Monitor vulnerabilities that affect your stack. Sign up free to get alerts when software you use is affected.

CVE Vulnerabilities - 13 February 2026

RSS

145 vulnerabilities published on 13 February 2026

Severity:
Cloudflare Agents: Malicious Links Can Steal User Data and Control MCP Servers
CVE-2026-1721 GHSA-cvhv-6xm6-c3v4
Cloudflare Agents has a security flaw that lets attackers steal user chat history and take control of connected servers if users click on a malicious link. To fix this, update to [email protected] or ensu...
6.2
Nessus Agent: Weak File Permissions on Windows Hosts Expose to Unauthorized Access
CVE-2026-2026
The Nessus Agent directory on Windows hosts has weak file permissions, which could allow unauthorized access and potentially lead to Denial of Service (DoS) attacks. This affects organizations that us...
5.4
VM Host Denial of Service through PCIe Link Buffer Overflow
CVE-2024-21961
An attacker with access to a virtual machine can disrupt the host system, causing it to become unavailable. This could lead to downtime and lost productivity. To mitigate this risk, ensure that access...
6.0
Genetec Sipelia Plugin: Unprivileged User Can Gain Elevated Privileges
CVE-2025-1790
An attacker who already has a Genetec Sipelia Plugin user account can use this vulnerability to gain more powerful access on the Windows system where the plugin is installed. This could allow them to ...
5.8
Renovate Child Processes Have Access to Sensitive Environment Variables
GHSA-8wc6-vgrq-x6cf
Renovate versions 42.68.1 and later have a security issue where child processes can access environment variables that Renovate has access to. This could allow attackers to steal sensitive information....
5.5
BACnet Protocol Stack library: Crash when processing long strings
CVE-2026-21870
The BACnet Protocol Stack library, used for building automation and control systems, has a bug that causes it to crash when processing long strings. This can lead to system instability and potentially...
5.5
Beautiful Mermaid diagrams can inject malicious code into web pages
CVE-2026-26226 GHSA-cgmm-x5ww-q5cr
Beautiful Mermaid diagrams can be used to inject malicious code into web pages, which can allow an attacker to execute scripts on your site. This is a concern if you're using Beautiful Mermaid to rend...
5.3
GNOME-based systems' HTTP library allows unauthorized access to memory
CVE-2026-2443
A bug in the HTTP library used by GNOME-based systems can allow a remote attacker to access sensitive information from a server's memory. This requires a specific server configuration and access to th...
5.3
HP App for Android: Outdated Version Exposes Users to Malicious Web Content
CVE-2026-1578
Using an outdated version of the HP App on Android devices may put users at risk of seeing fake or malicious websites. This is a concern because these sites could trick users into revealing sensitive ...
5.1
Tandoor Recipes: Unauthorized Access to Server Files
CVE-2026-25964
Authenticated users with import permissions can read sensitive files on the server, potentially leading to system compromise. This is due to a weakness in how the application handles user input. Updat...
4.9
Unauthorized task duplication in Kanboard project management software
CVE-2026-25531
Kanboard software versions prior to 1.2.50 allow authenticated users to copy tasks into projects they shouldn't have access to. This can lead to unauthorized access to sensitive project information. U...
4.3
Mattermost: Unauthorized users can read sensitive Jira issue data
CVE-2026-22892 GHSA-9pj7-jh2r-87g8
When creating Jira issues from Mattermost posts, users with authorized access to the Jira plugin can read content and attachments from channels they shouldn't have access to. This applies to users who...
4.3
RegistrationMagic Exposes Sensitive Data to Authorized Users
CVE-2025-15520
The RegistrationMagic WordPress plugin has a security issue that allows users with certain permissions to see information they shouldn't. This affects plugin versions before 6.0.7.2. To fix this, upda...
4.3
Mattermost Reveals Team Names to Deactivated Users
CVE-2026-20796 GHSA-2xf7-hmf6-p64j
Mattermost versions 10.11.x through 10.11.9 don't check if a user is active when showing team names. This means a deactivated user might see team names they shouldn't have access to. Update to a fixed...
3.1
Windows SafeNet Agent can be tricked into accepting fake certificates
CVE-2026-0872
A security weakness in SafeNet Agent for Windows Logon means a hacker could potentially trick the software into accepting a fake digital certificate, which could lead to unauthorized access to sensiti...
2.5
TP-Link Omada Cloud Controller allows unauthorized access to sensitive data
CVE-2025-9292
A misconfigured security setting in the Omada Cloud Controller may allow hackers to access sensitive information if they have already found a way to inject malicious code into the system. This can onl...
2.0
CGA-crxx-5xpf-m6mv
Adobe Acrobat Reader PDF Parsing Flaw Can Allow Arbitrary Code Execution
CGA-crxx-5xpf-m6mv
Adobe Acrobat Reader has a security flaw that could allow attackers to execute malicious code on a victim's computer when they open a specially crafted PDF file. This means that if you use Adobe Acrob...
WordPress Plugins can be Installed by Attacker with Valid but Unnecessary Permissions
CVE-2025-68128
Some WordPress plugins have a feature that allows administrators to assign permissions to users even if the users don't need them. An attacker could exploit this by creating an account with the requir...
Misconfigured Java-based web applications may expose user data
CVE-2025-68127
Some Java-based web applications may leak user data when handling user login attempts. This is due to a configuration issue that can allow unauthorized access to sensitive information. To fix this, up...
Apache Struts allows unauthorized access due to rejected reasons not checked
CVE-2025-68126
Apache Struts does not properly validate rejected reasons in certain situations, potentially allowing an attacker to bypass authentication and gain unauthorized access to sensitive data. This issue af...
WordPress Plugin Rejected User Input Not Sanitized
CVE-2025-68125
The WordPress plugin allows user input to be used in a way that could lead to security issues. This could potentially allow an attacker to inject malicious code into the website. To fix this issue, up...
Apache HTTP Server Allows Unintended Access to Restricted Resources
CVE-2025-68124
Apache HTTP Server may allow unauthorized access to sensitive files if a user is able to guess a specific, reserved but unused URL. This could potentially allow an attacker to access sensitive data or...
WordPress Allows Unintended Access to Unpublished Posts
CVE-2025-58184
A security issue in WordPress allows attackers to view unpublished posts that are not supposed to be accessible. This could allow unauthorized individuals to read sensitive information. WordPress has ...
WordPress Plugin WP User Manager Allows Unauthorized User Access
CVE-2025-58182
The WordPress Plugin WP User Manager has a security issue that lets attackers access user accounts even if they are rejected. This is a serious problem because it could allow hackers to gain control o...