Monitor vulnerabilities that affect your stack. Sign up free to get alerts when software you use is affected.

CVE Vulnerabilities - 8 April 2026

RSS

685 vulnerabilities published on 8 April 2026

Severity:
LobeHub: Unauthenticated authentication bypass on `webapi` routes via forgeable `X-lobe-chat-auth` header
GHSA-5mwj-v5jw-5c97 CVE-2026-39411
# Summary The `webapi` authentication layer trusts a client-controlled `X-lobe-chat-auth` header that is only XOR-obfuscated, not signed or otherwise authenticated. Because the XOR key is hardcoded i...
5.0
Nodemailer: Email Spoofing via Malicious SMTP Server Interaction
GHSA-vvjj-xcjg-gr5g
Nodemailer versions 8.0.4 and earlier are vulnerable to email spoofing and phishing attacks. An attacker can manipulate the email sender's name to trick recipients. Update to a fixed version of Nodema...
4.9
Nodemailer Allows Malicious Email Sending via Email Server Settings
GHSA-vvjj-xcjg-gr5g
Nodemailer, a popular email library, allows hackers to send emails pretending to be from your company by manipulating the email server settings. This could lead to phishing attacks and other security ...
4.9
CI4MS has stored XSS via Unescaped Blacklist Note in Admin User List
GHSA-7cm9-v848-cfh2 CVE-2026-39391
## Summary The blacklist (ban) note parameter in `UserController::ajax_blackList_post()` is stored in the database without sanitization and rendered into an HTML `data-note` attribute without escapin...
4.8
Hono: Malicious Cookies Can Override Secure Cookies
GHSA-r5rp-j6wh-rvv4 CVE-2026-39410
A security issue in Hono's cookie handling code allows attackers to set malicious cookies that can override secure cookies, potentially leading to session hijacking or other security risks. Affected a...
4.8
MATCHA INVOICE: Unrestricted File Upload Allows Malicious Code Execution
CVE-2026-33273
An administrator can upload a malicious file to your MATCHA INVOICE server, potentially allowing hackers to execute code on the server. This poses a risk to your data and system security. Update to th...
5.1
Gravity Forms plugin for WordPress vulnerable to malicious scripts via form links
CVE-2026-4406
A weakness in the Gravity Forms plugin for WordPress allows hackers to inject malicious scripts into web pages by tricking users into clicking on links. This can cause problems for unauthenticated vis...
4.7
Sleuth Kit ISO9660 Parser Reads Beyond Disk Data
CVE-2026-40026
A maliciously crafted ISO image can cause the Sleuth Kit to read data it shouldn't, potentially exposing sensitive information. This affects users who work with disk images, especially those who rely ...
4.8
Sleuth Kit - Malicious APFS Image Can Reveal Sensitive Data
CVE-2026-40025
An attacker can create a malicious APFS disk image that, when processed by certain Sleuth Kit tools, may reveal sensitive information or crash the system. This vulnerability affects all versions of Th...
4.8
Kamailio SIP Server Crashes with Malformed User Authentication Requests
CVE-2026-39864
The Kamailio SIP server may crash if it receives a specially crafted authentication request. This could potentially disrupt service to users. Update to version 6.0.5 or 5.8.7 to fix this issue.
4.4
Dell PowerScale OneFS reveals sensitive server information
CVE-2026-24511
Dell PowerScale OneFS versions 9.5 to 9.13 contain a flaw that could allow an attacker with high-level access to access sensitive server information. This could potentially compromise the security of ...
4.4
WordPress Inquiry Form Plugin Allows Malicious Scripts to Run on Administrator's Dashboard
CVE-2026-5169
An attacker with administrator access to a WordPress site using the Inquiry Form to Posts or Pages plugin can inject malicious scripts that will run on the plugin settings page or on pages with the [i...
4.4
Whole Enquiry Cart for WooCommerce plugin vulnerable to injected scripts on multisite installations
CVE-2026-2838
An attacker with admin access on a multisite WordPress installation can inject malicious scripts that will run when users visit specific pages. This can lead to unauthorized actions being performed on...
4.4
GitLab EE: Unauthorized Changes to Private Project Vulnerability Flags
CVE-2026-2619
A bug in GitLab EE allowed an authenticated user with limited access to modify vulnerability flags in private projects. This could have led to incorrect vulnerability data being displayed. Update to t...
4.3
GitLab: Authenticated Users Can Access Confidential Issues via CSV Export
CVE-2026-2104
Authenticated users in GitLab Community Edition and Enterprise Edition can potentially access confidential issues assigned to other users if they have permission to export issues in CSV format. This i...
4.3
GitLab EE: Authenticated users can change protected environment settings
CVE-2026-1752
An attacker with a developer account and special permissions could modify sensitive settings for projects and environments. This could lead to unintended changes to your project's security and workflo...
4.3
GitLab: Attacker can see other users' email addresses
CVE-2025-9484
An authenticated user could see other users' email addresses under certain circumstances. This issue has been fixed in all affected versions. To stay secure, update to the latest version of GitLab.
4.3
Old Google Chrome Allows Attackers to Steal Data Across Websites
CVE-2026-5918
A security flaw in old versions of Google Chrome allows a hacker who has taken control of a user's browsing session to steal sensitive information from other websites. This is a concern because it cou...
4.3
Google Chrome allows data leak via crafted HTML in compromised renderer process
DEBIAN-CVE-2026-5918
A security issue in older versions of Google Chrome could allow an attacker who has already compromised the browser's inner workings to steal data from other websites. This is a low-risk issue, but it...
4.3
Google Chrome Policy Bypass via Malicious HTML Pages
CVE-2026-5911
Google Chrome's content security policy can be bypassed by a malicious HTML page, allowing an attacker to potentially inject and execute unauthorized scripts. This affects older versions of Google Chr...
4.3
Google Chrome: Policy Bypass in ServiceWorker Allows Remote Attack
DEBIAN-CVE-2026-5911
A vulnerability in Google Chrome allows an attacker to bypass security policies on a website by tricking a user into visiting a malicious webpage. This could potentially allow an attacker to inject ma...
4.3
Google Chrome on Android can show fake URLs in the address bar
DEBIAN-CVE-2026-5906
A security weakness in older versions of Google Chrome on Android can be exploited by a malicious website to display a fake address in the address bar. This could potentially trick users into visiting...
4.3
Google Chrome on Android: Malicious Page Can Spoof URL Bar
CVE-2026-5906
A security issue in Google Chrome on Android devices allows a hacker to create a fake webpage that can trick users into thinking they are on a different website. This could potentially lead to users e...
4.3
openstatusHQ openstatus: Remote Code Execution via Malicious Links
CVE-2026-5808
A vulnerability in openstatusHQ openstatus allows an attacker to execute malicious code by manipulating links. This is a security risk because it could allow an attacker to take control of your system...
5.3
Wimi Teamwork On-Premises leaks private conversations
CVE-2026-35023
Versions prior to 8.2.0 allow attackers to access private conversations and sensitive information by guessing conversation IDs. This could happen if you're using an outdated version of Wimi Teamwork O...
5.3