Vulnerability Report - April 2026

All vulnerability reports

Introduction

This vulnerability report has been generated with the help of AI, using the VulnMCP tooling on top of Vulnerability-Lookup, with contributions from the platform’s community.

It highlights the most frequently mentioned vulnerabilities for April 2026, based on data aggregated from Vulnerability-Lookup, the CISA Known Exploited Vulnerabilities catalog, the CIRCL KEV catalog, the ENISA EUVD feed, and contributor comments and bundles. Sightings come from MISP, Exploit-DB, Bluesky, Mastodon, Telegram, GitHub Gists, The Shadowserver Foundation, Nuclei, SPLOITUS, Metasploit, and more. For further details, please visit this page.

The Month at a Glance

April 2026 was dominated by a Linux kernel crypto subsystem flaw, CVE-2026-31431 (“Copy Fail”), an algif_aead in-place operation regression that drew 279 sightings – by far the highest activity of the month. Local privilege escalation against shared multi-user Linux hosts and container infrastructure (including Microsoft WSL) was confirmed in the wild, and CISA added the entry to its KEV catalog on May 1.

Edge-security appliances and developer tooling shaped the rest of the top ranking. Fortinet FortiClient EMS (improper access control, CVSS 9.1) was added to both the CISA and CIRCL KEV catalogs on April 6, and a related FortiClient EMS SQLi – CVE-2026-21643 – was KEV-listed on April 13. Adobe Acrobat Reader prototype-pollution CVE-2026-34621 and GitHub Enterprise Server git-push option injection CVE-2026-3854 both crossed 140 sightings, while Apache ActiveMQ CVE-2026-34197 (Jolokia/Spring code injection) followed closely.

A burst of “AI-stack” exposure also marked the month: marimo (pre-auth RCE via an unauthenticated terminal WebSocket) was added to KEV on April 23, and Meta React Server Components CVE-2025-55182 (KEV since December 2025, known ransomware use) continued to rack up sightings as scanning persisted.

The end of the month brought a critical hosting-stack incident: WebPros cPanel & WHM CVE-2026-41940, an authentication bypass in the login flow (CVSS 9.8), was disclosed on April 28-29 and added to CISA KEV on April 30 with a 3-day remediation deadline.

The CISA Known Exploited Vulnerabilities catalog added 30 entries during April. Highlights:

CISA also re-anchored attention on long-standing exploited issues – ConnectWise ScreenConnect (CVE-2024-1708), SimpleHelp (CVE-2024-57726, CVE-2024-57728), Samsung MagicINFO (CVE-2024-7399), JetBrains TeamCity (CVE-2024-27199), PaperCut NG (CVE-2023-27351), Microsoft Exchange (CVE-2023-21529) and even legacy Microsoft Office issues from 2009/2012 (CVE-2009-0238, CVE-2012-1854).

The CIRCL Known Exploited Vulnerabilities catalog added one entry: CVE-2026-35616 (Fortinet FortiClient EMS), confirmed via incident-response evidence. The ENISA EUVD KEV catalog had no new entries in April.

Contributor activity in April focused on operational mitigations for the Linux kernel “Copy Fail” issue, with practical SELinux, systemd RestrictAddressFamilies, and initcall_blacklist recipes shared by community members.

Top 10 vulnerabilities of the Month

VulnerabilitySighting CountVendorProductVLAI Severity
CVE-2026-31431279LinuxKernel (algif_aead)High (confidence: 0.9482)
CVE-2026-34621147AdobeAcrobat ReaderHigh (confidence: 0.997)
CVE-2026-35616142FortinetFortiClient EMSCritical (confidence: 0.9572)
CVE-2026-3854142GitHubEnterprise ServerCritical (confidence: 0.8704)
CVE-2026-34197138ApacheActiveMQCritical (confidence: 0.6661)
CVE-2025-55182111MetaReact Server ComponentsCritical (confidence: 0.9934)
CVE-2026-5281104GoogleChrome (Dawn)High (confidence: 0.9874)
CVE-2026-3998796marimo-teammarimoCritical (confidence: 0.9856)
CVE-2026-4194092WebProscPanel & WHMCritical (confidence: 0.8211)
CVE-2026-3220191MicrosoftSharePoint ServerHigh (confidence: 0.5863)

Known Exploited Vulnerabilities

New entries have been added to major Known Exploited Vulnerabilities catalogs.

CISA

CVE IDDate AddedVendorProductVLAI Severity
CVE-2026-322022026-04-28MicrosoftWindows ShellMedium (confidence: 0.8578)
CVE-2024-17082026-04-28ConnectWiseScreenConnectHigh (confidence: 0.6127)
CVE-2024-577262026-04-24SimpleHelpSimpleHelpHigh (confidence: 0.7288)
CVE-2024-577282026-04-24SimpleHelpSimpleHelpHigh (confidence: 0.8902)
CVE-2024-73992026-04-24SamsungMagicINFO 9 ServerCritical (confidence: 0.6987)
CVE-2025-296352026-04-24D-LinkDIR-823XHigh (confidence: 0.9867)
CVE-2026-399872026-04-23marimo-teammarimoCritical (confidence: 0.9856)
CVE-2026-338252026-04-22MicrosoftDefender Antimalware PlatformHigh (confidence: 0.9396)
CVE-2024-271992026-04-20JetBrainsTeamCityHigh (confidence: 0.785)
CVE-2025-329752026-04-20QuestKACE Systems Management ApplianceCritical (confidence: 0.8677)
CVE-2026-201282026-04-20CiscoCatalyst SD-WAN ManagerHigh (confidence: 0.5543)
CVE-2025-487002026-04-20SynacorZimbra Collaboration SuiteMedium (confidence: 0.9744)
CVE-2023-273512026-04-20PaperCutNGHigh (confidence: 0.7781)
CVE-2025-27492026-04-20KenticoXperienceHigh (confidence: 0.9762)
CVE-2026-201332026-04-20CiscoCatalyst SD-WAN ManagerHigh (confidence: 0.7295)
CVE-2026-201222026-04-20CiscoCatalyst SD-WAN ManagerMedium (confidence: 0.9478)
CVE-2026-341972026-04-16ApacheActiveMQCritical (confidence: 0.6661)
CVE-2026-322012026-04-14MicrosoftSharePoint ServerHigh (confidence: 0.5863)
CVE-2009-02382026-04-14MicrosoftOffice ExcelHigh (confidence: 0.5354)
CVE-2026-346212026-04-13AdobeAcrobat ReaderHigh (confidence: 0.997)
CVE-2026-216432026-04-13FortinetFortiClient EMSCritical (confidence: 0.9881)
CVE-2020-97152026-04-13AdobeAcrobat & ReaderHigh (confidence: 0.8726)
CVE-2023-364242026-04-13MicrosoftWindows CLFS DriverHigh (confidence: 0.9933)
CVE-2023-215292026-04-13MicrosoftExchange ServerHigh (confidence: 0.6307)
CVE-2025-607102026-04-13MicrosoftHost Process for Windows TasksHigh (confidence: 0.9957)
CVE-2012-18542026-04-13MicrosoftOffice VBE6 / VBACritical (confidence: 0.954)
CVE-2026-13402026-04-08IvantiEndpoint Manager Mobile (EPMM)Critical (confidence: 0.9867)
CVE-2026-356162026-04-06FortinetFortiClient EMSCritical (confidence: 0.9572)
CVE-2026-35022026-04-02TrueConfTrueConf ClientHigh (confidence: 0.9884)
CVE-2026-52812026-04-01GoogleChrome / DawnHigh (confidence: 0.9874)

More KEV entries from the CISA Catalog.

CIRCL

Vulnerability IDDate AddedVendorProductVLAI Severity
CVE-2026-356162026-04-06FortinetFortiClient EMSCritical (confidence: 0.9572)

More KEV entries from the CIRCL Catalog.

ENISA (EUVD)

No new entry in April.

More KEV entries from the ENISA Catalog.

Insights from Contributors

Community members focused on operational mitigations for the Linux kernel “Copy Fail” issue, sharing concrete defensive recipes:

The recurring theme across these contributions: AF_ALG / algif_aead is rarely needed by user workloads, so disabling it at the kernel, container-runtime, or systemd-unit boundary is a pragmatic mitigation while distributions roll out the corrected kernel patches.

Thank you

Thank you to all the contributors and our diverse sources!

If you want to contribute to the next report, you can create your account.

Feedback and Support

If you have suggestions, please feel free to open a ticket on our GitHub repository. Your feedback is invaluable to us!
https://github.com/vulnerability-lookup/vulnerability-lookup/issues/

Funding

eu_funded_en

The main objective of Federated European Team for Threat Analysis (FETTA) is improvement of Cyber Threat Intelligence (CTI) products available to the public and private sector in Poland, Luxembourg, and the European Union as a whole.
Developing actionable CTI products (reports, indicators, etc) is a complex task and requires an in-depth understanding of the threat landscape and the ability to analyse and interpret large amounts of data. Many SOCs and CSIRTs build their capabilities in this area independently, leading to a fragmented approach and duplication of work.

The Computer Incident Response Center Luxembourg (CIRCL) is a government-driven initiative designed to provide a systematic response facility to computer security threats and incidents. The organization brings to the table its extensive experience in cybersecurity incident management, threat intelligence, and proactive response strategies. With a strong background in developing innovative open source cybersecurity tools and solutions, CIRCL’s contribution to the FETTA project is instrumental in achieving enhanced collaboration and intelligence sharing across Europe.

Press release