Skip to content

File tree

Lines changed: 56 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,56 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-28cf-2j8g-v8mv",
4+
"modified": "2026-02-14T00:32:42Z",
5+
"published": "2026-02-14T00:32:42Z",
6+
"aliases": [
7+
"CVE-2026-1841"
8+
],
9+
"details": "The PixelYourSite – Your smart PIXEL (TAG) & API Manager plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'pysTrafficSource' parameter and the 'pys_landing_page' parameter in all versions up to, and including, 11.2.0 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N"
14+
}
15+
],
16+
"affected": [],
17+
"references": [
18+
{
19+
"type": "ADVISORY",
20+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1841"
21+
},
22+
{
23+
"type": "WEB",
24+
"url": "https://plugins.trac.wordpress.org/browser/pixelyoursite/tags/11.1.5.2/includes/enrich/class_enrich_order.php#L252"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://plugins.trac.wordpress.org/browser/pixelyoursite/tags/11.1.5.2/includes/enrich/class_enrich_order.php#L255"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://plugins.trac.wordpress.org/browser/pixelyoursite/tags/11.1.5.2/includes/enrich/class_enrich_order.php#L265"
33+
},
34+
{
35+
"type": "WEB",
36+
"url": "https://plugins.trac.wordpress.org/browser/pixelyoursite/tags/11.1.5.2/includes/enrich/class_enrich_order.php#L266"
37+
},
38+
{
39+
"type": "WEB",
40+
"url": "https://plugins.trac.wordpress.org/changeset/3454364/pixelyoursite"
41+
},
42+
{
43+
"type": "WEB",
44+
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4c4f2d9d-d34c-45dd-aff8-ca9bbe808b5a?source=cve"
45+
}
46+
],
47+
"database_specific": {
48+
"cwe_ids": [
49+
"CWE-79"
50+
],
51+
"severity": "HIGH",
52+
"github_reviewed": false,
53+
"github_reviewed_at": null,
54+
"nvd_published_at": "2026-02-13T22:16:10Z"
55+
}
56+
}
Lines changed: 33 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,33 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-38xg-3ffm-68p7",
4+
"modified": "2026-02-14T00:32:42Z",
5+
"published": "2026-02-14T00:32:42Z",
6+
"aliases": [
7+
"CVE-2025-70866"
8+
],
9+
"details": "LavaLite CMS 10.1.0 is vulnerable to Incorrect Access Control. An authenticated user with low-level privileges (User role) can directly access the admin backend by logging in through /admin/login. The vulnerability exists because the admin and user authentication guards share the same user provider without role-based access control verification.",
10+
"severity": [],
11+
"affected": [],
12+
"references": [
13+
{
14+
"type": "ADVISORY",
15+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-70866"
16+
},
17+
{
18+
"type": "WEB",
19+
"url": "https://gist.github.com/gkjzjh146/6d541c80b0666a596581ccd85bd10058"
20+
},
21+
{
22+
"type": "WEB",
23+
"url": "https://github.com/LavaLite/cms/releases/tag/v10.1.0"
24+
}
25+
],
26+
"database_specific": {
27+
"cwe_ids": [],
28+
"severity": null,
29+
"github_reviewed": false,
30+
"github_reviewed_at": null,
31+
"nvd_published_at": "2026-02-13T22:16:09Z"
32+
}
33+
}

advisories/unreviewed/2026/02/GHSA-7chh-rv6q-8pp3/GHSA-7chh-rv6q-8pp3.json

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-7chh-rv6q-8pp3",
4-
"modified": "2026-02-05T06:31:23Z",
4+
"modified": "2026-02-14T00:32:41Z",
55
"published": "2026-02-04T15:30:29Z",
66
"aliases": [
77
"CVE-2026-1642"
@@ -34,6 +34,7 @@
3434
],
3535
"database_specific": {
3636
"cwe_ids": [
37+
"CWE-345",
3738
"CWE-349"
3839
],
3940
"severity": "HIGH",
Lines changed: 40 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,40 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-7j93-6xm6-qf2c",
4+
"modified": "2026-02-14T00:32:42Z",
5+
"published": "2026-02-14T00:32:42Z",
6+
"aliases": [
7+
"CVE-2026-1844"
8+
],
9+
"details": "The PixelYourSite PRO plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'pysTrafficSource' parameter and the 'pys_landing_page' parameter in all versions up to, and including, 12.4.0.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N"
14+
}
15+
],
16+
"affected": [],
17+
"references": [
18+
{
19+
"type": "ADVISORY",
20+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1844"
21+
},
22+
{
23+
"type": "WEB",
24+
"url": "https://www.pixelyoursite.com/plugins/pixelyoursite-professional"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0fa6a112-ee69-43eb-bded-daba2c2c4dc5?source=cve"
29+
}
30+
],
31+
"database_specific": {
32+
"cwe_ids": [
33+
"CWE-79"
34+
],
35+
"severity": "HIGH",
36+
"github_reviewed": false,
37+
"github_reviewed_at": null,
38+
"nvd_published_at": "2026-02-13T22:16:11Z"
39+
}
40+
}
Lines changed: 33 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,33 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-7vwv-5gmf-fwq5",
4+
"modified": "2026-02-14T00:32:42Z",
5+
"published": "2026-02-14T00:32:42Z",
6+
"aliases": [
7+
"CVE-2025-69633"
8+
],
9+
"details": "A SQL Injection vulnerability in the Advanced Popup Creator (advancedpopupcreator) module for PrestaShop 1.1.26 through 1.2.6 (Fixed in version 1.2.7) allows remote unauthenticated attackers to execute arbitrary SQL queries via the fromController parameter in the popup controller. The parameter is passed unsanitized to SQL queries in classes/AdvancedPopup.php (getPopups() and updateVisits() functions).",
10+
"severity": [],
11+
"affected": [],
12+
"references": [
13+
{
14+
"type": "ADVISORY",
15+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-69633"
16+
},
17+
{
18+
"type": "WEB",
19+
"url": "https://addons.prestashop.com/en/pop-up-gamification/23773-popup-on-entry-exit-popup-and-newsletter.html"
20+
},
21+
{
22+
"type": "WEB",
23+
"url": "https://labs.esokia.com/cve/cve-2025-69633"
24+
}
25+
],
26+
"database_specific": {
27+
"cwe_ids": [],
28+
"severity": null,
29+
"github_reviewed": false,
30+
"github_reviewed_at": null,
31+
"nvd_published_at": "2026-02-13T22:16:09Z"
32+
}
33+
}

advisories/unreviewed/2026/02/GHSA-82p2-ccrf-wxw5/GHSA-82p2-ccrf-wxw5.json

Lines changed: 11 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,18 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-82p2-ccrf-wxw5",
4-
"modified": "2026-02-12T00:31:04Z",
4+
"modified": "2026-02-14T00:32:41Z",
55
"published": "2026-02-12T00:31:04Z",
66
"aliases": [
77
"CVE-2026-20615"
88
],
99
"details": "A path handling issue was addressed with improved validation. This issue is fixed in iOS 26.3 and iPadOS 26.3, macOS Tahoe 26.3, macOS Sonoma 14.8.4, visionOS 26.3. An app may be able to gain root privileges.",
10-
"severity": [],
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
14+
}
15+
],
1116
"affected": [],
1217
"references": [
1318
{
@@ -32,8 +37,10 @@
3237
}
3338
],
3439
"database_specific": {
35-
"cwe_ids": [],
36-
"severity": null,
40+
"cwe_ids": [
41+
"CWE-22"
42+
],
43+
"severity": "HIGH",
3744
"github_reviewed": false,
3845
"github_reviewed_at": null,
3946
"nvd_published_at": "2026-02-11T23:16:05Z"
Lines changed: 41 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,41 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-964f-vc2f-ch6j",
4+
"modified": "2026-02-14T00:32:42Z",
5+
"published": "2026-02-14T00:32:42Z",
6+
"aliases": [
7+
"CVE-2025-70955"
8+
],
9+
"details": "A Stack Overflow vulnerability was discovered in the TON Virtual Machine (TVM) before v2024.10. The vulnerability stems from the improper handling of vmstate and continuation jump instructions, which allow for continuous dynamic tail calls. An attacker can exploit this by crafting a smart contract with deeply nested jump logic. Even within permissible gas limits, this nested execution exhausts the host process's stack space, causing the validator node to crash. This results in a Denial of Service (DoS) for the TON blockchain network.",
10+
"severity": [],
11+
"affected": [],
12+
"references": [
13+
{
14+
"type": "ADVISORY",
15+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-70955"
16+
},
17+
{
18+
"type": "WEB",
19+
"url": "https://github.com/ton-blockchain/ton/commit/b5734d2e30b9c93cfdacb4ea37c9ebdf11ca5d49#diff-17eca9db515992a081522236bf9bad767fac171044f7c00c20bf740f4206b3de"
20+
},
21+
{
22+
"type": "WEB",
23+
"url": "https://gist.github.com/Lucian-code233/25b0a13be569db9160340d9ecd2fdf0d"
24+
},
25+
{
26+
"type": "WEB",
27+
"url": "https://github.com/ton-blockchain/ton/releases/tag/v2024.10#:~:text=krigga%20%28emulator%29%2C-%2CArayz%2C-%40%20TonBit%20%28LS%20security"
28+
},
29+
{
30+
"type": "WEB",
31+
"url": "https://mp.weixin.qq.com/s/wy2ea6udkNZzIsp1K2LEOQ"
32+
}
33+
],
34+
"database_specific": {
35+
"cwe_ids": [],
36+
"severity": null,
37+
"github_reviewed": false,
38+
"github_reviewed_at": null,
39+
"nvd_published_at": "2026-02-13T22:16:10Z"
40+
}
41+
}
Lines changed: 41 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,41 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-9xqh-f8h9-23pv",
4+
"modified": "2026-02-14T00:32:42Z",
5+
"published": "2026-02-14T00:32:42Z",
6+
"aliases": [
7+
"CVE-2025-70956"
8+
],
9+
"details": "A State Pollution vulnerability was discovered in the TON Virtual Machine (TVM) before v2025.04. The issue exists in the RUNVM instruction logic (VmState::run_child_vm), which is responsible for initializing child virtual machines. The operation moves critical resources (specifically libraries and log) from the parent state to a new child state in a non-atomic manner. If an Out-of-Gas (OOG) exception occurs after resources are moved but before the state transition is finalized, the parent VM retains a corrupted state where these resources are emptied/invalid. Because RUNVM supports gas isolation, the parent VM continues execution with this corrupted state, leading to unexpected behavior or denial of service within the contract's context.",
10+
"severity": [],
11+
"affected": [],
12+
"references": [
13+
{
14+
"type": "ADVISORY",
15+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-70956"
16+
},
17+
{
18+
"type": "WEB",
19+
"url": "https://github.com/ton-blockchain/ton/commit/1835d84602bbaaa1593270d7ab3bb0b499920416"
20+
},
21+
{
22+
"type": "WEB",
23+
"url": "https://gist.github.com/Lucian-code233/beab9d14683ed2bdf5543be430b91c70"
24+
},
25+
{
26+
"type": "WEB",
27+
"url": "https://github.com/ton-blockchain/ton/releases/tag/v2025.04#:~:text=Arayz%2C%20Robinlzw%2C%20%40wy666444%20%40Lucian-code233"
28+
},
29+
{
30+
"type": "WEB",
31+
"url": "https://mp.weixin.qq.com/s/ZD35baKUikefFdtNHZIC9g"
32+
}
33+
],
34+
"database_specific": {
35+
"cwe_ids": [],
36+
"severity": null,
37+
"github_reviewed": false,
38+
"github_reviewed_at": null,
39+
"nvd_published_at": "2026-02-13T22:16:10Z"
40+
}
41+
}

advisories/unreviewed/2026/02/GHSA-fc72-gwgq-7p26/GHSA-fc72-gwgq-7p26.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-fc72-gwgq-7p26",
4-
"modified": "2026-02-04T15:30:31Z",
4+
"modified": "2026-02-14T00:32:41Z",
55
"published": "2026-02-04T15:30:31Z",
66
"aliases": [
77
"CVE-2026-20732"
Lines changed: 41 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,41 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-g989-fg9h-96pr",
4+
"modified": "2026-02-14T00:32:42Z",
5+
"published": "2026-02-14T00:32:42Z",
6+
"aliases": [
7+
"CVE-2025-70954"
8+
],
9+
"details": "A Null Pointer Dereference vulnerability exists in the TON Virtual Machine (TVM) within the TON Blockchain before v2025.06. The issue is located in the execution logic of the INMSGPARAM instruction, where the program fails to validate if a specific pointer is null before accessing it. By sending a malicious transaction or smart contract, an attacker can trigger this null pointer dereference, causing the validator node process to crash (segmentation fault). This results in a Denial of Service (DoS) affecting the availability of the entire blockchain network.",
10+
"severity": [],
11+
"affected": [],
12+
"references": [
13+
{
14+
"type": "ADVISORY",
15+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-70954"
16+
},
17+
{
18+
"type": "WEB",
19+
"url": "https://github.com/ton-blockchain/ton/commit/9e5109d56bc4f2345a00b2271c3711103841b799"
20+
},
21+
{
22+
"type": "WEB",
23+
"url": "https://gist.github.com/Lucian-code233/04940a264cab50732cc07fd991749226"
24+
},
25+
{
26+
"type": "WEB",
27+
"url": "https://github.com/ton-blockchain/ton/releases/tag/v2025.06#:~:text=AArayz%2C%20wy666444%2C%20Robinlzw%2C%20Lucian-code233"
28+
},
29+
{
30+
"type": "WEB",
31+
"url": "https://mp.weixin.qq.com/s/IbRKrCKdMyIi-azkuqOOvg"
32+
}
33+
],
34+
"database_specific": {
35+
"cwe_ids": [],
36+
"severity": null,
37+
"github_reviewed": false,
38+
"github_reviewed_at": null,
39+
"nvd_published_at": "2026-02-13T22:16:10Z"
40+
}
41+
}

0 commit comments

Comments
 (0)