUM
CVE-2026-41585
CVE-2026-41585
pkg: zfnd zebra-rpc, zfnd zebrad

published: May 8, 2026

ZEBRA is a Zcash node written entirely in Rust. From zebrad versions 2.2.0 to before 4.3.1 and from zebra-rpc versions 1.0.0-beta.45 to before 6.0.2, a vulnerability in Zebra's JSON-RPC HTTP middleware allows an authenticated RPC client to cause a Zebra node to crash by disconnecting before the requ…
CWE: CWE-248, CWE-617
GitHub-GHSA

MEDIUM
Ech0 allows PUT /api/echo/like/:id unauthenticated: anonymous callers to modify any echo's fav_count
GHSA-pj6q-4vq4-r8cg
pkg: github.com/lin-snow/Ech0
eco: go
published: May 7, 2026
## Summary

`PUT /api/echo/like/:id` at `internal/router/echo.go:12` is registered on `PublicRouterGroup` with no authentication and no rate limit. Anonymous callers increment the `fav_count` counter on any echo (including private echoes) by UUID, repeat the request without deduplication, and trigge…

NVD

MEDIUM
CVE-2026-33589
CVE-2026-33589
pkg: lfnovo open-notebook

published: May 7, 2026

Lack of user input validation in the file upload functionality of Open Notebook v1.8.3 allows the application user to access local files content from the docker container via path traversal.
CWE: CWE-20
GitHub-GHSA

MEDIUM
vm2 Host Promise Resolution Preserves Object Identity Across Sandbox Boundary
GHSA-mpf8-4hx2-7cjg
pkg: vm2
eco: npm
published: May 7, 2026
### Summary

A sandbox boundary violation in **vm2** allows host object identity to cross into the sandbox through host Promise resolution.

When a host-side Promise that resolves to a host object is exposed to the sandbox, the value delivered to the sandbox `.then()` callback preserves host identit…

CVE-2026-44000
GitHub-GHSA

MEDIUM
ShellHub has cross-tenant IDOR in `GET /api/namespaces/:tenant` via API Key bypasses membership check
GHSA-vwx9-7qcf-gg7f
pkg: github.com/shellhub-io/shellhub
eco: go
published: May 7, 2026
## Summary
`GET /api/namespaces/:tenant` returns the full namespace object — including the members list (user IDs, e-mails, roles), settings, and device counts — to any caller authenticated by an **API Key**, for any tenant, regardless of the API Key's own tenant scope.

The handler conditionall…

CVE-2026-44426
GitHub-GHSA

MEDIUM
Daptin's Session Management Vulnerability Leads to Insufficient Session Expiration After Password Change
GHSA-258c-965c-p3hc
pkg: github.com/daptin/daptin
eco: go
published: May 7, 2026
### Summary

A session invalidation vulnerability exists in daptin's authentication system where JSON Web Tokens (JWTs) remain fully valid after a user changes their password. The JWT validation middleware (`CheckJWT`) only verifies token signature, expiry, issuer, and signing algorithm — it does …

GitHub-GHSA

MEDIUM
Kubetail has a Cross-Site WebSocket Hijacking issue that allows attacker to read Kubernetes logs from authenticated users
GHSA-v8j7-hp7c-738f
pkg: github.com/kubetail-org/kubetail/modules/dashboard, github.com/kubetail-org/kubetail/modules/cli
eco: go
published: May 7, 2026
### Summary

Kubetail's dashboard exposes WebSocket endpoints that did not adequately validate the Origin header on connection upgrade. A malicious web page visited by a user with an active Kubetail session could open a WebSocket to the user's dashboard and read their Kubernetes logs in real time. T…

CVE-2026-44514
GitHub-GHSA

MEDIUM
Netty vulnerable to HTTP Request Smuggling due to malformed Transfer-Encoding
GHSA-38f8-5428-x5cv
pkg: io.netty:netty-codec-http, io.netty:netty-codec-http
eco: maven
published: May 7, 2026
### Summary
Netty incorrectly parses malformed Transfer-Encoding, enabling request smuggling attacks.

### Details
Netty incorrectly marks a request as chunked when malformed "Transfer-Encoding: chunked, identity" is present.
According to RFC https://datatracker.ietf.org/doc/html/rfc9112#name-messag…

CVE-2026-42585
GitHub-GHSA

MEDIUM
Netty vulnerable to HTTP Request Smuggling due to incorrect chunk size parsing
GHSA-m4cv-j2px-7723
pkg: io.netty:netty-codec-http, io.netty:netty-codec-http
eco: maven
published: May 7, 2026
### Summary
Netty's chunk size parser silently overflows int, enabling request smuggling attacks.

### Details
io.netty.handler.codec.http.HttpObjectDecoder#getChunkSize silently overflows int.

The size is accumulated as follows:

result *= 16;
result += digit;

The result is checked only for negat…

CVE-2026-42580
GitHub-GHSA

MEDIUM
Hono: bodyLimit() can be bypassed for chunked / unknown-length requests
GHSA-9vqf-7f2p-gf9v
pkg: hono
eco: npm
published: May 6, 2026
## Summary

`bodyLimit()` does not reliably enforce `maxSize` for requests without a usable `Content-Length` (e.g. `Transfer-Encoding: chunked`). Oversized requests can reach handlers and return `200` instead of `413`.

## Details

For chunked / unknown-length requests, `bodyLimit()` wraps the body …

CVE-2026-44456
GitHub-GHSA

MEDIUM
ShellHub has cross-tenant IDOR in `GET /api/sessions/:uid` that discloses SSH session data
GHSA-9w9c-9w8m-w89q
pkg: github.com/shellhub-io/shellhub
eco: go
published: May 6, 2026
## Summary
`GET /api/sessions/:uid` returns the full session object for any authenticated caller, without scoping by the caller's tenant. An authenticated user can read session records (SSH username, device UID, remote IP, terminal type, authenticated flag, timestamps) belonging to any other namespa…
CVE-2026-44423
GitHub-GHSA

MEDIUM
ShellHub has cross-tenant IDOR in `GET /api/devices/:uid` that discloses device data of any namespace
GHSA-j72x-xfwg-783f
pkg: github.com/shellhub-io/shellhub
eco: go
published: May 6, 2026
## Summary
`GET /api/devices/:uid` returns the full device object whenever the caller is authenticated, without verifying that the device belongs to the caller's namespace (tenant). Any authenticated user (JWT or API Key) who knows or can guess a device UID can read device metadata from any other na…
CVE-2026-44424
GitHub-GHSA

MEDIUM
vLLM: extract_hidden_states speculative decoding crashes server on any request with penalty parameters
GHSA-83vm-p52w-f9pw
pkg: vllm
eco: pip
published: May 6, 2026
### Summary

The `extract_hidden_states` speculative decoding proposer in vLLM returns a tensor with an incorrect shape after the first decode step, causing a `RuntimeError` that crashes the EngineCore process. The crash is triggered when any request in the batch uses sampling penalty parameters (`r…

CVE-2026-44223
NVD

MEDIUM
CVE-2026-40197
CVE-2026-40197
pkg: linuxcontainers incus

published: May 6, 2026

Incus is a system container and virtual machine manager. In versions before 7.0.0, missing validation logic in the storage volume import logic allows an authenticated user with access to the storage volume feature to cause the Incus daemon to crash. The custom volume backup import subsystem contains…
CWE: CWE-476
GitHub-GHSA

MEDIUM
Nginx-UI Settings API Exposes Protected Secrets
GHSA-q4w7-56hr-83rm
pkg: github.com/0xJacky/nginx-ui
eco: go
published: May 6, 2026
### Summary
The `GetSettings` API handler (`api/settings/settings.go:24-65`) serializes all settings structs to JSON and returns them to authenticated users. Many sensitive fields are tagged with `protected:"true"` – however, this tag is only enforced during writes (via `ProtectedFill` in `SaveSetti…
CVE-2026-42223
GitHub-GHSA

MEDIUM
vLLM Vulnerable to Remote DoS via Special-Token Placeholders
GHSA-hpv8-x276-m59f
pkg: vllm
eco: pip
published: May 5, 2026
## Summary
This report explains a Token Injection vulnerability in vLLM’s multimodal processing. Unauthenticated, text-only prompts that spell special tokens are interpreted as control. Image and video placeholder sequences supplied without matching data cause vLLM to index into empty grids during…
CVE-2026-44222
GitHub-GHSA

MEDIUM
PyLoad Vulnerable to Path Traversal via Package Folder Name
GHSA-97r3-5w84-r4q8
pkg: pyload-ng
eco: pip
published: May 5, 2026
Insufficient sanitization of package folder names allows writing files outside the intended download directory.

## Affected Component
– `src/pyload/core/api/__init__.py`
– Function: `add_package()`

## Description
Package folder names are sanitized using insufficient string replacement:

“`python

CVE-2026-42314
GitHub-GHSA

MEDIUM
Nginx-UI: Authenticated settings disclosure exposes node.secret and enables trusted-node authentication abuse, backup exfiltration, and restore-based nginx-ui state rollback
GHSA-7jrr-xw9c-mj39
pkg: github.com/0xJacky/Nginx-UI
eco: go
published: May 5, 2026
## Summary
An authenticated user can call `GET /api/settings` and retrieve sensitive configuration values, including `node.secret`. The same `node.secret` is accepted by `AuthRequired()` through the `X-Node-Secret` header (or `node_secret` query parameter), causing the request to be treated as authe…
CVE-2026-42220
NVD

MEDIUM
CVE-2026-32603
CVE-2026-32603
pkg: sandboxie-plus sandboxie

published: May 5, 2026

Sandboxie is an open source sandbox-based isolation software for Windows. In versions 1.17.2 and earlier, a local denial of service vulnerability exists in the Sandboxie kernel driver. An unprivileged process running inside a Standard Sandbox can send a malformed IOCTL to the \Device\SandboxieDriver…
CWE: CWE-20
GitHub-GHSA

MEDIUM
requests-hardened is Vulnerable to Server-Side Request Forgery
GHSA-vh75-fwv3-pqrh
pkg: requests-hardened
eco: pip
published: May 5, 2026
The SSRF protection in `requests-hardened` prior to version 1.2.1 fails to block IP addresses within the RFC 6598 Shared Address Space (`100.64.0.0/10`). An attacker who can supply arbitrary URLs to `requests-hardened` could exploit this gap to access internal services hosted within `100.64.0.0/10`.…
CVE-2026-42175
NVD

MEDIUM
CVE-2026-30246
CVE-2026-30246
pkg: go

published: May 5, 2026

Fiber is a web framework for Go. In github.com/gofiber/fiber/v3 versions through 3.1.0, the default key generator in the cache middleware uses only the request path and does not include the query string. As a result, requests for the same path with different query parameters can share a cache key an…
CWE: CWE-436
GitHub-GHSA

MEDIUM
OpenClaw contains a symlink traversal vulnerability
GHSA-35mw-5vvr-vrxc
pkg: openclaw
eco: npm
published: May 5, 2026
OpenClaw versions 2026.3.22 before 2026.4.5 contain a symlink traversal vulnerability in remote marketplace repository path handling that allows attackers to escape the expected repository root. Attackers can exploit this by providing crafted symlink paths to access files outside the intended reposi…
CVE-2026-43570
GitHub-GHSA

MEDIUM
Axios: Invisible JSON Response Tampering via Prototype Pollution Gadget in `parseReviver`
GHSA-3w6x-2g7m-8v23
pkg: axios
eco: npm
published: May 5, 2026
# Vulnerability Disclosure: Invisible JSON Response Tampering via Prototype Pollution Gadget in `parseReviver`

## Summary

The Axios library is vulnerable to a Prototype Pollution "Gadget" attack that allows any `Object.prototype` pollution in the application's dependency tree to be escalated into …

CVE-2026-42044
NVD

MEDIUM
CVE-2026-42223
CVE-2026-42223
pkg: nginxui nginx_ui

published: May 4, 2026

Nginx UI is a web user interface for the Nginx web server. Prior to version 2.3.8, the GetSettings API handler (api/settings/settings.go:24-65) serializes all settings structs to JSON and returns them to authenticated users. Many sensitive fields are tagged with protected:"true" – however, this tag …
CWE: CWE-200
NVD

MEDIUM
CVE-2026-42220
CVE-2026-42220
pkg: nginxui nginx_ui

published: May 4, 2026

Nginx UI is a web user interface for the Nginx web server. Prior to version 2.3.8, an authenticated user can call GET /api/settings and retrieve sensitive configuration values, including node.secret. The same node.secret is accepted by AuthRequired() through the X-Node-Secret header (or node_secret …
CWE: CWE-200, CWE-863
NVD

MEDIUM
CVE-2026-42228
CVE-2026-42228
pkg: n8n n8n

published: May 4, 2026

n8n is an open source workflow automation platform. Prior to versions 1.123.32, 2.17.4, and 2.18.1, the /chat WebSocket endpoint used by the Chat Trigger node's Hosted Chat feature did not verify that an incoming connection was authorized to interact with the target execution. An unauthenticated rem…
CWE: CWE-862
NVD

MEDIUM
CVE-2026-42092
CVE-2026-42092
pkg: go

published: May 4, 2026

titra is an open source time tracking project. In version 0.99.52, the globalsettings Meteor publication returns all global settings without any admin or role check. Any authenticated user can subscribe via DDP and receive sensitive configuration fields such as google_secret, openai_apikey, and goog…
CWE: CWE-200
NVD

MEDIUM
CVE-2026-42091
CVE-2026-42091
pkg: go

published: May 4, 2026

goshs is a SimpleHTTPServer written in Go. Prior to version 2.0.2, the PUT upload handler (httpserver/updown.go) lacks the CSRF token validation that was added to the POST upload handler during the CVE-2026-40883 fix. Combined with the unconditional Access-Control-Allow-Origin: * on the OPTIONS pref…
CWE: CWE-352
GitHub-GHSA

MEDIUM
kube-router: GoBGP gRPC Admin Port Exposed on Node Primary IP Without Authentication, Allowing Cluster-Wide BGP Route Injection
GHSA-v5mh-h5hx-7v92
pkg: github.com/cloudnativelabs/kube-router
eco: go
published: May 6, 2026
## Summary

When the kube-router routing controller starts (`–run-router`), it binds the GoBGP gRPC management server to the node's primary IP (e.g., `192.168.1.10:50051`) in addition to `127.0.0.1:50051`. The default admin port is `50051` and the server is enabled by default with no TLS and no aut…

GitHub-GHSA

MEDIUM
go-ipld-prime's DAG-CBOR and DAG-JSON decoders have unbounded recursion depth
GHSA-w239-58×2-q8p5
pkg: github.com/ipld/go-ipld-prime
eco: go
published: May 7, 2026
The DAG-CBOR and DAG-JSON decoders recurse on each nested map or list without a depth limit. A payload containing deeply nested collections causes the decoder to recurse once per level, growing the goroutine stack until the Go runtime terminates the process with a fatal stack overflow (distinct from…
CVE-2026-42328
GitHub-GHSA

MEDIUM
@evomap/evolver has an unbounded request body in proxy /asset/submit that causes persistent disk-exhaustion DoS
GHSA-7xp7-m392-h92c
pkg: @evomap/evolver
eco: npm
published: May 5, 2026
## Summary

The EvoMap proxy daemon's HTTP body parser accepts requests of any size, and the `POST /asset/submit` route persists the full request body — verbatim and uncapped — as a JSONL line in `<dataDir>/messages.jsonl`. An unauthenticated local attacker (other local user, container neighbor,…

GitHub-GHSA

MEDIUM
LobeHub has a Cross-Site Scripting issue that escalates to Remote Code Execution
GHSA-xq4x-622m-q8fq
pkg: @lobehub/lobehub
eco: npm
published: May 5, 2026
### Summary
The vulnerability was automatically discovered by an ai agent and then manually verified.

LobeChat's message rendering mechanism has a stored cross-site scripting (XSS) vulnerability. Combined with the Electron main process's exposed insecure IPC interface, attackers can construct malic…

CVE-2026-42045
GitHub-GHSA

MEDIUM
Mistune Heading ID Attribute has Injection XSS
GHSA-v87v-83h2-53w7
pkg: mistune
eco: pip
published: May 9, 2026
## Summary
`HTMLRenderer.heading()` builds the opening `<hN>` tag by string-concatenating the `id` attribute value directly into the HTML — with no call to `escape()`, `safe_entity()`, or any other sanitisation function. A double-quote character `"` in the `id` value terminates the attribute, allo…
CVE-2026-44897
GitHub-GHSA

MEDIUM
Mistune Math Plugin has an XSS Escape Bypass
GHSA-8g87-j6q8-g93x
pkg: mistune
eco: pip
published: May 8, 2026
## Summary
The mistune math plugin renders inline math (`$…$`) and block math (`$$…$$`) by concatenating the raw user-supplied content directly into the HTML output **without any HTML escaping**. This occurs even when the parser is explicitly created with `escape=True`, which is supposed to guar…
CVE-2026-44708
GitHub-GHSA

MEDIUM
fast-xml-builder Comment Value regex can be bypassed
GHSA-45c6-75p6-83cc
pkg: fast-xml-builder
eco: npm
published: May 8, 2026
# Summary
The fix for https://github.com/advisories/GHSA-gh4j-gqv2-49f6 in fast-xml-parser sanitizes `–` sequences in XML comment content using .replace(/–/g, '- -'). This skip the values containing three consecutive dashes (e.g., —>…), allowing an attacker to break out of an XML comment and i…
CVE-2026-44664
GitHub-GHSA

MEDIUM
Devise has an Open Redirect via Unvalidated `request.referrer` in Timeoutable Session Timeout Handler
GHSA-jp94-3292-c3xv
pkg: devise
eco: rubygems
published: May 8, 2026
## Summary

When the `Timeoutable` module is enabled in Devise, the `FailureApp#redirect_url` method returns `request.referrer` — the HTTP `Referer` header, which is attacker-controllable — without validation for any non-GET request that results in a session timeout. An attacker who hosts a page…

CVE-2026-40295
GitHub-GHSA

MEDIUM
Free5GC AMF Bypasses UE Security Capabilities on NGAP PathSwitchRequest
GHSA-77×9-rf64-92gv
pkg: github.com/free5gc/amf
eco: go
published: May 7, 2026
### Summary
The AMF in Free5GC v4.2.1 does not verify the UE Security Capabilities received in NGAP PathSwitchRequest messages against its locally stored values, as mandated by 3GPP TS 33.501 §6.7.3.1. A malicious gNB can overwrite the AMF's stored UE security capabilities with arbitrary values, wh…
CVE-2026-42081
GitHub-GHSA

MEDIUM
Kanidm: Stored HTML injection in "passkey-enrolment" partial via displayname → htmx-driven authenticated request forgery
GHSA-gpxg-fx2g-qxj2
pkg: kanidm
eco: rust
published: May 6, 2026
### Summary

The kanidmd web UI renders the WebAuthn passkey-registration challenge as raw JSON inside an inline `<script id="data">` element using the Askama `|safe` filter. The challenge embeds the account's `displayname`, which `serde_json` serialises without escaping `<`/`>`. A `displayname` con…

GitHub-GHSA

MEDIUM
Kyverno policy-reporter-ui has XSS via Stored Property Values in PropertyCard Component
GHSA-q98m-7w8c-w388
pkg: github.com/kyverno/policy-reporter-ui
eco: go
published: May 6, 2026
### Summary
Vue 3's v-html directive is the framework-documented mechanism for injecting raw HTML, and it intentionally disables the auto-escaping that {{ }} interpolation provides. The PropertyCard.vue component uses v-html for the else branch of the URL check, meaning any non-URL string value flow…
CVE-2026-44245
NVD

MEDIUM
CVE-2026-42230
CVE-2026-42230
pkg: n8n n8n

published: May 4, 2026

n8n is an open source workflow automation platform. Prior to versions 1.123.32, 2.17.4, and 2.18.1, the /mcp-oauth/register endpoint accepted OAuth client registrations without authentication, allowing arbitrary redirect_uri values to be registered. When a user denies the MCP OAuth consent dialog, t…
CWE: CWE-601
GitHub-GHSA

MEDIUM
OpenClaw's Webhooks SecretRef route secret remains valid after rotation/reload
GHSA-q8ff-7ffm-m3r9
pkg: openclaw
eco: npm
published: May 5, 2026
## Summary

OpenClaw webhooks allowed route secrets to be backed by `SecretRef` values, but cached the resolved secret for a route. After an operator rotated the underlying secret and ran `openclaw secrets reload`, the previous resolved webhook secret could remain valid until the plugin or gateway r…

GitHub-GHSA

MEDIUM
SharpCompress has directory traversal via directory entries in WriteToDirectory (zip slip variant)
GHSA-6c8g-7p36-r338
pkg: SharpCompress
eco: nuget
published: May 8, 2026
### Summary

A path traversal vulnerability in `IArchive.WriteToDirectory()` allows a malicious archive to create directories outside the intended extraction root. For TAR archives, this can be escalated to arbitrary file writes by chaining with a symlink entry, giving a full write primitive on the …

CVE-2026-44788
GitHub-GHSA

MEDIUM
view_component: System Test Entry Point Path Check Allows Sibling Directory Escape
GHSA-hg3h-g7xc-f7vp
pkg: view_component
eco: rubygems
published: May 8, 2026
### Summary

The system test entrypoint canonicalizes a user-controlled file path with `File.realpath`, then checks whether the resolved path starts with the temp directory path. This is not a safe containment check because sibling directories can share the same string prefix.

Severity: Medium; tes…

CVE-2026-44837
GitHub-GHSA

MEDIUM
Gotenberg allows Chromium URL conversion routes to read arbitrary files under /tmp via file:// scheme
GHSA-g924-cjx7-2rjw
pkg: github.com/gotenberg/gotenberg/v8
eco: go
published: May 7, 2026
## Summary

The `/forms/chromium/convert/url` and `/forms/chromium/screenshot/url` routes accept `url=file:///tmp/…` from anonymous callers. The default Chromium deny-list intentionally exempts `file:///tmp/` so HTML/Markdown routes can load their own request-local assets, and those routes apply a…

CVE-2026-42597
GitHub-GHSA

MEDIUM
axonflow-sdk-java: Webhook signing-key (HMAC-SHA256) not exposed by SDK type, preventing signature verification
GHSA-248h-974q-xrc2
pkg: com.getaxonflow:axonflow-sdk
eco: maven
published: May 6, 2026
## Summary

The AxonFlow SDK's `WebhookSubscription` (or equivalent) type did not expose the HMAC-SHA256 signing key returned by the platform's `CreateWebhook` endpoint. Without access to the secret through the typed SDK API, callers had no path to verify the `X-AxonFlow-Signature` header on incomin…

GitHub-GHSA

MEDIUM
axonflow-sdk-typescript: Webhook signing-key (HMAC-SHA256) not exposed by SDK type, preventing signature verification
GHSA-mph8-9v29-pm42
pkg: @axonflow/sdk
eco: npm
published: May 6, 2026
## Summary

The AxonFlow SDK's `WebhookSubscription` (or equivalent) type did not expose the HMAC-SHA256 signing key returned by the platform's `CreateWebhook` endpoint. Without access to the secret through the typed SDK API, callers had no path to verify the `X-AxonFlow-Signature` header on incomin…

GitHub-GHSA

MEDIUM
axonflow-sdk-go: Webhook signing-key (HMAC-SHA256) not exposed by SDK type, preventing signature verification
GHSA-mhc4-qq83-fmrr
pkg: github.com/getaxonflow/axonflow-sdk-go/v5
eco: go
published: May 6, 2026
## Summary

The AxonFlow SDK's `WebhookSubscription` (or equivalent) type did not expose the HMAC-SHA256 signing key returned by the platform's `CreateWebhook` endpoint. Without access to the secret through the typed SDK API, callers had no path to verify the `X-AxonFlow-Signature` header on incomin…

GitHub-GHSA

MEDIUM
axonflow-sdk-python: Webhook signing-key (HMAC-SHA256) not exposed by SDK type, preventing signature verification
GHSA-7f4h-6264-89fr
pkg: axonflow
eco: pip
published: May 6, 2026
## Summary

The AxonFlow SDK's `WebhookSubscription` (or equivalent) type did not expose the HMAC-SHA256 signing key returned by the platform's `CreateWebhook` endpoint. Without access to the secret through the typed SDK API, callers had no path to verify the `X-AxonFlow-Signature` header on incomin…

GitHub-GHSA

MEDIUM
Granian vulnerable to DoS via WSGI response header panic
GHSA-f5p7-9fr5-8jmj
pkg: granian
eco: pip
published: May 6, 2026
### Summary

Granian aborts a worker process if a WSGI application returns an invalid HTTP response header name or value. The WSGI response conversion path uses `.unwrap()` on both the header name and header value constructors, so malformed output from the application becomes a process abort instead…

CVE-2026-42545
GitHub-GHSA

MEDIUM
OpAMP client reads unbounded HTTP response bodies
GHSA-w2jh-77fq-7gp8
pkg: OpenTelemetry.OpAmp.Client
eco: nuget
published: May 5, 2026
### Summary

When receiving responses from the OpAMP server over HTTP, the OpAMP client allocates an unbounded buffer to read all bytes from the server, with no upper-bound on the number of bytes consumed.

This could cause memory exhaustion in the consuming application if the configured OpAMP serve…

CVE-2026-42348
GitHub-GHSA

MEDIUM
eventsource-encoder vulnerable to SSE event injection via unsanitized `event` and `id` fields
GHSA-m9g3-3g99-mhpx
pkg: eventsource-encoder
eco: npm
published: May 8, 2026
### Summary

`eventsource-encoder` does not sanitize the `event` or `id` fields of an `EventSourceMessage` before serializing them. An attacker who controls either field can inject arbitrary Server-Sent Events line terminators (`\n`, `\r`, or `\r\n`) and thereby forge additional SSE fields or entire…

CVE-2026-44214
GitHub-GHSA

MEDIUM
vm2 is Vulnerable to Host File Path Disclosure via Stack Trace Information Leak
GHSA-v27g-jcqj-v8rw
pkg: vm2
eco: npm
published: May 7, 2026
### Summary
vm2's `CallSite` wrapper class (intended as a safe wrapper for V8's native CallSite) blocks `getThis()` and `getFunction()` to prevent host object leakage, but allows `getFileName()` to return unsanitized host absolute paths. Any sandboxed code can extract the full directory structure, l…
CVE-2026-44002
GitHub-GHSA

MEDIUM
CSS Parser: Improper Certificate Validation allows MITM injection of remote CSS content
GHSA-ff6c-w6qf-7xqc
pkg: css_parser, css_parser
eco: rubygems
published: May 7, 2026
### Summary

The CSS Parser gem does not validate HTTPS connections, allowing a Man-in-the-Middle (MITM) attacker to inject or modify CSS content when stylesheets are loaded via HTTPS. The connection is established with `OpenSSL::SSL::VERIFY_NONE`, meaning any HTTPS certificate—even entirely untru…

CVE-2026-44312
GitHub-GHSA

MEDIUM
Netty HTTP/1.0 TE+CL Coexistence Bypasses Smuggling Sanitization
GHSA-xxqh-mfjm-7mv9
pkg: io.netty:netty-codec-http, io.netty:netty-codec-http
eco: maven
published: May 7, 2026
# NETTY HTTP/1.0 TE+CL Coexistence Bypasses Smuggling Sanitization

| Field | Value |
|———–|——-|
| Library | `io.netty:netty-codec-http` |
| Component | `codec-http` — `HttpObjectDecoder` |
| Severity | **HIGH** |
| Affects | HEAD, commit `4f3533ae` confirmed |

## Summary…

CVE-2026-42581
GitHub-GHSA

MEDIUM
docling-graph has SSRF via Missing Internal IP Validation in URLInputHandler
GHSA-fqph-j6v6-jvgx
pkg: docling-graph
eco: pip
published: May 7, 2026
### Impact

The `URLInputHandler` class in `docling_graph/core/input/handlers.py` makes HTTP requests to user-supplied URLs without validating whether the target resolves to a private, loopback, or link-local IP address. The `URLValidator` only checks for a valid scheme and non-empty `netloc`, perfo…

CVE-2026-44520
GitHub-GHSA

MEDIUM
BentoML has Information Disclosure in `bentoml build` via symlink traversal in the build context
GHSA-mcfx-4vc6-qgxv
pkg: bentoml
eco: pip
published: May 7, 2026
### Summary
BentoML's `bentoml build` packaging workflow follows attacker-controlled symlinks inside the build context and copies the referenced file contents into the generated Bento artifact.

If a victim builds an untrusted repository or other attacker-supplied build context, the attacker can pla…

CVE-2026-40610
NVD

MEDIUM
CVE-2026-40004
CVE-2026-40004
pkg: openssl

published: May 7, 2026

There exists an openssl.cnf privilege escalation vulnerability in ZTE Cloud PC client uSmartview. An attacker can execute arbitrary code locally and escalate privileges.
CWE: CWE-427
GitHub-GHSA

MEDIUM
Vercel: Non-interactive mode includes CLI arguments in suggested command output
GHSA-pgf8-2hgj-grqg
pkg: vercel
eco: npm
published: May 7, 2026
# Summary

When the Vercel CLI runs in non-interactive mode (`–non-interactive` or auto-detected AI agent), commands that cannot complete autonomously emit JSON payloads with suggested follow-up commands. If the user authenticated via `–token` or `-t` on the command line, the token value is includ…

CVE-2026-44479
GitHub-GHSA

MEDIUM
@axonflow/openclaw fix introduces plugin cache and credential-file permission hardening
GHSA-cqmh-pcgr-q42f
pkg: @axonflow/openclaw
eco: npm
published: May 6, 2026
## Summary

Two related permission defects in this AxonFlow plugin allowed registration credentials and cache state to be readable by other local users on hosts where the calling user's home directory was at the conventional `0755` mode.

## Affected versions

Versions 1.3.2 and below.

## Impact

1…

NVD

MEDIUM
CVE-2026-43277
CVE-2026-43277
pkg: linux linux_kernel

published: May 6, 2026

In the Linux kernel, the following vulnerability has been resolved:

APEI/GHES: ensure that won't go past CPER allocated record

The logic at ghes_new() prevents allocating too large records, by
checking if they're bigger than GHES_ESTATUS_MAX_SIZE (currently, 64KB).
Yet, the allocation is done with…

NVD

MEDIUM
CVE-2026-43271
CVE-2026-43271
pkg: linux linux_kernel

published: May 6, 2026

In the Linux kernel, the following vulnerability has been resolved:

md-cluster: fix NULL pointer dereference in process_metadata_update

The function process_metadata_update() blindly dereferences the 'thread'
pointer (acquired via rcu_dereference_protected) within the wait_event()
macro.

While th…

CWE: CWE-476
NVD

MEDIUM
CVE-2026-43266
CVE-2026-43266
pkg: linux linux_kernel

published: May 6, 2026

In the Linux kernel, the following vulnerability has been resolved:

EFI/CPER: don't go past the ARM processor CPER record buffer

There's a logic inside GHES/CPER to detect if the section_length
is too small, but it doesn't detect if it is too big.

Currently, if the firmware receives an ARM proces…

NVD

MEDIUM
CVE-2026-43265
CVE-2026-43265
pkg: linux linux_kernel

published: May 6, 2026

In the Linux kernel, the following vulnerability has been resolved:

KVM: x86: Ignore -EBUSY when checking nested events from vcpu_block()

Ignore -EBUSY when checking nested events after exiting a blocking state
while L2 is active, as exiting to userspace will generate a spurious
userspace exit, us…

NVD

MEDIUM
CVE-2026-43264
CVE-2026-43264
pkg: linux linux_kernel

published: May 6, 2026

In the Linux kernel, the following vulnerability has been resolved:

fbdev: of: display_timing: fix refcount leak in of_get_display_timings()

of_parse_phandle() returns a device_node with refcount incremented,
which is stored in 'entry' and then copied to 'native_mode'. When the
error paths at line…

NVD

MEDIUM
CVE-2026-42192
CVE-2026-42192
pkg: react

published: May 8, 2026

Plunk is an open-source email platform built on top of AWS SES. Prior to version 0.9.0, a stored cross-site scripting (XSS) vulnerability exists in the campaign management feature, where the email body content created by authenticated project members is stored and later rendered in the admin dashboa…
CWE: CWE-79
GitHub-GHSA

MEDIUM
Open WebUI: Deactivated Channel Members Retain Full Access to Group/DM Channels
GHSA-hmgr-67hw-j2cq
pkg: open-webui
eco: pip
published: May 8, 2026
# Deactivated Channel Members Retain Full Access to Group/DM Channels

## Affected Component

Channel membership authorization check:
– `backend/open_webui/models/channels.py` (lines 663-673, `is_user_channel_member`)
– Used at 15 locations in `backend/open_webui/routers/channels.py`

## Affected Ve…

CVE-2026-44561
GitHub-GHSA

MEDIUM
Read-Only Open WebUI Users Can Modify Collaborative Documents via Socket.IO
GHSA-vrfh-rj4q-rmhr
pkg: open-webui
eco: pip
published: May 8, 2026
# Read-Only Users Can Modify Collaborative Documents via Socket.IO

## Affected Component

Socket.IO collaborative document editing handler:
– `backend/open_webui/socket/main.py` (lines 667-721, `ydoc:document:update` handler)

## Affected Versions

Current main branch and likely all versions with c…

CVE-2026-44564
GitHub-GHSA

MEDIUM
Open WebUI's Ollama Model Access Control Bypass via /api/generate, /api/embed, /api/embeddings, and /api/show
GHSA-rcvp-6fgw-c7fh
pkg: open-webui
eco: pip
published: May 8, 2026
# Ollama Model Access Control Bypass via /api/generate, /api/embed, /api/embeddings, and /api/show

## Affected Component

Ollama proxy endpoints missing model access control:
– `backend/open_webui/routers/ollama.py` (lines 955-995, `generate_completion`)
– `backend/open_webui/routers/ollama.py` (li…

CVE-2026-44563
GitHub-GHSA

MEDIUM
Open WebUI's Channel Access Grants Bypass filter_allowed_access_grants
GHSA-7rjh-px4v-5w55
pkg: open-webui
eco: pip
published: May 8, 2026
# Channel Access Grants Bypass filter_allowed_access_grants

## Affected Component

Channel creation and update endpoints:
– `backend/open_webui/routers/channels.py` (lines 291-340, `create_new_channel`)
– `backend/open_webui/routers/channels.py` (lines 617-638, `update_channel_by_id`)
– `backend/op…

CVE-2026-44558
GitHub-GHSA

MEDIUM
gitsign –verify panics on empty-certificate PKCS7 and exits 0, bypassing exit-code callers
GHSA-7c37-gx6w-8vc5
pkg: github.com/sigstore/gitsign
eco: go
published: May 8, 2026
## Summary

`CertVerifier.Verify()` in `pkg/git/verifier.go` unconditionally dereferences `certs[0]` after `sd.GetCertificates()` without checking the slice length. A CMS/PKCS7 signed message with an empty certificate set is a structurally valid DER payload; `GetCertificates()` returns an empty slic…

CVE-2026-44310
GitHub-GHSA

MEDIUM
FileBrowser Vulnerable to Stored XSS via SVG File in Public Share (Missing CSP Header)
GHSA-mmpx-jh39-wrv6
pkg: github.com/gtsteffaniak/filebrowser
eco: go
published: May 7, 2026
## Summary

FileBrowser Quantum serves inline SVG files without a `Content-Security-Policy` header, allowing embedded JavaScript in SVG files to execute when accessed via public share links.

Verified on v1.3.0-stable.

## Affected product

– **Product:** FileBrowser Quantum (`gtsteffaniak/filebrows…

GitHub-GHSA

MEDIUM
ShellHub has crash-DoS via field injection in filter and sort-by parameters
GHSA-47r2-v3x6-wff9
pkg: github.com/shellhub-io/shellhub
eco: go
published: May 6, 2026
## Summary
The device list endpoint accepts user-controlled identifiers in two places that are passed directly as BSON/SQL keys in the database layer without validation:

1. The `name` field of each filter property in the base64-encoded `filter`
query parameter.
2. The `sort_by` query param…

CVE-2026-44425
GitHub-GHSA

MEDIUM
wger: trainer_login open redirect – ?next= parameter not validated against host
GHSA-vqv8-j3mj-wjxj
pkg: wger
eco: pip
published: May 6, 2026
### Summary

The `trainer_login` view in wger redirects to `request.GET['next']` directly via `HttpResponseRedirect()` without calling `url_has_allowed_host_and_scheme()`. After the trainer successfully enters impersonation mode, their browser is redirected to any attacker-controlled URL supplied in…

GitHub-GHSA

MEDIUM
Axios: XSRF Token Cross-Origin Leakage via Prototype Pollution Gadget in `withXSRFToken` Boolean Coercion
GHSA-xx6v-rp6x-q39c
pkg: axios, axios
eco: npm
published: May 5, 2026
# Vulnerability Disclosure: XSRF Token Cross-Origin Leakage via Prototype Pollution Gadget in `withXSRFToken` Boolean Coercion

## Summary

The Axios library's XSRF token protection logic uses JavaScript truthy/falsy semantics instead of strict boolean comparison for the `withXSRFToken` config prope…

CVE-2026-42042
NVD

MEDIUM
CVE-2026-1677
CVE-2026-1677
pkg: tls

published: May 11, 2026

Zephyr sockets created with `IPPROTO_TLS_1_3` can still negotiate a TLS 1.2 connection when both TLS versions are enabled in Kconfig, because the socket-level protocol selection is not propagated to mbedTLS (e.g. via `mbedtls_ssl_conf_min_tls_version`). The ClientHello advertises both versions and t…
CWE: CWE-757
GitHub-GHSA

MEDIUM
Vert.x has a DoS via unbounded server-side SNI SslContext cache growth
GHSA-3g76-f9xq-8vp6
pkg: io.vertx:vertx-core, io.vertx:vertx-core, io.vertx:vertx-core
eco: maven
published: May 9, 2026
Potential unbounded server-side SNI `SslContext` cache growth in Vert.x TLS handling, with possible resource-exhaustion / DoS impact.

On affected versions, matching server-side SNI names are cached via `computeIfAbsent(serverName, …)` in a serverName-keyed `SslContext` cache, and I could not find…

CVE-2026-6860
GitHub-GHSA

MEDIUM
Hono's Cache Middleware ignores Vary: Authorization / Vary: Cookie leading to cross-user cache leakage
GHSA-p77w-8qqv-26rm
pkg: hono
eco: npm
published: May 9, 2026
### Summary

Cache Middleware does not skip caching for responses that declare per-user variance via `Vary: Authorization` or `Vary: Cookie`. As a result, a response cached for one authenticated user may be served to subsequent requests from different users.

### Details

The Cache Middleware skips …

CVE-2026-44457
GitHub-GHSA

MEDIUM
gitsign verify accepts signatures over go-git-normalized bytes, enabling trust confusion on malformed commits
GHSA-7rmh-48mx-2vwc
pkg: github.com/sigstore/gitsign
eco: go
published: May 8, 2026
## Summary

`gitsign verify` and `gitsign verify-tag` re-encode commit/tag objects through go-git's `EncodeWithoutSignature` before checking the signature, instead of verifying against the raw git object bytes. For malformed objects with duplicate `tree` headers, git-core and go-git parse different …

CVE-2026-44309
GitHub-GHSA

MEDIUM
Wagtail has improper restriction handling on Documents and Images API
GHSA-p5gm-92h4-6pv6
pkg: wagtail, wagtail
eco: pip
published: May 8, 2026
### Impact

The Documents and Images [API](https://docs.wagtail.org/en/stable/advanced_topics/api/index.html) incorrectly listed items in private collections. A user with access to the API could see the filename and name of documents and images in private collections.

### Patches

Patched versions …

CVE-2026-44201
NVD

MEDIUM
CVE-2026-42190
CVE-2026-42190
pkg: react

published: May 8, 2026

RedwoodSDK is a server-first React framework. From version 1.0.0-beta.50 to before version 1.2.3, server actions in rwsdk apply HTTP method enforcement but no origin validation. A request originating from a different origin that the browser treats as same-site can invoke a server action with the vic…
CWE: CWE-352
GitHub-GHSA

MEDIUM
vm2 has access to `VM2_INTERNAL_STATE_DO_NOT_USE_OR_PROGRAM_WILL_FAIL`
GHSA-2cm2-m3w5-gp2f
pkg: vm2
eco: npm
published: May 8, 2026
### Summary

https://github.com/patriksimek/vm2/security/advisories/GHSA-wp5r-2gw5-m7q7 is not fully patched.

### Details

It is still possible to get access to `VM2_INTERNAL_STATE_DO_NOT_USE_OR_PROGRAM_WILL_FAIL`.

### PoC

“`js
const {VM} = require("vm2");
const vm = new VM();
console.log(vm.run…

NVD

MEDIUM
CVE-2026-44500
CVE-2026-44500
pkg: zfnd zebra-chain, zfnd zebra-network, zfnd zebrad

published: May 8, 2026

ZEBRA is a Zcash node written entirely in Rust. Prior to zebrad version 4.4.0, prior to zebra-chain version 7.0.0, and prior to zebra-network version 6.0.0, several inbound deserialization paths in Zebra allocated buffers sized against generic transport or block-size ceilings before the tighter prot…
CWE: CWE-770
NVD

MEDIUM
CVE-2022-26523
CVE-2022-26523
pkg: windows

published: May 8, 2026

The socket connection handler in aswArPot.sys in the Avast and AVG Windows Anti Rootkit driver before 22.1 allows local attackers to execute arbitrary code in kernel mode or cause a denial of service (memory corruption and OS crash) due to a double fetch vulnerability at aswArPot+0xbb94.
CWE: CWE-400
NVD

MEDIUM
CVE-2026-41645
CVE-2026-41645
pkg: projectdiscovery nuclei

published: May 8, 2026

Nuclei is a vulnerability scanner built on a simple YAML-based DSL. From version 3.0.0 to before version 3.8.0, a vulnerability in Nuclei's expression evaluation engine makes it possible for a malicious target server to inject and execute supported DSL expressions. This happens when HTTP response da…
CWE: CWE-94
GitHub-GHSA

MEDIUM
Ech0's Unauthenticated Like Endpoint Enables Arbitrary Engagement Metric Inflation
GHSA-rgj7-vg8v-j4wr
pkg: github.com/lin-snow/ech0
eco: go
published: May 7, 2026
### Summary

**No authentication** is required to invoke **`PUT /api/echo/like/:id`**. The handler is registered on the **public** router group. The service increments **`fav_count`** for the given echo **without** checking identity, **without** a per-user limit, and **without** CSRF tokens. A remot…

GitHub-GHSA

MEDIUM
Ech0 comment model's Email field returned on public /api/comments endpoints
GHSA-rj4g-rqgh-rx9h
pkg: github.com/lin-snow/Ech0
eco: go
published: May 7, 2026
## Summary

The `Comment` model serializes its `Email` field through the public comment-listing API. `internal/model/comment/comment.go:33` uses `json:"email"`, while adjacent PII fields (`IPHash`, `UserAgent`) correctly use `json:"-"`. The public endpoints `GET /api/comments?echo_id=X` and `GET /ap…

GitHub-GHSA

MEDIUM
Zebra Vulnerable to Allocation Amplification in Inbound Network Deserializers
GHSA-438q-jx8f-cccv
pkg: zebra-network, zebrad, zebra-chain
eco: rust
published: May 7, 2026
# CVE-2026-44500: Allocation Amplification in Inbound Network Deserializers

## Summary

Several inbound deserialization paths in Zebra allocated buffers sized against generic transport or block-size ceilings before the tighter protocol or consensus limits were enforced. An unauthenticated or post-h…

CVE-2026-44500
GitHub-GHSA

MEDIUM
Netty MQTT: Resource exhaustion in MqttDecoder
GHSA-jfg9-48mv-9qgx
pkg: io.netty:netty-codec-mqtt, io.netty:netty-codec-mqtt
eco: maven
published: May 7, 2026
### Impact
The MQTT 5 header Properties section is parsed and buffered _before_ any message size limit is applied.

Specifically, in `MqttDecoder`, the `decodeVariableHeader()` method is called before the `bytesRemainingBeforeVariableHeader > maxBytesInMessage` check. The `decodeVariableHeader()` ca…

CVE-2026-44248
GitHub-GHSA

MEDIUM
vm2's Transformer Fast-Path Bypass Exposes Internal State Variable
GHSA-wp5r-2gw5-m7q7
pkg: vm2
eco: npm
published: May 7, 2026
### Summary
vm2's code transformer has a performance optimization that skips AST analysis when the code does not contain `catch`, `import`, or `async` keywords. This fast-path bypass allows sandboxed code to directly access the internal `VM2_INTERNAL_STATE_DO_NOT_USE_OR_PROGRAM_WILL_FAIL` variable, …
CVE-2026-44003
GitHub-GHSA

MEDIUM
Goteberg has arbitrary PDF read via stampExpression and watermarkExpression in merge, split, and convert routes
GHSA-3cv5-q585-h563
pkg: github.com/gotenberg/gotenberg/v8
eco: go
published: May 7, 2026
## Summary

Six conversion routes (`pdfengines/merge`, `pdfengines/split`, `libreoffice/convert`, `chromium/convert/url`, `chromium/convert/html`, `chromium/convert/markdown`) accept `stampSource=pdf` + `stampExpression=/path` and `watermarkSource=pdf` + `watermarkExpression=/path` from anonymous ca…

CVE-2026-42593
GitHub-GHSA

MEDIUM
Gotenberg's DNS rebinding bypasses SSRF validation on Chromium URL conversion routes
GHSA-2pmr-289p-44r3
pkg: github.com/gotenberg/gotenberg/v8
eco: go
published: May 7, 2026
## Summary

`FilterOutboundURL` resolves the hostname, checks the resolved IPs against the private-address deny-list, and returns only the error. It discards the resolved addresses. Chromium later performs its own DNS resolution when it navigates to the URL. An attacker who controls DNS for a hostna…

CVE-2026-42592
GitHub-GHSA

MEDIUM
OpenSearch Security plugin: DLS not applied on documents linked by has_child or has_parent relation
GHSA-x83w-23jp-g6pw
pkg: org.opensearch.plugin:opensearch-security, org.opensearch.plugin:opensearch-security
eco: maven
published: May 7, 2026
### Description

A flaw was identified in the OpenSearch Security plugin's document-level security (DLS) implementation. DLS restrictions were not correctly applied to search queries that use has_parent or has_child join relations. This could allow an authenticated user to access document contents t…

GitHub-GHSA

MEDIUM
Nitro has a proxy scope bypass via percent-encoded path traversal in `routeRules`
GHSA-5w89-w975-hf9q
pkg: nitro, nitropack
eco: npm
published: May 6, 2026
A proxy route rule like:

“`ts
routeRules: {
"/api/orders/**": { proxy: { to: "http://upstream/orders/**" } }
}
“`

is intended to limit the proxy to URLs under `/api/orders/`. Before the patch, an attacker could bypass that scope by sending percent-encoded path traversal (`..%2f`) in the URL, c…

CVE-2026-44373
GitHub-GHSA

MEDIUM
Lemmy may expose private community data through community, saved, liked, and modlog API views
GHSA-95q8-x6r6-672m
pkg: lemmy_api
eco: rust
published: May 6, 2026
## Summary

Lemmy applies private-community checks in `PostView` and `CommentView`, but several adjacent API views skip the accepted-follower filter. Bob, a registered user who is not an accepted follower, can read private community `sidebar` and `summary` fields. Alice, a former accepted follower, …

GitHub-GHSA

MEDIUM
Private Lemmy instances expose multi-community metadata without authentication
GHSA-jmxc-hhwx-gvv3
pkg: lemmy_api
eco: rust
published: May 6, 2026
## Summary

`read_multi_community()` does not enforce the private-instance setting. On a private instance, an unauthenticated visitor can read multi-community names, titles, summaries, sidebars, owner identities, and member community lists.

## Details

Other read handlers load `local_site` and call…

GitHub-GHSA

MEDIUM
Hatchet affected by cross-tenant information disclosure in `listTasksByDAGIds`
GHSA-55gc-6fmc-fpx9
pkg: github.com/hatchet-dev/hatchet
eco: go
published: May 6, 2026
## Summary

A missing authorization directive on the `GET /api/v1/stable/dags/tasks` endpoint caused Hatchet's tenant-membership check to be skipped for this route. A user authenticated to any tenant on the same Hatchet instance could query the endpoint with another tenant's UUID and a DAG UUID belo…

CVE-2026-42572
GitHub-GHSA

MEDIUM
Nokogiri XSLT transform has a memory leak
GHSA-v2fc-qm4h-8hqv
pkg: nokogiri
eco: rubygems
published: May 6, 2026
## Summary

Nokogiri's `Nokogiri::XSLT::Stylesheet#transform` leaks a small heap allocation when passed a Ruby string parameter containing a null byte.

For applications that pass attacker-controlled input through `XSLT.transform` parameters, this may be a vector for a denial of service attack again…

GitHub-GHSA

MEDIUM
PyLoad vulnerable to unauthenticated traceback disclosure via global exception handler in WebUI
GHSA-c3gc-9pf2-84gg
pkg: pyload-ng
eco: pip
published: May 6, 2026
### Summary
`pyload-ng` WebUI returns full Python traceback details to clients on unhandled exceptions.

Because `/web/<path:filename>` is reachable without authentication and renders attacker-controlled template names, an unauthenticated user can reliably trigger a server exception (for example by …

CVE-2026-44226
GitHub-GHSA

MEDIUM
GraphQL-Ruby's Ruby lexer does not count comment tokens for the purposes of max_query_string_tokens
GHSA-3h96-34p3-xm76
pkg: graphql, graphql, graphql
eco: rubygems
published: May 5, 2026
GraphQL-Ruby's `max_query_string_tokens` configuration didn't count comment tokens against the limit, allowing strings to be processed even after the configured maximum had actually been reached.

In patched versions, the Ruby lexer does count these tokens.

GraphQL-CParser is not affected by this…

NVD

MEDIUM
CVE-2026-34527
CVE-2026-34527
pkg: sandboxie-plus sandboxie

published: May 5, 2026

Sandboxie-Plus is an open source sandbox-based isolation software for Windows. In versions 1.17.2 and earlier, SbieIniServer::HashPassword converts a SHA-1 digest to hexadecimal incorrectly. The high nibble of each byte is shifted right by 8 instead of 4, which always produces zero for an 8-bit valu…
CWE: CWE-328
GitHub-GHSA

MEDIUM
OpenStack Horizon has Incorrect Behavior Order
GHSA-vxvf-xvm3-p8j5
pkg: horizon
eco: pip
published: May 5, 2026
An issue was discovered in OpenStack Horizon 25.6 and 25.7 before 25.7.3. There is a write operation to the session storage backend before authentication and thus storage can be exhausted by unauthenticated requests. This is a regression of the CVE-2014-8124 fix.
CVE-2026-43002
GitHub-GHSA

MEDIUM
Django has an Improper Handling of Length Parameter Inconsistency
GHSA-w26r-rmm8-9c29
pkg: Django, Django
eco: pip
published: May 5, 2026
An issue was discovered in 6.0 before 6.0.5 and 5.2 before 5.2.14. ASGI requests with a missing or understated `Content-Length` header can bypass the `FILE_UPLOAD_MAX_MEMORY_SIZE` limit, potentially loading large files into memory and causing service degradation.

As a reminder, Django expects a li…

CVE-2026-5766
GitHub-GHSA

MEDIUM
Netty: Start-Line Injection in DefaultHttpRequest.setUri() Allows HTTP Request Smuggling and RTSP Request Injection
GHSA-v8h7-rr48-vmmv
pkg: io.netty:netty-codec-http, io.netty:netty-codec-http
eco: maven
published: May 5, 2026
### Summary
Netty allows request-line validation to be bypassed when a `DefaultHttpRequest` or `DefaultFullHttpRequest` is created first and its URI is later changed via `setUri()`.

The constructors reject CRLF and whitespace characters that would break the start-line, but `setUri()` does not apply…

CVE-2026-41417
GitHub-GHSA

MEDIUM
ots has a negative expire override that can bypass its secret retention policy
GHSA-h5fq-653g-gxrm
pkg: github.com/Luzifer/ots
eco: go
published: May 5, 2026
## Summary

The `/api/create` endpoint accepted negative `expire` query values. For the memory storage backend, negative values were passed to secret creation as a negative duration and treated as no expiry, allowing callers to create secrets that persisted longer than intended.

## Impact

Unauthen…

GitHub-GHSA

MEDIUM
Apache Thrift has a Memory Allocation with Excessive Size Value Vulnerability
GHSA-2f9f-gq7v-9h6m
pkg: thrift
eco: rust
published: May 5, 2026
Memory Allocation with Excessive Size Value vulnerability in Apache Thrift.

This issue affects Apache Thrift: before 0.23.0.

Users are recommended to upgrade to version [0.23.0](https://github.com/apache/thrift/releases/tag/v0.23.0), which fixes the issue.

CVE-2026-43868
GitHub-GHSA

MEDIUM
Axios: CRLF Injection in multipart/form-data body via unsanitized blob.type in formDataToStream
GHSA-445q-vr5w-6q77
pkg: axios
eco: npm
published: May 5, 2026
### Summary
The `FormDataPart` constructor in `lib/helpers/formDataToStream.js` interpolates `value.type` directly into the `Content-Type` header of each multipart part without sanitizing CRLF (`\r\n`) sequences. An attacker who controls the `.type` property of a Blob/File-like object (e.g., via a u…
CVE-2026-42037
GitHub-GHSA

MEDIUM
Axios' HTTP adapter-streamed uploads bypass maxBodyLength when maxRedirects: 0
GHSA-5c9x-8gcm-mpgx
pkg: axios, axios
eco: npm
published: May 5, 2026
### Summary

For stream request bodies, maxBodyLength is bypassed when maxRedirects is set to 0 (native http/https transport path). Oversized streamed uploads are sent fully even when the caller sets strict body limits.

### Details

Relevant flow in lib/adapters/http.js:
– 556-564: maxBodyLength …

CVE-2026-42034
GitHub-GHSA

MEDIUM
Axios: HTTP adapter streamed responses bypass maxContentLength
GHSA-vf2m-468p-8v99
pkg: axios, axios
eco: npm
published: May 5, 2026
### Summary

When responseType: 'stream' is used, Axios returns the response stream without enforcing maxContentLength. This bypasses configured response-size limits and allows unbounded downstream consumption.

### Details
In lib/adapters/http.js:
– 786-789: for responseType === 'stream', Axios i…

CVE-2026-42036
NVD

MEDIUM
CVE-2026-41572
CVE-2026-41572
pkg: go

published: May 4, 2026

Note Mark is an open-source note-taking application. Prior to version 0.19.3, after a note-mark owner soft-deletes a public book, its notes and uploaded assets stay readable at /api/notes/{id}, /api/notes/{id}/content, the slug URL, and the asset endpoints. Unauthenticated callers who hold the note …
CWE: CWE-285
GitHub-GHSA

MEDIUM
`potato-annotation` has a Project-Boundary Bypass
GHSA-q9m2-fhv9-3jcf
pkg: potato-annotation
eco: pip
published: May 8, 2026
## Summary
`validate_path_security` uses string-prefix containment (`startswith`) for boundary checks. This allows paths that are **outside** the intended project directory but share its prefix string (e.g., `/tmp/potato_proj_demo_evil/…` vs `/tmp/potato_proj_demo`) to be accepted.

## Details
###…

GitHub-GHSA

MEDIUM
Open WebUI's Mass Assignment via Pydantic extra='allow' Allows Creating Folders in Other Users' Accounts
GHSA-hr43-rjmr-7wmm
pkg: open-webui
eco: pip
published: May 8, 2026
# Mass Assignment via Pydantic extra='allow' Allows Creating Folders in Other Users' Accounts

## Affected Component

Folder creation endpoint and form model:
– `backend/open_webui/models/folders.py` (lines 72-77, `FolderForm` with `extra='allow'`)
– `backend/open_webui/models/folders.py` (lines 95-…

CVE-2026-44550
GitHub-GHSA

MEDIUM
ExternalSecrets vulnerable to privilege escalation with secret overwriting
GHSA-fq7h-9×26-6j22
pkg: github.com/external-secrets/external-secrets/apis
eco: go
published: May 8, 2026
ExternalSecrets allows users to craft Service Account tokens for misconfigured Service Accounts in namespaces the users have access to.

### Impact

A user who only has permission to create ExternalSecret resources can cause the operator to create a Secret that Kubernetes will automatically populate…

CVE-2026-42876
GitHub-GHSA

MEDIUM
Open WebUI has Stored XSS in Pending User Overlay via Incorrect DOMPurify Application Order
GHSA-fq3v-xjjx-95rc
pkg: open-webui
eco: pip
published: May 8, 2026
## Vulnerability Details

**CWE-79**: Cross-site Scripting (XSS)

The `AccountPending.svelte` component renders the admin-configured "Pending User Overlay Content" using `marked.parse()` inside `{@html}` with an incorrect DOMPurify application order:

### Vulnerable Code

**`src/lib/components/layou…

CVE-2026-44568
GitHub-GHSA

MEDIUM
Ech0's RSS feed renders unescaped tag names and raw-HTML markdown, stored XSS against subscribers
GHSA-3v85-fqvh-7rxf
pkg: github.com/lin-snow/Ech0
eco: go
published: May 7, 2026
## Summary

The public RSS/Atom feed at `/rss` renders two attacker-controlled surfaces without HTML escaping. Tag names flow through `fmt.Appendf(renderedContent, "<br /><span class=\"tag\">#%s</span>", tag.Name)` at `internal/service/common/common.go:120`, and the Markdown renderer at `internal/ut…

NVD

MEDIUM
CVE-2026-40243
CVE-2026-40243
pkg: linuxcontainers incus

published: May 6, 2026

Incus is a system container and virtual machine manager. In versions before 7.0.0, broken TLS validation logic in the OVN database connection logic can allow connections to an attacker's OVN database. The OVN client implementations disable Go standard TLS server verification and replace it with cust…
CWE: CWE-295
GitHub-GHSA

MEDIUM
Axios: Authentication Bypass via Prototype Pollution Gadget in `validateStatus` Merge Strategy
GHSA-w9j2-pvgh-6h63
pkg: axios, axios
eco: npm
published: May 5, 2026
# Vulnerability Disclosure: Authentication Bypass via Prototype Pollution Gadget in `validateStatus` Merge Strategy

## Summary

The Axios library is vulnerable to a Prototype Pollution "Gadget" attack that allows any `Object.prototype` pollution to **silently suppress all HTTP error responses** (40…

CVE-2026-42041
GitHub-GHSA

MEDIUM
utcp-http vulnerable to SSRF via attacker-controlled OpenAPI servers[0].url in HTTP communication protocol
GHSA-39j6-4867-gg4w
pkg: utcp-http
eco: pip
published: May 7, 2026
## Summary

The `utcp-http` plugin is vulnerable to a blind Server-Side Request Forgery (SSRF) caused by a trust-boundary inconsistency between manual discovery and tool invocation. `register_manual()` validates the discovery URL against an HTTPS / loopback allowlist, but `call_tool()` and `call_too…

CVE-2026-44661
GitHub-GHSA

MEDIUM
hono/jsx has Unvalidated JSX Tag Names that May Allow HTML Injection
GHSA-69xw-7hcm-h432
pkg: hono
eco: npm
published: May 6, 2026
## Summary

Improper handling of JSX element tag names in hono/jsx allowed unvalidated tag names to be directly inserted into the generated HTML output.

When untrusted input is used as a tag name via the programmatic `jsx()` or `createElement()` APIs during server-side rendering, specially crafted …

CVE-2026-44455
GitHub-GHSA

MEDIUM
PPTAgent: Arbitrary File Write via `save_generated_slides`
GHSA-pxhg-7xr2-w7xg
pkg: pptagent
eco: pip
published: May 5, 2026
## Summary

> This vulnerability has been fixed in https://github.com/icip-cas/PPTAgent/commit/418491a9a1c02d9d93194b5973bb58df35cf9d00.

The `save_generated_slides` MCP tool accepts a pptx_path argument and writes the generated PPTX file to that path without any workspace restriction or path valida…

CVE-2026-42080
GitHub-GHSA

MEDIUM
PPTAgent: Arbitrary File Write + Directory Creation via markdown_table_to_image
GHSA-hrcw-xc63-g29m
pkg: pptagent
eco: pip
published: May 5, 2026
### Summary

The `markdown_table_to_image` tool accepts a caller-controlled path parameter and passes it directly to `get_html_table_image`:

“`python
# pptagent/mcp_server.py:127-143
def markdown_table_to_image(markdown_table: str, path: str, css: str) -> str:
"""
Args:
path (str):…

CVE-2026-42078
NVD

MEDIUM
CVE-2026-7572
CVE-2026-7572
pkg: linux

published: May 6, 2026

An off-by-one error (CWE-193) in the ConsumeUnit16Array and ConsumeUnit64Array functions in Velocidex Velociraptor before version 0.76.5 on Windows and Linux allows a local attacker to cause a Denial of Service (DoS) via a process crash by providing a specially crafted .evtx file to the parse_evtx V…
CWE: CWE-193
GitHub-GHSA

MEDIUM
XWiki PlantUML Macro Vulnerable to Server-Side Request Forgery (SSRF) via 'server' parameter
GHSA-42fc-7w97-8vrc
pkg: org.xwiki.contrib.plantuml:macro-plantuml-macro
eco: maven
published: May 5, 2026
### Impact

The [PlantUML Macro](https://extensions.xwiki.org/xwiki/bin/view/Extension/PlantUML+Macro) is vulnerable to Server-Side Request Forgery (SSRF). The macro allows users to specify an alternative PlantUML server via the `server` parameter. However, the application does not validate the supp…

CVE-2026-42140
NVD

MEDIUM
CVE-2026-8194
CVE-2026-8194
pkg: react

published: May 9, 2026

A security vulnerability has been detected in osTicket up to 1.18.3. Impacted is an unknown function of the file include/class.dispatcher.php of the component Dispatcher. The manipulation of the argument _method leads to cross-site request forgery. Remote exploitation of the attack is possible. The …
CWE: CWE-352, CWE-862
GitHub-GHSA

MEDIUM
Hono has CSS Declaration Injection via Style Object Values in JSX SSR
GHSA-qp7p-654g-cw7p
pkg: hono
eco: npm
published: May 9, 2026
### Summary

The JSX renderer escapes `style` attribute object values for HTML but not for CSS. Untrusted input in a `style` object value or property name can therefore inject additional CSS declarations into the rendered `style` attribute. The impact is limited to CSS and does not allow JavaScript …

CVE-2026-44458
GitHub-GHSA

MEDIUM
free5GC's UDR nudr-dr DELETE amf-subscriptions panics on missing subsId when UE state exists (nil pointer dereference)
GHSA-4rqf-grm6-vf75
pkg: github.com/free5gc/udr
eco: go
published: May 8, 2026
### Summary
free5GC's UDR `nudr-dr` `DELETE /subscription-data/{ueId}/{servingPlmnId}/ee-subscriptions/{subsId}/amf-subscriptions` handler contains a nil-pointer dereference reachable from a single authenticated request, after one preparatory authenticated EE-subscription create. The handler checks …
CVE-2026-44323
GitHub-GHSA

MEDIUM
Wagtail has improper permission handling when viewing page history
GHSA-c4mr-889m-vgf6
pkg: wagtail, wagtail
eco: pip
published: May 8, 2026
### Impact

A CMS user without the ability to edit a page could still access the history report for the page, potentially resulting in disclosure of sensitive information.

### Patches
Patched versions have been released as Wagtail 7.0.7 and 7.3.2. The new 7.4 LTS feature release also incorporates t…

CVE-2026-44198
NVD

MEDIUM
CVE-2026-42282
CVE-2026-42282
pkg: oauth

published: May 8, 2026

n8n-MCP is an MCP server that provides AI assistants access to n8n node documentation, properties, and operations. Prior to version 2.47.13, when n8n-mcp runs in HTTP transport mode, authenticated MCP tools/call requests had their full arguments and JSON-RPC params written to server logs by the requ…
CWE: CWE-532
GitHub-GHSA

MEDIUM
Open WebUI Missing Access Check on Channel Members Endpoint for Standard Channels
GHSA-c7wp-3qh5-55pv
pkg: open-webui
eco: pip
published: May 8, 2026
# Missing Access Check on Channel Members Endpoint for Standard Channels

## Affected Component

Channel members listing endpoint:
– `backend/open_webui/routers/channels.py` (lines 445-507, `get_channel_members_by_id`)

## Affected Versions

Current main branch and likely all versions with the chann…

CVE-2026-44559
GitHub-GHSA

MEDIUM
Open WebUI vulnerable to Global Knowledge Base Enumeration via knowledge-bases Meta-Collection
GHSA-6c2x-gcp3-gp73
pkg: open-webui
eco: pip
published: May 8, 2026
# Global Knowledge Base Enumeration via knowledge-bases Meta-Collection

## Affected Component

Retrieval collection access validation:
– `backend/open_webui/routers/retrieval.py` (lines 2330-2355, `_validate_collection_access`)
– `backend/open_webui/routers/retrieval.py` (query endpoints, e.g. `POS…

CVE-2026-44557
GitHub-GHSA

MEDIUM
Bunsink has an SSRF bypass in `validate_webhook_url`
GHSA-fp53-qcf8-2xx2
pkg: bugsink
eco: pip
published: May 8, 2026
## Summary

Bugsink’s webhook URL validation in versions 2.1.2 and earlier could be (partially) bypassed because of a mismatch in URL parsing.

In some malformed URLs, Python’s standard URL parser (urllib) and the HTTP client stack (requests / urllib3) do not agree on which host is actually bei…

CVE-2026-44502
GitHub-GHSA

MEDIUM
Weblate vulnerable to XSS via crafted Markdown
GHSA-5cmv-3rc4-7279
pkg: weblate
eco: pip
published: May 7, 2026
### Impact
The Markdown renderer used in user comments and other user-provided content didn't properly sanitize some attributes.

### Patches
* https://github.com/WeblateOrg/weblate/pull/19259

### Workarounds
Even though the attacker might be able to inject code into the HTML, the Weblate's strict …

CVE-2026-44264
GitHub-GHSA

MEDIUM
Weblate Vulnerable to Private Translation Enumeration via Screenshot API
GHSA-gcg5-86jr-f7jg
pkg: weblate
eco: pip
published: May 7, 2026
### Impact

The screenshots, tasks, and component link API allowed for the enumeration of translations in a project inaccessible to the user.

### Patches
* https://github.com/WeblateOrg/weblate/pull/19258

### Acknowledgement
Weblate thanks Luay for reporting this vulnerability according to the org…

CVE-2026-44263
GitHub-GHSA

MEDIUM
Backstage: Catalog unprocessed read endpoints allow authenticated cross-owner data access without permission checks
GHSA-p7g9-rp3g-mgfg
pkg: @backstage/plugin-catalog-unprocessed-entities-common, @backstage/plugin-catalog-unprocessed-entities, @backstage/plugin-catalog-backend-module-unprocessed
eco: npm
published: May 6, 2026
### Impact

The unprocessed entities read endpoints in `@backstage/plugin-catalog-backend-module-unprocessed` do not enforce permission authorization checks. Any authenticated user can access unprocessed entity records regardless of ownership. This is
an information disclosure vulnerability …

CVE-2026-44374
NVD

MEDIUM
CVE-2026-7946
CVE-2026-7946
pkg: google chrome, apple macos, google chrome_os

published: May 6, 2026

Insufficient policy enforcement in WebUI in Google Chrome on Linux, Mac, Windows, ChromeOS prior to 148.0.7778.96 allowed a remote attacker who had compromised the renderer process to bypass site isolation via a crafted HTML page. (Chromium security severity: Medium)
CWE: CWE-693
NVD

MEDIUM
CVE-2026-7904
CVE-2026-7904
pkg: google chrome, apple macos, linux linux_kernel

published: May 6, 2026

Out of bounds read in Fonts in Google Chrome prior to 148.0.7778.96 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: High)
CWE: CWE-125
GitHub-GHSA

MEDIUM
Kubewarden vulnerable to RBAC Reconnaissance via unchecked can_i host capability call
GHSA-wqcw-g35j-j578
pkg: github.com/kubewarden/kubewarden-controller
eco: go
published: May 5, 2026
### Impact
Kubewarden is a policy engine for Kubernetes. Kubewarden cluster operators can grant permissions to users to deploy namespaced AdmissionPolicies and AdmissionPolicyGroups in their Namespaces. One of Kubewarden promises is that configured users can deploy namespaced policies in a safe mann…
CVE-2026-42541
GitHub-GHSA

MEDIUM
@workos/authkit-session has an Open Redirect via state-derived redirect target
GHSA-vvvv-983w-r7pv
pkg: @workos/authkit-session
eco: npm
published: May 5, 2026
An open redirect vulnerability exists in `AuthService.handleCallback` due to insufficient validation of the `returnPathname` value derived from the OAuth `state` parameter.

The `state` parameter is round-tripped through the identity provider (IdP) and can be influenced by an attacker. The handleCal…

CVE-2026-42565
NVD

MEDIUM
CVE-2026-7996
CVE-2026-7996
pkg: google chrome, apple macos, linux linux_kernel

published: May 6, 2026

Insufficient validation of untrusted input in SSL in Google Chrome prior to 148.0.7778.96 allowed a remote attacker who had compromised the renderer process to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low)
CWE: CWE-20
NVD

MEDIUM
CVE-2026-7912
CVE-2026-7912
pkg: google chrome, google android

published: May 6, 2026

Integer overflow in GPU in Google Chrome on Android prior to 148.0.7778.96 allowed a remote attacker who had compromised the renderer process to perform arbitrary read/write via a crafted HTML page. (Chromium security severity: High)
CWE: CWE-472
GitHub-GHSA

MEDIUM
next-intl has prototype pollution with `experimental.messages.precompile` via attacker-controlled translation catalog keys
GHSA-4c35-wcg5-mm9h
pkg: next-intl
eco: npm
published: May 6, 2026
## Summary

`setNestedProperty` in `packages/next-intl/src/extractor/utils.tsx` walks a dotted key path and assigns the final value without blocking the reserved keys `__proto__`, `constructor`, or `prototype`. When the next-intl Next.js plugin is configured with `experimental.messages` and `message…

GitHub-GHSA

MEDIUM
in-toto-golang and in-toto-python have inconsistent negation behavior
GHSA-pmwq-pjrm-6p5r
pkg: github.com/in-toto/in-toto-golang
eco: go
published: May 8, 2026
### Impact
_What kind of vulnerability is it? Who is impacted?_

in-toto-golang and in-toto-python both support glob patterns in artifact rules to indicate the artifacts that a rule applies to. Both support negations in character classes to indicate what should *not* be matched, but they used differ…

GitHub-GHSA

MEDIUM
ciguard: SCA HTTP client reads response body without size cap
GHSA-xw8c-rrvx-f7xq
pkg: ciguard
eco: pip
published: May 5, 2026
## Summary

Both SCA HTTP clients (`src/ciguard/analyzer/sca/osv.py` and `src/ciguard/analyzer/sca/endoflife.py`) call `payload = json.loads(resp.read().decode('utf-8'))` without a maximum-bytes cap. A hostile or compromised endoflife.date / OSV.dev (or a successful TLS MITM) could return a multi-GB…

CVE-2026-44219
GitHub-GHSA

MEDIUM
Mistune has XSS via unescaped figclass/figwidth in Figure directive
GHSA-58cw-g322-p94v
pkg: mistune
eco: pip
published: May 8, 2026
In `src/mistune/directives/image.py`, the `render_figure()` function concatenates `figclass` and `figwidth` options directly into HTML attributes without escaping (lines 152-168).

This allows attribute injection and XSS even when `HTMLRenderer(escape=True)` is used, because these values bypass the …

CVE-2026-44896
GitHub-GHSA

MEDIUM
eml_parser has recursion DoS via nested message/rfc822 attachments
GHSA-g47v-rwmh-r9f8
pkg: eml_parser
eco: pip
published: May 8, 2026
### Summary

`EmlParser.get_raw_body_text()` recurses unconditionally for every nested `message/rfc822` attachment without any depth limit. An attacker who can supply a badly crafted EML file with approximately 120 nested `message/rfc822` parts triggers an unhandled `RecursionError` and aborts parsi…

CVE-2026-44844
GitHub-GHSA

MEDIUM
@cyclonedx/cdxgen: Docker registry auth substring match forwards credentials to a different registry
GHSA-qhh4-458h-xwh2
pkg: @cyclonedx/cdxgen
eco: npm
published: May 8, 2026
# Docker registry auth substring match forwards credentials to a different registry

## Repository

`cdxgen/cdxgen`

## Affected product/package

– Ecosystem: npm
– Package: `@cyclonedx/cdxgen`
– Reviewed tree version: `12.3.3`
– Reviewed commit: `b1e179869fd7c6032c3d483c3f7bd4d7154ec22b`
– Affected…

GitHub-GHSA

MEDIUM
MCP Registry has an unauthenticated SSRF: HTTP namespace verification dials 6to4 / NAT64 / site-local IPv6 addresses, bypassing private-address allowlist
GHSA-r48c-v28r-pf6v
pkg: github.com/modelcontextprotocol/registry
eco: go
published: May 8, 2026
### Summary

The Registry's HTTP-based namespace verification (`POST /v0/auth/http`, `POST /v0.1/auth/http`) uses `safeDialContext` (`internal/api/handlers/v0/auth/http.go:67-110`) to refuse dialling private/internal addresses when fetching the well-known public-key file from a publisher-supplied do…

CVE-2026-44430
GitHub-GHSA

MEDIUM
MCP Registry vulnerable to stored XSS in catalogue UI via attribute-quote breakout in publisher-controlled `websiteUrl`
GHSA-rqv2-m695-f8j4
pkg: github.com/modelcontextprotocol/registry
eco: go
published: May 8, 2026
## Summary

The public catalogue UI served at `GET /` (file `internal/api/handlers/v0/ui_index.html`) is vulnerable to stored cross-site scripting via the `server.websiteUrl` field of any published `server.json`. Server-side validation in `internal/validators/validators.go` (`validateWebsiteURL`) on…

CVE-2026-44429
GitHub-GHSA

MEDIUM
MCP Registry has open redirect via protocol-relative path in trailing-slash middleware
GHSA-v8vw-gw5j-w7m6
pkg: github.com/modelcontextprotocol/registry
eco: go
published: May 8, 2026
### Summary
The TrailingSlashMiddleware in internal/api/server.go is vulnerable to an open redirect attack. An attacker can craft a URL with a protocol-relative path (e.g., //evil.com/) that, after trailing slash removal, results in a Location header of //evil.com — which browsers interpret as an …
CVE-2026-44427
GitHub-GHSA

MEDIUM
rust-openssl vulnerable to heap buffer overflow when encrypting with AES key-wrap-with-padding
GHSA-xv59-967r-8726
pkg: openssl
eco: rust
published: May 7, 2026
`CipherCtxRef::cipher_update`, `CipherCtxRef::cipher_update_vec`, and `symm::Crypter::update` incorrectly sized output buffers when used with AES key-wrap-with-padding ciphers (`EVP_aes_{128,192,256}_wrap_pad`). For a non-multiple-of-8 input, OpenSSL writes up to 7 bytes past the end of the caller's…
CVE-2026-44662
GitHub-GHSA

MEDIUM
gittuf's policy can be rolled back to prior valid versions
GHSA-vxvc-cg7j-rwqj
pkg: github.com/gittuf/gittuf
eco: go
published: May 7, 2026
## Summary

An attacker with push access to gittuf's Reference State Log (RSL) can roll back the current policy to any previous policy trusted by the current set of root keys.

## Impact

gittuf determines the policy to load by inspecting the RSL. Except for the very first policy (which is automatic…

CVE-2026-44544
GitHub-GHSA

MEDIUM
imageproc: integer overflow in kernel size check leads to out-of-bounds read
GHSA-w5p8-4jcx-2j6r
pkg: imageproc, imageproc, imageproc
eco: rust
published: May 7, 2026
A bounds verification of a slice storage of a 2-dimensional matrix's coefficients (a kernel) would compare the total size against the product of individual dimensions. This would erroneously cast *after* the multiplication and consequently fail to detect possible violations when overflow occurs.

Af…

GitHub-GHSA

MEDIUM
imageproc: Out-of-bounds read via NaN coordinates in bilinear/bicubic sampling
GHSA-qg8r-f7x3-25f7
pkg: imageproc, imageproc, imageproc
eco: rust
published: May 7, 2026
A bounds check was performed in floating points before a cast to the index passed to an unchecked access function. This checked considered `NaN` cases improperly, causing them to succeed the check instead of failing it. The floating point coordinate is under caller control by passing a selected proj…
GitHub-GHSA

MEDIUM
imageproc has fragile bounds check when sampling from image
GHSA-5qv7-j6w5-fr4m
pkg: imageproc, imageproc, imageproc
eco: rust
published: May 7, 2026
A read of pixels was coded as modifying coordinates to lie within the image bounds. It would calculate a coordinate by adding a constant to an input and taking the minimum of the resulting coordinate and 'dimension – 1'. This would not protect against malicious inputs that could overflow the additio…
GitHub-GHSA

MEDIUM
hickory-proto vulnerable to CPU exhaustion during message encoding due to O(n²) name compression
GHSA-q2qq-hmj6-3wpp
pkg: hickory-proto
eco: rust
published: May 7, 2026
During message encoding, `hickory-proto`'s `BinEncoder` stores pointers to labels that are candidates for name compression in a `Vec<(usize, Vec<u8>)>`. The name compression logic then searches for matches with a linear scan.

A malicious message with many records can both introduce many candidate l…

GitHub-GHSA

MEDIUM
wasmtime has a panic when allocating a table exceeding the size of the host's address space
GHSA-p8xm-42r7-89xg
pkg: wasmtime, wasmtime
eco: rust
published: May 7, 2026
### Impact

Wasmtime's allocation logic for a WebAssembly table contained checked arithmetic which panicked on overflow. This overflow is possible to trigger, and thus panic, when a table with an extremely large size is allocated. This is possible with the WebAssembly memory64 proposal where tables …

CVE-2026-44216
GitHub-GHSA

MEDIUM
Spring Cloud AWS missing SNS message signature verification allows spoofing of HTTP/HTTPS endpoint notifications
GHSA-r4w4-wv68-qv85
pkg: io.awspring.cloud:spring-cloud-aws-sns, io.awspring.cloud:spring-cloud-aws-sns
eco: maven
published: May 7, 2026
### Impact

Applications using Spring Cloud AWS SNS HTTP/HTTPS endpoint support (@NotificationMessageMapping, @NotificationSubscriptionMapping, @NotificationUnsubscribeConfirmationMapping) did not verify the signature of incoming SNS messages.

An unauthenticated attacker who knows the endpoint …

CVE-2026-44308
GitHub-GHSA

MEDIUM
Lemmy resend-verification endpoint exposes registered email addresses to unauthenticated users
GHSA-qxrw-f6fh-34r7
pkg: lemmy_api
eco: rust
published: May 6, 2026
## Summary

The unauthenticated resend-verification endpoint returns different responses for registered and unregistered email addresses. A malicious third party can submit candidate addresses to `/api/v4/account/auth/resend_verification_email` and distinguish accounts from misses.

## Details

`res…

GitHub-GHSA

MEDIUM
Playwright Capture permits access to local files and internal network resources during page capture
GHSA-687h-xw6f-q2qw
pkg: PlaywrightCapture
eco: pip
published: May 6, 2026
Playwright Capture did not sufficiently restrict navigations and resource requests initiated by rendered pages. An attacker-controlled page could abuse browser-side redirection mechanisms, such as window.location.href, to make the capture process open file:// URLs or request resources hosted on priv…
CVE-2026-44439
GitHub-GHSA

MEDIUM
Angular SSR has Open Redirect and Request Steering via Encoded X-Forwarded-Prefix
GHSA-69xr-m8h6-h664
pkg: @angular/ssr, @angular/ssr, @angular/ssr
eco: npm
published: May 6, 2026
### Description
A vulnerability exists in the `X-Forwarded-Prefix` header processing logic within Angular SSR. The internal validation mechanism fails to properly account for URL-encoded characters, specifically dots (`%2e%2e`). This allows an attacker to bypass security filters by injecting encoded…
CVE-2026-44437
GitHub-GHSA

MEDIUM
kanidmd_lib: Image upload validators run before authorization; PNG validator panics on malformed input
GHSA-84jc-3hj2-hwc7
pkg: kanidmd_lib
eco: rust
published: May 6, 2026
### Summary
The `POST /v1/domain/_image` and `POST /v1/oauth2/{rs_name}/_image` handlers call `validate_image()` on the uploaded body **before** the ACL check that restricts image upload to admins. Any bug in an image validator is therefore reachable by an unauthenticated remote client rather than b…
GitHub-GHSA

MEDIUM
Nitro has an Open Redirect via Protocol-Relative URL Bypass in Wildcard Route Rules
GHSA-9phm-9p8f-hw5m
pkg: nitro, nitropack
eco: npm
published: May 6, 2026
A redirect route rule like:

“`ts
routeRules: {
"/legacy/**": { redirect: "/**" }
}
“`

is intended to rewrite paths within the same host. Before the patch, an attacker could turn the rewrite into a cross-host redirect by sliding an extra slash in after the rule prefix. Example exploit:

“`
GET…

CVE-2026-44372
GitHub-GHSA

MEDIUM
pyquorum: Timing side‑channel in mul_mod
GHSA-7r92-3jgr-r65q
pkg: pyquorum
eco: pip
published: May 6, 2026
### Impact
The `mul_mod` function implements multiplication via a binary expansion loop whose execution time depends on the Hamming weight of the second operand (the exponent). An attacker who can measure the time of secret‑sharing operations (e.g., via a remote service) could progressively recove…
CVE-2026-44368
GitHub-GHSA

MEDIUM
misp-modules has nsafe remote resource fetching in expansion
GHSA-fhq3-2gf3-8f3j
pkg: misp-modules
eco: pip
published: May 6, 2026
An unsafe remote resource fetching vulnerability existed in MISP Modules expansion modules. The html_to_markdown module accepted arbitrary HTTP(S) URLs without sufficient validation, which could allow Server-Side Request Forgery against loopback, private, or link-local network resources. Additionall…
CVE-2026-44363
GitHub-GHSA

MEDIUM
Hugo's Node tool execution allows file system access outside the project directory
GHSA-x597-9fr4-5857
pkg: github.com/gohugoio/hugo
eco: go
published: May 6, 2026
## Impact
When building a Hugo site that uses Node-based asset pipelines (PostCSS, Babel, TailwindCSS), Hugo invoked the configured Node tools without restrictions on file system access. As a result, executing hugo against an untrusted site could allow code running through these tools to read or wr…
CVE-2026-44301
GitHub-GHSA

MEDIUM
astral-tokio-tar is Vulnerable to PAX Header Desynchronization
GHSA-fp55-jw48-c537
pkg: astral-tokio-tar
eco: rust
published: May 6, 2026
### Impact

Versions of astral-tokio-tar prior to 0.6.1 contain a PAX header interpretation bug that allows manipulated entries to be made selectively visible or invisible during extraction with astral-tokio-tar versus other tar implementations. An attacker could use this differential to smuggle une…

GitHub-GHSA

MEDIUM
Tauri has an Origin Confusion Issue that Allows Remote Pages to Invoke Local-Only IPC Commands
GHSA-7gmj-67g7-phm9
pkg: tauri
eco: rust
published: May 6, 2026
### Summary
A flaw in Tauri's `is_local_url()` function causes it to incorrectly classify remote URLs as trusted local origins on Windows and Android. On these systems, Tauri maps custom URI scheme protocols to `http://<scheme>.localhost/` because those platforms' WebView implementations cannot serv…
CVE-2026-42184
GitHub-GHSA

MEDIUM
sse-channel: SSE Injection via unsanitized event fields
GHSA-84hm-wfh8-c5pg
pkg: sse-channel
eco: npm
published: May 5, 2026
### Impact

Implementations that allows user-provided values to be passed to `event`, `retry` or `id` fields would be susceptible to event spoofing, where an attacker could inject arbitrary messages into the stream.

– **Event Spoofing:** Attacker can inject arbitrary SSE events into the stream
– **…

CVE-2026-44217
GitHub-GHSA

MEDIUM
Prometheus vulnerable to stored XSS via crafted histogram bucket label values in the old web UI heatmap display
GHSA-fw8g-cg8f-9j28
pkg: github.com/prometheus/prometheus
eco: go
published: May 5, 2026
### Impact

In the Prometheus server's legacy web UI (enabled via the command-line flag `–enable-feature=old-ui`), the histogram heatmap chart view does not escape `le` label values when inserting them into the HTML for use as axis tick mark labels.

An attacker who can inject crafted metrics (e.g.…

GitHub-GHSA

MEDIUM
ip-address has XSS in Address6 HTML-emitting methods
GHSA-v2v4-37r5-5v8g
pkg: ip-address
eco: npm
published: May 5, 2026
### Summary

`Address6.group()` and `Address6.link()` do not HTML-escape attacker-controlled content before embedding it in the HTML strings they return, and `AddressError.parseMessage` (emitted by the `Address6` constructor for invalid input) can contain unescaped attacker-controlled content in one…

CVE-2026-42338
GitHub-GHSA

MEDIUM
PocketBase vulnerable to account pre-hijacking via OAuth2 unverfied->verified autolinking upgrade
GHSA-pq7p-mc74-g65w
pkg: github.com/pocketbase/pocketbase, github.com/pocketbase/pocketbase
eco: go
published: May 5, 2026
A pre-hijacking issue was discovered with the OAuth2 autolinking by [Alardiians](https://github.com/Alardiians).

In some situations, if an attacker knows the email address of the victim they can create and link an **unverified** PocketBase user in advance by authenticating with one of the OAuth2 ap…

CVE-2026-44166
GitHub-GHSA

MEDIUM
Ethyca Fides has a Privacy Request Identity Verification Bypass Vulnerability via Duplicate Detection
GHSA-qx5f-ghc2-7g5c
pkg: ethyca-fides
eco: pip
published: May 5, 2026
### Summary

Fides deployments that enable both subject identity verification and duplicate privacy request detection are affected by a vulnerability in which an administrator can approve a privacy request whose identity was never verified. For erasure policies, this can result in unauthorized delet…

CVE-2026-42303
GitHub-GHSA

MEDIUM
Fiber vulnerable to XSS in AutoFormat Content Negotiation
GHSA-qjv7-627w-8qjv
pkg: github.com/gofiber/fiber/v3, github.com/gofiber/fiber/v2
eco: go
published: May 5, 2026
## Summary

**Description**

A Cross-Site Scripting (CWE-79) vulnerability in Go Fiber allows a remote attacker to inject arbitrary HTML/JavaScript by supplying `Accept: text/html` on any request whose handler passes attacker-influenced data to the AutoFormat() feature. This affects `github.com/gofi…

CVE-2026-42554
GitHub-GHSA

MEDIUM
MinIO vulnerable to Path Traversal via msgpack Body in `ReadMultiple` Storage-REST Endpoint
GHSA-xh8f-g2qw-gcm7
pkg: github.com/minio/minio
eco: go
published: May 5, 2026
### Impact

_What kind of vulnerability is it? Who is impacted?_

A path traversal vulnerability in MinIO's `ReadMultiple` internode storage-REST
endpoint allows a caller holding the cluster root JWT to read files from
outside the configured drive roots, bounded only by the MinIO process UID.

Distr…

CVE-2026-42600
GitHub-GHSA

MEDIUM
net-imap vulnerable to command Injection via "raw" arguments to multiple commands
GHSA-hm49-wcqc-g2xg
pkg: net-imap, net-imap, net-imap
eco: rubygems
published: May 4, 2026
### Summary
Several `Net::IMAP` commands accept a raw string argument that is sent to the server without validation or escaping. If this string is derived from user-controlled input, it may contain contain `CRLF` sequences, which an attacker can use to inject arbitrary IMAP commands.

### Details

CVE-2026-42257
GitHub-GHSA

MEDIUM
net-imap vulnerable to command Injection via unvalidated Symbol inputs
GHSA-75xq-5h9v-w6px
pkg: net-imap, net-imap, net-imap
eco: rubygems
published: May 4, 2026
### Summary

Symbol arguments to commands are vulnerable to a CRLF Injection / IMAP Command injection via Symbol arguments passed to IMAP commands.

### Details

Symbol arguments represent IMAP "system flags", which are formatted as "atoms" (with no quoting) with a `"\"` prefix. Vulnerable versions…

CVE-2026-42258
GitHub-GHSA

MEDIUM
net-imap vulnerable to denial of service via high iteration count for `SCRAM-*` authentication
GHSA-87pf-fpwv-p7m7
pkg: net-imap, net-imap, net-imap
eco: rubygems
published: May 4, 2026
### Summary

When authenticating a connection with `SCRAM-SHA1` or `SCRAM-SHA256`, a hostile server can perform a computational denial-of-service attack on the client process by sending a big iteration count value.

### Details

A hostile IMAP server can send an arbitrarily large PBKDF2 iteration co…

CVE-2026-42256
GitHub-GHSA

MEDIUM
quarkus-openapi-generator has overly broad path-parameter matching that sends authentication headers to unintended operations
GHSA-fr8f-rwjx-f32v
pkg: io.quarkiverse.openapi.generator:quarkus-openapi-generator, io.quarkiverse.openapi.generator:quarkus-openapi-generator
eco: maven
published: May 4, 2026
### Summary

The generated authentication filter matches OpenAPI path templates too broadly when deciding whether to attach credentials. A security scheme configured for one operation can therefore be applied to a different same-method operation whose path only partially resembles the protected temp…

CVE-2026-42333
GitHub-GHSA

MEDIUM
OpenClaw's Gateway Control UI bootstrap config required Gateway auth
GHSA-93rg-2xm5-2p9v
pkg: openclaw
eco: npm
published: May 4, 2026
## Summary
Gateway Control UI bootstrap config required Gateway auth.

## Affected Packages / Versions
– Package: openclaw (npm)
– Affected versions: <= 2026.4.21
– Fixed version: 2026.4.22

## Impact
When Gateway authentication was enabled, the Control UI bootstrap config endpoint could still be re…

GitHub-GHSA

MEDIUM
OpenClaw: OpenShell FS bridge reads pin and verify the opened file before returning bytes
GHSA-5h3g-6xhh-rg6p
pkg: openclaw
eco: npm
published: May 4, 2026
## Summary
OpenShell FS bridge reads pin and verify the opened file before returning bytes

## Affected Packages / Versions
– Package: openclaw (npm)
– Affected versions: <= 2026.4.21
– Fixed version: 2026.4.22

## Impact
A time-of-check/time-of-use race around OpenShell sandbox filesystem reads cou…

GitHub-GHSA

MEDIUM
jOpenDocument has an improper restriction of XML external entity reference vulnerability
GHSA-j9rh-p96m-mhhp
pkg: org.jopendocument:jOpenDocument
eco: maven
published: May 4, 2026
Improper restriction of XML external entity reference vulnerability in ILM Informatique jOpenDocument allows Data Serialization External Entities Blowup.

This issue affects jOpenDocument: 1.5.

CVE-2026-6501