Instituto Nacional de ciberseguridad. Sección Incibe
Instituto Nacional de Ciberseguridad. Sección INCIBE-CERT

Vulnerabilidades

Con el objetivo de informar, advertir y ayudar a los profesionales sobre las ultimas vulnerabilidades de seguridad en sistemas tecnológicos, ponemos a disposición de los usuarios interesados en esta información una base de datos con información en castellano sobre cada una de las ultimas vulnerabilidades documentadas y conocidas.

Este repositorio con más de 75.000 registros esta basado en la información de NVD (National Vulnerability Database) – en función de un acuerdo de colaboración – por el cual desde INCIBE realizamos la traducción al castellano de la información incluida. En ocasiones este listado mostrará vulnerabilidades que aún no han sido traducidas debido a que se recogen en el transcurso del tiempo en el que el equipo de INCIBE realiza el proceso de traducción.

Se emplea el estándar de nomenclatura de vulnerabilidades CVE (Common Vulnerabilities and Exposures), con el fin de facilitar el intercambio de información entre diferentes bases de datos y herramientas. Cada una de las vulnerabilidades recogidas enlaza a diversas fuentes de información así como a parches disponibles o soluciones aportadas por los fabricantes y desarrolladores. Es posible realizar búsquedas avanzadas teniendo la opción de seleccionar diferentes criterios como el tipo de vulnerabilidad, fabricante, tipo de impacto entre otros, con el fin de acortar los resultados.

Mediante suscripción RSS o Boletines podemos estar informados diariamente de las ultimas vulnerabilidades incorporadas al repositorio.

CVE-2026-6296

Fecha de publicación:
15/04/2026
Idioma:
Inglés
*** Pendiente de traducción *** Heap buffer overflow in ANGLE in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Critical)
Gravedad CVSS v3.1: CRÍTICA
Última modificación:
17/04/2026

CVE-2026-40917

Fecha de publicación:
15/04/2026
Idioma:
Inglés
*** Pendiente de traducción *** A flaw was found in GIMP. This vulnerability, a heap buffer over-read in the `icns_slurp()` function, occurs when processing specially crafted ICNS image files. An attacker could provide a malicious ICNS file, potentially leading to application crashes or information disclosure on systems that process such files.
Gravedad CVSS v3.1: MEDIA
Última modificación:
17/04/2026

CVE-2026-40918

Fecha de publicación:
15/04/2026
Idioma:
Inglés
*** Pendiente de traducción *** A flaw was found in GIMP. Processing a specially crafted PVR image file with large dimensions can lead to a denial of service (DoS). This occurs due to a stack-based buffer overflow and an out-of-bounds read in the PVR image loader, causing the application to crash. Systems that process untrusted PVR image files are affected.
Gravedad CVSS v3.1: MEDIA
Última modificación:
17/04/2026

CVE-2026-40919

Fecha de publicación:
15/04/2026
Idioma:
Inglés
*** Pendiente de traducción *** A flaw was found in GIMP. This vulnerability, a buffer overflow in the `file-seattle-filmworks` plugin, can be exploited when a user opens a specially crafted Seattle Filmworks file. A remote attacker could leverage this to cause a denial of service (DoS), leading to the plugin crashing and potentially impacting the stability of the GIMP application.
Gravedad CVSS v3.1: MEDIA
Última modificación:
17/04/2026

CVE-2026-40915

Fecha de publicación:
15/04/2026
Idioma:
Inglés
*** Pendiente de traducción *** A flaw was found in GIMP. A remote attacker could exploit an integer overflow vulnerability in the FITS image loader by providing a specially crafted FITS file. This integer overflow leads to a zero-byte memory allocation, which is then subjected to a heap buffer overflow when processing pixel data. Successful exploitation could result in a denial of service (DoS) or potentially arbitrary code execution.
Gravedad CVSS v3.1: MEDIA
Última modificación:
17/04/2026

CVE-2026-40916

Fecha de publicación:
15/04/2026
Idioma:
Inglés
*** Pendiente de traducción *** A flaw was found in GIMP. A stack buffer overflow vulnerability in the TIM image loader's 4BPP decoding path allows a local user to cause a Denial of Service (DoS). By opening a specially crafted TIM image file, the application crashes due to an unconditional overflow when writing to a variable-length array.
Gravedad CVSS v3.1: MEDIA
Última modificación:
17/04/2026

CVE-2026-35569

Fecha de publicación:
15/04/2026
Idioma:
Inglés
*** Pendiente de traducción *** ApostropheCMS is an open-source Node.js content management system. Versions 4.28.0 and prior contain a stored cross-site scripting vulnerability in SEO-related fields (SEO Title and Meta Description), where user-controlled input is rendered without proper output encoding into HTML contexts including tags, attributes, and JSON-LD structured data. An attacker can inject a payload such as ">alert(1) to break out of the intended HTML context and execute arbitrary JavaScript in the browser of any authenticated user who views the affected page. This can be leveraged to perform authenticated API requests, access sensitive data such as usernames, email addresses, and roles via internal APIs, and exfiltrate it to an attacker-controlled server. This issue has been fixed in version 4.29.0.
Gravedad CVSS v3.1: ALTA
Última modificación:
22/04/2026

CVE-2026-39857

Fecha de publicación:
15/04/2026
Idioma:
Inglés
*** Pendiente de traducción *** ApostropheCMS is an open-source Node.js content management system. Versions 4.28.0 and prior contain an authorization bypass vulnerability in the choices and counts query parameters of the REST API, where these query builders execute MongoDB distinct() operations that bypass the publicApiProjection restrictions intended to limit which fields are exposed publicly. The choices and counts parameters are processed via applyBuildersSafely before the projection is applied, and MongoDB's distinct operation does not respect projections, returning all distinct values directly. The results are returned in the API response without any filtering against publicApiProjection or removeForbiddenFields. An unauthenticated attacker can extract all distinct field values for any schema field type that has a registered query builder, including string, integer, float, select, boolean, date, slug, and relationship fields. Fields protected with viewPermission are similarly exposed, and the counts variant additionally reveals how many documents have each distinct value. Both the piece-type and page REST APIs are affected. This issue has been fixed in version 4.29.0.
Gravedad CVSS v3.1: MEDIA
Última modificación:
20/04/2026

CVE-2026-33889

Fecha de publicación:
15/04/2026
Idioma:
Inglés
*** Pendiente de traducción *** ApostropheCMS is an open-source Node.js content management system. Versions 4.28.0 and prior contain a stored cross-site scripting vulnerability in the @apostrophecms/color-field module, where color values prefixed with -- bypass TinyColor validation intended for CSS custom properties, and the launder.string() call performs only type coercion without stripping HTML metacharacters. These unsanitized values are then concatenated directly into tags both in per-widget style elements rendered for all visitors and in the global stylesheet rendered for editors, with the output marked as safe HTML. An editor can inject a value which closes the style tag and executes arbitrary JavaScript in the browser of every visitor to any page containing the affected widget. This enables mass session hijacking, cookie theft, and privilege escalation to administrative control if an admin views draft content. This issue has been fixed in version 4.29.0.
Gravedad CVSS v3.1: MEDIA
Última modificación:
20/04/2026

CVE-2026-33888

Fecha de publicación:
15/04/2026
Idioma:
Inglés
*** Pendiente de traducción *** ApostropheCMS is an open-source Node.js content management system. Versions 4.28.0 and prior contain an authorization bypass vulnerability in the getRestQuery method of the @apostrophecms/piece-type module, where the method checks whether a MongoDB projection has already been set before applying the admin-configured publicApiProjection. An unauthenticated attacker can supply a project query parameter in the REST API request, which is processed by applyBuildersSafely before the permission check, pre-populating the projection state and causing the publicApiProjection to be skipped entirely. This allows disclosure of any field on publicly queryable documents that the administrator explicitly restricted from the public API, such as internal notes, draft content, or metadata. Exploitation is trivial, requiring only appending query parameters to a public URL with no authentication. This issue has been fixed in version 4.29.0.
Gravedad CVSS v3.1: MEDIA
Última modificación:
20/04/2026

CVE-2026-33877

Fecha de publicación:
15/04/2026
Idioma:
Inglés
*** Pendiente de traducción *** ApostropheCMS is an open-source Node.js content management system. Versions 4.28.0 and prior contain a timing side-channel vulnerability in the password reset endpoint (/api/v1/@apostrophecms/login/reset-request) that allows unauthenticated username and email enumeration. When a user is not found, the handler returns after a fixed 2-second artificial delay, but when a valid user is found, it performs a MongoDB update and SMTP email send with no equivalent delay normalization, producing measurably different response times. The endpoint also accepts both username and email via an $or query, and has no rate limiting as the existing checkLoginAttempts throttle only applies to the login flow. This enables automated enumeration of valid accounts for use in credential stuffing or targeted phishing. Only instances that have explicitly enabled the passwordReset option are affected, as it defaults to false. This issue has been fixed in version 4.29.0.
Gravedad CVSS v3.1: BAJA
Última modificación:
20/04/2026

CVE-2026-21727

Fecha de publicación:
15/04/2026
Idioma:
Inglés
*** Pendiente de traducción *** ---<br /> title: Cross-Tenant Legacy Correlation Disclosure and Deletion<br /> draft: false<br /> hero:<br /> image: /static/img/heros/hero-legal2.svg<br /> content: "# Cross-Tenant Legacy Correlation Disclosure and Deletion"<br /> date: 2026-01-29<br /> product: Grafana<br /> severity: Low<br /> cve: CVE-2026-21727<br /> cvss_score: "3.3"<br /> cvss_vector: "CVSS:3.3/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:N"<br /> fixed_versions:<br /> - "&gt;=11.6.11 &gt;=12.0.9 &gt;=12.1.6 &gt;=12.2.4"<br /> ---<br /> A cross-tenant isolation vulnerability was found in Grafana’s Correlations feature affecting legacy correlation records. Due to a backward compatibility condition allowing org_id = 0 records to be returned across organizations, a user with datasource management privileges could read and permanently delete legacy correlation data belonging to another organization. This issue affects correlations created prior to Grafana 10.2 and is fixed in &gt;=11.6.11, &gt;=12.0.9, &gt;=12.1.6, and &gt;=12.2.4.<br /> <br /> Thanks to Gyu-hyeok Lee (g2h) for reporting this vulnerability.
Gravedad CVSS v3.1: BAJA
Última modificación:
20/04/2026