Skip to content
Threat Feed

Briefs

April 2026 (30)

critical advisory

WordPress Create DB Tables Plugin Authorization Bypass Vulnerability (CVE-2026-4119)

The Create DB Tables plugin for WordPress versions 1.2.1 and earlier is vulnerable to an authorization bypass, allowing authenticated users to create and delete database tables without proper checks, potentially leading to complete site destruction.

wordpress authorization-bypass plugin-vulnerability cve-2026-4119
2r 3t 1c
high advisory

Binutils XCOFF Heap-Based Buffer Overflow Vulnerability (CVE-2026-6846)

A heap-buffer-overflow vulnerability exists in binutils when processing a specially crafted XCOFF object file, potentially leading to arbitrary code execution or denial of service.

binutils heap-buffer-overflow CVE-2026-6846 xcoff
2r 4t 1c 1i
critical advisory

WordPress HTTP Headers Plugin Remote Code Execution via File Path Manipulation (CVE-2026-4132)

The HTTP Headers WordPress plugin is vulnerable to remote code execution (RCE) due to insufficient validation of the htpasswd file path and lack of sanitization of the username, allowing authenticated administrators to write arbitrary code to the server.

wordpress rce plugin cve-2026-4132
2r 1t 1c
critical advisory

Insecure Deserialization Vulnerability in Telerik UI for AJAX RadFilter Control (CVE-2026-6023)

An insecure deserialization vulnerability exists in Progress Telerik UI for AJAX's RadFilter control (versions 2024.4.1114 through 2026.1.421) allowing remote code execution via tampering with the filter state exposed to the client.

cve-2026-6023 telerik deserialization rce webserver
2r 1t 1c
high advisory

Telerik UI for AJAX RadAsyncUpload Uncontrolled Resource Consumption (CVE-2026-6022)

A vulnerability exists in Progress Telerik UI for AJAX prior to 2026.1.421, RadAsyncUpload, due to missing cumulative size enforcement during chunk reassembly, which allows file uploads to exceed the configured maximum size, leading to disk space exhaustion.

cve-2026-6022 telerik resource-exhaustion
2r 1t 1c
medium advisory

util-linux Vulnerability Allows DoS and Information Disclosure

A local attacker can exploit a vulnerability in util-linux to perform a denial of service attack and disclose sensitive information.

util-linux denial-of-service information-disclosure linux
2r 2t
medium advisory

BigBlueButton Vulnerabilities Allow Data Manipulation and Redirects

Multiple vulnerabilities in BigBlueButton can be exploited by an attacker to manipulate data and redirect users to attacker-controlled domains.

bigbluebutton vulnerability datamanipulation redirect
2r 1t
high advisory

Multiple Vulnerabilities in OpenBao Allow for Security Bypass, DoS, and SQL Injection

Multiple vulnerabilities in OpenBao can be exploited by an attacker to bypass security measures, conduct a denial of service attack, and conduct a SQL injection attack.

openbao vulnerability sql-injection dos
3r 3t
high advisory

pyLoad Privilege Escalation Vulnerability (CVE-2026-41133)

pyLoad versions up to 0.5.0b3.dev97 cache user roles and permissions in the session, leading to privilege escalation even after an admin revokes privileges.

pyLoad privilege-escalation CVE-2026-41133
2r 1t 1c
critical advisory

WWBN AVideo Unauthenticated Remote Code Execution via test.php

WWBN AVideo versions up to 29.0 contain an OS Command Injection vulnerability (CVE-2026-41064) in the `test.php` file, allowing unauthenticated remote code execution due to insufficient input sanitization, especially affecting `file_get_contents` and `curl` code paths.

cve-2026-41064 avideo rce command-injection
2r 2t 1c 1i
medium advisory

Oracle VirtualBox Unauthenticated RDP Denial-of-Service Vulnerability (CVE-2026-35245)

An unauthenticated attacker with network access via RDP can exploit CVE-2026-35245 in Oracle VM VirtualBox version 7.2.6 to cause a denial-of-service (DOS) condition.

virtualbox rdp dos cve-2026-35245
2r 1t 1c
high advisory

Oracle VM VirtualBox CVE-2026-35246 Vulnerability

CVE-2026-35246 is a vulnerability in Oracle VM VirtualBox version 7.2.6, where a high-privileged attacker with local access can exploit it to compromise the application potentially leading to a complete takeover.

cve-2026-35246 virtualbox vulnerability
2r 1c
critical advisory

Esri Portal for ArcGIS Incorrect Authorization Vulnerability (CVE-2026-33519)

CVE-2026-33519 is a critical vulnerability in Esri Portal for ArcGIS 11.4, 11.5, and 12.0, where incorrect authorization checks on developer credentials can lead to unauthorized privilege escalation on Windows, Linux, and Kubernetes deployments.

esri arcgis privilege-escalation incorrect-authorization cve-2026-33519 webserver
2r 1t 1c
critical advisory

Crafty Controller Users API Insecure Direct Object Reference Vulnerability

Crafty Controller's Users API component contains an insecure direct object reference vulnerability, allowing a remote, authenticated attacker to perform unauthorized user modification actions due to improper API permissions validation (CVE-2026-5652).

idor privilege-escalation cve-2026-5652
2r 1t 1c 1i
high advisory

NVIDIA CUDA-Q Out-of-Bounds Read Vulnerability (CVE-2026-24189)

NVIDIA CUDA-Q is vulnerable to an out-of-bounds read via a maliciously crafted request to an endpoint, potentially leading to denial of service and information disclosure as tracked by CVE-2026-24189.

cve-2026-24189 out-of-bounds read nvidia
2r 2t 1i
high advisory

OpenMage LTS Phar Deserialization RCE

A remote code execution vulnerability exists in OpenMage LTS versions prior to 20.16.1 due to Phar deserialization, where an attacker can upload a malicious phar file disguised as an image and trigger deserialization via functions like `getimagesize()`, `file_exists()`, or `is_readable()` when processing `phar://` stream wrapper paths, leading to arbitrary code execution.

phar deserialization remote code execution OpenMage LTS Magento 1.x
2r 2t
high advisory

CVE-2026-32223 Windows USB Printing Stack Elevation of Privilege Vulnerability

CVE-2026-32223 is an elevation of privilege vulnerability affecting the Windows USB Printing Stack (usbprint.sys), potentially allowing a local attacker to gain elevated privileges on a vulnerable system.

cve-2026-32223 elevation-of-privilege windows
2r 1t 1c
high advisory

FreePBX API Module Command Injection Vulnerability (CVE-2026-40520)

FreePBX api module version 17.0.8 and prior contain a command injection vulnerability in the initiateGqlAPIProcess() function, allowing authenticated users to execute arbitrary commands via crafted GraphQL mutations.

command-injection freepbx graphql cve-2026-40520
2r 1t 1c
critical threat

Cisco Catalyst SD-WAN Manager Incorrect Use of Privileged APIs Vulnerability

Cisco Catalyst SD-WAN Manager contains an incorrect use of privileged APIs vulnerability due to improper file handling on the API interface, allowing an attacker to upload a malicious file and overwrite arbitrary files to gain vmanage user privileges.

exploited Catalyst SD-WAN Manger cve-2026-20122 privilege-escalation sd-wan
2r 2t 1c
medium advisory

Cisco Catalyst SD-WAN Manager Password Disclosure Vulnerability (CVE-2026-20128)

Cisco Catalyst SD-WAN Manager stores passwords in a recoverable format, allowing an authenticated local attacker to gain DCA user privileges by accessing a credential file.

Catalyst SD-WAN Manager cve-2026-20128 credential-access sd-wan cisco
2r 1t 1c
medium advisory

ConnectWise Automate Solution Center Cleartext Communication Vulnerability (CVE-2026-6066)

ConnectWise Automate is vulnerable to CVE-2026-6066, a cleartext transmission of sensitive information vulnerability, where certain client-to-server communications could occur without transport-layer encryption, potentially allowing network-based interception of Solution Center traffic, and the issue is resolved in Automate 2026.4 by enforcing secure communication.

cve-2026-6066 connectwise cleartext rmm
2r 1t 1c 1i
critical advisory

Vvveb CMS 1.0.8 Remote Code Execution via Malicious Upload

Vvveb CMS 1.0.8 is vulnerable to remote code execution, allowing authenticated attackers to upload a PHP webshell with a .phtml extension, bypass extension restrictions, and execute arbitrary operating system commands by requesting the uploaded file.

cve-2026-6249 rce web-application
2r 1t 1c
high advisory

Notepad++ Updater (gup.exe) Creates Uncommon Files

The Notepad++ updater (gup.exe) creating files in suspicious locations can indicate potential exploitation for malware delivery or unwarranted file placement, potentially leading to credential access and collection.

supply-chain malware notepad++
2r 3t
high advisory

MetaSlider Responsive Slider Plugin Deserialization Vulnerability (CVE-2026-39467)

A deserialization of untrusted data vulnerability in the MetaSlider Responsive Slider plugin for WordPress (versions up to 3.106.0) allows for unauthenticated object injection, potentially leading to remote code execution.

wordpress object-injection deserialization cve-2026-39467
2r 1t 1c
high advisory

Bad Apples: Weaponizing Native macOS Primitives for Lateral Movement and Execution

Adversaries are increasingly targeting macOS environments, leveraging native tools like Remote Application Scripting (RAS) and Spotlight metadata to bypass security controls for remote code execution and lateral movement.

macos lotl lateral-movement execution
2r 2t
high advisory

Multiple Vulnerabilities in Fortinet FortiSandbox

Multiple vulnerabilities in Fortinet FortiSandbox allow attackers to perform cross-site scripting attacks, disclose information, bypass security measures, and execute arbitrary code, potentially leading to system compromise.

fortinet fortisandbox vulnerability xss code-execution
3r 3t
critical advisory

Multiple Vulnerabilities in Red Hat Hardened Images RPMs

Remote, anonymous attackers can exploit vulnerabilities in Red Hat Hardened Images RPMs to bypass security measures, cause denial of service, disclose sensitive information, or potentially execute code.

redhat vulnerability denial-of-service information-disclosure code-execution linux
2r 7t
critical advisory

GIMP Multiple Vulnerabilities Allow Code Execution

A remote, anonymous attacker can exploit multiple vulnerabilities in GIMP to execute arbitrary program code, potentially leading to system compromise.

gimp code-execution vulnerability
2r 1t
critical advisory

Cisco Catalyst SD-WAN Manager Multiple Vulnerabilities

Multiple vulnerabilities in Cisco Catalyst SD-WAN Manager allow a remote, anonymous, or local attacker to gain administrator privileges, bypass authentication, execute commands with Netadmin rights, read sensitive system information, and overwrite arbitrary files.

cisco sdwan vulnerability privilege-escalation
2r 4t
critical advisory

Libarchive Code Execution Vulnerability

A remote attacker can exploit a vulnerability in libarchive to achieve arbitrary code execution on a vulnerable system.

libarchive code-execution vulnerability
2r 1t