Skip to content
Threat Feed

March 2026 (30)

high advisory

OpenClaw Approval Integrity Vulnerability Leads to Code Execution (CVE-2026-32971)

OpenClaw before 2026.3.11 exhibits an approval-integrity vulnerability where attackers can place wrapper binaries to execute local code after operators approve misleading command text, due to the system displaying extracted shell payloads instead of the actual executed arguments.

cve-2026-32971 code-execution approval-bypass
2r 1t 1c
medium advisory

Query Monitor WordPress Plugin Vulnerable to Reflected XSS (CVE-2026-4267)

The Query Monitor WordPress plugin is vulnerable to reflected cross-site scripting (XSS) due to insufficient input sanitization and output escaping of the '$_SERVER['REQUEST_URI']' parameter, allowing unauthenticated attackers to inject arbitrary web scripts.

wordpress xss reflected-xss cve-2026-4267
2r 1t 1c
high advisory

SQL Injection Vulnerability in Student Membership System 1.0

CVE-2026-5198 is a SQL injection vulnerability in the Admin Login component of code-projects Student Membership System 1.0, affecting the /admin/index.php file, enabling remote exploitation through manipulation of username/password parameters.

sql-injection vulnerability web-application
2r 1t 1c
medium advisory

OpenClaw Microsoft Teams Plugin Sender Allowlist Bypass (CVE-2026-34506)

OpenClaw before 2026.3.8 contains a sender allowlist bypass vulnerability in its Microsoft Teams plugin, allowing unauthorized senders to bypass intended authorization checks due to improper handling of empty groupAllowFrom parameters, potentially leading to information disclosure.

cve-2026-34506 openclaw microsoft teams allowlist bypass
2r 2t 1c
critical advisory

OpenClaw Webhook Rate Limit Bypass Vulnerability (CVE-2026-34505)

OpenClaw before 2026.3.12 applies rate limiting only after successful webhook authentication, allowing attackers to bypass rate limits and brute-force webhook secrets leading to forged webhook submission.

rate-limiting brute-force webhook cve-2026-34505
2r 1t 1c
medium advisory

OpenClaw Information Disclosure via Telegram Bot Token Exposure

OpenClaw before version 2026.3.13 exposes Telegram bot tokens in error messages due to the fetchRemoteMedia function embedding these tokens in MediaFetchError strings when media downloads fail.

information-disclosure vulnerability telegram
2r 1c
critical advisory

OpenClaw Remote Command Injection via iMessage Attachment Staging (CVE-2026-32917)

OpenClaw before 2026.3.13 is vulnerable to remote command injection via unsanitized iMessage attachment paths passed to the SCP remote operand, allowing attackers to execute arbitrary commands on configured remote hosts when remote attachment staging is enabled.

command-injection imessage openclaw
2r 1t 1c
critical threat

Citrix NetScaler ADC and Gateway CVE-2026-3055 Exploitation

Threat actors are actively exploiting CVE-2026-3055, a critical memory overread vulnerability in Citrix NetScaler ADC and NetScaler Gateway appliances configured as a SAML identity provider (IDP), to extract sensitive information, including authenticated administrative session IDs, potentially leading to full system takeover.

citrix netscaler cve-2026-3055 memory-overread information-disclosure
2r 3t
high advisory

code-projects Student Membership System SQL Injection Vulnerability (CVE-2026-5195)

A remote SQL injection vulnerability exists in the User Registration Handler component of code-projects Student Membership System 1.0, exploitable through manipulation of input.

sql-injection web-application cve-2026-5195
2r 1t 1c
high advisory

DELMIA Factory Resource Manager Stored XSS Vulnerability (CVE-2025-10553)

A stored cross-site scripting (XSS) vulnerability in DELMIA Factory Resource Manager from Release 3DEXPERIENCE R2023x through Release 3DEXPERIENCE R2025x (CVE-2025-10553) allows attackers to execute arbitrary script code within a user's browser session.

xss vulnerability web-application
2r 1t 1c
high advisory

DELMIA Factory Resource Manager Path Traversal Vulnerability (CVE-2025-10559)

CVE-2025-10559 is a path traversal vulnerability in DELMIA Factory Resource Manager, affecting versions 3DEXPERIENCE R2023x through R2025x, which allows an attacker with low privileges to read or write files in specific directories on the server, potentially leading to information disclosure or code execution.

path-traversal vulnerability delmia cve-2025-10559
2r 1t 1c
high advisory

ENOVIA Collaborative Industry Innovator Stored XSS Vulnerability (CVE-2025-10551)

A stored cross-site scripting (XSS) vulnerability in ENOVIA Collaborative Industry Innovator allows an attacker to execute arbitrary script code in a user's browser session by injecting malicious code into document management functions.

xss cve-2025-10551 enovia
2r 1t 1c
critical advisory

ImageMagick Multiple Vulnerabilities Leading to DoS, Code Execution, or Data Manipulation

Multiple vulnerabilities in ImageMagick could allow an attacker to perform a denial of service attack, execute arbitrary code, or manipulate data.

imagemagick vulnerability dos code_execution data_manipulation
2r 1t
critical advisory

Compromised trivy-action GitHub Action Leads to Credential Theft

The trivy-action GitHub Action was compromised via git tag repointing, where 76 of 77 release tags were retroactively poisoned, leading to a multi-stage credential theft operation discovered following a spike in script execution detections on Linux runners.

supply-chain github-actions credential-theft
2r 1t
critical advisory

Compromised trivy-action GitHub Action Leads to Credential Theft

The aquasecurity/trivy-action GitHub Action was compromised via git tag repointing, injecting malicious code into the entrypoint.sh script to steal credentials from CI/CD pipelines before executing the legitimate Trivy scanner.

supply-chain github-actions credential-theft
2r 1t
critical advisory

Compromised trivy-action GitHub Action Leads to Credential Theft

The trivy-action GitHub Action, a widely used vulnerability scanner in CI/CD pipelines, was compromised via git tag repointing to inject a multi-stage credential stealer, affecting 76 of 77 release tags.

supply-chain github-actions credential-theft linux
2r 2t
high advisory

SQL Injection Vulnerability in SourceCodester Simple Doctors Appointment System 1.0 (CVE-2026-5180)

A SQL Injection vulnerability (CVE-2026-5180) exists in SourceCodester Simple Doctors Appointment System 1.0, allowing remote attackers to execute arbitrary SQL commands by manipulating the 'email' parameter in the /admin/ajax.php?action=login2 endpoint.

sql-injection vulnerability web-application
2r 1t 1c
high advisory

SQL Injection Vulnerability in SourceCodester Simple Doctors Appointment System 1.0 (CVE-2026-5179)

A SQL injection vulnerability (CVE-2026-5179) exists in SourceCodester Simple Doctors Appointment System 1.0, allowing remote attackers to execute arbitrary SQL commands by manipulating the Username argument in the /admin/login.php file, with a public exploit available.

sql-injection web-application vulnerability
2r 1t 1c
high advisory

vcpkg OpenSSL Windows Build Path Vulnerability (CVE-2026-34054)

A vulnerability exists in vcpkg versions prior to 3.6.1#3, where Windows builds of OpenSSL set openssldir to a path on the build machine, making that path vulnerable to attack on customer machines.

vulnerability openssl vcpkg cwe-427 windows
2r 2t 1c
high advisory

SciTokens Authorization Bypass Vulnerability (CVE-2026-32716)

SciTokens versions prior to 1.9.6 incorrectly validate scope paths using a prefix match, leading to an authorization bypass vulnerability where a token with access to a specific path can access sibling paths with the same prefix.

authorization-bypass scitokens CVE-2026-32716
2r 1t 1c
critical advisory

act Project Cache Poisoning Vulnerability Leads to Potential RCE

A vulnerability in versions prior to 0.2.86 of the act project allows remote attackers to create arbitrary caches, potentially leading to remote code execution within Docker containers by poisoning predicted cache keys.

act cache-poisoning rce github-actions linux
2r 1t 1c
high advisory

Moby Authorization Plugin Bypass Vulnerability (CVE-2026-34040)

A security vulnerability in Moby (prior to v29.3.1) allows attackers to bypass authorization plugins, potentially leading to unauthorized container access and privilege escalation.

containerization authorization bypass privilege escalation cve-2026-34040
2r 2t 1c
high advisory

SciTokens Library Path Traversal Vulnerability (CVE-2026-32727)

A path traversal vulnerability (CVE-2026-32727) in SciTokens library versions prior to 1.9.7 allows attackers to bypass intended directory restrictions using dot-dot sequences in the scope claim of a token due to improper path normalization.

scitokens path-traversal cve-2026-32727 vulnerability
2r 1t 1c
critical advisory

SciTokens KeyCache SQL Injection Vulnerability (CVE-2026-32714)

A SQL injection vulnerability exists in SciTokens versions before 1.9.6, allowing attackers to execute arbitrary SQL commands via the KeyCache class by manipulating user-supplied data used in SQL query construction.

sql-injection scitokens cve-2026-32714 web-application
2r 3t 1c
critical advisory

Totolink A3300R Command Injection Vulnerability (CVE-2026-5176)

A command injection vulnerability (CVE-2026-5176) exists in the setSyslogCfg function of the Totolink A3300R router version 17.0.0cu.557_b20221024, allowing remote attackers to execute arbitrary commands by manipulating arguments in the /cgi-bin/cstecgi.cgi file.

command-injection cve-2026-5176 totolink router
2r 1t 1c
critical advisory

baserCMS OS Command Injection Vulnerability (CVE-2026-21861)

baserCMS versions prior to 5.2.3 are vulnerable to OS command injection, allowing an authenticated administrator to execute arbitrary commands on the server via maliciously crafted input to the core update functionality.

cve-2026-21861 command-injection webserver
2r 1t 1c
medium advisory

baserCMS DOM-Based Cross-Site Scripting Vulnerability (CVE-2026-32734)

baserCMS versions prior to 5.2.3 are vulnerable to DOM-based Cross-Site Scripting (XSS) due to improper neutralization of input during web page generation, potentially allowing a remote attacker to execute arbitrary JavaScript in a user's browser.

xss vulnerability basercms
2r 1t 1c
critical advisory

baserCMS OS Command Injection Vulnerability (CVE-2026-30877)

baserCMS prior to version 5.2.3 contains an OS command injection vulnerability in the update functionality, allowing authenticated administrators to execute arbitrary OS commands on the server.

basercms command-injection webserver
2r 1t 1c
critical advisory

baserCMS Pre-Auth Arbitrary Code Execution via Zip Upload (CVE-2025-32957)

baserCMS versions prior to 5.2.3 are vulnerable to arbitrary code execution via a crafted zip file upload through the restore function, leading to unauthenticated remote command execution on the webserver.

basercms rce cve-2025-32957 webserver
2r 6t 1c
critical advisory

Tenda CH22 Router Stack-Based Buffer Overflow Vulnerability

A stack-based buffer overflow vulnerability exists in Tenda CH22 1.0.0.1 via manipulation of the `mit_linktype` argument in the `/goform/QuickIndex` endpoint, potentially enabling remote code execution.

cve-2026-5156 buffer-overflow tenda router
2r 1t 1c