Skip to content
Threat Feed

Tag

Web-Application

213 briefs RSS
critical advisory

OpenMRS Module Upload Path Traversal Vulnerability

OpenMRS versions 2.7.8 and earlier, as well as versions 2.8.0 through 2.8.5, are vulnerable to a path traversal (Zip Slip) attack via the `POST /openmrs/ws/rest/v1/module` endpoint that allows authenticated attackers to achieve arbitrary file write and remote code execution.

openmrs-web +1 path-traversal zip-slip rce openmrs web-application
2r 1t
high advisory

Quarkus Vertx HTTP Authorization Bypass via Matrix Parameters

Quarkus Vertx HTTP versions < 3.20.6.1, >= 3.21.0 and < 3.27.3.1, >= 3.30.0 and < 3.33.1.1, and >= 3.34.0 and < 3.35.1.1 are vulnerable to an authorization bypass where appending a semicolon and arbitrary text to the request URL allows unauthorized access to protected resources.

Quarkus Vertx HTTP +3 authentication-bypass authorization-bypass web-application
2r 2t
critical advisory

Langflow Multiple Vulnerabilities Allow Code Execution

An authenticated remote attacker can exploit multiple unspecified vulnerabilities in Langflow to achieve arbitrary code execution.

Langflow code-execution web-application
2r 1t
high advisory

YunaiV yudao-cloud Authentication Bypass Vulnerability (CVE-2026-7710)

YunaiV yudao-cloud up to version 3.8.0 is vulnerable to an authentication bypass (CVE-2026-7710) due to improper handling of the mock-token argument in the JwtAuthenticationTokenFilter.java file, allowing remote attackers to bypass authentication.

yudao-cloud <= 3.8.0 +1 authentication bypass cve-2026-7710 web application
2r 1t 1c
critical advisory

Tiandy Easy7 Integrated Management Platform OS Command Injection Vulnerability

CVE-2026-7698 allows for remote OS command injection in Tiandy Easy7 Integrated Management Platform 7.17.0 via manipulation of the 'week' argument in the /Easy7/rest/systemInfo/updateDbBackupInfo file.

Easy7 Integrated Management Platform cve-2026-7698 command-injection web-application
2r 1t 1c
high threat

Jinher OA 1.0 SQL Injection Vulnerability (CVE-2026-7670)

Jinher OA 1.0 is vulnerable to remote SQL injection via the DeptIDList parameter in the /C6/JHSoft.Web.PlanSummarize/UserSel.aspx file, potentially allowing attackers to execute arbitrary SQL queries.

OA 1.0 sql-injection cve-2026-7670 web-application
2r 1t 1c
high threat

InnoShop Improper Authentication Vulnerability (CVE-2026-7630)

InnoShop version 0.7.8 and earlier contains an improper authentication vulnerability in the InstallServiceProvider::boot function (CVE-2026-7630) that allows remote attackers to bypass authentication and gain unauthorized access to the installation endpoint.

exploited InnoShop cve authentication bypass web application
2r 1t 1c
high advisory

code-projects Online Hospital Management System SQL Injection Vulnerability

CVE-2026-7632 is a SQL injection vulnerability in code-projects Online Hospital Management System 1.0, allowing a remote attacker to execute arbitrary SQL commands by manipulating the 'delid' argument in the '/viewappointment.php' file.

Online Hospital Management System 1.0 sql-injection web-application vulnerability
2r 1t 1c
critical advisory

OS Command Injection Vulnerability in p_69_branch_monkey_mcp Preview Endpoint (CVE-2026-7590)

A remote attacker can inject OS commands by manipulating the dev_script argument in the Preview Endpoint of eyal-gor's p_69_branch_monkey_mcp (up to commit 69bc71874ce40050ef45fde5a435855f18af3373), leading to arbitrary code execution on the server.

p_69_branch_monkey_mcp command-injection web-application cve
2r 1t 1c
high advisory

Zyosoft School App Insecure Direct Object Reference Vulnerability

Zyosoft's School App contains an Insecure Direct Object Reference vulnerability (CVE-2026-7491) that allows authenticated remote attackers to modify parameters and access or modify other users' data.

School App idor vulnerability web application cve-2026-7491
2r 3t 1c
high advisory

Sunnet CTMS SQL Injection Vulnerability (CVE-2026-7489)

Sunnet CTMS is vulnerable to SQL injection (CVE-2026-7489), allowing authenticated remote attackers to execute arbitrary SQL commands and compromise the database.

CTMS sqli cve-2026-7489 web-application
2r 1t 1c
high advisory

Flux159 mcp-game-asset-gen Path Traversal Vulnerability

A path traversal vulnerability exists in Flux159 mcp-game-asset-gen version 0.1.0, where manipulation of the `statusFile` argument in the `image_to_3d_async` function allows for remote exploitation.

mcp-game-asset-gen 0.1.0 path-traversal vulnerability web-application
2r 1t 1c
high advisory

SQL Injection Vulnerability in itsourcecode Courier Management System

itsourcecode Courier Management System 1.0 is vulnerable to SQL Injection via the ID parameter in /edit_staff.php, potentially allowing remote attackers to execute arbitrary SQL commands.

Courier Management System sql-injection web-application cve
2r 1t 1c
high advisory

SourceCodester Pharmacy Sales and Inventory System SQL Injection Vulnerability

SourceCodester Pharmacy Sales and Inventory System 1.0 is vulnerable to remote SQL injection via the ID parameter in the /ajax.php?action=delete_customer endpoint, allowing attackers to potentially read, modify, or delete database information.

Pharmacy Sales and Inventory System 1.0 sql-injection web-application vulnerability
2r 1t 1c
high advisory

SourceCodester Pharmacy Sales and Inventory System SQL Injection Vulnerability

CVE-2026-7550 is an SQL injection vulnerability in SourceCodester Pharmacy Sales and Inventory System 1.0, allowing remote attackers to execute arbitrary SQL commands by manipulating the ID argument in the /ajax.php?action=save_customer endpoint.

Pharmacy Sales and Inventory System 1.0 sql-injection web-application cve-2026-7550
2r 1t 1c
high advisory

SourceCodester Advanced School Management System SQL Injection Vulnerability

A SQL injection vulnerability (CVE-2026-7545) exists in SourceCodester Advanced School Management System 1.0 within the checkEmail endpoint of commonController.php, allowing remote attackers to potentially execute arbitrary SQL commands.

Advanced School Management System 1.0 sqli vulnerability web-application
2r 1t 1c
high advisory

Fujian Apex LiveBOS Path Traversal Vulnerability

A path traversal vulnerability exists in Fujian Apex LiveBOS version 2.0 and earlier, allowing remote attackers to read arbitrary files by manipulating the filename argument in the /feed/UploadImage.do endpoint.

LiveBOS path-traversal web-application cve-2026-7519
2r 1t 1c
critical advisory

SSCMS v7.4.0 SQL Injection Vulnerability in stl:sqlContent Tag

SSCMS v7.4.0 is vulnerable to SQL injection via the stl:sqlContent tag's queryString attribute, allowing attackers to execute arbitrary SQL statements through crafted payloads submitted to the /api/stl/actions/dynamic endpoint.

SSCMS 7.4.0 sqli cve-2026-7435 web-application
2r 1t 1c
high advisory

Kirby CMS Missing Authorization Vulnerability

A missing authorization vulnerability in Kirby CMS allows authenticated users to bypass intended access restrictions on pages and files, potentially leading to unauthorized information disclosure and content modification; patched in versions 4.9.0 and 5.4.0.

cms +3 authorization web-application
2r 2t
medium advisory

1024-lab smart-admin Improper Access Control Vulnerability (CVE-2026-7468)

CVE-2026-7468 is an improper access control vulnerability in 1024-lab smart-admin up to version 3.30.0, affecting the /smart-admin-api/druid/index.html file, which can be exploited remotely.

smart-admin access-control vulnerability web-application
2r 1t 1c
medium advisory

Admidio SAML Signature Validation Bypass Allows Forged AuthnRequests and LogoutRequests

Admidio's SAML Identity Provider implementation fails to properly validate signatures on SAML AuthnRequests and LogoutRequests, enabling attackers to bypass signature enforcement, potentially disclose user attributes via forged SSO requests, and terminate user sessions via forged SLO requests.

admidio saml signature-bypass authentication authorization web-application
2r 5t
high advisory

Relative Path Traversal Vulnerability in mcpo-simple-server

A relative path traversal vulnerability exists in getsimpletool mcpo-simple-server <= 0.2.0, allowing remote attackers to delete arbitrary files via manipulation of the `detail` argument in the `delete_shared_prompt` function.

mcpo-simple-server path-traversal web-application cve-2026-7404
2r 1t 1c
high advisory

XATABoost CMS 1.0.0 SQL Injection Vulnerability

XATABoost CMS 1.0.0 is vulnerable to union-based SQL injection, allowing unauthenticated attackers to manipulate database queries by injecting SQL code through the id parameter via GET requests to news.php, enabling extraction of sensitive database information.

xataboost cms 1.0.0 sql-injection web-application cve
2r 1t 1c
high advisory

Path Traversal Vulnerability in mail-mcp-bridge

A path traversal vulnerability exists in fatbobman mail-mcp-bridge version 1.3.3 and earlier, allowing a remote attacker to read arbitrary files by manipulating the message_ids argument in the src/mail_mcp_server.py file.

mail-mcp-bridge path-traversal vulnerability web-application
2r 1t 1c
high advisory

EyouCMS SQL Injection Vulnerability (CVE-2026-7389)

A remote SQL injection vulnerability (CVE-2026-7389) exists in EyouCMS versions up to 1.7.9 due to improper handling of the 'sort_asc' argument in the GetSortData function, potentially allowing attackers to execute arbitrary SQL commands.

EyouCMS sql-injection cve-2026-7389 web-application
2r 1t 1c
high advisory

Eiceblue Spire-PDF-MCP-Server Path Traversal Vulnerability (CVE-2026-7315)

A path traversal vulnerability exists in eiceblue spire-pdf-mcp-server version 0.1.1, allowing remote attackers to access arbitrary files via manipulation of the filepath argument in the get_pdf_path function.

spire-pdf-mcp-server path-traversal web-application cve
2r 1t 1c
high advisory

eiceblue spire-doc-mcp-server Path Traversal Vulnerability

A path traversal vulnerability exists in eiceblue spire-doc-mcp-server version 1.0.0, allowing a remote attacker to access arbitrary files by manipulating the 'document_name' argument in the 'get_doc_path' function.

spire-doc-mcp-server 1.0.0 path-traversal web-application cve-2026-7314
2r 1t 1c
high threat

Elinsky execution-system-mcp Path Traversal Vulnerability

Elinsky execution-system-mcp 0.1.0 is vulnerable to path traversal via manipulation of the context argument in the _get_context_file_path function, allowing remote attackers to access sensitive files.

exploited execution-system-mcp 0.1.0 path-traversal web-application cve-2026-7319
2r 1t 1c
high advisory

SourceCodester Pharmacy Sales and Inventory System SQL Injection Vulnerability

A remote SQL injection vulnerability exists in SourceCodester Pharmacy Sales and Inventory System 1.0 via manipulation of the ID parameter in the /ajax.php?action=delete_category endpoint, potentially leading to unauthorized data access or modification.

Pharmacy Sales and Inventory System 1.0 sqli web-application cve-2026-7130
2r 1t 1c
medium advisory

ChatGPTNextWeb NextChat Server-Side Request Forgery Vulnerability

A server-side request forgery (SSRF) vulnerability in ChatGPTNextWeb NextChat up to version 2.16.1 allows remote attackers to manipulate the proxyHandler function, potentially leading to unauthorized internal resource access.

NextChat ssrf cve-2026-7177 web-application
2r 1t 1c
high advisory

AgiFlow scaffold-mcp Path Traversal Vulnerability (CVE-2026-7237)

A path traversal vulnerability (CVE-2026-7237) exists in AgiFlow scaffold-mcp versions up to 1.0.27, allowing remote attackers to write to arbitrary files by manipulating the file_path argument in the write-to-file tool.

scaffold-mcp path-traversal cve web-application
2r 1t 1c
high advisory

BrowserOperator Core Path Traversal Vulnerability (CVE-2026-7234)

A path traversal vulnerability (CVE-2026-7234) exists in BrowserOperator browser-operator-core up to version 0.6.0, allowing remote attackers to read arbitrary files by manipulating the request.url argument in the startsWith function of scripts/component_server/server.js.

browser-operator-core path-traversal web-application cve-2026-7234
2r 1t 1c
high advisory

edvardlindelof notes-mcp Path Traversal Vulnerability (CVE-2026-7212)

A path traversal vulnerability exists in edvardlindelof notes-mcp up to version 0.1.4, affecting the notes_mcp.py file, allowing a remote attacker to access sensitive files by manipulating the `root_dir/path` argument.

notes-mcp path-traversal web-application CVE-2026-7212
2r 1t 1c
high advisory

Duartium papers-mcp-server Path Traversal Vulnerability (CVE-2026-7205)

A path traversal vulnerability exists in the `search_papers` function of `src/main.py` in duartium papers-mcp-server version 9ceb3812a6458ba7922ca24a7406f8807bc55598, allowing remote attackers to read arbitrary files by manipulating the `topic` argument, with a public exploit available.

papers-mcp-server path-traversal vulnerability web-application
2r 1t 1c
high threat

dubydu sqlite-mcp SQL Injection Vulnerability (CVE-2026-7206)

A SQL injection vulnerability exists in dubydu sqlite-mcp version 0.1.0 and earlier within the extract_to_json function allowing remote exploitation through manipulation of the output_filename argument.

exploited sqlite-mcp sql-injection cve-2026-7206 web-application
2r 1c
high advisory

SourceCodester Pharmacy Sales and Inventory System SQL Injection Vulnerability (CVE-2026-7199)

A SQL injection vulnerability (CVE-2026-7199) exists in SourceCodester Pharmacy Sales and Inventory System 1.0, allowing remote attackers to execute arbitrary SQL commands by manipulating the 'ID' parameter in the `/ajax.php?action=delete_product` endpoint, potentially leading to data breach or system compromise.

Pharmacy Sales and Inventory System 1.0 sql-injection cve-2026-7199 web-application
2r 1t 1c
high advisory

Online Lot Reservation System SQL Injection Vulnerability

CVE-2026-7131 is a SQL injection vulnerability in code-projects Online Lot Reservation System up to version 1.0, affecting the /loginuser.php component via manipulation of the email/password arguments, which could allow remote attackers to execute arbitrary SQL queries.

Online Lot Reservation System sql-injection web-application cve
2r 1t 1c 1i
high advisory

SourceCodester Pharmacy Sales and Inventory System SQL Injection Vulnerability

SourceCodester Pharmacy Sales and Inventory System 1.0 is vulnerable to SQL injection by manipulating the ID argument in the /ajax.php?action=save_receiving file, allowing remote attackers to execute arbitrary SQL commands.

Pharmacy Sales and Inventory System 1.0 sqli web-application cve-2026-7088
2r 1t 1c
high advisory

itsourcecode Construction Management System SQL Injection Vulnerability

A SQL injection vulnerability exists in itsourcecode Construction Management System version 1.0, affecting the processing of the /locations.php file, allowing a remote attacker to inject SQL commands by manipulating the 'address' argument, with a publicly available exploit.

Construction Management System 1.0 sql-injection web-application cve-2026-7075
2r 1t 1c
high advisory

CodePanda Source canteen_management_system SQL Injection Vulnerability

A SQL injection vulnerability exists in CodePanda Source canteen_management_system version 1.0 within the /api/login.php file by manipulating the Username argument, allowing remote attackers to execute arbitrary SQL commands.

canteen_management_system 1.0 sql-injection cve-2026-7072 web-application
1r 1t 1c
high advisory

SQL Injection Vulnerability in code-projects Inventory Management System 1.0

A SQL injection vulnerability exists in code-projects Inventory Management System 1.0 within the Login component, specifically affecting the Username argument, where a remote attacker can manipulate the Username parameter, leading to unauthorized data access or modification.

Inventory Management System 1.0 sql-injection web-application vulnerability
2r 1t 1c
high advisory

code-projects Employee Management System SQL Injection Vulnerability (CVE-2026-7063)

CVE-2026-7063 is a SQL Injection vulnerability in code-projects Employee Management System 1.0 via the 'pwd' parameter in /370project/process/eprocess.php, enabling remote attackers to execute arbitrary SQL commands.

Employee Management System 1.0 sqli cve-2026-7063 web-application
2r 1t 1c
high advisory

KLiK SocialMediaWebsite SQL Injection Vulnerability (CVE-2026-7002)

KLiK SocialMediaWebsite up to version 1.0.1 is vulnerable to SQL injection via manipulation of the c_id argument in the /includes/get_message_ajax.php file, specifically affecting the Private Message Handler component, which can be exploited remotely.

SocialMediaWebsite sql-injection vulnerability web-application
2r 1t 1c
high advisory

PicoClaw Web Launcher Management Plane Command Injection Vulnerability

PicoClaw version 0.2.4 is vulnerable to command injection via the /api/gateway/restart endpoint of the Web Launcher Management Plane, allowing a remote attacker to execute arbitrary commands by manipulating input.

PicoClaw command-injection vulnerability web-application
2r 1t 1c
medium advisory

vanna-ai vanna Improper Authorization Vulnerability (CVE-2026-6977)

An improper authorization vulnerability (CVE-2026-6977) exists in vanna-ai vanna up to version 2.0.2 due to manipulation of an unknown function within the Legacy Flask API, potentially allowing remote attackers to bypass intended access restrictions.

vanna vulnerability authorization web application
2r 1t 1c
medium advisory

OpenClaw Cross-Site Request Forgery Vulnerability

OpenClaw before 2026.3.31 is vulnerable to cross-site request forgery (CSRF) attacks due to missing browser-origin validation in HTTP operator endpoints when operating in trusted-proxy mode, allowing attackers to perform unauthorized actions.

OpenClaw csrf web-application vulnerability
2r 1t 1c
critical advisory

Xerte Online Toolkits Unauthenticated Remote Code Execution via File Upload

Xerte Online Toolkits 3.15 and earlier contain an incomplete input validation vulnerability allowing unauthenticated attackers to upload malicious PHP code with a '.php4' extension, leading to arbitrary operating system command execution on the server.

Online Toolkits cve-2026-34415 rce file-upload web-application
2r 3t 1c
high advisory

Daptin SQL Injection Vulnerability in Aggregate API

A SQL injection vulnerability exists in Daptin versions prior to 0.11.4 within the `/aggregate/:typename` endpoint, where the `column` and `group` query parameters are passed to `goqu.L()` without validation, allowing authenticated users to inject arbitrary SQL expressions and exfiltrate sensitive data.

Daptin sql-injection web-application
2r 1t
high advisory

SiYuan Path Traversal via Double URL Encoding in `/export/` Endpoint

SiYuan is vulnerable to path traversal via double URL encoding in the `/export/` endpoint, bypassing an incomplete fix for CVE-2026-30869; an authenticated attacker can exploit this vulnerability to traverse directories and read arbitrary workspace files, including the SQLite database (`siyuan.db`), kernel log, and user documents due to a redundant `url.PathUnescape()` call in `serveExport()`.

siyuan path-traversal web-application
2r 1t 1c 1i
medium advisory

FreeScout Incorrect Authorization Vulnerability via Save Draft

FreeScout before 1.8.215 has an incorrect authorization vulnerability where a direct POST request to the `save_draft` AJAX path can create a draft inside a hidden conversation when `APP_SHOW_ONLY_ASSIGNED_CONVERSATIONS` is enabled, potentially allowing unauthorized access or modification of data.

cve authorization web application
2r 1t 1c 4i
critical advisory

Vvveb CMS 1.0.8 Remote Code Execution via Malicious Upload

Vvveb CMS 1.0.8 is vulnerable to remote code execution, allowing authenticated attackers to upload a PHP webshell with a .phtml extension, bypass extension restrictions, and execute arbitrary operating system commands by requesting the uploaded file.

cve-2026-6249 rce web-application
2r 1t 1c
high advisory

Rowboatlabs Rowboat Improper Authentication Vulnerability (CVE-2026-6635)

An improper authentication vulnerability in rowboatlabs rowboat <=0.1.67 allows remote attackers to bypass authentication by manipulating the X-Tools-JWE argument in the tool_call function, potentially leading to unauthorized access and control.

cve-2026-6635 authentication bypass web application
2r 1t 1c
high advisory

Metasoft MetaCRM SQL Injection Vulnerability (CVE-2026-6629)

A SQL injection vulnerability (CVE-2026-6629) exists in Metasoft MetaCRM up to version 6.4.0, allowing remote attackers to execute arbitrary SQL commands via manipulation of the sql argument in the Statement.executeUpdate function of the sql.jsp file.

cve-2026-6629 sql-injection web-application metasoft
2r 1t
critical advisory

Digiwin EasyFlow .NET SQL Injection Vulnerability (CVE-2026-5964)

Digiwin's EasyFlow .NET is susceptible to a SQL Injection vulnerability, enabling unauthenticated remote attackers to inject arbitrary SQL commands for unauthorized database access, modification, and deletion.

sql-injection vulnerability web-application
2r 1t 1c
high advisory

liangliangyy DjangoBlog Hardcoded Cryptographic Key Vulnerability (CVE-2026-6580)

CVE-2026-6580 describes a vulnerability in liangliangyy DjangoBlog up to version 2.1.0.0 where manipulation of the 'key' argument in the Amap API Call Handler leads to the use of a hard-coded cryptographic key, enabling remote exploitation.

cve-2026-6580 djangoblog hardcoded-key web-application
2r 1c
critical advisory

liangliangyy DjangoBlog Authentication Bypass Vulnerability (CVE-2026-6577)

A critical authentication bypass vulnerability in liangliangyy DjangoBlog up to version 2.1.0.0 (CVE-2026-6577) allows remote attackers to inject arbitrary GPS data without authentication via the logtracks endpoint, potentially leading to data manipulation and unauthorized access.

cve-2026-6577 djangoblog authentication-bypass gps-injection web-application
2r 1t 1c
high advisory

osuuu LightPicture Hardcoded Credentials Vulnerability (CVE-2026-6574)

CVE-2026-6574 allows remote attackers to manipulate the 'key' argument in the /public/install/lp.sql file via the API Upload Endpoint in osuuu LightPicture <= 1.2.2, leading to hardcoded credentials exposure.

cve-2026-6574 hardcoded-credentials web-application
2r 1t 1c
high advisory

WeGIA SQL Injection Vulnerability (CVE-2026-40285)

WeGIA versions prior to 3.6.10 are vulnerable to SQL injection via the cpf_usuario POST parameter, allowing authenticated users to query the database under an arbitrary identity.

wegia sql-injection cve-2026-40285 web-application
2r 1t 1c
high advisory

PraisonAI Multiple Backends Vulnerable to SQL Injection via Unvalidated Table Prefix

PraisonAI is vulnerable to SQL injection across nine database backends due to unsanitized `table_prefix` parameters, and in PostgreSQL due to an unsanitized `schema` parameter, enabling arbitrary SQL execution.

sql-injection praisonai web-application
2r 1t 1c
high advisory

YesWiki Authenticated SQL Injection Vulnerability

YesWiki is vulnerable to authenticated SQL Injection via the id_fiche parameter in the EntryManager::formatDataBeforeSave() function, allowing attackers to inject arbitrary SQL commands and potentially extract sensitive data.

yeswiki sql-injection web-application
2r 1t 2i
medium advisory

Movary SSRF Vulnerability (CVE-2026-40348)

Movary versions before 0.71.1 are vulnerable to server-side request forgery (SSRF) via the `/settings/jellyfin/server-url-verify` endpoint, allowing authenticated users to probe internal network resources.

ssrf cve-2026-40348 movary web-application
2r 2t 1c
high advisory

Movary Privilege Escalation Vulnerability (CVE-2026-40349)

Movary versions prior to 0.71.1 allow authenticated users to escalate privileges to administrator by manipulating the `isAdmin` field via a PUT request to the `/settings/users/{userId}` endpoint, due to missing authorization checks.

privilege-escalation web-application cve-2026-40349
2r 1t 1c 1i
medium advisory

WeGIA Stored Cross-Site Scripting Vulnerability (CVE-2026-40286)

A stored Cross-Site Scripting (XSS) vulnerability exists in WeGIA versions prior to 3.6.10, allowing attackers to inject malicious scripts into the 'Member Name' field during member registration, leading to persistent execution upon user access.

xss web-application cve-2026-40286
2r 1t 1c
high advisory

Weblate Improper Privilege Management via API Endpoint (CVE-2026-34393)

Weblate versions prior to 5.17 are vulnerable to improper privilege management due to an API endpoint failing to properly limit the scope of edits, potentially leading to unauthorized modifications.

weblate privilege-escalation web-application
2r 2t 1c
high advisory

wger Broken Access Control in Global Gym Configuration Update Endpoint

The wger application has a broken access control vulnerability in the global gym configuration update endpoint, allowing low-privileged authenticated users to modify installation-wide configuration settings and escalate privileges.

privilege-escalation broken-access-control web-application
2r 1t
critical advisory

OAuth2 Proxy Authentication Bypass via User-Agent Header

A critical authentication bypass vulnerability (CVE-2026-34457) exists in OAuth2 Proxy when used with `auth_request`-style integration and either `--ping-user-agent` is set or `--gcp-healthchecks` is enabled, allowing unauthenticated access to protected resources.

oauth2-proxy authentication-bypass web-application
2r 1t
critical advisory

manikandan580 School-management-system SQL Injection Vulnerability

A time-based blind SQL injection vulnerability in manikandan580 School-management-system 1.0 allows unauthenticated attackers to potentially execute arbitrary SQL queries and gain unauthorized access to sensitive information.

sqli cve-2025-65135 school-management-system web-application
2r 1t 1c
critical advisory

SQL Injection Vulnerability in anirudhkannan Grocery Store Management System 1.0 (CVE-2025-63939)

A critical SQL injection vulnerability (CVE-2025-63939) exists in the anirudhkannan Grocery Store Management System 1.0, allowing unauthenticated attackers to execute arbitrary SQL queries via the sitem_name POST parameter in /Grocery/search_products_itname.php.

sql-injection web-application cve-2025-63939
2r 1t 1c 2i
high advisory

PHPGurukul Daily Expense Tracking System SQL Injection Vulnerability

A remote SQL injection vulnerability exists in PHPGurukul Daily Expense Tracking System 1.1 within the /register.php file, where manipulation of the email argument allows for arbitrary SQL command execution, with a public exploit available.

sqli cve-2026-6193 php web-application
2r 1t 1c
critical advisory

Pachno 1.0.6 XML External Entity Injection Vulnerability

Pachno 1.0.6 is vulnerable to XML external entity injection, allowing unauthenticated attackers to read arbitrary files by injecting malicious XML entities into wiki content due to unsafe XML parsing in the TextParser helper.

xxe cve-2026-40042 pachno web-application
2r 2t 1c 3i
high advisory

SQL Injection Vulnerability in Simple Content Management System 1.0

A remote SQL injection vulnerability exists in code-projects Simple Content Management System 1.0, specifically affecting the /web/admin/login.php file where manipulation of the 'User' argument allows unauthenticated attackers to execute arbitrary SQL queries.

sqli web-application cve-2026-6182
2r 1t 1c 5i
high advisory

SQL Injection Vulnerability in Faculty Management System

A remote attacker can exploit an SQL injection vulnerability (CVE-2026-6167) in the code-projects Faculty Management System 1.0 by manipulating the ID argument in the /subject-print.php file, potentially leading to data exfiltration or modification.

sql-injection web-application vulnerability
2r 1t 1c
high advisory

SQL Injection Vulnerability in Vehicle Showroom Management System 1.0

A remote attacker can exploit an SQL injection vulnerability (CVE-2026-6165) in code-projects Vehicle Showroom Management System 1.0 by manipulating the ID parameter in /util/Login_check.php, potentially leading to unauthorized data access and modification.

sqli web-application cve-2026-6165
2r 1t 1c
high advisory

SQL Injection Vulnerability in Lost and Found Thing Management 1.0

A remote SQL injection vulnerability (CVE-2026-6163) exists in code-projects Lost and Found Thing Management 1.0 via manipulation of the 'cat' parameter in /catageory.php, potentially allowing attackers to read, modify, or delete database information.

sql-injection web-application vulnerability
2r 1t 1c
high advisory

Simple ChatBox Unauthenticated SQL Injection Vulnerability (CVE-2026-6161)

CVE-2026-6161 is an unauthenticated SQL injection vulnerability in the Simple ChatBox application (<= 1.0) that can be exploited by sending a crafted HTTP request to `/chatbox/insert.php`.

sql-injection web-application cve-2026-6161
2r 1t 1c
high advisory

MyT-PM 1.5.1 SQL Injection Vulnerability

MyT-PM 1.5.1 is vulnerable to SQL injection, allowing authenticated attackers to execute arbitrary SQL queries via the Charge[group_total] parameter.

sql-injection web-application cve-2019-25713
2r 1t 1c 4i
high advisory

Dolibarr ERP-CRM 8.0.4 SQL Injection Vulnerability

Dolibarr ERP-CRM 8.0.4 is vulnerable to SQL injection via the rowid parameter in the admin dict.php endpoint, allowing attackers to execute arbitrary SQL queries and extract sensitive database information.

sqli cve-2019-25710 dolibarr web-application
2r 1t 1c
high advisory

eBrigade ERP 4.5 SQL Injection Vulnerability (CVE-2019-25707)

eBrigade ERP 4.5 is vulnerable to SQL injection via the 'id' parameter in pdf.php, allowing authenticated attackers to execute arbitrary SQL queries and extract sensitive database information.

sql-injection web-application cve-2019-25707
2r 1t 1c 5i
high advisory

zhayujie chatgpt-on-wechat CowAgent Authentication Bypass Vulnerability (CVE-2026-6126)

CVE-2026-6126 is an unauthenticated remote code execution vulnerability in zhayujie chatgpt-on-wechat CowAgent 2.0.4 due to missing authentication in the Administrative HTTP Endpoint.

CVE-2026-6126 authentication-bypass web-application
2r 1t 1c
medium advisory

Chamilo LMS Session Fixation Vulnerability (CVE-2026-31940)

Chamilo LMS versions prior to 1.11.38 and 2.0.0-RC.3 are vulnerable to session fixation due to user-controlled request parameters being used to set the PHP session ID, potentially allowing attackers to hijack user sessions.

session-fixation web-application cve-2026-31940
2r 1t 1c
medium advisory

TREK Travel Planner Missing Authorization Vulnerability (CVE-2026-40185)

TREK collaborative travel planner before version 2.7.2 is vulnerable to missing authorization checks on the Immich trip photo management routes, potentially allowing unauthorized access to trip photos.

cve-2026-40185 authorization-bypass web-application
2r 1t 1c 1i
high advisory

DotNetNuke.Core Stored XSS via SVG Upload

DotNetNuke.Core is vulnerable to stored cross-site scripting (XSS) where a user can upload a specially crafted SVG file containing malicious scripts, potentially targeting both authenticated and unauthenticated DNN users, with successful exploitation requiring user interaction and leading to high impact on confidentiality, integrity, and availability.

dotnetnuke xss svg web-application
2r 2t
high advisory

CouchCMS Privilege Escalation via f_k_levels_list Parameter Manipulation (CVE-2026-29002)

CouchCMS is vulnerable to privilege escalation, allowing authenticated Admin-level users to create SuperAdmin accounts by manipulating the 'f_k_levels_list' parameter during user creation, granting them full application control.

privilege-escalation web-application cve
2r 1t 1c
high advisory

Chamilo LMS Privilege Escalation via REST API (CVE-2026-33706)

Chamilo LMS before 1.11.38 allows authenticated users with a REST API key to escalate their privileges by modifying their user status via the update_user_from_username endpoint, potentially granting unauthorized course management capabilities.

privilege-escalation web-application CVE-2026-33706
2r 1t 1c
high advisory

Chartbrew Cross-Tenant Authorization Bypass Vulnerability

Chartbrew versions prior to 4.9.0 are vulnerable to a cross-tenant authorization bypass, allowing an authenticated attacker to access project data belonging to other teams.

chartbrew authorization-bypass web-application
2r 1t 1c
high advisory

Vehicle Showroom Management System SQL Injection Vulnerability (CVE-2026-6038)

A remote SQL injection vulnerability (CVE-2026-6038) exists in the code-projects Vehicle Showroom Management System 1.0, specifically affecting the /util/RegisterCustomerFunction.php file by manipulating the BRANCH_ID argument.

cve-2026-6038 sql-injection web-application
2r 3t 1c
high advisory

SQL Injection Vulnerability in Vehicle Showroom Management System 1.0 (CVE-2026-6036)

A remote SQL injection vulnerability (CVE-2026-6036) exists in the Vehicle Showroom Management System 1.0 due to improper sanitization of the VEHICLE_ID parameter in /util/VehicleDetailsFunction.php, potentially allowing attackers to execute arbitrary SQL commands.

sqli cve-2026-6036 web-application
2r 2t 1c
high advisory

PraisonAI SSRF Vulnerability via Unvalidated Webhook URL

PraisonAI versions prior to 4.5.128 are vulnerable to Server-Side Request Forgery (SSRF) due to a lack of URL validation on the webhook_url parameter in the /api/v1/runs endpoint, allowing unauthenticated attackers to send arbitrary POST requests from the server.

ssrf praisonai cve-2026-40114 web-application
2r 3t 1c
critical advisory

AGiXT Path Traversal Vulnerability (CVE-2026-39981)

AGiXT versions prior to 1.9.2 are vulnerable to path traversal (CVE-2026-39981) due to insufficient validation in the safe_join() function, allowing authenticated attackers to read, write, or delete arbitrary files.

path-traversal cve agixt web-application
2r 3t 1c 4i
high threat

PHPGurukul News Portal Project SQL Injection Vulnerability (CVE-2026-5837)

PHPGurukul News Portal Project version 4.1 is vulnerable to SQL injection via the Comment parameter in /news-details.php, potentially allowing remote attackers to execute arbitrary SQL queries.

exploited sql-injection web-application php CVE-2026-5837
2r 1t 1c
high advisory

code-projects Simple IT Discussion Forum SQL Injection Vulnerability (CVE-2026-5829)

A remote SQL injection vulnerability (CVE-2026-5829) exists in code-projects Simple IT Discussion Forum 1.0 due to improper handling of the 'post_id' argument in the '/pages/content.php' file, allowing attackers to execute arbitrary SQL queries.

sql-injection web-application cve-2026-5829
2r 1t 1c
high advisory

Simple IT Discussion Forum SQL Injection Vulnerability (CVE-2026-5827)

CVE-2026-5827 is a SQL injection vulnerability in code-projects Simple IT Discussion Forum 1.0, allowing remote attackers to execute arbitrary SQL commands by manipulating the 'content' argument in /question-function.php.

sqli web-application injection
2r 1t 1c
high advisory

PraisonAI Unauthenticated Agent Activity Exposure (CVE-2026-39889)

PraisonAI versions prior to 4.5.115 expose agent activity without authentication due to improperly secured A2U event stream endpoints, potentially allowing unauthorized access to sensitive agent information.

cve-2026-39889 information-disclosure web-application
2r 1t 1c 1i
medium advisory

LORIS Directory Traversal Vulnerability

LORIS, a neuroimaging research data management web application, is vulnerable to directory traversal (CVE-2026-35446) due to an incorrect order of operations in the FilesDownloadHandler, allowing authenticated attackers to access unauthorized files.

directory-traversal web-application neuroimaging
2r 2t 1c
high advisory

LORIS File Traversal Vulnerability (CVE-2026-34392)

A file traversal vulnerability (CVE-2026-34392) in LORIS versions 20.0.0 to before 27.0.3 and 28.0.1 allows an unauthenticated attacker to download arbitrary files via the static file router.

file-traversal web-application cve-2026-34392
2r 1t 1c
high advisory

CoolerControl-UI Stored XSS Vulnerability (CVE-2026-5301)

Unauthenticated attackers can perform a stored XSS attack against CoolerControl/coolercontrol-ui versions less than 4.0.0 by injecting malicious JavaScript into log entries, leading to potential service takeover.

xss cve-2026-5301 web-application
2r 2t 1c
high advisory

ChurchCRM Stored XSS Vulnerability in Person Property Management

A stored cross-site scripting (XSS) vulnerability in ChurchCRM versions prior to 7.0.0 allows authenticated users to inject arbitrary JavaScript code via dynamically assigned person properties, leading to potential session hijacking or account compromise when other users view the affected profile.

xss web-application churchcrm
2r 1t 2c
critical advisory

Emmett Web Framework Path Traversal Vulnerability (CVE-2026-39847)

Emmett web framework versions 2.5.0 to before 2.8.1 are vulnerable to path traversal attacks (CVE-2026-39847), allowing attackers to read arbitrary files outside the intended assets directory using manipulated URLs.

path-traversal web-application emmett cve-2026-39847
2r 1t 1c
high advisory

ChurchCRM Authenticated API User Authorization Bypass (CVE-2026-39331)

An authenticated API user of ChurchCRM prior to v7.1.0 can bypass authorization checks and modify arbitrary family records by manipulating the familyId parameter in API requests, leading to privilege escalation and potential data manipulation.

cve-2026-39331 churchcrm authorization-bypass privilege-escalation web-application
2r 1t 1c
critical advisory

WeGIA Web Manager SQL Injection Vulnerability (CVE-2026-35395)

WeGIA web manager versions prior to 3.6.9 are vulnerable to SQL injection, allowing authenticated users to execute arbitrary SQL commands by directly interpolating the id_memorando parameter from $_REQUEST into SQL queries without validation, as identified by CVE-2026-35395.

cve-2026-35395 sql-injection web-application
2r 1t 1c
critical advisory

Brave CMS Missing Authorization Leads to Privilege Escalation

Brave CMS versions prior to 2.0.6 are vulnerable to privilege escalation due to a missing authorization check in the update role endpoint, allowing any authenticated user to gain Super Admin privileges.

cve-2026-35182 privilege-escalation web-application brave-cms
2r 1t 1c 1i
high advisory

code-projects Online FIR System SQL Injection Vulnerability

A SQL injection vulnerability in code-projects Online FIR System 1.0 allows remote attackers to execute arbitrary SQL commands by manipulating the email or password parameters in the /Login/checklogin.php file.

sqli cve-2026-5665 web-application
2r 1t 1c 6i
high advisory

GLPI Unauthenticated Time-Based Blind SQL Injection Vulnerability (CVE-2026-26263)

GLPI versions 11.0.0 to before 11.0.6 are susceptible to an unauthenticated time-based blind SQL injection vulnerability in the search engine, allowing remote attackers to potentially extract sensitive information.

sql-injection glpi cve-2026-26263 web-application
2r 1t 1c
high advisory

SQL Injection Vulnerability in Car Rental Project 1.0 (CVE-2026-5634)

A remote SQL injection vulnerability (CVE-2026-5634) exists in projectworlds Car Rental Project 1.0 via the fname parameter in /book_car.php, allowing unauthenticated attackers to potentially read, modify, or delete database information.

sqli web-application cve-2026-5634
2r 1t 1c 5i
high advisory

SQL Injection Vulnerability in projectworlds Car Rental System 1.0

A SQL injection vulnerability (CVE-2026-5637) exists in projectworlds Car Rental System 1.0's /message_admin.php, allowing remote attackers to execute arbitrary SQL commands by manipulating the 'Message' argument.

sql-injection web-application cve-2026-5637
2r 1t 1c
high advisory

GPT Researcher Authentication Bypass Vulnerability (CVE-2026-5632)

CVE-2026-5632 is an authentication bypass vulnerability in assafelovic gpt-researcher up to version 3.4.3, affecting the HTTP REST API Endpoint and allowing remote attackers to perform actions without proper authorization.

CVE-2026-5632 authentication-bypass web-application
2r 1t 1c
high advisory

Kados R10 GreenBee SQL Injection Vulnerability (CVE-2019-25704)

Kados R10 GreenBee is vulnerable to SQL injection (CVE-2019-25704), allowing attackers to manipulate database queries via the filter_user_mail parameter, potentially leading to data extraction or modification.

sql-injection cve-2019-25704 web-application
2r 1t 1c
high advisory

Kados R10 GreenBee SQL Injection Vulnerability (CVE-2019-25702)

Kados R10 GreenBee is vulnerable to SQL injection via the id_project parameter, allowing attackers to manipulate database queries to extract sensitive information or modify data.

sql-injection web-application cve-2019-25702
2r 1t 1c
high advisory

Kados R10 GreenBee SQL Injection Vulnerability (CVE-2019-25692)

Kados R10 GreenBee is vulnerable to SQL injection via the 'id_to_modify' parameter, enabling attackers to manipulate database queries and potentially extract or modify sensitive data.

sqli cve-2019-25692 web-application
2r 1t 1c
critical advisory

C4G Basic Laboratory Information System 3.4 SQL Injection Vulnerability

C4G Basic Laboratory Information System 3.4 is vulnerable to SQL injection, allowing unauthenticated attackers to execute arbitrary SQL commands via the 'site' parameter in GET requests to the users_select.php endpoint, potentially leading to sensitive data extraction.

sql-injection web-application cve-2019-25678
2r 1t 1c
critical advisory

VA MAX 8.3.4 Remote Code Execution via changeip.php (CVE-2019-25671)

VA MAX 8.3.4 is vulnerable to remote code execution (CVE-2019-25671), allowing authenticated attackers to execute arbitrary commands by injecting shell metacharacters into the mtu_eth0 parameter via a POST request to changeip.php.

rce cve-2019-25671 web-application
2r 1t 1c 2i
high advisory

PilusCart 1.4.1 SQL Injection Vulnerability

PilusCart 1.4.1 is vulnerable to SQL injection, allowing unauthenticated attackers to manipulate database queries by injecting SQL code through the 'send' parameter to extract sensitive database information.

sqli vulnerability web-application
2r 1t 1c
high advisory

SQL Injection Vulnerability in jkev Record Management System 1.0 (CVE-2026-5575)

A SQL injection vulnerability (CVE-2026-5575) exists in the Login component of SourceCodester/jkev Record Management System 1.0, allowing remote attackers to execute arbitrary SQL commands by manipulating the Username parameter in index.php.

sql-injection cve-2026-5575 web-application
2r 1t 1c
high advisory

Technostrobe HI-LED-WR120-G2 Unrestricted File Upload Vulnerability (CVE-2026-5573)

CVE-2026-5573 allows remote attackers to perform unrestricted file uploads on Technostrobe HI-LED-WR120-G2 devices by manipulating the 'cwd' argument when interacting with the /fs file.

CVE-2026-5573 file-upload web-application
2r 1t 1c 4i
high advisory

code-projects Simple Laundry System 1.0 SQL Injection Vulnerability

A remote SQL Injection vulnerability exists in code-projects Simple Laundry System 1.0 within the /delmemberinfo.php file's userid parameter, potentially allowing attackers to execute arbitrary SQL commands.

sql-injection web-application vulnerability
2r 1t 1c
high threat

SQL Injection Vulnerability in Concert Ticket Reservation System

A remote attacker can exploit CVE-2026-5554 in code-projects Concert Ticket Reservation System 1.0 to perform SQL injection by manipulating the searching argument in the process_search.php file.

exploited sql-injection web-application vulnerability
2r 1t 1c
high advisory

SQL Injection Vulnerability in Free Hotel Reservation System 1.0 (CVE-2026-5551)

A SQL injection vulnerability (CVE-2026-5551) exists in itsourcecode Free Hotel Reservation System 1.0, specifically affecting the `email` parameter within the `/hotel/admin/login.php` file, allowing remote attackers to execute arbitrary SQL queries.

sql-injection web-application vulnerability
2r 1t 1c 1i
critical advisory

Signal K Server Privilege Escalation via Unprotected /enableSecurity Endpoint

The Signal K server is vulnerable to privilege escalation due to the /skServer/enableSecurity endpoint remaining active after initial setup, allowing unauthenticated users to inject a new admin account and gain full server control; this affects versions prior to 2.24.0-beta.4.

privilege-escalation web-application vulnerability
2r 1t 1c
critical advisory

Emlog Path Traversal Vulnerability Leads to Remote Code Execution

Emlog versions 2.6.2 and prior are vulnerable to path traversal via crafted ZIP uploads, allowing authenticated admins to write arbitrary files and achieve remote code execution.

path-traversal remote-code-execution emlog web-application
2r 3t 1c
high advisory

Piwigo SQL Injection Vulnerability (CVE-2026-27885)

CVE-2026-27885 is a SQL Injection vulnerability in Piwigo before version 16.3.0, affecting the Activity List API endpoint, allowing an authenticated administrator to extract sensitive data.

sql-injection web-application piwigo
2r 1t 1c 1i
high advisory

Budibase Stored Cross-Site Scripting Vulnerability (CVE-2026-35218)

A stored cross-site scripting (XSS) vulnerability in Budibase versions prior to 3.32.5 allows authenticated users with Builder access to inject malicious HTML payloads into entity names, leading to potential session cookie theft and account takeover when other Builder users open the Command Palette.

budibase xss cve-2026-35218 web-application
2r 1t 1c
high advisory

Ech0 Unauthenticated Server-Side Request Forgery Vulnerability

Ech0 is vulnerable to Server-Side Request Forgery (SSRF) due to an unauthenticated API endpoint (`/api/website/title`) that fetches website titles from user-controlled URLs, lacking proper validation and TLS verification, allowing attackers to access internal resources and potentially cause denial of service.

ssrf ech0 web-application
2r 1t 2i
high advisory

OpenClaw Incomplete Scope Clearing Allows Privilege Escalation

An incomplete fix in OpenClaw versions 2026.3.28 and earlier allows for operator.admin privilege escalation via trusted-proxy authentication mode, which is fixed in version 2026.3.31.

privilege-escalation web-application openclaw
2r 1t
critical advisory

OpenProject SQL Injection Vulnerability (CVE-2026-34717)

OpenProject versions before 17.2.3 are susceptible to SQL injection due to improper input sanitization in the '=n' operator, potentially allowing remote attackers to execute arbitrary SQL commands.

openproject sqli cve-2026-34717 web-application
2r 1t 1c 1i
high advisory

Endian Firewall Arbitrary File Deletion via Path Traversal (CVE-2026-34790)

Endian Firewall versions 3.3.25 and prior allow authenticated users to delete arbitrary files due to a path traversal vulnerability in the `remove ARCHIVE` parameter of the `/cgi-bin/backup.cgi` script, leading to unauthorized file system modification.

cve path-traversal file-deletion web-application
2r 1t 1c 1i
high threat

SQL Injection Vulnerability in itsourcecode Online Enrollment System 1.0

A SQL injection vulnerability exists in itsourcecode Online Enrollment System 1.0 within the Parameter Handler component at /enrollment/index.php, where manipulating the deptid argument can lead to remote code execution, with public exploits available.

exploited sql-injection web-application cve-2026-5334
2r 1t 1c
high advisory

DefaultFuction CMS 1.0 Command Injection Vulnerability (CVE-2026-5333)

DefaultFuction Content-Management-System 1.0 is vulnerable to command injection via manipulation of the 'host' argument in the /admin/tools.php file, allowing remote attackers to execute arbitrary commands.

command-injection web-application cve-2026-5333
2r 2t 1c
high advisory

SillyTavern Path Traversal Vulnerability in Chat Endpoints

A path traversal vulnerability in SillyTavern versions 1.16.0 and earlier allows an authenticated attacker to read and delete arbitrary files under their user data root by manipulating the avatar_url parameter in the `/api/chats/export` and `/api/chats/delete` endpoints.

path-traversal web-application sillytavern
3r 4t
critical advisory

Unauthenticated SQL Injection Vulnerability in mb24api Endpoint (CVE-2026-33616)

CVE-2026-33616 describes an unauthenticated blind SQL Injection vulnerability affecting an mb24api endpoint, which a remote attacker can exploit by injecting special elements into a SQL SELECT command, potentially leading to a total loss of confidentiality due to improper neutralization of special elements.

sql-injection cve-2026-33616 web-application
2r 1t 1c
critical advisory

Unauthenticated SQL Injection Vulnerability in setinfo Endpoint

An unauthenticated remote attacker can exploit a SQL Injection vulnerability (CVE-2026-33615) in the setinfo endpoint by injecting malicious code into a SQL UPDATE command, leading to a total loss of integrity and availability.

sql-injection vulnerability web-application
2r 1t 1c 3i
critical advisory

Unauthenticated SQL Injection Vulnerability in getinfo Endpoint (CVE-2026-33614)

An unauthenticated SQL Injection vulnerability (CVE-2026-33614) in the getinfo endpoint allows a remote attacker to execute arbitrary SQL commands due to improper neutralization of special elements, potentially leading to a total loss of confidentiality.

sql-injection vulnerability web-application
2r 1t 1c
high advisory

AlejandroArciniegas mcp-data-vis SQL Injection Vulnerability

A SQL injection vulnerability exists in the MCP Handler component of AlejandroArciniegas mcp-data-vis, specifically in the Request function of src/servers/database/server.js, allowing remote attackers to execute arbitrary SQL commands.

sql-injection web-application cve-2026-5322
2r 1t 1c
critical advisory

CI4MS Stored XSS Vulnerability in User Management

A stored cross-site scripting (XSS) vulnerability in CI4MS versions prior to 0.31.0.0 allows attackers to inject persistent JavaScript code into the backend user management functionality, leading to session hijacking, privilege escalation, and full administrative account compromise.

xss web-application cve-2026-34571
2r 2t 1c
medium advisory

Open WebUI Broken Access Control Vulnerability (CVE-2026-34222)

A broken access control vulnerability in Open WebUI versions prior to 0.8.11 (CVE-2026-34222) allows authenticated users to potentially access or modify tool values they should not be authorized to, leading to privilege escalation and unauthorized configuration changes.

broken-access-control web-application privilege-escalation
2r 3t 1c
high advisory

Django Multiple Vulnerabilities Leading to SQL Injection, Information Disclosure, and DoS

A remote, authenticated attacker can exploit multiple vulnerabilities in Django to perform SQL injections, disclose confidential information, or cause a denial-of-service condition.

django sql-injection information-disclosure denial-of-service web-application webserver
2r 2t
high advisory

Sanster IOPaint Path Traversal Vulnerability (CVE-2026-5258)

A path traversal vulnerability (CVE-2026-5258) exists in Sanster IOPaint 1.5.3, allowing remote attackers to read arbitrary files by manipulating the filename argument in the _get_file function within the File Manager component.

path traversal cve-2026-5258 web application
2r 1t 1c
high advisory

itsourcecode Payroll Management System 1.0 SQL Injection Vulnerability

itsourcecode Payroll Management System 1.0 is vulnerable to SQL injection via the ID parameter in /view_employee.php, allowing remote attackers to execute arbitrary SQL commands.

sql-injection web-application payroll-system
2r 1t 1c 5i
high advisory

SQL Injection Vulnerability in itsourcecode Payroll Management System 1.0 (CVE-2026-5237)

A SQL injection vulnerability (CVE-2026-5237) exists in itsourcecode Payroll Management System 1.0, allowing remote attackers to execute arbitrary SQL commands by manipulating the ID parameter in the /manage_user.php file.

sql-injection web-application payroll-system
2r 1t 1c
high advisory

SourceCodester Leave Application System 1.0 File Inclusion Vulnerability (CVE-2026-5210)

SourceCodester Leave Application System 1.0 is vulnerable to remote file inclusion (CVE-2026-5210) due to improper handling of the 'page' argument, potentially allowing attackers to execute arbitrary code.

cve-2026-5210 file-inclusion web-application
2r 1t 1c 6i
high advisory

SQL Injection Vulnerability in Student Membership System 1.0

CVE-2026-5198 is a SQL injection vulnerability in the Admin Login component of code-projects Student Membership System 1.0, affecting the /admin/index.php file, enabling remote exploitation through manipulation of username/password parameters.

sql-injection vulnerability web-application
2r 1t 1c
high advisory

code-projects Student Membership System SQL Injection Vulnerability (CVE-2026-5195)

A remote SQL injection vulnerability exists in the User Registration Handler component of code-projects Student Membership System 1.0, exploitable through manipulation of input.

sql-injection web-application cve-2026-5195
2r 1t 1c
high advisory

DELMIA Factory Resource Manager Stored XSS Vulnerability (CVE-2025-10553)

A stored cross-site scripting (XSS) vulnerability in DELMIA Factory Resource Manager from Release 3DEXPERIENCE R2023x through Release 3DEXPERIENCE R2025x (CVE-2025-10553) allows attackers to execute arbitrary script code within a user's browser session.

xss vulnerability web-application
2r 1t 1c
high advisory

SQL Injection Vulnerability in SourceCodester Simple Doctors Appointment System 1.0 (CVE-2026-5180)

A SQL Injection vulnerability (CVE-2026-5180) exists in SourceCodester Simple Doctors Appointment System 1.0, allowing remote attackers to execute arbitrary SQL commands by manipulating the 'email' parameter in the /admin/ajax.php?action=login2 endpoint.

sql-injection vulnerability web-application
2r 1t 1c 5i
high advisory

SQL Injection Vulnerability in SourceCodester Simple Doctors Appointment System 1.0 (CVE-2026-5179)

A SQL injection vulnerability (CVE-2026-5179) exists in SourceCodester Simple Doctors Appointment System 1.0, allowing remote attackers to execute arbitrary SQL commands by manipulating the Username argument in the /admin/login.php file, with a public exploit available.

sql-injection web-application vulnerability
2r 1t 1c
critical advisory

SciTokens KeyCache SQL Injection Vulnerability (CVE-2026-32714)

A SQL injection vulnerability exists in SciTokens versions before 1.9.6, allowing attackers to execute arbitrary SQL commands via the KeyCache class by manipulating user-supplied data used in SQL query construction.

sql-injection scitokens cve-2026-32714 web-application
2r 3t 1c
high advisory

SQL Injection Vulnerability in code-projects Accounting System 1.0 (CVE-2026-5150)

A remote SQL injection vulnerability (CVE-2026-5150) exists in code-projects Accounting System 1.0 via manipulation of the 'cos_id' argument in /viewin_costumer.php, potentially allowing attackers to execute arbitrary SQL commands.

sql-injection web-application cve-2026-5150
2r 1t
high advisory

YunaiV yudao-cloud SQL Injection Vulnerability

A remote SQL injection vulnerability (CVE-2026-5147) exists in YunaiV yudao-cloud up to version 2026.01 via the Website argument in the /admin-api/system/tenant/get-by-website endpoint, allowing unauthenticated attackers to potentially execute arbitrary SQL queries.

cve-2026-5147 sql-injection web-application
2r 1t
high advisory

OpenClaw Insufficient Access Control Vulnerability (CVE-2026-32914)

OpenClaw before 2026.3.12 contains an insufficient access control vulnerability in the /config and /debug command handlers that allows command-authorized non-owners to access owner-only surfaces, enabling attackers with command authorization to read or modify privileged configuration settings.

insufficient-access-control privilege-escalation web-application
2r 1t 3i
high advisory

code-projects Accounting System 1.0 SQL Injection Vulnerability (CVE-2026-5034)

A remote SQL injection vulnerability exists in code-projects Accounting System 1.0 via manipulation of the 'cos_id' parameter in '/edit_costumer.php', potentially allowing unauthorized database access.

sqli cve-2026-5034 web-application
2r 1t
high advisory

SQL Injection Vulnerability in Simple Food Order System 1.0

A SQL injection vulnerability exists in code-projects Simple Food Order System 1.0 within the register-router.php file, where manipulation of the Name argument can lead to remote code execution.

sql-injection web-application vulnerability
2r 1t
high advisory

code-projects Simple Food Order System SQL Injection Vulnerability (CVE-2026-5017)

CVE-2026-5017 is a SQL injection vulnerability in code-projects Simple Food Order System 1.0, allowing remote attackers to execute arbitrary SQL commands by manipulating the 'Status' parameter in the `/all-tickets.php` file.

sql-injection web-application vulnerability
2r 1t
medium advisory

elecV2 elecV2P Server-Side Request Forgery Vulnerability (CVE-2026-5016)

A server-side request forgery vulnerability exists in elecV2 elecV2P up to 3.8.3, affecting the eAxios function within the /mock URL handler, allowing remote attackers to manipulate the req argument and potentially conduct internal reconnaissance or other malicious activities.

cve-2026-5016 ssrf elecv2 web-application
2r 2t
high advisory

WeGIA Web Manager SQL Injection Vulnerability (CVE-2026-33991)

WeGIA web manager prior to version 3.6.7 is vulnerable to SQL injection via the `id_tag` parameter in the `deletar_tag.php` script due to unsanitized input and direct concatenation into SQL queries, potentially allowing attackers to read, modify, or delete data.

cve-2026-33991 sql-injection web-application
2r 1t
critical advisory

Path Traversal Vulnerability in API File Upload Endpoint (CVE-2026-5027)

The 'POST /api/v2/files' endpoint is vulnerable to path traversal due to improper sanitization of the 'filename' parameter, potentially allowing attackers to write files to arbitrary locations on the filesystem and achieve remote code execution.

path-traversal file-upload cve-2026-5027 web-application
2r 3t
high advisory

Sharp CMS Path Traversal Vulnerability (CVE-2026-33686)

A path traversal vulnerability exists in Sharp CMS versions prior to 9.20.0 due to improper sanitization of file extensions, potentially allowing attackers to bypass security restrictions and access sensitive files.

path-traversal cms laravel web-application
2r 1t
high advisory

HCL Aftermarket DPC SQL Injection Vulnerability (CVE-2025-55262)

CVE-2025-55262 is a SQL Injection vulnerability affecting HCL Aftermarket DPC, allowing an attacker to retrieve sensitive information from the database and potentially gain unauthorized access.

cve-2025-55262 sql-injection web-application
2r 1t
high advisory

HCL Aftermarket DPC Missing Access Control Vulnerability (CVE-2025-55261)

A missing functional level access control vulnerability in HCL Aftermarket DPC (CVE-2025-55261) allows an attacker to escalate privileges, potentially compromising the application and leading to data theft or manipulation.

privilege-escalation access-control web-application
2r 1t 1i
high advisory

Online Quiz Maker 1.0 SQL Injection Vulnerability (CVE-2018-25207)

Online Quiz Maker 1.0 is vulnerable to SQL injection via the catid and usern parameters, allowing authenticated attackers to execute arbitrary SQL commands by submitting malicious POST requests to quiz-system.php or add-category.php.

sql-injection cve-2018-25207 web-application
2r 1t 4i
high advisory

KomSeo Cart 1.3 SQL Injection Vulnerability

KomSeo Cart 1.3 is vulnerable to SQL injection via the 'my_item_search' parameter in edit.php, allowing attackers to inject SQL commands and extract sensitive database information.

sqli vulnerability web-application
2r 1t
critical advisory

Wecodex Hotel CMS 1.0 SQL Injection Vulnerability

Wecodex Hotel CMS 1.0 is vulnerable to SQL injection in the admin login functionality, allowing unauthenticated attackers to bypass authentication and potentially extract sensitive database information or gain administrative access by injecting SQL code through the username parameter in POST requests to index.php with action=processlogin.

sqli web-application authentication-bypass
2r 1t
critical advisory

School Management System CMS 1.0 SQL Injection Vulnerability

School Management System CMS 1.0 is vulnerable to SQL injection in the admin login functionality, allowing attackers to bypass authentication by injecting SQL code through the username parameter.

sql-injection web-application vulnerability
2r 1t
high advisory

OpenEMR XXE Vulnerability (CVE-2026-33913)

OpenEMR before version 8.0.0.3 is vulnerable to XML External Entity (XXE) injection, allowing an authenticated user with access to the Carecoordination module to upload a crafted CCDA document and read arbitrary files from the server.

cve-2026-33913 xxe openemr web-application
2r 1i
high advisory

SQL Injection Vulnerability in Simple Laundry System 1.0

A remote SQL Injection vulnerability exists in code-projects Simple Laundry System 1.0 within the Parameter Handler component's /checkregisitem.php file, where manipulating the Long-arm-shirtVol argument can trigger the injection, with a publicly available exploit.

sqli web-application vulnerability
2r 1t 6i
high advisory

SQL Injection Vulnerability in itsourcecode Online Enrollment System 1.0

A remote SQL injection vulnerability exists in itsourcecode Online Enrollment System 1.0 within the Parameter Handler component affecting the `/sms/grades/index.php` file, allowing unauthorized database access and has been publicly disclosed.

sqli vulnerability web-application
2r 1t
high advisory

code-projects Online Food Ordering System SQL Injection Vulnerability (CVE-2026-4844)

CVE-2026-4844 describes a SQL injection vulnerability in the Admin Login Module of code-projects Online Food Ordering System 1.0, which can be exploited remotely by manipulating the Username argument in the /admin.php file.

sql-injection web-application cve-2026-4844
2r 1t
high advisory

SourceCodester Malawi Online Market SQL Injection Vulnerability (CVE-2026-4838)

A remote SQL injection vulnerability (CVE-2026-4838) exists in the /display.php file of SourceCodester Malawi Online Market 1.0 due to improper input sanitization of the ID parameter, potentially allowing attackers to execute arbitrary SQL queries.

sqli web-application cve-2026-4838
2r 1t 6i
high advisory

SourceCodester Online Catering Reservation SQL Injection Vulnerability (CVE-2026-4615)

A SQL injection vulnerability exists in SourceCodester Online Catering Reservation 1.0's `/search.php` file, allowing remote attackers to execute arbitrary SQL commands by manipulating the `rcode` argument.

sql-injection cve-2026-4615 web-application
2r 1t 5i
high advisory

Langflow Path Traversal Vulnerability (CVE-2026-33497)

A path traversal vulnerability in Langflow versions before 1.7.1 allows unauthenticated attackers to read sensitive files via the download_profile_picture endpoint due to insufficient filtering of the folder_name and file_name parameters.

path-traversal vulnerability web-application
2r 1t
high advisory

SQL Injection Vulnerability in Free Hotel Reservation System 1.0

A SQL injection vulnerability (CVE-2026-4612) exists in itsourcecode Free Hotel Reservation System 1.0 within the Parameter Handler component, allowing remote attackers to execute arbitrary SQL commands via the account_id parameter in the /hotel/admin/mod_users/index.php script.

cve-2026-4612 sql-injection web-application
2r 1t
critical advisory

Netartmedia Vlog System SQL Injection Vulnerability

Netartmedia Vlog System is vulnerable to SQL injection, allowing unauthenticated attackers to manipulate database queries by injecting SQL code through the email parameter in the forgotten_password module.

sqli vulnerability web-application
2r 1t 3i
critical advisory

eNdonesia Portal v8.7 SQL Injection Vulnerability

eNdonesia Portal v8.7 is vulnerable to SQL injection allowing unauthenticated attackers to execute arbitrary SQL queries via the bid parameter in banners.php, potentially leading to sensitive data extraction.

sql-injection web-application cve-2019-25643
2r 1t
critical advisory

Zeeways Matrimony CMS Unauthenticated SQL Injection Vulnerability

Zeeways Matrimony CMS is vulnerable to SQL injection via the profile_list endpoint, where an unauthenticated attacker can inject SQL code via the up_cast, s_mother, and s_religion parameters, potentially allowing them to extract sensitive information.

sql-injection web-application matrimony-cms
2r 1t 4i
high advisory

Zeeways Jobsite CMS SQL Injection Vulnerability (CVE-2019-25636)

Zeeways Jobsite CMS is vulnerable to SQL injection, allowing unauthenticated attackers to inject SQL code through the 'id' GET parameter in crafted requests to news_details.php, jobs_details.php, or job_cmp_details.php to extract sensitive database information.

sql-injection cve-2019-25636 web-application
2r 1t 4i
high advisory

Meeplace Business Review Script SQL Injection Vulnerability (CVE-2019-25638)

Meeplace Business Review Script is vulnerable to SQL injection via the 'id' parameter in the addclick.php endpoint, allowing unauthenticated attackers to execute arbitrary SQL queries and potentially extract sensitive database information or cause a denial of service.

sql-injection web-application cve-2019-25638
2r 1t 4i
high advisory

SourceCodester Online Library Management System SQL Injection Vulnerability (CVE-2026-4624)

A remote SQL injection vulnerability (CVE-2026-4624) exists in SourceCodester Online Library Management System 1.0 by manipulating the 'searchField' parameter in the /home.php file, potentially allowing attackers to execute arbitrary SQL commands.

sql-injection cve-2026-4624 web-application
2r 1t
high advisory

MacCMS 2025.1000.4052 Missing Authentication Vulnerability (CVE-2026-4562)

A missing authentication vulnerability exists in MacCMS 2025.1000.4052, specifically affecting the Timming API Endpoint component in application/api/controller/Timming.php, allowing remote attackers to bypass authentication.

CVE-2026-4562 authentication-bypass web-application
2r 1t
high advisory

Census CSWeb 8.0.1 Path Traversal Vulnerability (CVE-2025-60946)

CVE-2025-60946 details a vulnerability in Census CSWeb 8.0.1, where arbitrary file path input is permitted, allowing a remote, authenticated attacker to access unintended file directories.

path-traversal cve-2025-60946 web-application
2r 2t
high advisory

Census CSWeb 8.0.1 Arbitrary File Upload Vulnerability

A remote, authenticated attacker can exploit an arbitrary file upload vulnerability in Census CSWeb 8.0.1 (CVE-2025-60947) to upload malicious files, potentially leading to remote code execution.

file-upload remote-code-execution web-application
2r 2t
medium advisory

VMware Tanzu Spring Framework and Spring Security Vulnerabilities Allow Security Bypass

An anonymous, remote attacker can exploit multiple vulnerabilities in VMware Tanzu Spring Security and VMware Tanzu Spring Framework to bypass security measures.

vmware spring security-bypass web-application
2r 1t
medium advisory

Znuny Cross-Site Scripting Vulnerability

An anonymous remote attacker can exploit a vulnerability in Znuny to perform a cross-site scripting attack, potentially leading to information disclosure or session hijacking.

znuny xss cross-site scripting web application
2r 1t
high advisory

Vitals ESP Incorrect Authorization Vulnerability (CVE-2026-4639)

CVE-2026-4639 is an Incorrect Authorization vulnerability in Galaxy Software Services' Vitals ESP, allowing authenticated remote attackers to perform administrative functions and escalate privileges.

incorrect-authorization privilege-escalation web-application
2r 1t
high advisory

SQL Injection Vulnerability in itsourcecode Online Enrollment System 1.0 (CVE-2026-4632)

CVE-2026-4632 is a SQL Injection vulnerability in itsourcecode Online Enrollment System 1.0, specifically affecting the Parameter Handler component at '/sms/user/index.php?view=add', allowing a remote attacker to inject malicious SQL code by manipulating the 'Name' argument, with a public exploit available.

sql-injection web-application cve-2026-4632
2r 1t
high advisory

SourceCodester Online Admission System 1.0 SQL Injection Vulnerability

A SQL injection vulnerability in SourceCodester Online Admission System 1.0 allows remote attackers to execute arbitrary SQL commands by manipulating the 'program' argument in the /programmes.php file.

sql-injection web-application vulnerability
2r 1t 6i
high advisory

SourceCodester E-Commerce Site SQL Injection Vulnerability (CVE-2026-4613)

A remote SQL injection vulnerability (CVE-2026-4613) exists in SourceCodester E-Commerce Site 1.0 within the /products.php file due to improper input sanitization of the 'Search' argument, potentially allowing attackers to read or modify sensitive database information.

sql-injection web-application ecommerce cve-2026-4613
2r 1t
critical advisory

WWBN AVideo SQL Injection Vulnerability (CVE-2026-33723)

WWBN AVideo platform versions up to 26.0 are vulnerable to SQL injection (CVE-2026-33723), allowing authenticated attackers to inject arbitrary SQL commands via the 'user_id' POST parameter and extract sensitive data such as password hashes, API keys, and encryption salts.

avideo sqli cve-2026-33723 web-application
2r 1t
high advisory

WWBN AVideo Privilege Escalation via Moderator Account

WWBN AVideo platform versions up to 26.0 allows a 'Videos Moderator' to escalate privileges and perform unauthorized video management operations due to inconsistent authorization checks.

avideo privilege-escalation web-application
2r 1t
critical advisory

WWBN AVideo Channel Password Bypass Vulnerability (CVE-2026-33297)

WWBN AVideo versions prior to 26.0 are vulnerable to a credential access vulnerability where passwords containing non-numeric characters are incorrectly processed, effectively setting the password to '0' and allowing trivial channel access bypass.

cve-2026-33297 credential-access web-application
2r 1t
high advisory

WP Maps WordPress Plugin Time-Based SQL Injection Vulnerability (CVE-2026-2580)

The WP Maps WordPress plugin before version 4.9.2 is vulnerable to time-based SQL Injection via the 'orderby' parameter, allowing unauthenticated attackers to extract sensitive information from the database.

wordpress sqli cve-2026-2580 web-application
2r 1t
critical advisory

LiteLLM Proxy API Key Verification SQL Injection

A SQL injection vulnerability exists in LiteLLM versions 1.81.16 to prior to 1.83.7 allowing an unauthenticated attacker to inject SQL queries via a crafted 'Authorization' header, potentially leading to unauthorized data access or modification.

litellm sqli web-application
2r 1t
high advisory

Grafana Privilege Escalation Vulnerability

A remote, authenticated attacker can exploit a vulnerability in Grafana to escalate privileges.

Grafana privilege-escalation web-application
2r 1t
high advisory

Saltcorn Data Tenant Admin Privilege Escalation via Tenant Creation

A vulnerability in Saltcorn Data allows tenant admins to gain unauthorized admin-level access to the root domain by creating tenants in the root domain's schema instead of their own.

Saltcorn Data privilege-escalation web-application cloud
2r 1t
high advisory

CI4MS Authenticated Remote Code Execution via Theme Upload

CI4MS versions 0.26.0.0 through 0.31.6.0 are vulnerable to remote code execution; an authenticated backend user with theme upload permissions can upload a crafted ZIP file containing a PHP file, which is then installed into the web-accessible public directory without filtering, allowing direct execution via HTTP.

ci4-cms-erp/ci4ms code-execution web-application php
2r 2t
high advisory

Acrel EEMS Enterprise Power Operation and Maintenance Cloud Platform SQL Injection Vulnerability

A SQL injection vulnerability exists in Acrel Electrical EEMS Enterprise Power Operation and Maintenance Cloud Platform 1.3.0 when manipulating the 'fCircuitids' argument in the '/SubstationWEBV2/main/elecMaxMinAvgValue' file, potentially allowing for remote code execution or data exfiltration.

EEMS Enterprise Power Operation and Maintenance Cloud Platform sql-injection web-application vulnerability
2r 1t 1c
high advisory

NocoBase SQL Injection via Missing Validation on Update Endpoint

A SQL injection vulnerability exists in nocobase plugin-collection-sql versions 2.0.32 and earlier due to missing validation on the sqlCollection:update endpoint, allowing attackers with collection management permissions to execute arbitrary SQL queries and exfiltrate data.

plugin-collection-sql sql-injection web-application nocobase
2r 1t
high advisory

Icinga Web Reflected XSS Vulnerability via Malformed Search Requests

A reflected cross-site scripting (XSS) vulnerability exists in Icinga Web versions 0.13.0 and earlier, allowing attackers to inject malicious JavaScript into a victim's browser through malformed search requests, potentially leading to arbitrary code execution within the Icinga Web context.

Icinga Web +1 xss web-application icinga
2r 1t
high advisory

liyupi yu-picture SQL Injection Vulnerability (CVE-2026-7060)

A SQL injection vulnerability (CVE-2026-7060) exists in liyupi yu-picture versions up to a053632c41340152bf75b66b3c543d129123d8ec, allowing a remote attacker to execute arbitrary SQL commands by manipulating the sortField argument in the PageRequest function of PictureServiceImpl.java.

yu-picture sql-injection cve-2026-7060 web-application
2r 1t 1c
high advisory

Kaggle-MCP Path Traversal Vulnerability in prepare_kaggle_dataset Function

A path traversal vulnerability exists in the prepare_kaggle_dataset function of kaggle-mcp up to version 406127ffcb2b91b8c10e20e6c2ca787fbc1dc92d, allowing remote attackers to access arbitrary files by manipulating the competition_id argument.

kaggle-mcp path-traversal web-application cve
2r 1t 1c
high advisory

itsourcecode Electronic Judging System SQL Injection Vulnerability (CVE-2026-7555)

A remote SQL injection vulnerability (CVE-2026-7555) exists in itsourcecode Electronic Judging System 1.0 via manipulation of the Username argument in the /intrams/login.php file, potentially leading to unauthorized data access and modification.

Electronic Judging System 1.0 sql-injection vulnerability web-application
2r 1t 1c
high advisory

SourceCodester Hotel Management System SQL Injection Vulnerability

A SQL injection vulnerability exists in SourceCodester Hotel Management System 1.0 in the /index.php/reservation/check component due to improper sanitization of the room_type parameter, allowing a remote attacker to execute arbitrary SQL commands.

Hotel Management System 1.0 sqli vulnerability web application
2r 1t 1c
high advisory

Nginx-UI SSRF Vulnerability via Cluster Node Proxy

Nginx-UI version 2.3.4 and earlier is vulnerable to Server-Side Request Forgery (SSRF) allowing authenticated users to access internal services by manipulating cluster node configurations.

Nginx-UI ssrf web-application
2r 1t 1i
critical advisory

Pardus Software Center Path Traversal Vulnerability (CVE-2026-5166)

CVE-2026-5166 is a path traversal vulnerability affecting TUBITAK BILGEM Software Technologies Research Institute Pardus Software Center before version 1.0.3, allowing attackers to bypass directory restrictions.

Pardus Software Center cve-2026-5166 path-traversal web-application
2r 1t 1c
high advisory

MCPHub Path Traversal Vulnerability via Malicious MCPB Manifest Name

MCPHub is vulnerable to path traversal, where a malicious MCPB file with a crafted manifest.name can cause files to be extracted to arbitrary locations due to missing sanitization in the upload handler.

@samanhappy/mcphub path-traversal web-application mcphub
2r 2t
high advisory

Kirby CMS Missing Authorization Vulnerability

Kirby CMS versions before 4.9.0 and between 5.0.0 and 5.3.3 contain a missing authorization vulnerability, allowing authenticated Panel users to access site model, user, and role information without proper permission checks, potentially leading to unauthorized information disclosure.

cms +1 authorization privilege-escalation web-application
3r 1t
high advisory

florensiawidjaja BioinfoMCP Path Traversal Vulnerability

A path traversal vulnerability in florensiawidjaja BioinfoMCP allows remote attackers to write arbitrary files via manipulation of the 'Name' argument in the Upload function of app.py.

BioinfoMCP path-traversal web-application cve-2026-7398
2r 1t 1c
high threat

ChatGPTNextWeb NextChat SSRF Vulnerability (CVE-2026-7178)

ChatGPTNextWeb NextChat versions up to 2.16.1 are vulnerable to server-side request forgery (SSRF) due to improper input validation in the storeUrl function, allowing remote attackers to potentially access internal resources or conduct other malicious activities.

exploited NextChat ssrf cve vulnerability web-application
2r 1t 1c
medium advisory

ChatGPTNextWeb NextChat Improper Authorization Vulnerability (CVE-2026-7644)

CVE-2026-7644 is an improper authorization vulnerability in the addMcpServer function of ChatGPTNextWeb NextChat version 2.16.1 and earlier, allowing for potential remote exploitation following public disclosure of the exploit.

NextChat authorization cve-2026-7644 web-application
1r 1t 1c
critical advisory

AstrBotDevs AstrBot Vulnerability Leads to Hardcoded Credentials (CVE-2026-7579)

CVE-2026-7579 describes a vulnerability in AstrBotDevs AstrBot up to version 4.16.0 where improper handling of the `auth.py` file in the dashboard component leads to hardcoded credentials being exposed, enabling remote exploitation.

AstrBot cve hardcoded-credentials web-application
2r 1t 1c
critical advisory

Actual Privilege Escalation via change-password Endpoint on OpenID-Migrated Servers

Any authenticated user can escalate to ADMIN on Actual servers migrated from password authentication to OpenID Connect by exploiting a lack of authorization checks, orphaned password rows, and client-controlled login methods, leading to full administrative privileges.

@actual-app/sync-server privilege-escalation web-application
2r 1t
medium advisory

MyBB Recent Threads 17.0 Persistent Cross-Site Scripting Vulnerability (CVE-2018-25309)

MyBB Recent threads 17.0 contains a persistent cross-site scripting vulnerability (CVE-2018-25309) that allows attackers to inject malicious scripts by creating threads with crafted subject lines, leading to arbitrary JavaScript execution in the browsers of users viewing the index page.

Recent threads 17.0 xss cve-2018-25309 web-application
2r 1t 1c
high advisory

MLOps_MCP Path Traversal Vulnerability (CVE-2026-7213)

A path traversal vulnerability exists in ef10007 MLOps_MCP version 1.0.0, allowing a remote attacker to manipulate the 'filename/destination' argument in the 'save_file Tool' component's 'fastmcp_server.py' file.

MLOps_MCP 1.0.0 path-traversal web-application cve-2026-7213
2r 1t 1c
high advisory

GitPilot-MCP Command Injection Vulnerability (CVE-2026-6980)

A command injection vulnerability (CVE-2026-6980) in Divyanshu-hash GitPilot-MCP up to version 9ed9f153ba4158a2ad230ee4871b25130da29ffd allows remote attackers to execute arbitrary commands by manipulating the 'command' argument in the repo_path function of main.py, and public exploit code is available.

GitPilot-MCP command-injection web-application cve
2r 1t 1c
high advisory

geekgod382 filesystem-mcp-server Path Traversal Vulnerability (CVE-2026-7400)

A path traversal vulnerability exists in geekgod382 filesystem-mcp-server version 1.0.0 allowing remote attackers to access unauthorized files due to insufficient path validation in the is_path_allowed function.

filesystem-mcp-server path-traversal web-application cve-2026-7400
2r 1t 1c
high advisory

BidingCC BuildingAI SSRF Vulnerability (CVE-2026-7065)

A server-side request forgery (SSRF) vulnerability exists in BidingCC BuildingAI up to version 26.0.1, allowing remote attackers to manipulate the `url` argument in the `uploadRemoteFile` function of `file-storage.service.ts` to conduct SSRF attacks.

BuildingAI ssrf cve-2026-7065 web-application
2r 1t 1c