CVE-2026-20122
Cisco Catalyst SD-WAN Manager Incorrect Use of Privileged APIs Vulnerability - Active in CISA KEV catalog.
Critical vulnerabilities, curated daily for security professionals
See how vulnerabilities affect your specific environment
CRS uses the System Security Context Vector (SSCV) Framework v1.0 to adjust CVSS scores based on your system's exposure level, network position, and business criticality. Learn more about SSCV Framework
Tuesday's disclosures are led by HP, Digiwin EasyFlow .NET, and Infor products, alongside critical flaws in Apache Kafka and AWS services. The brief contains 14 critical CVEs (up 367% from 3 yesterday) and 65 high-priority CVEs (up 195% from 22). Notable entries include CVE-2026-39918 (CVSS 9.8) in an HP configuration file, CVE-2026-32613 (CVSS 9.9) affecting Infor multiple products, and CVE-2026-33557 (CVSS 9.1) in Apache Kafka. Remote code execution and configuration-level weaknesses dominate today's disclosures, impacting enterprise middleware, messaging infrastructure, and cloud platforms. No patches are currently available across the reported set, and 17 vulnerabilities have confirmed active exploitation spanning Cisco Catalyst SD-WAN Manager, Microsoft Windows, Adobe Acrobat, and Apache ActiveMQ.
Immediate action: Prioritize review of HP, Digiwin EasyFlow .NET, Infor, and Apache Kafka deployments, and apply compensating controls for Cisco Catalyst SD-WAN Manager and Apache ActiveMQ given active exploitation. With 0% patch availability in today's set, restrict network exposure, enforce access controls, and monitor vendor advisories for fixes as they are released.
Cisco Catalyst SD-WAN Manager Incorrect Use of Privileged APIs Vulnerability - Active in CISA KEV catalog.
Cisco Catalyst SD-WAN Manager Exposure of Sensitive Information to an Unauthorized Actor Vulnerability - Active in CISA KEV catalog.
Synacor Zimbra Collaboration Suite (ZCS) Cross-site Scripting Vulnerability - Active in CISA KEV catalog.
Cisco Catalyst SD-WAN Manager Storing Passwords in a Recoverable Format Vulnerability - Active in CISA KEV catalog.
Microsoft Visual Basic for Applications Insecure Library Loading Vulnerability - Active in CISA KEV catalog.
Microsoft Windows Link Following Vulnerability - Active in CISA KEV catalog.
Microsoft Exchange Server Deserialization of Untrusted Data Vulnerability - Active in CISA KEV catalog.
Microsoft Windows Out-of-Bounds Read Vulnerability - Active in CISA KEV catalog.
Adobe Acrobat Use-After-Free Vulnerability - Active in CISA KEV catalog.
Adobe Acrobat Reader is vulnerable to prototype pollution, which can result in arbitrary code execution when a victim opens a malicious file.
Microsoft Office Remote Code Execution - Active in CISA KEV catalog.
Microsoft SharePoint Server Improper Input Validation Vulnerability - Active in CISA KEV catalog.
Apache ActiveMQ Improper Input Validation Vulnerability - Active in CISA KEV catalog.
Kentico Xperience Path Traversal Vulnerability - Active in CISA KEV catalog.
PaperCut NG/MF Improper Authentication Vulnerability - Active in CISA KEV catalog.
Quest KACE Systems Management Appliance (SMA) Improper Authentication Vulnerability - Active in CISA KEV catalog.
JetBrains TeamCity Relative Path Traversal Vulnerability - Active in CISA KEV catalog.
SQL Injection vulnerability in Apartment Visitors Management System Apartment Visitors Management System V1.1 within the username parameter of the login page (index.php). This allows an unauthenticated attacker to manipulate backend SQL queries during authentication and retrieve sensitive database contents.
Vvveb prior to 1.0.8.1 contains a code injection vulnerability in the installation endpoint where the subdir POST parameter is written unsanitized into the env.php configuration file without escaping or validation. Attackers can inject arbitrary PHP code by breaking out of the string context in the define statement to achieve unauthenticated remote code execution as the web server user.
Vvveb CMS v1.0.8 contains a remote code execution vulnerability in its media management functionality where a missing return statement in the file rename handler allows authenticated attackers to rename files to blocked extensions .php or .htaccess. Attackers can exploit this logic flaw by first uploading a text file and renaming it to .htaccess to inject Apache directives that register PHP-executable MIME types, then uploading another file and renaming it to .php to execute arbitrary operating system commands as the www-data user.
Digiwin EasyFlow .NET contains a SQL injection vulnerability allowing unauthenticated remote attackers to manipulate database contents.
Digiwin EasyFlow .NET contains a SQL injection vulnerability allowing unauthenticated remote attackers to manipulate database contents.
Spinnaker is an open source, multi-cloud continuous delivery platform. Echo like some other services, uses SPeL (Spring Expression Language) to process information - specifically around expected artifacts. In versions prior to 2026.1.0, 2026.0.1, 2025.4.2, and 2025.3.2, unlike orca, it was NOT restricting that context to a set of trusted classes, but allowing FULL JVM access. This enabled a user to use arbitrary java classes which allow deep access to the system. This enabled the ability to invoke commands, access files, etc. Versions 2026.1.0, 2026.0.1, 2025.4.2, and 2025.3.2 contain a patch. As a workaround, disable echo entirely.
A possible security vulnerability has been identified in Apache Kafka. By default, the broker property `sasl.oauthbearer.jwt.validator.class` is set to `org.apache.kafka.common.security.oauthbearer.DefaultJwtValidator`. It accepts any JWT token without validating its signature, issuer, or audience. An attacker can generate a JWT token from any issuer with the `preferred_username` set to any user, and the broker will accept it. We advise the Kafka users using kafka v4.1.0 or v4.1.1 to set the config `sasl.oauthbearer.jwt.validator.class` to `org.apache.kafka.common.security.oauthbearer.BrokerJwtValidator` explicitly to avoid this vulnerability. Since Kafka v4.1.2 and v4.2.0 and later, the issue is fixed and will correctly validate the JWT token.
SGLang's reranking endpoint (/v1/rerank) achieves Remote Code Execution (RCE) when a model file containing a malcious tokenizer.chat_template is loaded, as the Jinja2 chat templates are rendered using an unsandboxed jinja2.Environment().
OpenAEV is an open source platform allowing organizations to plan, schedule and conduct cyber adversary simulation campaign and tests. Starting in version 1.0.0 and prior to version 2.0.13, OpenAEV's password reset implementation contains multiple security weaknesses that together allow reliable account takeover. The primary issue is that password reset tokens do not expire. Once a token is generated, it remains valid indefinitely, even if significant time has passed or if newer tokens are issued for the same account. This allows an attacker to accumulate valid password reset tokens over time and reuse them at any point in the future to reset a victim’s password. A secondary weakness is that password reset tokens are only 8 digits long. While an 8-digit numeric token provides 100,000,000 possible combinations (which is secure enough), the ability to generate large numbers of valid tokens drastically reduces the required number of attempts to guess a valid password reset token. For example, if an attacker generates 2,000 valid tokens, the brute-force effort is reduced to approximately 50,000 attempts, which is a trivially achievable number of requests for an automated attack. (100 requests per second can mathematically find a valid password reset token in 500 seconds.) By combining these flaws, an attacker can mass-generate valid password reset tokens and then brute-force them efficiently until a match is found, allowing the attacker to reset the victim’s password to a value of their choosing. The original password is not required, and the attack can be performed entirely without authentication. This vulnerability enables full account takeover that leads to platform compromise. An unauthenticated remote attacker can reset the password of any registered user account and gain complete access without authentication. Because user email addresses are exposed to other users by design, a single guessed or observed email address is sufficient to compromise even administrator accounts with non-guessable email addresses. This design flaw results in a reliable and scalable account takeover vulnerability that affects any registered user account in the system. Note: The vulnerability does not require OpenAEV to have the email service configured. The exploit does not depend on the target email address to be a real email address. It just needs to be registered to OpenAEV. Successful exploitation allows an unauthenticated remote attacker to access sensitive data (such as the Findings section of a simulation), modify payloads executed by deployed agents to compromise all hosts where agents are installed (therefore the Scope is changed). Users should upgrade to version 2.0.13 to receive a fix.
Improper access control in Doorman v0.1.0 and v1.0.2 allows any authenticated user to update their own account role to a non-admin privileged role via /platform/user/{username}. The `role` field is accepted by the update model without a manage_users permission check for self-updates, enabling privilege escalation to high-privileged roles.
OpenClaw before 2026.3.31 contains a sandbox bypass vulnerability allowing attackers to escalate privileges via heartbeat context inheritance and senderIsOwner parameter manipulation. Attackers can exploit improper context validation to bypass sandbox restrictions and achieve unauthorized privilege escalation.
silex technology SD-330AC and AMC Manager contain a heap-based buffer overflow vulnerability, potentially allowing arbitrary code execution.
Spinnaker is an open source, multi-cloud continuous delivery platform. In versions prior to 2026.1.0, 2026.0.1, 2025.4.2, and 2025.3.2, a bad actor can execute arbitrary commands very simply on the clouddriver pods. This can expose credentials, remove files, or inject resources easily. Versions 2026.1.0, 2026.0.1, 2025.4.2, and 2025.3.2 contain a patch. As a workaround, disable the gitrepo artifact types.
NewSoftOA developed by NewSoft has an OS Command Injection vulnerability, allowing unauthenticated local attackers to inject arbitrary OS commands and execute them on the server.
The wpForo Forum plugin for WordPress is vulnerable to Arbitrary File Deletion in versions up to and including 3
The Everest Forms plugin for WordPress is vulnerable to Arbitrary File Read and Deletion in all versions up to, and including, 3
Dell PowerProtect Data Domain, versions 7
Vvveb CMS 1
Neko is a a self-hosted virtual browser that runs in Docker and uses WebRTC In versions 3
Apktool is a tool for reverse engineering Android APK files
A vulnerability was identified in kodcloud KodExplorer up to 4
A vulnerability was identified in ProjectsAndPrograms School Management System up to 6b6fae5426044f89c08d0dd101c7fa71f9042a59
Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions 7
Dell PowerProtect Data Domain, versions 7
Dell PowerProtect Data Domain, versions 8
Dell PowerProtect Data Domain, versions 7
Dell PowerProtect Data Domain, versions 7
SQL Injection vulnerability in Apartment Visitors Management System Apartment Visitors Management System V1
OS Command Injection Remote Code Execution Vulnerability in API in Progress ADC Products allows an authenticated attacker with “Geo Administration” permissions to execute arbitrary commands on the LoadMaster appliance by exploiting unsanitized input in the 'addcountry' command
OS Command Injection Remote Code Execution Vulnerability in API in Progress ADC Products allows an authenticated attacker with “All” permissions to execute arbitrary commands on the LoadMaster appliance by exploiting unsanitized input in the 'killsession' command
OS Command Injection Remote Code Execution Vulnerability in API in Progress ADC Products allows an authenticated attacker with “VS Administration” permissions to execute arbitrary commands on the LoadMaster appliance by exploiting unsanitized input in the 'aclcontrol' command
OS Command Injection Remote Code Execution Vulnerability in UI in Progress ADC Products allows an authenticated attacker with “All” permissions to execute arbitrary commands on the LoadMaster appliance by exploiting unsanitized input in a custom WAF rule file during the file upload process
SQL Injection vulnerability in Apartment Visitors Management System Apartment Visitors Management System V1
OpenClaude is an open-source coding-agent command line interface for cloud and local model providers
FreeScout is a free self-hosted help desk and shared mailbox
A vulnerability was found in rickxy Hospital Management System up to 88a4290d957dc5bdde8a56e5ad451ad14f7f90f4
A vulnerability was found in Tenda F451 1
A vulnerability was determined in Tenda F451 1
A vulnerability was identified in Tenda F451 1
OpenClaw before 2026
Magento Long Term Support (LTS) is an unofficial, community-driven project provides an alternative to the Magento Community Edition e-commerce platform with a high level of backward compatibility
ThreatSonar Anti-Ransomware developed by TeamT5 has an Privilege Escalation vulnerability
ConnectWise has released a security update for ConnectWise Automate™ that addresses a behavior in the ConnectWise Automate Solution Center where certain client-to-server communications could occur without transport-layer encryption
Vexa is an open-source, self-hostable meeting bot API and meeting transcription API
A vulnerability was found in ericc-ch copilot-api up to 0
A security vulnerability exists in H3C Magic B1 routers up to version 100R004.
SD-330AC and AMC Manager provided by silex technology, Inc
Vvveb prior to 1
KissFFT before commit 8a8e66e contains an integer overflow vulnerability in the kiss_fftndr_alloc() function in kiss_fftndr
Deserialization of Untrusted Data vulnerability in MetaSlider Responsive Slider by MetaSlider allows Object Injection
OpenClaw before 2026
OpenClaw before 2026
TeamT5 ThreatSonar Anti-Ransomware contains an arbitrary file deletion vulnerability.
SKYSEA Client View and SKYMEC IT Manager provided by Sky Co
Insecure Permissions vulnerability in DeepCool DeepCreative v
OpenClaw before 2026
AiAssistant is affected by type privilege bypass, successful exploitation of this vulnerability may affect service availability
Vvveb prior to 1
OpenClaw before 2026
OpenClaw before 2026
Initialization of a resource with an insecure default vulnerability exists in SD-330AC and AMC Manager provided by silex technology, Inc
LMDeploy is a toolkit for compressing, deploying, and serving large language models
Signal K Server is a server application that runs on a central hub in a boat
A vulnerability exists in osuuu LightPicture up to version 1.
A vulnerability exists in liangliangyy DjangoBlog up to version 2.
A security vulnerability exists in liangliangyy DjangoBlog up to version 2.
A security flaw has been identified in TransformerOptimus SuperAGI that may impact system integrity.
A vulnerability has been identified in the brikcss merge utility that could potentially lead to security regressions.
A security flaw has been discovered in langflow-ai langflow that may expose the system to unauthorized operations.
A vulnerability has been determined in modelscope agentscope that could potentially impact system security.
A vulnerability has been identified in modelscope agentscope that could lead to potential security compromises.
A security flaw has been discovered in modelscope agentscope up to 1
A weakness has been identified in modelscope agentscope up to 1
A weakness has been identified in TransformerOptimus SuperAGI up to 0
A vulnerability was determined in 1024bit extend-deep up to 0
A security vulnerability has been detected in moxi624 Mogu Blog v2 up to 5
A vulnerability has been found in Metasoft 美特软件 MetaCRM up to 6
A security vulnerability has been detected in rowboatlabs rowboat up to 0
OpenClaw before 2026