Instituto Nacional de ciberseguridad. Sección Incibe
Instituto Nacional de Ciberseguridad. Sección INCIBE-CERT

Vulnerabilidades

Con el objetivo de informar, advertir y ayudar a los profesionales sobre las ultimas vulnerabilidades de seguridad en sistemas tecnológicos, ponemos a disposición de los usuarios interesados en esta información una base de datos con información en castellano sobre cada una de las ultimas vulnerabilidades documentadas y conocidas.

Este repositorio con más de 75.000 registros esta basado en la información de NVD (National Vulnerability Database) – en función de un acuerdo de colaboración – por el cual desde INCIBE realizamos la traducción al castellano de la información incluida. En ocasiones este listado mostrará vulnerabilidades que aún no han sido traducidas debido a que se recogen en el transcurso del tiempo en el que el equipo de INCIBE realiza el proceso de traducción.

Se emplea el estándar de nomenclatura de vulnerabilidades CVE (Common Vulnerabilities and Exposures), con el fin de facilitar el intercambio de información entre diferentes bases de datos y herramientas. Cada una de las vulnerabilidades recogidas enlaza a diversas fuentes de información así como a parches disponibles o soluciones aportadas por los fabricantes y desarrolladores. Es posible realizar búsquedas avanzadas teniendo la opción de seleccionar diferentes criterios como el tipo de vulnerabilidad, fabricante, tipo de impacto entre otros, con el fin de acortar los resultados.

Mediante suscripción RSS o Boletines podemos estar informados diariamente de las ultimas vulnerabilidades incorporadas al repositorio.

CVE-2026-3805

Fecha de publicación:
11/03/2026
Idioma:
Inglés
*** Pendiente de traducción *** When doing a second SMB request to the same host again, curl would wrongly use<br /> a data pointer pointing into already freed memory.
Gravedad CVSS v3.1: ALTA
Última modificación:
11/03/2026

CVE-2026-1965

Fecha de publicación:
11/03/2026
Idioma:
Inglés
*** Pendiente de traducción *** libcurl can in some circumstances reuse the wrong connection when asked to do<br /> an Negotiate-authenticated HTTP or HTTPS request.<br /> <br /> libcurl features a pool of recent connections so that subsequent requests can<br /> reuse an existing connection to avoid overhead.<br /> <br /> When reusing a connection a range of criterion must first be met. Due to a<br /> logical error in the code, a request that was issued by an application could<br /> wrongfully reuse an existing connection to the same server that was<br /> authenticated using different credentials. One underlying reason being that<br /> Negotiate sometimes authenticates *connections* and not *requests*, contrary<br /> to how HTTP is designed to work.<br /> <br /> An application that allows Negotiate authentication to a server (that responds<br /> wanting Negotiate) with `user1:password1` and then does another operation to<br /> the same server also using Negotiate but with `user2:password2` (while the<br /> previous connection is still alive) - the second request wrongly reused the<br /> same connection and since it then sees that the Negotiate negotiation is<br /> already made, it just sends the request over that connection thinking it uses<br /> the user2 credentials when it is in fact still using the connection<br /> authenticated for user1...<br /> <br /> The set of authentication methods to use is set with `CURLOPT_HTTPAUTH`.<br /> <br /> Applications can disable libcurl&amp;#39;s reuse of connections and thus mitigate this<br /> problem, by using one of the following libcurl options to alter how<br /> connections are or are not reused: `CURLOPT_FRESH_CONNECT`,<br /> `CURLOPT_MAXCONNECTS` and `CURLMOPT_MAX_HOST_CONNECTIONS` (if using the<br /> curl_multi API).
Gravedad CVSS v3.1: MEDIA
Última modificación:
11/03/2026

CVE-2026-3492

Fecha de publicación:
11/03/2026
Idioma:
Inglés
*** Pendiente de traducción *** The Gravity Forms plugin for WordPress is vulnerable to Stored Cross-Site Scripting in all versions up to, and including, 2.9.28.1. This is due to a compound failure involving missing authorization on the `create_from_template` AJAX endpoint (allowing any authenticated user to create forms), insufficient input sanitization (`sanitize_text_field()` preserves single quotes), and missing output escaping when the form title is rendered in the Form Switcher dropdown (`title` attribute constructed without `esc_attr()`, and JavaScript `saferHtml` utility only escapes `&amp;`, `` but not quotes). This makes it possible for authenticated attackers, with Subscriber-level access and above, to inject arbitrary JavaScript that executes when an Administrator searches in the Form Switcher dropdown in the Form Editor.
Gravedad CVSS v3.1: MEDIA
Última modificación:
11/03/2026

CVE-2026-3906

Fecha de publicación:
11/03/2026
Idioma:
Inglés
*** Pendiente de traducción *** WordPress core is vulnerable to unauthorized access in versions 6.9 through 6.9.1. The Notes feature (block-level collaboration annotations) was introduced in WordPress 6.9 to allow editorial comments directly on posts in the block editor. However, the REST API `create_item_permissions_check()` method in the comments controller did not verify that the authenticated user has `edit_post` permission on the target post when creating a note. This makes it possible for authenticated attackers with Subscriber-level access to create notes on any post, including posts authored by other users, private posts, and posts in any status.
Gravedad CVSS v3.1: MEDIA
Última modificación:
11/03/2026

CVE-2026-1992

Fecha de publicación:
11/03/2026
Idioma:
Inglés
*** Pendiente de traducción *** The ExactMetrics – Google Analytics Dashboard for WordPress plugin is vulnerable to Insecure Direct Object Reference in versions 8.6.0 through 9.0.2. This is due to the `store_settings()` method in the `ExactMetrics_Onboarding` class accepting a user-supplied `triggered_by` parameter that is used instead of the current user&amp;#39;s ID to check permissions. This makes it possible for authenticated attackers with the `exactmetrics_save_settings` capability to bypass the `install_plugins` capability check by specifying an administrator&amp;#39;s user ID in the `triggered_by` parameter, allowing them to install arbitrary plugins and achieve Remote Code Execution. This vulnerability only affects sites on which administrator has given other user types the permission to view reports and can only be exploited by users of that type.
Gravedad CVSS v3.1: ALTA
Última modificación:
11/03/2026

CVE-2026-1993

Fecha de publicación:
11/03/2026
Idioma:
Inglés
*** Pendiente de traducción *** The ExactMetrics – Google Analytics Dashboard for WordPress plugin is vulnerable to Improper Privilege Management in versions 7.1.0 through 9.0.2. This is due to the `update_settings()` function accepting arbitrary plugin setting names without a whitelist of allowed settings. This makes it possible for authenticated attackers with the `exactmetrics_save_settings` capability to modify any plugin setting, including the `save_settings` option that controls which user roles have access to plugin functionality. The admin intended to delegate configuration access to a trusted user, not enable that user to delegate access to everyone. By setting `save_settings` to include `subscriber`, an attacker can grant plugin administrative access to all subscribers on the site.
Gravedad CVSS v3.1: ALTA
Última modificación:
11/03/2026

CVE-2026-3231

Fecha de publicación:
11/03/2026
Idioma:
Inglés
*** Pendiente de traducción *** The Checkout Field Editor (Checkout Manager) for WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via custom radio and checkboxgroup field values submitted through the WooCommerce Block Checkout Store API in all versions up to, and including, 2.1.7. This is due to the `prepare_single_field_data()` method in `class-thwcfd-block-order-data.php` first escaping values with `esc_html()` then immediately reversing the escaping with `html_entity_decode()` for radio and checkboxgroup field types, combined with a permissive `wp_kses()` allowlist in `get_allowed_html()` that explicitly permits the `` element with the `onchange` event handler attribute. This makes it possible for unauthenticated attackers to inject arbitrary web scripts via the Store API checkout endpoint that execute when an administrator views the order details page.
Gravedad CVSS v3.1: ALTA
Última modificación:
11/03/2026

CVE-2026-1454

Fecha de publicación:
11/03/2026
Idioma:
Inglés
*** Pendiente de traducción *** The Responsive Contact Form Builder &amp; Lead Generation Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting in all versions up to, and including, 2.0.1 via form field submissions. This is due to insufficient input sanitization in the lfb_lead_sanitize() function which omits certain field types from its sanitization whitelist, combined with an overly permissive wp_kses() filter at output time that allows onclick attributes on anchor tags. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever an administrator views the lead entries in the WordPress dashboard.
Gravedad CVSS v3.1: ALTA
Última modificación:
11/03/2026

CVE-2026-3903

Fecha de publicación:
11/03/2026
Idioma:
Inglés
*** Pendiente de traducción *** The Modular DS: Monitor, update, and backup multiple websites plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.5.1. This is due to missing nonce validation on the postConfirmOauth() function. This makes it possible for unauthenticated attackers to disconnect the plugin&amp;#39;s OAuth/SSO connection via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Gravedad CVSS v3.1: MEDIA
Última modificación:
11/03/2026

CVE-2026-1708

Fecha de publicación:
11/03/2026
Idioma:
Inglés
*** Pendiente de traducción *** The Appointment Booking Calendar — Simply Schedule Appointments Booking Plugin plugin for WordPress is vulnerable to blind SQL Injection in all versions up to, and including, 1.6.9.27. This is due to the `db_where_conditions` method in the `TD_DB_Model` class failing to prevent the `append_where_sql` parameter from being passed through JSON request bodies, while only checking for its presence in the `$_REQUEST` superglobal. This makes it possible for unauthenticated attackers to append arbitrary SQL commands to queries and extract sensitive information from the database via the `append_where_sql` parameter in JSON payloads granted they have obtained a valid `public_token` that is inadvertently exposed during the booking flow.
Gravedad CVSS v3.1: ALTA
Última modificación:
11/03/2026

CVE-2026-2917

Fecha de publicación:
11/03/2026
Idioma:
Inglés
*** Pendiente de traducción *** The Happy Addons for Elementor plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 3.21.0 via the `ha_duplicate_thing` admin action handler. This is due to the `can_clone()` method only checking `current_user_can(&amp;#39;edit_posts&amp;#39;)` (a general capability) without performing object-level authorization such as `current_user_can(&amp;#39;edit_post&amp;#39;, $post_id)`, and the nonce being tied to the generic action name `ha_duplicate_thing` rather than to a specific post ID. This makes it possible for authenticated attackers, with Contributor-level access and above, to clone any published post, page, or custom post type by obtaining a valid clone nonce from their own posts and changing the `post_id` parameter to target other users&amp;#39; content. The clone operation copies the full post content, all post metadata (including potentially sensitive widget configurations and API tokens), and taxonomies into a new draft owned by the attacker.
Gravedad CVSS v3.1: MEDIA
Última modificación:
11/03/2026

CVE-2026-2918

Fecha de publicación:
11/03/2026
Idioma:
Inglés
*** Pendiente de traducción *** The Happy Addons for Elementor plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 3.21.0 via the `ha_condition_update` AJAX action. This is due to the `validate_reqeust()` method using `current_user_can(&amp;#39;edit_posts&amp;#39;, $template_id)` instead of `current_user_can(&amp;#39;edit_post&amp;#39;, $template_id)` — failing to perform object-level authorization. Additionally, the `ha_get_current_condition` AJAX action lacks a capability check. This makes it possible for authenticated attackers, with Contributor-level access and above, to modify the display conditions of any published `ha_library` template. Because the `cond_to_html()` renderer outputs condition values into HTML attributes without proper escaping (using string concatenation instead of `esc_attr()`), an attacker can inject event handler attributes (e.g., `onmouseover`) that execute JavaScript when an administrator views the Template Conditions panel, resulting in Stored Cross-Site Scripting.
Gravedad CVSS v3.1: MEDIA
Última modificación:
11/03/2026