Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2026-5785

Publication date:
16/04/2026
Zohocorp ManageEngine PAM360 versions before 8531 and ManageEngine Password Manager Pro versions from 8600 to 13230 are vulnerable to Authenticated SQL injection in the query report module.
Severity CVSS v4.0: Pending analysis
Last modification:
17/04/2026

CVE-2026-4160

Publication date:
16/04/2026
The Fluent Forms – Customizable Contact Forms, Survey, Quiz, & Conversational Form Builder plugin for WordPress is vulnerable to Insecure Direct Object Reference via the 'submission_id' parameter in versions up to, and including, 6.1.21. This is due to missing authorization and ownership validation on a user controlled key in the Stripe SCA confirmation AJAX endpoint. This makes it possible for unauthenticated attackers to modify payment status of targeted pending submissions (for example, setting the status to "failed").
Severity CVSS v4.0: Pending analysis
Last modification:
22/04/2026

CVE-2026-31987

Publication date:
16/04/2026
JWT Tokens used by tasks were exposed in logs. This could allow UI users to act as Dag Authors. <br /> Users are advised to upgrade to Airflow version that contains fix.<br /> <br /> Users are recommended to upgrade to version 3.2.0, which fixes this issue.
Severity CVSS v4.0: Pending analysis
Last modification:
20/04/2026

CVE-2026-6414

Publication date:
16/04/2026
@fastify/static versions 8.0.0 through 9.1.0 decode percent-encoded path separators (%2F) before filesystem resolution, while Fastify&amp;#39;s router treats them as literal characters. This mismatch allows attackers to bypass route-based middleware or guards that protect files served by @fastify/static. For example, a route guard on a protected path can be circumvented by encoding the path separator in the URL. Upgrade to @fastify/static 9.1.1 to fix this issue. There are no workarounds.
Severity CVSS v4.0: Pending analysis
Last modification:
23/04/2026

CVE-2026-5968

Publication date:
16/04/2026
Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. Reason: This candidate was issued in error. Notes: All references and descriptions in this candidate have been removed to prevent accidental usage.
Severity CVSS v4.0: Pending analysis
Last modification:
16/04/2026

CVE-2026-31843

Publication date:
16/04/2026
The goodoneuz/pay-uz Laravel package (
Severity CVSS v4.0: CRITICAL
Last modification:
17/04/2026

CVE-2025-15621

Publication date:
16/04/2026
Insufficiently Protected Credentials in Sparx Systems Pty Ltd. Sparx Enterprise Architect. Client does not verify the receiver of OAuth2 credentials during OpenID authentication
Severity CVSS v4.0: MEDIUM
Last modification:
17/04/2026

CVE-2026-3369

Publication date:
16/04/2026
The Better Find and Replace – AI-Powered Suggestions plugin for WordPress is vulnerable to Stored Cross-Site Scripting via uploaded image title in versions up to, and including, 1.7.9 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Severity CVSS v4.0: Pending analysis
Last modification:
22/04/2026

CVE-2026-3489

Publication date:
16/04/2026
The DirectoryPress – Business Directory And Classified Ad Listing plugin for WordPress is vulnerable to SQL Injection via the &amp;#39;packages&amp;#39; parameter in versions up to, and including, 3.6.26 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
Severity CVSS v4.0: Pending analysis
Last modification:
22/04/2026

CVE-2026-3155

Publication date:
16/04/2026
The OneSignal – Web Push Notifications plugin for WordPress is vulnerable to authorization bypass in versions up to, and including, 3.8.0. This is due to the plugin not properly verifying that a user is authorized to perform an action. This makes it possible for authenticated attackers, with subscriber-level access and above, to delete OneSignal metadata for arbitrary posts.
Severity CVSS v4.0: Pending analysis
Last modification:
22/04/2026

CVE-2025-12624

Publication date:
16/04/2026
Active access tokens are not revoked or invalidated when a user account is locked within WSO2 Identity Server. This failure to enforce revocation allows previously issued, valid tokens to remain usable, enabling continued access to protected resources by locked user accounts.<br /> <br /> The security consequence is that a locked user account can maintain access to protected resources through the use of existing, unexpired access tokens. This creates a security gap where access control policies are bypassed, potentially leading to unauthorized data access or actions until the tokens naturally expire.
Severity CVSS v4.0: Pending analysis
Last modification:
23/04/2026

CVE-2025-6024

Publication date:
16/04/2026
The authentication endpoint fails to encode user-supplied input before rendering it in the web page, allowing for script injection.<br /> An attacker can leverage this by injecting malicious scripts into the authentication endpoint. This can result in the user&amp;#39;s browser being redirected to a malicious website, manipulation of the web page&amp;#39;s user interface, or the retrieval of information from the browser. However, session hijacking is not possible due to the httpOnly flag protecting session-related cookies.
Severity CVSS v4.0: Pending analysis
Last modification:
23/04/2026