Instituto Nacional de ciberseguridad. Sección Incibe
Instituto Nacional de Ciberseguridad. Sección INCIBE-CERT

Vulnerabilidades

Con el objetivo de informar, advertir y ayudar a los profesionales sobre las últimas vulnerabilidades de seguridad en sistemas tecnológicos, ponemos a disposición de los usuarios interesados en esta información una base de datos con información en castellano sobre cada una de las últimas vulnerabilidades documentadas y conocidas.

Este repositorio con más de 75.000 registros esta basado en la información de NVD (National Vulnerability Database) – en función de un acuerdo de colaboración – por el cual desde INCIBE realizamos la traducción al castellano de la información incluida. En ocasiones este listado mostrará vulnerabilidades que aún no han sido traducidas debido a que se recogen en el transcurso del tiempo en el que el equipo de INCIBE realiza el proceso de traducción.

Se emplea el estándar de nomenclatura de vulnerabilidades CVE (Common Vulnerabilities and Exposures), con el fin de facilitar el intercambio de información entre diferentes bases de datos y herramientas. Cada una de las vulnerabilidades recogidas enlaza a diversas fuentes de información así como a parches disponibles o soluciones aportadas por los fabricantes y desarrolladores. Es posible realizar búsquedas avanzadas teniendo la opción de seleccionar diferentes criterios como el tipo de vulnerabilidad, fabricante, tipo de impacto entre otros, con el fin de acortar los resultados.

Mediante suscripción RSS o Boletines podemos estar informados diariamente de las últimas vulnerabilidades incorporadas al repositorio.

CVE-2026-6437

Fecha de publicación:
17/04/2026
Idioma:
Inglés
*** Pendiente de traducción *** Improper neutralization of argument delimiters in the volume handling component in AWS EFS CSI Driver (aws-efs-csi-driver) before v3.0.1 allows remote authenticated users with PersistentVolume creation permissions to inject arbitrary mount options via comma injection.<br /> <br /> <br /> <br /> <br /> To remediate this issue, users should upgrade to version v3.0.1
Gravedad CVSS v4.0: MEDIA
Última modificación:
20/04/2026

CVE-2026-40525

Fecha de publicación:
17/04/2026
Idioma:
Inglés
*** Pendiente de traducción *** OpenViking prior to version 0.3.9 contains an authentication bypass vulnerability in the VikingBot OpenAPI HTTP route surface where the authentication check fails open when the api_key configuration value is unset or empty. Remote attackers with network access to the exposed service can invoke privileged bot-control functionality without providing a valid X-API-Key header, including submitting attacker-controlled prompts, creating or using bot sessions, and accessing downstream tools, integrations, secrets, or data accessible to the bot.
Gravedad CVSS v4.0: CRÍTICA
Última modificación:
05/05/2026

CVE-2026-33337

Fecha de publicación:
17/04/2026
Idioma:
Inglés
*** Pendiente de traducción *** Firebird is an open-source relational database management system. In versions prior to 5.0.4, 4.0.7 and 3.0.14, when deserializing a slice packet, the xdr_datum() function does not validate that a cstring length conforms to the slice descriptor bounds, allowing a cstring longer than the allocated buffer to overflow it. An unauthenticated attacker can exploit this by sending a crafted packet to the server, potentially causing a crash or other security impact. This issue has been fixed in versions 5.0.4, 4.0.7 and 3.0.14.
Gravedad CVSS v3.1: ALTA
Última modificación:
27/04/2026

CVE-2026-28224

Fecha de publicación:
17/04/2026
Idioma:
Inglés
*** Pendiente de traducción *** Firebird is an open-source relational database management system. In versions prior to 5.0.4, 4.0.7 and 3.0.14, when the server receives an op_crypt_key_callback packet without prior authentication, the port_server_crypt_callback handler is not initialized, resulting in a null pointer dereference and server crash. An unauthenticated attacker who knows only the server&amp;#39;s IP and port can exploit this to crash the server. This issue has been fixed in versions 5.0.4, 4.0.7 and 3.0.14.
Gravedad CVSS v3.1: ALTA
Última modificación:
24/04/2026

CVE-2026-28214

Fecha de publicación:
17/04/2026
Idioma:
Inglés
*** Pendiente de traducción *** Firebird is an open-source relational database management system. In versions prior to 5.0.4, 4.0.7 and 3.0.14, the ClumpletReader::getClumpletSize() function can overflow the totalLength value when parsing a Wide type clumplet, causing an infinite loop. An authenticated user with INSERT privileges on any table can exploit this via a crafted Batch Parameter Block to cause a denial of service against the server. This issue has been fixed in versions 5.0.4, 4.0.7 and 3.0.14.
Gravedad CVSS v4.0: MEDIA
Última modificación:
24/04/2026

CVE-2026-28212

Fecha de publicación:
17/04/2026
Idioma:
Inglés
*** Pendiente de traducción *** Firebird is an open-source relational database management system. In versions prior to 6.0.0, 5.0.4, 4.0.7 and 3.0.14, when processing an op_slice network packet, the server passes an unprepared structure containing a null pointer to the SDL_info() function, resulting in a null pointer dereference and server crash. An unauthenticated attacker can trigger this by sending a crafted packet to the server port. This issue has been fixed in versions 6.0.0, 5.0.4, 4.0.7 and 3.0.14.
Gravedad CVSS v3.1: ALTA
Última modificación:
24/04/2026

CVE-2026-27890

Fecha de publicación:
17/04/2026
Idioma:
Inglés
*** Pendiente de traducción *** Firebird is an open-source relational database management system. In versions prior to 5.0.4, 4.0.7 and 3.0.14, when processing CNCT_specific_data segments during authentication, the server assumes segments arrive in strictly ascending order. If segments arrive out of order, the Array class&amp;#39;s grow() method computes a negative size value, causing a SIGSEGV crash. An unauthenticated attacker who knows only the server&amp;#39;s IP and port can exploit this to crash the server. This issue has been fixed in versions 5.0.4, 4.0.7 and 3.0.14.
Gravedad CVSS v3.1: ALTA
Última modificación:
24/04/2026

CVE-2026-40320

Fecha de publicación:
17/04/2026
Idioma:
Inglés
*** Pendiente de traducción *** Giskard is an open-source testing framework for AI models. In versions prior to 1.0.2b1, the ConformityCheck class rendered the rule parameter through Jinja2&amp;#39;s default Template() constructor, silently interpreting template expressions at runtime. If check definitions are loaded from an untrusted source, a crafted rule string could achieve arbitrary code execution. Exploitation requires write access to a check definition and subsequent execution of the test suite. This issue has been fixed in giskard-checks version 1.0.2b1.
Gravedad CVSS v4.0: MEDIA
Última modificación:
24/04/2026

CVE-2026-40319

Fecha de publicación:
17/04/2026
Idioma:
Inglés
*** Pendiente de traducción *** Giskard is an open-source testing framework for AI models. In versions prior to 1.0.2b1, the RegexMatching check passes a user-supplied regular expression pattern directly to Python&amp;#39;s re.search() without any timeout or complexity guard. A crafted regex pattern can trigger catastrophic backtracking, causing the process to hang indefinitely. Exploitation requires write access to a check definition and subsequent execution of the test suite. This issue has been fixed in giskard-checks version 1.0.2b1.
Gravedad CVSS v4.0: BAJA
Última modificación:
24/04/2026

CVE-2026-5710

Fecha de publicación:
17/04/2026
Idioma:
Inglés
*** Pendiente de traducción *** The Drag and Drop Multiple File Upload for Contact Form 7 plugin for WordPress is vulnerable to Path Traversal leading to Arbitrary File Read in versions up to and including 1.3.9.6. This is due to the plugin using client-supplied mfile[] POST values as the source of truth for email attachment selection without performing any server-side upload provenance check, path canonicalization, or directory containment boundary enforcement. In dnd_wpcf7_posted_data(), each user-submitted filename is directly appended to the plugin&amp;#39;s upload URL without sanitization. In dnd_cf7_mail_components(), the URL is converted back to a filesystem path using str_replace() and only file_exists() is used as the acceptance check before attaching the file to the outgoing CF7 email. This makes it possible for unauthenticated attackers to read and exfiltrate arbitrary files readable by the web server process via path traversal sequences in the mfile[] parameter, with files being disclosed as email attachments. Note: This vulnerability is limited to the &amp;#39;wp-content&amp;#39; folder due to the wpcf7_is_file_path_in_content_dir() function in the Contact Form 7 plugin.
Gravedad CVSS v3.1: ALTA
Última modificación:
22/04/2026

CVE-2026-5718

Fecha de publicación:
17/04/2026
Idioma:
Inglés
*** Pendiente de traducción *** The Drag and Drop Multiple File Upload for Contact Form 7 plugin for WordPress is vulnerable to arbitrary file upload in versions up to, and including, 1.3.9.6. This is due to insufficient file type validation that occurs when custom blacklist types are configured, which replaces the default dangerous extension denylist instead of merging with it, and the wpcf7_antiscript_file_name() sanitization function being bypassed for filenames containing non-ASCII characters. This makes it possible for unauthenticated attackers to upload arbitrary files, such as PHP files, to the server, which can be leveraged to achieve remote code execution.
Gravedad CVSS v3.1: ALTA
Última modificación:
22/04/2026

CVE-2025-65104

Fecha de publicación:
17/04/2026
Idioma:
Inglés
*** Pendiente de traducción *** Firebird is an open-source relational database management system. In versions FB3 of the client library placed incorrect data length values into XSQLDA fields when communicating with FB4 or higher servers, resulting in an information leak. This issue is fixed by upgrading to the FB4 client or higher.
Gravedad CVSS v3.1: ALTA
Última modificación:
24/04/2026