Monitor vulnerabilities that affect your stack. Sign up free to get alerts when software you use is affected.

CVE Vulnerabilities - 8 April 2026

RSS

133 vulnerabilities published on 8 April 2026

Severity:
Parse Server Leaks Protected Session Data
CVE-2026-39381 GHSA-g4v2-qx3q-4p64
Prior to version 9.8.0-alpha.7 and 8.6.75, the Parse Server returns sensitive session data that's meant to be hidden. This can happen when an authenticated user requests their own session details. To ...
5.3
Emissary Configuration API Allows Access to Sensitive Files
CVE-2026-35583 GHSA-hxf2-gm22-7vcm
Prior to version 8.39.0, the Emissary configuration API had a weakness that could allow attackers to access sensitive files. This was fixed in version 8.39.0. To protect your system, make sure you're ...
5.3
File Browser Allows Unauthorized Download of Text Files
CVE-2026-35606 GHSA-67cg-cpj7-qgc9
A security issue in File Browser's file management interface allowed users without permission to download text files. This has been fixed in version 2.63.1. Update to the latest version to ensure secu...
5.3
pyLoad Download Manager: Path Traversal Vulnerability in Tar Archive Extraction
CVE-2026-35592 GHSA-mvwx-582f-56r7
A security issue in pyLoad's tar archive extraction feature allows a malicious file to be saved outside the intended directory. This could lead to unauthorized files being written to your system. Upgr...
5.3
CourseVault Preview Utility Allows Unauthorized File Access
CVE-2026-35613 GHSA-9h9m-rr67-9jpg
Early versions of the CourseVault Preview utility can allow an attacker to access files outside the intended directory. This is a security risk because it could potentially allow unauthorized access t...
5.1
Hono: Malicious Cookies Can Override Secure Cookies
GHSA-r5rp-j6wh-rvv4 CVE-2026-39410
A security issue in Hono's cookie handling code allows attackers to set malicious cookies that can override secure cookies, potentially leading to session hijacking or other security risks. Affected a...
4.8
MATCHA INVOICE: Unrestricted File Upload Allows Malicious Code Execution
CVE-2026-33273
An administrator can upload a malicious file to your MATCHA INVOICE server, potentially allowing hackers to execute code on the server. This poses a risk to your data and system security. Update to th...
5.1
Gravity Forms plugin for WordPress vulnerable to malicious scripts via form links
CVE-2026-4406
A weakness in the Gravity Forms plugin for WordPress allows hackers to inject malicious scripts into web pages by tricking users into clicking on links. This can cause problems for unauthenticated vis...
4.7
WordPress Inquiry Form Plugin Allows Malicious Scripts to Run on Administrator's Dashboard
CVE-2026-5169
An attacker with administrator access to a WordPress site using the Inquiry Form to Posts or Pages plugin can inject malicious scripts that will run on the plugin settings page or on pages with the [i...
4.4
Whole Enquiry Cart for WooCommerce plugin vulnerable to injected scripts on multisite installations
CVE-2026-2838
An attacker with admin access on a multisite WordPress installation can inject malicious scripts that will run when users visit specific pages. This can lead to unauthorized actions being performed on...
4.4
Blog2Social Plugin for WordPress Allows Attackers to Modify Other Users' Posts
CVE-2026-4330
The Blog2Social plugin for WordPress has a security flaw that lets attackers with a certain level of account access modify or delete scheduled social media posts that belong to other users. This means...
4.3
Quran Translations Plugin for WordPress: Unauthenticated Settings Changes
CVE-2026-4141
An attacker can trick an administrator into clicking a link, allowing them to change plugin settings without permission. This can happen in all versions of the Quran Translations plugin for WordPress ...
4.3
Cosign may falsely verify malicious code in containers and binaries
CVE-2026-39395 GHSA-w6c6-c85g-mmv6
Cosign, a code signing tool, had a flaw that allowed it to incorrectly verify malicious code as legitimate. This flaw was fixed in versions 3.0.6 and 2.6.3. Users should update to the latest version t...
4.3
LightRAG JWT Algorithm Forgery Allows Unauthorized Access
GHSA-8ffj-4hx4-9pgf CVE-2026-39413
The LightRAG API allows attackers to create fake login tokens, allowing them to access protected resources without a valid account. This is because the API doesn't properly check the type of token bei...
4.2
parisneo/lollms: Persistent Access After Password Reset
CVE-2026-1163
A vulnerability in parisneo/lollms allows an attacker to keep using an old session after a password reset, potentially giving them continued access to a compromised account. This happens because the a...
4.1
Kube-router Logs BGP Passwords at High Log Levels
GHSA-fcmh-qfxc-w685
If you use Kube-router with per-node BGP passwords and enable detailed logging, anyone with access to the logs can see the passwords. This is a concern because logging is often shared with support tea...
4.1
JustHTML: Custom Settings Allow Malicious Code Injection
GHSA-r758-8hxw-4845
A security issue exists in JustHTML when using custom settings to allow certain HTML elements. If you've set up JustHTML to allow specific elements like SVG or MathML, an attacker could inject malicio...
2.1
WordPress ActivityPub Plugin Allows Access to Private Posts
CVE-2026-4338
The WordPress ActivityPub plugin has a security issue that allows anyone, even without a login, to view posts that are not yet published. This means sensitive or draft content might be exposed. Update...
Ado::Sessions Perl Module Generates Predictable Session IDs
CVE-2026-5083
Ado::Sessions versions up to 0.935 generate session IDs that can be guessed by attackers, allowing them to access systems. This is due to the use of a weak random number generator and predictable inpu...
Amon2::Plugin::Web::CSRFDefender: Weak Session IDs in Versions 7.00-7.03
CVE-2026-5082
Versions 7.00 through 7.03 of Amon2::Plugin::Web::CSRFDefender for Perl generate weak session IDs that can be guessed or predicted, potentially allowing unauthorized access to user sessions. This issu...
CGA-rfvj-mw43-h8w8
CGA-rfvj-mw43-h8w8
CGA-rfvj-mw43-h8w8
Apache Log4j in Java Applications Allows Remote Code Execution
ECHO-56a7-5917-6302
Apache's Log4j library, used in many Java applications, has a critical flaw that can allow hackers to run malicious code on a server. This could lead to data theft, system compromise, and other securi...
rootio-linux: Unauthenticated Code Execution through HTTP Request
ROOT-OS-DEBIAN-13-CVE-2026-31406
The rootio-linux package in Root:Debian:13 has a security issue that allows attackers to execute malicious code without being authenticated. This could let someone access sensitive information or take...
rootio-linux: Unpatched Software Allows Unauthorized Code Execution
ROOT-OS-DEBIAN-13-CVE-2026-31408
The rootio-linux package in Root is affected by a security issue that could allow an attacker to execute malicious code with elevated privileges. This issue was patched by Root, and we recommend updat...