Monitor vulnerabilities that affect your stack. Sign up free to get alerts when software you use is affected.

CVE Vulnerabilities - 17 April 2026

RSS

76 vulnerabilities published on 17 April 2026

Severity:
Backdoor in Accordion and Accordion Slider plugin allows attackers to inject spam
CVE-2026-6443
The Accordion and Accordion Slider plugin for WordPress versions 1.4.6 may allow attackers to secretly install malicious code. This can lead to spam being injected into your website. You should remove...
9.8
Sparx Pro Cloud Server Database SQL Injection Risk
CVE-2025-15625
An attacker can execute unauthorized database commands to steal or modify data. This is a serious risk because it can allow an attacker to access sensitive information or disrupt the database. To prot...
9.5
Sparx EA Pro Cloud Server Stores Passwords in Plain Text
CVE-2025-15624
If OpenID is used for authentication, Sparx EA Pro Cloud Server stores users' passwords without encryption. This means that if an unauthorized person gains access to the server, they can easily access...
9.3
Sparx Pro Cloud Server Leaks Passwords to Unauthorized Users
CVE-2025-15623
If you use Sparx Pro Cloud Server, a lack of proper authentication allows anyone to access your database password, potentially giving them control over your system. This is a serious concern because i...
9.3
Note Mark allows attackers to inject malicious code into notes
GHSA-9pr4-rf97-79qh CVE-2026-40262
A security issue allows attackers to upload and execute malicious code in Note Mark notes. This means that if you use Note Mark, you could be at risk of having your account taken over. To stay safe, c...
8.7
Cloud Foundry UAA Token Bypass: Attackers Can Access Protected Systems
CVE-2026-22734
A security issue in Cloud Foundry's UAA system allows attackers to get a special token that lets them access systems that should be protected. This can happen if a specific security feature is turned ...
8.6
Rapid7 Insight Agent allows attackers to gain SYSTEM level control on Windows
CVE-2026-6482
The Rapid7 Insight Agent on Windows is vulnerable to a security threat. An attacker can exploit this vulnerability by tricking the agent into running malicious code, which can then gain control of the...
8.5
Dell PowerProtect Data Domain: Unauthorized Access to System
CVE-2026-23853
Dell PowerProtect Data Domain systems with outdated operating system versions are at risk of being accessed by unauthorized users. This could allow malicious individuals to gain control of the system....
8.4
Unauthorized user may delete secrets, causing service disruption
CVE-2026-3605
A user with authorized access to some secrets in Vault may accidentally or intentionally delete other secrets they are not allowed to touch, causing disruptions to the service. This issue affects Vaul...
8.1
Dell PowerProtect Data Domain BoostFS: Credentials Exposed by Local Attack
CVE-2025-36568
A security issue in Dell PowerProtect Data Domain BoostFS allows an attacker with local access to see sensitive login credentials. This could let the attacker use those credentials to access the syste...
7.8
Dell PowerProtect Appliances Leak Sensitive Info in Log Files
CVE-2026-23775
Dell PowerProtect Data Domain appliances with certain software versions may leak sensitive information, such as login credentials, into log files. This could potentially be exploited by an attacker wi...
7.6
Unlimited Elements for Elementor plugin: Malicious File Access on WordPress
CVE-2026-4659
A security issue in the Unlimited Elements for Elementor plugin for WordPress allows attackers to view sensitive files on the website, such as the password file. This is possible when an attacker with...
7.5
Vault: Unauthenticated attackers can block root token operations
CVE-2026-5807
An attacker can repeatedly initiate or cancel root token generation or rekey operations, blocking legitimate users from completing these tasks. This can disrupt the operation of Vault. Update to Vault...
7.5
Vault Leaks Authentication Token in Auth Plugin
CVE-2026-4525
If you use an auth mount that passes the Authorization header and uses it to log in to Vault, an attacker could get the Vault token. This could happen if you're using a vulnerable version of Vault. To...
7.5
Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions 7.7.1.0 through 8.5, LTS2025 release version 8.3.1.0 through 8.3.1.20, LTS2024 release versions 7...
CVE-2026-23776
Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions 7.7.1.0 through 8.5, LTS2025 release version 8.3.1.0 through 8.3.1.20, LTS2024 release versions 7.13...
7.2
Dell PowerProtect Data Domain: Unprivileged Access via Command Injection
CVE-2026-23778
Dell PowerProtect Data Domain's command injection flaw allows a highly privileged attacker to potentially gain complete control over the system if they have remote access. This could happen if an atta...
7.2
High Privilege User Can Bypass Security Sandbox in JetBrains YouTrack
CVE-2026-33392
A security issue in JetBrains YouTrack allows a high-privilege user to bypass security restrictions, potentially allowing them to execute malicious code. This could lead to unauthorized access and pot...
7.2
CubeCart: Admins Can Run Any System Command
CVE-2026-21719
A security issue in CubeCart's administrative interface allows an attacker with admin privileges to execute any system command, potentially leading to data loss or system compromise. This affects all ...
8.6
WP Statistics plugin on WordPress can inject malicious scripts
CVE-2026-5231
The WP Statistics plugin for WordPress is vulnerable to a type of cyber attack that injects malicious code into administrator pages. This could allow an attacker to take control of your site or steal ...
7.2
MobaXterm Home Edition: Uncontrolled Search Path Leads to Local Attack
CVE-2026-6421
A security issue in MobaXterm Home Edition versions up to 26.1 could allow an attacker to gain unauthorized access to your system. This is a local attack, meaning it requires physical access to your c...
7.3
Adobe Acrobat: Malicious PDFs can cause memory crashes
GHSA-3crg-w4f6-42mx CVE-2026-40260
A malicious PDF can be crafted to consume all available memory on a system that uses the pypdf library, potentially causing the program to freeze or crash. This affects systems that parse XMP metadata...
6.9
Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions 7.7.1.0 through 8.5, LTS2025 release version 8.3.1.0 through 8.3.1.20, LTS2024 release versions 7...
CVE-2026-23779
Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions 7.7.1.0 through 8.5, LTS2025 release version 8.3.1.0 through 8.3.1.20, LTS2024 release versions 7.13...
6.7
Tutor LMS plugin for WordPress exposes sensitive data to attackers
CVE-2026-6080
The Tutor LMS plugin for WordPress has a security flaw that can allow attackers with admin access to steal sensitive information from the database. This affects versions up to 3.9.8. Update to the lat...
6.5
wpForo Forum Plugin Allows Unauthenticated Post Editing
CVE-2026-4666
The wpForo Forum plugin for WordPress has a security flaw that allows anyone to edit any forum post, including private ones, without permission. This is because the plugin doesn't properly check user ...
6.5
MasterStudy LMS Plugin for WordPress at Risk of Data Exposure
CVE-2026-4817
An outdated version of the MasterStudy LMS WordPress Plugin (up to 3.7.25) allows attackers to potentially steal sensitive user information, such as login credentials and session tokens, by manipulati...
6.5