home.social

#vuln — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #vuln, aggregated by home.social.

  1. 🚨 CVE-2026-42281: CRITICAL SSRF in MagicMirror² (<2.36.0)! /cors endpoint lets unauthenticated attackers scan internal networks & exfiltrate environment secrets. Upgrade to 2.36.0+ now! radar.offseq.com/threat/cve-20 #OffSeq #SSRF #MagicMirror #Vuln

  2. 🚨 CVE-2026-42281: CRITICAL SSRF in MagicMirror² (<2.36.0)! /cors endpoint lets unauthenticated attackers scan internal networks & exfiltrate environment secrets. Upgrade to 2.36.0+ now! radar.offseq.com/threat/cve-20 #OffSeq #SSRF #MagicMirror #Vuln

  3. 🚨 CVE-2026-42281: CRITICAL SSRF in MagicMirror² (<2.36.0)! /cors endpoint lets unauthenticated attackers scan internal networks & exfiltrate environment secrets. Upgrade to 2.36.0+ now! radar.offseq.com/threat/cve-20 #OffSeq #SSRF #MagicMirror #Vuln

  4. 🚨 CVE-2026-42281: CRITICAL SSRF in MagicMirror² (<2.36.0)! /cors endpoint lets unauthenticated attackers scan internal networks & exfiltrate environment secrets. Upgrade to 2.36.0+ now! radar.offseq.com/threat/cve-20 #OffSeq #SSRF #MagicMirror #Vuln

  5. 🔴 CVE-2026-8181: Burst Statistics WP plugin (v3.4.0 – 3.4.1.1) suffers CRITICAL auth bypass. Attackers can impersonate admins using any password — immediate removal advised until a fix is released. Details: radar.offseq.com/threat/cve-20 #OffSeq #WordPress #Vuln

  6. 🔴 CVE-2026-8181: Burst Statistics WP plugin (v3.4.0 – 3.4.1.1) suffers CRITICAL auth bypass. Attackers can impersonate admins using any password — immediate removal advised until a fix is released. Details: radar.offseq.com/threat/cve-20 #OffSeq #WordPress #Vuln

  7. 🔴 CVE-2026-8181: Burst Statistics WP plugin (v3.4.0 – 3.4.1.1) suffers CRITICAL auth bypass. Attackers can impersonate admins using any password — immediate removal advised until a fix is released. Details: radar.offseq.com/threat/cve-20 #OffSeq #WordPress #Vuln

  8. 🔴 CVE-2026-8181: Burst Statistics WP plugin (v3.4.0 – 3.4.1.1) suffers CRITICAL auth bypass. Attackers can impersonate admins using any password — immediate removal advised until a fix is released. Details: radar.offseq.com/threat/cve-20 #OffSeq #WordPress #Vuln

  9. 🚨 CRITICAL: CVE-2026-6512 in InfusedWoo Pro (≤5.1.2) lets unauthenticated attackers delete posts, orders, and more on WordPress sites. No patch yet — restrict/disable plugin & monitor vendor advisories. radar.offseq.com/threat/cve-20 #OffSeq #WordPress #Infosec #Vuln

  10. 🚨 CRITICAL: CVE-2026-6512 in InfusedWoo Pro (≤5.1.2) lets unauthenticated attackers delete posts, orders, and more on WordPress sites. No patch yet — restrict/disable plugin & monitor vendor advisories. radar.offseq.com/threat/cve-20 #OffSeq #WordPress #Infosec #Vuln

  11. 🚨 CRITICAL: CVE-2026-6512 in InfusedWoo Pro (≤5.1.2) lets unauthenticated attackers delete posts, orders, and more on WordPress sites. No patch yet — restrict/disable plugin & monitor vendor advisories. radar.offseq.com/threat/cve-20 #OffSeq #WordPress #Infosec #Vuln

  12. 🚨 CRITICAL: CVE-2026-6512 in InfusedWoo Pro (≤5.1.2) lets unauthenticated attackers delete posts, orders, and more on WordPress sites. No patch yet — restrict/disable plugin & monitor vendor advisories. radar.offseq.com/threat/cve-20 #OffSeq #WordPress #Infosec #Vuln

  13. 🚨 CVE-2026-6510 (CRITICAL, CVSS 9.8) in InfusedWoo Pro ≤5.1.2: Missing authorization in iwar_save_recipe() lets attackers escalate privileges & gain admin access via crafted URLs. No patch yet — restrict/disable plugin. radar.offseq.com/threat/cve-20 #OffSeq #WordPress #Vuln

  14. 🚨 CVE-2026-6510 (CRITICAL, CVSS 9.8) in InfusedWoo Pro ≤5.1.2: Missing authorization in iwar_save_recipe() lets attackers escalate privileges & gain admin access via crafted URLs. No patch yet — restrict/disable plugin. radar.offseq.com/threat/cve-20 #OffSeq #WordPress #Vuln

  15. 🚨 CVE-2026-6510 (CRITICAL, CVSS 9.8) in InfusedWoo Pro ≤5.1.2: Missing authorization in iwar_save_recipe() lets attackers escalate privileges & gain admin access via crafted URLs. No patch yet — restrict/disable plugin. radar.offseq.com/threat/cve-20 #OffSeq #WordPress #Vuln

  16. 🚨 CVE-2026-6510 (CRITICAL, CVSS 9.8) in InfusedWoo Pro ≤5.1.2: Missing authorization in iwar_save_recipe() lets attackers escalate privileges & gain admin access via crafted URLs. No patch yet — restrict/disable plugin. radar.offseq.com/threat/cve-20 #OffSeq #WordPress #Vuln

  17. 🚨 CVE-2026-6510: InfusedWoo Pro ≤5.1.2 has a CRITICAL vuln (CVSS 9.8). Missing auth checks in iwar_save_recipe() lets attackers bypass auth & escalate to admin. No patch yet — disable plugin or restrict access now! radar.offseq.com/threat/cve-20 #OffSeq #WordPress #Vuln #CVE20266510

  18. 🚨 CVE-2026-6510: InfusedWoo Pro ≤5.1.2 has a CRITICAL vuln (CVSS 9.8). Missing auth checks in iwar_save_recipe() lets attackers bypass auth & escalate to admin. No patch yet — disable plugin or restrict access now! radar.offseq.com/threat/cve-20 #OffSeq #WordPress #Vuln #CVE20266510

  19. 🚨 CVE-2026-6510: InfusedWoo Pro ≤5.1.2 has a CRITICAL vuln (CVSS 9.8). Missing auth checks in iwar_save_recipe() lets attackers bypass auth & escalate to admin. No patch yet — disable plugin or restrict access now! radar.offseq.com/threat/cve-20 #OffSeq #WordPress #Vuln #CVE20266510

  20. 🚨 CVE-2026-6510: InfusedWoo Pro ≤5.1.2 has a CRITICAL vuln (CVSS 9.8). Missing auth checks in iwar_save_recipe() lets attackers bypass auth & escalate to admin. No patch yet — disable plugin or restrict access now! radar.offseq.com/threat/cve-20 #OffSeq #WordPress #Vuln #CVE20266510

  21. ⚠️ CRITICAL: OPNsense core < 26.1.7 vulnerable to argument injection (CVE-2026-44193). Remote code execution possible via XMLRPC method. Update to 26.1.7+ now! radar.offseq.com/threat/cve-20 #OffSeq #OPNsense #Vuln #RCE

  22. ⚠️ CRITICAL: OPNsense core < 26.1.7 vulnerable to argument injection (CVE-2026-44193). Remote code execution possible via XMLRPC method. Update to 26.1.7+ now! radar.offseq.com/threat/cve-20 #OffSeq #OPNsense #Vuln #RCE

  23. ⚠️ CRITICAL: OPNsense core < 26.1.7 vulnerable to argument injection (CVE-2026-44193). Remote code execution possible via XMLRPC method. Update to 26.1.7+ now! radar.offseq.com/threat/cve-20 #OffSeq #OPNsense #Vuln #RCE

  24. ⚠️ CRITICAL: OPNsense core < 26.1.7 vulnerable to argument injection (CVE-2026-44193). Remote code execution possible via XMLRPC method. Update to 26.1.7+ now! radar.offseq.com/threat/cve-20 #OffSeq #OPNsense #Vuln #RCE

  25. 🚨 CVE-2026-44194 (CVSS 9.1): OPNsense core <26.1.8 is vulnerable to OS command injection via sync_user.php. Authenticated users with user-management rights can gain root. Update to 26.1.8 ASAP. radar.offseq.com/threat/cve-20 #OffSeq #OPNsense #Vuln #BlueTeam

  26. 🚨 CVE-2026-44194 (CVSS 9.1): OPNsense core <26.1.8 is vulnerable to OS command injection via sync_user.php. Authenticated users with user-management rights can gain root. Update to 26.1.8 ASAP. radar.offseq.com/threat/cve-20 #OffSeq #OPNsense #Vuln #BlueTeam

  27. 🚨 CVE-2026-44194 (CVSS 9.1): OPNsense core <26.1.8 is vulnerable to OS command injection via sync_user.php. Authenticated users with user-management rights can gain root. Update to 26.1.8 ASAP. radar.offseq.com/threat/cve-20 #OffSeq #OPNsense #Vuln #BlueTeam

  28. 🚨 CVE-2026-44194 (CVSS 9.1): OPNsense core <26.1.8 is vulnerable to OS command injection via sync_user.php. Authenticated users with user-management rights can gain root. Update to 26.1.8 ASAP. radar.offseq.com/threat/cve-20 #OffSeq #OPNsense #Vuln #BlueTeam

  29. 🚨 CRITICAL: OPNsense core < 26.1.8 has CVE-2026-45158 — command injection in DHCP config allows root RCE. Upgrade to 26.1.8+ now to prevent full system compromise. Details: radar.offseq.com/threat/cve-20 #OffSeq #OPNsense #Vuln #Cybersecurity

  30. 🚨 CRITICAL: OPNsense core < 26.1.8 has CVE-2026-45158 — command injection in DHCP config allows root RCE. Upgrade to 26.1.8+ now to prevent full system compromise. Details: radar.offseq.com/threat/cve-20 #OffSeq #OPNsense #Vuln #Cybersecurity

  31. 🚨 CRITICAL: OPNsense core < 26.1.8 has CVE-2026-45158 — command injection in DHCP config allows root RCE. Upgrade to 26.1.8+ now to prevent full system compromise. Details: radar.offseq.com/threat/cve-20 #OffSeq #OPNsense #Vuln #Cybersecurity

  32. 🚨 CRITICAL: OPNsense core < 26.1.8 has CVE-2026-45158 — command injection in DHCP config allows root RCE. Upgrade to 26.1.8+ now to prevent full system compromise. Details: radar.offseq.com/threat/cve-20 #OffSeq #OPNsense #Vuln #Cybersecurity

  33. 🚨 CRITICAL: CVE-2026-45714 in CubeCart < 6.7.0 enables authenticated admins to execute OS commands via SSTI (Smarty engine) — full RCE risk. Patch to 6.7.0+ ASAP! radar.offseq.com/threat/cve-20 #OffSeq #CubeCart #SSTI #RCE #Vuln

  34. 🚨 CRITICAL: CVE-2026-45714 in CubeCart < 6.7.0 enables authenticated admins to execute OS commands via SSTI (Smarty engine) — full RCE risk. Patch to 6.7.0+ ASAP! radar.offseq.com/threat/cve-20 #OffSeq #CubeCart #SSTI #RCE #Vuln

  35. 🚨 CRITICAL: CVE-2026-45714 in CubeCart < 6.7.0 enables authenticated admins to execute OS commands via SSTI (Smarty engine) — full RCE risk. Patch to 6.7.0+ ASAP! radar.offseq.com/threat/cve-20 #OffSeq #CubeCart #SSTI #RCE #Vuln

  36. 🚨 CRITICAL: CVE-2026-45714 in CubeCart < 6.7.0 enables authenticated admins to execute OS commands via SSTI (Smarty engine) — full RCE risk. Patch to 6.7.0+ ASAP! radar.offseq.com/threat/cve-20 #OffSeq #CubeCart #SSTI #RCE #Vuln

  37. 🚨 CRITICAL vuln: ERPNext <16.9.1 (CVE-2026-44442) lets users with limited rights modify data due to missing authorization. Update ASAP to 16.9.1+ to fix. No known exploits yet. Details: radar.offseq.com/threat/cve-20 #OffSeq #ERPNext #Vuln #AppSec

  38. 🚨 CRITICAL vuln: ERPNext <16.9.1 (CVE-2026-44442) lets users with limited rights modify data due to missing authorization. Update ASAP to 16.9.1+ to fix. No known exploits yet. Details: radar.offseq.com/threat/cve-20 #OffSeq #ERPNext #Vuln #AppSec

  39. 🚨 CRITICAL vuln: ERPNext <16.9.1 (CVE-2026-44442) lets users with limited rights modify data due to missing authorization. Update ASAP to 16.9.1+ to fix. No known exploits yet. Details: radar.offseq.com/threat/cve-20 #OffSeq #ERPNext #Vuln #AppSec

  40. 🚨 CRITICAL vuln: ERPNext <16.9.1 (CVE-2026-44442) lets users with limited rights modify data due to missing authorization. Update ASAP to 16.9.1+ to fix. No known exploits yet. Details: radar.offseq.com/threat/cve-20 #OffSeq #ERPNext #Vuln #AppSec

  41. 🚩 CRITICAL: CVE-2026-6722 in PHP SOAP (8.2 – 8.5) allows unauthenticated RCE via use-after-free. No patch confirmed — restrict SOAP access or disable if not needed. Details: radar.offseq.com/threat/cve-20 #OffSeq #PHP #Vuln #RCE #InfoSec

  42. 🚨 CVE-2026-42193 (CVSS 9.1, CRITICAL): useplunk plunk < 0.9.0 fails to verify SNS signatures at /webhooks/sns, allowing spoofed webhook attacks. Patched in 0.9.0 — verify your version & check vendor advisory. radar.offseq.com/threat/cve-20 #OffSeq #Vuln #EmailSecurity #CVE202642193

  43. 🚨 CVE-2026-42193 (CVSS 9.1, CRITICAL): useplunk plunk < 0.9.0 fails to verify SNS signatures at /webhooks/sns, allowing spoofed webhook attacks. Patched in 0.9.0 — verify your version & check vendor advisory. radar.offseq.com/threat/cve-20 #OffSeq #Vuln #EmailSecurity #CVE202642193

  44. 🚨 CVE-2026-42193 (CVSS 9.1, CRITICAL): useplunk plunk < 0.9.0 fails to verify SNS signatures at /webhooks/sns, allowing spoofed webhook attacks. Patched in 0.9.0 — verify your version & check vendor advisory. radar.offseq.com/threat/cve-20 #OffSeq #Vuln #EmailSecurity #CVE202642193

  45. 🚨 CVE-2026-42193 (CVSS 9.1, CRITICAL): useplunk plunk < 0.9.0 fails to verify SNS signatures at /webhooks/sns, allowing spoofed webhook attacks. Patched in 0.9.0 — verify your version & check vendor advisory. radar.offseq.com/threat/cve-20 #OffSeq #Vuln #EmailSecurity #CVE202642193

  46. Rien ne dit “bon week-end” comme trois CVE cPanel annoncées un vendredi, avec les détails techniques livrés pile au moment du patch -->c’est-à-dire à 18h, l’heure sacrée de l’apéro.

    Santé aux admins qui vont lancer /scripts/upcp avec une main sur le clavier et l’autre sur le verre.
    👇
    " To help protect customers prior to patch availability, technical details about vulnerabilities will be released alongside the patches. Full technical details will be published on our support page at the same time the patch is released. The CVE IDs are CVE-2026-29201, CVE-2026-29202, and CVE-2026-29203.

    Patch & Affected Versions
    The patch will be available on May 08 at 12:00pm EST and will be distributed through the standard cPanel automatic update process and through the manual update process. We strongly recommend performing a manual update with /scripts/upcp once the patch is made available.
    "
    👇
    reddit.com/r/cpanel/comments/1

    #CpanelVulnerability #cpanel #CyberVeille #vuln #infosec

  47. 🚨 CVE-2026-42826 (CRITICAL, CVSS 10.0) in Azure DevOps exposes sensitive data to unauthorized actors remotely. Microsoft has released a fix — ensure your environment is fully updated. More info: radar.offseq.com/threat/cve-20 #OffSeq #AzureDevOps #Vuln #InfoSec

  48. 🚨 CVE-2026-42826 (CRITICAL, CVSS 10.0) in Azure DevOps exposes sensitive data to unauthorized actors remotely. Microsoft has released a fix — ensure your environment is fully updated. More info: radar.offseq.com/threat/cve-20 #OffSeq #AzureDevOps #Vuln #InfoSec

  49. 🚨 CVE-2026-42826 (CRITICAL, CVSS 10.0) in Azure DevOps exposes sensitive data to unauthorized actors remotely. Microsoft has released a fix — ensure your environment is fully updated. More info: radar.offseq.com/threat/cve-20 #OffSeq #AzureDevOps #Vuln #InfoSec

  50. 🚨 CVE-2026-42826 (CRITICAL, CVSS 10.0) in Azure DevOps exposes sensitive data to unauthorized actors remotely. Microsoft has released a fix — ensure your environment is fully updated. More info: radar.offseq.com/threat/cve-20 #OffSeq #AzureDevOps #Vuln #InfoSec