4.9

CVSS4.0

CVE-2026-33158 - Craft CMS: Low-privilege users could read private asset contents when editing an asset (IDOR)

Craft CMS is a content management system (CMS). From version 4.0.0-RC1 to before version 4.17.8 and from version 5.0.0-RC1 to before version 5.9.14, a low-privileged authenticated user can read private asset content by calling assets/edit-image with an arbitrary assetId that they are not authorized…

📅 Published: March 24, 2026, 5:26 p.m. 🔄 Last Modified: March 24, 2026, 5:26 p.m.

8.6

CVSS4.0

CVE-2026-33157 - Craft CMS: Potential authenticated Remote Code Execution via malicious attached Behavior

Craft CMS is a content management system (CMS). From version 5.6.0 to before version 5.9.13, a Remote Code Execution (RCE) vulnerability exists in Craft CMS, it can be exploited by any authenticated user with control panel access. This is a bypass of a previous fix. The existing patches add cleanse…

📅 Published: March 24, 2026, 5:22 p.m. 🔄 Last Modified: March 24, 2026, 5:22 p.m.

2.1

CVSS4.0

CVE-2025-11571 - Command Execution vulnerability in Simplicity Installer

Vulnerable endpoints accept user-controlled input through a URL in JSON format which enables command execution. The commands allowed to execute can open executables. However, the commands cannot pass parameters or arguments.  To successfully execute this attack, the attacker needs to be on the same…

📅 Published: March 24, 2026, 4:26 p.m. 🔄 Last Modified: March 24, 2026, 5:16 p.m.

9.1

CVSS3.1

CVE-2026-33340 - LoLLMs WEBUI has unauthenticated Server-Side Request Forgery (SSRF) in /api/proxy endpoint

LoLLMs WEBUI provides the Web user interface for Lord of Large Language and Multi modal Systems. A critical Server-Side Request Forgery (SSRF) vulnerability has been identified in all known existing versions of `lollms-webui`. The `@router.post("/api/proxy")` endpoint allows unauthenticated attacke…

📅 Published: March 24, 2026, 3:58 p.m. 🔄 Last Modified: March 24, 2026, 5:30 p.m.

6.9

CVSS4.0

CVE-2026-33700 - Vikunja has a Link Share Delete IDOR — Missing Project Ownership Check Allows Cross-Project Link Sh…

Vikunja is an open-source self-hosted task management platform. Prior to version 2.2.1, the `DELETE /api/v1/projects/:project/shares/:share` endpoint does not verify that the link share belongs to the project specified in the URL. An attacker with admin access to any project can delete link shares …

📅 Published: March 24, 2026, 3:51 p.m. 🔄 Last Modified: March 24, 2026, 6:04 p.m.

7.5

CVSS3.1

CVE-2026-33680 - Vikunja Vulnerable to Link Share Hash Disclosure via ReadAll Endpoint Enables Permission Escalation

Vikunja is an open-source self-hosted task management platform. Prior to version 2.2.2, the `LinkSharing.ReadAll()` method allows link share authenticated users to list all link shares for a project, including their secret hashes. While `LinkSharing.CanRead()` correctly blocks link share users from…

📅 Published: March 24, 2026, 3:47 p.m. 🔄 Last Modified: March 24, 2026, 4:16 p.m.

6.4

CVSS3.1

CVE-2026-33679 - Vikunja has SSRF via OpenID Connect Avatar Download that Bypasses Webhook SSRF Protections

Vikunja is an open-source self-hosted task management platform. Prior to version 2.2.1, the `DownloadImage` function in `pkg/utils/avatar.go` uses a bare `http.Client{}` with no SSRF protection when downloading user avatar images from the OpenID Connect `picture` claim URL. An attacker who controls…

📅 Published: March 24, 2026, 3:46 p.m. 🔄 Last Modified: March 24, 2026, 5:34 p.m.

8.1

CVSS3.1

CVE-2026-33678 - Vikunja has IDOR in Task Attachment ReadOne Allows Cross-Project File Access and Deletion

Vikunja is an open-source self-hosted task management platform. Prior to version 2.2.1, `TaskAttachment.ReadOne()` queries attachments by ID only (`WHERE id = ?`), ignoring the task ID from the URL path. The permission check in `CanRead()` validates access to the task specified in the URL, but `Rea…

📅 Published: March 24, 2026, 3:44 p.m. 🔄 Last Modified: March 24, 2026, 4:16 p.m.

6.5

CVSS3.1

CVE-2026-33677 - Webhook BasicAuth Credentials Exposed to Read-Only Project Collaborators via API

Vikunja is an open-source self-hosted task management platform. Prior to version 2.2.1, the `GET /api/v1/projects/:project/webhooks` endpoint returns webhook BasicAuth credentials (`basic_auth_user` and `basic_auth_password`) in plaintext to any user with read access to the project. While the exist…

📅 Published: March 24, 2026, 3:36 p.m. 🔄 Last Modified: March 24, 2026, 5:43 p.m.

6.5

CVSS3.1

CVE-2026-33676 - Vikunja has Cross-Project Information Disclosure via Task Relations — Missing Authorization Check o…

Vikunja is an open-source self-hosted task management platform. Prior to version 2.2.1, when the Vikunja API returns tasks, it populates the `related_tasks` field with full task objects for all related tasks without checking whether the requesting user has read permission on those tasks' projects. …

📅 Published: March 24, 2026, 3:35 p.m. 🔄 Last Modified: March 24, 2026, 4:16 p.m.
Total resulsts: 339758
Page 2 of 33,976
« previous page » next page
Filters