Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2026-4993

Publication date:
28/03/2026
A vulnerability has been found in wandb OpenUI up to 0.0.0.0/1.0. This impacts an unknown function of the file backend/openui/config.py. The manipulation of the argument LITELLM_MASTER_KEY leads to hard-coded credentials. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Severity CVSS v4.0: LOW
Last modification:
24/04/2026

CVE-2026-2442

Publication date:
28/03/2026
The Page Builder: Pagelayer – Drag and Drop website builder plugin for WordPress is vulnerable to Improper Neutralization of CRLF Sequences ('CRLF Injection') in all versions up to, and including, 2.0.7. This is due to the contact form handler performing placeholder substitution on attacker-controlled form fields and then passing the resulting values into email headers without removing CR/LF characters. This makes it possible for unauthenticated attackers to inject arbitrary email headers (for example Bcc / Cc) and abuse form email delivery via the 'email' parameter granted they can target a contact form configured to use placeholders in mail template headers.
Severity CVSS v4.0: Pending analysis
Last modification:
24/04/2026

CVE-2026-23399

Publication date:
28/03/2026
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> nf_tables: nft_dynset: fix possible stateful expression memleak in error path<br /> <br /> If cloning the second stateful expression in the element via GFP_ATOMIC<br /> fails, then the first stateful expression remains in place without being<br /> released.<br /> <br />   unreferenced object (percpu) 0x607b97e9cab8 (size 16):<br />     comm "softirq", pid 0, jiffies 4294931867<br />     hex dump (first 16 bytes on cpu 3):<br />       00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00<br />     backtrace (crc 0):<br />       pcpu_alloc_noprof+0x453/0xd80<br />       nft_counter_clone+0x9c/0x190 [nf_tables]<br />       nft_expr_clone+0x8f/0x1b0 [nf_tables]<br />       nft_dynset_new+0x2cb/0x5f0 [nf_tables]<br />       nft_rhash_update+0x236/0x11c0 [nf_tables]<br />       nft_dynset_eval+0x11f/0x670 [nf_tables]<br />       nft_do_chain+0x253/0x1700 [nf_tables]<br />       nft_do_chain_ipv4+0x18d/0x270 [nf_tables]<br />       nf_hook_slow+0xaa/0x1e0<br />       ip_local_deliver+0x209/0x330
Severity CVSS v4.0: Pending analysis
Last modification:
27/04/2026

CVE-2026-1307

Publication date:
28/03/2026
The Ninja Forms - The Contact Form Builder That Grows With You plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 3.14.1 via a callback function for the admin_enqueue_scripts action handler in blocks/bootstrap.php. This makes it possible for authenticated attackers, with Contributor-level access and above, to gain access to an authorization token to view form submissions for arbitrary forms, which could potentially contain sensitive information.
Severity CVSS v4.0: Pending analysis
Last modification:
24/04/2026

CVE-2025-15445

Publication date:
28/03/2026
The Restaurant Cafeteria WordPress theme through 0.4.6 exposes insecure admin-ajax actions without nonce or capability checks, allowing any logged-in user, like subscriber, to perform privileged operations. An attacker can install and activate a from a user-supplied URL, leading to arbitrary PHP code execution, and also import demo content that rewrites site configuration, including Restaurant Cafeteria WordPress theme through 0.4.6_mods, pages, menus, and front page settings.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2025-12886

Publication date:
28/03/2026
The Oxygen Theme theme for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 6.0.8 via the laborator_calc_route AJAX action. This makes it possible for unauthenticated attackers to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.
Severity CVSS v4.0: Pending analysis
Last modification:
24/04/2026

CVE-2026-4987

Publication date:
28/03/2026
The SureForms – Contact Form, Payment Form &amp; Other Custom Form Builder plugin for WordPress is vulnerable to Payment Amount Bypass in all versions up to, and including, 2.5.2. This is due to the create_payment_intent() function performing a payment validation solely based on the value of a user-controlled parameter. This makes it possible for unauthenticated attackers to bypass configured form payment-amount validation and create underpriced payment/subscription intents by setting form_id to 0.
Severity CVSS v4.0: Pending analysis
Last modification:
24/04/2026

CVE-2026-1679

Publication date:
28/03/2026
The eswifi socket offload driver copies user-provided payloads into a fixed buffer without checking available space; oversized sends overflow `eswifi-&gt;buf`, corrupting kernel memory (CWE-120). Exploit requires local code that can call the socket send API; no remote attacker can reach it directly.
Severity CVSS v4.0: Pending analysis
Last modification:
31/03/2026

CVE-2026-4991

Publication date:
27/03/2026
A vulnerability was detected in QDOCS Smart School Management System up to 7.2. The impacted element is an unknown function of the file /admin/enquiry of the component Admission Enquiry Module. Performing a manipulation of the argument Note results in cross site scripting. The attack is possible to be carried out remotely.
Severity CVSS v4.0: MEDIUM
Last modification:
24/04/2026

CVE-2026-4992

Publication date:
27/03/2026
A flaw has been found in wandb OpenUI up to 1.0. This affects the function create_share/get_share of the file backend/openui/server.py of the component HTMLAnnotator Component. Executing a manipulation of the argument ID can lead to HTML injection. The attack may be performed from remote. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Severity CVSS v4.0: LOW
Last modification:
29/04/2026

CVE-2026-33993

Publication date:
27/03/2026
Locutus brings stdlibs of other programming languages to JavaScript for educational purposes. Prior to version 3.0.25, the `unserialize()` function in `locutus/php/var/unserialize` assigns deserialized keys to plain objects via bracket notation without filtering the `__proto__` key. When a PHP serialized payload contains `__proto__` as an array or object key, JavaScript&amp;#39;s `__proto__` setter is invoked, replacing the deserialized object&amp;#39;s prototype with attacker-controlled content. This enables property injection, for...in propagation of injected properties, and denial of service via built-in method override. This is distinct from the previously reported prototype pollution in `parse_str` (GHSA-f98m-q3hr-p5wq, GHSA-rxrv-835q-v5mh) — `unserialize` is a different function with no mitigation applied. Version 3.0.25 patches the issue.
Severity CVSS v4.0: MEDIUM
Last modification:
01/04/2026

CVE-2026-33994

Publication date:
27/03/2026
Locutus brings stdlibs of other programming languages to JavaScript for educational purposes. Starting in version 2.0.39 and prior to version 3.0.25, a prototype pollution vulnerability exists in the `parse_str` function of the npm package locutus. An attacker can pollute `Object.prototype` by overriding `RegExp.prototype.test` and then passing a crafted query string to `parse_str`, bypassing the prototype pollution guard. This vulnerability stems from an incomplete fix for CVE-2026-25521. The CVE-2026-25521 patch replaced the `String.prototype.includes()`-based guard with a `RegExp.prototype.test()`-based guard. However, `RegExp.prototype.test` is itself a writable prototype method that can be overridden, making the new guard bypassable in the same way as the original — trading one hijackable built-in for another. Version 3.0.25 contains an updated fix.
Severity CVSS v4.0: MEDIUM
Last modification:
01/04/2026