Instituto Nacional de ciberseguridad. Sección Incibe
Instituto Nacional de Ciberseguridad. Sección INCIBE-CERT

Vulnerabilidades

Con el objetivo de informar, advertir y ayudar a los profesionales sobre las últimas vulnerabilidades de seguridad en sistemas tecnológicos, ponemos a disposición de los usuarios interesados en esta información una base de datos con información en castellano sobre cada una de las últimas vulnerabilidades documentadas y conocidas.

Este repositorio con más de 75.000 registros esta basado en la información de NVD (National Vulnerability Database) – en función de un acuerdo de colaboración – por el cual desde INCIBE realizamos la traducción al castellano de la información incluida. En ocasiones este listado mostrará vulnerabilidades que aún no han sido traducidas debido a que se recogen en el transcurso del tiempo en el que el equipo de INCIBE realiza el proceso de traducción.

Se emplea el estándar de nomenclatura de vulnerabilidades CVE (Common Vulnerabilities and Exposures), con el fin de facilitar el intercambio de información entre diferentes bases de datos y herramientas. Cada una de las vulnerabilidades recogidas enlaza a diversas fuentes de información así como a parches disponibles o soluciones aportadas por los fabricantes y desarrolladores. Es posible realizar búsquedas avanzadas teniendo la opción de seleccionar diferentes criterios como el tipo de vulnerabilidad, fabricante, tipo de impacto entre otros, con el fin de acortar los resultados.

Mediante suscripción RSS o Boletines podemos estar informados diariamente de las últimas vulnerabilidades incorporadas al repositorio.

CVE-2026-33278

Fecha de publicación:
20/05/2026
Idioma:
Inglés
*** Pendiente de traducción *** NLnet Labs Unbound 1.19.1 up to and including version 1.25.0 has a vulnerability in the DNSSEC validator that enables denial of service and possible remote code execution as a result of deep copying a data structure and erroneously overwriting a destination pointer. An adversary can exploit the vulnerability by controlling a malicious signed zone and querying a vulnerable Unbound. When DS sub-queries need to suspend validation due to NSEC3 computational budget exhaustion (introduced in Unbound 1.19.1), Unbound deep-copies response messages to preserve them across memory region teardown. A struct-assignment bug overwrites the destination's pointer with the source's pointer. After the sub-query region is freed, the resumed validator dereferences this dangling pointer, triggering a crash or potentially enabling arbitrary code execution. Unbound 1.25.1 contains a patch with a fix to preserve the correct pointer when deep copying the data structure.
Gravedad CVSS v4.0: CRÍTICA
Última modificación:
20/05/2026

CVE-2026-35070

Fecha de publicación:
20/05/2026
Idioma:
Inglés
*** Pendiente de traducción *** Dell SmartFabric Storage Software, versions prior to 1.4.5, contains an Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Filesystem access for attacker.
Gravedad CVSS v3.1: MEDIA
Última modificación:
20/05/2026

CVE-2026-40622

Fecha de publicación:
20/05/2026
Idioma:
Inglés
*** Pendiente de traducción *** NLnet Labs Unbound 1.16.2 up to and including version 1.25.0 has a vulnerability of the 'ghost domain names' family of attacks that could extend the ghost domain window by up to one cached TTL configured value. Similar to other 'ghost domain names' attacks, an adversary needs to control a (ghost) zone and be able to query a vulnerable Unbound. A single client NS query can cause Unbound to overwrite the cached expired parent-side referral NS rrset with the child-side apex NS rrset and essentially extend the ghost domain window by up to one cached TTL configured value ('cache-max-ttl'). In configurations where 'harden-referral-path: yes' is used (non-default configuration), no client NS query is required since Unbound implicitly performs that query. Unbound 1.25.1 contains a patch with a fix that does not allow extension of TTLs for (parent) NS records regardless of their trust.
Gravedad CVSS v4.0: MEDIA
Última modificación:
20/05/2026

CVE-2026-41054

Fecha de publicación:
20/05/2026
Idioma:
Inglés
*** Pendiente de traducción *** In `src/havegecmd.c`, the `socket_handler` function performs a credential check on the abstract UNIX socket (`\0/sys/entropy/haveged`). However, while it detects if the connecting user is not root (`cred.uid != 0`) and prepares a negative acknowledgement (`ASCII_NAK`), it **fails to stop execution**. The code proceeds to the `switch` statement, allowing any local unprivileged user to execute privileged commands such as `MAGIC_CHROOT`.
Gravedad CVSS v3.1: ALTA
Última modificación:
20/05/2026

CVE-2026-9059

Fecha de publicación:
20/05/2026
Idioma:
Inglés
*** Pendiente de traducción *** NextGEN Gallery version prior to 4.2.1 are vulnerable to authenticated SQL injection via the &amp;#39;orderby&amp;#39; parameter on the REST API endpoints &amp;#39;/imagely/v1/galleries&amp;#39; and &amp;#39;/imagely/v1/albums&amp;#39;.<br /> <br /> <br /> <br /> The root cause is an insufficient sanitization function (&amp;#39;_clean_column()&amp;#39;) in the data mapper layer that uses a character blacklist instead of a whitelist approach. This allows an authenticated attacker with the &amp;#39;NextGEN Gallery overview&amp;#39; capability (assigned to the Administrator role by default) to inject arbitrary SQL into the &amp;#39;ORDER BY&amp;#39; clause.
Gravedad CVSS v4.0: CRÍTICA
Última modificación:
20/05/2026

CVE-2026-9065

Fecha de publicación:
20/05/2026
Idioma:
Inglés
*** Pendiente de traducción *** SureCart version prior to 4.2.1 are vulnerable to authenticated SQL injection via multiple parameters (&amp;#39;model_name&amp;#39;, &amp;#39;model_id&amp;#39;, &amp;#39;integration_id&amp;#39;, &amp;#39;provider&amp;#39;) on the REST API endpoint &amp;#39;/surecart/v1/integrations/{id}&amp;#39;.<br /> <br /> The root cause is a flawed escaping bypass in the query builder (&amp;#39;wp-query-builder&amp;#39;). Values passed to the &amp;#39;where()&amp;#39; method are only sanitized via &amp;#39;$wpdb-&gt;prepare()&amp;#39; when they do **not** contain a dot (&amp;#39;.&amp;#39;) or the WordPress table prefix (&amp;#39;wp_&amp;#39;). By including a dot anywhere in the payload, an attacker completely bypasses the escaping logic and injects arbitrary SQL into the &amp;#39;WHERE&amp;#39; clause, allowing full UNION-based extraction of the database.
Gravedad CVSS v4.0: CRÍTICA
Última modificación:
20/05/2026

CVE-2026-6405

Fecha de publicación:
20/05/2026
Idioma:
Inglés
*** Pendiente de traducción *** The Anomify AI – Anomaly Detection and Alerting plugin for WordPress is vulnerable to Cross-Site Request Forgery (CSRF) leading to Stored Cross-Site Scripting (XSS) in versions up to and including 0.3.6. This is due to missing nonce verification on the settings page handler and insufficient output escaping in the admin_options.php template. The settings form includes no wp_nonce_field() and the handler performs no check_admin_referer() check, meaning any cross-origin POST can modify plugin settings. The API key field is sanitized only with sanitize_text_field(), which strips HTML tags but does not encode double-quote characters; the value is then rendered into an HTML attribute via bare echo without esc_attr(), allowing a double-quote attribute-escape payload to survive both sanitization and storage. This makes it possible for unauthenticated attackers to inject arbitrary web scripts by tricking a logged-in administrator into visiting a malicious page that submits a forged request, storing the payload in the database and causing it to execute in the administrator&amp;#39;s browser whenever the plugin settings page is visited.
Gravedad CVSS v3.1: MEDIA
Última modificación:
20/05/2026

CVE-2026-5200

Fecha de publicación:
20/05/2026
Idioma:
Inglés
*** Pendiente de traducción *** The AcyMailing – An Ultimate Newsletter Plugin and Marketing Automation Solution for WordPress plugin for WordPress is vulnerable to Missing Authorization in versions up to, and including, 10.8.2. This is due to the plugin not properly verifying that a user is authorized to perform an action. This makes it possible for authenticated attackers, with subscriber-level access and above, to modify privileged AcyMailing configuration, export subscriber secret keys, and chain these actions into administrator account takeover when a target administrator email address is known.
Gravedad CVSS v3.1: ALTA
Última modificación:
20/05/2026

CVE-2026-6566

Fecha de publicación:
20/05/2026
Idioma:
Inglés
*** Pendiente de traducción *** The Photo Gallery, Sliders, Proofing and Themes – NextGEN Gallery plugin for WordPress is vulnerable to Insecure Direct Object Reference in versions up to and including 4.2.0. This is due to insufficient object-level authorization in the image deletion REST flow where the permission callback for DELETE /imagely/v1/images/{id} only checks &amp;#39;NextGEN Manage gallery&amp;#39; permissions and does not enforce gallery ownership or &amp;#39;NextGEN Manage others gallery&amp;#39; permissions. This makes it possible for authenticated attackers, with Subscriber-level privileges and &amp;#39;NextGEN Manage gallery&amp;#39; capability, to delete gallery images belonging to other users as well as their associated image files from disk when deleteImg is enabled (default).
Gravedad CVSS v3.1: MEDIA
Última modificación:
20/05/2026

CVE-2026-7385

Fecha de publicación:
20/05/2026
Idioma:
Inglés
*** Pendiente de traducción *** The Decent Comments WordPress plugin before 3.0.2 does not restrict access to comment author email addresses and post author email addresses via its REST API endpoint, allowing unauthenticated attackers to enumerate registered user email addresses.
Gravedad: Pendiente de análisis
Última modificación:
20/05/2026

CVE-2026-44392

Fecha de publicación:
20/05/2026
Idioma:
Inglés
*** Pendiente de traducción *** Missing authorization vulnerability exists in Movable Type. Under certain conditions, when a user without administrator privileges signs in to the product, unintended update processing may be executed.
Gravedad CVSS v4.0: MEDIA
Última modificación:
20/05/2026

CVE-2026-47783

Fecha de publicación:
20/05/2026
Idioma:
Inglés
*** Pendiente de traducción *** In memcached before 1.6.42, username data for SASL password database authentication has a timing side channel because a loop exits as soon as a valid username is found by sasl_server_userdb_checkpass.
Gravedad CVSS v3.1: ALTA
Última modificación:
20/05/2026