6.3

CVSS4.0

CVE-2026-25118 - immich-server: Insecure Transmission of Authentication Credentials via Password Parameter in HTTP R…

immich is a high performance self-hosted photo and video management solution. Prior to version 2.6.0, the Immich application is vulnerable to credential disclosure when a user authenticates to a shared album. During the authentication process, the application transmits the album password within the…

📅 Published: April 3, 2026, 3:51 p.m. 🔄 Last Modified: April 3, 2026, 4:16 p.m.

9.6

CVSS3.1

CVE-2026-31818 - Budibase: Server-Side Request Forgery via REST Connector with Empty Default Blacklist

Budibase is an open-source low-code platform. Prior to version 3.33.4, a server-side request forgery (SSRF) vulnerability exists in Budibase's REST datasource connector. The platform's SSRF protection mechanism (IP blacklist) is rendered completely ineffective because the BLACKLIST_IPS environment …

📅 Published: April 3, 2026, 3:41 p.m. 🔄 Last Modified: April 3, 2026, 4:16 p.m.

8.7

CVSS4.0

CVE-2026-25044 - Budibase: Command Injection in Bash Automation Step

Budibase is an open-source low-code platform. Prior to version 3.33.4, the bash automation step executes user-provided commands using execSync without proper sanitization or validation. User input is processed through processStringSync which allows template interpolation, potentially allowing arbit…

📅 Published: April 3, 2026, 3:38 p.m. 🔄 Last Modified: April 3, 2026, 4:16 p.m.

5.3

CVSS3.1

CVE-2026-25043 - Budibase: Unauthenticated Password Reset Endpoint Lacks Rate Limiting, Enabling Email Flooding

Budibase is an open-source low-code platform. Prior to version 3.23.25, a business logic vulnerability exists in Budibase’s password reset functionality due to the absence of rate limiting, CAPTCHA, or abuse prevention mechanisms on the “Forgot Password” endpoint. An unauthenticated attacker can re…

📅 Published: April 3, 2026, 3:35 p.m. 🔄 Last Modified: April 3, 2026, 4:16 p.m.

7.1

CVSS4.0

CVE-2025-68153 - Juju: Resource poisoning

Juju is an open source application orchestration engine that enables any application operation on any infrastructure at any scale through special operators called ‘charms’. From versions 2.9 to before 2.9.56 and 3.6 to before 3.6.19, any authenticated user, machine or controller under a Juju contro…

📅 Published: April 3, 2026, 3:28 p.m. 🔄 Last Modified: April 3, 2026, 4:16 p.m.
Load More Vulnerability
avatar

Mehmet Ince

@mdisec

CVE stats coming here

avatar

Nuri Çilengir

@ncilengir

CVE stats coming here

avatar

@aydinnyunus

CVE stats coming here

avatar

Onurcan Genç

@onurcangnc

CVE stats coming here

avatar

Seyit Sigirci

@h3xecute

CVE stats coming here

avatar

Ali İltizar

@iltosec

CVE stats coming here

avatar

@b3rsec

CVE stats coming here

avatar

@furkank

CVE stats coming here

avatar

kutaysec

@kutaysec

CVE stats coming here