Skip to content
Threat Feed

April 2026 (30)

critical advisory

SandboxJS Integrity Escape Vulnerability

A sandbox integrity escape vulnerability exists in SandboxJS versions prior to 0.8.36, allowing untrusted code to bypass global write protections and mutate host shared global objects, potentially leading to cross-context persistence and broader compromise.

sandbox-escape javascript vulnerability
2r 2t
high advisory

curl_cffi SSRF Vulnerability via Redirects

curl_cffi versions before 0.15.0 are vulnerable to server-side request forgery (SSRF) due to unrestricted redirects to internal IP ranges, potentially enabling access to sensitive internal resources and cloud metadata.

ssrf curl_cffi cloud
2r 1t 1c 1i
high advisory

Amazon Athena ODBC Driver Authentication Bypass Vulnerability (CVE-2026-35561)

CVE-2026-35561 describes an insufficient authentication security control vulnerability in the browser-based authentication components of the Amazon Athena ODBC driver before version 2.1.0.0, potentially allowing a threat actor to intercept or hijack authentication sessions.

amazon athena odbc authentication hijacking cve-2026-35561
2r 2t 1c
high advisory

Amazon Athena ODBC Driver Denial of Service Vulnerability (CVE-2026-35562)

A remote, unauthenticated attacker can cause a denial of service by sending crafted input to vulnerable versions of the Amazon Athena ODBC driver, triggering excessive resource consumption during parsing operations.

CVE-2026-35562 denial-of-service amazon athena odbc driver
2r 1t 1c
high advisory

Amazon Athena ODBC Driver Man-in-the-Middle Vulnerability

A man-in-the-middle vulnerability exists in Amazon Athena ODBC driver versions prior to 2.1.0.0 due to improper certificate validation, potentially allowing attackers to intercept authentication credentials when connecting to external identity providers.

cve-2026-35560 athena odbc man-in-the-middle mitm credential-theft
2r 1t 1c
high advisory

Amazon Athena ODBC Driver Command Injection Vulnerability (CVE-2026-35558)

A command injection vulnerability (CVE-2026-35558) exists in the Amazon Athena ODBC driver before 2.1.0.0 due to improper neutralization of special elements in connection parameters, potentially leading to arbitrary code execution or authentication redirection.

command injection cve-2026-35558 athena
2r 2t 1c
high advisory

Unauthenticated Access to Administrative Endpoint (CVE-2026-32646)

CVE-2026-32646 allows unauthenticated access to a specific administrative endpoint, potentially exposing device management functions, with a CVSS v3.1 score of 7.5.

cve-2026-32646 authentication-bypass device-management
2r 1t 1c
high advisory

prompts.chat Fal.ai SSRF Vulnerability (CVE-2026-22664)

prompts.chat prior to commit 30a8f04 is vulnerable to server-side request forgery (SSRF) in Fal.ai media status polling, allowing authenticated users to perform arbitrary outbound requests by supplying attacker-controlled URLs, leading to potential credential theft and internal network probing.

ssrf cve-2026-22664 fal.ai prompts.chat
2r 1t 1c 1i
high advisory

Hardcoded Storage Credentials in Mobile App and Device Firmware (CVE-2025-10681)

CVE-2025-10681 describes a vulnerability where hardcoded storage credentials in a mobile app and device firmware, with inadequate permission limits and lack of expiration, could lead to unauthorized access to production storage containers.

cve-2025-10681 hardcoded-credentials ics-cert ot
2r 1t 1c
high advisory

Hirschmann HiOS EtherNet/IP Stack Denial-of-Service Vulnerability (CVE-2020-37216)

A denial-of-service vulnerability in Hirschmann HiOS devices allows remote attackers to crash or hang the device by sending crafted UDP EtherNet/IP packets with invalid length fields.

dos cve-2020-37216 network
2r 2t 1c
high threat

Rise in Software Supply Chain Attacks Targeting Open-Source Libraries

Multiple supply chain attacks, including the compromise of Axios and Trivy via hijacked GitHub repositories by TeamPCP, demonstrate the increasing threat to open-source software.

TeamPCP supply-chain software-compromise github
3r 1t
critical advisory

Budibase Path Traversal Vulnerability in Plugin Upload

A path traversal vulnerability exists in Budibase versions prior to 3.33.4, allowing attackers with Global Builder privileges to delete arbitrary directories and write arbitrary files via crafted plugin uploads.

path-traversal vulnerability budibase
2r 1t 1c
high advisory

Budibase Stored Cross-Site Scripting Vulnerability (CVE-2026-35218)

A stored cross-site scripting (XSS) vulnerability in Budibase versions prior to 3.32.5 allows authenticated users with Builder access to inject malicious HTML payloads into entity names, leading to potential session cookie theft and account takeover when other Builder users open the Command Palette.

budibase xss cve-2026-35218 web-application
2r 1t 1c
critical advisory

Budibase Unauthenticated Remote Code Execution via Webhook

Budibase versions before 3.33.4 are susceptible to unauthenticated remote code execution, where a threat actor can trigger a Bash step within an automation via the public webhook endpoint, leading to code execution as root within the container.

CVE-2026-35216 budibase rce webhook
2r 1t 1c
critical advisory

Critical Authentication Bypass Vulnerability in Cisco Integrated Management Controller (CVE-2026-20093)

An unauthenticated remote attacker can exploit CVE-2026-20093 to bypass authentication in Cisco Integrated Management Controller (IMC), gain full administrative access, and manipulate hardware settings, potentially disrupting critical infrastructure.

authentication bypass cisco imc cve-2026-20093
3r 3t 1c
critical advisory

Compromised Axios Library Leads to RAT Deployment via @usebruno/cli

Compromised versions of the `axios` npm package introduced a hidden dependency deploying a cross-platform Remote Access Trojan (RAT), impacting users of `@usebruno/cli` who ran `npm install` between 00:21 UTC and ~03:30 UTC on March 31, 2026, potentially leading to credential exfiltration.

supply-chain npm rat credential-theft
2r 5t 1i
medium advisory

Democratization of Business Email Compromise (BEC) Attacks

Attackers are leveraging AI to rapidly reconnoiter and tailor content for smaller organizations, making it easier to execute business email compromise (BEC) scams and scam smaller sums from many victims, as demonstrated by a recent attack targeting a small community organization.

business-email-compromise bec ai social-engineering credential-harvesting exploitation
2r 2t 1c 6i
critical advisory

fast-jwt Library JWT Algorithm Confusion Vulnerability

The fast-jwt library is vulnerable to JWT Algorithm Confusion via Whitespace-Prefixed RSA Public Key due to an incomplete fix for CVE-2023-48223, allowing attackers to bypass intended security measures by exploiting leading whitespace in the RSA public key, enabling attackers to sign arbitrary payloads that will be accepted by the verifier, potentially leading to privilege escalation.

jwt algorithm-confusion vulnerability fast-jwt nodejs
2r 1t 1c
medium advisory

Suricata Quadratic Complexity Issue in SMTP URL Searching (CVE-2026-31934)

Suricata versions 8.0.0 to before 8.0.4 exhibit a quadratic complexity vulnerability (CVE-2026-31934) when searching for URLs in MIME-encoded SMTP messages, leading to significant performance degradation and potential denial-of-service conditions; this is fixed in version 8.0.4.

suricata cve-2026-31934 denial-of-service performance network-security
2r 1t 1c 1i
medium advisory

ManageEngine Exchange Reporter Plus Stored XSS Vulnerability

Zohocorp ManageEngine Exchange Reporter Plus versions before 5802 are vulnerable to Stored XSS in the Distribution Lists report, allowing attackers to inject malicious scripts.

xss vulnerability manageengine
2r 2t 1c
high advisory

AIRBUS PSS TETRA Connectivity Server Privilege Escalation via Incorrect Permissions

AIRBUS PSS TETRA Connectivity Server version 7.0 on Windows Server is vulnerable to incorrect default permissions, allowing local privilege escalation to SYSTEM by placing a malicious file in a specific directory.

cve-2025-7024 privilege-escalation windows
2r 1t 1c
critical advisory

Perfmatters WordPress Plugin Arbitrary File Deletion Vulnerability (CVE-2026-4350)

The Perfmatters plugin for WordPress versions up to 2.5.9.1 is vulnerable to arbitrary file deletion via path traversal, allowing authenticated attackers with minimal privileges to delete sensitive files.

cve-2026-4350 wordpress perfmatters file-deletion path-traversal
2r 1t 1c
high advisory

Pymetasploit3 Command Injection Vulnerability (CVE-2026-5463)

A command injection vulnerability in pymetasploit3 versions up to 1.0.6 allows attackers to inject newline characters into module options, leading to arbitrary command execution within Metasploit sessions.

command-injection metasploit pymetasploit3
2r 1t 1c
high advisory

Ajenti Authorization Bypass Vulnerability (CVE-2026-35175)

Ajenti versions before 2.2.15 contain an authorization bypass vulnerability that allows authenticated non-superuser users to install custom packages, potentially leading to privilege escalation and system compromise.

ajenti authorization-bypass privilege-escalation CVE-2026-35175
2r 1t
high advisory

Wisp Multipart Parsing Vulnerability Leads to Denial of Service

A vulnerability in the multipart parsing logic of gleam-wisp allows an unauthenticated attacker to bypass request size limits and cause a denial of service by exhausting server memory or disk.

denial-of-service multipart-parsing gleam-wisp
3r 1t 1c
high advisory

Swift Crypto X-Wing HPKE Decapsulation Vulnerability

The X-Wing decapsulation path in swift-crypto accepts attacker-controlled encapsulated ciphertext bytes without enforcing the required fixed ciphertext length of 1120 bytes, leading to a potential out-of-bounds read.

vulnerability memory-safety swift-crypto
2r 1t
high advisory

Ech0 Unauthenticated Server-Side Request Forgery Vulnerability

Ech0 is vulnerable to Server-Side Request Forgery (SSRF) due to an unauthenticated API endpoint (`/api/website/title`) that fetches website titles from user-controlled URLs, lacking proper validation and TLS verification, allowing attackers to access internal resources and potentially cause denial of service.

ssrf ech0 web-application
2r 1t 1i
critical advisory

Better Auth Two-Factor Authentication Bypass Vulnerability

Better Auth versions prior to 1.4.9 have a critical two-factor authentication bypass vulnerability; when session.cookieCache is enabled, the initial sign-in session may be improperly cached, allowing attackers with valid credentials to bypass 2FA.

authentication 2fa bypass better-auth
2r 1t
high advisory

Sudo Privilege Escalation Vulnerability (CVE-2026-35535)

CVE-2026-35535 describes a privilege escalation vulnerability in Sudo versions up to 1.9.17p2, where a non-fatal error during privilege dropping can allow an attacker to gain elevated privileges.

sudo privilege-escalation cve-2026-35535
2r 1t 1c
critical advisory

OpenClaw TOCTOU Race Condition Leads to Sandbox Escape

A critical time-of-check time-of-use (TOCTOU) vulnerability in OpenClaw's remote file system bridge allows a sandbox escape by exploiting the delay between path validation and file reading, affecting versions up to 2026.3.28.

openclaw sandbox-escape toctou
2r 1t