Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2026-46722

Publication date:
19/05/2026
The OOXML parsing of the file indexer does not disable external entity resolution. A crafted xlsx or pptx document placed in an indexed directory can cause local files to be read or outbound HTTP requests to be performed, with the retrieved content being written to the search index.
Severity CVSS v4.0: MEDIUM
Last modification:
19/05/2026

CVE-2026-46723

Publication date:
19/05/2026
The additional_tables configuration of the page and tt_content indexers accepts arbitrary table and field names. A backend user with permission to edit indexer configurations can copy sensitive data from internal TYPO3 tables into the search index.
Severity CVSS v4.0: MEDIUM
Last modification:
19/05/2026

CVE-2026-46724

Publication date:
19/05/2026
The file indexer does not normalize the configured directory path. A backend user with permission to edit indexer configurations can index documents from arbitrary locations on the server file system through path traversal sequences.
Severity CVSS v4.0: MEDIUM
Last modification:
19/05/2026

CVE-2026-46725

Publication date:
19/05/2026
The extension passes an attacker-controlled cookie directly to PHP's unserialize() without safely processing the input. A remote, unauthenticated attacker can supply a crafted serialized payload to trigger PHP Object Injection, leading to Remote Code Execution on the TYPO3 server. Exploitation requires the content element to be configured with "Persistent Mode: Static" in the plugin settings.
Severity CVSS v4.0: CRITICAL
Last modification:
19/05/2026

CVE-2026-8726

Publication date:
19/05/2026
The extension fails to properly sanitize user input before using it in a database query. As a result, an unauthenticated attacker can inject arbitrary SQL through a URL parameter on pages using the "Date Menu of news articles" plugin. Exploitation requires the "Date Menu of news articles" plugin to be in use and the TypoScript/Plugin setting disableOverrideDemand not to be enabled.
Severity CVSS v4.0: HIGH
Last modification:
19/05/2026

CVE-2026-8727

Publication date:
19/05/2026
The Crawler extension passes the X-T3Crawler-Meta response header from crawled URLs directly to PHP's unserialize(). An attacker controlling a crawled endpoint can inject arbitrary serialized PHP objects, leading to Remote Code Execution on the TYPO3 server. Exploitation requires administrative privileges to configure a crawler-enabled page and trigger the crawl via a Scheduler task.
Severity CVSS v4.0: HIGH
Last modification:
19/05/2026

CVE-2026-8827

Publication date:
19/05/2026
The AddressRepository::getSqlQuery() method constructs a database query without properly sanitizing user input, leading to SQL Injection. The method is not invoked anywhere within the extension itself and therefore poses no direct risk in a default installation. However, custom extensions that call this method with untrusted input would expose the site to SQL injection.
Severity CVSS v4.0: HIGH
Last modification:
19/05/2026

CVE-2026-31910

Publication date:
19/05/2026
Server-Side Request Forgery (SSRF) vulnerability in Apache OFBiz.<br /> <br /> This issue affects Apache OFBiz: before 24.09.06.<br /> <br /> Users are recommended to upgrade to version 24.09.06, which fixes the issue.
Severity CVSS v4.0: Pending analysis
Last modification:
19/05/2026

CVE-2026-31986

Publication date:
19/05/2026
Use of Hard-coded Cryptographic Key vulnerability in Apache OFBiz.<br /> <br /> This issue affects Apache OFBiz: before 24.09.06.<br /> <br /> Users are recommended to upgrade to version 24.09.06, which fixes the issue.
Severity CVSS v4.0: Pending analysis
Last modification:
19/05/2026

CVE-2026-35086

Publication date:
19/05/2026
Improper Control of Generation of Code (&amp;#39;Code Injection&amp;#39;) vulnerability in email services of Apache OFBiz.<br /> <br /> This issue affects Apache OFBiz: before 24.09.06.<br /> <br /> Users are recommended to upgrade to version 24.09.06, which fixes the issue.
Severity CVSS v4.0: Pending analysis
Last modification:
19/05/2026

CVE-2026-41919

Publication date:
19/05/2026
Improper Neutralization of Special Elements used in an LDAP Query (&amp;#39;LDAP Injection&amp;#39;) vulnerability in Apache OFBiz.<br /> <br /> This issue affects Apache OFBiz: before 24.09.06.<br /> <br /> Users are recommended to upgrade to version 24.09.06, which fixes the issue.
Severity CVSS v4.0: Pending analysis
Last modification:
19/05/2026

CVE-2026-45187

Publication date:
19/05/2026
Improper Authorization vulnerability in Apache OFBiz Webtools.<br /> <br /> This issue affects Apache OFBiz: before 24.09.06.<br /> <br /> Users are recommended to upgrade to version 24.09.06, which fixes the issue.
Severity CVSS v4.0: Pending analysis
Last modification:
19/05/2026