Monitor vulnerabilities that affect your stack. Sign up free to get alerts when software you use is affected.

CVE Vulnerabilities - 16 April 2026

RSS

962 vulnerabilities published on 16 April 2026

Severity:
Mathjs expression parser allows arbitrary JavaScript execution
GHSA-29qv-4j9f-fjw5 CVE-2026-40897
If users can input math expressions in your app, a bad actor could inject malicious code. This affects mathjs versions before 15.2.0. To stay safe, update to version 15.2.0 or later.
8.8
My Calendar Plugin Exposes Private Events on WordPress Sites
GHSA-2mvx-f5qm-v2ch CVE-2026-40308
An attacker can view private or hidden calendar events on any WordPress site, or crash the site on single-site installations. This can happen because the My Calendar plugin doesn't properly check who ...
8.8
ACME Lego: Arbitrary File Write via Path Traversal in Webroot HTTP-01 Provider
GHSA-qqx8-2xmm-jrv8 CVE-2026-40611
### Summary The webroot HTTP-01 challenge provider in lego is vulnerable to arbitrary file write and deletion via path traversal. A malicious ACME server can supply a crafted challenge token containi...
8.8
Weblate User Patching API Allows Unauthorized Edits
CVE-2026-34393 GHSA-3382-gw9x-477v
Weblate's user patching API in older versions allowed anyone to make changes to translations without proper authorization. This could lead to unauthorized edits being made to translations. Update to W...
8.8
WordPress Career Section Plugin Deletes Files on Unauthentic Clicks
CVE-2025-14868
The Career Section plugin for WordPress has a security flaw that lets attackers delete files on your website if an administrator clicks on a malicious link. This can happen if an attacker tricks an ad...
8.8
Livemesh Addons for Elementor allows attackers to access server files
CVE-2026-1620
If you use the Livemesh Addons for Elementor plugin with WordPress, an attacker could trick an administrator into installing a malicious file. This would allow the attacker to access and potentially e...
8.8
AcyMailing for WordPress: Privilege Escalation Risk for Attackers
CVE-2026-3614
The AcyMailing plugin for WordPress is vulnerable to a security risk that allows attackers to gain unauthorized access to administrative features and potentially take control of the site. This risk af...
8.8
Festo MSE6 products: Unauthorized access to test mode data
CVE-2023-3634
Some Festo MSE6 products have a hidden test mode that can be accessed by an authorized user who shouldn't have it. This could potentially allow an attacker to see sensitive information and disrupt sys...
8.8
WinMatrix Agent: Local Attackers Can Run System-Level Code
CVE-2026-6348
The WinMatrix agent from Simopro Technology has a security weakness that allows someone with a valid login on the same computer to run any code with administrator-level access, not just on that comput...
9.3
OpenHarness Allowing Sensitive Commands Through Remote Chat Sessions
CVE-2026-40502
Remote users can access and change settings in OpenHarness through chat sessions. This is a security risk because it allows unauthorized changes to the system. Update to the latest version of OpenHarn...
8.7
Apache ActiveMQ allows malicious code execution through web console
CVE-2026-34197 GHSA-rxpj-7qvf-xv32
Apache ActiveMQ Classic's web console has a security flaw that lets an attacker inject malicious code and take control of the system. This can happen if an attacker logs in to the console and uses a s...
8.8 KEV
Paperclip: Unauthorized access to Gmail account via connected ChatGPT/OpenAI app
GHSA-gqqj-85qm-8qhf
A security issue in Paperclip allowed it to access your connected Gmail account and send emails without permission. This happened because of a misconfigured setting that allowed the program to bypass ...
8.7
Angular SSR: Attacker Can Hijack Internal APIs with Malicious URLs
GHSA-45q2-gjvg-7973
A vulnerability in Angular's Server-Side Rendering (SSR) feature allows an attacker to trick the application into thinking a malicious website is the local origin, potentially exposing internal APIs o...
8.7
free5GC is an open-source implementation of the 5G core network. In versions 4.2.1 and below of the UDR service, the handler for creating or updating Traffic Influence Subscriptions checks whether ...
GHSA-jgq2-qv8v-5cmj CVE-2026-40248
free5GC is an open-source implementation of the 5G core network. In versions 4.2.1 and below of the UDR service, the handler for creating or updating Traffic Influence Subscriptions checks whether the...
8.7
Free5GC UDR lets attackers access sensitive data without login
GHSA-x5r2-r74c-3w28 CVE-2026-40247
The Free5GC UDR system has a security weakness that allows unauthorized users to access sensitive data by sending a special request. This means attackers can potentially get access to confidential inf...
8.7
Free5GC UDR allows unauthorized deletion of traffic influence subscriptions
GHSA-g9cw-qwhf-24jp CVE-2026-40246
The free5GC UDR service has a security weakness that lets anyone delete traffic influence subscriptions without logging in. This is because the system doesn't properly check the path of incoming reque...
8.7
Flowise: Data Exfiltration via Neo4j Database Tampering
GHSA-28g4-38q8-3cwc
The Flowise GraphCypherQAChain node in Flowise allows malicious users to inject arbitrary commands into the Neo4j database, potentially leading to unauthorized data access, modification, or deletion. ...
8.7
CloneSite Plugin Allows Remote Code Execution in WWBN AVideo
GHSA-xr6f-h4x7-r6qp
The CloneSite plugin in WWBN AVideo contains a vulnerability that allows an attacker to inject malicious commands, potentially leading to remote code execution on the server. This could allow an attac...
8.7
DataEase versions 2.10.20 and below: Unauthorized database access
CVE-2026-40900
DataEase versions 2.10.20 and below contain a security risk that allows an attacker with valid login credentials to access and modify your database. This is a serious issue that allows unauthorized ch...
8.7
MCP-Framework: Large HTTP request crashes server
GHSA-353c-v8x9-v7c3 CVE-2026-39313
A large HTTP request can cause the server to run out of memory and crash. This can happen if an attacker sends a very large POST request to the server. To fix this, MCP-Framework should set a limit on...
8.7
ApostropheCMS: Malicious code can be injected in SEO fields
CVE-2026-35569 GHSA-855c-r2vq-c292
ApostropheCMS versions 4.28.0 and earlier contain a security flaw that allows an attacker to inject malicious code into SEO fields, potentially allowing them to access sensitive user data and perform ...
8.7
Google Chrome: Malicious SPDY Frames Can Crash Service
GHSA-pc3f-x583-g7j2 CVE-2026-35469
A security flaw in the SPDY protocol used by Google Chrome can allow a malicious actor to send a special type of packet that crashes the service. This affects any program using the spdystream library,...
8.7
DataEase versions 2.10.20 and below: SQL injection risk in data sorting
CVE-2026-33084
DataEase users may be at risk of unauthorized data access due to a flaw in the data sorting feature. An attacker with an account on the platform can potentially inject malicious code to access sensiti...
8.7
DataEase SQL Injection in Sorting Direction Field
CVE-2026-33083
DataEase versions 2.10.20 and below are vulnerable to a security issue that allows an attacker to access and manipulate data in the database. This could lead to unauthorized data extraction or the web...
8.7
DataEase SQL Injection in Dataset Export Functionality
CVE-2026-33082
Using DataEase versions 2.10.20 and below, an attacker can inject malicious SQL code into the dataset export feature, potentially stealing sensitive data or disrupting the application. This issue has ...
8.7