Monitor vulnerabilities that affect your stack. Sign up free to get alerts when software you use is affected.

CVE Vulnerabilities - 18 April 2026

RSS

130 vulnerabilities published on 18 April 2026

Severity:
Movary: Authenticated Users Can Access Internal Server Targets
CVE-2026-40348
A security issue in Movary versions prior to 0.71.1 allowed authenticated users to access internal server targets, potentially allowing them to discover internal hosts, test network ports, and access ...
7.7
SecureDrop Client: Compromised Server Can Damage Journalist Files
CVE-2026-35465
SecureDrop Client, used by journalists to communicate with sources, is at risk if the server they rely on is compromised. A hacker could use a security weakness to alter or delete sensitive files. Upd...
7.5
Easy Appointments Plugin Leaks Customer Data on WordPress Sites
CVE-2026-2262
The Easy Appointments plugin for WordPress exposes sensitive customer information on all sites using versions up to 3.12.21. This means attackers can access names, emails, phone numbers, and other det...
7.5
Zebra: Malicious Miners Can Split Zcash Network
GHSA-xvj8-ph7x-65gf CVE-2026-40880
A flaw in Zebra's transaction verification system allows a malicious miner to trick some nodes into accepting an invalid block, potentially disrupting the network and allowing double-spend attacks. Th...
7.2
ChurchCRM Prior to 7.2.0 Allows Attackers to Access Sensitive Data
CVE-2026-40482
The ChurchCRM system is vulnerable to a security risk that could allow hackers to access sensitive information. If left unpatched, this could lead to unauthorized access to financial and member data. ...
7.1
ChurchCRM: Unauthorized access to personal data in older versions
CVE-2026-40480
In older versions of ChurchCRM, any user with limited access can view sensitive personal information of other members. This is fixed in version 7.2.0. Update to the latest version to ensure secure acc...
7.1
Zebra Can Crash from Interrupted RPC Requests from Authorized Clients
GHSA-29x4-r6jv-ff4w
An authenticated client can crash a Zebra node by disconnecting during a request. This can happen if a client sends only part of a request and then drops the connection. To protect your Zebra nodes, m...
6.9
AsyncHttpClient Exposes Credentials in Redirects
CVE-2026-40490
The AsyncHttpClient library for Java applications shares sensitive login credentials when sending HTTP requests to a new website. This can allow an attacker to steal your login details if they control...
6.8
gdown: Malicious files can overwrite any file on your system
CVE-2026-40491
If you use outdated versions of gdown to download files from Google Drive, an attacker could create a malicious archive that overwrites important files on your system. This could lead to data loss or ...
6.5
MailKit has STARTTLS Response Injection via unflushed stream buffer that enables SASL mechanism downgrade
GHSA-9j88-vvj5-vhgr
### Summary A STARTTLS Response Injection vulnerability in MailKit allows a Man-in-the-Middle attacker to inject arbitrary protocol responses across the plaintext-to-TLS trust boundary, enabling SASL...
6.5
MailKit has STARTTLS Response Injection via unflushed stream buffer that enables SASL mechanism downgrade
GHSA-9j88-vvj5-vhgr
### Summary A STARTTLS Response Injection vulnerability in MailKit allows a Man-in-the-Middle attacker to inject arbitrary protocol responses across the plaintext-to-TLS trust boundary, enabling SASL...
6.5
AWS EFS CSI Driver allows attackers to inject arbitrary mount options
CVE-2026-6437 GHSA-mph4-q2vm-w2pw
A security issue in the AWS EFS CSI Driver allows authenticated users to inject malicious options when creating a persistent volume. This could potentially lead to unauthorized access or data corrupti...
6.9
Youzify Plugin for WordPress: Malicious Code Injection Possible
CVE-2026-1559
The Youzify plugin for WordPress has a security weakness that allows attackers to inject malicious code into pages. This could happen when an attacker with a basic account accesses a page. To protect ...
6.4
NocoBase is an AI-powered no-code/low-code platform for building business applications and enterprise solutions. Prior to version 2.0.37, NocoBase's workflow HTTP request plugin and custom request ...
GHSA-mvvv-v22x-xqwp CVE-2026-40346
NocoBase is an AI-powered no-code/low-code platform for building business applications and enterprise solutions. Prior to version 2.0.37, NocoBase's workflow HTTP request plugin and custom request act...
6.4
Zebra: Malicious Addresses Can Crash the Program
GHSA-xr93-pcq3-pxf8 CVE-2026-40881
Zebra's software can run out of memory when processing large address lists, potentially crashing the node. This issue affects all versions of Zebra prior to 4.3.1. To fix, update to version 4.3.1 or l...
6.3
Hostel plugin for WordPress: Malicious scripts can be injected via links
CVE-2026-1838
If a user clicks on a malicious link, attackers can inject scripts that can harm a website. This affects all versions of the Hostel plugin for WordPress up to 1.1.6. To protect your site, update the p...
6.1
Pretalx Email Templates Allow Malicious Emails to Be Sent as Legitimate
GHSA-jm8c-9f3j-4378
An attacker can send fake emails that appear to come from a legitimate email address, potentially phishing victims. This can happen when a user with a malicious account name is reset by an unsuspectin...
6.1
libgphoto2: Camera library allows reading sensitive data
CVE-2026-40340
A security issue in libgphoto2's camera library could allow an attacker to access sensitive information from cameras. This issue affects versions up to and including 2.5.33. To stay secure, update to ...
6.1
libgphoto2: Unrestricted data reads from camera devices
CVE-2026-40333
In libgphoto2 versions up to 2.5.33, some functions can read data from cameras without checking the amount of data being read. This could allow an attacker to access more data than intended, potential...
6.1
OpenTelemetry .NET has potential memory exhaustion via unbounded pooled-list sizing in Jaeger exporter conversion path
GHSA-38h3-2333-qx47 CVE-2026-41078
### Summary > [!IMPORTANT] > There is no plan to fix this issue as `OpenTelemetry.Exporter.Jaeger` was deprecated in 2023. It is for informational purposes only. `OpenTelemetry.Exporter.Jaeger` ma...
5.9
ChurchCRM Pledge Editor allows malicious HTML injection
CVE-2026-40483
A security issue affects ChurchCRM's Pledge Editor in versions older than 7.2.0. An attacker with Finance permissions can inject malicious code into donation comments, which can harm other users who o...
5.4
ChurchCRM Public API Leaks Valid Usernames
CVE-2026-40485
ChurchCRM versions prior to 7.2.0 leak valid usernames through the public API login endpoint, making it easier for attackers to guess valid usernames. This can lead to unauthorized access to sensitive...
5.3
Python Multipart Software Can Be Slowed Down by Malicious File Uploads
GHSA-mj87-hwqh-73pj CVE-2026-40347
The Python multipart library can be exploited to cause a slowdown in file uploads, making it harder for legitimate users to access the system. This issue affects how the library handles certain types ...
5.3
libgphoto2: Out-of-bounds read in Sony camera handling
CVE-2026-40339
Libgphoto2, a library that helps access and control cameras, has a bug in its code that could allow an attacker to access sensitive data. This vulnerability affects camera handling in libgphoto2 versi...
5.2
libgphoto2: Sony camera data access can reveal sensitive info
CVE-2026-40338
A bug in the libgphoto2 library for accessing and controlling cameras can allow an attacker to read sensitive information from Sony cameras. This issue affects versions up to 2.5.33. To fix the issue,...
5.2