6.5

CVSS3.1

CVE-2026-27943 - OpenEMR's Eye Exam View Trusts form_id Without Verifying Patient/Encounter Ownership

OpenEMR is a free and open source electronic health records and medical practice management application. In versions up to and including 8.0.0, the eye exam (eye_mag) view loads data by `form_id` (or equivalent) without verifying that the form belongs to the current user’s patient/encounter context…

📅 Published: Feb. 26, 2026, 1:30 a.m. 🔄 Last Modified: April 18, 2026, 10:30 a.m.

4.4

CVSS3.1

CVE-2026-2499 - Custom Logo <= 2.2 - Authenticated (Administrator+) Stored Cross-Site Scripting via Logo Path Setti…

The Custom Logo plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 2.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and abo…

📅 Published: Feb. 26, 2026, 1:24 a.m. 🔄 Last Modified: April 15, 2026, 6:15 p.m.

6.4

CVSS3.1

CVE-2026-2029 - Livemesh Addons for Beaver Builder <= 3.9.2 - Authenticated (Contributor+) Stored Cross-Site Script…

The Livemesh Addons for Beaver Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the `[labb_pricing_item]` shortcode's `title` and `value` attributes in all versions up to, and including, 3.9.2 due to insufficient input sanitization and output escaping. Specifically, the…

📅 Published: Feb. 26, 2026, 1:24 a.m. 🔄 Last Modified: April 15, 2026, 6:15 p.m.

4.4

CVSS3.1

CVE-2026-2489 - TP2WP Importer <= 1.1 - Authenticated (Administrator+) Stored Cross-Site Scripting via 'Watched dom…

The TP2WP Importer plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'Watched domains' textarea on the attachment importer settings page in all versions up to, and including, 1.1. This is due to insufficient input sanitization and output escaping when domains are saved via A…

📅 Published: Feb. 26, 2026, 1:24 a.m. 🔄 Last Modified: April 15, 2026, 8:15 p.m.

4.4

CVSS3.1

CVE-2026-2498 - WP Social Meta <= 1.0.1 - Authenticated (Administrator+) Stored Cross-Site Scripting via Settings

The WP Social Meta plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 1.0.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions an…

📅 Published: Feb. 26, 2026, 1:24 a.m. 🔄 Last Modified: April 16, 2026, midnight

7.5

CVSS3.1

CVE-2026-1557 - WP Responsive Images <= 1.0 - Unauthenticated Path Traversal to Arbitrary File Read via src

The WP Responsive Images plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 1.0 via the 'src' parameter. This makes it possible for unauthenticated attackers to read the contents of arbitrary files on the server, which can contain sensitive information.

📅 Published: Feb. 26, 2026, 1:24 a.m. 🔄 Last Modified: April 21, 2026, 11:45 p.m.

6.1

CVSS3.1

CVE-2026-2506 - EM Cost Calculator <= 2.3.1 - Unauthenticated Stored Cross-Site Scripting via 'customer_name'

The EM Cost Calculator plugin for WordPress is vulnerable to Stored Cross-Site Scripting in versions up to, and including, 2.3.1. This is due to the plugin storing attacker-controlled 'customer_name' data and rendering it in the admin customer list without output escaping. This makes it possible fo…

📅 Published: Feb. 26, 2026, 1:24 a.m. 🔄 Last Modified: April 15, 2026, 8:15 p.m.

2.7

CVSS4.0

CVE-2026-27942 - fast-xml-parser has stack overflow in XMLBuilder with preserveOrder

fast-xml-parser allows users to validate XML, parse XML to JS object, or build XML from JS object without C/C++ based libraries and no callback. Prior to version 5.3.8, the application crashes with stack overflow when user use XML builder with `preserveOrder:true`. Version 5.3.8 fixes the issue. As…

📅 Published: Feb. 26, 2026, 1:22 a.m. 🔄 Last Modified: April 17, 2026, 2:45 p.m.

10

CVSS3.1

CVE-2026-27941 - OpenLIT Vulnerable to Remote Code Execution and Secret Exposure via Misuse of `pull_request_target`…

OpenLIT is an open source platform for AI engineering. Prior to version 1.37.1, several GitHub Actions workflows in OpenLIT's GitHub repository use the `pull_request_target` event while checking out and executing untrusted code from forked pull requests. These workflows run with the security contex…

📅 Published: Feb. 26, 2026, 1:17 a.m. 🔄 Last Modified: April 17, 2026, 2:45 p.m.

7.7

CVSS3.1

CVE-2026-27938 - WPGraphQL Repo Vulnerable to Command Injection via Unsanitized GitHub Actions Expression in Release…

WPGraphQL provides a GraphQL API for WordPress sites. Prior to version 2.9.1, the `wp-graphql/wp-graphql` repository contains a GitHub Actions workflow (`release.yml`) vulnerable to OS command injection through direct use of `${{ github.event.pull_request.body }}` inside a `run:` shell block. When …

📅 Published: Feb. 26, 2026, 1:10 a.m. 🔄 Last Modified: April 17, 2026, 2:45 p.m.
Total resulsts: 349182
Page 1428 of 34,919
« previous page » next page
Filters