Monitor vulnerabilities that affect your stack. Sign up free to get alerts when software you use is affected.

CVE Vulnerabilities - 20 February 2026

RSS

391 vulnerabilities published on 20 February 2026

Severity:
Nexter Blocks allows hackers to run malicious code on websites
CVE-2024-50452
An attacker can inject malicious code into websites that use Nexter Blocks, allowing them to steal user data or take control of the site. This affects all versions of Nexter Blocks up to 3.3.3, which ...
6.5
PHP File Inclusion Vulnerability in WordPress
CVE-2025-59819
A security issue in WordPress allows hackers who have logged in to your site to view any file on your server. This means they can access sensitive information, such as configuration files or user data...
6.5
Tanium Interact and TDS Log File Sensitive Data Exposure
CVE-2026-2350
Tanium's Interact and TDS software may write sensitive information to log files, potentially exposing it to unauthorized access. This could happen if attackers gain access to the log files, compromisi...
6.5
Tanium Trends Exposes Sensitive Data in Log Files
CVE-2026-1292
Tanium Trends stores sensitive information in log files without adequate protection. This could allow unauthorized access to confidential data. Update to the latest version of Trends to fix this issue...
6.5
OrientDB allows attackers to inject malicious scripts via user names
CVE-2019-25448
Authenticated attackers can inject malicious scripts by creating users with special characters in their names. This can happen when a user views the application. To fix, update to the latest version o...
5.1
Master Addons For Elementor plugin allows malicious scripts in WordPress pages
CVE-2026-2486
A security flaw in the Master Addons For Elementor plugin for WordPress allows attackers with contributor access to inject malicious scripts into your website's pages. This can happen when a user with...
6.4
Quiz Maker Plugin for WordPress Allows Malicious Code Injection
CVE-2026-2384
The Quiz Maker plugin for WordPress can be used to inject malicious code into pages, potentially allowing attackers to take control of a site. This is a concern if your site uses the Quiz Maker plugin...
6.4
Liquid Prompt: Arbitrary Code Execution through Git Branch Name
CVE-2026-27113
Liquid Prompt, a tool for Bash and Zsh, is vulnerable to code execution if a user enters a specially crafted directory name in a Git repository. This requires specific configuration settings to be ena...
6.3
Yeqifu Warehouse Unsecured Sales Data Function
CVE-2026-2852
A security issue in Yeqifu Warehouse's sales data management function allows unauthorized access and potentially malicious changes to sales data. This could happen remotely and affects the security of...
5.3
Yeqifu Warehouse Cache Manipulation Can Lead to Unauthorized Access
CVE-2026-2849
A security issue has been found in Yeqifu Warehouse that allows an attacker to manipulate the cache, potentially leading to unauthorized access. This means that an attacker could potentially access or...
5.3
WooCommerce Coming Soon Product with Countdown allows Remote File Access
CVE-2025-68552
An attacker can access and read any file on your server by tricking the plugin into including it. This is a security risk because sensitive data might be exposed. Update to version 5.1 or later to fix...
6.3
WooCommerce BlueX Plugin: Access Control Security Failure
CVE-2025-68022
A security weakness in the WooCommerce BlueX plugin allows hackers to access restricted areas of the website if access controls are misconfigured. This affects versions of the plugin up to 3.1.6. To f...
6.3
Dromara RuoYi-Vue-Plus workflow module unauthorized access risk
CVE-2026-2819
An unauthorized access risk exists in the workflow module of Dromara RuoYi-Vue-Plus versions 5.5.3 and earlier. This means that an attacker could potentially access sensitive information or perform ac...
5.3
Foscam Video Management System Crashes with Malformed User ID
CVE-2019-25437
The Foscam Video Management System is prone to crashing if a user enters an extremely long username when trying to add a new device. This can allow an attacker to disrupt the system's functionality. T...
6.7
HyperCloud versions 2.3.5-2.6.8 allow unauthorized access with expired tokens
CVE-2026-1842
HyperCloud versions 2.3.5 through 2.6.8 contain a security issue that allows users to access resources with expired or invalid tokens. This could lead to unauthorized access if a token is leaked or co...
6.2
phpMoAdmin 1.1.5: Attackers can inject malicious scripts in web browsers
CVE-2019-25454
An attacker can inject malicious scripts in users' web browsers, potentially allowing them to steal sensitive information or take control of users' accounts, by manipulating a parameter in a web reque...
5.3
phpMoAdmin: Unauthenticated Attackers Can Inject Malicious Scripts
CVE-2019-25453
A security issue in phpMoAdmin allows attackers to inject malicious scripts into users' browsers if they visit a specially crafted link. This can happen without needing a password, making it a risk fo...
5.1
OrientDB 3.0.17: Malicious Scripts Can Run in Users' Browsers
CVE-2019-25449
OrientDB 3.0.17 has a security flaw that lets hackers inject malicious code into websites. This can happen if a user visits a website that sends a specially crafted request to OrientDB. To stay safe, ...
5.1
AVideo allows malicious code injection in video comments
CVE-2026-27568 GHSA-rcqw-6466-3mv7
AVideo's video comment feature allows a malicious user to inject code that can steal user sessions, take over admin accounts, and steal data when another user clicks on a link. This is a serious secur...
5.1
Fiverr Clone Script 1.2.2 allows attackers to inject malicious scripts
CVE-2019-25445
An attacker can inject malicious code into the Fiverr Clone Script by manipulating a specific parameter in a URL, potentially allowing them to execute unauthorized actions on a user's browser. This co...
5.1
Sync-in Server: Malicious SVG files can steal user data
CVE-2025-67438 GHSA-9jmq-xgjm-p8c2
An attacker can upload a malicious SVG file to Sync-in Server, allowing them to steal sensitive user data, including login cookies. This can happen when a victim opens a manipulated SVG file from the ...
5.1
SVXportal: Malicious Code Can Run in Admin Browser
CVE-2026-27505
SVXportal versions 2.5 and earlier store user-input data in the database without proper protection, allowing an attacker to inject malicious code that can run in an administrator's browser. This could...
5.1
SVXportal: Unauthenticated Script Injection in Admin Area
CVE-2026-27504
A security issue in SVXportal's admin area allows an attacker to inject malicious code into an authenticated administrator's browser. This could allow the attacker to take control of the admin session...
5.1
SVXportal: Attacker can steal admin session or take control of admin account
CVE-2026-27503
A weakness in SVXportal allows an attacker to trick an administrator into executing malicious code in their browser, potentially allowing them to steal sensitive information or take control of the adm...
5.1
SVXportal: Unauthenticated JavaScript Injection via Log Search
CVE-2026-27502
SVXportal versions 2.5 and earlier have a security flaw. An attacker can trick a user into visiting a malicious URL, allowing the attacker to execute arbitrary JavaScript code in the user's browser. T...
5.1