Skip to content
Threat Feed

April 2026 (30)

high advisory

React Server Components Denial of Service Vulnerability (CVE-2026-23869)

A denial of service vulnerability, CVE-2026-23869, exists in React Server Components due to excessive CPU usage triggered by specially crafted HTTP requests to Server Function endpoints, potentially leading to service disruption.

CVE-2026-23869 denial-of-service react
2r 1t 1c
high advisory

Immich Stored XSS Vulnerability in 360° Panorama Viewer (CVE-2026-35455)

A stored cross-site scripting (XSS) vulnerability in Immich versions before 2.7.0 allows authenticated users to inject arbitrary JavaScript via crafted equirectangular images, leading to session hijacking, data exfiltration, and unauthorized access.

immich xss cve-2026-35455 webserver
2r 2t 1c
medium advisory

LORIS Directory Traversal Vulnerability

LORIS, a neuroimaging research data management web application, is vulnerable to directory traversal (CVE-2026-35446) due to an incorrect order of operations in the FilesDownloadHandler, allowing authenticated attackers to access unauthorized files.

directory-traversal web-application neuroimaging
2r 2t 1c
medium advisory

Saleor GraphQL Resource Exhaustion Vulnerability (CVE-2026-35401)

A remote, unauthenticated attacker can cause resource exhaustion in Saleor e-commerce platforms via maliciously crafted GraphQL API requests, leading to denial of service.

cve-2026-35401 graphql resource-exhaustion denial-of-service saleor
2r 1t 1c
high advisory

LORIS File Traversal Vulnerability (CVE-2026-34392)

A file traversal vulnerability (CVE-2026-34392) in LORIS versions 20.0.0 to before 27.0.3 and 28.0.1 allows an unauthenticated attacker to download arbitrary files via the static file router.

file-traversal web-application cve-2026-34392
2r 1t 1c
high advisory

mcp-from-openapi SSRF Vulnerability via Untrusted OpenAPI Specifications

The mcp-from-openapi library is vulnerable to Server-Side Request Forgery (SSRF) due to insecure handling of $ref pointers in OpenAPI specifications, allowing attackers to read local files, internal network resources, and cloud metadata endpoints by processing untrusted OpenAPI specifications.

ssrf openapi mcp-from-openapi
2r 2i
high advisory

Logstash Arbitrary File Write via Path Traversal (CVE-2026-33466)

CVE-2026-33466 describes a vulnerability in Logstash where improper validation of file paths within compressed archives allows arbitrary file writes, potentially leading to remote code execution.

path-traversal remote-code-execution logstash
2r 2t 1c
critical advisory

Red Hat Quay Deserialization Vulnerability Leads to Remote Code Execution (CVE-2026-32590)

CVE-2026-32590 describes a deserialization vulnerability in Red Hat Quay's handling of resumable container image layer uploads, potentially allowing an attacker to execute arbitrary code on the Quay server by tampering with intermediate data stored in the database.

cve-2026-32590 redhat-quay deserialization rce
2r 2t 1c
medium advisory

Red Hat Quay Image Upload Interference Vulnerability (CVE-2026-32589)

CVE-2026-32589 describes a vulnerability in Red Hat Quay's container image upload process where an authenticated user can interfere with other users' uploads, potentially leading to unauthorized access and modification.

quay image upload vulnerability
2r 2t 1c
medium advisory

Kibana Fleet Plugin Privilege Escalation via CVE-2026-4498

CVE-2026-4498 allows an authenticated Kibana user with Fleet sub-feature privileges to read index data beyond their direct Elasticsearch RBAC scope due to improper privilege handling in debug route handlers.

cve privilege-escalation kibana
2r 1t 1c
high advisory

Unauthenticated Access to kcp Cache Server

The kcp cache server is exposed without authentication, allowing unauthorized read access to sensitive data and a race condition for write access that could lead to temporary privilege escalation.

kcp kubernetes cache authentication authorization privilege-escalation
2r 2t
high advisory

XWiki Remote Code Execution via Unprotected Velocity Scripting API

XWiki is vulnerable to remote code execution due to an improperly protected scripting API, allowing users with script rights to bypass the Velocity scripting API sandbox and execute arbitrary code, leading to full instance compromise.

xwiki rce velocity scripting CVE-2026-33229
2r 2t
critical advisory

Apache ActiveMQ Classic RCE via Jolokia API Exploitation

A remote code execution vulnerability (CVE-2026-34197) in Apache ActiveMQ Classic allows authenticated attackers to invoke management operations through the Jolokia API to retrieve a remote configuration file and execute OS commands, potentially exploitable without authentication via CVE-2024-32114.

activemq rce jolokia cve-2026-34197 cve-2024-32114 cve-2022-41678 spring-xml
2r 3t 3c
high advisory

CoolerControl-UI Stored XSS Vulnerability (CVE-2026-5301)

Unauthenticated attackers can perform a stored XSS attack against CoolerControl/coolercontrol-ui versions less than 4.0.0 by injecting malicious JavaScript into log entries, leading to potential service takeover.

xss cve-2026-5301 web-application
2r 2t 1c
medium advisory

Dell ECS and ObjectScale Sensitive Information Logging Vulnerability (CVE-2026-28261)

Dell Elastic Cloud Storage and ObjectScale are vulnerable to local privilege escalation due to sensitive information being logged, potentially allowing a low-privileged attacker with local access to expose secrets and gain unauthorized access.

cve-2026-28261 secret-leak privilege-escalation
2r 1t 1c
critical advisory

CoolerControl Command Injection Vulnerability (CVE-2026-5208)

CoolerControl/coolercontrold versions before 4.0.0 are vulnerable to command injection, allowing authenticated attackers with high privileges to execute arbitrary code as root by injecting bash commands into alert names.

command-injection privilege-escalation coolercontrol
2r 1t 1c
high advisory

WooCommerce Ajax Product Filter Plugin Vulnerable to SQL Injection (CVE-2026-3396)

The WCAPF - WooCommerce Ajax Product Filter plugin is vulnerable to time-based SQL Injection (CVE-2026-3396) due to insufficient escaping and SQL query preparation, allowing unauthenticated attackers to extract sensitive information from the database in versions up to 4.2.3.

woocommerce sqli cve-2026-3396 wordpress plugin
2r 1t 1c
medium advisory

OpenClaw Agent Suspicious Child Process Execution

Malicious actors are exploiting OpenClaw, Moltbot, and Clawdbot AI coding agents via Node.js to execute arbitrary shell commands and download-and-execute commands, potentially targeting cryptocurrency wallets and credentials.

ai-agent execution malware credential-theft
2r 10t 3i
high advisory

ChurchCRM Stored XSS Vulnerability in Person Property Management

A stored cross-site scripting (XSS) vulnerability in ChurchCRM versions prior to 7.0.0 allows authenticated users to inject arbitrary JavaScript code via dynamically assigned person properties, leading to potential session hijacking or account compromise when other users view the affected profile.

xss web-application churchcrm
2r 1t 2c
high advisory

Drizzle ORM SQL Injection Vulnerability (CVE-2026-39356)

Drizzle ORM versions before 0.45.2 and 1.0.0-beta.20 are vulnerable to SQL injection due to improper escaping of SQL identifiers, allowing attackers to inject malicious SQL code through manipulated input leading to potential data breaches.

sql-injection drizzle-orm cve-2026-39356 typescript orm
2r 5t 1c
high advisory

NI LabVIEW Out-of-Bounds Read Vulnerability (CVE-2026-32864)

A memory corruption vulnerability exists in NI LabVIEW due to an out-of-bounds read in mgcore_SH_25_3!aligned_free(), potentially leading to information disclosure or arbitrary code execution if a user opens a specially crafted VI file.

cve-2026-32864 labview memory-corruption out-of-bounds-read
2r 4t 1c
high advisory

D-LINK Router M60 and DIR-3040 'Airsnitch' Vulnerability

The 'Airsnitch' vulnerability in D-LINK Router M60 and DIR-3040 allows an attacker from an adjacent network to bypass security measures, disclose confidential information, and manipulate network traffic.

d-link router airsnitch vulnerability network-traffic-manipulation
2r 5t
high advisory

WordPress Plugin Vulnerability: Arbitrary File Upload in Gerador de Certificados – DevApps

The Gerador de Certificados – DevApps WordPress plugin is vulnerable to arbitrary file uploads due to missing file type validation, potentially leading to remote code execution.

wordpress plugin file-upload remote-code-execution
2r 2t 1c
high advisory

ASDA-Soft Stack-based Buffer Overflow Vulnerability (CVE-2026-5726)

A stack-based buffer overflow vulnerability exists in ASDA-Soft, potentially leading to arbitrary code execution, as identified by CVE-2026-5726 and reported by Deltaww with a CVSS v3.1 score of 7.8.

buffer-overflow asda-soft cve-2026-5726
2r 6t 1c 2i
critical advisory

Everest Forms WordPress Plugin PHP Object Injection Vulnerability

The Everest Forms plugin for WordPress is vulnerable to PHP Object Injection (CVE-2026-3296) in versions up to 3.4.3, allowing unauthenticated attackers to execute arbitrary code by injecting serialized PHP objects via form fields.

wordpress php object-injection rce cve-2026-3296
2r 2t 1c
high advisory

Product Feed PRO for WooCommerce Plugin CSRF Vulnerability (CVE-2026-3499)

The Product Feed PRO for WooCommerce WordPress plugin (versions 13.4.6-13.5.2.1) is vulnerable to Cross-Site Request Forgery (CSRF) attacks, allowing unauthenticated attackers to perform administrative actions by tricking an administrator into clicking a malicious link.

wordpress woocommerce csrf cve-2026-3499
3r 1t 1c
critical advisory

IBM Langflow Desktop Deserialization RCE (CVE-2026-3357)

IBM Langflow Desktop versions 1.6.0 through 1.8.2 is vulnerable to arbitrary code execution due to insecure deserialization of untrusted data, allowing an authenticated user to execute code on the system.

cve-2026-3357 deserialization rce langflow
2r 1t 1c
medium advisory

IBM Tivoli Netcool Impact Sensitive Information Leak via Log Files (CVE-2026-4788)

IBM Tivoli Netcool Impact 7.1.0.0 through 7.1.0.37 stores sensitive information in log files, potentially exposing it to unauthorized local users, tracked as CVE-2026-4788.

cve-2026-4788 information-disclosure log-files
2r 1t 1c
critical advisory

IBM Verify Access and Security Verify Access Container Privilege Escalation (CVE-2026-1346)

A locally authenticated user can escalate privileges to root on vulnerable IBM Verify Identity Access Container and IBM Security Verify Access Container installations due to the execution of processes with unnecessary privileges, as tracked by CVE-2026-1346.

privilege-escalation cve-2026-1346 ibm
2r 1t 1c
medium advisory

IBM Verify and Security Verify Access Container Server-Side Request Forgery Vulnerability (CVE-2026-1343)

CVE-2026-1343 allows an attacker to contact internal authentication endpoints protected by the Reverse Proxy in IBM Verify Identity Access Container and IBM Security Verify Access Container.

cve cve-2026-1343 ssrf ibm
2r 2t 1c