Monitor vulnerabilities that affect your stack. Sign up free to get alerts when software you use is affected.

CVE Vulnerabilities - 16 April 2026

RSS

965 vulnerabilities published on 16 April 2026

Severity:
Paperclip: Malicious Skills Can Steal and Wipe User Data
GHSA-w8hx-hqjv-vjcq
Certain skills can secretly access and delete all user data by exploiting a weakness in the Paperclip workspace service. This means sensitive information such as API keys, passwords, and database cred...
7.3
Adobe Acrobat and pypdf PDF parsing errors can cause RAM exhaustion
GHSA-x284-j5p8-9c5p
A flaw in Adobe Acrobat and pypdf can cause a malicious PDF to crash your system by consuming all available memory. This can happen if a hacker creates a specially crafted PDF with an image that's too...
7.3
pypdf: Long Runtimes from Malicious PDFs in Certain Scenarios
GHSA-4pxv-j86v-mhcw
A malicious PDF can cause pypdf to take a long time to process in certain situations. This is a security risk because an attacker might use this to slow down or even crash a system. To fix this, updat...
7.3
pypdf: Large PDFs can cause memory exhaustion
GHSA-7gw9-cf7v-778f
An attacker might create a large PDF that uses a specific compression method, which could cause the computer to run out of memory. This affects anyone using pypdf, a Python library for working with PD...
7.3
Flowise: Unsecured File System Writes in Vector Store
GHSA-w6v6-49gh-mc9w
An attacker with proper credentials can write files to the server's file system. This occurs when an authenticated user provides a custom 'basePath' that is not properly validated. To fix this, ensure...
7.3
Opam Allow Path Traversal When Installing Packages
CVE-2026-41082
Opam, a package manager for OCaml, contains a flaw that allows attackers to install packages in unintended locations. This could lead to malicious code being installed on a system. Update to a version...
7.3
Simple Music Cloud System Exposed to Malicious Database Access
CVE-2026-37337
The Simple Music Cloud System's playlist view feature allows hackers to inject harmful code into the database, potentially giving them access to sensitive user information and control over the system....
7.3
Simple Music Cloud Community System: SQL Injection in view_music.php
CVE-2026-37336
The Simple Music Cloud Community System version 1.0 has a security weakness in its /music/view_music.php file. This means an attacker could potentially access or modify sensitive data. Update the soft...
7.3
Dell Storage Manager - Replay Manager for Microsoft Servers Elevation of Privileges
CVE-2026-23772
A security weakness in Dell Storage Manager's Replay Manager for Microsoft Servers version 8.0 allows a malicious user with limited access to gain more powerful user rights within the system. This cou...
7.3
Authentik: Malicious Users Can Execute Arbitrary Code
CVE-2026-25227 BIT-authentik-2026-25227
A vulnerability in Authentik's delegated permissions allows a malicious user to execute arbitrary code on the server. This can happen when a user has permission to view property mappings or expression...
7.2
Authentik: Unauthorized Token Access with Client Credentials or Device Code
CVE-2024-52287 BIT-authentik-2024-52287
An attacker could obtain an access token with scopes not set up in Authentik. This means they might be able to access features or data they shouldn't have access to. Update to version 2024.8.5 or 2024...
6.4
Prismatic plugin for WordPress: Stored Cross-Site Scripting via 'prismatic_encoded' shortcode
CVE-2026-3876
The Prismatic plugin for WordPress has a security flaw that allows attackers to inject malicious code into website pages. This could allow them to take control of your site or steal user data. Update ...
7.2
Flowise: Attackers Can Redirect API Requests to Sensitive Systems
GHSA-6r77-hqx7-7vw8
Flowise's API Chain feature allows attackers to inject malicious prompts that can redirect API requests to sensitive internal systems, potentially leading to internal network reconnaissance and data t...
7.1
Flowise: Attackers can hijack Flowise API requests to internal systems
GHSA-6r77-hqx7-7vw8
Unauthenticated attackers can use Flowise's API to make unauthorized requests to internal systems, potentially leading to data theft or network reconnaissance. This is possible due to a security weakn...
7.1
Flowise: Server-Side Request Forgery Attacks Can Succeed
GHSA-2x8m-83vc-6wv4
Flowise's security features to prevent Server-Side Request Forgery (SSRF) contain flaws that allow attackers to bypass restrictions. This means they can trick Flowise into making unwanted requests to ...
7.1
Flowise: SSRF Protection Bypass (TOCTOU & Default Insecure)
GHSA-2x8m-83vc-6wv4
### Summary The core security wrappers (secureAxiosRequest and secureFetch) intended to prevent Server-Side Request Forgery (SSRF) contain multiple logic flaws. These flaws allow attackers to bypass t...
7.1
Flowise: SSRF Protection Bypass via Unprotected Built-in HTTP Modules in Custom Function Sandbox
GHSA-xhmj-rg95-44hv
### Summary A Server-Side Request Forgery (SSRF) protection bypass vulnerability exists in the Custom Function feature. While the application implements SSRF protection via HTTP_DENY_LIST for axios an...
7.1
Flowise: Hackers Can Access Internal Resources Through Custom Function
GHSA-xhmj-rg95-44hv
A security weakness in Flowise's Custom Function feature allows attackers to access internal network resources. This can happen when an authenticated user uses a built-in HTTP module in the Node.js sa...
7.1
Flowise: Malicious JavaScript Uploads Allowed
GHSA-rh7v-6w34-w2rr
Flowise allows uploading JavaScript files through a configuration file, which can lead to the execution of malicious code on the server. This could allow an attacker to access and control the server. ...
7.1
Flowise: Malicious JavaScript Uploads via Chatflow Configuration
GHSA-rh7v-6w34-w2rr
Flowise allows malicious JavaScript files to be uploaded through its Chatflow configuration, enabling potential Remote Code Execution attacks. This is because the application does not properly validat...
7.1
AMD SMM Driver Privilege Escalation Risk
CVE-2025-54502
A critical issue in the AMD SMM driver could allow a highly skilled attacker with direct access to the system to gain more control than they should have, potentially allowing them to run malicious cod...
7.1
PHP Protobuf: Malicious Messages Can Crash Your Application
GHSA-qjfj-3mm5-vrjg
A security issue in the PHP Protobuf library can cause your application to crash if it receives a specially crafted message. This can happen if you're not careful when processing input from unknown so...
7.1
PHP Protobuf Library Can Crash with Malicious Input
CVE-2026-6409
An attacker can crash a PHP application that uses the Protobuf library by sending specially crafted messages. This can cause the application to become unavailable, impacting users. To protect against ...
7.1
Daylight Studio FuelCMS Password Reset Token Leaked via Malicious Email
CVE-2026-30459
A security issue in Daylight Studio FuelCMS v1.5.2 allows attackers to reset a user's password without knowing their current password. This is done by sending a specially crafted email link to the use...
7.1
Free5GC UDR Service Allows Unintended Subscription Updates
GHSA-gx38-8h33-pmxr CVE-2026-40249
A flaw in the Free5GC UDR service allows unauthorized updates to Policy Data notification subscriptions if the service receives invalid or incomplete input. This could lead to unintended modifications...
6.9