vuln-tracker — Top 50

The 50 most important CVEs from the current and previous month, ranked by VAP score (70% CVSS + 30% EPSS)

Last updated: 2026-04-15 20:58 UTC

Top 50 (50)

CVE ID CVSS Severity CWE KEV EPSS VAP Description Published
CVE-2026-29058 9.8 CRITICAL CWE-78   50.9% p97 8.39
AVideo is a video-sharing Platform software. Prior to version 7.0, an unauthenti...

AVideo is a video-sharing Platform software. Prior to version 7.0, an unauthenticated attacker can execute arbitrary OS commands on the server by injecting shell command substitution into the base64Url GET parameter. This can lead to full server compromise, data exfiltration (e.g., configuration secrets, internal keys, credentials), and service disruption. This issue has been patched in version 7.0.

2026-03-06
CVE-2026-3055 9.3 CRITICAL CWE-125 53.8% p98 8.12
Insufficient input validation in NetScaler ADC and NetScaler Gateway when config...

Insufficient input validation in NetScaler ADC and NetScaler Gateway when configured as a SAML IDP leading to memory overread

2026-03-23
CVE-2026-1492 9.8 CRITICAL CWE-269   39.0% p97 8.03
The User Registration & Membership – Custom Registration Form Builder, Custom Lo...

The User Registration & Membership – Custom Registration Form Builder, Custom Login Form, User Profile, Content Restriction & Membership Plugin plugin for WordPress is vulnerable to improper privilege management in all versions up to, and including, 5.1.2. This is due to the plugin accepting a user-supplied role during membership registration without properly enforcing a server-side allowlist. This makes it possible for unauthenticated attackers to create administrator accounts by supplying a role value during membership registration.

2026-03-03
CVE-2026-28289 10.0 CRITICAL CWE-434   22.3% p95 7.67
FreeScout is a free help desk and shared inbox built with PHP's Laravel framewor...

FreeScout is a free help desk and shared inbox built with PHP's Laravel framework. A patch bypass vulnerability for CVE-2026-27636 in FreeScout 1.8.206 and earlier allows any authenticated user with file upload permissions to achieve Remote Code Execution (RCE) on the server by uploading a malicious .htaccess file using a zero-width space character prefix to bypass the security check. The vulnerability exists in the sanitizeUploadedFileName() function in app/Http/Helper.php. The function contains a Time-of-Check to Time-of-Use (TOCTOU) flaw where the dot-prefix check occurs before sanitization removes invisible characters. This vulnerability is fixed in 1.8.207.

2026-03-03
CVE-2026-35616 9.8 CRITICAL CWE-284 25.3% p96 7.62
A improper access control vulnerability in Fortinet FortiClientEMS 7.4.5 through...

A improper access control vulnerability in Fortinet FortiClientEMS 7.4.5 through 7.4.6 may allow an unauthenticated attacker to execute unauthorized code or commands via crafted requests.

2026-04-04
CVE-2026-33478 10.0 CRITICAL CWE-78   20.6% p95 7.62
WWBN AVideo is an open source video platform. In versions up to and including 26...

WWBN AVideo is an open source video platform. In versions up to and including 26.0, multiple vulnerabilities in AVideo's CloneSite plugin chain together to allow a completely unauthenticated attacker to achieve remote code execution. The `clones.json.php` endpoint exposes clone secret keys without authentication, which can be used to trigger a full database dump via `cloneServer.json.php`. The dump contains admin password hashes stored as MD5, which are trivially crackable. With admin access, the attacker exploits an OS command injection in the rsync command construction in `cloneClient.json.php` to execute arbitrary system commands. Commit c85d076375fab095a14170df7ddb27058134d38c contains a patch.

2026-03-23
CVE-2026-28501 9.8 CRITICAL CWE-89   20.9% p95 7.49
WWBN AVideo is an open source video platform. Prior to version 24.0, an unauthen...

WWBN AVideo is an open source video platform. Prior to version 24.0, an unauthenticated SQL Injection vulnerability exists in AVideo within the objects/videos.json.php and objects/video.php components. The application fails to properly sanitize the catName parameter when it is supplied via a JSON-formatted POST request body. Because JSON input is parsed and merged into $_REQUEST after global security checks are executed, the payload bypasses the existing sanitization mechanisms. This issue has been patched in version 24.0.

2026-03-06
CVE-2026-4257 9.8 CRITICAL CWE-94   19.6% p95 7.45
The Contact Form by Supsystic plugin for WordPress is vulnerable to Server-Side ...

The Contact Form by Supsystic plugin for WordPress is vulnerable to Server-Side Template Injection (SSTI) leading to Remote Code Execution (RCE) in all versions up to, and including, 1.7.36. This is due to the plugin using the Twig `Twig_Loader_String` template engine without sandboxing, combined with the `cfsPreFill` prefill functionality that allows unauthenticated users to inject arbitrary Twig expressions into form field values via GET parameters. This makes it possible for unauthenticated attackers to execute arbitrary PHP functions and OS commands on the server by leveraging Twig's `registerUndefinedFilterCallback()` method to register arbitrary PHP callbacks.

2026-03-30
CVE-2026-3584 9.8 CRITICAL CWE-94   17.1% p95 7.37
The Kali Forms plugin for WordPress is vulnerable to Remote Code Execution in al...

The Kali Forms plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 2.4.9 via the 'form_process' function. This is due to the 'prepare_post_data' function mapping user-supplied keys directly into internal placeholder storage, combined with the use of 'call_user_func' on these placeholder values. This makes it possible for unauthenticated attackers to execute code on the server.

2026-03-20
CVE-2026-27971 9.2 CRITICAL CWE-502   30.0% p96 7.34
Qwik is a performance focused javascript framework. qwik <=1.19.0 is vulnerable ...

Qwik is a performance focused javascript framework. qwik <=1.19.0 is vulnerable to RCE due to an unsafe deserialization vulnerability in the server$ RPC mechanism that allows any unauthenticated user to execute arbitrary code on the server with a single HTTP request. Affects any deployment where require() is available at runtime. This vulnerability is fixed in 1.19.1.

2026-03-03
CVE-2026-33634 9.4 CRITICAL CWE-506 21.2% p95 7.21
Trivy is a security scanner. On March 19, 2026, a threat actor used compromised ...

Trivy is a security scanner. On March 19, 2026, a threat actor used compromised credentials to publish a malicious Trivy v0.69.4 release, force-push 76 of 77 version tags in `aquasecurity/trivy-action` to credential-stealing malware, and replace all 7 tags in `aquasecurity/setup-trivy` with malicious commits. This incident is a continuation of the supply chain attack that began in late February 2026. Following the initial disclosure on March 1, credential rotation was performed but was not atomic (not all credentials were revoked simultaneously). The attacker could have use a valid token to exfiltrate newly rotated secrets during the rotation window (which lasted a few days). This could have allowed the attacker to retain access and execute the March 19 attack. Affected components include the `aquasecurity/trivy` Go / Container image version 0.69.4, the `aquasecurity/trivy-action` GitHub Action versions 0.0.1 – 0.34.2 (76/77), and the`aquasecurity/setup-trivy` GitHub Action versions 0.2.0 – 0.2.6, prior to the recreation of 0.2.6 with a safe commit. Known safe versions include versions 0.69.2 and 0.69.3 of the Trivy binary, version 0.35.0 of trivy-action, and version 0.2.6 of setup-trivy. Additionally, take other mitigations to ensure the safety of secrets. If there is any possibility that a compromised version ran in one's environment, all secrets accessible to affected pipelines must be treated as exposed and rotated immediately. Check whether one's organization pulled or executed Trivy v0.69.4 from any source. Remove any affected artifacts immediately. Review all workflows using `aquasecurity/trivy-action` or `aquasecurity/setup-trivy`. Those who referenced a version tag rather than a full commit SHA should check workflow run logs from March 19–20, 2026 for signs of compromise. Look for repositories named `tpcp-docs` in one's GitHub organization. The presence of such a repository may indicate that the fallback exfiltration mechanism was triggered and secrets were successfully stolen. Pin GitHub Actions to full, immutable commit SHA hashes, don't use mutable version tags.

2026-03-23
CVE-2026-2699 9.8 CRITICAL CWE-284   9.9% p93 7.16
Customer Managed ShareFile Storage Zones Controller (SZC) allows an unauthentica...

Customer Managed ShareFile Storage Zones Controller (SZC) allows an unauthenticated attacker to access restricted configuration pages. This leads to changing system configuration and potential remote code execution.

2026-04-02
CVE-2026-34156 9.9 CRITICAL CWE-913   7.2% p91 7.15
NocoBase is an AI-powered no-code/low-code platform for building business applic...

NocoBase is an AI-powered no-code/low-code platform for building business applications and enterprise solutions. Prior to version 2.0.28, NocoBase's Workflow Script Node executes user-supplied JavaScript inside a Node.js vm sandbox with a custom require allowlist (controlled by WORKFLOW_SCRIPT_MODULES env var). However, the console object passed into the sandbox context exposes host-realm WritableWorkerStdio stream objects via console._stdout and console._stderr. An authenticated attacker can traverse the prototype chain to escape the sandbox and achieve Remote Code Execution as root. This issue has been patched in version 2.0.28.

2026-03-31
CVE-2026-28775 10.0 CRITICAL CWE-1188   0.9% p75 7.03
An unauthenticated Remote Code Execution (RCE) vulnerability exists in the SNMP ...

An unauthenticated Remote Code Execution (RCE) vulnerability exists in the SNMP service of International Datacasting Corporation (IDC) SFX Series SuperFlex SatelliteReceiver. The deployment insecurely provisions the `private` SNMP community string with read/write access by default. Because the SNMP agent runs as root, an unauthenticated remote attacker can utilize `NET-SNMP-EXTEND-MIB` directives, abusing the fact that the system runs a vulnerable version of net-snmp pre 5.8, to execute arbitrary operating system commands with root privileges.

2026-03-04
CVE-2026-2743 10.0 CRITICAL CWE-22   0.6% p68 7.02
Arbitrary File Write via Path Traversal upload to Remote Code Execution in SeppM...

Arbitrary File Write via Path Traversal upload to Remote Code Execution in SeppMail User Web Interface. The affected feature is the large file transfer (LFT). This issue affects SeppMail: 15.0.2.1 and before

2026-03-05
CVE-2026-0848 10.0 CRITICAL CWE-20   0.5% p66 7.02
NLTK versions <=3.9.2 are vulnerable to arbitrary code execution due to improper...

NLTK versions <=3.9.2 are vulnerable to arbitrary code execution due to improper input validation in the StanfordSegmenter module. The module dynamically loads external Java .jar files without verification or sandboxing. An attacker can supply or replace the JAR file, enabling the execution of arbitrary Java bytecode at import time. This vulnerability can be exploited through methods such as model poisoning, MITM attacks, or dependency poisoning, leading to remote code execution. The issue arises from the direct execution of the JAR file via subprocess with unvalidated classpath input, allowing malicious classes to execute when loaded by the JVM.

2026-03-05
CVE-2026-30302 10.0 CRITICAL CWE-78   0.5% p63 7.01
The command auto-approval module in CodeRider-Kilo contains an OS Command Inject...

The command auto-approval module in CodeRider-Kilo contains an OS Command Injection vulnerability, rendering its whitelist security mechanism ineffective. The vulnerability stems from the incorrect use of an incompatible command parser (the Unix-based shell-quote library) to analyze commands on the Windows platform, coupled with a failure to correctly handle Windows CMD-specific escape sequences (^). Attackers can exploit this discrepancy between the parsing logic and the execution environment by constructing payloads such as git log ^" & malicious_command ^". The CodeRider-Kilo parser is deceived by the escape characters, misinterpreting the malicious command connector (&) as being within a protected string argument and thus auto-approving the command. However, the underlying Windows CMD interpreter ignores the escaped quotes, parsing and executing the subsequent malicious command directly. This allows attackers to achieve arbitrary Remote Code Execution (RCE) after bypassing what appears to be a legitimate Git whitelist check.

2026-03-27
CVE-2026-40175 10.0 CRITICAL CWE-113   0.4% p60 7.01
Axios is a promise based HTTP client for the browser and Node.js. Prior to 1.15....

Axios is a promise based HTTP client for the browser and Node.js. Prior to 1.15.0 and 0.3.1, the Axios library is vulnerable to a specific "Gadget" attack chain that allows Prototype Pollution in any third-party dependency to be escalated into Remote Code Execution (RCE) or Full Cloud Compromise (via AWS IMDSv2 bypass). This vulnerability is fixed in 1.15.0 and 0.3.1.

2026-04-10
CVE-2026-24898 10.0 CRITICAL CWE-287   0.3% p55 7.01
OpenEMR is a free and open source electronic health records and medical practice...

OpenEMR is a free and open source electronic health records and medical practice management application. Prior to 8.0.0, an unauthenticated token disclosure vulnerability in the MedEx callback endpoint allows any unauthenticated visitor to obtain the practice's MedEx API tokens, leading to complete third-party service compromise, PHI exfiltration, unauthorized actions on the MedEx platform, and HIPAA violations. The vulnerability exists because the endpoint bypasses authentication ($ignoreAuth = true) and performs a MedEx login whenever $_POST['callback_key'] is provided, returning the full JSON response including sensitive API tokens. This vulnerability is fixed in 8.0.0.

2026-03-03
CVE-2026-39337 10.0 CRITICAL CWE-94   0.3% p55 7.01
ChurchCRM is an open-source church management system. Prior to 7.1.0, critical p...

ChurchCRM is an open-source church management system. Prior to 7.1.0, critical pre-authentication remote code execution vulnerability in ChurchCRM's setup wizard allows unauthenticated attackers to inject arbitrary PHP code during the initial installation process, leading to complete server compromise. The "$dbPassword" variable is not sanitized. This vulnerability exists due to an incomplete fix for CVE-2025-62521. This vulnerability is fixed in 7.1.0.

2026-04-07
CVE-2026-31957 10.0 CRITICAL CWE-1188   0.3% p50 7.01
Himmelblau is an interoperability suite for Microsoft Azure Entra ID and Intune....

Himmelblau is an interoperability suite for Microsoft Azure Entra ID and Intune. From 3.0.0 to before 3.1.0, if Himmelblau is deployed without a configured tenant domain in himmelblau.conf, authentication is not tenant-scoped. In this mode, Himmelblau can accept authentication attempts for arbitrary Entra ID domains by dynamically registering providers at runtime. This behavior is intended for initial/local bootstrap scenarios, but it can create risk in remote authentication environments. This vulnerability is fixed in 3.1.0.

2026-03-11
CVE-2026-21628 10.0 CRITICAL CWE-434   0.3% p48 7.01
A improperly secured file management feature allows uploads of dangerous data ty...

A improperly secured file management feature allows uploads of dangerous data types for unauthenticated users, leading to remote code execution.

2026-03-05
CVE-2025-15379 10.0 CRITICAL CWE-77   0.2% p46 7.01
A command injection vulnerability exists in MLflow's model serving container ini...

A command injection vulnerability exists in MLflow's model serving container initialization code, specifically in the `_install_model_dependencies_to_env()` function. When deploying a model with `env_manager=LOCAL`, MLflow reads dependency specifications from the model artifact's `python_env.yaml` file and directly interpolates them into a shell command without sanitization. This allows an attacker to supply a malicious model artifact and achieve arbitrary command execution on systems that deploy the model. The vulnerability affects versions 3.8.0 and is fixed in version 3.8.2.

2026-03-30
CVE-2026-3611 10.0 CRITICAL CWE-306   0.2% p45 7.01
The Honeywell IQ4x building management controller, exposes its full web-based HM...

The Honeywell IQ4x building management controller, exposes its full web-based HMI without authentication in its factory-default configuration. With no user module configured, security is disabled by design and the system operates under a System Guest (level 100) context, granting read/write privileges to any party able to reach the HTTP interface. Authentication controls are only enforced after a web user is created via U.htm, which dynamically enables the user module. Because this function is accessible prior to authentication, a remote user can create a new account with administrative read/write permissions enabling the user module and imposing authentication under attacker-controlled credentials. This action can effectively lock legitimate operators out of local and web-based configuration and administration.

2026-03-12
CVE-2026-34208 10.0 CRITICAL CWE-693   0.2% p39 7.01
SandboxJS is a JavaScript sandboxing library. Prior to 0.8.36, SandboxJS blocks ...

SandboxJS is a JavaScript sandboxing library. Prior to 0.8.36, SandboxJS blocks direct assignment to global objects (for example Math.random = ...), but this protection can be bypassed through an exposed callable constructor path: this.constructor.call(target, attackerObject). Because this.constructor resolves to the internal SandboxGlobal function and Function.prototype.call is allowed, attacker code can write arbitrary properties into host global objects and persist those mutations across sandbox instances in the same process. This vulnerability is fixed in 0.8.36.

2026-04-06
CVE-2026-34162 10.0 CRITICAL CWE-306   0.2% p36 7.00
FastGPT is an AI Agent building platform. Prior to version 4.14.9.5, the FastGPT...

FastGPT is an AI Agent building platform. Prior to version 4.14.9.5, the FastGPT HTTP tools testing endpoint (/api/core/app/httpTools/runTool) is exposed without any authentication. This endpoint acts as a full HTTP proxy — it accepts a user-supplied baseUrl, toolPath, HTTP method, custom headers, and body, then makes a server-side HTTP request and returns the complete response to the caller. This issue has been patched in version 4.14.9.5.

2026-03-31
CVE-2026-32871 10.0 CRITICAL CWE-918   0.2% p36 7.00
FastMCP is a Pythonic way to build MCP servers and clients. Prior to version 3.2...

FastMCP is a Pythonic way to build MCP servers and clients. Prior to version 3.2.0, the OpenAPIProvider in FastMCP exposes internal APIs to MCP clients by parsing OpenAPI specifications. The RequestDirector class is responsible for constructing HTTP requests to the backend service. A vulnerability exists in the _build_url() method. When an OpenAPI operation defines path parameters (e.g., /api/v1/users/{user_id}), the system directly substitutes parameter values into the URL template string without URL-encoding. Subsequently, urllib.parse.urljoin() resolves the final URL. Since urljoin() interprets ../ sequences as directory traversal, an attacker controlling a path parameter can perform path traversal attacks to escape the intended API prefix and access arbitrary backend endpoints. This results in authenticated SSRF, as requests are sent with the authorization headers configured in the MCP provider. This issue has been patched in version 3.2.0.

2026-04-02
CVE-2026-3587 10.0 CRITICAL CWE-912   0.1% p30 7.00
An unauthenticated remote attacker can exploit a hidden function in the CLI prom...

An unauthenticated remote attacker can exploit a hidden function in the CLI prompt to escape the restricted interface, leading to full compromise of the device.

2026-03-23
CVE-2026-31852 10.0 CRITICAL CWE-269   0.1% p30 7.00
Jellyfin is an open-source media system. The code-quality.yml GitHub Actions wor...

Jellyfin is an open-source media system. The code-quality.yml GitHub Actions workflow in jellyfin/jellyfin-ios is vulnerable to arbitrary code execution via pull requests from forked repositories. Due to the workflow's elevated permissions (nearly all write permissions), this vulnerability enables full repository takeover of jellyfin/jellyfin-ios, exfiltration of highly privileged secrets, Apple App Store supply chain attack, GitHub Container Registry (ghcr.io) package poisoning, and full jellyfin organization compromise via cross-repository token usage. Note: This is not a code vulnerability, but a vulnerability in the GitHub Actions workflows. No new version is required for this GHSA and end users do not need to take any actions.

2026-03-11
CVE-2026-34938 10.0 CRITICAL CWE-693   0.1% p30 7.00
PraisonAI is a multi-agent teams system. Prior to version 1.5.90, execute_code()...

PraisonAI is a multi-agent teams system. Prior to version 1.5.90, execute_code() in praisonai-agents runs attacker-controlled Python inside a three-layer sandbox that can be fully bypassed by passing a str subclass with an overridden startswith() method to the _safe_getattr wrapper, achieving arbitrary OS command execution on the host. This issue has been patched in version 1.5.90.

2026-04-03
CVE-2026-32169 10.0 CRITICAL CWE-918   0.1% p26 7.00
Server-side request forgery (ssrf) in Azure Cloud Shell allows an unauthorized a...

Server-side request forgery (ssrf) in Azure Cloud Shell allows an unauthorized attacker to elevate privileges over a network.

2026-03-19
CVE-2026-32186 10.0 CRITICAL CWE-918   0.1% p26 7.00
Server-side request forgery (ssrf) in Microsoft Bing allows an unauthorized atta...

Server-side request forgery (ssrf) in Microsoft Bing allows an unauthorized attacker to elevate privileges over a network.

2026-04-03
CVE-2026-33494 10.0 CRITICAL CWE-23   0.1% p23 7.00
ORY Oathkeeper is an Identity & Access Proxy (IAP) and Access Control Decision A...

ORY Oathkeeper is an Identity & Access Proxy (IAP) and Access Control Decision API that authorizes HTTP requests based on sets of Access Rules. Versions prior to 26.2.0 are vulnerable to an authorization bypass via HTTP path traversal. An attacker can craft a URL containing path traversal sequences (e.g. `/public/../admin/secrets`) that resolves to a protected path after normalization, but is matched against a permissive rule because the raw, un-normalized path is used during rule evaluation. Version 26.2.0 contains a patch.

2026-03-26
CVE-2026-4370 10.0 CRITICAL CWE-295   0.1% p21 7.00
A vulnerability was identified in Juju from version 3.2.0 until 3.6.19 and from ...

A vulnerability was identified in Juju from version 3.2.0 until 3.6.19 and from version 4.0 until 4.0.4, where the internal Dqlite database cluster fails to perform proper TLS client and server authentication. Specifically, the Juju controller's database endpoint does not validate client certificates when a new node attempts to join the cluster. An unauthenticated attacker with network reachability to the Juju controller's Dqlite port can exploit this flaw to join the database cluster. Once joined, the attacker gains full read and write access to the underlying database, allowing for total data compromise.

2026-04-01
CVE-2026-27897 10.0 CRITICAL CWE-22   0.1% p21 7.00
Vociferous provides cross-platform, offline speech-to-text with local AI refinem...

Vociferous provides cross-platform, offline speech-to-text with local AI refinement. Prior to 4.4.2, the vulnerability exists in src/api/system.py within the export_file route. The application accepts a JSON payload containing a filename and content. While the developer intended for a native UI dialog to handle the file path, the API does not validate the filename string before it is processed by the backends filesystem logic. Because the API is unauthenticated and the CORS configuration in app.py is overly permissive (allow_origins=["*"] or allowing localhost), an external attacker can bypass the UI entirely. By using directory traversal sequences (../), an attacker can force the app to write arbitrary data to any location accessible by the current user's permissions. This vulnerability is fixed in 4.4.2.

2026-03-11
CVE-2025-54328 10.0 CRITICAL CWE-121   0.1% p20 7.00
An issue was discovered in SMS in Samsung Mobile Processor, Wearable Processor, ...

An issue was discovered in SMS in Samsung Mobile Processor, Wearable Processor, and Modem Exynos 980, 990, 850, 1080, 2100, 1280, 2200, 1330, 1380, 1480, 2400, 1580, 2500, 9110, W920, W930, W1000, Modem 5123, Modem 5300, and Modem 5400. A Stack-based Buffer Overflow occurs while parsing SMS RP-DATA messages.

2026-04-06
CVE-2026-26954 10.0 CRITICAL CWE-94   0.1% p20 7.00
SandboxJS is a JavaScript sandboxing library. Prior to 0.8.34, it is possible to...

SandboxJS is a JavaScript sandboxing library. Prior to 0.8.34, it is possible to obtain arrays containing Function, which allows escaping the sandbox. Given an array containing Function, and Object.fromEntries, it is possible to construct {[p]: Function} where p is any constructible property. This vulnerability is fixed in 0.8.34.

2026-03-13
CVE-2026-28353 10.0 CRITICAL CWE-506   0.1% p19 7.00
Trivy Vulnerability Scanner is a VS Code extension that helps find vulnerabiliti...

Trivy Vulnerability Scanner is a VS Code extension that helps find vulnerabilities. In Trivy VSCode Extension version 1.8.12, which was distributed via OpenVSX marketplace was compromised and contained malicious code designed to leverage local AI coding agent to collect and exfiltrate sensitive information. Users using the affected artifact are advised to immediately remove it and rotate environment secrets. The malicious artifact has been removed from the marketplace. No other affected artifacts have been identified.

2026-03-05
CVE-2026-30966 10.0 CRITICAL CWE-284   0.1% p19 7.00
Parse Server is an open source backend that can be deployed to any infrastructur...

Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 9.5.2-alpha.7 and 8.6.20, Parse Server's internal tables, which store Relation field mappings such as role memberships, can be directly accessed via the REST API or GraphQL API by any client using only the application key. No master key is required. An attacker can create, read, update, or delete records in any internal relationship table. Exploiting this allows the attacker to inject themselves into any Parse Role, gaining all permissions associated with that role, including full read, write, and delete access to classes protected by role-based Class-Level Permissions (CLP). Similarly, writing to any such table that backs a Relation field used in a pointerFields CLP bypasses that access control. This vulnerability is fixed in 9.5.2-alpha.7 and 8.6.20.

2026-03-10
CVE-2026-34976 10.0 CRITICAL CWE-862   0.0% p12 7.00
Dgraph is an open source distributed GraphQL database. Prior to 25.3.1, the rest...

Dgraph is an open source distributed GraphQL database. Prior to 25.3.1, the restoreTenant admin mutation is missing from the authorization middleware config (admin.go), making it completely unauthenticated. Unlike the similar restore mutation which requires Guardian-of-Galaxy authentication, restoreTenant executes with zero middleware. This mutation accepts attacker-controlled backup source URLs (including file:// for local filesystem access), S3/MinIO credentials, encryption key file paths, and Vault credential file paths. An unauthenticated attacker can overwrite the entire database, read server-side files, and perform SSRF. This vulnerability is fixed in 25.3.1.

2026-04-06
CVE-2026-33107 10.0 CRITICAL CWE-918   0.0% p12 7.00
Server-side request forgery (ssrf) in Azure Databricks allows an unauthorized at...

Server-side request forgery (ssrf) in Azure Databricks allows an unauthorized attacker to elevate privileges over a network.

2026-04-03
CVE-2026-33105 10.0 CRITICAL CWE-285   0.0% p12 7.00
Improper authorization in Microsoft Azure Kubernetes Service allows an unauthori...

Improper authorization in Microsoft Azure Kubernetes Service allows an unauthorized attacker to elevate privileges over a network.

2026-04-03
CVE-2026-32213 10.0 CRITICAL CWE-285   0.0% p12 7.00
Improper authorization in Azure AI Foundry allows an unauthorized attacker to el...

Improper authorization in Azure AI Foundry allows an unauthorized attacker to elevate privileges over a network.

2026-04-03
CVE-2026-22557 10.0 CRITICAL CWE-22   0.0% p9 7.00
A malicious actor with access to the network could exploit a Path Traversal vuln...

A malicious actor with access to the network could exploit a Path Traversal vulnerability found in the UniFi Network Application to access files on the underlying system that could be manipulated to access an underlying account.

2026-03-19
CVE-2026-4689 10.0 CRITICAL CWE-190   0.0% p7 7.00
Sandbox escape due to incorrect boundary conditions, integer overflow in the XPC...

Sandbox escape due to incorrect boundary conditions, integer overflow in the XPCOM component. This vulnerability was fixed in Firefox 149, Firefox ESR 115.34, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9.

2026-03-24
CVE-2026-4692 10.0 CRITICAL NVD-CWE-noinfo   0.0% p6 7.00
Sandbox escape in the Responsive Design Mode component. This vulnerability was f...

Sandbox escape in the Responsive Design Mode component. This vulnerability was fixed in Firefox 149, Firefox ESR 115.34, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9.

2026-03-24
CVE-2026-33054 10.0 CRITICAL CWE-22   0.0% p5 7.00
Mesop is a Python-based UI framework that allows users to build web applications...

Mesop is a Python-based UI framework that allows users to build web applications. Versions 1.2.2 and below contain a Path Traversal vulnerability that allows any user supplying an untrusted state_token through the UI stream payload to arbitrarily target files on the disk under the standard file-based runtime backend. This can result in application denial of service (via crash loops when reading non-msgpack target files as configurations), or arbitrary file manipulation. This vulnerability heavily exposes systems hosted utilizing FileStateSessionBackend. Unauthorized malicious actors could interact with arbitrary payloads overwriting or explicitly removing underlying service resources natively outside the application bounds. This issue has been fixed in version 1.2.3.

2026-03-20
CVE-2026-4688 10.0 CRITICAL CWE-416   0.0% p5 7.00
Sandbox escape due to use-after-free in the Disability Access APIs component. Th...

Sandbox escape due to use-after-free in the Disability Access APIs component. This vulnerability was fixed in Firefox 149, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9.

2026-03-24
CVE-2026-0124 10.0 CRITICAL CWE-787   0.0% p5 7.00
There is a possible out of bounds write due to a missing bounds check. This coul...

There is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

2026-03-10
CVE-2025-48611 10.0 CRITICAL CWE-120   0.0% p5 7.00
In DeviceId of DeviceId.java, there is a possible desync in persistence due to a...

In DeviceId of DeviceId.java, there is a possible desync in persistence due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

2026-03-10