Monitor vulnerabilities that affect your stack. Sign up free to get alerts when software you use is affected.

CVE Vulnerabilities - 16 April 2026

RSS

950 vulnerabilities published on 16 April 2026

Severity:
Airflow: Exposed Tokens Allow UI Users to Act as Dag Authors
CVE-2026-31987 GHSA-phv5-vq5p-qhp7
Airflow's task logs revealed sensitive information, potentially allowing unauthorized users to create workflows as if they were administrators. This could lead to data breaches or unauthorized changes...
6.9
PySpector Plugin Code Execution Bypass
GHSA-vp22-38m5-r39r
A security weakness in PySpector's plugin validation allows an attacker to inject malicious code, potentially allowing them to execute arbitrary code within the PySpector process. This could happen if...
6.9
openCryptoki Library on Linux and AIX: Out-of-Bounds Reads Possible
CVE-2026-40253
The openCryptoki library, used for Linux and AIX, has a vulnerability in its decoding functions that can allow an attacker to access sensitive data by sending malformed files. This can happen when usi...
6.8
pypdf RAM exhaustion through malicious PDF images
GHSA-x284-j5p8-9c5p
A malicious PDF file can cause your system to run out of memory. This is a risk if you use the pypdf library to process PDFs. To stay safe, update to the latest version of pypdf or apply the suggested...
6.8
pypdf: Malicious PDFs can cause slow processing
GHSA-4pxv-j86v-mhcw
Using pypdf to process a malicious PDF file in a specific way can cause it to take a long time to load. This issue is fixed in version 6.10.2 of the software. If you can't update right away, you can t...
6.8
pypdf: Large PDF can exhaust your computer's memory
GHSA-7gw9-cf7v-778f
A malicious PDF file can cause your computer to run out of memory, leading to system slowdowns or crashes. This affects systems using the pypdf library to handle PDFs. To fix this, update to version 6...
6.8
Weblate translation memory API exposes sensitive data to unauthorized users
CVE-2026-33220 GHSA-mqph-7h49-hqfm
Weblate's translation memory API in versions prior to 5.17 doesn't control who can access certain data. If you're using an outdated version, you may be exposing sensitive information. Update to versio...
6.8
ProcessWire CMS: Authenticated Admins Can Access Internal Hosts
CVE-2026-40500 GHSA-gmwr-9j4p-96vm
A vulnerability in ProcessWire's admin panel allows authenticated administrators to access internal or external hosts by entering malicious URLs. This could lead to network scanning and access to sens...
6.1
Dell PowerScale OneFS exposes sensitive user credentials in logs
CVE-2025-43937
Dell PowerScale OneFS versions prior to 9.12.0.0 store user credentials in log files, which can be accessed by a low-privileged attacker with local access. This could allow an attacker to steal user c...
6.6
authentik: Access Tokens Can Be Stolen and Used to Impersonate Users
CVE-2024-47077 BIT-authentik-2024-47077
A security issue in older versions of authentik allows an application to steal access tokens and use them to pretend to be a user. This could let an app access resources it shouldn't. Update to versio...
6.5
LangChain Text Splitters: Attackers Can Redirect to Internal Servers
GHSA-fv5p-p927-qmxr
A vulnerability in LangChain Text Splitters allows attackers to redirect requests to internal servers or cloud metadata endpoints, potentially exposing sensitive data. This could happen if an applicat...
6.5
Paperclip: Arbitrary File Read via Agent-Controlled adapterConfig.instructionsFilePath
GHSA-3pw3-v88x-xj24
### Summary Paperclip contains an arbitrary file read vulnerability that allows an attacker with an Agent API key to read files from the Paperclip server host filesystem. The vulnerability occurs beca...
6.5
LINE iOS app: Repeated OS dialogs can crash your iPhone
CVE-2026-3861
The LINE app for iOS has a security issue that can cause your iPhone to freeze or become unresponsive if you visit a malicious website. This only affects older versions of the app, and updating to the...
6.5
WordPress Accessibility Suite plugin allows attackers to steal WordPress database data
CVE-2026-3773
This plugin, used by WordPress sites, allows attackers to access sensitive information if they have a low-level user account. This is because the plugin doesn't properly protect against a type of atta...
6.5
Eaton Intelligent Power Protector: Unauthorized Login Attempts Possible
CVE-2026-22616
The Eaton Intelligent Power Protector software doesn't limit how many times you can try to log in to the web interface, making it possible for someone to repeatedly try to guess your username and pass...
6.5
OpenHarness allows unauthorized access to sensitive files via malicious chat commands
CVE-2026-40503
OpenHarness users with chat access can read sensitive files if an attacker tricks them into entering malicious commands. This can compromise sensitive project data. Update to a fixed version of OpenHa...
7.1
Email Encoder plugin for WordPress: Malicious Email Links
CVE-2026-2840
The Email Encoder plugin for WordPress is vulnerable to a security threat that allows attackers to inject malicious code into email links. This can happen when a user accesses a website with the vulne...
6.4
BetterDocs Plugin for WordPress: Stored Cross-Site Scripting Risk
CVE-2026-3875
The BetterDocs plugin for WordPress contains a security flaw that allows attackers to inject malicious code into certain pages. This could lead to unauthorized actions on your website. Update the plug...
6.4
Livemesh Addons for Elementor: Unauthorized Data Changes and Malicious Scripts
CVE-2026-1572
Attackers with administrator access can change plugin settings and inject malicious scripts into the plugin settings page, which can run when an administrator views the page. This can happen if the at...
6.4
WP Maps Plugin Allows Malicious Code Injection on WordPress Sites
CVE-2025-13364
The WP Maps plugin for WordPress contains a security flaw that can be exploited by attackers with contributor-level access or higher. This flaw could allow an attacker to inject malicious code into a ...
6.4
Vantage WordPress Theme Allows Attackers to Inject Malware
CVE-2026-5070
The Vantage theme for WordPress, in versions up to 1.20.32, allows attackers with contributor-level access to inject malicious code into website pages. This can lead to malware execution when a user v...
6.4
WP Docs Plugin for WordPress Allows Malicious Scripts to Run
CVE-2026-3878
The WP Docs plugin for WordPress has a security flaw that allows attackers with subscriber-level access or higher to inject malicious scripts into websites. This can lead to unauthorized actions, such...
6.4
WordPress Shortcodes Ultimate Plugin Allows Malicious Script Injection
CVE-2026-3885
The WordPress plugin Shortcodes Ultimate allows attackers to inject malicious scripts into website pages, potentially harming visitors. This vulnerability affects all versions up to 7.4.9. Update to t...
6.4
WP YouTube Lyte plugin: Malicious scripts can be injected via YouTube videos
CVE-2026-3299
The WP YouTube Lyte plugin for WordPress has a security issue that allows an attacker with contributor-level access to inject malicious code into websites using the plugin. This can cause problems for...
6.4
OpenClaw: TOCTOU read in exec script preflight
GHSA-gj9q-8w99-mp8j
## Summary OpenClaw's exec script preflight validator previously validated and then read a script by mutable pathname. A local race could swap the path between validation and read, causing preflight ...
6.3