CISA-KEV
CRITICAL
D-Link DIR-823X Command Injection Vulnerability
D-Link DIR-823X contains a command injection vulnerability that allows an authorized attacker to execute arbitrary commands on remote devices by sending a POST request to /goform/set_prohibiting via the corresponding function. The impacted product could be end-of-life (EoL) and/or end-of-service (Eo…
Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
CISA-KEV
CRITICAL
Samsung MagicINFO 9 Server Path Traversal Vulnerability
Samsung MagicINFO 9 Server contains a path traversal vulnerability that could allow an attacker to write arbitrary files as system authority.
Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
CISA-KEV
CRITICAL
SimpleHelp Path Traversal Vulnerability
SimpleHelp contains a path traversal vulnerability that allows admin users to upload arbitrary files anywhere on the file system by uploading a crafted zip file (i.e. zip slip). This can be exploited to execute arbitrary code on the host in the context of the SimpleHelp server user.
Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
CISA-KEV
CRITICAL
SimpleHelp Missing Authorization Vulnerability
SimpleHelp contains a missing authorization vulnerability that could allow low-privileged technicians to create API keys with excessive permissions. These API keys can be used to escalate privileges to the server admin role.
Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
CISA-KEV
CRITICAL
Marimo Remote Code Execution Vulnerability
Marimo contains an pre-authorization remote code execution vulnerability, allowing an unauthenticated attacked to shell access and execute arbitrary system commands.
Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
CISA-KEV
CRITICAL
Microsoft Defender Insufficient Granularity of Access Control Vulnerability
Microsoft Defender contains an insufficient granularity of access control vulnerability that could allow an authorized attacker to escalate privileges locally.
Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
GitHub-GHSA
CRITICAL
Gemini CLI: Remote Code Execution via workspace trust and tool allowlisting bypasses
GHSA-wpqr-6v78-jr5g
pkg: @google/gemini-cli, @google/gemini-cli, google-github-actions/run-gemini-cli
eco: npm
published: Apr 24, 2026
# Summary
Gemini CLI (`@google/gemini-cli`) and the `run-gemini-cli` GitHub Action are being updated to harden workspace trust and tool allowlisting, in particular when used in untrusted environments like GitHub Actions. This update introduces a breaking change to how non-interactive (headless) env…
NVD
CRITICAL
CVE-2026-41679
Paperclip is a Node.js server and React UI that orchestrates a team of AI agents to run a business. Prior to version 2026.416.0, an unauthenticated attacker can achieve full remote code execution on any network-accessible Paperclip instance running in `authenticated` mode with default configuration.…
CWE: CWE-287, CWE-862, CWE-1188
GitHub-GHSA
CRITICAL
openvpn-auth-oauth2 returns FUNC_SUCCESS on client-deny, allowing unauthenticated VPN access
GHSA-246w-jgmq-88fg
pkg: github.com/jkroepke/openvpn-auth-oauth2
eco: go
published: Apr 22, 2026
# Summary
When `openvpn-auth-oauth2` is deployed in the **experimental plugin mode** (shared library loaded by OpenVPN via the `plugin` directive), clients that do not support WebAuth/SSO (e.g., the `openvpn` CLI on Linux) are incorrectly admitted to the VPN despite being denied by the authenticati…
CVE-2026-41070
GitHub-GHSA
CRITICAL
Spinnaker: RCE via expression parsing due to unrestricted context handling
GHSA-69rw-45wj-g4v6
pkg: io.spinnaker.echo:echo-pipelinetriggers, io.spinnaker.echo:echo-pipelinetriggers, io.spinnaker.echo:echo-pipelinetriggers
eco: maven
published: Apr 21, 2026
### Impact
Echo like some other services, uses SPeL (Spring Expression Language) to process information – specifically around expected artifacts. Unlike orca, it was NOT restricting that context to a set of trusted classes, but allowing FULL JVM access. This enables a user to use arbitrary java cl…
CVE-2026-32613
GitHub-GHSA
CRITICAL
Spinnaker: RCE when using gitrepo artifact types due to improper sanitization of user input on branch and paths
GHSA-x3j7-7pgj-h87r
pkg: io.spinnaker.clouddriver:clouddriver-artifacts-gitrepo
eco: maven
published: Apr 21, 2026
### Impact
A bad actor can execute arbitrary commands very simply on the clouddriver pods. This can expose credentials, remove files, or inject resources easily.
### Workarounds
Disable the gitrepo artifact types.
CVE-2026-32604
NVD
CRITICAL
CVE-2026-40906
Electric is a Postgres sync engine. From 1.1.12 to before 1.5.0, the order_by parameter in the ElectricSQL /v1/shape API is vulnerable to error-based SQL injection, allowing any authenticated user to read, write, and destroy the full contents of the underlying PostgreSQL database through crafted ORD…
CWE: CWE-89
NVD
CRITICAL
CVE-2026-32613
Spinnaker is an open source, multi-cloud continuous delivery platform. Echo like some other services, uses SPeL (Spring Expression Language) to process information – specifically around expected artifacts. In versions prior to 2026.1.0, 2026.0.1, 2025.4.2, and 2025.3.2, unlike orca, it was NOT restr…
CWE: CWE-94
GitHub-GHSA
CRITICAL
electurm has Command Injection via runLinux funtion
GHSA-8×35-hph8-37hq
pkg: electerm
eco: npm
published: Apr 24, 2026
### Impact
_What kind of vulnerability is it? Who is impacted?_
**Command Injection vulnerabilities in electerm:**
A command injection vulnerability exists in `github.com/elcterm/electerm/npm/install.js:130`. The `runLinux()` function appends attacker-controlled remote version strings directly int…
CVE-2026-41501
NVD
CRITICAL
CVE-2026-6911
Missing JWT signature verification in AWS Ops Wheel allows unauthenticated attackers to forge JWT tokens and gain unintended administrative access to the application, including the ability to read, modify, and delete all application data across tenants and manage Cognito user accounts within the dep…
CWE: CWE-347
GitHub-GHSA
CRITICAL
go-zserio has Unbounded Memory Allocation for All Platforms
GHSA-xhj4-g6w8-2xjw
pkg: github.com/woven-planet/go-zserio
eco: go
published: Apr 24, 2026
### Impact
When deserializing arrays, strings or bytes (blob) types zserio first reads the size of the variable, and then allocates sufficient memory to load data. Since the size is always trusted this can be abused by creating a data file with a large size value, causing the zserio runtime to allo…
GitHub-GHSA
CRITICAL
Dgraph: Unauthenticated Admin Token Disclosure Leading to Authentication Bypass via /debug/vars
GHSA-vvf7-6rmr-m29q
pkg: github.com/dgraph-io/dgraph/v25, github.com/dgraph-io/dgraph/v24, github.com/dgraph-io/dgraph
eco: go
published: Apr 24, 2026
### Summary
Dgraph `v25.3.2` still exposes the process command line through the unauthenticated `/debug/vars` endpoint on Alpha. Because the admin token is commonly supplied via the `–security "token=…"` startup flag, an unauthenticated attacker can retrieve that token and replay it in the `X-Dgr…
CVE-2026-41492
GitHub-GHSA
CRITICAL
Pipecat: Remote Code Execution by Pickle Deserialization Through LivekitFrameSerializer
GHSA-c2jg-5cp7-6wc7
pkg: pipecat-ai
eco: pip
published: Apr 23, 2026
Remote Code Execution via Unsafe Deserialization in Pipecat's LivekitFrameSerializer
### Summary
A critical vulnerability exists in Pipecat's `LivekitFrameSerializer` – an **optional, non-default, undocumented** frame serializer class (now deprecated) intended for LiveKit integration. The class'…
CVE-2025-62373
NVD
CRITICAL
CVE-2026-41268
Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.1.0, Flowise is vulnerable to a critical unauthenticated remote command execution (RCE) vulnerability. It can be exploited via a parameter override bypass using the FILE-STORAGE:: keyword combined wit…
CWE: CWE-20
NVD
CRITICAL
CVE-2026-41265
Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.1.0, the specific flaw exists within the run method of the Airtable_Agents class. The issue results from the lack of proper sandboxing when evaluating an LLM generated python script. Using prompt inje…
CWE: CWE-77
NVD
CRITICAL
CVE-2026-41264
Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.1.0, the specific flaw exists within the run method of the CSV_Agents class. The issue results from the lack of proper sandboxing when evaluating an LLM generated python script. An attacker can levera…
CWE: CWE-184
NVD
CRITICAL
CVE-2025-62373
Pipecat is an open-source Python framework for building real-time voice and multimodal conversational agents. Versions 0.0.41 through 0.0.93 have a vulnerability in `LivekitFrameSerializer` – an optional, non-default, undocumented frame serializer class (now deprecated) intended for LiveKit integr…
CWE: CWE-502
NVD
CRITICAL
CVE-2026-29198
In Rocket.Chat <8.3.0, <8.2.1, <8.1.2, <8.0.3, <7.13.5, <7.12.6, <7.11.6, and <7.10.9, a NoSQL injection vulnerability can lead to account takeover of the first user with a generated token when an OAuth app is configured.
CWE: CWE-89
GitHub-GHSA
CRITICAL
Evolver: Command Injection via `execSync` in `_extractLLM()` function allows Remote Code Execution
GHSA-j5w5-568x-rq53
pkg: @evomap/evolver
eco: npm
published: Apr 22, 2026
### Summary
A command injection vulnerability in the `_extractLLM()` function allows attackers to execute arbitrary shell commands on the server. The function constructs a curl command using string concatenation and passes it to `execSync()` without proper sanitization, enabling remote code executio…
GitHub-GHSA
CRITICAL
NornicDB has Improper Network Binding in its Bolt Server, allowing unauthorized remote access
GHSA-2hp7-65r3-wv54
pkg: github.com/orneryd/nornicdb
eco: go
published: Apr 22, 2026
## Summary
The `–address` CLI flag (and `NORNICDB_ADDRESS` / `server.host` config key) is plumbed through to the HTTP server correctly but **never reaches the Bolt server config**. The Bolt listener therefore always binds to the wildcard address (all interfaces), regardless of what the user config…
NVD
CRITICAL
CVE-2026-33519
An incorrect authorization vulnerability exists in Esri Portal for ArcGIS 11.4, 11.5 and 12.0 on Windows, Linux and Kubernetes that did not correctly check permissions assigned to developer credentials.
CWE: CWE-266
NVD
CRITICAL
CVE-2026-33518
An incorrect privilege assignment vulnerability exists in Esri Portal for ArcGIS 11.5 in Windows and Linux that allows highly privileged users to create developer credentials that may grant more privileges than expected.
CWE: CWE-266
NVD
CRITICAL
CVE-2026-40884
goshs is a SimpleHTTPServer written in Go. Prior to 2.0.0-beta.6, goshs contains an SFTP authentication bypass when the documented empty-username basic-auth syntax is used. If the server is started with -b ':pass' together with -sftp, goshs accepts that configuration but does not install any SFTP pa…
CWE: CWE-306
NVD
CRITICAL
CVE-2026-32311
Flowsint is an open-source OSINT graph exploration tool designed for cybersecurity investigation, transparency, and verification. Flowsint allows a user to create investigations, which are used to manage sketches and analyses. Sketches have controllable graphs, which are comprised of nodes and relat…
CWE: CWE-78
NVD
CRITICAL
CVE-2026-6920
Out of bounds read in GPU in Google Chrome on Android prior to 147.0.7727.117 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)
CWE: CWE-125
NVD
CRITICAL
CVE-2026-6919
Use after free in DevTools in Google Chrome prior to 147.0.7727.117 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)
CWE: CWE-416
GitHub-GHSA
CRITICAL
OpenC3 COSMOS: Permissions Bypass Provides User Access to Unassigned Administrative Actions via Script Runner Tool
GHSA-2wvh-87g2-89hr
pkg: openc3
eco: rubygems
published: Apr 23, 2026
**Vulnerability Type: Execution with Unnecessary Privileges
Attack type: Authenticated remote
Impact: Data disclosure/manipulation, privilege escalation
Affected components: The following docker images:
• Openc3inc/openc3-COSMOS-script-runner-api**
The Script Runner widget allows users to execute…
GitHub-GHSA
CRITICAL
OpenC3 COSMOS has SQL Injection in QuestDB Time-Series Database
GHSA-v529-vhwc-wfc5
pkg: openc3
eco: rubygems
published: Apr 23, 2026
**Vulnerability Type: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Attack type: Authenticated remote
Impact: Telemetry data disclosure and deletion
Affected components: openc3-tsdb (QuestDB)**
A SQL injection vulnerability exists in the Time-Series Da…
GitHub-GHSA
CRITICAL
nimiq-block has skip block quorum bypass via out-of-range BitSet indices & u16 truncation
GHSA-6973-8887-87ff
pkg: nimiq-block
eco: rust
published: Apr 22, 2026
### Impact
`SkipBlockProof::verify` computes its quorum check using `BitSet.len()`, then iterates `BitSet` indices and casts each `usize` index to `u16` (`slot as u16`) for slot lookup. If an attacker can get a `SkipBlockProof` verified where `MultiSignature.signers` contains out-of-range indices sp…
CVE-2026-33471
GitHub-GHSA
CRITICAL
Note Mark: OIDC-registered users authenticated by submitting password "null"
GHSA-pxf8-6wqm-r6hh
pkg: github.com/enchant97/note-mark/backend
eco: go
published: Apr 25, 2026
## Summary
`IsPasswordMatch` in `backend/db/models.go` falls back to a hard-coded `bcrypt("null")` placeholder whenever a user has no stored password. OIDC-registered users are created with an empty password, so anyone who submits `password: "null"` to the internal login endpoint receives a valid s…
CVE-2026-41571
NVD
CRITICAL
CVE-2026-41428
Budibase is an open-source low-code platform. Prior to 3.35.4, the authenticated middleware uses unanchored regular expressions to match public (no-auth) endpoint patterns against ctx.request.url. Since ctx.request.url in Koa includes the query string, an attacker can access any protected endpoint b…
CWE: CWE-287
GitHub-GHSA
CRITICAL
Dgraph: Pre-Auth Full Database Exfiltration via DQL Injection in NQuad Lang Field
GHSA-x92x-px7w-4gx4
pkg: github.com/dgraph-io/dgraph/v25, github.com/dgraph-io/dgraph/v24, github.com/dgraph-io/dgraph
eco: go
published: Apr 24, 2026
## 1. Executive Summary
A vulnerability has been found in Dgraph that gives an unauthenticated attacker full read access to every piece of data in the database. This affects Dgraph's default configuration where ACL is not enabled.
The attack requires two HTTP POSTs to port 8080. The first sets up …
CVE-2026-41328
GitHub-GHSA
CRITICAL
Dgraph: Pre-Auth Full Database Exfiltration via DQL Injection in Upsert Condition Field
GHSA-mrxx-39g5-ph77
pkg: github.com/dgraph-io/dgraph/v25, github.com/dgraph-io/dgraph/v24, github.com/dgraph-io/dgraph
eco: go
published: Apr 24, 2026
## 1. Executive Summary
A vulnerability has been found in Dgraph that gives an unauthenticated attacker full read access to every piece of data in the database. This affects Dgraph's default configuration where ACL is not enabled.
The attack is a single HTTP POST to `/mutate?commitNow=true` contai…
CVE-2026-41327
GitHub-GHSA
CRITICAL
Microsoft Security Advisory CVE-2026-40372 – ASP.NET Core Elevation of Privilege
GHSA-9mv3-2cwr-p262
pkg: Microsoft.AspNetCore.DataProtection
eco: nuget
published: Apr 23, 2026
## Executive Summary:
A bug in `Microsoft.AspNetCore.DataProtection` 10.0.0-10.0.6 NuGet packages can give an attacker the opportunity to execute an Elevation of Privilege attack by forging authentication cookies, and also allows some protected payloads to be decrypted.
If an attacker used forged…
CVE-2026-40372
NVD
CRITICAL
CVE-2026-40575
OAuth2 Proxy is a reverse proxy that provides authentication using OAuth2 providers. Versions 7.5.0 through 7.15.1 may trust a client-supplied `X-Forwarded-Uri` header when `–reverse-proxy` is enabled and `–skip-auth-regex` or `–skip-auth-route` is configured. An attacker can spoof this header so…
CWE: CWE-290
NVD
CRITICAL
CVE-2026-40903
goshs is a SimpleHTTPServer written in Go. Prior to 2.0.0-beta.6, goshs has an ArtiPACKED vulnerability. ArtiPACKED can lead to leakage of the GITHUB_TOKEN through workflow artifacts, even though the token is not present in the repository source code. This vulnerability is fixed in 2.0.0-beta.6.
CWE: CWE-829
NVD
CRITICAL
CVE-2026-40887
Vendure is an open-source headless commerce platform. Starting in version 1.7.4 and prior to versions 2.3.4, 3.5.7, and 3.6.2, an unauthenticated SQL injection vulnerability exists in the Vendure Shop API. A user-controlled query string parameter is interpolated directly into a raw SQL expression wi…
CWE: CWE-89
NVD
CRITICAL
CVE-2026-33432
Roxy-WI is a web interface for managing Haproxy, Nginx, Apache and Keepalived servers. In versions up to and including 8.2.8.2, when LDAP authentication is enabled, Roxy-WI constructs an LDAP search filter by directly concatenating the user-supplied login username into the filter string without esca…
CWE: CWE-287
GitHub-GHSA
CRITICAL
Apache Kafka does not validate JWT tokens in its OAUTHBEARER authentication implementation
GHSA-28jg-cgg7-j4wc
pkg: org.apache.kafka:kafka-clients
eco: maven
published: Apr 20, 2026
A security vulnerability has been identified in Apache Kafka. By default, the broker property `sasl.oauthbearer.jwt.validator.class` is set to `org.apache.kafka.common.security.oauthbearer.DefaultJwtValidator`. It accepts any JWT token without validating its signature, issuer, or audience. An atta…
CVE-2026-33557
NVD
CRITICAL
CVE-2026-33557
A possible security vulnerability has been identified in Apache Kafka.
By default, the broker property `sasl.oauthbearer.jwt.validator.class` is set to `org.apache.kafka.common.security.oauthbearer.DefaultJwtValidator`. It accepts any JWT token without validating its signature, issuer, or audienc…
CWE: CWE-1285
GitHub-GHSA
CRITICAL
LiteLLM has SQL Injection in Proxy API key verification
GHSA-r75f-5x8p-qvmc
pkg: litellm
eco: pip
published: Apr 24, 2026
### Impact
A database query used during proxy API key checks mixed the caller-supplied key value into the query text instead of passing it as a separate parameter. An unauthenticated attacker could send a specially crafted `Authorization` header to any LLM API route (for example `POST /chat/complet…
GitHub-GHSA
CRITICAL
RClone: Unauthenticated operations/fsinfo allows attacker-controlled backend instantiation and local command execution
GHSA-jfwf-28xr-xw6q
pkg: github.com/rclone/rclone
eco: go
published: Apr 22, 2026
### Summary
The RC endpoint `operations/fsinfo` is exposed without `AuthRequired: true` and accepts attacker-controlled `fs` input. Because `rc.GetFs(…)` supports inline backend definitions, an unauthenticated attacker can instantiate an attacker-controlled backend on demand. For the WebDAV backen…
CVE-2026-41179
GitHub-GHSA
CRITICAL
Rclone: Unauthenticated options/set allows runtime auth bypass, leading to sensitive operations and command execution
GHSA-25qr-6mpr-f7qx
pkg: github.com/rclone/rclone
eco: go
published: Apr 22, 2026
### Summary
The RC endpoint `options/set` is exposed without `AuthRequired: true`, but it can mutate global runtime configuration, including the RC option block itself. An unauthenticated attacker can set `rc.NoAuth=true`, which disables the authorization gate for many RC methods registered with `Au…
CVE-2026-41176
GitHub-GHSA
CRITICAL
Flowise: CSV Agent Prompt Injection Remote Code Execution Vulnerability
GHSA-3hjv-c53m-58jj
pkg: flowise, flowise-components
eco: npm
published: Apr 21, 2026
## Abstract
Trend Micro's Zero Day Initiative has identified a vulnerability affecting FlowiseAI Flowise.
## Vulnerability Details
– **Version tested:** 3.0.13
– **Installer file:** https://github.com/FlowiseAI/Flowise
– **Platform tested:** Ubuntu 25.10
## Analysis
This vulnerability allows re…
CVE-2026-41264
GitHub-GHSA
CRITICAL
Brillig: Heap corruption in foreign call results with nested tuple arrays
GHSA-jj7c-x25r-r8r3
pkg: brillig
eco: rust
published: Apr 21, 2026
## Description
Noir programs can invoke external functions through foreign calls. When compiling to Brillig bytecode, the SSA instructions are processed block-by-block in `BrilligBlock::compile_block()`. When the compiler encounters an `Instruction::Call` with a `Value::ForeignFunction` target, it …
CVE-2026-41197
NVD
HIGH
CVE-2026-7082
A flaw has been found in Tenda F456 1.0.0.5. Affected by this vulnerability is the function formWrlExtraSet of the file /goform/WrlExtraSet of the component httpd. Executing a manipulation of the argument Go can lead to buffer overflow. The attack can be executed remotely. The exploit has been publi…
CWE: CWE-119, CWE-120
NVD
HIGH
CVE-2026-7035
A vulnerability was determined in Tenda FH1202 1.2.0.14. This affects the function fromWrlclientSet of the file /goform/WrlclientSet of the component httpd. Executing a manipulation of the argument Go can lead to stack-based buffer overflow. The attack may be launched remotely. The exploit has been …
CWE: CWE-119, CWE-121
NVD
HIGH
CVE-2026-7034
A vulnerability was found in Tenda FH1202 1.2.0.14(408). Affected by this issue is the function WrlExtraSet of the file /goform/WrlExtraSet of the component httpd. Performing a manipulation of the argument Go results in stack-based buffer overflow. The attack may be initiated remotely. The exploit h…
CWE: CWE-119, CWE-121
GitHub-GHSA
HIGH
GitPython has Command Injection via Git options bypass
GHSA-rpm5-65cw-6hj4
pkg: GitPython
eco: pip
published: Apr 25, 2026
### Summary
GitPython blocks dangerous Git options such as `–upload-pack` and `–receive-pack` by default, but the equivalent Python kwargs `upload_pack` and `receive_pack` bypass that check. If an application passes attacker-controlled kwargs into `Repo.clone_from()`, `Remote.fetch()`, `Remote.pul…
NVD
HIGH
CVE-2026-41421
SiYuan is an open-source personal knowledge management system. Prior to 3.6.5, SiYuan desktop renders notification messages as raw HTML inside an Electron renderer. The notification route POST /api/notification/pushMsg accepts a user-controlled msg value, forwards it through the backend broadcast la…
CWE: CWE-78, CWE-79
NVD
HIGH
CVE-2026-40897
Math.js is an extensive math library for JavaScript and Node.js. From 13.1.1 to before 15.2.0, a vulnerability allowed executing arbitrary JavaScript via the expression parser of mathjs. You can be affected when you have an application where users can evaluate arbitrary expressions using the mathjs …
CWE: CWE-915
GitHub-GHSA
HIGH
Avo: Broken Access Control Through Unauthorized Execution of Arbitrary Action Classes Across Resources
GHSA-qc5p-3mg5-9fh8
pkg: avo
eco: rubygems
published: Apr 24, 2026
### Summary
A critical Broken Access Control vulnerability was identified in the `ActionsController` of the Avo framework (v3.x). Due to insecure action lookup logic, an authenticated user can execute any Action class (descendants of `Avo::BaseAction`) on any resource, even if the action is not reg…
NVD
HIGH
CVE-2026-41352
OpenClaw before 2026.3.31 contains a remote code execution vulnerability where a device-paired node can bypass the node scope gate authentication mechanism. Attackers with device pairing credentials can execute arbitrary node commands on the host system without proper node pairing validation.
CWE: CWE-862
GitHub-GHSA
HIGH
OpenLearnX has Critical Remote Code Execution Through Python Sandbox Escape via Code Execution Environment
GHSA-8h25-q488-4hxw
pkg: openlearnx
eco: npm
published: Apr 23, 2026
## Overview
A critical Remote Code Execution (RCE) vulnerability was identified in the OpenLearnX code execution environment, allowing sandbox escape and arbitrary command execution. The issue has been fixed.
CVE-2026-41900
GitHub-GHSA
HIGH
Actual has Privilege Escalation via 'change-password' Endpoint on OpenID-Migrated Servers
GHSA-prp4-2f49-fcgp
pkg: @actual-app/sync-server
eco: npm
published: Apr 23, 2026
### Summary
Any authenticated user (including `BASIC` role) can escalate to `ADMIN` on servers migrated from password authentication to OpenID Connect. Three weaknesses combine: `POST /account/change-password` has no authorization check, allowing any session to overwrite the password hash; the inac…
CVE-2026-33318
NVD
HIGH
CVE-2026-41138
Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.1.0, there is a remote code execution vulnerability in AirtableAgent.ts caused by lack of input verification when using Pandas. The user’s input is directly applied to the question parameter within …
CWE: CWE-94
NVD
HIGH
CVE-2026-41208
Paperclip is a Node.js server and React UI that orchestrates a team of AI agents to run a business. Versions of @paperclipai/server prior to 2026.416.0 contain a privilege escalation vulnerability that allows an attacker with an Agent API key to execute arbitrary OS commands on the Paperclip server …
CWE: CWE-78
NVD
HIGH
CVE-2026-6859
A flaw was found in InstructLab. The `linux_train.py` script hardcodes `trust_remote_code=True` when loading models from HuggingFace. This allows a remote attacker to achieve arbitrary Python code execution by convincing a user to run `ilab train/download/generate` with a specially crafted malicious…
CWE: CWE-829
NVD
HIGH
CVE-2026-41133
pyLoad is a free and open-source download manager written in Python. Versions up to and including 0.5.0b3.dev97 cache `role` and `permission` in the session at login and continues to authorize requests using these cached values, even after an admin changes the user's role/permissions in the database…
CWE: CWE-613
NVD
HIGH
CVE-2026-40876
goshs is a SimpleHTTPServer written in Go. Prior to 2.0.0-beta.6, goshs contains an SFTP root escape caused by prefix-based path validation. An authenticated SFTP user can read from and write to filesystem paths outside the configured SFTP root, which breaks the intended jail boundary and can expose…
CWE: CWE-22
NVD
HIGH
CVE-2026-40611
Let's Encrypt client and ACME library written in Go (Lego). Prior to 4.34.0, the webroot HTTP-01 challenge provider in lego is vulnerable to arbitrary file write and deletion via path traversal. A malicious ACME server can supply a crafted challenge token containing ../ sequences, causing lego to wr…
CWE: CWE-22
GitHub-GHSA
HIGH
Neko has a Self-service Privilege Escalation for Authenticated Users
GHSA-2gw9-c2r2-f5qf
pkg: github.com/m1k1o/neko/server, github.com/m1k1o/neko/server
eco: go
published: Apr 21, 2026
### Impact
Any authenticated user can immediately obtain full administrative control of the entire Neko instance (member management, room settings, broadcast control, session termination, etc.). This results in a complete compromise of the instance.
### Patches
The vulnerability has been patched …
CVE-2026-39386
NVD
HIGH
CVE-2026-39386
Neko is a a self-hosted virtual browser that runs in Docker and uses WebRTC In versions 3.0.0 through 3.0.10 and 3.1.0 through 3.1.1, any authenticated user can immediately obtain full administrative control of the entire Neko instance (member management, room settings, broadcast control, session te…
CWE: CWE-20, CWE-269, CWE-284, CWE-639, CWE-862
GitHub-GHSA
HIGH
zrok: WebDAV drive backend follows symlinks outside DriveRoot, enabling host filesystem read/write
GHSA-74m3-9qvm-rp9h
pkg: github.com/openziti/zrok, github.com/openziti/zrok/v2
eco: go
published: Apr 25, 2026
**Summary**
The zrok WebDAV drive backend (davServer.Dir) restricts path traversal through lexical normalization but does not prevent symlink following. When a symbolic link inside the shared DriveRoot points to a location outside that root, remote WebDAV consumers can read files and—on shares wit…
GitHub-GHSA
HIGH
i18next-http-middleware: HTTP response splitting and DoS via unsanitised Content-Language header
GHSA-c3h8-g69v-pjrg
pkg: i18next-http-middleware
eco: npm
published: Apr 22, 2026
### Summary
Versions of `i18next-http-middleware` prior to 3.9.3 wrote user-controlled language values into the `Content-Language` response header after passing them through `utils.escape()`, which is an HTML-entity encoder that does not strip carriage return, line feed, or other control characters…
CVE-2026-41683
GitHub-GHSA
HIGH
i18next-http-middleware: Prototype pollution and path traversal via user-controlled language and namespace parameters
GHSA-5fgg-jcpf-8jjw
pkg: i18next-http-middleware
eco: npm
published: Apr 22, 2026
### Summary
Versions of `i18next-http-middleware` prior to 3.9.3 pass user-controlled `lng` and `ns` parameters to two internal paths that use them in ways that enable prototype pollution and, depending on the configured backend, path traversal or SSRF.
The vulnerable entry points are unauthentica…
NVD
HIGH
CVE-2026-40931
Compressing is a compressing and uncompressing lib for node. Prior to 2.1.1 and 1.10.5, the patch for CVE-2026-24884 relies on a purely logical string validation within the isPathWithinParent utility. This check verifies if a resolved path string starts with the destination directory string but fail…
CWE: CWE-59
GitHub-GHSA
HIGH
OpenClaude: Sandbox Bypass via Early-Exit Logic Flaw Allows Path Traversal
GHSA-m6rx-7pvw-2f73
pkg: @gitlawb/openclaude
eco: npm
published: Apr 21, 2026
A logic flaw exists in `bashToolHasPermission()` inside `src/tools/BashTool/bashPermissions.ts`. When the sandbox auto-allow feature is active and no explicit deny rule is configured, the function returns an `allow` result immediately — before the path constraint filter (`checkPathConstraints`) is…
CVE-2026-35570
NVD
HIGH
CVE-2026-6921
Race in GPU in Google Chrome on Windows prior to 147.0.7727.117 allowed a remote attacker to potentially perform a sandbox escape via a crafted video file. (Chromium security severity: Medium)
CWE: CWE-362
GitHub-GHSA
HIGH
RustFS: Missing admin authorization on notification target endpoints allows unauthenticated configuration of event webhooks
GHSA-pfcq-4gjr-6gjm
pkg: rustfs
eco: rust
published: Apr 22, 2026
# Missing Admin Auth on Notification Target Endpoints in RustFS
### Finding Summary
All four notification target admin API endpoints in `rustfs/src/admin/handlers/event.rs` use a `check_permissions` helper that validates authentication only (access key + session token), without performing any adm…
CVE-2026-40937
GitHub-GHSA
HIGH
Daptin: SQL injection via unvalidated goqu.L() calls in aggregate API
GHSA-rw2c-8rfq-gwfv
pkg: github.com/daptin/daptin
eco: go
published: Apr 22, 2026
## Summary
The `/aggregate/:typename` endpoint accepted `column` and `group` query parameters that were passed verbatim to `goqu.L()` — a raw SQL literal expression builder — without any validation. This bypassed all parameterization and allowed authenticated users with any valid session to inj…
CVE-2026-41422
NVD
HIGH
CVE-2026-41273
Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.1.0, Flowise contains an authentication bypass vulnerability that allows an unauthenticated attacker to obtain OAuth 2.0 access tokens associated with a public chatflow. By accessing a public chatflow…
CWE: CWE-306
GitHub-GHSA
HIGH
i18next-fs-backend: Path traversal via unsanitised lng/ns allows arbitrary file read/overwrite
GHSA-8847-338w-5hcj
pkg: i18next-fs-backend
eco: npm
published: Apr 22, 2026
### Summary
Versions of `i18next-fs-backend` prior to 2.6.4 interpolate the caller-supplied `lng` and `ns` values directly into the configured `loadPath` and `addPath` templates with no path-component validation and no sanitisation. When an application exposes the resolved language code to user-con…
NVD
HIGH
CVE-2026-41059
OAuth2 Proxy is a reverse proxy that provides authentication using OAuth2 providers. Versions 7.5.0 through 7.15.1 have a configuration-dependent authentication bypass. Deployments are affected when all of the following are true: Use of `skip_auth_routes` or the legacy `skip_auth_regex`; use of patt…
CWE: CWE-288
GitHub-GHSA
HIGH
GitPython: Unsafe option check validates multi_options before shlex.split transformation
GHSA-x2qx-6953-8485
pkg: GitPython
eco: pip
published: Apr 25, 2026
### Summary
`_clone()` validates `multi_options` as the original list, then executes `shlex.split(" ".join(multi_options))`. A string like `"–branch main –config core.hooksPath=/x"` passes validation (starts with `–branch`), but after split becomes `["–branch", "main", "–config", "core.hooksPa…
GitHub-GHSA
HIGH
Budibase auth session cookies are set with httpOnly:false — any XSS can lead to full account takeover
GHSA-4f9j-vr4p-642r
pkg: @budibase/backend-core
eco: npm
published: Apr 24, 2026
### Summary
The `budibase:auth` cookie containing the JWT session token is set with `httpOnly: false` at `packages/backend-core/src/utils/utils.ts:218`. JavaScript can read this cookie via `document.cookie`. Given that Budibase has had XSS vulnerabilities (GHSA-gp5x-2v54-v2q5 — stored XSS via uns…
GitHub-GHSA
HIGH
ERB has an @_init deserialization guard bypass via def_module / def_method / def_class
GHSA-q339-8rmv-2mhv
pkg: erb, erb, erb
eco: rubygems
published: Apr 24, 2026
## Summary
Ruby 2.7.0 (before ERB 2.2.0 was published on rubygems.org) introduced an `@_init` instance variable guard in `ERB#result` and `ERB#run` to prevent code execution when an ERB object is reconstructed via `Marshal.load` (deserialization). However, three other public methods that also evalu…
CVE-2026-41316
GitHub-GHSA
HIGH
Contour has Lua code injection via Cookie Path Rewrite Policy
GHSA-x4mj-7f9g-29h4
pkg: github.com/projectcontour/contour, github.com/projectcontour/contour, github.com/projectcontour/contour
eco: go
published: Apr 24, 2026
### Impact
Contour's [Cookie Rewriting](https://projectcontour.io/docs/1.33/config/cookie-rewriting/) feature is vulnerable to Lua code injection. An attacker with RBAC permissions to create or modify `HTTPProxy` resources can craft a malicious value in the following fields that results in arbitrar…
CVE-2026-41246
NVD
HIGH
CVE-2026-41246
Contour is a Kubernetes ingress controller using Envoy proxy. From v1.19.0 to before v1.33.4, v1.32.5, and v1.31.6, Contour's Cookie Rewriting feature is vulnerable to Lua code injection. An attacker with RBAC permissions to create or modify HTTPProxy resources can craft a malicious value in spec.ro…
CWE: CWE-94
GitHub-GHSA
HIGH
OpenC3 COSMOS: Hijacked session token can be used to reset password for persistence
GHSA-wgx6-g857-jjf7
pkg: openc3, openc3
eco: rubygems
published: Apr 22, 2026
### Summary
The OpenC3 password change functionality allows a user to change their password without providing the old password, by accepting a valid session token instead. In assumed breach scenarios, this behaviour can be exploited by an attacker who has already obtained a valid session token, to g…
GitHub-GHSA
HIGH
Evolver: Path Traversal via `–out` flag in `fetch` command allows Arbitrary File Write
GHSA-r466-rxw4-3j9j
pkg: @evomap/evolver
eco: npm
published: Apr 22, 2026
### Summary
A path traversal vulnerability in the skill download (`fetch`) command allows attackers to write files to arbitrary locations on the filesystem. The `–out=` flag accepts user-provided paths without validation, enabling directory traversal attacks that can overwrite critical system files…
NVD
HIGH
CVE-2026-34403
Nginx UI is a web user interface for the Nginx web server. Prior to version 2.3.5, all WebSocket endpoints in nginx-ui use a gorilla/websocket Upgrader with CheckOrigin unconditionally returning true, allowing Cross-Site WebSocket Hijacking (CSWSH). Combined with the fact that authentication tokens …
CWE: CWE-1385
NVD
HIGH
CVE-2026-33031
Nginx UI is a web user interface for the Nginx web server. Prior to version 2.3.4, a user who was disabled by an administrator can use previously issued API tokens for up to the token lifetime. In practice, disabling a compromised account does not actually terminate that user’s access, so an attac…
CWE: CWE-284, CWE-863
GitHub-GHSA
HIGH
Cillium exposes sensitive information included in the cilium-bugtool debug archive
GHSA-gj49-89wh-h4gj
pkg: github.com/cilium/cilium, github.com/cilium/cilium, github.com/cilium/cilium
eco: go
published: Apr 25, 2026
### Impact
The output of `cilium-bugtool` can contain sensitive data when the tool is run against Cilium deployments with WireGuard encryption enabled.
Users of [WireGuard Transparent Encryption](https://docs.cilium.io/en/stable/security/network/encryption-wireguard/) are affected.
The sensitive da…
CVE-2026-41520
NVD
HIGH
CVE-2026-32679
The installers of LiveOn Meet Client for Windows (Downloader5Installer.exe and Downloader5InstallerForAdmin.exe) and the installers of Canon Network Camera Plugin (CanonNWCamPlugin.exe and CanonNWCamPluginForAdmin.exe) insecurely load Dynamic Link Libraries (DLLs). If a malicious DLL is placed at th…
CWE: CWE-427
GitHub-GHSA
HIGH
Kyverno Controller Denial of Service via forEach Mutation Panic
GHSA-fpjq-c37h-cqcv
pkg: github.com/kyverno/kyverno, github.com/kyverno/kyverno
eco: go
published: Apr 24, 2026
### Summary
An unchecked type assertion in the `forEach` mutation handler allows any user with permission to create a `Policy` or `ClusterPolicy` to crash the cluster-wide background controller into a persistent CrashLoopBackOff. The same bug also causes the admission controller to drop connections…
CVE-2026-41485
NVD
HIGH
CVE-2026-41068
Kyverno is a policy engine designed for cloud native platform engineering teams. The patch for CVE-2026-22039 fixed cross-namespace privilege escalation in Kyverno's `apiCall` context by validating the `URLPath` field. However, the ConfigMap context loader has the identical vulnerability — the `co…
CWE: CWE-863
GitHub-GHSA
HIGH
Argo Workflows: Unchecked annotation parsing in pod informer crashes Argo Workflows Controller
GHSA-5jv8-h7qh-rf5p
pkg: github.com/argoproj/argo-workflows/v4, github.com/argoproj/argo-workflows/v3, github.com/argoproj/argo-workflows/v3
eco: go
published: Apr 23, 2026
### Summary
An unchecked array index in the pod informer's `podGCFromPod()` function causes a controller-wide panic when a workflow pod carries a malformed `workflows.argoproj.io/pod-gc-strategy` annotation. Because the panic occurs inside an informer goroutine (outside the controller's `recover()`…
CVE-2026-40886
NVD
HIGH
CVE-2026-40886
Argo Workflows is an open source container-native workflow engine for orchestrating parallel jobs on Kubernetes. From 3.6.5 to 4.0.4, an unchecked array index in the pod informer's podGCFromPod() function causes a controller-wide panic when a workflow pod carries a malformed workflows.argoproj.io/po…
CWE: CWE-129
GitHub-GHSA
HIGH
Tekton Pipelines: Git resolver API mode leaks system-configured API token to user-controlled serverURL
GHSA-wjxp-xrpv-xpff
pkg: github.com/tektoncd/pipeline
eco: go
published: Apr 21, 2026
### Summary
The Tekton Pipelines git resolver in API mode sends the system-configured Git API token to a user-controlled `serverURL` when the user omits the `token` parameter. A tenant with TaskRun or PipelineRun create permission can exfiltrate the shared API token (GitHub PAT, GitLab token, etc.)…
CVE-2026-40161
NVD
HIGH
CVE-2026-34428
Vvveb prior to 1.0.8.1 contains a server-side request forgery vulnerability in the oEmbedProxy action of the editor/editor module where the url parameter is passed directly to getUrl() via curl without scheme or destination validation. Authenticated backend users can supply file:// URLs to read arb…
CWE: CWE-918
NVD
HIGH
CVE-2026-31952
Xibo is an open source digital signage platform with a web content management system and Windows display player software. Versions 1.7 through 4.4.0 have an SQL injection vulnerability in the API routes inside the CMS responsible for Filtering DataSets. This allows an authenticated user to to obtain…
CWE: CWE-89, CWE-184
NVD
HIGH
CVE-2026-41066
lxml is a library for processing XML and HTML in the Python language. Prior to 6.1.0, using either of the two parsers in the default configuration (with resolve_entities=True) allows untrusted XML input to read local files. Setting the resolve_entities option explicitly to resolve_entities='internal…
CWE: CWE-611
GitHub-GHSA
HIGH
Zserio Runtime: Integer Overflow in BitStreamReader and Unbounded Memory Allocation in Deserialization
GHSA-cwq5-8pvq-j65j
pkg: io.github.ndsev:zserio-runtime
eco: maven
published: Apr 24, 2026
## Summary
### Unbounded Memory Allocation (all platforms)
A crafted payload as small as 4-5 bytes can force memory allocations of up to 16 GB, crashing any process with an OOM error (Denial of Service).
**Affected code (C++):**
– `cpp/runtime/src/zserio/Array.h` (line 1029) — `m_rawArray.reser…
CVE-2026-33524
GitHub-GHSA
HIGH
rustls-webpki: Denial of service via panic on malformed CRL BIT STRING
GHSA-82j2-j2ch-gfr8
pkg: rustls-webpki, rustls-webpki
eco: rust
published: Apr 24, 2026
### Summary
`bit_string_flags()` in `src/der.rs` panics with an index-out-of-bounds when given a BIT STRING whose content is exactly `[0x00]` (one byte: zero padding bits, zero data bytes). This is reachable through the public API `BorrowedCertRevocationList::from_der()` via the `issuingDistributio…
GitHub-GHSA
HIGH
russh has pre-auth DoS via unbounded allocation in its keyboard-interactive auth handler
GHSA-f5v4-2wr6-hqmg
pkg: russh
eco: rust
published: Apr 24, 2026
## Summary
A pre-authentication denial-of-service vulnerability exists in the server's keyboard-interactive authentication handler. A malicious client can crash any russh-based server that implements keyboard-interactive auth (e.g., for 2FA/TOTP) with a single malformed packet, requiring no credent…
GitHub-GHSA
HIGH
liquidjs has a Denial of Service via circular block reference in layout
GHSA-4rc3-7j7w-m548
pkg: liquidjs
eco: npm
published: Apr 24, 2026
### Summary
A circular block reference in `{% layout %}` / `{% block %}` causes an infinite recursive loop, consuming all available memory (~4GB) and crashing the Node.js process with `FATAL ERROR: JavaScript heap out of memory`. This allows any user who can submit a Liquid template to perform a De…
CVE-2026-41311
NVD
HIGH
CVE-2026-41324
basic-ftp is an FTP client for Node.js. Versions prior to 5.3.0 are vulnerable to denial of service through unbounded memory growth while processing directory listings from a remote FTP server. A malicious or compromised server can send an extremely large or never-ending listing response to `Client.…
CWE: CWE-400, CWE-770
NVD
HIGH
CVE-2026-41278
Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.1.0, the GET /api/v1/public-chatflows/:id endpoint returns the full chatflow object without sanitization for public chatflows. Docker validation revealed this is worse than initially assessed: the san…
CWE: CWE-200
NVD
HIGH
CVE-2026-41040
GROWI provided by GROWI, Inc. is vulnerable to a regular expression denial of service (ReDoS) via a crafted input string.
CWE: CWE-1333
GitHub-GHSA
HIGH
locize Client SDK: Cross-origin DOM XSS & Handler Hijack Through Missing e.origin Validation in InContext Editor
GHSA-w937-fg2h-xhq2
pkg: locize
eco: npm
published: Apr 22, 2026
### Summary
Versions of the `locize` client SDK (the browser module that wires up the locize InContext translation editor) prior to 4.0.21 register a `window.addEventListener("message", …)` handler that dispatches to registered internal handlers (`editKey`, `commitKey`, `commitKeys`, `isLocizeEna…
NVD
HIGH
CVE-2026-34065
nimiq-primitives contains primitives (e.g., block, account, transaction) to be used in Nimiq's Rust implementation. Prior to version 1.3.0, an untrusted p2p peer can cause a node to panic by announcing an election macro block whose `validators` set contains an invalid compressed BLS voting key. Hash…
CWE: CWE-252, CWE-755
NVD
HIGH
CVE-2026-34063
Nimiq's network-libp2p is a Nimiq network implementation based on libp2p. Prior to version 1.3.0, `network-libp2p` discovery uses a libp2p `ConnectionHandler` state machine. the handler assumes there is at most one inbound and one outbound discovery substream per connection. if a remote peer opens/n…
CWE: CWE-617
GitHub-GHSA
HIGH
@nocobase/database has SQL Injection via String Concatenation through Recursive Eager Loading
GHSA-4948-f92q-f432
pkg: @nocobase/database
eco: npm
published: Apr 22, 2026
## Summary
The `queryParentSQL()` function in the core database package constructs a recursive CTE query by joining `nodeIds` with string concatenation instead of using parameterized queries. The `nodeIds` array contains primary key values read from database rows. An attacker who can create a recor…
CVE-2026-41640
GitHub-GHSA
HIGH
free5GC PCF: Memory Leak via CORS Middleware Registration in HTTP Handler Leads to Denial of Service
GHSA-98cp-84m9-q3qp
pkg: github.com/free5gc/pcf
eco: go
published: Apr 22, 2026
## Summary
A memory leak vulnerability in the free5GC PCF (Policy Control Function) allows any unauthenticated attacker with network access to the PCF SBI interface to cause uncontrolled memory growth by sending repeated HTTP requests to the OAM endpoint. The root cause is a `router.Use()` call ins…
CVE-2026-41135
GitHub-GHSA
HIGH
nimiq-primitives: Node crash due to missing interlink validation in election macro block proposals
GHSA-7c4j-2m43-2mgh
pkg: nimiq-primitives
eco: rust
published: Apr 22, 2026
### Impact
An untrusted p2p peer can cause a node to panic by announcing an election macro block whose `validators` set contains an invalid compressed BLS voting key.
Hashing an election macro header hashes `validators` and reaches `Validators::voting_keys()`, which calls `validator.voting_key.unco…
CVE-2026-34065
NVD
HIGH
CVE-2026-40895
follow-redirects is an open source, drop-in replacement for Node's `http` and `https` modules that automatically follows redirects. Prior to 1.16.0, when an HTTP request follows a cross-domain redirect (301/302/307/308), follow-redirects only strips authorization, proxy-authorization, and cookie hea…
CWE: CWE-200
GitHub-GHSA
HIGH
lxml: Default configuration of iterparse() and ETCompatXMLParser() allows XXE to local files
GHSA-vfmq-68hx-4jfw
pkg: lxml
eco: pip
published: Apr 21, 2026
### Impact
Using either of the two parsers in the default configuration (with `resolve_entities=True`) allows untrusted XML input to read local files.
### Patches
lxml 6.1.0 changes the default to `resolve_entities='internal'`, thus disallowing local file access by default.
### Workarounds
Setting…
CVE-2026-41066
GitHub-GHSA
HIGH
Tekton Pipeline: Git Resolver Unsanitized Revision Parameter Enables git Argument Injection Leading to RCE
GHSA-94jr-7pqp-xhcq
pkg: github.com/tektoncd/pipeline
eco: go
published: Apr 21, 2026
## Summary
The git resolver's `revision` parameter is passed directly as a positional argument to `git fetch` without any validation that it does not begin with a `-` character. Because git parses flags from mixed positional arguments, an attacker can inject arbitrary `git fetch` flags such as `–u…
CVE-2026-40938
NVD
HIGH
CVE-2026-40890
The package `github.com/gomarkdown/markdown` is a Go library for parsing Markdown text and rendering as HTML. Processing a malformed input containing a < character that is not followed by a > character anywhere in the remaining text with a SmartypantsRenderer will lead to Out of Bounds read or a pan…
CWE: CWE-125
NVD
HIGH
CVE-2026-40879
Nest is a framework for building scalable Node.js server-side applications. Prior to 11.1.19, when an attacker sends many small, valid JSON messages in one TCP frame, handleData() recurses once per message; the buffer shrinks each call. maxBufferSize is never reached; call stack overflows instead. A…
CWE: CWE-674
NVD
HIGH
CVE-2026-40869
Decidim is a participatory democracy framework. Starting in version 0.19.0 and prior to versions 0.30.5 and 0.31.1, a vulnerability allows any registered and authenticated user to accept or reject any amendments. The impact is on any users who have created proposals where the amendments feature is e…
CWE: CWE-266
GitHub-GHSA
HIGH
Signal K Server has an Unauthenticated Regular Expression Denial of Service (ReDoS) via WebSocket Subscription Paths
GHSA-7gcj-phff-2884
pkg: signalk-server
eco: npm
published: Apr 21, 2026
## Summary
The SignalK server is vulnerable to an unauthenticated Regular Expression Denial of Service (ReDoS) attack within its WebSocket subscription handling logic. By injecting unescaped regex metacharacters into the `context` parameter of a stream subscription, an attacker can force the server'…
CVE-2026-39320
GitHub-GHSA
HIGH
LMDeploy has Server-Side Request Forgery (SSRF) via Vision-Language Image Loading
GHSA-6w67-hwm5-92mq
pkg: lmdeploy
eco: pip
published: Apr 21, 2026
## Summary
A Server-Side Request Forgery (SSRF) vulnerability exists in LMDeploy's vision-language module. The `load_image()` function in `lmdeploy/vl/utils.py` fetches arbitrary URLs without validating internal/private IP addresses, allowing attackers to access cloud metadata services, internal ne…
CVE-2026-33626
NVD
HIGH
CVE-2026-39320
Signal K Server is a server application that runs on a central hub in a boat. Versions prior to 2.25.0 are vulnerable to an unauthenticated Regular Expression Denial of Service (ReDoS) attack within the WebSocket subscription handling logic. By injecting unescaped regex metacharacters into the `cont…
CWE: CWE-400, CWE-1333
NVD
HIGH
CVE-2026-42035
Axios is a promise based HTTP client for the browser and Node.js. Prior to 1.15.1 and 0.31.1, a prototype pollution gadget exists in the Axios HTTP adapter (lib/adapters/http.js) that allows an attacker to inject arbitrary HTTP headers into outgoing requests. The vulnerability exploits duck-type che…
CWE: CWE-113, CWE-1321
NVD
HIGH
CVE-2026-42033
Axios is a promise based HTTP client for the browser and Node.js. Prior to 1.15.1 and 0.31.1, when Object.prototype has been polluted by any co-dependency with keys that axios reads without a hasOwnProperty guard, an attacker can (a) silently intercept and modify every JSON response before the appli…
CWE: CWE-1321
NVD
HIGH
CVE-2026-7060
A vulnerability was determined in liyupi yu-picture up to a053632c41340152bf75b66b3c543d129123d8ec. This impacts the function PageRequest of the file yu-picture-backend/src/main/java/com/yupi/yupicturebackend/service/impl/PictureServiceImpl.java of the component MyBatis-Plus. Executing a manipulatio…
CWE: CWE-74, CWE-89
NVD
HIGH
CVE-2025-14362
The login limit is not enforced on the SFTP service of Fortra's GoAnywhere MFT prior to 7.10.0 if the Web User attempting to be logged in to is configured to log in with an SSH Key, making the SSH key vulnerable to being guessed via Brute Force.
CWE: CWE-307
NVD
HIGH
CVE-2026-42043
Axios is a promise based HTTP client for the browser and Node.js. Prior to 1.15.1 and 0.31.1, an attacker who can influence the target URL of an Axios request can use any address in the 127.0.0.0/8 range (other than 127.0.0.1) to completely bypass the NO_PROXY protection. This vulnerability is due t…
CWE: CWE-183, CWE-441, CWE-918
NVD
HIGH
CVE-2026-5464
The ExactMetrics – Google Analytics Dashboard for WordPress (Website Stats Plugin) plugin for WordPress is vulnerable to unauthorized arbitrary plugin installation and activation in all versions up to, and including, 9.1.2. This is due to the reports page exposing the 'onboarding_key' transient to…
CWE: CWE-862
GitHub-GHSA
HIGH
@nocobase/plugin-collection-sql: SQL Validation Bypass Through Missing `checkSQL` Call
GHSA-wrwh-c28m-9jjh
pkg: @nocobase/plugin-collection-sql
eco: npm
published: Apr 22, 2026
## Summary
The `checkSQL()` validation function that blocks dangerous SQL keywords (e.g., `pg_read_file`, `LOAD_FILE`, `dblink`) is applied on the `collections:create` and `sqlCollection:execute` endpoints but is entirely missing on the `sqlCollection:update` endpoint. An attacker with collection m…
CVE-2026-41641
NVD
HIGH
CVE-2026-40871
mailcow: dockerized is an open source groupware/email suite based on docker. Versions prior to 2026-03b have a second-order SQL injection vulnerability in the quarantine_category field via the Mailcow API. The /api/v1/add/mailbox endpoint stores quarantine_category without validation or sanitization…
CWE: CWE-20, CWE-89, CWE-116, CWE-564
GitHub-GHSA
HIGH
New API: Stripe Webhook Signature Bypass via Empty Secret Enables Unlimited Quota Fraud
GHSA-xff3-5c9p-2mr4
pkg: github.com/QuantumNous/new-api
eco: go
published: Apr 24, 2026
## Summary
A critical vulnerability exists in the Stripe webhook handler that allows an **unauthenticated attacker to forge webhook events** and credit arbitrary quota to their account without making any payment. The vulnerability stems from three compounding flaws:
1. The Stripe webhook endpoint …
CVE-2026-41432
GitHub-GHSA
HIGH
Apktool: Path Traversal to Arbitrary File Write
GHSA-m8mh-x359-vm8m
pkg: org.apktool:apktool-lib
eco: maven
published: Apr 23, 2026
A path traversal vulnerability in `brut/androlib/res/decoder/ResFileDecoder.java` allows a maliciously crafted APK to write arbitrary files to the filesystem during standard decoding (`apktool d`). This is a security regression introduced in commit [e10a045](https://github.com/iBotPeaches/Apktool/co…
CVE-2026-39973
NVD
HIGH
CVE-2026-41270
Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.1.0, a Server-Side Request Forgery (SSRF) protection bypass vulnerability exists in the Custom Function feature. While the application implements SSRF protection via HTTP_DENY_LIST for axios and node-…
CWE: CWE-284, CWE-918
NVD
HIGH
CVE-2026-41269
Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.1.0, the Chatflow configuration file upload settings can be modified to allow the application/javascript MIME type. This lets an attacker upload .js files even though the frontend doesn’t normally a…
CWE: CWE-434
NVD
HIGH
CVE-2026-39973
Apktool is a tool for reverse engineering Android APK files. In versions 3.0.0 and 3.0.1, a path traversal vulnerability in `brut/androlib/res/decoder/ResFileDecoder.java` allows a maliciously crafted APK to write arbitrary files to the filesystem during standard decoding (`apktool d`). This is a se…
CWE: CWE-22
GitHub-GHSA
HIGH
OpenRemote has Improper Access Control via updateUserRealmRoles function
GHSA-49vv-25qx-mg44
pkg: io.openremote:openremote-manager
eco: maven
published: Apr 22, 2026
### Summary
A user who has `write:admin` in one Keycloak realm can call the Manager API to update **Keycloak realm roles** for users in **another** realm, including **`master`**. The handler uses the `{realm}` path segment when talking to the identity provider but does not check that the caller may …
CVE-2026-41166
GitHub-GHSA
HIGH
Heimdall has an authorization bypass via path normalization mismatch
GHSA-3q34-rx83-r6mq
pkg: github.com/dadrus/heimdall
eco: go
published: Apr 25, 2026
### Summary
Heimdall performs rule matching on the raw (non-normalized) request path, while downstream components may normalize dot-segments according to [RFC 3986, Section 6.2.2.3](https://www.rfc-editor.org/rfc/rfc3986#section-6.2.2.3). This discrepancy can result in heimdall authorizing a reques…
GitHub-GHSA
HIGH
Heimdall: Case-sensitive host matching may lead to policy bypass
GHSA-72h4-mxfc-jx37
pkg: github.com/dadrus/heimdall
eco: go
published: Apr 25, 2026
### Summary
Heimdall performs host matching in a case-sensitive manner, while HTTP hostnames are case-insensitive. This discrepancy can result in heimdall failing to match a rule for a request host that differs only in letter casing, potentially causing the request to be classified differently than…
GitHub-GHSA
HIGH
Heimdall: Case-sensitive handling of URL-encoded slashes may lead to inconsistent path interpretation
GHSA-43jv-5j4x-qv67
pkg: github.com/dadrus/heimdall
eco: go
published: Apr 25, 2026
### Summary
Heimdall handles URL-encoded slashes (`%2F`) in a case-sensitive manner, while percent-encoding is defined to be case-insensitive. As a result, the lowercase equivalent (`%2f`) is not recognized and therefore not processed as expected when `allow_encoded_slashes` is set to `off` (the de…
GitHub-GHSA
HIGH
LiteLLM: Authenticated command execution via MCP stdio test endpoints
GHSA-v4p8-mg3p-g94g
pkg: litellm
eco: pip
published: Apr 25, 2026
### Impact
Two endpoints used to preview an MCP server before saving it — `POST /mcp-rest/test/connection` and `POST /mcp-rest/test/tools/list` — accepted a full server configuration in the request body, including the `command`, `args`, and `env` fields used by the stdio transport. When called …
GitHub-GHSA
HIGH
Traefik has an StripPrefixRegex Middleware Authorization Bypass via Path/RawPath Desync
GHSA-6jwx-7vp4-9847
pkg: github.com/traefik/traefik/v3, github.com/traefik/traefik/v3, github.com/traefik/traefik/v2
eco: go
published: Apr 24, 2026
## Summary
There is a high severity authentication bypass vulnerability in Traefik's `StripPrefixRegex` middleware when used in combination with `ForwardAuth`, `BasicAuth`, or `DigestAuth`.
The middleware matches the regex against the decoded URL path but uses the resulting byte length to slice th…
CVE-2026-40912
GitHub-GHSA
HIGH
k8sGPT has Prompt Injection through its k8sGPT-Operator
GHSA-rp7v-4384-hfrp
pkg: github.com/k8sgpt-ai/k8sgpt
eco: go
published: Apr 24, 2026
### Summary
In the auto-remediation pipeline, `object_to_execution.go` was deserializing the AI-generated YAML directly into a Deployment object, but there was lack of validation from the original Deployment object.
### Details
This issue was fixed after coordination with Alex Jones.
### PoC
To mi…
GitHub-GHSA
HIGH
Claude Code: Trust Dialog Bypass via Git Worktree Spoofing Allows Arbitrary Code Execution
GHSA-q5hj-mxqh-vv77
pkg: @anthropic-ai/claude-code
eco: npm
published: Apr 24, 2026
Claude Code used the git worktree `commondir` file when determining folder trust but did not validate its contents. By crafting a repository with a `commondir` file pointing to a path the victim had previously trusted, an attacker could bypass the trust dialog and immediately execute malicious hooks…
CVE-2026-40068
GitHub-GHSA
HIGH
Traefik: Pre-authentication decision bypass due to forwarded alias spoofing
GHSA-5m6w-wvh7-57vm
pkg: github.com/traefik/traefik/v3, github.com/traefik/traefik/v3, github.com/traefik/traefik/v2
eco: go
published: Apr 24, 2026
## Summary
There is a high severity authentication bypass vulnerability in Traefik's `ForwardAuth` and snippet-based authentication middleware. Traefik's forwarded-header sanitization logic targets only canonical header names (e.g., `X-Forwarded-Proto`) and does not strip or normalize alias variant…
CVE-2026-39858
GitHub-GHSA
HIGH
Traefik's ForwardAuth trustForwardHeader=false allows spoofed X-Forwarded-Prefix to bypass authentication
GHSA-6384-m2mw-rf54
pkg: github.com/traefik/traefik/v3, github.com/traefik/traefik/v3, github.com/traefik/traefik/v2
eco: go
published: Apr 24, 2026
## Summary
There is a high-severity authentication bypass vulnerability in Traefik's `ForwardAuth` middleware when `trustForwardHeader=false` is configured and Traefik is deployed behind a trusted upstream proxy.
While `X-Forwarded-*` headers (such as `X-Forwarded-For`, `X-Forwarded-Host`, and `X-…
CVE-2026-35051
GitHub-GHSA
HIGH
Ray: Remote Code Execution via Parquet Arrow Extension Type Deserialization
GHSA-mw35-8rx3-xf9r
pkg: ray
eco: pip
published: Apr 24, 2026
# Remote Code Execution via Parquet Arrow Extension Type Deserialization
## Summary
Ray Data registers custom Arrow extension types (`ray.data.arrow_tensor`, `ray.data.arrow_tensor_v2`, `ray.data.arrow_variable_shaped_tensor`) globally in PyArrow. When PyArrow reads a Parquet file containing one o…
CVE-2026-41486
GitHub-GHSA
HIGH
LiteLLM: Server-Side Template Injection in /prompts/test endpoint
GHSA-xqmj-j6mv-4862
pkg: litellm
eco: pip
published: Apr 24, 2026
### Impact
The `POST /prompts/test` endpoint accepted user-supplied prompt templates and rendered them without sandboxing. A crafted template could run arbitrary code inside the LiteLLM Proxy process.
The endpoint only checks that the caller presents a valid proxy API key, so any authenticated user…
GitHub-GHSA
HIGH
rust-openssl: Deriver::derive and PkeyCtxRef::derive can overflow short buffers on OpenSSL 1.1.1
GHSA-pqf5-4pqq-29f5
pkg: openssl
eco: rust
published: Apr 22, 2026
`Deriver::derive` (and `PkeyCtxRef::derive`) sets `len = buf.len()` and passes it as the in/out length to `EVP_PKEY_derive`, relying on OpenSSL to honor it. On OpenSSL 1.1.x, X25519, X448, DH and HKDF-extract ignore the incoming `*keylen`, unconditionally writing the full shared secret (32/56/prime…
CVE-2026-41676
GitHub-GHSA
HIGH
rust-openssl has incorrect bounds assertion in aes key wrap
GHSA-8c75-8mhr-p7r9
pkg: openssl
eco: rust
published: Apr 22, 2026
### Summary
“aes::unwrap_key()“ has an incorrect bounds assertion on the out buffer size, which can lead to out-of-bounds write.
### Details
“aes::unwrap_key()“ contains an incorrect assertion: it checks that `out.len() + 8 <= in_.len()`, but this condition is reversed. The intended invariant i…
CVE-2026-41678
GitHub-GHSA
HIGH
rust-openssl: rustMdCtxRef::digest_final() writes past caller buffer with no length check
GHSA-ghm9-cr32-g9qj
pkg: openssl
eco: rust
published: Apr 22, 2026
`EVP_DigestFinal()` always writes `EVP_MD_CTX_size(ctx)` to the `out` buffer. If `out` is smaller than that, `MdCtxRef::digest_final()` writes past its end, usually corrupting the stack. This is reachable from safe Rust.
CVE-2026-41681
GitHub-GHSA
HIGH
rust-openssl: Unchecked callback length in PSK/cookie trampolines leaks adjacent memory to peer
GHSA-hppc-g8h3-xhp3
pkg: openssl
eco: rust
published: Apr 22, 2026
The FFI trampolines behind `SslContextBuilder::set_psk_client_callback`, `set_psk_server_callback`, `set_cookie_generate_cb`, and `set_stateless_cookie_generate_cb` forwarded the user closure's returned usize directly to OpenSSL without checking it against the `&mut [u8]` that was handed to the clo…
GitHub-GHSA
HIGH
SiYuan: Path Traversal via Double URL Encoding in `/export/` Endpoint (Incomplete Fix Bypass for CVE-2026-30869)
GHSA-hjh7-r5w8-5872
pkg: github.com/siyuan-note/siyuan/kernel
eco: go
published: Apr 22, 2026
### Summary
The fix for CVE-2026-30869 in SiYuan v3.5.10 only added a denylist check (`IsSensitivePath`) but did not address the root cause — a redundant `url.PathUnescape()` call in `serveExport()`. An authenticated attacker can use double URL encoding (`%252e%252e`) to traverse directories and r…
GitHub-GHSA
HIGH
MCPHub has Path Traversal via Malicious MCPB Manifest Name
GHSA-p3h2-2j4p-p83g
pkg: @samanhappy/mcphub
eco: npm
published: Apr 22, 2026
The MCPB file upload handler extracts a ZIP file and reads `manifest.json` from it. The `name` field from the manifest is concatenated directly into the file path (line 107) without any sanitization or path traversal character validation. An attacker can craft a malicious MCPB file with `manifest.na…
GitHub-GHSA
HIGH
xmldom: Uncontrolled recursion in XML serialization leads to DoS
GHSA-2v35-w6hq-6mfw
pkg: @xmldom/xmldom, @xmldom/xmldom, xmldom
eco: npm
published: Apr 22, 2026
## Summary
Seven recursive traversals in `lib/dom.js` operate without a depth limit. A sufficiently deeply
nested DOM tree causes a `RangeError: Maximum call stack size exceeded`, crashing the application.
**Reported operations:**
– `Node.prototype.normalize()` — reported by @praveen-kv (email 2…
CVE-2026-41673
GitHub-GHSA
HIGH
xmldom has XML injection through unvalidated DocumentType serialization
GHSA-f6ww-3ggp-fr8h
pkg: @xmldom/xmldom, @xmldom/xmldom, xmldom
eco: npm
published: Apr 22, 2026
## Summary
The package serializes `DocumentType` node fields (`internalSubset`, `publicId`, `systemId`) verbatim
without any escaping or validation. When these fields are set programmatically to attacker-controlled
strings, `XMLSerializer.serializeToString` can produce output where the DOCTYPE decl…
CVE-2026-41674
GitHub-GHSA
HIGH
xmldom has XML node injection through unvalidated processing instruction serialization
GHSA-x6wf-f3px-wcqx
pkg: @xmldom/xmldom, @xmldom/xmldom, xmldom
eco: npm
published: Apr 22, 2026
## Summary
The package allows attacker-controlled processing instruction data to be serialized into XML without validating or neutralizing the PI-closing sequence `?>`. As a result, an attacker can terminate the processing instruction early and inject arbitrary XML nodes into the serialized output.…
CVE-2026-41675
GitHub-GHSA
HIGH
xmldom has XML node injection through unvalidated comment serialization
GHSA-j759-j44w-7fr8
pkg: @xmldom/xmldom, @xmldom/xmldom, xmldom
eco: npm
published: Apr 22, 2026
## Summary
The package allows attacker-controlled comment content to be serialized into XML without validating or neutralizing comment breaking sequences. As a result, an attacker can terminate the comment early and inject arbitrary XML nodes into the serialized output.
—
## Details
The issue …
CVE-2026-41672
GitHub-GHSA
HIGH
monetr: Server-side request forgery in Lunch Flow link creation and refresh
GHSA-29v9-frvh-c426
pkg: github.com/monetr/monetr
eco: go
published: Apr 22, 2026
### Impact
A server-side request forgery (SSRF) vulnerability in monetr's Lunch Flow integration allowed any authenticated user on
a self-hosted instance to cause the monetr server to issue HTTP GET requests to arbitrary URLs supplied by the caller,
with the response body from non-200 upstream resp…
CVE-2026-41644
GitHub-GHSA
HIGH
engram: HTTP server CORS wildcard + auth-off-by-default enables CSRF graph exfiltration and persistent indirect prompt injection
GHSA-2r2p-4cgf-hv7h
pkg: engramx
eco: npm
published: Apr 22, 2026
### Summary
The local HTTP server started by `engram server` (binding `127.0.0.1:7337` by default) was exposed to any browser origin with no authentication unless `ENGRAM_API_TOKEN` was explicitly set. Combined with `Access-Control-Allow-Origin: *` on every response and a body parser that did not r…
GitHub-GHSA
HIGH
@saltcorn/data: Tenant user role is used for tenant creation role check
GHSA-9237-rg5p-rhfw
pkg: @saltcorn/data, @saltcorn/data, @saltcorn/data
eco: npm
published: Apr 22, 2026
## Summary
When a tenant admin is logged out of the root domain (e.g., saltcorn.com) but logged in to their own tenant space as admin, they can simply append `/tenant/create` to their tenant URL. The system reads the role from the tenant context (admin), and a new tenant is created on the **root do…
GitHub-GHSA
HIGH
Claude Code: Sandbox Escape via Symlink Following Allows Arbitrary File Write Outside Workspace
GHSA-vp62-r36r-9xqp
pkg: @anthropic-ai/claude-code
eco: npm
published: Apr 21, 2026
Claude Code's sandbox did not prevent sandboxed processes from creating symlinks pointing to locations outside the workspace. When Claude Code subsequently wrote to a path within such a symlink, its unsandboxed process followed the symlink and wrote to the target location outside the workspace witho…
CVE-2026-39861
GitHub-GHSA
HIGH
Glances has SSRF in IP Plugin via public_api leading to credential leakage
GHSA-g5pq-48mj-jvw8
pkg: glances
eco: pip
published: Apr 21, 2026
### Summary
A Server-Side Request Forgery (SSRF) vulnerability exists in the Glances IP plugin due to improper validation of the public_api configuration parameter. The value of public_api is used directly in outbound HTTP requests without any scheme restriction or hostname/IP validation.
An attack…
CVE-2026-35587
GitHub-GHSA
HIGH
Glances: Cross-Origin Information Disclosure via Unauthenticated REST API (/api/4) due to Permissive CORS
GHSA-gfc2-9qmw-w7vh
pkg: Glances
eco: pip
published: Apr 21, 2026
### Summary
The Glances web server exposes a REST API (`/api/4/*`) that is accessible without authentication and allows cross-origin requests from any origin due to a permissive CORS policy (`Access-Control-Allow-Origin: *`).
This allows a malicious website to read sensitive system information from…
CVE-2026-34839
GitHub-GHSA
HIGH
Nginx-UI: Cross-Site WebSocket Hijacking (CSWSH) via missing origin validation on all WebSocket endpoints
GHSA-78mf-482w-62qj
pkg: github.com/0xJacky/Nginx-UI
eco: go
published: Apr 21, 2026
## Summary
All WebSocket endpoints in nginx-ui use a gorilla/websocket Upgrader with CheckOrigin unconditionally returning true, allowing Cross-Site WebSocket Hijacking (CSWSH). Combined with the fact that authentication tokens are stored in browser cookies (set via JavaScript without HttpOnly or e…
CVE-2026-34403
GitHub-GHSA
HIGH
Nginx-UI: Disabled users retain full API access through previously issued bearer tokens
GHSA-x234-x5vq-cc2v
pkg: github.com/0xJacky/Nginx-UI
eco: go
published: Apr 21, 2026
### Summary
A user who was disabled by an administrator can use previously issued API tokens for up to the token lifetime. In practice, disabling a compromised account does not actually terminate that user’s access, so an attacker who already stole a JWT can continue reading and modifying protect…
CVE-2026-33031
GitHub-GHSA
MEDIUM
DOMPurify: Prototype Pollution to XSS Bypass via CUSTOM_ELEMENT_HANDLING Fallback
GHSA-v9jr-rg53-9pgp
pkg: dompurify
eco: npm
published: Apr 22, 2026
## Summary
DOMPurify versions 3.0.1 through 3.3.3 (latest) are vulnerable to a prototype pollution-based XSS bypass. When an application uses `DOMPurify.sanitize()` with the default configuration (no `CUSTOM_ELEMENT_HANDLING` option), a prior prototype pollution gadget can inject permissive `tagNam…
CVE-2026-41238
NVD
MEDIUM
CVE-2026-41527
KDE Kleopatra before 26.08.0 on Windows allows local users to obtain the privileges of a Kleopatra user, because there is an error in the mechanism (KUniqueService) for ensuring that only one instance is running.
CWE: CWE-670
NVD
MEDIUM
CVE-2026-42038
Axios is a promise based HTTP client for the browser and Node.js. Prior to 1.15.1 and 0.31.1, he fix for no_proxy hostname normalization bypass is incomplete. When no_proxy=localhost is set, requests to 127.0.0.1 and [::1] still route through the proxy instead of bypassing it. The shouldBypassProxy(…
CWE: CWE-918
NVD
MEDIUM
CVE-2026-41239
DOMPurify is a DOM-only cross-site scripting sanitizer for HTML, MathML, and SVG. Starting in version 1.0.10 and prior to version 3.4.0, `SAFE_FOR_TEMPLATES` strips `{{…}}` expressions from untrusted HTML. This works in string mode but not with `RETURN_DOM` or `RETURN_DOM_FRAGMENT`, allowing XSS v…
CWE: CWE-79, CWE-1289
GitHub-GHSA
MEDIUM
nimiq-transaction: UpdateValidator transactions allows voting key change without proof-of-knowledge
GHSA-pf4j-pf3w-95f9
pkg: nimiq-transaction
eco: rust
published: Apr 22, 2026
### Impact
The staking contract accepts `UpdateValidator` transactions that set `new_voting_key=Some(…)` while omitting `new_proof_of_knowledge`. this skips the proof-of-knowledge requirement that is needed to prevent BLS rogue-key attacks when public keys are aggregated.
Because tendermint macro…
CVE-2026-34068
GitHub-GHSA
MEDIUM
DOMPurify has a SAFE_FOR_TEMPLATES bypass in RETURN_DOM mode
GHSA-crv5-9vww-q3g8
pkg: dompurify
eco: npm
published: Apr 22, 2026
## Summary
| Field | Value |
|:——|:——|
| **Severity** | Medium |
| **Affected** | DOMPurify `main` at [`883ac15`](https://github.com/cure53/DOMPurify/tree/883ac15d47f907cb1a3b5a152fe90c4d8c10f9e6), introduced in v1.0.10 ([`7fc196db`](https://github.com/cure53/DOMPurify/commit/7fc196db0b42a0…
CVE-2026-41239
NVD
MEDIUM
CVE-2026-40574
OAuth2 Proxy is a reverse proxy that provides authentication using OAuth2 providers. Prior to 7.15.2, an authorization bypass exists in OAuth2 Proxy as part of the email_domain enforcement option. An attacker may be able to authenticate with an email claim such as attacker@evil.com@company.com and s…
CWE: CWE-863
NVD
MEDIUM
CVE-2026-41667
Integer overflow in constant tensor data size calculation in Samsung Open Source ONE could cause incorrect buffer sizing for large constant nodes.
Affected version is prior to commit 1.30.0.
CWE: CWE-190
GitHub-GHSA
MEDIUM
python-dotenv: Symlink following in set_key allows arbitrary file overwrite via cross-device rename fallback
GHSA-mf9w-mj56-hr94
pkg: python-dotenv
eco: pip
published: Apr 21, 2026
### Summary
`set_key()` and `unset_key()` in python-dotenv follow symbolic links when rewriting `.env` files, allowing a local attacker to overwrite arbitrary files via a crafted symlink when a cross-device rename fallback is triggered.
### Details
The `rewrite()` context manager in `dotenv/main…
CVE-2026-28684
NVD
MEDIUM
CVE-2026-28684
python-dotenv reads key-value pairs from a .env file and can set them as environment variables. Prior to version 1.2.2, `set_key()` and `unset_key()` in python-dotenv follow symbolic links when rewriting `.env` files, allowing a local attacker to overwrite arbitrary files via a crafted symlink when …
CWE: CWE-59, CWE-61
NVD
MEDIUM
CVE-2026-42044
Axios is a promise based HTTP client for the browser and Node.js. From 1.0.0 to before 1.15.2, he Axios library is vulnerable to a Prototype Pollution "Gadget" attack that allows any Object.prototype pollution in the application's dependency tree to be escalated into surgical, invisible modification…
CWE: CWE-915, CWE-1321
GitHub-GHSA
MEDIUM
Lemmy has SSRF and internal image disclosure in post link metadata via unvalidated og:image
GHSA-h6hf-9846-xwrq
pkg: lemmy_api_common
eco: rust
published: Apr 24, 2026
### Summary
Lemmy fetches metadata for user-supplied post URLs and, under the default `StoreLinkPreviews` image mode, downloads the preview image through local pict-rs. While the top-level page URL is checked against internal IP ranges, the extracted `og:image` URL is not subject to the same restric…
GitHub-GHSA
MEDIUM
goshs has Cross-Origin Arbitrary File Write via Missing CSRF on PUT and Wildcard CORS
GHSA-rhf7-wvw3-vjvm
pkg: github.com/patrickhener/goshs/v2, github.com/patrickhener/goshs
eco: go
published: Apr 23, 2026
### Summary
The PUT upload handler (`httpserver/updown.go`) lacks the CSRF token validation that was added to the POST upload handler during the GHSA-jrq5-hg6x-j6g3 fix. Combined with the unconditional `Access-Control-Allow-Origin: *` on the OPTIONS preflight handler (`httpserver/server.go`), any we…
NVD
MEDIUM
CVE-2026-1352
IBM Db2 11.5.0 through 11.5.9, and 12.1.0 through 12.1.4 for Linux, UNIX and Windows (includes Db2 Connect Server) could allow an authenticated user to cause a denial of service due to improper neutralization of special elements in data query logic.
CWE: CWE-1284
GitHub-GHSA
MEDIUM
i18next-locize-backend has URL Injection via Unsanitized Path Parameters
GHSA-mgcp-mfp8-3q45
pkg: i18next-locize-backend
eco: npm
published: Apr 22, 2026
### Summary
Versions of `i18next-locize-backend` prior to 9.0.2 interpolate `lng`, `ns`, `projectId`, and `version` directly into the configured `loadPath` / `privatePath` / `addPath` / `updatePath` / `getLanguagesPath` URL templates with no path-component validation and no encoding. When an applic…
GitHub-GHSA
MEDIUM
DDEV has ZipSlip path traversal in tar and zip archive extraction
GHSA-x2xq-qhjf-5mvg
pkg: github.com/ddev/ddev
eco: go
published: Apr 22, 2026
## Summary
The DDEV local dev tool has unsanitized extraction in both `Untar()` and `Unzip()` functions in `pkg/archive/archive.go`. This flaw allows users to download and extract archives from remote sources without path validation.
## Vulnerable Code
`pkg/archive/archive.go:235` (Untar):
“`go
…
CVE-2026-32885
GitHub-GHSA
MEDIUM
i18next-http-backend has Path Traversal & URL Injection via Unsanitised lng/ns
GHSA-q89c-q3h5-w34g
pkg: i18next-http-backend
eco: npm
published: Apr 22, 2026
### Summary
Versions of `i18next-http-backend` prior to 3.0.5 interpolate the `lng` and `ns` values directly into the configured `loadPath` / `addPath` URL template without any encoding, validation, or path sanitisation. When an application exposes the language-code selection to user-controlled inp…
NVD
MEDIUM
CVE-2026-32885
DDEV is an open-source tool for running local web development environments for PHP and Node.js. Versions prior to 1.25.2 have unsanitized extraction in both `Untar()` and `Unzip()` functions in `pkg/archive/archive.go`. Downloads and extracts archives from remote sources without path validation. Ver…
CWE: CWE-22
NVD
MEDIUM
CVE-2026-40924
Tekton Pipelines project provides k8s-style resources for declaring CI/CD-style pipelines. Prior to 1.11.1, the HTTP resolver's FetchHttpResource function calls io.ReadAll(resp.Body) with no response body size limit. Any tenant with permission to create TaskRuns or PipelineRuns that reference the HT…
CWE: CWE-400
GitHub-GHSA
MEDIUM
Tekton Pipelines: HTTP Resolver Unbounded Response Body Read Enables Denial of Service via Memory Exhaustion
GHSA-m2cx-gpqf-qf74
pkg: github.com/tektoncd/pipeline
eco: go
published: Apr 21, 2026
## Summary
The HTTP resolver's `FetchHttpResource` function calls `io.ReadAll(resp.Body)` with no response body size limit. Any tenant with permission to create TaskRuns or PipelineRuns that reference the HTTP resolver can point it at an attacker-controlled HTTP server that returns a very large res…
CVE-2026-40924
NVD
MEDIUM
CVE-2026-40907
WWBN AVideo is an open source video platform. In versions 29.0 and prior, the endpoint `plugin/Live/view/Live_restreams/list.json.php` contains an Insecure Direct Object Reference (IDOR) vulnerability that allows any authenticated user with streaming permission to retrieve other users' live restream…
CWE: CWE-639
GitHub-GHSA
MEDIUM
nbconvert has an Arbitrary File Read via Path Traversal in HTMLExporter Image Embedding
GHSA-7jqv-fw35-gmx9
pkg: nbconvert
eco: pip
published: Apr 21, 2026
## Summary
When `HTMLExporter.embed_images=True`, nbconvert's markdown renderer allows arbitrary file read via path traversal in image references. A malicious notebook can exfiltrate sensitive files from the conversion host by embedding them as base64 data URIs in the output HTML.
## Patches
Upgr…
CVE-2026-39378
GitHub-GHSA
MEDIUM
nbconvert has an Arbitrary File Write via Path Traversal in Cell Attachment Filenames
GHSA-4c99-qj7h-p3vg
pkg: nbconvert
eco: pip
published: Apr 21, 2026
# Arbitrary File Write via Path Traversal in Cell Attachment Filenames
## Summary
nbconvert allows arbitrary file writes to locations outside the intended output directory when processing notebooks containing crafted cell attachment filenames. The `ExtractAttachmentsPreprocessor` passes attachment…
CVE-2026-39377
NVD
MEDIUM
CVE-2026-25542
Tekton Pipelines project provides k8s-style resources for declaring CI/CD-style pipelines. From 0.43.0 to 1.11.0, trusted resources verification policies match a resource source string (refSource.URI) against spec.resources[].pattern using regexp.MatchString. In Go, regexp.MatchString reports a matc…
CWE: CWE-185
GitHub-GHSA
MEDIUM
Tekton Pipelines has VerificationPolicy regex pattern bypass via substring matching
GHSA-rmx9-2pp3-xhcr
pkg: github.com/tektoncd/pipeline
eco: go
published: Apr 21, 2026
## Summary
The Trusted Resources verification system matches a resource source string (`refSource.URI`) against `spec.resources[].pattern` using Go's `regexp.MatchString`. In Go, `regexp.MatchString` reports a match if the pattern matches **anywhere** in the input string. As a result, common unanch…
CVE-2026-25542
NVD
MEDIUM
CVE-2026-1089
User‑Controlled HTTP Header in Fortra's GoAnywhere MFT prior to version 7.10.0 allows attackers to trigger a DNS lookup, as well as DNS Rebinding and Information Disclosure.
CWE: CWE-74
NVD
MEDIUM
CVE-2026-33431
Roxy-WI is a web interface for managing Haproxy, Nginx, Apache and Keepalived servers. Prior to version 8.2.6.4, the POST /config/<service>/show API endpoint accepts a configver parameter that is directly appended to a base directory path to construct a local file path, which is subsequently opened …
CWE: CWE-24
NVD
MEDIUM
CVE-2026-31953
Xibo is an open source digital signage platform with a web content management system and Windows display player software. A stored Cross-Site Scripting (XSS) vulnerability in versions prior to 4.4.1 allows an authenticated user with notification creation permissions to inject arbitrary JavaScript in…
CWE: CWE-79
GitHub-GHSA
MEDIUM
Marko: XSS via case-insensitive script/style closing tag bypass in runtime HTML escaping
GHSA-x9fj-57fh-c8wq
pkg: marko, @marko/runtime-tags
eco: npm
published: Apr 22, 2026
### Summary
When dynamic text is interpolated into a `<script>` or `<style>` tag the Marko runtime failed to prevent tag breakout when the closing tag used non-lowercase casing.
An attacker able to place input inside a `<script>` or `<style>` block could break out of the tag with `</SCRIPT>`, `</St…
CVE-2026-41591
NVD
MEDIUM
CVE-2026-35252
Vulnerability in the Oracle Security Service product of Oracle Fusion Middleware (component: C Oracle SSL API). Supported versions that are affected are 12.2.1.4.0 and 12.1.3.0.0. Difficult to exploit vulnerability allows low privileged attacker with network access via HTTPS to compromise Oracle S…
CWE: CWE-284
GitHub-GHSA
MEDIUM
Lemmy has SSRF in /api/v3/post via Webmention dispatch
GHSA-3jvj-v6w2-h948
pkg: lemmy_api_common
eco: rust
published: Apr 24, 2026
### Summary
Lemmy allows an authenticated low-privileged user to create a link post through `POST /api/v3/post`. When a post is created in a public community, the backend asynchronously sends a Webmention to the attacker-controlled link target.
The submitted URL is checked for syntax and scheme, bu…
NVD
MEDIUM
CVE-2025-62233
Deserialization of Untrusted Data vulnerability in Apache DolphinScheduler RPC module.
This issue affects Apache DolphinScheduler:
Version >= 3.2.0 and < 3.3.1.
Attackers who can access the Master or Worker nodes can compromise the system by creating a StandardRpcRequest, injecting a malicious …
CWE: CWE-502
GitHub-GHSA
MEDIUM
Glances has CQL Injection in its Cassandra Export Module via Unsanitized Config Values
GHSA-grp3-h8m8-45p7
pkg: glances
eco: pip
published: Apr 21, 2026
## Summary
The Cassandra export module (`glances/exports/glances_cassandra/__init__.py`) interpolates `keyspace`, `table`, and `replication_factor` configuration values directly into CQL statements without validation. A user with write access to `glances.conf` can redirect all monitoring data to an…
CVE-2026-35588
GitHub-GHSA
MEDIUM
Grid: Integer Overflow in Grid::expand_rows Leads to Safe-API Undefined Behavior
GHSA-38c5-483c-4qqp
pkg: grid
eco: rust
published: Apr 24, 2026
### Summary
An integer overflow in `Grid::expand_rows()` can corrupt the relationship between the grid’s logical dimensions and its backing storage. After the internal invariant is broken, the safe API get() may invoke get_unchecked() with an invalid index, resulting in Undefined Behavior.
### De…
GitHub-GHSA
MEDIUM
OpenMcdf has an Infinite loop DoS via crafted CFB directory cycle
GHSA-jxpf-xq2m-q525
pkg: OpenMcdf
eco: nuget
published: Apr 22, 2026
### Summary
OpenMcdf does not detect cycles in the directory entry red-black tree of a Compound File Binary (CFB) document. A crafted CFB file with a cycle in the `LeftSiblingID` / `RightSiblingID` chain causes `Storage.EnumerateEntries()` and `Storage.OpenStream()` to loop indefinitely, consuming t…
CVE-2026-41511
NVD
MEDIUM
CVE-2026-40608
Next AI Draw.io is a next.js web application that integrates AI capabilities with draw.io diagrams. Prior to 0.4.15, the embedded HTTP sidecar contains three POST handlers (/api/state, /api/restore, and /api/history-svg) that process incoming requests by accumulating the entire request body into a J…
CWE: CWE-770
GitHub-GHSA
MEDIUM
PostCSS has XSS via Unescaped </style> in its CSS Stringify Output
GHSA-qx2v-qp2m-jg93
pkg: postcss
eco: npm
published: Apr 24, 2026
# PostCSS: XSS via Unescaped `</style>` in CSS Stringify Output
## Summary
PostCSS v8.5.5 (latest) does not escape `</style>` sequences when stringifying CSS ASTs. When user-submitted CSS is parsed and re-stringified for embedding in HTML `<style>` tags, `</style>` in CSS values breaks out of the …
CVE-2026-41305
GitHub-GHSA
MEDIUM
melange has Path Traversal When Resolving External Pipelines via Unvalidated pipeline[].uses
GHSA-98f2-w9h9-7fp9
pkg: chainguard.dev/melange
eco: go
published: Apr 23, 2026
### Impact
An attacker who can influence a melange configuration file — for example through pull-request-driven CI or build-as-a-service scenarios — could set `pipeline[].uses` to a value containing `../` sequences or an absolute path. The `(*Compiled).compilePipeline` function in `pkg/build/co…
CVE-2026-29050
GitHub-GHSA
MEDIUM
fast-xml-parser XMLBuilder: XML Comment and CDATA Injection via Unescaped Delimiters
GHSA-gh4j-gqv2-49f6
pkg: fast-xml-parser
eco: npm
published: Apr 22, 2026
# fast-xml-parser XMLBuilder: Comment and CDATA Injection via Unescaped Delimiters
## Summary
fast-xml-parser XMLBuilder does not escape the `–>` sequence in comment content or the `]]>` sequence in CDATA sections when building XML from JavaScript objects. This allows XML injection when user-cont…
CVE-2026-41650
GitHub-GHSA
MEDIUM
Astro: XSS in define:vars via incomplete </script> tag sanitization
GHSA-j687-52p2-xcff
pkg: astro
eco: npm
published: Apr 21, 2026
## Summary
The `defineScriptVars` function in Astro's server-side rendering pipeline uses a case-sensitive regex `/<\/script>/g` to sanitize values injected into inline `<script>` tags via the `define:vars` directive. HTML parsers close `<script>` elements case-insensitively and also accept whitesp…
CVE-2026-41067
NVD
MEDIUM
CVE-2026-40565
FreeScout is a free self-hosted help desk and shared mailbox. Prior to version 1.8.213, FreeScout's linkify() function in app/Misc/Helper.php converts plain-text URLs in email bodies into HTML anchor tags without escaping double-quote characters (") in the URL. HTMLPurifier (called first via getClea…
CWE: CWE-79
GitHub-GHSA
MEDIUM
OpenTelemetry.Sampler.AWS & OpenTelemetry.Resources.AWS have unbounded HTTP response body reads
GHSA-28xm-prxc-5866
pkg: OpenTelemetry.Sampler.AWS, OpenTelemetry.Resources.AWS
eco: nuget
published: Apr 23, 2026
### Summary
`OpenTelemetry.Sampler.AWS` reads unbounded HTTP response bodies from a configured AWS X-Ray remote sampling endpoint into memory.
`OpenTelemetry.Resources.AWS` reads unbounded HTTP response bodies from a configured AWS EC2/ECS/EKS remote instance metadata service endpoint into memory.…
CVE-2026-41173
NVD
MEDIUM
CVE-2026-41213
@node-oauth/oauth2-server is a module for implementing an OAuth2 server in Node.js. The token exchange path accepts RFC7636-invalid code_verifier values (including one-character strings) for S256 PKCE flows. Because short/weak verifiers are accepted and failed verifier attempts do not consume the au…
CWE: CWE-307, CWE-1289
GitHub-GHSA
MEDIUM
free5GC UDR: Fail-open handling in PolicyDataSubsToNotifyPost allows unintended subscription creation
GHSA-jwch-w7wh-gqjm
pkg: github.com/free5gc/udr
eco: go
published: Apr 21, 2026
### Summary
A fail-open request handling flaw in the UDR service causes the `/nudr-dr/v2/policy-data/subs-to-notify` POST handler to continue processing requests even after request body retrieval or deserialization errors.
This may allow unintended creation of Policy Data notification subscriptions…
CVE-2026-40343
NVD
MEDIUM
CVE-2025-1241
Encrypted values in Fortra's GoAnywhere MFT prior to version 7.10.0 and GoAnywhere Agents prior to version 2.2.0 utilize a static IV which allows admin users to brute-force decryption of data.
CWE: CWE-326
NVD
MEDIUM
CVE-2026-41389
OpenClaw versions 2026.4.7 before 2026.4.15 fail to enforce local-root containment on tool-result media paths, allowing arbitrary local and UNC file access. Attackers can craft malicious tool-result media references to trigger host-side file reads or Windows network path access, potentially disclosi…
CWE: CWE-73
NVD
MEDIUM
CVE-2026-7018
A vulnerability was determined in Datavane Datavines up to 13607645e14a4982468cfdbcf75c85cde63bae71. The affected element is an unknown function of the file datavines-core/src/main/java/io/datavines/core/utils/TokenManager.java of the component JWT Token Handler. Executing a manipulation of the argu…
CWE: CWE-320, CWE-321
NVD
MEDIUM
CVE-2026-40602
The Home Assistant Command-line interface (hass-cli) is a command-line tool for Home Assistant. Up to 1.0.0 of home-assitant-cli an unrestricted environment was used to handle Jninja2 templates instead of a sandboxed one. The user-supplied input within Jinja2 templates was rendered locally with no r…
CWE: CWE-94, CWE-1336
GitHub-GHSA
MEDIUM
Nuclei: Local File Read via require() Module Loader Bypass
GHSA-29rg-wmcw-hpf4
pkg: github.com/projectdiscovery/nuclei/v3
eco: go
published: Apr 22, 2026
A vulnerability in Nuclei's JavaScript protocol runtime allows JavaScript templates to read local `.js` and `.json` files through the `require()` function, bypassing the default local file access restriction.
**Affected Component**
The issue is in the JavaScript runtime's module loading system. Th…
CVE-2026-41646
NVD
MEDIUM
CVE-2026-6862
A flaw was found in libefiboot, a component of efivar. The device path node parser in libefiboot fails to validate that each node's Length field is at least 4 bytes, which is the minimum size for an EFI (Extensible Firmware Interface) device path node header. A local user could exploit this vulnerab…
CWE: CWE-674
NVD
MEDIUM
CVE-2026-41425
Authlib is a Python library which builds OAuth and OpenID Connect servers. Prior to 1.6.11, there is no CSRF protection on the cache feature in authlib.integrations.starlette_client.OAuth. This vulnerability is fixed in 1.6.11.
CWE: CWE-352
NVD
MEDIUM
CVE-2026-42042
Axios is a promise based HTTP client for the browser and Node.js. Prior to 1.15.1 and 0.31.1, the Axios library's XSRF token protection logic uses JavaScript truthy/falsy semantics instead of strict boolean comparison for the withXSRFToken config property. When this property is set to any truthy non…
CWE: CWE-183, CWE-201
GitHub-GHSA
MEDIUM
Tekton Pipelines: VolumeMount path restriction bypass via missing filepath.Clean in /tekton/ check
GHSA-rx35-6rhx-7858
pkg: github.com/tektoncd/pipeline
eco: go
published: Apr 21, 2026
## Summary
A validation bypass in the VolumeMount path restriction allows mounting volumes under restricted `/tekton/` internal paths by using `..` path traversal components. The restriction check uses `strings.HasPrefix` without `filepath.Clean`, so a path like `/tekton/home/../results` passes val…
CVE-2026-40923
NVD
MEDIUM
CVE-2026-41194
FreeScout is a free self-hosted help desk and shared mailbox. Prior to version 1.8.215, the mailbox OAuth disconnect action is implemented as `GET /mailbox/oauth-disconnect/{id}/{in_out}/{provider}`. It removes stored OAuth metadata from the mailbox and then redirects. Because it is a GET route, no …
CWE: CWE-352
GitHub-GHSA
MEDIUM
Auth0 Next.js SDK has Improper Proxy Cache Lookup
GHSA-xq8m-7c5p-c2r6
pkg: @auth0/nextjs-auth0
eco: npm
published: Apr 21, 2026
### Description
In affected versions of the Next.js SDK, simultaneous requests that trigger a nonce retry may cause the proxy cache fetcher to perform improper lookups for the token request results.
### Which Projects are Affected?
Users are affected if they meet all of the following preconditions:…
CVE-2026-40155
NVD
MEDIUM
CVE-2026-0972
HTML injection is possible in system generated emails in Fortra's GoAnywhere MFT prior to 7.10.0.
Note: The title, details, and description of this CVE were corrected post-publishing.
CWE: CWE-74
GitHub-GHSA
MEDIUM
Note Mark: Unauthenticated read of notes and assets in soft-deleted public books
GHSA-3gr9-485j-v4xf
pkg: github.com/enchant97/note-mark/backend
eco: go
published: Apr 25, 2026
## Summary
After a note-mark owner soft-deletes a public book, its notes and uploaded assets stay readable at `/api/notes/{id}`, `/api/notes/{id}/content`, the slug URL, and the asset endpoints. Unauthenticated callers who hold the note ID or the slug path retain access. GORM's soft-delete scope do…
CVE-2026-41572
NVD
MEDIUM
CVE-2026-6993
A security flaw has been discovered in go-kratos kratos up to 2.9.2. This impacts the function NewServer of the file transport/http/server.go of the component http.DefaultServeMux Fallback Handler. The manipulation results in unintended intermediary. The attack may be launched remotely. The exploit …
CWE: CWE-441
NVD
MEDIUM
CVE-2026-6985
A weakness has been identified in Cesanta Mongoose up to 7.20. This vulnerability affects the function handle_opt of the file /src/net_builtin.c of the component TCP Option Handler. This manipulation of the argument optlen causes infinite loop. The attack is possible to be carried out remotely. The …
CWE: CWE-404, CWE-835
NVD
MEDIUM
CVE-2026-42037
Axios is a promise based HTTP client for the browser and Node.js. From 1.0.0 to before 1.15.1, the FormDataPart constructor in lib/helpers/formDataToStream.js interpolates value.type directly into the Content-Type header of each multipart part without sanitizing CRLF (\r\n) sequences. An attacker wh…
CWE: CWE-93
NVD
MEDIUM
CVE-2026-42036
Axios is a promise based HTTP client for the browser and Node.js. Prior to 1.15.1 and 0.31.1, when responseType: 'stream' is used, Axios returns the response stream without enforcing maxContentLength. This bypasses configured response-size limits and allows unbounded downstream consumption. This vul…
CWE: CWE-770
NVD
MEDIUM
CVE-2026-42034
Axios is a promise based HTTP client for the browser and Node.js. Prior to 1.15.1 and 0.31.1, for stream request bodies, maxBodyLength is bypassed when maxRedirects is set to 0 (native http/https transport path). Oversized streamed uploads are sent fully even when the caller sets strict body limits.…
CWE: CWE-770
NVD
MEDIUM
CVE-2026-41322
@astrojs/node allows Astro to deploy your SSR site to Node targets. Prior to 10.0.5, requesting a static js/css resources from _astro path with an incorrect/malformed if-match header returns a 500 error with a one year cache lifetime instead of 412 in some cases. This has the effect that all subsequ…
CWE: CWE-525
GitHub-GHSA
MEDIUM
ParquetSharp: Possible Stack Overflow When Reading a ParquetFile with Large Decimal Type Width
GHSA-rrjr-v56m-ww88
pkg: ParquetSharp
eco: nuget
published: Apr 24, 2026
`DecimalConverter.ReadDecimal` makes a stackalloc using what might be an attacker-supplied value. If an attacker declares a decimal column with some unreasonable width, this could lead to a stack overflow. In a service environment, this would potentially take down a service.
This affects applicatio…
GitHub-GHSA
MEDIUM
RedwoodSDK has Same-site CSRF through lack of origin validation in its server actions
GHSA-m2m6-cff5-3w7c
pkg: rwsdk
eco: npm
published: Apr 24, 2026
### Summary
Server actions in `rwsdk` apply HTTP method enforcement but no origin validation. A request originating from a different origin that the browser treats as same-site can invoke a server action with the victim's session cookie attached.
### Impact
An attacker who controls any origin the…
NVD
MEDIUM
CVE-2026-5488
The ExactMetrics – Google Analytics Dashboard for WordPress plugin for WordPress is vulnerable to Missing Authorization in versions up to and including 9.1.2. This is due to missing capability checks in the get_ads_access_token() and reset_experience() AJAX handlers. While the mi-admin-nonce is lo…
CWE: CWE-862
NVD
MEDIUM
CVE-2026-32952
go-ntlmssp is a Go package that provides NTLM/Negotiate authentication over HTTP. Prior to version 0.1.1, a malicious NTLM challenge message can causes an slice out of bounds panic, which can crash any Go process using `ntlmssp.Negotiator` as an HTTP transport. Version 0.1.1 patches the issue.
CWE: CWE-190
GitHub-GHSA
MEDIUM
OpenTelemetry dotnet: Excessive memory allocation when parsing OpenTelemetry propagation headers
GHSA-g94r-2vxg-569j
pkg: OpenTelemetry.Api, OpenTelemetry.Extensions.Propagators
eco: nuget
published: Apr 23, 2026
### Summary
The implementation details of the baggage, B3 and Jaeger processing code in the `OpenTelemetry.Api` and `OpenTelemetry.Extensions.Propagators` NuGet packages can allocate excessive memory when parsing which could create a potential denial of service (DoS) in the consuming application.
…
CVE-2026-40894
GitHub-GHSA
MEDIUM
OpenTelemetry dotnet: Unbounded `grpc-status-details-bin` parsing in OTLP/gRPC retry handling
GHSA-mr8r-92fq-pj8p
pkg: OpenTelemetry.Exporter.OpenTelemetryProtocol
eco: nuget
published: Apr 23, 2026
### Summary
When exporting telemetry over gRPC using the OpenTelemetry Protocol (OTLP), the exporter may parse a server-provided `grpc-status-details-bin` trailer during retry handling. Prior to the fix, a malformed trailer could encode an extremely large length-delimited protobuf field which was u…
CVE-2026-40891
GitHub-GHSA
MEDIUM
OpenTelemetry dotnet: OTLP exporter reads unbounded HTTP response bodies
GHSA-q834-8qmm-v933
pkg: OpenTelemetry.Exporter.OpenTelemetryProtocol
eco: nuget
published: Apr 23, 2026
### Summary
When exporting telemetry to a back-end/collector over gRPC or HTTP using OpenTelemetry Protocol format (OTLP), if the request results in a unsuccessful request (i.e. HTTP 4xx or 5xx), the response is read into memory with no upper-bound on the number of bytes consumed.
This could cause…
CVE-2026-40182
GitHub-GHSA
MEDIUM
go-ntlmssp NTLM challenges can panic on malformed payloads
GHSA-pjcq-xvwq-hhpj
pkg: github.com/Azure/go-ntlmssp
eco: go
published: Apr 23, 2026
A malicious NTLM challenge message can causes an slice out of bounds panic, which can crash any Go process using `ntlmssp.Negotiator` as an HTTP transport.
CVE-2026-32952
GitHub-GHSA
MEDIUM
Astro: Cache Poisoning due to incorrect error handling when if-match header is malformed
GHSA-c57f-mm3j-27q9
pkg: @astrojs/node
eco: npm
published: Apr 23, 2026
### Summary
Requesting a static JS/CSS resource from the `_astro` path with an incorrect or malformed `if-match` header returns a `500` error with a one-year cache lifetime instead of `412` in some cases. As a result, all subsequent requests to that file — regardless of the `if-match` header — w…
CVE-2026-41322
GitHub-GHSA
MEDIUM
n8n-MCP Logs Sensitive Request Data on Unauthorized /mcp Requests
GHSA-pfm2-2mhg-8wpx
pkg: n8n-mcp
eco: npm
published: Apr 23, 2026
### Impact
When `n8n-mcp` runs in HTTP transport mode, incoming requests to the `POST /mcp` endpoint had their request metadata written to server logs regardless of the authentication outcome. In deployments where logs are collected, forwarded to external systems, or viewable outside the request tr…
CVE-2026-41495
NVD
MEDIUM
CVE-2026-41182
LangSmith Client SDKs provide SDK's for interacting with the LangSmith platform. Prior to version 0.5.19 of the JavaScript SDK and version 0.7.31 of the Python SDK, the LangSmith SDK's output redaction controls (hideOutputs in JS, hide_outputs in Python) do not apply to streaming token events. When …
CWE: CWE-200, CWE-359, CWE-532
NVD
MEDIUM
CVE-2026-34064
nimiq-account contains account primitives to be used in Nimiq's Rust implementation. Prior to version 1.3.0, `VestingContract::can_change_balance` returns `AccountError::InsufficientFunds` when `new_balance < min_cap`, but it constructs the error using `balance: self.balance – min_cap`. `Coin::sub` …
CWE: CWE-191
NVD
MEDIUM
CVE-2026-34062
nimiq-libp2p is a Nimiq network implementation based on libp2p. Prior to version 1.3.0, `MessageCodec::read_request` and `read_response` call `read_to_end()` on inbound substreams, so a remote peer can send only a partial frame and keep the substream open. because `Behaviour::new` also sets `with_ma…
CWE: CWE-770
GitHub-GHSA
MEDIUM
Nuclei: Environment variable disclosure via Response-Derived DSL Expressions
GHSA-jm34-66cf-qpvr
pkg: github.com/projectdiscovery/nuclei/v3
eco: go
published: Apr 22, 2026
A vulnerability in Nuclei's expression evaluation engine makes it possible for a malicious target server to inject and execute supported DSL expressions. This happens when HTTP response data containing helper/function syntax gets reused by multi-step templates. If the `-env-vars` / `-ev` option is e…
CVE-2026-41645
GitHub-GHSA
MEDIUM
nimiq-blockchain: Peer-triggerable panic during history sync
GHSA-j99g-7rqw-q9jg
pkg: nimiq-blockchain
eco: rust
published: Apr 22, 2026
### Impact
`HistoryStore::put_historic_txns` uses an `assert!` to enforce invariants about `HistoricTransaction.block_number` (must be within the macro block being pushed and within the same epoch). During history sync, a peer can influence the `history: &[HistoricTransaction]` input passed into `Bl…
CVE-2026-34066
GitHub-GHSA
MEDIUM
nimiq-account: Vesting insufficient funds error can panic
GHSA-vc34-39q2-m6q3
pkg: nimiq-account
eco: rust
published: Apr 22, 2026
### Impact
`VestingContract::can_change_balance` returns `AccountError::InsufficientFunds` when `new_balance < min_cap`, but it constructs the error using `balance: self.balance – min_cap`. `Coin::sub` panics on underflow, so if an attacker can reach a state where `min_cap > balance`, the node crash…
CVE-2026-34064
NVD
MEDIUM
CVE-2026-22748
Vulnerability in Spring Spring Security. When an application configures JWT decoding with NimbusJwtDecoder or NimbusReactiveJwtDecoder, it must configure an OAuth2TokenValidator<Jwt> separately, for example by calling setJwtValidator.This issue affects Spring Security: from 6.3.0 through 6.3.…
CWE: CWE-20
NVD
MEDIUM
CVE-2026-34273
Vulnerability in Oracle GoldenGate (component: Libraries). Supported versions that are affected are 23.4-23.10. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle GoldenGate. Successful attacks of this vulnerability can result in una…
CWE: CWE-200
GitHub-GHSA
MEDIUM
Apache Kafka exposes sensitive information in its DEBUG logs
GHSA-wf66-mphr-4c4r
pkg: org.apache.kafka:kafka-clients, org.apache.kafka:kafka-clients
eco: maven
published: Apr 20, 2026
Information exposure vulnerability has been identified in Apache Kafka.
The NetworkClient component will output entire requests and responses information in the DEBUG log level in the logs. By default, the log level is set to INFO level. If the DEBUG level is enabled, the sensitive information will…
CVE-2026-33558
GitHub-GHSA
MEDIUM
Apache Doris MCP Server vulnerable to SQL Injection via improper query context neutralization
GHSA-qhfq-gvvc-5q6q
pkg: doris-mcp-server
eco: pip
published: Apr 20, 2026
Apache Doris MCP Server versions prior to 0.6.1 are affected by an improper neutralization flaw in query context handling that may allow execution of unintended SQL statements and bypass of intended query validation and access restrictions through the MCP query execution interface. Versions 0.6.1 an…
CVE-2025-66335
GitHub-GHSA
MEDIUM
Evolver has Prototype Pollution via `Object.assign()` in its mailbox store operations
GHSA-2cjr-5v3h-v2w4
pkg: @evomap/evolver
eco: npm
published: Apr 22, 2026
### Summary
A prototype pollution vulnerability in the mailbox store module allows attackers to modify the behavior of all JavaScript objects by injecting malicious properties into `Object.prototype`. The vulnerability exists in the `_applyUpdate()` and `_updateRecord()` functions which use `Object.…
GitHub-GHSA
MEDIUM
wlc: print_html outputs API data without HTML escaping
GHSA-gx2m-mcc2-r4p3
pkg: wlc
eco: pip
published: Apr 24, 2026
### Impact
The HTML output format in wlc embeds API response data into HTML without escaping, allowing cross-site scripting when the output is rendered in a browser.
### Patches
* https://github.com/WeblateOrg/wlc/pull/1327
### Workarounds
The only vulnerable code path is HTML output which is opt…
GitHub-GHSA
MEDIUM
OpenFGA has Improper Policy Enforcement
GHSA-57j5-qwp2-vqp6
pkg: github.com/openfga/openfga
eco: go
published: Apr 22, 2026
### Description
In OpenFGA, in specific scenarios, models using conditions with caching enabled can result in two different check requests producing the same cache key. This could result in OpenFGA reusing an earlier cached result for a subsequent request.
### Am I Affected?
Users are affected if t…
CVE-2026-41131
NVD
MEDIUM
CVE-2026-31955
Xibo is an open source digital signage platform with a web content management system and Windows display player software. An authenticated Server-Side Request Forgery (SSRF) vulnerability in versions prior to 4.4.1 allows users with DataSet permissions to make arbitrary HTTP requests from the CMS se…
CWE: CWE-918
NVD
MEDIUM
CVE-2026-42041
Axios is a promise based HTTP client for the browser and Node.js. Prior to 1.15.1 and 0.31.1, the Axios library is vulnerable to a Prototype Pollution "Gadget" attack that allows any Object.prototype pollution to silently suppress all HTTP error responses (401, 403, 500, etc.), causing them to be tr…
CWE: CWE-287, CWE-1321
GitHub-GHSA
MEDIUM
Spring Security Core has a TOCTOU race condition when One-Time Token login with JdbcOneTimeTokenService is configured
GHSA-x2wq-9x2f-fhj7
pkg: org.springframework.security:spring-security-core, org.springframework.security:spring-security-core, org.springframework.security:spring-security-core
eco: maven
published: Apr 21, 2026
Vulnerability in Spring Spring Security. Applications that explicitly configure One-Time Token login with JdbcOneTimeTokenService are vulnerable to a Time-of-check Time-of-use (TOCTOU) race condition. This issue affects Spring Security: from 6.4.0 through 6.4.15, from 6.5.0 through 6.5.9, from 7.…
CVE-2026-22751
NVD
MEDIUM
CVE-2026-40606
mitmproxy is a interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers and mitmweb is a web-based interface for mitmproxy. In mitmproxy 12.2.1 and below, the builtin LDAP proxy authentication does not correctly sanitize the username when querying the LDAP serv…
CWE: CWE-90
NVD
MEDIUM
CVE-2026-40594
pyLoad is a free and open-source download manager written in Python. Prior to 0.5.0b3.dev98, the set_session_cookie_secure before_request handler in src/pyload/webui/app/__init__.py reads the X-Forwarded-Proto header from any HTTP request without validating that the request originates from a trusted…
CWE: CWE-346
GitHub-GHSA
MEDIUM
AWS Encryption SDK for Python: Key commitment policy bypass via shared key cache
GHSA-v638-38fc-rhfv
pkg: aws-encryption-sdk, aws-encryption-sdk
eco: pip
published: Apr 24, 2026
## Summary
AWS Encryption SDK (ESDK) for Python is a client-side encryption library. An issue exists where, under certain circumstances, a specific cryptographic algorithm downgrade in the caching layer might allow an authenticated local threat actor to bypass key commitment policy enforcement via a…
CVE-2026-6550
GitHub-GHSA
MEDIUM
i18nextify has DOM XSS via javascript:/data: URL schemes in translated href/src attributes
GHSA-6457-mxpq-4fqq
pkg: i18nextify
eco: npm
published: Apr 22, 2026
### Summary
Versions of `i18nextify` prior to 4.0.8 substitute `{{key}}` interpolation tokens inside `src` and `href` attribute values with the raw string returned by `i18next.t()`. The substitution logic in `src/localize.js` (`replaceInside` handler around line 122) only guards against a duplicate…
NVD
MEDIUM
CVE-2026-6550
Cryptographic algorithm downgrade in the caching layer of Amazon AWS Encryption SDK for Python before version 3.3.1 and before version 4.0.5 might allow an authenticated local threat actor to bypass key commitment policy enforcement via a shared key cache, resulting in ciphertext that can be decryp…
CWE: CWE-757
GitHub-GHSA
MEDIUM
OpenC3 COSMOS is Vulnerable to Self-XSS Through the Command Sender
GHSA-ffq5-qpvf-xq7x
pkg: openc3
eco: rubygems
published: Apr 22, 2026
### Summary
The Command Sender UI uses an unsafe `eval()` function on array-like command parameters, which allows a user-supplied payload to execute in the browser when sending a command. This creates a self-XSS risk because an attacker can trigger their own script execution in the victim’s sessio…
GitHub-GHSA
MEDIUM
melange has Path Traversal via .PKGINFO in –persist-lint-results
GHSA-q2pw-xx38-p64j
pkg: chainguard.dev/melange
eco: go
published: Apr 23, 2026
### Impact
`melange lint –persist-lint-results` (opt-in flag, also usable via `melange build –persist-lint-results`) constructs output file paths by joining `–out-dir` with the `arch` and `pkgname` values read from the `.PKGINFO` control file of the APK being linted. In affected versions these v…
CVE-2026-29051
NVD
MEDIUM
CVE-2026-35366
The printenv utility in uutils coreutils fails to display environment variables containing invalid UTF-8 byte sequences. While POSIX permits arbitrary bytes in environment strings, the uutils implementation silently skips these entries rather than printing the raw bytes. This vulnerability allows ma…
CWE: CWE-754
NVD
MEDIUM
CVE-2026-35358
The cp utility in uutils coreutils, when performing recursive copies (-R), incorrectly treats character and block device nodes as stream sources rather than preserving them. Because the implementation reads bytes into regular files at the destination instead of using mknod, device semantics are dest…
CWE: CWE-706
NVD
MEDIUM
CVE-2026-41330
OpenClaw before 2026.3.31 contains an environment variable override vulnerability in host exec policy that fails to properly enforce proxy, TLS, Docker, and Git TLS controls. Attackers can bypass security controls by overriding environment variables to circumvent proxy settings, TLS verification, Do…
CWE: CWE-453
NVD
MEDIUM
CVE-2026-7086
A vulnerability was identified in HBAI-Ltd Toonflow-app up to 1.1.1. This issue affects the function updateStoryboardUrl of the file replaceUrl.ts of the component Storyboard Export. Such manipulation of the argument url leads to path traversal. It is possible to launch the attack remotely. The expl…
CWE: CWE-22
NVD
MEDIUM
CVE-2026-33566
There is a cypher injection issue in LogonTracer prior to v2.0.0. If specially crafted Windows event log data is loaded, the contents of the database may be altered.
CWE: CWE-943
GitHub-GHSA
MEDIUM
n8n-MCP: Sensitive MCP tool-call arguments logged on authenticated requests in HTTP mode
GHSA-wg4g-395p-mqv3
pkg: n8n-mcp
eco: npm
published: Apr 25, 2026
### Impact
When `n8n-mcp` runs in HTTP transport mode, authenticated MCP `tools/call` requests had their full arguments and JSON-RPC params written to server logs by the request dispatcher and several sibling code paths before any redaction. When a tool call carries credential material — most not…
NVD
MEDIUM
CVE-2026-40690
The asset dependency graph did not restrict nodes by the viewer's DAG read permissions: a user with read access to at least one DAG could browse the asset graph for any other asset in the deployment and learn the existence and names of DAGs and assets outside their authorized scope.
Users are recom…
CWE: CWE-1220
NVD
MEDIUM
CVE-2026-31956
Xibo is an open source digital signage platform with a web content management system and Windows display player software. Prior to version 4.4.1, any authenticated user can manually construct a URL to preview campaigns/regions, and export saved reports belonging to other users. Exploitation of the v…
CWE: CWE-639
GitHub-GHSA
MEDIUM
OpenC3 COSMOS allows arbitrary writes to plugins directory via path-traversed config filenames
GHSA-4jvx-93h3-f45h
pkg: openc3, openc3
eco: rubygems
published: Apr 22, 2026
### Summary
OpenC3 COSMOS contains a design flaw in the `save_tool_config()` function that allows saving tool configuration files at arbitrary locations inside the shared `/plugins` directory tree by supplying crafted configuration filenames. Although the implementation sufficiently mitigates standa…
NVD
MEDIUM
CVE-2026-6294
The Google PageRank Display plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to and including 1.4. This is due to missing nonce validation in the gpdisplay_option() function, which handles the plugin settings page. The settings form does not include a wp_nonce_field(),…
CWE: CWE-352
NVD
MEDIUM
CVE-2026-0971
An improper session timeout issue in Fortra's GoAnywhere MFT prior to version 7.10.0 results in SAML configured Web Users being redirected to the regular login page instead of the SAML login page.
CWE: CWE-613
NVD
MEDIUM
CVE-2026-41285
In OpenBSD through 7.8, the slaacd and rad daemons have an infinite loop when they receive a crafted ICMPv6 Neighbor Discovery (ND) option (over a local network) with length zero, because of an "nd_opt_len * 8 – 2" expression with no preceding check for whether nd_opt_len is zero.
CWE: CWE-1284, CWE-835
GitHub-GHSA
MEDIUM
OpenClaw: Agent gateway config mutations could change protected operator settings
GHSA-7jm2-g593-4qrc
pkg: openclaw
eco: npm
published: Apr 25, 2026
## Affected Packages / Versions
– Package: `openclaw` (npm)
– Affected versions: `< 2026.4.20`
– Patched version: `2026.4.20`
## Impact
The agent-facing `gateway config.patch` / `config.apply` guard did not cover several operator-trusted settings, including sandbox policy, plugin enablement, gate…
GitHub-GHSA
MEDIUM
OpenClaw: Bundled MCP/LSP tools could bypass configured tool policy
GHSA-qrp5-gfw2-gxv4
pkg: openclaw
eco: npm
published: Apr 25, 2026
## Affected Packages / Versions
– Package: `openclaw` (npm)
– Affected versions: `< 2026.4.20`
– Patched version: `2026.4.20`
## Impact
Bundled MCP and LSP tools could be appended to the agent's effective tool set after the normal tool-policy pipeline had already filtered core tools. If an operat…
GitHub-GHSA
MEDIUM
OpenClaw: Workspace dotenv MiniMax host override could redirect credentialed requests
GHSA-h2vw-ph2c-jvwf
pkg: openclaw
eco: npm
published: Apr 25, 2026
## Affected Packages / Versions
– Package: `openclaw` (npm)
– Affected versions: `>= 2026.4.5, < 2026.4.20`
– Patched version: `2026.4.20`
## Impact
A malicious workspace `.env` could set `MINIMAX_API_HOST` and redirect credentialed MiniMax requests to an attacker-controlled origin, exposing the …
GitHub-GHSA
MEDIUM
OpenClaw: MCP stdio server env could load dangerous startup variables from workspace config
GHSA-mj59-h3q9-ghfh
pkg: openclaw
eco: npm
published: Apr 25, 2026
## Affected Packages / Versions
– Package: `openclaw` (npm)
– Affected versions: `< 2026.4.20`
– Patched version: `2026.4.20`
## Impact
Workspace MCP stdio configuration could pass dangerous process-startup environment variables such as `NODE_OPTIONS`, `LD_PRELOAD`, or `BASH_ENV` to the spawned M…
GitHub-GHSA
MEDIUM
OpenClaw: Workspace dotenv could override runtime-control environment variables
GHSA-hxvm-xjvf-93f3
pkg: openclaw
eco: npm
published: Apr 25, 2026
## Affected Packages / Versions
– Package: `openclaw` (npm)
– Affected versions: `< 2026.4.20`
– Patched version: `2026.4.20`
## Impact
Workspace `.env` loading did not reserve the `OPENCLAW_` runtime-control namespace broadly enough. A malicious workspace could set variables such as `OPENCLAW_GI…
GitHub-GHSA
MEDIUM
OpenClaw: Feishu card actions could misclassify DMs and skip dmPolicy
GHSA-72q8-jcmc-97wx
pkg: openclaw
eco: npm
published: Apr 25, 2026
## Affected Packages / Versions
– Package: `openclaw` (npm)
– Affected versions: `< 2026.4.20`
– Patched version: `2026.4.20`
## Impact
Feishu card-action callbacks could synthesize a message event with DM conversations classified as group conversations. That skipped `dmPolicy` enforcement for ca…
GitHub-GHSA
MEDIUM
OpenClaw: Hook mapping templates could bypass hook session-key opt-in
GHSA-2xcp-x87w-q377
pkg: openclaw
eco: npm
published: Apr 25, 2026
## Affected Packages / Versions
– Package: `openclaw` (npm)
– Affected versions: `< 2026.4.20`
– Patched version: `2026.4.20`
## Impact
Templated hook mapping `sessionKey` values were treated differently from request-supplied session keys. A hook mapping could render an externally influenced sess…
GitHub-GHSA
MEDIUM
gitverify has improper tag signature verification
GHSA-h829-5cg7-6hff
pkg: github.com/supply-chain-tools/gitverify
eco: go
published: Apr 24, 2026
gitverify is still a prototype.
### Impact
The bug is related to `requireSignedTags` which is on by default: an unsigned annotated tag would pass the verification. The commit pointed to by the tag would still have to be signed by a maintainer or a contributor.
### Patches
Since the initial commit,…
GitHub-GHSA
MEDIUM
Excalidraw vulnerable to XSS via Mermaid sequence diagram labels (KaTeX rendering)
GHSA-39h7-pwv7-rc3x
pkg: @excalidraw/excalidraw, @excalidraw/mermaid-to-excalidraw
eco: npm
published: Apr 24, 2026
### Impact
`@excalidraw/excalidraw@0.18.0` depends on a Mermaid conversion package version that resolves to a Mermaid release affected by CVE-2025-54881 / GHSA-7rqq-prvp-x9jh. User-supplied Mermaid sequence diagram labels could trigger XSS through Mermaid’s KaTeX label rendering path.
This is pa…
GitHub-GHSA
MEDIUM
Traefik: A timing side-channel vulnerability allows for valid username enumeration via BasicAuth middleware
GHSA-6x2q-h3cr-8j2h
pkg: github.com/traefik/traefik/v3, github.com/traefik/traefik/v3, github.com/traefik/traefik/v2
eco: go
published: Apr 24, 2026
## Summary
There is a timing side-channel vulnerability in Traefik's BasicAuth middleware that allows an attacker to enumerate valid usernames through response-time differences.
The variable intended to hold a constant-time fallback secret always resolves to an empty string, causing the constant-t…
CVE-2026-41263
GitHub-GHSA
MEDIUM
Traefik Kubernetes CRD allows unauthorized cross-namespace middleware binding
GHSA-xhjw-95fp-8vgq
pkg: github.com/traefik/traefik/v3, github.com/traefik/traefik/v3, github.com/traefik/traefik/v2
eco: go
published: Apr 24, 2026
## Summary
There is a vulnerability in Traefik's Kubernetes CRD provider cross-namespace isolation enforcement.
When `providers.kubernetesCRD.allowCrossNamespace=false`, Traefik correctly rejects direct cross-namespace middleware references from `IngressRoute` objects, but fails to apply the same …
CVE-2026-41174
GitHub-GHSA
MEDIUM
justhtml has sanitization bypass in custom policies and programmatic DOM
GHSA-vrx2-77f2-ww34
pkg: justhtml
eco: pip
published: Apr 22, 2026
## Summary
`justhtml` `1.17.0` fixes multiple security issues in sanitization, serialization, and programmatic DOM handling.
Most of these issues affected advanced or custom configurations rather than the default safe path.
## Affected versions
– `justhtml` `<= 1.16.0`
## Fixed version
– `just…
GitHub-GHSA
MEDIUM
uuid: Missing buffer bounds check in v3/v5/v6 when buf is provided
GHSA-w5hq-g745-h8pq
pkg: uuid
eco: npm
published: Apr 22, 2026
### Summary
`v3`, `v5`, and `v6` accept external output buffers but do not reject out-of-range writes (small `buf` or large `offset`).
By contrast, `v4`, `v1`, and `v7` explicitly throw `RangeError` on invalid bounds.
This inconsistency allows **silent partial writes** into caller-provided buffe…
GitHub-GHSA
MEDIUM
Gitea has insecure default SSH settings
GHSA-3m6q-h5gj-7mrw
pkg: code.gitea.io/gitea
eco: go
published: Apr 22, 2026
## Summary
The built-in SSH server currently advertises a number of key exchange, MAC, and host key algorithms that are considered weak or broken. The defaults should be tightened so a fresh installation passes a baseline SSH security audit out of the box.
## Details
Running `ssh-audit` against a…
GitHub-GHSA
MEDIUM
free5GC AMF: Missing default case in Content-Type switch in HTTPUEContextTransfer
GHSA-r99v-75p9-xqm5
pkg: github.com/free5gc/amf
eco: go
published: Apr 22, 2026
## Summary
The `HTTPUEContextTransfer` handler in `internal/sbi/api_communication.go` does not include a `default` case in the `Content-Type` switch statement. When a request arrives with an unsupported `Content-Type`, the deserialization step is silently skipped, `err` remains `nil`, and the proce…
CVE-2026-41136
GitHub-GHSA
MEDIUM
Inspektor Gadget uses unsanitized ANSI Escape Sequences In `columns` Output Mode
GHSA-34r5-6j7w-235f
pkg: github.com/inspektor-gadget/inspektor-gadget
eco: go
published: Apr 22, 2026
### Description
String fields from eBPF events in `columns` output mode are rendered to the terminal without any sanitization of control characters or ANSI escape sequences.
Therefore, a maliciously forged – partially or completely – event payload, coming from an observed container, might inj…
CVE-2026-25996
GitHub-GHSA
MEDIUM
Inspektor Gadget: Command Injection via malicious buildOptions manipulation
GHSA-79qw-g77v-2vfh
pkg: github.com/inspektor-gadget/inspektor-gadget
eco: go
published: Apr 22, 2026
### Impacted Resources
`inspektor-gadget/cmd/common/image/build.go`
`inspektor-gadget/cmd/common/image/helpers/Makefile.build`
### Description
The `ig` binary provides a subcommand for image building, used to generate custom gadget OCI images.
A part of this functionality is implemented in the f…
CVE-2026-24905
GitHub-GHSA
MEDIUM
DOMPurify: FORBID_TAGS bypassed by function-based ADD_TAGS predicate (asymmetry with FORBID_ATTR fix)
GHSA-h7mw-gpvr-xq4m
pkg: dompurify
eco: npm
published: Apr 22, 2026
There is an inconsistency between FORBID_TAGS and FORBID_ATTR handling when function-based ADD_TAGS is used.
Commit [c361baa](https://github.com/cure53/DOMPurify/commit/c361baa18dbdcb3344a41110f4c48ad85bf48f80) added an early exit for FORBID_ATTR at line 1214:
/* FORBID_ATTR must always win, e…
CVE-2026-41240
GitHub-GHSA
MEDIUM
actix-http has HTTP/1.1 CL.TE Request Smuggling
GHSA-xhj4-vrgc-hr34
pkg: actix-http
eco: rust
published: Apr 22, 2026
A vulnerability in `actix-http`'s HTTP/1.1 request parser allows an unauthenticated remote client to smuggle requests in deployments where a front-end HTTP intermediary and the Actix backend disagree about whether `Content-Length` or `Transfer-Encoding: chunked` defines the request body length.
## …
GitHub-GHSA
MEDIUM
OpenBao's SQL Injection in PostgreSQL database secrets engine
GHSA-6vgr-cp5c-ffx3
pkg: github.com/openbao/openbao
eco: go
published: Apr 21, 2026
### Impact
When OpenBao revoked privileges on a role in the PostgreSQL database secrets engine, OpenBao failed to use proper database quoting on schema names provided by PostgreSQL. This could lead to role revocation failures, or more rarely, SQL injection as the management user.
This vulnerabilit…
CVE-2026-39946
GitHub-GHSA
MEDIUM
pip has an interpretation conflict due to handling both concatenated tar and ZIP files as ZIP files
GHSA-58qw-9mgm-455v
pkg: pip
eco: pip
published: Apr 20, 2026
pip handles concatenated tar and ZIP files as ZIP files regardless of filename or whether a file is both a tar and ZIP file. This behavior could result in confusing installation behavior, such as installing "incorrect" files according to the filename of the archive. New behavior only proceeds with i…
CVE-2026-3219