CVE-2026-34197
Apache ActiveMQ Improper Input Validation Vulnerability - Active in CISA KEV catalog.
Critical vulnerabilities, curated daily for security professionals
See how vulnerabilities affect your specific environment
CRS uses the System Security Context Vector (SSCV) Framework v1.0 to adjust CVSS scores based on your system's exposure level, network position, and business criticality. Learn more about SSCV Framework
Tuesday's disclosures center on Apache infrastructure components, with multiple critical flaws in Apache Camel and Apache MINA driving the day's volume. Critical CVEs reached 32 (up from 2 the prior day) while high-priority disclosures climbed to 100 from 61. Notable entries include CVE-2026-33453 (CVSS 10) in Apache Camel, CVE-2026-41635 (CVSS 9.8) in Apache MINA, and CVE-2026-41462 (CVSS 9.8) in ProjeQtor. Remote code execution and unauthenticated access patterns dominate the critical tier, with networking gear from Totolink and firmware-level flaws expanding the attack surface. No patches are currently published for the disclosed set, requiring compensating controls and exposure reduction until vendor fixes ship.
Immediate action: Prioritize inventory and exposure review for Apache Camel, Apache MINA, ProjeQtor, and Totolink A8000RU deployments, and isolate management interfaces for ActiveMQ, Kentico, PaperCut, SimpleHelp, and Quest KACE pending vendor guidance. With no patches currently available for the new critical set, apply network segmentation, restrict external reachability, and monitor for indicators of exploitation against the actively exploited products.
Apache ActiveMQ Improper Input Validation Vulnerability - Active in CISA KEV catalog.
Kentico Xperience Path Traversal Vulnerability - Active in CISA KEV catalog.
PaperCut NG/MF Improper Authentication Vulnerability - Active in CISA KEV catalog.
Quest KACE Systems Management Appliance (SMA) Improper Authentication Vulnerability - Active in CISA KEV catalog.
JetBrains TeamCity Relative Path Traversal Vulnerability - Active in CISA KEV catalog.
Microsoft Defender Insufficient Granularity of Access Control Vulnerability - Active in CISA KEV catalog.
Marimo Remote Code Execution Vulnerability - Active in CISA KEV catalog.
D-Link DIR-823X Command Injection Vulnerability - Active in CISA KEV catalog.
Samsung MagicINFO 9 Server Path Traversal Vulnerability - Active in CISA KEV catalog.
SimpleHelp Path Traversal Vulnerability - Active in CISA KEV catalog.
SimpleHelp Missing Authorization Vulnerability - Active in CISA KEV catalog.
Improperly Controlled Modification of Dynamically-Determined Object Attributes vulnerability in Apache Camel Camel-Coap component. Apache Camel's camel-coap component is vulnerable to Camel message header injection, leading to remote code execution when routes forward CoAP requests to header-sensitive producers (e.g. camel-exec) The camel-coap component maps incoming CoAP request URI query parameters directly into Camel Exchange In message headers without applying any HeaderFilterStrategy. Specifically, CamelCoapResource.handleRequest() iterates over OptionSet.getUriQuery() and calls camelExchange.getIn().setHeader(...) for every query parameter. CoAPEndpoint extends DefaultEndpoint rather than DefaultHeaderFilterStrategyEndpoint, and CoAPComponent does not implement HeaderFilterStrategyComponent; the component contains no references to HeaderFilterStrategy at all. As a result, an unauthenticated attacker who can send a single CoAP UDP packet to a Camel route consuming from coap:// can inject arbitrary Camel internal headers (those prefixed with Camel*) into the Exchange. When the route delivers the message to a header-sensitive producer such as camel-exec, camel-sql, camel-bean, camel-file, or template components (camel-freemarker, camel-velocity), the injected headers can alter the producer's behavior. In the case of camel-exec, the CamelExecCommandExecutable and CamelExecCommandArgs headers override the executable and arguments configured on the endpoint, resulting in arbitrary OS command execution under the privileges of the Camel process. The producer's output is written back to the Exchange body and returned in the CoAP response payload by CamelCoapResource, giving the attacker an interactive RCE channel without any need for out-of-band exfiltration. Exploitation prerequisites are minimal: a single unauthenticated UDP datagram to the CoAP port (default 5683). CoAP (RFC 7252) has no built-in authentication, and DTLS is optional and disabled by default. Because the protocol is UDP-based, HTTP-layer WAF/IDS controls do not apply. This issue affects Apache Camel: from 4.14.0 through 4.14.5, from 4.18.0 before 4.18.1, 4.19.0. Users are recommended to upgrade to version 4.18.1 or 4.19.0, fixing the issue.
JmsBinding.extractBodyFromJms() in camel-jms, and the equivalent JmsBinding class in camel-sjms, deserialized the payload of incoming JMS ObjectMessage values via javax.jms.ObjectMessage.getObject() without applying any ObjectInputFilter, class allowlist or class denylist. Because this code path is reached whenever the mapJmsMessage option is enabled (the default) and Camel acts as a JMS consumer, an attacker able to publish a crafted ObjectMessage to a queue or topic consumed by a Camel application could achieve remote code execution when a deserialization gadget chain was present on the classpath. The same handling was reached transitively through camel-sjms2 (whose Sjms2Endpoint extends SjmsEndpoint) and through camel-amqp (whose AMQPJmsBinding extends JmsBinding), and by other JMS-family components built on JmsComponent such as camel-activemq and camel-activemq6. This issue affects Apache Camel: from 3.0.0 before 4.14.7, from 4.15.0 before 4.18.2, from 4.19.0 before 4.20.0. Users are recommended to upgrade to version 4.20.0, which fixes the issue. If users are on the 4.14.x LTS releases stream, then they are suggested to upgrade to 4.14.7. If users are on the 4.18.x releases stream, then they are suggested to upgrade to 4.18.2.
Improper header filtering in Apache Camel allows attackers to inject case-variant headers, leading to remote code execution and arbitrary file writes.
The Camel-Mail component is vulnerable to Camel message header injection. The custom header filter strategy used by the component (MailHeaderFilterStrategy) only filters the 'out' direction via setOutFilterStartsWith, while it does not configure the 'in' direction via setInFilterStartsWith. As a result, when a Camel application consumes mail through camel-mail (for example via from(\"imap://...\") or from(\"pop3://...\")) the inbound filter check is skipped and Camel-prefixed MIME headers are mapped unfiltered into the Exchange. An attacker who can deliver an email to a mailbox monitored by such a consumer can inject Camel-specific headers that, for some Camel components downstream of the mail consumer (such as camel-bean, camel-exec, or camel-sql), can alter the behaviour of the route. This is the same pattern that was previously addressed in camel-undertow (CVE-2025-30177) and the broader incoming-header filter (CVE-2025-27636 and CVE-2025-29891). This issue affects Apache Camel: from 3.0.0 before 4.14.6, from 4.15.0 before 4.18.1. Users are recommended to upgrade to version 4.19.0, which fixes the issue. If users are on the 4.18.x LTS releases stream, then they are suggested to upgrade to 4.18.1. If users are on the 4.14.x LTS releases stream, then they are suggested to upgrade to 4.14.6.
ProjeQtor versions 7.0 through 12.4.3 contain an unauthenticated SQL injection vulnerability in the login functionality where the login variable is directly concatenated into a SQL query without parameterization or sanitization. Attackers can inject arbitrary SQL expressions through the username field at the authentication endpoint to create privileged accounts, read sensitive data, and execute operating system commands if the database user has elevated permissions.
Apache MINA's AbstractIoBuffer.resolveClass() contains two branches, one of them (for static classes or primitive types) does not check the class at all, bypassing the classname allowlist and allowing arbitrary code to be executed. The fix checks if the class is present in the accepted class filter before calling Class.forName(). Affected versions are Apache MINA 2.0.0 <= 2.0.27, 2.1.0 <= 2.1.10, and 2.2.0 <= 2.2.5. The problem is resolved in Apache MINA 2.0.28, 2.1.11, and 2.2.6 by applying the classname allowlist earlier. Affected are applications using Apache MINA that call IoBuffer.getObject(). Applications using Apache MINA are advised to upgrade.
The fix for CVE-2024-52046 in Apache MINA AbstractIoBuffer.getObject() was incomplete. The classname allowlist of classes allowed to be deserialized was applied too late after a static initializer in a class to be read might already have been executed. Affected versions are Apache MINA 2.0.0 <= 2.0.27, 2.1.0 <= 2.1.10, and 2.2.0 <= 2.2.5. The problem is resolved in Apache MINA 2.0.28, 2.1.11, and 2.2.6 by applying the classname allowlist earlier. Affected are applications using Apache MINA that call IoBuffer.getObject(). Applications using Apache MINA are advised to upgrade
A remote code execution (RCE) vulnerability in the /devserver/start endpoint of leonvanzyl autocoder commit 79d02a allows attackers to execute arbitrary code via providing a crafted command parameter.
Specific firmware versions of Milesight AIOT cameras use SSL certificates with default private keys.
A remote OS command injection vulnerability in the Totolink A8000RU CGI handler allows unauthenticated attackers to execute arbitrary commands via the wizard parameter.
An unauthenticated remote OS command injection vulnerability exists in the Totolink A8000RU CGI handler via the enable parameter in the setUPnPCfg function.
An unauthenticated remote OS command injection vulnerability in the Totolink A8000RU CGI handler occurs via the setIptvCfg function.
An unauthenticated remote OS command injection vulnerability exists in the Totolink A8000RU CGI handler via the addrPrefixLen parameter in the setIpv6LanCfg function.
An unauthenticated remote OS command injection vulnerability exists in the Totolink A8000RU CGI handler via the merge parameter in the setWiFiEasyCfg function.
An unauthenticated remote OS command injection vulnerability exists in the Totolink A8000RU CGI handler via the wanIdx parameter in the setDmzCfg function.
An unauthenticated remote OS command injection vulnerability exists in the Totolink A8000RU CGI handler via the sambaEnabled parameter in the setStorageCfg function.
An unauthenticated remote OS command injection vulnerability exists in the Totolink A8000RU CGI handler via the tz parameter in the setNtpCfg function.
An unauthenticated remote OS command injection vulnerability exists in the Totolink A8000RU CGI handler via the mode parameter in the setWiFiAclRules function.
An OS command injection vulnerability exists in the Totolink A8000RU CGI handler, allowing unauthenticated remote attackers to execute arbitrary system commands via the CsteSystem function.
An OS command injection vulnerability in the Totolink A8000RU CGI handler allows unauthenticated remote attackers to execute arbitrary commands by manipulating the telnet_enabled argument.
An OS command injection vulnerability in the Totolink A8000RU CGI handler allows unauthenticated remote attackers to execute arbitrary system commands via the sys_info argument.
An OS command injection vulnerability in the Totolink A8000RU CGI handler allows unauthenticated remote attackers to execute arbitrary system commands via the tty_server argument.
An OS command injection vulnerability in the Totolink A8000RU CGI handler allows unauthenticated remote attackers to execute arbitrary system commands via the admpass argument.
A vulnerability was detected in Totolink A8000RU 7.1cu.643_b20200521. Affected is the function CsteSystem of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument HTTP results in os command injection. The attack may be launched remotely. The exploit is now public and may be used.
A vulnerability has been found in Totolink A8000RU 7.1cu.643_b20200521. This affects the function setWiFiWpsStart of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument wscDisabled leads to os command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
A vulnerability was found in Totolink A8000RU 7.1cu.643_b20200521. This vulnerability affects the function setUrlFilterRules of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument enable results in os command injection. The attack can be launched remotely. The exploit has been made public and could be used.
A vulnerability was determined in Totolink A8000RU 7.1cu.643_b20200521. This issue affects the function setPptpServerCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. This manipulation of the argument enable causes os command injection. The attack may be initiated remotely. The exploit has been publicly disclosed and may be utilized.
A vulnerability has been found in Totolink A8000RU 7.1cu.643_b20200521. This vulnerability affects the function setVpnAccountCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Such manipulation of the argument User leads to os command injection. The attack can be executed remotely. The exploit has been disclosed to the public and may be used.
In certain circumstances, Spring Boot's default web security is ineffective allowing unauthorized access to all endpoints. For an application to be vulnerable, it must: be a servlet-based web application; have no Spring Security configuration of its own and rely on the default web security filter chain; depend on spring-boot-actuator-autoconfigure; not depend on spring-boot-health. If any of the above does not apply, the application is not vulnerable. Affected: Spring Boot 4.0.0–4.0.5; upgrade to 4.0.6 or later per vendor advisory.
Incorrect Privilege Assignment vulnerability in Directorist Directorist Social Login allows Privilege Escalation.This issue affects Directorist Social Login: from n/a before 2.1.4.
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Directorist Booking allows SQL Injection.This issue affects Directorist Booking: from n/a before 3.0.2.
GeoVision GV-IP Device Utility 9.0.5 uses insufficient encryption for administrative credentials, allowing attackers to intercept and decrypt sensitive data over local broadcast traffic.
The camel-infinispan component's ProtoStream-based remote aggregation repository deserializes data read from a remote Infinispan cache using java
The Highland Software Custom Role Manager plugin for WordPress is susceptible to privilege escalation, allowing unauthorized users to obtain elevated permissions.
The LatePoint – Calendar Booking Plugin for Appointments and Events plugin for WordPress is vulnerable to Privilege Escalation in versions up to and including 5
When authentication is enabled on the Apache Camel embedded HTTP server or embedded management server (camel-platform-http-main) and a non-root context path such as /api or /admin is configured via camel
Memory safety bugs in Firefox ESR 115 could lead to arbitrary code execution if exploited by an attacker via a malicious webpage.
Memory safety bugs in Firefox ESR 140 could allow a remote attacker to execute arbitrary code or cause a crash via a malicious webpage.
The camel-mina component's MinaConverter
The Camel-PQC FileBasedKeyLifecycleManager class deserializes the contents of `<keyId>
A vulnerability was detected in code-projects Employee Management System 1
Cross Site Request Forgery vulnerability in diskoverdata diskover-community v
A security weakness has been identified in the Toowiredd chatgpt-mcp-server, potentially allowing unauthorized access or service disruption.
A vulnerability in CodePanda Source canteen_management_system 1 allows for potential unauthorized actions due to improper security controls.
A security flaw has been found in the itsourcecode Construction Management System 1, potentially leading to unauthorized system access.
A vulnerability has been found in the itsourcecode Construction Management System 1 that could allow for unauthorized data access or system manipulation.
A security vulnerability exists in the itsourcecode Construction Management System 1, potentially exposing the application to unauthorized exploitation.
A security vulnerability exists in the itsourcecode Courier Management System 1, potentially exposing the application to unauthorized exploitation.
A security vulnerability exists in the itsourcecode Courier Management System 1, potentially exposing the application to unauthorized exploitation.
A security vulnerability exists in the SourceCodester Pharmacy Sales and Inventory System 1, potentially exposing the application to unauthorized exploitation.
A security vulnerability exists in the SourceCodester Pharmacy Sales and Inventory System 1, potentially exposing the application to unauthorized exploitation.
A security flaw has been discovered in SourceCodester Pharmacy Sales and Inventory System 1
A weakness has been identified in SourceCodester Pharmacy Sales and Inventory System 1
A security vulnerability has been detected in SourceCodester Pharmacy Sales and Inventory System 1
A flaw has been found in SourceCodester Pharmacy Sales and Inventory System 1
A vulnerability has been found in code-projects Online Lot Reservation System up to 1
A weakness has been identified in SourceCodester Pharmacy Sales and Inventory System 1
A vulnerability was detected in SourceCodester Pharmacy Sales and Inventory System 1
A weakness has been identified in dvladimirov MCP up to 0
A weakness has been identified in Tenda F456 1
A security vulnerability has been detected in Tenda F456 1
A vulnerability was detected in Tenda F456 1
A flaw has been found in Tenda F456 1
A vulnerability has been found in Tenda F456 1
A vulnerability was found in Tenda FH1202 1
A vulnerability was determined in Tenda FH1202 1
A security flaw has been discovered in Tenda F456 1
A weakness has been identified in Tenda F456 1
A security vulnerability has been detected in Tenda F456 1
A vulnerability was detected in Tenda F456 1
A flaw has been found in Tenda F456 1
An OS command Injection issue exists in LogonTracer prior to v2
A vulnerability was identified in D-Link DIR-825 3
A security flaw has been discovered in Tenda F456 1
A weakness has been identified in Tenda F456 1
A security vulnerability has been detected in Tenda F456 1
A vulnerability was detected in Tenda F456 1
A flaw has been found in Tenda F456 1
A security flaw has been discovered in Tenda HG3 2
A weakness has been identified in Tenda F456 1
A security vulnerability has been detected in Tenda F456 1
A vulnerability was detected in Tenda F456 1
A flaw has been found in Tenda F456 1
A vulnerability has been found in Tenda F456 1
A vulnerability was detected in Tenda HG3 2
A vulnerability was determined in Tenda HG3 2
A security vulnerability has been detected in tufantunc ssh-mcp up to 1
A security flaw has been discovered in D-Link DIR-825 up to 3
An issue in the /store/items/search endpoint of Agent Protocol server commit e9a89f allows attackers to cause a Denial of Service (DoS) via a crafted POST request
A vulnerability was identified in Tenda i9 1
A vulnerability was determined in D-Link DIR-822 A_101
An attacker on the same network as the remote application may be able to utilize a timing attack to discover information about the remote secret
ProjeQtor versions 7
The Fan Control application V251 contains an improper privilege handling vulnerability in its Open File Dialog
A vulnerability was determined in Tenda HG3 2
Specific firmware versions of Milesight AIOT camera firmware contain hard-coded credentials
An out-of-bounds memory access vulnerability exists in specific firmware versions of Milesight AIOT cameras
In Spring AI, various FilterExpressionConverter implementations accept a filter expression object and translate them to specific vector store query languages
OpenClaw before 2026
Faleemi Desktop Software 1
iSmartViewPro 1
OpenClaw before 2026
Calling a function that triggers a UI refresh after removing comments via a script may access an invalidated object, leading to program crashes
Parsing logic flaws cause non-signature data to be misidentified as valid signatures when processing malformed form field hierarchies, leading to invalid memory writes and program crashes during internal data structure construction
Document structural anomalies caused inconsistencies between page element relationships and internal index states
Insertion of Sensitive Information Into Sent Data vulnerability in WPDeveloper Templately allows Retrieve Embedded Sensitive Data
CEWE Photoshow 6
Text::Minify::XS versions from v0
A path traversal vulnerability in the UI/static component of leonvanzyl autocoder commit 79d02a allows attackers to read arbitrary files via sending crafted URL path containing traversal sequences
A flaw has been found in 666ghj MiroFish up to 0
A vulnerability has been found in 666ghj MiroFish up to 0
A vulnerability was determined in liyupi yu-picture up to a053632c41340152bf75b66b3c543d129123d8ec
A security vulnerability has been identified in the Intina47 context-sync software, potentially allowing unauthorized access to synchronized data.
A flaw has been found in AgentDeskAI browser-tools-mcp up to 1
A vulnerability has been found in BidingCC BuildingAI up to 26
A vulnerability was found in choieastsea simple-openstack-mcp up to 767b2f4a8154cca344344b9725537a58399e6036
A weakness has been identified in code-projects Inventory Management System 1
A vulnerability was determined in ShadowCloneLabs GlutamateMCPServers up to e2de73280b01e5d943593dd1aa2c01c5b9112f78
A security vulnerability has been detected in AlejandroArciniegas mcp-data-vis up to de5a51525a69822290eaee569a1ab447b490746d
A vulnerability was detected in JoeCastrom mcp-chat-studio up to 1
A vulnerability has been found in dexhunter kaggle-mcp up to 406127ffcb2b91b8c10e20e6c2ca787fbc1dc92d
A flaw has been found in disler aider-mcp-server up to b2516fa466d0d851932da92ee6d0e66946db9efc
A vulnerability has been found in dmitryglhf mcp-url-downloader up to 4b8cf2de55f6e8864a77d108e8a94a5b8e4394c6
A vulnerability was found in douinc mkdocs-mcp-plugin up to 0
A security flaw has been discovered in ChatGPTNextWeb NextChat up to 2
A weakness has been identified in ChatGPTNextWeb NextChat up to 2
A vulnerability was identified in duartium papers-mcp-server 9ceb3812a6458ba7922ca24a7406f8807bc55598
A security flaw has been discovered in dubydu sqlite-mcp up to 0
A security vulnerability has been detected in edvardlindelof notes-mcp up to 0
A vulnerability was detected in ef10007 MLOps_MCP 1
A vulnerability was identified in eghuzefa engineer-your-data up to 0
A security flaw has been discovered in egtai gmx-vmd-mcp up to 0