Monitor vulnerabilities that affect your stack. Sign up free to get alerts when software you use is affected.

CVE Vulnerabilities - 8 April 2026

RSS

104 vulnerabilities published on 8 April 2026

Severity:
AVideo's EPG Feature Fails to Prevent JavaScript Injection
CVE-2026-39367 GHSA-rqp3-gf5h-mrqx
AVideo's Electronic Program Guide feature in versions 26.0 and earlier allows attackers to inject malicious JavaScript code into the guide, which can steal user sessions and take control of accounts w...
5.4
MainWP Child Reports plugin leaks sensitive data to malicious users
CVE-2026-4299
An attacker with Subscriber-level access or higher can obtain sensitive information about your WordPress site's activity logs by sending a specific request. This includes user information, IP addresse...
5.3
LTL Freight Quotes plugin allows unauthorized changes to subscription plans
CVE-2026-3646
The LTL Freight Quotes plugin for WordPress lacks proper security checks, allowing anyone to modify subscription settings, potentially downgrading paid plans or disabling premium features, without nee...
5.3
Unvalidated Cookie Names in Hono Set-Cookie Headers
GHSA-26pp-8wgv-hjvm
Hono applications may encounter runtime errors if using untrusted input for cookie names in setCookie() or similar functions. This is due to invalid characters in cookie names, which can cause issues ...
5.3
Hono: Access to protected files by manipulating request path with repeated slashes
GHSA-wmmm-f939-6g9c CVE-2026-39407
Hono, a middleware, has a bug that allows attackers to access protected files by using multiple slashes in the request path, which can lead to unauthorized access to sensitive files. This affects appl...
5.3
Repeated slashes in URL can bypass security restrictions in Node.js server
GHSA-92pp-h63x-v22m CVE-2026-39406
A security risk exists in Node.js servers using the serveStatic middleware. If an attacker uses repeated slashes in a URL, they may be able to access files that are intended to be protected by securit...
5.3
JWCrypto: Memory Exhaustion from Maliciously Compressed JWE Tokens
CVE-2026-39373 GHSA-fjrm-76x2-c4q4
An attacker can send a specially crafted JWE token to a JWCrypto server, causing it to use up all its memory. This can happen even if the token itself is small, because it's been compressed to a much ...
5.3
Hustle Plugin for WordPress Allows Unapproved Data Changes
CVE-2026-2263
The Hustle plugin for WordPress, used for email marketing and lead generation, is missing a security check that could let hackers manipulate marketing data. This means they could fake conversion track...
5.3
RustFS: Unprivileged User Can Exfiltrate Objects
CVE-2026-39360 GHSA-mx42-j6wv-px98
A low-privileged user in a shared RustFS storage system can copy and steal objects from other users' accounts without permission. This can happen in multi-user environments. Update to the latest versi...
5.3
Parse Server Leaks Protected Session Data
CVE-2026-39381 GHSA-g4v2-qx3q-4p64
Prior to version 9.8.0-alpha.7 and 8.6.75, the Parse Server returns sensitive session data that's meant to be hidden. This can happen when an authenticated user requests their own session details. To ...
5.3
Emissary Configuration API Allows Access to Sensitive Files
CVE-2026-35583 GHSA-hxf2-gm22-7vcm
Prior to version 8.39.0, the Emissary configuration API had a weakness that could allow attackers to access sensitive files. This was fixed in version 8.39.0. To protect your system, make sure you're ...
5.3
File Browser Allows Unauthorized Download of Text Files
CVE-2026-35606 GHSA-67cg-cpj7-qgc9
A security issue in File Browser's file management interface allowed users without permission to download text files. This has been fixed in version 2.63.1. Update to the latest version to ensure secu...
5.3
pyLoad Download Manager: Path Traversal Vulnerability in Tar Archive Extraction
CVE-2026-35592 GHSA-mvwx-582f-56r7
A security issue in pyLoad's tar archive extraction feature allows a malicious file to be saved outside the intended directory. This could lead to unauthorized files being written to your system. Upgr...
5.3
CourseVault Preview Utility Allows Unauthorized File Access
CVE-2026-35613 GHSA-9h9m-rr67-9jpg
Early versions of the CourseVault Preview utility can allow an attacker to access files outside the intended directory. This is a security risk because it could potentially allow unauthorized access t...
5.1
Hono: Malicious Cookies Can Override Secure Cookies
GHSA-r5rp-j6wh-rvv4 CVE-2026-39410
A security issue in Hono's cookie handling code allows attackers to set malicious cookies that can override secure cookies, potentially leading to session hijacking or other security risks. Affected a...
4.8
MATCHA INVOICE: Unrestricted File Upload Allows Malicious Code Execution
CVE-2026-33273
An administrator can upload a malicious file to your MATCHA INVOICE server, potentially allowing hackers to execute code on the server. This poses a risk to your data and system security. Update to th...
5.1
Gravity Forms plugin for WordPress vulnerable to malicious scripts via form links
CVE-2026-4406
A weakness in the Gravity Forms plugin for WordPress allows hackers to inject malicious scripts into web pages by tricking users into clicking on links. This can cause problems for unauthenticated vis...
4.7
Cosign may falsely verify malicious code in containers and binaries
CVE-2026-39395 GHSA-w6c6-c85g-mmv6
Cosign, a code signing tool, had a flaw that allowed it to incorrectly verify malicious code as legitimate. This flaw was fixed in versions 3.0.6 and 2.6.3. Users should update to the latest version t...
4.3
LightRAG JWT Algorithm Forgery Allows Unauthorized Access
GHSA-8ffj-4hx4-9pgf CVE-2026-39413
The LightRAG API allows attackers to create fake login tokens, allowing them to access protected resources without a valid account. This is because the API doesn't properly check the type of token bei...
4.2
parisneo/lollms: Persistent Access After Password Reset
CVE-2026-1163
A vulnerability in parisneo/lollms allows an attacker to keep using an old session after a password reset, potentially giving them continued access to a compromised account. This happens because the a...
4.1
Kube-router Logs BGP Passwords at High Log Levels
GHSA-fcmh-qfxc-w685
If you use Kube-router with per-node BGP passwords and enable detailed logging, anyone with access to the logs can see the passwords. This is a concern because logging is often shared with support tea...
4.1
JustHTML: Custom Settings Allow Malicious Code Injection
GHSA-r758-8hxw-4845
A security issue exists in JustHTML when using custom settings to allow certain HTML elements. If you've set up JustHTML to allow specific elements like SVG or MathML, an attacker could inject malicio...
2.1
Ado::Sessions Perl Module Generates Predictable Session IDs
CVE-2026-5083
Ado::Sessions versions up to 0.935 generate session IDs that can be guessed by attackers, allowing them to access systems. This is due to the use of a weak random number generator and predictable inpu...
Amon2::Plugin::Web::CSRFDefender: Weak Session IDs in Versions 7.00-7.03
CVE-2026-5082
Versions 7.00 through 7.03 of Amon2::Plugin::Web::CSRFDefender for Perl generate weak session IDs that can be guessed or predicted, potentially allowing unauthorized access to user sessions. This issu...
CGA-rfvj-mw43-h8w8