Vulnerabilities
Aggregated CVE / GHSA / KEV / OSV — filter by tag and category.
| ID | Title | |
|---|---|---|
| GHSA-qhh4-458h-xwh2 |
|
Vulnerability in @cyclonedx/cdxgen (GHSA-qhh4-458h-xwh2)
vulnerability in @cyclonedx/cdxgen (GHSA-qhh4-458h-xwh2). Risk of unauthorized operations or information disclosure. Exploitable via ``b1e179869fd7c6032c3d483c3f7bd4d7154ec22b``. Mitigation: upgrade to `12.3.3` or later.
|
| CVE-2026-44560 |
|
Vulnerability in open-webui (CVE-2026-44560)
vulnerability in open-webui (CVE-2026-44560). Risk of unauthorized operations or information disclosure. Exploitable via `POST /api/chat/completions`. Mitigation: upgrade to `0.9.0` or later.
|
| CVE-2026-44561 |
|
Vulnerability in open-webui (CVE-2026-44561)
vulnerability in open-webui (CVE-2026-44561). Risk of unauthorized operations or information disclosure. Exploitable via `GET /api/v1/channels/{channel_id}/messages`. Mitigation: upgrade to `0.9.0` or later.
|
| CVE-2026-44564 |
|
Authorization Flaw in open-webui (CVE-2026-44564)
vulnerability in open-webui (CVE-2026-44564). Risk of unauthorized operations or information disclosure. Exploitable via ``read``. Mitigation: upgrade to `0.9.0` or later.
|
| CVE-2026-44563 |
|
Vulnerability in open-webui (CVE-2026-44563)
vulnerability in open-webui (CVE-2026-44563). Risk of unauthorized operations or information disclosure. Exploitable via `POST /ollama/api/generate`. Mitigation: upgrade to `0.9.0` or later.
|
| CVE-2026-44562 |
|
Vulnerability in open-webui (CVE-2026-44562)
vulnerability in open-webui (CVE-2026-44562). Risk of unauthorized operations or information disclosure. Exploitable via `POST /api/v1/models/import`. Mitigation: upgrade to `0.9.0` or later.
|
| CVE-2026-44559 |
|
Vulnerability in open-webui (CVE-2026-44559)
vulnerability in open-webui (CVE-2026-44559). Risk of unauthorized operations or information disclosure. Exploitable via `GET /api/v1/channels/{id}/members`. Mitigation: upgrade to `0.9.0` or later.
|
| CVE-2026-44557 |
|
Information Disclosure in open-webui (CVE-2026-44557)
vulnerability in open-webui (CVE-2026-44557). Risk of unauthorized operations or information disclosure. Exploitable via `POST /query/doc`. Mitigation: upgrade to `0.9.0` or later.
|
| CVE-2026-44554 |
|
Vulnerability in open-webui (CVE-2026-44554)
vulnerability in open-webui (CVE-2026-44554). Risk of unauthorized operations or information disclosure. Exploitable via `POST /api/v1/retrieval/process/web`. Mitigation: upgrade to `0.9.0` or later.
|
| CVE-2026-44558 |
|
Authorization Flaw in open-webui (CVE-2026-44558)
vulnerability in open-webui (CVE-2026-44558). Risk of unauthorized operations or information disclosure. Exploitable via `POST /api/v1/channels/`. Mitigation: upgrade to `0.9.0` or later.
|
| CVE-2026-44556 |
|
Vulnerability in open-webui (CVE-2026-44556)
vulnerability in open-webui (CVE-2026-44556). Risk of unauthorized operations or information disclosure. Mitigation: upgrade to `0.9.0` or later.
|
| CVE-2026-44555 |
|
Vulnerability in open-webui (CVE-2026-44555)
vulnerability in open-webui (CVE-2026-44555). Risk of unauthorized operations or information disclosure. Exploitable via `POST /api/v1/models/create`. Mitigation: upgrade to `0.9.0` or later.
|
| CVE-2026-44552 |
|
Vulnerability in open-webui (CVE-2026-44552)
vulnerability in open-webui (CVE-2026-44552). Risk of unauthorized operations or information disclosure. Exploitable via ``REDIS_KEY_PREFIX``. Mitigation: upgrade to `0.9.0` or later.
|
| CVE-2026-44553 |
|
Vulnerability in open-webui (CVE-2026-44553)
vulnerability in open-webui (CVE-2026-44553). Risk of unauthorized operations or information disclosure. Exploitable via `POST /api/v1/users/{B_id}/update`. Mitigation: upgrade to `0.9.0` or later.
|
| CVE-2026-44550 |
|
Vulnerability in open-webui (CVE-2026-44550)
vulnerability in open-webui (CVE-2026-44550). Risk of unauthorized operations or information disclosure. Exploitable via `GET /api/v1/users/search`. Mitigation: upgrade to `0.9.0` or later.
|
| CVE-2026-44551 |
|
Authentication Bypass in open-webui (CVE-2026-44551)
authentication bypass in open-webui (CVE-2026-44551). Risk of unauthorized operations or information disclosure. Exploitable via `POST /api/v1/auths/ldap`. Mitigation: upgrade to `0.9.0` or later.
|
| CVE-2026-44737 |
|
Cross-Site Scripting (XSS) in getgrav/grav (CVE-2026-44737)
cross-site scripting in getgrav/grav (CVE-2026-44737). Risk of unauthorized operations or information disclosure. Exploitable via `GET /admin/pages/`. Mitigation: upgrade to `1.7.49.5` or later.
|
| CVE-2026-44680 |
|
SQL Injection in @mikro-orm/sql (CVE-2026-44680)
SQL injection in @mikro-orm/sql (CVE-2026-44680). Risk of unauthorized operations or information disclosure. Exploitable via ``Platform.quoteIdentifier``. Mitigation: upgrade to `7.0.14` or later.
|
| CVE-2026-8178 |
|
Vulnerability in Amazon aws (CVE-2026-8178)
vulnerability in Amazon aws (CVE-2026-8178). Successful exploitation can lead to full system takeover.
|
| CVE-2026-41511 |
|
Vulnerability in c (CVE-2026-41511)
vulnerability in c (CVE-2026-41511). Risk of unauthorized operations or information disclosure.
|
| CVE-2026-29203 |
|
Vulnerability in privilege-escalation (CVE-2026-29203)
vulnerability in privilege-escalation (CVE-2026-29203). Successful exploitation can lead to full system takeover.
|
| CVE-2026-29202 |
|
Vulnerability in CVE-2026-29202 (CVE-2026-29202)
vulnerability in CVE-2026-29202 (CVE-2026-29202). Successful exploitation can lead to full system takeover. Exploitable via ``plugin``.
|
| CVE-2026-29201 |
|
Vulnerability in CVE-2026-29201 (CVE-2026-29201)
vulnerability in CVE-2026-29201 (CVE-2026-29201). Risk of unauthorized operations or information disclosure.
|
| CVE-2026-6322 |
|
Vulnerability in fast-uri (CVE-2026-6322)
vulnerability in fast-uri (CVE-2026-6322). Risk of unauthorized operations or information disclosure. Exploitable via ``evil.com``. Mitigation: upgrade to `3.1.2` or later.
|
| CVE-2026-44502 |
|
SSRF (Server-Side Request Forgery) in bugsink (CVE-2026-44502)
SSRF in bugsink (CVE-2026-44502). Risk of unauthorized operations or information disclosure. Mitigation: upgrade to `2.1.3` or later.
|
| CVE-2026-44588 |
|
Cross-Site Scripting (XSS) in github.com/siyuan-note/siyuan/kernel (CVE-2026-44588)
cross-site scripting in github.com/siyuan-note/siyuan/kernel (CVE-2026-44588). Risk of unauthorized operations or information disclosure. Exploitable via ``getAttribute``.
|
| CVE-2026-44721 |
|
Cross-Site Scripting (XSS) in open-webui (CVE-2026-44721)
cross-site scripting in open-webui (CVE-2026-44721). Risk of unauthorized operations or information disclosure. Exploitable via ``marked``. Mitigation: upgrade to `0.9.0` or later.
|
| GHSA-pvmv-cwg8-v6c8 |
|
Vulnerability in zebrad (GHSA-pvmv-cwg8-v6c8)
vulnerability in zebrad (GHSA-pvmv-cwg8-v6c8). Risk of unauthorized operations or information disclosure. Exploitable via ``SIGHASH_SINGLE``. Mitigation: upgrade to `4.4.1` or later.
|
| CVE-2024-27355 |
|
Vulnerability in phpseclib/phpseclib (CVE-2024-27355)
vulnerability in phpseclib/phpseclib (CVE-2024-27355). Risk of unauthorized operations or information disclosure. Mitigation: upgrade to `1.0.23` or later.
|
| GHSA-r8cj-3554-33mr |
|
Vulnerability in justhtml (GHSA-r8cj-3554-33mr)
vulnerability in justhtml (GHSA-r8cj-3554-33mr). Risk of unauthorized operations or information disclosure. Exploitable via ``justhtml``. Mitigation: upgrade to `1.18.0` or later.
|
| CVE-2026-6659 |
|
Vulnerability in CVE-2026-6659 (CVE-2026-6659)
vulnerability in CVE-2026-6659 (CVE-2026-6659). Confidential information can be exposed externally.
|
| CVE-2026-44714 |
|
Vulnerability in org.bitcoinj:bitcoinj-core (CVE-2026-44714)
vulnerability in org.bitcoinj:bitcoinj-core (CVE-2026-44714). Risk of unauthorized operations or information disclosure. Exploitable via ``P2PKH``. Mitigation: upgrade to `0.17.1` or later.
|
| GHSA-7hgr-xvrr-xpw3 |
|
Vulnerability in github.com/nhost/nhost (GHSA-7hgr-xvrr-xpw3)
vulnerability in github.com/nhost/nhost (GHSA-7hgr-xvrr-xpw3). Risk of unauthorized operations or information disclosure. Exploitable via ``ChangePassword``. Mitigation: upgrade to `0.0.0-20260430132514-52c70664a7e9` or later.
|
| CVE-2026-44310 |
|
Vulnerability in github.com/sigstore/gitsign (CVE-2026-44310)
vulnerability in github.com/sigstore/gitsign (CVE-2026-44310). Risk of unauthorized operations or information disclosure. Exploitable via ``nil``. Mitigation: upgrade to `0.15.0` or later.
|
| GHSA-q9m2-fhv9-3jcf |
|
Path Traversal in potato-annotation (GHSA-q9m2-fhv9-3jcf)
path traversal in potato-annotation (GHSA-q9m2-fhv9-3jcf). Risk of unauthorized operations or information disclosure. Exploitable via ``validate_path_security``. Mitigation: upgrade to `2.4.5` or later.
|
| CVE-2026-42876 |
|
Vulnerability in github.com/external-secrets/external-secrets/apis (CVE-2026-42876)
vulnerability in github.com/external-secrets/external-secrets/apis (CVE-2026-42876). Risk of unauthorized operations or information disclosure. Mitigation: upgrade to `2.4.1` or later.
|
| CVE-2026-44430 |
|
SSRF (Server-Side Request Forgery) in github.com/modelcontextprotocol/registry (CVE-2026-44430)
SSRF in github.com/modelcontextprotocol/registry (CVE-2026-44430). Risk of unauthorized operations or information disclosure. Exploitable via `POST /v0/auth/http`. Mitigation: upgrade to `1.7.7` or later.
|
| CVE-2026-44429 |
|
Cross-Site Scripting (XSS) in github.com/modelcontextprotocol/registry (CVE-2026-44429)
cross-site scripting in github.com/modelcontextprotocol/registry (CVE-2026-44429). Risk of unauthorized operations or information disclosure. Exploitable via `POST /v0/auth/github-at`. Mitigation: upgrade to `1.7.7` or later.
|
| CVE-2026-42072 |
|
Vulnerability in graph (CVE-2026-42072)
vulnerability in graph (CVE-2026-42072). Successful exploitation can lead to full system takeover. Exploitable via ``NORNICDB_ADDRESS``.
|
| CVE-2026-42030 |
|
Vulnerability in CVE-2026-42030 (CVE-2026-42030)
vulnerability in CVE-2026-42030 (CVE-2026-42030). Risk of unauthorized operations or information disclosure.
|
| CVE-2026-42028 |
|
Path Traversal in path-traversal (CVE-2026-42028)
path traversal in path-traversal (CVE-2026-42028). Risk of unauthorized operations or information disclosure.
|
| CVE-2026-41889 |
|
SQL Injection in sqli (CVE-2026-41889)
SQL injection in sqli (CVE-2026-41889). Risk of unauthorized operations or information disclosure.
|
| CVE-2026-41887 |
|
Path Traversal in CVE-2026-41887 (CVE-2026-41887)
path traversal in CVE-2026-41887 (CVE-2026-41887). Confidential information can be exposed externally.
|
| CVE-2026-38360 |
|
Path Traversal in path-traversal (CVE-2026-38360)
path traversal in path-traversal (CVE-2026-38360). Successful exploitation can lead to full system takeover.
|
| CVE-2026-6321 |
|
Path Traversal in fast-uri (CVE-2026-6321)
path traversal in fast-uri (CVE-2026-6321). Risk of unauthorized operations or information disclosure. Mitigation: upgrade to `3.1.1` or later.
|
| CVE-2026-7768 |
|
Vulnerability in @fastify/accepts-serializer (CVE-2026-7768)
vulnerability in @fastify/accepts-serializer (CVE-2026-7768). Risk of unauthorized operations or information disclosure. Exploitable via ``Accept``. Mitigation: upgrade to `6.0.4` or later.
|
| CVE-2026-44671 |
|
Vulnerability in github.com/zitadel/zitadel (CVE-2026-44671)
vulnerability in github.com/zitadel/zitadel (CVE-2026-44671). Risk of unauthorized operations or information disclosure. Mitigation: upgrade to `3.4.10` or later.
|
| CVE-2026-44700 |
|
Vulnerability in ex_webrtc (CVE-2026-44700)
vulnerability in ex_webrtc (CVE-2026-44700). Risk of unauthorized operations or information disclosure. Exploitable via ``ex_webrtc``. Mitigation: upgrade to `0.16.1` or later.
|
| CVE-2026-44428 |
|
SSRF (Server-Side Request Forgery) in github.com/modelcontextprotocol/registry (CVE-2026-44428)
SSRF in github.com/modelcontextprotocol/registry (CVE-2026-44428). Risk of unauthorized operations or information disclosure. Exploitable via ``c5c4b9e8890dd5754bee889b2f1417f4fe3b5ce5``. Mitigation: upgrade to `1.7.6` or later.
|
| CVE-2026-44427 |
|
Open Redirect in github.com/modelcontextprotocol/registry (CVE-2026-44427)
vulnerability in github.com/modelcontextprotocol/registry (CVE-2026-44427). Risk of unauthorized operations or information disclosure. Mitigation: upgrade to `1.7.5` or later.
|