Instituto Nacional de ciberseguridad. Sección Incibe
Instituto Nacional de Ciberseguridad. Sección INCIBE-CERT

Vulnerabilidades

Con el objetivo de informar, advertir y ayudar a los profesionales sobre las ultimas vulnerabilidades de seguridad en sistemas tecnológicos, ponemos a disposición de los usuarios interesados en esta información una base de datos con información en castellano sobre cada una de las ultimas vulnerabilidades documentadas y conocidas.

Este repositorio con más de 75.000 registros esta basado en la información de NVD (National Vulnerability Database) – en función de un acuerdo de colaboración – por el cual desde INCIBE realizamos la traducción al castellano de la información incluida. En ocasiones este listado mostrará vulnerabilidades que aún no han sido traducidas debido a que se recogen en el transcurso del tiempo en el que el equipo de INCIBE realiza el proceso de traducción.

Se emplea el estándar de nomenclatura de vulnerabilidades CVE (Common Vulnerabilities and Exposures), con el fin de facilitar el intercambio de información entre diferentes bases de datos y herramientas. Cada una de las vulnerabilidades recogidas enlaza a diversas fuentes de información así como a parches disponibles o soluciones aportadas por los fabricantes y desarrolladores. Es posible realizar búsquedas avanzadas teniendo la opción de seleccionar diferentes criterios como el tipo de vulnerabilidad, fabricante, tipo de impacto entre otros, con el fin de acortar los resultados.

Mediante suscripción RSS o Boletines podemos estar informados diariamente de las ultimas vulnerabilidades incorporadas al repositorio.

CVE-2026-2552

Fecha de publicación:
16/02/2026
Idioma:
Inglés
*** Pendiente de traducción *** A vulnerability was identified in ZenTao up to 21.7.8. Affected by this issue is the function delete of the file editor/control.php of the component Committer. Such manipulation of the argument filePath leads to path traversal. Upgrading to version 21.7.9 can resolve this issue. The affected component should be upgraded.
Gravedad CVSS v4.0: MEDIA
Última modificación:
16/02/2026

CVE-2026-2553

Fecha de publicación:
16/02/2026
Idioma:
Inglés
*** Pendiente de traducción *** A security flaw has been discovered in tushar-2223 Hotel-Management-System up to bb1f3b3666124b888f1e4bcf51b6fba9fbb01d15. This affects an unknown part of the file /home.php of the component HTTP POST Request Handler. Performing a manipulation of the argument Name/Email results in sql injection. The attack can be initiated remotely. The exploit has been released to the public and may be used for attacks. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. The vendor was contacted early about this disclosure but did not respond in any way.
Gravedad CVSS v4.0: MEDIA
Última modificación:
16/02/2026

CVE-2026-2555

Fecha de publicación:
16/02/2026
Idioma:
Inglés
*** Pendiente de traducción *** A weakness has been identified in JeecgBoot 3.9.1. This vulnerability affects the function importDocumentFromZip of the file org/jeecg/modules/airag/llm/controller/AiragKnowledgeController.java of the component Retrieval-Augmented Generation. Executing a manipulation can lead to deserialization. The attack can be launched remotely. Attacks of this nature are highly complex. It is stated that the exploitability is difficult. The project was informed of the problem early through an issue report but has not responded yet.
Gravedad CVSS v4.0: BAJA
Última modificación:
16/02/2026

CVE-2025-13821

Fecha de publicación:
16/02/2026
Idioma:
Inglés
*** Pendiente de traducción *** Mattermost versions 11.1.x
Gravedad CVSS v3.1: MEDIA
Última modificación:
16/02/2026

CVE-2026-2415

Fecha de publicación:
16/02/2026
Idioma:
Inglés
*** Pendiente de traducción *** Emails sent by pretix can utilize placeholders that will be filled with customer data. For example, when {name}<br /> is used in an email template, it will be replaced with the buyer&amp;#39;s <br /> name for the final email. This mechanism contained two security-relevant<br /> bugs:<br /> <br /> <br /> <br /> * <br /> It was possible to exfiltrate information about the pretix system through specially crafted placeholder names such as {{event.__init__.__code__.co_filename}}.<br /> This way, an attacker with the ability to control email templates <br /> (usually every user of the pretix backend) could retrieve sensitive <br /> information from the system configuration, including even database <br /> passwords or API keys. pretix does include mechanisms to prevent the usage of such <br /> malicious placeholders, however due to a mistake in the code, they were <br /> not fully effective for the email subject.<br /> <br /> <br /> <br /> <br /> * <br /> Placeholders in subjects and plain text bodies of emails were <br /> wrongfully evaluated twice. Therefore, if the first evaluation of a <br /> placeholder again contains a placeholder, this second placeholder was <br /> rendered. This allows the rendering of placeholders controlled by the <br /> ticket buyer, and therefore the exploitation of the first issue as a <br /> ticket buyer. Luckily, the only buyer-controlled placeholder available <br /> in pretix by default (that is not validated in a way that prevents the <br /> issue) is {invoice_company}, which is very unusual (but not<br /> impossible) to be contained in an email subject template. In addition <br /> to broadening the attack surface of the first issue, this could <br /> theoretically also leak information about an order to one of the <br /> attendees within that order. However, we also consider this scenario <br /> very unlikely under typical conditions.<br /> <br /> <br /> Out of caution, we recommend that you rotate all passwords and API keys contained in your pretix.cfg https://docs.pretix.eu/self-hosting/config/  file.
Gravedad CVSS v4.0: ALTA
Última modificación:
16/02/2026

CVE-2026-2451

Fecha de publicación:
16/02/2026
Idioma:
Inglés
*** Pendiente de traducción *** Emails sent by pretix can utilize placeholders that will be filled with customer data. For example, when {name}<br /> is used in an email template, it will be replaced with the buyer&amp;#39;s <br /> name for the final email. This mechanism contained a security-relevant bug:<br /> <br /> It was possible to exfiltrate information about the pretix system through specially crafted placeholder names such as {{event.__init__.__code__.co_filename}}.<br /> This way, an attacker with the ability to control email templates <br /> (usually every user of the pretix backend) could retrieve sensitive <br /> information from the system configuration, including even database <br /> passwords or API keys. pretix does include mechanisms to prevent the usage of such <br /> malicious placeholders, however due to a mistake in the code, they were <br /> not fully effective for this plugin.<br /> <br /> Out of caution, we recommend that you rotate all passwords and API keys contained in your pretix.cfg file.
Gravedad CVSS v4.0: ALTA
Última modificación:
16/02/2026

CVE-2026-2452

Fecha de publicación:
16/02/2026
Idioma:
Inglés
*** Pendiente de traducción *** Emails sent by pretix can utilize placeholders that will be filled with customer data. For example, when {name}<br /> is used in an email template, it will be replaced with the buyer&amp;#39;s <br /> name for the final email. This mechanism contained a security-relevant bug:<br /> <br /> It was possible to exfiltrate information about the pretix system through specially crafted placeholder names such as {{event.__init__.__code__.co_filename}}.<br /> This way, an attacker with the ability to control email templates <br /> (usually every user of the pretix backend) could retrieve sensitive <br /> information from the system configuration, including even database <br /> passwords or API keys. pretix does include mechanisms to prevent the usage of such <br /> malicious placeholders, however due to a mistake in the code, they were <br /> not fully effective for this plugin.<br /> <br /> Out of caution, we recommend that you rotate all passwords and API keys contained in your pretix.cfg https://docs.pretix.eu/self-hosting/config/  file.
Gravedad CVSS v4.0: ALTA
Última modificación:
16/02/2026

CVE-2026-2551

Fecha de publicación:
16/02/2026
Idioma:
Inglés
*** Pendiente de traducción *** A vulnerability was determined in ZenTao up to 21.7.8. Affected by this vulnerability is the function delete of the file editor/control.php of the component Backup Handler. This manipulation of the argument fileName causes path traversal. It is possible to initiate the attack remotely. The exploit has been publicly disclosed and may be utilized.
Gravedad CVSS v4.0: MEDIA
Última modificación:
16/02/2026

CVE-2026-0999

Fecha de publicación:
16/02/2026
Idioma:
Inglés
*** Pendiente de traducción *** Mattermost versions 11.1.x
Gravedad CVSS v3.1: MEDIA
Última modificación:
16/02/2026

CVE-2026-2549

Fecha de publicación:
16/02/2026
Idioma:
Inglés
*** Pendiente de traducción *** A vulnerability has been found in zhanghuanhao LibrarySystem 图书馆管理系统 up to 1.1.1. This impacts an unknown function of the file BookController.java. The manipulation leads to improper access controls. The attack is possible to be carried out remotely. The exploit has been disclosed to the public and may be used. The project was informed of the problem early through an issue report but has not responded yet.
Gravedad CVSS v4.0: MEDIA
Última modificación:
16/02/2026

CVE-2026-2550

Fecha de publicación:
16/02/2026
Idioma:
Inglés
*** Pendiente de traducción *** A vulnerability was found in EFM iptime A6004MX 14.18.2. Affected is the function commit_vpncli_file_upload of the file /cgi/timepro.cgi. The manipulation results in unrestricted upload. The attack may be performed from remote. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
Gravedad CVSS v4.0: ALTA
Última modificación:
16/02/2026

CVE-2026-2577

Fecha de publicación:
16/02/2026
Idioma:
Inglés
*** Pendiente de traducción *** The WhatsApp bridge component in Nanobot binds the WebSocket server to all network interfaces (0.0.0.0) on port 3001 by default and does not require authentication for incoming connections. An unauthenticated remote attacker with network access to the bridge can connect to the WebSocket server to hijack the WhatsApp session. This allows the attacker to send messages on behalf of the user, intercept all incoming messages and media in real-time, and capture authentication QR codes.
Gravedad CVSS v3.1: CRÍTICA
Última modificación:
16/02/2026