Latest CVE Feed

Vulnerabilities published in the last 30 days. Filter by severity, exploit status, or attack vector.

Score
Vulnerability
Published
4.9 MEDIUM
CVE-2026-44298 — Kimai: Arbitrary file read in invoice PDF renderer (admin)

Kimai is an open-source time tracking application. From version 2.32.0 to before version 2.56.0, users with the role System-Admin (ROLE_SYSTE_ADMIN) and the permission upload_invoice_template can upl…

kimai | Remote | Path Traversal
May 08, 2026 May 08, 2026
May 08, 2026
May 08, 2026
9.6 CRITICAL
CVE-2026-43944 — electerm: dangerous code can be run through links or command line

electerm is an open-sourced terminal/ssh/sftp/telnet/serialport/RDP/VNC/Spice/ftp client. From versions 3.0.6 to before 3.8.15, electerm is vulnerable to arbitrary local code execution via deep links…

electerm | Remote | Misconfiguration
May 08, 2026 May 08, 2026
May 08, 2026
May 08, 2026
7.8 HIGH
CVE-2026-43943 — electerm: RCE via malicious SSH server filename in openFileWithEditor

electerm is an open-sourced terminal/ssh/sftp/telnet/serialport/RDP/VNC/Spice/ftp client. Prior to version 3.7.9, a code execution (RCE) vulnerability exists in electerm's SFTP open with system edito…

electerm | Injection
May 08, 2026 May 08, 2026
May 08, 2026
May 08, 2026
5.5 MEDIUM
CVE-2026-43942 — electerm: Full process.env exposed to renderer via window.pre.env in electerm

electerm is an open-sourced terminal/ssh/sftp/telnet/serialport/RDP/VNC/Spice/ftp client. In versions 3.8.15 and prior, the getConstants() IPC handler in src/app/lib/ipc-sync.js serialises the entire…

electerm | Information Disclosure
May 08, 2026 May 08, 2026
May 08, 2026
May 08, 2026
9.6 CRITICAL
CVE-2026-43941 — Unvalidated shell.openExternal in electerm allows arbitrary protocol execution via termin…

electerm is an open-sourced terminal/ssh/sftp/telnet/serialport/RDP/VNC/Spice/ftp client. In versions 3.8.15 and prior, Electerm's terminal hyperlink handler passes any URL clicked in the terminal di…

electerm | Remote | Information Disclosure
May 08, 2026 May 08, 2026
May 08, 2026
May 08, 2026
8.4 HIGH
CVE-2026-43940 — electerm: Path traversal in electerm runWidget leads to arbitrary code execution

electerm is an open-sourced terminal/ssh/sftp/telnet/serialport/RDP/VNC/Spice/ftp client. Prior to version 3.7.16, the runWidget function in src/app/widgets/load-widget.js constructs a file path by d…

electerm | Path Traversal
May 08, 2026 May 08, 2026
May 08, 2026
May 08, 2026
8.7 HIGH
CVE-2026-42275 — zrok: WebDAV drive backend follows symlinks outside DriveRoot, enabling host filesystem r…

zrok is software for sharing web services, files, and network resources. Prior to version 2.0.2, the zrok WebDAV drive backend (davServer.Dir) restricts path traversal through lexical normalization b…

zrok | Remote | Path Traversal
May 08, 2026 May 08, 2026
May 08, 2026
May 08, 2026
7.8 HIGH
CVE-2026-42274 — Heimdall: Authorization bypass via path normalization mismatch

Heimdall is a cloud native Identity Aware Proxy and Access Control Decision service. Prior to version 0.17.14, Heimdall performs rule matching on the raw (non-normalized) request path, while downstre…

heimdall | Remote | Path Traversal
May 08, 2026 May 08, 2026
May 08, 2026
May 08, 2026
7.8 HIGH
CVE-2026-42273 — Heimdall: Case-sensitive host matching may lead to policy bypass

Heimdall is a cloud native Identity Aware Proxy and Access Control Decision service. Prior to version 0.17.14, Heimdall performs host matching in a case-sensitive manner, while HTTP hostnames are cas…

heimdall | Remote | Misconfiguration
May 08, 2026 May 08, 2026
May 08, 2026
May 08, 2026
7.8 HIGH
CVE-2026-42272 — Heimdall: Case-sensitive handling of URL-encoded slashes may lead to inconsistent path in…

Heimdall is a cloud native Identity Aware Proxy and Access Control Decision service. Prior to version 0.17.14, Heimdall handles URL-encoded slashes (%2F) in a case-sensitive manner, while percent-enc…

heimdall | Remote | Authorization
May 08, 2026 May 08, 2026
May 08, 2026
May 08, 2026
8.8 HIGH
CVE-2026-42271 — LiteLLM: Authenticated command execution via MCP stdio test endpoints

LiteLLM is a proxy server (AI Gateway) to call LLM APIs in OpenAI (or native) format. From version 1.74.2 to before version 1.83.7, two endpoints used to preview an MCP server before saving it — POST…

litellm | Remote | Misconfiguration
May 08, 2026 May 08, 2026
May 08, 2026
May 08, 2026
5.4 MEDIUM
CVE-2026-42267 — Kimai: Formula Injection via tag names in XLSX export

Kimai is an open-source time tracking application. From version 2.27.0 to before version 2.54.0, any ROLE_USER can create a tag with a formula string as its name (e.g. =SUM(54+51)) via POST /api/tags…

kimai | Remote | Server-Side Request Forgery
May 08, 2026 May 08, 2026
May 08, 2026
May 08, 2026
7.4 HIGH
CVE-2026-42264 — Axios: Prototype pollution read-side gadgets in HTTP adapter allow credential injection a…

Axios is a promise based HTTP client for the browser and Node.js. From version 1.0.0 to before version 1.15.2, fFive config properties (auth, baseURL, socketPath, beforeRedirect, and insecureHTTPPars…

axios | Remote | Misconfiguration
May 08, 2026 May 08, 2026
May 08, 2026
May 08, 2026
7.1 HIGH
CVE-2026-42261 — PromptHub: Authenticated SSRF via IPv6 filter bypass in `POST /api/skills/fetch-remote`

PromptHub is an all-in-one AI toolbox for prompt, skill, and agent management. From version 0.4.9 to before version 0.5.4, apps/web/src/routes/skills.ts exposes an authenticated endpoint POST /api/sk…

Remote | Server-Side Request Forgery
May 08, 2026 May 08, 2026
May 08, 2026
May 08, 2026
9.8 CRITICAL
CVE-2026-42208 — LiteLLM: SQL injection in Proxy API key verification

LiteLLM is a proxy server (AI Gateway) to call LLM APIs in OpenAI (or native) format. From version 1.81.16 to before version 1.83.7, a database query used during proxy API key checks mixed the caller…

litellm | Remote | Injection
May 08, 2026 May 08, 2026
May 08, 2026
May 08, 2026
8.6 HIGH
CVE-2026-42203 — LiteLLM: Server-Side Template Injection in /prompts/test endpoint

LiteLLM is a proxy server (AI Gateway) to call LLM APIs in OpenAI (or native) format. From version 1.80.5 to before version 1.83.7, the POST /prompts/test endpoint accepted user-supplied prompt templ…

litellm | Remote | Injection
May 08, 2026 May 08, 2026
May 08, 2026
May 08, 2026
5.1 MEDIUM
CVE-2026-42150 — wlc: print_html outputs API data without HTML escaping, enabling stored XSS

wlc is a Weblate command-line client using Weblate's REST API. Prior to version 2.0.0, the HTML output format in wlc embeds API response data into HTML without escaping, allowing cross-site scripting…

wlc | Remote | Cross-Site Scripting
May 08, 2026 May 08, 2026
May 08, 2026
May 08, 2026
8.8 HIGH
CVE-2026-41900 — OpenLearnX has Critical Remote Code Execution Through Python Sandbox Escape via Code Exec…

OpenLearnX is an open-source, decentralized learning and assessment platform. Prior to version 2.0.3, a remote code execution (RCE) vulnerability was identified in the OpenLearnX code execution envir…

Remote | Injection
May 08, 2026 May 08, 2026
May 08, 2026
May 08, 2026
5.5 MEDIUM
CVE-2026-41646 — Nuclei: Local File Read via require() Module Loader Bypass

Nuclei is a vulnerability scanner built on a simple YAML-based DSL. From version 3.0.0 to before version 3.8.0, a vulnerability in Nuclei's JavaScript protocol runtime allows JavaScript templates to …

nuclei | Misconfiguration
May 08, 2026 May 08, 2026
May 08, 2026
May 08, 2026
5.3 MEDIUM
CVE-2026-41645 — Nuclei: Environment variable disclosure via Response-Derived DSL Expressions

Nuclei is a vulnerability scanner built on a simple YAML-based DSL. From version 3.0.0 to before version 3.8.0, a vulnerability in Nuclei's expression evaluation engine makes it possible for a malici…

nuclei | Remote | Injection
May 08, 2026 May 08, 2026
May 08, 2026
May 08, 2026
Showing 20 of 5799 Results