Skip to content
Threat Feed

April 2026 (30)

high advisory

@sveltejs/adapter-node BODY_SIZE_LIMIT Bypass Vulnerability

A vulnerability exists in @sveltejs/adapter-node where requests could bypass the `BODY_SIZE_LIMIT` on SvelteKit applications, potentially leading to denial of service.

sveltekit denial-of-service vulnerability
2r 1t 1c
low advisory

AWS S3 Rapid Bucket Posture API Calls Indicate Reconnaissance

An AWS principal rapidly enumerates S3 bucket configurations using read-only APIs, potentially indicating reconnaissance activity by security scanners, CSPM tools, or malicious actors performing post-compromise enumeration.

cloud aws s3 reconnaissance
2r 4t
high advisory

BugSink Authenticated File Write Vulnerability (CVE-2026-40162)

BugSink 2.1.0 is vulnerable to an authenticated file write vulnerability (CVE-2026-40162) allowing an attacker with a valid authentication token to write arbitrary content to the filesystem, potentially leading to code execution or data compromise.

cve-2026-40162 file-write authentication
2r 1t 1c
high advisory

CactusThemes VideoPro Theme Local File Inclusion Vulnerability (CVE-2025-58913)

CVE-2025-58913 is a PHP Local File Inclusion vulnerability in the CactusThemes VideoPro WordPress theme, affecting versions from n/a through 2.3.8.1 due to improper control of the filename for include/require statements, potentially allowing unauthorized file access.

wordpress lfi cve-2025-58913
2r 1t 1c
high advisory

Case Theme User WordPress Plugin Local File Inclusion Vulnerability (CVE-2025-5804)

CVE-2025-5804 is a PHP Local File Inclusion vulnerability in the Case Theme User WordPress plugin before version 1.0.4 due to improper filename control in include/require statements, potentially allowing attackers to execute arbitrary code by including malicious local files.

php lfi wordpress cve-2025-5804
2r 1t 1c
high advisory

Chamilo LMS Path Traversal Vulnerability (CVE-2026-31939)

A path traversal vulnerability (CVE-2026-31939) in Chamilo LMS versions prior to 1.11.38 allows authenticated attackers to delete arbitrary files via unsanitized user input in the 'test' parameter of savescores.php.

path-traversal file-deletion chamilo-lms
2r 1t 1c
high advisory

Chamilo LMS Privilege Escalation via REST API (CVE-2026-33706)

Chamilo LMS before 1.11.38 allows authenticated users with a REST API key to escalate their privileges by modifying their user status via the update_user_from_username endpoint, potentially granting unauthorized course management capabilities.

privilege-escalation web-application CVE-2026-33706
2r 1t 1c
high advisory

Chamilo LMS REST API Key Brute-Force Vulnerability (CVE-2026-33710)

Chamilo LMS versions prior to 1.11.38 and 2.0.0-RC.3 generate predictable REST API keys, allowing attackers with knowledge of a username and approximate key creation time to brute-force access.

cve-2026-33710 chamilo api-key brute-force webserver
2r 1t 1c
high advisory

Chamilo LMS SSRF Vulnerability in Social Wall Feature

A Server-Side Request Forgery (SSRF) vulnerability exists in Chamilo LMS versions prior to 1.11.38 and 2.0.0-RC.3, allowing authenticated attackers to make arbitrary HTTP requests, scan internal ports, and access cloud instance metadata via the Social Wall feature.

chamilo ssrf cve-2026-31941 lms
2r 1t 1c
critical advisory

Chamilo LMS Unauthenticated Remote Code Execution via Configuration Injection (CVE-2026-33618)

Chamilo LMS versions prior to 2.0.0-RC.3 are vulnerable to remote code execution (RCE) via eval injection, where an authenticated administrator can inject arbitrary PHP code into platform settings that is then executed when any user (including unauthenticated) requests the /platform-config/list endpoint.

chamilo rce eval-injection cve-2026-33618
2r 1t 1c
critical advisory

Chamilo LMS Weak Password Reset Vulnerability (CVE-2026-33707)

Chamilo LMS versions prior to 1.11.38 and 2.0.0-RC.3 are vulnerable to a weak password reset mechanism, allowing attackers to compute password reset tokens using only a user's email address due to the use of SHA1 hashing without randomization, expiration, or rate limiting, leading to unauthorized account takeover.

CVE-2026-33707 chamilo lms password-reset credential-access
2r 1t 1c
high advisory

CouchCMS Privilege Escalation via f_k_levels_list Parameter Manipulation (CVE-2026-29002)

CouchCMS is vulnerable to privilege escalation, allowing authenticated Admin-level users to create SuperAdmin accounts by manipulating the 'f_k_levels_list' parameter during user creation, granting them full application control.

privilege-escalation web-application cve
2r 1t 1c
high advisory

DotNetNuke.Core Stored XSS via SVG Upload

DotNetNuke.Core is vulnerable to stored cross-site scripting (XSS) where a user can upload a specially crafted SVG file containing malicious scripts, potentially targeting both authenticated and unauthenticated DNN users, with successful exploitation requiring user interaction and leading to high impact on confidentiality, integrity, and availability.

dotnetnuke xss svg web-application
2r 2t
critical advisory

Elastic Defend Alert from Package Manager Install Ancestry

This rule detects Elastic Defend alerts where the alerted process has a package-manager install context in its ancestry (npm, PyPI, Rust), indicating potential supply chain compromise via malicious postinstall scripts.

supply-chain initial-access package-manager elastic-defend post-install
3r 1t
high advisory

Helm Plugin Path Traversal Vulnerability

A path traversal vulnerability in Helm versions 4.0.0 to 4.1.3 allows a malicious plugin to write files to arbitrary locations on the filesystem, leading to potential system compromise.

helm path-traversal vulnerability plugin kubernetes
2r 1t 1c
critical advisory

LiteLLM Remote Code Execution via Bytecode Rewriting (CVE-2026-40217)

LiteLLM through 2026-04-08 allows remote attackers to execute arbitrary code via bytecode rewriting at the /guardrails/test_custom_code URI, potentially leading to complete system compromise.

CVE-2026-40217 litellm rce bytecode-rewriting
2r 1t 1c
high advisory

Math.js Improperly Controlled Modification of Object Attributes Leads to RCE

A vulnerability in math.js versions before 15.2.0 allows for arbitrary JavaScript execution through the expression parser when evaluating user-supplied expressions.

mathjs rce expression-injection
2r 1t
critical advisory

Multiple Rare Elastic Defend Behavior Rules Triggered on Single Host

This rule identifies hosts triggering multiple distinct, globally rare Elastic Defend behavior rules, increasing the likelihood of detecting compromised hosts while reducing false positives.

threat-detection higher-order-rule elastic-defend
2r 8t
critical advisory

wpForo Forum Plugin Arbitrary File Deletion Vulnerability (CVE-2026-5809)

The wpForo Forum plugin for WordPress is vulnerable to arbitrary file deletion due to a logic flaw that allows authenticated users to delete arbitrary files writable by the PHP process by manipulating post metadata.

wordpress file-deletion plugin CVE-2026-5809
2r 1t 1c
critical advisory

BuddyPress Groupblog Plugin Privilege Escalation Vulnerability (CVE-2026-5144)

The BuddyPress Groupblog plugin for WordPress is vulnerable to privilege escalation (CVE-2026-5144), allowing a low-privileged user to gain administrator access on a WordPress Multisite network by manipulating group blog settings.

wordpress buddypress privilege-escalation cve-2026-5144 cloud
2r 1t 1c
high advisory

Chartbrew Cross-Tenant Authorization Bypass Vulnerability

Chartbrew versions prior to 4.9.0 are vulnerable to a cross-tenant authorization bypass, allowing an authenticated attacker to access project data belonging to other teams.

chartbrew authorization-bypass web-application
2r 1t 1c
critical advisory

Goshs File-Based ACL Authorization Bypass Vulnerability

Goshs is vulnerable to an authorization bypass (CVE-2026-40189) due to inconsistent enforcement of .goshs ACLs on state-changing routes, allowing an unauthenticated attacker to manipulate files within protected directories and bypass authentication barriers.

authorization bypass acl file upload file deletion CVE-2026-40189
3r 4t 4i
critical advisory

PraisonAI Remote Code Execution via Malicious Workflow YAML

PraisonAI is vulnerable to remote code execution; loading untrusted YAML files with `type: job` can lead to arbitrary host command execution, potentially enabling full system compromise.

praisonai rce yaml
2r 1t 2i
critical advisory

PraisonAI UI Hardcoded Approval Mode Leads to Remote Code Execution

A vulnerability in PraisonAI allows authenticated users to execute arbitrary shell commands due to a hardcoded approval setting in the Chainlit UI modules, overriding administrator configurations and bypassing intended approval gates; insufficient command sanitization allows for destructive command execution, leading to confidentiality breach, integrity compromise, and availability impact on the server.

rce command-injection praisonai
2r 3t
critical advisory

LXD Backup Import Bypass Allows Privilege Escalation in Restricted Projects

A vulnerability in LXD allows an attacker with instance-creation rights in a restricted project to bypass project restrictions and escalate privileges by crafting a malicious backup archive.

lxd privilege-escalation container-escape cve-2026-34178
2r 1t
high advisory

Chamilo LMS Insecure Direct Object Reference Vulnerability (CVE-2026-32930)

An Insecure Direct Object Reference (IDOR) vulnerability in Chamilo LMS (CVE-2026-32930) allows authenticated teachers to modify gradebook evaluation settings of other courses by manipulating the 'editeval' GET parameter, leading to unauthorized data modification.

idor chamilo lms cve-2026-32930
2r 2t 1c
medium advisory

Entra ID ADRS Token Request by Microsoft Authentication Broker

Detects suspicious OAuth 2.0 token requests where the Microsoft Authentication Broker requests access to the Device Registration Service on behalf of a user principal, potentially indicating an attempt to abuse device registration for unauthorized persistence.

azure entra_id persistence oauth
2r 2t 1i
high advisory

OpenClaw Insufficient Access Control in Gateway Agent Session Reset (CVE-2026-35660)

OpenClaw before 2026.3.23 contains an insufficient access control vulnerability in the Gateway agent /reset endpoint that allows callers with operator.write permission to reset admin sessions by invoking /reset or /new messages with an explicit sessionKey, bypassing operator.admin requirements.

cve-2026-35660 openclaw access-control privilege-escalation
2r 1t 1c
medium advisory

GitHub Exfiltration via High Number of Repository Clones

A single user rapidly cloning a high number of GitHub repositories indicates potential exfiltration of sensitive data such as proprietary code, embedded secrets, and build artifacts.

github exfiltration code_repository
2r 3t
high advisory

OpenClaw Path Traversal Vulnerability (CVE-2026-35668)

OpenClaw before 2026.3.24 is vulnerable to path traversal, allowing sandboxed agents to read arbitrary files from other agents' workspaces via manipulated URL parameters.

path-traversal vulnerability openclaw
2r 1t 1c