Updated CVEs from Tenable

Updated CVEs from Tenable Get the latest CVE updates from Tenable

  • CVE-2026-1282
    on February 11, 2026 at 12:16 pm

    Low Severity Description GitLab has remediated an issue in GitLab CE/EE affecting all versions from 18.6 before 18.6.6, 18.7 before 18.7.4, and 18.8 before 18.8.4 that could have allowed an authenticated user to inject malicious content into project labels titles. Read more at https://www.tenable.com/cve/CVE-2026-1282

  • CVE-2026-1458
    on February 11, 2026 at 12:16 pm

    Medium Severity Description GitLab has remediated an issue in GitLab CE/EE affecting all versions from 8.0 before 18.6.6, 18.7 before 18.7.4, and 18.8 before 18.8.4 that, under certain conditions could have allowed an unauthenticated user to cause denial of service by uploading malicious files. Read more at https://www.tenable.com/cve/CVE-2026-1458

  • CVE-2026-1080
    on February 11, 2026 at 12:16 pm

    Medium Severity Description GitLab has remediated an issue in GitLab EE affecting all versions from 16.7 before 18.6.6, 18.7 before 18.7.4, and 18.8 before 18.8.4 that, under certain conditions could have allowed an authenticated user to access iteration data from private descendant groups by querying the iterations API endpoint. Read more at https://www.tenable.com/cve/CVE-2026-1080

  • CVE-2026-1094
    on February 11, 2026 at 12:16 pm

    Medium Severity Description GitLab has remediated an issue in GitLab CE/EE affecting all versions from 18.8 before 18.8.4 that could have allowed an authenticated developer to hide specially crafted file changes from the WebUI. Read more at https://www.tenable.com/cve/CVE-2026-1094

  • CVE-2025-14592
    on February 11, 2026 at 12:16 pm

    Low Severity Description GitLab has remediated an issue in GitLab CE/EE affecting all versions from 18.6 before 18.6.6, 18.7 before 18.7.4, and 18.8 before 18.8.4 that, under certain conditions could have allowed an authenticated user to perform unauthorized operations by submitting GraphQL mutations through the GLQL API endpoint. Read more at https://www.tenable.com/cve/CVE-2025-14592

  • CVE-2026-0595
    on February 11, 2026 at 12:16 pm

    High Severity Description GitLab has remediated an issue in GitLab CE/EE affecting all versions from 13.9 before 18.6.6, 18.7 before 18.7.4, and 18.8 before 18.8.4 that, under certain conditions could have allowed an authenticated user to add unauthorized email addresses to victim accounts through HTML injection in test case titles. Read more at https://www.tenable.com/cve/CVE-2026-0595

  • CVE-2025-14560
    on February 11, 2026 at 12:16 pm

    High Severity Description GitLab has remediated an issue in GitLab CE/EE affecting all versions from 17.1 before 18.6.6, 18.7 before 18.7.4, and 18.8 before 18.8.4 that, under certain conditions could have allowed an authenticated user to perform unauthorized actions on behalf of another user by injecting malicious content into vulnerability code flow. Read more at https://www.tenable.com/cve/CVE-2025-14560

  • CVE-2026-2295
    on February 11, 2026 at 10:15 am

    Medium Severity Description The WPZOOM Addons for Elementor – Starter Templates & Widgets plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the ‘ajax_post_grid_load_more’ function in all versions up to, and including, 1.3.2. This makes it possible for unauthenticated attackers to retrieve protected (draft, future, pending) post titles and excerpts that should not be accessible to unauthenticated users. Read more at https://www.tenable.com/cve/CVE-2026-2295

  • CVE-2025-15096
    on February 11, 2026 at 10:15 am

    High Severity Description The ‘Videospirecore Theme Plugin’ plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 1.0.6. This is due to the plugin not properly validating a user’s identity prior to updating their details like email. This makes it possible for authenticated attackers, with Subscriber-level access and above, to change arbitrary user’s email addresses, including administrators, and leverage that to reset the user’s password and gain access to their account. Read more at https://www.tenable.com/cve/CVE-2025-15096

  • CVE-2026-1885
    on February 11, 2026 at 9:15 am

    Medium Severity Description The Slideshow Wp plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘sswpid’ attribute of the ‘sswp-slide’ shortcode in all versions up to, and including, 1.1. This is due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. Read more at https://www.tenable.com/cve/CVE-2026-1885

  • CVE-2026-1853
    on February 11, 2026 at 9:15 am

    Medium Severity Description The BuddyHolis ListSearch plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin’s ‘listsearch’ shortcode in all versions up to, and including, 1.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. Read more at https://www.tenable.com/cve/CVE-2026-1853

  • CVE-2026-1827
    on February 11, 2026 at 9:15 am

    Medium Severity Description The Flask Micro code-editor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin’s codeflask shortcode in all versions up to, and including, 1.0.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. Read more at https://www.tenable.com/cve/CVE-2026-1827

  • CVE-2026-1826
    on February 11, 2026 at 9:15 am

    Medium Severity Description The OpenPOS Lite – Point of Sale for WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘width’ parameter of the order_qrcode shortcode in all versions up to, and including, 3.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. Read more at https://www.tenable.com/cve/CVE-2026-1826

  • CVE-2026-1821
    on February 11, 2026 at 9:15 am

    Medium Severity Description The Microtango plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘restkey’ parameter of the mt_reservation shortcode in all versions up to, and including, 0.9.29 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. Read more at https://www.tenable.com/cve/CVE-2026-1821

  • CVE-2026-1809
    on February 11, 2026 at 9:15 am

    Medium Severity Description The HTML Tag Shortcodes plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin’s shortcodes in all versions up to, and including, 1.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. Read more at https://www.tenable.com/cve/CVE-2026-1809

  • CVE-2026-1833
    on February 11, 2026 at 9:15 am

    Medium Severity Description The WaMate Confirm – Order Confirmation plugin for WordPress is vulnerable to unauthorized access in all versions up to, and including, 2.0.1. This is due to the plugin not properly verifying that a user is authorized to perform an action. This makes it possible for authenticated attackers, with subscriber-level access and above, to block and unblock phone numbers, which should be restricted to administrators. Read more at https://www.tenable.com/cve/CVE-2026-1833

  • CVE-2026-1804
    on February 11, 2026 at 9:15 am

    Medium Severity Description The WDES Responsive Popup plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin’s ‘wdes-popup-title’ shortcode in all versions up to, and including, 1.3.6 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. Read more at https://www.tenable.com/cve/CVE-2026-1804

  • CVE-2026-1215
    on February 11, 2026 at 9:15 am

    Medium Severity Description The MMA Call Tracking plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.3.15. This is due to missing nonce validation when saving plugin configuration on the `mma_call_tracking_menu` admin page. This makes it possible for unauthenticated attackers to modify call tracking configuration settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. Read more at https://www.tenable.com/cve/CVE-2026-1215

  • CVE-2026-1560
    on February 11, 2026 at 9:15 am

    High Severity Description The Custom Block Builder – Lazy Blocks plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 4.2.0 via multiple functions in the ‘LazyBlocks_Blocks’ class. This makes it possible for authenticated attackers, with Contributor-level access and above, to execute code on the server. Read more at https://www.tenable.com/cve/CVE-2026-1560

  • CVE-2026-1748
    on February 11, 2026 at 9:15 am

    Medium Severity Description The Invoct – PDF Invoices & Billing for WooCommerce plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on multiple functions in all versions up to, and including, 1.6. This makes it possible for authenticated attackers, with Subscriber-level access and above, to retrieve invoice clients, invoice items, and list of WordPress users along with their emails. Read more at https://www.tenable.com/cve/CVE-2026-1748

  • CVE-2026-1786
    on February 11, 2026 at 9:15 am

    Medium Severity Description The Twitter posts to Blog plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the ‘dg_tw_options’ function in all versions up to, and including, 1.11.25. This makes it possible for unauthenticated attackers to update plugin settings including Twitter API credentials, post author, post status, and the capability required to access the plugin’s admin menu. Read more at https://www.tenable.com/cve/CVE-2026-1786

  • CVE-2026-0815
    on February 11, 2026 at 9:15 am

    Medium Severity Description The Category Image plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘tag-image’ parameter in all versions up to, and including, 2.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Editor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. Read more at https://www.tenable.com/cve/CVE-2026-0815

  • CVE-2025-13651
    on February 11, 2026 at 9:15 am

    Medium Severity Description Exposure of Sensitive System Information to an Unauthorized Actor vulnerability in Microcom ZeusWeb allows Web Application Fingerprinting of sensitive data. This issue affects ZeusWeb: 6.1.31. Read more at https://www.tenable.com/cve/CVE-2025-13651

  • CVE-2026-0724
    on February 11, 2026 at 9:15 am

    Medium Severity Description The WPlyr Media Block plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘_wplyr_accent_color’ parameter in all versions up to, and including, 1.3.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with Administrator-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. Read more at https://www.tenable.com/cve/CVE-2026-0724

  • CVE-2025-13650
    on February 11, 2026 at 9:15 am

    Medium Severity Description An attacker with access to the web application ZeusWeb of the provider Microcom (in this case, registration is not necessary, but the action must be performed) who has the vulnerable software could introduce arbitrary JavaScript by injecting an XSS payload into the ‘Surname’ parameter of the ‘Create Account’ operation at the URL: https://zeus.microcom.es:4040/index.html?zeus6=true . This issue affects ZeusWeb: 6.1.31. Read more at https://www.tenable.com/cve/CVE-2025-13650

  • CVE-2025-15440
    on February 11, 2026 at 9:15 am

    High Severity Description The iONE360 configurator plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Contact Form Parameters in all versions up to, and including, 2.0.57 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. Read more at https://www.tenable.com/cve/CVE-2025-15440

  • CVE-2025-9986
    on February 11, 2026 at 9:15 am

    High Severity Description Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in Vadi Corporate Information Systems Ltd. Co. DIGIKENT allows Excavation.This issue affects DIGIKENT: through 13092025. Read more at https://www.tenable.com/cve/CVE-2025-9986

  • CVE-2025-13649
    on February 11, 2026 at 9:15 am

    Medium Severity Description An attacker with access to the web application ZeusWeb of the provider Microcom (in this case, registration is not necessary, but the action must be performed) who has the vulnerable software could introduce arbitrary JavaScript by injecting an XSS payload into the ‘Email’ parameters within the ‘Recover password’ section at the URL: https://zeus.microcom.es:4040/index.html?zeus6=true . This issue affects ZeusWeb: 6.1.31. Read more at https://www.tenable.com/cve/CVE-2025-13649

  • CVE-2025-13648
    on February 11, 2026 at 9:15 am

    Medium Severity Description An attacker with access to the web application ZeusWeb of the provider Microcom (in this case, registration is required) who has the vulnerable software could introduce arbitrary JavaScript by injecting an XSS payload into the ‘Name’ and “Surname” parameters within the ‘My Account’ section at the URL: https://zeus.microcom.es:4040/administracion-estaciones.html resulting in a stored XSS. This issue affects ZeusWeb: 6.1.31. Read more at https://www.tenable.com/cve/CVE-2025-13648

  • CVE-2025-10913
    on February 11, 2026 at 8:16 am

    High Severity Description Improper Neutralization of Input During Web Page Generation (XSS or ‘Cross-site Scripting’) vulnerability in Saastech Cleaning and Internet Services Inc. TemizlikYolda allows Cross-Site Scripting (XSS).This issue affects TemizlikYolda: through 11022026. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. Read more at https://www.tenable.com/cve/CVE-2025-10913

Share Websitecyber
We are an ethical website cyber security team and we perform security assessments to protect our clients.