Vulnerability Digest — April 11, 2026 · 54 Critical · 2 Exploited






Vulnerability Digest — Saturday, April 11, 2026


Security Report

Saturday, April 11, 2026  ·  Last 7 days  ·  Min severity: MEDIUM
Total Findings
401
Critical
54
High
157
Actively Exploited
2
CISA-KEV2
NVD100
GitHub-GHSA299
Findings sorted by severity
CISA-KEV

CRITICAL
Ivanti Endpoint Manager Mobile (EPMM) Code Injection Vulnerability
CVE-2026-1340
pkg: Ivanti Endpoint Manager Mobile (EPMM)

published: Apr 8, 2026

Ivanti Endpoint Manager Mobile (EPMM) contains a code injection vulnerability that could allow attackers to achieve unauthenticated remote code execution.
Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
CISA-KEV

CRITICAL
Fortinet FortiClient EMS Improper Access Control Vulnerability
CVE-2026-35616
pkg: Fortinet FortiClient EMS

published: Apr 6, 2026

Fortinet FortiClient EMS contains an improper access control vulnerability that may allow an unauthenticated attacker to execute unauthorized code or commands via crafted requests.
Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
GitHub-GHSA

CRITICAL
Daptin has Unauthenticated Path Traversal and Zip Slip
GHSA-9cp7-j3f8-p5jx
pkg: github.com/daptin/daptin
eco: go
published: Apr 10, 2026
### Impact
The `cloudstore.file.upload` action in `server/actions/action_cloudstore_file_upload.go` writes user-supplied filenames directly to disk without proper validation.

This allows unauthenticated attackers to perform path traversal and zip slip attacks, leading to arbitrary file write and p…

GitHub-GHSA

CRITICAL
paperclip Vulnerable to Unauthenticated Remote Code Execution via Import Authorization Bypass
GHSA-68qg-g8mg-6pr7
pkg: paperclipai, @paperclipai/server
eco: npm
published: Apr 10, 2026
## Summary

An unauthenticated attacker can achieve full remote code execution on any network-accessible Paperclip instance running in `authenticated` mode with default configuration. No user interaction, no credentials, just the target's address. The entire chain is six API calls.

## Steps to Repr…

GitHub-GHSA

CRITICAL
Juju: CloudSpec method leaking cloud credentials
GHSA-w5fq-8965-c969
pkg: github.com/juju/juju
eco: go
published: Apr 10, 2026
### Impact

If a user has login permission to a controller and knows the controller model UUID, they can call the CloudSpec method on the Controller facade and get cloud credentials used to bootstrap the controller.

The CloudSpec API is called by workers running in the controller to maintain connec…

CVE-2026-5412
NVD

CRITICAL
CVE-2026-40175
CVE-2026-40175
pkg: axios

published: Apr 10, 2026

Axios is a promise based HTTP client for the browser and Node.js. Prior to 1.15.0, the Axios library is vulnerable to a specific "Gadget" attack chain that allows Prototype Pollution in any third-party dependency to be escalated into Remote Code Execution (RCE) or Full Cloud Compromise (via AWS IMDS…
CWE: CWE-113, CWE-444, CWE-918
GitHub-GHSA

CRITICAL
Axios has Unrestricted Cloud Metadata Exfiltration via Header Injection Chain
GHSA-fvcv-3m26-pcqx
pkg: axios
eco: npm
published: Apr 10, 2026
# Vulnerability Disclosure: Unrestricted Cloud Metadata Exfiltration via Header Injection Chain

## Summary
The Axios library is vulnerable to a specific "Gadget" attack chain that allows **Prototype Pollution** in any third-party dependency to be escalated into **Remote Code Execution (RCE)** or **…

CVE-2026-40175
GitHub-GHSA

CRITICAL
PraisonAI has sandbox escape via exception frame traversal in `execute_code` (subprocess mode)
GHSA-qf73-2hrx-xprp
pkg: praisonaiagents
eco: pip
published: Apr 8, 2026
## Summary

`execute_code()` in `praisonaiagents.tools.python_tools` defaults to
`sandbox_mode="sandbox"`, which runs user code in a subprocess wrapped with a
restricted `__builtins__` dict and an AST-based blocklist. The AST blocklist
embedded inside the subprocess wrapper (`blocked_attrs`, line 14…

CVE-2026-39888
NVD

CRITICAL
CVE-2026-40089
CVE-2026-40089
pkg: docker

published: Apr 9, 2026

Sonicverse is a Self-hosted Docker Compose stack for live radio streaming. The Sonicverse Radio Audio Streaming Stack dashboard contains a Server-Side Request Forgery (SSRF) vulnerability in its API client (apps/dashboard/lib/api.ts). Installations created using the provided install.sh script (inclu…
CWE: CWE-918
NVD

CRITICAL
CVE-2026-23696
CVE-2026-23696
pkg: jwt

published: Apr 7, 2026

Windmill CE and EE versions 1.276.0 through 1.603.2 contain an SQL injection vulnerability in the folder ownership management functionality that allows authenticated attackers to inject SQL through the owner parameter. An attacker can use the injection to read sensitive data such as the JWT signing …
CWE: CWE-89
GitHub-GHSA

CRITICAL
PraisonAI has critical RCE via `type: job` workflow YAML
GHSA-vc46-vw85-3wvm
pkg: praisonaiagents, PraisonAI
eco: pip
published: Apr 10, 2026
`praisonai workflow run <file.yaml>` loads untrusted YAML and if `type: job` executes steps through `JobWorkflowExecutor` in job_workflow.py.

This supports:
– `run:` → shell command execution via `subprocess.run()`
– `script:` → inline Python execution via `exec()`
– `python:` → arbitrary Pyt…

GitHub-GHSA

CRITICAL
PraisonAI Vulnerable to Remote Code Execution via YAML Deserialization in Agent Definition Loading
GHSA-32vr-5gcf-3pw2
pkg: praisonai
eco: pip
published: Apr 8, 2026
## Summary
The `AgentService.loadAgentFromFile` method uses the `js-yaml` library to parse YAML files without disabling dangerous tags (such as `!!js/function` and `!!js/undefined`). This allows an attacker to craft a malicious YAML file that, when parsed, executes arbitrary JavaScript code. An atta…
CVE-2026-39890
GitHub-GHSA

CRITICAL
pgx contains memory-safety vulnerability
GHSA-xgrm-4fwx-7qm8
pkg: github.com/jackc/pgx/v5/pgproto3
eco: go
published: Apr 7, 2026
[pgx](github.com/jackc/pgx/v5) is a pure Go driver and toolkit for PostgreSQL. pgx v5.9.1 and earlier contain a memory-safety vulnerability.
CVE-2026-33815
NVD

CRITICAL
CVE-2026-35490
CVE-2026-35490
pkg: flask

published: Apr 7, 2026

changedetection.io is a free open source web page change detection tool. Prior to 0.54.8, the @login_optionally_required decorator is placed before (outer to) @blueprint.route() instead of after it. In Flask, @route() must be the outermost decorator because it registers the function it receives. Whe…
CWE: CWE-863
NVD

CRITICAL
CVE-2026-4277
CVE-2026-4277
pkg: django

published: Apr 7, 2026

An issue was discovered in 6.0 before 6.0.4, 5.2 before 5.2.13, and 4.2 before 4.2.30.
Add permissions on inline model instances were not validated on submission of
forged `POST` data in `GenericInlineModelAdmin`.
Earlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluat…
CWE: CWE-862
NVD

CRITICAL
CVE-2026-1114
CVE-2026-1114
pkg: jwt

published: Apr 7, 2026

In parisneo/lollms version 2.1.0, the application's session management is vulnerable to improper access control due to the use of a weak secret key for signing JSON Web Tokens (JWT). This vulnerability allows an attacker to perform an offline brute-force attack to recover the secret key. Once the se…
CWE: CWE-284
GitHub-GHSA

CRITICAL
changedetection.io Vulnerable to Authentication Bypass via Decorator Ordering
GHSA-jmrh-xmgh-x9j4
pkg: changedetection.io
eco: pip
published: Apr 6, 2026
### Summary

On 13 routes across 5 blueprint files, the `@login_optionally_required` decorator is placed **before** (outer to) `@blueprint.route()` instead of after it. In Flask, `@route()` must be the outermost decorator because it registers the function it receives. When the order is reversed, `@r…

CVE-2026-35490
NVD

CRITICAL
CVE-2026-34841
CVE-2026-34841
pkg: axios

published: Apr 6, 2026

Bruno is an open source IDE for exploring and testing APIs. Prior to 3.2.1, Bruno was affected by a supply chain attack involving compromised versions of the axios npm package, which introduced a hidden dependency deploying a cross-platform Remote Access Trojan (RAT). Users of @usebruno/cli who ran …
CWE: CWE-494, CWE-506
GitHub-GHSA

CRITICAL
PraisonAI Vulnerable to OS Command Injection
GHSA-2763-cj5r-c79m
pkg: PraisonAI
eco: pip
published: Apr 8, 2026
The `execute_command` function and workflow shell execution are exposed to user-controlled input via agent workflows, YAML definitions, and LLM-generated tool calls, allowing attackers to inject arbitrary shell commands through shell metacharacters.

## Description

PraisonAI's workflow system …

CVE-2026-40088
GitHub-GHSA

CRITICAL
parisneo/lollms vulnerable to stored XSS in the social feature
GHSA-8wrq-fv5f-pfp2
pkg: lollms
eco: pip
published: Apr 10, 2026
A Stored Cross-Site Scripting (XSS) vulnerability was identified in the social feature of parisneo/lollms, affecting the latest version prior to 2.2.0. The vulnerability exists in the `create_post` function within `backend/routers/social/__init__.py`, where user-provided content is directly assigned…
CVE-2026-1115
GitHub-GHSA

CRITICAL
@delmaredigital/payload-puc is missing authorization on /api/puck/* CRUD endpoints allows unauthenticated access to Puck-registered collections
GHSA-65w6-pf7x-5g85
pkg: @delmaredigital/payload-puck
eco: npm
published: Apr 8, 2026
### Impact

All `/api/puck/*` CRUD endpoint handlers registered by `createPuckPlugin()` called Payload's local API with the default `overrideAccess: true`, bypassing all collection-level access control. The `access` option passed to `createPuckPlugin()` and any `access` rules defined on Puck-registe…

CVE-2026-39397
GitHub-GHSA

CRITICAL
PraisonAI Vulnerable Untrusted Remote Template Code Execution
GHSA-pv9q-275h-rh7x
pkg: PraisonAI
eco: pip
published: Apr 10, 2026
PraisonAI treats remotely fetched template files as trusted executable code without integrity verification, origin validation, or user confirmation, enabling supply chain attacks through malicious templates.

## Description

When a user installs a template from a remote source (e.g., GitHub), P…

CVE-2026-40154
GitHub-GHSA

CRITICAL
gramps-webapi: Zip Slip Path Traversal in Media Archive Import
GHSA-m5gr-86j6-99jp
pkg: gramps-webapi
eco: pip
published: Apr 10, 2026
## Summary

A path traversal vulnerability (Zip Slip) exists in the media archive import feature. An authenticated user with owner-level privileges can craft a malicious ZIP file with directory-traversal filenames to write arbitrary files outside the intended temporary extraction directory on the se…

CVE-2026-40258
GitHub-GHSA

CRITICAL
nimiq-blockchain is missing a wall-clock upper bound on block timestamps
GHSA-49xc-52mp-cc9j
pkg: nimiq-blockchain
eco: rust
published: Apr 10, 2026
### Impact

Block timestamp validation enforces that `timestamp >= parent.timestamp` for non-skip blocks and `timestamp == parent.timestamp + MIN_PRODUCER_TIMEOUT` for skip blocks, but there is no visible upper bound check against the wall clock. A malicious block-producing validator can set block t…

CVE-2026-40093
GitHub-GHSA

CRITICAL
PraisonAI Browser Server allows unauthenticated WebSocket clients to hijack connected extension sessions
GHSA-8x8f-54wf-vv92
pkg: praisonaiagents, PraisonAI
eco: pip
published: Apr 10, 2026
### Summary
`praisonai browser start` exposes the browser bridge on `0.0.0.0` by default, and its `/ws` endpoint accepts websocket clients that omit the `Origin` header entirely. An unauthenticated network client can connect as a fake controller, send `start_session`, cause the server to forward `st…
GitHub-GHSA

CRITICAL
LXD: VM lowlevel restriction bypass via raw.apparmor and raw.qemu.conf
GHSA-fm2x-c5qw-4h6f
pkg: github.com/canonical/lxd
eco: go
published: Apr 10, 2026
## Summary

The `isVMLowLevelOptionForbidden` function in `lxd/project/limits/permissions.go` is missing `raw.apparmor` and `raw.qemu.conf` from its hardcoded forbidden list. A user with `can_edit` permission on a VM instance in a restricted project can combine these two omissions to bridge the LXD …

CVE-2026-34177
GitHub-GHSA

CRITICAL
LXD: Importing a crafted backup leads to project restriction bypass
GHSA-q96j-3fmm-7fv4
pkg: github.com/canonical/lxd
eco: go
published: Apr 10, 2026
## Summary

LXD instance backup import validates project restrictions against `backup/index.yaml` embedded in the tar archive, but creates the actual instance from `backup/container/backup.yaml` extracted to the storage volume. Because these are separate, independently attacker-controlled files with…

CVE-2026-34178
GitHub-GHSA

CRITICAL
LXD: Update of type field in restricted TLS certificate allows privilege escalation to cluster admin
GHSA-c3h3-89qf-jqm5
pkg: github.com/canonical/lxd
eco: go
published: Apr 10, 2026
### Summary

A restricted TLS certificate user can escalate to cluster admin by changing their certificate type from `client` to `server` via PUT/PATCH to `/1.0/certificates/{fingerprint}`. The non-admin guard and reset block in `doCertificateUpdate` fail to validate or reset the `Type` field, allow…

CVE-2026-34179
GitHub-GHSA

CRITICAL
Apache Tomcat: CLIENT_CERT authentication does not fail as expected
GHSA-95jq-rwvf-vjx4
pkg: org.apache.tomcat:tomcat-catalina, org.apache.tomcat:tomcat-catalina, org.apache.tomcat:tomcat-catalina
eco: maven
published: Apr 9, 2026
CLIENT_CERT authentication does not fail as expected for some scenarios when soft fail is disabled vulnerability in Apache Tomcat, Apache Tomcat Native.

This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.18, from 10.1.0-M7 through 10.1.52, from 9.0.83 through 9.0.115; Apache Tomcat Nativ…

CVE-2026-29145
NVD

CRITICAL
CVE-2026-29145
CVE-2026-29145
pkg: apache

published: Apr 9, 2026

CLIENT_CERT authentication does not fail as expected for some scenarios when soft fail is disabled vulnerability in Apache Tomcat, Apache Tomcat Native.

This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.18, from 10.1.0-M7 through 10.1.52, from 9.0.83 through 9.0.115; Apache Tomcat Nativ…

CWE: CWE-287
GitHub-GHSA

CRITICAL
Apache Airflow: JWT token still valid after logout
GHSA-c92r-g8j5-vhcx
pkg: apache-airflow
eco: pip
published: Apr 9, 2026
When user logged out, the JWT token the user had authtenticated with was not invalidated, which could lead to reuse of that token in case it was intercepted. In Airflow 3.2 we implemented the mechanism that implements token invalidation at logout. Users who are concerned about the logout scenario an…
CVE-2025-57735
NVD

CRITICAL
CVE-2025-57735
CVE-2025-57735
pkg: jwt

published: Apr 9, 2026

When user logged out, the JWT token the user had authtenticated with was not invalidated, which could lead to reuse of that token in case it was intercepted. In Airflow 3.2 we implemented the mechanism that implements token invalidation at logout. Users who are concerned about the logout scenario an…
CWE: CWE-613
NVD

CRITICAL
CVE-2026-34179
CVE-2026-34179
pkg: tls

published: Apr 9, 2026

In Canonical LXD versions 4.12 through 6.7, the doCertificateUpdate function in lxd/certificates.go does not validate the Type field when handling PUT/PATCH requests to /1.0/certificates/{fingerprint} for restricted TLS certificate users, allowing a remote authenticated attacker to escalate privileg…
CWE: CWE-915
NVD

CRITICAL
CVE-2026-40035
CVE-2026-40035
pkg: flask

published: Apr 8, 2026

Unfurl through 2025.08 contains an improper input validation vulnerability in config parsing that enables Flask debug mode by default. The debug configuration value is read as a string and passed directly to app.run(), causing any non-empty string to evaluate truthy, allowing attackers to access the…
CWE: CWE-489
GitHub-GHSA

CRITICAL
SiYuan: Remote Code Execution in the Electron desktop client via stored XSS in synced table captions
GHSA-phhp-9rm9-6gr2
pkg: github.com/siyuan-note/siyuan/kernel
eco: go
published: Apr 8, 2026
### Summary
A malicious note synced to another user can trigger remote code execution in the SiYuan Electron desktop client. The root cause is that table caption content is stored without safe escaping and later unescaped into rendered HTML, creating a stored XSS sink. Because the desktop renderer r…
CVE-2026-39846
GitHub-GHSA

CRITICAL
Emmett has a path traversal in internal assets handler
GHSA-pr46-2v3c-5356
pkg: emmett
eco: pip
published: Apr 8, 2026
The RSGI static handler for Emmett's internal assets (`/__emmett__` paths) is vulnerable to path traversal attacks.

An attacker can use `../` sequences (eg `/__emmett__/../rsgi/handlers.py`) to read arbitrary files outside the assets directory.

CVE-2026-39847
GitHub-GHSA

CRITICAL
Emissary has GitHub Actions Shell Injection via Workflow Inputs
GHSA-3g6g-gq4r-xjm9
pkg: gov.nsa.emissary:emissary
eco: maven
published: Apr 8, 2026
## Summary

Three GitHub Actions workflow files contained **10 shell injection points** where
user-controlled `workflow_dispatch` inputs were interpolated directly into shell
commands via `${{ }}` expression syntax. An attacker with repository write access
could inject arbitrary shell commands, lead…

CVE-2026-35580
NVD

CRITICAL
CVE-2026-28386
CVE-2026-28386
pkg: tls

published: Apr 7, 2026

Issue summary: Applications using AES-CFB128 encryption or decryption on
systems with AVX-512 and VAES support can trigger an out-of-bounds read
of up to 15 bytes when processing partial cipher blocks.

Impact summary: This out-of-bounds read may trigger a crash which leads to
Denial of Service for …

CWE: CWE-125
NVD

CRITICAL
CVE-2026-35573
CVE-2026-35573
pkg: churchcrm churchcrm

published: Apr 7, 2026

ChurchCRM is an open-source church management system. Prior to 6.5.3, a path traversal vulnerability in ChurchCRM's backup restore functionality allows authenticated administrators to upload arbitrary files and achieve remote code execution by overwriting Apache .htaccess configuration files. The vu…
CWE: CWE-22, CWE-434
NVD

CRITICAL
CVE-2026-35580
CVE-2026-35580
pkg: express

published: Apr 7, 2026

Emissary is a P2P based data-driven workflow engine. Prior to 8.39.0, GitHub Actions workflow files contained shell injection points where user-controlled workflow_dispatch inputs were interpolated directly into shell commands via ${{ }} expression syntax. An attacker with repository write access co…
CWE: CWE-77
NVD

CRITICAL
CVE-2026-35030
CVE-2026-35030
pkg: litellm litellm

published: Apr 6, 2026

LiteLLM is a proxy server (AI Gateway) to call LLM APIs in OpenAI (or native) format. Prior to 1.83.0, when JWT authentication is enabled (enable_jwt_auth: true), the OIDC userinfo cache uses token[:20] as the cache key. JWT headers produced by the same signing algorithm generate identical first 20 …
CWE: CWE-287
NVD

CRITICAL
CVE-2026-34950
CVE-2026-34950
pkg: jwt

published: Apr 6, 2026

fast-jwt provides fast JSON Web Token (JWT) implementation. In 6.1.0 and earlier, the publicKeyPemMatcher regex in fast-jwt/src/crypto.js uses a ^ anchor that is defeated by any leading whitespace in the key string, re-enabling the exact same JWT algorithm confusion attack that CVE-2023-48223 patche…
CWE: CWE-327
GitHub-GHSA

CRITICAL
PraisonAI Vulnerable to Arbitrary File Write / Path Traversal in Action Orchestrator
GHSA-jfxc-v5g9-38xr
pkg: PraisonAI
eco: pip
published: Apr 6, 2026
The Action Orchestrator feature contains a Path Traversal vulnerability that allows an attacker (or compromised agent) to write to arbitrary files outside of the configured workspace directory. By supplying relative path segments (`../`) in the target path, malicious actions can overwrite sensitive …
CVE-2026-39305
GitHub-GHSA

CRITICAL
goshs has a file-based ACL authorization bypass in goshs state-changing routes
GHSA-wvhv-qcqf-f3cx
pkg: github.com/patrickhener/goshs
eco: go
published: Apr 10, 2026
### Summary
goshs enforces the documented per-folder `.goshs` ACL/basic-auth mechanism for directory listings and file reads, but it does not enforce the same authorization checks for state-changing routes. An unauthenticated attacker can upload files with `PUT`, upload files with multipart `POST /u…
CVE-2026-40189
GitHub-GHSA

CRITICAL
ajenti.plugin.core has password bypass when 2FA is activated
GHSA-3mcx-6wxm-qr8v
pkg: ajenti.plugin.core
eco: pip
published: Apr 10, 2026
### Impact

If the 2FA was activated, it was possible to bypass the password authentication

### Patches

This is fixed in the version 0.112. Users should upgrade to this version as soon as possible.

CVE-2026-40177
GitHub-GHSA

CRITICAL
PraisonAI vulnerable to arbitrary file write via path traversal in `praisonai recipe unpack`
GHSA-99g3-w8gr-x37c
pkg: PraisonAI
eco: pip
published: Apr 10, 2026
| Field | Value |
|—|—|
| Severity | Critical |
| Type | Path traversal — arbitrary file write via `tar.extract()` without member validation |
| Affected | `src/praisonai/praisonai/cli/features/recipe.py:1170-1172` |

## Summary

`cmd_unpack` in the recipe CLI extracts `.praison` tar archives u…

CVE-2026-40157
GitHub-GHSA

CRITICAL
PraisonAIAgents has an OS Command Injection via shell=True in Memory Hooks Executor (memory/hooks.py)
GHSA-v7px-3835-7gjx
pkg: praisonaiagents
eco: pip
published: Apr 10, 2026
Summary

The memory hooks executor in praisonaiagents passes a user-controlled command string
directly to subprocess.run() with shell=True at
src/praisonai-agents/praisonaiagents/memory/hooks.py lines 303 to 305.
No sanitization, no shlex.quote(), no character filter, and no allowlist check
exists a…

CVE-2026-40111
GitHub-GHSA

CRITICAL
Wasmtime with Winch compiler backend on aarch64 may allow a sandbox-escaping memory access
GHSA-xx5w-cvp6-jv83
pkg: wasmtime, wasmtime, wasmtime
eco: rust
published: Apr 10, 2026
### Impact

Wasmtime with its Winch (baseline) non-default compiler backend may allow properly constructed guest Wasm to access host memory outside of its linear-memory sandbox.

This vulnerability requires use of the Winch compiler (`-Ccompiler=winch`). By default, Wasmtime uses its Cranelift backe…

CVE-2026-34987
GitHub-GHSA

CRITICAL
Wasmtime: Miscompiled guest heap access enables sandbox escape on aarch64 Cranelift
GHSA-jhxm-h53p-jm7w
pkg: wasmtime, wasmtime, wasmtime
eco: rust
published: Apr 9, 2026
### Impact

Wasmtime's Cranelift compilation backend contains a bug on aarch64 when performing a certain shape of heap accesses which means that the wrong address is accessed. When combined with explicit bounds checks a guest WebAssembly module this can create a situation where there are two divergi…

CVE-2026-34971
GitHub-GHSA

CRITICAL
Axios has a NO_PROXY Hostname Normalization Bypass Leads to SSRF
GHSA-3p68-rc4w-qgx5
pkg: axios
eco: npm
published: Apr 9, 2026
Axios does not correctly handle hostname normalization when checking `NO_PROXY` rules.
Requests to loopback addresses like `localhost.` (with a trailing dot) or `[::1]` (IPv6 literal) skip `NO_PROXY` matching and go through the configured proxy.

This goes against what developers expect and lets att…

CVE-2025-62718
GitHub-GHSA

CRITICAL
Marimo: Pre-Auth Remote Code Execution via Terminal WebSocket Authentication Bypass
GHSA-2679-6mx9-h9xc
pkg: marimo
eco: pip
published: Apr 8, 2026
## Summary

Marimo (19.6k stars) has a Pre-Auth RCE vulnerability. The terminal WebSocket endpoint `/terminal/ws` lacks authentication validation, allowing an unauthenticated attacker to obtain a full PTY shell and execute arbitrary system commands.

Unlike other WebSocket endpoints (e.g., `/ws`) th…

CVE-2026-39987
GitHub-GHSA

CRITICAL
Rack::Session::Cookie secrets: decrypt failure fallback enables secretless session forgery and Marshal deserialization
GHSA-33qg-7wpp-89cq
pkg: rack-session
eco: rubygems
published: Apr 8, 2026
`Rack::Session::Cookie` incorrectly handles decryption failures when configured with `secrets:`. If cookie decryption fails, the implementation falls back to a default decoder instead of rejecting the cookie. This allows an unauthenticated attacker to supply a crafted session cookie that is accepted…
CVE-2026-39324
GitHub-GHSA

CRITICAL
OpenIdentityPlatform OpenAM: Pre-Authentication Remote Code Execution via `jato.clientSession` Deserialization in OpenAM
GHSA-2cqq-rpvq-g5qj
pkg: org.openidentityplatform.openam:openam
eco: maven
published: Apr 7, 2026
## Summary

OpenIdentityPlatform OpenAM 16.0.5 (and likely earlier versions) is vulnerable to pre-authentication Remote Code Execution (RCE) via unsafe Java deserialization of the `jato.clientSession` HTTP parameter. This bypasses the `WhitelistObjectInputStream` mitigation that was applied to the `…

CVE-2026-33439
GitHub-GHSA

CRITICAL
PraisonAI Has Path Traversal in FileTools
GHSA-693f-pf34-72c5
pkg: PraisonAI
eco: pip
published: Apr 6, 2026
### Executive Summary:
The path validation has a critical logic bug: it checks for `..` AFTER `normpath()` has already collapsed all `..` sequences. This makes the check completely useless and allows trivial path traversal to any file on the system.
The path validation function also does not resolve…
CVE-2026-35615
GitHub-GHSA

HIGH
mathjs Allows Improperly Controlled Modification of Dynamically-Determined Object Attributes
GHSA-jvff-x2qm-6286
pkg: mathjs
eco: npm
published: Apr 10, 2026
### Impact
Two security vulnerabilities where detected that allowed executing arbitrary JavaScript via the expression parser of mathjs. You can be affected when you have an application where users can evaluate arbitrary expressions using the mathjs expression parser.

### Patches
The problem is patc…

GitHub-GHSA

HIGH
PraisonAI: Hardcoded `approval_mode="auto"` in Chainlit UI Overrides Administrator Configuration, Enabling Unapproved Shell Command Execution
GHSA-qwgj-rrpj-75xm
pkg: PraisonAI
eco: pip
published: Apr 10, 2026
## Summary

The Chainlit UI modules (`chat.py` and `code.py`) hardcode `config.approval_mode = "auto"` after loading administrator configuration from the `PRAISON_APPROVAL_MODE` environment variable, silently overriding any "manual" or "scoped" approval setting. This defeats the human-in-the-loop ap…

GitHub-GHSA

HIGH
Duplicate Advisory: OpenClaw Gateway: RCE and Privilege Escalation from operator.pairing to operator.admin via device.pair.approve
GHSA-r3v5-2grc-429h
pkg: openclaw
eco: npm
published: Apr 10, 2026
### Duplicate Advisory
This advisory has been withdrawn because it is a duplicate of GHSA-hf68-49fm-59cq. This link is maintained to preserve external references.

### Original Description
OpenClaw before 2026.3.22 contains a privilege escalation vulnerability in the device.pair.approve method that …

NVD

HIGH
CVE-2026-39911
CVE-2026-39911
pkg: express

published: Apr 9, 2026

Hashgraph Guardian through version 3.5.0 contains an unsandboxed JavaScript execution vulnerability in the Custom Logic policy block worker that allows authenticated Standard Registry users to execute arbitrary code by passing user-supplied JavaScript expressions directly to the Node.js Function() c…
CWE: CWE-668
NVD

HIGH
CVE-2026-39891
CVE-2026-39891
pkg: express

published: Apr 8, 2026

PraisonAI is a multi-agent teams system. Prior to 4.5.115, the create_agent_centric_tools() function returns tools (like acp_create_file) that process file content using template rendering. When user input from agent.start() is passed directly into these tools without escaping, template expressions …
CWE: CWE-94
GitHub-GHSA

HIGH
AGiXT Vulnerable to Path Traversal in safe_join()
GHSA-5gfj-64gh-mgmw
pkg: agixt
eco: pip
published: Apr 8, 2026
### Summary
The safe_join() function in the essential_abilities extension fails to validate that resolved file paths remain within the designated agent workspace. An authenticated attacker can use directory traversal sequences to read, write, or delete arbitrary files on the server hosting the AGiXT…
CVE-2026-39981
GitHub-GHSA

HIGH
PraisonAI has Template Injection in Agent Tool Definitions
GHSA-hwg5-x759-7wjg
pkg: praisonai
eco: pip
published: Apr 8, 2026
## Summary
Direct insertion of unescaped user input into template-rendering tools allows arbitrary code execution via specially crafted agent instructions.
## Details
The `create_agent_centric_tools()` function returns tools (like `acp_create_file`) that process file content using template rendering…
CVE-2026-39891
GitHub-GHSA

HIGH
Apache Cassandra is vulnerable to privilege escalation in an mTLS environment using MutualTlsAuthenticator
GHSA-qxpc-96fq-wwmg
pkg: org.apache.cassandra:cassandra-all
eco: maven
published: Apr 7, 2026
Privilege escalation in Apache Cassandra 5.0 on an mTLS environment using MutualTlsAuthenticator allows a user with only CREATE permission to associate their own certificate identity with an arbitrary role, including a superuser role, and authenticate as that role via ADD IDENTITY.

Users are re…

CVE-2026-27314
NVD

HIGH
CVE-2026-27314
CVE-2026-27314
pkg: apache

published: Apr 7, 2026

Privilege escalation in Apache Cassandra 5.0 on an mTLS environment using MutualTlsAuthenticator allows a user with only CREATE permission to associate their own certificate identity with an arbitrary role,
including a superuser role, and authenticate as that role via ADD IDENTITY.

Users are re…

CWE: CWE-267
NVD

HIGH
CVE-2026-35463
CVE-2026-35463
pkg: ssl

published: Apr 7, 2026

pyLoad is a free and open-source download manager written in Python. In 0.5.0b3.dev96 and earlier, the ADMIN_ONLY_OPTIONS protection mechanism restricts security-critical configuration values (reconnect scripts, SSL certs, proxy credentials) to admin-only access. However, this protection is only app…
CWE: CWE-78
NVD

HIGH
CVE-2026-34197
CVE-2026-34197
pkg: apache

published: Apr 7, 2026

Improper Input Validation, Improper Control of Generation of Code ('Code Injection') vulnerability in Apache ActiveMQ Broker, Apache ActiveMQ.

Apache ActiveMQ Classic exposes the Jolokia JMX-HTTP bridge at /api/jolokia/ on the web console. The default Jolokia access policy permits exec operations o…

CWE: CWE-20, CWE-94
NVD

HIGH
CVE-2026-35044
CVE-2026-35044
pkg: bentoml bentoml

published: Apr 6, 2026

BentoML is a Python library for building online serving systems optimized for AI apps and model inference. Prior to 1.4.38, the Dockerfile generation function generate_containerfile() in src/bentoml/_internal/container/generate.py uses an unsandboxed jinja2.Environment with the jinja2.ext.do extensi…
CWE: CWE-1336
NVD

HIGH
CVE-2019-25671
CVE-2019-25671
pkg: apache

published: Apr 5, 2026

VA MAX 8.3.4 contains a remote code execution vulnerability that allows authenticated attackers to execute arbitrary commands by injecting shell metacharacters into the mtu_eth0 parameter. Attackers can send POST requests to the changeip.php endpoint with malicious payload in the mtu_eth0 field to e…
CWE: CWE-22
NVD

HIGH
CVE-2026-35554
CVE-2026-35554
pkg: apache

published: Apr 7, 2026

A race condition in the Apache Kafka Java producer client’s buffer pool management can cause messages to be silently delivered to incorrect topics.

When a produce batch expires due to delivery.timeout.ms while a network request containing that batch is still in flight, the batch’s ByteBuffer is…

CWE: CWE-362, CWE-416
NVD

HIGH
CVE-2026-35408
CVE-2026-35408
pkg: oauth

published: Apr 6, 2026

Directus is a real-time API and App dashboard for managing SQL database content. Prior to 11.17.0, Directus's Single Sign-On (SSO) login pages lacked a Cross-Origin-Opener-Policy (COOP) HTTP response header. Without this header, a malicious cross-origin window that opens the Directus login page reta…
CWE: CWE-346, CWE-693
GitHub-GHSA

HIGH
PraisonAI Vulnerable to Code Injection and Protection Mechanism Failure
GHSA-3c4r-6p77-xwr7
pkg: PraisonAI
eco: pip
published: Apr 10, 2026
PraisonAI's AST-based Python sandbox can be bypassed using `type.__getattribute__` trampoline, allowing arbitrary code execution when running untrusted agent code.

## Description

The `_execute_code_direct` function in `praisonaiagents/tools/python_tools.py` uses AST filtering to block dangerous Py…

CVE-2026-40158
GitHub-GHSA

HIGH
basic-ftp has FTP Command Injection via CRLF
GHSA-chqc-8p9q-pq6q
pkg: basic-ftp
eco: npm
published: Apr 8, 2026
## Summary

`basic-ftp` version `5.2.0` allows FTP command injection via CRLF sequences (`\r\n`) in file path parameters passed to high-level path APIs such as `cd()`, `remove()`, `rename()`, `uploadFrom()`, `downloadTo()`, `list()`, and `removeDir()`. The library's `protectWhitespace()` helper only…

CVE-2026-39983
NVD

HIGH
CVE-2026-33752
CVE-2026-33752
pkg: lexiforest curl_cffi

published: Apr 6, 2026

curl_cffi is the a Python binding for curl. Prior to 0.15.0, curl_cffi does not restrict requests to internal IP ranges, and follows redirects automatically via the underlying libcurl. Because of this, an attacker-controlled URL can redirect requests to internal services such as cloud metadata endpo…
CWE: CWE-918
GitHub-GHSA

HIGH
SiYuan: Publish Reader Path Traversal Delete via `removeUnusedAttributeView`
GHSA-vw86-c94w-v3x4
pkg: github.com/siyuan-note/siyuan/kernel
eco: go
published: Apr 10, 2026
SiYuan's publish/read-only boundary can be broken through `/api/av/removeUnusedAttributeView`.

A publish-service Reader context can call this endpoint because it is protected only by `CheckAuth`, and publish requests are forwarded upstream with a valid `RoleReader` JWT. The handler accepts attacker…

NVD

HIGH
CVE-2026-5483
CVE-2026-5483
pkg: kubernetes

published: Apr 10, 2026

A flaw was found in odh-dashboard in Red Hat Openshift AI. This vulnerability in the `odh-dashboard` component of Red Hat OpenShift AI (RHOAI) allows for the disclosure of Kubernetes Service Account tokens through a NodeJS endpoint. This could enable an attacker to gain unauthorized access to Kubern…
CWE: CWE-201
GitHub-GHSA

HIGH
n8n-mcp has authenticated SSRF via instance-URL header in multi-tenant HTTP mode
GHSA-4ggg-h7ph-26qr
pkg: n8n-mcp
eco: npm
published: Apr 8, 2026
## Impact
An authenticated Server-Side Request Forgery in `n8n-mcp` allows a caller holding a valid `AUTH_TOKEN` to cause the server to issue HTTP requests to arbitrary URLs supplied through multi-tenant HTTP headers. Response bodies are reflected back through JSON-RPC, so an attacker can read the c…
CVE-2026-39974
GitHub-GHSA

HIGH
PraisonAI Vulnerable to RCE via Automatic tools.py Import
GHSA-g985-wjh9-qxxc
pkg: praisonaiagents, PraisonAI
eco: pip
published: Apr 10, 2026
PraisonAI automatically imports `./tools.py` from the current working directory when launching certain components. This includes call.py, tool_resolver.py, and CLI tool-loading paths.

A malicious tools.py placed in the process working directory is executed immediately, allowing arbitrary Python cod…

GitHub-GHSA

HIGH
PraisonAI Vulnerable to Argument Injection into Cloud Run Environment Variables via Unsanitized Comma in gcloud –set-env-vars
GHSA-fvxx-ggmx-3cjg
pkg: PraisonAI
eco: pip
published: Apr 10, 2026
**Summary**

deploy.py constructs a single comma-delimited string for the gcloud run
deploy –set-env-vars argument by directly interpolating openai_model,
openai_key, and openai_base without validating that these values do not
contain commas. gcloud uses a comma as the key-value pair separator for

CVE-2026-40113
GitHub-GHSA

HIGH
Vikunja vulnerable to Privilege Escalation via Project Reparenting
GHSA-2vq4-854f-5c72
pkg: code.vikunja.io/api
eco: go
published: Apr 10, 2026
## Summary

A user with Write-level access to a project can escalate their permissions to Admin by moving the project under a project they own. After reparenting, the recursive permission CTE resolves ownership of the new parent as Admin on the moved project. The attacker can then delete the project…

CVE-2026-35595
GitHub-GHSA

HIGH
Open Cluster Management (OCM): Cross-cluster privilege escalation via improper Kubernetes client certificate renewal validation
GHSA-q4gv-pjmh-c735
pkg: open-cluster-management.io/ocm
eco: go
published: Apr 7, 2026
A flaw was found in Open Cluster Management (OCM), the technology underlying Red Hat Advanced Cluster Management (ACM). Improper validation of Kubernetes client certificate renewal allows a managed cluster administrator to forge a client certificate that can be approved by the OCM controller. This e…
CVE-2026-4740
GitHub-GHSA

HIGH
n8n-mcp has unauthenticated session termination and information disclosure in HTTP transport
GHSA-75hx-xj24-mqrw
pkg: n8n-mcp
eco: npm
published: Apr 10, 2026
### Summary

Several HTTP transport endpoints in n8n-mcp lacked proper authentication, and the health check endpoint exposed sensitive operational metadata without credentials.

### Impact

An unauthenticated attacker with network access to the n8n-mcp HTTP server could disrupt active MCP sessions a…

GitHub-GHSA

HIGH
basic-ftp: Incomplete CRLF Injection Protection Allows Arbitrary FTP Command Execution via Credentials and MKD Commands
GHSA-6v7q-wjvx-w8wg
pkg: basic-ftp
eco: npm
published: Apr 10, 2026
## Summary

basic-ftp's CRLF injection protection (added in commit 2ecc8e2 for GHSA-chqc-8p9q-pq6q) is incomplete. Two code paths bypass the `protectWhitespace()` control character check: (1) the `login()` method directly concatenates user-supplied credentials into USER/PASS FTP commands without any…

GitHub-GHSA

HIGH
Saltcorn has an Unauthenticated Path Traversal in sync endpoints, allowing arbitrary file write and directory read
GHSA-32pv-mpqg-h292
pkg: @saltcorn/server, @saltcorn/server, @saltcorn/server
eco: npm
published: Apr 10, 2026
### Summary

Two unauthenticated path traversal vulnerabilities exist in Saltcorn's mobile sync endpoints. The `POST /sync/offline_changes` endpoint allows an unauthenticated attacker to create arbitrary directories and write a `changes.json` file with attacker-controlled JSON content anywhere on th…

CVE-2026-40163
NVD

HIGH
CVE-2026-39429
CVE-2026-39429
pkg: kubernetes

published: Apr 8, 2026

kcp is a Kubernetes-like control plane for form-factors and use-cases beyond Kubernetes and container workloads. Prior to 0.30.3 and 0.29.3, the cache server is directly exposed by the root shard and has no authentication or authorization in place. This allows anyone who can access the root shard to…
CWE: CWE-302, CWE-862
GitHub-GHSA

HIGH
kcp's cache server is accessible without authentication or authorization checks
GHSA-3j3q-wp9x-585p
pkg: github.com/kcp-dev/kcp, github.com/kcp-dev/kcp
eco: go
published: Apr 8, 2026
### Summary

The cache server is directly exposed by the root shard and has no authentication or authorization in place.
This allows anyone who can access the root shard to read and write to the cache server.

### Details

The cache server is routed in the pre-mux chain in the shard code.
The preHa…

CVE-2026-39429
NVD

HIGH
CVE-2026-34045
CVE-2026-34045
pkg: kubernetes

published: Apr 7, 2026

Podman Desktop is a graphical tool for developing on containers and Kubernetes. Prior to 1.26.2, an unauthenticated HTTP server exposed by Podman Desktop allows any network attacker to remotely trigger denial-of-service conditions and extract sensitive information. By abusing missing connection limi…
CWE: CWE-209, CWE-284, CWE-400
NVD

HIGH
CVE-2026-4740
CVE-2026-4740
pkg: kubernetes

published: Apr 7, 2026

A flaw was found in Open Cluster Management (OCM), the technology underlying Red Hat Advanced Cluster Management (ACM). Improper validation of Kubernetes client certificate renewal allows a managed cluster administrator to forge a client certificate that can be approved by the OCM controller. This e…
CWE: CWE-295
NVD

HIGH
CVE-2026-34982
CVE-2026-34982
pkg: express

published: Apr 6, 2026

Vim is an open source, command line text editor. Prior to version 9.2.0276, a modeline sandbox bypass in Vim allows arbitrary OS command execution when a user opens a crafted file. The `complete`, `guitabtooltip` and `printheader` options are missing the `P_MLE` flag, allowing a modeline to be execu…
CWE: CWE-78
GitHub-GHSA

HIGH
DotNetNuke.Core has stored cross-site-scripting (XSS) via SVG upload
GHSA-ffq7-898w-9jc4
pkg: DotNetNuke.Core
eco: nuget
published: Apr 10, 2026
A user could upload a specially crafted SVG file that could include scripts that can target both authenticated and unauthenticated DNN users. The impact is increased if the scripts are run by a power user.
GitHub-GHSA

HIGH
SiYuan: Publish Reader Can Arbitrarily Delete Attribute View Files via `/api/av/removeUnusedAttributeView`
GHSA-7m5h-w69j-qggg
pkg: github.com/siyuan-note/siyuan/kernel
eco: go
published: Apr 10, 2026
## Summary

An authenticated publish-service reader can invoke `/api/av/removeUnusedAttributeView` and cause persistent deletion of arbitrary attribute view (`AV`) definition files from the workspace.

The route is protected only by generic `CheckAuth`, which accepts publish `RoleReader` requests. T…

CVE-2026-40259
GitHub-GHSA

HIGH
PraisonAI: Cross-Origin Agent Execution via Hardcoded Wildcard CORS and Missing Authentication on AGUI Endpoint
GHSA-x462-jjpc-q4q4
pkg: praisonaiagents
eco: pip
published: Apr 10, 2026
## Summary

The AGUI endpoint (`POST /agui`) has no authentication and hardcodes `Access-Control-Allow-Origin: *` on all responses. Combined with Starlette/FastAPI's Content-Type-agnostic JSON parsing, any website a victim visits can silently trigger arbitrary agent execution against a locally-runni…

NVD

HIGH
CVE-2021-47961
CVE-2021-47961
pkg: ssl

published: Apr 10, 2026

A plaintext storage of a password vulnerability in Synology SSL VPN Client before 1.4.5-0684 allows remote attackers to access or influence the user's PIN code due to insecure storage. This may lead to unauthorized VPN configuration and potential interception of subsequent VPN traffic when combined …
CWE: CWE-256
GitHub-GHSA

HIGH
bsv-sdk and bsv-wallet persist unverified certifier signatures in acquire_certificate (direct and issuance paths)
GHSA-hc36-c89j-5f4j
pkg: bsv-sdk, bsv-wallet
eco: rubygems
published: Apr 9, 2026
# Unverified certifier signatures persisted by `acquire_certificate`

## Affected packages

Both `bsv-sdk` and `bsv-wallet` are published from the [sgbett/bsv-ruby-sdk](https://github.com/sgbett/bsv-ruby-sdk) repository. The vulnerable code lives in `lib/bsv/wallet_interface/wallet_client.rb`, which…

CVE-2026-40070
GitHub-GHSA

HIGH
RedwoodSDK has a CSRF vulnerability in server function dispatch via GET requests
GHSA-x8rx-789c-2pxq
pkg: rwsdk
eco: npm
published: Apr 8, 2026
**Summary**

Server functions exported from `"use server"` files could be invoked via GET requests, bypassing their intended HTTP method. In cookie-authenticated applications, this allowed cross-site GET navigations to trigger state-changing functions, because browsers send `SameSite=Lax` cookies on…

CVE-2026-39371
GitHub-GHSA

HIGH
File Browser: Proxy auth auto-provisioned users inherit Execute permission and Commands
GHSA-7526-j432-6ppp
pkg: github.com/filebrowser/filebrowser/v2
eco: go
published: Apr 8, 2026
## Summary

The fix in commit `b6a4fb1` ("self-registered users don't get execute perms") stripped `Execute` permission and `Commands` from users created via the signup handler. The same fix was not applied to the proxy auth handler. Users auto-created on first successful proxy-auth login are grante…

CVE-2026-35607
NVD

HIGH
CVE-2026-39371
CVE-2026-39371
pkg: react

published: Apr 7, 2026

RedwoodSDK is a server-first React framework. From 1.0.0-beta.50 to 1.0.5, erver functions exported from "use server" files could be invoked via GET requests, bypassing their intended HTTP method. In cookie-authenticated applications, this allowed cross-site GET navigations to trigger state-changing…
CWE: CWE-352
GitHub-GHSA

HIGH
PraisonAI Has Arbitrary File Write (Zip Slip) in Templates Extraction
GHSA-4ph2-f6pf-79wv
pkg: PraisonAI
eco: pip
published: Apr 6, 2026
The PraisonAI templates installation feature is vulnerable to a "Zip Slip" Arbitrary File Write attack. When downloading and extracting template archives from external sources (e.g., GitHub), the application uses Python's `zipfile.extractall()` without verifying if the files within the archive resol…
CVE-2026-39307
GitHub-GHSA

HIGH
PraisonAI: Unauthenticated Allow-List Manipulation Bypasses Agent Tool Approval Safety Controls
GHSA-4wr3-f4p3-5wjh
pkg: PraisonAI
eco: pip
published: Apr 10, 2026
## Summary

The gateway's `/api/approval/allow-list` endpoint permits unauthenticated modification of the tool approval allowlist when no `auth_token` is configured (the default). By adding dangerous tool names (e.g., `shell_exec`, `file_write`) to the allowlist, an attacker can cause the `ExecAppro…

CVE-2026-40149
GitHub-GHSA

HIGH
PraisonAI Vulnerable to Implicit Execution of Arbitrary Code via Automatic `tools.py` Loading
GHSA-2g3w-cpc4-chr4
pkg: praisonai
eco: pip
published: Apr 10, 2026
PraisonAI automatically loads a file named `tools.py` from the current working directory to discover and register custom agent tools. This loading process uses `importlib.util.spec_from_file_location` and immediately executes module-level code via `spec.loader.exec_module()` **without explicit user …
CVE-2026-40156
GitHub-GHSA

HIGH
Fleet Affected by Local Privilege Escalation via Tcl Command Injection in Orbit
GHSA-rphv-h674-5hp2
pkg: github.com/fleetdm/fleet/v4
eco: go
published: Apr 8, 2026
## Summary

The Orbit agent's FileVault disk encryption key rotation flow on collects a local user's password via a GUI dialog and interpolates it directly into a Tcl/expect script executed via `exec.Command("expect", "-c", script)`. Because the password is inserted into Tcl brace-quoted `send {%s}`…

CVE-2026-27806
GitHub-GHSA

HIGH
OpenEXR has a signed 32-bit Overflow in PIZ Decoder Leads to OOB Read/Write
GHSA-588r-cr5c-w6hf
pkg: OpenEXR, OpenEXR, OpenEXR
eco: pip
published: Apr 8, 2026
## Summary

`internal_exr_undo_piz()` advances the working wavelet pointer with signed 32-bit arithmetic:

“`c
wavbuf += nx * ny * wcount;
“`

Because `nx`, `ny`, and `wcount` are `int`, a crafted EXR file can make this product overflow and wrap. The next channel then decodes from an incorrect add…

CVE-2026-34588
GitHub-GHSA

HIGH
Local settings bypass config trust checks
GHSA-436v-8fw5-4mj8
pkg: mise
eco: rust
published: Apr 7, 2026
### Summary

`mise` loads trust-control settings from a local project `.mise.toml` before the trust check runs. An attacker who can place a malicious `.mise.toml` in a repository can make that same file appear trusted and then reach dangerous directives such as `[env] _.source`, templates, hooks, or…

CVE-2026-35533
NVD

HIGH
CVE-2026-35021
CVE-2026-35021
pkg: express

published: Apr 6, 2026

Anthropic Claude Code CLI and Claude Agent SDK contain an OS command injection vulnerability in the prompt editor invocation utility that allows attackers to execute arbitrary commands by crafting malicious file paths. Attackers can inject shell metacharacters such as $() or backtick expressions int…
CWE: CWE-78
GitHub-GHSA

HIGH
goshs is Missing Write Protection for Parametric Data Values
GHSA-2943-crp8-38xx
pkg: github.com/patrickhener/goshs
eco: go
published: Apr 10, 2026
### Summary
The SFTP command rename sanitizes only the source path and not the destination, so it is possible to write outside of the root directory of the SFTP.

### Details

Here is the issue:
“`go
// helper.go:155-215
func cmdFile(root string, r *sftp.Request, ip string, sftpServer *SFTPServer)…

CVE-2026-40188
GitHub-GHSA

HIGH
PraisonAIAgents has SSRF and Local File Read via Unvalidated URLs in web_crawl Tool
GHSA-8f4v-xfm9-3244
pkg: praisonaiagents
eco: pip
published: Apr 10, 2026
## Summary

The `web_crawl()` function in `praisonaiagents/tools/web_crawl_tools.py` accepts arbitrary URLs from AI agents with zero validation. No scheme allowlisting, hostname/IP blocklisting, or private network checks are applied before fetching. This allows an attacker (or prompt injection in cr…

CVE-2026-40150
GitHub-GHSA

HIGH
MONAI: Unsafe functions lead to pickle deserialization rce
GHSA-89gg-p5r5-q6r4
pkg: monai
eco: pip
published: Apr 7, 2026
### Summary
The `algo_from_pickle` function in `monai/auto3dseg/utils.py` causes `pickle.loads(data_bytes)` to be executed, and it does not perform any validation on the input parameters. This ultimately leads to insecure deserialization and can result in code execution vulnerabilities.

### Details…

GitHub-GHSA

HIGH
Ech0: Scoped admin access tokens can bypass least-privilege controls on privileged endpoints, including backup export
GHSA-4h9q-p5j4-xvvh
pkg: github.com/lin-snow/ech0
eco: go
published: Apr 10, 2026
## Summary

Ech0 scoped access tokens do not reliably enforce least privilege: multiple privileged admin routes omit scope checks, and the backup export handler strips token scope metadata entirely, allowing a low-scope admin access token to reach broader admin functionality than intended.

## Impac…

GitHub-GHSA

HIGH
PraisonAI: Unauthenticated WebSocket Endpoint Proxies to Paid OpenAI Realtime API Without Rate Limits
GHSA-q5r4-47m9-5mc7
pkg: PraisonAI
eco: pip
published: Apr 10, 2026
## Summary

The `/media-stream` WebSocket endpoint in PraisonAI's call module accepts connections from any client without authentication or Twilio signature validation. Each connection opens an authenticated session to OpenAI's Realtime API using the server's API key. There are no limits on concurre…

CVE-2026-40116
GitHub-GHSA

HIGH
@vitejs/plugin-rsc has a Denial of Service with React Server Components
GHSA-v457-wxvj-p9w9
pkg: @vitejs/plugin-rsc
eco: npm
published: Apr 10, 2026
### Impact

`@vitejs/plugin-rsc` vendors `react-server-dom-webpack`, which contained a vulnerability in versions prior to 19.2.4. See details in React repository's advisory https://github.com/facebook/react/security/advisories/GHSA-479c-33wc-g2pg

### Patches

Upgrade immediately to `@vitejs/plugin-…

GitHub-GHSA

HIGH
Next.js has a Denial of Service with Server Components
GHSA-q4gf-8mx6-v5v3
pkg: next, next
eco: npm
published: Apr 10, 2026
A vulnerability affects certain React Server Components packages for versions 19.x and frameworks that use the affected packages, including Next.js 13.x, 14.x, 15.x, and 16.x using the App Router. The issue is tracked upstream as [CVE-2026-23869](https://github.com/facebook/react/security/advisories…
GitHub-GHSA

HIGH
React Server Components have a Denial of Service Vulnerability
GHSA-479c-33wc-g2pg
pkg: react-server-dom-parcel, react-server-dom-parcel, react-server-dom-parcel
eco: npm
published: Apr 10, 2026
## Impact

A denial of service vulnerability exists in React Server Components, affecting the following packages: react-server-dom-parcel, react-server-dom-turbopack, react-server-dom-webpack versions 19.0.0, 19.1.0 and 19.2.0. The vulnerability is triggered by sending specially crafted HTTP request…

CVE-2026-23869
GitHub-GHSA

HIGH
Apache ActiveMQ: Denial of Service via Out of Memory vulnerability
GHSA-5568-6qcg-g7fx
pkg: org.apache.activemq:activemq-client, org.apache.activemq:activemq-client, org.apache.activemq:activemq-broker
eco: maven
published: Apr 10, 2026
Denial of Service via Out of Memory vulnerability in Apache ActiveMQ Client, Apache ActiveMQ Broker, Apache ActiveMQ.

ActiveMQ NIO SSL transports do not correctly handle TLSv1.3 handshake KeyUpdates triggered by clients. This makes it possible for a client to rapidly trigger updates which causes th…

CVE-2026-39304
NVD

HIGH
CVE-2026-39304
CVE-2026-39304
pkg: ssl

published: Apr 10, 2026

Denial of Service via Out of Memory vulnerability in Apache ActiveMQ Client, Apache ActiveMQ Broker, Apache ActiveMQ.

ActiveMQ NIO SSL transports do not correctly handle TLSv1.3 handshake KeyUpdates triggered by clients. This makes it possible for a client to rapidly trigger updates which causes th…

CWE: CWE-400
GitHub-GHSA

HIGH
Spring Cloud Gateway's SSL bundle configuration silently bypassed
GHSA-hwqh-2684-54fc
pkg: org.springframework.cloud:spring-cloud-gateway
eco: maven
published: Apr 10, 2026
When configuring SSL bundles in Spring Cloud Gateway by using the configuration property spring.ssl.bundle, the configuration was silently ignored and the default SSL configuration was used instead.
Note: The 4.2.x branch is no longer under open source support. If you are using Spring Cloud Gatew…
CVE-2026-22750
NVD

HIGH
CVE-2026-22750
CVE-2026-22750
pkg: ssl

published: Apr 10, 2026

When configuring SSL bundles in Spring Cloud Gateway by using the configuration property spring.ssl.bundle, the configuration was silently ignored and the default SSL configuration was used instead.
Note: The 4.2.x branch is no longer under open source support. If you are using Spring Cloud Gatew…
CWE: CWE-15
GitHub-GHSA

HIGH
Apache Tomcat Missing Encryption of Sensitive Data vulnerability
GHSA-69r9-qgr7-g2wj
pkg: org.apache.tomcat:tomcat-catalina, org.apache.tomcat:tomcat-catalina, org.apache.tomcat:tomcat-catalina
eco: maven
published: Apr 9, 2026
Missing Encryption of Sensitive Data vulnerability in Apache Tomcat due to the fix for CVE-2026-29146 allowing the bypass of the EncryptInterceptor.

This issue affects Apache Tomcat: 11.0.20, 10.1.53, 9.0.116.

Users are recommended to upgrade to version 11.0.21, 10.1.54 or 9.0.117, which fix the …

CVE-2026-34486
GitHub-GHSA

HIGH
Apache Tomcat has an Improper Encoding or Escaping of Output vulnerability in the JsonAccessLogValve
GHSA-rv64-5gf8-9qq8
pkg: org.apache.tomcat:tomcat-catalina, org.apache.tomcat:tomcat-catalina, org.apache.tomcat:tomcat-catalina
eco: maven
published: Apr 9, 2026
Improper Encoding or Escaping of Output vulnerability in the JsonAccessLogValve component of Apache Tomcat.

This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.20, from 10.1.0-M1 through 10.1.53, from 9.0.40 through 9.0.116.

Users are recommended to upgrade to version 11.0.21, 10.1.54 or…

CVE-2026-34483
GitHub-GHSA

HIGH
Apache Tomcat vulnerable to Insertion of Sensitive Information into Log File
GHSA-x4m4-345f-5h5g
pkg: org.apache.tomcat:tomcat-catalina, org.apache.tomcat:tomcat-catalina, org.apache.tomcat:tomcat-catalina
eco: maven
published: Apr 9, 2026
Insertion of Sensitive Information into Log File vulnerability in the cloud membership for clustering component of Apache Tomcat exposed the Kubernetes bearer token.

This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.20, from 10.1.0-M1 through 10.1.53, from 9.0.13 through 9.0.116.

Users…

CVE-2026-34487
GitHub-GHSA

HIGH
Apache Tomcat: Configured cipher preference order not preserved
GHSA-69cc-cv78-qc8g
pkg: org.apache.tomcat:tomcat-catalina, org.apache.tomcat:tomcat-catalina, org.apache.tomcat:tomcat-catalina
eco: maven
published: Apr 9, 2026
Configured cipher preference order not preserved vulnerability in Apache Tomcat.

This issue affects Apache Tomcat: from 11.0.16 through 11.0.18, from 10.1.51 through 10.1.52, from 9.0.114 through 9.0.115.

Users are recommended to upgrade to version 11.0.20, 10.1.53 or 9.0.116, which fix the issue.

CVE-2026-29129
GitHub-GHSA

HIGH
Apache Tomcat: Padding Oracle vulnerability in EncryptInterceptor
GHSA-h468-7pvh-8vr8
pkg: org.apache.tomcat:tomcat-catalina, org.apache.tomcat:tomcat-catalina, org.apache.tomcat:tomcat-catalina
eco: maven
published: Apr 9, 2026
Padding Oracle vulnerability in Apache Tomcat's EncryptInterceptor with default configuration.

This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.18, from 10.0.0-M1 through 10.1.52, from 9.0.13 through 9..115, from 8.5.38 through 8.5.100, from 7.0.100 through 7.0.109.

Users are recommen…

CVE-2026-29146
GitHub-GHSA

HIGH
Apache Tomcat has an HTTP Request/Response Smuggling vulnerability
GHSA-563x-q5rq-57qp
pkg: org.apache.tomcat:tomcat-catalina, org.apache.tomcat:tomcat-catalina, org.apache.tomcat:tomcat-catalina
eco: maven
published: Apr 9, 2026
Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling') vulnerability in Apache Tomcat via invalid chunk extension.

This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.18, from 10.1.0-M1 through 10.1.52, from 9.0.0.M1 through 9.0.115, from 8.5.0 through 8.5.100, f…

CVE-2026-24880
GitHub-GHSA

HIGH
bsv-sdk ARC broadcaster treats INVALID/MALFORMED/ORPHAN responses as successful broadcasts
GHSA-9hfr-gw99-8rhx
pkg: bsv-sdk
eco: rubygems
published: Apr 9, 2026
# ARC broadcaster treats failure statuses as successful broadcasts

## Summary

`BSV::Network::ARC`'s failure detection only recognises `REJECTED` and `DOUBLE_SPEND_ATTEMPTED`. ARC responses with `txStatus` values of `INVALID`, `MALFORMED`, `MINED_IN_STALE_BLOCK`, or any `ORPHAN`-containing `extraIn…

CVE-2026-40069
NVD

HIGH
CVE-2026-34487
CVE-2026-34487
pkg: kubernetes

published: Apr 9, 2026

Insertion of Sensitive Information into Log File vulnerability in the cloud membership for clustering component of Apache Tomcat exposed the Kubernetes bearer token.

This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.20, from 10.1.0-M1 through 10.1.53, from 9.0.13 through 9.0.116.

Users…

CWE: CWE-532
NVD

HIGH
CVE-2026-34486
CVE-2026-34486
pkg: apache

published: Apr 9, 2026

Missing Encryption of Sensitive Data vulnerability in Apache Tomcat due to the fix for CVE-2026-29146 allowing the bypass of the EncryptInterceptor.

This issue affects Apache Tomcat: 11.0.20, 10.1.53, 9.0.116.

Users are recommended to upgrade to version 11.0.21, 10.1.54 or 9.0.117, which fix the …

CWE: CWE-311
NVD

HIGH
CVE-2026-34483
CVE-2026-34483
pkg: apache

published: Apr 9, 2026

Improper Encoding or Escaping of Output vulnerability in the JsonAccessLogValve component of Apache Tomcat.

This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.20, from 10.1.0-M1 through 10.1.53, from 9.0.40 through 9.0.116.

Users are recommended to upgrade to version 11.0.21, 10.1.54 or…

CWE: CWE-116
NVD

HIGH
CVE-2026-29146
CVE-2026-29146
pkg: apache

published: Apr 9, 2026

Padding Oracle vulnerability in Apache Tomcat's EncryptInterceptor with default configuration.

This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.18, from 10.0.0-M1 through 10.1.52, from 9.0.13 through 9..115, from 8.5.38 through 8.5.100, from 7.0.100 through 7.0.109.

Users are recommen…

CWE: CWE-209, CWE-642
NVD

HIGH
CVE-2026-29129
CVE-2026-29129
pkg: apache

published: Apr 9, 2026

Configured cipher preference order not preserved vulnerability in Apache Tomcat.

This issue affects Apache Tomcat: from 11.0.16 through 11.0.18, from 10.1.51 through 10.1.52, from 9.0.114 through 9.0.115.

Users are recommended to upgrade to version 11.0.20, 10.1.53 or 9.0.116, which fix the issue.

CWE: CWE-327
NVD

HIGH
CVE-2026-24880
CVE-2026-24880
pkg: apache

published: Apr 9, 2026

Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling') vulnerability in Apache Tomcat via invalid chunk extension.

This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.18, from 10.1.0-M1 through 10.1.52, from 9.0.0.M1 through 9.0.115, from 8.5.0 through 8.5.100, f…

CWE: CWE-444
GitHub-GHSA

HIGH
Apache OpenMeetings Uses GET Request Method With Sensitive Query Strings
GHSA-gcvm-c75m-h4p4
pkg: org.apache.openmeetings:openmeetings-parent
eco: maven
published: Apr 9, 2026
Use of GET Request Method With Sensitive Query Strings vulnerability in Apache OpenMeetings.

The REST login endpoint uses HTTP GET method with username and password passed as query parameters. Please check references regarding possible impact

This issue affects Apache OpenMeetings: from 3.1.3 be…

CVE-2026-34020
GitHub-GHSA

HIGH
Apache OpenMeetings Uses Hard-coded Cryptographic Key
GHSA-wqxq-w68r-wg85
pkg: org.apache.openmeetings:openmeetings-parent
eco: maven
published: Apr 9, 2026
Use of Hard-coded Cryptographic Key vulnerability in Apache OpenMeetings.

The remember-me cookie encryption key is set to default value in openmeetings.properties and not being auto-rotated. In case OM admin hasn't changed the default encryption key, an attacker who has stolen a cookie from a logge…

CVE-2026-33266
NVD

HIGH
CVE-2026-1584
CVE-2026-1584
pkg: tls

published: Apr 9, 2026

A flaw was found in gnutls. A remote, unauthenticated attacker can exploit this vulnerability by sending a specially crafted ClientHello message with an invalid Pre-Shared Key (PSK) binder value during the TLS handshake. This can lead to a NULL pointer dereference, causing the server to crash and re…
CWE: CWE-476
NVD

HIGH
CVE-2026-40046
CVE-2026-40046
pkg: apache

published: Apr 9, 2026

Integer Overflow or Wraparound vulnerability in Apache ActiveMQ, Apache ActiveMQ All, Apache ActiveMQ MQTT.

The fix for "CVE-2025-66168: MQTT control packet remaining length field is not properly validated" was only applied to 5.19.2 (and future 5.19.x) releases but was missed for all 6.0.0+ versio…

CWE: CWE-190
NVD

HIGH
CVE-2026-34020
CVE-2026-34020
pkg: apache

published: Apr 9, 2026

Use of GET Request Method With Sensitive Query Strings vulnerability in Apache OpenMeetings.

The REST login endpoint uses HTTP GET method with username and password passed as query parameters. Please check references regarding possible impact

This issue affects Apache OpenMeetings: from 3.1.3 be…

CWE: CWE-598
NVD

HIGH
CVE-2026-33266
CVE-2026-33266
pkg: apache

published: Apr 9, 2026

Use of Hard-coded Cryptographic Key vulnerability in Apache OpenMeetings.

The remember-me cookie encryption key is set to default value in openmeetings.properties and not being auto-rotated. In case OM admin hasn't changed the default encryption key, an attacker who has stolen a cookie from a logge…

CWE: CWE-321
GitHub-GHSA

HIGH
HashiCorp's go-getter library may allow arbitrary file reads
GHSA-92mm-2pjq-r785
pkg: github.com/hashicorp/go-getter
eco: go
published: Apr 9, 2026
HashiCorp's go-getter library up to v1.8.5 may allow arbitrary file reads on the file system during certain git operations through a maliciously crafted URL. This is fixed in go-getter v1.8.6. This vulnerability does not affect the go-getter/v2 branch and package.
CVE-2026-4660
GitHub-GHSA

HIGH
Apache DolphinScheduler vulnerable to sensitive information disclosure
GHSA-3cjc-vhfm-ffp2
pkg: org.apache.dolphinscheduler:dolphinscheduler
eco: maven
published: Apr 9, 2026
An Exposure of Sensitive Information to an Unauthorized Actor vulnerability exists in Apache DolphinScheduler.

This vulnerability may allow unauthorized actors to access sensitive information, including database credentials.

This issue affects Apache DolphinScheduler versions 3.1.*.

Users are r…

CVE-2025-62188
NVD

HIGH
CVE-2025-62188
CVE-2025-62188
pkg: apache

published: Apr 9, 2026

An Exposure of Sensitive Information to an Unauthorized Actor vulnerability exists in Apache DolphinScheduler.

This vulnerability may allow unauthorized actors to access sensitive information, including database credentials.

This issue affects Apache DolphinScheduler versions 3.1.*.

Users are r…

CWE: CWE-200
GitHub-GHSA

HIGH
Duplicate Advisory: Unfurl's unbounded zlib decompression allows decompression bomb DoS
GHSA-c3f2-qg8v-25q2
pkg: dfir-unfurl
eco: pip
published: Apr 9, 2026
### Duplicate Advisory
This advisory has been withdrawn because it is a duplicate of GHSA-h5qv-qjv4-pc5m. This link is maintained to preserve external references.

### Original Description
Unfurl before 2026.04 contains an unbounded zlib decompression vulnerability in parse_compressed.py that allow…

NVD

HIGH
CVE-2026-39863
CVE-2026-39863
pkg: tls

published: Apr 8, 2026

Kamailio is an open source implementation of a SIP Signaling Server. Prior to 6.1.1, 6.0.6, and 5.8.8, an out-of-bounds access in the core of Kamailio (formerly OpenSER and SER) allows remote attackers to cause a denial of service (process crash) via a specially crafted data packet sent over TCP. Th…
CWE: CWE-119
NVD

HIGH
CVE-2026-23869
CVE-2026-23869
pkg: react

published: Apr 8, 2026

A denial of service vulnerability exists in React Server Components, affecting the following packages: react-server-dom-parcel, react-server-dom-turbopack and react-server-dom-webpack (versions 19.0.0 through 19.0.4, 19.1.0 through 19.1.5, and 19.2.0 through 19.2.4). The vulnerability is triggered b…
CWE: CWE-400, CWE-502
GitHub-GHSA

HIGH
mcp-from-openapi is Vulnerable to SSRF via $ref Dereferencing in Untrusted OpenAPI Specifications
GHSA-v6ph-xcq9-qxxj
pkg: mcp-from-openapi, @frontmcp/sdk, @frontmcp/adapters
eco: npm
published: Apr 8, 2026
## Summary

The `mcp-from-openapi` library uses `@apidevtools/json-schema-ref-parser` to dereference `$ref` pointers in OpenAPI specifications without configuring any URL restrictions or custom resolvers. A malicious OpenAPI specification containing `$ref` values pointing to internal network address…

CVE-2026-39885
GitHub-GHSA

HIGH
PraisonAI Has Unauthenticated SSE Event Stream that Exposes All Agent Activity in A2U Server
GHSA-f292-66h9-fpmf
pkg: praisonai
eco: pip
published: Apr 8, 2026
The A2U (Agent-to-User) event stream server in PraisonAI exposes all agent activity without authentication. This is a separate component from the gateway server fixed in CVE-2026-34952.

The create_a2u_routes() function registers the following endpoints with NO authentication checks:
– GET /a2u/inf…

CVE-2026-39889
GitHub-GHSA

HIGH
LiquidJS: Root restriction bypass for partial and layout loading through symlinked templates
GHSA-56p5-8mhr-2fph
pkg: liquidjs
eco: npm
published: Apr 8, 2026
### Summary

LiquidJS enforces partial and layout root restrictions using the resolved pathname string, but it does not resolve the canonical filesystem path before opening the file. A symlink placed inside an allowed partials or layouts directory can therefore point to a file outside that directory…

CVE-2026-35525
GitHub-GHSA

HIGH
Drizzle ORM has SQL injection via improperly escaped SQL identifiers
GHSA-gpj5-g38j-94v9
pkg: drizzle-orm, drizzle-orm
eco: npm
published: Apr 8, 2026
### Summary

Drizzle ORM improperly escaped quoted SQL identifiers in its dialect-specific `escapeName()` implementations. In affected versions, embedded identifier delimiters were not escaped before the identifier was wrapped in quotes or backticks.

As a result, applications that pass attacker-con…

CVE-2026-39356
GitHub-GHSA

HIGH
FastFeedParser has an infinite redirect loop DoS via meta-refresh chain
GHSA-4gx2-pc4f-wq37
pkg: fastfeedparser
eco: pip
published: Apr 8, 2026
### Summary
When `parse()` fetches a URL that returns an HTML page containing a `<meta http-equiv="refresh">` tag, it recursively calls itself with the redirect URL — with no depth limit, no visited-URL deduplication, and no redirect count cap. An attacker-controlled server that returns an infinit…
CVE-2026-39376
GitHub-GHSA

HIGH
Addressable has a Regular Expression Denial of Service in Addressable templates
GHSA-h27x-rffw-24p4
pkg: addressable
eco: rubygems
published: Apr 8, 2026
### Impact

Within the URI template implementation in Addressable, two classes of URI template generate regular expressions vulnerable to catastrophic backtracking:

1. Templates using the `*` (explode) modifier with any expansion operator (e.g., `{foo*}`, `{+var*}`, `{#var*}`, `{/var*}`, `{.var*}`,…

CVE-2026-35611
NVD

HIGH
CVE-2026-28390
CVE-2026-28390
pkg: openssl

published: Apr 7, 2026

Issue summary: During processing of a crafted CMS EnvelopedData message
with KeyTransportRecipientInfo a NULL pointer dereference can happen.

Impact summary: Applications that process attacker-controlled CMS data may
crash before authentication or cryptographic operations occur resulting in
Denial …

CWE: CWE-476
NVD

HIGH
CVE-2026-28389
CVE-2026-28389
pkg: openssl

published: Apr 7, 2026

Issue summary: During processing of a crafted CMS EnvelopedData message
with KeyAgreeRecipientInfo a NULL pointer dereference can happen.

Impact summary: Applications that process attacker-controlled CMS data may
crash before authentication or cryptographic operations occur resulting in
Denial of S…

CWE: CWE-476
NVD

HIGH
CVE-2026-28388
CVE-2026-28388
pkg: openssl

published: Apr 7, 2026

Issue summary: When a delta CRL that contains a Delta CRL Indicator extension
is processed a NULL pointer dereference might happen if the required CRL
Number extension is missing.

Impact summary: A NULL pointer dereference can trigger a crash which
leads to a Denial of Service for an application.

CWE: CWE-476
GitHub-GHSA

HIGH
GenieACS has an unauthenticated access vulnerability via the NBI API endpoint
GHSA-2h6j-mhcp-9j9h
pkg: genieacs
eco: npm
published: Apr 7, 2026
In GenieACS 1.2.13, an unauthenticated access vulnerability exists in the NBI API endpoint.
CVE-2025-56015
GitHub-GHSA

HIGH
OpenTelemetry-Go: multi-value `baggage` header extraction causes excessive allocations (remote dos amplification)
GHSA-mh2q-q3fh-2475
pkg: go.opentelemetry.io/otel/baggage, go.opentelemetry.io/otel/propagation
eco: go
published: Apr 7, 2026
multi-value `baggage:` header extraction parses each header field-value independently and aggregates members across values. this allows an attacker to amplify cpu and allocations by sending many `baggage:` header lines, even when each individual value is within the 8192-byte per-value parse limit.

CVE-2026-29181
NVD

HIGH
CVE-2026-35611
CVE-2026-35611
pkg: express

published: Apr 7, 2026

Addressable is an alternative implementation to the URI implementation that is part of Ruby's standard library. From 2.3.0 to before 2.9.0, within the URI template implementation in Addressable, two classes of URI template generate regular expressions vulnerable to catastrophic backtracking. Templat…
CWE: CWE-1333
GitHub-GHSA

HIGH
Django vulnerable to ASGI header spoofing via underscore/hyphen conflation
GHSA-mvfq-ggxm-9mc5
pkg: Django, Django, Django
eco: pip
published: Apr 7, 2026
An issue was discovered in 6.0 before 6.0.4, 5.2 before 5.2.13, and 4.2 before 4.2.30. `ASGIRequest` allows a remote attacker to spoof headers by exploiting an ambiguous mapping of two header variants (with hyphens or with underscores) to a single version with underscores.

Earlier, unsupported Djan…

CVE-2026-3902
GitHub-GHSA

HIGH
Django: SGI requests with a missing or understated `Content-Length` header could bypass the `DATA_UPLOAD_MAX_MEMORY_SIZE` limit
GHSA-933h-hp56-hf7m
pkg: Django, Django, Django
eco: pip
published: Apr 7, 2026
An issue was discovered in 6.0 before 6.0.4, 5.2 before 5.2.13, and 4.2 before 4.2.30. ASGI requests with a missing or understated `Content-Length` header could bypass the `DATA_UPLOAD_MAX_MEMORY_SIZE` limit when reading `HttpRequest.body`, allowing remote attackers to load an unbounded request body…
CVE-2026-33034
NVD

HIGH
CVE-2026-3902
CVE-2026-3902
pkg: django

published: Apr 7, 2026

An issue was discovered in 6.0 before 6.0.4, 5.2 before 5.2.13, and 4.2 before 4.2.30.
`ASGIRequest` allows a remote attacker to spoof headers by exploiting an ambiguous mapping of two header variants (with hyphens or with underscores) to a single version with underscores.
Earlier, unsupported Djang…
CWE: CWE-290
NVD

HIGH
CVE-2026-35464
CVE-2026-35464
pkg: flask

published: Apr 7, 2026

pyLoad is a free and open-source download manager written in Python. The fix for CVE-2026-33509 added an ADMIN_ONLY_OPTIONS set to block non-admin users from modifying security-critical config options. The storage_folder option is not in this set and passes the existing path restriction because the …
CWE: CWE-502, CWE-863
NVD

HIGH
CVE-2026-33034
CVE-2026-33034
pkg: django

published: Apr 7, 2026

An issue was discovered in 6.0 before 6.0.4, 5.2 before 5.2.13, and 4.2 before 4.2.30.
ASGI requests with a missing or understated `Content-Length` header could
bypass the `DATA_UPLOAD_MAX_MEMORY_SIZE` limit when reading
`HttpRequest.body`, allowing remote attackers to load an unbounded request bo…
CWE: CWE-770
NVD

HIGH
CVE-2026-31842
CVE-2026-31842
pkg: nginx

published: Apr 7, 2026

Tinyproxy through 1.11.3 is vulnerable to HTTP request parsing desynchronization due to a case-sensitive comparison of the Transfer-Encoding header in src/reqs.c. The is_chunked_transfer() function uses strcmp() to compare the header value against "chunked", even though RFC 7230 specifies that trans…
CWE: CWE-444
GitHub-GHSA

HIGH
strawberry-graphql: Denial of Service via unbounded WebSocket subscriptions
GHSA-hv3w-m4g2-5×77
pkg: strawberry-graphql
eco: pip
published: Apr 6, 2026
Strawberry GraphQL's WebSocket subscription handlers for both the `graphql-transport-ws` and legacy `graphql-ws` protocols allocate an `asyncio.Task` and associated `Operation` object for every incoming subscribe message without enforcing any limit on the number of active subscriptions per connectio…
CVE-2026-35526
GitHub-GHSA

HIGH
strawberry-graphql: Authentication bypass via legacy graphql-ws WebSocket subprotocol
GHSA-vpwc-v33q-mq89
pkg: strawberry-graphql
eco: pip
published: Apr 6, 2026
Strawberry up until version `0.312.3` is vulnerable to an authentication bypass on WebSocket subscription endpoints. The legacy graphql-ws subprotocol handler does not verify that a `connection_init` handshake has been completed before processing start (subscription) messages. This allows a remote a…
CVE-2026-35523
GitHub-GHSA

HIGH
Distribution: stale blob access resurrection via repo-scoped redis descriptor cache invalidation
GHSA-f2g3-hh2r-cwgc
pkg: github.com/distribution/distribution/v3, github.com/distribution/distribution
eco: go
published: Apr 6, 2026
## summary:
distribution can restore read access in `repo a` after an explicit delete when `storage.cache.blobdescriptor: redis` and `storage.delete.enabled: true` are both enabled. the delete path clears the shared digest descriptor but leaves stale repo-scoped membership behind, so a later `Stat` …
CVE-2026-35172
GitHub-GHSA

HIGH
Distribution affected by pull-through cache credential exfiltration via www-authenticate bearer realm
GHSA-3p65-76g6-3w7r
pkg: github.com/distribution/distribution/v3, github.com/distribution/distribution
eco: go
published: Apr 6, 2026
hi guys,

commit: 40594bd98e6d6ed993b5c6021c93fdf96d2e5851 (as-of 2026-01-31)
contact: GitHub Security Advisory (https://github.com/distribution/distribution/security/advisories/new)

## summary

in pull-through cache mode, distribution discovers token auth endpoints by parsing `WWW-Authenticate` ch…

CVE-2026-33540
NVD

HIGH
CVE-2026-34211
CVE-2026-34211
pkg: nyariv sandboxjs

published: Apr 6, 2026

SandboxJS is a JavaScript sandboxing library. Prior to 0.8.36, the @nyariv/sandboxjs parser contains unbounded recursion in the restOfExp function and the lispify/lispifyExpr call chain. An attacker can crash any Node.js process that parses untrusted input by supplying deeply nested expressions (e.g…
CWE: CWE-674
GitHub-GHSA

HIGH
PraisonAIAgents: Environment Variable Secret Exfiltration via os.path.expandvars() Bypassing shell=False in Shell Tool
GHSA-v8g7-9q6v-p3x8
pkg: praisonaiagents
eco: pip
published: Apr 10, 2026
## Summary

The `execute_command` function in `shell_tools.py` calls `os.path.expandvars()` on every command argument at line 64, manually re-implementing shell-level environment variable expansion despite using `shell=False` (line 88) for security. This allows exfiltration of secrets stored in envi…

CVE-2026-40153
NVD

HIGH
CVE-2026-34727
CVE-2026-34727
pkg: jwt

published: Apr 10, 2026

Vikunja is an open-source self-hosted task management platform. Prior to 2.3.0, the OIDC callback handler issues a full JWT token without checking whether the matched user has TOTP two-factor authentication enabled. When a local user with TOTP enrolled is matched via the OIDC email fallback mechanis…
CWE: CWE-287
GitHub-GHSA

HIGH
Vikunja has TOTP Two-Factor Authentication Bypass via OIDC Login Path
GHSA-8jvc-mcx6-r4cg
pkg: code.vikunja.io/api
eco: go
published: Apr 10, 2026
## Summary

The OIDC callback handler issues a full JWT token without checking whether the matched user has TOTP two-factor authentication enabled. When a local user with TOTP enrolled is matched via the OIDC email fallback mechanism, the second factor is completely skipped.

## Details

The OIDC ca…

CVE-2026-34727
GitHub-GHSA

HIGH
Eclipse Jetty: Early return from the JASPIAuthenticator code can potentially no clear ThreadLocal variables
GHSA-gc59-r5jq-98qw
pkg: org.eclipse.jetty.ee10:jetty-ee10, org.eclipse.jetty.ee10:jetty-ee10, org.eclipse.jetty.ee10:jetty-ee10
eco: maven
published: Apr 8, 2026
In Eclipse Jetty, the class JASPIAuthenticator initiates the authentication checks, which set two ThreadLocal variable.

Upon returning from the initial checks, there are conditions that cause an early return from the JASPIAuthenticator code without clearing those ThreadLocals.

A subsequent reque…

CVE-2026-5795
NVD

HIGH
CVE-2026-4158
CVE-2026-4158
pkg: openssl

published: Apr 11, 2026

KeePassXC OpenSSL Configuration Uncontrolled Search Path Element Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of KeePassXC. An attacker must first obtain the ability to execute low-privileged code on the target s…
CWE: CWE-427
NVD

HIGH
CVE-2026-5974
CVE-2026-5974
pkg: react

published: Apr 9, 2026

A vulnerability was determined in FoundationAgents MetaGPT up to 0.8.1. The affected element is the function Bash.run in the library metagpt/tools/libs/terminal.py. This manipulation causes os command injection. The attack is possible to be carried out remotely. The project was informed of the probl…
CWE: CWE-77, CWE-78
NVD

HIGH
CVE-2026-5973
CVE-2026-5973
pkg: react

published: Apr 9, 2026

A vulnerability was found in FoundationAgents MetaGPT up to 0.8.1. Impacted is the function get_mime_type of the file metagpt/utils/common.py. The manipulation results in os command injection. The attack can be executed remotely. The exploit has been made public and could be used. The project was in…
CWE: CWE-77, CWE-78
NVD

HIGH
CVE-2026-5971
CVE-2026-5971
pkg: react

published: Apr 9, 2026

A flaw has been found in FoundationAgents MetaGPT up to 0.8.1. This vulnerability affects the function ActionNode.xml_fill of the file metagpt/actions/action_node.py of the component XML Handler. Executing a manipulation can lead to improper neutralization of directives in dynamically evaluated code…
CWE: CWE-94, CWE-95
NVD

HIGH
CVE-2026-5970
CVE-2026-5970
pkg: react

published: Apr 9, 2026

A vulnerability was detected in FoundationAgents MetaGPT up to 0.8.1. This affects the function check_solution of the component HumanEvalBenchmark/MBPPBenchmark. Performing a manipulation results in code injection. The attack may be initiated remotely. The exploit is now public and may be used. The …
CWE: CWE-74, CWE-94
NVD

HIGH
CVE-2026-5741
CVE-2026-5741
pkg: docker

published: Apr 7, 2026

A weakness has been identified in suvarchal docker-mcp-server up to 0.1.0. The impacted element is the function stop_container/remove_container/pull_image of the file src/index.ts of the component HTTP Interface. This manipulation causes os command injection. The attack is possible to be carried out…
CWE: CWE-77, CWE-78
GitHub-GHSA

HIGH
PraisonAI recipe registry pull path traversal writes files outside the chosen output directory
GHSA-4rx4-4r3x-6534
pkg: PraisonAI
eco: pip
published: Apr 6, 2026
### Summary

PraisonAI's recipe registry pull flow extracts attacker-controlled `.praison` tar archives with `tar.extractall()` and does not validate archive member paths before extraction. A malicious publisher can upload a recipe bundle that contains `../` traversal entries and any user who later …

CVE-2026-39306
GitHub-GHSA

HIGH
Authorizer: CQL/N1QL Injection in Cassandra and Couchbase Backends via fmt.Sprintf String Interpolation
GHSA-jfwg-rxf3-p7r9
pkg: github.com/authorizerdev/authorizer
eco: go
published: Apr 6, 2026
## Vulnerability Details

**CWE:** CWE-943 – Improper Neutralization of Special Elements in Data Query Logic

All 66+ CQL queries in `internal/storage/db/cassandradb/` use `fmt.Sprintf` to interpolate user-controlled values directly into CQL query strings without parameterization.

Unauthenticated e…

NVD

HIGH
CVE-2026-5577
CVE-2026-5577
pkg: flask

published: Apr 5, 2026

A vulnerability has been found in Song-Li cross_browser up to ca690f0fe6954fd9bcda36d071b68ed8682a786a. This affects an unknown part of the file flask/uniquemachine_app.py of the component details Endpoint. Such manipulation of the argument ID leads to sql injection. The attack can be executed remot…
CWE: CWE-74, CWE-89
NVD

HIGH
CVE-2026-40242
CVE-2026-40242
pkg: docker

published: Apr 10, 2026

Arcane is an interface for managing Docker containers, images, networks, and volumes. Prior to 1.17.3, the /api/templates/fetch endpoint accepts a caller-supplied url parameter and performs a server-side HTTP GET request to that URL without authentication and without URL scheme or host validation. T…
CWE: CWE-918
GitHub-GHSA

HIGH
Arcane has Unauthenticated SSRF with Conditional Response Reflection in Template Fetch Endpoint
GHSA-ff24-4prj-gpmj
pkg: github.com/getarcaneapp/arcane/backend
eco: go
published: Apr 10, 2026
### Summary
The /api/templates/fetch endpoint accepts a caller-supplied url parameter and performs a server-side HTTP GET request to that URL without authentication and without URL scheme or host validation. The server's response is returned directly to the caller. type. This constitutes an unauthen…
CVE-2026-40242
GitHub-GHSA

HIGH
PraisonAI Vulnerable to Server-Side Request Forgery via Unvalidated webhook_url in Jobs API
GHSA-8frj-8q3m-xhgm
pkg: PraisonAI
eco: pip
published: Apr 10, 2026
## Summary

The `/api/v1/runs` endpoint accepts an arbitrary `webhook_url` in the request body with no URL validation. When a submitted job completes (success or failure), the server makes an HTTP POST request to this URL using `httpx.AsyncClient`. An unauthenticated attacker can use this to make th…

CVE-2026-40114
GitHub-GHSA

HIGH
Emissary has a Command Injection via PLACE_NAME Configuration in Executrix
GHSA-6c37-7w4p-jg9v
pkg: gov.nsa.emissary:emissary
eco: maven
published: Apr 8, 2026
## Summary

The `Executrix` utility class constructed shell commands by concatenating
configuration-derived values — including the `PLACE_NAME` parameter — with
insufficient sanitization. Only spaces were replaced with underscores, allowing
shell metacharacters (`;`, `|`, `$`, “ ` “, `(`, `)`,…

CVE-2026-35581
GitHub-GHSA

HIGH
Bugsink affected by authenticated arbitrary file write in artifactbundle/assemble
GHSA-8hw4-fhww-273g
pkg: bugsink
eco: pip
published: Apr 10, 2026
# Authenticated arbitrary file write in artifact bundle assembly

## Summary

An authenticated file write vulnerability was identified in Bugsink **2.1.0** in the artifact bundle assembly flow.

A user with a valid authentication token could cause the application to write attacker-controlled content…

CVE-2026-40162
NVD

HIGH
CVE-2026-33704
CVE-2026-33704
pkg: apache

published: Apr 10, 2026

Chamilo LMS is a learning management system. Prior to 1.11.38, any authenticated user (including students) can write arbitrary content to files on the server via the BigUpload endpoint. The key parameter controls the filename and the raw POST body becomes the file content. While .php extensions are …
CWE: CWE-434
NVD

HIGH
CVE-2026-39976
CVE-2026-39976
pkg: jwt

published: Apr 9, 2026

Laravel Passport provides OAuth2 server support to Laravel. From 13.0.0 to before 13.7.1, there is an Authentication Bypass for client_credentials tokens. the league/oauth2-server library sets the JWT sub claim to the client identifier (since there's no user). The token guard then passes this value …
CWE: CWE-287
GitHub-GHSA

HIGH
Tmds.DBus: malicious D-Bus peers can spoof signals, exhaust file descriptor resources, and cause denial of service
GHSA-xrw6-gwf8-vvr9
pkg: Tmds.DBus, Tmds.DBus.Protocol, Tmds.DBus.Protocol
eco: nuget
published: Apr 8, 2026
Tmds.DBus and Tmds.DBus.Protocol are vulnerable to malicious D-Bus peers. A peer on the same bus can spoof signals by impersonating the owner of a well-known name, exhaust system resources or cause file descriptor spillover by sending messages with an excessive number of Unix file descriptors, and c…
CVE-2026-39959
GitHub-GHSA

HIGH
PraisonAI recipe registry publish path traversal allows out-of-root file write
GHSA-r9x3-wx45-2v7f
pkg: PraisonAI
eco: pip
published: Apr 6, 2026
### Summary

PraisonAI's recipe registry publish endpoint writes uploaded recipe bundles to a filesystem path derived from the bundle's internal `manifest.json` before it verifies that the manifest `name` and `version` match the HTTP route. A malicious publisher can place `../` traversal sequences i…

CVE-2026-39308
GitHub-GHSA

HIGH
Duplicate Advisory: OpenClaw: Plivo V2 verified replay identity drifts on query-only variants
GHSA-j56c-wpqm-h24x
pkg: openclaw
eco: npm
published: Apr 10, 2026
### Duplicate Advisory
This advisory has been withdrawn because it is a duplicate of GHSA-cg6c-q2hx-69h7. This link is maintained to preserve external references.

### Original Description
OpenClaw before 2026.3.23 contains a replay identity vulnerability in Plivo V2 signature verification that allo…

GitHub-GHSA

HIGH
Duplicate Advisory: OpenClaw: `fetchWithSsrFGuard` replays unsafe request bodies across cross-origin redirects
GHSA-pg8g-f2hf-x82m
pkg: openclaw
eco: npm
published: Apr 9, 2026
### Duplicate Advisory
This advisory has been withdrawn because it is a duplicate of GHSA-qx8j-g322-qj6m. This link is maintained to preserve external references.

### Original Description
OpenClaw before 2026.3.31 (patched in 2026.4.8) contains a request body replay vulnerability in fetchWithSsrFGu…

GitHub-GHSA

HIGH
OpenEXR: DWA Lossy Decoder Heap Out-of-Bounds Write
GHSA-p8xc-w3q4-h64x
pkg: OpenEXR, OpenEXR, OpenEXR
eco: pip
published: Apr 8, 2026
## Summary

The DWA lossy decoder constructs temporary per-component block pointers using signed 32-bit arithmetic. For a large enough width, the calculation overflows and later decoder stores operate on a wrapped pointer outside the allocated `rowBlock` backing store.

This bug is reachable from th…

CVE-2026-34589
GitHub-GHSA

HIGH
PraisonAIAgents: SSRF via unvalidated URL in `web_crawl` httpx fallback
GHSA-qq9r-63f6-v542
pkg: praisonaiagents
eco: pip
published: Apr 10, 2026
| Field | Value |
|—|—|
| Severity | High |
| Type | SSRF — unvalidated URL in `web_crawl` httpx fallback allows internal network access |
| Affected | `src/praisonai-agents/praisonaiagents/tools/web_crawl_tools.py:133-180` |

## Summary

`web_crawl`'s httpx fallback path passes user-supplied U…

CVE-2026-40160
GitHub-GHSA

HIGH
SiYuan Affected by Zero-Click NTLM Hash Theft and Blind SSRF via Mermaid Diagram Rendering
GHSA-w95v-4h65-j455
pkg: github.com/siyuan-note/siyuan/kernel
eco: go
published: Apr 10, 2026
SiYuan configures Mermaid.js with `securityLevel: "loose"` and `htmlLabels: true`. In this mode, `<img>` tags with `src` attributes survive Mermaid's internal DOMPurify and land in SVG `<foreignObject>` blocks. The SVG is injected via `innerHTML` with no secondary sanitization. When a victim opens a…
CVE-2026-40107
GitHub-GHSA

HIGH
@sveltejs/adapter-node has a BODY_SIZE_LIMIT bypass
GHSA-2crg-3p73-43xp
pkg: @sveltejs/kit
eco: npm
published: Apr 10, 2026
Under certain circumstances, requests could bypass the `BODY_SIZE_LIMIT` on SvelteKit applications running with `adapter-node`. This bypass does not affect body size limits at other layers of the application stack, so limits enforced in the WAF, gateway, or at the platform level are unaffected.
CVE-2026-40073
GitHub-GHSA

HIGH
Helm's plugin verification fails open when .prov is missing, allowing unsigned plugin install
GHSA-q5jf-9vfq-h4h7
pkg: helm.sh/helm/v4
eco: go
published: Apr 10, 2026
Helm is a package manager for Charts for Kubernetes. In Helm versions >=4.0.0 and <=4.1.3, Helm will install plugins missing provenance (`.prov` file) when signature verification is required.

### Impact

The bug allows plugin authors to omit provenance (signing) data from plugins, bypassing plugin …

CVE-2026-35205
GitHub-GHSA

HIGH
Helm has a path traversal in plugin metadata version enables arbitrary file write outside Helm plugin directory
GHSA-vmx8-mqv2-9gmg
pkg: helm.sh/helm/v4
eco: go
published: Apr 10, 2026
Helm is a package manager for Charts for Kubernetes. In Helm versions >=4.0.0 and <=4.1.3, a specially crafted Helm plugin, when installed or updated, will cause Helm to write the contents of the plugin to an arbitrary filesystem location.

### Impact

A Helm user who installs or updates a plugin th…

CVE-2026-35204
GitHub-GHSA

HIGH
OpenClaw: `fetchWithSsrFGuard` replays unsafe request bodies across cross-origin redirects
GHSA-qx8j-g322-qj6m
pkg: openclaw
eco: npm
published: Apr 9, 2026
## Impact

`fetchWithSsrFGuard` replays unsafe request bodies across cross-origin redirects.

A guarded fetch could resend unsafe request bodies or headers when following cross-origin redirects.

OpenClaw is a user-controlled local assistant. This advisory is scoped to the OpenClaw trust model and d…

CVE-2026-40037
GitHub-GHSA

HIGH
OpenClaw: Node Pairing Reconnect Command Escalation Bypasses operator.admin Scope Requirement
GHSA-5wj5-87vq-39xm
pkg: openclaw
eco: npm
published: Apr 9, 2026
## Impact

Node Pairing Reconnect Command Escalation Bypasses operator.admin Scope Requirement.

A previously paired node could reconnect with a broader command set, including exec-capable commands, without forcing the operator/admin re-pairing path.

OpenClaw is a user-controlled local assistant. T…

GitHub-GHSA

HIGH
MinIO affected a DoS via Unbounded Memory Allocation in S3 Select CSV Parsing
GHSA-h749-fxx7-pwpg
pkg: github.com/minio/minio
eco: go
published: Apr 9, 2026
### Impact

_What kind of vulnerability is it? Who is impacted?_

MinIO's S3 Select feature is vulnerable to memory exhaustion when processing CSV
files containing lines longer than available memory. The CSV reader's `nextSplit()`
function calls `bufio.Reader.ReadBytes('\n')` with no size limit, b…

CVE-2026-39414
GitHub-GHSA

HIGH
OpenClaw: HGRCPATH, CARGO_BUILD_RUSTC_WRAPPER, RUSTC_WRAPPER, and MAKEFLAGS missing from exec env denylist — RCE via build tool env injection (GHSA-cm8v-2vh9-cxf3 class)
GHSA-7437-7hg8-frrw
pkg: openclaw
eco: npm
published: Apr 9, 2026
## Impact

HGRCPATH, CARGO_BUILD_RUSTC_WRAPPER, RUSTC_WRAPPER, and MAKEFLAGS missing from exec env denylist — RCE via build tool env injection (GHSA-cm8v-2vh9-cxf3 class).

Missing denylist entries allowed hostile build-tool environment variables to influence host exec commands.

OpenClaw is a use…

GitHub-GHSA

HIGH
OpenClaw: Authenticated `/hooks/wake` and mapped `wake` payloads are promoted into the trusted `System:` prompt channel
GHSA-jf56-mccx-5f3f
pkg: openclaw
eco: npm
published: Apr 9, 2026
## Impact

Authenticated `/hooks/wake` and mapped `wake` payloads are promoted into the trusted `System:` prompt channel.

An authenticated wake hook or mapped wake payload could be promoted into the trusted System prompt channel instead of an untrusted event.

OpenClaw is a user-controlled local as…

GitHub-GHSA

HIGH
OpenClaw: Lower-trust background runtime output is injected into trusted `System:` events, and local async exec completion misses the intended `exec-event` downgrade
GHSA-gfmx-pph7-g46x
pkg: openclaw
eco: npm
published: Apr 9, 2026
## Impact

Lower-trust background runtime output is injected into trusted `System:` events, and local async exec completion misses the intended `exec-event` downgrade.

Lower-trust runtime/background output could be promoted into trusted System events, allowing prompt-injection into later agent turn…

GitHub-GHSA

HIGH
Pretext: Algorithmic Complexity (DoS) in the text analysis phase
GHSA-5478-66c3-rhxr
pkg: @chenglou/pretext
eco: npm
published: Apr 8, 2026
`isRepeatedSingleCharRun()` in `src/analysis.ts` (line 285) re-scans the entire accumulated segment on every merge iteration during text analysis, producing O(n²) total work for input consisting of repeated identical punctuation characters. An attacker who controls text passed to `prepare()` can bl…
GitHub-GHSA

HIGH
mercure has Topic Selector Cache Key Collision
GHSA-hwr4-mq23-wcv5
pkg: github.com/dunglas/mercure
eco: go
published: Apr 8, 2026
### Impact

A cache key collision vulnerability in `TopicSelectorStore` allows an attacker to poison the match result cache, potentially causing private updates to be delivered to unauthorized subscribers or blocking delivery to authorized ones.

The cache key was constructed by concatenating the to…

CVE-2026-39972
GitHub-GHSA

HIGH
opentelemetry-go: BSD kenv command not using absolute path enables PATH hijacking
GHSA-hfvc-g4fc-pqhx
pkg: go.opentelemetry.io/otel/sdk
eco: go
published: Apr 8, 2026
## Summary

The fix for GHSA-9h8m-3fm2-qjrq (CVE-2026-24051) changed the Darwin `ioreg` command to use an absolute path but left the BSD `kenv` command using a bare name, allowing the same PATH hijacking attack on BSD and Solaris platforms.

## Root Cause

`sdk/resource/host_id.go` line 42:

if …

CVE-2026-39883
GitHub-GHSA

HIGH
stata-mcp has insufficient validation of user-supplied Stata do-file content that can lead to command execution
GHSA-jpcj-7wfg-mqxv
pkg: stata-mcp
eco: pip
published: Apr 8, 2026
A vulnerability was identified in stata-mcp prior to v1.13.0 where insufficient validation of user-supplied Stata do-file content can lead to command execution.
CVE-2026-31040
GitHub-GHSA

HIGH
XWiki vulnerable to remote code execution with script right through unprotected Velocity scripting API
GHSA-h259-74h5-4rh9
pkg: org.xwiki.platform:xwiki-platform-oldcore, org.xwiki.platform:xwiki-platform-oldcore, org.xwiki.platform:xwiki-platform-legacy-oldcore
eco: maven
published: Apr 8, 2026
### Impact
An improperly protected scripting API allows any user with script right to bypass the sandboxing of the Velocity scripting API and execute, e.g., arbitrary Python scripts, allowing full access to the XWiki instance and thereby compromising the confidentiality, integrity and availability o…
CVE-2026-33229
GitHub-GHSA

HIGH
File Browser share links remain accessible after Share/Download permissions are revoked
GHSA-v9w4-gm2x-6rvf
pkg: github.com/filebrowser/filebrowser/v2
eco: go
published: Apr 8, 2026
When an admin revokes a user's Share and Download permissions, existing share links created by that user remain fully accessible to unauthenticated users. The public share download handler does not re-check the share owner's current permissions. Verified with a running PoC against v2.62.2 (commit 86…
CVE-2026-35604
GitHub-GHSA

HIGH
File Browser has a Command Injection via Hook Runner
GHSA-jvpw-637p-h3pw
pkg: github.com/filebrowser/filebrowser/v2
eco: go
published: Apr 8, 2026
> [!NOTE]
> **This feature has been disabled by default for all installations from v2.33.8 onwards, including for existent installations**. To exploit this vulnerability, the instance administrator must turn on a feature and ignore all the warnings about known vulnerabilities. We're publishing this …
CVE-2026-35585
GitHub-GHSA

HIGH
LiteLLM: Password hash exposure and pass-the-hash authentication bypass
GHSA-69×8-hrgq-fjj8
pkg: litellm
eco: pip
published: Apr 8, 2026
### Impact

Three issues combine into a full authentication bypass chain:

1. Weak hashing: User passwords are stored as unsalted SHA-256 hashes, making them vulnerable to rainbow table attacks and trivially identifying users with identical passwords.
2. Hash exposure: Multiple API endpoints (/user/…

GitHub-GHSA

HIGH
Java-SDK has a DNS Rebinding Vulnerability
GHSA-8jxr-pr72-r468
pkg: io.modelcontextprotocol.sdk:mcp-core
eco: maven
published: Apr 7, 2026
### Summary

The java-sdk contains a DNS rebinding vulnerability. This vulnerability allows an attacker to access a locally or network-private java-sdk MCP server via a victims browser that is either local, or network adjacent.

This allows an attacker to make any tool call to the server as if they …

CVE-2026-35568
GitHub-GHSA

HIGH
Gotenberg has incomplete fix for ExifTool arbitrary file write: case-insensitive bypass and missing HardLink/SymLink tags
GHSA-qmwh-9m9c-h36m
pkg: github.com/gotenberg/gotenberg/v8
eco: go
published: Apr 7, 2026
## Summary

The fix for ExifTool arbitrary file write (commit `043b158`, released in v8.29.0) uses a case-sensitive blocklist to filter dangerous pseudo-tags. ExifTool processes tag names case-insensitively, so alternate casings bypass the filter. The blocklist also omits the `HardLink` and `SymLink…

GitHub-GHSA

HIGH
Gotenberg Vulnerable to ReDoS via extraHttpHeaders scope feature
GHSA-fmwg-qcqh-m992
pkg: github.com/gotenberg/gotenberg/v8
eco: go
published: Apr 7, 2026
### Summary
Gotenberg uses `dlclark/regexp2` to compile user-supplied scope patterns without setting a proper timeout. Users with access to features using this logic can hang workers indefinitely.

### Details
Gotenberg uses `dlclark/regexp2` to compile user-supplied scope patterns (gotenberg/pkg/m…

CVE-2026-35458
GitHub-GHSA

HIGH
Lupa has a Sandbox escape and RCE due to incomplete attribute_filter enforcement in getattr / setattr
GHSA-69v7-xpr6-6gjm
pkg: lupa
eco: pip
published: Apr 7, 2026
### Summary
The `attribute_filter` in the Lupa library is intended to restrict access to sensitive Python attributes when exposing objects to Lua.

However, the filter is not consistently applied when attributes are accessed through built-in functions like getattr and setattr. This allows an attacke…

CVE-2026-34444
GitHub-GHSA

HIGH
Authorizer: Password reset token theft and full auth token redirect via unvalidated redirect_uri
GHSA-x3f4-v83f-7wp2
pkg: github.com/authorizerdev/authorizer
eco: go
published: Apr 6, 2026
Hi,

I found that 6 endpoints in Authorizer accept a user-controlled `redirect_uri` and append sensitive tokens to it without validating the URL against `AllowedOrigins`. The OAuth `/app` handler validates redirect_uri at `http_handlers/app.go:46`, but the GraphQL mutations and verify_email handler …

GitHub-GHSA

MEDIUM
OpenEXR has buffer overflow in PyOpenEXR_old's channels() and channel()
GHSA-vh63-9mqx-wmjr
pkg: OpenEXR, OpenEXR, OpenEXR
eco: pip
published: Apr 6, 2026
### Summary

A memory safety bug in the legacy OpenEXR Python adapter (the deprecated OpenEXR.InputFile wrapper) allow crashes and likely code execution when opening attacker-controlled EXR files or when passing crafted Python objects.

Integer overflow and unchecked allocation in InputFile.channel(…

CVE-2025-64182
GitHub-GHSA

MEDIUM
OpenEXR has use after free in PyObject_StealAttrString
GHSA-57cw-j6vp-2p9m
pkg: OpenEXR, OpenEXR, OpenEXR
eco: pip
published: Apr 6, 2026
### Summary
There is a use-after-free in PyObject_StealAttrString of pyOpenEXR_old.cpp.

This bug was found with [ZeroPath](https://zeropath.com/?utm_source=joshua.hu).

### Details

The legacy adapter defines PyObject_StealAttrString that calls PyObject_GetAttrString to obtain a new reference, imme…

CVE-2025-64183
GitHub-GHSA

MEDIUM
Duplicate Advisory: OpenClaw: SSRF via Unguarded Configured Base URLs in Multiple Channel Extensions (Incomplete Fix for CVE-2026-28476)
GHSA-8j7f-g9gv-7jhc
pkg: openclaw
eco: npm
published: Apr 10, 2026
### Duplicate Advisory
This advisory has been withdrawn because it is a duplicate of GHSA-rhfg-j8jq-7v2h. This link is maintained to preserve external references.

### Original Description
OpenClaw before 2026.3.25 contains a server-side request forgery vulnerability in multiple channel extensions t…

GitHub-GHSA

MEDIUM
Duplicate Advisory: OpenClaw: Tlon cite expansion happens before channel and DM authorization is complete
GHSA-p6j4-wvmc-vx2h
pkg: openclaw
eco: npm
published: Apr 10, 2026
### Duplicate Advisory
This advisory has been withdrawn because it is a duplicate of GHSA-vfg3-pqpq-93m4. This link is maintained to preserve external references.

### Original Description
OpenClaw before 2026.3.22 performs cite expansion before completing channel and DM authorization checks, allowi…

GitHub-GHSA

MEDIUM
FoundationAgents MetaGPT vulnerable to OS Command Injection in metagpt/utils/common.py
GHSA-qw5f-qpq5-ppfg
pkg: metagpt
eco: pip
published: Apr 9, 2026
A vulnerability was found in FoundationAgents MetaGPT up to 0.8.1. Impacted is the function get_mime_type of the file metagpt/utils/common.py. The manipulation results in os command injection. The attack can be executed remotely. The exploit has been made public and could be used. The project was in…
CVE-2026-5973
GitHub-GHSA

MEDIUM
FoundationAgents MetaGPT vulnerable to os command injection via the Terminal.run_command
GHSA-wp29-qmvj-frvp
pkg: metagpt
eco: pip
published: Apr 9, 2026
A vulnerability has been found in FoundationAgents MetaGPT up to 0.8.1. This issue affects the function Terminal.run_command in the library metagpt/tools/libs/terminal.py. The manipulation leads to os command injection. Remote exploitation of the attack is possible. The exploit has been disclosed to…
CVE-2026-5972
GitHub-GHSA

MEDIUM
FoundationAgents MetaGPT vulnerable to OS Command Injection in metagpt/tools/libs/terminal.py
GHSA-fcc8-4q7h-wvwc
pkg: metagpt
eco: pip
published: Apr 9, 2026
A vulnerability was determined in FoundationAgents MetaGPT up to 0.8.1. The affected element is the function Bash.run in the library metagpt/tools/libs/terminal.py. This manipulation causes os command injection. The attack is possible to be carried out remotely. The project was informed of the probl…
CVE-2026-5974
GitHub-GHSA

MEDIUM
FoundationAgents MetaGPT vulnerable to eval injection
GHSA-3ghp-8r47-4gj4
pkg: metagpt
eco: pip
published: Apr 9, 2026
A flaw has been found in FoundationAgents MetaGPT up to 0.8.1. This vulnerability affects the function ActionNode.xml_fill of the file metagpt/actions/action_node.py of the component XML Handler. Executing a manipulation can lead to improper neutralization of directives in dynamically evaluated code…
CVE-2026-5971
GitHub-GHSA

MEDIUM
decolua 9router vulnerable to authorization bypass
GHSA-xrrh-p7f2-27vm
pkg: 9router
eco: npm
published: Apr 9, 2026
A security vulnerability has been detected in decolua 9router up to 0.3.47. The impacted element is an unknown function of the file /api of the component Administrative API Endpoint. The manipulation leads to authorization bypass. The attack is possible to be carried out remotely. The exploit has be…
CVE-2026-5842
GitHub-GHSA

MEDIUM
api-lab-mcp vulnerable to SSRF
GHSA-crh9-3gjh-m6gc
pkg: api-lab-mcp
eco: npm
published: Apr 9, 2026
A weakness has been identified in atototo api-lab-mcp up to 0.2.1. This affects the function analyze_api_spec/generate_test_scenarios/test_http_endpoint of the file src/mcp/http-server.ts of the component HTTP Interface. This manipulation of the argument source/url causes server-side request forgery…
CVE-2026-5832
GitHub-GHSA

MEDIUM
PowerJob's GroovyEvaluator.evaluate endpoint vulnerable to code injection
GHSA-wpwf-v25w-54g3
pkg: tech.powerjob:powerjob-server-starter
eco: maven
published: Apr 7, 2026
A security flaw has been discovered in PowerJob 5.1.0/5.1.1/5.1.2. The affected element is the function GroovyEvaluator.evaluate of the file /openApi/addWorkflowNode of the component OpenAPI Endpoint. The manipulation of the argument nodeParams results in code injection. The attack can be executed r…
CVE-2026-5739
GitHub-GHSA

MEDIUM
PowerJob vulnerable to SQL injection
GHSA-4fp2-3xgg-jg4w
pkg: tech.powerjob:powerjob-server-starter
eco: maven
published: Apr 7, 2026
A vulnerability was identified in PowerJob 5.1.0/5.1.1/5.1.2. Impacted is an unknown function of the file powerjob-server/powerjob-server-starter/src/main/java/tech/powerjob/server/web/controller/InstanceController.java of the component detailPlus Endpoint. The manipulation of the argument customQue…
CVE-2026-5736
GitHub-GHSA

MEDIUM
Aiven Operator has cross-namespace secret exfiltration via ClickhouseUser connInfoSecretSource
GHSA-99j8-wv67-4c72
pkg: github.com/aiven/aiven-operator
eco: go
published: Apr 10, 2026
### Impact
A developer with create permission on ClickhouseUser CRDs in their own namespace can exfiltrate secrets from any other namespace — production database credentials, API keys, service tokens — with a single kubectl apply. The operator reads the victim's secret using its ClusterRole and …
CVE-2026-39961
NVD

MEDIUM
CVE-2026-39961
CVE-2026-39961
pkg: kubernetes

published: Apr 9, 2026

Aiven Operator allows you to provision and manage Aiven Services from your Kubernetes cluster. From 0.31.0 to before 0.37.0, a developer with create permission on ClickhouseUser CRDs in their own namespace can exfiltrate secrets from any other namespace — production database credentials, API keys,…
CWE: CWE-269, CWE-441
GitHub-GHSA

MEDIUM
pyload-ng: Authorization Bypass for SSL Certificate/Key Configuration Due to Option Name Mismatch in pyload-ng
GHSA-ppvx-rwh9-7rj7
pkg: pyload-ng
eco: pip
published: Apr 8, 2026
## Summary

The `ADMIN_ONLY_CORE_OPTIONS` authorization set in `set_config_value()` uses incorrect option names `ssl_cert` and `ssl_key`, while the actual configuration option names are `ssl_certfile` and `ssl_keyfile`. This name mismatch causes the admin-only check to always evaluate to False, allo…

CVE-2026-35586
NVD

MEDIUM
CVE-2026-35586
CVE-2026-35586
pkg: ssl

published: Apr 7, 2026

pyLoad is a free and open-source download manager written in Python. Prior to 0.5.0b3.dev97, the ADMIN_ONLY_CORE_OPTIONS authorization set in set_config_value() uses incorrect option names ssl_cert and ssl_key, while the actual configuration option names are ssl_certfile and ssl_keyfile. This name m…
CWE: CWE-863
NVD

MEDIUM
CVE-2026-4837
CVE-2026-4837
pkg: tls

published: Apr 8, 2026

An eval() injection vulnerability in the Rapid7 Insight Agent beaconing logic for Linux versions could theoretically allow an attacker to achieve remote code execution as root via a crafted beacon response. Because the Agent uses mutual TLS (mTLS) to verify commands from the Rapid7 Platform, it is u…
CWE: CWE-95
NVD

MEDIUM
CVE-2026-35197
CVE-2026-35197
pkg: express

published: Apr 6, 2026

dye is a portable and respectful color library for shell scripts. Prior to 1.1.1, certain dye template expressions would result in execution of arbitrary code. This issue was discovered and fixed by dye's author, and is not known to be exploited. This vulnerability is fixed in 1.1.1.
CWE: CWE-94
GitHub-GHSA

MEDIUM
Ech0 Scope Bypass: profile:read Access Token Can Change Admin Password and Escalate to Unrestricted Session
GHSA-hm2h-wwwh-g49x
pkg: github.com/lin-snow/ech0
eco: go
published: Apr 10, 2026
## Summary

The `PUT /user` endpoint is protected by `RequireScopes("profile:read")`, which is a read-only scope. However, the endpoint performs write operations including password changes. An attacker who obtains an admin's restricted `profile:read` access token can change the admin's password, the…

GitHub-GHSA

MEDIUM
Ech0: Missing authorization on dashboard log endpoints allows low-privilege users to access sensitive system logs
GHSA-cp79-9mwr-wr49
pkg: github.com/lin-snow/ech0
eco: go
published: Apr 10, 2026
## Summary

Ech0 allows any authenticated user to read historical system logs and subscribe to live log streams because the dashboard log endpoints validate only that a JWT is present and valid, but do not require an administrator role or privileged scope.

## Impact

Any valid user session can acce…

GitHub-GHSA

MEDIUM
PraisonAI Vulnerable to Decompression Bomb DoS via Recipe Bundle Extraction Without Size Limits
GHSA-f2h6-7xfr-xm8w
pkg: PraisonAI
eco: pip
published: Apr 10, 2026
## Summary

The `_safe_extractall()` function in PraisonAI's recipe registry validates archive members against path traversal attacks but performs no checks on individual member sizes, cumulative extracted size, or member count before calling `tar.extractall()`. An attacker can publish a malicious r…

CVE-2026-40148
NVD

MEDIUM
CVE-2026-35594
CVE-2026-35594
pkg: jwt

published: Apr 10, 2026

Vikunja is an open-source self-hosted task management platform. Prior to 2.3.0, Vikunja's link share authentication (GetLinkShareFromClaims in pkg/models/link_sharing.go) constructs authorization objects entirely from JWT claims without any server-side database validation. When a project owner delet…
CWE: CWE-613
GitHub-GHSA

MEDIUM
Vikunja has Algorithmic Complexity DoS in Repeating Task Handler
GHSA-r4fg-73rc-hhh7
pkg: code.vikunja.io/api
eco: go
published: Apr 10, 2026
## Summary

The `addRepeatIntervalToTime` function uses an O(n) loop that advances a date by the task's `RepeatAfter` duration until it exceeds the current time. By creating a repeating task with a 1-second interval and a due date far in the past, an attacker triggers billions of loop iterations, co…

CVE-2026-35599
GitHub-GHSA

MEDIUM
Vikunja: Link Share JWT tokens remain valid for 72 hours after share deletion or permission downgrade
GHSA-96q5-xm3p-7m84
pkg: code.vikunja.io/api
eco: go
published: Apr 10, 2026
## Title
Link Share JWT tokens remain valid for 72 hours after share deletion or permission downgrade

## Description

Vikunja's link share authentication constructs authorization objects entirely from JWT claims without any server-side database validation. When a project owner deletes a link share …

CVE-2026-35594
NVD

MEDIUM
CVE-2021-47960
CVE-2021-47960
pkg: ssl

published: Apr 10, 2026

A files or directories accessible to external parties vulnerability in Synology SSL VPN Client before 1.4.5-0684 allows remote attackers to access files within the installation directory via a local HTTP server bound to the loopback interface. By leveraging user interaction with a crafted web page, …
CWE: CWE-552
GitHub-GHSA

MEDIUM
Duplicate Advisory: OpenClaw: Nostr inbound DMs could trigger unauthenticated crypto work before sender policy enforcement
GHSA-2j53-2c28-g9v2
pkg: openclaw
eco: npm
published: Apr 10, 2026
### Duplicate Advisory
This advisory has been withdrawn because it is a duplicate of GHSA-65h8-27jh-q8wv. This link is maintained to preserve external references.

### Original Description
OpenClaw before 2026.3.22 performs cryptographic and dispatch operations on inbound Nostr direct messages befor…

NVD

MEDIUM
CVE-2026-39848
CVE-2026-39848
pkg: docker

published: Apr 9, 2026

Dockyard is a Docker container management app. Prior to 1.1.0, Docker container start and stop operations are performed through GET requests without CSRF protection. A remote attacker can cause a logged-in administrator's browser to request /apps/action.php?action=stop&name=<container> or /apps/acti…
CWE: CWE-306
GitHub-GHSA

MEDIUM
Apache Tomcat: CLIENT_CERT authentication does not fail as expected
GHSA-24j9-x2wg-9qv6
pkg: org.apache.tomcat:tomcat-catalina, org.apache.tomcat:tomcat-catalina, org.apache.tomcat:tomcat-catalina
eco: maven
published: Apr 9, 2026
CLIENT_CERT authentication does not fail as expected for some scenarios when soft fail is disabled and FFM is used in Apache Tomcat.

This issue affects Apache Tomcat: from 11.0.0-M14 through 11.0.20, from 10.1.22 through 10.1.53, from 9.0.92 through 9.0.116.

Users are recommended to upgrade to ver…

CVE-2026-34500
NVD

MEDIUM
CVE-2026-34500
CVE-2026-34500
pkg: apache

published: Apr 9, 2026

CLIENT_CERT authentication does not fail as expected for some scenarios when soft fail is disabled and FFM is used in Apache Tomcat.

This issue affects Apache Tomcat: from 11.0.0-M14 through 11.0.20, from 10.1.22 through 10.1.53, from 9.0.92 through 9.0.116.

Users are recommended to upgrade to ver…

CWE: CWE-287
GitHub-GHSA

MEDIUM
Apache Airflow has an authorization bypass in DagRun wait endpoint
GHSA-r7vr-m4jw-r794
pkg: apache-airflow
eco: pip
published: Apr 9, 2026
Apache Airflow versions 3.0.0 through 3.1.8 DagRun wait endpoint returns XCom result values even to users who only have DAG Run read permissions, such as the Viewer role.This behavior conflicts with the FAB RBAC model, which treats XCom as a separate protected resource, and with the security model d…
CVE-2026-34538
NVD

MEDIUM
CVE-2026-34538
CVE-2026-34538
pkg: apache

published: Apr 9, 2026

Apache Airflow versions 3.0.0 through 3.1.8 DagRun wait endpoint returns XCom result values even to users who only have DAG Run read permissions, such as the Viewer role.This behavior conflicts with the FAB RBAC model, which treats XCom as a separate protected resource, and with the security model d…
CWE: CWE-668
GitHub-GHSA

MEDIUM
OpenFGA: Unauthenticated playground endpoint discloses preshared API key in HTML response
GHSA-68m9-983m-f3v5
pkg: github.com/openfga/openfga
eco: go
published: Apr 8, 2026
### Description
When OpenFGA is configured to use preshared-key authentication with the built-in playground enabled, the local server includes the preshared API key in the HTML response of the /playground endpoint. The /playground endpoint is enabled by default and does not require authentication. I…
GitHub-GHSA

MEDIUM
PraisonAI has Memory State Leakage and Path Traversal in MultiAgent Context Handling
GHSA-766v-q9x3-g744
pkg: praisonaiagents
eco: pip
published: Apr 8, 2026
## Summary
The `MultiAgentLedger` and `MultiAgentMonitor` components in the provided code exhibit vulnerabilities that can lead to context leakage and arbitrary file operations. Specifically:
1. **Memory State Leakage via Agent ID Collision**: The `MultiAgentLedger` uses a dictionary to store ledger…
GitHub-GHSA

MEDIUM
kubernetes-graphql-gateway: GraphQL Endpoint Vulnerable to Authenticated Denial-of-Service via Unrestricted Query Execution
GHSA-h9mw-h4qc-f5jf
pkg: github.com/platform-mesh/kubernetes-graphql-gateway
eco: go
published: Apr 8, 2026
**CVSS 6.5 Medium** — The GraphQL API served by kubernetes-graphql-gateway is vulnerable to Denial-of-Service (DoS) attacks due to a complete absence of query resource controls (depth limiting, complexity analysis, response size capping, and rate limiting). An authenticated attacker can craft quer…
NVD

MEDIUM
CVE-2026-32588
CVE-2026-32588
pkg: apache

published: Apr 7, 2026

Authenticated DoS over CQL in Apache Cassandra 4.0, 4.1, 5.0 allows authenticated user to raise query latencies via repeated password changes.
Users are recommended to upgrade to version 4.0.20, 4.1.11, 5.0.7, which fixes this issue.
CWE: CWE-400
GitHub-GHSA

MEDIUM
Django has potential DoS via MultiPartParser through crafted multipart uploads
GHSA-5mf9-h53q-7mhq
pkg: Django, Django, Django
eco: pip
published: Apr 7, 2026
An issue was discovered in 6.0 before 6.0.4, 5.2 before 5.2.13, and 4.2 before 4.2.30. `MultiPartParser` allows remote attackers to degrade performance by submitting multipart uploads with `Content-Transfer-Encoding: base64` including excessive whitespace.

Earlier, unsupported Django series (such a…

CVE-2026-33033
NVD

MEDIUM
CVE-2026-33033
CVE-2026-33033
pkg: django

published: Apr 7, 2026

An issue was discovered in 6.0 before 6.0.4, 5.2 before 5.2.13, and 4.2 before 4.2.30.
`MultiPartParser` allows remote attackers to degrade performance by submitting multipart uploads with `Content-Transfer-Encoding: base64` including excessive whitespace.
Earlier, unsupported Django series (such as…
CWE: CWE-407
GitHub-GHSA

MEDIUM
HuggingFace Transformers allows for arbitrary code execution in the `Trainer` class
GHSA-69w3-r845-3855
pkg: transformers
eco: pip
published: Apr 7, 2026
A vulnerability in the HuggingFace Transformers library, specifically in the `Trainer` class, allows for arbitrary code execution. The `_load_rng_state()` method in `src/transformers/trainer.py` at line 3059 calls `torch.load()` without the `weights_only=True` parameter. This issue affects all versi…
CVE-2026-1839
GitHub-GHSA

MEDIUM
kedro-datasets has a path traversal vulnerability in PartitionedDataset that allows arbitrary file write
GHSA-cjg8-h5qc-hrjv
pkg: kedro-datasets
eco: pip
published: Apr 6, 2026
### Impact

PartitionedDataset in kedro-datasets was vulnerable to path traversal. Partition IDs were concatenated directly with the dataset base path without validation. An attacker or malicious input containing .. components in a partition ID could cause files to be written outside the configured …

CVE-2026-35492
GitHub-GHSA

MEDIUM
OpenEXR has heap-buffer-overflow via signed integer underflow in ImfContextInit.cpp
GHSA-q6vj-wxvf-5m8c
pkg: OpenEXR, OpenEXR
eco: pip
published: Apr 6, 2026
## Summary

A heap-buffer-overflow (OOB read) occurs in the `istream_nonparallel_read` function in `ImfContextInit.cpp` when parsing a malformed EXR file through a memory-mapped `IStream`. A signed integer subtraction produces a negative value that is implicitly converted to `size_t`, resulting in a…

CVE-2026-26981
NVD

MEDIUM
CVE-2025-57851
CVE-2025-57851
pkg: kubernetes

published: Apr 8, 2026

A container privilege escalation flaw was found in certain Multicluster Engine for Kubernetes images. This issue stems from the /etc/passwd file being created with group-writable permissions during build time. In certain conditions, an attacker who can execute commands within an affected container, …
CWE: CWE-276
GitHub-GHSA

MEDIUM
Agions taskflow-ai vulnerable to os command injection in src/mcp/server/handlers.ts
GHSA-3xp3-pr8x-f755
pkg: taskflow-ai
eco: npm
published: Apr 9, 2026
A security flaw has been discovered in Agions taskflow-ai up to 2.1.8. This impacts an unknown function of the file src/mcp/server/handlers.ts of the component terminal_execute. Performing a manipulation results in os command injection. The attack is possible to be carried out remotely. Upgrading to…
CVE-2026-5831
GitHub-GHSA

MEDIUM
PraisonAIAgents: Arbitrary File Read via read_skill_file Missing Workspace Boundary and Approval Gate
GHSA-grrg-5cg9-58pf
pkg: praisonaiagents
eco: pip
published: Apr 10, 2026
## Summary

`read_skill_file()` in `skill_tools.py` allows reading arbitrary files from the filesystem by accepting an unrestricted `skill_path` parameter. Unlike `file_tools.read_file` which enforces workspace boundary confinement, and unlike `run_skill_script` which requires critical-level approva…

CVE-2026-40117
GitHub-GHSA

MEDIUM
PraisonAI has Unrestricted Upload Size in WSGI Recipe Registry Server that Enables Memory Exhaustion DoS
GHSA-2xgv-5cv2-47vv
pkg: PraisonAI
eco: pip
published: Apr 10, 2026
## Summary

The WSGI-based recipe registry server (`server.py`) reads the entire HTTP request body into memory based on the client-supplied `Content-Length` header with no upper bound. Combined with authentication being disabled by default (no token configured), any local process can send arbitraril…

CVE-2026-40115
GitHub-GHSA

MEDIUM
rfc3161-client Has Improper Certificate Validation
GHSA-3xxc-pwj6-jgrj
pkg: rfc3161-client
eco: pip
published: Apr 8, 2026
### Summary

An Authorization Bypass vulnerability in `rfc3161-client`'s signature verification allows any attacker to impersonate a trusted TimeStamping Authority (TSA). By exploiting a logic flaw in how the library extracts the leaf certificate from an unordered PKCS#7 bag of certificates, an atta…

CVE-2026-33753
GitHub-GHSA

MEDIUM
netavark has incorrect error handling for malformed tcp packets
GHSA-hfpq-x728-986j
pkg: netavark
eco: rust
published: Apr 7, 2026
### Impact

A truncated TCP DNS query followed by a connection reset causes aardvark-dns to enter an unrecoverable infinite error loop at 100% CPU.

### Patches
https://github.com/containers/aardvark-dns/commit/3b49ea7b38bdea134b7f03256f2e13f44ce73bb1

### Workarounds
None

### Credits

Thanks to @d…

CVE-2026-35406
GitHub-GHSA

MEDIUM
go-ipld-prime: DAG-CBOR decoder unbounded memory allocation from CBOR headers
GHSA-378j-3jfj-8r9f
pkg: github.com/ipld/go-ipld-prime
eco: go
published: Apr 6, 2026
The DAG-CBOR decoder uses collection sizes declared in CBOR headers as Go preallocation hints for maps and lists. The decoder does not cap these size hints or account for their cost in its allocation budget, allowing small payloads to cause excessive memory allocation.

A CBOR map or list header can…

CVE-2026-35480
GitHub-GHSA

MEDIUM
go.etcd.io/bbolt affected by index out-of-range vulnerability
GHSA-6jwv-w5xf-7j27
pkg: go.etcd.io/bbolt
eco: go
published: Apr 6, 2026
Index out-of-range when encountering a branch page with zero elements in go.etcd.io/bbolt
CVE-2026-33817
GitHub-GHSA

MEDIUM
Apache Tomcat has an Open Redirect vulnerability
GHSA-9m3c-qcxr-9×87
pkg: org.apache.tomcat:tomcat-catalina, org.apache.tomcat:tomcat-catalina, org.apache.tomcat:tomcat
eco: maven
published: Apr 9, 2026
Occasional URL redirection to untrusted Site ('Open Redirect') vulnerability in Apache Tomcat via the LoadBalancerDrainingValve.

This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.18, from 10.1.0-M1 through 10.1.52, from 9.0.0.M23 through 9.0.115, from 8.5.30 through 8.5.100.
Other, unsu…

CVE-2026-25854
GitHub-GHSA

MEDIUM
Unhead has a hasDangerousProtocol() bypass via leading-zero padded HTML entities in useHeadSafe()
GHSA-95h2-gj7x-gx9w
pkg: unhead
eco: npm
published: Apr 9, 2026
##EVIDENCE

<img width="1900" height="855" alt="Screenshot_2026-03-25_090729" src="https://github.com/user-attachments/assets/3da93464-1caf-46ca-818f-46f8fe32ab50" />
<img width="1919" height="947" alt="Screenshot_2026-03-25_090715" src="https://github.com/user-attachments/assets/b27b1fc3-fa89-4864-…

CVE-2026-39315
NVD

MEDIUM
CVE-2026-25854
CVE-2026-25854
pkg: apache

published: Apr 9, 2026

Occasional URL redirection to untrusted Site ('Open Redirect') vulnerability in Apache Tomcat via the LoadBalancerDrainingValve.

This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.18, from 10.1.0-M1 through 10.1.52, from 9.0.0.M23 through 9.0.115, from 8.5.30 through 8.5.100.
Other, unsu…

CWE: CWE-601
NVD

MEDIUM
CVE-2026-39315
CVE-2026-39315
pkg: express

published: Apr 9, 2026

Unhead is a document head and template manager. Prior to 2.1.13, useHeadSafe() is the composable that Nuxt's own documentation explicitly recommends for rendering user-supplied content in <head> safely. Internally, the hasDangerousProtocol() function in packages/unhead/src/plugins/safe.ts decodes HT…
CWE: CWE-184
GitHub-GHSA

MEDIUM
Vikunja Vulnerable to TOTP Brute-Force Due to Non-Functional Account Lockout
GHSA-fgfv-pv97-6cmj
pkg: code.vikunja.io/api
eco: go
published: Apr 10, 2026
## Summary

The TOTP failed-attempt lockout mechanism is non-functional due to a database transaction handling bug. The account lock is written to the same database session that the login handler always rolls back on TOTP failure, so the lockout is triggered but never persisted. This allows unlimite…

CVE-2026-35597
GitHub-GHSA

MEDIUM
Axios HTTP/2 Session Cleanup State Corruption Vulnerability
GHSA-qj83-cq47-w5f8
pkg: axios
eco: npm
published: Apr 8, 2026
### Summary

Axios HTTP/2 session cleanup logic contains a state corruption bug that allows a malicious server to crash the client process through concurrent session closures. This denial-of-service vulnerability affects axios versions prior to 1.13.2 when HTTP/2 is enabled.

### Details

The vulner…

CVE-2026-39865
NVD

MEDIUM
CVE-2026-39865
CVE-2026-39865
pkg: axios

published: Apr 8, 2026

Axios is a promise based HTTP client for the browser and Node.js. Prior to 1.13.2, Axios HTTP/2 session cleanup logic contains a state corruption bug that allows a malicious server to crash the client process through concurrent session closures. The vulnerability exists in the Http2Sessions.getSessi…
CWE: CWE-400, CWE-662
GitHub-GHSA

MEDIUM
NiceGUI: Upload filename sanitization bypass via backslashes allows path traversal on Windows
GHSA-w8wv-vfpc-hw2w
pkg: nicegui
eco: pip
published: Apr 8, 2026
### Summary

The upload filename sanitization introduced in GHSA-9ffm-fxg3-xrhh uses `PurePosixPath(filename).name` to strip path components. Since `PurePosixPath` only recognizes forward slashes (`/`) as path separators, an attacker can bypass this sanitization on Windows by using backslashes (`\`)…

CVE-2026-39844
GitHub-GHSA

MEDIUM
Denial of Service due to Panic in AWS SDK for Go v2 SDK EventStream Decoder
GHSA-xmrv-pmrh-hhx2
pkg: github.com/aws/aws-sdk-go-v2/aws/protocol/eventstream, github.com/aws/aws-sdk-go-v2/service/bedrockagentcore, github.com/aws/aws-sdk-go-v2/service/bedrockagentruntime
eco: go
published: Apr 8, 2026
**CVSSv3.1 Rating**: [Medium]
**CVSSv3.1 Score**: [5.9]
**CVSSv3.1 Vector String**: [CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H]

## Summary and Impact
An issue exists in the the EventStream header decoder in AWS SDK for Go v2 in versions predating [2026-03-23](https://github.com/aws/aws-sdk-go-v2…

GitHub-GHSA

MEDIUM
rdiscount has an Out-of-bounds Read
GHSA-6r34-94wq-jhrc
pkg: rdiscount
eco: rubygems
published: Apr 6, 2026
### Summary

A signed length truncation bug causes an out-of-bounds read in the default Markdown parse path. Inputs larger than `INT_MAX` are truncated to a signed `int` before entering the native parser, allowing the parser to read past the end of the supplied buffer and crash the process

### Deta…

CVE-2026-35201
NVD

MEDIUM
CVE-2026-34380
CVE-2026-34380
pkg: openexr openexr

published: Apr 6, 2026

OpenEXR provides the specification and reference implementation of the EXR file format, an image storage format for the motion picture industry. From 3.2.0 to before 3.2.7, 3.3.9, and 3.4.9, a signed integer overflow exists in undo_pxr24_impl() in src/lib/OpenEXRCore/internal_pxr24.c at line 377. Th…
CWE: CWE-190, CWE-787
GitHub-GHSA

MEDIUM
monetr: Protected Transactions Deletable via PUT
GHSA-hqxq-hwqf-wg83
pkg: github.com/monetr/monetr
eco: go
published: Apr 8, 2026
### Summary
A transaction integrity flaw allows an authenticated tenant user to soft-delete synced non-manual transactions through the transaction update endpoint, despite the application explicitly blocking deletion of those transactions via the normal `DELETE` path. This bypass undermines the inte…
CVE-2026-39901
GitHub-GHSA

MEDIUM
LangSmith Client SDKs has Prototype Pollution in langsmith-sdk via Incomplete `__proto__` Guard in Internal lodash `set()`
GHSA-fw9q-39r9-c252
pkg: langsmith
eco: npm
published: Apr 10, 2026
# GHSA-fw9q-39r9-c252: Prototype Pollution via Incomplete Lodash `set()` Guard in `langsmith-sdk`

**Severity:** Medium (CVSS ~5.6)
**Status:** Fixed in 0.5.18

## Summary

The LangSmith JavaScript/TypeScript SDK (`langsmith`) contains an incomplete prototype pollution fix in its internally ven…

CVE-2026-40190
NVD

MEDIUM
CVE-2026-40190
CVE-2026-40190
pkg: lodash

published: Apr 10, 2026

LangSmith Client SDKs provide SDK's for interacting with the LangSmith platform. Prior to 0.5.18, the LangSmith JavaScript/TypeScript SDK (langsmith) contains an incomplete prototype pollution fix in its internally vendored lodash set() utility. The baseAssignValue() function only guards against the…
CWE: CWE-1321
GitHub-GHSA

MEDIUM
Ech0 has SSRF via DNS Resolution Bypass in Webhook URL Validation
GHSA-r2x7-427f-rq69
pkg: github.com/lin-snow/ech0
eco: go
published: Apr 10, 2026
## Summary

The `validateWebhookURL` function in `webhook_setting_service.go` attempts to block webhooks targeting private/internal IP addresses, but only checks literal IP strings via `net.ParseIP()`. Hostnames that DNS-resolve to private IPs (e.g., `169.254.169.254.nip.io`, `10.0.0.1.nip.io`) bypa…

GitHub-GHSA

MEDIUM
Ech0 Comment Panel Endpoints Missing RequireScopes Middleware — Scoped Access Token Bypass
GHSA-fwg7-53p4-g33c
pkg: github.com/lin-snow/ech0
eco: go
published: Apr 10, 2026
## Summary

All 9 comment panel admin endpoints (`/api/panel/comments/*`) are missing `RequireScopes()` middleware, while every other admin endpoint in the application enforces scope-based authorization on access tokens. An admin-issued access token scoped to minimal permissions (e.g., `echo:read` o…

GitHub-GHSA

MEDIUM
PraisonAI: Coarse-Grained Tool Approval Cache Bypasses Per-Invocation Consent for Shell Commands
GHSA-ffp3-3562-8cv3
pkg: praisonaiagents
eco: pip
published: Apr 10, 2026
## Summary

The approval system in PraisonAI Agents caches tool approval decisions by tool name only, not by invocation arguments. Once a user approves `execute_command` for any command (e.g., `ls -la`), all subsequent `execute_command` calls in that execution context bypass the approval prompt enti…

GitHub-GHSA

MEDIUM
PraisonAI Vulnerable to Sensitive Environment Variable Exposure via Untrusted MCP Subprocess Execution
GHSA-pj2r-f9mw-vrcq
pkg: PraisonAI
eco: pip
published: Apr 10, 2026
PraisonAI’s MCP (Model Context Protocol) integration allows spawning background servers via stdio using user-supplied command strings (e.g., `MCP("npx -y @smithery/cli …")`). These commands are executed through Python’s `subprocess` module. By default, the implementation **forwards the entire …
CVE-2026-40159
NVD

MEDIUM
CVE-2026-35477
CVE-2026-35477
pkg: express

published: Apr 8, 2026

InvenTree is an Open Source Inventory Management System. From 1.2.3 to 1.2.6, the fix for CVE-2026-27629 upgraded the PART_NAME_FORMAT validator to use jinja2.sandbox.SandboxedEnvironment. However, the actual renderer in part/helpers.py was not updated and still uses the non-sandboxed jinja2.Environ…
CWE: CWE-1336
NVD

MEDIUM
CVE-2026-27315
CVE-2026-27315
pkg: apache

published: Apr 7, 2026

Sensitive Information Leak in cqlsh in Apache Cassandra 4.0 allows access to sensitive information, like passwords, from previously executed cqlsh command via  ~/.cassandra/cqlsh_history local file access.

Users are recommended to upgrade to version 4.0.20, which fixes this issue.


Description…

CWE: CWE-532
GitHub-GHSA

MEDIUM
PraisonAI Vulnerable to Stored XSS via Unsanitized Agent Output in HTML Rendering (nh3 Not a Required Dependency)
GHSA-cfg2-mxfj-j6pw
pkg: PraisonAI
eco: pip
published: Apr 10, 2026
## Summary

The Flask API endpoint in `src/praisonai/api.py` renders agent output as HTML without effective sanitization. The `_sanitize_html` function relies on the `nh3` library, which is not listed as a required or optional dependency in `pyproject.toml`. When `nh3` is absent (the default install…

CVE-2026-40112
GitHub-GHSA

MEDIUM
Vikunja has File Size Limit Bypass via Vikunja Import
GHSA-qh78-rvg3-cv54
pkg: code.vikunja.io/api
eco: go
published: Apr 10, 2026
## Summary

The Vikunja file import endpoint uses the attacker-controlled `Size` field from the JSON metadata inside the import zip instead of the actual decompressed file content length for the file size enforcement check. By setting `Size` to 0 in the JSON while including large compressed file ent…

CVE-2026-35602
GitHub-GHSA

MEDIUM
Vikunja has HTML Injection via Task Titles in Overdue Email Notifications
GHSA-45q4-x4r9-8fqj
pkg: code.vikunja.io/api
eco: go
published: Apr 10, 2026
## Summary

Task titles are embedded directly into Markdown link syntax in overdue email notifications without escaping Markdown special characters. When rendered by goldmark and sanitized by bluemonday (which allows `<a>` and `<img>` tags), injected Markdown constructs produce phishing links and tr…

CVE-2026-35600
NVD

MEDIUM
CVE-2026-40112
CVE-2026-40112
pkg: flask

published: Apr 9, 2026

PraisonAI is a multi-agent teams system. Prior to 4.5.128, the Flask API endpoint in src/praisonai/api.py renders agent output as HTML without effective sanitization. The _sanitize_html function relies on the nh3 library, which is not listed as a required or optional dependency in pyproject.toml. Wh…
CWE: CWE-79
GitHub-GHSA

MEDIUM
Apache ActiveMQ, Apache ActiveMQ All, Apache ActiveMQ MQTT vulnerable to Integer Overflow or Wraparound
GHSA-xvqc-pp94-fmpx
pkg: org.apache.activemq:apache-activemq, org.apache.activemq:activemq-all, org.apache.activemq:activemq-mqtt
eco: maven
published: Apr 9, 2026
Integer Overflow or Wraparound vulnerability in Apache ActiveMQ, Apache ActiveMQ All, Apache ActiveMQ MQTT.

The fix for "CVE-2025-66168: MQTT control packet remaining length field is not properly validated" was only applied to 5.19.2 (and future 5.19.x) releases but was missed for all 6.0.0+ versio…

CVE-2026-40046
NVD

MEDIUM
CVE-2026-35207
CVE-2026-35207
pkg: tls

published: Apr 9, 2026

dde-control-center is the control panel of DDE, the Deepin Desktop Environment. plugin-deepinid is a plugin in dde-control-center, which provides the deepinid cloud service. Prior to 6.1.80, plugin-deepinid is configured to skip TLS certificate verification when fetching the user's avatar from opena…
CWE: CWE-295
GitHub-GHSA

MEDIUM
pyload-ng has a WebUI JSON permission mismatch that lets ADD/DELETE users invoke MODIFY-only actions
GHSA-rfgh-63mg-8pwm
pkg: pyload-ng
eco: pip
published: Apr 8, 2026
### Summary
Several WebUI JSON endpoints enforce weaker permissions than the core API methods they invoke. This allows authenticated low-privileged users to execute `MODIFY` operations that should be denied by pyLoad's own permission model.

Confirmed mismatches:
– `ADD` user can reorder packages/fi…

NVD

MEDIUM
CVE-2026-3691
CVE-2026-3691
pkg: oauth

published: Apr 11, 2026

OpenClaw Client PKCE Verifier Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose stored credentials on affected installations of OpenClaw. User interaction is required to exploit this vulnerability in that the target must initiate an OAuth authorization flow…
CWE: CWE-200
GitHub-GHSA

MEDIUM
Rembg has a Path Traversal via Custom Model Loading
GHSA-3wqj-33cg-xc48
pkg: rembg
eco: pip
published: Apr 10, 2026
## Summary

A **path traversal vulnerability** in the rembg HTTP server allows unauthenticated remote attackers to read arbitrary files from the server's filesystem. By sending a crafted request with a malicious `model_path` parameter, an attacker can force the server to attempt loading any file as …

CVE-2026-40086
GitHub-GHSA

MEDIUM
xrootd has path traversal in directory listing that allows access to the parent directory via trailing ".." pattern
GHSA-vj8v-p5vw-m6v5
pkg: xrootd
eco: pip
published: Apr 10, 2026
## Summary

A path traversal vulnerability in XRootD allows users to escape the exported directory scope and enumerate the contents of the parent directory by appending `/..` (specifically without trailing slash) to an exported path in `xrdfs ls` or `HTTP PROPFIND` requests.

This bypass ignores the…

GitHub-GHSA

MEDIUM
PraisonAIAgents: Path Traversal via Unvalidated Glob Pattern in list_files Bypasses Workspace Boundary
GHSA-7j2f-xc8p-fjmq
pkg: praisonaiagents
eco: pip
published: Apr 10, 2026
## Summary

The `list_files()` tool in `FileTools` validates the `directory` parameter against workspace boundaries via `_validate_path()`, but passes the `pattern` parameter directly to `Path.glob()` without any validation. Since Python's `Path.glob()` supports `..` path segments, an attacker can u…

CVE-2026-40152
GitHub-GHSA

MEDIUM
PraisonAI: Unauthenticated Information Disclosure of Agent Instructions via /api/agents in AgentOS
GHSA-pm96-6xpr-978x
pkg: PraisonAI
eco: pip
published: Apr 10, 2026
## Summary

The AgentOS deployment platform exposes a `GET /api/agents` endpoint that returns agent names, roles, and the first 100 characters of agent system instructions to any unauthenticated caller. The AgentOS FastAPI application has no authentication middleware, no API key validation, and defa…

CVE-2026-40151
GitHub-GHSA

MEDIUM
Zod jsVideoUrlParser vulnerable to ReDoS in util.js
GHSA-8fgx-wgvr-pcx8
pkg: js-video-url-parser
eco: npm
published: Apr 10, 2026
A weakness has been identified in Zod jsVideoUrlParser up to 0.5.1. The impacted element is the function getTime in the library lib/util.js. This manipulation of the argument timestamp causes inefficient regular expression complexity. It is possible to initiate the attack remotely. The exploit has b…
CVE-2026-5986
GitHub-GHSA

MEDIUM
Duplicate Advisory: OpenClaw: Remote media error responses could trigger unbounded memory allocation before failure
GHSA-hm63-vwj4-mj2q
pkg: openclaw
eco: npm
published: Apr 10, 2026
### Duplicate Advisory
This advisory has been withdrawn because it is a duplicate of GHSA-4qwc-c7g9-4xcw. This link is maintained to preserve external references.

### Original Description
OpenClaw before 2026.3.22 contains an unbounded memory allocation vulnerability in remote media HTTP error hand…

GitHub-GHSA

MEDIUM
Duplicate Advisory: OpenClaw: Feishu webhook reads and parses unauthenticated request bodies before signature validation
GHSA-8f9r-gr6r-x63q
pkg: openclaw
eco: npm
published: Apr 10, 2026
### Duplicate Advisory
This advisory has been withdrawn because it is a duplicate of GHSA-3h52-cx59-c456. This link is maintained to preserve external references.

### Original Description
OpenClaw before 2026.3.25 parses JSON request bodies before validating webhook signatures, allowing unauthentic…

GitHub-GHSA

MEDIUM
Duplicate Advisory: OpenClaw is vulnerable to unauthenticated resource exhaustion through its voice call webhook handling
GHSA-36cp-mh65-x882
pkg: openclaw
eco: npm
published: Apr 10, 2026
### Duplicate Advisory
This advisory has been withdrawn because it is a duplicate of GHSA-rm59-992w-x2mv. This link is maintained to preserve external references.

### Original Description
OpenClaw before 2026.3.22 contains an unauthenticated resource exhaustion vulnerability in voice call webhook h…

NVD

MEDIUM
CVE-2026-5986
CVE-2026-5986
pkg: express

published: Apr 9, 2026

A weakness has been identified in Zod jsVideoUrlParser up to 0.5.1. The impacted element is the function getTime in the library lib/util.js. This manipulation of the argument timestamp causes inefficient regular expression complexity. It is possible to initiate the attack remotely. The exploit has b…
CWE: CWE-400, CWE-1333
GitHub-GHSA

MEDIUM
Apache Tomcat has an Improper Input Validation vulnerability
GHSA-8mc5-53m5-3qj2
pkg: org.apache.tomcat:tomcat-catalina, org.apache.tomcat:tomcat-catalina, org.apache.tomcat:tomcat-catalina
eco: maven
published: Apr 9, 2026
Improper Input Validation vulnerability in Apache Tomcat due to an incomplete fix of CVE-2025-66614.

This issue affects Apache Tomcat: from 11.0.15 through 11.0.19, from 10.1.50 through 10.1.52, from 9.0.113 through 9.0.115.

Users are recommended to upgrade to version 11.0.20, 10.1.53 or 9.0.116, …

CVE-2026-32990
NVD

MEDIUM
CVE-2026-40087
CVE-2026-40087
pkg: express

published: Apr 9, 2026

LangChain is a framework for building agents and LLM-powered applications. Prior to 0.3.84 and 1.2.28, LangChain's f-string prompt-template validation was incomplete in two respects. First, some prompt template classes accepted f-string templates and formatted them without enforcing the same attribu…
CWE: CWE-1336
NVD

MEDIUM
CVE-2026-32990
CVE-2026-32990
pkg: apache

published: Apr 9, 2026

Improper Input Validation vulnerability in Apache Tomcat due to an incomplete fix of CVE-2025-66614.

This issue affects Apache Tomcat: from 11.0.15 through 11.0.19, from 10.1.50 through 10.1.52, from 9.0.113 through 9.0.115.

Users are recommended to upgrade to version 11.0.20, 10.1.53 or 9.0.116, …

CWE: CWE-20
GitHub-GHSA

MEDIUM
fast-jwt: Stateful RegExp (/g or /y) causes non-deterministic allowed-claim validation (logical DoS)
GHSA-3j8v-cgw4-2g6q
pkg: fast-jwt
eco: npm
published: Apr 9, 2026
## Impact

Using certain modifiers on RegExp objects in the allowedAud, allowedIss, allowedSub, allowedJti, or allowedNonce options in verify functions can cause certain unintended behaviours. This is because some modifiers are stateful and will cause failures in every second verification attempt re…

CVE-2026-35040
GitHub-GHSA

MEDIUM
LangChain has incomplete f-string validation in prompt templates
GHSA-926x-3r5x-gfhw
pkg: langchain-core, langchain-core
eco: pip
published: Apr 8, 2026
LangChain's f-string prompt-template validation was incomplete in two respects.

First, some prompt template classes accepted f-string templates and formatted them without enforcing the same attribute-access validation as `PromptTemplate`. In particular, `DictPromptTemplate` and `ImagePromptTemplate…

CVE-2026-40087
GitHub-GHSA

MEDIUM
opentelemetry-go: OTLP HTTP exporters read unbounded HTTP response bodies
GHSA-w8rr-5gcm-pp58
pkg: go.opentelemetry.io/otel/exporters/otlp/otlptrace/otlptracehttp, go.opentelemetry.io/otel/exporters/otlp/otlpmetric/otlpmetrichttp, go.opentelemetry.io/otel/exporters/otlp/otlplog/otlploghttp
eco: go
published: Apr 8, 2026
overview:
this report shows that the otlp HTTP exporters (traces/metrics/logs) read the full HTTP response body into an in-memory `bytes.Buffer` without a size cap.

this is exploitable for memory exhaustion when the configured collector endpoint is attacker-controlled (or a network attacker can mit…

CVE-2026-39882
GitHub-GHSA

MEDIUM
LiquidJS: ownPropertyOnly bypass via sort_natural filter — prototype property information disclosure through sorting side-channel
GHSA-rv5g-f82m-qrvv
pkg: liquidjs
eco: npm
published: Apr 8, 2026
### Summary

The `sort_natural` filter bypasses the `ownPropertyOnly` security option, allowing template authors to extract values of prototype-inherited properties through a sorting side-channel attack. Applications relying on `ownPropertyOnly: true` as a security boundary (e.g., multi-tenant templ…

CVE-2026-39412
GitHub-GHSA

MEDIUM
Hono missing validation of cookie name on write path in setCookie()
GHSA-26pp-8wgv-hjvm
pkg: hono
eco: npm
published: Apr 8, 2026
## Summary

Cookie names are not validated on the write path when using `setCookie()`, `serialize()`, or `serializeSigned()` to generate Set-Cookie headers.

While certain cookie attributes such as domain and path are validated, the cookie name itself may contain invalid characters.

This results in…

GitHub-GHSA

MEDIUM
Hono: Middleware bypass via repeated slashes in serveStatic
GHSA-wmmm-f939-6g9c
pkg: hono
eco: npm
published: Apr 8, 2026
## Summary

A path handling inconsistency in `serveStatic` allows protected static files to be accessed by using repeated slashes (`//`) in the request path.

When route-based middleware (e.g., `/admin/*`) is used for authorization, the router may not match paths containing repeated slashes, while s…

CVE-2026-39407
GitHub-GHSA

MEDIUM
@hono/node-server: Middleware bypass via repeated slashes in serveStatic
GHSA-92pp-h63x-v22m
pkg: @hono/node-server
eco: npm
published: Apr 8, 2026
## Summary

A path handling inconsistency in `serveStatic` allows protected static files to be accessed by using repeated slashes (`//`) in the request path.

When route-based middleware (e.g., `/admin/*`) is used for authorization, the router may not match paths containing repeated slashes, while `…

CVE-2026-39406
GitHub-GHSA

MEDIUM
JWCrypto: JWE ZIP decompression bomb
GHSA-fjrm-76×2-c4q4
pkg: jwcrypto
eco: pip
published: Apr 8, 2026
### Summary
The fix for GHSA-j857-7rvv-vj97 in v1.5.6 is weak in that it does not allow to fully control the amount of plaintext the receiver is willing to deal with and provides just a weak upper bound. The patch limits input token size to 250KB but does not validate the decompressed output size. A…
CVE-2026-39373
GitHub-GHSA

MEDIUM
Emissary has a Path Traversal via Blacklist Bypass in Configuration API
GHSA-hxf2-gm22-7vcm
pkg: gov.nsa.emissary:emissary
eco: maven
published: Apr 8, 2026
## Summary

The configuration API endpoint (`/api/configuration/{name}`) validated
configuration names using a blacklist approach that checked for `\`, `/`, `..`,
and trailing `.`. This could potentially be bypassed using URL-encoded variants,
double-encoding, or Unicode normalization to achieve pat…

CVE-2026-35583
GitHub-GHSA

MEDIUM
pyload-ng: Incomplete Tar Path Traversal Fix in UnTar._safe_extractall via os.path.commonprefix Bypass
GHSA-mvwx-582f-56r7
pkg: pyload-ng
eco: pip
published: Apr 8, 2026
## Summary

The `_safe_extractall()` function in `src/pyload/plugins/extractors/UnTar.py` uses `os.path.commonprefix()` for its path traversal check, which performs character-level string comparison rather than path-level comparison. This allows a specially crafted tar archive to write files outside…

CVE-2026-35592
GitHub-GHSA

MEDIUM
OpenViking contains a missing authorization vulnerability in the task polling endpoints
GHSA-h336-2wxm-pr6q
pkg: OpenViking
eco: pip
published: Apr 7, 2026
OpenViking versions prior to 0.3.3 contain a missing authorization vulnerability in the task polling endpoints that allows unauthorized attackers to enumerate or retrieve background task metadata created by other users. Attackers can access the /api/v1/tasks and /api/v1/tasks/{task_id} routes withou…
CVE-2026-22680
NVD

MEDIUM
CVE-2026-34899
CVE-2026-34899
pkg: express

published: Apr 7, 2026

Missing Authorization vulnerability in Eniture technology LTL Freight Quotes – Worldwide Express Edition allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects LTL Freight Quotes – Worldwide Express Edition: from n/a through 5.2.1.
CWE: CWE-862
GitHub-GHSA

MEDIUM
Duplicate Advisory: OpenClaw: Gateway Canvas local-direct requests bypass Canvas HTTP and WebSocket authentication
GHSA-9gvx-vj57-vqqx
pkg: openclaw
eco: npm
published: Apr 10, 2026
### Duplicate Advisory
This advisory has been withdrawn because it is a duplicate of GHSA-6mqc-jqh6-x8fc. This link is maintained to preserve external references.

### Original Description
OpenClaw before 2026.3.23 contains an authentication bypass vulnerability in the Canvas gateway where authorize…

GitHub-GHSA

MEDIUM
coursevault-preview has a path traversal due to improper base-directory boundary validation
GHSA-9h9m-rr67-9jpg
pkg: coursevault-preview
eco: npm
published: Apr 8, 2026
## Summary

`coursevault-preview` versions prior to `0.1.1` contain a path traversal vulnerability in the `resolveSafe` utility. The boundary check used `String.prototype.startsWith(baseDir)` on a normalized path, which does not enforce a directory boundary. An attacker who controls the `relativePat…

CVE-2026-35613
GitHub-GHSA

MEDIUM
LobeHub: Unauthenticated authentication bypass on `webapi` routes via forgeable `X-lobe-chat-auth` header
GHSA-5mwj-v5jw-5c97
pkg: @lobehub/lobehub
eco: npm
published: Apr 8, 2026
# Summary

The `webapi` authentication layer trusts a client-controlled `X-lobe-chat-auth` header that is only XOR-obfuscated, not signed or otherwise authenticated. Because the XOR key is hardcoded in the repository, an attacker can forge arbitrary auth payloads and bypass authentication on protect…

CVE-2026-39411
GitHub-GHSA

MEDIUM
OpenFGA's BatchCheck within-request deduplication produces incorrect authorization decisions via list-value cache-key collision
GHSA-jwvj-g8pc-cx45
pkg: github.com/openfga/openfga
eco: go
published: Apr 7, 2026
### Description

In OpenFGA, under specific conditions, BatchCheck calls with multiple checks sent for the same object, relation, and user combination can result in improper policy enforcement.

### Am I affected?

You are affected if you meet the following preconditions:
1. You execute **BatchCheck…

CVE-2026-34972
GitHub-GHSA

MEDIUM
Nodemailer Vulnerable to SMTP Command Injection via CRLF in Transport name Option (EHLO/HELO)
GHSA-vvjj-xcjg-gr5g
pkg: nodemailer
eco: npm
published: Apr 8, 2026
### Summary

Nodemailer versions up to and including 8.0.4 are vulnerable to SMTP command injection via CRLF sequences in the transport `name` configuration option. The `name` value is used directly in the EHLO/HELO SMTP command without any sanitization for carriage return and line feed characters (…

GitHub-GHSA

MEDIUM
Ech0 has Stored XSS via SVG Upload and Content-Type Validation Bypass in File Upload
GHSA-69hx-63pv-f8f4
pkg: github.com/lin-snow/ech0
eco: go
published: Apr 10, 2026
## Summary

The file upload endpoint validates Content-Type using only the client-supplied multipart header, with no server-side content inspection or file extension validation. Combined with an unauthenticated static file server that determines Content-Type from file extension, this allows an admin…

GitHub-GHSA

MEDIUM
Duplicate Advisory: OpenClaw: Synology Chat Webhook Pre-Auth Rate-Limit Bypass Enables Brute-Force Guessing of Webhook Token
GHSA-59xc-5v89-r7pr
pkg: openclaw
eco: npm
published: Apr 10, 2026
### Duplicate Advisory
This advisory has been withdrawn because it is a duplicate of GHSA-mf5g-6r6f-ghhm. This link is maintained to preserve external references.

### Original Description
OpenClaw before 2026.3.25 contains a pre-authentication rate-limit bypass vulnerability in webhook token valida…

GitHub-GHSA

MEDIUM
Duplicate Advisory: OpenClaw Bypasses DM Policy Separation via Synology Chat Webhook Path Collision
GHSA-g8mc-c5f2-mqg7
pkg: openclaw
eco: npm
published: Apr 10, 2026
### Duplicate Advisory
This advisory has been withdrawn because it is a duplicate of GHSA-rqp8-q22p-5j9q This link is maintained to preserve external references.

### Original Description
OpenClaw before 2026.3.22 contains a webhook path route replacement vulnerability in the Synology Chat extension…

GitHub-GHSA

MEDIUM
Hono: Non-breaking space prefix bypass in cookie name handling in getCookie()
GHSA-r5rp-j6wh-rvv4
pkg: hono
eco: npm
published: Apr 8, 2026
## Summary

A discrepancy between browser cookie parsing and `parse()` handling allows cookie prefix protections to be bypassed.

Cookie names that are treated as distinct by the browser may be normalized to the same key by `parse()`, allowing attacker-controlled cookies to override legitimate ones.…

CVE-2026-39410
GitHub-GHSA

MEDIUM
Emissary has Stored XSS via Navigation Template Link Injection
GHSA-cpm7-cfpx-3hvp
pkg: gov.nsa.emissary:emissary
eco: maven
published: Apr 7, 2026
## Summary

Mustache navigation templates interpolated configuration-controlled link values
directly into `href` attributes without URL scheme validation. An administrator
who could modify the `navItems` configuration could inject `javascript:` URIs,
enabling stored cross-site scripting (XSS) agains…

CVE-2026-35571
GitHub-GHSA

MEDIUM
rembg server is vulnerable to Server-Side Request Forgery (SSRF) and a weak default CORS configuration
GHSA-55v6-g8pm-pw4c
pkg: rembg
eco: pip
published: Apr 10, 2026
# GitHub Security Lab (GHSL) Vulnerability Report, rembg: `GHSL-2024-161`, `GHSL-2024-162`

The [GitHub Security Lab](https://securitylab.github.com) team has identified potential security vulnerabilities in [rembg](https://github.com/danielgatis/rembg).

We are committed to working with you to help…

GitHub-GHSA

MEDIUM
DNN: Force Friend Request Acceptance
GHSA-fpj4-9qhx-5m6m
pkg: DotNetNuke.Core
eco: nuget
published: Apr 10, 2026
In the friends feature, a user could craft a request that would force the acceptance of a friend request on another user.
GitHub-GHSA

MEDIUM
Ech0's Missing Authorization on System Logs Allows Non-Admin Information Disclosure
GHSA-w8jj-cwmc-wgq2
pkg: github.com/lin-snow/ech0
eco: go
published: Apr 10, 2026
## Summary

The system log endpoints (`GET /api/system/logs`, `GET /api/system/logs/stream`, `WS /ws/system/logs`) lack authorization checks, allowing any authenticated non-admin user to read and stream all server logs. These logs contain error stack traces, internal file paths, module names, and ar…

GitHub-GHSA

MEDIUM
Vikunja: Scoped API tokens with projects.background permission can delete project backgrounds
GHSA-v479-vf79-mg83
pkg: code.vikunja.io/api
eco: go
published: Apr 10, 2026
### Summary

Vikunja's scoped API token enforcement for custom project background routes is method-confused. A token with only `projects.background` can successfully delete a project background, while a token with only `projects.background_delete` is rejected.

This is a scoped-token authorization b…

CVE-2026-40103
GitHub-GHSA

MEDIUM
Vikunja Missing Authorization on CalDAV Task Read
GHSA-48ch-p4gq-x46x
pkg: code.vikunja.io/api
eco: go
published: Apr 10, 2026
## Summary

The CalDAV `GetResource` and `GetResourcesByList` methods fetch tasks by UID from the database without verifying that the authenticated user has access to the task's project. Any authenticated CalDAV user who knows (or guesses) a task UID can read the full task data from any project on t…

CVE-2026-35598
GitHub-GHSA

MEDIUM
Vikunja has Broken Access Control on Label Read via SQL Operator Precedence Bug
GHSA-hj5c-mhh2-g7jq
pkg: code.vikunja.io/api
eco: go
published: Apr 10, 2026
## Summary

The `hasAccessToLabel` function contains a SQL operator precedence bug that allows any authenticated user to read any label that has at least one task association, regardless of project access. Label titles, descriptions, colors, and creator information are exposed.

## Details

The acce…

CVE-2026-35596
NVD

MEDIUM
CVE-2026-35642
CVE-2026-35642
pkg: react

published: Apr 9, 2026

OpenClaw before 2026.3.25 contains an authorization bypass vulnerability where group reaction events bypass the requireMention access control mechanism. Attackers can trigger reactions in mention-gated groups to enqueue agent-visible system events that should remain restricted.
CWE: CWE-288
GitHub-GHSA

MEDIUM
Apache OpenMeetings has an Improper Handling of Insufficient Privileges vulnerability
GHSA-78cg-fc6c-w44w
pkg: org.apache.openmeetings:openmeetings-parent
eco: maven
published: Apr 9, 2026
Sny registered user can query web service with their credentials and get files/sub-folders of any folder by ID (metadata only NOT contents). Metadata includes id, type, name and some other field. Full list of fields get be checked at FileItemDTO object.

This issue affects Apache OpenMeetings: fro…

CVE-2026-33005
NVD

MEDIUM
CVE-2026-33005
CVE-2026-33005
pkg: apache

published: Apr 9, 2026

Improper Handling of Insufficient Privileges vulnerability in Apache OpenMeetings.

Any registered user can query web service with their credentials and get files/sub-folders of any folder by ID (metadata only NOT contents). Metadata includes id, type, name and some other field. Full list of fields …

CWE: CWE-274
GitHub-GHSA

MEDIUM
RustFS has an authorization bypass in multipart UploadPartCopy enables cross-bucket object exfiltration
GHSA-mx42-j6wv-px98
pkg: rustfs
eco: rust
published: Apr 8, 2026
RustFS contains a missing authorization check in the multipart copy path (`UploadPartCopy`). A low-privileged user who cannot read objects from a victim bucket can still exfiltrate victim objects by copying them into an attacker-controlled multipart upload and completing the upload.

This breaks ten…

CVE-2026-39360
GitHub-GHSA

MEDIUM
Cosign's verify-blob-attestation reports false positive when payload parsing fails
GHSA-w6c6-c85g-mmv6
pkg: github.com/sigstore/cosign, github.com/sigstore/cosign
eco: go
published: Apr 8, 2026
## Description

`cosign verify-blob-attestation` may erroneously report a "Verified OK" result for attestations with malformed payloads or mismatched predicate types. For old-format bundles and detached signatures, this was due to a logic flaw in the error handling of the predicate type validation. …

CVE-2026-39395
GitHub-GHSA

MEDIUM
Apache ActiveMQ: Improper validation and restriction of a classpath path name
GHSA-h2h4-5m64-m273
pkg: org.apache.activemq:activemq-client, org.apache.activemq:activemq-client, org.apache.activemq:activemq-broker
eco: maven
published: Apr 7, 2026
Improper validation and restriction of a classpath path name vulnerability in Apache ActiveMQ Client, Apache ActiveMQ Broker, Apache ActiveMQ All, Apache ActiveMQ Web, Apache ActiveMQ.

In two instances (when creating a Stomp consumer and also browsing messages in the Web console) an authenticated u…

CVE-2026-33227
NVD

MEDIUM
CVE-2026-33227
CVE-2026-33227
pkg: apache

published: Apr 7, 2026

Improper validation and restriction of a classpath path name vulnerability in

Apache ActiveMQ Client, Apache ActiveMQ Broker, Apache ActiveMQ All, Apache ActiveMQ Web, Apache ActiveMQ.

In two instances (when creating a Stomp consumer and also browsing messages in the Web console) an authentica…

CWE: CWE-22
GitHub-GHSA

MEDIUM
fast-jwt has a ReDoS when using RegExp in allowed* leading to CPU exhaustion during token verification
GHSA-cjw9-ghj4-fwxf
pkg: fast-jwt
eco: npm
published: Apr 9, 2026
## ⚠️ IMPORTANT CLARIFICATIONS

### Affected Configurations
This vulnerability ONLY affects applications that:
– Use RegExp objects (not strings) in the allowedAud, allowedIss, allowedSub, allowedJti, or allowedNonce options
– Configure patterns susceptible to catastrophic backtracking

CVE-2026-35041
NVD

MEDIUM
CVE-2026-35041
CVE-2026-35041
pkg: express

published: Apr 9, 2026

fast-jwt provides fast JSON Web Token (JWT) implementation. From 5.0.0 to 6.2.0, a denial-of-service condition exists in fast-jwt when the allowedAud verification option is configured using a regular expression. Because the aud claim is attacker-controlled and the library evaluates it against the su…
CWE: CWE-1333
NVD

MEDIUM
CVE-2026-39413
CVE-2026-39413
pkg: jwt

published: Apr 8, 2026

LightRAG provides simple and fast retrieval-augmented generation. Prior to 1.4.14, the LightRAG API is vulnerable to a JWT algorithm confusion attack where an attacker can forge tokens by specifying 'alg': 'none' in the JWT header. Since the jwt.decode() call does not explicitly deny the 'none' algo…
CWE: CWE-347
GitHub-GHSA

MEDIUM
lightrag-hku: JWT Algorithm Confusion Vulnerability
GHSA-8ffj-4hx4-9pgf
pkg: lightrag-hku
eco: pip
published: Apr 8, 2026
## Summary
The LightRAG API is vulnerable to a JWT algorithm confusion attack where an attacker can forge tokens by specifying 'alg': 'none' in the JWT header. Since the `jwt.decode()` call does not explicitly deny the 'none' algorithm, a crafted token without a signature will be accepted as valid, …
CVE-2026-39413
GitHub-GHSA

MEDIUM
Vikunja has iCalendar Property Injection via CRLF in CalDAV Task Output
GHSA-2g7h-7rqr-9p4r
pkg: code.vikunja.io/api
eco: go
published: Apr 10, 2026
## Summary

The CalDAV output generator builds iCalendar VTODO entries via raw string concatenation without applying RFC 5545 TEXT value escaping. User-controlled task titles containing CRLF characters break the iCalendar property boundary, allowing injection of arbitrary iCalendar properties such a…

CVE-2026-35601
GitHub-GHSA

MEDIUM
parisneo/lollms has an insufficient session expiration vulnerability
GHSA-8jg2-726g-xh43
pkg: lollms
eco: pip
published: Apr 8, 2026
An insufficient session expiration vulnerability exists in the latest version of parisneo/lollms. The application fails to invalidate active sessions after a password reset, allowing an attacker to continue using an old session token. This issue arises due to the absence of logic to reject requests …
CVE-2026-1163
GitHub-GHSA

MEDIUM
kube-router: BGP Peer Passwords Exposed in Logs at Verbose Logging Level
GHSA-fcmh-qfxc-w685
pkg: github.com/cloudnativelabs/kube-router/v2
eco: go
published: Apr 8, 2026
## Summary

When kube-router is configured with per-node BGP peer passwords using the `kube-router.io/peer.passwords` node annotation, and verbose logging is enabled (`–v=2` or higher), the raw Kubernetes node annotation map is logged verbatim — including the base64-encoded BGP MD5 passwords. Any…

GitHub-GHSA

MEDIUM
next-intl has an open redirect vulnerability
GHSA-8f24-v5vv-gm5j
pkg: next-intl
eco: npm
published: Apr 10, 2026
### Impact

Applications using the `next-intl` middleware with `localePrefix: 'as-needed'` could construct URLs where path handling and the WHATWG URL parser resolved a relative redirect target to another host (e.g. scheme-relative `//` or control characters stripped by the URL parser), so the middl…

GitHub-GHSA

MEDIUM
Juju: In-Memory Token Store for Discharge Tokens Lacks Concurrency Safety and Persistence
GHSA-7m55-2hr4-pw78
pkg: github.com/juju/juju
eco: go
published: Apr 10, 2026
### Summary

The localLoginHandlers struct in the Juju API server maintains an in-memory map to store discharge tokens following successful local authentication. This map is accessed concurrently from multiple HTTP handler goroutines without any synchronization primitive protecting it. The absence o…

CVE-2026-5774
GitHub-GHSA

MEDIUM
pypdf: Manipulated XMP metadata entity declarations can exhaust RAM
GHSA-3crg-w4f6-42mx
pkg: pypdf
eco: pip
published: Apr 10, 2026
### Impact

An attacker who uses this vulnerability can craft a PDF which leads to large memory usage. This requires parsing the XMP metadata.

### Patches
This has been fixed in [pypdf==6.10.0](https://github.com/py-pdf/pypdf/releases/tag/6.10.0).

### Workarounds
If you cannot upgrade yet, conside…

CVE-2026-40260
GitHub-GHSA

MEDIUM
ajenti.plugin.core has race conditions in 2FA
GHSA-8647-755q-fw9p
pkg: ajenti.plugin.core
eco: pip
published: Apr 10, 2026
### Impact

If the 2FA was activated, it was possible during a short moment after the authentication of an user to bypass its authentication.

### Patches

This is fixed in the version 0.112. Users should upgrade to this version as soon as possible.

CVE-2026-40178
GitHub-GHSA

MEDIUM
PraisonAI: SQLiteConversationStore didn't validate table_prefix when constructing SQL queries
GHSA-x783-xp3g-mqhp
pkg: PraisonAI
eco: pip
published: Apr 10, 2026
### Summary

The `table_prefix` configuration value is directly used to construct SQL table identifiers without validation.

If an attacker controls this value, they can manipulate SQL query structure, leading to unauthorized data access (e.g., reading internal SQLite tables such as `sqlite_master`)…

GitHub-GHSA

MEDIUM
justhtml includes multiple security fixes
GHSA-c9vm-hv86-f23r
pkg: justhtml
eco: pip
published: Apr 10, 2026
## Summary

`justhtml` `1.15.0` includes multiple security fixes affecting URL sanitization helpers, HTML serialization, Markdown passthrough, and several custom sanitization-policy edge cases.

These issues have different impact levels and do not all affect the default configuration in the same way…

GitHub-GHSA

MEDIUM
Apache Log4j's JsonTemplateLayout produces invalid JSON output when log events contain non-finite floating-point values
GHSA-w35j-pv5h-q9q9
pkg: org.apache.logging.log4j:log4j-layout-template-json, org.apache.logging.log4j:log4j-layout-template-json
eco: maven
published: Apr 10, 2026
Apache Log4j's JsonTemplateLayout https://logging.apache.org/log4j/2.x/manual/json-template-layout.html , in versions up to and including 2.25.3, produces invalid JSON output when log events contain non-finite floating-point values (NaN, Infinity, or -Infinity), which are prohibited by RFC 8259. Thi…
CVE-2026-34481
GitHub-GHSA

MEDIUM
Apache Log4j Core's XmlLayout fails to sanitize characters
GHSA-3pxv-7cmr-fjr4
pkg: org.apache.logging.log4j:log4j-core, org.apache.logging.log4j:log4j-core
eco: maven
published: Apr 10, 2026
Apache Log4j Core's XmlLayout https://logging.apache.org/log4j/2.x/manual/layouts.html#XmlLayout , in versions up to and including 2.25.3, fails to sanitize characters forbidden by the XML 1.0 specification https://www.w3.org/TR/xml/#charsets producing invalid XML output whenever a log message or …
CVE-2026-34480
GitHub-GHSA

MEDIUM
@sveltejs/kit: Unvalidated redirect in handle hook causes Denial-of-Service
GHSA-3f6h-2hrp-w5wx
pkg: @sveltejs/kit
eco: npm
published: Apr 10, 2026
`redirect`, when called from inside the `handle` server hook with a location parameter containing characters that are invalid in a HTTP header, will cause an unhandled `TypeError`. This could result in DoS on some platforms, especially if the location passed to `redirect` contains unsanitized user i…
CVE-2026-40074
GitHub-GHSA

MEDIUM
Helm Chart extraction output directory collapse via `Chart.yaml` name dot-segment
GHSA-hr2v-4r36-88hr
pkg: helm.sh/helm/v4, helm.sh/helm/v3
eco: go
published: Apr 10, 2026
Helm is a package manager for Charts for Kubernetes. In Helm versions <=3.20.1 and <=4.1.3, a specially crafted Chart will cause `helm pull –untar [chart URL | repo/chartname]` to write the Chart's contents to the immediate output directory (as defaulted to the current working directory; or as giv…
CVE-2026-35206
GitHub-GHSA

MEDIUM
Wasmtime has improperly masked return value from `table.grow` with Winch compiler backend
GHSA-f984-pcp8-v2p7
pkg: wasmtime, wasmtime, wasmtime
eco: rust
published: Apr 10, 2026
### Impact

Wasmtime's Winch compiler backend contains a bug where translating the `table.grow` operator causes the result to be incorrectly typed. For 32-bit tables this means that the result of the operator, internally in Winch, is tagged as a 64-bit value instead of a 32-bit value. This invalid i…

CVE-2026-35186
GitHub-GHSA

MEDIUM
Gramps Web API: Private Sub-Object Data in Non-Private Objects Exposed to Guest Users
GHSA-9gjv-jvm7-vv2v
pkg: gramps-webapi
eco: pip
published: Apr 9, 2026
## Summary

Users with the **Guest** role could receive private sub-object data (e.g. private alternate names, private addresses, private note/citation/media handles) through list API endpoints such as `GET /api/people/`, `GET /api/places/`, `GET /api/events/`, and all other object list endpoints.

GitHub-GHSA

MEDIUM
Wasmtime has out-of-bounds write or crash when transcoding component model strings
GHSA-394w-hwhg-8vgm
pkg: wasmtime, wasmtime, wasmtime
eco: rust
published: Apr 9, 2026
### Impact

Wasmtime's implementation of transcoding strings between components contains a bug where the return value of a guest component's `realloc` is not validated before the host attempts to write through the pointer. This enables a guest to cause the host to write arbitrary transcoded string b…

CVE-2026-35195
GitHub-GHSA

MEDIUM
Wasmtime has host panic when Winch compiler executes `table.fill`
GHSA-q49f-xg75-m9xw
pkg: wasmtime, wasmtime, wasmtime
eco: rust
published: Apr 9, 2026
### Impact

Wasmtime's Winch compiler contains a vulnerability where the compilation of the `table.fill` instruction can result in a host panic. This means that a valid guest can be compiled with Winch, on any architecture, and cause the host to panic. This represents a denial-of-service vulnerabili…

CVE-2026-34946
GitHub-GHSA

MEDIUM
Wasmtime segfault or unused out-of-sandbox load with `f64x2.splat` operator on x86-64
GHSA-qqfj-4vcm-26hv
pkg: wasmtime, wasmtime, wasmtime
eco: rust
published: Apr 9, 2026
On x86-64 platforms with SSE3 disabled Wasmtime's compilation of the `f64x2.splat` WebAssembly instruction with Cranelift may load 8 more bytes than is necessary. When [signals-based-traps](https://docs.rs/wasmtime/latest/wasmtime/struct.Config.html#method.signals_based_traps) are disabled this can …
CVE-2026-34944
GitHub-GHSA

MEDIUM
Wasmtime has a possible panic when lifting `flags` component value
GHSA-m758-wjhj-p3jq
pkg: wasmtime, wasmtime, wasmtime
eco: rust
published: Apr 9, 2026
### Impact

Wasmtime contains a possible panic which can happen when a `flags`-typed component model value is lifted with the `Val` type. If bits are set outside of the set of flags the component model specifies that these bits should be ignored but Wasmtime will panic when this value is lifted. Thi…

CVE-2026-34943
GitHub-GHSA

MEDIUM
Wasmtime: Panic when transcoding misaligned utf-16 strings
GHSA-jxhv-7h78-9775
pkg: wasmtime, wasmtime, wasmtime
eco: rust
published: Apr 9, 2026
### Impact

Wasmtime's implementation of transcoding strings into the Component Model's `utf16` or `latin1+utf16` encodings improperly verified the alignment of reallocated strings. This meant that unaligned pointers could be passed to the host for transcoding which would trigger a host panic. This …

CVE-2026-34942
GitHub-GHSA

MEDIUM
Wasmtime: Heap OOB read in component model UTF-16 to latin1+utf16 string transcoding
GHSA-hx6p-xpx3-jvvv
pkg: wasmtime, wasmtime, wasmtime
eco: rust
published: Apr 9, 2026
### Summary

Wasmtime contains a vulnerability where when transcoding a UTF-16 string to the latin1+utf16 component-model encoding it would incorrectly validate the byte length of the input string when performing a bounds check. Specifically the number of code units were checked instead of the byte …

CVE-2026-34941
GitHub-GHSA

MEDIUM
OpenClaw: Multiple Code Paths Missing Base64 Pre-Allocation Size Checks
GHSA-ccx3-fw7q-rr2r
pkg: openclaw
eco: npm
published: Apr 9, 2026
## Impact

Multiple Code Paths Missing Base64 Pre-Allocation Size Checks.

Several base64 decode paths could allocate before enforcing decoded-size limits.

OpenClaw is a user-controlled local assistant. This advisory is scoped to the OpenClaw trust model and does not assume a multi-tenant service b…

GitHub-GHSA

MEDIUM
OpenClaw B-M3: ClawHub package downloads are not enforced with integrity verification
GHSA-3vvq-q2qc-7rmp
pkg: openclaw
eco: npm
published: Apr 9, 2026
## Impact

B-M3: ClawHub package downloads are not enforced with integrity verification.

ClawHub downloads could install plugin archives without enforcing archive or per-file integrity metadata.

OpenClaw is a user-controlled local assistant. This advisory is scoped to the OpenClaw trust model and …

GitHub-GHSA

MEDIUM
OpenClaw Host-Exec Environment Variable Injection
GHSA-w9j9-w4cp-6wgr
pkg: openclaw
eco: npm
published: Apr 9, 2026
## Impact

OpenClaw Host-Exec Environment Variable Injection.

Host exec could inherit environment variables that influence interpreters, shells, or build tools.

OpenClaw is a user-controlled local assistant. This advisory is scoped to the OpenClaw trust model and does not assume a multi-tenant ser…

GitHub-GHSA

MEDIUM
OpenClaw: Strict browser SSRF bypass in Playwright redirect handling leaves private targets reachable
GHSA-w8g9-x8gx-crmm
pkg: openclaw
eco: npm
published: Apr 9, 2026
## Impact

Strict browser SSRF bypass in Playwright redirect handling leaves private targets reachable.

Strict browser SSRF checks could miss Playwright request-time navigation to private targets.

OpenClaw is a user-controlled local assistant. This advisory is scoped to the OpenClaw trust model an…

GitHub-GHSA

MEDIUM
OpenClaw has Browser SSRF Policy Bypass via Interaction-Triggered Navigation
GHSA-vr5g-mmx7-h897
pkg: openclaw
eco: npm
published: Apr 9, 2026
## Impact

Browser SSRF Policy Bypass via Interaction-Triggered Navigation.

Browser interactions could trigger navigations that bypassed the normal SSRF navigation checks.

OpenClaw is a user-controlled local assistant. This advisory is scoped to the OpenClaw trust model and does not assume a multi…

GitHub-GHSA

MEDIUM
OpenClaw `node.pair.approve` placed in `operator.write` scope instead of `operator.pairing` allows unprivileged pairing approval
GHSA-67mf-f936-ppxf
pkg: openclaw
eco: npm
published: Apr 9, 2026
## Impact

OpenClaw `node.pair.approve` placed in `operator.write` scope instead of `operator.pairing` allows unprivileged pairing approval.

The pairing approval method accepted operator.write instead of the narrower pairing scope and admin requirement for exec-capable nodes.

OpenClaw is a user-co…

GitHub-GHSA

MEDIUM
OpenClaw QQ Bot Extension missing SSRF Protection on All Media Fetch Paths
GHSA-3fv3-6p2v-gxwj
pkg: openclaw
eco: npm
published: Apr 9, 2026
## Impact

QQ Bot Extension: Missing SSRF Protection on All Media Fetch Paths.

QQ Bot media download paths were not consistently routed through the SSRF guard and allowlist policy.

OpenClaw is a user-controlled local assistant. This advisory is scoped to the OpenClaw trust model and does not assum…

GitHub-GHSA

MEDIUM
OpenClaw: Existing WS sessions survive shared gateway token rotation
GHSA-5h3f-885m-v22w
pkg: openclaw
eco: npm
published: Apr 9, 2026
## Impact

Existing WS sessions survive shared gateway token rotation.

Rotating the shared gateway token did not disconnect existing shared-token WebSocket sessions.

OpenClaw is a user-controlled local assistant. This advisory is scoped to the OpenClaw trust model and does not assume a multi-tenan…

GitHub-GHSA

MEDIUM
OpenClaw: /allowlist omits owner-only enforcement for cross-channel allowlist writes
GHSA-vc32-h5mq-453v
pkg: openclaw
eco: npm
published: Apr 9, 2026
## Impact

/allowlist omits owner-only enforcement for cross-channel allowlist writes.

An authorized non-owner sender could attempt allowlist writes against a different channel.

OpenClaw is a user-controlled local assistant. This advisory is scoped to the OpenClaw trust model and does not assume a…

GitHub-GHSA

MEDIUM
OpenClaw: resolvedAuth closure becomes stale after config reload
GHSA-68×5-xx89-w9mm
pkg: openclaw
eco: npm
published: Apr 9, 2026
## Impact

resolvedAuth closure becomes stale after config reload.

After a config reload, newly accepted gateway connections could continue using stale resolved auth state.

OpenClaw is a user-controlled local assistant. This advisory is scoped to the OpenClaw trust model and does not assume a mult…

GitHub-GHSA

MEDIUM
OpenClaw `node.invoke(browser.proxy)` bypasses `browser.request` persistent profile-mutation guard
GHSA-cmfr-9m2r-xwhq
pkg: openclaw
eco: npm
published: Apr 9, 2026
## Impact

OpenClaw `node.invoke(browser.proxy)` bypasses `browser.request` persistent profile-mutation guard.

node.invoke(browser.proxy) could mutate persistent browser profiles through a path that bypassed the browser.request guard.

OpenClaw is a user-controlled local assistant. This advisory is…

GitHub-GHSA

MEDIUM
OpenClaw `device.token.rotate` mints tokens for unapproved roles, bypassing device role-upgrade pairing
GHSA-whf9-3hcx-gq54
pkg: openclaw
eco: npm
published: Apr 9, 2026
## Impact

OpenClaw `device.token.rotate` mints tokens for unapproved roles, bypassing device role-upgrade pairing.

Device token rotation could mint or preserve roles/scopes that had not gone through the intended pairing approval.

OpenClaw is a user-controlled local assistant. This advisory is sco…

GitHub-GHSA

MEDIUM
OpenClaw: Shared reply MEDIA – paths are treated as trusted and can trigger cross-channel local file exfiltration
GHSA-qqq7-4hxc-x63c
pkg: openclaw
eco: npm
published: Apr 9, 2026
## Impact

Shared reply MEDIA: paths are treated as trusted and can trigger cross-channel local file exfiltration.

A crafted shared reply MEDIA reference could cause another channel to read a local file path as trusted generated media.

OpenClaw is a user-controlled local assistant. This advisory i…

GitHub-GHSA

MEDIUM
OpenClaw: strictInlineEval explicit-approval boundary bypassed by approval-timeout fallback on gateway and node exec hosts
GHSA-q2gc-xjqw-qp89
pkg: openclaw
eco: npm
published: Apr 9, 2026
## Impact

strictInlineEval explicit-approval boundary bypassed by approval-timeout fallback on gateway and node exec hosts.

The approval-timeout fallback could allow inline eval commands that strictInlineEval was meant to require explicit approval for.

OpenClaw is a user-controlled local assistan…

GitHub-GHSA

MEDIUM
Cryptography vulnerable to buffer overflow if non-contiguous buffers were passed to APIs
GHSA-p423-j2cm-9vmq
pkg: cryptography
eco: pip
published: Apr 8, 2026
If a non-contiguous buffer was passed to APIs which accepted Python buffers (e.g. `Hash.update()`), this could lead to buffer overflows. For example:

“`python
h = Hash(SHA256())
b.update(buf[::-1])
“`

would read past the end of the buffer on Python >3.11

CVE-2026-39892
GitHub-GHSA

MEDIUM
quarkus-openapi-generator extension has Zip Slip Path Traversal in ApicurioCodegenWrapper class
GHSA-jx2w-vp7f-456q
pkg: io.quarkiverse.openapi.generator:quarkus-openapi-generator
eco: maven
published: Apr 8, 2026
### Summary
A path traversal vulnerability was discovered in the quarkus-openapi-generator extension

### Details
The `unzip()` method in `ApicurioCodegenWrapper.java` extracts ZIP entries without validating that the resolved file path stays within the intended output directory. At line 101, the des…

CVE-2026-40180
GitHub-GHSA

MEDIUM
pretix: API leaks check-in data between events of the same organizer
GHSA-wr8q-c73g-m7gp
pkg: pretix, pretix, pretix
eco: pip
published: Apr 8, 2026
A new API endpoint introduced in pretix 2025 that is supposed to return all check-in events of a specific event in fact returns all check-in events belonging to the respective organizer. This allows an API consumer to access information for all other events under the same organizer, even those they …
CVE-2026-5600
GitHub-GHSA

MEDIUM
LiquidJS: `renderFile()` / `parseFile()` bypass configured `root` and allow arbitrary file read
GHSA-v273-448j-v4qj
pkg: liquidjs
eco: npm
published: Apr 8, 2026
`liquidjs` 10.25.0 documents `root` as constraining filenames passed to `renderFile()` and `parseFile()`, but top-level file loads do not enforce that boundary.

The published npm package `liquidjs@10.25.0` on Linux 6.17.0 with Node v22.22.1. A `Liquid` instance configured with an empty temporary di…

CVE-2026-39859
GitHub-GHSA

MEDIUM
Hono has incorrect IP matching in ipRestriction() for IPv4-mapped IPv6 addresses
GHSA-xpcf-pg52-r92g
pkg: hono
eco: npm
published: Apr 8, 2026
## Summary

`ipRestriction()` does not canonicalize IPv4-mapped IPv6 client addresses (e.g. `::ffff:127.0.0.1`) before applying IPv4 allow or deny rules. In environments such as Node.js dual-stack, this can cause IPv4 rules to fail to match, leading to unintended authorization behavior.

## Details

CVE-2026-39409
GitHub-GHSA

MEDIUM
Hono: Path traversal in toSSG() allows writing files outside the output directory
GHSA-xf4j-xp2r-rqqx
pkg: hono
eco: npm
published: Apr 8, 2026
## Summary

A path traversal issue in `toSSG()` allows files to be written outside the configured output directory during static site generation. When using dynamic route parameters via `ssgParams`, specially crafted values can cause generated file paths to escape the intended output directory.

## …

CVE-2026-39408
GitHub-GHSA

MEDIUM
openclaw-claude-bridge: sandbox is not effective – `–allowed-tools ""` does not restrict available tools
GHSA-7853-gqqm-vcwx
pkg: openclaw-claude-bridge
eco: npm
published: Apr 8, 2026
## Affected

openclaw-claude-bridge v1.1.0

## Issue

v1.1.0 spawns the Claude Code CLI subprocess with `–allowed-tools ""` and the release notes + README claim this **"disables all CLI tools"** for sandboxing. This claim is incorrect.

Per the Claude Code CLI documentation, `–allowed-tools` (alia…

CVE-2026-39398
GitHub-GHSA

MEDIUM
Parse Server's Endpoint `/sessions/me` bypasses `_Session` `protectedFields`
GHSA-g4v2-qx3q-4p64
pkg: parse-server, parse-server
eco: npm
published: Apr 8, 2026
### Impact

The `GET /sessions/me` endpoint returns `_Session` fields that the server operator explicitly configured as protected via the `protectedFields` server option. Any authenticated user can retrieve their own session's protected fields with a single request. The equivalent `GET /sessions` an…

CVE-2026-39381
GitHub-GHSA

MEDIUM
skilleton has improper input handling in repository/path processing
GHSA-5g3j-89fr-r2vp
pkg: skilleton
eco: npm
published: Apr 8, 2026
## Summary

`skilleton` versions prior to `0.3.1` include security-related weaknesses in repository normalization and path handling logic.
Version `0.3.1` contains fixes and additional test coverage for these issues.

## Affected Versions

`<0.3.1`

## Patched Versions

`>=0.3.1`

## Impact

In af…

GitHub-GHSA

MEDIUM
Parse Server has a login timing side-channel reveals user existence
GHSA-mmpq-5hcv-hf2v
pkg: parse-server, parse-server
eco: npm
published: Apr 8, 2026
### Impact

The login endpoint response time differs measurably depending on whether the submitted username or email exists in the database. When a user is not found, the server responds immediately. When a user exists but the password is wrong, a bcrypt comparison runs first, adding significant lat…

CVE-2026-39321
GitHub-GHSA

MEDIUM
File Browser discloses text file content via /api/resources endpoint bypassing Perm.Download check
GHSA-67cg-cpj7-qgc9
pkg: github.com/filebrowser/filebrowser/v2
eco: go
published: Apr 8, 2026
## Summary

The `resourceGetHandler` in `http/resource.go` returns full text file content without checking the `Perm.Download` permission flag. All three other content-serving endpoints (`/api/raw`, `/api/preview`, `/api/subtitle`) correctly verify this permission before serving content. A user with…

CVE-2026-35606
GitHub-GHSA

MEDIUM
File Browser has an access rule bypass via HasPrefix without trailing separator in path matching
GHSA-5q48-q4fm-g3m6
pkg: github.com/filebrowser/filebrowser/v2
eco: go
published: Apr 8, 2026
Hi,

The `Matches()` function in `rules/rules.go` uses `strings.HasPrefix()` without a trailing directory separator when matching paths against access rules. A rule for `/uploads` also matches `/uploads_backup/`, granting or denying access to unintended directories. Verified against v2.62.2 (commit …

CVE-2026-35605
GitHub-GHSA

MEDIUM
Apache Cassandra has sensitive Information Leak in cqlsh
GHSA-fh34-c629-p8xj
pkg: org.apache.cassandra:cassandra-all
eco: maven
published: Apr 7, 2026
Sensitive Information Leak in cqlsh in Apache Cassandra 4.0 allows access to sensitive information, like passwords, from previously executed cqlsh command via  ~/.cassandra/cqlsh_history local file access.

Users are recommended to upgrade to version 4.0.20, which fixes this issue.


Description…

CVE-2026-27315
GitHub-GHSA

MEDIUM
OpenClaw: Android accepted cleartext remote gateway endpoints and sent stored credentials over ws://
GHSA-83f3-hh45-vfw9
pkg: openclaw
eco: npm
published: Apr 7, 2026
## Summary

Before OpenClaw 2026.4.2, Android accepted non-loopback cleartext `ws://` gateway endpoints and would send stored gateway credentials over that connection. Discovery beacons or setup codes could therefore steer the client onto a cleartext remote endpoint.

## Impact

A user who followed …

GitHub-GHSA

MEDIUM
OpenClaw: Shared-secret comparison call sites leaked length information through timing
GHSA-jj6q-rrrf-h66h
pkg: openclaw
eco: npm
published: Apr 7, 2026
## Summary

Before OpenClaw 2026.4.2, several shared-secret comparison call sites still used early length-mismatch checks instead of the shared fixed-length comparison helper. Those paths could leak secret-length information through measurable timing differences.

## Impact

The affected paths expos…

GitHub-GHSA

MEDIUM
OpenClaw: Zalo replay dedupe keys could suppress messages across chats or senders
GHSA-rxmx-g7hr-8mx4
pkg: openclaw
eco: npm
published: Apr 7, 2026
## Summary

Before OpenClaw 2026.4.2, Zalo webhook replay dedupe keys were not scoped strongly enough across chat and sender dimensions. Legitimate events from different conversations or senders could collide and be dropped as duplicates.

## Impact

Cross-conversation or cross-sender collisions cou…

GitHub-GHSA

MEDIUM
OpenClaw: Trailing-dot localhost CDP hosts could bypass remote loopback protections
GHSA-fh32-73r9-rgh5
pkg: openclaw
eco: npm
published: Apr 7, 2026
## Summary

Before OpenClaw 2026.4.2, remote CDP discovery could return a trailing-dot localhost host such as `localhost.` and bypass OpenClaw's loopback-host normalization. That let a non-loopback remote CDP profile pivot the follow-up connection back onto localhost.

## Impact

A hostile discovery…

GitHub-GHSA

MEDIUM
OpenClaw: pnpm dlx approvals did not bind local script operands
GHSA-w6wx-jq6j-6mcj
pkg: openclaw
eco: npm
published: Apr 7, 2026
## Summary

Before OpenClaw 2026.4.2, `pnpm dlx` approval planning did not bind local script operands the same way as related `pnpm exec` flows. A local script approved through a `pnpm dlx` path could be replaced before execution without invalidating the approval.

## Impact

An operator could appro…

GitHub-GHSA

MEDIUM
OpenClaw: Windows-compatible env override keys could bypass system.run approval binding
GHSA-98ch-45wp-ch47
pkg: openclaw
eco: npm
published: Apr 7, 2026
## Summary

Before OpenClaw 2026.4.2, system-run approval binding normalized environment override keys differently from host execution. Windows-compatible keys could be omitted from the approval binding while still being injected at execution time.

## Impact

An approved command could run with atta…

GitHub-GHSA

MEDIUM
OpenClaw: Gateway hello snapshots exposed host config and state paths to non-admin clients
GHSA-2f7j-rp58-mr42
pkg: openclaw
eco: npm
published: Apr 7, 2026
## Summary

Before OpenClaw 2026.4.2, the Gateway `connect` success snapshot exposed local `configPath` and `stateDir` metadata to non-admin clients. Low-privilege authenticated clients could learn host filesystem layout and deployment details that were not needed for their role.

## Impact

A non-a…

GitHub-GHSA

MEDIUM
OpenClaw: Untrusted workspace channel shadows could execute during built-in channel setup
GHSA-2qrv-rc5x-2g2h
pkg: openclaw
eco: npm
published: Apr 7, 2026
## Summary

Before OpenClaw 2026.4.2, built-in channel setup and login could resolve an untrusted workspace channel shadow before the plugin was explicitly trusted. A malicious workspace plugin that claimed a bundled channel id could execute during channel setup even while still disabled.

## Impact…

GitHub-GHSA

MEDIUM
OpenClaw: Read-scoped identity-bearing HTTP clients could kill sessions via /sessions/:sessionKey/kill
GHSA-5hff-46vh-rxmw
pkg: openclaw
eco: npm
published: Apr 7, 2026
## Summary

Before OpenClaw 2026.4.2, `POST /sessions/:sessionKey/kill` did not enforce write scopes in identity-bearing HTTP modes. A caller limited to read-only operator scopes could still terminate a running subagent session.

## Impact

A read-scoped caller could perform a write-class control-pl…

GitHub-GHSA

MEDIUM
OpenClaw: iOS A2UI bridge trusted generic local-network pages for agent.request dispatch
GHSA-4p4f-fc8q-84m3
pkg: openclaw
eco: npm
published: Apr 7, 2026
## Summary
Before OpenClaw 2026.4.2, the iOS A2UI bridge treated generic local-network pages as trusted bridge origins. A page loaded from a local-network or tailnet host could trigger agent.request dispatch without the stricter trusted-canvas origin check.

## Impact
A loaded attacker-controlled pa…

GitHub-GHSA

MEDIUM
OpenClaw: QQ Bot structured payloads could read arbitrary local files
GHSA-846p-hgpv-vphc
pkg: openclaw
eco: npm
published: Apr 7, 2026
## Summary

Before OpenClaw 2026.4.2, QQ Bot structured media payloads could read local files from attacker-chosen paths. A crafted structured payload could escape QQ Bot-owned media roots and cause arbitrary file reads on the host.

## Impact

Prompt-influenced structured payload output could exfil…

GitHub-GHSA

MEDIUM
OpenClaw: OpenShell mirror mode could delete arbitrary remote directories when roots were mis-scoped
GHSA-m34q-h93w-vg5x
pkg: openclaw
eco: npm
published: Apr 7, 2026
## Summary

Before OpenClaw 2026.4.2, the OpenShell mirror backend accepted arbitrary absolute `remoteWorkspaceDir` and `remoteAgentWorkspaceDir` values. In mirror mode, those paths were then used as the target of remote cleanup and overwrite operations.

## Impact

If an attacker could influence th…

GitHub-GHSA

MEDIUM
OpenClaw: Pairing pending-request caps were enforced per channel instead of per account
GHSA-wwfp-w96m-c6x8
pkg: openclaw
eco: npm
published: Apr 7, 2026
## Summary

Before OpenClaw 2026.3.31, pending pairing-request caps were enforced per channel file instead of per account. On multi-account channel setups, requests from other accounts could fill the shared pending window and block new pairing challenges on an unaffected account.

## Impact

This is…

GitHub-GHSA

MEDIUM
MLflow is vulnerable to Stored Cross-Site Scripting (XSS) caused by unsafe parsing of YAML-based MLmodel artifacts in its web interface
GHSA-fh64-r2vc-xvhr
pkg: mlflow
eco: pip
published: Apr 7, 2026
MLflow is vulnerable to Stored Cross-Site Scripting (XSS) caused by unsafe parsing of YAML-based MLmodel artifacts in its web interface. An authenticated attacker can upload a malicious MLmodel file containing a payload that executes when another user views the artifact in the UI. This allows action…
CVE-2026-33865
GitHub-GHSA

MEDIUM
MLflow is vulnerable to an authorization bypass affecting the AJAX endpoint
GHSA-46r5-x6jq-v8g6
pkg: mlflow
eco: pip
published: Apr 7, 2026
MLflow is vulnerable to an authorization bypass affecting the AJAX endpoint used to download saved model artifacts. Due to missing access‑control validation, a user without permissions to a given experiment can directly query this endpoint and retrieve model artifacts they are not authorized to ac…
CVE-2026-33866


Leave a Reply