Skip to content
Threat Feed

March 2026 (30)

critical advisory

Multiple Vulnerabilities in Canva Affinity, TP-Link, and HikVision Devices

Cisco Talos disclosed multiple vulnerabilities in Canva Affinity, TP-Link Archer AX53, and HikVision Ultra Face Recognition Terminal products which could lead to sensitive information disclosure, arbitrary code execution, or credentials leak if exploited.

vulnerability code-execution information-disclosure
3r 6t
high advisory

OpenClaw Symlink Traversal via IDENTITY.md appendFile in agents.create/update

OpenClaw is vulnerable to symlink traversal via IDENTITY.md appendFile in agents.create/update. An attacker who can place a symlink in the agent workspace can hijack the IDENTITY.md path to append attacker-controlled content to arbitrary files on the system leading to remote code execution, persistent code execution, unauthorized SSH access, or service disruption.

openclaw symlink-traversal vulnerability npm rce persistence
2r 2t
high advisory

BadAML Injection Allows Arbitrary Code Execution in Confidential VMs

The BadAML injection attack allows arbitrary code execution in confidential VMs by exploiting the ACPI interface, enabling attackers with host control to execute malicious AML code within the guest.

badaml acpi injection confidential-computing
2r 1t
high advisory

CVE-2026-4926: Regular Expression Denial of Service

CVE-2026-4926 describes a denial-of-service vulnerability due to an inefficient regular expression complexity issue when handling multiple sequential optional groups, leading to exponential growth and resource exhaustion.

denial-of-service regex cve
2r 2t
high advisory

EVerest CAN Interface Stack Buffer Overflow Vulnerability (CVE-2026-23995)

A stack-based buffer overflow vulnerability exists in EVerest EV charging software stack versions prior to 2026.02.0. Passing an interface name longer than 16 characters to CAN open routines overflows `ifreq.ifr_name`, potentially leading to code execution.

everest buffer-overflow cve-2026-23995 ev-charging
2r 3t
high advisory

EVerest Out-of-Bounds Access Vulnerability (CVE-2026-26008)

EVerest, an EV charging software stack, has an out-of-bounds access vulnerability in versions prior to 2026.02.0, which can lead to remote crash or memory corruption when the CSMS sends UpdateAllowedEnergyTransferModes over the network.

cve ev-charging out-of-bounds denial-of-service
2r 2t
high advisory

Kestra Orchestration Platform XSS Vulnerability (CVE-2026-33664)

Kestra versions up to 1.3.3 are vulnerable to a cross-site scripting (XSS) vulnerability (CVE-2026-33664) allowing arbitrary JavaScript execution by viewing crafted flow metadata.

kestra xss cve-2026-33664 orchestration
2r 1t
high advisory

LIBPNG Out-of-Bounds Read/Write Vulnerability in Neon Optimization (CVE-2026-33636)

An out-of-bounds read and write vulnerability in LIBPNG's ARM/AArch64 Neon-optimized palette expansion path (CVE-2026-33636) allows attackers to potentially achieve denial-of-service or arbitrary code execution by crafting malicious PNG images.

libpng png oob CVE-2026-33636 vulnerability defense-evasion privilege-escalation
2r 2t
critical advisory

Tenda AC5 Stack-Based Buffer Overflow Vulnerability (CVE-2026-4903)

A stack-based buffer overflow vulnerability exists in Tenda AC5 version 15.03.06.47, allowing remote attackers to execute arbitrary code by manipulating the `PPPOEPassword` argument in the `formQuickIndex` function of the `/goform/QuickIndex` component.

cve-2026-4903 buffer-overflow tenda
2r 1t
high advisory

Zen C Compiler Stack-Based Buffer Overflow (CVE-2026-33491)

A stack-based buffer overflow vulnerability in Zen C compiler versions before 0.4.4 allows attackers to crash the compiler or potentially execute arbitrary code via a crafted `.zc` source file with overly long identifiers.

cve buffer_overflow compiler
2r 2t
high advisory

Red Hat OpenShift AI Llama Stack Unauthorized Access Vulnerability (CVE-2025-12805)

CVE-2025-12805 describes a flaw in Red Hat OpenShift AI (RHOAI) llama-stack-operator that allows unauthorized access to Llama Stack services in other namespaces via direct network requests due to missing NetworkPolicy restrictions, potentially enabling attackers to view or manipulate sensitive data.

openshift kubernetes networkpolicy unauthorized-access
2r 1t
critical advisory

Critical Vulnerabilities in n8n Workflow Automation Tool

Multiple critical vulnerabilities in n8n, including prototype pollution, code injection, and SQL injection, allow authenticated users to achieve remote code execution, read sensitive files, and perform unauthorized database operations.

n8n vulnerability rce sqli code-injection
3r 2t
high advisory

Doveadm Credentials Vulnerable to Timing Oracle Attack (CVE-2026-27856)

Doveadm credentials are verified using direct comparison, making it susceptible to timing oracle attacks, allowing attackers to determine credentials and gain full access.

vulnerability timing oracle credential access doveadm
2r 1t
medium advisory

ManageSieve AUTHENTICATE Command Denial-of-Service Vulnerability (CVE-2025-59032)

CVE-2025-59032 describes a vulnerability in ManageSieve's AUTHENTICATE command, where using a literal as a SASL initial response can crash the ManageSieve service, leading to a denial-of-service condition.

denial-of-service managesieve cve-2025-59032 mail-service
2r 1t
high advisory

Spring AI Redis Store TAG Injection Vulnerability (CVE-2026-22744)

CVE-2026-22744 is a code injection vulnerability in Spring AI's RedisFilterExpressionConverter which allows an attacker to inject arbitrary commands into RediSearch TAG blocks via unescaped user-controlled strings, affecting versions 1.0.0 before 1.0.5 and 1.1.0 before 1.1.4.

injection spring-ai redis
2r 1t
high advisory

Spring AI BedrockProxyChatModel SSRF Vulnerability (CVE-2026-22742)

Spring AI's spring-ai-bedrock-converse library is vulnerable to Server-Side Request Forgery (SSRF) due to insufficient validation of user-supplied media URLs in multimodal messages, allowing attackers to trigger HTTP requests to internal or external destinations.

ssrf spring-ai bedrockproxychatmodel cve-2026-22742
2r 1t
critical advisory

Spring AI SimpleVectorStore SpEL Injection Vulnerability (CVE-2026-22738)

A SpEL injection vulnerability exists in Spring AI's SimpleVectorStore when a user-supplied value is used as a filter expression key, potentially allowing malicious actors to execute arbitrary code in vulnerable applications.

spel-injection spring-ai cve-2026-22738 code-execution
2r 1t
high advisory

Shenzhen Ruiming Technology Streamax Crocus bis SQL Injection Vulnerability

A SQL injection vulnerability (CVE-2026-4910) exists in Shenzhen Ruiming Technology Streamax Crocus bis 1.3.44 via the /RemoteFormat.do endpoint, allowing remote attackers to execute arbitrary SQL commands by manipulating the State argument.

cve-2026-4910 sql-injection streamax webserver
2r 1t
high advisory

cpp-httplib Vulnerability Leads to Credential Leakage via HTTP Redirects

The cpp-httplib library prior to version 0.39.0 forwards stored authentication credentials to arbitrary hosts via HTTP redirects, potentially exposing sensitive information to malicious actors.

cpp-httplib credential-leak cve-2026-33745 http-redirect credential-access cross-origin
2r 1t
critical advisory

Tenda AC5 Stack-Based Buffer Overflow Vulnerability

A stack-based buffer overflow vulnerability (CVE-2026-4905) exists in Tenda AC5 firmware version 15.03.06.47 allowing remote attackers to execute arbitrary code by manipulating the 'index' argument in a POST request to the /goform/WifiWpsOOB endpoint.

buffer-overflow tenda router cve-2026-4905
2r 1t
critical advisory

vLLM Remote Code Execution Vulnerability (CVE-2026-27893)

vLLM versions before 0.18.0 are vulnerable to remote code execution due to hardcoded trust of remote code, even when explicitly disabled by the user, allowing attackers to execute arbitrary code via malicious model repositories.

vLLM RCE CVE-2026-27893
2r 1t
critical advisory

Incus Instance Template Vulnerability CVE-2026-33897

A vulnerability in Incus versions prior to 6.23.0 allows for arbitrary read and write access as root on the host server by exploiting a missing chroot isolation in the pongo2 template engine.

incus template-injection privilege-escalation CVE-2026-33897 linux
3r 1t
high advisory

C2C CI utils Vulnerable to DoS via pyasn Dependency (CVE-2026-30922)

The c2cciutils package is vulnerable to denial of service due to an uncontrolled recursion vulnerability (CWE-674) in the pyasn dependency, specifically versions before 1.1.65.

denial-of-service pyasn c2cciutils dependency-vulnerability
2r 1t
high advisory

Sharp CMS Path Traversal Vulnerability (CVE-2026-33686)

A path traversal vulnerability exists in Sharp CMS versions prior to 9.20.0 due to improper sanitization of file extensions, potentially allowing attackers to bypass security restrictions and access sensitive files.

path-traversal cms laravel web-application
2r 1t
high advisory

Forge Ed25519 Signature Forgery Vulnerability

Forge is vulnerable to signature forgery in Ed25519 due to a missing check that S < L, allowing non-canonical signatures and potentially bypassing authentication/authorization logic, affecting versions before 1.4.0.

ed25519 signature-forgery forge javascript
2r 1t
high advisory

Node-Forge Certificate Chain Verification Bypass due to basicConstraints Violation

Node-forge's certificate chain verification fails to enforce RFC 5280 basicConstraints, allowing leaf certificates without basicConstraints and keyUsage extensions to act as Certificate Authorities, leading to potential certificate forgery and man-in-the-middle attacks.

certificate-forgery man-in-the-middle node-forge basicConstraints
2r 3t
high advisory

OpenClaw ACP Chat Command Injection Vulnerability

A vulnerability in the openclaw npm package before version 2026.3.22 allowed mutating internal ACP chat commands without requiring operator.admin scope enforcement, potentially allowing unauthorized control-plane actions.

openclaw acp chat-command-injection vulnerability
2r
critical advisory

Ruckus Unleashed Authenticated Remote Code Execution via CVE-2023-7338

CVE-2023-7338 is a remote code execution vulnerability affecting Ruckus Unleashed when gateway mode is enabled, allowing authenticated remote attackers to execute arbitrary code by sending specially crafted requests through the web-based management interface.

CVE-2023-7338 ruckus rce os command injection
2r 3t
high advisory

Ory Polis DOM-based XSS Vulnerability (CVE-2026-33506)

Ory Polis versions prior to 26.2.0 are vulnerable to DOM-based XSS due to improper handling of the `callbackUrl` parameter, allowing attackers to execute arbitrary JavaScript in a user's browser.

xss ory-polis cve-2026-33506 cloud
2r 1t
high advisory

OpenClaw Nostr DM Unauthorized Crypto Computation Vulnerability

The openclaw npm package before version 2026.3.22 allows unauthorized pre-authentication computation due to improper handling of inbound Nostr DMs, where crypto and dispatch work are performed before enforcing sender and pairing policies.

supply-chain vulnerability npm
2r