Written by 9:27 am Cybersecurity & Digital Integrity

Week in Cybersecurity: 338 New Vulnerabilities, 11 Critical (April 07 – April 14, 2026)

This week in cybersecurity: 338 new CVEs published including 11 critical severity. 9 vulnerabilitie…

This week’s cybersecurity landscape brought 338 new CVE entries, including 11 rated critical and 118 rated high severity. 9 vulnerabilities were added to CISA’s Known Exploited Vulnerabilities catalog, meaning they are actively being used in attacks right now.

This weekly roundup distills the most important vulnerability disclosures, threat intelligence, and security news into a format busy IT teams can scan in five minutes. Bookmark this page — we publish every Monday.

Week at a Glance

Metric Count
Total new CVEs 338
Critical severity (CVSS 9.0+) 11
High severity (CVSS 7.0-8.9) 118
Actively exploited (CISA KEV) 9

Critical Vulnerabilities

These vulnerabilities scored 9.0 or above on the CVSS scale and deserve immediate attention from any organization running the affected software.

CVE-2026-34865 (CVSS 10.0)

Out-of-bounds write vulnerability in the WEB module.Impact: Successful exploitation of this vulnerability will affect availability and confidentiality.

View on NVD →

CVE-2026-31059 (CVSS 9.8)

A remote command execution (RCE) vulnerability in the /goform/formDia component of UTT Aggressive HiPER 520W v3v1.7.7-180627 allows attackers to execute arbitrary commands via a crafted string.

View on NVD →

CVE-2026-31151 (CVSS 9.8)

An issue in the login mechanism of Kaleris YMS v7.2.2.1 allows attackers to bypass login verification to access the application ‘s resources.

View on NVD →

CVE-2019-25709 (CVSS 9.3)

CF Image Hosting Script 1.6.5 allows unauthenticated attackers to download and decode the application database by accessing the imgdb.db file in the upload/data directory. Attackers can extract delete IDs stored in plaintext from the deserialized database and use them to delete all pictures via the

View on NVD →

CVE-2026-4810 (CVSS 9.3)

A Code Injection and Missing Authentication vulnerability in Google Agent Development Kit (ADK) versions 1.7.0 (and 2.0.0a1) through 1.28.1 (and 2.0.0a2) on Python (OSS), Cloud Run, and GKE allows an unauthenticated remote attacker to execute arbitrary code on the server hosting the ADK instance.

T

View on NVD →

CVE-2026-23891 (CVSS 9.3)

Decidim is a participatory democracy framework. In versions below 0.30.5 and 0.31.0.rc1 through 0.31.0, a stored code execution vulnerability in the user name field allows a low-privileged attacker to execute arbitrary code in the context of any user who passively visits a comment page, resulting in

View on NVD →

CVE-2026-40042 (CVSS 9.3)

Pachno 1.0.6 contains an XML external entity injection vulnerability that allows unauthenticated attackers to read arbitrary files by exploiting unsafe XML parsing in the TextParser helper. Attackers can inject malicious XML entities through wiki table syntax and inline tags in issue descriptions, c

View on NVD →

CVE-2026-40044 (CVSS 9.3)

Pachno 1.0.6 contains a deserialization vulnerability that allows unauthenticated attackers to execute arbitrary code by injecting malicious serialized objects into cache files. Attackers can write PHP object payloads to world-writable cache files with predictable names in the cache directory, which

View on NVD →

CVE-2026-26026 (CVSS 9.1)

GLPI is a free asset and IT management software package. From 11.0.0 to before 11.0.6, template injection by an administrator lead to RCE. This vulnerability is fixed in 11.0.6.

View on NVD →

CVE-2026-5085 (CVSS 9.1)

Solstice::Session versions through 1440 for Perl generates session ids insecurely.

The _generateSessionID method returns an MD5 digest seeded by the epoch time, a random hash reference, a call to the built-in rand() function and the process id.

The same method is used in the _generateID method in

View on NVD →

Actively Exploited Vulnerabilities (CISA KEV)

These vulnerabilities have confirmed active exploitation in the wild. If you run the affected products, patch immediately — attackers are already using these.

CVE Vendor / Product Action Due Ransomware?
CVE-2026-34621 Adobe Acrobat and Reader 2026-04-27 Unknown
CVE-2026-21643 Fortinet FortiClient EMS 2026-04-16 Unknown
CVE-2020-9715 Adobe Acrobat 2026-04-27 Unknown
CVE-2023-36424 Microsoft Windows 2026-04-27 Unknown
CVE-2023-21529 Microsoft Exchange Server 2026-04-27 Unknown
CVE-2025-60710 Microsoft Windows 2026-04-27 Unknown
CVE-2012-1854 Microsoft Visual Basic for Applications (VBA) 2026-04-27 Unknown
CVE-2026-1340 Ivanti Endpoint Manager Mobile (EPMM) 2026-04-11 Unknown
CVE-2026-35616 Fortinet FortiClient EMS 2026-04-09 Unknown

Protect Your Network

Patching is the first line of defense, but a layered security approach is essential. Here are tools we recommend for small businesses and home users:

This roundup is generated from our automated CyberBrief intelligence pipeline, which monitors NVD, CISA KEV, and vendor advisories daily. Subscribe to our newsletter for daily alerts.

Blue Headline Briefing

Enjoyed this? The best stuff lands in your inbox first.

We don’t email on a schedule — we email when something is genuinely worth your time. No filler, no daily blasts, just the sharpest picks from Blue Headline delivered only when they matter.

Free, no account needed, unsubscribe anytime. We only send when it’s actually worth reading.

Last modified: April 14, 2026
Close Search Window
Close