Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2026-41461

Publication date:
23/04/2026
SocialEngine versions 7.8.0 and prior contain a blind server-side request forgery vulnerability in the /core/link/preview endpoint where user-supplied input passed via the uri request parameter is not sanitized before being used to construct outbound HTTP requests. Authenticated remote attackers can supply arbitrary URLs including internal network addresses and loopback addresses to cause the server to issue HTTP requests to attacker-controlled destinations, enabling internal network enumeration and access to services not intended to be externally reachable.
Severity CVSS v4.0: MEDIUM
Last modification:
29/04/2026

CVE-2026-35225

Publication date:
23/04/2026
An unauthenticated remote attacker is able to exhaust all available TCP connections in the CODESYS EtherNet/IP adapter stack, preventing legitimate clients from establishing new connections.
Severity CVSS v4.0: HIGH
Last modification:
24/04/2026

CVE-2025-70994

Publication date:
23/04/2026
Yadea T5 Electric Bicycles (models manufactured in/after 2024) have a weak authentication mechanism in their keyless entry system. The system utilizes the EV1527 fixed-code RF protocol without implementing rolling codes or cryptographic challenge-response mechanisms. This is vulnerable to signal forgery after a local attacker intercepts any legitimate key fob transmission, allowing for complete unauthorized vehicle operation via a replay attack.
Severity CVSS v4.0: Pending analysis
Last modification:
24/04/2026

CVE-2026-39440

Publication date:
23/04/2026
Improper Control of Generation of Code ('Code Injection') vulnerability in Funnelforms LLC FunnelFormsPro allows Remote Code Inclusion.This issue affects FunnelFormsPro: from n/a through 3.8.1.
Severity CVSS v4.0: Pending analysis
Last modification:
23/04/2026

CVE-2025-66286

Publication date:
23/04/2026
An API design flaw in WebKitGTK and WPE WebKit allows untrusted web content to unexpectedly perform IP connections, DNS lookups, and HTTP requests. Applications expect to use the<br /> WebPage::send-request signal handler to approve or reject all network requests. However, certain types of HTTP requests bypass this signal handler.
Severity CVSS v4.0: Pending analysis
Last modification:
24/04/2026

CVE-2025-13763

Publication date:
23/04/2026
Multiple uses of uninitialized variables were found in libopensc that may lead to information disclosure or application crash. An attack requires a crafted USB device or smart card that would present the system with specially crafted responses to the APDUs
Severity CVSS v4.0: Pending analysis
Last modification:
24/04/2026

CVE-2026-31531

Publication date:
23/04/2026
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> ipv4: nexthop: allocate skb dynamically in rtm_get_nexthop()<br /> <br /> When querying a nexthop object via RTM_GETNEXTHOP, the kernel currently<br /> allocates a fixed-size skb using NLMSG_GOODSIZE. While sufficient for<br /> single nexthops and small Equal-Cost Multi-Path groups, this fixed<br /> allocation fails for large nexthop groups like 512 nexthops.<br /> <br /> This results in the following warning splat:<br /> <br /> WARNING: net/ipv4/nexthop.c:3395 at rtm_get_nexthop+0x176/0x1c0, CPU#20: rep/4608<br /> [...]<br /> RIP: 0010:rtm_get_nexthop (net/ipv4/nexthop.c:3395)<br /> [...]<br /> Call Trace:<br /> <br /> rtnetlink_rcv_msg (net/core/rtnetlink.c:6989)<br /> netlink_rcv_skb (net/netlink/af_netlink.c:2550)<br /> netlink_unicast (net/netlink/af_netlink.c:1319 net/netlink/af_netlink.c:1344)<br /> netlink_sendmsg (net/netlink/af_netlink.c:1894)<br /> ____sys_sendmsg (net/socket.c:721 net/socket.c:736 net/socket.c:2585)<br /> ___sys_sendmsg (net/socket.c:2641)<br /> __sys_sendmsg (net/socket.c:2671)<br /> do_syscall_64 (arch/x86/entry/syscall_64.c:63 arch/x86/entry/syscall_64.c:94)<br /> entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130)<br /> <br /> <br /> Fix this by allocating the size dynamically using nh_nlmsg_size() and<br /> using nlmsg_new(), this is consistent with nexthop_notify() behavior. In<br /> addition, adjust nh_nlmsg_size_grp() so it calculates the size needed<br /> based on flags passed. While at it, also add the size of NHA_FDB for<br /> nexthop group size calculation as it was missing too.<br /> <br /> This cannot be reproduced via iproute2 as the group size is currently<br /> limited and the command fails as follows:<br /> <br /> addattr_l ERROR: message exceeded bound of 1048
Severity CVSS v4.0: Pending analysis
Last modification:
28/04/2026

CVE-2025-62104

Publication date:
23/04/2026
Missing Authorization vulnerability in Navneil Naicker ACF Galerie 4 allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects ACF Galerie 4: from n/a through 1.4.2.
Severity CVSS v4.0: Pending analysis
Last modification:
23/04/2026

CVE-2025-62110

Publication date:
23/04/2026
Improper Neutralization of Input During Web Page Generation (&amp;#39;Cross-site Scripting&amp;#39;) vulnerability in Rescue Themes Rescue Shortcodes allows Stored XSS.This issue affects Rescue Shortcodes: from n/a through 3.3.
Severity CVSS v4.0: Pending analysis
Last modification:
23/04/2026

CVE-2026-28040

Publication date:
23/04/2026
Improper Neutralization of Input During Web Page Generation (&amp;#39;Cross-site Scripting&amp;#39;) vulnerability in Magepeople inc. Taxi Booking Manager for WooCommerce allows Stored XSS.This issue affects Taxi Booking Manager for WooCommerce: from n/a through 2.0.0.
Severity CVSS v4.0: Pending analysis
Last modification:
23/04/2026

CVE-2026-31532

Publication date:
23/04/2026
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> can: raw: fix ro-&gt;uniq use-after-free in raw_rcv()<br /> <br /> raw_release() unregisters raw CAN receive filters via can_rx_unregister(),<br /> but receiver deletion is deferred with call_rcu(). This leaves a window<br /> where raw_rcv() may still be running in an RCU read-side critical section<br /> after raw_release() frees ro-&gt;uniq, leading to a use-after-free of the<br /> percpu uniq storage.<br /> <br /> Move free_percpu(ro-&gt;uniq) out of raw_release() and into a raw-specific<br /> socket destructor. can_rx_unregister() takes an extra reference to the<br /> socket and only drops it from the RCU callback, so freeing uniq from<br /> sk_destruct ensures the percpu area is not released until the relevant<br /> callbacks have drained.<br /> <br /> [mkl: applied manually]
Severity CVSS v4.0: Pending analysis
Last modification:
29/04/2026

CVE-2026-5464

Publication date:
23/04/2026
The ExactMetrics – Google Analytics Dashboard for WordPress (Website Stats Plugin) plugin for WordPress is vulnerable to unauthorized arbitrary plugin installation and activation in all versions up to, and including, 9.1.2. This is due to the reports page exposing the &amp;#39;onboarding_key&amp;#39; transient to any user with the &amp;#39;exactmetrics_view_dashboard&amp;#39; capability. This key is the sole authorization gate for the &amp;#39;/wp-json/exactmetrics/v1/onboarding/connect-url&amp;#39; REST endpoint, which returns a one-time hash (OTH) token. This OTH token is then the only credential checked by the &amp;#39;exactmetrics_connect_process&amp;#39; AJAX endpoint — which has no capability check, no nonce verification, and accepts an arbitrary plugin ZIP URL via the file parameter for installation and activation. This makes it possible for authenticated attackers, with Editor-level access and above granted the report viewing permission, to install and activate arbitrary plugins from attacker-controlled URLs, leading to Remote Code Execution.
Severity CVSS v4.0: Pending analysis
Last modification:
23/04/2026