Monitor vulnerabilities that affect your stack.
Sign up free to get alerts when software you use is affected.
CVE Vulnerabilities - 19 February 2026
RSS391 vulnerabilities published on 19 February 2026
Severity:
Lewe WebMeasure: Malicious Code Can Be Injected Through URL
CVE-2025-40697
The Lewe WebMeasure application has a security weakness that can allow an attacker to inject malicious code into a user's browser. This could potentially allow the attacker to steal sensitive informat...
5.1
Kargo REST API Missing Authorization Checks in Approval and Promotion
CVE-2026-27111
GHSA-5vvm-67pj-72g4
Kargo's REST API has three endpoints that don't properly verify user permissions, allowing unauthorized users to approve or promote freight to certain stages. This can lead to unauthorized access to s...
5.3
Alobaidi Extend Link allows attackers to make fake server requests
CVE-2026-25310
A vulnerability in Alobaidi Extend Link allows an attacker to trick the software into making unintended requests to any server on the internet, potentially revealing sensitive information or taking co...
4.9
CM Business Directory: Stored Cross-Site Scripting in Directory Listings
CVE-2026-25004
The CM Business Directory plugin is vulnerable to a stored cross-site scripting (XSS) attack. This means that if an attacker injects malicious code into a directory listing, it can be executed by othe...
4.8
Open Redirect in go-chi/chi allows attackers to redirect users to malicious sites
CVE-2025-69725
The go-chi/chi library has a security issue that could allow attackers to trick users into visiting fake websites by manipulating URLs. This could potentially lead to phishing or other types of malici...
4.7
WordPress Update URLs Plugin Redirects to Untrusted Sites
CVE-2026-25392
A security issue in the WordPress Update URLs plugin can redirect users to untrusted websites, potentially allowing phishing attacks. This affects the plugin 'Update URLs – Quick and Easy way to searc...
4.7
Dell PowerProtect Data Manager allows high-privilege attackers to bypass security
CVE-2026-22269
Prior to version 19.22, Dell PowerProtect Data Manager's REST API fails to properly verify the source of incoming requests. This means a highly privileged attacker with remote access could potentially...
4.7
SvelteKit remote forms can crash server with malicious data
GHSA-vrhm-gvg7-fpcf
If you're using SvelteKit's experimental remote forms, a malicious form submission could crash your server. This only affects projects using both remote functions and forms, and can be fixed by updati...
4.6
Spring Data Geode extracts sensitive files in predictable directories on shared hosts
CVE-2026-2817
When using Spring Data Geode to import snapshots, sensitive files are stored in a predictable location on a shared host, making it possible for other users to access them. This could lead to exposure ...
4.8
Client Testimonial Slider plugin allows attackers to inject malicious scripts on WordPress sites
CVE-2026-2716
A security flaw in the Client Testimonial Slider plugin for WordPress can let attackers inject malicious scripts into pages viewed by other users. This only affects WordPress sites with this plugin in...
4.4
TS Poll <= 2.5.5 allows attackers to access unauthorized servers
CVE-2026-25428
An attacker can trick the TS Poll plugin into making requests to any server on the internet. This could allow an attacker to steal sensitive data or disrupt your website. Update to version 2.5.6 or la...
4.4
Slidorion plugin for WordPress allows attackers to inject malicious scripts in admin settings
CVE-2026-2282
The Slidorion plugin for WordPress has a security flaw that lets attackers with admin access inject malicious scripts into pages. This can affect multi-site WordPress installations or those with speci...
4.4
TalkJS plugin for WordPress: Admin settings allow malicious scripts to run
CVE-2026-1055
Attackers with admin permissions can inject malicious code into WordPress pages, potentially compromising site security. This affects multi-site installations and sites where HTML input is restricted....
4.4
Salavat Counter Plugin for WordPress: Unauthenticated Admin Access via Image URL
CVE-2026-1047
The Salavat Counter WordPress plugin contains a security flaw that allows hackers with administrator access to inject malicious code into website pages. This can happen when a hacker with admin access...
4.4
Tennis Court Bookings plugin can inject malicious code on sites
CVE-2026-1044
The Tennis Court Bookings plugin for WordPress has a security flaw that allows an attacker with admin permissions to inject malicious code on WordPress sites with multi-site installations or where cer...
4.4
PostmarkApp Email Integrator plugin for WordPress: Malicious code injection risk
CVE-2026-1043
The PostmarkApp Email Integrator plugin for WordPress may allow an attacker with Administrator access to inject malicious code on the plugin settings page, potentially affecting any user who views the...
4.4
YayMail for WooCommerce Email Customizer: Unauthorized Access Risk
CVE-2026-27327
The YayMail plugin for WooCommerce email customization has a security weakness that could allow an attacker to access or modify email settings without permission. This is a concern for online store ow...
4.3
SPIP 4.4.8 and earlier may allow unauthorized server access
CVE-2026-27472
A security flaw in SPIP versions 4.4.8 and earlier allows an attacker who has access to the private area to make the server access unauthorized destinations. This could potentially allow the attacker ...
5.3
GFI MailEssentials: Unrestricted Directory Existence Disclosure
CVE-2026-23621
GFI MailEssentials versions before 22.4 allow an attacker to determine if certain directories exist on the server by submitting a specially crafted path. This could help an attacker gather information...
5.3
GFI MailEssentials AI versions prior to 22.4 allow file existence checks
CVE-2026-23620
GFI MailEssentials AI versions before 22.4 have a security flaw that allows an attacker to see if specific files exist on your server. This could potentially reveal sensitive information about your se...
5.3
Kenta Companion 1.3.3: Malicious Actions Can Be Forced
CVE-2026-27090
A security weakness in Kenta Companion allows an attacker to trick users into performing unintended actions on their account. This affects versions 1.3.3 and earlier of Kenta Companion. Update to a fi...
4.3
iThemes Sync: Unauthorized Access to Sensitive Data
CVE-2026-27056
The iThemes Sync plugin has a security flaw that could allow an attacker to access sensitive data without permission. This issue affects versions of iThemes Sync from an unknown version up to 3.2.8. U...
4.3
Penci AI SmartContent Creator: Unauthorized Access to Configuration
CVE-2026-27055
An issue in Penci AI SmartContent Creator allows unauthorized users to access and potentially modify sensitive settings. This affects all versions up to 2.0. To fix, update to the latest version or ad...
4.3
Sober theme: unauthorized access to settings possible due to misconfigured access control
CVE-2026-25459
A security issue exists in Sober themes where users with incorrect security settings can access settings they shouldn't. This affects Sober themes version 3.5.12 and earlier. To stay secure, update to...
4.3
MailerLite: Unsecured Sign-Up Forms Allow Unauthorized Access
CVE-2026-25420
MailerLite's sign-up forms may be vulnerable to unauthorized access if not properly configured. This means that an attacker could potentially access or modify your sign-up forms if they have incorrect...
4.3