7.5

CVSS3.1

CVE-2026-5050 - Payment Gateway for Redsys & WooCommerce Lite <= 7.0.0 - Improper Verification of Cryptographic Sig…

The Payment Gateway for Redsys & WooCommerce Lite plugin for WordPress is vulnerable to Improper Verification of Cryptographic Signature in versions up to, and including, 7.0.0 due to successful_request() handlers calculating a local signature but not validating Ds_Signature from the request before…

📅 Published: April 16, 2026, 5:29 a.m. 🔄 Last Modified: April 16, 2026, 5:29 a.m.

4.4

CVSS3.1

CVE-2026-3551 - Custom New User Notification <= 1.2.0 - Authenticated (Administrator+) Stored Cross-Site Scripting …

The Custom New User Notification plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's admin settings in all versions up to, and including, 1.2.0. This is due to insufficient input sanitization and output escaping on multiple settings fields including 'User Mail Subject…

📅 Published: April 16, 2026, 5:29 a.m. 🔄 Last Modified: April 22, 2026, 8:23 p.m.

5.3

CVSS3.1

CVE-2026-3595 - Riaxe Product Customizer <= 2.1.2 - Unauthenticated Arbitrary User Deletion via 'user_id' Parameter

The Riaxe Product Customizer plugin for WordPress is vulnerable to authorization bypass in all versions up to, and including, 2.1.2. This is due to the plugin registering a REST API route at POST /wp-json/InkXEProductDesignerLite/customer/delete_customer without a permission_callback, causing WordP…

📅 Published: April 16, 2026, 5:29 a.m. 🔄 Last Modified: April 22, 2026, 8:23 p.m.

9.8

CVSS3.1

CVE-2026-3596 - Riaxe Product Customizer <= 2.1.2 - Missing Authorization to Unauthenticated Arbitrary Options Upda…

The Riaxe Product Customizer plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 2.1.2. The plugin registers an unauthenticated AJAX action ('wp_ajax_nopriv_install-imprint') that maps to the ink_pd_add_option() function. This function reads 'option' and…

📅 Published: April 16, 2026, 5:29 a.m. 🔄 Last Modified: April 22, 2026, 8:22 p.m.

7.8

CVSS3.1

CVE-2026-22619 - Insecure Library Loading in Eaton Intelligent Power Protector Allows Code Execution

Eaton Intelligent Power Protector (IPP) is affected by insecure library loading in its executable, which could lead to arbitrary code execution by an attacker with access to the software package. This security issue has been fixed in the latest version of Eaton IPP software which is available on th…

📅 Published: April 16, 2026, 5:26 a.m. 🔄 Last Modified: April 22, 2026, 8 p.m.

5.9

CVSS3.1

CVE-2026-22618 -

A security misconfiguration was identified in Eaton Intelligent Power Protector (IPP), where an HTTP response header was set with an insecure attribute, potentially exposing users to web‑based attacks. This security issue has been fixed in the latest version of Eaton IPP software which is available…

📅 Published: April 16, 2026, 5:11 a.m. 🔄 Last Modified: April 22, 2026, 8:01 p.m.

5.7

CVSS3.1

CVE-2026-22617 - Insecure Cookie Configuration in Eaton IPP Allows Network-Based Man-in-the-Middle Interception

Eaton Intelligent Power Protector (IPP) uses an insecure cookie configuration, which could allow a network‑based attacker to intercept the cookie and exploit it through a man‑in‑the‑middle attack. This security issue has been fixed in the latest version of Eaton IPP software which is available on t…

📅 Published: April 16, 2026, 5:02 a.m. 🔄 Last Modified: April 22, 2026, 8:01 p.m.

4.3

CVSS3.1

CVE-2023-5872 - Wago: Vulnerability in Smart Designer Web-Application

In Wago Smart Designer in versions up to 2.33.1 a low privileged remote attacker may enumerate projects and usernames through iterative requests to an specific endpoint.

📅 Published: April 16, 2026, 4:55 a.m. 🔄 Last Modified: April 17, 2026, 3:38 p.m.

6.5

CVSS3.1

CVE-2026-22616 - Repeated Authentication Attempts Due to Insufficient Rate‑Limiting in Eaton IPP Web Interface

Eaton Intelligent Power Protector (IPP) software allows repeated authentication attempts against the web interface login page due to insufficient rate‑limiting controls. This security issue has been fixed in the latest version of Eaton IPP which is available on the Eaton download centre.

📅 Published: April 16, 2026, 4:54 a.m. 🔄 Last Modified: April 22, 2026, 8:02 p.m.

6

CVSS3.1

CVE-2026-22615 -

Due to improper input validation in one of the Eaton Intelligent Power Protector (IPP) XML, it is possible for an attacker with admin privileges and access to the local system to inject malicious code resulting in arbitrary command execution. This security issue has been fixed in the latest version…

📅 Published: April 16, 2026, 4:45 a.m. 🔄 Last Modified: April 22, 2026, 8:03 p.m.
Total resulsts: 346283
Page 141 of 34,629
« previous page » next page
Filters