Monitor vulnerabilities that affect your stack.
Sign up free to get alerts when software you use is affected.
CVE Vulnerabilities - 17 February 2026
RSS172 vulnerabilities published on 17 February 2026
Severity:
Gogs Protected Branch Deletion at Risk via Web Interface
CVE-2026-25232
GHSA-2c6v-8r3v-gh6p
Any repository collaborator with write permissions can delete protected branches, including the default branch, by sending a direct POST request through the web interface. This allows a low-privilege ...
7.1
Phpgurukul Student Management System SQL Injection Flaw
CVE-2024-55270
The Phpgurukul Student Management System's search function is not secure, allowing an attacker to access or modify sensitive data. This could lead to unauthorized changes or theft of student informati...
8.8
Beetel 777VR1 Telnet/SSH Service Not Securely Configured
CVE-2026-2617
The Telnet and SSH services on Beetel 777VR1 devices are not properly configured, which means they may not be secure by default. This could allow an attacker on the same local network to exploit this ...
5.3
Datart v1.0.0-rc.3: Malicious URL in JDBC Config Allows Code Execution
CVE-2025-70828
An attacker can inject malicious code into the Datart application by manipulating the url parameter in the JDBC configuration. This could allow them to take control of the system or steal sensitive da...
8.8
WP Maps plugin for WordPress allows hackers to access sensitive files
CVE-2025-12062
The WP Maps plugin for WordPress has a security flaw that allows hackers with a basic account to access and run files on the server, potentially stealing sensitive data or taking control of the site. ...
8.8
Microsoft Windows Video ActiveX Control Lets Attackers Run Malicious Code
CVE-2008-0015
A security flaw in the Microsoft Windows Video ActiveX Control could allow hackers to take control of a user's computer if they visit a malicious website. This could let the hacker do anything the use...
8.8
KEV
Google Chromium: Malicious Code Can Crash Browsers
CVE-2026-2441
If a hacker creates a specific web page, it could cause your browser to crash or behave unexpectedly, potentially allowing them to take control of your computer. This issue affects multiple popular we...
8.8
KEV
Malwarebytes AdwCleaner: Non-admin users can delete important files
CVE-2025-67905
Non-admin users can delete important system files on Malwarebytes AdwCleaner versions before 8.7.0. This is a security risk because it could allow an attacker to delete critical system files, potentia...
8.7
Apache NiFi: Unrestricted Changes to Critical Flow Components
CVE-2026-25903
GHSA-c5w7-m8wf-xc77
Critical Apache NiFi installations are at risk of unauthorized changes to sensitive flow components. This can happen when a user with limited permissions is allowed to update configuration settings fo...
8.7
Tumeva Prime News Software: SQL Injection Risk for User Data
CVE-2025-7631
Tumeva Prime News Software versions 1.0.1 and earlier are at risk of being hacked if malicious code is injected through user input. This could allow an attacker to access sensitive user information. U...
8.6
Clicldeu SaaS Reports Expose Confidential Data in Downloaded PDFs
CVE-2026-2247
A security issue in Clicldeu SaaS allows an attacker who has already logged in to access sensitive information by manipulating the URL of a downloaded report. This could happen if an attacker can tric...
8.3
IBM Db2 Database: XML Data Processing Security Risk
CVE-2025-36247
IBM Db2 databases version 11.5 and 12.1 are at risk of being exploited by an attacker who can access sensitive information or crash the system by sending a malicious XML file. This is a serious securi...
8.2
OpenClaw Plugin Installation Can Write Files Outside Intended Directory
CVE-2026-28447
GHSA-qrq5-wjgg-rvqw
A security issue affects older versions of OpenClaw, where a malicious plugin can write files in the wrong directory if installed by an administrator. This could potentially allow an attacker to acces...
7.0
Pterodactyl Panel Exposes Server Configs and Data to Malicious Access
CVE-2026-26016
GHSA-g7vw-f8p5-c728
A security flaw in Pterodactyl Panel allows unauthorized access to server configurations and data. This means that a malicious user with a secret token can view and manipulate other servers, potential...
9.2
FBackup 9.9: Unsecured Local Access to Sensitive Data
CVE-2026-2627
FBackup 9.9 has a security issue that allows attackers to access sensitive data on the same computer. This means that an attacker with local access can potentially exploit this weakness. We recommend ...
8.5
Glory RBG-100 Systems Expose Root Access to Unauthorized Users
CVE-2026-23648
The ISPK-08 software on some Glory RBG-100 recyclers has weak file permissions, allowing a local attacker to replace or modify critical system files and gain root access. This means an unauthorized pe...
8.5
Zarinpal Gateway for WooCommerce Plugin Allows Unauthorized Order Payments
CVE-2026-2592
The Zarinpal Gateway for WooCommerce plugin on your WordPress site may let anyone mark orders as paid without actually paying for them. This can happen if someone gets a secret payment code from a dif...
7.7
OpenClaw Gateway tool allows malicious URLs from trusted users
CVE-2026-26322
GHSA-g6q9-8fvw-f7rf
Trusted users with special access to the OpenClaw Gateway tool can accidentally or maliciously make the tool connect to unauthorized websites. This can happen when users have more access than they nee...
7.6
Jorani: Unauthorized SQL Commands Can Be Executed
CVE-2025-67102
A security issue in Jorani's all-day offs feature allows an authorized user to execute unintended database commands, potentially leading to data tampering or unauthorized access. This vulnerability af...
7.6
OpenClaw Image Tool Can Fetch Unauthorized Network Targets
GHSA-56f2-hvwg-5743
OpenClaw's Image tool can be tricked into fetching images from unauthorized internal network targets, potentially exposing sensitive information. This issue is fixed in version 2026.2.2 and later. Upd...
7.6
OpenClaw SSRF Protection Can Be Bypassed with Certain IPv6 Addresses
CVE-2026-26324
GHSA-jrvc-8ff5-2f9f
OpenClaw's built-in security feature to block certain types of internet requests can be tricked into allowing malicious access. This could allow hackers to access internal systems or networks that sho...
7.5
OpenClaw Feishu Extension Can Expose Local Files
CVE-2026-26321
GHSA-8jpq-5h99-ff5r
If an attacker can trick the OpenClaw Feishu extension into loading a malicious file, they may be able to access and steal sensitive files from your computer. This issue is fixed in version 2026.2.14 ...
7.5
OpenClaw Telnyx Plugin Missing Authentication for Calls
CVE-2026-26319
GHSA-4hg8-92x6-h2f3
If you use the OpenClaw Telnyx plugin, you may be at risk of accepting fake requests from unknown sources. This happens when the plugin is installed, enabled, and exposed to the public internet withou...
7.5
BlueBubbles Webhook Security Risk: Unauthorized Access
CVE-2026-26316
GHSA-pchc-86f6-8758
If you use the BlueBubbles plugin with OpenClaw, an attacker could potentially send fake messages as if they came from you, by exploiting a weakness in the way the plugin checks for authentication. To...
7.5
fast-xml-parser: Malicious XML Can Cause Long Delays in Processing
CVE-2026-26278
GHSA-jmr7-xgp7-cmfj
A maliciously crafted XML file can cause the fast-xml-parser library to take a long time to process, potentially freezing the application. This is due to a flaw in the way the library handles certain ...
7.5