Monitor vulnerabilities that affect your stack. Sign up free to get alerts when software you use is affected.

CVE Vulnerabilities - 18 February 2026

RSS

331 vulnerabilities published on 18 February 2026

Severity:
Graylog Web Interface console 2.2.3 allows malicious scripts to run in user's browser
CVE-2026-1441
A security flaw in the Graylog Web Interface console allows an attacker to inject malicious code into the interface, potentially allowing them to take control of a user's session and manipulate their ...
5.3
Graylog Web Interface console allows malicious code execution
CVE-2026-1440
A security issue in Graylog version 2.2.3 can allow hackers to inject malicious code into your browser if you visit a specially crafted URL. This could potentially let them take control of your sessio...
5.3
Graylog Web Interface console: Malicious scripts can be injected via URLs
CVE-2026-1439
A flaw in the Graylog Web Interface console allows attackers to inject malicious scripts into a user's browser. This can lead to unauthorized actions being taken on the user's account. To fix this, up...
5.3
Graylog Web Interface Allows Attackers to Inject Malicious Code
CVE-2026-1438
The Graylog Web Interface console version 2.2.3 has a security flaw that lets attackers inject code into a user's browser. This could allow the attacker to manipulate the user's session and potentiall...
5.3
Graylog Web Interface console: Malicious JavaScript injection via URL
CVE-2026-1437
The Graylog Web Interface console version 2.2.3 does not properly protect against malicious code injected into URLs. This could allow an attacker to trick a user into executing malicious JavaScript in...
5.3
WordPress Download Manager plugin exposes users to malicious scripts via links
CVE-2026-1666
A security issue in the Download Manager plugin for WordPress allows attackers to inject malicious scripts into pages if a user clicks on a link. This can happen if the user clicks on a link from an u...
6.1
WordPress Frontend Post Submission Manager Lite plugin redirects users to malicious sites
CVE-2026-1296
The Frontend Post Submission Manager Lite plugin for WordPress is affected by a bug that could allow attackers to trick users into visiting fake websites. This happens when an attacker sends a specifi...
6.1
OpenClaw Chutes OAuth Login Can Be Hijacked by Malicious URLs
CVE-2026-28477 GHSA-7rcp-mxpq-72pj
Using OpenClaw Chutes with manual OAuth login, attackers could trick users into entering fake login data. This could allow an attacker to access a user's Chutes account instead of the intended one. Up...
5.1
Trivy Action allows attackers to run malicious commands in CI runner
CVE-2026-26189 GHSA-9p44-j4g5-cfx5
The Trivy Action in GitHub Actions can execute arbitrary commands in the CI environment if an attacker injects malicious code into the action's inputs. This can happen if you pass untrusted data into ...
5.9
OpenClaw Telegram Authorization Weakness: Usernames Can Be Stolen
CVE-2026-28480 GHSA-mj5r-hh7j-4gxf
If you use OpenClaw with Telegram, be aware that usernames can be changed, potentially allowing an unauthorized user to access your bot. To fix this, update to the latest version of OpenClaw, which no...
6.9
OpenClaw affected by Stored XSS in Control UI via unsanitized assistant name/avatar in inline script injection
CVE-2026-27009 GHSA-37gc-85xm-2ww6
## Summary Stored XSS in the OpenClaw Control UI when rendering assistant identity (name/avatar) into an inline `<script>` tag without script-context-safe escaping. A crafted value containing `</scrip...
5.8
Splunk Enterprise and Cloud Platform: Unauthorized Access to Sensitive Commands
CVE-2026-20137
A low-privileged user can bypass security controls and run sensitive commands in Splunk by creating a Data Model with a malicious query. This can happen in older versions of Splunk Enterprise and Clou...
5.7
Intel EDK II Boot Firmware Vulnerability on Red Hat Systems
RHSA-2026:2776
A security issue has been found in the Intel EDK II firmware used in some Red Hat systems. This could allow an attacker to potentially execute arbitrary code on affected systems. To mitigate this, use...
5.6
Red Hat EDK2 Update Fixes Multiple Security Risks for Servers
RHSA-2026:2771
A security update has been released for the EDK2 firmware, which is used in some Red Hat servers. This update addresses multiple security risks that could allow an attacker to take control of the firm...
5.6
OpenClaw session tool visibility hardening and Telegram webhook secret fallback
CVE-2026-27004 GHSA-6hf3-mhgc-cm65
## Vulnerability In some shared-agent deployments, OpenClaw session tools (`sessions_list`, `sessions_history`, `sessions_send`) allowed broader session targeting than some operators intended. This i...
6.9
OpenClaw Exposes Telegram Bot Tokens in Error Messages
CVE-2026-27003 GHSA-chf7-jq6g-qrwv
OpenClaw, a library used in some applications, previously logged sensitive Telegram bot tokens in error messages. This could have allowed attackers to steal the tokens and take control of the bot. To ...
6.9
ipPulse 1.92 Can Crash with Oversized Input
CVE-2019-25326
A flaw in ipPulse 1.92 allows a local attacker to crash the application by entering more data than it can handle in the Enter Key field. This could cause the application to stop working, but it does n...
4.6
QEMU virtio-crypto device allows guest OS to crash host system
CVE-2025-14876
A security flaw in QEMU's virtio-crypto device can allow a malicious guest operating system to cause the QEMU process to crash, resulting in a denial of service for the host system. This is a serious ...
5.5
FFmpeg can crash when using TensorFlow-based models
CVE-2025-12343
FFmpeg, a popular media processing tool, has a flaw that can cause it to crash when processing certain types of artificial intelligence models. This is not a security risk, but it can make FFmpeg stop...
5.5
FFmpeg Firequalizer Filter Crashes with Malicious Media Files
CVE-2025-10256
The Firequalizer filter in FFmpeg can crash if it processes a specially crafted media file, potentially causing the application to stop working. This could allow an attacker to disrupt operations by f...
5.5
Wren up to 0.4.0 allows attackers to crash the program
CVE-2026-2657
A security issue in Wren's error message handling could allow an attacker to cause a Wren program to crash. This issue affects Wren versions up to 0.4.0. To protect yourself, update Wren to a version ...
4.8
OpenClaw: Malicious Session IDs Can Read Unauthorized Files
CVE-2026-28482 GHSA-5xfq-5mr7-426q
OpenClaw versions prior to 2026.2.12 contain a security flaw that allows an attacker to access unauthorized files by manipulating session IDs. This only affects systems where the OpenClaw gateway is e...
8.4
Tanium Enforce Recovery Key Portal File Permissions Issue
CVE-2026-1344
A bug in the Tanium Enforce Recovery Key Portal could allow unauthorized access to sensitive data. This means that someone who shouldn't have access could potentially see confidential information. Tan...
5.5
InvoicePlane: Malicious scripts can be injected into invoices
CVE-2026-26270
An attacker can inject malicious code that executes when users view invoices or the main dashboard. This can lead to unauthorized access or actions. Update to version 1.7.1 to fix the issue.
5.4
IPFire 2.21 Update 127: Attackers Can Inject Malicious Browser Scripts
CVE-2019-25400
IPFire's update 127 has a security flaw that allows hackers to inject malicious code into a user's web browser if they visit a specially crafted website. This could lead to unauthorized access or data...
4.8