Monitor vulnerabilities that affect your stack.
Sign up free to get alerts when software you use is affected.
CVE Vulnerabilities - 8 April 2026
RSS689 vulnerabilities published on 8 April 2026
Severity:
Download Monitor Plugin Allows Attackers to Delete or Modify Download Paths
CVE-2026-4401
The Download Monitor plugin for WordPress is at risk because it doesn't properly check the source of some requests. This could allow an attacker to trick an administrator into deleting, disabling, or ...
5.4
AVideo's EPG Feature Fails to Prevent JavaScript Injection
CVE-2026-39367
GHSA-rqp3-gf5h-mrqx
AVideo's Electronic Program Guide feature in versions 26.0 and earlier allows attackers to inject malicious JavaScript code into the guide, which can steal user sessions and take control of accounts w...
5.4
LangChain: Unvalidated Expressions in Prompt Templates
GHSA-926x-3r5x-gfhw
LangChain's prompt templates may evaluate untrusted expressions, potentially leading to security risks if untrusted template strings are accepted. This issue affects applications that use untrusted te...
5.3
LangChain: Unvalidated Template Injection in Prompt Templates
GHSA-926x-3r5x-gfhw
LangChain's prompt template validation is incomplete, allowing malicious code to be injected into templates. This can lead to formatting errors or even security issues if untrusted data is used in tem...
5.3
InvenTree: Unvalidated User-Controlled Image Download
CVE-2026-39362
If you use InvenTree, be aware that versions prior to 1.2.7 and 1.3.0 allow authenticated users to download images from any URL, which could be malicious. This means an attacker could trick a user int...
5.3
OpenTelemetry-go: Attacker can crash the process by sending a large response
GHSA-w8rr-5gcm-pp58
CVE-2026-39882
The OpenTelemetry-go library reads the full HTTP response body without limits, which allows an attacker who controls the collector endpoint to cause a memory crash. This is a serious issue if you send...
5.3
LiquidJS: Sensitive Data Leaked via Template Sorting
GHSA-rv5g-f82m-qrvv
CVE-2026-39412
LiquidJS templates can leak sensitive data, such as API keys, if the `ownPropertyOnly` security option is used. This happens when sorting data in a multi-tenant template system. To fix, update to the ...
5.3
Flipmart: Accidental Access to Sensitive Content Possible
CVE-2026-39716
Flipmart versions 2.8 and below have a security issue that allows unauthorized users to access sensitive content. This is a concern because it could lead to sensitive data being exposed or manipulated...
5.3
G5Plus April: Unauthorized Access to Sensitive Content
CVE-2026-39714
A bug in G5Plus April software allows hackers to access sensitive areas of a website without permission. This means that if the security settings are not properly configured, attackers can see or even...
5.3
tagDiv Composer: Injecting Harmful Code into Web Pages
CVE-2026-39712
A security flaw in tagDiv Composer allows an attacker to inject malicious code into web pages. This could compromise the security of websites that use the software. Update to version 5.4.3 or later to...
5.3
Make My Trivia: Incorrect Access Control Leads to Unauthorized Access
CVE-2026-39706
A security problem in Make My Trivia allows unauthorized users to access areas they shouldn't. If your Make My Trivia software is configured incorrectly, attackers can exploit this weakness. Update to...
5.3
Precious Metals Automated Product Pricing Pro Missing Access Controls
CVE-2026-39704
The Precious Metals Automated Product Pricing Pro software has a security weakness that could allow unauthorized access to sensitive areas. This could lead to data theft or manipulation. Update the so...
5.3
WowOptin: Incorrect Access Control for WPXPO Exposes Sensitive Data
CVE-2026-39700
The WowOptin plugin for WordPress has a security issue that could allow unauthorized access to sensitive data. This affects versions of the plugin installed on WordPress websites. To fix this, update ...
5.3
PublisherDesk: Unauthorized Access to Configuration Files
CVE-2026-39698
A security flaw in PublisherDesk allows attackers to access sensitive configuration files without permission. This affects PublisherDesk versions 1.0 through 1.5.0. To fix this, update to a newer vers...
5.3
Simply Schedule Appointments: Unauthorized Access to Sessions
CVE-2026-39694
A configuration error in Simply Schedule Appointments allows unauthorized users to access sessions they shouldn't be able to. This means that users with incorrect permissions can potentially access an...
5.3
Author Avatars List/Block allows unauthorized access to sensitive data
CVE-2026-39690
A security weakness in the Author Avatars List/Block software lets attackers access data they shouldn't have. This affects versions of the software up to 2.1.25. To stay secure, update to the latest v...
5.3
Glowlogix WP Frontend Profile: Unauthorized Access to User Data
CVE-2026-39688
A security flaw in Glowlogix WP Frontend Profile allows unauthorized access to user data when access control settings are incorrectly configured. This affects versions 1.3.9 and earlier of the plugin....
5.3
Incorrect Access Settings in linkPizza-Manager Allow Unauthorized Access
CVE-2026-39682
A security issue exists in linkPizza-Manager, a software used to manage links. This issue allows someone with the wrong configuration to access areas they shouldn't. You should update to the latest ve...
5.3
Diet Calorie Calculator allows unauthorized access to sensitive data
CVE-2026-39680
A security issue in the Diet Calorie Calculator allows unauthorized users to access sensitive information. This affects versions up to 1.1.1, so it's essential to update to a newer version to ensure s...
5.3
Pinpoint Booking System allows unauthorized access to bookings
CVE-2026-39678
A security issue in the Pinpoint Booking System allows unauthorized users to access and potentially manipulate booking information. This affects all versions up to 2.9.9.6.5. To stay secure, update to...
5.3
ShipTime Discounted Shipping Rates: Unsecured Discounts
CVE-2026-39672
A security flaw in ShipTime's discounted shipping rates feature allows unauthorized users to access and claim discounts they shouldn't have. This could lead to incorrect or unauthorized discounts bein...
5.3
Leadrebel Leads to Unauthorized Access Due to Incorrect Security Levels
CVE-2026-39664
An incorrectly configured security setting in Leadrebel can allow unauthorized users to access sensitive information. This affects versions of Leadrebel from an unknown version up to 1.0.2. To stay se...
5.3
ProWCPlugins Product Price by Formula for WooCommerce: Unauthorized Access to Prices
CVE-2026-39662
A security issue in ProWCPlugins Product Price by Formula for WooCommerce can allow unauthorized access to product prices. This means that someone could potentially see or change prices without permis...
5.3
Ultimate Member: Incorrect Access Control Exposes Sensitive Data
CVE-2026-39659
A security issue in Ultimate Member could allow unauthorized users to access sensitive data. This is because access control settings are not properly enforced. To fix this, update to a version of Ulti...
5.3
LeadLovers Forms Incorrect Access Control Puts Data at Risk
CVE-2026-39657
The LeadLovers Forms application has a security flaw that allows unauthorized users to access sensitive data. This issue affects all versions of LeadLovers Forms up to and including 1.0.2. To fix this...
5.3