During the period of May 5-11, 2026, the threat landscape was dominated by critical vulnerabilities affecting enterprise infrastructure and widespread malware distribution activity. Three high-severity vulnerabilities were added to CISA's Known Exploited Vulnerabilities catalog, including a critical out-of-bounds write vulnerability in Palo Alto Networks PAN-OS firewalls (CVE-2026-0300) and SQL injection in BerriAI LiteLLM (CVE-2026-42208), both enabling unauthorized access and potential remote code execution. The NVD disclosed 29 additional vulnerabilities, with five rated CRITICAL, primarily affecting CMS platforms, WordPress plugins, and authentication systems.
Malware distribution infrastructure remains highly active, with 50 malicious URLs identified on a single IP address (45.148.120.78) distributing ua-wget malware payloads. This concentration suggests an active botnet command-and-control or malware staging server targeting vulnerable IoT devices and Linux systems. The vulnerabilities span multiple attack vectors including SQL injection, arbitrary file upload, authentication bypass, and remote code execution, with many requiring only low-privilege or unauthenticated access.
Organizations should prioritize patching the three KEV entries immediately, particularly the Palo Alto Networks firewall vulnerability which affects perimeter security devices. The prevalence of CMS and WordPress vulnerabilities indicates continued targeting of web applications, while authentication bypass vulnerabilities in enterprise tools like Argo Workflows and AzuraCast pose significant risks to containerized and self-hosted environments. Network defenders should block traffic to/from 45.148.120.78 and monitor for ua-wget malware indicators.
Three critical vulnerabilities added to CISA's Known Exploited Vulnerabilities catalog this week require immediate patching due to active exploitation risks.
Critical out-of-bounds write vulnerability in PAN-OS User-ID Authentication Portal allows unauthenticated attackers to execute arbitrary code with root privileges on PA-Series and VM-Series firewalls. This perimeter security device vulnerability poses extreme risk to enterprise networks.
SQL injection vulnerability in BerriAI LiteLLM allows attackers to read and potentially modify proxy database contents, leading to unauthorized access to the proxy and managed credentials. Particularly concerning for AI/LLM infrastructure deployments.
Ivanti Endpoint Manager Mobile improper input validation vulnerability enables remotely authenticated administrators to achieve remote code execution. Expands attack surface for compromised admin accounts in mobile device management infrastructure.
Five CRITICAL-severity vulnerabilities disclosed in NVD enable unauthenticated remote code execution and privilege escalation across multiple platforms.
Unauthenticated arbitrary file upload vulnerability in WordPress Download From Files plugin v1.48 and earlier allows attackers to upload malicious files via AJAX fileupload action to admin-ajax.php endpoint, achieving remote code execution.
OpenCATS 0.9.4 allows unauthenticated attackers to execute arbitrary commands by uploading malicious PHP files disguised as resume attachments through the careers job application endpoint.
WordPress MStore API 2.0.6 contains arbitrary file upload vulnerability allowing unauthenticated attackers to upload PHP files to config_file REST API endpoint for remote code execution.
TheCartPress 1.5.3.6 allows unauthenticated privilege escalation enabling attackers to create administrator accounts via crafted requests to tcp_register_and_login_ajax action with tcp_role set to administrator.
OpenCart 3.0.3.8 session fixation vulnerability allows attackers to hijack user sessions by injecting arbitrary OCSESSID cookie values, enabling unauthorized access to user accounts.
Critical vulnerability in phpVMS prior to v7.0.6 allows unauthenticated access to legacy import feature, enabling unauthorized data manipulation in airline simulation application.
Auth library versions 1.18.0-1.25.2 and 2.0.0-2.1.2 map all authenticated Patreon accounts to the same local user.ID instead of deriving unique IDs, enabling mass account takeover in applications using Patreon OAuth.
Multiple HIGH-severity vulnerabilities affecting CMS platforms, enterprise applications, and infrastructure components enable authenticated remote code execution and privilege escalation.
Argo Workflows prior to v3.7.14 and v4.0.5 allows users with create Workflow permission to bypass templateReferencing: Strict to gain host network access, switch service accounts, and override pod security contexts.
AzuraCast prior to v0.23.6 fails to sanitize currentDirectory parameter in Flow.js media upload endpoint for path traversal, enabling authenticated attackers to write files outside intended directories when combined with local filesystem storage.
AzuraCast prior to v0.23.6 unconditionally trusts client-supplied X-Forwarded-Host header with no trusted proxy allowlist, enabling unauthenticated attackers to poison password reset URLs sent to users.
Plainpad prior to v1.1.1 allows low-privilege authenticated users to self-escalate to administrator by submitting admin=true in PUT /api.php/v1/users/{id} request due to insufficient input validation.
Aero CMS 0.0.1 allows authenticated attackers to execute arbitrary PHP code by uploading malicious files through image parameter to admin posts.php with source=add_post parameter.
CyberPanel 2.1 command execution vulnerability allows authenticated attackers to read arbitrary files and execute remote code by exploiting symlink attacks through filemanager controller endpoint manipulation of completeStartingPath parameter.
EFM ipTIME A8004T 14.18.2 contains stack-based buffer overflow in formWifiBasicSet function of /goform/WifiBasicSet file, exploitable remotely via manipulation of security_5g argument.
Concentrated malware distribution campaign identified with 50 unique URLs on single IP address distributing ua-wget malware, indicating active botnet or IoT targeting infrastructure.
URLhaus identified 50 malicious URLs hosted on IP 45.148.120.78 distributing ua-wget malware payloads. The high concentration of URLs on a single IP suggests active command-and-control or staging server for botnet operations targeting Linux systems and IoT devices. Network defenders should immediately block this IP and monitor for ua-wget indicators.
Multiple SQL injection vulnerabilities identified in CMS platforms and web applications enabling database extraction and manipulation.
WordPress Survey & Poll plugin 1.5.7.3 contains unauthenticated SQL injection via wp_sap cookie parameter, allowing attackers to extract sensitive database information through crafted SQL payloads.
Balbooa Joomla Forms Builder 2.0.6 contains unauthenticated SQL injection in form submission handler via malicious JSON payloads in 'id' field parameter to com_baforms component.
Opencart TMD Vendor System 3.x blind SQL injection allows unauthenticated attackers to extract database information via product_id parameter using time-based or content-based injection techniques.
Multiple CMS platforms contain authenticated remote code execution vulnerabilities requiring valid user credentials but enabling system-level compromise.
TextPattern CMS 4.8.7 allows authenticated attackers to upload malicious PHP files through file upload functionality in Files section, enabling arbitrary command execution.
Evolution CMS 3.1.6 enables authenticated users with module creation permissions to execute arbitrary system commands by injecting PHP code into module parameters via POST to /manager/index.php.
ImpressCMS 1.4.2 autotasks administrative interface allows authenticated attackers to execute arbitrary PHP code by injecting malicious code into sat_code parameter via POST to /modules/system/admin.php.
e107 CMS 2.3.0 allows authenticated users with theme installation permissions to execute arbitrary commands by uploading malicious theme files through theme.php endpoint that deploy web shells.
Sentry 8.2.0 allows authenticated superusers to execute arbitrary commands by injecting malicious pickle-serialized objects through audit log entry data parameter via crafted POST requests to admin endpoint.
Critical vulnerabilities in software supply chain tools and package managers pose risks to development and deployment pipelines.
apko prior to v1.2.7 verifies signatures on APKINDEX.tar.gz but never compares downloaded .apk packages against checksums in signed index, enabling package substitution attacks in container image builds.
apko versions 0.14.8 to before 1.2.5 vulnerable to path traversal where crafted .apk could install TypeSymlink tar entry targeting outside build root, followed by directory creation or file writes in same or later packages.
pyp2spec prior to v0.14.1 writes PyPI package metadata into generated spec files without escaping RPM macro directives, enabling arbitrary command execution when packagers run rpmbuild on generated specs.
Other significant vulnerabilities affecting various systems including privilege escalation, denial of service, and authentication issues.
Industrial Application Software IAS Canias ERP 8.03 contains improper authentication vulnerability in iasServerRemoteInterface.doAction function of Java RMI Session Management, exploitable remotely.
Discontinued Hikvision switch products vulnerable to authenticated remote command execution via insufficient input validation. Attackers with valid credentials can exploit by sending crafted packets with malicious commands.
Argus Surveillance DVR 4.0 contains unquoted service path vulnerability in DVRWatchdog service enabling local attackers to escalate privileges by placing malicious executable in Program Files directory for LocalSystem execution.
LiquidJS prior to v10.25.7 vulnerable to denial of service via circular block reference in layout/block constructs causing infinite recursive loop, consuming all memory and crashing Node.js process.
memono Notepad 4.2 denial of service vulnerability allows attackers to crash application by pasting excessively long character buffers (350000 characters) twice into note fields.