Vulnerability Research

CVEs

66 vulnerabilities reported

2026

18

CVE-2026-26215

9.3 CRITICAL

manga-image-translator version beta-0.3 and prior in shared API mode contains an unsafe deserialization vulnerability via pickle.loads() on two FastAPI endpoints, combined with a nonce authentication bypass that defaults to an empty string, allowing unauthenticated remote code execution.

RCE

CVE-2026-26220

9.3 CRITICAL

LightLLM version 1.1.0 and prior contain an unauthenticated remote code execution vulnerability in PD (prefill-decode) disaggregation mode. The PD master node exposes WebSocket endpoints that receive binary frames and pass the data directly to pickle.loads() without authentication or validation. The server explicitly refuses to bind to localhost, ensuring these endpoints are always network-exposed.

RCE

CVE-2026-27174

9.8 CRITICAL

MajorDoMo (aka Major Domestic Module) allows unauthenticated remote code execution via the admin panel's PHP console feature. An include order bug in modules/panel.class.php causes execution to continue past a redirect() call that lacks an exit statement, allowing unauthenticated requests to reach eval() via register_globals parameters.

RCE

CVE-2026-27175

9.8 CRITICAL

MajorDoMo (aka Major Domestic Module) is vulnerable to unauthenticated OS command injection via rc/index.php. The $param variable is interpolated into a command string within double quotes without escapeshellarg(), queued via safe_exec(), and executed by the web-accessible cycle_execs.php worker via exec().

RCE

CVE-2026-27176

6.1 MEDIUM

MajorDoMo (aka Major Domestic Module) contains a reflected cross-site scripting (XSS) vulnerability in command.php. The $qry parameter is rendered directly into the HTML page without htmlspecialchars().

XSS

CVE-2026-27177

7.2 HIGH

MajorDoMo (aka Major Domestic Module) contains a stored XSS vulnerability via the unauthenticated /objects/?op=set endpoint. Property values are stored raw and rendered without escaping in the admin panel's property editor, enabling session hijack via cookie exfiltration.

XSS

CVE-2026-27178

7.2 HIGH

MajorDoMo (aka Major Domestic Module) contains a stored XSS vulnerability through method parameter injection into the shoutbox. Default methods pass attacker-controlled parameters into say(), which stores messages raw. The dashboard widget auto-refreshes every 3 seconds, firing the XSS automatically.

XSS

CVE-2026-27179

8.2 HIGH

MajorDoMo (aka Major Domestic Module) contains an unauthenticated SQL injection vulnerability in the commands module. The $_GET['parent'] parameter is directly interpolated into multiple SQL queries without sanitization. Admin passwords are stored as unsalted MD5 hashes.

SQLi

CVE-2026-27180

9.8 CRITICAL

MajorDoMo (aka Major Domestic Module) is vulnerable to unauthenticated remote code execution through supply chain compromise via update URL poisoning. The saverestore module exposes its admin() method without authentication, allowing an attacker to poison the update URL, serve a malicious tarball, and trigger deployment to the webroot.

RCESupply Chain

CVE-2026-27181

7.5 HIGH

MajorDoMo (aka Major Domestic Module) allows unauthenticated arbitrary module uninstallation through the market module. The market module's admin() method is reachable without authentication, enabling recursive deletion of module files, templates, and database records.

DoS

CVE-2026-27743

9.8 CRITICAL

SPIP referer_spam plugin <= 1.2.1 is vulnerable to unauthenticated blind SQL injection. Two action handlers take $_GET['url'] and concatenate it raw into SQL LIKE clauses without sql_quote(), securiser_action(), or autoriser().

SQLi

CVE-2026-27744

9.8 CRITICAL

SPIP tickets plugin <= 4.3.2 is vulnerable to unauthenticated remote code execution. During forum comment preview, raw _request() values are concatenated into the previsu error key, which is rendered via #ENV** (interdire_scripts=false), allowing PHP code injection through SPIP's template eval() chain.

RCE

CVE-2026-27745

8.8 HIGH

SPIP interface_traduction_objets plugin <= 2.2.1 is vulnerable to authenticated remote code execution. The lang_dest parameter is concatenated raw into _hidden, which skips protege_champ() and renders with interdire_scripts=false, enabling PHP code injection via SPIP's template eval() chain.

RCE

CVE-2026-27746

6.1 MEDIUM

SPIP jeux plugin <= 4.1.0 is vulnerable to reflected XSS. The debut_index_jeux and index_jeux parameters are interpolated unsanitized into a single-quoted HTML id attribute, allowing attribute breakout and script injection.

XSS

CVE-2026-27747

6.5 MEDIUM

SPIP interface_traduction_objets plugin <= 2.2.1 is vulnerable to authenticated blind SQL injection. The id_parent parameter from _request() is concatenated raw into a sql_getfetsel WHERE clause without intval() or sql_quote().

SQLi

CVE-2026-28515

9.3 CRITICAL

openDCIM install.php performs no role check before the LDAP configuration form, allowing any authenticated user (or unauthenticated on Docker deployments) to reach Config::UpdateParameter() calls.

Missing Auth

CVE-2026-28516

9.3 CRITICAL

openDCIM Config::UpdateParameter() uses string interpolation in SQL queries. PDO with MySQL supports stacked queries, giving full database control via the LDAP configuration form in install.php.

SQLi

CVE-2026-28517

9.3 CRITICAL

openDCIM report_network_map.php reads the dot config value from fac_Config and passes it directly to exec() without validation. Combined with CVE-2026-28516, an attacker can overwrite the value and achieve RCE.

RCE

2025

26

CVE-2025-34452

8.7 HIGH

Streama versions 1.10.0 through 1.10.5 and prior to commit b7c8767 contain a combination of path traversal and server-side request forgery (SSRF) vulnerabilities that allow an authenticated attacker to write arbitrary files to the server filesystem.

SSRFPath Traversal

CVE-2025-34433

9.3 CRITICAL

AVideo versions 14.3.1 prior to 20.1 contain an unauthenticated remote code execution vulnerability caused by predictable generation of an installation salt using PHP uniqid(). The installation timestamp is exposed via a public endpoint, and a derived hash identifier is accessible through unauthenticated API responses, allowing attackers to brute-force the remaining entropy. The recovered salt can then be used to encrypt a malicious payload supplied to a notification API endpoint that evaluates attacker-controlled input, resulting in arbitrary code execution as the web server user.

RCE

CVE-2025-34434

9.1 CRITICAL

AVideo versions prior to 20.0 with the ImageGallery plugin enabled is vulnerable to unauthenticated file upload and deletion. Plugin endpoints responsible for managing gallery images fail to enforce authentication checks and do not validate ownership, allowing unauthenticated attackers to upload or delete images associated with any image-based video.

File Upload

CVE-2025-34435

6.5 MEDIUM

AVideo versions prior to 20.0 are vulnerable to an insecure direct object reference (IDOR) that allows any authenticated user to delete media files belonging to other users. The affected endpoint validates authentication but fails to verify ownership or edit permissions for the targeted video.

IDOR

CVE-2025-34436

8.8 HIGH

AVideo versions prior to 20.0 allow any authenticated user to upload files into directories belonging to other users due to an insecure direct object reference. The upload functionality verifies authentication but does not enforce ownership checks.

IDOR

CVE-2025-34437

8.8 HIGH

AVideo versions prior to 20.0 permit any authenticated user to upload comment images to videos owned by other users. The endpoint validates authentication but omits ownership checks, allowing attackers to perform unauthorized uploads to arbitrary video objects.

IDOR

CVE-2025-34438

8.1 HIGH

AVideo versions prior to 20.0 contain an insecure direct object reference vulnerability allowing users with upload permissions to modify the rotation metadata of any video. The endpoint verifies upload capability but fails to enforce ownership or management rights for the targeted video.

IDOR

CVE-2025-34439

6.1 MEDIUM

AVideo versions prior to 20.0 are vulnerable to an open redirect flaw due to missing validation of the cancelUri parameter during user login. An attacker can craft a link to redirect users to arbitrary external sites, enabling phishing attacks.

Open Redirect

CVE-2025-34440

6.1 MEDIUM

AVideo versions prior to 20.0 contain an open redirect vulnerability caused by insufficient validation of the siteRedirectUri parameter during user registration. Attackers can redirect users to external sites, facilitating phishing attacks.

Open Redirect

CVE-2025-34441

7.5 HIGH

AVideo versions prior to 20.0 expose sensitive user information through an unauthenticated public API endpoint. Responses include emails, usernames, administrative status, and last login times, enabling user enumeration and privacy violations.

Info Disclosure

CVE-2025-34442

7.5 HIGH

AVideo versions prior to 20.0 disclose absolute filesystem paths via multiple public API endpoints. Returned metadata includes full server paths to media files, revealing underlying filesystem structure and facilitating more effective attack chains.

Info Disclosure

CVE-2025-2611

9.3 CRITICAL

ICTBroadcast <= 7.4 is vulnerable to an unauthenticated remote code execution. The /login.php page issues a session cookie, and certain cookie keys are evaluated using shell backticks in server-side code. This allows attackers to inject arbitrary system commands into the cookie, resulting in code execution during session handling, without authentication.

RCE

CVE-2025-34147

9.4 CRITICAL

An unauthenticated OS command injection vulnerability exists in the Shenzhen Aitemi M300 Wi-Fi Repeater (hardware model MT02). When configuring the device in Extender mode via its captive portal, the extap2g SSID field is inserted unescaped into a reboot-time shell script. This allows remote attackers within Wi-Fi range to inject arbitrary shell commands that execute as root during device reboot, leading to full system compromise.

RCE

CVE-2025-34148

9.4 CRITICAL

An unauthenticated OS command injection vulnerability exists in the Shenzhen Aitemi M300 Wi-Fi Repeater (hardware model MT02). When configuring the device in WISP mode, the 'ssid' parameter is passed unsanitized to system-level scripts. This allows remote attackers within Wi-Fi range to inject arbitrary shell commands that execute as root, resulting in full device compromise.

RCE

CVE-2025-34149

9.4 CRITICAL

A command injection vulnerability affects the Shenzhen Aitemi M300 Wi-Fi Repeater (hardware model MT02) during WPA2 configuration. The 'key' parameter is interpreted directly by the system shell, enabling attackers to execute arbitrary commands as root. Exploitation requires no authentication and can be triggered during wireless setup.

RCE

CVE-2025-34150

9.4 CRITICAL

The PPPoE configuration interface of the Shenzhen Aitemi M300 Wi-Fi Repeater (hardware model MT02) is vulnerable to command injection via the 'user' parameter. Input is processed unsafely during network setup, allowing attackers to execute arbitrary system commands with root privileges.

RCE

CVE-2025-34151

9.4 CRITICAL

A command injection vulnerability exists in the 'passwd' parameter of the PPPoE setup process on the Shenzhen Aitemi M300 Wi-Fi Repeater (hardware model MT02). The input is passed directly to system-level commands without sanitation, enabling unauthenticated attackers to achieve root-level code execution.

RCE

CVE-2025-34152

9.4 CRITICAL

An unauthenticated OS command injection vulnerability exists in the Shenzhen Aitemi M300 Wi-Fi Repeater (hardware model MT02) via the 'time' parameter of the '/protocol.csp?' endpoint. The input is processed by the internal `date -s` command without rebooting or disrupting HTTP service. Unlike other injection points, this vector allows remote compromise without triggering visible configuration changes.

RCE

CVE-2025-2609

8.2 HIGH

MagnusBilling 7.3.0 and lower is vulnerable to an unauthenticated stored XSS via the login logs feature. Malicious input submitted as a username during login is stored and later executed in the admin context.

XSS

CVE-2025-2610

7.6 HIGH

MagnusBilling 7.3.0 and lower contains a stored XSS vulnerability in the Alarm module. Unsanitized message fields can lead to arbitrary JavaScript execution when viewed by an administrator.

XSS

CVE-2025-2292

6.5 MEDIUM

Xorcom CompletePBX <= 5.2.35 is vulnerable to authenticated file disclosure, allowing access to sensitive files through crafted requests.

File Disclosure

CVE-2025-30004

8.8 HIGH

Xorcom CompletePBX <= 5.2.35 contains an authenticated command injection vulnerability, leading to remote code execution via system commands.

RCE

CVE-2025-30005

8.3 HIGH

Xorcom CompletePBX <= 5.2.35 is affected by a path traversal vulnerability allowing authenticated file deletion and access to arbitrary paths.

Path Traversal

CVE-2025-30006

6.1 MEDIUM

Xorcom CompletePBX 5.2.35 is vulnerable to an authenticated reflected XSS, allowing JavaScript injection via crafted input.

XSS

CVE-2025-30007

8.2 HIGH

Vembu BDRSuite <= 7.5.0.1 is affected by an unauthenticated stored XSS in serverbackupprogress.sgp via the ClientName and BackupName parameters.

XSS

CVE-2025-30008

8.2 HIGH

Vembu BDRSuite <= 7.5.0.1 contains an unauthenticated stored XSS in restoreprogress.sgp through multiple unsanitized URL parameters.

XSS

2024

21

CVE-2024-22899

8.8 HIGH

Vinchin Backup & Recovery v7.2 was discovered to contain an authenticated remote code execution (RCE) vulnerability via the syncNtpTime function.

RCE

CVE-2024-22900

8.8 HIGH

Vinchin Backup & Recovery v7.2 was discovered to contain an authenticated remote code execution (RCE) vulnerability via the setNetworkCardInfo function.

RCE

CVE-2024-22901

9.8 CRITICAL

Vinchin Backup & Recovery v7.2 was discovered to use default MYSQL credentials.

Default Creds

CVE-2024-22902

9.8 CRITICAL

Vinchin Backup & Recovery v7.2 was discovered to be configured with default root credentials.

Default Creds

CVE-2024-22903

8.8 HIGH

Vinchin Backup & Recovery v7.2 was discovered to contain an authenticated remote code execution (RCE) vulnerability via the deleteUpdateAPK function.

RCE

CVE-2024-25228

8.8 HIGH

Vinchin Backup and Recovery 7.2 and Earlier is vulnerable to Authenticated Remote Code Execution (RCE) via the getVerifydiyResult function in ManoeuvreHandler.class.php.

RCE

CVE-2024-30920

7.4 HIGH

Cross Site Scripting vulnerability in DerbyNet v9.0 and below allows a remote attacker to execute arbitrary code via the render-document.php component.

XSS

CVE-2024-30921

5.4 MEDIUM

Cross Site Scripting vulnerability in DerbyNet v9.0 and below allows a remote attacker to execute arbitrary code via the photo.php component.

XSS

CVE-2024-30922

9.8 CRITICAL

SQL Injection vulnerability in DerbyNet v9.0 allows a remote attacker to execute arbitrary code via the where Clause in Award Document Rendering.

SQLi

CVE-2024-30923

9.8 CRITICAL

SQL Injection vulnerability in DerbyNet v9.0 and below allows a remote attacker to execute arbitrary code via the where Clause in Racer Document Rendering.

SQLi

CVE-2024-30924

4.6 MEDIUM

Cross Site Scripting vulnerability in DerbyNet v9.0 and below allows attackers to execute arbitrary code via the checkin.php component.

XSS

CVE-2024-30925

6.5 MEDIUM

Cross Site Scripting vulnerability in DerbyNet v9.0 and below allows attackers to execute arbitrary code via the photo-thumbs.php component.

XSS

CVE-2024-30926

4.6 MEDIUM

Cross Site Scripting vulnerability in DerbyNet v9.0 and below allows attackers to execute arbitrary code via the ./inc/kiosks.inc component.

XSS

CVE-2024-30927

6.3 MEDIUM

Cross Site Scripting vulnerability in DerbyNet v9.0 and below allows attackers to execute arbitrary code via the racer-results.php component.

XSS

CVE-2024-30928

8.1 HIGH

SQL Injection vulnerability in DerbyNet v9.0 and below allows attackers to execute arbitrary SQL commands via 'classids' Parameter in ajax/query.slide.next.inc.

SQLi

CVE-2024-30929

8 HIGH

Cross Site Scripting vulnerability in DerbyNet v9.0 and below allows attackers to execute arbitrary code via the 'back' Parameter in playlist.php.

XSS

CVE-2024-31818

9.8 CRITICAL

Directory Traversal vulnerability in DerbyNet v9.0 allows a remote attacker to execute arbitrary code via the page parameter of the kiosk.php component.

Path Traversal

CVE-2024-31819

9.8 CRITICAL

An issue in WWBN AVideo v12.4 through v14.2 allows a remote attacker to execute arbitrary code via the systemRootPath parameter of the submitIndex.php component.

RCE

CVE-2024-3032

6.1 MEDIUM

Themify Builder < 7.5.8 does not validate a parameter before redirecting the user to its value, leading to an Open Redirect issue.

Open Redirect

CVE-2024-35373

9.8 CRITICAL

Mocodo Online 4.2.6 and below is vulnerable to Remote Code Execution via /web/rewrite.php.

RCE

CVE-2024-35374

9.8 CRITICAL

Mocodo Online 4.2.6 and below does not properly sanitize the sql_case input field in /web/generate.php, leading to remote code execution (RCE).

RCE

2023

1