Monitor vulnerabilities that affect your stack.
Sign up free to get alerts when software you use is affected.
CVE Vulnerabilities - 20 February 2026
RSS391 vulnerabilities published on 20 February 2026
Severity:
PHP File Inclusion in Yokoo Theme Allows Malicious File Access
CVE-2025-69400
The Yokoo theme has a security flaw that allows an attacker to access files on the website. This means an attacker could potentially access sensitive files, which could lead to data theft or other iss...
8.1
ThemeREX Cobble allows attackers to access sensitive local files
CVE-2025-69399
A vulnerability in ThemeREX Cobble allows attackers to access and potentially read sensitive local files on your website. This could lead to unauthorized access to sensitive information. Update to ver...
8.1
ThemeREX Plank allows hackers to access local files
CVE-2025-69398
A security issue in ThemeREX Plank could allow hackers to access and view local files on your website. This means that if a hacker can exploit this issue, they might be able to see sensitive informati...
8.1
Tint ThemeREX Tint PHP File Inclusion Vulnerability Allows Local File Access
CVE-2025-69397
A security issue in Tint ThemeREX Tint allows an attacker to access and read local files on the server. This can happen if an attacker can trick the system into including a malicious file. To fix this...
8.1
ThemeREX Splendour allows hackers to access local files
CVE-2025-69396
A security issue in ThemeREX Splendour allows attackers to access sensitive files on your server. This could allow them to steal or modify your website's data. You should update to the latest version ...
8.1
ThemeREX Gable allows hackers to access local files
CVE-2025-69395
A flaw in ThemeREX Gable's design lets hackers access files on your server, potentially leading to data theft or disruption. If you're using Gable versions 1.5 or earlier, update to the latest version...
8.1
SolverWp Portfolio Builder allows hackers to read local files
CVE-2025-69375
A security flaw in SolverWp Portfolio Builder allows hackers to access and view sensitive local files. This means that if a hacker can trick the software into reading a file they shouldn't be able to,...
8.1
SolverWp Eleblog Allows Malicious Files to Be Injected into WordPress
CVE-2025-69374
A security flaw in SolverWp Eleblog's Elementor Blog And Magazine Addons allows attackers to inject malicious PHP code into the WordPress site. This can lead to unauthorized access to sensitive data a...
8.1
PeakShops allows hackers to access your files
CVE-2025-69322
The PeakShops software has a security weakness that allows hackers to access and potentially read sensitive files on your server. This could lead to unauthorized data exposure or other security risks....
8.1
Diza PHP Files Can Be Accessed without Permission
CVE-2025-68543
A flaw in Diza allows attackers to access unauthorized PHP files on the server, potentially leading to sensitive information exposure or system compromise. This affects Diza versions up to 1.3.15. Upd...
8.1
Fana Fana: Malicious Files Can Be Loaded from Local Computer
CVE-2025-68539
A security flaw in Fana Fana allows hackers to access and read files from a local computer. This could potentially allow them to access sensitive information. Users should update to a fixed version of...
8.1
Zota: Files Can Be Accessed from Local Computer
CVE-2025-68536
A security issue in Zota allows an attacker to access files from their own computer. This could potentially allow unauthorized access to sensitive data. To protect your system, update Zota to a versio...
8.1
PatioTime allows hackers to read files on your server
CVE-2025-67992
A security issue in PatioTime allows hackers to read sensitive files on your server by manipulating a file path. This is a serious issue because it could allow unauthorized access to your server's dat...
8.1
CozyStay CozyStay allows hackers to access local files
CVE-2025-67988
The CozyStay website has a security issue that allows hackers to access files on the server. This means that sensitive or confidential information could be exposed. Upgrade to version 1.9.1 or later t...
8.1
PHP File Inclusion in thembay Urna Could Leak Sensitive Data
CVE-2025-67982
A flaw in thembay Urna's PHP code allows hackers to access and view sensitive files on the server. This could lead to unauthorized data disclosure. Users should update to the latest version of thembay...
8.1
Besa Besa Exposes Local Files to Attack
CVE-2025-67981
The Besa Besa software has a security weakness that allows an attacker to access and view files on the server. This can happen because the software doesn't properly check the names of files it tries t...
8.1
Hara hara PHP Files Can Be Accessibly Read or Modified
CVE-2025-67980
A weakness in Hara hara's coding allows attackers to access or modify internal files. This affects versions up to 1.2.17. Users should update to a fixed version to prevent unauthorized access to sensi...
8.1
Nenad Obradovic WPBakery Addons Exposes Local Files
CVE-2025-60087
A security flaw in Nenad Obradovic's Extensive VC Addons for WPBakery page builder allows hackers to access and read local files on the server. This affects versions up to 1.9.1, but the latest versio...
8.1
GIMP: Malicious XWD Files Can Execute Code on Your System
DEBIAN-CVE-2026-2048
If you use GIMP, be aware that hackers can trick you into opening a malicious file, which could let them run unauthorized code on your system. To stay safe, only open XWD files from trusted sources, a...
7.8
GIMP Can Execute Malicious Code if You Open a Bad File
CVE-2026-2048
A security issue in GIMP can allow attackers to run malicious code on your computer if you open a specially crafted XWD file. This requires you to interact with the file, such as visiting a malicious ...
7.8
GIMP: Malicious XWD Files Can Run Code on Your Computer
CVE-2026-2048
A security flaw in GIMP allows hackers to execute malicious code on your computer if you open a specially crafted XWD file or visit a malicious webpage. To stay safe, avoid opening XWD files from unkn...
7.8
GIMP Fails to Properly Handle Malicious ICNS Files
CVE-2026-2047
A security issue in GIMP can allow hackers to execute malicious code on vulnerable systems. If a user opens a specially crafted ICNS file or visits a malicious webpage, an attacker may be able to take...
7.8
GIMP Can Execute Malicious Code When Opening Certain Files
CVE-2026-2047
If you use GIMP, a hacker can potentially take control of your computer by tricking you into opening a malicious file. You can protect yourself by avoiding opening unknown files from untrusted sources...
7.8
GIMP Fails to Safely Open Malicious XWD Files, Allowing Code Execution
DEBIAN-CVE-2026-2045
GIMP's XWD file parser is not secure, allowing hackers to execute code on your computer if you open a specially crafted XWD file. To stay safe, avoid opening XWD files from unknown sources and ensure ...
7.8
GIMP Can Run Malicious Code from Files
CVE-2026-2045
If you use GIMP and open a specially crafted file, a hacker can run malicious code on your computer. This is a serious issue because it lets hackers take control of your computer. To stay safe, make s...
7.8