Monitor vulnerabilities that affect your stack.
Sign up free to get alerts when software you use is affected.
CVE Vulnerabilities - 3 April 2026
RSS122 vulnerabilities published on 3 April 2026
Severity:
Azure Databricks: Unauthenticated Network Access from Application
CVE-2026-33107
An attacker can use Azure Databricks to access and control systems on your network without permission. This could allow them to steal data, disrupt operations, or install malware. To protect your comp...
10.0
Microsoft Azure Kubernetes Service Unauthorized Privilege Escalation
CVE-2026-33105
An attacker can access and control Azure Kubernetes Service resources without permission, potentially leading to unauthorized changes or data breaches. This affects organizations that use Azure Kubern...
10.0
Azure AI Foundry Privilege Elevation via Unauthorized Access
CVE-2026-32213
An unauthorized user can gain elevated privileges on a network by exploiting a weakness in Azure AI Foundry's authorization process. This means they could potentially access or tamper with sensitive d...
10.0
goshs: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in goshs POST multipart upload
GHSA-jg56-wf8x-qrv5
CVE-2026-35393
### Summary
* POST multipart upload directory not sanitized | `httpserver/updown.go:71-174`
This finding affect the default configuration, no flags or authentication required.
### Details
**File:**...
9.8
goshs: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in goshs PUT Upload
GHSA-g8mv-vp7j-qp64
CVE-2026-35392
### Summary
* PUT upload has no path sanitization | `httpserver/updown.go:20-69`
This finding affects the default configuration, no flags or authentication required.
### Details
**File:** `httpserv...
9.8
Kedro: Untrusted Logging Config Can Run Malicious Code
GHSA-9cqf-439c-j96r
CVE-2026-35171
An attacker can exploit a configuration file vulnerability in Kedro to run malicious code during application startup. This can happen if an attacker controls the KEDRO_LOGGING_CONFIG environment varia...
9.8
Azure Custom Locations RP Allows Privilege Elevation Over Network
CVE-2026-26135
An attacker with permission to manage Azure Custom Locations can use this issue to gain control over network resources. This could allow them to access sensitive data or disrupt services. Users should...
9.6
User Profile Name Updates Can Take Over Accounts on CI4MS
GHSA-vr2g-rhm5-q4jr
CVE-2026-34989
An attacker can inject malicious code into their user profile name, which is then stored and executed when others view the profile, potentially allowing them to take over accounts. This can happen whe...
9.4
OpenClaw: Untrusted Node Access Leads to Gateway Takeover
GHSA-gjm7-hw8f-73rq
A security issue in OpenClaw allows an attacker with a paired node to gain full access to the gateway, potentially allowing them to take control of the system. This is a serious risk because it requir...
9.4
OpenClaw: Attackers Can Escape From the Safe Sandbox
GHSA-9p3r-hh9g-5cmg
A security issue in OpenClaw allows attackers to escape from a safe area of the system and access sensitive information. This affects users who are running version 2026.3.28 or earlier of the OpenClaw...
9.4
OpenClaw: Files Accessed Outside of Safe Area
GHSA-cwf8-44x6-32c2
OpenClaw software allows attackers to access files outside a safe area, potentially leading to unauthorized data access or modification. This issue affects versions of OpenClaw installed through npm b...
9.4
Using Custom Cache Keys in Fast-JWT Can Mix Up User Identities
GHSA-rp9m-7r4c-75qg
CVE-2026-35039
If you use custom cache keys in Fast-JWT, it can lead to user identity mix-ups, allowing one user to access another's account or gain extra privileges. To fix this, ensure your custom cache key builde...
9.1
Better Auth Allows Access Without Second Factor Under Certain Configurations
GHSA-xg6x-h9c9-2m83
A configuration issue in Better Auth allows users with valid login credentials to bypass the second authentication factor and access protected areas of an application. This can happen when two-factor ...
9.1
Azure MCP Server Exposes Critical Data to Unauthorized Access
CVE-2026-32211
A mistake in Azure MCP Server's authentication process makes it possible for unauthorized users to access sensitive information over the network. This means that an attacker could potentially see conf...
9.1
OpenClaw: Workspace Environment Variables Can Override Plugin Trust
GHSA-qcj9-wwgw-6gm8
If an attacker controls the workspace environment variables, they can potentially bypass security settings in OpenClaw. This is a high-risk issue, but it requires an attacker to have control over the ...
8.9
OpenSTAManager: Unauthenticated SQL Injection via Aggiornamenti Module
CVE-2026-35168
GHSA-2fr7-cc4f-wh98
An attacker with access to the Updates module can execute arbitrary SQL commands, potentially damaging the database. This affects OpenSTAManager versions prior to 2.10.2. Upgrade to version 2.10.2 or ...
8.8
OpenClaw: Untrusted Node Access Can Lead to Gateway Takeover
GHSA-gjm7-hw8f-73rq
An attacker can take control of a gateway computer if they have access to a paired node that is not properly secured. This is a serious issue because it allows an attacker to execute arbitrary code on...
8.7
OpenClaw: Unrestricted File Sync and Symlink Traversal Risks Malicious File Access
GHSA-cwf8-44x6-32c2
OpenClaw versions up to 2026.3.28 have a security flaw that allows a hacker to access and manipulate files on the system. This is due to unrestricted file syncing and the ability to create symlinks, w...
8.7
Apple Swift Cryptography Library Crashes or Discloses Memory
CVE-2026-28815
GHSA-9m44-rr2w-ppp7
A critical issue in Apple's Swift cryptography library allows an attacker to potentially crash the application or access sensitive information. This issue is fixed in version 4.3.1. Update to the late...
8.6
Better Auth Two-Factor Bypass via Session Caching
GHSA-xg6x-h9c9-2m83
An attacker can bypass two-factor authentication in Better Auth by exploiting a session caching issue. This allows them to access protected areas of the application without completing the second verif...
8.6
OpenClaw: Unbound Setup Codes Allow Unauthorized Access
GHSA-gg9v-mgcp-v6m7
A security issue in OpenClaw allows hackers to gain more access than they should during the initial setup process. This can happen when pairing devices. To fix this, update OpenClaw to version 2026.3....
8.6
OpenClaw: Unbound Bootstrapping Allows Unauthorized Access
GHSA-gg9v-mgcp-v6m7
The OpenClaw software has a security weakness that could allow an attacker to gain more access than they should during the initial setup process. This is a serious issue, as it could potentially lead ...
8.6
OpenClaw Node Browser Proxy Allows Unintended Access
GHSA-h5hg-h7rr-gpf3
Some versions of OpenClaw's Node browser proxy allow unauthorized access to profiles. This can happen when a malicious user exploits a weakness in the way profiles are handled. To fix this, update Ope...
8.6
OpenClaw: Malware Can Escape Sandbox with Recent Versions
GHSA-9p3r-hh9g-5cmg
OpenClaw, a software tool, has a security weakness that could allow a hacker to escape the security sandbox and take control of your system. This affects versions of OpenClaw released before March 31,...
8.6
OpenClaw: Incomplete scope-clearing fix allows operator.admin escalation via trusted-proxy auth mode
GHSA-g374-mggx-p6xc
## Summary
Incomplete scope-clearing fix allows operator.admin escalation via trusted-proxy auth mode
## Current Maintainer Triage
- Normalized severity: high
- Assessment: v2026.3.28 still misses tr...
8.6