A vulnerability was found in MariaDB Server up to 11.4.9/11.8.5/12.2.1. It has been classified as critical. This impacts the function JSON_SCHEMA_VALID. Performing a manipulation results in heap-based buffer overflow.
This vulnerability is cataloged as CVE-2026-32710. It is possible to initiate the attack remotely. There is no exploit available.
Upgrading the affected component is recommended.
A vulnerability identified as critical has been detected in jwsthemes StreamVid Plugin up to 6.8.6 on WordPress. Affected by this vulnerability is an unknown functionality. The manipulation leads to improper control of filename for include/require statement in php program ('php remote file inclusion').
This vulnerability is listed as CVE-2026-25379. The attack may be initiated remotely. There is no available exploit.
You should upgrade the affected component.
A vulnerability described as critical has been identified in jwsthemes LoveDate Plugin up to 3.8.6 on WordPress. This vulnerability affects unknown code. Such manipulation leads to improper control of filename for include/require statement in php program ('php remote file inclusion').
This vulnerability is documented as CVE-2026-25381. The attack can be executed remotely. There is not any exploit available.
Upgrading the affected component is recommended.
A vulnerability, which was classified as critical, was found in jwsthemes Feedy Plugin up to 2.1.5 on WordPress. The impacted element is an unknown function. The manipulation results in improper control of filename for include/require statement in php program ('php remote file inclusion').
This vulnerability is known as CVE-2026-25380. It is possible to launch the attack remotely. No exploit is available.
You should upgrade the affected component.
A vulnerability marked as critical has been reported in eyecix Addon Jobsearch Chat Plugin up to 3.0 on WordPress. This affects an unknown function. The manipulation leads to sql injection.
This vulnerability is listed as CVE-2026-25377. The attack may be initiated remotely. There is no available exploit.
A vulnerability labeled as critical has been found in jwsthemes IdealAuto Plugin up to 3.8.6 on WordPress. Impacted is an unknown function. Executing a manipulation can lead to improper control of filename for include/require statement in php program ('php remote file inclusion').
The identification of this vulnerability is CVE-2026-25382. The attack may be launched remotely. There is no exploit available.
The affected component should be upgraded.
A vulnerability, which was classified as critical, was found in CoderPress Commerce Coinbase for WooCommerce Plugin up to 1.6.6 on WordPress. Affected by this vulnerability is an unknown functionality. Executing a manipulation can lead to missing authorization.
This vulnerability is registered as CVE-2026-25396. It is possible to launch the attack remotely. No exploit is available.
A vulnerability has been found in Snowray File Uploader for WooCommerce Plugin up to 1.0.4 on WordPress and classified as critical. Affected by this issue is some unknown functionality. The manipulation leads to path traversal: '.../...//'.
This vulnerability is documented as CVE-2026-25397. The attack can be initiated remotely. There is not any exploit available.
A vulnerability was found in Webilia Vertex Addons for Elementor Plugin up to 1.6.4 on WordPress. It has been declared as critical. This issue affects some unknown processing. Such manipulation leads to missing authorization.
This vulnerability is traded as CVE-2026-25398. The attack may be launched remotely. There is no exploit available.
A vulnerability classified as critical was found in Saad Iqbal New User Approve Plugin up to 3.2.3 on WordPress. Affected by this issue is some unknown functionality. Executing a manipulation can lead to missing authorization.
This vulnerability is tracked as CVE-2026-25390. The attack can be launched remotely. No exploit exists.
A vulnerability categorized as critical has been discovered in thememount Apicona Plugin up to 24.1.0 on WordPress. Affected by this issue is some unknown functionality. Such manipulation leads to deserialization.
This vulnerability is traded as CVE-2026-25400. The attack may be launched remotely. There is no exploit available.
A vulnerability, which was classified as problematic, has been found in Iqonic Design KiviCare Plugin up to 3.6.16 on WordPress. This affects an unknown function. Performing a manipulation results in cross site scripting.
This vulnerability is identified as CVE-2026-25383. The attack can be initiated remotely. There is not any exploit available.
Vulnerabilities in the Vim and GNU Emacs text editors, discovered using simple prompts with the Claude assistant, allow remote code execution simply by opening a file. [...]
A vulnerability labeled as problematic has been found in Seraphinite Solutions Seraphinite Accelerator Plugin up to 2.28.14 on WordPress. This affects the function OnAdminApi_GetData of the component Scheduled Task Handler. Such manipulation leads to information disclosure.
This vulnerability is referenced as CVE-2026-3058. It is possible to launch the attack remotely. No exploit is available.