Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

CVE-2026-27739: Angular SSR Request Vulnerability Enabling Server-Side Request Forgery

A critical vulnerability has been discovered in Angular Server-Side Rendering (SSR) that could allow attackers to manipulate request handling and trigger unauthorized server-side requests. Tracked as CVE-2026-27739, the vulnerability arises from how Angular SSR reconstructs request origins using HTTP headers such as Host and X-Forwarded-*. In affected versions, these headers were not strictly validated before being used to build request URLs.

Discover Exposed AI Infrastructure with Indusface WAS

You track your web applications. You inventory your APIs. But is anybody monitoring your AI servers? Just last week research found that there were more than 175,000 exposed versions of Ollama, an AI server popular for self-hosting LLMs. Across enterprises, self-hosted model servers are being deployed on cloud VMs and GPU-backed instances to power copilots, internal automation, and experimental AI features.

CVE-2026-25639: Axios Vulnerability Triggers DoS in Node.js Applications

A newly disclosed vulnerability tracked as CVE-2026-25639 puts Node.js applications using Axios at risk of remote Denial-of-Service attacks. By sending a specially crafted configuration object, attackers can trigger a fatal runtime error inside Axios’s internal request handling logic, causing the Node.js process to crash instantly.

CVE-2026-1357: WordPress Plugin RCE Exposes Sites to Full Takeover

A critical vulnerability in the WPvivid Backup & Migration WordPress plugin allows unauthenticated attackers to upload and execute arbitrary PHP files on exposed websites. Tracked as CVE-2026-1357, the vulnerability affects vulnerable versions of the plugin and enables remote code execution through network-accessible functionality intended for backup and migration workflows. With over 900,000 active installations, WPvivid is widely deployed across production WordPress environments.

CVE-2026-1281 & CVE-2026-1340: Actively Exploited Pre-Authentication RCE in Ivanti EPMM

Approximately 1,600 Ivanti Endpoint Manager Mobile (EPMM) instances are currently exposed globally, creating a significant attack surface for enterprise mobile infrastructure. Ivanti has disclosed two critical vulnerabilities, CVE-2026-1281 and CVE-2026-1340, that allow unauthenticated remote code execution on affected on-premises deployments. CVE-2026-1281 has been confirmed exploited prior to disclosure and is now listed in CISA’s Known Exploited Vulnerabilities (KEV) catalog.

CVE-2025-11953 - Metro4Shell RCE in React Native Metro Server

A critical unauthenticated remote code execution (RCE) vulnerability has been identified in the React Native Metro development server, with nearly 3,500 exposed instances currently reachable on the public internet. Tracked as CVE-2025-11953, also known as Metro4Shell, this flaw affects the Metro server used during React Native application build and testing workflows.

CVE-2026-22610: Angular Template Compiler XSS Vulnerability Enabling Client-Side Script Execution

Angular applications often rely on built-in protections to handle user input safely. However, a recently disclosed vulnerability shows how gaps in this trust can lead to client-side attacks when input is not properly handled. The vulnerability lies in Angular’s template sanitization logic, where improper handling of SVG elements during template compilation allows attackers to execute arbitrary JavaScript in a user’s browser.

CVE-2026-21858 (Ni8mare): Unauthenticated Remote Code Execution in Self-Hosted n8n

A critical unauthenticated remote code execution (RCE) vulnerability has been disclosed in n8n, a widely used open-source workflow automation platform that orchestrates business processes, SaaS integrations, and event-driven automation pipelines. Tracked as CVE-2026-21858 and referred to as Ni8mare, the vulnerability carries a CVSS v3.1 score of 10.0 (Critical) and allows unauthenticated attackers to execute arbitrary system-level code on vulnerable self-hosted n8n instances.

Magento Patching Without Panic: How Agencies Protect Stores While Updates Catch Up

If you run a Magento agency, you know the feeling: it is 4:00 PM on a Friday, and a critical vulnerability like SessionReaper drops. You are now stuck between two impossible choices. Do you rush an emergency patch and risk breaking your checkout flow right before the weekend? Or do you wait for a safe testing window and pray you don’t become a statistic?

How to Sell Premium Web Security Retainers

For the last decade, the agency model relied on a simple formula: Build a high-value asset, hand it over, and charge a nominal fee to keep the lights on. That model is breaking and the smartest agencies have already moved on. This guide shows you how to package, price, and sell that assurance without hiring an internal security team.