Tuesday, March 31, 2026

Today's Security Snapshot

Critical vulnerabilities, curated daily for security professionals

🎯 SSCV Profile

See how vulnerabilities affect your specific environment

CRS uses the System Security Context Vector (SSCV) Framework v1.0 to adjust CVSS scores based on your system's exposure level, network position, and business criticality. Learn more about SSCV Framework

Risk scores will be adjusted based on your selected environment

Today's Security Brief

Yesterday's disclosures include two maximum-severity vulnerabilities in MLflow (CVE-2025-15379, CVSS 10.0) and Arch steam-trader (CVE-2026-5128, CVSS 10.0), alongside critical remote code execution flaws in WordPress, Nginx UI, and SciTokens. The disclosure volume includes 14 critical CVEsβ€”double the prior day's count of 7β€”and 68 high-priority vulnerabilities, up 11% from 61. Actively exploited vulnerabilities affect Citrix NetScaler (CVE-2026-3055), Zimbra Collaboration Suite (CVE-2025-66376), Craft CMS (CVE-2025-32432), and three Apple product lines, with 9 KEV entries confirmed. Attack patterns center on remote code execution and authentication bypass across web frameworks, CMS platforms, and developer tooling. No patches are currently available for the disclosed vulnerabilities, making compensating controls and network-level mitigations essential in the interim.

  • Two CVSS 10.0 vulnerabilities disclosed in MLflow (CVE-2025-15379) and Arch steam-trader (CVE-2026-5128) require immediate risk assessment
  • Critical CVE count doubled from 7 to 14 compared to the prior day, a 100% increase
  • 68 high-priority vulnerabilities disclosed, up 11% from 61 the previous day
  • RCE and authentication bypass flaws dominate disclosures across WordPress, Nginx UI, SciTokens, and multiple CMS frameworks
  • Patch availability stands at 0%β€”no vendor fixes are currently released for these disclosures
  • 9 actively exploited vulnerabilities confirmed, affecting Citrix NetScaler, Zimbra, Apple products, Craft CMS, Laravel Livewire, and Langflow

Immediate action: Prioritize risk assessment for environments running MLflow, WordPress, Nginx UI, Citrix NetScaler, Zimbra, and Apple products, as these carry the highest severity scores and confirmed exploitation activity. With patch availability at 0%, implement compensating controls including network segmentation, WAF rules, and access restrictions for affected services until vendor fixes are released.

πŸ’‘ Tip: Swipe CVE cards left to ⭐ star, right to ❌ remove

Section Navigation