{
"Source": "CVE FEED",
"Title": "CVE-2026-2367 - Secure Copy Content Protection and Content Locking <= 5.0.1 - authenticated (contributor+) stored cross-site scripting via shortcode attribute",
"Content": "CVE ID : CVE-2026-2367
Published : Feb. 25, 2026, 10:16 a.m. | 33 minutes ago
Description : The Secure Copy Content Protection and Content Locking plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'ays_block' shortcode in all versions up to, and including, 5.0.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Severity: 6.4 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "25 Feb 2026",
"Type": "Vulnerability"
}
๐น t.me/cvedetector ๐น
"Source": "CVE FEED",
"Title": "CVE-2026-2367 - Secure Copy Content Protection and Content Locking <= 5.0.1 - authenticated (contributor+) stored cross-site scripting via shortcode attribute",
"Content": "CVE ID : CVE-2026-2367
Published : Feb. 25, 2026, 10:16 a.m. | 33 minutes ago
Description : The Secure Copy Content Protection and Content Locking plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'ays_block' shortcode in all versions up to, and including, 5.0.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Severity: 6.4 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "25 Feb 2026",
"Type": "Vulnerability"
}
๐น t.me/cvedetector ๐น
{
"Source": "CVE FEED",
"Title": "CVE-2026-2410 - Disable Admin Notices โ Hide Dashboard Notifications <= 1.4.2 - cross-site request forgery to plugin settings update",
"Content": "CVE ID : CVE-2026-2410
Published : Feb. 25, 2026, 10:16 a.m. | 33 minutes ago
Description : The Disable Admin Notices โ Hide Dashboard Notifications plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.4.2. This is due to missing nonce validation in the `showPageContent()` function. This makes it possible for unauthenticated attackers to add arbitrary URLs to the blocked redirects list via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Severity: 4.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "25 Feb 2026",
"Type": "Vulnerability"
}
๐น t.me/cvedetector ๐น
"Source": "CVE FEED",
"Title": "CVE-2026-2410 - Disable Admin Notices โ Hide Dashboard Notifications <= 1.4.2 - cross-site request forgery to plugin settings update",
"Content": "CVE ID : CVE-2026-2410
Published : Feb. 25, 2026, 10:16 a.m. | 33 minutes ago
Description : The Disable Admin Notices โ Hide Dashboard Notifications plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.4.2. This is due to missing nonce validation in the `showPageContent()` function. This makes it possible for unauthenticated attackers to add arbitrary URLs to the blocked redirects list via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Severity: 4.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "25 Feb 2026",
"Type": "Vulnerability"
}
๐น t.me/cvedetector ๐น
{
"Source": "CVE FEED",
"Title": "CVE-2026-3171 - SourceCodester/Patrick Mvuma Patients Waiting Area Queue Management System queue.php cross site scripting",
"Content": "CVE ID : CVE-2026-3171
Published : Feb. 25, 2026, 9:16 a.m. | 1 hour, 33 minutes ago
Description : A flaw has been found in SourceCodester/Patrick Mvuma Patients Waiting Area Queue Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /queue.php. This manipulation of the argument firstname/lastname causes cross site scripting. The attack is possible to be carried out remotely. The exploit has been published and may be used.
Severity: 5.1 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "25 Feb 2026",
"Type": "Vulnerability"
}
๐น t.me/cvedetector ๐น
"Source": "CVE FEED",
"Title": "CVE-2026-3171 - SourceCodester/Patrick Mvuma Patients Waiting Area Queue Management System queue.php cross site scripting",
"Content": "CVE ID : CVE-2026-3171
Published : Feb. 25, 2026, 9:16 a.m. | 1 hour, 33 minutes ago
Description : A flaw has been found in SourceCodester/Patrick Mvuma Patients Waiting Area Queue Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /queue.php. This manipulation of the argument firstname/lastname causes cross site scripting. The attack is possible to be carried out remotely. The exploit has been published and may be used.
Severity: 5.1 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "25 Feb 2026",
"Type": "Vulnerability"
}
๐น t.me/cvedetector ๐น
{
"Source": "CVE FEED",
"Title": "CVE-2026-0704 - Octopus Deploy File Traversal Vulnerability",
"Content": "CVE ID : CVE-2026-0704
Published : Feb. 25, 2026, 12:22 p.m. | 27 minutes ago
Description : In affected version of Octopus Deploy it was possible to remove files and/or contents of files on the host using an API endpoint. The field lacked validation which could potentially result in ways to circumvent expected workflows.
Severity: 5.9 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "25 Feb 2026",
"Type": "Vulnerability"
}
๐น t.me/cvedetector ๐น
"Source": "CVE FEED",
"Title": "CVE-2026-0704 - Octopus Deploy File Traversal Vulnerability",
"Content": "CVE ID : CVE-2026-0704
Published : Feb. 25, 2026, 12:22 p.m. | 27 minutes ago
Description : In affected version of Octopus Deploy it was possible to remove files and/or contents of files on the host using an API endpoint. The field lacked validation which could potentially result in ways to circumvent expected workflows.
Severity: 5.9 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "25 Feb 2026",
"Type": "Vulnerability"
}
๐น t.me/cvedetector ๐น
{
"Source": "CVE FEED",
"Title": "CVE-2026-3118 - Rhdh: graphql injection leading to platform-wide denial of service (dos) in rh developer hub orchestrator plugin",
"Content": "CVE ID : CVE-2026-3118
Published : Feb. 25, 2026, 12:16 p.m. | 33 minutes ago
Description : A security flaw was identified in the Orchestrator Plugin of Red Hat Developer Hub (Backstage). The issue occurs due to insufficient input validation in GraphQL query handling. An authenticated user can inject specially crafted input into API requests, which disrupts backend query processing. This results in the entire Backstage application crashing and restarting, leading to a platform-wide Denial of Service (DoS). As a result, legitimate users temporarily lose access to the platform.
Severity: 6.5 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "25 Feb 2026",
"Type": "Vulnerability"
}
๐น t.me/cvedetector ๐น
"Source": "CVE FEED",
"Title": "CVE-2026-3118 - Rhdh: graphql injection leading to platform-wide denial of service (dos) in rh developer hub orchestrator plugin",
"Content": "CVE ID : CVE-2026-3118
Published : Feb. 25, 2026, 12:16 p.m. | 33 minutes ago
Description : A security flaw was identified in the Orchestrator Plugin of Red Hat Developer Hub (Backstage). The issue occurs due to insufficient input validation in GraphQL query handling. An authenticated user can inject specially crafted input into API requests, which disrupts backend query processing. This results in the entire Backstage application crashing and restarting, leading to a platform-wide Denial of Service (DoS). As a result, legitimate users temporarily lose access to the platform.
Severity: 6.5 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "25 Feb 2026",
"Type": "Vulnerability"
}
๐น t.me/cvedetector ๐น
{
"Source": "CVE FEED",
"Title": "CVE-2026-25701 - openSUSE sdbootutil Temporary File Insecure Directory Creation Vulnerability",
"Content": "CVE ID : CVE-2026-25701
Published : Feb. 25, 2026, 12:16 p.m. | 33 minutes ago
Description : An Insecure Temporary File vulnerability in openSUSE sdbootutil allows local users to pre-create a directory to achieve various effects like:
* gain access to possible private information found in /var/lib/pcrlock.d
* manipulate the data backed up in /tmp/pcrlock.d.bak, therefore violating the integrity of the data should it be restored.
* overwrite protected system files with data from /var/lib/pcrlock.d by placing symlinks to existing files in the directory tree in /tmp/pcrlock.d.bak.
This issue affects sdbootutil: from ? before 5880246d3a02642dc68f5c8cb474bf63cdb56bca.
Severity: 7.0 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "25 Feb 2026",
"Type": "Vulnerability"
}
๐น t.me/cvedetector ๐น
"Source": "CVE FEED",
"Title": "CVE-2026-25701 - openSUSE sdbootutil Temporary File Insecure Directory Creation Vulnerability",
"Content": "CVE ID : CVE-2026-25701
Published : Feb. 25, 2026, 12:16 p.m. | 33 minutes ago
Description : An Insecure Temporary File vulnerability in openSUSE sdbootutil allows local users to pre-create a directory to achieve various effects like:
* gain access to possible private information found in /var/lib/pcrlock.d
* manipulate the data backed up in /tmp/pcrlock.d.bak, therefore violating the integrity of the data should it be restored.
* overwrite protected system files with data from /var/lib/pcrlock.d by placing symlinks to existing files in the directory tree in /tmp/pcrlock.d.bak.
This issue affects sdbootutil: from ? before 5880246d3a02642dc68f5c8cb474bf63cdb56bca.
Severity: 7.0 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "25 Feb 2026",
"Type": "Vulnerability"
}
๐น t.me/cvedetector ๐น
{
"Source": "CVE FEED",
"Title": "CVE-2026-26104 - Udisks: missing authorization check allows unprivileged users to back up luks headers via udisks d-bus api",
"Content": "CVE ID : CVE-2026-26104
Published : Feb. 25, 2026, 11:16 a.m. | 1 hour, 33 minutes ago
Description : A flaw was found in the udisks storage management daemon that allows unprivileged users to back up LUKS encryption headers without authorization. The issue occurs because a privileged D-Bus method responsible for exporting encryption metadata does not perform a policy check. As a result, sensitive cryptographic metadata can be read and written to attacker-controlled locations. This weakens the confidentiality guarantees of encrypted storage volumes.
Severity: 5.5 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "25 Feb 2026",
"Type": "Vulnerability"
}
๐น t.me/cvedetector ๐น
"Source": "CVE FEED",
"Title": "CVE-2026-26104 - Udisks: missing authorization check allows unprivileged users to back up luks headers via udisks d-bus api",
"Content": "CVE ID : CVE-2026-26104
Published : Feb. 25, 2026, 11:16 a.m. | 1 hour, 33 minutes ago
Description : A flaw was found in the udisks storage management daemon that allows unprivileged users to back up LUKS encryption headers without authorization. The issue occurs because a privileged D-Bus method responsible for exporting encryption metadata does not perform a policy check. As a result, sensitive cryptographic metadata can be read and written to attacker-controlled locations. This weakens the confidentiality guarantees of encrypted storage volumes.
Severity: 5.5 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "25 Feb 2026",
"Type": "Vulnerability"
}
๐น t.me/cvedetector ๐น
{
"Source": "CVE FEED",
"Title": "CVE-2025-67601 - Rancher CLI skips TLS verification on Rancher CLI login command",
"Content": "CVE ID : CVE-2025-67601
Published : Feb. 25, 2026, 11:16 a.m. | 1 hour, 33 minutes ago
Description : A vulnerability has been identified within Rancher Manager, where using self-signed CA certificates and passing the -skip-verify flag to the Rancher CLI login command without also passing the โcacert flag results in the CLI attempting to fetch CA certificates stored in Rancherโs setting cacerts.
Severity: 8.3 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "25 Feb 2026",
"Type": "Vulnerability"
}
๐น t.me/cvedetector ๐น
"Source": "CVE FEED",
"Title": "CVE-2025-67601 - Rancher CLI skips TLS verification on Rancher CLI login command",
"Content": "CVE ID : CVE-2025-67601
Published : Feb. 25, 2026, 11:16 a.m. | 1 hour, 33 minutes ago
Description : A vulnerability has been identified within Rancher Manager, where using self-signed CA certificates and passing the -skip-verify flag to the Rancher CLI login command without also passing the โcacert flag results in the CLI attempting to fetch CA certificates stored in Rancherโs setting cacerts.
Severity: 8.3 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "25 Feb 2026",
"Type": "Vulnerability"
}
๐น t.me/cvedetector ๐น
{
"Source": "CVE FEED",
"Title": "CVE-2025-62878 - Local Path Provisioner vulnerable to Path Traversal via parameters.pathPattern",
"Content": "CVE ID : CVE-2025-62878
Published : Feb. 25, 2026, 11:16 a.m. | 1 hour, 33 minutes ago
Description : A malicious user can manipulate the parameters.pathPattern to create PersistentVolumes in arbitrary locations on the host node, potentially overwriting sensitive files or gaining access to unintended directories.
Severity: 9.9 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "25 Feb 2026",
"Type": "Vulnerability"
}
๐น t.me/cvedetector ๐น
"Source": "CVE FEED",
"Title": "CVE-2025-62878 - Local Path Provisioner vulnerable to Path Traversal via parameters.pathPattern",
"Content": "CVE ID : CVE-2025-62878
Published : Feb. 25, 2026, 11:16 a.m. | 1 hour, 33 minutes ago
Description : A malicious user can manipulate the parameters.pathPattern to create PersistentVolumes in arbitrary locations on the host node, potentially overwriting sensitive files or gaining access to unintended directories.
Severity: 9.9 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "25 Feb 2026",
"Type": "Vulnerability"
}
๐น t.me/cvedetector ๐น
{
"Source": "CVE FEED",
"Title": "CVE-2026-28195 - JetBrains TeamCity Unauthenticated Build Configuration Parameter Injection",
"Content": "CVE ID : CVE-2026-28195
Published : Feb. 25, 2026, 2:16 p.m. | 34 minutes ago
Description : In JetBrains TeamCity before 2025.11.3 missing authorization allowed project developers to add parameters to build configurations
Severity: 4.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "25 Feb 2026",
"Type": "Vulnerability"
}
๐น t.me/cvedetector ๐น
"Source": "CVE FEED",
"Title": "CVE-2026-28195 - JetBrains TeamCity Unauthenticated Build Configuration Parameter Injection",
"Content": "CVE ID : CVE-2026-28195
Published : Feb. 25, 2026, 2:16 p.m. | 34 minutes ago
Description : In JetBrains TeamCity before 2025.11.3 missing authorization allowed project developers to add parameters to build configurations
Severity: 4.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "25 Feb 2026",
"Type": "Vulnerability"
}
๐น t.me/cvedetector ๐น
{
"Source": "CVE FEED",
"Title": "CVE-2026-3185 - feiyuchuixue sz-boot-parent API Endpoint sys-message authorization",
"Content": "CVE ID : CVE-2026-3185
Published : Feb. 25, 2026, 2:16 p.m. | 34 minutes ago
Description : A vulnerability was found in feiyuchuixue sz-boot-parent up to 1.3.2-beta. Affected is an unknown function of the file /api/admin/sys-message/ of the component API Endpoint. The manipulation of the argument messageId results in authorization bypass. The attack can be launched remotely. The exploit has been made public and could be used. Upgrading to version 1.3.3-beta is able to address this issue. The patch is identified as aefaabfd7527188bfba3c8c9eee17c316d094802. The affected component should be upgraded. The project was informed beforehand and acted very professional: "We have implemented message ownership verification, so that users can only query messages related to themselves."
Severity: 5.5 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "25 Feb 2026",
"Type": "Vulnerability"
}
๐น t.me/cvedetector ๐น
"Source": "CVE FEED",
"Title": "CVE-2026-3185 - feiyuchuixue sz-boot-parent API Endpoint sys-message authorization",
"Content": "CVE ID : CVE-2026-3185
Published : Feb. 25, 2026, 2:16 p.m. | 34 minutes ago
Description : A vulnerability was found in feiyuchuixue sz-boot-parent up to 1.3.2-beta. Affected is an unknown function of the file /api/admin/sys-message/ of the component API Endpoint. The manipulation of the argument messageId results in authorization bypass. The attack can be launched remotely. The exploit has been made public and could be used. Upgrading to version 1.3.3-beta is able to address this issue. The patch is identified as aefaabfd7527188bfba3c8c9eee17c316d094802. The affected component should be upgraded. The project was informed beforehand and acted very professional: "We have implemented message ownership verification, so that users can only query messages related to themselves."
Severity: 5.5 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "25 Feb 2026",
"Type": "Vulnerability"
}
๐น t.me/cvedetector ๐น
{
"Source": "CVE FEED",
"Title": "CVE-2026-28196 - JetBrains TeamCity Unsecured Credentials Disclosure",
"Content": "CVE ID : CVE-2026-28196
Published : Feb. 25, 2026, 2:16 p.m. | 34 minutes ago
Description : In JetBrains TeamCity before 2025.11.3 disabling versioned settings left a credentials config on disk
Severity: 2.3 | LOW
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "25 Feb 2026",
"Type": "Vulnerability"
}
๐น t.me/cvedetector ๐น
"Source": "CVE FEED",
"Title": "CVE-2026-28196 - JetBrains TeamCity Unsecured Credentials Disclosure",
"Content": "CVE ID : CVE-2026-28196
Published : Feb. 25, 2026, 2:16 p.m. | 34 minutes ago
Description : In JetBrains TeamCity before 2025.11.3 disabling versioned settings left a credentials config on disk
Severity: 2.3 | LOW
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "25 Feb 2026",
"Type": "Vulnerability"
}
๐น t.me/cvedetector ๐น
{
"Source": "CVE FEED",
"Title": "CVE-2026-3186 - feiyuchuixue sz-boot-parent Password Reset password default password",
"Content": "CVE ID : CVE-2026-3186
Published : Feb. 25, 2026, 2:16 p.m. | 34 minutes ago
Description : A vulnerability was determined in feiyuchuixue sz-boot-parent up to 1.3.2-beta. Affected by this vulnerability is an unknown functionality of the file /api/admin/sys-user/reset/password/ of the component Password Reset Handler. This manipulation of the argument userId causes use of default password. The attack may be initiated remotely. The exploit has been publicly disclosed and may be utilized. Upgrading to version 1.3.3-beta addresses this issue. Patch name: aefaabfd7527188bfba3c8c9eee17c316d094802. It is suggested to upgrade the affected component. The project was informed beforehand and acted very professional: "We have added authorization validation to the password reset interface; now only users with the corresponding permissions are allowed to perform password resets."
Severity: 6.5 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "25 Feb 2026",
"Type": "Vulnerability"
}
๐น t.me/cvedetector ๐น
"Source": "CVE FEED",
"Title": "CVE-2026-3186 - feiyuchuixue sz-boot-parent Password Reset password default password",
"Content": "CVE ID : CVE-2026-3186
Published : Feb. 25, 2026, 2:16 p.m. | 34 minutes ago
Description : A vulnerability was determined in feiyuchuixue sz-boot-parent up to 1.3.2-beta. Affected by this vulnerability is an unknown functionality of the file /api/admin/sys-user/reset/password/ of the component Password Reset Handler. This manipulation of the argument userId causes use of default password. The attack may be initiated remotely. The exploit has been publicly disclosed and may be utilized. Upgrading to version 1.3.3-beta addresses this issue. Patch name: aefaabfd7527188bfba3c8c9eee17c316d094802. It is suggested to upgrade the affected component. The project was informed beforehand and acted very professional: "We have added authorization validation to the password reset interface; now only users with the corresponding permissions are allowed to perform password resets."
Severity: 6.5 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "25 Feb 2026",
"Type": "Vulnerability"
}
๐น t.me/cvedetector ๐น
{
"Source": "CVE FEED",
"Title": "CVE-2026-28193 - JetBrains YouTrack Unvalidated Request Vulnerability",
"Content": "CVE ID : CVE-2026-28193
Published : Feb. 25, 2026, 2:16 p.m. | 34 minutes ago
Description : In JetBrains YouTrack before 2025.3.121962 apps were able to send requests to the app permissions endpoint
Severity: 8.8 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "25 Feb 2026",
"Type": "Vulnerability"
}
๐น t.me/cvedetector ๐น
"Source": "CVE FEED",
"Title": "CVE-2026-28193 - JetBrains YouTrack Unvalidated Request Vulnerability",
"Content": "CVE ID : CVE-2026-28193
Published : Feb. 25, 2026, 2:16 p.m. | 34 minutes ago
Description : In JetBrains YouTrack before 2025.3.121962 apps were able to send requests to the app permissions endpoint
Severity: 8.8 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "25 Feb 2026",
"Type": "Vulnerability"
}
๐น t.me/cvedetector ๐น
{
"Source": "CVE FEED",
"Title": "CVE-2026-28194 - JetBrains TeamCity Open Redirect Vulnerability",
"Content": "CVE ID : CVE-2026-28194
Published : Feb. 25, 2026, 2:16 p.m. | 34 minutes ago
Description : In JetBrains TeamCity before 2025.11.3 open redirect was possible in the React project creation flow
Severity: 4.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "25 Feb 2026",
"Type": "Vulnerability"
}
๐น t.me/cvedetector ๐น
"Source": "CVE FEED",
"Title": "CVE-2026-28194 - JetBrains TeamCity Open Redirect Vulnerability",
"Content": "CVE ID : CVE-2026-28194
Published : Feb. 25, 2026, 2:16 p.m. | 34 minutes ago
Description : In JetBrains TeamCity before 2025.11.3 open redirect was possible in the React project creation flow
Severity: 4.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "25 Feb 2026",
"Type": "Vulnerability"
}
๐น t.me/cvedetector ๐น
{
"Source": "CVE FEED",
"Title": "CVE-2026-21725 - Authorization Bypass via TOCTOU in Grafana Datasource Deletion by Name",
"Content": "CVE ID : CVE-2026-21725
Published : Feb. 25, 2026, 1:16 p.m. | 1 hour, 34 minutes ago
Description : A time-of-create-to-time-of-use (TOCTOU) vulnerability lets recently deleted-then-recreated data sources be re-deleted without permission to do so.
This requires several very stringent conditions to be met:
- The attacker must have admin access to the specific datasource prior to its first deletion.
- Upon deletion, all steps within the attack must happen within the next 30 seconds and on the same pod of Grafana.
- The attacker must delete the datasource, then someone must recreate it.
- The new datasource must not have the attacker as an admin.
- The new datasource must have the same UID as the prior datasource. These are randomised by default.
- The datasource can now be re-deleted by the attacker.
- Once 30 seconds are up, the attack is spent and cannot be repeated.
- No datasource with any other UID can be attacked.
Severity: 2.6 | LOW
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "25 Feb 2026",
"Type": "Vulnerability"
}
๐น t.me/cvedetector ๐น
"Source": "CVE FEED",
"Title": "CVE-2026-21725 - Authorization Bypass via TOCTOU in Grafana Datasource Deletion by Name",
"Content": "CVE ID : CVE-2026-21725
Published : Feb. 25, 2026, 1:16 p.m. | 1 hour, 34 minutes ago
Description : A time-of-create-to-time-of-use (TOCTOU) vulnerability lets recently deleted-then-recreated data sources be re-deleted without permission to do so.
This requires several very stringent conditions to be met:
- The attacker must have admin access to the specific datasource prior to its first deletion.
- Upon deletion, all steps within the attack must happen within the next 30 seconds and on the same pod of Grafana.
- The attacker must delete the datasource, then someone must recreate it.
- The new datasource must not have the attacker as an admin.
- The new datasource must have the same UID as the prior datasource. These are randomised by default.
- The datasource can now be re-deleted by the attacker.
- Once 30 seconds are up, the attack is spent and cannot be repeated.
- No datasource with any other UID can be attacked.
Severity: 2.6 | LOW
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "25 Feb 2026",
"Type": "Vulnerability"
}
๐น t.me/cvedetector ๐น
{
"Source": "CVE FEED",
"Title": "CVE-2026-2624 - Authentication Bypass in ePati's Antikor NGFW",
"Content": "CVE ID : CVE-2026-2624
Published : Feb. 25, 2026, 1:16 p.m. | 1 hour, 34 minutes ago
Description : Missing Authentication for Critical Function vulnerability in ePati Cyber โโSecurity Technologies Inc. Antikor Next Generation Firewall (NGFW) allows Authentication Bypass.This issue affects Antikor Next Generation Firewall (NGFW): from v.2.0.1298 before v.2.0.1301.
Severity: 9.8 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "25 Feb 2026",
"Type": "Vulnerability"
}
๐น t.me/cvedetector ๐น
"Source": "CVE FEED",
"Title": "CVE-2026-2624 - Authentication Bypass in ePati's Antikor NGFW",
"Content": "CVE ID : CVE-2026-2624
Published : Feb. 25, 2026, 1:16 p.m. | 1 hour, 34 minutes ago
Description : Missing Authentication for Critical Function vulnerability in ePati Cyber โโSecurity Technologies Inc. Antikor Next Generation Firewall (NGFW) allows Authentication Bypass.This issue affects Antikor Next Generation Firewall (NGFW): from v.2.0.1298 before v.2.0.1301.
Severity: 9.8 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "25 Feb 2026",
"Type": "Vulnerability"
}
๐น t.me/cvedetector ๐น
{
"Source": "CVE FEED",
"Title": "CVE-2026-3188 - feiyuchuixue sz-boot-parent API templates path traversal",
"Content": "CVE ID : CVE-2026-3188
Published : Feb. 25, 2026, 4:23 p.m. | 27 minutes ago
Description : A security flaw has been discovered in feiyuchuixue sz-boot-parent up to 1.3.2-beta. This affects an unknown part of the file /api/admin/common/download/templates of the component API. Performing a manipulation of the argument templateName results in path traversal. Remote exploitation of the attack is possible. The exploit has been released to the public and may be used for attacks. Upgrading to version 1.3.3-beta is able to mitigate this issue. The patch is named aefaabfd7527188bfba3c8c9eee17c316d094802. It is recommended to upgrade the affected component. The project was informed beforehand and acted very professional: "We have implemented path validity checks on parameters for the template download interface (...)"
Severity: 5.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "25 Feb 2026",
"Type": "Vulnerability"
}
๐น t.me/cvedetector ๐น
"Source": "CVE FEED",
"Title": "CVE-2026-3188 - feiyuchuixue sz-boot-parent API templates path traversal",
"Content": "CVE ID : CVE-2026-3188
Published : Feb. 25, 2026, 4:23 p.m. | 27 minutes ago
Description : A security flaw has been discovered in feiyuchuixue sz-boot-parent up to 1.3.2-beta. This affects an unknown part of the file /api/admin/common/download/templates of the component API. Performing a manipulation of the argument templateName results in path traversal. Remote exploitation of the attack is possible. The exploit has been released to the public and may be used for attacks. Upgrading to version 1.3.3-beta is able to mitigate this issue. The patch is named aefaabfd7527188bfba3c8c9eee17c316d094802. It is recommended to upgrade the affected component. The project was informed beforehand and acted very professional: "We have implemented path validity checks on parameters for the template download interface (...)"
Severity: 5.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "25 Feb 2026",
"Type": "Vulnerability"
}
๐น t.me/cvedetector ๐น
{
"Source": "CVE FEED",
"Title": "CVE-2026-3206 - Improper management of context cancelations",
"Content": "CVE ID : CVE-2026-3206
Published : Feb. 25, 2026, 4:23 p.m. | 27 minutes ago
Description : Improper Resource Shutdown or Release vulnerability in KrakenD, SLU KrakenD-CE (CircuitBreaker modules), KrakenD, SLU KrakenD-EE (CircuitBreaker modules). This issue affects KrakenD-CE: before 2.13.1; KrakenD-EE: before 2.13.0.
Severity: 1.3 | LOW
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "25 Feb 2026",
"Type": "Vulnerability"
}
๐น t.me/cvedetector ๐น
"Source": "CVE FEED",
"Title": "CVE-2026-3206 - Improper management of context cancelations",
"Content": "CVE ID : CVE-2026-3206
Published : Feb. 25, 2026, 4:23 p.m. | 27 minutes ago
Description : Improper Resource Shutdown or Release vulnerability in KrakenD, SLU KrakenD-CE (CircuitBreaker modules), KrakenD, SLU KrakenD-EE (CircuitBreaker modules). This issue affects KrakenD-CE: before 2.13.1; KrakenD-EE: before 2.13.0.
Severity: 1.3 | LOW
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "25 Feb 2026",
"Type": "Vulnerability"
}
๐น t.me/cvedetector ๐น
{
"Source": "CVE FEED",
"Title": "CVE-2026-27848 - Missing neutralization in Linksys MR9600, Linksys MX4200",
"Content": "CVE ID : CVE-2026-27848
Published : Feb. 25, 2026, 4:23 p.m. | 27 minutes ago
Description : Due to missing neutralization of special elements, OS commands can be injected via the handshake of a TLS-SRP connection, which are ultimately run as the root user.
This issue affects MR9600: 1.0.4.205530; MX4200: 1.0.13.210200.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "25 Feb 2026",
"Type": "Vulnerability"
}
๐น t.me/cvedetector ๐น
"Source": "CVE FEED",
"Title": "CVE-2026-27848 - Missing neutralization in Linksys MR9600, Linksys MX4200",
"Content": "CVE ID : CVE-2026-27848
Published : Feb. 25, 2026, 4:23 p.m. | 27 minutes ago
Description : Due to missing neutralization of special elements, OS commands can be injected via the handshake of a TLS-SRP connection, which are ultimately run as the root user.
This issue affects MR9600: 1.0.4.205530; MX4200: 1.0.13.210200.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "25 Feb 2026",
"Type": "Vulnerability"
}
๐น t.me/cvedetector ๐น
{
"Source": "CVE FEED",
"Title": "CVE-2026-27846 - Missing authentication in Linksys MR9600, Linksys MX4200",
"Content": "CVE ID : CVE-2026-27846
Published : Feb. 25, 2026, 4:23 p.m. | 27 minutes ago
Description : Due to missing authentication, a user with physical access to the device can misuse the mesh functionality for adding a new mesh device to the network
to gain access to sensitive information, including the password for admin access to the web interface and the Wi-Fi passwords.This issue affects MR9600: 1.0.4.205530; MX4200: 1.0.13.210200.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "25 Feb 2026",
"Type": "Vulnerability"
}
๐น t.me/cvedetector ๐น
"Source": "CVE FEED",
"Title": "CVE-2026-27846 - Missing authentication in Linksys MR9600, Linksys MX4200",
"Content": "CVE ID : CVE-2026-27846
Published : Feb. 25, 2026, 4:23 p.m. | 27 minutes ago
Description : Due to missing authentication, a user with physical access to the device can misuse the mesh functionality for adding a new mesh device to the network
to gain access to sensitive information, including the password for admin access to the web interface and the Wi-Fi passwords.This issue affects MR9600: 1.0.4.205530; MX4200: 1.0.13.210200.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "25 Feb 2026",
"Type": "Vulnerability"
}
๐น t.me/cvedetector ๐น