Latest CVE Feed

Vulnerabilities published in the last 30 days. Filter by severity, exploit status, or attack vector.

Score
Vulnerability
Published
6.1 MEDIUM
CVE-2026-41575 — th30d4y/IP: DOM-Based Cross-Site Scripting (XSS) Vulnerability

In th30d4y/IP from version 1.0.1 to before version 2.0.1, a DOM-Based Cross-Site Scripting (XSS) vulnerability was identified in an IP Reputation Checker application. Unsanitized user input was direc…

Remote | Cross-Site Scripting
May 08, 2026 May 08, 2026
May 08, 2026
May 08, 2026
9.3 CRITICAL
CVE-2026-41574 — Nhost Vulnerable to Account Takeover via OAuth Email Verification Bypass

Nhost is an open source Firebase alternative with GraphQL. Prior to version 0.49.1, Nhost automatically links an incoming OAuth identity to an existing Nhost account when the email addresses match. T…

nhost\/auth | Remote | Authentication
May 08, 2026 May 08, 2026
May 08, 2026
May 08, 2026
7.8 HIGH
CVE-2026-41570 — PHPUnit: Argument injection via newline in PHP INI values forwarded to child processes

PHPUnit is a testing framework for PHP. In versions 12.5.21 and 13.1.5, PHPUnit forwards PHP INI settings to child processes (used for isolated/PHPT test execution) as -d name=value command-line argu…

phpunit | Injection
May 08, 2026 May 08, 2026
May 08, 2026
May 08, 2026
8.7 HIGH
CVE-2026-41524 — Ajax30/BraveCMS-2.0: Stored XSS in Page / Article Content

Brave CMS is an open-source CMS. Prior to commit 6c56603, page and article body content entered through the CKEditor rich-text editor is stored verbatim in the database and subsequently rendered with…

bravecms | Remote | Cross-Site Scripting
May 08, 2026 May 08, 2026
May 08, 2026
May 08, 2026
5.3 MEDIUM
CVE-2026-41487 — Langfuse: Improper role-based-access control in Langfuse LLM connection management allowe…

Langfuse is an open source large language model engineering platform. From version 3.68.0 to before version 3.167.0, there is a role-based-access control flaw in the LLM connection update flow. An a…

langfuse | Remote | Authorization
May 08, 2026 May 08, 2026
May 08, 2026
May 08, 2026
6.5 MEDIUM
CVE-2026-41308 — Password Pusher: JSON API `/p.json` file upload alias bypasses file-push authentication

Password Pusher is an open source application to communicate sensitive information over the web. Prior to versions 1.69.3 and 2.4.2, a security issue in OSS PasswordPusher allowed unauthenticated cre…

Remote | Authentication
May 08, 2026 May 08, 2026
May 08, 2026
May 08, 2026
7.5 HIGH
CVE-2026-38361 — Fohrloop Dash-Uploader Remote Code Execution Vulnerability

An issue in fohrloop dash-uploader v.0.1.0 through v.0.7.0a2 allows a remote attacker to execute arbitrary code via the dash_uploader/httprequesthandler.py, dash_uploader/upload.py in the Upload func…

Remote | Injection
May 08, 2026 May 08, 2026
May 08, 2026
May 08, 2026
9.8 CRITICAL
CVE-2026-37431 — Beauty Parlour Management System SQL Injection

Beauty Parlour Management System v1.1 was discovered to contain a SQL injection vulnerability via the aptnumber parameter in the /appointment-detail.php endpoint. This vulnerability allows attackers …

Remote | Injection
May 08, 2026 May 08, 2026
May 08, 2026
May 08, 2026
8.6 HIGH
CVE-2025-67486 — Dolibarr has an Authenticated Remote Code Execution via eval() injection in user extrafie…

Dolibarr is an enterprise resource planning (ERP) and customer relationship management (CRM) software package. Versions 22.0.2 and earlier contains an authenticated remote code execution vulnerabilit…

dolibarr_erp\/crm | Remote | Injection
May 08, 2026 May 08, 2026
May 08, 2026
May 08, 2026
6.9 MEDIUM
CVE-2026-7864 — Exposure of Sensitive Information to an Unauthorized Actor

SEPPmail Secure Email Gateway before version 15.0.4 exposes server environment variables through an unauthenticated endpoint in the new GINA UI, allowing remote attackers to obtain sensitive system i…

Remote | Information Disclosure
May 08, 2026 May 08, 2026
May 08, 2026
May 08, 2026
8.7 HIGH
CVE-2026-44340 — PraisonAI: Symlink-extraction bypass of `_safe_extractall` writes outside `dest_dir`

PraisonAI is a multi-agent teams system. Prior to version 4.6.37, the _safe_extractall helper that all recipe pull, recipe publish, and recipe unpack flows route through validates each archive member…

praisonai | Remote | Path Traversal
May 08, 2026 May 08, 2026
May 08, 2026
May 08, 2026
8.6 HIGH
CVE-2026-44339 — PraisonAI has unsafe tool resolution in `ToolExecutionMixin.execute_tool`: undeclared `__…

PraisonAI is a multi-agent teams system. Prior to praisonai version 4.6.37 and praisonaiagents version 1.6.37, praisonaiagents resolves unresolved tool names against module globals and __main__ after…

praisonai praisonaiagents | Remote | Misconfiguration
May 08, 2026 May 08, 2026
May 08, 2026
May 08, 2026
7.3 HIGH
CVE-2026-44338 — PraisonAI ships and generates a legacy API server with authentication disabled by default…

PraisonAI is a multi-agent teams system. From version 2.5.6 to before version 4.6.34, PraisonAI ships a legacy Flask API server with authentication disabled by default. When that server is used, any …

praisonai | Remote | Authentication
May 08, 2026 May 08, 2026
May 08, 2026
May 08, 2026
6.3 MEDIUM
CVE-2026-44337 — PraisonAI knowledge-store backends interpolate unvalidated collection names into SQL and …

PraisonAI is a multi-agent teams system. From version 2.4.1 to before version 4.6.34, PraisonAI exposes optional SQL/CQL-backed knowledge-store implementations that build table and index identifiers …

praisonai | Remote | Injection
May 08, 2026 May 08, 2026
May 08, 2026
May 08, 2026
9.6 CRITICAL
CVE-2026-44336 — PraisonAI MCP `tools/call` path-traversal and RCE via Python `.pth` injection

PraisonAI is a multi-agent teams system. Prior to version 4.6.34, PraisonAI's MCP (Model Context Protocol) server (praisonai mcp serve) registers four file-handling tools by default — praisonai.rules…

praisonai | Remote | Path Traversal
May 08, 2026 May 08, 2026
May 08, 2026
May 08, 2026
9.8 CRITICAL
CVE-2026-44335 — SSRF bypass in PraisonAI

PraisonAI is a multi-agent teams system. Prior to version 1.6.32, the URL checking logic in PraisonAI has a logical flaw that could be bypassed by attackers, leading to SSRF attacks. This issue has b…

praisonai praisonaiagents | Remote | Server-Side Request Forgery
May 08, 2026 May 08, 2026
May 08, 2026
May 08, 2026
8.4 HIGH
CVE-2026-44334 — PraisonAI: Unauthenticated RCE via `tool_override.py`

PraisonAI is a multi-agent teams system. From version 4.5.139 to before version 4.6.32, CVE-2026-40287's fix gated tools.py auto-import behind PRAISONAI_ALLOW_LOCAL_TOOLS=true in two files (tool_reso…

praisonai | Misconfiguration
May 08, 2026 May 08, 2026
May 08, 2026
May 08, 2026
8.3 HIGH
CVE-2026-44129 — Server-side template injection

SEPPmail Secure Email Gateway before version 15.0.4 contains a server-side template injection vulnerability in the new GINA UI because an endpoint accepts attacker-controlled template, allowing remot…

Remote | Injection
May 08, 2026 May 08, 2026
May 08, 2026
May 08, 2026
9.3 CRITICAL
CVE-2026-44128 — Unauthenticated Remote Code Execution

SEPPmail Secure Email Gateway before version 15.0.2.1 allows unauthenticated remote code execution in the new GINA UI because an endpoint passes attacker-controlled input from a parameter to Perl's e…

Remote | Injection
May 08, 2026 May 08, 2026
May 08, 2026
May 08, 2026
8.8 HIGH
CVE-2026-44127 — Local File Inclusion (LFI) and Arbitrary File Deletion

SEPPmail Secure Email Gateway before version 15.0.4 contains an unauthenticated path traversal vulnerability in the identifier parameter of /api.app/attachment/preview that allows remote attackers to…

Remote | Path Traversal
May 08, 2026 May 08, 2026
May 08, 2026
May 08, 2026
Showing 20 of 5668 Results