Monitor vulnerabilities that affect your stack. Sign up free to get alerts when software you use is affected.

CVE Vulnerabilities - 25 February 2026

RSS

235 vulnerabilities published on 25 February 2026

Severity:
Chia Blockchain 2.1.0 allows attackers to trick users into making unauthorized transactions
CVE-2026-3193
A security weakness in Chia Blockchain 2.1.0 makes it possible for a malicious website to trick users into making unwanted transactions from their account. This is a serious issue because it could res...
2.3
Feiyuchuixue sz-boot-parent download feature can be tricked by attackers
CVE-2026-3189
A security weakness in Feiyuchuixue sz-boot-parent's download feature allows hackers to potentially trick the server into doing something it shouldn't. This can be fixed by upgrading to version 1.3.3-...
2.3
Talishar Fan Game: Unsecured Game Actions by Malicious Websites
CVE-2026-27632
The Talishar fan game has a security weakness that allows hackers to trick users into performing unauthorized actions in their games, potentially disrupting their experience. This can happen when a us...
3.1
Craft CMS Stored XSS in Table Field Header
GHSA-6j87-m5qx-9fqp
A vulnerability in Craft CMS allows an attacker to inject malicious code into table headers, which can be executed when another user views the table. To fix this, ensure that 'allowAdminChanges' is di...
2.3
JetBrains TeamCity Leaks Credentials to Disk
CVE-2026-28196
A security issue in JetBrains TeamCity versions before 2025.11.3 can expose sensitive credentials to unauthorized access if versioned settings are disabled. To protect your team's data, update to the ...
2.3
Grafana Datasource Deletion Exploit: Unauthorized Deletion Possible
CVE-2026-21725
A rare combination of events can allow an attacker with admin access to delete a datasource again after it's been recreated, even if they're no longer an admin. This only works if the attacker acted w...
2.0
KrakenD CircuitBreaker Module Fails to Release Resources Properly
CVE-2026-3206
A bug in the CircuitBreaker module of KrakenD can cause the program to leave behind open connections or resources when it shuts down, potentially leading to performance issues or resource leaks. This ...
1.3
ImageMagick Memory Leak When Reading TXT File Metrics
GHSA-3q5f-gmjc-38r8
A flaw in ImageMagick's handling of TXT files can cause memory to be leaked when reading metrics. This can happen if a TXT file contains a 'texture' attribute that fails to be read. To avoid this issu...
ImageMagick: Malicious SVG files can execute commands when opened
GHSA-xpg8-7m6m-jf56
If you use ImageMagick to process user-submitted SVG files, an attacker could inject malicious commands that execute when the file is opened. This could lead to unintended actions on your system. Upda...
This security threat was mistakenly reported and should not be used
CVE-2026-3197
This security issue was incorrectly reported and has been removed to prevent mistakes. It's no longer a concern. No action is required.