Thursday, April 9, 2026

Today's Security Snapshot

Critical vulnerabilities, curated daily for security professionals

🎯 SSCV Profile

See how vulnerabilities affect your specific environment

CRS uses the System Security Context Vector (SSCV) Framework v1.0 to adjust CVSS scores based on your system's exposure level, network position, and business criticality. Learn more about SSCV Framework

Risk scores will be adjusted based on your selected environment

Today's Security Brief

WordPress plugins account for four of Thursday's 19 critical vulnerabilities, with CVE-2026-1830, CVE-2026-3296, CVE-2026-2942, and CVE-2026-4003 all scoring CVSS 9.8. Critical disclosures dropped 30% from Wednesday's 27, while high-priority CVEs held steady at 100. CVE-2026-39888 (CVSS 9.9) in Microsoft Teams represents the highest-scored finding, alongside CVE-2026-3535 (CVSS 9.8) in Google Web Fonts and CVE-2026-34179 (CVSS 9.1) in Canon LXD systems. Three vulnerabilities are confirmed actively exploited β€” Ivanti EPMM (CVE-2026-1340), Google Dawn (CVE-2026-5281), and TrueConf Client (CVE-2026-3502), each rated CVSS 9.5. Patch availability stands at zero percent across all 119 disclosed CVEs, making network-level mitigations and access restrictions the primary defensive option.

  • CVE-2026-39888 (CVSS 9.9) in Microsoft Teams is Thursday's highest-scored vulnerability, with a second Teams flaw (CVE-2026-39890, CVSS 9.8) also disclosed
  • 19 critical CVEs disclosed, down 30% from Wednesday's 27 β€” WordPress plugins represent four of the critical findings
  • 100 high-priority CVEs, unchanged from the prior day, bringing total disclosures to 119
  • Remote code execution and authentication bypass patterns appear across WordPress, Google Web Fonts, and Canon LXD products
  • Zero patches are currently available for any disclosed vulnerability, requiring compensating controls across all affected systems
  • Three actively exploited vulnerabilities confirmed in Ivanti EPMM, Google Dawn, and TrueConf Client, all rated CVSS 9.5

Immediate action: Prioritize restricting network access to Ivanti EPMM, Google Dawn, and TrueConf Client instances given confirmed active exploitation. WordPress administrators should audit and disable affected plugins until patches become available, and Teams deployments should be monitored for anomalous activity. With zero patches available across all 119 CVEs, implement network segmentation and enhanced logging as interim controls.

πŸ’‘ Tip: Swipe CVE cards left to ⭐ star, right to ❌ remove

Section Navigation