CVE-2026-20122
Cisco Catalyst SD-WAN Manager Incorrect Use of Privileged APIs Vulnerability - Active in CISA KEV catalog.
Critical vulnerabilities, curated daily for security professionals
See how vulnerabilities affect your specific environment
CRS uses the System Security Context Vector (SSCV) Framework v1.0 to adjust CVSS scores based on your system's exposure level, network position, and business criticality. Learn more about SSCV Framework
Wednesday's disclosures center on PostgreSQL, Linux/Kubernetes, and Nginx infrastructure vulnerabilities, with a maximum-severity flaw affecting WWBN AVideo. Critical CVE volume doubled from yesterday to 28 (up 100%), while high-priority vulnerabilities rose to 100 (up 54%). Notable issues include CVE-2026-40906 (CVSS 9.9) in PostgreSQL, CVE-2026-33519 (CVSS 9.8) affecting Linux and Kubernetes, and CVE-2026-40911 (CVSS 10) in WWBN AVideo. Remote code execution and uninitialized memory flaws dominate the attack patterns, with Oracle, Cisco, and Microsoft products also heavily represented. No patches are currently available for the disclosed vulnerabilities, requiring defensive mitigations and compensating controls.
Immediate action: Prioritize review of PostgreSQL, Linux/Kubernetes, Nginx, and Oracle deployments, alongside Cisco Catalyst SD-WAN Manager instances with confirmed active exploitation. With no patches currently available, apply vendor-recommended mitigations, restrict network exposure, and monitor for exploitation indicators on affected systems.
Cisco Catalyst SD-WAN Manager Incorrect Use of Privileged APIs Vulnerability - Active in CISA KEV catalog.
Cisco Catalyst SD-WAN Manager Exposure of Sensitive Information to an Unauthorized Actor Vulnerability - Active in CISA KEV catalog.
Synacor Zimbra Collaboration Suite (ZCS) Cross-site Scripting Vulnerability - Active in CISA KEV catalog.
Cisco Catalyst SD-WAN Manager Storing Passwords in a Recoverable Format Vulnerability - Active in CISA KEV catalog.
Microsoft Visual Basic for Applications Insecure Library Loading Vulnerability - Active in CISA KEV catalog.
Microsoft Windows Link Following Vulnerability - Active in CISA KEV catalog.
Microsoft Exchange Server Deserialization of Untrusted Data Vulnerability - Active in CISA KEV catalog.
Microsoft Windows Out-of-Bounds Read Vulnerability - Active in CISA KEV catalog.
Adobe Acrobat Use-After-Free Vulnerability - Active in CISA KEV catalog.
Adobe Acrobat Reader is vulnerable to prototype pollution, which can result in arbitrary code execution when a victim opens a malicious file.
Microsoft Office Remote Code Execution - Active in CISA KEV catalog.
Microsoft SharePoint Server Improper Input Validation Vulnerability - Active in CISA KEV catalog.
Apache ActiveMQ Improper Input Validation Vulnerability - Active in CISA KEV catalog.
Kentico Xperience Path Traversal Vulnerability - Active in CISA KEV catalog.
PaperCut NG/MF Improper Authentication Vulnerability - Active in CISA KEV catalog.
Quest KACE Systems Management Appliance (SMA) Improper Authentication Vulnerability - Active in CISA KEV catalog.
JetBrains TeamCity Relative Path Traversal Vulnerability - Active in CISA KEV catalog.
ElectricSQL is vulnerable to error-based SQL injection via the /v1/shape API, allowing authenticated users to read, modify, or destroy database contents.
An unauthenticated SQL injection vulnerability in the Vendure Shop API allows remote attackers to execute arbitrary SQL commands against the backend database.
An incorrect authorization vulnerability exists in Esri Portal for ArcGIS 11.4, 11.5 and 12.0 on Windows, Linux and Kubernetes that did not correctly check permissions assigned to developer credentials.
An incorrect privilege assignment vulnerability exists in Esri Portal for ArcGIS 11.5 in Windows and Linux that allows highly privileged users to create developer credentials that may grant more privileges than expected.
OAuth2 Proxy is a reverse proxy that provides authentication using OAuth2 providers. Versions 7.5.0 through 7.15.1 may trust a client-supplied `X-Forwarded-Uri` header when `--reverse-proxy` is enabled and `--skip-auth-regex` or `--skip-auth-route` is configured. An attacker can spoof this header so OAuth2 Proxy evaluates authentication and skip-auth rules against a different path than the one actually sent to the upstream application. This can result in an unauthenticated remote attacker bypassing authentication and accessing protected routes without a valid session. Impacted users are deployments that run oauth2-proxy with `--reverse-proxy` enabled and configure at least one `--skip-auth-regex` or `--skip-auth-route` rule. This issue is patched in `v7.15.2`. Some workarounds are available for those who cannot upgrade immediately. Strip any client-provided `X-Forwarded-Uri` header at the reverse proxy or load balancer level; explicitly overwrite `X-Forwarded-Uri` with the actual request URI before forwarding requests to OAuth2 Proxy; restrict direct client access to OAuth2 Proxy so it can only be reached through a trusted reverse proxy; and/or remove or narrow `--skip-auth-regex` / `--skip-auth-route` rules where possible. For nginx-based deployments, ensure `X-Forwarded-Uri` is set by nginx and not passed through from the client.
A WebSocket-based cross-site scripting (XSS) vulnerability in the AVideo YPTSocket plugin allows unauthenticated attackers to achieve universal account takeover.
Uninitialized memory in the Audio/Video: Web Codecs component. This vulnerability was fixed in Firefox 150, Firefox ESR 140.10, Thunderbird 150, and Thunderbird 140.10.
Mitigation bypass in the Networking: Cookies component. This vulnerability was fixed in Firefox 150 and Thunderbird 150.
Mitigation bypass in the DOM: Security component. This vulnerability was fixed in Firefox 150, Firefox ESR 140.10, Thunderbird 150, and Thunderbird 140.10.
An unauthenticated, easily exploitable vulnerability in the Oracle Advanced Inbound Telephony component allows a remote attacker to achieve a full system takeover.
WWBN AVideo is an open source video platform. In versions up to and including 29.0, an incomplete fix for AVideo's `test.php` adds `escapeshellarg` for wget but leaves the `file_get_contents` and `curl` code paths unsanitized, and the URL validation regex `/^http/` accepts strings like `httpevil[.]com`. Commit 78bccae74634ead68aa6528d631c9ec4fd7aa536 contains an updated fix.
Improper verification of cryptographic signature in ASP.NET Core allows an unauthorized attacker to elevate privileges over a network.
A high-privileged vulnerability in the Oracle Enterprise Manager Event Management component allows for a full system takeover and cross-product impact.
An unauthenticated vulnerability in the Oracle Identity Manager Connector allows remote attackers to gain unauthorized access to critical identity data.
An unauthenticated vulnerability in the Oracle Identity Manager Connector permits remote attackers to perform unauthorized operations on critical identity data.
An unauthenticated vulnerability in the Oracle Identity Manager Connector enables remote attackers to compromise sensitive identity data through unauthorized access.
FreeScout is a free self-hosted help desk and shared mailbox. Versions prior to 1.8.213 have a mass assignment vulnerability in the mailbox connection settings endpoints of FreeScout (`connectionIncomingSave()` at `app/Http/Controllers/MailboxesController.php:468` and `connectionOutgoingSave()` at line 398). Both methods pass `$request->all()` directly to `$mailbox->fill()` without any field allowlisting, allowing an authenticated admin to overwrite any of the 32 fields in the Mailbox model's `$fillable` array -- including security-critical fields that do not belong to the connection settings form, such as `auto_bcc`, `out_server`, `out_password`, `signature`, `auto_reply_enabled`, and `auto_reply_message`. Validation in `connectionIncomingSave()` is entirely commented out, and the validator in `connectionOutgoingSave()` only checks value formats for SMTP fields without stripping extra parameters. An authenticated admin user can exploit this by appending hidden parameters (e.g., `auto_bcc=attacker@evil.com`) to a legitimate connection settings save request. Because the `auto_bcc` field is not displayed on the connection settings form (it only appears on the general mailbox settings page), the injection is invisible to other administrators reviewing connection settings. Once set, every outgoing email from the affected mailbox is silently BCC'd to the attacker via the `SendReplyToCustomer` job. The same mechanism allows redirecting outgoing SMTP through an attacker-controlled server, injecting tracking pixels or phishing links into email signatures, and enabling attacker-crafted auto-replies -- all from a single HTTP request. This is particularly dangerous in multi-admin environments where one admin can silently surveil mailboxes managed by others, and when an admin session is compromised via a separate vulnerability (e.g., XSS), the attacker gains persistent email exfiltration that survives session expiry. Version 1.8.213 fixes the issue.
A path traversal vulnerability in excel-mcp-server allows unauthenticated remote attackers to read, write, and overwrite arbitrary files on the host filesystem.
A critical unauthenticated path traversal vulnerability in CrowdStrike LogScale allows remote attackers to read arbitrary files from the server filesystem.
An insecure direct object reference vulnerability in the Users API component of Crafty Controller allows a remote, authenticated attacker to perform user modification actions via improper API permissions validation.
OpenClaw before 2026.3.31 contains a sandbox bypass vulnerability allowing attackers to escalate privileges via heartbeat context inheritance and senderIsOwner parameter manipulation. Attackers can exploit improper context validation to bypass sandbox restrictions and achieve unauthorized privilege escalation.
An SFTP authentication bypass in goshs allows unauthenticated network attackers to access files without a password when specific configurations are used.
Storable versions before 3.05 for Perl has a stack overflow. The retrieve_hook function stored the length of the class name into a signed integer but in read operations treated the length as unsigned. This allowed an attacker to craft data that could trigger the overflow.
Net::Dropbear versions before 0.14 contain outdated libtomcrypt dependencies, exposing the application to multiple known cryptographic vulnerabilities.
Flowise prior to 3.1.0 is vulnerable to OS command injection due to unsafe serialization of stdio commands in the MCP adapter, allowing authenticated attackers to execute arbitrary commands.
NewSoftOA is susceptible to an unauthenticated OS command injection vulnerability, permitting remote attackers to execute arbitrary commands on the server.
FreeScout is a free self-hosted help desk and shared mailbox. Prior to version 1.8.215, FreeScout's module installation feature extracts ZIP archives without validating file paths, allowing an authenticated admin to write files arbitrarily on the server filesystem via a specially crafted ZIP. Version 1.8.215 fixes the vulnerability.
The goshs SimpleHTTPServer is affected by an ArtiPACKED vulnerability that can lead to the unauthorized leakage of GITHUB_TOKEN credentials via workflow artifacts.
Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Web Services)
Vulnerability in the Oracle HTTP Server product of Oracle Fusion Middleware (component: Core)
Vulnerability in the Oracle Life Sciences Empirica Signal product of Oracle Life Science Applications (component: Common Core)
Vulnerability in the PeopleSoft Enterprise PeopleTools product of Oracle PeopleSoft (component: Security)
Vulnerability in the Oracle Application Development Framework (ADF) product of Oracle Fusion Middleware (component: ADF Faces)
Vulnerability in the Oracle Applications DBA product of Oracle E-Business Suite (component: ADPatch)
Vulnerability in the Oracle Financial Services Analytical Applications Infrastructure product of Oracle Financial Services Applications (component: Platform)
Vulnerability in the Oracle Identity Manager Connector product of Oracle Fusion Middleware (component: Core)
Vulnerability in the Oracle HCM Common Architecture product of Oracle E-Business Suite (component: Knowledge Integration)
Vulnerability in the Oracle Financial Services Analytical Applications Infrastructure product of Oracle Financial Services Applications (component: Platform)
Vulnerability in the Oracle Financial Services Customer Screening product of Oracle Financial Services Applications (component: User Interface)
Vulnerability in the Java VM component of Oracle Database Server
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core)
The wpForo Forum plugin for WordPress is vulnerable to Arbitrary File Deletion in versions up to and including 3
The Everest Forms plugin for WordPress is vulnerable to Arbitrary File Read and Deletion in all versions up to, and including, 3
Kyverno is a policy engine designed for cloud native platform engineering teams
Dell PowerProtect Data Domain, versions 7
Vvveb CMS 1
Neko is a a self-hosted virtual browser that runs in Docker and uses WebRTC In versions 3
In Dolibarr ERP & CRM <= 22
In the Website module of Dolibarr ERP & CRM 22
Use-after-free in the DOM: Core & HTML component
Use-after-free in the JavaScript Engine component
Use-after-free in the JavaScript: WebAssembly component
Memory safety bugs present in Firefox 149 and Thunderbird 149
Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JAXP)
Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Networking)
SQL Injection vulnerability in Apartment Visitors Management System Apartment Visitors Management System V1
OS Command Injection Remote Code Execution Vulnerability in API in Progress ADC Products allows an authenticated attacker with “Geo Administration” permissions to execute arbitrary commands on the LoadMaster appliance by exploiting unsanitized input in the 'addcountry' command
OS Command Injection Remote Code Execution Vulnerability in API in Progress ADC Products allows an authenticated attacker with “All” permissions to execute arbitrary commands on the LoadMaster appliance by exploiting unsanitized input in the 'killsession' command
OS Command Injection Remote Code Execution Vulnerability in API in Progress ADC Products allows an authenticated attacker with “VS Administration” permissions to execute arbitrary commands on the LoadMaster appliance by exploiting unsanitized input in the 'aclcontrol' command
OS Command Injection Remote Code Execution Vulnerability in UI in Progress ADC Products allows an authenticated attacker with “All” permissions to execute arbitrary commands on the LoadMaster appliance by exploiting unsanitized input in a custom WAF rule file during the file upload process
SQL Injection vulnerability in Apartment Visitors Management System Apartment Visitors Management System V1
WWBN AVideo is an open source video platform
FreeScout is a free self-hosted help desk and shared mailbox
OpenClaude is an open-source coding-agent command line interface for cloud and local model providers
WWBN AVideo is an open source video platform
FreeScout is a free self-hosted help desk and shared mailbox
WWBN AVideo is an open source video platform
WWBN AVideo is an open source video platform
NVIDIA KAI Scheduler contains a vulnerability where an attacker could access API endpoints without authorization
pyLoad is a free and open-source download manager written in Python
A vulnerability was found in Tenda F451 1
A vulnerability was determined in Tenda F451 1
A vulnerability was identified in Tenda F451 1
OpenClaw before 2026
HKUDS OpenHarness prior to PR #156 remediation exposes plugin lifecycle commands including /plugin install, /plugin enable, /plugin disable, and /reload-plugins to remote senders by default
NVIDIA CUDA-Q contains a vulnerability in an endpoint, where an unauthenticated attacker could cause an out-of-bounds read by sending a maliciously crafted request
Magento Long Term Support (LTS) is an unofficial, community-driven project provides an alternative to the Magento Community Edition e-commerce platform with a high level of backward compatibility
HKUDS OpenHarness prior to PR #147 remediation contains an insecure default configuration vulnerability where remote channels inherit allow_from = ["*"] permitting arbitrary remote senders to pass admission checks
OAuth2 Proxy is a reverse proxy that provides authentication using OAuth2 providers
Tekton Pipelines project provides k8s-style resources for declaring CI/CD-style pipelines
Hermes WebUI contains an arbitrary file deletion vulnerability in the /api/session/delete endpoint that allows authenticated attackers to delete files outside the session directory by supplying an absolute path or path traversal payload in the session_id parameter
ThreatSonar Anti-Ransomware developed by TeamT5 has an Privilege Escalation vulnerability
Privilege escalation in the Graphics: WebRender component
Privilege escalation in the Networking component
Privilege escalation in the Debugger component
Vexa is an open-source, self-hostable meeting bot API and meeting transcription API
Vvveb prior to 1
KissFFT before commit 8a8e66e contains an integer overflow vulnerability in the kiss_fftndr_alloc() function in kiss_fftndr
In OpenXiangShan NEMU, when Smstateen is enabled, clearing mstateen0
Let's Encrypt client and ACME library written in Go (Lego)
OpenClaw before 2026
WWBN AVideo is an open source video platform
In NTFS-3G 2022
Compressing is a compressing and uncompressing lib for node
OpenClaw before 2026
blueprintUE is a tool to help Unreal Engine developers
LinkAce is a self-hosted archive to collect website links
WWBN AVideo is an open source video platform
In Progress® Telerik® UI for AJAX versions 2024
SKYSEA Client View and SKYMEC IT Manager provided by Sky Co
Insecure Permissions vulnerability in DeepCool DeepCreative v
A local attacker who can execute privileged CSR operations (or can induce firmware to do so) performs carefully crafted reads/writes to menvcfg (e
OpenClaw before 2026
AiAssistant is affected by type privilege bypass, successful exploitation of this vulnerability may affect service availability
Incorrect boundary conditions in the WebRTC: Networking component
Vvveb prior to 1
OpenClaw before 2026
OpenClaw before 2026
FreeScout is a free self-hosted help desk and shared mailbox
NEMU (OpenXiangShan/NEMU) before v2025
LMDeploy is a toolkit for compressing, deploying, and serving large language models
Calling the ungetwc function on a FILE stream with wide characters encoded in a character set that has overlaps between its single byte and multi-byte character encodings, in the GNU C Library version 2
Signal K Server is a server application that runs on a central hub in a boat
Use-after-free in the WebRTC component
Information disclosure due to uninitialized memory in the Graphics: Canvas2D component
Use-after-free in the Widget: Cocoa component
Incorrect boundary conditions in the Libraries component in NSS
Incorrect boundary conditions in the Libraries component in NSS
Denial-of-service due to integer overflow in the Graphics: WebGPU component
Denial-of-service in the Audio/Video: Playback component
Denial-of-service in the Audio/Video: Playback component
Information disclosure in the IP Protection component
blueprintUE is a tool to help Unreal Engine developers
Coturn is a free open source implementation of TURN and STUN Server
Decidim is a participatory democracy framework
Decidim is a participatory democracy framework
Nest is a framework for building scalable Node
The package `github