Monitor vulnerabilities that affect your stack.
Sign up free to get alerts when software you use is affected.
CVE Vulnerabilities - 8 April 2026
RSS685 vulnerabilities published on 8 April 2026
Severity:
BEAR Plugin for WooCommerce allows attackers to delete product categories
CVE-2026-1673
The BEAR plugin for WordPress has a security flaw that allows attackers to delete product categories and other taxonomies without permission. This could happen if an administrator clicks on a maliciou...
4.3
Blog2Social Plugin for WordPress Allows Attackers to Modify Other Users' Posts
CVE-2026-4330
The Blog2Social plugin for WordPress has a security flaw that lets attackers with a certain level of account access modify or delete scheduled social media posts that belong to other users. This means...
4.3
Quran Translations Plugin for WordPress: Unauthenticated Settings Changes
CVE-2026-4141
An attacker can trick an administrator into clicking a link, allowing them to change plugin settings without permission. This can happen in all versions of the Quran Translations plugin for WordPress ...
4.3
Cosign may falsely verify malicious code in containers and binaries
CVE-2026-39395
GHSA-w6c6-c85g-mmv6
Cosign, a code signing tool, had a flaw that allowed it to incorrectly verify malicious code as legitimate. This flaw was fixed in versions 3.0.6 and 2.6.3. Users should update to the latest version t...
4.3
LightRAG JWT Algorithm Forgery Allows Unauthorized Access
GHSA-8ffj-4hx4-9pgf
CVE-2026-39413
The LightRAG API allows attackers to create fake login tokens, allowing them to access protected resources without a valid account. This is because the API doesn't properly check the type of token bei...
4.2
parisneo/lollms: Persistent Access After Password Reset
CVE-2026-1163
GHSA-8jg2-726g-xh43
A vulnerability in parisneo/lollms allows an attacker to keep using an old session after a password reset, potentially giving them continued access to a compromised account. This happens because the a...
4.1
Kube-router Logs BGP Passwords at High Log Levels
GHSA-fcmh-qfxc-w685
If you use Kube-router with per-node BGP passwords and enable detailed logging, anyone with access to the logs can see the passwords. This is a concern because logging is often shared with support tea...
4.1
LiquidJS Template Can Use Excessive Memory When Replacing Text
GHSA-mmg9-6m6j-jqqx
CVE-2026-34166
LiquidJS templates can crash due to excessive memory use when an attacker adds a lot of replacements in a template. This can happen when the template tries to replace a pattern with a long string many...
3.7
SourceCodester Sales and Inventory System Can Be Hacked Through Web Address
CVE-2026-5810
The SourceCodester Sales and Inventory System version 1.0 contains a security weakness that can be exploited by hackers to inject malicious code into the system. This could allow unauthorized access t...
5.1
Easy Blog Site 1.0: Malicious code can be injected into blog posts
CVE-2026-5806
A security vulnerability in Easy Blog Site 1.0 allows attackers to inject malicious code into blog posts. This can happen when a user submits a post title with malicious code, potentially compromising...
5.1
Dell PowerProtect Agent: Local Access Could Expose Sensitive Data
CVE-2026-28264
A security issue exists in older versions of the Dell PowerProtect Agent that can allow a low-level user with access to the system to potentially view sensitive information. This could be exploited by...
3.3
GitLab: Authenticated User Can Remove Higher-Powered Group Members
CVE-2026-4916
A security update has been released for GitLab to fix a vulnerability that could allow an authorized user with special permissions to accidentally remove or demote users with higher-level access. This...
2.7
JustHTML: Custom Settings Allow Malicious Code Injection
GHSA-r758-8hxw-4845
A security issue exists in JustHTML when using custom settings to allow certain HTML elements. If you've set up JustHTML to allow specific elements like SVG or MathML, an attacker could inject malicio...
2.1
CVE Withdrawn: No Information Available
CVE-2026-4398
This CVE has been removed from the list due to a lack of valid information. As a result, there is no known vulnerability to report. No action is necessary.
WordPress Plugin WP Super Cache allows unauthorized access to sensitive files
ECHO-e74f-830c-cd04
A security issue in the WP Super Cache plugin for WordPress allows hackers to access sensitive files on a website. This means that an attacker could potentially read or modify sensitive data, such as ...
WordPress Plugin Duplicator Pro Allows Remote Code Execution
ECHO-8d16-7d9a-2e99
The Duplicator Pro plugin for WordPress has a vulnerability that could allow an attacker to execute malicious code on a website. This means a hacker could potentially take control of a site by exploit...
Apache Tomcat Web Application Manager Remote Code Execution
ECHO-0fd5-793c-3eaa
Apache Tomcat's Web Application Manager is vulnerable to a remote code execution attack, allowing an attacker to execute arbitrary code on a server. This means that an attacker could potentially acces...
Apache HTTP Server Unauthenticated Remote Code Execution
ECHO-502f-9006-e836
A flaw in the Apache HTTP Server can allow attackers to run malicious code on affected servers without needing a password. This could allow hackers to take control of the server or steal sensitive dat...
WordPress Plugin WP Super Cache Can Be Tricked into Disclosing Sensitive Information
ECHO-602f-3dc6-d1d6
A popular WordPress plugin used for website caching has a weakness that could allow an attacker to obtain sensitive data from websites using it. This could potentially lead to unauthorized access to s...
Adobe Acrobat Reader allows remote code execution when opening malicious PDFs
ECHO-4306-7f98-795c
Adobe Acrobat Reader has a vulnerability that could allow attackers to execute malicious code on your computer if you open a specially crafted PDF file. This could lead to unauthorized access to your ...
Google Chrome: Malicious web page can read sensitive information
CVE-2026-5913
A security issue in older versions of Google Chrome could allow a malicious website to access sensitive information from your browser. This is a low-risk issue, but it's still essential to update your...
Google Chrome Extensions: Malicious Extensions Can Crash Browser
CVE-2026-5904
A security issue in older versions of Google Chrome could allow a malicious extension to crash the browser and potentially cause other issues. If a user installs a malicious extension, it could lead t...
Google Chrome: Bypassing Navigation Restrictions Through HTML Page
CVE-2026-5903
A bug in older versions of Google Chrome allowed an attacker to trick a user into bypassing navigation restrictions by showing a specially crafted web page. This could potentially allow the attacker t...
Google Chrome on Android Leaks Sensitive Media Information
CVE-2026-5902
A security issue in older versions of Google Chrome on Android allows hackers who have taken control of a user's browser to access and manipulate sensitive media information. This could potentially le...
Google Chrome: Malicious Extensions Can Bypass Enterprise Cookie Rules
CVE-2026-5901
A security issue in older versions of Google Chrome could allow a hacker to trick a user into installing a malicious extension that can bypass rules set by your company to control cookie settings. Thi...