CVE-2026-20182
Cisco Catalyst SD-WAN Controller Authentication Bypass Vulnerability - Active in CISA KEV catalog.
Critical vulnerabilities, curated daily for security professionals
See how vulnerabilities affect your specific environment
CRS uses the System Security Context Vector (SSCV) Framework v1.0 to adjust CVSS scores based on your system's exposure level, network position, and business criticality. Learn more about SSCV Framework
Tuesday's disclosures center on Microsoft Azure Local, SGLang AI runtimes, and WordPress, with multiple remote code execution flaws affecting widely deployed enterprise and developer infrastructure. The brief covers 10 critical CVEs (up 233% from yesterday's 3) and 35 high-priority vulnerabilities (up 52% from 23). Notable issues include CVE-2026-42822 (CVSS 10) in Azure Local Disconnected, CVE-2026-27130 (CVSS 9.9) in Dokploy deployment platform, and three SGLang multimodal runtime flaws (CVE-2026-7301, CVE-2026-7302, CVE-2026-7304). Attack patterns skew toward RCE and unauthenticated access against cloud orchestration, AI inference services, and WordPress ecosystems. No vendor patches are currently available across this batch, requiring compensating controls and exposure reduction as the primary near-term posture.
Immediate action: Prioritize exposure reduction for Azure Local Disconnected, Dokploy, SGLang inference endpoints, and WordPress deployments, and verify Cisco Catalyst SD-WAN and affected Microsoft systems against the two actively exploited CVEs. With no vendor patches yet published for the critical batch, apply network segmentation, restrict management interface exposure, and monitor for indicators tied to the listed CVE IDs until fixes are released.
Cisco Catalyst SD-WAN Controller Authentication Bypass Vulnerability - Active in CISA KEV catalog.
A cross-site scripting (XSS) vulnerability in Microsoft Exchange Server allows unauthenticated attackers to perform spoofing over a network.
The Piotnet Addons for Elementor Pro plugin for WordPress is vulnerable to arbitrary file upload due to insufficient extension filtering, enabling unauthenticated remote code execution.
Improper authentication in Azure Local Disconnected Operations allows an unauthorized attacker to perform privilege escalation over the network.
The SGLangs multimodal generation runtime is vulnerable to unauthenticated remote code execution when custom logit processing is enabled, due to unsafe Python object deserialization.
WebdriverIO versions below 9.24.0 are vulnerable to command injection via unsanitized branch names, leading to remote code execution in test orchestration environments.
The SGLangs scheduler binds its ROUTER socket to 0.0.0.0 and performs unsafe pickle deserialization on incoming messages, enabling unauthenticated remote code execution.
The snmpv3 USM Handler in lwIP up to 2.2.1 is vulnerable to a stack-based buffer overflow in the snmp_parse_inbound_frame function, allowing remote code execution.
The Amazon Redshift Python driver contains a critical vulnerability where `eval()` is used on server-received data, allowing a malicious server to trigger remote code execution on the client.
Dokploy 0.26.6 and below contain an OS command injection vulnerability in the appName parameter, allowing authenticated attackers to execute arbitrary commands with server-level privileges.
DumbAssets contains a path traversal vulnerability in the file deletion API that allows unauthenticated attackers to delete arbitrary files, resulting in denial of service.
The SGLangs runtime is vulnerable to an unauthenticated path traversal attack, allowing remote attackers to write arbitrary files to the server's filesystem.
A Remote Code Execution (RCE) vulnerability exists in the Chromium-based Microsoft Edge browser.
The Autoptimize WordPress plugin before 3
The WP Photo Album Plus WordPress plugin before 9
The WP Maps WordPress plugin before 4
This affects versions of the package exifreader before 4
The Ajax Load More WordPress plugin before 7
An issue in prestashop upsshipping all versions through at least 2
Use after free vulnerability in Samsung Open Source Escargot allows Pointer Manipulation
Heap-based buffer overflow vulnerability in Samsung Open Source Escargot allows Overflow Buffers
A security flaw has been discovered in the GnuTLS library, a widely used implementation of the TLS and SSL protocols.
Out-of-bounds write vulnerability in Samsung Open Source Escargot allows Overflow Buffers
Mullvad VPN is a VPN client app for desktop and mobile
Improper neutralization of input during web page generation ('cross-site scripting') vulnerability in Basamak Information Technology Consulting and Organization Trade Ltd
ngrok v4
Thermo Fisher Scientific Torrent Suite Dx through 5
in OpenHarmony v6
A local privilege escalation vulnerability exists in O+ Connect because it fails to validate the identity of the caller on the pipe interface
Mattermost versions 11
in OpenHarmony v6
Net::Statsd::Tiny versions before 0
Joplin is an open source note-taking and to-do application that organises notes and lists into notebooks
SOGo 5
in OpenHarmony v6
Claude HUD through 0
Dify version 1
Mattermost versions 11
A vulnerability has been identified in the AutoGPT workflow automation platform, which is used for managing continuous artificial intelligence agents.
In tinyMQTT commit 6226ade15bd4f97be2d196352e64dd10937c1962 (2024-02-18), the broker mishandles protocol violations during CONNECT packet parsing
A security flaw has been reported in the AutoGPT platform, impacting its functionality for creating and managing continuous artificial intelligence agents.
Dify version 1
Summarize prior to 0
FacturaScripts is an open source accounting and invoicing software
Summarize prior to 0
A security vulnerability has been identified within the AutoGPT workflow automation platform, which facilitates the management of AI agents.
In mlflow/mlflow versions prior to 3