Monitor vulnerabilities that affect your stack. Sign up free to get alerts when software you use is affected.

CVE Vulnerabilities - 20 February 2026

RSS

391 vulnerabilities published on 20 February 2026

Severity:
Modal Popup Box allows Malicious Code Execution
CVE-2025-68526
A security issue in Modal Popup Box for WordPress allows hackers to inject malicious code. This affects all versions of the plugin up to and including 1.6.1. Update to a newer version to fix the issue...
8.8
Miraculous Elementor: Bypassing Security Checks via Alternate Path
CVE-2025-67998
A security issue in Miraculous Elementor allows attackers to bypass its security checks and gain unauthorized access. This could let hackers access sensitive data or perform actions on your website wi...
8.8
Comfast CF-E7 Wireless Router Allows Remote Command Injection
CVE-2026-2824
A bug in Comfast CF-E7 firmware 2.6.0.9 allows an attacker to remotely execute malicious commands on the router, potentially giving them control over the device. This is a serious security risk becaus...
5.3
Comfast CF-E7: Remote Command Injection in NTP Timezone Config
CVE-2026-2823
A security flaw in the Comfast CF-E7's web interface allows an attacker to execute arbitrary commands remotely. This vulnerability is publicly known and can be exploited. It's essential to update the ...
5.3
JeecgBoot: SQL Injection in Backend Interface
CVE-2026-2822
A security flaw in JeecgBoot versions up to 3.9.1 allows an attacker to inject malicious SQL code, potentially accessing or modifying sensitive data. This can happen remotely, and a public exploit is ...
5.3
calibre e-book manager writes unauthorized files to disk
CVE-2026-26065
Versions 9.2.1 and below of calibre allow attackers to write unauthorized files to your computer, potentially leading to data corruption or code execution. This issue has been fixed in version 9.3.0, ...
9.3
calibre allows attackers to write files anywhere on your computer
CVE-2026-26064
Old versions of calibre can allow attackers to write files to any location on your computer, potentially leading to malware installation on Windows. This is a security risk because attackers can use t...
9.3
Music Assistant: Unauthenticated Code Execution on Connected Speakers
CVE-2026-26975
Unauthenticated hackers can access and control connected speakers and execute code on the system. This is a serious issue because it can allow unauthorized access to your music library and potentially...
8.8
Tanium Asset SQL Injection Vulnerability Allows Unauthorized Data Access
CVE-2026-2435
A vulnerability in Tanium Asset allows an attacker to inject malicious SQL code, potentially exposing sensitive data. This issue affects Tanium Asset users, who should update to the latest version to ...
8.8
Google Cloud Vertex AI SDK allows malicious scripts in model evaluation
CVE-2026-2472 GHSA-qv8j-hgpc-vrq8
Google Cloud Vertex AI SDK versions 1.98.0 to 1.131.0 are vulnerable to a security risk where an attacker can inject malicious code into model evaluation results or dataset data, allowing them to take...
8.6
Vanquish Upload Files Anywhere Fails to Secure File Uploads
CVE-2025-69379
An attacker can upload files to any location on the server, potentially allowing them to steal sensitive data or take control of the server. This affects Upload Files Anywhere versions up to 2.8. Upda...
8.6
Vanquish User Extra Fields Allows Malicious File Access
CVE-2025-69376
A security issue in Vanquish User Extra Fields plugin for WordPress allows an attacker to access files outside the intended directory, potentially leading to sensitive information exposure or maliciou...
8.6
Saad Iqbal New User Approve: Unauthorized Access to User Accounts
CVE-2025-69063
A security weakness in Saad Iqbal New User Approve affects versions up to 3.2.0. If not configured correctly, this could allow unauthorized access to user accounts. To stay safe, update to a fixed ver...
8.6
JS Help Desk: Hackers can steal sensitive information from your database
CVE-2026-24959
A security weakness in JS Help Desk software can allow hackers to access and steal sensitive information from your database. This is a serious issue that affects all versions of JS Help Desk up to 3.0...
8.5
ExpressTech Systems Quiz And Survey Master allows hackers to access sensitive data
CVE-2025-67987
A security issue in ExpressTech Systems Quiz And Survey Master allows hackers to manipulate the database, potentially exposing sensitive information. This affects all versions up to 10.3.1. To stay se...
8.5
Blue-Smiley-Organizer 1.32 Allows Attackers to Access or Steal Data
CVE-2019-25431
An attacker can send a special kind of code to the Blue-Smiley-Organizer's database, allowing them to potentially access or steal sensitive information, or even write files to the server. This can hap...
8.8
Spring Data Geode: Malicious Files Can Be Written Outside Intended Directory
CVE-2026-2818
An attacker can exploit a vulnerability in Spring Data Geode's snapshot import feature to write files in unintended locations on Windows systems. This could allow attackers to create or modify sensiti...
8.2
Key Systems Global Facilities Management Software allows execution of arbitrary code via input
CVE-2026-26723
A vulnerability in the Key Systems Global Facilities Management Software allows a remote attacker to execute malicious code on a system. This could lead to unauthorized access or data theft. Update th...
8.2
Device Control System Can Be Remotely Manipulated
CVE-2026-24790
The control system of a device can be taken over by an attacker, allowing them to potentially disrupt or compromise operations. This is a concern for businesses that rely on these devices for critical...
8.2
HAPPY Help Desk System: Incorrect Access Control Lets Guests Access Admin Areas
CVE-2025-67977
A security issue in HAPPY Help Desk System allows guests to access areas they shouldn't be able to, such as admin areas. This is because the system doesn't properly control who can access what. To fix...
8.2
MLflow Tracking Server allows remote code execution without login
CVE-2026-2033
Affected: MLflow Tracking Server. Risk: attackers can execute code on your server without a login. To fix: update to the latest version of MLflow Tracking Server or apply patches as recommended by the...
8.1
detronetdip E-commerce 1.0.0 allows unauthorized deletion of products
CVE-2025-15582
A security flaw in the product management module of detronetdip E-commerce 1.0.0 allows an attacker to delete or update products without permission. This could be exploited by anyone with knowledge of...
5.3
PawFriends Theme Allows Hackers to Access Local Files
CVE-2026-22381
An issue in the PawFriends theme for WordPress allows attackers to access files on your website. This could let hackers steal sensitive information or cause other security problems. Update the theme t...
8.1
UnlimHost: Files can be accessed from outside the website
CVE-2026-22380
A security issue in UnlimHost allows hackers to access and view files on the server. This could potentially lead to sensitive information being exposed. To fix this, update UnlimHost to the latest ver...
8.1
AncoraThemes Netmix: Malicious Files Can Be Accessed
CVE-2026-22379
An issue in AncoraThemes Netmix allows an attacker to access and potentially read sensitive files on the server. This could lead to unauthorized access to confidential data. Update to version 1.0.11 o...
8.1