CVE-2026-35616
Fortinet FortiClientEMS versions 7.4.5 and 7.4.6 contain an improper access control vulnerability. Unauthenticated attackers can execute unauthorized code or commands via crafted requests.
Critical vulnerabilities, curated daily for security professionals
See how vulnerabilities affect your specific environment
CRS uses the System Security Context Vector (SSCV) Framework v1.0 to adjust CVSS scores based on your system's exposure level, network position, and business criticality. Learn more about SSCV Framework
Wednesday's vulnerability disclosures revealed 27 critical-severity CVEs, a 69% increase from the prior day, with HP products bearing the highest impact including a maximum-severity CVSS 10.0 code execution flaw (CVE-2026-39337). WordPress faced multiple critical vulnerabilities (CVE-2026-3296, CVE-2026-0740), while Google Web Fonts (CVE-2026-3535) and Apache ChurchCRM (CVE-2026-35573) also disclosed high-impact issues. Remote code execution and unauthorized access patterns dominate across enterprise collaboration tools, content management systems, and endpoint management platforms. No patches are currently available for any of the 127 disclosed vulnerabilities, and four CVEs have confirmed active exploitation including Fortinet FortiClient EMS and Google Dawn.
Immediate action: Prioritize risk assessment for HP products, WordPress installations, and Fortinet FortiClient EMS deployments, applying network-level mitigations such as access restrictions and monitoring where patches are unavailable. With zero patches currently available across all disclosed vulnerabilities, organizations should implement compensating controls, increase monitoring for exploitation indicators, and prepare for rapid patching as vendor updates are released.
Fortinet FortiClientEMS versions 7.4.5 and 7.4.6 contain an improper access control vulnerability. Unauthenticated attackers can execute unauthorized code or commands via crafted requests.
Aquasecurity Trivy Embedded Malicious Code Vulnerability - Active in CISA KEV catalog.
A use-after-free vulnerability exists in the Dawn component of Google Chrome. This flaw allows attackers to potentially execute arbitrary code or cause a denial-of-service via a crafted HTML page.
TrueConf Client Download of Code Without Integrity Check Vulnerability - Active in CISA KEV catalog.
The Google Web Fonts GDPR plugin for WordPress is vulnerable to unauthenticated arbitrary file upload via the `DSGVOGWPdownloadGoogleFonts()` function, potentially leading to remote code execution.
A broken access control flaw in the Genealogy PHP application allows authenticated users to transfer ownership of arbitrary non-personal team workspaces to their own accounts.
The Everest Forms WordPress plugin is vulnerable to PHP Object Injection via unsafe deserialization of user-supplied form metadata.
ChurchCRM is an open-source church management system. Prior to 7.1.0, critical pre-authentication remote code execution vulnerability in ChurchCRM's setup wizard allows unauthenticated attackers to inject arbitrary PHP code during the initial installation process, leading to complete server compromise. The "$dbPassword" variable is not sanitized. This vulnerability exists due to an incomplete fix for CVE-2025-62521. This vulnerability is fixed in 7.1.0.
Tianxin Internet Behavior Management System contains a command injection vulnerability in the Reporter component endpoint that allows unauthenticated attackers to execute arbitrary commands by supplying a crafted objClass parameter containing shell metacharacters and output redirection. Attackers can exploit this vulnerability to write malicious PHP files into the web root and achieve remote code execution with the privileges of the web server process. This vulnerability has been fixed in version NACFirmware_4.0.0.7_20210716.180815_topsec_0_basic.bin. Exploitation evidence was first observed by the Shadowserver Foundation on 2024-06-01 (UTC).
The Ninja Forms File Uploads plugin is vulnerable to unauthenticated arbitrary file uploads, potentially leading to remote code execution.
ChurchCRM's backup restore functionality is vulnerable to path traversal, allowing authenticated administrators to overwrite configuration files and achieve remote code execution.
ChurchCRM is an open-source church management system. Prior to 7.1.0, a critical authentication bypass vulnerability in ChurchCRM's API middleware (ChurchCRM/Slim/Middleware/AuthMiddleware.php) allows unauthenticated attackers to access all protected API endpoints by including "api/public" anywhere in the request URL, leading to complete exposure of church member data and system information. This vulnerability is fixed in 7.1.0.
SiYuan personal knowledge management system is vulnerable to stored XSS, which can lead to remote code execution in the Electron desktop client.
A Path Traversal vulnerability in the PraisonAI Action Orchestrator allows attackers to read or write arbitrary files on the host system.
The Users manager β PN WordPress plugin contains a privilege escalation flaw allowing unauthenticated attackers to modify arbitrary user metadata.
Memory safety bugs present in Firefox ESR 115.34.0, Firefox ESR 140.9.0, Thunderbird ESR 140.9.0, Firefox 149.0.1 and Thunderbird 149.0.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 149.0.2, Firefox ESR < 115.34.1, Firefox ESR < 140.9.1, Thunderbird < 149.0.2, and Thunderbird < 140.9.1.
Memory safety bugs present in Firefox ESR 140.9.0, Thunderbird ESR 140.9.0, Firefox 149.0.1 and Thunderbird 149.0.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 149.0.2, Firefox ESR < 140.9.1, Thunderbird < 149.0.2, and Thunderbird < 140.9.1.
Memory safety bugs present in Firefox 149.0.1 and Thunderbird 149.0.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 149.0.2 and Thunderbird < 149.0.2.
Cockpit's remote login feature is vulnerable to command injection via unsanitized input, allowing unauthenticated attackers to achieve remote code execution.
A heap-based buffer overflow exists in LibRaw's `lossless_jpeg_load_raw` function, which can be triggered by a specially crafted malicious file.
Weaver (Fanwei) E-cology 10.0 versions prior toΒ 20260312 contain an unauthenticated remote code execution vulnerability in the /papi/esearch/data/devops/dubboApi/debug/method endpoint that allows attackers to execute arbitrary commands by invoking exposed debug functionality. Attackers can craft POST requests with attacker-controlled interfaceName and methodName parameters to reach command-execution helpers and achieve arbitrary command execution on the system.Β Exploitation evidence was first observed by the Shadowserver Foundation on 2026-03-31 (UTC).
The Emmett web framework is vulnerable to path traversal attacks via the RSGI static handler, allowing unauthorized access to arbitrary files.
IBM Verify Identity and Security Verify Access products contain a privilege escalation vulnerability allowing locally authenticated users to gain root access.
Emissary is a P2P based data-driven workflow engine. Prior to 8.39.0, GitHub Actions workflow files contained shell injection points where user-controlled workflow_dispatch inputs were interpolated directly into shell commands via ${{ }} expression syntax. An attacker with repository write access could inject arbitrary shell commands, leading to repository poisoning and supply chain compromise affecting all downstream users. This vulnerability is fixed in 8.39.0.
The @delmaredigital/payload-puck plugin for PayloadCMS bypasses collection-level access controls, allowing unauthorized API access.
A path traversal vulnerability exists in mintplex-labs/anything-llm versions up to and including 1.9.1, within the `AgentFlows` component. The vulnerability arises from improper handling of user input in the `loadFlow` and `deleteFlow` methods in `server/utils/agentFlows/index.js`. Specifically, the combination of `path.join` and `normalizePath` allows attackers to bypass directory restrictions and access or delete arbitrary `.json` files on the server. This can lead to information disclosure, such as leaking sensitive configuration files containing API keys, or denial of service by deleting critical files like `package.json`. The issue is resolved in version 1.12.1.
Windmill CE and EE versions 1.276.0 through 1.603.2 contain an SQL injection vulnerability in the folder ownership management functionality that allows authenticated attackers to inject SQL through the owner parameter. An attacker can use the injection to read sensitive data such as the JWT signing secret and administrative user identifiers, forge an administrative token, and then execute arbitrary code via the workflow execution endpoints.
A heap-based buffer overflow exists in LibRaw's `x3f_thumb_loader` functionality, which can be triggered by a malicious file.
A heap-based buffer overflow exists in LibRaw's `HuffTable::initval` functionality, which can be triggered by a malicious file.
lollms uses a weak secret key for JWT signing, enabling attackers to forge administrative tokens via offline brute-force.
An improper decorator ordering in changedetection.io causes authentication wrappers to be bypassed, exposing sensitive routes to unauthenticated access.
A race condition in the Apache Kafka Java producer clientβs buffer pool management can cause messages to be silently delivered to incorrect topics
A vulnerability has been identified in the graphical user interface (GUI) of HPE Aruba Networking Private 5G Core On-Prem that could allow an attacker to abuse an open redirect vulnerability in the login flow using a crafted URL
Remote Code Execution VulnerabilityΒ in JP1/IT Desktop Management 2 - Manager on Windows, JP1/IT Desktop Management 2 - Operations Director on Windows, Job Management Partner 1/IT Desktop Management 2 - Manager on Windows, JP1/IT Desktop Management - Manager on Windows, Job Management Partner 1/IT Desktop Management - Manager on Windows, JP1/NETM/DM Manager on Windows, JP1/NETM/DM Client on Windows, Job Management Partner 1/Software Distribution Manager on Windows, Job Management Partner 1/Software Distribution Client on Windows
The Product Feed PRO for WooCommerce by AdTribes β Product Feeds for WooCommerce plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions 13
Directus is a real-time API and App dashboard for managing SQL database content
Directus is a real-time API and App dashboard for managing SQL database content
Privilege escalationΒ in Apache Cassandra 5
The Booking for Appointments and Events Calendar β Amelia plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 2
PraisonAI is a multi-agent teams system
Brave CMS is an open-source CMS
OpenSTAManager is an open source management software for technical assistance and invoicing
Improper Input Validation, Improper Control of Generation of Code ('Code Injection') vulnerability in Apache ActiveMQ Broker, Apache ActiveMQ
ChurchCRM is an open-source church management system
ChurchCRM is an open-source church management system
ChurchCRM is an open-source church management system
ChurchCRM is an open-source church management system
ChurchCRM is an open-source church management system
ChurchCRM is an open-source church management system
ChurchCRM is an open-source church management system
ChurchCRM is an open-source church management system
ChurchCRM is an open-source church management system
ChurchCRM is an open-source church management system
ChurchCRM is an open-source church management system
ChurchCRM is an open-source church management system
ChurchCRM is an open-source church management system
FTLDNS (pihole-FTL) provides an interactive API and also generates statistics for Pi-hole's Web interface
FTLDNS (pihole-FTL) provides an interactive API and also generates statistics for Pi-hole's Web interface
FTLDNS (pihole-FTL) provides an interactive API and also generates statistics for Pi-hole's Web interface
FTLDNS (pihole-FTL) provides an interactive API and also generates statistics for Pi-hole's Web interface
FTLDNS (pihole-FTL) provides an interactive API and also generates statistics for Pi-hole's Web interface
Brave CMS is an open-source CMS
WeGIA is a Web manager for charitable institutions
Unsanitized input in the FileBrowser API in AWS Research and Engineering Studio (RES) version 2024
Podman Desktop is a graphical tool for developing on containers and Kubernetes
ChurchCRM is an open-source church management system
ChurchCRM is an open-source church management system
BentoML is a Python library for building online serving systems optimized for AI apps and model inference
pyLoad is a free and open-source download manager written in Python
curl_cffi is the a Python binding for curl
A vulnerability was identified in Tenda CX12L 16
A security flaw has been discovered in Tenda CX12L 16
A weakness has been identified in Tenda CX12L 16
Unsanitized input in an OS command in the virtual desktop session name handling in AWS Research and Engineering Studio (RES)Β version 2025
Unsanitized control of user-modifiable attributes in the session creation component in AWS Research and Engineering Studio (RES) prior to version 2026
IBM Langflow Desktop 1
BentoML is a Python library for building online serving systems optimized for AI apps and model inference
A flaw was found in libssh
Plunk is an open-source email platform built on top of AWS SES
IBM Verify Identity Access Container 11
IBM Tivoli Netcool Impact 7
LiteLLM is a proxy server (AI Gateway) to call LLM APIs in OpenAI (or native) format
A flaw was found in Open Cluster Management (OCM), the technology underlying Red Hat Advanced Cluster Management (ACM)
GLPI is a free asset and IT management software package
A vulnerability was determined in Tenda CX12L 16
Nokia MantaRay NM is vulnerable to an OS command injection vulnerability due to improper neutralization of special elements used in an OS command in Log Search application
SQL Injection vulnerability exists in MATCHA INVOICE 2
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in David Lingren Media LIbrary Assistant allows SQL Injection
A heap-based buffer overflow vulnerability exists in the x3f_load_huffman functionality of LibRaw Commit d20315b
ChurchCRM is an open-source church management system
A vulnerability in the Mattermost Plugin Legal Hold allows for potential security bypasses in version 1 and earlier.
Homarr is an open-source dashboard
Memory corruption when decoding corrupted satellite data files with invalid signature offsets
In Modem, there is a possible out of bounds write due to a missing bounds check
Incorrect boundary conditions, integer overflow in the Graphics: Text component
Incorrect boundary conditions in the Graphics: WebGPU component
Windmill versions 1
PolarLearn is a free and open-source learning program
ChurchCRM is an open-source church management system
Anthropic Claude Code CLI and Claude Agent SDK contain an OS command injection vulnerability in the command lookup helper and deep-link terminal launcher that allows local attackers to execute arbitrary commands by manipulating the TERMINAL environment variable
Mobile Next is an MCP server for mobile development and automation
Vim is an open source, command line text editor
libp2p-rust is the official rust language Implementation of the libp2p networking stack
Ferret is a declarative system for working with web data
Tandoor Recipes is an application for managing recipes, planning meals, and building shopping lists
An integer overflow vulnerability exists in the deflate_dng_load_raw functionality of LibRaw Commit 8dc68e2
An integer overflow vulnerability exists in the uncompressed_fp_dng_load_raw functionality of LibRaw Commit 8dc68e2
An issue that allowed all-organization administrators to promote accounts to superuser status has been resolved
Tandoor Recipes is an application for managing recipes, planning meals, and building shopping lists
File Browser is a file managing interface for uploading, deleting, previewing, renaming, and editing files within a specified directory
ChurchCRM is an open-source church management system
ChurchCRM is an open-source church management system
RedwoodSDK is a server-first React framework
In Modem, there is a possible out of bounds write due to a missing bounds check
ChurchCRM is an open-source church management system
Twitch Studio version 0
Memory corruption when buffer copy operation fails due to integer overflow during attestation report generation
Memory corruption while preprocessing IOCTL request in JPEG driver
Memory corruption while processing a frame request from user
Memory Corruption when retrieving output buffer with insufficient size validation
Memory Corruption when sending IOCTL requests with invalid buffer sizes during memcpy operations
Memory Corruption when accessing an output buffer without validating its size during IOCTL processing
Memory Corruption when processing auxiliary sensor input/output control commands with insufficient buffer size validation
Memory Corruption when accessing an output buffer without validating its size during IOCTL processing
Memory Corruption when accessing an output buffer without validating its size during IOCTL processing in a camera sensor driver
Memory Corruption when accessing an output buffer without validating its size during IOCTL processing in a camera sensor driver
Memory Corruption when using deprecated DMABUF IOCTL calls to manage video memory
Memory Corruption when handling power management requests with improperly sized input/output buffers
OpenEXR provides the specification and reference implementation of the EXR file format, an image storage format for the motion picture industry
Anthropic Claude Code CLI and Claude Agent SDK contain an OS command injection vulnerability in the prompt editor invocation utility that allows attackers to execute arbitrary commands by crafting malicious file paths
There is a memory corruption vulnerability due to an out-of-bounds write when loading a corrupted LVLIB file in NI LabVIEW