Monitor vulnerabilities that affect your stack.
Sign up free to get alerts when software you use is affected.
CVE Vulnerabilities - 1 April 2026
RSS100 vulnerabilities published on 1 April 2026
Severity:
XenForo Passkey Authentication Security Risk
CVE-2025-71279
A security issue in XenForo 2.3.7 and earlier may allow an attacker to compromise Passkey-based authentication. This could put user accounts at risk of unauthorized access. To fix the issue, update to...
9.3
OpenClaw Chat and Zalouser Extension Security Risk: Unrestricted Bot Access
CVE-2026-33578
GHSA-63mg-xp9j-jfcm
The OpenClaw chat extension has a security flaw that allows attackers to bypass restrictions and interact with chat bots. This means that if you're using OpenClaw with Google Chat or Zalouser, your ch...
5.3
OpenClaw Node Pairing Approval Vulnerability
CVE-2026-33577
GHSA-2x4x-cc5g-qmmg
Low-privilege operators can approve nodes with more access than they should have, giving attackers extra permissions. This can lead to unauthorized actions on the system. Update OpenClaw to version 20...
4.9
OpenClaw allows malicious configuration files to override settings
GHSA-8rh7-6779-cjqq
A flaw in OpenClaw allows a malicious configuration file to override security settings when a user starts the application from a specific directory. This could potentially allow an attacker to access ...
9.7
CodeIgniter 4 CMS Skeleton Exposes Users to Malicious Scripts
CVE-2026-34557
GHSA-rpjr-985c-qhvm
A security issue in older versions of CI4MS allows attackers to inject malicious code into the system, which can be executed by administrators. This could allow hackers to take control of the system o...
9.1
CodeIgniter 4 CMS Skeleton Stores Malicious JavaScript in Pages
CVE-2026-34558
GHSA-v77r-xg3p-75g7
CodeIgniter 4 CMS Skeleton stores JavaScript code from users in pages without proper security checks, allowing an attacker to inject malicious scripts that can affect administrators. This can lead to ...
9.1
RTI Connext Professional Services Allow Data Leaks Through XML Errors
CVE-2026-4374
RTI Connext Professional's Routing, Observability, Recording, Queueing, and Cloud Discovery Services may allow unauthorized access to data when handling XML files. This can lead to sensitive data bein...
8.8
XenForo Admin Panel Security Risk: Malicious Admin Can Run Code
CVE-2026-35056
XenForo, a forum software, has a security risk. An attacker with admin access can run malicious code on the server, which could compromise data and disrupt the forum. Update to the latest version of X...
8.7
XenForo 2.3.7 and earlier allows unauthorized method calls
CVE-2025-71281
An attacker could potentially execute unauthorized actions in XenForo by using a template to call a non-public method. This is a security risk because it could allow an attacker to access or modify se...
8.7
XenForo 2.3.4 and Earlier: Unauthorized Access to User Data
CVE-2025-71278
If you're using XenForo 2.3.4 or earlier, an unauthorized application can request more access than it's supposed to have, potentially exposing your users' data. This is a serious issue that affects al...
8.7
SiYuan Knowledge Management System: SVG Script Execution Risk
CVE-2026-34605
GHSA-73g7-86qr-jrg3
A security issue in SiYuan's icon retrieval feature could allow an attacker to execute malicious code on a user's browser if they view a specially crafted SVG file. This affects versions 3.6.0 to 3.6....
8.6
SiYuan prior to 3.6.2 allows malicious documents to inject code
CVE-2026-34585
GHSA-ff66-236v-p4fg
SiYuan users may be at risk of injected code execution if they open a malicious document downloaded from an untrusted source. This can happen when a document contains malicious attributes that bypass ...
8.6
Elixir App Crash: Malicious Input Can Exhaust Atom Table
GHSA-jjf9-w5vj-r6vp
CVE-2026-34593
A vulnerability in Elixir's Ash library can cause an Elixir application to crash if an attacker sends a large number of specially crafted requests. This can happen if the application uses Ash to valid...
8.2
Mismanaged List Box Calculation Triggers Potential Code Execution
CVE-2026-3779
This vulnerability affects the way the application handles list box calculations, potentially allowing an attacker to execute arbitrary code. This could be exploited by creating a crafted document tha...
7.8
Adobe Acrobat Update Service Can Load Malicious Libraries from Untrusted Locations
CVE-2026-3775
The Adobe Acrobat update service can load malicious libraries from certain directories that are accessible to low-privileged users. This could allow an attacker to execute arbitrary code on the system...
7.8
IBM Storage Protect Server 8.2.0 allows unauthorized database access
CVE-2025-13855
IBM Storage Protect Server 8.2.0 has a security weakness that lets an attacker, from anywhere, view or change information in the server's database. This could lead to unauthorized access to sensitive ...
7.6
XenForo discloses server directory structure with error messages
CVE-2025-71282
XenForo software versions prior to 2.3.7 may reveal sensitive information about the server's directory structure. This could potentially be used by an attacker to gather information that could be used...
8.7
xmldom: Attackers can insert malicious XML code in certain cases
GHSA-wh4c-j3r5-mjhp
CVE-2026-34601
A weakness in xmldom allows attackers to inject malicious XML code into text areas, potentially allowing them to manipulate business logic and data. This can happen when attacker-controlled strings co...
7.5
Windows Installer Allows Malicious Files to Replace Legitimate System Files
CVE-2026-3780
A weakness in the Windows installer allows a local attacker to replace system files with malicious ones, potentially giving them elevated privileges. This means that if you have a malicious program on...
7.3
itsourcecode Payroll Management System 1.0: Remote SQL Injection Risk
CVE-2026-5238
A vulnerability in itsourcecode Payroll Management System 1.0 allows hackers to inject malicious SQL code, potentially stealing sensitive employee data. This can happen when a malicious user manipulat...
6.9
OpenClaw gateway incorrectly trusts some executable files
GHSA-p4x4-2r7f-wjxg
A bug in the OpenClaw gateway allows it to trust certain executable files too easily, potentially allowing unauthorized access. This could happen if a user allows an executable once, and it might be u...
7.3
OpenClaw gateway allows unintended execution of malicious code
GHSA-p4x4-2r7f-wjxg
A security issue in OpenClaw gateway allows a one-time approval to permanently allow execution of malicious code, potentially weakening security boundaries. This affects OpenClaw gateway users, who sh...
7.3
OpenClaw: Malicious Fal Relay Can Fetch Internal URLs
GHSA-qxgf-hmcj-3xw3
A vulnerability in OpenClaw's Fal provider could allow a malicious or compromised relay to access internal URLs and expose sensitive information. This affects users who are running versions of OpenCla...
7.3
Signing Invitation Acceptance Vulnerability: Unauthorized Access to Documents
CVE-2026-4947
A flaw in the way signatures are accepted could have allowed attackers to access or modify documents they shouldn't have. This could have led to fake signatures and compromised trust in the signing pr...
7.1
@tinacms/graphql's `FilesystemBridge` Path Validation Can Be Bypassed via Symlinks or Junctions
GHSA-g9c2-gf25-3x67
CVE-2026-34604
## Summary
`@tinacms/graphql` uses string-based path containment checks in `FilesystemBridge`:
- `path.resolve(path.join(baseDir, filepath))`
- `startsWith(resolvedBase + path.sep)`
That blocks pla...
7.1