CVE-2021-26829
OpenPLC ScadaBR Cross-site Scripting Vulnerability - Active in CISA KEV catalog.
Critical vulnerabilities, curated daily for security professionals
See how vulnerabilities affect your specific environment
CRS uses the System Security Context Vector (SSCV) Framework v1.0 to adjust CVSS scores based on your system's exposure level, network position, and business criticality. Learn more about SSCV Framework
Sunday's vulnerability landscape reveals 3 critical CVEs, a 67% decrease from Saturday's count of 9. High-priority vulnerabilities dropped 47% to 53 issues, reflecting typical weekend reduction patterns. The 11 actively exploited KEV vulnerabilities remain unchanged from yesterday, with notable entries including Android Framework flaws (CVE-2025-48633, CVE-2025-48572), Array Networks ArrayOS AG (CVE-2025-66644), and Microsoft Windows (CVE-2025-62221). Critical WordPress plugin vulnerabilities include CVE-2025-10738 affecting URL Shortener Plugin and CVE-2025-14440 impacting JAY Login. Patch availability stands at 0%, requiring organizations to prioritize network segmentation and access controls as interim mitigations.
Immediate action: Prioritize mitigation of the 11 actively exploited vulnerabilities, particularly Android Framework and Microsoft Windows flaws affecting enterprise environments. Implement network segmentation and restrict access to vulnerable WordPress installations, D-Link routers, and GeoServer deployments until patches become available. Weekend security teams should monitor for exploitation attempts against KEV-listed products and escalate confirmed activity.
OpenPLC ScadaBR Cross-site Scripting Vulnerability - Active in CISA KEV catalog.
Android Framework Information Disclosure Vulnerability - Active in CISA KEV catalog.
Android Framework Privilege Escalation Vulnerability - Active in CISA KEV catalog.
OpenPLC ScadaBR Unrestricted Upload of File with Dangerous Type Vulnerability - Active in CISA KEV catalog.
D-Link Routers Buffer Overflow Vulnerability - Active in CISA KEV catalog.
Array Networks ArrayOS AG OS Command Injection Vulnerability - Active in CISA KEV catalog.
RARLAB WinRAR Path Traversal Vulnerability - Active in CISA KEV catalog.
Microsoft Windows Use After Free Vulnerability - Active in CISA KEV catalog.
OSGeo GeoServer Improper Restriction of XML External Entity Reference Vulnerability - Active in CISA KEV catalog.
Sierra Wireless AirLink ALEOS Unrestricted Upload of File with Dangerous Type Vulnerability - Active in CISA KEV catalog.
The URL Shortener Plugin For WordPress plugin for WordPress is vulnerable to SQL Injection via the âanalytic_idâ parameter in all versions up to, and including, 3.0.7 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
The JAY Login & Register plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 2.4.01. This is due to incorrect authentication checking in the 'jay_login_register_process_switch_back' function with the 'jay_login_register_process_switch_back' cookie value. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the user id.
The Export WP Page to Static HTML & PDF plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 4.3.4 through publicly exposed cookies.txt files containing authentication cookies. This makes it possible for unauthenticated attackers to cookies that may have been injected into the log file if the site administrator triggered a back-up using a specific user role like 'administrator.'
Out of bounds memory access in ANGLE in Google Chrome on Mac prior to 143
The Doubly â Cross Domain Copy Paste for WordPress plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1
The Ø§ŲØ˛ŲŲŲ ŲžÛØ§Ų ÚŠ ŲŲÚŠØ§Ų ØąØŗ ŲŲŲ ØØąŲŲ Ø§Û (ØŦØ¯ÛØ¯) payamito sms woocommerce plugin for WordPress is vulnerable to time-based blind SQL Injection via the 'columns' parameter in all versions up to, and including, 1
The Postem Ipsum plugin for WordPress is vulnerable to unauthorized modification of data to Privilege Escalation due to a missing capability check on the postem_ipsum_generate_users() function in all versions up to, and including, 3
The WP Directory Kit plugin for WordPress is vulnerable to SQL Injection via the 'hide_fields' and the 'attr_search' parameter in all versions up to, and including, 1
The wpForo Forum plugin for WordPress is vulnerable to generic SQL Injection via the `post_args` and `topic_args` parameters in all versions up to, and including, 2
The WP3D Model Import Viewer plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the handle_import_file() function in all versions up to, and including, 1
The Extensive VC Addons for WPBakery page builder plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 1
The WooMulti WordPress plugin through 17 does not validate a file parameter when deleting files, which could allow any authenticated users, such as subscriber to delete arbitrary files on the server
Weak Encryption Algorithm in StreamPark, The use of an AES cipher in ECB mode and a weak random number generator for encrypting sensitive data, including JWT tokens, may have risked exposing sensitive authentication data This issue affects Apache StreamPark: from 2
The vulnerability arises when a client fetches a toolsâ JSON specification, known as a Manual, from a remote Manual Endpoint
Execution with Unnecessary Privileges vulnerability in Nebim Neyir Computer Industry and Services Inc
An eval injection in the malware de-obfuscation routines of CloudLinux ai-bolit before v32
WonderCMS 4
Atcom 100M IP Phones firmware version 2
A vulnerability was found in UTT čŋå 512W up to 1
A vulnerability was identified in Tenda AC20 16
The Preset configuration https://v2
Lightning Flow Scanner provides a A CLI plugin, VS Code Extension and GitHub Action for analysis and optimization of Salesforce Flows
OpenPLC_V3 is vulnerable to a cross-site request forgery (CSRF) attack due to the absence of proper CSRF validation
This issue was addressed with improved checks
A permissions issue was addressed with additional restrictions
Online Shopping System Advanced 1
A vulnerability was identified in kidaze CourseSelectionSystem up to 42cd892b40a18d50bd4ed1905fa89f939173a464
A security flaw has been discovered in kidaze CourseSelectionSystem up to 42cd892b40a18d50bd4ed1905fa89f939173a464
A flaw has been found in projectworlds Advanced Library Management System 1
A vulnerability has been found in projectworlds Advanced Library Management System 1
A weakness has been identified in itsourcecode Student Management System 1
A flaw has been found in campcodes Online Student Enrollment System 1
A vulnerability has been found in itsourcecode COVID Tracking System 1
A vulnerability was found in itsourcecode COVID Tracking System 1
A vulnerability was identified in itsourcecode Online Pet Shop Management System 1
A security flaw has been discovered in itsourcecode Student Management System 1
A security vulnerability has been detected in code-projects Prison Management System 2
A vulnerability was found in code-projects Student File Management System 1
A vulnerability was determined in code-projects Student File Management System 1
A vulnerability was identified in code-projects Student File Management System 1
A security flaw has been discovered in code-projects Student File Management System 1
A weakness has been identified in code-projects Student File Management System 1
A weakness has been identified in itsourcecode Online Pet Shop Management System 1
A security vulnerability has been detected in itsourcecode Online Pet Shop Management System 1
A vulnerability was detected in itsourcecode Student Management System 1
A flaw has been found in code-projects Student File Management System 1
A vulnerability was found in code-projects Simple Attendance Record System 2
A vulnerability was determined in itsourcecode Student Management System 1
A vulnerability was identified in code-projects Student File Management System 1
A security flaw has been discovered in code-projects Student File Management System 1
A weakness has been identified in code-projects Computer Book Store 1
A vulnerability was detected in itsourcecode Online Cake Ordering System 1
A flaw has been found in itsourcecode Online Cake Ordering System 1
A vulnerability was found in itsourcecode Online Cake Ordering System 1
A vulnerability was determined in itsourcecode Student Management System 1
An issue was discovered in Weaviate OSS before 1