CVE-2026-1340
Ivanti Endpoint Manager Mobile (EPMM) Code Injection Vulnerability - Active in CISA KEV catalog.
Critical vulnerabilities, curated daily for security professionals
See how vulnerabilities affect your specific environment
CRS uses the System Security Context Vector (SSCV) Framework v1.0 to adjust CVSS scores based on your system's exposure level, network position, and business criticality. Learn more about SSCV Framework
Yesterday's disclosures reveal 33 critical vulnerabilities spanning Docker, WordPress, Juniper Networks, and multiple enterprise collaboration platforms. Critical CVE volume increased 74% from the prior day while high-priority disclosures held steady at 100. CVE-2026-40089 (CVSS 9.9) targets Docker Compose stacks, CVE-2026-33784 (CVSS 9.8) affects Juniper Networks infrastructure, and CVE-2026-34424 (CVSS 9.8) impacts both WordPress and Joomla installations. Remote code execution and authentication bypass patterns are prominent across CMS platforms and container orchestration tooling, with three vulnerabilities under active exploitation targeting Ivanti EPMM, Google Dawn, and TrueConf Client. No vendor patches are currently available for these disclosures, requiring defenders to prioritize compensating controls and network-level mitigations.
Immediate action: Prioritize reviewing exposure to Docker Compose, Juniper Networks, WordPress, and Ivanti EPMM environments, as these carry the highest severity scores and broadest attack surface. With no patches currently available, apply network segmentation, restrict access to affected services, and monitor for indicators of exploitation until vendor fixes are released.
Ivanti Endpoint Manager Mobile (EPMM) Code Injection Vulnerability - Active in CISA KEV catalog.
A use-after-free vulnerability exists in the Dawn component of Google Chrome. This flaw allows attackers to potentially execute arbitrary code or cause a denial-of-service via a crafted HTML page.
TrueConf Client Download of Code Without Integrity Check Vulnerability - Active in CISA KEV catalog.
Sonicverse is a Self-hosted Docker Compose stack for live radio streaming. The Sonicverse Radio Audio Streaming Stack dashboard contains a Server-Side Request Forgery (SSRF) vulnerability in its API client (apps/dashboard/lib/api.ts). Installations created using the provided install.sh script (including the oneβliner bash <(curl -fsSL https://sonicverse.short.gy/install-audiostack)) are affected. In these deployments, the dashboard accepts user-controlled URLs and passes them directly to a server-side HTTP client without sufficient validation. An authenticated operator can abuse this to make arbitrary HTTP requests from the dashboard backend to internal or external systems. This vulnerability is fixed with commit cb1ddbacafcb441549fe87d3eeabdb6a085325e4.
Smart Slider 3 Pro 3.5.1.35 contains a critical remote access toolkit vulnerability that allows unauthenticated attackers to execute arbitrary code and commands via a compromised update system.
The Quick Playground plugin for WordPress contains an RCE vulnerability due to insufficient authorization on REST API endpoints, allowing unauthenticated file uploads.
PraisonAI is a multi-agent teams system. Prior to 4.5.128, PraisonAI treats remotely fetched template files as trusted executable code without integrity verification, origin validation, or user confirmation, enabling supply chain attacks through malicious templates. This vulnerability is fixed in 4.5.128.
PraisonAI is a multi-agent teams system. Prior to 4.5.121, the execute_command function and workflow shell execution are exposed to user-controlled input via agent workflows, YAML definitions, and LLM-generated tool calls, allowing attackers to inject arbitrary shell commands through shell metacharacters. This vulnerability is fixed in 4.5.121.
A stored Cross-Site Scripting (XSS) vulnerability in the lollms social feature allows unauthenticated attackers to inject malicious JavaScript, leading to potential account takeover.
OpenCTI prior to 6.9.5 contains an EJS template injection vulnerability allowing authenticated users with Manage customization capabilities to execute arbitrary JavaScript on the platform.
V2Board 1.6.1 through 1.7.4 and Xboard through 0.1.9 expose authentication tokens in HTTP response bodies of the loginWithMailLink endpoint when the login_with_mail_link_enable feature is active. Unauthenticated attackers can POST to the loginWithMailLink endpoint with a known email address to receive the full authentication URL in the response, then exchange the token at the token2Login endpoint to obtain a valid bearer token with complete account access including admin privileges.
A Use of Default Password vulnerability in the Juniper Networks Support Insights (JSI) Virtual Lightweight Collector (vLWC) allows an unauthenticated, network-based attacker to take full control of the device. vLWC software images ship with an initial password for a high privileged account. A change of this password is not enforced during the provisioning of the software, which can make full access to the system by unauthorized actors possible.This issue affects all versions of vLWC before 3.0.94.
Canonical LXD versions 4.12 through 6.7 contain a privilege escalation vulnerability where restricted TLS certificate users can elevate to cluster admin.
An incomplete denylist in Canonical LXD allows a restricted project user to inject AppArmor and QEMU configurations, facilitating privilege escalation to host root.
The Totolink A7100RU contains an OS command injection vulnerability in the setVpnPassCfg function, allowing remote attackers to execute arbitrary system commands via the pptpPassThru parameter.
The Totolink A7100RU is susceptible to remote OS command injection via the setUPnPCfg function, specifically through the enable parameter in the CGI handler.
The Totolink A7100RU allows remote OS command injection via the setIptvCfg function by manipulating the igmpVer argument in the CGI handler.
The Totolink A7100RU is vulnerable to remote OS command injection via the setIpv6LanCfg function, exploitable through the addrPrefixLen argument in the CGI handler.
The Totolink A7100RU is susceptible to remote OS command injection via the setWiFiEasyCfg function, specifically through the merge argument in the CGI handler.
The Totolink A7100RU CGI Handler contains an OS command injection vulnerability in the setDmzCfg function, allowing remote attackers to execute arbitrary commands.
The Totolink A7100RU CGI Handler contains an OS command injection vulnerability in the setStorageCfg function, allowing remote attackers to execute arbitrary commands.
The Totolink A7100RU CGI Handler contains an OS command injection vulnerability in the setWiFiBasicCfg function, allowing remote attackers to execute arbitrary commands.
The Totolink A7100RU CGI Handler contains an OS command injection vulnerability in the setWiFiAclRules function, allowing remote attackers to execute arbitrary commands.
The Totolink A7100RU CGI Handler contains an OS command injection vulnerability in the setWiFiGuestCfg function, allowing remote attackers to execute arbitrary commands.
The Totolink A7100RU CGI Handler contains an OS command injection vulnerability in the setTelnetCfg function, allowing remote attackers to execute arbitrary commands.
The Totolink A7100RU CGI Handler contains an OS command injection vulnerability in the setMiniuiHomeInfoShow function, allowing remote attackers to execute arbitrary commands.
A remote OS command injection vulnerability exists in the Totolink A7100RU CGI handler, allowing unauthenticated attackers to execute arbitrary system commands via the tty_server argument.
A remote OS command injection vulnerability in the Totolink A7100RU CGI handler allows unauthenticated attackers to execute arbitrary system commands via the admpass argument.
An OS command injection vulnerability in the Totolink A7100RU CGI handler allows unauthenticated remote attackers to execute arbitrary commands via the enable argument in setSyslogCfg.
A remote OS command injection vulnerability exists in the Totolink A7100RU CGI handler, allowing unauthenticated attackers to execute commands via the enable argument in setPortalConfWeChat.
A remote OS command injection vulnerability in the Totolink A7100RU CGI handler allows unauthenticated remote attackers to execute commands via the enable argument in setUrlFilterRules.
A security vulnerability has been detected in Totolink A7100RU 7.4cu.2313_b20191024. Impacted is the function setPptpServerCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument enable leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed publicly and may be used.
A vulnerability was detected in Totolink A7100RU 7.4cu.2313_b20191024. The affected element is the function setVpnAccountCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument User results in os command injection. The attack may be launched remotely. The exploit is now public and may be used.
A backup import validation flaw in Canonical LXD allows authenticated remote attackers to bypass project restrictions and achieve full host compromise.
An attacker could use data obtained by sniffing the network traffic to forge packets in order to make arbitrary requests to Contemporary Controls BASC 20T.
When user logged out, the JWT token the user had authtenticated with was not invalidated, which could lead to reuse of that token in case it was intercepted. In Airflow 3.2 we implemented the mechanism that implements token invalidation at logout. Users who are concerned about the logout scenario and possibility of intercepting the tokens, should upgrade to Airflow 3.2+ Users are recommended to upgrade to version 3.2.0, which fixes this issue.
A Key Exchange without Entity Authentication vulnerability in the SSH implementation of Juniper Networks Apstra allows a unauthenticated, MITM attacker to impersonate managed devices
Use after free in Media in Google Chrome prior to 147
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in kutethemes Biolife biolife allows PHP Local File Inclusion
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in UnTheme OrganicFood organicfood allows PHP Local File Inclusion
PraisonAI is a multi-agent teams system
Integer overflow in Media in Google Chrome prior to 147
Integer overflow in Media in Google Chrome prior to 147
Integer overflow in Media in Google Chrome prior to 147
Integer overflow in WebRTC in Google Chrome prior to 147
Type Confusion in CSS in Google Chrome prior to 147
The Vertex Addons for Elementor plugin for WordPress is vulnerable to Missing Authorization in all versions up to and including 1
PraisonAI is a multi-agent teams system
A Dynamic-link Library Injection vulnerability in GatewayGeo MapServer for Windows version 5 allows attackers to escalate privileges via a crafted executable
WordPress adivaha Travel Plugin 2
Insufficient data validation in Media in Google Chrome prior to 147
Insufficient validation of untrusted input in WebML in Google Chrome prior to 147
Directus is a real-time API and App dashboard for managing SQL database content
PraisonAI is a multi-agent teams system
PraisonAIAgents is a multi-agent teams system
PraisonAI is a multi-agent teams system
The Advanced Members for ACF plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the create_crop function in all versions up to, and including, 1
n8n-MCP is a Model Context Protocol (MCP) server that provides AI assistants with comprehensive access to n8n node documentation, properties, and operations
The MW WP Form plugin for WordPress is vulnerable to Arbitrary File Move/Read in all versions up to and including 5
The Perfmatters plugin for WordPress is vulnerable to arbitrary file overwrite via path traversal in all versions up to, and including, 2
A Missing Authorization vulnerability in the CLI of Juniper Networks Junos OS on MX Series allows a local, authenticated user with low privileges to execute specific commands which will lead to a complete compromise of managed devices
kcp is a Kubernetes-like control plane for form-factors and use-cases beyond Kubernetes and container workloads
Dell Elastic Cloud Storage, version 3
HDF5 is software for managing data
A Missing Authentication for Critical Function vulnerability in the Flexible PIC Concentrators (FPCs) of Juniper Networks Junos OS Evolved on PTX Series allows a local, authenticated attacker with low privileges to gain direct access to FPCs installed in the device
An Execution with Unnecessary Privileges vulnerabilityΒ in the User Interface (UI) of Juniper Networks Junos OS and Junos OS Evolved allows a local, low-privileged attacker to gain root privileges, thus compromising the system
Execution with Unnecessary Privileges (CWE-250) in Kibanaβs Fleet plugin debug route handlers can lead reading index data beyond their direct Elasticsearch RBAC scope via Privilege Abuse (CAPEC-122)
An Exposure of Sensitive Information to an Unauthorized Actor vulnerability exists in Apache DolphinScheduler
LORIS (Longitudinal Online Research and Imaging System) is a self-hosted web application that provides data- and project-management for neuroimaging research
OPNsense is a FreeBSD based firewall and routing platform
LORIS (Longitudinal Online Research and Imaging System) is a self-hosted web application that provides data- and project-management for neuroimaging research
LORIS (Longitudinal Online Research and Imaging System) is a self-hosted web application that provides data- and project-management for neuroimaging research
LORIS (Longitudinal Online Research and Imaging System) is a self-hosted web application that provides data- and project-management for neuroimaging research
Samsung MagicINFO 9 Server Incorrect Default Permissions Local Privilege Escalation Vulnerability This issue affects MagicINFO 9 Server: less than 21
Improper Limitation of a Pathname to a Restricted Directory (CWE-22) in Logstash can lead to arbitrary file write and potentially remote code execution via Relative Path Traversal (CAPEC-139)
BSV Ruby SDK is the Ruby SDK for the BSV blockchain
WCAPF β WooCommerce Ajax Product Filter plugin is vulnerable to time-based SQL Injection via the 'post-author' parameter in all versions up to, and including, 4
A vulnerability was detected in D-Link DIR-645 1
A vulnerability was identified in Tenda AC15 15
A vulnerability was detected in D-Link DIR-605L 2
A flaw has been found in D-Link DIR-605L 2
A vulnerability has been found in D-Link DIR-605L 2
A vulnerability was found in D-Link DIR-605L 2
A vulnerability was determined in D-Link DIR-605L 2
A vulnerability was identified in D-Link DIR-605L 2
A vulnerability was detected in Tenda F451 1
A flaw has been found in Tenda F451 1
A vulnerability has been found in Tenda F451 1
A vulnerability was found in Tenda F451 1
A vulnerability was determined in Tenda F451 1
A security vulnerability has been detected in D-Link DIR-513 1
A vulnerability was detected in D-Link DIR-513 1
A flaw has been found in D-Link DIR-513 1
A vulnerability has been found in Tenda AC9 15
A vulnerability was found in Tenda AC9 15
osslsigncode is a tool that implements Authenticode signing and timestamping
GitLab has remediated an issue in GitLab CE/EE affecting all versions from 16
A flaw was found in gnutls
Cross-Site Request Forgery (CSRF) vulnerability in spicethemes SpicePress spicepress allows Upload a Web Shell to a Web Server
A low-privileged remote attacker can send Modbus packets to manipulate register values that are inputs to the odorant injection logic such that too much or too little odorant is injected into a gas line
Rapid7 Velociraptor versions prior to 0
D-Link DI-8300 v16
D-Link DI-8300 v16
GitLab has remediated an issue in GitLab CE/EE affecting all versions from 13
GitLab has remediated an issue in GitLab CE/EE affecting all versions from 12
Hashgraph Guardian through version 3
AGiXT is a dynamic AI Agent Automation Platform
OpenClaw before 2026
OpenClaw before 2026
basic-ftp is an FTP client for Node
InvenTree is an Open Source Inventory Management System
Command injection in alerts in CoolerControl/coolercontrold <4
CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready, modular architecture with RBAC authorization and theme support
CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready, modular architecture with RBAC authorization and theme support
nimiq-blockchain provides persistent block storage for Nimiq's Rust implementation
OpenClaw before 2026
OpenClaw before 2026
Fleet is open source device management software
parseusbs before 1
parseusbs before 1
MemProcFS before 5
UAC (Unix-like Artifacts Collector) before 3
OpenClaw before 2026
Emocheck insecurely loads Dynamic Link Libraries (DLLs)
Incorrect Authorization (CWE-863) in Kibana can lead to information disclosure via Privilege Abuse (CAPEC-122)
Plane is an an open-source project management tool
Stored XSS in log viewer in CoolerControl/coolercontrol-ui <4
OpenAirInterface Version 2
OpenAirInterface v2
Saleor is an e-commerce platform
Saleor is an e-commerce platform
A denial of service vulnerability exists in React Server Components, affecting the following packages: react-server-dom-parcel, react-server-dom-turbopack and react-server-dom-webpack (versions 19
Kamailio is an open source implementation of a SIP Signaling Server
FrontMCP is a TypeScript-first framework for the Model Context Protocol (MCP)
Unfurl beforeΒ 2026
HashiCorpβs go-getter library up to v1