Thursday, May 14, 2026

Today's Security Snapshot

Critical vulnerabilities, curated daily for security professionals

🎯 SSCV Profile

See how vulnerabilities affect your specific environment

CRS uses the System Security Context Vector (SSCV) Framework v1.0 to adjust CVSS scores based on your system's exposure level, network position, and business criticality. Learn more about SSCV Framework

Risk scores will be adjusted based on your selected environment

Today's Security Brief

Thursday's disclosures center on multiple maximum-severity Node.js vm2 sandbox escape vulnerabilities affecting server-side JavaScript execution environments. Critical CVE volume dropped to 16 from 39 the prior day (-59%), while high-priority CVEs held steady at 100. Notable critical items include CVE-2026-44005, CVE-2026-43997, and CVE-2026-44006 (all CVSS 10) targeting Node.js vm2, CVE-2026-44442 (CVSS 9.9) in ERPNext, and CVE-2026-41050 (CVSS 9.9) in Rancher Fleet. Attack patterns are dominated by sandbox escape and remote code execution, with secondary clusters in WordPress plugins (CVE-2026-6271, CVE-2026-6510) and mail security gateways. Patch availability sits at 0% for today's disclosures, so defenders should rely on compensating controls and vendor advisories until fixes ship.

  • Node.js vm2 library hit with multiple CVSS 10 sandbox escape vulnerabilities (CVE-2026-44005, CVE-2026-43997, CVE-2026-44006)
  • 16 critical CVEs disclosed, down 59% from prior day's 39
  • 100 high-priority CVEs disclosed, unchanged from prior day
  • Remote code execution and sandbox escape dominate, with ERPNext (CVE-2026-44442) and Rancher Fleet (CVE-2026-41050) also affected
  • 0% patch availability across today's critical disclosures; mitigations required pending vendor fixes
  • 1 actively exploited vulnerability in Linux Kernel (CVE-2026-31431, CVSS 9.5) carried over from prior reporting

Immediate action: Prioritize inventory and isolation of any Node.js services using the vm2 sandbox library, as three CVSS 10 escapes enable code execution on host systems; WordPress plugin and ERPNext deployments should also be reviewed for exposure. With no patches available for today's critical issues, apply network segmentation, restrict untrusted input to vm2-based workloads, and monitor vendor advisories for fix releases.

πŸ’‘ Tip: Swipe CVE cards left to ⭐ star, right to ❌ remove

Section Navigation