Skip to content
Threat Feed

April 2026 (30)

critical advisory

Juniper Junos OS MX Series Missing Authorization Vulnerability

CVE-2026-33785 allows a low-privileged, local, authenticated user to execute 'request csds' commands on Juniper Junos OS MX Series devices, leading to complete device compromise.

privilege-escalation network juniper
2r 1t 1c
critical advisory

D-Link DIR-605L Router Buffer Overflow Vulnerability (CVE-2026-5980)

A buffer overflow vulnerability exists in the D-Link DIR-605L router version 2.13B01, allowing a remote attacker to execute arbitrary code by manipulating the `curTime` argument in the `formSetMACFilter` function.

cve buffer_overflow router d-link
2r 4t 1c
critical advisory

D-Link DIR-605L Router Buffer Overflow Vulnerability

A remote buffer overflow vulnerability exists in the D-Link DIR-605L version 2.13B01 due to improper handling of the 'curTime' argument in the '/goform/formVirtualServ' POST request handler, potentially allowing attackers to execute arbitrary code.

dlink router buffer_overflow cve-2026-5979
2r 1t 1c
high advisory

Nimiq Blockchain Timestamp Manipulation Vulnerability

A vulnerability in nimiq-blockchain versions 1.3.0 and earlier allows malicious validators to manipulate block timestamps, leading to inflation of the monetary supply.

blockchain timestamp-manipulation inflation
2r 4t 1c
high threat

WordPress adivaha Travel Plugin SQL Injection Vulnerability (CVE-2023-54359)

The WordPress adivaha Travel Plugin version 2.3 is vulnerable to time-based blind SQL injection via the 'pid' GET parameter, allowing unauthenticated attackers to inject SQL code through the /mobile-app/v3/ endpoint for potential data extraction or denial of service.

exploited wordpress sql-injection cve-2023-54359
2r 1t 1c
high advisory

bsv-sdk and bsv-wallet Credential Forgery Vulnerability

The bsv-sdk and bsv-wallet packages are vulnerable to credential forgery because the `acquire_certificate` function persists certificate records to storage without verifying the certifier's signature, allowing attackers to forge identity certificates.

credential-forgery ruby bsv-sdk bsv-wallet
2r 1t
high advisory

MetaGPT Bash.run Command Injection Vulnerability (CVE-2026-5974)

A command injection vulnerability exists in FoundationAgents MetaGPT version 0.8.1 affecting the Bash.run function, enabling remote attackers to execute arbitrary OS commands via crafted input.

command-injection metagpt cve-2026-5974
2r 1t 1c
critical advisory

MetaGPT OS Command Injection Vulnerability (CVE-2026-5972)

A remote command injection vulnerability exists in FoundationAgents MetaGPT <= 0.8.1 via the Terminal.run_command function, allowing unauthenticated attackers to execute arbitrary OS commands.

CVE-2026-5972 command-injection metagpt
2r 1t 1c
high advisory

CVE-2026-4436: Modbus Odorant Injection Manipulation

A low-privileged remote attacker can exploit CVE-2026-4436 by sending Modbus packets to manipulate register values controlling odorant injection in gas lines, potentially leading to hazardous conditions.

cve modbus industrial-control-system odorant-injection
2r 2t 1c
critical advisory

PraisonAI OS Command Injection Vulnerability (CVE-2026-40088)

PraisonAI versions prior to 4.5.121 are vulnerable to OS command injection, allowing attackers to execute arbitrary shell commands via user-controlled input in agent workflows, YAML definitions, and LLM-generated tool calls.

cve-2026-40088 command-injection praisonai
2r 1t 1c
high advisory

HDF5 Heap Use-After-Free Vulnerability in h5dump (CVE-2026-34734)

A heap-use-after-free vulnerability (CVE-2026-34734) in HDF5 version 1.14.1-2 and earlier within the h5dump helper utility can be triggered by a malicious h5 file, leading to arbitrary code execution.

hdf5 heap-use-after-free cve-2026-34734 h5dump
2r 1t 1c
critical advisory

Contemporary Controls BASC 20T Packet Forging Vulnerability

CVE-2025-13926 describes a vulnerability in Contemporary Controls BASC 20T that allows an attacker to sniff network traffic and forge packets to make arbitrary requests, potentially leading to unauthorized actions.

cve-2025-13926 basc-20t packet-forging industrial-control-system
2r 1t 1c
high advisory

FoundationAgents MetaGPT Code Injection Vulnerability (CVE-2026-5971)

A code injection vulnerability exists in FoundationAgents MetaGPT <= 0.8.1 within the ActionNode.xml_fill function, allowing remote attackers to inject code due to improper neutralization of directives in dynamically evaluated code.

code-injection vulnerability metagpt CVE-2026-5971
2r 1t 1c
high advisory

MetaGPT Code Injection Vulnerability (CVE-2026-5970)

A code injection vulnerability, CVE-2026-5970, exists in FoundationAgents MetaGPT up to version 0.8.1, allowing remote attackers to execute arbitrary code via manipulation of the `check_solution` function in the HumanEvalBenchmark/MBPPBenchmark component.

code-injection metagpt cve-2026-5970
2r 1t 1c
high advisory

BSV Ruby SDK Improper ARC Response Handling

BSV Ruby SDK versions before 0.8.2 improperly handle ARC responses, treating certain failure statuses as successful broadcasts, potentially tricking applications into trusting unaccepted transactions; version 0.8.2 resolves this vulnerability.

bsv ruby blockchain vulnerability
2r 1t 1c
critical advisory

AGiXT Path Traversal Vulnerability (CVE-2026-39981)

AGiXT versions prior to 1.9.2 are vulnerable to path traversal (CVE-2026-39981) due to insufficient validation in the safe_join() function, allowing authenticated attackers to read, write, or delete arbitrary files.

path-traversal cve agixt web-application
2r 3t 1c
high advisory

GNUTLS Denial of Service via Malformed ClientHello (CVE-2026-1584)

A remote, unauthenticated attacker can exploit CVE-2026-1584 in gnutls by sending a specially crafted ClientHello message with an invalid Pre-Shared Key (PSK) binder value during the TLS handshake, leading to a NULL pointer dereference and a denial-of-service condition.

cve-2026-1584 denial-of-service gnutls
2r 2t 1c
high advisory

SaaS Notification Pipeline Phishing and Medusa Ransomware Exploitation

Threat actors are weaponizing legitimate SaaS notification pipelines to deliver phishing and spam emails, bypassing traditional email authentication protocols, and Storm-1175 is exploiting CVE-2026-1731 to deploy Medusa ransomware.

saas phishing ransomware medusa
1r 1t 1c 2i
high advisory

MinIO S3 Select CSV Parsing Denial of Service

MinIO's S3 Select feature is vulnerable to denial of service due to unbounded memory allocation when processing CSV files without newlines, leading to memory exhaustion and server crashes.

dos minio s3select
2r 1t
critical advisory

Axios NO_PROXY Hostname Normalization Bypass Leads to SSRF

Axios is vulnerable to a NO_PROXY hostname normalization bypass leading to SSRF, where requests to loopback addresses like `localhost.` or `[::1]` bypass `NO_PROXY` rules, allowing attackers to force requests through a proxy and potentially exfiltrate sensitive data.

ssrf no_proxy axios hostname_normalization
2r 1t 1c
high advisory

Laravel Passport Authentication Bypass Vulnerability (CVE-2026-39976)

Laravel Passport versions 13.0.0 before 13.7.1 contain an authentication bypass vulnerability (CVE-2026-39976) where machine-to-machine tokens can authenticate as a real user due to improper validation of the JWT sub claim.

cve-2026-39976 laravel oauth2 authentication bypass
2r 1t 1c
high advisory

Tmds.DBus Vulnerability Allows Signal Spoofing and Resource Exhaustion

Tmds.DBus and Tmds.DBus.Protocol are vulnerable to signal spoofing, resource exhaustion, and application crashes due to malformed messages from malicious D-Bus peers on the same bus.

dbus vulnerability dotnet
2r 1t 1c
high advisory

osslsigncode Stack Buffer Overflow Vulnerability (CVE-2026-39853)

A stack buffer overflow vulnerability (CVE-2026-39853) exists in osslsigncode versions prior to 2.12 due to insufficient validation of digest length during PKCS#7 signature verification, potentially leading to arbitrary code execution.

osslsigncode buffer-overflow authenticode code-signing CVE-2026-39853
2r 1t 1c
high advisory

Plane Project Management Tool SSRF Vulnerability (CVE-2026-39843)

Plane project management tool versions before 1.3.0 are vulnerable to Server-Side Request Forgery (SSRF), allowing authenticated low-privilege attackers to read internal resources by exploiting the favicon fetch functionality.

ssrf cve-2026-39843 plane project-management
2r 1t 1c
high advisory

OPNsense LDAP Injection Vulnerability (CVE-2026-34578)

OPNsense versions prior to 26.1.6 are vulnerable to LDAP injection, allowing unauthenticated attackers to enumerate valid LDAP usernames and bypass group membership restrictions via the WebGUI login page.

ldap-injection vulnerability opnsense
2r 1t 1c
high advisory

OpenClaw RCE via Build Tool Environment Variable Injection

OpenClaw versions prior to 2026.4.8 are vulnerable to remote code execution (RCE) via build tool environment variable injection due to missing denylist entries for HGRCPATH, CARGO_BUILD_RUSTC_WRAPPER, RUSTC_WRAPPER, and MAKEFLAGS, allowing hostile environment variables to influence host exec commands.

rce environment-variable-injection openclaw
2r 2t
high advisory

OpenClaw Trust Model Vulnerability: System Prompt Channel Injection

OpenClaw versions 2026.4.2 and earlier are vulnerable to a trust model issue where authenticated wake hooks or mapped wake payloads can be promoted into the trusted System prompt channel, potentially leading to security vulnerabilities within the OpenClaw trust model.

openclaw trust-model system-prompt-injection npm
2r
high advisory

HashiCorp go-getter Arbitrary File Read Vulnerability (CVE-2026-4660)

HashiCorp's go-getter library up to v1.8.5 is vulnerable to arbitrary file reads on the file system during certain git operations through a maliciously crafted URL (CVE-2026-4660), potentially allowing attackers to access sensitive information.

cve-2026-4660 file-read go-getter information-disclosure
2r 1t 1c 1i
high advisory

OpenEXR DWA Lossy Decoder Heap Out-of-Bounds Write Vulnerability

A heap out-of-bounds write vulnerability exists in OpenEXR's DWA lossy decoder due to integer overflow during block pointer calculation, triggered via crafted DWAA files, leading to crashes during DCT execution.

openexr heap-overflow dwaa cve-2026-34589
2r 1t 1c 1i
medium advisory

Saleor GraphQL Batch Query Resource Exhaustion Vulnerability (CVE-2026-33756)

Unauthenticated attackers can exploit a resource exhaustion vulnerability (CVE-2026-33756) in Saleor e-commerce platform versions before 3.23.0a3, 3.22.47, 3.21.54, and 3.20.118 by sending a single HTTP request with a large number of GraphQL operations, bypassing query complexity limits and exhausting server resources.

resource-exhaustion graphql cve-2026-33756 dos
2r 1t 1c