Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-8010

Publication date:
16/04/2026
The component accepts XML input through the publisher without disabling external entity resolution. This allows malicious actors to submit a crafted XML payload that exploits the unescaped external entity references.<br /> <br /> By leveraging this vulnerability, a malicious actor can read confidential files from the product&amp;#39;s file system or access limited HTTP resources reachable via HTTP GET requests to the vulnerable product.
Severity CVSS v4.0: Pending analysis
Last modification:
17/04/2026

CVE-2025-6024

Publication date:
16/04/2026
The authentication endpoint fails to encode user-supplied input before rendering it in the web page, allowing for script injection.<br /> An attacker can leverage this by injecting malicious scripts into the authentication endpoint. This can result in the user&amp;#39;s browser being redirected to a malicious website, manipulation of the web page&amp;#39;s user interface, or the retrieval of information from the browser. However, session hijacking is not possible due to the httpOnly flag protecting session-related cookies.
Severity CVSS v4.0: Pending analysis
Last modification:
17/04/2026

CVE-2024-4867

Publication date:
16/04/2026
The WSO2 API Manager developer portal accepts user-supplied input without enforcing expected validation constraints or proper output encoding. This deficiency allows a malicious actor to inject script content that is executed within the context of a user&amp;#39;s browser.<br /> <br /> By leveraging this cross-site scripting vulnerability, a malicious actor can cause the browser to redirect to a malicious website, make changes to the UI of the web page, or retrieve information from the browser. However, session hijacking is not possible as all session-related sensitive cookies are protected by the httpOnly flag.
Severity CVSS v4.0: Pending analysis
Last modification:
17/04/2026

CVE-2024-10242

Publication date:
16/04/2026
The authentication endpoint fails to adequately validate user-supplied input before reflecting it back in the response. This allows an attacker to inject malicious script payloads into the input parameters, which are then executed by the victim&amp;#39;s browser.<br /> <br /> Successful exploitation can enable an attacker to redirect the user&amp;#39;s browser to a malicious website, modify the UI of the web page, or retrieve information from the browser. However, the impact is limited as session-related sensitive cookies are protected by the httpOnly flag, preventing session hijacking.
Severity CVSS v4.0: Pending analysis
Last modification:
17/04/2026

CVE-2026-23772

Publication date:
16/04/2026
Dell Storage Manager - Replay Manager for Microsoft Servers, version(s) 8.0, contain(s) an Improper Privilege Management vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of privileges.
Severity CVSS v4.0: Pending analysis
Last modification:
17/04/2026

CVE-2024-2374

Publication date:
16/04/2026
The XML parsers within multiple WSO2 products accept user-supplied XML data without properly configuring to prevent the resolution of external entities. This omission allows malicious actors to craft XML payloads that exploit the parser&amp;#39;s behavior, leading to the inclusion of external resources.<br /> <br /> By leveraging this vulnerability, an attacker can read confidential files from the file system and access limited HTTP resources reachable by the product. Additionally, the vulnerability can be exploited to perform denial of service attacks by exhausting server resources through recursive entity expansion or fetching large external resources.
Severity CVSS v4.0: Pending analysis
Last modification:
17/04/2026

CVE-2026-0718

Publication date:
16/04/2026
The Post Grid Gutenberg Blocks for News, Magazines, Blog Websites – PostX plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the ultp_shareCount_callback() function in all versions up to, and including, 5.0.5. This makes it possible for unauthenticated attackers to modify the share_count post meta for any post, including private or draft posts.
Severity CVSS v4.0: Pending analysis
Last modification:
16/04/2026

CVE-2025-14868

Publication date:
16/04/2026
The Career Section plugin for WordPress is vulnerable to Cross-Site Request Forgery leading to Path Traversal and Arbitrary File Deletion in all versions up to, and including, 1.6. This is due to missing nonce validation and insufficient file path validation on the delete action in the &amp;#39;appform_options_page_html&amp;#39; function. This makes it possible for unauthenticated attackers to delete arbitrary files on the server via a forged request, granted they can trick a site administrator into performing an action such as clicking on a link.
Severity CVSS v4.0: Pending analysis
Last modification:
16/04/2026

CVE-2026-41035

Publication date:
16/04/2026
In rsync 3.0.1 through 3.4.1, receive_xattr relies on an untrusted length value during a qsort call, leading to a receiver use-after-free. The victim must run rsync with -X (aka --xattrs). On Linux, many (but not all) common configurations are vulnerable. Non-Linux platforms are more widely vulnerable.
Severity CVSS v4.0: Pending analysis
Last modification:
17/04/2026

CVE-2026-3876

Publication date:
16/04/2026
The Prismatic plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the &amp;#39;prismatic_encoded&amp;#39; pseudo-shortcode in all versions up to, and including, 3.7.3. This is due to insufficient input sanitization and output escaping on user-supplied attributes within the &amp;#39;prismatic_decode&amp;#39; function. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page by submitting a comment containing a crafted &amp;#39;prismatic_encoded&amp;#39; pseudo-shortcode.
Severity CVSS v4.0: Pending analysis
Last modification:
16/04/2026

CVE-2026-3995

Publication date:
16/04/2026
The OPEN-BRAIN plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the &amp;#39;API Key&amp;#39; settings field in all versions up to, and including, 0.5.0. This is due to insufficient input sanitization and output escaping. The plugin uses sanitize_text_field() which strips HTML tags but does not encode double quotes or other HTML-special characters needed for safe attribute context output. The API key value is saved via update_option() and later output into an HTML input element&amp;#39;s value attribute without esc_attr() escaping. This makes it possible for authenticated attackers, with Administrator-level access, to inject arbitrary web scripts via attribute breakout payloads (e.g., double quotes followed by event handlers) that execute whenever a user accesses the plugin settings page.
Severity CVSS v4.0: Pending analysis
Last modification:
16/04/2026

CVE-2026-3875

Publication date:
16/04/2026
The BetterDocs plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the &amp;#39;betterdocs_feedback_form&amp;#39; shortcode in all versions up to, and including, 4.3.8. This is due to insufficient input sanitization and output escaping on user supplied shortcode attributes. This makes it possible for authenticated attackers, with contributor level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Severity CVSS v4.0: Pending analysis
Last modification:
16/04/2026