Monitor vulnerabilities that affect your stack.
Sign up free to get alerts when software you use is affected.
CVE Vulnerabilities - 19 February 2026
RSS391 vulnerabilities published on 19 February 2026
Severity:
GFI MailEssentials: Malicious Code Can Be Injected via Filter Rule
CVE-2026-23606
GFI MailEssentials versions before 22.4 have a security flaw that lets a malicious user inject harmful code into the system. This could allow them to take control of the system or steal sensitive info...
5.1
GFI MailEssentials AI: Stored Scripting in Rule Creation
CVE-2026-23605
GFI MailEssentials AI versions before 22.4 have a security flaw in the rule creation process. An attacker with a login can add malicious code to the rule name, which is then executed when an administr...
5.1
GFI MailEssentials versions before 22.4: Stored JavaScript injection in management interface
CVE-2026-23604
If an attacker has an account on the system, they can inject malicious code into the management interface, which could let them take control of the system or steal sensitive information. This affects ...
5.1
SPIP before 4.4.8 allows hackers to inject malicious scripts
CVE-2026-26345
SPIP, a content management system, contains a vulnerability that lets hackers inject malicious code into the system. This can allow them to take actions in the system as if they were other users, incl...
8.6
SPIP 4.2.14 and Earlier: Malicious Scripts Can Run in Browsers
CVE-2025-71240
If you use SPIP version 4.2.14 or earlier, a hacker could inject malicious code into your website that runs in visitors' browsers, potentially stealing data or taking control of their sessions. To fix...
4.8
Svelte Server-Side Rendering Can Inject Malicious HTML
CVE-2026-27122
GHSA-m56q-vw4c-c2cp
Svelte's server-side rendering feature does not properly check user-inputted HTML tag names, which can allow attackers to inject malicious code into the web page. This is a concern only when using ser...
5.1
Old Svelte Software Can Let Hackers Run Malicious Code in Browsers
CVE-2026-27121
GHSA-f7gr-6p89-r883
Old versions of Svelte, a popular web development framework, can let attackers inject malicious code in web pages. This can happen if an application uses user data as HTML attributes, allowing hackers...
5.1
Svelte SSR Option Element Vulnerable to Malicious Code Injection
CVE-2026-27119
GHSA-h7h7-mm68-gmrc
The Svelte framework's server-side rendering can inject malicious code into the HTML output of an option element. This could allow an attacker to manipulate pages and steal user data. Update to the la...
5.1
Comodo Dome Firewall: Malicious Scripts Can Run in Administrators' Browsers
CVE-2019-25419
Comodo Dome Firewall 2.7.0 has a security issue that allows hackers to inject malicious code into administrators' web browsers when they access the firewall's schedule page. This could lead to unautho...
5.3
Comodo Dome Firewall 2.7.0 Allows Malicious Script Injection
CVE-2019-25405
The Comodo Dome Firewall has a security flaw that lets attackers inject malicious code into administrators' browsers. This can happen when an attacker sends a special type of request to the firewall's...
5.3
Comodo Dome Firewall: Attacker Can Inject Malicious Scripts
CVE-2019-25404
Authenticated attackers can inject malicious scripts into Comodo Dome Firewall's admin interface, potentially taking control of the system. This can happen when a user submits special input through th...
5.1
Comodo Dome Firewall Stored XSS Allows Malicious Script Injection
CVE-2019-25403
Comodo Dome Firewall version 2.7.0 has a security flaw that lets hackers inject malicious code into the system. If an attacker submits specially crafted input to the system, they can execute their cod...
5.1
OpenCms v18.0 allows hackers to inject malicious code in blog posts
CVE-2026-2735
An attacker can inject malicious code into OpenCms blog posts, potentially allowing them to steal user data or take control of the site. This happens when user input is not checked properly. To fix th...
5.1
RealPress allows hackers to trick users into doing something they didn't intend
CVE-2026-27050
The RealPress plugin in WordPress has a security issue that could allow an attacker to trick users into performing an unintended action on their website. If exploited, this could lead to unauthorized ...
5.4
WZone Access Control Security Levels Misconfigured, Allowing Unauthorized Access
CVE-2026-25473
A security issue exists in WZone versions up to 14.0.31, allowing an attacker to access areas they shouldn't. This is a concern because it could lead to unauthorized actions within the application. Up...
5.4
Popularis Extra Themes4WP Plugin Allows Malicious Website Requests
CVE-2026-25422
A security issue in the Popularis Extra plugin for WordPress allows hackers to trick users into performing unintended actions on their website. This affects all versions up to 1.2.10. To fix the issue...
5.4
WP Wand ai-content-generation allows unauthorized access to sensitive content
CVE-2026-25391
WP Wand, a plugin used in WordPress sites, has a security issue that allows unauthorized users to access sensitive content. This could lead to sensitive information being compromised, which could harm...
5.4
Ads Pro Plugin Security: Insecure Access Control
CVE-2026-25388
The Ads Pro plugin for WordPress is missing proper security checks, allowing an attacker to access unauthorized areas of a website. This can lead to data theft, modification, or other malicious activi...
5.4
Coachify: Unapproved Requests Can Be Sent on Behalf of Users
CVE-2026-25337
A security flaw in Coachify allows an attacker to trick users into performing unintended actions. This issue affects users of Coachify versions 1.1.5 and earlier. To protect your site, update to the l...
5.4
PublishPress Revisions: Hackers can trick users into making changes
CVE-2026-25322
A security weakness in PublishPress Revisions makes it possible for hackers to trick users into making changes they didn't intend to make. This affects all versions of PublishPress Revisions up to 3.7...
5.4
Autoshare for Twitter Missing Access Control Puts Data at Risk
CVE-2026-25311
A security issue in Autoshare for Twitter means that if not configured correctly, sensitive information can be accessed by unauthorized users. This affects versions of the plugin up to 2.3.1, so it's ...
5.4
Better Business Reviews Missing Authorization Allows Unauthorized Access
CVE-2026-23804
A security issue in Better Business Reviews plugins allows unauthorized access to sensitive data if the access control security levels are not properly set. This affects versions of Better Business Re...
5.4
News Element Elementor Blog Magazine plugin for WordPress can delete database tables and files
CVE-2026-2284
An attacker with a WordPress account can delete important database tables and files, causing permanent data loss. This can happen because the plugin doesn't properly check if a user has permission to ...
5.4
OpenText Directory Services can display fake information to users
CVE-2026-1658
A security issue in OpenText Directory Services could allow hackers to trick users by displaying manipulated text in the application. This affects versions 20.4.1 through 25.2. To stay secure, update ...
5.3
OpenText XM Fax allows hackers to access other servers
CVE-2025-8055
A security flaw in OpenText XM Fax could let an attacker secretly access other systems on the same network as the server, potentially allowing them to steal information or disrupt services. This affec...
5.3