diff --git a/security/vuxml/vuln/2026.xml b/security/vuxml/vuln/2026.xml index 41aae6cf82d3..0c1ce94f5902 100644 --- a/security/vuxml/vuln/2026.xml +++ b/security/vuxml/vuln/2026.xml @@ -1,1341 +1,1423 @@ + + PostgreSQL -- Multiple vulnerabilities + + + postgresql14-server + 14.21 + + + postgresql15-server + 15.16 + + + postgresql16-server + 16.12 + + + postgresql17-server + 17.8 + + + postgresql18-server + 18.2 + + + postgresql14-server + 14.21 + + + + +

The PostgreSQL project reports:

+
+

+ Improper validation of type oidvector in PostgreSQL + allows a database user to disclose a few bytes of server + memory. We have not ruled out viability of attacks that + arrange for presence of confidential information in + disclosed bytes, but they seem unlikely. +

+

+ Missing validation of type of input in PostgreSQL + intarray extension selectivity estimator function allows + an object creator to execute arbitrary code as the + operating system user running the database. +

+

+ Heap buffer overflow in PostgreSQL pgcrypto allows a + ciphertext provider to execute arbitrary code as the + operating system user running the database. +

+

+ Missing validation of multibyte character length in + PostgreSQL text manipulation allows a database user to + issue crafted queries that achieve a buffer overrun. + That suffices to execute arbitrary code as the operating + system user running the database. +

+

+ Heap buffer overflow in PostgreSQL pg_trgm allows a + database user to achieve unknown impacts via a crafted + input string. The attacker has limited control over the + byte patterns to be written, but we have not ruled out + the viability of attacks that lead to privilege + escalation. +

+
+ +
+ + CVE-2026-2003 + CVE-2026-2004 + CVE-2026-2005 + CVE-2026-2006 + CVE-2026-2007 + https://www.postgresql.org/about/news/postgresql-182-178-1612-1516-and-1421-released-3235/ + + + 2026-02-12 + 2026-02-12 + +
+ MongoDB Server -- CWE-704 Incorrect Type Conversion or Cast mongodb70 7.0.29

https://jira.mongodb.org/browse/SERVER-113685 reports:

An authorized user may disable the MongoDB server by issuing a query against a collection that contains an invalid compound wildcard index.

CVE-2026-25613 https://cveawg.mitre.org/api/cve/CVE-2026-25613 2026-02-10 2026-02-12
MongoDB Server -- CWE-617 Reachable Assertion mongodb80 8.0.13

https://jira.mongodb.org/browse/SERVER-99119 reports:

An authorized user may trigger a server crash by running a $geoNear pipeline with certain invalid index hints.

CVE-2026-25610 https://cveawg.mitre.org/api/cve/CVE-2026-25610 2026-02-10 2026-02-12
MongoDB Server -- Multiple vulnerabilities mongodb80 8.0.18

https://jira.mongodb.org/browse/SERVER-114126 reports:

Complex queries can cause excessive memory usage in MongoDB Query Planner resulting in an Out-Of-Memory Crash.

https://jira.mongodb.org/browse/SERVER-102364 reports:

MongoDB Server may experience an out-of-memory failure while evaluating expressions that produce deeply nested documents. The issue arises in recursive functions because the server does not periodically check the depth of the expression.

https://jira.mongodb.org/browse/SERVER-113532 reports:

Inserting certain large documents into a replica set could lead to replica set secondaries not being able to fetch the oplog from the primary. This could stall replication inside the replica set leading to server crash.

CVE-2026-1850 CVE-2026-1849 CVE-2026-1847 https://cveawg.mitre.org/api/cve/CVE-2026-1850 https://cveawg.mitre.org/api/cve/CVE-2026-1849 https://cveawg.mitre.org/api/cve/CVE-2026-1847 2026-02-10 2026-02-12
Gitlab -- vulnerabilities gitlab-ce gitlab-ee 18.8.018.8.4 18.7.018.7.4 8.0.018.6.6

Gitlab reports:

Incomplete Validation issue in Web IDE impacts GitLab CE/EE

Denial of Service issue in GraphQL introspection impacts GitLab CE/EE

Denial of Service issue in JSON validation middleware impacts GitLab CE/EE

Cross-site Scripting issue in Code Flow impacts GitLab CE/EE

HTML Injection issue in test case titles impacts GitLab CE/EE

Denial of Service issue in Markdown processor impacts GitLab CE/EE

Denial of Service issue in Markdown Preview impacts GitLab CE/EE

Denial of Service issue in dashboard impacts GitLab EE

Server-Side Request Forgery issue in Virtual Registry impacts GitLab EE

Improper Validation issue in diff parser impacts GitLab CE/EE

Server-Side Request Forgery issue in Git repository import impacts GitLab CE/EE

Authorization Bypass issue in iterations API impacts GitLab EE

Missing Authorization issue in GLQL API impacts GitLab CE/EE

Stored HTML Injection issue in project label impacts GitLab CE/EE

Authorization Bypass issue in Pipeline Schedules API impacts GitLab CE/EE

CVE-2025-7659 CVE-2025-8099 CVE-2026-0958 CVE-2025-14560 CVE-2026-0595 CVE-2026-1458 CVE-2026-1456 CVE-2026-1387 CVE-2025-12575 CVE-2026-1094 CVE-2025-12073 CVE-2026-1080 CVE-2025-14592 CVE-2026-1282 CVE-2025-14594 https://about.gitlab.com/releases/2026/02/10/patch-release-gitlab-18-8-4-released/ 2026-02-10 2026-02-11
FreeBSD -- blocklistd(8) socket leak FreeBSD 15.015.0_3

Problem Description:

Due to a programming error, blocklistd leaks a socket descriptor for each adverse event report it receives.

Once a certain number of leaked sockets is reached, blocklistd becomes unable to run the helper script: a child process is forked, but this child dereferences a null pointer and crashes before it is able to exec the helper. At this point, blocklistd still records adverse events but is unable to block new addresses or unblock addresses whose database entries have expired.

Once a second, much higher number of leaked sockets is reached, blocklistd becomes unable to receive new adverse event reports.

Impact:

An attacker may take advantage of this by triggering a large number of adverse events from sacrificial IP addresses to effectively disable blocklistd before launching an attack.

Even in the absence of attacks or probes by would-be attackers, adverse events will occur regularly in the course of normal operations, and blocklistd will gradually run out file descriptors and become ineffective.

The accumulation of open sockets may have knock-on effects on other parts of the system, resulting in a general slowdown until blocklistd is restarted.

CVE-2026-2261 SA-26:03.blocklistd 2026-02-10 2026-02-11
chromium -- multiple security fixes chromium 144.0.7559.132 ungoogled-chromium 144.0.7559.132

Chrome Releases reports:

This update includes 2 security fixes:

  • [478942410] High CVE-2026-1861: Heap buffer overflow in libvpx. Reported by Google on 2026-01-26
  • [479726070] High CVE-2026-1862: Type Confusion in V8. Reported by Chaoyuan Peng (@ret2happy) on 2026-01-29
CVE-2026-1861 CVE-2026-1862 https://chromereleases.googleblog.com/2026/02/stable-channel-update-for-desktop.html 2026-02-03 2026-02-09
Roundcube -- Multiple vulnerabilities roundcube-php82 roundcube-php83 roundcube-php84 roundcube-php85 1.6.13,1

The Roundcube project reports:

Unspecified CSS injection vulnerability.

Remote image blocking bypass via SVG content.

https://github.com/roundcube/roundcubemail/releases/tag/1.6.13 2026-02-08 2026-02-08
qt6-webengine -- multiple vulnerabilities qt6-pdf qt6-webengine 6.10.2

Qt qtwebengine-chromium repo reports:

Backports for 7 security bugs in Chromium:

  • CVE-2025-13638: Prevent media element GC in callbacks in WebMediaPlayerMS
  • CVE-2025-13639: Improve validation of SDP direction in remote description
  • CVE-2025-13720: Avoid downcasting Hash and Integrity reports
  • CVE-2025-14174: Metal: Don't use pixelsDepthPitch to size buffers
  • CVE-2025-14765: Polyfill unary negation and abs for amd mesa frontend
  • CVE-2026-0908: Use CheckedNumerics in HandleAllocator
  • CVE-2026-1504: Block opaque 416 responses to non-range requests
CVE-2025-13638 CVE-2025-13639 CVE-2025-13720 CVE-2025-14174 CVE-2025-14765 CVE-2026-0908 CVE-2026-1504 https://code.qt.io/cgit/qt/qtwebengine-chromium.git/log/?h=134-based 2026-02-02 2026-02-08
navidrome -- multiple vulnerabilities navidrome 0.60.0

An XSS vulnerability in the frontend allows a malicious attacker to inject code through the comment metadata of a song to exfiltrate user credentials.

Authenticated users can crash the Navidrome server by supplying an excessively large size parameter to /rest/getCoverArt or to a shared-image URL (/share/img/{token}). When processing such requests, the server attempts to create an extremely large resized image, causing uncontrolled memory growth. This triggers the Linux OOM killer, terminates the Navidrome process, and results in a full service outage.

CVE-2026-25578 https://github.com/navidrome/navidrome/security/advisories/GHSA-rh3r-8pxm-hg4w CVE-2026-25579 https://github.com/navidrome/navidrome/security/advisories/GHSA-hrr4-3wgr-68x3 2026-02-03 2026-02-07
traefik -- ACME TLS-ALPN fast path potential DoS traefik 3.6.7

The traefik project reports:

There is a potential vulnerability in Traefik ACME TLS certificates' automatic generation: the ACME TLS-ALPN fast path can allow unauthenticated clients to tie up goroutines and file descriptors indefinitely when the ACME TLS challenge is enabled.A malicious client can open many connections, send a minimal ClientHello with acme-tls/1, then stop responding, leading to denial of service of the entrypoint.

CVE-2026-22045 https://nvd.nist.gov/vuln/detail/CVE-2026-22045 2026-01-15 2026-02-07
python -- several security vulnerabilities python310 0 python311 3.11.14_2 python312 0 python313 3.13.12 python313t 3.13.12 python314 3.14.3

The Python project announces a new release with several security fixes:

  • CVE-2026-1299: gh-144125: BytesGenerator will now refuse to serialize (write) headers that are unsafely folded or delimited; see verify_generated_headers. (Contributed by Bas Bloemsaat and Petr Viktorin in gh-121650).
  • gh-143935: Fixed a bug in the folding of comments when flattening an email message using a modern email policy. Comments consisting of a very long sequence of non-foldable characters could trigger a forced line wrap that omitted the required leading space on the continuation line, causing the remainder of the comment to be interpreted as a new header field. This enabled header injection with carefully crafted inputs.
  • gh-143925: Reject control characters in data: URL media types.
  • gh-143919: Reject control characters in http.cookies.Morsel fields and values.
  • CVE-2026-0865: gh-143916: Reject C0 control characters within wsgiref.headers.Headers fields, values, and parameters.
CVE-2026-1299 CVE-2026-0865 https://docs.python.org/release/3.14.3/whatsnew/changelog.html 2026-01-16 2026-02-04
xrdp -- remote code execution xrdp 0.10.5

Denis Skvortsov, Security Researcher at Kaspersky reports:

xrdp before v0.10.5 contains an unauthenticated stack-based buffer overflow vulnerability. The issue stems from improper bounds checking when processing user domain information during the connection sequence. If exploited, the vulnerability could allow remote attackers to execute arbitrary code on the target system.

CVE-2025-68670 https://www.cve.org/CVERecord?id=CVE-2025-68670 2025-12-06 2026-01-27
zeek -- potential DoS vulnerability zeek 8.0.6

Tim Wojtulewicz of Corelight reports:

Zeek's HTTP analyzer can be tricked into interpreting Transfer-Encoding or Content-Length headers set in MIME entities within HTTP bodies and change the analyzer behavior.

https://github.com/zeek/zeek/releases/tag/v8.0.6 2026-01-29 2026-01-29
chromium -- security fix chromium 144.0.7559.109 ungoogled-chromium 144.0.7559.109

Chrome Releases reports:

This update includes 1 security fix:

  • [474435504] High CVE-2026-1504: Inappropriate implementation in Background Fetch API. Reported by Luan Herrera (@lbherrera_) on 2026-01-09
CVE-2026-1504 https://chromereleases.googleblog.com/2026/01/stable-channel-update-for-desktop_27.html 2026-01-27 2026-01-28
Firefox -- Multiple vulnerabilities firefox 147.0.2,2

https://bugzilla.mozilla.org/show_bug.cgi?id=2007302 reports:

Mitigation bypass in the Privacy: Anti-Tracking component.

Use-after-free in the Layout: Scrolling and Overflow component.

CVE-2026-24868 https://cveawg.mitre.org/api/cve/CVE-2026-24868 CVE-2026-24869 https://cveawg.mitre.org/api/cve/CVE-2026-24869 2026-01-27 2026-01-28
FreeBSD -- Jail escape by a privileged user via nullfs FreeBSD-kernel 14.314.3_8 13.513.5_9

Problem Description:

By default, jailed processes cannot mount filesystems, including nullfs(4). However, the allow.mount.nullfs option enables mounting nullfs filesystems, subject to privilege checks.

If a privileged user within a jail is able to nullfs-mount directories, a limitation of the kernel's path lookup logic allows that user to escape the jail's chroot, yielding access to the full filesystem of the host or parent jail.

Impact:

In a jail configured to allow nullfs(4) mounts from within the jail, the jailed root user can escape the jail's filesystem root.

CVE-2025-15547 SA-26:02.jail 2026-01-27 2026-01-28
OpenSSL -- Multiple vulnerabilities FreeBSD 15.015.0_2 14.314.3_8 13.513.5_9 openssl 3.0.19,1 openssl33 3.3.6 openssl34 3.4.4 openssl35 3.5.5 openssl36 3.6.1 openssl 3.0.19

The OpenSSL project reports:

  • Improper validation of PBMAC1 parameters in PKCS#12 MAC verification (CVE-2025-11187)
  • Stack buffer overflow in CMS AuthEnvelopedData parsing (CVE-2025-15467)
  • NULL dereference in SSL_CIPHER_find() function on unknown cipher ID (CVE-2025-15468)
  • "openssl dgst" one-shot codepath silently truncates inputs >16MB (CVE-2025-15469)
  • TLS 1.3 CompressedCertificate excessive memory allocation (CVE-2025-66199)
  • Heap out-of-bounds write in BIO_f_linebuffer on short writes (CVE-2025-68160)
  • Unauthenticated/unencrypted trailing bytes with low-level OCB function calls (CVE-2025-69418)
  • Out of bounds write in PKCS12_get_friendlyname() UTF-8 conversion (CVE-2025-69419)
  • Missing ASN1_TYPE validation in TS_RESP_verify_response() function (CVE-2025-69420)
  • NULL Pointer Dereference in PKCS12_item_decrypt_d2i_ex function (CVE-2025-69421)
  • Missing ASN1_TYPE validation in PKCS#12 parsing (CVE-2026-22795)
  • ASN1_TYPE Type Confusion in the PKCS7_digest_from_attributes() function (CVE-2026-22796)
CVE-2025-11187 CVE-2025-15467 CVE-2025-15468 CVE-2025-15469 CVE-2025-66199 CVE-2025-68160 CVE-2025-69418 CVE-2025-69419 CVE-2025-69420 CVE-2025-69421 CVE-2026-22795 CVE-2026-22796 https://openssl-library.org/news/secadv/20260127.txt SA-26:01.openssl 2026-01-27 2026-01-27 2026-01-28
MySQL -- Multiple vulnerabilities mysql80-server 8.0.45 mysql84-server 8.4.8 mysql91-server 9.1.3 mysql94-server 9.4.3

Oracle reports:

Oracle reports multiple vulnerabilities in its MySQL server products.

CVE-2026-21949 CVE-2026-21950 CVE-2026-21968 CVE-2026-21929 CVE-2026-21936 CVE-2026-21937 CVE-2026-21941 CVE-2026-21948 CVE-2026-21952 CVE-2026-21964 CVE-2026-21965 https://www.oracle.com/security-alerts/cpujan2026.html#AppendixMSQL 2026-01-20 2026-01-24
wheel -- CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') py310-wheel py311-wheel py312-wheel py313-wheel py313t-wheel py314-wheel 0.46.2

https://github.com/pypa/wheel/security/advisories/GHSA-8rrh-rw8j-w5fx reports:

wheel is a command line tool for manipulating Python wheel files, as defined in PEP 427. In versions 0.46.1 and below, the unpack function is vulnerable to file permission modification through mishandling of file permissions after extraction. The logic blindly trusts the filename from the archive header for the chmod operation, even though the extraction process itself might have sanitized the path. Attackers can craft a malicious wheel file that, when unpacked, changes the permissions of critical system files (e.g., /etc/passwd, SSH keys, config files), allowing for Privilege Escalation or arbitrary code execution by modifying now-writable scripts. This issue has been fixed in version 0.46.2.

CVE-2026-24049 https://cveawg.mitre.org/api/cve/CVE-2026-24049 2026-01-22 2026-01-22
chromium -- multiple security fixes chromium 144.0.7559.96 ungoogled-chromium 144.0.7559.96

Chrome Releases reports:

This update includes 1 security fix:

  • [473851441] High CVE-2026-1220: Race in V8. Reported by @p1nky4745 on 2026-01-07
CVE-2026-1220 https://chromereleases.googleblog.com/2026/01/stable-channel-update-for-desktop_20.html 2026-01-20 2026-01-22
Gitlab -- vulnerabilities gitlab-ce gitlab-ee 18.8.018.8.2 18.7.018.7.2 11.9.018.6.4

Gitlab reports:

Denial of Service issue in Jira Connect integration impacts GitLab CE/EE

Incorrect Authorization issue in Releases API impacts GitLab CE/EE

Unchecked Return Value issue in authentication services impacts GitLab CE/EE

Infinite Loop issue in Wiki redirects impacts GitLab CE/EE

Denial of Service issue in API endpoint impacts GitLab CE/EE

CVE-2025-13927 CVE-2025-13928 CVE-2026-0723 CVE-2025-13335 CVE-2026-1102 https://about.gitlab.com/releases/2026/01/21/patch-release-gitlab-18-8-2-released/ 2026-01-21 2026-01-21
mail/mailpit -- multiple vulnerabilities mailpit 1.28.3

Mailpit author reports:

Ensure SMTP TO & FROM addresses are RFC 5322 compliant and prevent header injection (GHSA-54wq-72mp-cq7c)

Prevent Server-Side Request Forgery (SSRF) via HTML Check API (GHSA-6jxm-fv7w-rw5j)

CVE-2026-23829 https://github.com/axllent/mailpit/security/advisories/GHSA-54wq-72mp-cq7c CVE-2026-23845 https://github.com/axllent/mailpit/security/advisories/GHSA-6jxm-fv7w-rw5j 2026-01-18 2026-01-19
oauth2-proxy -- multiple vulnerabilities oauth2-proxy 7.14.1

Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.

A flaw was found in the crypto/x509 package in the Go standard library. This vulnerability allows a certificate validation bypass via an excluded subdomain constraint in a certificated chain as it does not restrict the usage of wildcard SANs in the leaf certificate.

SSH Agent servers do not validate the size of messages when processing new identity requests, which may cause the program to panic if the message is malformed due to an out of bounds read.

SSH servers parsing GSSAPI authentication requests do not validate the number of mechanisms specified in the request, allowing an attacker to cause unbounded memory consumption.

CVE-2025-61729 CVE-2025-61727 CVE-2025-47914 CVE-2025-58181 2026-01-16 2026-01-18
Mozilla -- multiple vulnerabilities firefox 147.0.0,2 thunderbird 147.0.0

Memory safety bugs present in Firefox 146 and Thunderbird 146. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.

Denial-of-service in the DOM: Service Workers component.

Information disclosure in the XML component.

Sandbox escape in the Messaging System component.

CVE-2026-0892 CVE-2026-0889 CVE-2026-0888 CVE-2026-0881 2026-01-13 2026-01-15
Mozilla -- multiple vulnerabilities firefox 147.0.0,2 firefox-esr 140.7.0 thunderbird 147

Memory safety bugs present in firefox-esr 140.6, Thunderbird ESR 140.6, Firefox 146 and Thunderbird 146.

Spoofing issue in the DOM: Copy & Paste and Drag & Drop component.

Clickjacking issue and information disclosure in the PDF Viewer component.

Use-after-free in the JavaScript: GC component.

Use-after-free in the JavaScript Engine component.

Information disclosure in the Networking component.

Sandbox escape due to incorrect boundary conditions in the Graphics: CanvasWebGL component.

CVE-2026-0891 CVE-2026-0890 CVE-2026-0887 CVE-2026-0885 CVE-2026-0884 CVE-2026-0883 CVE-2026-0878 2026-01-13 2026-01-15
Mozilla -- multiple vulnerabilities firefox 147.0.0,2 firefox-esr 140.7 thunderbird 147.0.0

Incorrect boundary conditions in the Graphics component.

Use-after-free in the IPC component.

Sandbox escape due to integer overflow in the Graphics component.

Sandbox escape due to incorrect boundary conditions in the Graphics component.

Mitigation bypass in the DOM: Security component.

CVE-2026-0886 CVE-2026-0882 CVE-2026-0880 CVE-2026-0879 CVE-2026-0877 2026-01-13 2026-01-15
chromium -- multiple security fixes chromium 144.0.7559.59 ungoogled-chromium 144.0.7559.59

Chrome Releases reports:

This update includes 10 security fixes:

  • [458914193] High CVE-2026-0899: Out of bounds memory access in V8. Reported by @p1nky4745 on 2025-11-08
  • [465730465] High CVE-2026-0900: Inappropriate implementation in V8. Reported by Google on 2025-12-03
  • [40057499] High CVE-2026-0901: Inappropriate implementation in Blink. Reported by Irvan Kurniawan (sourc7) on 2021-10-04
  • [469143679] Medium CVE-2026-0902: Inappropriate implementation in V8. Reported by 303f06e3 on 2025-12-16
  • [444803530] Medium CVE-2026-0903: Insufficient validation of untrusted input in Downloads. Reported by Azur on 2025-09-13
  • [452209495] Medium CVE-2026-0904: Incorrect security UI in Digital Credentials. Reported by Hafiizh on 2025-10-15
  • [465466773] Medium CVE-2026-0905: Insufficient policy enforcement in Network. Reported by Google on 2025-12-02
  • [467448811] Low CVE-2026-0906: Incorrect security UI. Reported by Khalil Zhani on 2025-12-10
  • [444653104] Low CVE-2026-0907: Incorrect security UI in Split View. Reported by Hafiizh on 2025-09-12
  • [452209503] Low CVE-2026-0908: Use after free in ANGLE. Reported by Glitchers BoB 14th. on 2025-10-15
CVE-2026-0899 CVE-2026-0900 CVE-2026-0901 CVE-2026-0902 CVE-2026-0903 CVE-2026-0904 CVE-2026-0905 CVE-2026-0906 CVE-2026-0907 CVE-2026-0908 https://chromereleases.googleblog.com/2026/01/stable-channel-update-for-desktop_13.html 2026-01-13 2026-01-15
virtualenv -- CWE-59: Improper Link Resolution Before File Access ('Link Following') py310-virtualenv py311-virtualenv py312-virtualenv py313-virtualenv py313t-virtualenv py314-virtualenv 20.36.1

https://github.com/pypa/virtualenv/security/advisories/GHSA-597g-3phw-6986 reports:

virtualenv is a tool for creating isolated virtual python environments. Prior to version 20.36.1, TOCTOU (Time-of-Check-Time-of-Use) vulnerabilities in virtualenv allow local attackers to perform symlink-based attacks on directory creation operations. An attacker with local access can exploit a race condition between directory existence checks and creation to redirect virtualenv's app_data and lock file operations to attacker-controlled locations. This issue has been patched in version 20.36.1.

CVE-2026-22702 https://cveawg.mitre.org/api/cve/CVE-2026-22702 2026-01-10 2026-01-12
libtasn1 -- Stack-based buffer overflow libtasn1 4.21.0

oss-security@ list reports:

Stack-based buffer overflow in libtasn1 version: v4.20.0. The function fails to validate the size of input data resulting in a buffer overflow in asn1_expend_octet_string.

CVE-2025-13151 https://nvd.nist.gov/vuln/detail/CVE-2025-13151 2026-01-07 2026-01-11
Gitlab -- vulnerabilities gitlab-ce gitlab-ee 18.7.018.7.1 18.6.018.6.3 8.3.018.5.5

Gitlab reports:

Stored Cross-site Scripting issue in GitLab Flavored Markdown placeholders impacts GitLab CE/EE

Cross-site Scripting issue in Web IDE impacts GitLab CE/EE

Missing Authorization issue in Duo Workflows API impacts GitLab EE

Missing Authorization issue in AI GraphQL mutation impacts GitLab EE

Denial of Service issue in import functionality impacts GitLab CE/EE

Insufficient Access Control Granularity issue in GraphQL runnerUpdate mutation impacts GitLab CE/EE

Information Disclosure issue in Mermaid diagram rendering impacts GitLab CE/EE

CVE-2025-9222 CVE-2025-13761 CVE-2025-13772 CVE-2025-13781 CVE-2025-10569 CVE-2025-11246 CVE-2025-3950 https://about.gitlab.com/releases/2026/01/07/patch-release-gitlab-18-7-1-released/ 2026-01-07 2026-01-11
mail/mailpit -- Cross-Site WebSocket Hijacking mailpit 1.28.2

Mailpit author reports:

The Mailpit WebSocket server is configured to accept connections from any origin. This lack of Origin header validation introduces a Cross-Site WebSocket Hijacking (CSWSH) vulnerability.

An attacker can host a malicious website that, when visited by a developer running Mailpit locally, establishes a WebSocket connection to the victim's Mailpit instance (default ws://localhost:8025). This allows the attacker to intercept sensitive data such as email contents, headers, and server statistics in real-time.

CVE-2026-22689 https://github.com/axllent/mailpit/security/advisories/GHSA-524m-q5m7-79mm 2026-01-10 2026-01-10
phpmyfaq -- multiple vulnerabilities phpmyfaq-php82 phpmyfaq-php83 phpmyfaq-php84 phpmyfaq-php85 4.0.16

phpMyFAQ team reports:

Stored cross-site scripting (XSS) and unauthenticated config backup download vulnerability

https://www.phpmyfaq.de/security/advisory-2025-12-29/ 2025-12-29 2026-01-10
chromium -- multiple security fixes chromium 143.0.7499.192 ungoogled-chromium 143.0.7499.192

Chrome Releases reports:

This update includes 1 security fix:

  • [463155954] High CVE-2026-0628: Insufficient policy enforcement in WebView tag. Reported by Gal Weizman on 2025-11-23
CVE-2026-0628 https://chromereleases.googleblog.com/2026/01/stable-channel-update-for-desktop.html 2026-01-06 2026-01-07
security/libsodium -- crypto_core_ed25519_is_valid_point mishandles checks for whether an elliptic curve point is valid libsodium 1.0.21

Libsodium maintainer reports:

The function crypto_core_ed25519_is_valid_point(), a low-level function used to check if a given elliptic curve point is valid, was supposed to reject points that aren't in the main cryptographic group, but some points were slipping through.

CVE-2025-69277 https://00f.net/2025/12/30/libsodium-vulnerability/ 2025-12-30 2026-01-07
mail/mailpit -- Server-Side Request Forgery mailpit 1.28.1

Mailpit author reports:

A Server-Side Request Forgery (SSRF) vulnerability exists in Mailpit's /proxy endpoint that allows attackers to make requests to internal network resources.

The /proxy endpoint allows requests to internal network resources. While it validates http:// and https:// schemes, it does not block internal IP addresses, allowing attackers to access internal services and APIs.

CVE-2026-21859 https://github.com/axllent/mailpit/security/advisories/GHSA-8v65-47jx-7mfr 2026-01-06 2026-01-06
net-mgmt/net-snmp -- Remote Code Execution (snmptrapd) net-snmp 5.9.5

net-snmp development team reports:

A specially crafted packet to an net-snmp snmptrapd daemon can cause a buffer overflow and the daemon to crash.

CVE-2025-68615 https://github.com/net-snmp/net-snmp/security/advisories/GHSA-4389-rwqf-q9gq 2025-12-23 2026-01-06
gstreamer1-plugins-bad -- Out-of-bounds reads in MIDI parser gstreamer1-plugins-bad 1.26.10

The GStreamer Security Center reports:

Multiple out-of-bounds reads in the MIDI parser that can cause crashes for certain input files.

CVE-2025-67326 CVE-2025-67327 https://gstreamer.freedesktop.org/security/sa-2025-0009.html 2025-12-27 2026-01-04