Monitor vulnerabilities that affect your stack. Sign up free to get alerts when software you use is affected.

CVE Vulnerabilities - 19 February 2026

RSS

391 vulnerabilities published on 19 February 2026

Severity:
WooCommerce Product Table and List Builder plugin leaks sensitive data
CVE-2026-2232
The WooCommerce Product Table and List Builder plugin for WordPress allows unauthorized access to sensitive information in its database. This means that attackers can potentially steal sensitive data ...
7.5
Hyland Alfresco allows unauthorized access to sensitive configuration files
CVE-2026-26336
An attacker can access sensitive files in protected directories without logging in. This could lead to the disclosure of confidential configuration settings. Hyland Alfresco users should update to the...
8.7
strongSwan Management Interface Exposes Sensitive Data
CVE-2026-25998
The strongSwan management interface stores sensitive data like passwords and encryption keys in a database without proper protection. This makes it easy for an attacker with access to the database to ...
8.7
wpForo Forum plugin for WordPress allows unauthorized database access
CVE-2026-1581
The wpForo Forum plugin for WordPress has a security flaw that allows an attacker to access sensitive information from the database without needing a password. This happens when a user interacts with ...
7.5
jspdf: Malicious GIFs Can Crash Your PDF Generator
CVE-2026-25535 GHSA-67pg-wm7f-q7fj
A malicious GIF image can crash the jspdf library, causing a denial of service. This can happen if you're not careful when adding images to a PDF. To fix this, update jspdf to version 4.2.0 or later, ...
8.7
Python S3 Transfer Tool Security Update for Linux
RHSA-2026:2911
The Python S3 transfer tool for Linux has a security issue that could allow an attacker to potentially execute code on your system. This issue affects Linux systems running certain versions of the Pyt...
7.5
OpenShift Container Platform: Unpatched Security Flaw Exposes User Data
RHSA-2026:2670
OpenShift Container Platform users may be at risk of data exposure due to an unaddressed security flaw. If not patched, an attacker could potentially access sensitive user data. Red Hat has released a...
7.5
Apache HTTP Server in OpenShift Container Platform 4.16.57 is Updated
RHSA-2026:2658
The Apache HTTP Server in OpenShift Container Platform has been updated to fix a security issue that could allow an attacker to bypass security restrictions. This update is crucial for all users of Op...
7.5
WooCommerce Sales Countdown Timer Allows Attackers to Access Local Files
CVE-2026-27052
A vulnerability in the Sales Countdown Timer plugin for WooCommerce and WordPress allows attackers to access and potentially read sensitive files on the website. This could potentially allow unauthori...
7.5
CMSMasters Content Composer Allows Malicious File Access
CVE-2026-25326
A flaw in CMSMasters Content Composer allows attackers to access sensitive files on your website. This could happen if an attacker tricks the system into including a file that shouldn't be loaded, pot...
7.5
Patient Record Management System 1.0: Compromised Patient Data
CVE-2026-2706
A security issue in Patient Record Management System 1.0 allows hackers to access sensitive patient information by manipulating the 'comp_id' field. This could result in unauthorized access to patient...
5.3
Library Management System plugin for WordPress leaks sensitive data due to SQL attack
CVE-2025-12707
The Library Management System plugin for WordPress can expose sensitive database information if an attacker sends malicious input. This could allow an attacker to access confidential data without need...
7.5
GDPR Cookie Consent Plugin Exposes Sensitive Data on WordPress
CVE-2025-11754
An attacker without WordPress login can access sensitive settings, including API tokens and email addresses, in the GDPR Cookie Consent plugin. This affects all versions up to 4.1.2. Update the plugin...
7.5
Envanty Allows Attackers to Gain Unauthorized Access
CVE-2025-9062
A security issue in Envanty versions before 1.0.6 allows attackers to bypass security checks and access data they shouldn't have access to. This is a serious concern, as it could lead to sensitive inf...
7.3
Notepad++ versions before 8.9.2 can run malicious Windows Explorer
CVE-2026-25926
Using Notepad++ versions prior to 8.9.2 may allow an attacker to run malicious code on your computer if you open Windows Explorer from within the program. This is fixed in version 8.9.2, which you sho...
7.3
PyO3: Malicious code can corrupt memory when accessing PyList data
GHSA-47qc-857f-7w7f
PyO3, a Rust library for creating Python extensions, has a bug that allows an attacker to corrupt memory when accessing data from subclasses of certain native types. This bug was fixed in version 0.28...
7.2
Adobe Experience Manager: Admins Can Inject Malicious Server Code
CVE-2025-12107
Adobe Experience Manager users with admin access may be able to inject malicious code on the server, potentially leading to remote code execution, data theft, or unauthorized access. To protect yourse...
7.2
CartFlows: Untrusted Data Can Allow Unwanted Actions
CVE-2026-25316
The CartFlows plugin for WordPress doesn't properly validate user input, which means an attacker could potentially inject malicious code. This could lead to unauthorized actions or data modifications....
7.2
YITH WooCommerce Compare: Untrusted Data Can Execute Malicious Code
CVE-2026-22333
The YITH WooCommerce Compare plugin allows hackers to inject malicious code into your website. This can happen if you're using an older version of the plugin (3.6.0 or earlier). To protect your site, ...
7.2
BackWPup Plugin for WordPress Allows Attackers to Gain Admin Access
CVE-2025-15041
The BackWPup plugin for WordPress contains a security flaw that lets attackers with some level of access change important settings on your site. This could allow them to make all new users on the site...
7.2
WP Customer Reviews plugin vulnerable to malicious script injection
CVE-2025-14452
The WP Customer Reviews plugin for WordPress contains a bug that allows attackers to inject malicious scripts into websites using it. This can happen if a user clicks on a link sent by the attacker. T...
7.2
CTX Feed Plugin Allows Shop Managers to Install Malicious Plugins
CVE-2025-12975
The CTX Feed plugin for WordPress can be used by authorized Shop Managers to install any plugin they want, which could let attackers take control of your site. This issue affects all versions up to 6....
7.2
CMSMasters Content Composer Security Risk: Unauthorized Access
CVE-2026-23547
The CMSMasters Content Composer software has a security flaw that could allow unauthorized access to its content management system. This means that attackers may be able to access and modify sensitive...
7.1
SvelteKit CPU Exhaustion with Remote Forms Can Cause Server Crash
GHSA-88qp-p4qg-rqm6
If you use SvelteKit and remote forms with the experimental feature enabled, an attacker can send malicious data that makes your server become unresponsive. This can happen when processing a form subm...
6.9
Thesamur's AutoGPT Authentication Bypass Allows Unauthorized Access
CVE-2025-41023
A security flaw in Thesamur's AutoGPT lets attackers log in without a password. This allows them to use any part of the web application, even if they shouldn't be able to. Update to the latest version...
6.9