Ptechhub
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
PtechHub
No Result
View All Result

Ivanti, Fortinet, SAP, VMware, n8n Patch RCE, SQL Injection, Privilege Escalation Flaws

The Hacker News by The Hacker News
May 18, 2026
Home Cybersecurity
Share on FacebookShare on Twitter


Ravie LakshmananMay 18, 2026Vulnerability / Software Security

Ivanti, Fortinet, n8n, SAP, and VMware have released security fixes for various vulnerabilities that could be exploited by bad actors to bypass authentication and execute arbitrary code.

Topping the list is a critical flaw impacting Ivanti Xtraction (CVE-2026-8043, CVSS score: 9.6) that could be exploited to achieve information disclosure or client-side attacks.

“External control of a file name in Ivanti Xtraction before version 2026.2 allows a remote authenticated attacker to read sensitive files and write arbitrary HTML files to a web directory, leading to information disclosure and possible client-side attacks,” Ivanti said in an advisory.

Fortinet published advisories for two critical shortcomings affecting FortiAuthenticator and FortiSandbox, FortiSandbox Cloud, and FortiSandbox PaaS that could result in code execution –

  • CVE-2026-44277 (CVSS score: 9.1) – An improper access control vulnerability in FortiAuthenticator that may allow an unauthenticated attacker to execute unauthorized code or commands via crafted requests. (Fixed in FortiAuthenticator versions 6.5.7, 6.6.9, and 8.0.3)
  • CVE-2026-26083 (CVSS score: 9.1) – A missing authorization vulnerability in FortiSandbox, FortiSandbox Cloud, and FortiSandbox PaaS WEB UI that may allow an unauthenticated attacker to execute unauthorized code or commands via HTTP requests. (Fixed in FortiSandbox versions 4.4.9 and 5.0.2, FortiSandbox Cloud version 5.0.6, and FortiSandbox PaaS versions 4.4.9. and 5.0.2)

SAP also shipped fixes for two critical vulnerabilities –

  • CVE-2026-34260 (CVSS score: 9.6) – An SQL injection vulnerability in SAP S/4HANA
  • CVE-2026-34263 (CVSS score: 9.6) – A missing authentication check in the SAP Commerce cloud configuration

“The vulnerability is caused by an overly permissive security configuration with improper rule ordering, allowing an unauthenticated user to perform malicious configuration upload and code injection, resulting in arbitrary server-side code execution,” Onapsis said about CVE-2026-34263.

On the other hand, CVE-2026-34260 could be exploited by an attacker to inject malicious SQL statements and potentially impact the confidentiality and availability of the application. However, since the affected code only allows read access to data, the vulnerability does not compromise the integrity of the application.

“It allows a low-privileged, authenticated attacker to inject malicious SQL code via user-controlled input, potentially exposing sensitive database information and crashing the application,” Pathlock said.

Patches have also been released by Broadcom for a high-severity flaw in VMware Fusion (CVE-2026-41702, CVSS score: 7.8) that could pave the way for local privilege escalation. The issue has been addressed in version 26H1.

“VMware Fusion contains a TOCTOU (Time-of-check Time-of-use) vulnerability that occurs during an operation performed by a SETUID binary,” Broadcom said. “A malicious actor with local non-administrative user privileges may exploit this vulnerability to escalate privileges to root on the system where Fusion is installed.”

Round off the list is a set of five critical vulnerabilities impacting n8n –

  • CVE-2026-42231 (CVSS score: 9.4) – A vulnerability in the xml2js library used to parse XML request bodies in n8n’s webhook handler that allows prototype pollution via a crafted XML payload, enabling an authenticated user with permission to create or modify workflows to achieve remote code execution on the n8n host. (Fixed in n8n versions 1.123.32, 2.17.4, and 2.18.1)
  • CVE-2026-42232 (CVSS score: 9.4) – An authenticated user with permission to create or modify workflows could achieve global prototype pollution via the XML Node, leading to remote code execution when combined with other nodes exploiting the prototype pollution. (Fixed in n8n versions 1.123.32, 2.17.4, and 2.18.1)
  • CVE-2026-44791 (CVSS score: 9.4) – A bypass for CVE-2026-42232 that could result in remote code execution on the n8n host. (Fixed in n8n versions 1.123.43, 2.20.7, and 2.22.1)
  • CVE-2026-44789 (CVSS score: 9.4) – An authenticated user with permission to create or modify workflows could achieve global prototype pollution via an unvalidated pagination parameter in the HTTP Request node, leading to remote code execution on the n8n host. (Fixed in n8n versions 1.123.43, 2.20.7, and 2.22.1)
  • CVE-2026-44790 (CVSS score: 9.4) – An authenticated user with permission to create or modify workflows could inject CLI flags on the Git node’s Push operation, enabling an attacker to read arbitrary files from the n8n server and resulting in full compromise. (Fixed in n8n versions 1.123.43, 2.20.7, and 2.22.1)

Software Patches from Other Vendors

Security updates have also been released by other vendors over the past several weeks to rectify various vulnerabilities, including –

  • ABB
  • Adobe
  • Amazon Web Services
  • AMD
  • Apple
  • ASUS
  • Atlassian
  • Axis Communications
  • AVEVA
  • Canon
  • Cisco
  • CODESYS
  • ConnectWise
  • Dell
  • Devolutions
  • Drupal
  • F5
  • Fortra
  • Foxit Software
  • Fujitsu
  • GitLab
  • GnuTLS
  • Google
    Android
    and
    Pixel
  • Google Chrome
  • Google Cloud
  • Grafana
  • Hikvision
  • Hitachi Energy
  • Honeywell
  • HP
  • HP Enterprise
    (including Aruba Networking and
    Juniper Networks
    )
  • Huawei
  • IBM
  • Intel
  • Jenkins
  • Lenovo
  • Linux distributions
    AlmaLinux
    ,
    Alpine Linux
    ,
    Amazon Linux
    ,
    Arch Linux
    ,
    Debian
    ,
    Gentoo
    ,
    Oracle Linux
    ,
    Mageia
    ,
    Red Hat
    ,
    Rocky Linux
    ,
    SUSE
    , and
    Ubuntu
  • MediaTek
  • Meta WhatsApp
  • Microsoft
  • Mitel
  • Mitsubishi Electric
  • MongoDB
  • Moxa
  • Mozilla
    Firefox, Firefox ESR, and Thunderbird
  • NVIDIA
  • OPPO
  • Palo Alto Networks
  • Phoenix Contact
  • Phoenix Technologies
  • Progress Software
  • QNAP
  • Qualcomm
  • React
  • Ricoh
  • Samsung
  • Schneider Electric
  • Siemens
  • Sophos
  • Spring Framework
  • Supermicro
  • Synology
  • Tenable
  • TP-Link
  • WatchGuard
  • Zoom
    , and
  • Zyxel



Source link

The Hacker News

The Hacker News

Next Post
CIOs under pressure as disruptions mount

CIOs under pressure as disruptions mount

Recommended.

Senator Blackburn Pulls Support for AI Moratorium in Trump’s ‘Big Beautiful Bill’ Amid Backlash

Senator Blackburn Pulls Support for AI Moratorium in Trump’s ‘Big Beautiful Bill’ Amid Backlash

July 1, 2025
Elegoo bringt Nexprint auf den Markt, eine Open-Source-Plattform für 3D-Modelle für Kreative weltweit

Elegoo bringt Nexprint auf den Markt, eine Open-Source-Plattform für 3D-Modelle für Kreative weltweit

August 4, 2025

Trending.

Spirit of openness helps banks get serious about stopping scams | Computer Weekly

Spirit of openness helps banks get serious about stopping scams | Computer Weekly

April 10, 2025
Microsoft Q3 Earnings Preview: What To Watch On Azure, Copilot, OpenAI

Microsoft Q3 Earnings Preview: What To Watch On Azure, Copilot, OpenAI

April 29, 2026
Weibo Publishes 2025 Environmental, Social and Governance Report

Weibo Publishes 2025 Environmental, Social and Governance Report

April 28, 2026
It Takes 2 Minutes to Hack the EU’s New Age-Verification App

It Takes 2 Minutes to Hack the EU’s New Age-Verification App

April 18, 2026
Chunghwa Telecom 2025 Form 20-F filed with the U.S. SEC

Chunghwa Telecom 2025 Form 20-F filed with the U.S. SEC

April 15, 2026

PTechHub

A tech news platform delivering fresh perspectives, critical insights, and in-depth reporting — beyond the buzz. We cover innovation, policy, and digital culture with clarity, independence, and a sharp editorial edge.

Follow Us

Industries

  • AI & ML
  • Cybersecurity
  • Enterprise IT
  • Finance
  • Telco

Navigation

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Subscribe to Our Newsletter

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Copyright © 2025 | Powered By Porpholio

No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs

Copyright © 2025 | Powered By Porpholio