Vulnerability Report - January 2026

All vulnerability reports

Introduction

This vulnerability report has been generated using data aggregated on Vulnerability-Lookup, with contributions from the platform’s community.

It highlights the most frequently mentioned vulnerability for January 2026, based on sightings collected from various sources, including MISP, Exploit-DB, Bluesky, Mastodon, GitHub Gists, The Shadowserver Foundation, Nuclei, SPLOITUS, Metasploit, and more. For further details, please visit this page.

The Month at a Glance

January 2026 saw two vulnerabilities tied for most frequently sighted with 110 sightings each: CVE-2026-21858, a Critical-severity vulnerability in n8n-io’s n8n workflow automation platform, and CVE-2026-24061, a Critical vulnerability affecting GNU Inetutils. The n8n vulnerability was extensively covered in contributor insights, notably in “The Ni8mare Test: n8n RCE Under the Microscope”.

Other critical vulnerabilities in the top 10 include CVE-2025-55182 in Meta’s react-server-dom-webpack (97 sightings), CVE-2026-20045 in Cisco Unified Communications Manager (80 sightings), CVE-2026-24858 in Fortinet FortiManager (80 sightings), CVE-2026-1281 in Ivanti Endpoint Manager Mobile (70 sightings), and CVE-2017-18368, an older but still active vulnerability in billion 5200w-t devices (62 sightings).

January was a busy month for actively exploited vulnerabilities, with 15 new entries added to the CISA Known Exploited Vulnerabilities catalog. Notable additions include:

No new entries were added to the ENISA KEV catalog in January.

The Ghost CVE Report reveals early detection of vulnerabilities with limited public information. CVE-2025-58151 (Xen Security Advisory) and CVE-2026-23456 (YoSmart YoLink Smart Hub) led with 5 sightings each, followed by CVE-2024-31884 (4 sightings) and several GHSA identifiers and CVEs with 3 sightings.

Contributor insights covered a diverse range of topics, including EPMM detection techniques, PAN-OS firewall vulnerabilities, CVEs affecting the Svelte ecosystem, security advisories for Ivanti Endpoint Manager Mobile, GNU C Library updates, Trend Micro Apex Central vulnerabilities, and multiple vulnerabilities in GnuPG (gpg.fail).

Top 10 Vendors of the Month

Top 10 Vendors of the Month

Top 10 Assigners of the Month

Top 10 Assigners of the Month

Top 10 vulnerabilities of the Month

VulnerabilitySighting CountVendorProductVLAI Severity
CVE-2026-21858110n8n-ion8nCritical (confidence: 0.8071)
CVE-2026-24061110GNUInetutilsCritical (confidence: 0.9534)
CVE-2025-5518297Metareact-server-dom-webpackCritical (confidence: 0.9914)
CVE-2026-2150994MicrosoftMicrosoft 365 Apps for EnterpriseHigh (confidence: 0.9735)
CVE-2025-808884win.rar GmbHWinRARHigh (confidence: 0.9881)
CVE-2026-2004580CiscoCisco Unified Communications ManagerCritical (confidence: 0.5226)
CVE-2026-2485880FortinetFortiManagerCritical (confidence: 0.9378)
CVE-2025-1484776MongoDB Inc.MongoDB ServerHigh (confidence: 0.9349)
CVE-2026-128170IvantiEndpoint Manager MobileCritical (confidence: 0.9914)
CVE-2017-1836862billion5200w-tCritical (confidence: 0.9748)

Known Exploited Vulnerabilities

New entries have been added to major Known Exploited Vulnerabilities catalogs.

CISA

CVE IDDate AddedVendorProductVLAI Severity
CVE-2026-248582026-01-27FortinetFortiManagerCritical (confidence: 0.9378)
CVE-2025-526912026-01-26SmarterToolsSmarterMailCritical (confidence: 0.7545)
CVE-2018-146342026-01-26The Linux FoundationkernelHigh (confidence: 0.8719)
CVE-2026-237602026-01-26SmarterToolsSmarterMailCritical (confidence: 0.9916)
CVE-2026-215092026-01-26MicrosoftMicrosoft 365 Apps for EnterpriseHigh (confidence: 0.9735)
CVE-2026-240612026-01-26GNUInetutilsCritical (confidence: 0.9534)
CVE-2024-370792026-01-23vmwarevcenter_serverCritical (confidence: 0.9302)
CVE-2025-543132026-01-22prettiereslint-config-prettierHigh (confidence: 0.8864)
CVE-2025-340262026-01-22VersaConcertoCritical (confidence: 0.9819)
CVE-2025-311252026-01-22vitejsviteMedium (confidence: 0.6523)
CVE-2026-200452026-01-21CiscoCisco Unified Communications ManagerCritical (confidence: 0.5226)
CVE-2026-208052026-01-13MicrosoftWindows 10 Version 1607Medium (confidence: 0.995)
CVE-2025-81102026-01-12GogsGogsHigh (confidence: 0.9905)
CVE-2009-05562026-01-07MicrosoftOfficeHigh (confidence: 0.8535)
CVE-2025-371642026-01-07Hewlett Packard Enterprise (HPE)HPE OneViewHigh (confidence: 0.6929)

ENISA

No new entry in January.

Top 10 Weaknesses of the Month

Top 10 Weaknesses of the Month

Click the image for more information.

Ghost CVE Report

A ghost CVE is a vulnerability identifier that’s already popped up in the wild but is still listed as RESERVED or NOT_FOUND in official registries like NVD or MITRE.

Sightings detected between 2026-01-01 and 2026-01-31 that are associated with vulnerabilities without public records.

Vulnerability IDOccurrencesComment
CVE-2025-581515Xen Security Advisory 478 v2
CVE-2026-234565Critical Vulnerabilities in YoSmart YoLink Smart Hub Expose Smart Homes to Remote Attacks
CVE-2024-318844Incorrect usage of certificate checking via Pybind
GHSA-7hf5-mc28-xmcv3CVE-2026-22794: Trust Issues: Hijacking Appsmith Accounts via Origin Header Abuse
GHSA-7g7f-ff96-5gcw3CVE-2025-8217: Amazon Q’s Self-Sabotage: The Backdoor That Couldn’t Code
CVE-2026-235943Remote Privilege Elevation in HPE Alletra & Nimble Storage
CVE-2026-12203Google Chrome 144 Update Patches High-Severity V8 Vulnerability
CVE-2023-423442XXE in OpenCMS
CVE-2026-123452Zero-day RCE in NexusFlow API Gateway is actively exploited
CVE-2025-530862The recent patch for HarfBuzz (CVE-2025-53086) addresses a classic yet dangerous heap corruption bug
CVE-2025-1346551prototype pollution flaw
CVE-2025-632613vulnerability in AWStats as shipped with cPanel

Insights from Contributors

Thank you

Thank you to all the contributors and our diverse sources!

If you want to contribute to the next report, you can create your account.

Feedback and Support

If you have suggestions, please feel free to open a ticket on our GitHub repository. Your feedback is invaluable to us!
https://github.com/vulnerability-lookup/vulnerability-lookup/issues/

Funding

eu_funded_en

The main objective of Federated European Team for Threat Analysis (FETTA) is improvement of Cyber Threat Intelligence (CTI) products available to the public and private sector in Poland, Luxembourg, and the European Union as a whole.
Developing actionable CTI products (reports, indicators, etc) is a complex task and requires an in-depth understanding of the threat landscape and the ability to analyse and interpret large amounts of data. Many SOCs and CSIRTs build their capabilities in this area independently, leading to a fragmented approach and duplication of work.

The Computer Incident Response Center Luxembourg (CIRCL) is a government-driven initiative designed to provide a systematic response facility to computer security threats and incidents. The organization brings to the table its extensive experience in cybersecurity incident management, threat intelligence, and proactive response strategies. With a strong background in developing innovative open source cybersecurity tools and solutions, CIRCL’s contribution to the FETTA project is instrumental in achieving enhanced collaboration and intelligence sharing across Europe.

Press release