A vulnerability labeled as critical has been found in Craft CMS up to 4.17.4/5.9.10. This affects the function replaceFile. Such manipulation of the argument targetFilename leads to path traversal.
This vulnerability is documented as CVE-2026-32262. The attack can be executed remotely. There is not any exploit available.
The affected component should be upgraded.
A vulnerability marked as problematic has been reported in Chamilo LMS up to 1.11.35. This impacts an unknown function. Performing a manipulation of the argument keyword results in cross site scripting.
This vulnerability is reported as CVE-2026-30882. The attack is possible to be carried out remotely. No exploit exists.
It is suggested to upgrade the affected component.
A vulnerability classified as problematic has been found in Mattermost up to 11.2.2/11.3.0. Affected by this vulnerability is an unknown functionality of the component Playbook Run API. The manipulation leads to incorrect authorization.
This vulnerability is traded as CVE-2026-26304. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic was found in Mattermost up to 10.11.10/11.3.x. Affected by this issue is some unknown functionality of the component Private Channel Handler. The manipulation results in operation on a resource after expiration.
This vulnerability is known as CVE-2026-1629. It is possible to launch the attack remotely. No exploit is available.
Upgrading the affected component is advised.
A vulnerability, which was classified as problematic, has been found in Mattermost up to 10.11.10/11.3.x. This affects an unknown part of the component API Endpoint. This manipulation causes incorrect authorization.
This vulnerability is handled as CVE-2026-26230. The attack can be initiated remotely. There is not any exploit available.
It is advisable to upgrade the affected component.
A vulnerability was found in Forgejo up to 13.0.3. It has been classified as problematic. The affected element is an unknown function of the component File Attachment Handler. The manipulation leads to denial of service.
This vulnerability is referenced as CVE-2025-68971. Remote exploitation of the attack is possible. No exploit is available.
A vulnerability categorized as problematic has been discovered in Wavlink WL-WN578W2 221110. This affects an unknown function of the file /cgi-bin/login.cgi of the component POST Request Handler. Executing a manipulation of the argument homepage/hostname/login_page can lead to cross site scripting.
This vulnerability is registered as CVE-2026-4544. It is possible to launch the attack remotely. Furthermore, an exploit is available.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability was found in Wavlink WL-WN578W2 221110. It has been rated as critical. The impacted element is an unknown function of the file /cgi-bin/firewall.cgi of the component POST Request Handler. Performing a manipulation of the argument dmz_flag/del_flag results in command injection.
This vulnerability is cataloged as CVE-2026-4543. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
The vendor was contacted early about this disclosure but did not respond in any way.