24h | 7d | 30d

Overview

  • F5
  • NGINX Plus

13 May 2026
Published
14 May 2026
Updated

CVSS v3.1
HIGH (8.1)
EPSS
0.17%

KEV

Description

NGINX Plus and NGINX Open Source have a vulnerability in the ngx_http_rewrite_module module. This vulnerability exists when the rewrite directive is followed by a rewrite, if, or set directive and an unnamed Perl-Compatible Regular Expression (PCRE) capture (for example, $1, $2) with a replacement string that includes a question mark (?). An unauthenticated attacker along with conditions beyond its control can exploit this vulnerability by sending crafted HTTP requests. This may cause a heap buffer overflow in the NGINX worker process leading to a restart. Additionally, for systems with Address Space Layout Randomization (ASLR ) disabled, code execution is possible.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

Statistics

  • 22 Posts
  • 157 Interactions

Last activity: Last hour

Fediverse

Profile picture fallback

: An 18-year-old RCE vulnerability CVE-2026-42945 in the rewrite module enables server takeover. Update to NGINX 1.31.0 or 1.30.1 immediately!
👇
thehackernews.com/2026/05/18-y

  • 27
  • 23
  • 1
  • 21h ago
Profile picture fallback

CVE-2026-42945 - Nginx (otherwise branded Nginx Rift)

It relies on a specific Nginx config to be vulnerable, and for attacker to know or discover the config to exploit it. To reach RCE, also ASLR needs to have been disabled on the box.

The PoC they've built specifically disabled ASLR, deploys a specifically vulnerable config and the exploit knows about the vulnerable config endpoint.

  • 17
  • 48
  • 0
  • 22h ago
Profile picture fallback

Une faille vieille de 18 ans dans Nginx, un PoC public, beaucoup de bruit… mais qui est vraiment concerné ?

cryptolab.re/posts/2026/nginx-

#nginx #linux #devops #sysadmin #cybersecurity

  • 5
  • 2
  • 0
  • 2h ago
Profile picture fallback

The EasyEngine tutorial, StackPointer, WPMU DEV, Stack Overflow, and the WordPress.org forums all reference this same pattern.

This can easily be chained with one (or both) of two recent and trivial-to-exploit local privilege escalation Linux vulns.

In the words of @krypt3ia :

we doomed.

HOWEVER: I threw together a small Bash script that tries to detect whether a given conf file or directory of nginx configs has vulnerable directives. You can find it at:

git.sr.ht/~hrbrmstr/cve-2026-4 (2/3)

  • 3
  • 5
  • 0
  • 22h ago
Profile picture fallback

⚠️ NGINX `rewrite` vulnerability

Using unnamed regex captures (`$1`, `$2`) with `?` in replacement strings plus `rewrite`/`if`/`set` can be triggered **without auth**.

Systems with ASLR disabled are at risk of remote code execution. Patch immediately!

my.f5.com/manage/s/article/K00

nvd.nist.gov/vuln/detail/CVE-2

#NGINX #CVE202642945 #ZeroDay #InfoSec #RCE #CyberSecurity

  • 3
  • 2
  • 0
  • 10h ago
Profile picture fallback

Regarding CVE-2026-42945 in nginx - no modern (or even old) Linux distribution runs nginx without ASLR.

The way the PoC exploit works is they spawn nginx like this:

> exec setarch x86_64 -R /nginx-src/build/nginx -p /app -c /app/nginx.conf

Setarch -R disables ASLR. I've had a look through Github and I can't find any other software which actually does this for nginx either.

So, cool, sweet technical vuln - it's valid - but the RCE apocalypse ain't coming.

  • 2
  • 8
  • 0
  • Last hour
Profile picture fallback

⚡ An 18-year-old flaw in NGINX can let unauthenticated attackers run code or crash servers using crafted HTTP requests.

Tracked as CVE-2026-42945 and named NGINX Rift, the bug affects NGINX Plus and Open Source.

Patch details and mitigation steps: thehackernews.com/2026/05/18-y

  • 1
  • 1
  • 0
  • 22h ago
Profile picture fallback

NGINX Rift allows an unauthenticated attacker to crash a worker process, or potentially achieve remote code execution on hosts with ASLR disabled, by sending a single crafted HTTP request.

Help us test our patched nginx package: almalinux.org/blog/2026-05-13-

  • 1
  • 0
  • 0
  • 19h ago
Profile picture fallback

🚨 Nouvelle faille critique sur NGINX : CVE-2026-42945 (Z)

Une vulnérabilité dans ngx_http_rewrite_module peut provoquer un crash des workers NGINX, voire une exécution de code si l’ASLR est désactivé.

👉 security-tracker.debian.org/tr

  • 1
  • 0
  • 1
  • 1h ago
Profile picture fallback

Have y'all heard of any vendors discussing impact / no impact to CVE-2026-42945 ( the sev:CRIT NGINX RCE )? I see it running on a lot of appliances and enterprise services but don't have access to the NGINX configs to see the rewrite rules, or if ASLR is enabled.

  • 0
  • 2
  • 0
  • 15h ago
Profile picture fallback

yay, seems like nginx has a CVE... thanks AI

nvd.nist.gov/vuln/detail/CVE-2

  • 0
  • 0
  • 0
  • 18h ago
Profile picture fallback

GitHub - DepthFirstDisclosures/Nginx-Rift: exploit for CVE-2026-42945 · GitHub
github.com/DepthFirstDisclosur

That's bad... let's hope we don't use that

  • 0
  • 0
  • 0
  • 13h ago
Profile picture fallback

I don't wanna ruin your Friday, but nginx has a serious CVE with a rating of 9.2, and you should patch or mitigate it asap.

The CVE is an unauthenticated http request that can lead to a deterministic buffer overflow and remote code execution.

depthfirst.com/nginx-rift

#nginx #cve_2026_42945 #cve202642945

  • 0
  • 0
  • 0
  • Last hour
Profile picture fallback

CVE-2026-42945 + CVE-2026-43284 = full compromise, hope you guys are patching ;)

#infosec #cybersecurity

  • 0
  • 2
  • 0
  • 3h ago

Bluesky

Profile picture fallback
🚨 Critical NGINX RCE vulnerability (CVE-2026-42945, "NGINX Rift") disclosed — affecting NGINX Open Source. Bitnami patched container images and Helm charts are already live — released within hours of disclosure. Don't wait, update now. 🔗 community.broadcom.com/tanzu/blogs/...
  • 1
  • 1
  • 0
  • 22h ago
Profile picture fallback
CVE-2026-42945 : NGINX Heap Buffer Overflow in rewrite module - Writeup and PoC
  • 0
  • 0
  • 1
  • 23h ago
Profile picture fallback
18-year-old NGINX heap buffer overflow CVE-2026-42945 affects versions 0.6.27 to 1.30.0, enabling DoS and possible RCE under specific rewrite/set configs. F5 has released fixes. #NGINX #F5 #CVE202642945
  • 0
  • 0
  • 0
  • 15h ago
Profile picture fallback
💡 Summary: NGINXのngx_http_rewrite_moduleに起因する深刻なヒープバッファオーバーフローの RCE PoCが公開され、rewriteとsetディレクティブを利用する未認証リモートコード実行が可能となる脆弱性(CVE-2026-42945)の他、同様のメモリ破壊問題が計4件報告された。脆弱性は、2-passのスクリプトエンジンの長さ計算とコピー処理の間でis_argsの扱いが不整合になることで、攻撃者制御のURIデータを用いたヒープ領域の破壊を招き、ngx_pool_cleanup_sを介してsystem()を実行させる流れを利用する。 (1/2)
  • 0
  • 0
  • 0
  • 2h ago

Overview

  • Pending

Pending
Published
Pending
Updated

CVSS
Pending
EPSS
Pending

KEV

Description

This candidate has been reserved by a CVE Numbering Authority (CNA). This record will be updated by the assigning CNA once details are available.

Statistics

  • 13 Posts
  • 1 Interaction

Last activity: 1 hour ago

Fediverse

Profile picture fallback

Una nuova falla di Fragnesia su Linux consente agli attaccanti di ottenere privilegi di root

Le distribuzioni Linux stanno rilasciando patch per una nuova vulnerabilità di escalation dei privilegi del kernel di alta gravità (nota come Fragnesia e tracciata come CVE-2026-46300) che permette agli attaccanti di eseguire codice dannoso come root

bleepingcomputer.com/news/secu…

@gnulinuxitalia

  • 1
  • 0
  • 0
  • 13h ago
Profile picture fallback

Jour férié en fin de semaine en France, jour de #LPE (exploit Linux accessible aux utilisateurs) :

security-tracker.debian.org/tr

😠

  • 0
  • 0
  • 0
  • 23h ago
Profile picture fallback

Beep!

sudo sh -c "printf 'install esp4 /bin/false\ninstall esp6 /bin/false\ninstall rxrpc /bin/false\n' > /etc/modprobe.d/fragnesia.conf; rmmod esp4 esp6 rxrpc 2>/dev/null; true"

tuxcare.com/blog/fragnesia-cve

  • 0
  • 0
  • 0
  • 10h ago
Profile picture fallback

Oh and while we are here, Linux fans, please tell me you have updated your machine for "Fragnesia (CVE-2026-46300)", right… right!?

github.com/v12-security/pocs/t

  • 0
  • 0
  • 0
  • 4h ago
Profile picture fallback

Linux distributions are alerting users to a newly disclosed kernel vulnerability that could allow local attackers to escalate privileges to root.

The flaw, dubbed Fragnesia and tracked as CVE-2026-46300, enables unprivileged users to obtain root access by overwriting critical system files.

Most Linux distributions are impacted, and vendors have begun rolling out security patches.

  • 0
  • 0
  • 0
  • 2h ago

Bluesky

Profile picture fallback
Fragnesia (CVE-2026-46300) enables unprivileged users to gain root by corrupting Linux page-cache memory via the XFRM ESP-in-TCP/IPsec path, with public exploit code available.
  • 0
  • 0
  • 0
  • 22h ago
Profile picture fallback
Fragnesia (CVE-2026-46300) is a local kernel flaw enabling unprivileged attackers to overwrite files and gain root; patches are available and should be applied quickly.
  • 0
  • 0
  • 0
  • 20h ago
Profile picture fallback
Linux kernels face Fragnesia, a CVE-2026-46300 flaw in XFRM ESP-in-TCP that can let a local attacker gain root access and overwrite sensitive files. Microsoft says a PoC exists, but no in-the-wild abuse yet. #Fragnesia #CVE202646300 #LinuxKernel
  • 0
  • 0
  • 0
  • 19h ago
Profile picture fallback
"Fragnesia" Local Privilege Escalation report via ESP-in-TCP in the Linux Kernel (CVE-2026-46300) #patchmanagement
  • 0
  • 0
  • 0
  • 14h ago
Profile picture fallback
Fragnesia: New Linux kernel LPE bug was spawned by Dirty Frag patch (CVE-2026-46300) 📖 Read more: www.helpnetsecurity.com/2026/05/14/f... #cybersecurity #cybersecuritynews #containers #Linux #exploit #PoC #vulnerability @vakzz.bsky.social
  • 0
  • 0
  • 0
  • 3h ago
Profile picture fallback
A third major Linux kernel vulnerability has been disclosed in just two weeks, with the new flaw dubbed "Fragnesia" (CVE-2026-46300) allowing local attackers to escalate privileges to root.
  • 0
  • 0
  • 0
  • 3h ago
Profile picture fallback
Fragnesia Linux LPE: One Line Roots Your Kernel—Patch Now Before the Page Cache Betrays You + Video Introduction A newly disclosed Linux kernel local privilege escalation (LPE) vulnerability, tracked as CVE-2026-46300 and dubbed “Fragnesia,” allows an unprivileged local attacker to gain immediate…
  • 0
  • 0
  • 0
  • 1h ago

Overview

  • Cisco
  • Cisco Catalyst SD-WAN Manager

14 May 2026
Published
15 May 2026
Updated

CVSS v3.1
CRITICAL (10.0)
EPSS
Pending

Description

May 2026: This security advisory provides the details and fix information for a vulnerability that was discovered and fixed after the was disclosed in February 2026. This new advisory is for a new vulnerability in the control connection handshaking. The section of this advisory includes Show Control Connections guidance to help with system checks.  A vulnerability in the peering authentication in Cisco Catalyst SD-WAN Controller, formerly SD-WAN vSmart, and Cisco Catalyst SD-WAN Manager, formerly SD-WAN vManage, could allow an unauthenticated, remote attacker to bypass authentication and obtain administrative privileges on an affected system. This vulnerability exists because the peering authentication mechanism in an affected system is not working properly. An attacker could exploit this vulnerability by sending crafted requests to the affected system. A successful exploit could allow the attacker to log in to an affected Cisco Catalyst SD-WAN Controller as an internal, high-privileged, non-root user account. Using this account, the attacker could access NETCONF, which would then allow the attacker to manipulate network configuration for the SD-WAN fabric.

Statistics

  • 15 Posts
  • 10 Interactions

Last activity: 2 hours ago

Fediverse

Bluesky

Profile picture fallback
Cisco is warning that a critical Catalyst SD-WAN Controller authentication bypass flaw, tracked as CVE-2026-20182, was actively exploited in zero-day attacks that allowed attackers to gain administrative privileges on compromised devices.
  • 1
  • 3
  • 0
  • 13h ago
Profile picture fallback
@talosintelligence.com Attackers are actively exploiting critical auth bypass flaws in Cisco Catalyst SD-WAN to deploy webshells and C2 implants. - IOCs: 194. 163. 175. 135, 23. 27. 143. 170, 13. 62. 52. 206 - #CVE202620182 #Cisco #ThreatIntel
  • 0
  • 0
  • 0
  • 17h ago
Profile picture fallback
Cisco released updates for CVE-2026-20182, a maximum-severity authentication bypass in Catalyst SD-WAN Controller that enables unauthenticated remote admin access and NETCONF configuration changes.
  • 0
  • 0
  • 0
  • 15h ago
Profile picture fallback
Cisco patched a critical vulnerability (CVE-2026-20182) in its Catalyst SD-WAN software that has been exploited in limited attacks. The flaw, […]
  • 0
  • 0
  • 0
  • 14h ago
Profile picture fallback
~Cisa~ CISA added CVE-2026-20182, an actively exploited Cisco SD-WAN authentication bypass flaw, to its KEV catalog. - IOCs: CVE-2026-20182 - #CVE202620182 #Cisco #ThreatIntel
  • 0
  • 0
  • 0
  • 14h ago
Profile picture fallback
CISAが既知の悪用された脆弱性を1件カタログに追加 CISA Adds One Known Exploited Vulnerability to Catalog #CISA (May 14) CVE-2026-20182 Cisco Catalyst SD-WANコントローラ認証バイパスの脆弱性 www.cisa.gov/news-events/...
  • 0
  • 0
  • 0
  • 9h ago
Profile picture fallback
CVE-2026-20182 Cisco Catalyst SD-WAN Controller Authentication Bypass Vulnerability
  • 0
  • 0
  • 1
  • 7h ago
Profile picture fallback
CVE-2026-20182 in Cisco Catalyst SD-WAN Controller enables unauthenticated remote authentication bypass and administrative access, added to CISA KEV with FCEB remediation by May 17, 2026.
  • 0
  • 0
  • 0
  • 4h ago
Profile picture fallback
Cisco Catalyst SD-WANの重大な脆弱性、ゼロデイ攻撃で悪用される(CVE-2026-20182) | Codebook|Security News https://codebook.machinarecord.com/threatreport/silobreaker-cyber-alert/45603/
  • 0
  • 0
  • 0
  • 3h ago
Profile picture fallback
Cisco released patches for CVE-2026-20182, an exploited SD-WAN authentication bypass that can grant remote attackers admin privileges via crafted packets.
  • 0
  • 0
  • 0
  • 3h ago
Profile picture fallback
Cisco SD-WAN CVE-2026-20182, a CVSS 10.0 auth bypass, is being exploited in the wild. Attackers linked to UAT-8616 have gained admin access, added SSH keys, and altered NETCONF settings. #Cisco #SDWAN #UAT8616
  • 0
  • 0
  • 0
  • 3h ago
Profile picture fallback
Cisco fixed CVE-2026-20182 in Catalyst SD-WAN Controller and Manager after active exploitation of an auth bypass that can grant admin access and let attackers alter network configs. #Cisco #CVE2026 #SDWAN
  • 0
  • 0
  • 0
  • 2h ago
Profile picture fallback
CISA added CVE-2026-20182 to KEV after active exploitation of Cisco Catalyst SD-WAN. The 10.0 auth bypass is linked to UAT-8616, with attacks using web shells, miners, backdoors, and stealers. #Cisco #UAT8616 #KEV
  • 0
  • 0
  • 0
  • 2h ago

Overview

  • Microsoft
  • Microsoft Exchange Server 2016 Cumulative Update 23

14 May 2026
Published
15 May 2026
Updated

CVSS v3.1
HIGH (8.1)
EPSS
Pending

KEV

Description

Improper neutralization of input during web page generation ('cross-site scripting') in Microsoft Exchange Server allows an unauthorized attacker to perform spoofing over a network.

Statistics

  • 9 Posts
  • 4 Interactions

Last activity: 2 hours ago

Fediverse

Profile picture fallback
  • 0
  • 1
  • 0
  • 15h ago

Bluesky

Profile picture fallback
Microsoft released IIS URL Rewrite rule mitigation M2.1.0 for EEMS and EOMT today and disclosed CVE-2026-42897, a reported vulnerability affecting Outlook on the web in Exchange Server. This article talks about why you need EEMS or EOMT. lnkd.in/g7UNCHsQ #MSExchange
  • 1
  • 1
  • 0
  • 16h ago
Profile picture fallback
Microsoft disclosed CVE-2026-42897, a reported vulnerability affecting Exchange Server OWA. More info at techcommunity.microsoft.com/blog/exchang... #MSExchange #Security #EEMS #mitigation
  • 0
  • 1
  • 0
  • 16h ago
Profile picture fallback
"Addressing Exchange Server May 2026 vulnerability CVE-2026-42897" buff.ly/AIsupjL #Microsoft #techcommunity
  • 0
  • 0
  • 1
  • 16h ago
Profile picture fallback
Addressing Exchange Server May 2026 vulnerability CVE-2026-42897 #patchmanagement
  • 0
  • 0
  • 1
  • 13h ago
Profile picture fallback
CVE-2026-42897 enables spoofing via cross-site scripting in on-premises Exchange Server, with active exploitation, mitigated by emergency service or EOMT.
  • 0
  • 0
  • 0
  • 3h ago
Profile picture fallback
On-Prem Microsoft Exchange Server CVE-2026-42897 Exploited via Crafted Email https://thehackernews.com/2026/05/on-prem-microsoft-exchange-server-cve.html
  • 0
  • 0
  • 0
  • 2h ago

Overview

  • MervinPraison
  • PraisonAI

08 May 2026
Published
08 May 2026
Updated

CVSS v3.1
HIGH (7.3)
EPSS
0.07%

KEV

Description

PraisonAI is a multi-agent teams system. From version 2.5.6 to before version 4.6.34, PraisonAI ships a legacy Flask API server with authentication disabled by default. When that server is used, any caller that can reach it can access /agents and trigger the configured agents.yaml workflow through /chat without providing a token. This issue has been patched in version 4.6.34.

Statistics

  • 4 Posts
  • 1 Interaction

Last activity: 16 hours ago

Fediverse

Profile picture fallback

📰 PraisonAI Auth Bypass (CVE-2026-44338) Exploited Within Four Hours of Disclosure

The disclosure-to-exploit window has collapsed. ⏱️ A critical auth bypass in PraisonAI (CVE-2026-44338) was exploited by automated scanners in under 4 hours. A stark reminder to patch immediately. #CyberSecurity #Vulnerability #Automation #AI

🔗 cyber.netsecops.io/articles/pr

  • 1
  • 0
  • 0
  • 19h ago

Bluesky

Profile picture fallback
PraisonAI CVE-2026-44338 Auth Bypass Targeted Within Hours of Disclosure https://thehackernews.com/2026/05/praisonai-cve-2026-44338-auth-bypass.html
  • 0
  • 0
  • 0
  • 21h ago
Profile picture fallback
CVE-2026-44338: Scanners Target PraisonAI Within Four Hours of Disclosure
  • 0
  • 0
  • 0
  • 21h ago
Profile picture fallback
PraisonAI CVE-2026-44338 Auth Bypass Targeted Within Hours of Disclosure #cybersecurity #hacking #news #infosec #security #technology #privacy thehackernews.com/20...
  • 0
  • 0
  • 0
  • 16h ago

Overview

  • Pending

Pending
Published
Pending
Updated

CVSS
Pending
EPSS
Pending

KEV

Description

This candidate has been reserved by a CVE Numbering Authority (CNA). This record will be updated by the assigning CNA once details are available.

Statistics

  • 3 Posts
  • 6 Interactions

Last activity: 10 hours ago

Fediverse

Profile picture fallback
  • 4
  • 2
  • 0
  • 22h ago

Bluesky

Profile picture fallback
[25.11] phpPackages.composer: 2.9.7 -> 2.9.8, fix CVE-2026-45793 https://github.com/NixOS/nixpkgs/pull/520146 #security
  • 0
  • 0
  • 0
  • 15h ago
Profile picture fallback
#520179 lutgen: 1.0.1 -> 1.1.1 #520161 vscode-extensions.sonarsource.sonarlint-vscode: 5.2.1 -> 5.2.3 #520155 kubernetes: 1.36.0 -> 1.36.1 #520146 [25.11] phpPackages.composer: 2.9.7 -> 2.9.8, fix CVE-2026-45793 #520145 dwproton-bin: dwproton-10.0-26 -> dwproton-11.0-1
  • 0
  • 0
  • 0
  • 10h ago

Overview

  • Microsoft
  • Windows 11 version 22H3

12 May 2026
Published
14 May 2026
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
0.07%

KEV

Description

Heap-based buffer overflow in Microsoft Windows DNS allows an unauthorized attacker to execute code over a network.

Statistics

  • 3 Posts

Last activity: 1 hour ago

Fediverse

Profile picture fallback

CVE-2026-41096 普通に刺さりそうで怖いな
msrc.microsoft.com/update-guid

  • 0
  • 0
  • 0
  • 8h ago
Profile picture fallback

📰 Microsoft's May Patch Tuesday: 137 Flaws Fixed, Including Critical Netlogon RCE

Microsoft's May Patch Tuesday is huge: 137 vulnerabilities fixed, 30 critical. No zero-days for the first time in 22 months! 🚨 Key patches for critical RCEs in Netlogon (CVE-2026-41089) and DNS Client (CVE-2026-41096). Patch now! ✅ #PatchTuesday

🔗 cyber.netsecops.io/articles/mi

  • 0
  • 0
  • 0
  • 19h ago

Bluesky

Profile picture fallback
Breaking Down CVE-2026-41096: The DNS-Based RCE That Turns svchostexe into a LOLBin Launcher + Video Introduction: A newly disclosed critical vulnerability, CVE-2026-41096, exploits a heap-based buffer overflow in the Windows DNS Client (DNSAPI.dll), enabling remote code execution (RCE) with a…
  • 0
  • 0
  • 0
  • 1h ago

Overview

  • Fortinet
  • FortiSandbox Cloud

12 May 2026
Published
13 May 2026
Updated

CVSS v3.1
CRITICAL (9.1)
EPSS
0.04%

KEV

Description

A missing authorization vulnerability in Fortinet FortiSandbox 5.0.0 through 5.0.1, FortiSandbox 4.4.0 through 4.4.8, FortiSandbox Cloud 5.0.2 through 5.0.5, FortiSandbox PaaS 23.4 all versions, FortiSandbox PaaS 23.3 all versions, FortiSandbox PaaS 23.1 all versions, FortiSandbox PaaS 22.2 all versions, FortiSandbox PaaS 22.1 all versions, FortiSandbox PaaS 21.4 all versions, FortiSandbox PaaS 21.3 all versions, FortiSandbox PaaS 5.0.0 through 5.0.1, FortiSandbox PaaS 4.4.5 through 4.4.8 may allow an unauthenticated attacker to execute unauthorized code or commands via HTTP requests.

Statistics

  • 2 Posts
  • 5 Interactions

Last activity: Last hour

Fediverse

Profile picture fallback

CVE-2026-26083: Critical Fortinet FortiSandbox Flaw Allows Unauthenticated Remote Code Execution — Patch Now
#CyberSecurity
securebulletin.com/cve-2026-26

  • 4
  • 0
  • 0
  • Last hour

Bluesky

Profile picture fallback
Fortinetが複数製品の脆弱性を修正、FortiSandboxの認可不備は未認証でコード実行の恐れ(CVE-2026-26083 他) rocket-boys.co.jp/security-mea... #セキュリティ対策Lab #security #securitynews
  • 0
  • 1
  • 0
  • 11h ago

Overview

  • burstbv
  • Burst Statistics – Privacy-Friendly WordPress Analytics (Google Analytics Alternative)

14 May 2026
Published
14 May 2026
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
0.26%

KEV

Description

The Burst Statistics – Privacy-Friendly WordPress Analytics (Google Analytics Alternative) plugin for WordPress is vulnerable to Authentication Bypass in versions 3.4.0 to 3.4.1.1. This is due to incorrect return-value handling in the `is_mainwp_authenticated()` function when validating application passwords from the Authorization header. This makes it possible for unauthenticated attackers, with knowledge of an administrator username, to impersonate that administrator for the duration of the request by supplying any random Basic Authentication password achieving privilege escalation.

Statistics

  • 2 Posts

Last activity: 8 hours ago

Fediverse

Profile picture fallback

🔴 CVE-2026-8181: Burst Statistics WP plugin (v3.4.0 – 3.4.1.1) suffers CRITICAL auth bypass. Attackers can impersonate admins using any password — immediate removal advised until a fix is released. Details: radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 19h ago

Bluesky

Profile picture fallback
Hackers are exploiting CVE-2026-8181 in Burst Statistics to bypass auth, impersonate admins, and create rogue accounts. Wordfence reports over 7,400 blocked attacks. #WordPress #BurstStatistics #Wordfence
  • 0
  • 0
  • 0
  • 8h ago

Overview

  • Microsoft
  • Microsoft 365 Apps for Enterprise

12 May 2026
Published
14 May 2026
Updated

CVSS v3.1
HIGH (8.4)
EPSS
0.06%

KEV

Description

Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally.

Statistics

  • 2 Posts

Last activity: 10 hours ago

Bluesky

Profile picture fallback
Microsoft Wordの脆弱性 CVE-2026-40361に注意、Outlookでゼロクリック型サイバー攻撃への悪用の恐れ rocket-boys.co.jp/security-mea... #セキュリティ対策Lab #security #securitynews #cyberattack
  • 0
  • 0
  • 0
  • 11h ago
Profile picture fallback
Microsoft Wordの脆弱性 CVE-2026-40361に注意、Outlookでゼロクリック型サイバー攻撃への悪用の恐れ|セキュリティニュースのセキュリティ対策Lab https://rocket-boys.co.jp/security-measures-lab/microsoft-word-zero-click-outlook-cve-2026-40361/ 更新適用は早急に
  • 0
  • 0
  • 0
  • 10h ago
Showing 1 to 10 of 64 CVEs