// CVE Tracker

Critical vulnerabilities currently doing the rounds โ€” sorted by CVSS score.

23

CRITICAL

16

HIGH

39

TOTAL ACTIVE

37

PATCHED

CVSS Scale: 9.0โ€“10.0 CRITICAL ยท 7.0โ€“8.9 HIGH ยท 4.0โ€“6.9 MEDIUM ยท 0.1โ€“3.9 LOW
~9.8
EST.

CVE-2026-4681

PTC Windchill and FlexPLM โ€” Unauthenticated Remote Code Execution via Insecure Deserialization

CRITICAL โœ• No Patch

A critical remote code execution vulnerability in PTC Windchill (product lifecycle management) and PTC FlexPLM (retail PLM) arises from insecure deserialisation of trusted data in the application server. An unauthenticated attacker with network access can send a malicious serialised object and achieve arbitrary code execution. No patch was available at time of initial disclosure; the severity prompted German federal police (BKA) and state police (LKA) to physically dispatch officers to affected companies on the weekend of 27 March 2026. PTC provided a temporary web server rule workaround while developing a permanent fix.

PTC Windchill โ€” most supported versions and all critical patch sets (CPS) PTC FlexPLM โ€” most supported versions
~7.8
EST.

PENDING-2026-BLUEHAMMER

Windows Defender Signature Update TOCTOU Privilege Escalation (BlueHammer)

HIGH โœ• No Patch

A zero-day local privilege escalation vulnerability in the Windows Defender antimalware signature-update mechanism allows any authenticated local user to gain SYSTEM-level code execution. The flaw combines a time-of-check to time-of-use (TOCTOU) race condition with a path-confusion issue in the Defender update staging path, enabling an attacker to substitute a temporary update file with a malicious DLL that is subsequently loaded under the SYSTEM-privileged Defender service context. No CVE has been assigned by MITRE as of publication. A working public exploit is available and active exploitation has been observed in post-compromise scenarios preceding ransomware deployment.

Microsoft Windows 10 (all supported editions) Microsoft Windows 11 (all editions) Microsoft Windows Server 2016, 2019, 2022
10.0
CVSS

CVE-2025-32432

Craft CMS โ€” Unauthenticated Remote Code Execution via Code Injection

CRITICAL โœ“ Patch Available

A maximum-severity code injection vulnerability (CWE-94) in Craft CMS allows unauthenticated remote attackers to execute arbitrary PHP code on any accessible Craft installation. The vulnerability affects all major version branches from 3.0.0-RC1 through the respective unpatched minor versions. Orange Cyberdefense SensePost assessed exploitation began as a zero-day approximately February 2025. The Mimo intrusion set (aka Hezb) actively exploits this CVE to deploy cryptocurrency miners and residential proxy malware on compromised servers. CISA added CVE-2025-32432 to the Known Exploited Vulnerabilities catalogue on 20 March 2026, with a federal patch deadline of 3 April 2026.

Craft CMS 3.0.0-RC1 through 3.9.14 Craft CMS 4.0.0-RC1 through 4.14.14 Craft CMS 5.0.0-RC1 through 5.6.16
10.0
CVSS

CVE-2025-55182

React Server Components / Next.js โ€” Unauthenticated Remote Code Execution (React2Shell)

CRITICAL โœ“ Patch Available

A maximum-severity unauthenticated remote code execution vulnerability in React Server Components as implemented in Next.js and related frameworks allows attackers to execute arbitrary server-side code via a single malicious HTTP request. The vulnerability requires no credentials, no special configuration, and no user interaction. Known as React2Shell, the flaw was publicly disclosed on 3 December 2025 and exploitation by China-state-nexus groups (Earth Lamia, Jackpot Panda) began within hours of disclosure. Over 30 organisations have been confirmed breached with 77,000+ internet-exposed vulnerable instances identified. Attackers systematically harvest AWS credentials, database connection strings, and SSH keys.

Next.js versions prior to December 2025 patch release React Server Components implementations prior to patched versions
10.0
CVSS

CVE-2025-59528

Flowise CustomMCP Node Unauthenticated Remote Code Execution

CRITICAL โœ“ Patch Available

A code injection vulnerability in the CustomMCP node of Flowise, the open-source AI workflow builder, allows unauthenticated remote attackers to execute arbitrary JavaScript on the host machine. The node processes user-supplied mcpServerConfig parameters without sanitisation or sandboxing, enabling full system compromise. Over 12,000 internet-exposed Flowise instances remain unpatched and are actively targeted. Exploits are publicly available including a Metasploit module.

Flowise 2.x through 3.0.5
10.0
CVSS

CVE-2026-20127

Cisco Catalyst SD-WAN Controller Authentication Bypass

CRITICAL โœ“ Patch Available

A maximum-severity (CVSS 10.0) authentication bypass vulnerability in the Cisco Catalyst SD-WAN Controller and Manager allows an unauthenticated remote attacker to gain full administrative access by exploiting a broken peering authentication mechanism in the control-plane workflow. The exploit sends a forged CHALLENGE_ACK_ACK message to force the server to treat an unauthenticated connection as verified, enabling injection of malicious SSH keys and full control of the SD-WAN fabric. Cisco Talos attributes sustained exploitation since at least 2023 to a tracked threat actor designated UAT-8616, assessed with high confidence as a sophisticated, likely nation-state-aligned group. The vulnerability is included in CISA Emergency Directive 26-03.

Cisco Catalyst SD-WAN Controller / Manager 20.11.x before 20.12.6.1 Cisco Catalyst SD-WAN Controller / Manager 20.12.5.x before 20.12.5.3 Cisco Catalyst SD-WAN Controller / Manager 20.12.6.x before 20.12.6.1
10.0
CVSS

CVE-2026-20131

Cisco Secure Firewall Management Center โ€” Unauthenticated Deserialization RCE (Root Access)

CRITICAL โœ“ Patch Available

A maximum-severity insecure deserialization vulnerability in Cisco Secure Firewall Management Center (FMC) allows unauthenticated remote attackers to send a crafted serialised Java object to the management interface, resulting in arbitrary Java code execution as root. CVE-2026-20131 was exploited as a zero-day by Interlock ransomware for 36 days before Cisco patched it on 4 March 2026. Compromising Cisco FMC gives attackers full control over firewall policy, segmentation rules, VPN configuration, and all managed Firepower sensors โ€” effectively compromising the organisation's network security enforcement layer.

Cisco Secure Firewall Management Center (FMC) versions prior to SA-FMC-2026-0001 patch
10.0
CVSS

CVE-2026-22557

Ubiquiti UniFi Network Application โ€” Unauthenticated Path Traversal Leading to Account Takeover

CRITICAL โœ“ Patch Available

A maximum-severity path traversal vulnerability in the Ubiquiti UniFi Network Application allows unauthenticated remote attackers to read arbitrary files from the underlying operating system, including the controller's database credentials and user session tokens, enabling full account takeover without any authentication. No user interaction or special conditions are required. Approximately 87,000 internet-exposed UniFi controllers were identified by Censys at time of disclosure. The vulnerability is commonly chained with CVE-2026-22558 (NoSQL injection) for immediate administrative access.

Ubiquiti UniFi Network Application prior to 10.1.89 (stable) Ubiquiti UniFi Network Application prior to 10.2.97 (release candidate) Ubiquiti UniFi Express firmware prior to 4.0.13
~9.8
EST.

CVE-2025-43520

Apple OS Kernel Buffer Overflow โ€” DarkSword Full Kernel Compromise Stage

CRITICAL โœ“ Patch Available

A classic buffer overflow vulnerability in Apple operating system core components is the final stage of the DarkSword exploit chain, enabling attackers to write directly to kernel memory and achieve complete control over the compromised device. CVE-2025-43520 converts the OS-level access obtained via CVE-2025-43510 into full kernel compromise, allowing persistent implant installation, data exfiltration, and surveillance capabilities that survive reboots. CISA added CVE-2025-43520 to the Known Exploited Vulnerabilities catalogue on 20 March 2026.

Apple iOS and iPadOS prior to patched versions (2025) Apple macOS prior to patched versions (2025) Apple watchOS prior to patched versions (2025) +1 more
9.8
CVSS

CVE-2025-53521

F5 BIG-IP APM Remote Code Execution via apmd Process

CRITICAL โœ“ Patch Available

A remote code execution vulnerability in F5 BIG-IP Access Policy Manager (APM) affecting the apmd process. Initially disclosed in October 2025 as a denial-of-service flaw, F5 reclassified the vulnerability in March 2026 after new exploitation information emerged. An unauthenticated remote attacker can exploit the flaw to achieve code execution on the BIG-IP appliance. CISA confirmed active exploitation and added CVE-2025-53521 to its Known Exploited Vulnerabilities catalogue on 27 March 2026, issuing a three-day patch mandate to federal agencies.

F5 BIG-IP APM 17.5.0 โ€“ 17.5.1 F5 BIG-IP APM 17.1.0 โ€“ 17.1.2 F5 BIG-IP APM 16.1.0 โ€“ 16.1.6 +1 more
9.8
CVSS

CVE-2026-1281

Ivanti EPMM Apache URL Rewriting Code Injection โ€” Unauthenticated RCE

CRITICAL โœ“ Patch Available

A code injection vulnerability in legacy bash scripts used by Ivanti EPMM's Apache web server for URL rewriting allows unauthenticated remote attackers to execute arbitrary commands. This is the primary initial-access vector in the Ivanti EPMM exploit chain, typically followed by CVE-2026-1340 for further capability extension. CISA added this vulnerability to the KEV catalogue in January 2026 with exploitation confirmed in the wild targeting government and enterprise MDM deployments.

Ivanti Endpoint Manager Mobile (EPMM) all supported versions through 12.7.x
9.8
CVSS

CVE-2026-1340

Ivanti EPMM Android File Transfer Code Injection โ€” Unauthenticated RCE

CRITICAL โœ“ Patch Available

A code injection vulnerability in Ivanti Endpoint Manager Mobile (EPMM)'s Android File Transfer mechanism allows unauthenticated remote attackers to execute arbitrary code on internet-exposed appliances. The flaw is frequently chained with CVE-2026-1281 to achieve full appliance compromise. Active exploitation has been confirmed since January 2026, and CISA added the vulnerability to its Known Exploited Vulnerabilities catalogue on 8 April 2026 with a federal agency patch deadline of 11 April.

Ivanti Endpoint Manager Mobile (EPMM) all supported versions through 12.7.x
~9.8
EST.

CVE-2026-1603

Ivanti Endpoint Manager โ€” Unauthenticated Authentication Bypass and Credential Vault Access

CRITICAL โœ“ Patch Available

An authentication bypass vulnerability in Ivanti Endpoint Manager (EPM) prior to version 2024 SU5 allows unauthenticated remote attackers to bypass login controls entirely by submitting a crafted HTTP request containing a specific magic number value. Successful exploitation grants direct access to the EPM Credential Vault, exposing Domain Administrator NTLM password hashes and service account credentials stored within the management system. CISA added CVE-2026-1603 to the Known Exploited Vulnerabilities catalogue on 9 March 2026 with a federal agency remediation deadline of 23 March 2026.

Ivanti Endpoint Manager (EPM) all versions prior to 2024 SU5
9.8
CVSS

CVE-2026-20093

Cisco Integrated Management Controller Authentication Bypass

CRITICAL โœ“ Patch Available

A critical authentication bypass in the Cisco Integrated Management Controller (IMC) allows an unauthenticated remote attacker to bypass authentication entirely and gain elevated access to the affected system. The vulnerability is caused by incorrect handling of password change requests โ€” an attacker sends a crafted HTTP request to the IMC management interface to bypass authentication, reset the password of any local user including administrators, and gain full control of the server's out-of-band management plane. IMC access is equivalent to physical console access to the server.

Cisco UCS C-Series and E-Series Standalone Rack Servers (IMC firmware prior to patched release) Cisco HyperFlex HX Series Nodes with unpatched IMC
9.8
CVSS

CVE-2026-20160

Cisco Smart Software Manager On-Prem Unauthenticated RCE

CRITICAL โœ“ Patch Available

A critical vulnerability in Cisco Smart Software Manager On-Prem (SSM On-Prem) allows an unauthenticated remote attacker to execute arbitrary commands on the underlying operating system. The flaw stems from the unintentional exposure of an internal administrative service that was not designed to accept external connections โ€” an attacker who reaches this service can invoke OS-level commands without authentication. SSM On-Prem is used by enterprises to manage Cisco software licences on-premises, without sending licence data to Cisco's cloud.

Cisco Smart Software Manager On-Prem (SSM On-Prem) prior to version 9-202601
~9.8
EST.

CVE-2026-23760

SmarterMail Authentication Bypass Allowing Admin Account Takeover

CRITICAL โœ“ Patch Available

An authentication bypass vulnerability in SmarterTools SmarterMail email server allows unauthenticated remote attackers to bypass the authentication mechanism and gain administrative access. The flaw was exploited as a zero-day by Storm-1175, a China-linked ransomware affiliate, prior to public disclosure, and was subsequently used to deploy Medusa ransomware. SmarterMail is used by tens of thousands of organisations globally as an on-premises email and collaboration platform.

SmarterMail (versions prior to patched build โ€” see SmarterTools advisory)
9.8
CVSS

CVE-2026-3197

Palo Alto PAN-OS GlobalProtect SAML Authentication Bypass

CRITICAL โœ“ Patch Available

A critical authentication bypass in the Palo Alto Networks PAN-OS GlobalProtect SAML authentication handler allows unauthenticated remote attackers to forge a valid SAML assertion and gain full administrative access to the firewall management plane. The vulnerability exploits a signature verification flaw in the XML SAML response parser, enabling an attacker to send a crafted assertion that PAN-OS accepts as legitimate without contacting the configured identity provider. Exploitation grants the attacker the ability to modify firewall policy, create persistent accounts, and extract VPN configuration data. When chained with CVE-2026-3201 (post-authentication command injection), the combined attack achieves unauthenticated root-level OS code execution.

Palo Alto Networks PAN-OS 11.2.x prior to 11.2.4 Palo Alto Networks PAN-OS 11.1.x prior to 11.1.5 Palo Alto Networks PAN-OS 11.0.x prior to 11.0.6 +2 more
~9.8
EST.

CVE-2026-33634

Aqua Security Trivy โ€” Embedded Malicious Code in Official GitHub Actions and Releases

CRITICAL โœ“ Patch Available

Threat actor TeamPCP compromised the Aqua Security Trivy vulnerability scanner ecosystem on 19 March 2026, force-pushing malicious code to 75 of 77 version tags in the official aquasecurity/trivy-action and all tags in aquasecurity/setup-trivy GitHub Actions repositories. A second attack wave on 22 March replaced DockerHub images. The malicious code embedded in affected versions deployed an infostealer targeting plain-text secrets in CI/CD runner process memory, exfiltrating cloud credentials, API tokens, Kubernetes configurations, and SSH keys. CISA added CVE-2026-33634 to the Known Exploited Vulnerabilities catalogue on 26 March 2026.

aquasecurity/trivy-action GitHub Action (all tags except those predating March 19) aquasecurity/setup-trivy GitHub Action (all tags as of March 19) Aqua Security Trivy v0.69.4 through v0.69.6 (DockerHub images)
9.8
CVSS

CVE-2026-34197

Apache ActiveMQ Unauthenticated RCE via Jolokia API

CRITICAL โœ“ Patch Available

A critical remote code execution vulnerability in Apache ActiveMQ's Jolokia JMX-over-HTTP bridge allows unauthenticated remote attackers to execute arbitrary OS commands by invoking the addNetworkConnector MBean operation with a crafted URI. The flaw causes the broker to fetch and parse an attacker-controlled XML configuration file, enabling arbitrary Java class instantiation and OS command execution under the service account context. Present since ActiveMQ 5.x, this design weakness was not addressed in the 6.x rewrite and is unauthenticated by default in ActiveMQ 6.0.0โ€“6.1.1. When chained with CVE-2024-32114, the combined exploit achieves full unauthenticated root-level code execution in seconds.

Apache ActiveMQ 6.0.0 โ€“ 6.1.1 (Jolokia unauthenticated by default) Apache ActiveMQ 5.x prior to 5.19.4 (if Jolokia explicitly enabled)
9.3
CVSS

CVE-2026-3055

Citrix NetScaler ADC/Gateway Unauthenticated Memory Overread via SAML

CRITICAL โœ“ Patch Available

An insufficient input validation flaw in the SAML Identity Provider endpoint of Citrix NetScaler ADC and NetScaler Gateway allows an unauthenticated remote attacker to trigger an out-of-bounds memory read. The appliance leaks sensitive memory contents โ€” including session tokens and authentication credentials โ€” through the NSC_TASS response cookie when a crafted SAMLRequest omitting the AssertionConsumerServiceURL field is submitted to /saml/login. Only appliances configured as SAML IDPs are affected; default configurations are not vulnerable. CISA added this CVE to the Known Exploited Vulnerabilities catalogue on 30 March 2026 following confirmed in-the-wild exploitation.

Citrix NetScaler ADC and Gateway prior to 14.1-66.59 Citrix NetScaler ADC and Gateway 14.1 prior to 14.1-60.58 Citrix NetScaler ADC and Gateway 13.1 prior to 13.1-62.23 +1 more
9.3
CVSS

CVE-2026-33017

Langflow AI Pipeline Builder โ€” Unauthenticated Remote Code Execution

CRITICAL โœ“ Patch Available

An unauthenticated remote code execution vulnerability in Langflow's public flow build endpoint allows attackers to inject arbitrary Python code into flow node definitions, which Langflow executes server-side without sandboxing. No credentials or user interaction are required. Within 20 hours of public disclosure on 17 March 2026, active exploitation was confirmed with attackers harvesting LLM provider API keys (OpenAI, Anthropic, AWS) from compromised instances. CISA added the vulnerability to its Known Exploited Vulnerabilities catalogue on 26 March 2026.

Langflow all versions through 1.8.1
9.3
CVSS

CVE-2026-39987

Marimo Python Notebook Unauthenticated Terminal RCE via WebSocket

CRITICAL โœ“ Patch Available

A pre-authentication remote code execution vulnerability in Marimo, an open-source Python notebook widely used in data science and AI/ML workflows, allows any network-accessible attacker to obtain a full PTY shell on the server. The /terminal/ws WebSocket endpoint fails to call authenticate() before accepting connections, unlike all other protected endpoints. An attacker connects to the endpoint and is immediately granted interactive OS-level access. Exploitation was observed within 10 hours of public disclosure, with attackers building working exploits directly from the advisory.

Marimo prior to 0.23.0 (all versions up to and including 0.20.4)
9.1
CVSS

CVE-2026-2699

Progress ShareFile Storage Zones Controller Authentication Bypass

CRITICAL โœ“ Patch Available

A critical authentication bypass vulnerability in Progress ShareFile Storage Zones Controller (SZC) arises from improper handling of execution-after-redirect behaviour in the /ConfigService/Admin.aspx administrative endpoint. An unauthenticated remote attacker can exploit the redirect logic to gain access to restricted administrative functions without supplying valid credentials. When chained with CVE-2026-2701 (arbitrary file upload), this vulnerability enables fully unauthenticated remote code execution. Progress released a fix in SZC version 5.12.4 on 10 March 2026; watchTowr Labs published full technical details on 2 April, significantly lowering the exploitation barrier. Approximately 30,000 SZC instances are internet-exposed.

Progress ShareFile Storage Zones Controller 5.12.3 and earlier
9.1
CVSS

CVE-2026-35616

Fortinet FortiClient EMS Pre-Authentication API Bypass and Privilege Escalation

CRITICAL โœ“ Patch Available

A critical improper access control vulnerability (CWE-284) in Fortinet FortiClient Endpoint Management Server allows an unauthenticated remote attacker to bypass API authentication and execute arbitrary code or commands on the server via crafted HTTP requests. Carrying a CVSS score of 9.1, this flaw affects the management plane responsible for deploying and enforcing endpoint security policy, ZTNA, and VPN access controls across managed fleets. Active exploitation was confirmed by multiple researchers beginning 31 March 2026, and CISA added CVE-2026-35616 to its KEV catalogue on 6 April with a federal remediation deadline of 9 April โ€” one of the shortest timelines CISA issues.

Fortinet FortiClient EMS 7.4.5 Fortinet FortiClient EMS 7.4.6
8.8
CVSS

CVE-2025-31277

Apple WebKit Buffer Overflow โ€” DarkSword Exploit Chain Entry Point

HIGH โœ“ Patch Available

A buffer overflow vulnerability in Apple's WebKit browser engine serves as the initial entry point of the DarkSword multi-stage iOS and macOS exploit chain. An attacker can trigger the overflow by delivering a malicious webpage via Safari or any WebKit-based application, achieving initial code execution within the browser process without requiring user interaction beyond page load. This CVE affects iOS, iPadOS, macOS, watchOS, tvOS, and visionOS. CISA added CVE-2025-31277 to the Known Exploited Vulnerabilities catalogue on 20 March 2026, confirming active exploitation as part of the DarkSword framework.

Apple iOS and iPadOS prior to patched versions (2025) Apple macOS prior to patched versions (2025) Apple watchOS prior to patched versions (2025) +2 more
~8.8
EST.

CVE-2025-43510

Apple OS Improper Locking โ€” DarkSword Sandbox Escape Component

HIGH โœ“ Patch Available

An improper locking vulnerability in Apple operating systems allows attackers who have achieved initial code execution via the WebKit entry point (CVE-2025-31277) to escape sandbox confinement and access broader OS capabilities. CVE-2025-43510 is the second stage of the DarkSword exploit chain, enabling the transition from browser-process execution to OS-level access. CISA added this CVE to the Known Exploited Vulnerabilities catalogue on 20 March 2026 as part of the confirmed DarkSword active exploitation advisory.

Apple iOS and iPadOS prior to patched versions (2025) Apple macOS prior to patched versions (2025) Apple watchOS prior to patched versions (2025) +1 more
8.8
CVSS

CVE-2026-25177

Active Directory Domain Services Privilege Escalation via SPN/UPN Name Validation Flaw

HIGH โœ“ Patch Available

An elevation-of-privilege vulnerability in Windows Active Directory Domain Services caused by improper restriction and validation of Service Principal Names (SPNs) and User Principal Names (UPNs). A low-privileged authenticated domain user can exploit Unicode normalisation edge cases in name handling to escalate to domain administrator privileges over the network with no user interaction required. Patched in the March 2026 Patch Tuesday (10 March). Added to CISA Known Exploited Vulnerabilities catalogue following confirmed active exploitation approximately three weeks after the patch was released.

Windows Server 2022 Windows Server 2019 Windows Server 2016 +3 more
8.8
CVSS

CVE-2026-2701

Progress ShareFile Storage Zones Controller Arbitrary File Upload to Webroot

HIGH โœ“ Patch Available

An arbitrary file upload vulnerability in Progress ShareFile Storage Zones Controller allows an attacker with administrative session access to upload and extract archive content into the IIS web root, enabling placement of malicious ASPX webshells that execute with the web server's privileges. When chained with the authentication bypass in CVE-2026-2699, this vulnerability can be exploited without any authentication, yielding full remote code execution on the server. The full attack chain was publicly documented by watchTowr Labs on 2 April 2026 following coordinated disclosure, and Progress has issued a fix in version 5.12.4.

Progress ShareFile Storage Zones Controller 5.12.3 and earlier
8.8
CVSS

CVE-2026-5281

Google Chrome Dawn Use-After-Free (WebGPU) Under Active Exploitation

HIGH โœ“ Patch Available

A high-severity use-after-free vulnerability in Dawn, Chromium's open-source WebGPU implementation, allows a remote attacker who has already compromised the renderer process to escalate to arbitrary code execution via a crafted HTML page. Google confirmed active exploitation in the wild. CISA added CVE-2026-5281 to its Known Exploited Vulnerabilities catalogue on 1 April 2026, requiring federal agencies to patch by 15 April. This is the fifth Chrome zero-day exploited in attacks in 2026, following a sustained research focus on Chrome's graphics stack.

Google Chrome before 146.0.7680.177 (Linux) Google Chrome before 146.0.7680.177/178 (Windows/macOS) Microsoft Edge (Chromium-based) on equivalent unpatched V8/Dawn versions +1 more
8.7
CVSS

CVE-2025-14847

MongoDB Server โ€” Unauthenticated Heap Memory Disclosure (MongoBleed)

HIGH โœ“ Patch Available

An improper handling of length parameter inconsistency in MongoDB Server's zlib compressed protocol headers allows unauthenticated clients to trigger the server to respond with content from uninitialised heap memory. Since zlib compression is enabled by default, any internet-exposed MongoDB instance is potentially vulnerable with no authentication required. Heap memory contents may include fragments of recently processed queries, cached credentials, API keys, session tokens, and application data from collections. Approximately 87,000 internet-exposed MongoDB instances remain vulnerable globally. CISA added CVE-2025-14847 to the Known Exploited Vulnerabilities catalogue on 29 December 2025 with a federal remediation deadline of 19 January 2026.

MongoDB Server prior to 8.2.3 MongoDB Server 8.0.x prior to 8.0.17 MongoDB Server 7.0.x prior to 7.0.28 +3 more
8.4
CVSS

CVE-2026-3201

Palo Alto PAN-OS Management Interface Command Injection

HIGH โœ“ Patch Available

A command injection vulnerability in the Palo Alto Networks PAN-OS management interface allows an authenticated administrator to execute arbitrary OS commands with root privileges. While requiring authentication in isolation, CVE-2026-3201 is being actively chained with CVE-2026-3197 (SAML authentication bypass) to produce an unauthenticated root-level remote code execution attack against internet-exposed GlobalProtect portals. The combined exploit has been confirmed in Unit 42 incident response engagements and proof-of-concept code is publicly available.

Palo Alto Networks PAN-OS 11.2.x prior to 11.2.4 Palo Alto Networks PAN-OS 11.1.x prior to 11.1.5 Palo Alto Networks PAN-OS 11.0.x prior to 11.0.6 +2 more
8.1
CVSS

CVE-2026-22719

VMware Aria Operations โ€” Unauthenticated Command Injection

HIGH โœ“ Patch Available

A command injection vulnerability in VMware Aria Operations (formerly vRealize Operations) allows unauthenticated remote attackers to execute arbitrary operating system commands on the management appliance when support-assisted product migration is in use. The vulnerability was patched by Broadcom on 24 February 2026 as part of advisory VMSA-2026-0001. CISA added CVE-2026-22719 to the Known Exploited Vulnerabilities catalogue with a federal agency remediation deadline of 24 March 2026, confirming active exploitation.

VMware Aria Operations versions prior to those in VMSA-2026-0001
7.8
CVSS

CVE-2022-20775

Cisco SD-WAN CLI Path Traversal Privilege Escalation to Root

HIGH โœ“ Patch Available

A path traversal vulnerability in the Cisco SD-WAN Software CLI allows an authenticated local attacker to gain elevated privileges and execute arbitrary commands as root. Though first disclosed in 2022, this vulnerability has been actively weaponised since early 2026 as the second stage of an attack chain paired with CVE-2026-20127. Threat actors obtain unauthenticated remote access via CVE-2026-20127, then deliberately downgrade the SD-WAN Controller to a version where CVE-2022-20775 remains present, escalate to root, and restore the original software version to conceal the downgrade. CISA includes this vulnerability in Emergency Directive 26-03.

Cisco SD-WAN Software (vSmart, vBond, vManage, vEdge) unpatched versions Cisco Catalyst SD-WAN Controller versions vulnerable to software downgrade
~7.8
EST.

CVE-2026-31394

Linux Kernel AP VLAN Driver Privilege Escalation via Network Namespace Boundary Condition

HIGH โœ“ Patch Available

A privilege escalation vulnerability in the Linux kernel's AP VLAN (access point virtual LAN) network driver. A local user with access to a network namespace can exploit a boundary condition in the AP VLAN driver to escalate privileges to the host kernel context. Particularly significant in containerised and virtualised environments where container processes have network namespace access by default, creating a container escape path. Affects multiple kernel release lines across Red Hat Enterprise Linux, Ubuntu, Debian, and SUSE distributions.

Linux kernel (multiple release lines prior to patch โ€” see distribution advisories) Red Hat Enterprise Linux 8 and 9 Ubuntu 22.04 LTS and 24.04 LTS +2 more
7.7
CVSS

CVE-2026-0227

PAN-OS GlobalProtect Gateway and Portal Denial-of-Service

HIGH โœ“ Patch Available

A denial-of-service vulnerability in Palo Alto Networks PAN-OS affecting firewalls and Prisma Access deployments running GlobalProtect gateways or portals. An unauthenticated remote attacker can send malformed requests to the GlobalProtect interface to crash the service, potentially forcing the firewall into mandatory maintenance mode and rendering the appliance inoperable until administrator intervention. Affects PAN-OS 10.1, 10.2, 11.1, 11.2, and 12.1; also Prisma Access 10.2 and 11.2. A proof-of-concept exploit has been publicly released.

Palo Alto Networks PAN-OS 12.1 (multiple sub-versions) Palo Alto Networks PAN-OS 11.2 (multiple sub-versions) Palo Alto Networks PAN-OS 11.1 (multiple sub-versions) +4 more
7.7
CVSS

CVE-2026-22558

Ubiquiti UniFi Network Application โ€” NoSQL Injection Privilege Escalation

HIGH โœ“ Patch Available

A NoSQL injection vulnerability in the Ubiquiti UniFi Network Application allows authenticated attackers to escalate their privileges to administrative level within the controller. While requiring authentication, this vulnerability is primarily exploited as the second step in a two-stage attack chain with CVE-2026-22557: the unauthenticated path traversal flaw provides initial access, and this injection flaw converts that access to full administrator rights. Both vulnerabilities were disclosed together in Ubiquiti's security advisory on 18 March 2026.

Ubiquiti UniFi Network Application prior to 10.1.89 (stable) Ubiquiti UniFi Network Application prior to 10.2.97 (release candidate) Ubiquiti UniFi Express firmware prior to 4.0.13
7.7
CVSS

CVE-2026-4368

Citrix NetScaler Gateway Race Condition on Gateway/AAA Virtual Server

HIGH โœ“ Patch Available

A race condition vulnerability in Citrix NetScaler ADC and NetScaler Gateway affects appliances configured as a gateway (ICA Proxy, RDP Proxy, SSL VPN, or CVPN) or as an AAA virtual server. The flaw is present in version 14.1-66.54 specifically. No exploitation in the wild has been confirmed at time of disclosure; the vulnerability was patched in the same advisory release as CVE-2026-3055.

Citrix NetScaler ADC and Gateway 14.1-66.54
7.5
CVSS

CVE-2026-24297

Windows Kerberos Security Feature Bypass via Race Condition

HIGH โœ“ Patch Available

A security feature bypass vulnerability in the Windows Kerberos authentication implementation caused by a race condition in concurrent request processing. An unauthenticated remote attacker with network access to a Kerberos-speaking service can exploit the race condition to bypass security validation checks in the authentication flow. Requires no user interaction. Patched in the March 2026 Patch Tuesday. No active exploitation confirmed at time of disclosure.

Windows Server 2022 Windows Server 2019 Windows Server 2016 +3 more
~7.3
EST.

CVE-2026-23856

Dell iDRAC Service Module Privilege Escalation via Improper Access Control

HIGH โœ“ Patch Available

A privilege escalation vulnerability in the Dell iDRAC Service Module (iSM), the OS-level software agent that bridges server operating systems with the iDRAC out-of-band management controller on PowerEdge servers. The flaw arises from improper access control (CWE-284) in iSM's exposed interfaces. A local user with standard OS privileges can exploit the vulnerability to escalate to SYSTEM or root, as iSM operates with elevated privileges required for hardware management communication. Affects Windows iSM versions prior to 6.0.3.1 and Linux iSM versions prior to 5.4.1.1.

Dell iDRAC Service Module (iSM) for Windows prior to 6.0.3.1 Dell iDRAC Service Module (iSM) for Linux prior to 5.4.1.1 All Dell PowerEdge servers with iSM installed

Note: CVE data is curated manually from NVD, vendor advisories, and security research. CVSS scores reflect NVD base scores at time of entry. Always verify with official vendor advisories before actioning.