CVE-2026-20182
Cisco Catalyst SD-WAN Controller Authentication Bypass Vulnerability - Active in CISA KEV catalog.
Critical vulnerabilities, curated daily for security professionals
See how vulnerabilities affect your specific environment
CRS uses the System Security Context Vector (SSCV) Framework v1.0 to adjust CVSS scores based on your system's exposure level, network position, and business criticality. Learn more about SSCV Framework
Monday's disclosures concentrate on WordPress plugin code, GitBucket developer tooling, and ACL Analytics, with three critical CVEs at CVSS 9.8 enabling remote compromise of web-facing and developer-adjacent systems. Critical volume held steady at 3 (0% change) while high-priority disclosures dropped to 23, a 60% decline from the prior day's 57. CVE-2018-25335 affects a WordPress Peugeot plugin, CVE-2018-25332 targets GitBucket, and CVE-2018-25320 impacts ACL Analytics, all rated CVSS 9.8 with remote attack vectors. Two actively exploited vulnerabilities were observed in Cisco Catalyst SD-WAN (CVE-2026-20182) and Microsoft (CVE-2026-42897), both at CVSS 9.5, indicating continued attacker focus on edge networking and enterprise platforms. No patches are currently available across the 26 disclosed CVEs, requiring defenders to rely on compensating controls, network segmentation, and exposure reduction until vendor fixes ship.
Immediate action: Prioritize exposure review for WordPress installations running the affected Peugeot plugin, GitBucket developer instances, and ACL Analytics deployments, alongside Cisco Catalyst SD-WAN edge devices where active exploitation is confirmed. With no patches available for today's disclosures, apply network segmentation, restrict administrative access, and monitor for indicators of compromise on the affected products until vendor updates are released.
Cisco Catalyst SD-WAN Controller Authentication Bypass Vulnerability - Active in CISA KEV catalog.
A cross-site scripting (XSS) vulnerability in Microsoft Exchange Server allows unauthenticated attackers to perform spoofing over a network.
WordPress Plugin Peugeot Music 1.0 contains an arbitrary file upload vulnerability allowing unauthenticated remote code execution via the upload.php endpoint.
GitBucket 4.23.1 is vulnerable to unauthenticated remote code execution due to weak secret token generation and insecure file upload handling.
ACL Analytics versions 11.x through 13.0.0.579 contain a command execution vulnerability allowing attackers to run arbitrary system commands via the EXECUTE function.
Google Drive for WordPress contains an unspecified security vulnerability that requires immediate attention from system administrators.
A flaw has been found in projectworlds hospital-management-system-in-php 1
A security vulnerability has been identified in the WordPress plugin "WP with Spritz." The vulnerability requires immediate review and mitigation by site administrators.
A security flaw has been discovered in linlinjava litemall up to version 1.
Woocommerce CSV Importer 3
Redaxo CMS Addon MyEvents 2
Nordex N149/4
A security flaw has been identified in the Edimax BR-6428NS router that could potentially be exploited by remote attackers.
A vulnerability has been identified in the Edimax BR-6428NS router that could potentially lead to unauthorized access.
Allok Fast AVI MPEG Splitter 1
Allok AVI DivX MPEG to DVD Converter 2
VX Search 10
A vulnerability exists in the Joomla extension EkRishta, potentially allowing unauthorized access or control over the affected site.
Zechat 1
Zechat 1
A security flaw has been discovered in h2oai h2o-3, impacting versions up to 7402.
A flaw has been found in fishaudio Bert-VITS2, which requires prompt attention from security administrators.
A vulnerability has been found in fishaudio Bert-VITS2 up to 8f7fbd8c4770965225d258db548da27dc8dd934c
A security vulnerability has been identified in the AdenHQ Hive platform. The specific technical details regarding the flaw are currently limited pending further vendor disclosure.
A security vulnerability has been identified in the Metasoft MetaCRM platform. The exact nature of the vulnerability is currently under investigation by the vendor.
A vulnerability was identified in xiandafu beetl up to 3
A security vulnerability has been identified in the Vercel AI platform. Technical details are currently limited, requiring users to await further guidance from the vendor.
A security vulnerability has been identified in the H3C Magic B3 networking hardware. Further technical details remain under investigation by the manufacturer.