Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-14573

Publication date:
16/02/2026
Mattermost versions 10.11.x
Severity CVSS v4.0: Pending analysis
Last modification:
18/02/2026

CVE-2026-2556

Publication date:
16/02/2026
A security vulnerability has been detected in cskefu up to 8.0.1. This issue affects some unknown processing of the file com/cskefu/cc/controller/resource/MediaController.java of the component Endpoint. The manipulation of the argument url leads to server-side request forgery. The attack may be initiated remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Severity CVSS v4.0: MEDIUM
Last modification:
20/02/2026

CVE-2026-1046

Publication date:
16/02/2026
Mattermost Desktop App versions
Severity CVSS v4.0: Pending analysis
Last modification:
23/03/2026

CVE-2025-14350

Publication date:
16/02/2026
Mattermost versions 11.1.x
Severity CVSS v4.0: Pending analysis
Last modification:
18/02/2026

CVE-2025-2418

Publication date:
16/02/2026
URL Redirection to Untrusted Site (&amp;#39;Open Redirect&amp;#39;) vulnerability in TR7 Cyber ​​Defense Inc. Web Application Firewall allows Phishing.This issue affects Web Application Firewall: from 4.30 through 16022026.<br /> <br /> NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
Severity CVSS v4.0: Pending analysis
Last modification:
18/02/2026

CVE-2026-2553

Publication date:
16/02/2026
A security flaw has been discovered in tushar-2223 Hotel-Management-System up to bb1f3b3666124b888f1e4bcf51b6fba9fbb01d15. This affects an unknown part of the file /home.php of the component HTTP POST Request Handler. Performing a manipulation of the argument Name/Email results in sql injection. The attack can be initiated remotely. The exploit has been released to the public and may be used for attacks. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. The vendor was contacted early about this disclosure but did not respond in any way.
Severity CVSS v4.0: MEDIUM
Last modification:
18/02/2026

CVE-2026-2555

Publication date:
16/02/2026
A weakness has been identified in JeecgBoot 3.9.1. This vulnerability affects the function importDocumentFromZip of the file org/jeecg/modules/airag/llm/controller/AiragKnowledgeController.java of the component Retrieval-Augmented Generation. Executing a manipulation can lead to deserialization. The attack can be launched remotely. Attacks of this nature are highly complex. It is stated that the exploitability is difficult. The project was informed of the problem early through an issue report but has not responded yet.
Severity CVSS v4.0: LOW
Last modification:
18/02/2026

CVE-2026-2552

Publication date:
16/02/2026
A vulnerability was identified in ZenTao up to 21.7.8. Affected by this issue is the function delete of the file editor/control.php of the component Committer. Such manipulation of the argument filePath leads to path traversal. Upgrading to version 21.7.9 can resolve this issue. The affected component should be upgraded.
Severity CVSS v4.0: MEDIUM
Last modification:
20/02/2026

CVE-2025-13821

Publication date:
16/02/2026
Mattermost versions 11.1.x
Severity CVSS v4.0: Pending analysis
Last modification:
18/02/2026

CVE-2026-2551

Publication date:
16/02/2026
A vulnerability was determined in ZenTao up to 21.7.8. Affected by this vulnerability is the function delete of the file editor/control.php of the component Backup Handler. This manipulation of the argument fileName causes path traversal. It is possible to initiate the attack remotely. The exploit has been publicly disclosed and may be utilized.
Severity CVSS v4.0: MEDIUM
Last modification:
20/02/2026

CVE-2026-2452

Publication date:
16/02/2026
Emails sent by pretix can utilize placeholders that will be filled with customer data. For example, when {name}<br /> is used in an email template, it will be replaced with the buyer&amp;#39;s <br /> name for the final email. This mechanism contained a security-relevant bug:<br /> <br /> It was possible to exfiltrate information about the pretix system through specially crafted placeholder names such as {{event.__init__.__code__.co_filename}}.<br /> This way, an attacker with the ability to control email templates <br /> (usually every user of the pretix backend) could retrieve sensitive <br /> information from the system configuration, including even database <br /> passwords or API keys. pretix does include mechanisms to prevent the usage of such <br /> malicious placeholders, however due to a mistake in the code, they were <br /> not fully effective for this plugin.<br /> <br /> Out of caution, we recommend that you rotate all passwords and API keys contained in your pretix.cfg https://docs.pretix.eu/self-hosting/config/  file.
Severity CVSS v4.0: HIGH
Last modification:
12/03/2026

CVE-2026-2451

Publication date:
16/02/2026
Emails sent by pretix can utilize placeholders that will be filled with customer data. For example, when {name}<br /> is used in an email template, it will be replaced with the buyer&amp;#39;s <br /> name for the final email. This mechanism contained a security-relevant bug:<br /> <br /> It was possible to exfiltrate information about the pretix system through specially crafted placeholder names such as {{event.__init__.__code__.co_filename}}.<br /> This way, an attacker with the ability to control email templates <br /> (usually every user of the pretix backend) could retrieve sensitive <br /> information from the system configuration, including even database <br /> passwords or API keys. pretix does include mechanisms to prevent the usage of such <br /> malicious placeholders, however due to a mistake in the code, they were <br /> not fully effective for this plugin.<br /> <br /> Out of caution, we recommend that you rotate all passwords and API keys contained in your pretix.cfg file.
Severity CVSS v4.0: HIGH
Last modification:
13/03/2026