CVE-2026-1731
BeyondTrust Remote Support (RS) and Privileged Remote Access (PRA) OS Command Injection Vulnerability - Active in CISA KEV catalog.
Critical vulnerabilities, curated daily for security professionals
See how vulnerabilities affect your specific environment
CRS uses the System Security Context Vector (SSCV) Framework v1.0 to adjust CVSS scores based on your system's exposure level, network position, and business criticality. Learn more about SSCV Framework
Sunday's disclosure activity centers on Microsoft Windows and Office products, with six actively exploited vulnerabilities targeting core enterprise infrastructure. The brief includes 3 critical CVEs (down 40% from Saturday) and 27 high-priority vulnerabilities (down 62%), reflecting typical weekend reduction in disclosure volume. Three WordPress critical vulnerabilities (CVE-2026-1490, CVE-2026-1306, CVE-2025-8572) each scored CVSS 9.8, while SmarterTools SmarterMail accounts for three separate actively exploited flaws. Attack patterns span remote code execution, privilege escalation, and authentication bypass across diverse targets including BeyondTrust, Linux kernel, GitLab, and Sangoma FreePBX. No patches are currently available for disclosed vulnerabilities, requiring organizations to prioritize compensating controls and network segmentation.
Immediate action: Prioritize Microsoft Windows and Office systems for compensating controls given five actively exploited Windows vulnerabilities and two Office flaws with no patches yet available. Review SmarterMail, BeyondTrust, and FreePBX deployments for indicators of compromise, and apply network segmentation to WordPress installations pending patch release.
BeyondTrust Remote Support (RS) and Privileged Remote Access (PRA) OS Command Injection Vulnerability - Active in CISA KEV catalog.
Linux Kernel Integer Overflow Vulnerability - Active in CISA KEV catalog.
SmarterTools SmarterMail Unrestricted Upload of File with Dangerous Type Vulnerability - Active in CISA KEV catalog.
SmarterTools SmarterMail Authentication Bypass Using an Alternate Path or Channel Vulnerability - Active in CISA KEV catalog.
GNU InetUtils Argument Injection Vulnerability - Active in CISA KEV catalog.
Microsoft Office Security Feature Bypass Vulnerability - Active in CISA KEV catalog.
GitLab Community and Enterprise Editions Server-Side Request Forgery (SSRF) Vulnerability - Active in CISA KEV catalog.
Sangoma FreePBX OS Command Injection Vulnerability - Active in CISA KEV catalog.
Sangoma FreePBX Improper Authentication Vulnerability - Active in CISA KEV catalog.
React Native Community CLI OS Command Injection Vulnerability - Active in CISA KEV catalog.
SmarterTools SmarterMail Missing Authentication for Critical Function Vulnerability - Active in CISA KEV catalog.
A protection mechanism failure in the MSHTML Framework allows an unauthenticated attacker to bypass security features over a network, potentially leading to unauthorized system access.
Microsoft Windows NULL Pointer Dereference Vulnerability - Active in CISA KEV catalog.
A protection mechanism failure in the Windows Shell allows an unauthenticated attacker to bypass security features over a network connection.
Improper privilege management in Windows Remote Desktop allows an authorized attacker to elevate their privileges locally on the affected system.
A type confusion vulnerability in the Desktop Window Manager (DWM) allows an authorized local attacker to elevate their privileges to a higher level.
A security feature bypass vulnerability in Microsoft Office Word exists due to reliance on untrusted inputs, allowing an unauthorized local attacker to circumvent security protections.
A memory corruption vulnerability in Apple software was addressed through improved state management to prevent potential exploitation.
Microsoft Configuration Manager SQL Injection Vulnerability - Active in CISA KEV catalog.
Notepad++ Download of Code Without Integrity Check Vulnerability - Active in CISA KEV catalog.
The CleanTalk Anti-Spam plugin for WordPress allows unauthenticated attackers to install arbitrary plugins via PTR record spoofing, potentially leading to remote code execution.
The midi-Synth WordPress plugin allows unauthenticated arbitrary file uploads via the 'export' AJAX action, potentially leading to remote code execution through exposed nonces.
Truelysell Core plugin for WordPress is vulnerable to unauthenticated privilege escalation, allowing attackers to create administrator accounts by manipulating registration parameters.
Improper Control of Generation of Code ('Code Injection') vulnerability in Apache Avro Java SDK when generating specific records from untrusted Avro schemas
Google Chrome is vulnerable to a "Use After Free" condition in its CSS engine, which could allow a remote attacker to execute arbitrary code via a crafted webpage.
The BlueSnap Payment Gateway for WooCommerce plugin for WordPress is vulnerable to missing authorization, allowing unauthorized users to perform sensitive actions.
The Flexi Product Slider and Grid for WooCommerce plugin is vulnerable to Local File Inclusion (LFI), which could allow attackers to read sensitive system files.
The Starfish Review Generation & Marketing plugin for WordPress is vulnerable to privilege escalation due to a missing capability check in the `srm_restore_options_defaults` function.
The Ecwid by Lightspeed Ecommerce Shopping Cart plugin for WordPress is vulnerable to privilege escalation, which could allow unauthorized users to gain administrative access.
The PixelYourSite plugin for WordPress is vulnerable to Stored Cross-Site Scripting (XSS) via the 'pysTrafficSource' and 'pys_landing_page' parameters.
The Magic Login Mail or QR Code plugin for WordPress is vulnerable to privilege escalation, allowing attackers to gain unauthorized administrative access.
The PhotoStack Gallery plugin for WordPress is vulnerable to SQL Injection via the 'postid' parameter, allowing for unauthorized database access.
ADB Explorer, a fluent UI for ADB on Windows, contains a high-severity vulnerability that could lead to unauthorized system access or data manipulation.
The PixelYourSite PRO plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'pysTrafficSource' and 'pys_landing_page' parameters in versions up to 12.
The User Language Switch plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to and including version 1.
The Super Simple Contact Form plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'sscf_name' parameter in versions up to 1.
The Super Page Cache plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Activity Log in all versions up to and including version 5.
Versions of the package directorytree/imapengine before 1
An authentication bypass vulnerability exists in multiple products from Universal Software Inc due to the use of an alternate path or channel.
A heap buffer overflow vulnerability in the UPF component of free5GC v4
Privilege Defined With Unsafe Actions, Missing Authentication for Critical Function vulnerability in Universal Software Inc
Authorization Bypass Through User-Controlled Key vulnerability in Universal Software Inc
lakeFS, an open-source data versioning tool for object storage, contains a high-severity vulnerability that may affect repository security.
The Caido web security auditing toolkit is affected by a high-severity vulnerability that could compromise the security of the auditing environment.
The Cursor AI-powered code editor is affected by a high-severity vulnerability that could impact the security of the developer's environment and source code.
Tandoor Recipes, a meal management application, contains a high-severity vulnerability that could lead to unauthorized access or data compromise.
An array index out of bounds vulnerability in the AMF component of free5GC v4
An improper input validation and protocol compliance vulnerability in free5GC v4
The BACnet Stack open-source C library for embedded systems contains a vulnerability that may impact the security and stability of building automation and control networks.
OpenSourcePOS v3 is affected by a security vulnerability that could compromise the integrity of point-of-sale operations and sensitive retail data.