TopVuln

High-risk vulnerability digests

Digest of CISA KEV Additions

CVEs TopVuln recorded for CISA KEV digest days 2026-04-01 – 2026-04-30 (calendar month 2026-04).

Official CISA alerts: https://www.cisa.gov/news-events/alerts/2026/04/16/cisa-adds-one-known-exploited-vulnerability-catalog https://www.cisa.gov/news-events/alerts/2026/04/22/cisa-adds-one-known-exploited-vulnerability-catalog https://www.cisa.gov/news-events/alerts/2026/04/23/cisa-adds-one-known-exploited-vulnerability-catalog https://www.cisa.gov/news-events/alerts/2026/04/24/cisa-adds-four-known-exploited-vulnerabilities-catalog https://www.cisa.gov/news-events/alerts/2026/04/28/cisa-adds-two-known-exploited-vulnerabilities-catalog (TopVuln is not affiliated with CISA.)

#1 Apache ActiveMQ Improper Input Validation Vulnerability

CVE: CVE-2026-34197

CVSS: 8.8

Risk level: HIGH

Affected versions: cpe:2.3:a:apache:activemq:*:*:*:*:*:*:*:* cpe:2.3:a:apache:activemq:*:*:*:*:*:*:*:* cpe:2.3:a:apache:activemq_broker:*:*:*:*:*:*:*:* cpe:2.3:a:apache:activemq_broker:*:*:*:*:*:*:*:*

Summary: Apache ActiveMQ contains an improper input validation vulnerability that allows for code injection.

Remediation: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Exploit info: No exploit-tagged NVD references in our cache; see the CISA KEV link below.

#2 Microsoft Defender Insufficient Granularity of Access Control Vulnerability

CVE: CVE-2026-33825

CVSS: N/A

Risk level: HIGH

Affected versions: Defender

Summary: Microsoft Defender contains an insufficient granularity of access control vulnerability that could allow an authorized attacker to escalate privileges locally.

Remediation: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Exploit info: No exploit-tagged NVD references in our cache; see the CISA KEV link below.

#3 Marimo Remote Code Execution Vulnerability

CVE: CVE-2026-39987

CVSS: 9.3

Risk level: CRITICAL

Affected versions: All unpatched Marimo releases prior to the vendor's fixed update

Summary: This is a pre-authorization remote code execution vulnerability in Marimo software. It allows unauthenticated remote attackers to gain full shell access and execute arbitrary system commands on affected hosts. The vulnerability has a 9.8 CVSS v3 score and is listed in CISA KEV.

Remediation: Apply the vendor's security patch for this vulnerability as soon as possible. Block all public access to affected Marimo instances until patching is completed. Follow CISA BOD 22-01 guidance for mitigating known exploited vulnerabilities.

Exploit info: This exploit has been publicly disclosed, with references to this issue documented in trusted public vulnerability databases. You may check Exploit-DB or GitHub for potential exploit details.

#4 SimpleHelp Missing Authorization Vulnerability

CVE: CVE-2024-57726

CVSS: 9.9

Risk level: CRITICAL

Affected versions: SimpleHelp remote support software versions prior to the fixed vendor release

Summary: This critical vulnerability allows low-privileged authenticated technicians to create overprivileged API keys in SimpleHelp. Attackers can exploit the missing authorization control to escalate privileges to full server administrator access. This flaw is confirmed to be actively exploited and has publicly available exploit details.

Remediation: Immediately apply the latest security update from SimpleHelp to patch this vulnerability. If patches cannot be deployed immediately, restrict network access to SimpleHelp instances to only trusted IP addresses. Follow BOD 22-01 guidance for known exploited vulnerability mitigation.

Exploit info: This exploit has been publicly disclosed, with references to this issue documented in trusted public vulnerability databases. You may check Exploit-DB or GitHub for potential exploit details.

#5 SimpleHelp Path Traversal Vulnerability

CVE: CVE-2024-57728

CVSS: 7.2

Risk level: HIGH

Affected versions: cpe:2.3:a:simple-help:simplehelp:*:*:*:*:*:*:*:*

Summary: SimpleHelp contains a path traversal vulnerability that allows admin users to upload arbitrary files anywhere on the file system by uploading a crafted zip file (i.e. zip slip). This can be exploited to execute arbitrary code on the host in the context of the SimpleHelp server user.

Remediation: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Exploit info: No exploit-tagged NVD references in our cache; see the CISA KEV link below.

#6 Samsung MagicINFO 9 Server Path Traversal Vulnerability

CVE: CVE-2024-7399

CVSS: 8.8

Risk level: HIGH

Affected versions: Samsung MagicINFO 9 Server versions before the vendor's security update

Summary: This high-severity path traversal flaw impacts Samsung MagicINFO 9 Server, a common digital signage content management platform. Attackers can exploit the vulnerability to write arbitrary files with system-level privileges on the affected server. This can lead to full remote code execution and complete system compromise. Public exploit code is available for this issue.

Remediation: Apply the official security patch released by Samsung for MagicINFO 9 Server as soon as possible. Limit external network access to MagicINFO instances to only trusted business IP ranges. Follow CISA KEV guidance to prioritize remediation of this known exploited flaw.

Exploit info: This exploit has been publicly disclosed, with references to this issue documented in trusted public vulnerability databases. You may check Exploit-DB or GitHub for potential exploit details.

#7 D-Link DIR-823X Command Injection Vulnerability

CVE: CVE-2025-29635

CVSS: 7.2

Risk level: HIGH

Affected versions: All D-Link DIR-823X wireless router firmware versions

Summary: This command injection vulnerability impacts the D-Link DIR-823X wireless router. An authenticated attacker can send a malicious POST request to the router's management interface to execute arbitrary system commands. The affected product is likely end-of-life and will not receive an official security patch from D-Link.

Remediation: Replace end-of-life D-Link DIR-823X devices with a currently supported router model. If replacement is not immediate, disable public internet access to the router's management interface and restrict access only to trusted local networks. Follow CISA guidance for EOL device risk mitigation.

Exploit info: This exploit has been publicly disclosed, with references to this issue documented in trusted public vulnerability databases. You may check Exploit-DB or GitHub for potential exploit details.

#8 ConnectWise ScreenConnect Path Traversal Vulnerability

CVE: CVE-2024-1708

CVSS: 8.4

Risk level: HIGH

Affected versions: ConnectWise ScreenConnect versions before 23.9.7, 22.9.10, 21.9.6

Summary: This flaw exists in ConnectWise ScreenConnect, a widely used enterprise remote access and IT support tool. A path traversal vulnerability allows unauthenticated remote attackers to access files outside of the intended restricted file system path. Successful exploitation can lead to remote code execution, unauthorized access to sensitive organizational data, and full system compromise.

Remediation: Administrators should immediately apply the official security patches released by ConnectWise for all affected ScreenConnect instances. If patching cannot be done immediately, block public exposure of ScreenConnect instances and restrict access to only trusted internal IP addresses. Monitor affected systems for suspicious or unauthorized activity to detect potential exploitation attempts.

Exploit info: This exploit has been recorded in CISA KEV (CISA Known Exploited Vulnerabilities catalog, dateAdded 2026-04-28). You may check Exploit-DB or GitHub for potential exploit details.

#9 Microsoft Windows Protection Mechanism Failure Vulnerability

CVE: CVE-2026-32202

CVSS: 4.3

Risk level: HIGH

Affected versions: cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:arm64:* cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:arm64:* cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:arm64:* cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:arm64:* cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_11_25h2:*:*:*:*:*:*:arm64:* cpe:2.3:o:microsoft:windows_11_25h2:*:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_11_26h1:*:*:*:*:*:*:arm64:* cpe:2.3:o:microsoft:windows_11_26h1:*:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*

Summary: Microsoft Windows Shell contains a protection mechanism failure vulnerability that allows an unauthorized attacker to perform spoofing over a network.

Remediation: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Exploit info: Not available in our cache.