CVE-2026-5281
A use-after-free vulnerability exists in the Dawn component of Google Chrome. This flaw allows attackers to potentially execute arbitrary code or cause a denial-of-service via a crafted HTML page.
Critical vulnerabilities, curated daily for security professionals
See how vulnerabilities affect your specific environment
CRS uses the System Security Context Vector (SSCV) Framework v1.0 to adjust CVSS scores based on your system's exposure level, network position, and business criticality. Learn more about SSCV Framework
Tuesday's disclosures reveal 19 critical vulnerabilities spanning SAP, Talend, HP, Totolink, and GitHub Actions, with SAP Business Planning carrying the highest severity at CVSS 9.9. Critical CVEs increased 36% from the prior day's 14, while high-priority vulnerabilities rose 61% to 87. CVE-2026-27681 affects SAP Business Planning with near-maximum severity, CVE-2026-6264 impacts Talend across multiple products, and CVE-2026-6138 targets Totolink A7100RU routersβall scoring CVSS 9.8 or above. Nine vulnerabilities have confirmed active exploitation, including Fortinet FortiClient EMS, Google Dawn, Microsoft Exchange Server, and Adobe Acrobat. No vendor patches are currently available for the newly disclosed vulnerabilities, requiring organizations to prioritize compensating controls and network segmentation.
Immediate action: Prioritize network-level mitigations for SAP Business Planning, Talend, Totolink routers, and HP systems where critical unpatched vulnerabilities exist. For the nine actively exploited flaws in Fortinet FortiClient EMS, Google Dawn, Microsoft Exchange Server, and Adobe Acrobat, verify exposure and apply any available vendor advisories or workarounds immediately, as no patches have been released for the newly disclosed issues.
A use-after-free vulnerability exists in the Dawn component of Google Chrome. This flaw allows attackers to potentially execute arbitrary code or cause a denial-of-service via a crafted HTML page.
An unauthenticated SQL injection vulnerability in Fortinet FortiClientEMS 7.4.4 allows for unauthorized code or command execution via crafted HTTP requests.
TrueConf Client Download of Code Without Integrity Check Vulnerability - Active in CISA KEV catalog.
Microsoft Visual Basic for Applications Insecure Library Loading Vulnerability - Active in CISA KEV catalog.
Microsoft Windows Link Following Vulnerability - Active in CISA KEV catalog.
Microsoft Exchange Server Deserialization of Untrusted Data Vulnerability - Active in CISA KEV catalog.
Microsoft Windows Out-of-Bounds Read Vulnerability - Active in CISA KEV catalog.
Adobe Acrobat Use-After-Free Vulnerability - Active in CISA KEV catalog.
Adobe Acrobat Reader is vulnerable to prototype pollution, which can result in arbitrary code execution when a victim opens a malicious file.
PraisonAI is a multi-agent teams system. In versions below 4.5.139 of PraisonAI and 1.5.140 of praisonaiagents, the browser bridge (praisonai browser start) is vulnerable to unauthenticated remote session hijacking due to missing authentication and a bypassable origin check on its /ws WebSocket endpoint. The server binds to 0.0.0.0 by default and only validates the Origin header when one is present, meaning any non-browser client that omits the header is accepted without restriction. An unauthenticated network attacker can connect, send a start_session message, and the server will route it to the first idle browser-extension WebSocket (effectively hijacking that session) and then broadcast all resulting automation actions and outputs back to the attacker. This enables unauthorized remote control of connected browser automation sessions, leakage of sensitive page context and automation results, and misuse of model-backed browser actions in any environment where the bridge is network-reachable. This issue has been fixed in versions 4.5.139 of PraisonAI and 1.5.140 of praisonaiagents.
PraisonAI is a multi-agent teams system. In versions 4.5.139 and below, the GitHub Actions workflows are vulnerable to ArtiPACKED attack, a known credential leakage vector caused by using actions/checkout without setting persist-credentials: false. By default, actions/checkout writes the GITHUB_TOKEN (and sometimes ACTIONS_RUNTIME_TOKEN) into the .git/config file for persistence, and if any subsequent workflow step uploads artifacts (build outputs, logs, test results, etc.), these tokens can be inadvertently included. Since PraisonAI is a public repository, any user with read access can download these artifacts and extract the leaked tokens, potentially enabling an attacker to push malicious code, poison releases and PyPI/Docker packages, steal repository secrets, and execute a full supply chain compromise affecting all downstream users. The issue spans numerous workflow and action files across .github/workflows/ and .github/actions/. This issue has been fixed in version 4.5.140.
PraisonAI is a multi-agent teams system. In versions below 4.5.139 of PraisonAI and 1.5.140 of praisonaiagents, the workflow engine is vulnerable to arbitrary command and code execution through untrusted YAML files. When praisonai workflow run <file.yaml> loads a YAML file with type: job, the JobWorkflowExecutor in job_workflow.py processes steps that support run: (shell commands via subprocess.run()), script: (inline Python via exec()), and python: (arbitrary Python script execution)βall without any validation, sandboxing, or user confirmation. The affected code paths include action_run() in workflow.py and _exec_shell(), _exec_inline_python(), and _exec_python_script() in job_workflow.py. An attacker who can supply or influence a workflow YAML file (particularly in CI pipelines, shared repositories, or multi-tenant deployment environments) can achieve full arbitrary command execution on the host system, compromising the machine and any accessible data or credentials. This issue has been fixed in versions 4.5.139 of PraisonAI and 1.5.140 of praisonaiagents.
Pachno 1.0.6 contains a deserialization vulnerability that allows unauthenticated attackers to execute arbitrary code by injecting malicious serialized objects into cache files. Attackers can write PHP object payloads to world-writable cache files with predictable names in the cache directory, which are unserialized during framework bootstrap before authentication checks occur.
Due to insufficient authorization checks in SAP Business Planning and Consolidation and SAP Business Warehouse, an authenticated user can execute crafted SQL statements to read, modify, and delete database data. This leads to a high impact on the confidentiality, integrity, and availability of the system.
The LearnPress plugin for WordPress is vulnerable to unauthorized data deletion due to a missing capability check on the `delete_question_answer()` function in all versions up to, and including, 4.3.2.8. The plugin exposes a `wp_rest` nonce in public frontend HTML (`lpData`) to unauthenticated visitors, and uses that nonce as the only security gate for the `lp-load-ajax` AJAX dispatcher. The `delete_question_answer` action has no capability or ownership check. This makes it possible for unauthenticated attackers to delete any quiz answer option by sending a crafted POST request with a publicly available nonce.
A critical vulnerability in the Talend JobServer and Talend Runtime allows unauthenticated remote code execution via the JMX monitoring port. The attack vector is the JMX monitoring port of the Talend JobServer. The vulnerability can be mitigated for the Talend JobServer by requiring TLS client authentication for the monitoring port; however, the patch must be applied for full mitigation. For Talend ESB Runtime, the vulnerability can be mitigated by disabling the JobServer JMX monitoring port, which is disabled by default from the R2024-07-RT patch.
A malicious actor with access to the UniFi Play network could exploit a Path Traversal vulnerability found in the device firmware to write files on the system that could be used for a remote code execution (RCE). Affected Products: UniFi Play PowerAmp (Version 1.0.35 and earlier)β¨UniFi Play Audio PortΒ (Version 1.0.24 and earlier)β¨ Mitigation: Update UniFi Play PowerAmp to Version 1.0.38 or laterβ¨Update UniFi Play Audio PortΒ to Version 1.1.9 or later
An Improper Access Control vulnerability could allow a malicious actor with access to the UniFi Play network to enable SSH to make unauthorized changes to the system.⨠Affected Products: UniFi Play PowerAmp (Version 1.0.35 and earlier)⨠UniFi Play Audio Port (Version 1.0.24 and earlier)⨠Mitigation: Update UniFi Play PowerAmp to Version 1.0.38 or later⨠Update UniFi Play Audio Port to Version 1.1.9 or later
Totolink A7100RU is vulnerable to remote OS command injection via the setAccessDeviceCfg function in the CGI handler.
Totolink A7100RU contains an OS command injection vulnerability in the UploadOpenVpnCert function of the CGI handler.
Totolink A7100RU is susceptible to remote OS command injection via the UploadFirmwareFile function in the CGI handler.
Totolink A7100RU allows remote OS command injection via the setWizardCfg function within the CGI handler.
Totolink A7100RU is vulnerable to remote OS command injection via the setWanCfg function in the CGI handler.
Totolink A7100RU allows remote OS command injection via the setIpQosRules function in the CGI handler.
A security vulnerability has been detected in Totolink A7100RU 7.4cu.2313_b20191024. Affected by this issue is the function setPasswordCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Such manipulation of the argument admpass leads to os command injection. The attack can be executed remotely. The exploit has been disclosed publicly and may be used.
Pachno 1.0.6 contains an XML external entity injection vulnerability that allows unauthenticated attackers to read arbitrary files by exploiting unsafe XML parsing in the TextParser helper. Attackers can inject malicious XML entities through wiki table syntax and inline tags in issue descriptions, comments, and wiki articles to trigger entity resolution via simplexml_load_string() without LIBXML_NONET restrictions.
A series of Improper Input Validation vulnerabilities could allow a Command Injection by a malicious actor with access to the UniFi Play network. Affected Products: UniFi Play PowerAmp (Version 1.0.35 and earlier)⨠UniFi Play Audio Port (Version 1.0.24 and earlier)⨠Mitigation: Update UniFi Play PowerAmp to Version 1.0.38 or later⨠Update UniFi Play Audio Port to Version 1.1.9 or later
Solstice::Session versions through 1440 for Perl generates session ids insecurely. The _generateSessionID method returns an MD5 digest seeded by the epoch time, a random hash reference, a call to the built-in rand() function and the process id. The same method is used in the _generateID method in Solstice::Subsession, which is part of the same distribution. The epoch time may be guessed, if it is not leaked in the HTTP Date header. Stringified hash refences will contain predictable content. The built-in rand() function is seeded by 16-bits and is unsuitable for security purposes. The process id comes from a small set of numbers. Predictable session ids could allow an attacker to gain access to systems.
The Smart Post Show β Post Grid, Post Carousel & Slider, and List Category Posts plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 3
The Product Filter for WooCommerce by WBW WordPress plugin before 3
The JetEngine plugin for WordPress is vulnerable to SQL Injection via the Custom Content Type (CCT) REST API search endpoint in all versions up to, and including, 3
PraisonAI is a multi-agent teams system
Deserialization of Untrusted Data vulnerability in Apache Storm
simple-git enables running native Git commands from JavaScript
Dag Authors, who normally should not be able to execute code in the webserver context could craft XCom payload causing the webserver to execute arbitrary code
A NULL pointer dereference in Nitro PDF Pro for Windows v14
Nitro PDF Pro for Windows 14
nimiq/core-rs-albatross is a Rust implementation of the Nimiq Proof-of-Stake protocol based on the Albatross consensus algorithm
A security flaw has been discovered in PHPGurukul Daily Expense Tracking System 1
A security flaw has been discovered in nocobase plugin-workflow-javascript up to 2
CMSsite 1
Dolibarr ERP-CRM 8
The Form Maker by 10Web plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Matrix field (Text Box input type) in form submissions in all versions up to, and including, 1
The BackWPup plugin for WordPress is vulnerable to Local File Inclusion via the `block_name` parameter of the `/wp-json/backwpup/v1/getblock` REST endpoint in all versions up to, and including, 5
A vulnerability was determined in code-projects Simple ChatBox up to 1
ImpressCMS 1
eBrigade ERP 4
Server-Side Request Forgery via SW-URL Header vulnerability in Apache SkyWalking MCP
Pachno 1
The Tushar Hotel Management System contains a security vulnerability that requires immediate attention.
A security vulnerability has been detected in version 1 of the Code-projects Vehicle Showroom Management System.
A security flaw has been identified in version 1 of the Code-projects Vehicle Showroom Management System, requiring immediate attention.
A vulnerability was found in code-projects Vehicle Showroom Management System 1
A vulnerability was determined in code-projects Vehicle Showroom Management System 1
A vulnerability was identified in code-projects Vehicle Showroom Management System 1
A vulnerability was identified in code-projects Lost and Found Thing Management 1
A security flaw has been discovered in code-projects Lost and Found Thing Management 1
A weakness has been identified in code-projects Vehicle Showroom Management System 1
A security vulnerability has been detected in code-projects Vehicle Showroom Management System 1
A vulnerability was detected in code-projects Faculty Management System 1
A vulnerability was identified in code-projects Simple Content Management System 1
A security flaw has been discovered in code-projects Simple Content Management System 1
A vulnerability was detected in SourceCodester Pharmacy Sales and Inventory System 1
A flaw has been found in SourceCodester Pharmacy Sales and Inventory System 1
A vulnerability has been found in SourceCodester Pharmacy Sales and Inventory System 1
ResourceSpace 8
Heap-based buffer overflow vulnerability in Samsung Open Source Escargot allows out-of-bounds write
A vulnerability was found in Tenda F451 1
A vulnerability was determined in Tenda F451 1
A vulnerability was identified in Tenda F451 1
A security flaw has been discovered in Tenda F451 1
A weakness has been identified in Tenda F451 1
A security vulnerability has been detected in Tenda F451 1
A vulnerability was detected in Tenda F451 1
A vulnerability was detected in Tenda F456 1
A flaw has been found in Tenda F456 1
A vulnerability has been found in Tenda F456 1
A vulnerability was found in Tenda F456 1
A vulnerability was determined in Tenda F456 1
Integer overflow vulnerability in Samsung Open Source Escargot allows Overflow Buffers
Out-of-bounds write vulnerability in Samsung Open Source Escargot allows Overflow Buffers
Newsbull Haber Script 1
Due to a missing authorization check in SAP ERP and SAP S/4HANA (Private Cloud and On-Premise), an authenticated attacker could execute a particular ABAP report to overwrite any existing eight?character executable ABAP report without authorization
Across DR-810 contains an unauthenticated file disclosure vulnerability that allows remote attackers to download the rom-0 backup file containing sensitive information by sending a simple GET request
A heap buffer overflow in the av_bprint_finalize() function of FFmpeg v8
A vulnerability was detected in Totolink A800R 4
A flaw has been found in TOTOLINK A7000R up to 9
A vulnerability in the `TFSMLayer` class of the `keras` package, version 3
A security vulnerability has been detected in UTT HiPER 1200GW up to 2
A weakness has been identified in Totolink A3002MU B20211125
An attacker can control a server-side HTTP request by supplying a crafted URL, causing the server to initiate requests to arbitrary destinations
RGui 3
HTML5 Video Player 1
Faleemi Desktop Software 1
A security vulnerability has been identified in the R programming language environment. Further technical details regarding the specific vector remain limited.
Easy Video to iPod Converter 1
Echo Mirage 3
jq is a command-line JSON processor
In Mesa before 25
Permission bypass vulnerability in the LBS module
An out-of-bounds read in the read_global_param() function (libavcodec/av1dec
An improper resource deallocation and closure vulnerability in the tools/zmqsend
ImageMagick is free and open-source software used for editing and manipulating digital images
An Improper Access Control vulnerability could allow a malicious actor with access to the UniFi Play network to obtain UniFi Play WiFi credentials
ImageMagick is free and open-source software used for editing and manipulating digital images
jq is a command-line JSON processor
A weakness has been identified in zhayujie chatgpt-on-wechat CowAgent 2
A vulnerability was detected in zhayujie chatgpt-on-wechat CowAgent up to 2
A flaw has been found in chatboxai chatbox up to 1
UAF vulnerability in the communication module
A flaw has been found in Totolink N300RH 6
Pachno 1
Adianti Framework 5
MyT-PM 1
The ZTE ZXEDM iEMS product has a password reset vulnerability for any user