CVEReports
CVEReports

Automated vulnerability intelligence platform. Comprehensive reports for high-severity CVEs generated by AI.

Product

  • Home
  • Sitemap
  • RSS Feed

Company

  • About
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CVEReports. All rights reserved.

Made with love by Amit Schendel & Alon Barad

CVEReports
•about 8 hours ago•CVE-2026-30913
4.6

CVE-2026-30913: Link Injection and Content Spoofing in Flarum Nicknames Extension

The flarum/nicknames extension for Flarum prior to version 1.8.3 fails to sanitize user display names before including them in outbound notification emails. This allows registered users to construct nicknames that email clients interpret as hyperlinked domains or Markdown links, facilitating targeted phishing and content spoofing attacks against forum users.

Alon Barad
Alon Barad
7 views•6 min read
•about 9 hours ago•CVE-2026-3089
5.3

CVE-2026-3089: Authenticated Path Traversal in Actual Sync Server

CVE-2026-3089 is an authenticated path traversal vulnerability in Actual Sync Server prior to version 26.3.0. By manipulating the `x-actual-file-id` HTTP header, an authenticated attacker can bypass directory restrictions to read or write arbitrary files on the host filesystem. This flaw stems from a lack of input validation when constructing file paths for user uploads and downloads.

Alon Barad
Alon Barad
5 views•6 min read
•about 9 hours ago•GHSA-XV8G-FJ9H-6GMV
9.8

GHSA-xv8g-fj9h-6gmv: Missing Authentication in Linkdave Audio Streaming Server

Linkdave, a high-performance Lavalink rewrite in Go, suffers from a complete lack of authentication on its control plane prior to commit 0f9a00d. This critical vulnerability allows unauthenticated remote attackers to establish WebSocket connections, manipulate REST APIs, and hijack or terminate active audio streaming sessions.

Alon Barad
Alon Barad
7 views•6 min read
•about 10 hours ago•CVE-2026-30925
8.2

CVE-2026-30925: Regular Expression Denial of Service (ReDoS) in Parse Server LiveQuery

Parse Server versions prior to 8.6.11 and 9.5.0-alpha.14 contain a critical vulnerability in the LiveQuery component. The application evaluates client-provided regular expressions directly on the single-threaded Node.js event loop without adequate execution limits. Unauthenticated attackers can submit crafted subscriptions that cause exponential backtracking, exhausting CPU resources and resulting in a complete denial of service.

Amit Schendel
Amit Schendel
6 views•6 min read
•about 10 hours ago•GHSA-PJVX-RX66-R3FG
6.5

GHSA-PJVX-RX66-R3FG: Cross-account sender authorization expansion in OpenClaw

GHSA-PJVX-RX66-R3FG is a moderate severity authorization expansion vulnerability in the OpenClaw AI agent framework. It arises from improper account scoping when writing to the persistent pairing store via the `/allowlist` command, allowing sub-account users to elevate their privileges to the default account scope.

Alon Barad
Alon Barad
4 views•7 min read
•about 11 hours ago•GHSA-6MGF-V5J7-45CR
7.5

GHSA-6MGF-V5J7-45CR: Sensitive Information Leak via Cross-Origin Redirects in OpenClaw

OpenClaw versions prior to v2026.3.7 suffer from a sensitive information disclosure vulnerability in the `fetch-guard` component. During cross-origin HTTP redirects, custom authentication headers are improperly forwarded to untrusted domains due to an incomplete denylist validation approach.

Amit Schendel
Amit Schendel
7 views•5 min read
•about 12 hours ago•GHSA-R6QF-8968-WJ9Q
Moderate

GHSA-R6QF-8968-WJ9Q: Security Gating Bypass via Off-By-One Logic Error in OpenClaw system.run

An off-by-one boundary condition in the OpenClaw system.run command dispatcher permits attackers to bypass mandatory shell approval prompts in security=allowlist mode.

Amit Schendel
Amit Schendel
5 views•5 min read
•about 12 hours ago•GHSA-HFPR-JHPQ-X4RM
6.5

GHSA-HFPR-JHPQ-X4RM: Authorization Bypass via Gateway Command Routing in OpenClaw

OpenClaw versions prior to v2026.3.7 contain a moderate-severity authorization bypass vulnerability (CWE-863). The flaw allows authenticated clients restricted to the `operator.write` scope to perform administrative configuration changes by abusing the `chat.send` gateway protocol. This failure in internal message channel processing leads to unauthorized modifications of the system configuration and potential privilege escalation.

Alon Barad
Alon Barad
4 views•6 min read
•about 13 hours ago•GHSA-9Q2P-VC84-2RWM
6.5

GHSA-9Q2P-VC84-2RWM: Parser Differential Vulnerability in OpenClaw Security Allowlist

A parser differential vulnerability exists in the OpenClaw AI assistant system.run host tool. The security analysis engine fails to correctly parse POSIX shell comments, allowing attackers to bypass the allowlist via the allow-always persistence mechanism.

Alon Barad
Alon Barad
6 views•5 min read
•about 14 hours ago•CVE-2026-25960
7.1

CVE-2026-25960: Server-Side Request Forgery (SSRF) Bypass in vLLM MediaConnector via Parser Differential

vLLM contains a critical parser differential vulnerability that allows attackers to bypass existing Server-Side Request Forgery (SSRF) protections. By exploiting parsing discrepancies between urllib3 and yarl, attackers can craft specific URLs that pass validation but direct the underlying HTTP client to query internal network services and cloud metadata endpoints.

Amit Schendel
Amit Schendel
7 views•5 min read
•about 14 hours ago•GHSA-9Q36-67VC-RRWG
6.5

GHSA-9Q36-67VC-RRWG: Sandbox Escape via Slash Command in OpenClaw ACP

A logic flaw in the OpenClaw agent infrastructure platform allows sandboxed sessions to bypass isolation policies. By utilizing the `/acp spawn` slash command via integrated chat interfaces, restricted users can initialize high-privilege Agent Control Plane (ACP) sessions directly on the host runtime.

Amit Schendel
Amit Schendel
7 views•6 min read
•about 15 hours ago•GHSA-93FX-5QGC-WR38
8.8

GHSA-93FX-5QGC-WR38: Authenticated Remote Code Execution via Liquidsoap Interpolation in AzuraCast

AzuraCast versions prior to 0.23.4 contain a Remote Code Execution (RCE) vulnerability. The flaw exists in the ConfigWriter class, which fails to properly sanitize user-supplied metadata before writing it to Liquidsoap configuration files. This allows authenticated users to inject arbitrary commands via Liquidsoap's string interpolation functionality.

Alon Barad
Alon Barad
2 views•6 min read
SeverityExploitPeriodCatalog
Sort

Or generate a custom report

Search for a CVE ID (e.g. CVE-2024-1234) to generate an AI-powered vulnerability analysis

Automated vulnerability intelligence. 1,039+ reports.