Monitor vulnerabilities that affect your stack. Sign up free to get alerts when software you use is affected.

CVE Vulnerabilities - 8 April 2026

RSS

689 vulnerabilities published on 8 April 2026

Severity:
iGMS Direct Booking Security Settings Can Be Overridden
CVE-2026-39652
A security setting in iGMS Direct Booking can be incorrectly configured, allowing unauthorized access to certain features. This means that users who shouldn't have access might still be able to make c...
5.3
UnitechPay: Unsecured Access Could Lead to Unauthorized Transactions
CVE-2026-39650
A security weakness in UnitechPay, a mobile payment system, could allow unauthorized users to access and make transactions under certain configuration conditions. This issue affects versions 1.0.2 and...
5.3
Cream Blog: Incorrect Access Control Allows Unauthorized Access
CVE-2026-39648
A security issue in Cream Blog, a theme used in WordPress, allows unauthorized access to sensitive areas. This puts sensitive information at risk if an attacker gains access. Update to version 2.1.8 o...
5.3
Wp Ultimate Review: Incorrect Security Settings Allow Unauthorized Access
CVE-2026-39644
A security flaw in Wp Ultimate Review allows unauthorized users to access parts of the plugin they shouldn't. If not fixed, this could lead to sensitive data being viewed or modified. Update to versio...
5.3
Mogi: Unauthorized Access to Sensitive Data through Misconfigured Access Control
CVE-2026-39637
A security flaw in Mogi allows unauthorized access to sensitive data when access control levels are not properly configured. This means that attackers may be able to access sensitive information they ...
5.3
Awesome Support Plugin for WordPress Leaks Ticket Info
CVE-2026-4654
Versions of the Awesome Support WordPress plugin up to 6.3.7 have a security flaw that allows attackers to access sensitive information from any support ticket. This could happen even if the attacker ...
5.3
Masteriyo LMS WordPress Plugin Allows Unpaid Access to Paid Courses
CVE-2026-5167
The Masteriyo LMS plugin for WordPress is vulnerable to a security issue that could allow anyone to access paid courses without paying. This is because the plugin doesn't properly check who is sending...
5.3
Riaxe Product Customizer plugin exposes sensitive customer data on WordPress sites
CVE-2026-3594
The Riaxe Product Customizer plugin on WordPress sites allows anyone to access sensitive customer information, such as names and order details, without needing a password. This is a concern for sites ...
5.3
PZ Frontend Manager plugin for WordPress allows attackers to delete any user account
CVE-2026-3477
Attackers with Subscriber-level access can delete any WordPress user account, including administrators, by making a special request to the plugin's AJAX endpoint. This is a significant issue because i...
5.3
MainWP Child Reports plugin leaks sensitive data to malicious users
CVE-2026-4299
An attacker with Subscriber-level access or higher can obtain sensitive information about your WordPress site's activity logs by sending a specific request. This includes user information, IP addresse...
5.3
LTL Freight Quotes plugin allows unauthorized changes to subscription plans
CVE-2026-3646
The LTL Freight Quotes plugin for WordPress lacks proper security checks, allowing anyone to modify subscription settings, potentially downgrading paid plans or disabling premium features, without nee...
5.3
Hono Cookie Name Validation Error in Cookie Generation
GHSA-26pp-8wgv-hjvm
Untrusted input can cause errors when generating cookie headers. If you use Hono to generate cookies from user-controlled input, make sure to validate the cookie name to prevent errors. Update to the ...
5.3
Unvalidated Cookie Names in Hono Set-Cookie Headers
GHSA-26pp-8wgv-hjvm
Hono applications may encounter runtime errors if using untrusted input for cookie names in setCookie() or similar functions. This is due to invalid characters in cookie names, which can cause issues ...
5.3
Hono: Access to protected files by manipulating request path with repeated slashes
GHSA-wmmm-f939-6g9c CVE-2026-39407
Hono, a middleware, has a bug that allows attackers to access protected files by using multiple slashes in the request path, which can lead to unauthorized access to sensitive files. This affects appl...
5.3
Repeated slashes in URL can bypass security restrictions in Node.js server
GHSA-92pp-h63x-v22m CVE-2026-39406
A security risk exists in Node.js servers using the serveStatic middleware. If an attacker uses repeated slashes in a URL, they may be able to access files that are intended to be protected by securit...
5.3
JWCrypto: Memory Exhaustion from Maliciously Compressed JWE Tokens
CVE-2026-39373 GHSA-fjrm-76x2-c4q4
An attacker can send a specially crafted JWE token to a JWCrypto server, causing it to use up all its memory. This can happen even if the token itself is small, because it's been compressed to a much ...
5.3
Hustle Plugin for WordPress Allows Unapproved Data Changes
CVE-2026-2263
The Hustle plugin for WordPress, used for email marketing and lead generation, is missing a security check that could let hackers manipulate marketing data. This means they could fake conversion track...
5.3
RustFS: Unprivileged User Can Exfiltrate Objects
CVE-2026-39360 GHSA-mx42-j6wv-px98
A low-privileged user in a shared RustFS storage system can copy and steal objects from other users' accounts without permission. This can happen in multi-user environments. Update to the latest versi...
5.3
Parse Server Leaks Protected Session Data
CVE-2026-39381 GHSA-g4v2-qx3q-4p64
Prior to version 9.8.0-alpha.7 and 8.6.75, the Parse Server returns sensitive session data that's meant to be hidden. This can happen when an authenticated user requests their own session details. To ...
5.3
Emissary Configuration API Allows Access to Sensitive Files
CVE-2026-35583 GHSA-hxf2-gm22-7vcm
Prior to version 8.39.0, the Emissary configuration API had a weakness that could allow attackers to access sensitive files. This was fixed in version 8.39.0. To protect your system, make sure you're ...
5.3
pyLoad Download Manager: Path Traversal Vulnerability in Tar Archive Extraction
CVE-2026-35592 GHSA-mvwx-582f-56r7
A security issue in pyLoad's tar archive extraction feature allows a malicious file to be saved outside the intended directory. This could lead to unauthorized files being written to your system. Upgr...
5.3
Sonatype Nexus Repository allows JavaScript execution in browser
CVE-2026-3438
Unauthenticated attackers can run malicious code in your browser if you visit a specially crafted URL. This can happen if you use Sonatype Nexus Repository versions 3.0.0 through 3.90.2. Update to a f...
5.1
CourseVault Preview Utility Allows Unauthorized File Access
CVE-2026-35613 GHSA-9h9m-rr67-9jpg
Early versions of the CourseVault Preview utility can allow an attacker to access files outside the intended directory. This is a security risk because it could potentially allow unauthorized access t...
5.1
Remnawave Backend: Excessive Device Registration
CVE-2026-39880
Authenticated users can register more devices than allowed, potentially allowing them to resell subscriptions and consume excessive traffic. This can lead to financial losses for the business. Update ...
5.0
OpenEXR Image Decoder Can Read Outside Memory Bounds
CVE-2026-34589 GHSA-p8xc-w3q4-h64x
OpenEXR image file decoder can access memory outside its allocated space, potentially leading to a security issue. This affects versions 3.2.0 to 3.2.7, 3.3.9, and 3.4.9. Update to the latest version ...
8.4