Monitor vulnerabilities that affect your stack.
Sign up free to get alerts when software you use is affected.
CVE Vulnerabilities - 20 March 2026
RSS24 vulnerabilities published on 20 March 2026
Severity:
File Browser is a file managing interface for uploading, deleting, previewing, renaming, and editing files within a specified directory. In versions 2.61.2 and below, any unauthenticated visitor ca...
GHSA-5gg9-5g7w-hm73
CVE-2026-32760
File Browser is a file managing interface for uploading, deleting, previewing, renaming, and editing files within a specified directory. In versions 2.61.2 and below, any unauthenticated visitor can r...
10.0
SiYuan Allows Authorized Users to Execute Arbitrary SQL Statements
GHSA-j7wh-x834-p3r7
CVE-2026-32767
A security issue in SiYuan version 3.6.0 and earlier allows users with a certain role to execute any SQL command, potentially deleting or modifying data. This bypasses the intended security settings. ...
9.8
Xerte Online Toolkits versions 3.14 and earlier allow unauthorized file upload
CVE-2026-32985
A security issue in older versions of Xerte Online Toolkits lets attackers upload files without permission. This could allow an attacker to add malicious code to your website, which could be used to t...
9.3
CTFer.io Monitoring component allows malicious file overwrites
CVE-2026-32771
Versions of the CTFer.io Monitoring component prior to 0.2.2 can be tricked into overwriting important system files, potentially allowing attackers to gain control of the system. This is especially co...
8.8
SuiteCRM: Unauthenticated Access to Your CRM Data
CVE-2026-33289
If you're using SuiteCRM versions older than 7.15.1 or 8.9.3, an attacker might be able to access your customer data without logging in. This is because the software doesn't properly check user input ...
8.8
SuiteCRM: Unauthorized Access to Admin Account
CVE-2026-33288
A security flaw in older versions of SuiteCRM allows an attacker to gain full control of the system by exploiting a weakness in the login process. This could allow an unauthorized user to gain access ...
8.8
Admidio Critical File Upload Risk: Arbitrary File Types Can Be Uploaded
GHSA-95cq-p4w2-32w5
CVE-2026-32756
An attacker with upload permissions in Admidio can upload PHP scripts or other unauthorized file types, potentially allowing them to execute code on the server. This is a serious risk because it could...
8.8
SuiteCRM allows administrators to run arbitrary system commands
CVE-2026-29109
An attacker with administrator privileges can execute system commands on the server running SuiteCRM. This could lead to unauthorized actions, data exposure, or even server compromise. Update to versi...
8.6
LZ4 Flex Decompression Can Leak Sensitive Data
GHSA-vvp9-7p8x-rfvv
RUSTSEC-2026-0041
CVE-2026-32829
A bug in the LZ4 Flex decompression library can leak sensitive information, such as passwords or other confidential data, from memory or from previous decompression operations. This can happen when de...
8.2
Spring Boot with Actuator: Unauthenticated access to sensitive endpoints
CVE-2026-22733
Some Spring Boot applications with Actuator enabled may allow unauthorized access to secure endpoints. This could let attackers access sensitive data or perform actions without being authenticated. To...
8.2
SuiteCRM REST API exposes sensitive data to authenticated users
CVE-2026-29189
Authenticated users can access and modify data they shouldn't be able to see or change. This is a risk because it lets unauthorized users see or alter sensitive customer information. Update to SuiteCR...
8.1
Fullchain CTF Platform: Unsecured Lateral Movement in Older Versions
CVE-2026-32769
Fullchain's CTF platform versions before 0.1.1 allow an attacker to move between parts of a system they shouldn't have access to. This could lead to unauthorized access to sensitive data or disruption...
7.1
File Browser is a file managing interface for uploading, deleting, previewing, renaming, and editing files within a specified directory. Versions 2.61.0 and below contain a permission enforcement b...
GHSA-68j5-4m99-w9w9
CVE-2026-32761
File Browser is a file managing interface for uploading, deleting, previewing, renaming, and editing files within a specified directory. Versions 2.61.0 and below contain a permission enforcement bypa...
6.5
File Browser Allows Access to Restricted Folders via Path Traversal
GHSA-9f3r-2vgw-m8xp
CVE-2026-32758
A vulnerability in the file browser's copy and rename feature allows authorized users to bypass restrictions and access folders they shouldn't be able to access. This can happen when a user includes s...
6.5
SuiteCRM Missing ACL Check in Record Retrieval
CVE-2026-32697
Before patching, SuiteCRM's record retrieval feature didn't verify you had permission to view certain records. This could allow unauthorized access to sensitive customer information. You should update...
6.5
SuiteCRM: Authenticated Users Can Access Other Users' Passwords
CVE-2026-29108
A security issue in older versions of SuiteCRM allows any logged-in user to see sensitive information about other users, including their passwords. This could be used to crack the passwords of importa...
6.5
Spring Framework: Malicious File Disclosure in Template Views
CVE-2026-22737
Using a feature called scripting engine in some Spring applications can accidentally reveal sensitive file content to users. This is a security risk because it can expose confidential data. To fix thi...
5.9
Admidio Ecard Message Allows Unfiltered HTML Injection
GHSA-4wr4-f2qf-x5wj
CVE-2026-32757
An attacker can inject malicious HTML and JavaScript into eCard emails sent to other members. This could lead to phishing or other types of attacks. To fix this, update the Admidio eCard send handler ...
5.4
File Browser Allows Uncontrolled Hook Triggers with Negative Uploads
GHSA-ffx7-75gc-jg7c
CVE-2026-32759
An attacker can trigger post-upload hooks without uploading a file by sending a negative upload length. This allows unauthorized access to files and potentially malicious actions. Update the TUS handl...
5.3
Spring Server-Sent Events Can Corrupt Data Streams
CVE-2026-22735
Some Spring applications may experience data corruption when using a feature called Server-Sent Events. This can happen if you're using certain versions of the Spring Framework. To fix this, update to...
2.6
Kargo Allows Access to Internal Systems and Data
GHSA-j94x-8wcp-x7hm
CVE-2026-32828
Kargo's promotion steps can be configured to access internal network addresses, potentially exposing sensitive data and allowing unauthorized access to internal systems. This can happen if a user with...
2.0
Astral Tokio Tar: Malformed Tar Archives Can Cause Errors
GHSA-6gx3-4362-rf54
CVE-2026-32766
Astral Tokio Tar, a tool for working with tar archives, does not properly check for errors in some parts of the archive. This could potentially lead to errors if a user tries to extract a poorly const...
1.7
WordPress Plugin Vulnerability Allows Unauthenticated Access
CVE-2026-32765
A security issue in a WordPress plugin allows unauthorized users to gain access to the site's administrative area. This could allow hackers to manipulate site settings, upload malicious files, and pot...
GitHub Repository Access Restricted
CVE-2026-32764
A GitHub repository that was previously publicly accessible is now restricted, making it unavailable to the public. This may cause issues for users who relied on the repository for code or information...