Monitor vulnerabilities that affect your stack. Sign up free to get alerts when software you use is affected.

CVE Vulnerabilities - 16 April 2026

RSS

965 vulnerabilities published on 16 April 2026

Severity:
Airflow Example Code Allows Untrusted Users to Execute Arbitrary Code
CVE-2025-54550 GHSA-q2hg-643c-gw8h
An example code in Airflow's documentation uses a method to read data that can be exploited by a trusted user with UI access to run arbitrary code on the worker. This example is not intended for produ...
8.1
ManageEngine PAM360 and Password Manager Pro SQL Injection Flaw
CVE-2026-5785
Vulnerabilities in ManageEngine PAM360 and Password Manager Pro allow attackers to inject malicious SQL code and potentially access sensitive data. If exploited, this could lead to unauthorized access...
8.1
Luanti 5 before 5.15.2 Allows Malicious Modules to Access Sensitive Data
CVE-2026-40960
A security issue in Luanti 5 before 5.15.2 allows a specially crafted module to potentially access sensitive data. This is a concern because it could allow unauthorized access to your system. You shou...
8.1
Vite+ allows attackers to delete or rewrite files outside its cache directory
GHSA-33r3-4whc-44c2
A vulnerability in the Vite+ `downloadPackageManager()` function allows an attacker to manipulate the file system outside the intended cache location, potentially leading to data loss or malicious fil...
8.1
DOMPurify's tag filtering allows forbidden tags to pass
GHSA-39q2-94rc-95cp
DOMPurify's tag filtering can be bypassed, allowing forbidden tags to be added to HTML. This can happen when using both the 'ADD_TAGS' function and the 'FORBID_TAGS' list together. To fix this, update...
8.1
Authentik: Inadequate Session Deletion in Database Storage
CVE-2025-29928 BIT-authentik-2025-29928
If you're using Authentik's non-default database session storage, deleting sessions won't log out users. This means users can keep accessing Authentik even after sessions are deleted. To fix this, upd...
8.0
PySpector Plugin Code Execution Bypass via Incomplete Validation
GHSA-vp22-38m5-r39r
An attacker can inject malicious code into PySpector plugins, allowing them to execute arbitrary code within the PySpector process. This happens because the plugin security validator has a list of for...
7.9
Flowise: Unauthenticated Access to Confidential OAuth Tokens
GHSA-6f7g-v4pp-r667
Flowise has a security issue that allows anyone to access sensitive OAuth tokens without logging in. This can happen if a public chatflow is configured with an OAuth credential. To fix this, users sho...
7.8
Mako: Untrusted File Access via Malformed URI in Template Files
GHSA-v92g-xgxw-vvmm
A security issue in the Mako templating library can allow access to sensitive files on your system if you pass untrusted input to it. This could let an attacker read any file that your system's user h...
7.8
Eaton Intelligent Power Protector can run malicious code if package is tampered with
CVE-2026-22619
If an attacker can access and modify the Eaton Intelligent Power Protector software package, they may be able to run unauthorized code on your computer. This is a significant risk, and we recommend up...
7.8
Flowise: Unauthenticated Password Reset Allows Hacker Access
GHSA-f6hc-c5jr-878p
Flowise users are at risk of having their passwords reset by an unauthorized person, which could let them access the system without a password. This issue affects Flowise version 3.0.12. To fix the pr...
7.7
Flowise: Unauthenticated Access to Sensitive Chatflow Data
GHSA-6f7g-v4pp-r667
Flowise, a chatbot platform, allows unauthenticated access to chatflow configurations, which can reveal internal workflow data and OAuth credential identifiers. This can be used to obtain valid OAuth ...
7.7
Flowise Allows Unauthenticated Root Access via Malicious Request
GHSA-cvrr-qhgw-2mm6
Flowise, a business process management tool, has a security flaw that lets anyone access its system and execute commands with high-level privileges without needing a password. This means an attacker c...
7.7
Flowise: Unauthenticated Remote Code Execution via Parameter Override
GHSA-cvrr-qhgw-2mm6
Flowise allows attackers to execute arbitrary system commands without authentication by exploiting a flaw in its validation checks. This can happen if an attacker sends a specially crafted HTTP reques...
7.7
Flowise: Sensitive Data Leaked in Public Chatbot Configuration
GHSA-4jpm-cgx2-8h37
Flowise's public chatbot configuration API allows unauthorized access to sensitive data, including API keys and login credentials, by using a chatflow UUID. This can lead to data theft and unauthorize...
7.7
Kyverno apiCall Exposes ServiceAccount Token to External Endpoints
GHSA-8wfp-579w-6r25
A setting in Kyverno's apiCall service mode automatically sends your Kubernetes ServiceAccount token to external websites, making it possible for attackers to steal your credentials. This is a securit...
7.7
Kyverno apiCall Exposes ServiceAccount Token to External Endpoints
GHSA-8wfp-579w-6r25
Kyverno's apiCall service mode automatically shares a sensitive token with external or attacker-controlled websites, potentially allowing unauthorized access. This behavior is not documented and can b...
7.7
Kyverno: Multiple Namespaces Can Read Each Other's ConfigMaps
GHSA-cvq5-hhx3-f99p
Kyverno, a Kubernetes policy engine, has a security issue that allows administrators of one namespace to read ConfigMaps from other namespaces. This is a serious security risk in multi-tenant clusters...
7.7
Kyverno: Unauthorized Access to ConfigMaps in Other Namespaces
GHSA-cvq5-hhx3-f99p
A vulnerability in Kyverno allows a user with admin privileges in one namespace to access ConfigMaps in other namespaces. This is a security risk in multi-tenant Kubernetes clusters. To fix this, upda...
7.7
Weblate ZIP downloads may extract malicious files
CVE-2026-34242 GHSA-hv99-mxm5-q397
Weblate's ZIP download feature in older versions didn't check files for safety, which could allow attackers to extract malicious code or content. This issue has been fixed in version 5.17, so update t...
7.7
Flowise Software Can Be Tricked to Make Unauthorized Internet Requests
GHSA-qqvm-66q4-vf5c
Some parts of Flowise software can bypass security checks and make requests to any website, even if it's not supposed to. This means unauthorized access to sensitive data could occur. Update to the la...
7.6
wger: Unauthorized access to global gym settings
GHSA-xppv-4jrx-qf8m CVE-2026-40474
A security issue allows low-privileged users to change global gym settings, potentially causing unintended consequences. This is because the system declares a permission requirement but doesn't enforc...
7.6
ASP.NET Core can be crashed by a specially crafted internet packet
CVE-2026-25667 BIT-dotnet-sdk-2026-25667
An attacker can send a malicious packet to a server running ASP.NET Core, causing it to consume excessive CPU resources. This can happen in versions of ASP.NET Core running on .NET 8.0 before 8.0.22 a...
7.5
Malformed cookie bypasses authentik authentication with some proxies
CVE-2026-25748 BIT-authentik-2026-25748
An attacker could create a malformed cookie that bypasses authentik authentication when using certain reverse proxies. This could give an attacker access to your application. Update to authentik 2025....
7.5
Apache ActiveMQ Can Run Out of Memory with Certain TLS Handshakes
CVE-2026-39304 GHSA-5568-6qcg-g7fx BIT-activemq-2026-39304
Apache ActiveMQ versions 5.19.4 and earlier, and 6.0.0 to 6.2.3, are vulnerable to a denial of service attack that can cause the software to run out of memory when handling certain types of secure con...
7.5