CVSS: -EPSS: %CPEs: -EXPL: 0CVE-2026-25006 – WordPress XStore theme <= 9.6.4 - Arbitrary Shortcode Execution vulnerability
https://notcve.org/view.php?id=CVE-2026-25006
19 Feb 2026 — Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) vulnerability in 8theme XStore xstore allows Code Injection.This issue affects XStore: from n/a through <= 9.6.4. • https://patchstack.com/database/Wordpress/Theme/xstore/vulnerability/wordpress-xstore-theme-9-6-4-arbitrary-shortcode-execution-vulnerability?_s_id=cve • CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) •
CVSS: -EPSS: %CPEs: -EXPL: 0CVE-2026-22422 – WordPress Everest Forms plugin <= 3.4.1 - Arbitrary Shortcode Execution vulnerability
https://notcve.org/view.php?id=CVE-2026-22422
19 Feb 2026 — Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) vulnerability in wpeverest Everest Forms everest-forms allows Code Injection.This issue affects Everest Forms: from n/a through <= 3.4.1. • https://patchstack.com/database/Wordpress/Plugin/everest-forms/vulnerability/wordpress-everest-forms-plugin-3-4-1-arbitrary-shortcode-execution-vulnerability?_s_id=cve • CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) •
CVSS: 6.7EPSS: %CPEs: 1EXPL: 0CVE-2025-15585
https://notcve.org/view.php?id=CVE-2025-15585
18 Feb 2026 — Fileflows versions before 25.05.2 are affected by an authenticated SQL injection vulnerability in the library-file search function. Successful exploitation requires the system to use MySQL as the underlying database and could result in privilege escalation or data exfiltration. • https://projectblack.io/blog/fileflows-sql-injection-by-decompiling-net-code/#exploitation • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •
CVSS: 7.3EPSS: %CPEs: 1EXPL: 0CVE-2026-25926 – Notepad++ has an Untrusted Search Path
https://notcve.org/view.php?id=CVE-2026-25926
18 Feb 2026 — Under certain conditions, this could lead to arbitrary code execution in the context of the running application. • https://github.com/notepad-plus-plus/notepad-plus-plus/releases/tag/v8.9.2 • CWE-426: Untrusted Search Path •
CVSS: 9.1EPSS: %CPEs: 1EXPL: 0CVE-2026-25548 – InvoicePlane Vulnerable to Remote Code Execution via Local File Inclusion and Log Poisoning
https://notcve.org/view.php?id=CVE-2026-25548
18 Feb 2026 — InvoicePlane is a self-hosted open source application for managing invoices, clients, and payments. A critical Remote Code Execution (RCE) vulnerability exists in InvoicePlane 1.7.0 through a chained Local File Inclusion (LFI) and Log Poisoning attack. An authenticated administrator can execute arbitrary system commands on the server by manipulating the `public_invoice_template` setting to include poisoned log files containing PHP code. Version 1.7.1 patches the issue. • https://github.com/InvoicePlane/InvoicePlane/commit/93622f2df88a860d89bfee56012cabb2942061d6 • CWE-94: Improper Control of Generation of Code ('Code Injection') CWE-98: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') CWE-117: Improper Output Neutralization for Logs •
CVSS: 9.8EPSS: %CPEs: 1EXPL: 0CVE-2026-27174 – MajorDoMo Unauthenticated Remote Code Execution via Admin Console Eval
https://notcve.org/view.php?id=CVE-2026-27174
18 Feb 2026 — MajorDoMo (aka Major Domestic Module) allows unauthenticated remote code execution via the admin panel's PHP console feature. An include order bug in modules/panel.class.php causes execution to continue past a redirect() call that lacks an exit statement, allowing unauthenticated requests to reach the ajax handler in inc_panel_ajax.php. The console handler within that file passes user-supplied input from GET parameters (via register_globals) directly to eval() without any authentication check. An attacker c... • https://chocapikk.com/posts/2026/majordomo-revisited • CWE-94: Improper Control of Generation of Code ('Code Injection') •
CVSS: 3.3EPSS: %CPEs: -EXPL: 0CVE-2025-12343 – Ffmpeg: double-free vulnerability in ffmpeg tensorflow dnn backend
https://notcve.org/view.php?id=CVE-2025-12343
18 Feb 2026 — This results in a denial-of-service scenario but does not allow arbitrary code execution under normal conditions. • https://access.redhat.com/security/cve/CVE-2025-12343 • CWE-415: Double Free •
CVSS: 10.0EPSS: %CPEs: -EXPL: 0CVE-2025-14009 – Zip Slip Vulnerability in nltk/nltk Leading to Remote Code Execution
https://notcve.org/view.php?id=CVE-2025-14009
18 Feb 2026 — A critical vulnerability exists in the NLTK downloader component of nltk/nltk, affecting all versions. The _unzip_iter function in nltk/downloader.py uses zipfile.extractall() without performing path validation or security checks. This allows attackers to craft malicious zip packages that, when downloaded and extracted by NLTK, can execute arbitrary code. The vulnerability arises because NLTK assumes all downloaded packages are trusted and extracts them without validation. If a malicious package contains Py... • https://huntr.com/bounties/49ecbc02-054e-4470-b2e0-b267936cc4e4 • CWE-94: Improper Control of Generation of Code ('Code Injection') •
CVSS: 7.8EPSS: %CPEs: -EXPL: 0CVE-2025-61982
https://notcve.org/view.php?id=CVE-2025-61982
18 Feb 2026 — An arbitrary code execution vulnerability exists in the Code Stream directive functionality of OpenCFD OpenFOAM 2506. A specially crafted OpenFOAM simulation file can lead to arbitrary code execution. • https://talosintelligence.com/vulnerability_reports/TALOS-2025-2292 • CWE-94: Improper Control of Generation of Code ('Code Injection') •
CVSS: 7.8EPSS: %CPEs: 1EXPL: 0CVE-2025-33240
https://notcve.org/view.php?id=CVE-2025-33240
18 Feb 2026 — NVIDIA Megatron Bridge contains a vulnerability in a data shuffling tutorial, where malicious input could cause a code injection. • https://nvd.nist.gov/vuln/detail/CVE-2025-33240 • CWE-94: Improper Control of Generation of Code ('Code Injection') •
