CVE Monitor
3.29K subscribers
30.8K links
Download Telegram
{
"Source": "CVE FEED",
"Title": "CVE-2026-39419 - MaxKB: Sandbox Result Validation Bypass via Tool Output Spoofing",
"Content": "CVE ID :CVE-2026-39419
Published : April 14, 2026, 2:16 a.m. | 1 hour, 39 minutes ago
Description :MaxKB is an open-source AI assistant for enterprise. In versions 2.7.1 and below, an authenticated user can bypass sandbox result validation and spoof tool execution results by exploiting Python frame introspection to read the wrapper's UUID from its bytecode constants, then writing a forged result directly to file descriptor 1 (bypassing stdout redirection). By calling sys.exit(0), the attacker terminates the wrapper before it prints the legitimate output, causing the MaxKB service to parse and trust the spoofed response as the genuine tool result. This issue has been fixed in version 2.8.0.
Severity: 3.1 | LOW
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "14 Apr 2026",
"Type": "Vulnerability"
}
πŸ”Ή t.me/cvedetector πŸ”Ή
{
"Source": "CVE FEED",
"Title": "CVE-2026-34225 - Open WebUI has Blind Server Side Request Forgery in its Image Edit Functionality",
"Content": "CVE ID :CVE-2026-34225
Published : April 14, 2026, 2:16 a.m. | 1 hour, 39 minutes ago
Description :Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Versions 0.7.2 and below contain a Blind Server Side Request Forgery in the functionality that allows editing an image via a prompt. The affected function performs a GET request to a user-provided URL with no restriction on the domain, allowing the local address space to be accessed. Since the SSRF is blind (the response cannot be read), the primary impact is port scanning of the local network, as whether a port is open can be determined based on whether the GET request succeeds or fails. These response differentials can be automated to iterate through the entire port range and identify open ports. If the service running on an open port can be inferred, an attacker may be able to interact with it in a meaningful way, provided the service offers state-changing GET request endpoints. This issue was unresolved at the time of publication.
Severity: 4.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "14 Apr 2026",
"Type": "Vulnerability"
}
πŸ”Ή t.me/cvedetector πŸ”Ή
{
"Source": "CVE FEED",
"Title": "CVE-2026-3017 - Smart Post Show – Post Grid, Post Carousel & Slider, and List Category Posts <= 3.0.12 - authenticated (administrator+) php object injection",
"Content": "CVE ID :CVE-2026-3017
Published : April 14, 2026, 5:30 a.m. | 26 minutes ago
Description :The Smart Post Show – Post Grid, Post Carousel & Slider, and List Category Posts plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 3.0.12 via deserialization of untrusted input in the import_shortcodes() function. This makes it possible for authenticated attackers, with Administrator-level access and above, to inject a PHP Object. No known POP chain is present in the vulnerable software, which means this vulnerability has no impact unless another plugin or theme containing a POP chain is installed on the site. If a POP chain is present via an additional plugin or theme installed on the target system, it may allow the attacker to perform actions like delete arbitrary files, retrieve sensitive data, or execute code depending on the POP chain present.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "14 Apr 2026",
"Type": "Vulnerability"
}
πŸ”Ή t.me/cvedetector πŸ”Ή
{
"Source": "CVE FEED",
"Title": "CVE-2026-4059 - ShopLentor <= 3.3.5 - authenticated (contributor+) stored cross-site scripting via 'button_text' shortcode attribute",
"Content": "CVE ID :CVE-2026-4059
Published : April 14, 2026, 4:17 a.m. | 1 hour, 39 minutes ago
Description :The ShopLentor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the woolentor_quickview_button shortcode's button_text attribute in all versions up to, and including, 3.3.5. This is due to insufficient input sanitization and missing output escaping on user-supplied shortcode attributes. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Severity: 6.4 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "14 Apr 2026",
"Type": "Vulnerability"
}
πŸ”Ή t.me/cvedetector πŸ”Ή
{
"Source": "CVE FEED",
"Title": "CVE-2026-4479 - WholeSale Products Dynamic Pricing Management WooCommerce <= 1.2 - authenticated (administrator+) stored cross-site scripting via plugin settings",
"Content": "CVE ID :CVE-2026-4479
Published : April 14, 2026, 4:17 a.m. | 1 hour, 39 minutes ago
Description :The WholeSale Products Dynamic Pricing Management WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 1.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
Severity: 4.4 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "14 Apr 2026",
"Type": "Vulnerability"
}
πŸ”Ή t.me/cvedetector πŸ”Ή
{
"Source": "CVE FEED",
"Title": "CVE-2026-40315 - PraisonAI: SQLiteConversationStore didn't validate table_prefix when constructing SQL queries",
"Content": "CVE ID :CVE-2026-40315
Published : April 14, 2026, 4:17 a.m. | 1 hour, 39 minutes ago
Description :PraisonAI is a multi-agent teams system. Prior to 4.5.133, there is an SQL identifier injection vulnerability in SQLiteConversationStore where the table_prefix configuration value is directly concatenated into SQL queries via f-strings without any validation or sanitization. Since SQL identifiers cannot be safely parameterized, an attacker who controls the table_prefix value (e.g., through from_yaml or from_dict configuration input) can inject arbitrary SQL fragments that alter query structure. This enables unauthorized data access, such as reading internal SQLite tables like sqlite_master, and manipulation of query results through techniques like UNION-based injection. The vulnerability propagates from configuration input in config.py, through factory.py, to the SQL query construction in sqlite.py. Exploitation requires the ability to influence configuration input, and successful exploitation leads to internal schema disclosure and full query result tampering. This issue has been fixed in version 4.5.133.
Severity: 7.2 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "14 Apr 2026",
"Type": "Vulnerability"
}
πŸ”Ή t.me/cvedetector πŸ”Ή
{
"Source": "CVE FEED",
"Title": "CVE-2026-40313 - PraisonAI: ArtiPACKED Vulnerability via GitHub Actions Credential Persistence",
"Content": "CVE ID :CVE-2026-40313
Published : April 14, 2026, 4:17 a.m. | 1 hour, 39 minutes ago
Description :PraisonAI is a multi-agent teams system. In versions 4.5.139 and below, the GitHub Actions workflows are vulnerable to ArtiPACKED attack, a known credential leakage vector caused by using actions/checkout without setting persist-credentials: false. By default, actions/checkout writes the GITHUB_TOKEN (and sometimes ACTIONS_RUNTIME_TOKEN) into the .git/config file for persistence, and if any subsequent workflow step uploads artifacts (build outputs, logs, test results, etc.), these tokens can be inadvertently included. Since PraisonAI is a public repository, any user with read access can download these artifacts and extract the leaked tokens, potentially enabling an attacker to push malicious code, poison releases and PyPI/Docker packages, steal repository secrets, and execute a full supply chain compromise affecting all downstream users. The issue spans numerous workflow and action files across .github/workflows/ and .github/actions/. This issue has been fixed in version 4.5.140.
Severity: 9.1 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "14 Apr 2026",
"Type": "Vulnerability"
}
πŸ”Ή t.me/cvedetector πŸ”Ή
{
"Source": "CVE FEED",
"Title": "CVE-2026-40288 - PraisonAI: Critical RCE via `type: job` workflow YAML",
"Content": "CVE ID :CVE-2026-40288
Published : April 14, 2026, 4:17 a.m. | 1 hour, 40 minutes ago
Description :PraisonAI is a multi-agent teams system. In versions below 4.5.139 of PraisonAI and 1.5.140 of praisonaiagents, the workflow engine is vulnerable to arbitrary command and code execution through untrusted YAML files. When praisonai workflow run loads a YAML file with type: job, the JobWorkflowExecutor in job_workflow.py processes steps that support run: (shell commands via subprocess.run()), script: (inline Python via exec()), and python: (arbitrary Python script execution)β€”all without any validation, sandboxing, or user confirmation. The affected code paths include action_run() in workflow.py and _exec_shell(), _exec_inline_python(), and _exec_python_script() in job_workflow.py. An attacker who can supply or influence a workflow YAML file (particularly in CI pipelines, shared repositories, or multi-tenant deployment environments) can achieve full arbitrary command execution on the host system, compromising the machine and any accessible data or credentials. This issue has been fixed in versions 4.5.139 of PraisonAI and 1.5.140 of praisonaiagents.
Severity: 9.8 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "14 Apr 2026",
"Type": "Vulnerability"
}
πŸ”Ή t.me/cvedetector πŸ”Ή
{
"Source": "CVE FEED",
"Title": "CVE-2026-40289 - PraisonAI Browser Server allows unauthenticated WebSocket clients to hijack connected extension sessions",
"Content": "CVE ID :CVE-2026-40289
Published : April 14, 2026, 4:17 a.m. | 1 hour, 40 minutes ago
Description :PraisonAI is a multi-agent teams system. In versions below 4.5.139 of PraisonAI and 1.5.140 of praisonaiagents, the browser bridge (praisonai browser start) is vulnerable to unauthenticated remote session hijacking due to missing authentication and a bypassable origin check on its /ws WebSocket endpoint. The server binds to 0.0.0.0 by default and only validates the Origin header when one is present, meaning any non-browser client that omits the header is accepted without restriction. An unauthenticated network attacker can connect, send a start_session message, and the server will route it to the first idle browser-extension WebSocket (effectively hijacking that session) and then broadcast all resulting automation actions and outputs back to the attacker. This enables unauthorized remote control of connected browser automation sessions, leakage of sensitive page context and automation results, and misuse of model-backed browser actions in any environment where the bridge is network-reachable. This issue has been fixed in versions 4.5.139 of PraisonAI and 1.5.140 of praisonaiagents.
Severity: 9.1 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "14 Apr 2026",
"Type": "Vulnerability"
}
πŸ”Ή t.me/cvedetector πŸ”Ή
{
"Source": "CVE FEED",
"Title": "CVE-2026-40287 - PraisonAI has RCE via Automatic tools.py Import",
"Content": "CVE ID :CVE-2026-40287
Published : April 14, 2026, 4:17 a.m. | 1 hour, 40 minutes ago
Description :PraisonAI is a multi-agent teams system. Versions 4.5.138 and below are vulnerable to arbitrary code execution through automatic, unsanitized import of a tools.py file from the current working directory. Components including call.py (import_tools_from_file()), tool_resolver.py (_load_local_tools()), and CLI tool-loading paths blindly import ./tools.py at startup without any validation, sandboxing, or user confirmation. An attacker who can place a malicious tools.py in the directory where PraisonAI is launched (such as through a shared project, cloned repository, or writable workspace) achieves immediate arbitrary Python code execution in the host environment. This compromises the full PraisonAI process, the host system, and any connected data or credentials. This issue has been fixed in version 4.5.139.
Severity: 8.4 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "14 Apr 2026",
"Type": "Vulnerability"
}
πŸ”Ή t.me/cvedetector πŸ”Ή
{
"Source": "CVE FEED",
"Title": "CVE-2026-1607 - Surbma | Booking.com <= 2.1 - authenticated (contributor+) stored cross-site scripting via shortcode",
"Content": "CVE ID :CVE-2026-1607
Published : April 14, 2026, 4:17 a.m. | 1 hour, 40 minutes ago
Description :The Surbma | Booking.com Shortcode plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's `surbma-bookingcom` shortcode in all versions up to, and including, 2.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Severity: 6.4 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "14 Apr 2026",
"Type": "Vulnerability"
}
πŸ”Ή t.me/cvedetector πŸ”Ή
{
"Source": "CVE FEED",
"Title": "CVE-2026-2582 - Germanized for WooCommerce <= 3.20.5 - unauthenticated arbitrary shortcode execution",
"Content": "CVE ID :CVE-2026-2582
Published : April 14, 2026, 7:16 a.m. | 48 minutes ago
Description :The The Germanized for WooCommerce plugin for WordPress is vulnerable to arbitrary shortcode execution via 'account_holder' parameter in all versions up to, and including, 3.20.5. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes.
Severity: 6.5 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "14 Apr 2026",
"Type": "Vulnerability"
}
πŸ”Ή t.me/cvedetector πŸ”Ή
{
"Source": "CVE FEED",
"Title": "CVE-2026-33892 - Industrial Edge Management Pro/Virtual Unauthenticated Remote Authentication Bypass",
"Content": "CVE ID :CVE-2026-33892
Published : April 14, 2026, 9:16 a.m. | 50 minutes ago
Description :A vulnerability has been identified in Industrial Edge Management Pro V1 (All versions >= V1.7.6 < V1.15.17), Industrial Edge Management Pro V2 (All versions >= V2.0.0 < V2.1.1), Industrial Edge Management Virtual (All versions >= V2.2.0 < V2.8.0). Affected management systems do not properly enforce user authentication on remote connections to devices.
This could facilitate an unauthenticated remote attacker to circumvent authentication and impersonate a legitimate user.
Successful exploitation requires that the attacker has identified the header and port used for remote connections to devices and that the remote connection feature is enabled for the device.

Exploitation allows the attacker to tunnel to the device. Security features on this device itself (e.g. app specific authentication) are not affected.
Severity: 7.1 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "14 Apr 2026",
"Type": "Vulnerability"
}
πŸ”Ή t.me/cvedetector πŸ”Ή
{
"Source": "CVE FEED",
"Title": "CVE-2026-33929 - Apache PDFBox Examples: Path Traversal in PDFBox ExtractEmbeddedFiles Example Code",
"Content": "CVE ID :CVE-2026-33929
Published : April 14, 2026, 9:16 a.m. | 50 minutes ago
Description :Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Apache PDFBox Examples.

This issue affects the
ExtractEmbeddedFiles example in Apache PDFBox: from 2.0.24 through 2.0.36, from 3.0.0 through 3.0.7.


Users are recommended to update to version 2.0.37 or 3.0.8 once
available. Until then, they should apply the fix provided in GitHub PR
427.

The ExtractEmbeddedFiles example contained a path traversal vulnerability (CWE-22) mentioned in CVE-2026-23907. However the change in the releases 2.0.36 and 3.0.7 is flawed because it doesn't consider the file path separator. Because of that, a user having writing rights on /home/ABC could be victim to a malicious PDF resulting in a write attempt to any path starting with /home/ABC, e.g. "/home/ABCDEF".

Users who have copied this example into their production code should apply the mentioned change. The example
has been changed accordingly and is available in the project repository.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "14 Apr 2026",
"Type": "Vulnerability"
}
πŸ”Ή t.me/cvedetector πŸ”Ή
{
"Source": "CVE FEED",
"Title": "CVE-2026-4109 - Eventin – Events Calendar, Event Booking, Ticket & Registration (AI Powered) <= 4.1.8 missing authorization to authenticated (subscriber+) order information exposure",
"Content": "CVE ID :CVE-2026-4109
Published : April 14, 2026, 9:16 a.m. | 50 minutes ago
Description :The Eventin – Events Calendar, Event Booking, Ticket & Registration (AI Powered) plugin for WordPress is vulnerable to unauthorized access of data due to a improper capability check on the get_item_permissions_check() function in all versions up to, and including, 4.1.8. This makes it possible for authenticated attackers, with Subscriber-level access and above, to read arbitrary order data including customer PII (name, email, phone) by iterating order IDs.
Severity: 4.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "14 Apr 2026",
"Type": "Vulnerability"
}
πŸ”Ή t.me/cvedetector πŸ”Ή
{
"Source": "CVE FEED",
"Title": "CVE-2026-25654 - SINEC NMS Authentication Bypass Vulnerability",
"Content": "CVE ID :CVE-2026-25654
Published : April 14, 2026, 9:16 a.m. | 50 minutes ago
Description :A vulnerability has been identified in SINEC NMS (All versions < V4.0 SP3). Affected products do not properly validate user authorization when processing password reset requests. This could allow an authenticated remote attacker to bypass authorization checks, leading to the ability to reset the password of any arbitrary user account.
Severity: 8.8 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "14 Apr 2026",
"Type": "Vulnerability"
}
πŸ”Ή t.me/cvedetector πŸ”Ή
{
"Source": "CVE FEED",
"Title": "CVE-2026-27668 - RUGGEDCOM CROSSBOW SAM-P Privilege Escalation Vulnerability",
"Content": "CVE ID :CVE-2026-27668
Published : April 14, 2026, 9:16 a.m. | 50 minutes ago
Description :A vulnerability has been identified in RUGGEDCOM CROSSBOW Secure Access Manager Primary (SAM-P) (All versions < V5.8). User Administrators are allowed to administer groups they belong to. This could allow an authenticated User Administrator to escalate their own privileges and grant themselves access to any device group at any access level.
Severity: 8.8 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "14 Apr 2026",
"Type": "Vulnerability"
}
πŸ”Ή t.me/cvedetector πŸ”Ή
{
"Source": "CVE FEED",
"Title": "CVE-2026-31908 - Apache APISIX: forward auth plugin allows header injection",
"Content": "CVE ID :CVE-2026-31908
Published : April 14, 2026, 9:16 a.m. | 50 minutes ago
Description :Header injection vulnerability in Apache APISIX.

The attacker can take advantage of certain configuration in forward-auth plugin to inject malicious headers.
This issue affects Apache APISIX: from 2.12.0 through 3.15.0.

Users are recommended to upgrade to version 3.16.0, which fixes the issue.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "14 Apr 2026",
"Type": "Vulnerability"
}
πŸ”Ή t.me/cvedetector πŸ”Ή
{
"Source": "CVE FEED",
"Title": "CVE-2026-31923 - Apache APISIX: Openid-connect `tls_verify` field is disabled by default",
"Content": "CVE ID :CVE-2026-31923
Published : April 14, 2026, 9:16 a.m. | 50 minutes ago
Description :Cleartext Transmission of Sensitive Information vulnerability in Apache APISIX.

This can occur due to `ssl_verify` in openid-connect plugin configuration being set to false by default.
This issue affects Apache APISIX: from 0.7 through 3.15.0.

Users are recommended to upgrade to version 3.16.0, which fixes the issue.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "14 Apr 2026",
"Type": "Vulnerability"
}
πŸ”Ή t.me/cvedetector πŸ”Ή
{
"Source": "CVE FEED",
"Title": "CVE-2026-31924 - Apache APISIX: Plugin tencent-cloud-cls log export uses plaintext HTTP",
"Content": "CVE ID :CVE-2026-31924
Published : April 14, 2026, 9:16 a.m. | 50 minutes ago
Description :Cleartext Transmission of Sensitive Information vulnerability in Apache APISIX.

tencent-cloud-cls log export uses plaintext HTTP
This issue affects Apache APISIX: from 2.99.0 through 3.15.0.

Users are recommended to upgrade to version 3.16.0, which fixes the issue.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "14 Apr 2026",
"Type": "Vulnerability"
}
πŸ”Ή t.me/cvedetector πŸ”Ή
{
"Source": "CVE FEED",
"Title": "CVE-2025-40745 - Siemens Certificates Validation Weakness",
"Content": "CVE ID :CVE-2025-40745
Published : April 14, 2026, 9:16 a.m. | 50 minutes ago
Description :A vulnerability has been identified in Siemens Software Center (All versions < V3.5.8.2), Simcenter 3D (All versions < V2506.6000), Simcenter Femap (All versions < V2506.0002), Simcenter STAR-CCM+ (All versions < V2602), Solid Edge SE2025 (All versions < V225.0 Update 13), Solid Edge SE2026 (All versions < V226.0 Update 04), Tecnomatix Plant Simulation (All versions < V2504.0008). Affected applications do not properly validate client certificates to connect to Analytics Service endpoint. This could allow an unauthenticated remote attacker to perform man in the middle attacks.
Severity: 6.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "14 Apr 2026",
"Type": "Vulnerability"
}
πŸ”Ή t.me/cvedetector πŸ”Ή