Monitor vulnerabilities that affect your stack.
Sign up free to get alerts when software you use is affected.
CVE Vulnerabilities - 18 March 2026
RSS42 vulnerabilities published on 18 March 2026
Severity:
LDAP Account Manager (LAM) is a webfrontend for managing entries (e.g. users, groups, DHCP settings) stored in an LDAP directory. Prior to version 9.5, a local file inclusion was detected in the PD...
CVE-2026-27894
LDAP Account Manager (LAM) is a webfrontend for managing entries (e.g. users, groups, DHCP settings) stored in an LDAP directory. Prior to version 9.5, a local file inclusion was detected in the PDF e...
8.8
Roxy-WI Prior to 8.2.6.3: Hackers Can Run Commands on Your Server
CVE-2026-27811
A security weakness in Roxy-WI's web interface before version 8.2.6.3 lets attackers who are already logged in to the system run any system commands on the server. This is a serious issue because it c...
8.8
ONNX Model Downloads Can Be Hacked Without Warning
GHSA-hqmj-h5c6-369m
CVE-2026-28500
A security flaw in ONNX allows hackers to trick users into downloading and running malicious models from untrusted sources without any warnings. This can lead to sensitive information being stolen fro...
8.6
OpenClaw Feishu Media Download Can Write Files Outside of Safe Location
GHSA-vj3g-5px3-gr46
CVE-2026-22171
OpenClaw's Feishu media download feature can allow an attacker to write files to any location on the server by manipulating the Feishu media key. This is a security risk because it could allow an atta...
8.8
Keycloak SAML Authentication Bypass by External Identity Provider
CVE-2026-2603
A security issue in Keycloak allows an attacker to bypass security controls and authenticate with a disabled SAML Identity Provider. This could lead to unauthorized access to your system. To protect y...
8.1
Keycloak: Unauthorized Access via Malicious SAML Response
CVE-2026-2092
Keycloak's SAML feature has a flaw that allows an attacker to create a fake SAML response, potentially gaining unauthorized access to your system. This could lead to sensitive information being disclo...
7.7
xiaoheiFS Admins Can Run Any File on Their Servers
CVE-2026-28674
A security weakness in xiaoheiFS versions up to 0.3.15 lets system administrators upload and run any file on their servers. This could allow an attacker to take control of the server. Update to versio...
7.2
xiaoheiFS: Malicious zip file execution in plugin upload
CVE-2026-28673
An attacker can upload a specially crafted zip file to execute arbitrary code on the server, potentially allowing them to take control of the system. This affects all versions of xiaoheiFS up to 0.3.1...
7.2
pyOpenSSL DTLS Cookie Overflow Risk: Large Cookie Values Crash Application
GHSA-5pwr-322w-8jr4
CVE-2026-27459
A bug in pyOpenSSL could cause a crash if a server is given a very long cookie value. This has been fixed by pyOpenSSL's developers, so you should update to the latest version to stay safe.
7.2
OpenClaw Approval Bypass Using Shell Wrappers
GHSA-gwqp-86q6-w47g
CVE-2026-22175
OpenClaw's approval system can be tricked into allowing unauthorized access. If an attacker uses a specific type of shell wrapper, they can bypass the approval process, even if they shouldn't be allow...
7.1
The GLPI Inventory Plugin handles network discovery, inventory, software deployment, and data collection for GLPI agents. Prior to 1.6.6, non sanitized user input can lend to an SQL injection from ...
CVE-2026-26001
The GLPI Inventory Plugin handles network discovery, inventory, software deployment, and data collection for GLPI agents. Prior to 1.6.6, non sanitized user input can lend to an SQL injection from rep...
7.1
Kanboard User Invite Registration Allows Unauthorized Admin Creation
CVE-2026-29056
Kanboard's user invite registration process allowed attackers to create admin accounts by manipulating the registration form. This vulnerability has been fixed in version 1.2.51. Update to the latest ...
7.0
LeafKit may display unescaped data, allowing malicious scripts to run
GHSA-6jj5-j4j8-8473
CVE-2026-28499
LeafKit's data display feature can be bypassed, allowing hackers to inject malicious code. This can happen when displaying collections of data. To fix this, update LeafKit to the latest version or app...
6.9
Next.js: Unbounded image cache can fill up your disk space
GHSA-3x4c-7xq6-9pq8
CVE-2026-27980
An attacker can create many optimized images and fill up your disk space, causing your website to become unavailable. To fix this, update to the latest version of Next.js, or if you can't update right...
6.9
Next.js: Large File Uploads Can Crash Server
GHSA-h27x-g6w4-24gq
CVE-2026-27979
Some Next.js servers can crash if an attacker sends a very large file, causing the server to run out of memory. This is because Next.js doesn't always check the size of large file uploads. To protect ...
6.9
OpenClaw on macOS Can Execute Unlisted Commands
GHSA-9p38-94jf-hgjj
CVE-2026-22179
OpenClaw on macOS can execute unintended commands on the node host if you're using the allowlist mode. This can happen if you have a benign executable in your allowlist, but it's used in a way that al...
7.5
OpenClaw: Attackers Can Access Local Files Through Message Actions
GHSA-fqcm-97m6-w7rm
CVE-2026-27522
The OpenClaw software does not properly check the source of files attached to messages, which could allow an attacker to access sensitive local files. This is a concern for businesses using OpenClaw's...
7.1
OpenClaw: Malicious Feishu Metadata Can Block Message Processing
GHSA-c6hr-w26q-c636
CVE-2026-22178
OpenClaw, a software, has a security issue that can cause it to block message processing if it receives specially crafted metadata from Feishu. This is because the software does not properly escape ce...
6.9
OpenClaw Allows Malicious Code to Run on Windows System
GHSA-5v6x-rfc3-7qfr
CVE-2026-22168
OpenClaw, a Windows-based system, has a security flaw that allows unauthorized code to run on the system when a trusted user approves a command. This can happen when a user is tricked into approving a...
7.1
GLPI is a free Asset and IT management software package. Starting in version 11.0.0 and prior to version 11.0.6, a malicious actor with knowledge of a user's credentials can bypass MFA and steal th...
CVE-2026-25937
GLPI is a free Asset and IT management software package. Starting in version 11.0.0 and prior to version 11.0.6, a malicious actor with knowledge of a user's credentials can bypass MFA and steal their...
6.5
WP Go Maps Plugin Lets Attackers Inject Malicious Code
CVE-2026-4268
The WP Go Maps plugin for WordPress is vulnerable to a security issue that allows attackers to inject malicious code into pages. This could happen if an attacker with a basic level of access to the we...
6.4
OpenClaw's web tools may bypass DNS pinning with proxy settings
GHSA-8mvx-p2r9-r375
CVE-2026-22181
If you're using OpenClaw's web tools and proxy settings, an attacker could potentially access internal or private targets. This is because the tool's strict URL checks aren't enough to prevent proxy r...
6.1
OpenClaw: External Code Can Run Without Approval
GHSA-vmqr-rc7x-3446
CVE-2026-22169
A security flaw in OpenClaw's non-default settings allows external code to be executed without proper approval. This could lead to unauthorized actions being taken on your system. Update to the latest...
7.1
Next.js: Attackers can sneak malicious requests through rewrites
GHSA-ggv3-7p47-pfv8
CVE-2026-29057
Next.js rewrites can be tricked into allowing attackers to send requests to unintended backend routes, potentially allowing unauthorized access. This is fixed in newer versions of Next.js, but if you ...
6.3
OpenClaw: Malicious Code Can Execute from Wrong Location
GHSA-f7ww-2725-qvw2
CVE-2026-27545
A security issue in OpenClaw allows an attacker to trick the system into running a command from a different location than intended, potentially leading to unauthorized actions. This issue affects all ...
6.9