Monitor vulnerabilities that affect your stack. Sign up free to get alerts when software you use is affected.

CVE Vulnerabilities - 8 April 2026

RSS

104 vulnerabilities published on 8 April 2026

Severity:
AVideo Open Source Video Platform Allows Malicious File Downloads
CVE-2026-39370 GHSA-cmcr-q4jf-p6q9
AVideo's open source video platform has a security issue that allows attackers to trick the system into downloading malicious files. This can happen when a user uploads a file with a malicious URL, wh...
7.1
Skilleton: Malicious Input Can Cause Unintended Behavior
GHSA-5g3j-89fr-r2vp
The Skilleton software has a security weakness in how it handles certain inputs. This could allow an attacker to cause the software to behave unexpectedly or inefficiently. To fix this, update to vers...
6.9
pyLoad Download Manager: Unauthorized Access to SSL Certificates
CVE-2026-35586 GHSA-ppvx-rwh9-7rj7
pyLoad's download manager has a security weakness that allows any user to change the SSL certificate and key file paths, potentially allowing unauthorized access to the system. This issue can be fixed...
6.8
WWBN AVideo: Authenticated SSRF via Stored Callback URL
CVE-2026-39368 GHSA-q4x6-6mm2-crg9
An attacker-controlled URL is stored on the WWBN AVideo server, which can be used to make unauthorized requests to internal services. This affects authenticated streamers in versions 26.0 and prior. T...
6.5
AVideo PayPal Payment Handler Allows Malicious Transaction Replay
CVE-2026-39366 GHSA-mmw7-wq3c-wf9p
AVideo's outdated PayPal payment handler in versions 26.0 and prior can be exploited by attackers to inflate their wallet balance and renew subscriptions repeatedly. This is caused by a lack of transa...
6.5
The Plus Addons for Elementor allows attackers to inject malicious scripts
CVE-2026-3311
A security issue in The Plus Addons for Elementor plugin for WordPress allows authorized users to inject malicious code into website pages. This can happen when a contributor or higher-level user edit...
6.4
LatePoint Plugin for WordPress: Malicious Code Injection Possible
CVE-2026-4785
An attacker with contributor-level access to a WordPress site using the LatePoint plugin can inject malicious code that will run when users visit specific pages, potentially leading to unauthorized ac...
6.4
Prime Slider for Elementor plugin on WordPress allows attackers to inject malicious code
CVE-2026-4341
The Prime Slider – Addons for Elementor plugin on WordPress sites is vulnerable to a security risk that allows attackers to inject malicious code. This could allow an attacker with Author-level access...
6.4
LearnPress WordPress Plugin Allows Malicious Scripts in Course Pages
CVE-2026-4333
The LearnPress WordPress plugin has a security flaw that lets attackers inject malicious code into course pages, potentially harming users who visit those pages. This vulnerability affects all version...
6.4
Investi Plugin for WordPress Allows Attackers to Inject Malicious Code
CVE-2026-3600
The Investi plugin for WordPress is vulnerable to a security risk that allows attackers to inject malicious code into web pages. This can happen when a user with Contributor-level access and above add...
6.4
TableOn WordPress Plugin Allows Attackers to Inject Malicious Code
CVE-2026-3513
The TableOn WordPress plugin has a security flaw that lets attackers inject malicious code into pages if they have a certain level of access. This could allow them to take control of or disrupt your w...
6.4
Strong Testimonials Plugin for WordPress Allows Attackers to Execute Scripts
CVE-2026-3239
The Strong Testimonials plugin for WordPress has a security flaw that allows someone with contributor-level access to inject malicious code into pages, which can be executed when users visit those pag...
6.4
LightPress Lightbox plugin for WordPress allows attackers to inject scripts
CVE-2026-4379
The LightPress Lightbox plugin for WordPress contains a security flaw that allows attackers with contributor access or above to inject malicious scripts into web pages. This can happen when a user acc...
6.4
Blubrry PowerPress plugin for WordPress allows malicious script injection
CVE-2026-2988
An attacker with contributor-level access can inject malicious scripts into WordPress pages using the PowerPress plugin's shortcodes. This could potentially allow an attacker to take control of sensit...
6.4
Elementor Plugin for WordPress Exposes User Data through Malicious Pages
CVE-2025-14732
The Elementor plugin for WordPress allows attackers to inject malicious code into pages, potentially exposing user data. This vulnerability affects all versions up to 3.35.5. To protect your site, upd...
6.4
Hono Incorrectly Handles IPv4 Addresses in Some IPv6 Requests
GHSA-xpcf-pg52-r92g CVE-2026-39409
If you use Hono to restrict access to your application, it may incorrectly allow or deny requests from IPv4 clients when they're connected to a system that uses both IPv4 and IPv6. This can happen if ...
6.3
Parse Server login endpoint discloses user existence
CVE-2026-39321 GHSA-mmpq-5hcv-hf2v
Parse Server login endpoint reveals whether a user exists, potentially aiding attackers. This is fixed in versions 9.8.0-alpha.6 and 8.6.74. Update to a patched version to prevent unauthorized user en...
6.3
File Browser: Unintended Directory Access Through Malicious Path Matching
CVE-2026-35605 GHSA-5q48-q4fm-g3m6
A flaw in File Browser's access rules allows unauthorized access to unintended directories. This could be exploited by an attacker to access sensitive files. Update to version 2.63.1 to fix this issue...
6.3
WordPress Gravity Forms plugin exposes sensitive data to attackers
CVE-2026-4394
The Gravity Forms plugin for WordPress has a security flaw that allows attackers to inject malicious code into form entries. This can lead to unauthorized access to sensitive information when an admin...
6.1
AWS SDK for Go v2 Can Crash from Malformed Response
GHSA-xmrv-pmrh-hhx2
The AWS SDK for Go v2 can crash if it receives a malformed response from a server. This can happen if a malicious actor sends a specially crafted response. To fix this, update to the latest version of...
5.9
AWS SDK for Go v2 Crashes from Malformed EventStream Response
GHSA-xmrv-pmrh-hhx2
A malicious response from AWS can cause the Go SDK to crash, potentially disrupting services. This issue affects older versions of the AWS SDK for Go v2. To fix it, update to the latest version of the...
5.9
Hono: Malicious Files Can Be Written Outside the Output Directory
GHSA-xf4j-xp2r-rqqx CVE-2026-39408
A security issue affects the Hono framework, allowing attackers to write files outside the intended output directory during static site generation. This could lead to unintended files being overwritte...
5.9
MATCHA SNS versions 1.3.9 and earlier allow malicious scripts to run in user's browser
CVE-2026-27787
MATCHA SNS users may be at risk of having malicious scripts executed on their web browsers if they visit a compromised website. This could potentially lead to unauthorized actions or data theft. Users...
5.1
pyLoad WebUI Allows Unauthorized Access to Actions
GHSA-rfgh-63mg-8pwm
An authenticated user with 'ADD' or 'DELETE' permission can execute actions meant for 'MODIFY' permission. This can lead to unintended changes to the system. To fix this, update the WebUI JSON endpoin...
5.4
Download Monitor Plugin Allows Attackers to Delete or Modify Download Paths
CVE-2026-4401
The Download Monitor plugin for WordPress is at risk because it doesn't properly check the source of some requests. This could allow an attacker to trick an administrator into deleting, disabling, or ...
5.4