Monitor vulnerabilities that affect your stack.
Sign up free to get alerts when software you use is affected.
CVE Vulnerabilities - 18 February 2026
RSS331 vulnerabilities published on 18 February 2026
Severity:
Ghost has a SQL injection in Content API
CVE-2026-26980
GHSA-w52v-v783-gw97
### Impact
A SQL injection vulnerability existed in Ghost's Content API that allowed unauthenticated attackers to read arbitrary data from the database.
### Vulnerable Versions
This vulnerability ...
9.4
SourceCodester Customer Support System allows unauthorized admin access
CVE-2025-70141
An attacker can exploit this flaw to create, delete, or modify customer data without permission. This could lead to sensitive information being altered or deleted, compromising the integrity of the sy...
9.4
InvoicePlane 1.7.0 allows hackers to execute malicious code on your server
CVE-2026-25548
InvoicePlane users should update to version 1.7.1 to prevent an attacker with administrator access from taking control of your server and executing malicious code. By updating, you'll ensure the secur...
9.1
LibreNMS: Unapproved data can access database records
CVE-2026-26988
GHSA-h3rv-q4rq-pqcv
A security issue exists in LibreNMS's IPv6 address search feature. If not addressed, an attacker could potentially access unauthorized data or manipulate the database. To protect your data, update Lib...
9.3
ProjectWorlds Online Time Table Generator 1.0: Unauthenticated Admin Access
CVE-2025-70146
A security issue in ProjectWorlds Online Time Table Generator 1.0 allows unauthorized users to access administrative features, such as adding or deleting records, without proper authentication. This m...
9.1
GitHub Enterprise Server Leaks Sensitive Tokens Through Redirects
CVE-2026-0573
A security flaw in GitHub Enterprise Server allows attackers to steal sensitive login tokens when users visit a malicious website. This vulnerability affects all versions of GitHub Enterprise Server u...
7.6
PostgreSQL Version Detection Allows Malicious File Execution on Linux
CVE-2026-26318
GHSA-5vv4-hvf7-2h46
The systeminformation package for Linux allows an attacker to execute malicious files on the system when detecting the PostgreSQL version. This is a medium-risk issue that affects systeminformation us...
8.8
LibreNMS allows attackers to infer database info through SQL injection
CVE-2026-26990
GHSA-79q9-wc6p-cf92
LibreNMS, a network monitoring tool, has a security weakness that lets attackers guess information about the database by manipulating search queries. This issue affects any logged-in user. To stay saf...
8.8
Google Chrome: Heap Corruption in Media Component
CVE-2026-2650
A security issue in Google Chrome's media component could allow a website to potentially cause the browser to crash or behave unexpectedly. This affects Chrome versions prior to 145.0.7632.109. Update...
8.8
Google Chrome: Heap Corruption via Malicious HTML Page
CVE-2026-2649
A security issue in Google Chrome could allow an attacker to crash the browser or possibly execute malicious code. This affects users who visit a specially crafted website. To stay safe, keep your Goo...
8.8
Google Chrome: Malicious PDF File Can Crash Browser
CVE-2026-2648
A security issue in older versions of Google Chrome allows a hacker to create a malicious PDF file that could crash the browser. This could potentially happen if you visit a website that includes this...
8.8
Centova Cast 3.2.11 allows attackers to download system files
CVE-2019-25351
An attacker who has already logged in to a Centova Cast server can use a special request to download sensitive system files, such as password files, potentially revealing confidential information. Thi...
7.1
PHPGurukul Hospital Management System: Unprivileged users can access admin settings
CVE-2025-70064
A user can access sensitive areas of the system without permission, allowing them to view confidential information and make unintended changes. This is a concern for patient data and system security. ...
8.8
Scholars Tracking System 1.0 Fails to Validate File Uploads
CVE-2025-70151
An attacker who is logged in to the Scholars Tracking System can upload any type of file, including malicious PHP code. This can allow them to take control of the server and execute their own code. To...
8.8
Advanced AJAX Product Filters plugin for WordPress allows attackers to delete files or steal data
CVE-2026-1426
A security flaw in the Advanced AJAX Product Filters plugin for WordPress, used in conjunction with the Live Composer plugin, allows attackers with Author-level access to delete files or steal sensiti...
8.8
Rexroth IndraWorks: Malicious File Can Execute Code on Your System
CVE-2025-60038
A flaw in Rexroth IndraWorks can let an attacker take control of your computer if you open a specially crafted file. This can happen if a user unintentionally opens a malicious file, which can then ru...
8.8
Rexroth IndraWorks: Malicious File Can Execute Code on Your System
CVE-2025-60037
A critical security issue affects Rexroth IndraWorks. If you open a specially crafted file, an attacker could gain control of your system. Update your software to the latest version to prevent this fr...
8.8
Rexroth IndraWorks: Malicious File Can Crash and Steal System Control
CVE-2025-60036
The Rexroth IndraWorks software has a flaw that lets hackers take control of your system if you open a specially crafted file. This can happen if you use the program's test client tool. To stay safe, ...
8.8
Rexroth IndraWorks OPC.Testclient allows malicious file execution
CVE-2025-60035
A security flaw in the OPC.Testclient tool, part of Rexroth IndraWorks, lets hackers run malicious code on your system by tricking you into opening a specially crafted file. All versions of IndraWorks...
8.8
OpenClaw updater script allows malicious commands to run
CVE-2026-26323
GHSA-m7x8-2w3w-pr42
A bug in the OpenClaw updater script for contributors and maintainers allows a malicious actor to run arbitrary commands on your system. This happens when you run the updater in a source code reposito...
8.6
AMR Printer Management 1.01 Beta: Unauthorized File Access
CVE-2026-2464
The AMR Printer Management 1.01 Beta web service on Windows allows attackers to access sensitive files on the system without permission. This is a concern because the service doesn't require a login a...
8.7
OpenClaw: Feishu Extension Can Fetch Sensitive Internal Data
CVE-2026-28451
GHSA-x22m-j5qq-j49m
A security issue in the OpenClaw Feishu extension could allow an attacker to access and potentially steal sensitive internal data by tricking the extension into making unauthorized requests. To fix th...
6.3
time@work 7.0.5: Unsecured Query URL Exposes User Data
CVE-2025-59920
A security issue in time@work version 7.0.5 allows unauthorized users to see sensitive information about other users' projects. This can happen if someone copies a link from time@work and opens it in ...
8.6
ShopLentor Plugin Can Be Used to Send Spam Emails
CVE-2026-1714
A security issue in the ShopLentor plugin for WordPress allows unauthenticated attackers to send emails to any recipient using the plugin's functionality. This could be used for spam or phishing campa...
8.6
Saturn Remote Mouse Server allows malicious packets to run arbitrary commands
CVE-2026-27182
An attacker on the same network can send a special type of packet to the Saturn Remote Mouse Server, which can then run any command on the server. This means an attacker can potentially take control o...
8.6