Monitor vulnerabilities that affect your stack.
Sign up free to get alerts when software you use is affected.
CVE Vulnerabilities - 8 April 2026
RSS689 vulnerabilities published on 8 April 2026
Severity:
Malicious code can execute when using Robo Gallery plugin with WordPress
CVE-2026-4300
The Robo Gallery plugin for WordPress has a security flaw that allows attackers to inject malicious code into web pages. This can happen when an authenticated user with author-level access or above cr...
6.4
pdfl.io WordPress Plugin Allows Hackers to Inject Malicious Code
CVE-2026-4073
The pdfl.io plugin for WordPress has a security flaw that allows attackers to inject malicious code into web pages. This can happen if a website using the plugin allows users with certain access level...
6.4
PrivateContent Free plugin for WordPress allows attackers to inject malicious scripts
CVE-2026-4025
An attacker with Contributor-level access and above can inject malicious scripts into the PrivateContent Free plugin for WordPress, which can execute when a user accesses the affected page. This is du...
6.4
Magic Conversation For Gravity Forms Plugin Allows Malicious Code Injection
CVE-2026-1396
The Magic Conversation For Gravity Forms plugin for WordPress is vulnerable to a security flaw that allows attackers to inject malicious code into pages. This could happen if an authenticated user wit...
6.4
Element Pack Addons for Elementor plugin allows malicious SVG files to inject code
CVE-2026-4655
The Element Pack Addons for Elementor plugin has a security risk that allows attackers to inject malicious code into SVG files. This can happen if an attacker with contributor-level access uploads a m...
6.4
WowPress Plugin for WordPress: Malicious Code Injection via Shortcode
CVE-2026-5508
A security weakness in the WowPress plugin for WordPress allows attackers to inject malicious code into certain pages, which can harm users who visit those pages. This affects all versions of the plug...
6.4
Wavr plugin for WordPress allows attackers to inject malicious scripts
CVE-2026-5506
The Wavr plugin for WordPress is insecure, allowing attackers to inject malicious scripts into pages, which can execute when users access those pages. This affects all versions up to and including 0.2...
6.4
Sports Club Management plugin for WordPress: Stored Cross-Site Scripting
CVE-2026-4871
An attacker with contributor access can inject malicious scripts into pages that are accessed by other users, potentially allowing them to steal data or take control of user sessions. This affects all...
6.4
Columns by BestWebSoft plugin for WordPress allows attackers to inject malicious scripts
CVE-2026-3618
The Columns by BestWebSoft plugin for WordPress is at risk because an attacker with admin-level access can inject malicious code into pages that will be executed when visited. This can happen if an ad...
6.4
Pinterest Site Verification plugin for WordPress allows attackers to inject scripts
CVE-2026-3142
The Pinterest Site Verification plugin for WordPress, used in versions up to 1.8, has a security flaw that allows an attacker to inject malicious code into a website. This can harm users who visit the...
6.4
The Plus Addons for Elementor allows attackers to inject malicious scripts
CVE-2026-3311
A security issue in The Plus Addons for Elementor plugin for WordPress allows authorized users to inject malicious code into website pages. This can happen when a contributor or higher-level user edit...
6.4
LatePoint Plugin for WordPress: Malicious Code Injection Possible
CVE-2026-4785
An attacker with contributor-level access to a WordPress site using the LatePoint plugin can inject malicious code that will run when users visit specific pages, potentially leading to unauthorized ac...
6.4
Prime Slider for Elementor plugin on WordPress allows attackers to inject malicious code
CVE-2026-4341
The Prime Slider – Addons for Elementor plugin on WordPress sites is vulnerable to a security risk that allows attackers to inject malicious code. This could allow an attacker with Author-level access...
6.4
LearnPress WordPress Plugin Allows Malicious Scripts in Course Pages
CVE-2026-4333
The LearnPress WordPress plugin has a security flaw that lets attackers inject malicious code into course pages, potentially harming users who visit those pages. This vulnerability affects all version...
6.4
Investi Plugin for WordPress Allows Attackers to Inject Malicious Code
CVE-2026-3600
The Investi plugin for WordPress is vulnerable to a security risk that allows attackers to inject malicious code into web pages. This can happen when a user with Contributor-level access and above add...
6.4
TableOn WordPress Plugin Allows Attackers to Inject Malicious Code
CVE-2026-3513
The TableOn WordPress plugin has a security flaw that lets attackers inject malicious code into pages if they have a certain level of access. This could allow them to take control of or disrupt your w...
6.4
Strong Testimonials Plugin for WordPress Allows Attackers to Execute Scripts
CVE-2026-3239
The Strong Testimonials plugin for WordPress has a security flaw that allows someone with contributor-level access to inject malicious code into pages, which can be executed when users visit those pag...
6.4
LightPress Lightbox plugin for WordPress allows attackers to inject scripts
CVE-2026-4379
The LightPress Lightbox plugin for WordPress contains a security flaw that allows attackers with contributor access or above to inject malicious scripts into web pages. This can happen when a user acc...
6.4
Blubrry PowerPress plugin for WordPress allows malicious script injection
CVE-2026-2988
An attacker with contributor-level access can inject malicious scripts into WordPress pages using the PowerPress plugin's shortcodes. This could potentially allow an attacker to take control of sensit...
6.4
Elementor Plugin for WordPress Exposes User Data through Malicious Pages
CVE-2025-14732
The Elementor plugin for WordPress allows attackers to inject malicious code into pages, potentially exposing user data. This vulnerability affects all versions up to 3.35.5. To protect your site, upd...
6.4
Tophat: Malicious URLs Can Execute Code on Dev Workstations
CVE-2026-39862
If you use Tophat, a testing tool for mobile apps, on a Mac, an attacker can trick it into running malicious code on your computer. This can happen if you visit a specially crafted URL, and it can let...
6.3
Quarkus OpenAPI Generator Can Write Files Outside Intended Directory
GHSA-jx2w-vp7f-456q
A bug in the Quarkus OpenAPI Generator extension allows attackers who control the ZIP files used for code generation to write files outside the intended directory, which can lead to data being overwri...
6.3
CoolerControl Web Service Allows Data Exposure and Unwanted Commands
CVE-2026-5302
A recent issue in CoolerControl's web service allows unauthorized access to data and potential execution of malicious commands. This could lead to unauthorized changes to your system or data theft. Up...
6.3
Hono Incorrectly Handles IPv4 Addresses in Some IPv6 Requests
GHSA-xpcf-pg52-r92g
CVE-2026-39409
If you use Hono to restrict access to your application, it may incorrectly allow or deny requests from IPv4 clients when they're connected to a system that uses both IPv4 and IPv6. This can happen if ...
6.3
Parse Server login endpoint discloses user existence
CVE-2026-39321
GHSA-mmpq-5hcv-hf2v
Parse Server login endpoint reveals whether a user exists, potentially aiding attackers. This is fixed in versions 9.8.0-alpha.6 and 8.6.74. Update to a patched version to prevent unauthorized user en...
6.3