Instituto Nacional de ciberseguridad. Sección Incibe
Instituto Nacional de Ciberseguridad. Sección INCIBE-CERT

Vulnerabilidades

Con el objetivo de informar, advertir y ayudar a los profesionales sobre las últimas vulnerabilidades de seguridad en sistemas tecnológicos, ponemos a disposición de los usuarios interesados en esta información una base de datos con información en castellano sobre cada una de las últimas vulnerabilidades documentadas y conocidas.

Este repositorio con más de 75.000 registros esta basado en la información de NVD (National Vulnerability Database) – en función de un acuerdo de colaboración – por el cual desde INCIBE realizamos la traducción al castellano de la información incluida. En ocasiones este listado mostrará vulnerabilidades que aún no han sido traducidas debido a que se recogen en el transcurso del tiempo en el que el equipo de INCIBE realiza el proceso de traducción.

Se emplea el estándar de nomenclatura de vulnerabilidades CVE (Common Vulnerabilities and Exposures), con el fin de facilitar el intercambio de información entre diferentes bases de datos y herramientas. Cada una de las vulnerabilidades recogidas enlaza a diversas fuentes de información así como a parches disponibles o soluciones aportadas por los fabricantes y desarrolladores. Es posible realizar búsquedas avanzadas teniendo la opción de seleccionar diferentes criterios como el tipo de vulnerabilidad, fabricante, tipo de impacto entre otros, con el fin de acortar los resultados.

Mediante suscripción RSS o Boletines podemos estar informados diariamente de las últimas vulnerabilidades incorporadas al repositorio.

CVE-2026-42282

Fecha de publicación:
08/05/2026
Idioma:
Inglés
*** Pendiente de traducción *** n8n-MCP is an MCP server that provides AI assistants access to n8n node documentation, properties, and operations. Prior to version 2.47.13, when n8n-mcp runs in HTTP transport mode, authenticated MCP tools/call requests had their full arguments and JSON-RPC params written to server logs by the request dispatcher and several sibling code paths before any redaction. When a tool call carries credential material — most notably n8n_manage_credentials.data — the raw values can be persisted in logs. In deployments where logs are collected, forwarded to external systems, or viewable outside the request trust boundary (shared log storage, SIEM pipelines, support/ops access), this can result in disclosure of: bearer tokens and OAuth credentials sent through n8n_manage_credentials, per-tenant API keys and webhook auth headers embedded in tool arguments, arbitrary secret-bearing payloads passed to any MCP tool. The issue requires authentication (AUTH_TOKEN accepted by the server), so unauthenticated callers cannot trigger it; the runtime exposure is also reduced by an existing console-silencing layer in HTTP mode, but that layer is fragile and the values are still constructed and passed into the logger. This issue has been patched in version 2.47.13.
Gravedad CVSS v3.1: MEDIA
Última modificación:
14/05/2026

CVE-2026-44694

Fecha de publicación:
08/05/2026
Idioma:
Inglés
*** Pendiente de traducción *** n8n-MCP is an MCP server that provides AI assistants access to n8n node documentation, properties, and operations. From version 2.18.7 to before version 2.50.2, there is an authenticated server-side request forgery vulnerability affecting the webhook trigger tools, the n8n API client (N8N_API_URL), and per-request URLs supplied via the x-n8n-url header in multi-tenant HTTP mode. This issue has been patched in version 2.50.2.
Gravedad CVSS v4.0: ALTA
Última modificación:
14/05/2026

CVE-2026-42176

Fecha de publicación:
08/05/2026
Idioma:
Inglés
*** Pendiente de traducción *** Scoold is a Q&A and a knowledge sharing platform for teams. Prior to version 1.67.0, Scoold allows the admins configuration value to be modified through /api/config/set/admins with a forged Bearer token that is accepted as an admin API token. Once that setting is changed, the target email address is written to the application configuration file. The change does not become active immediately in the current process, because the ADMINS set is loaded once at startup. After a Scoold restart, though, the selected user is recognized as an administrator and gains access to the admin panel. This issue gives an attacker a reliable persistence path: write their own email into scoold.admins, wait for a restart or trigger one operationally, and the account comes back as admin. This issue has been patched in version 1.67.0.
Gravedad CVSS v3.1: MEDIA
Última modificación:
12/05/2026

CVE-2026-42160

Fecha de publicación:
08/05/2026
Idioma:
Inglés
*** Pendiente de traducción *** Data Space Portal is an open-source Software as a Service (SaaS) solution designed to streamline Dataspace management. From version 2.1.1 to before version 7.3.2, there is insufficient authorization in the dataspace-portal backend regarding self-registered "PENDING" organization / user accounts. This issue has been patched in version 7.3.2.
Gravedad CVSS v4.0: CRÍTICA
Última modificación:
13/05/2026

CVE-2026-41495

Fecha de publicación:
08/05/2026
Idioma:
Inglés
*** Pendiente de traducción *** n8n-MCP is an MCP server that provides AI assistants access to n8n node documentation, properties, and operations. Prior to version 2.47.11, when n8n-mcp runs in HTTP transport mode, incoming requests to the POST /mcp endpoint had their request metadata written to server logs regardless of the authentication outcome. In deployments where logs are collected, forwarded to external systems, or viewable outside the request trust boundary (shared log storage, SIEM pipelines, support/ops access), this can result in disclosure of: bearer tokens from the Authorization header, per-tenant API keys from the, x-n8n-key header in multi-tenant setups, JSON-RPC request payloads sent to the MCP endpoint. Access control itself was not bypassed — unauthenticated requests were correctly rejected with 401 Unauthorized — but sensitive values from those rejected requests could still be persisted in logs. This issue has been patched in version 2.47.11.
Gravedad CVSS v3.1: MEDIA
Última modificación:
14/05/2026

CVE-2026-8178

Fecha de publicación:
08/05/2026
Idioma:
Inglés
*** Pendiente de traducción *** An issue exists in Amazon Redshift JDBC Driver versions prior to 2.2.2. Under certain conditions, the driver could load and execute arbitrary classes when processing JDBC connection URL parameters. An actor who can influence the connection URL could potentially execute code in the application context, provided a suitable class is available on the application&amp;#39;s classpath.<br /> <br /> <br /> <br /> To mitigate this issue, users should upgrade to version 2.2.2 or later.
Gravedad CVSS v4.0: CRÍTICA
Última modificación:
12/05/2026

CVE-2026-41511

Fecha de publicación:
08/05/2026
Idioma:
Inglés
*** Pendiente de traducción *** OpenMcdf is a fully .NET / C# library to manipulate Compound File Binary File Format files, also known as Structured Storage. Prior to version 3.1.3, OpenMcdf does not detect cycles in the directory entry red-black tree of a Compound File Binary (CFB) document. A crafted CFB file with a cycle in the LeftSiblingID / RightSiblingID chain causes Storage.EnumerateEntries() and Storage.OpenStream() to loop indefinitely, consuming the calling thread with no possibility of recovery via try/catch. This issue has been patched in version 3.1.3.
Gravedad CVSS v3.1: MEDIA
Última modificación:
13/05/2026

CVE-2026-29202

Fecha de publicación:
08/05/2026
Idioma:
Inglés
*** Pendiente de traducción *** Insufficient input validation of the `plugin` parameter of the `create_user` plugin allows arbitrary Perl code execution on behalf of the already authenticated account&amp;#39;s system user.
Gravedad CVSS v4.0: MEDIA
Última modificación:
13/05/2026

CVE-2026-29203

Fecha de publicación:
08/05/2026
Idioma:
Inglés
*** Pendiente de traducción *** A chmod call in the cPanel Nova plugin&amp;#39;s Cpanel::Nova::Connector follows symlinks, allowing setting root permissions on arbitrary system files or directories. That can cause DoS or local privilege escalation when an authenticated cPanel user places a symlink at a user-controlled legacy Nova path under their home directory.
Gravedad CVSS v4.0: MEDIA
Última modificación:
15/05/2026

CVE-2026-29201

Fecha de publicación:
08/05/2026
Idioma:
Inglés
*** Pendiente de traducción *** Insufficient input validation of the feature file name in `feature::LOADFEATUREFILE` adminbin call can cause arbitrary file read when a relative file path is passed.
Gravedad CVSS v3.1: ALTA
Última modificación:
13/05/2026

CVE-2026-6659

Fecha de publicación:
08/05/2026
Idioma:
Inglés
*** Pendiente de traducción *** Crypt::PasswdMD5 versions through 1.42 for Perl generates insecure random values for salts.<br /> <br /> The built-in rand function is predictable, and unsuitable for cryptography.
Gravedad CVSS v3.1: ALTA
Última modificación:
12/05/2026

CVE-2026-42028

Fecha de publicación:
08/05/2026
Idioma:
Inglés
*** Pendiente de traducción *** novaGallery is a php image gallery. Prior to version 2.1.1, a path traversal vulnerability has been identified in novaGallery. This allows unauthenticated users to read image files outside the intended gallery root directory. This issue has been patched in version 2.1.1.
Gravedad CVSS v3.1: MEDIA
Última modificación:
12/05/2026