Monitor vulnerabilities that affect your stack. Sign up free to get alerts when software you use is affected.

CVE Vulnerabilities - 11 April 2026

RSS

42 vulnerabilities published on 11 April 2026

Severity:
Sonos Era 300: Remote Attackers Can Execute Code on Your Device
CVE-2026-4149
A bug in the Sonos Era 300's handling of network requests allows hackers to execute code on your device without needing a password. This could allow them to access or manipulate your device's settings...
10.0
AWS CLI Command Injection in aws-mcp-server Allows Remote Code Execution
CVE-2026-5059
An attacker can execute arbitrary code on aws-mcp-server installations without needing a password. This is a serious security risk because it allows unauthorized access to the server. Update aws-mcp-s...
9.8
aws-mcp-server Command Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of aws-mcp-server. Authenticatio...
CVE-2026-5058
aws-mcp-server Command Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of aws-mcp-server. Authentication i...
9.8
BuddyPress Groupblog plugin allows attackers to take control of WordPress sites
CVE-2026-5144
The BuddyPress Groupblog plugin for WordPress has a security issue that lets attackers with limited access take control of any blog on a WordPress site, including the main site. This can happen when a...
8.8
Labcenter Electronics Proteus: Malicious File Can Run Code Remotely
CVE-2026-5496
If you use Labcenter Electronics Proteus, you should be aware that a malicious file can be used to run unauthorized code on your system if you open it or visit a bad website. This requires user intera...
7.8
Labcenter Electronics Proteus Malicious File Can Run Code on Your Computer
CVE-2026-5495
Labcenter Electronics Proteus software has a security flaw that lets hackers run malicious code on your computer if you open a specially crafted file or visit a website that contains the file. This ca...
7.8
Labcenter Electronics Proteus Malicious File Can Execute Code on Your Computer
CVE-2026-5494
A flaw in Labcenter Electronics Proteus allows hackers to execute malicious code on your computer if you open a specially crafted file or visit a malicious website. This can happen if you're not caref...
7.8
Labcenter Electronics Proteus PDSPRJ File Parsing Error Allows Remote Code Execution
CVE-2026-5493
A security flaw in Labcenter Electronics Proteus allows hackers to run malicious code on affected computers if a user opens a specially crafted file or visits a malicious website. This could potential...
7.8
NoMachine Privilege Escalation Risk: Executable Code as Admin
CVE-2026-5055
NoMachine software may allow a local attacker to gain administrator access, potentially taking control of the system. This is a concern for businesses that use NoMachine for remote access and collabor...
7.8
NoMachine Privilege Escalation Risk on Local Machines
CVE-2026-5054
NoMachine users are at risk of having their system compromised by unauthorized access if an attacker can run low-privileged code on the same machine. This can happen if the NoMachine software does not...
7.8
GIMP may let attackers run malicious code if you open a bad XPM file
CVE-2026-4154
If someone tricks you into opening a malicious XPM file or visiting a fake website with a malicious XPM file, an attacker might be able to run malicious code on your computer. This affects GIMP instal...
7.8
GIMP May Let Attackers Run Code on Your Computer
CVE-2026-4153
GIMP, a popular image editing software, has a security flaw that could allow hackers to run malicious code on your computer if you open a specially crafted file or visit a malicious website. This mean...
7.8
GIMP Can Be Compromised by Visiting a Malicious Website or Opening a Bad File
CVE-2026-4152
If a user opens a malicious file or visits a malicious website, an attacker can potentially take control of their GIMP installation. This is a serious concern, especially for users who work with image...
7.8
GIMP Can Run Malicious Code from Visited Web Pages
CVE-2026-4151
A security flaw in GIMP can allow hackers to run malicious code on your computer if you visit a bad website or open a malicious file. To stay safe, you should update GIMP to the latest version or use ...
7.8
GIMP Crash and Remote Code Execution when Opening Malicious PSD Files
CVE-2026-4150
This vulnerability in GIMP allows hackers to execute malicious code on a computer if a user opens a specially crafted PSD file or visits a malicious website. If you use GIMP, update to the latest vers...
7.8
ChargePoint Home Flex allows hackers to take control of your device
CVE-2026-4157
ChargePoint Home Flex devices are at risk of being hacked by someone on the same network, potentially allowing them to access and control the device. This is a serious issue because hackers can exploi...
7.5
ChargePoint Home Flex Charger Allows Hackers to Run Code Remotely
CVE-2026-4156
If an attacker is connected to the same network as a ChargePoint Home Flex charger, they can potentially access and control the device, potentially leading to unauthorized access to your home's electr...
7.5
ChargePoint Home Flex Exposes Sensitive Data in Charging Station
CVE-2026-4155
A vulnerability in ChargePoint Home Flex charging stations can reveal sensitive information without requiring login credentials. This could allow an attacker to access stored credentials and gain furt...
7.5
OpenClaw Authentication Bypass: Attackers Can Access Without Logging In
CVE-2026-3690
A security issue in OpenClaw allows attackers to access the system without entering a valid login. This means unauthorized users can potentially access sensitive areas of OpenClaw. To protect your sys...
7.4
KeePassXC Can Allow Local Attackers to Escalate Privileges
CVE-2026-4158
A vulnerability in KeePassXC allows a local attacker to gain elevated access to the system if they can run low-privileged code on the target machine. This could potentially let the attacker execute ma...
7.3
Optimole WordPress Plugin Allows Attackers to Inject Malware on Any Page
CVE-2026-5217
The Optimole plugin for WordPress contains a security flaw that allows hackers to inject malicious code on any page, even if they're not logged in. This can happen when a user visits a page that has b...
7.2
NoMachine: Local Attackers Can Delete Files on Your System
CVE-2026-5053
An attacker with some privileges on a system with NoMachine installed can delete any file they choose, potentially causing data loss. This is a concern because sensitive files could be deleted, and it...
7.1
LifterLMS plugin for WordPress allows attackers to access sensitive data
CVE-2026-5207
The LifterLMS plugin for WordPress has a security flaw that allows attackers with certain permissions to view sensitive information from the plugin's database. This is a serious issue because it could...
6.5
OpenClaw Canvas Path Traversal Allows Remote Disclosure of Sensitive Data
CVE-2026-3689
An attacker can access sensitive information on your OpenClaw installation, even if they're not logged in, by manipulating the path to files used by OpenClaw. This is a serious issue because it could ...
6.5
GreenShift Plugin for WordPress: Malicious Scripts Can Be Injected
CVE-2026-4895
The GreenShift plugin for WordPress, used for animation and page building, has a security flaw. Attackers with contributor-level access can inject malicious scripts into pages, which can execute when ...
6.4