Monitor vulnerabilities that affect your stack. Sign up free to get alerts when software you use is affected.

CVE Vulnerabilities - 20 February 2026

RSS

391 vulnerabilities published on 20 February 2026

Severity:
Vanquish User Extra Fields allows hackers to steal user data via email
CVE-2025-67991
A security issue in Vanquish User Extra Fields plugin for WordPress allows hackers to steal sensitive user information by sending a malicious email. This affects users who have installed the plugin ve...
7.1
GMap Targeting Reflected Cross-Site Scripting in RealMag777 GMap Targeting
CVE-2025-67990
An attacker can inject malicious code into GMap Targeting, potentially stealing user data or taking control of a user's account. This affects GMap Targeting versions up to 1.1.7, so update to a fixed ...
7.1
NPS computy Cross-site Scripting allows malicious code execution
CVE-2025-67984
A security issue in NPS computy versions up to 2.8.2 allows hackers to inject malicious code into web pages, potentially stealing user data or taking control of user sessions. This issue can be exploi...
7.1
Educare Cross-Site Scripting Can Happen When You Visit a Malicious Link
CVE-2025-67978
Using FixBD Educare version 1.6.1 or earlier, attackers can trick you into visiting a fake link that can steal your data or take control of your account. This is a risk because it can lead to unauthor...
7.1
Fox-Themes Prague Plugins Allow Malicious Code to Run on Websites
CVE-2025-67972
A security issue in Fox-Themes Prague plugins makes it possible for attackers to inject malicious code into websites that use the plugin. If you have this plugin installed, an attacker could potential...
7.1
FluentCart: Unsecured Input Can Steal User Data
CVE-2025-67971
FluentCart, a plugin for WordPress, has a security flaw that allows hackers to steal user data or take control of user sessions. This affects versions of FluentCart before 1.3.0. To stay safe, update ...
7.1
WP Wizard Cloak: Malicious Code Can Be Injected via Reflected Attack
CVE-2025-53237
The WP Wizard Cloak plugin for WordPress is vulnerable to a security issue that could allow hackers to inject malicious code into web pages. This could potentially harm users who interact with affecte...
7.1
RylanH Storyform: Malicious Code Can Run on Your Website
CVE-2025-53233
A security issue in RylanH Storyform could let hackers inject malicious code into your website. This could happen if a user clicks on a link or visits a website that contains malicious code. To avoid ...
7.1
Easy Taxonomy Images: Malicious Code Can Be Injected into Your Website
CVE-2025-53231
A security issue in Easy Taxonomy Images allows hackers to inject malicious code into your website, potentially allowing them to steal user data or take control of your site. If you're using Easy Taxo...
7.1
Jezza101 bbpress Simple Advert Units allows malicious scripts to run on your website
CVE-2025-53228
A security issue in Jezza101 bbpress Simple Advert Units plugin allows hackers to inject malicious scripts into your website, potentially causing harm to your visitors. This affects versions 0.42 and ...
7.1
Node.js Tar Extracts Files Outside Its Safe Area
DEBIAN-CVE-2026-26960
Versions of Node.js Tar below 7.5.8 may allow an attacker to read or write arbitrary files on the system. This happens when a malicious archive is extracted, allowing the attacker to access files outs...
7.1
TensorFlow's HDF5 Library Lets Local Attackers Take Over the Computer
CVE-2026-2492
A vulnerability in TensorFlow's HDF5 library allows attackers who already have some access to the computer to gain even more access and run unauthorized code. This is a risk because it could allow mal...
7.0
Deciso OPNsense diag_backup PHP File Allows Network Attackers to Run Code
CVE-2026-2035
If not updated, attackers on the same network can use a specific file to run malicious code on your Deciso OPNsense system, even if they don't have a login. This can lead to unauthorized changes or da...
6.8
Sricam DeviceViewer Password Change Bypass Allows Unauthorized Password Changes
CVE-2019-25436
A security issue in Sricam DeviceViewer 3.12.0.1 allows anyone who has logged in to change passwords without needing to know the current password. This could allow an attacker to gain control of the a...
5.1
A vulnerability was found in yeqifu warehouse up to aaf29962ba407d22d991781de28796ee7b4670e4. This affects the function addCustomer/updateCustomer/deleteCustomer of the file dataset\repos\warehouse...
CVE-2026-2850
A vulnerability was found in yeqifu warehouse up to aaf29962ba407d22d991781de28796ee7b4670e4. This affects the function addCustomer/updateCustomer/deleteCustomer of the file dataset\repos\warehouse\sr...
5.3
Simple File List: Malicious Files Can Be Accessible on Your Server
CVE-2026-24953
A security issue in Simple File List allows hackers to access files they shouldn't be able to access on your server. This puts sensitive information at risk. Update to the latest version of Simple Fil...
6.5
WooCommerce Print Invoice & Delivery Notes Missing Access Control
CVE-2026-24946
A security weakness in the WooCommerce plugin Print Invoice & Delivery Notes allows hackers to access sensitive information if access controls are not set up correctly. This plugin, which helps manage...
6.5
Subscribe2: Unrestricted Access to Subscription Management
CVE-2026-24944
A security issue exists in Subscribe2, a plugin for managing email subscriptions. If not configured correctly, this could allow unauthorized users to access or modify subscription settings. Update to ...
6.5
WP FullCalendar allows unauthorized access to events
CVE-2026-22351
Some events in WP FullCalendar may be visible to users who shouldn't see them. This is because the security settings weren't properly configured. To fix this, update to the latest version of WP FullCa...
6.5
Elementor Forms PDF Generator Can Be Used by Unauthorized Users
CVE-2026-22350
The PDF generator for Elementor Forms may allow anyone to access and modify sensitive information if the security settings are not properly configured. This affects the PDF for Elementor Forms + Drag ...
6.5
Cliengo Chatbot Allows Unauthorized Access with Incorrect Security Settings
CVE-2025-69388
A security issue in Cliengo Chatbot allows someone with incorrect permissions to access areas they shouldn't. This affects older versions of Cliengo Chatbot, including version 3.0.4 and below. To stay...
6.5
AgniHD Cartify - WooCommerce Theme: Unauthorized Access to Cart Functions
CVE-2025-69385
The AgniHD Cartify - WooCommerce Gutenberg WordPress Theme has a security weakness that could allow unauthorized users to access and manipulate cart functions, potentially leading to financial loss an...
6.5
WPKube Cool Tag Cloud Allows Malicious Code to be Stored
CVE-2025-69011
A security issue in WPKube Cool Tag Cloud allows attackers to store malicious code on a website, which can be executed by visitors. This could lead to unauthorized actions, such as stealing user data ...
6.5
AhaChat Messenger Marketing: Passwords Can Be Recovered Without Permission
CVE-2025-68895
A security issue exists in AhaChat Messenger Marketing, a software used for marketing. If not addressed, attackers could potentially recover passwords without the user's consent, potentially leading t...
6.5
ELEX WordPress HelpDesk & Customer Ticketing System Security Risk: Unauthorized Access
CVE-2025-68837
The ELEX WordPress HelpDesk & Customer Ticketing System has a security weakness that makes it possible for unauthorized users to access sensitive areas of the system. This is because the system's acce...
6.5