CVE-2026-9082
Drupal Core SQL Injection Vulnerability - Active in CISA KEV catalog.
Critical vulnerabilities, curated daily for security professionals
See how vulnerabilities affect your specific environment
CRS uses the System Security Context Vector (SSCV) Framework v1.0 to adjust CVSS scores based on your system's exposure level, network position, and business criticality. Learn more about SSCV Framework
Sunday's vulnerability landscape is dominated by ten actively exploited CVEs spanning Microsoft Defender, Trend Micro Apex One, Drupal Core, and a cluster of long-standing Microsoft client-side flaws. No new Critical or High-priority CVEs were disclosed yesterday, matching the prior day's zero Critical count and reflecting a -100% change in High-priority disclosures. Notable exploited issues include CVE-2026-41091 and CVE-2026-45498 in Microsoft Defender, CVE-2026-34926 in Trend Micro Apex One, and CVE-2026-9082 in Drupal Core, all rated CVSS 9.5. Endpoint security platforms and content management systems remain the focal point for attackers, alongside continued opportunistic exploitation of decade-old Microsoft Internet Explorer and DirectX vulnerabilities against unpatched environments. With zero new disclosures requiring triage, defenders should redirect capacity toward verifying patch coverage on the exploited products listed below.
Immediate action: Prioritize patch verification on Microsoft Defender (CVE-2026-41091, CVE-2026-45498), Trend Micro Apex One (CVE-2026-34926), Drupal Core (CVE-2026-9082), and Langflow (CVE-2025-34291), since these are confirmed under active exploitation. Vendor patches are available for all ten exploited CVEs, so today's effort should focus on coverage gap analysis and confirming deployment across endpoint security and public-facing web stacks.