Monitor vulnerabilities that affect your stack.
Sign up free to get alerts when software you use is affected.
CVE Vulnerabilities - 19 February 2026
RSS391 vulnerabilities published on 19 February 2026
Severity:
Clasifico Listing Plugin for WordPress Allows Unauthorized User Privilege Escalation
CVE-2025-12882
The Clasifico Listing plugin for WordPress allows anyone to create an account and gain administrator privileges without proper authorization, which could lead to unauthorized access to your website's ...
9.8
SECCN Dingcheng G10 3.1.0.181203: Remote Command Injection Risk
CVE-2026-2686
A remote attacker can inject malicious system commands through the 'User' input in the /cgi-bin/session_login.cgi file, potentially allowing unauthorized access and control of the system. This makes i...
8.9
Unrestricted File Upload in Tsinghua Unigroup Electronic Archives System
CVE-2026-2684
A vulnerability in the Electronic Archives System allows an attacker to upload any file without restriction, potentially allowing them to upload malicious files. This could lead to data breaches or sy...
6.9
Delinea Cloud Suite: Malicious Data Can Be Injected into Database
CVE-2026-2409
A security issue in Delinea Cloud Suite before version 25.2 HF1 allows attackers to inject malicious data into the database, which could potentially allow them to access or modify sensitive informatio...
9.3
Carbon API Manager Allows Unrestricted File Uploads
CVE-2025-13590
GHSA-p6jf-79j3-33f3
Carbon API Manager's file upload feature can be exploited by an attacker with admin privileges, potentially leading to code execution on your server. This means an attacker could potentially take cont...
9.1
SoftVision webPDF before 10.0.2 allows attackers to scan internal servers and steal files
CVE-2025-55853
The PDF converter in older versions of SoftVision webPDF doesn't check what files it's being asked to use. This means an attacker can upload a special file that lets them scan your internal servers an...
9.1
OpenClaw versions before 2026.2.14: Malicious file access and deletion
GHSA-r5fq-947m-xm57
Older versions of OpenClaw allow attackers to access and delete files in unintended areas of the system. This can happen if the system is set up to allow applying patches without proper security contr...
8.7
Formwork: User with Editor Role Can Gain Admin Access
CVE-2026-27198
GHSA-34p4-7w83-35g2
A security flaw in Formwork allows an authenticated user with the 'editor' role to create new accounts with admin privileges, giving them full control over the CMS and its data. This could lead to sen...
8.8
Kata Containers Guest VM Privilege Escalation on Certain Platforms
CVE-2026-24834
GHSA-wwj6-vghv-5p64
A vulnerability in Kata Containers allows an attacker to gain root access to a Guest VM, potentially compromising its security. This issue affects Kata Containers running on certain platforms, particu...
5.2
WorkTime Server 'widget' API Allows Unauthorized Data Access
CVE-2025-15560
A vulnerability in the WorkTime server's 'widget' API allows an authenticated user with limited permissions to access sensitive data. If the Firebird database is used, attackers can see all data. If t...
8.8
Dell PowerProtect Data Manager: Unprivileged Access Leads to Elevated Privileges
CVE-2026-22267
A remote attacker with basic access can gain full control over Dell PowerProtect Data Manager, allowing them to make changes to the system and sensitive data. This could lead to unauthorized access, d...
8.8
Dell PowerProtect Data Manager 19.22 and earlier: Untrusted API Access Risk
CVE-2026-22266
A high-risk vulnerability in the Dell PowerProtect Data Manager's REST API allows a malicious user with remote access to potentially bypass security protections. This means an attacker could potential...
8.8
Dell Unisphere for PowerMax 10.2: Malicious File Overwriting
CVE-2026-26359
A low-privilege attacker with remote access to your Dell Unisphere for PowerMax 10.2 system could potentially delete or change any file, which could disrupt your storage management and data security. ...
8.8
Dell Unisphere for PowerMax 10.2: Unauthorized Access via Remote Attack
CVE-2026-26358
A low-privilege attacker with remote access can potentially access parts of Dell Unisphere for PowerMax 10.2 without permission. This could allow them to view sensitive data or make unauthorized chang...
8.8
Valenti Software Allows Hackers to Inject Malicious Code
CVE-2026-23544
A security flaw in Valenti software allows hackers to inject malicious code by manipulating data. This can lead to unauthorized access to sensitive information and system compromise. Update to Valenti...
8.8
Unauthorized Plugin Installation in The Orderable WordPress Plugin
CVE-2026-0974
The Orderable WordPress plugin for restaurants allows attackers with a basic account to install any plugin, potentially giving them control over your site. This could let them do bad things to your si...
8.8
Toret Manager plugin for WordPress allows attackers to gain admin access
CVE-2026-0912
The Toret Manager plugin for WordPress is not secure. Attackers with Subscriber-level access can change important settings and gain administrative user access to a site. Update to the latest version o...
8.8
IDonate Plugin for WordPress Allows Attackers to Take Over Accounts
CVE-2025-4521
The IDonate plugin for WordPress has a security issue that lets attackers take over any account on a website. This can happen if an attacker with a simple login can change the email address of another...
8.8
WP AUDIO GALLERY plugin for WordPress allows attackers to read files
CVE-2025-13603
The WP AUDIO GALLERY plugin for WordPress is outdated and vulnerable to attack. This means that someone with a user account, even a basic one, could potentially read sensitive files on your server. If...
8.8
Unauthorized access to sensitive WordPress plugin data
CVE-2025-12845
A security issue in the Tablesome Table plugin for WordPress allows attackers with Subscriber-level access or higher to access sensitive data, including email logs and password reset keys. This could ...
8.8
NewsBlogger Theme for WordPress Allows Attackers to Upload Malicious Files
CVE-2025-12821
The NewsBlogger theme for WordPress has a security issue that lets attackers upload malicious files if they trick a site administrator into clicking on a link. This can allow the attacker to run code ...
8.8
SillyTavern: Malicious Users Can Access Internal Services
CVE-2026-26286
A security issue in SillyTavern versions prior to 1.16.0 allows malicious users to access internal services, cloud metadata, and private network resources by making unauthorized requests. This is a ri...
7.1
Google AppSheet: Sensitive Local File Read and Network Access
CVE-2026-2274
A security issue in Google AppSheet (before November 23, 2022) allowed an attacker with a user account to read sensitive files and access internal network resources. However, this issue has been fixed...
8.5
eBay API MCP Server: Environment Variable Injection Risk
CVE-2026-27203
GHSA-97rm-xj73-33jh
A security flaw in the eBay API MCP server allows an attacker to inject malicious environment variables into the configuration file, which could lead to configuration overwrites, denial of service, or...
8.3
Alfresco Transformation Service lets attackers read any file on the server
CVE-2026-26337
The Alfresco Transformation Service has a security issue that allows anyone to read any file on the server without needing a password. This is a security risk because sensitive information could be ac...
8.8