Monitor vulnerabilities that affect your stack. Sign up free to get alerts when software you use is affected.

CVE Vulnerabilities - 8 April 2026

RSS

87 vulnerabilities published on 8 April 2026

Severity:
The Everest Forms plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 3.4.3 via deserialization of untrusted input from form entry metadata. This is due...
CVE-2026-3296
The Everest Forms plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 3.4.3 via deserialization of untrusted input from form entry metadata. This is due to...
9.8
PayloadCMS plugin for Puck visual page builder insecurely bypasses access controls
CVE-2026-39397 GHSA-65w6-pf7x-5g85
A flaw in the @delmaredigital/payload-puck plugin for PayloadCMS allows unauthorized access to certain features of the Puck visual page builder. This means that an attacker could potentially access or...
9.4
IBM Software Privilege Escalation Risk on IBM Verify and Access Containers
CVE-2026-1346
Certain IBM software versions allow a user with local access to gain elevated system privileges. This could lead to unauthorized changes to the system or data. Update to the latest fixed version to re...
9.3
Emmett 2.5.0 to 2.8.1: Path Traversal in Web Framework Exposes Internal Files
CVE-2026-39847 GHSA-pr46-2v3c-5356
Emmett, a Python web framework, has a security weakness that allows attackers to access internal files. This means an attacker could potentially read sensitive information that should not be publicly ...
9.1
Rack::Session: Cookie Decryption Fails to Reject Invalid Sessions
CVE-2026-39324 GHSA-33qg-7wpp-89cq
A software library used for managing user sessions incorrectly handles failed decryption, allowing an attacker to manipulate user sessions without a password. This could lead to unauthorized access to...
9.1
GitHub Actions workflows in Emissary can be hijacked by attackers
CVE-2026-35580 GHSA-3g6g-gq4r-xjm9
Emissary workflows before version 8.39.0 can be compromised if an attacker with repository access injects malicious code. This allows the attacker to affect all users who rely on the workflow. Update ...
9.1
Product Feed PRO for WooCommerce allows attackers to trick site administrators
CVE-2026-3499
The Product Feed PRO for WooCommerce plugin for WordPress is vulnerable to a type of attack where an attacker tricks an administrator into performing an unintended action. This could lead to unintende...
8.8
IBM Langflow Desktop: Malicious User Can Run Unauthorized Code on System
CVE-2026-3357
IBM Langflow Desktop versions 1.6.0 to 1.8.2 have a security issue that allows an authorized user to run unauthorized code on the system. This can happen if the software is set up with a default secur...
8.8
LiteLLM Password Exposure Allows Unauthorized Login
GHSA-69x8-hrgq-fjj8
A security patch fixed a way for an authenticated user to steal another user's password and log in as them. This happened because passwords were stored in an easily guessable format and shared in API ...
8.6
IBM Verify Products Allow Local User to Run Malicious Scripts
CVE-2026-1342
Multiple IBM Verify products have a security issue that could allow a user with local access to execute unauthorized scripts. This could potentially allow an attacker to take control of the system. IB...
8.5
IBM Tivoli Netcool Impact Exposes Sensitive Data in Log Files
CVE-2026-4788
IBM Tivoli Netcool Impact stores sensitive information in log files that can be accessed by local users. This means that unauthorized individuals with access to the system can potentially view sensiti...
8.4
Unauthenticated users can still access files via old share links
CVE-2026-35604 GHSA-v9w4-gm2x-6rvf
A security issue in File Browser allows anyone to download shared files even after permissions have been removed. This is fixed in version 2.63.1. Update to this version to ensure shared files are pro...
8.2
RedwoodSDK: GET requests can bypass intended HTTP method
CVE-2026-39371 GHSA-x8rx-789c-2pxq
A bug in RedwoodSDK allowed attackers to use GET requests to perform actions intended for other HTTP methods. This could have allowed unauthorized changes to a website's state. Update to version 1.0.6...
8.1
File Browser: Users may get unintended permission to execute files
CVE-2026-35607 GHSA-7526-j432-6ppp
An older version of the File Browser software allowed newly created users to execute files even if they shouldn't have permission to do so. This has been fixed in version 2.63.1. If you're using File ...
8.1
ASDA-Soft Software Buffer Overflow Risk: Data Tampering
CVE-2026-5726
The ASDA-Soft software has a weakness that allows an attacker to potentially inject malicious data into the system, which can lead to unauthorized changes or disruptions. This could happen if an attac...
7.8
AVideo open-source video platform exposes local files via GIF
CVE-2026-39369 GHSA-f4f9-627c-jh33
AVideo versions 26.0 and prior allow an authenticated user to access and read local files on the server. This can be exploited to reveal sensitive information, such as passwords and application source...
7.6
Firecracker 1.13.0-1.14.3, 1.15.0: Local Guest User Privilege Escalation
CVE-2026-5747
A critical issue in Amazon Firecracker 1.13.0 through 1.14.3 and 1.15.0 might allow a local user with administrative privileges in a virtual machine to crash the program running the virtual machine or...
8.7
Drizzle ORM fails to protect against malicious database input
CVE-2026-39356 GHSA-gpj5-g38j-94v9
If you use Drizzle ORM, an attacker could potentially inject malicious code into your database by manipulating the text you send to the database. This is fixed in versions 0.45.2 and 1.0.0-beta.20. Up...
7.5
FastFeedParser crashes when parsing malicious URLs
CVE-2026-39376 GHSA-4gx2-pc4f-wq37
A bug in FastFeedParser causes it to crash when parsing URLs that contain a specific type of redirect. This could allow an attacker to take down the system. Update to version 0.5.10 or later to fix th...
7.5
Addressable Ruby Gem Can Cause System to Run Out of Memory
CVE-2026-35611 GHSA-h27x-rffw-24p4
A security issue in the Addressable Ruby gem can cause the system to run out of memory if a malicious URL is processed. This happens when the gem tries to match a specific type of URL pattern. If you'...
7.5
File Browser Hook System Allows Malicious File Uploads
CVE-2026-35585 GHSA-jvpw-637p-h3pw
The File Browser's hook system has a security flaw that allows an attacker to execute unauthorized commands on the server. This could lead to malicious files being uploaded and potentially harming the...
7.5
IBM Verify and IBM Security Verify Access: Unrestricted Access to Internal Authentication Endpoints
CVE-2026-1343
Certain IBM Verify and IBM Security Verify Access versions allow an attacker to bypass security restrictions and access internal authentication endpoints, which could lead to unauthorized access to se...
7.2
Emissary Workflow Engine Exposes User Data to Command Injection
CVE-2026-35581 GHSA-6c37-7w4p-jg9v
A software error in Emissary's workflow engine can allow attackers to inject malicious commands, potentially leading to data theft or system compromise. To protect your system, update to version 8.39....
7.2
AVideo Open Source Video Platform Allows Malicious File Downloads
CVE-2026-39370 GHSA-cmcr-q4jf-p6q9
AVideo's open source video platform has a security issue that allows attackers to trick the system into downloading malicious files. This can happen when a user uploads a file with a malicious URL, wh...
7.1
Skilleton: Malicious Input Can Cause Unintended Behavior
GHSA-5g3j-89fr-r2vp
The Skilleton software has a security weakness in how it handles certain inputs. This could allow an attacker to cause the software to behave unexpectedly or inefficiently. To fix this, update to vers...
6.9