Skip to content
Threat Feed

April 2026 (30)

high advisory

OpenClaw Trust Model Vulnerability: System Prompt Channel Injection

OpenClaw versions 2026.4.2 and earlier are vulnerable to a trust model issue where authenticated wake hooks or mapped wake payloads can be promoted into the trusted System prompt channel, potentially leading to security vulnerabilities within the OpenClaw trust model.

openclaw trust-model system-prompt-injection npm
2r
high advisory

HashiCorp go-getter Arbitrary File Read Vulnerability (CVE-2026-4660)

HashiCorp's go-getter library up to v1.8.5 is vulnerable to arbitrary file reads on the file system during certain git operations through a maliciously crafted URL (CVE-2026-4660), potentially allowing attackers to access sensitive information.

cve-2026-4660 file-read go-getter information-disclosure
2r 1t 1c 1i
critical advisory

Nix Package Manager Arbitrary File Overwrite Vulnerability

A flaw in Nix package manager allows arbitrary file overwrites via symlink following during fixed-output derivation registration, potentially leading to root privilege escalation on multi-user Linux systems.

nix privilege-escalation linux vulnerability
2r 1t 2c
high advisory

OpenEXR DWA Lossy Decoder Heap Out-of-Bounds Write Vulnerability

A heap out-of-bounds write vulnerability exists in OpenEXR's DWA lossy decoder due to integer overflow during block pointer calculation, triggered via crafted DWAA files, leading to crashes during DCT execution.

openexr heap-overflow dwaa cve-2026-34589
2r 1t 1c 1i
medium advisory

Saleor GraphQL Batch Query Resource Exhaustion Vulnerability (CVE-2026-33756)

Unauthenticated attackers can exploit a resource exhaustion vulnerability (CVE-2026-33756) in Saleor e-commerce platform versions before 3.23.0a3, 3.22.47, 3.21.54, and 3.20.118 by sending a single HTTP request with a large number of GraphQL operations, bypassing query complexity limits and exhausting server resources.

resource-exhaustion graphql cve-2026-33756 dos
2r 1t 1c
high advisory

WAGO PLC OpenVPN Configuration Vulnerability (CVE-2024-1490)

An authenticated remote attacker with high privileges can exploit the OpenVPN configuration via the web-based management interface of a WAGO PLC to achieve arbitrary command execution on the device.

cve-2024-1490 wago-plc openvpn rce code-injection
2r 1t 1c 2i
high advisory

Vim Vulnerability Allows Local Code Execution

A local attacker can exploit a vulnerability in Vim to execute arbitrary code on a vulnerable system.

vim code-execution local-privilege-escalation
2r 1t
critical advisory

Multiple Vulnerabilities in Zammad

Multiple vulnerabilities in Zammad allow a remote attacker to execute arbitrary code, bypass security measures, disclose sensitive information, and perform cross-site scripting attacks.

zammad vulnerability code execution xss
2r 3t
critical advisory

D-Link DIR-882 Remote Command Injection Vulnerability (CVE-2026-5844)

A command injection vulnerability (CVE-2026-5844) exists in the D-Link DIR-882 router version 1.01B02, allowing a remote attacker to execute arbitrary OS commands by manipulating the IPAddress argument in the HNAP1 SetNetworkSettings Handler via the prog.cgi script.

command-injection d-link router cve-2026-5844
2r 1t 1c 1i
high advisory

Decolua 9router Authorization Bypass Vulnerability (CVE-2026-5842)

CVE-2026-5842 is an authorization bypass vulnerability in decolua 9router versions up to 0.3.47, allowing remote attackers to gain unauthorized access via manipulation of the /api endpoint.

cve authorization-bypass router
2r 1t 1c
high threat

PHPGurukul News Portal Project SQL Injection Vulnerability (CVE-2026-5837)

PHPGurukul News Portal Project version 4.1 is vulnerable to SQL injection via the Comment parameter in /news-details.php, potentially allowing remote attackers to execute arbitrary SQL queries.

exploited sql-injection web-application php CVE-2026-5837
2r 1t 1c
high advisory

code-projects Simple IT Discussion Forum SQL Injection Vulnerability (CVE-2026-5829)

A remote SQL injection vulnerability (CVE-2026-5829) exists in code-projects Simple IT Discussion Forum 1.0 due to improper handling of the 'post_id' argument in the '/pages/content.php' file, allowing attackers to execute arbitrary SQL queries.

sql-injection web-application cve-2026-5829
2r 1t 1c
critical advisory

Tenda AC15 Router Stack-Based Buffer Overflow (CVE-2026-5830)

A stack-based buffer overflow vulnerability (CVE-2026-5830) in Tenda AC15 firmware version 15.03.05.18 allows remote attackers to execute arbitrary code by manipulating password change parameters, potentially leading to complete device compromise.

cve-2026-5830 tenda router buffer-overflow stack-overflow
2r 2t 1c
high advisory

Simple IT Discussion Forum SQL Injection Vulnerability (CVE-2026-5827)

CVE-2026-5827 is a SQL injection vulnerability in code-projects Simple IT Discussion Forum 1.0, allowing remote attackers to execute arbitrary SQL commands by manipulating the 'content' argument in /question-function.php.

sqli web-application injection
2r 1t 1c
high advisory

MemProcFS DLL and Shared Library Hijacking Vulnerability

MemProcFS before 5.17 is susceptible to DLL and shared-library hijacking due to unsafe library-loading patterns, allowing attackers to achieve arbitrary code execution by placing malicious libraries or manipulating the library search path.

dll-hijacking library-hijacking code-execution memprocfs cve-2026-40031
2r 3t 1c
high advisory

parseusbs OS Command Injection Vulnerability (CVE-2026-40030)

parseusbs before 1.9 is vulnerable to OS command injection (CVE-2026-40030) due to improper sanitization of the volume listing path argument, potentially allowing arbitrary command execution via crafted volume paths.

command-injection vulnerability linux
2r 1t 1c
high advisory

parseusbs Unsanitized LNK File Command Injection Vulnerability

parseusbs before 1.9 is vulnerable to OS command injection in parseUSBs.py due to unsanitized LNK file paths passed to os.popen(), allowing arbitrary command execution via crafted .lnk filenames.

command injection lnk parseusbs cve-2026-40029
2r 1t 1c
high advisory

UAC (Unix-like Artifacts Collector) Command Injection Vulnerability

UAC before 3.3.0-rc1 is vulnerable to command injection in the _run_command() function, allowing attackers to execute arbitrary commands with the privileges of the UAC process through manipulated input values.

command-injection vulnerability uac
2r 1t 1c
high advisory

Sleuth Kit Path Traversal Vulnerability (CVE-2026-40024)

A path traversal vulnerability exists in The Sleuth Kit through 4.14.0 (tsk_recover), enabling attackers to write files to arbitrary locations via crafted filenames with path traversal sequences in a filesystem image, potentially leading to code execution.

path traversal code execution privilege escalation sleuth kit CVE-2026-40024
2r 3t 1c
critical advisory

PraisonAI Vulnerable to OS Command Injection

PraisonAI is vulnerable to OS command injection due to the use of `subprocess.run()` with `shell=True` on user-controlled inputs, allowing attackers to inject arbitrary shell commands and potentially leading to sensitive data exfiltration or system compromise in versions prior to 4.5.121.

command-injection rce praisonai
2r 1t 1i
high advisory

PraisonAI Unauthenticated Agent Activity Exposure (CVE-2026-39889)

PraisonAI versions prior to 4.5.115 expose agent activity without authentication due to improperly secured A2U event stream endpoints, potentially allowing unauthorized access to sensitive agent information.

cve-2026-39889 information-disclosure web-application
2r 1t 1c
medium advisory

First Time Python Process Creates macOS Launch Agent or Daemon

This rule detects the initial creation or modification of a macOS LaunchAgent or LaunchDaemon plist file by a Python process, a common persistence technique employed by attackers using malicious scripts, compromised dependencies, or model file deserialization.

persistence macos python
2r 2t
high advisory

Kamailio Out-of-Bounds Access Denial of Service Vulnerability

A remote attacker can exploit an out-of-bounds access vulnerability (CVE-2026-39863) in Kamailio versions prior to 6.1.1, 6.0.6, and 5.8.8 by sending a specially crafted data packet over TCP, causing a denial-of-service condition.

dos cve-2026-39863 kamailio
2r 1t 1c
high advisory

InvenTree Privilege Escalation via API Abuse (CVE-2026-35476)

A non-staff authenticated user can elevate their account to a staff level via a POST request against their user account endpoint in InvenTree versions prior to 1.2.7 and 1.3.0 due to improperly configured API write permissions.

inventree privilege-escalation cve-2026-35476
2r 1t 1c
high advisory

React Server Components Denial of Service Vulnerability (CVE-2026-23869)

A denial of service vulnerability, CVE-2026-23869, exists in React Server Components due to excessive CPU usage triggered by specially crafted HTTP requests to Server Function endpoints, potentially leading to service disruption.

CVE-2026-23869 denial-of-service react
2r 1t 1c
high advisory

Immich Stored XSS Vulnerability in 360° Panorama Viewer (CVE-2026-35455)

A stored cross-site scripting (XSS) vulnerability in Immich versions before 2.7.0 allows authenticated users to inject arbitrary JavaScript via crafted equirectangular images, leading to session hijacking, data exfiltration, and unauthorized access.

immich xss cve-2026-35455 webserver
2r 2t 1c
medium advisory

LORIS Directory Traversal Vulnerability

LORIS, a neuroimaging research data management web application, is vulnerable to directory traversal (CVE-2026-35446) due to an incorrect order of operations in the FilesDownloadHandler, allowing authenticated attackers to access unauthorized files.

directory-traversal web-application neuroimaging
2r 2t 1c
medium advisory

Saleor GraphQL Resource Exhaustion Vulnerability (CVE-2026-35401)

A remote, unauthenticated attacker can cause resource exhaustion in Saleor e-commerce platforms via maliciously crafted GraphQL API requests, leading to denial of service.

cve-2026-35401 graphql resource-exhaustion denial-of-service saleor
2r 1t 1c
high advisory

LORIS File Traversal Vulnerability (CVE-2026-34392)

A file traversal vulnerability (CVE-2026-34392) in LORIS versions 20.0.0 to before 27.0.3 and 28.0.1 allows an unauthenticated attacker to download arbitrary files via the static file router.

file-traversal web-application cve-2026-34392
2r 1t 1c
high advisory

mcp-from-openapi SSRF Vulnerability via Untrusted OpenAPI Specifications

The mcp-from-openapi library is vulnerable to Server-Side Request Forgery (SSRF) due to insecure handling of $ref pointers in OpenAPI specifications, allowing attackers to read local files, internal network resources, and cloud metadata endpoints by processing untrusted OpenAPI specifications.

ssrf openapi mcp-from-openapi
2r 2i