In partnership with

PatchDay Alert: 2026-05-07
PatchDay Alert

DAILY BRIEF · MAY 7, 2026

Five patches today, two that need your attention right now. Gotenberg has a CVSS 9.4 SSRF bug that lets unauthenticated attackers bypass its deny-list and hit your internal services, including cloud metadata endpoints. Right behind it, Apache HTTP Server has a double-free in mod_http2 (CVSS 8.8) that could hand an attacker remote code execution on any internet-facing instance.

TOP THREAT TODAY

CVE-2026-42786

HIGH

8.7

CVSS

EPSS 0.06%

An attacker can crash your Bandit-based Elixir/Erlang web server by sending crafted WebSocket continuation frames that pile up in memory without limit. No authentication needed. The server just keeps buffering until it runs out of RAM and dies.

Who's affected: Elixir developers and operators running Bandit as their HTTP server with WebSocket endpoints exposed to the internet

 

Patch this week. Upgrade the Bandit dependency to the patched version listed in the advisory and redeploy your application.

NVD Ref 1 Ref 2

CVE-2026-23918 CVSS 8.8 EPSS 0.06% HIGH

A double-free bug in Apache HTTP Server's HTTP/2 handling can be triggered when a client sends an early stream reset. This could lead to remote code execution. No authentication is required, and any internet-facing Apache instance with mod_http2 enabled is a target.

Affects: Anyone running Apache httpd 2.4.66 or earlier with HTTP/2 enabled, including Azure Linux 3.0 and CBL Mariner 2.0 operators

 

Patch within 24 hours. Update httpd to a version newer than 2.4.66 using your distro's package manager (e.g., `tdnf update httpd` on Azure Linux), then restart the service.

NVD MSRC

CVE-2026-43058 CVSS 7.1 EPSS 0.02% HIGH

A kernel bug in the vidtv virtual DVB driver passes structs by value incorrectly, causing uninitialized memory reads flagged by MSAN. Exploitation requires local access and use of the vidtv test driver, which most production systems never load.

Affects: Azure Linux 3.0 operators running kernel 6.6.134.1-2 who have the vidtv module loaded (uncommon outside testing environments)

 

Monitor and patch. Update the kernel package to the patched version via `tdnf update kernel` on your next maintenance window.

NVD MSRC Ref 1

CVE-2026-44503 CVSS 7.0 HIGH

Kiota's built-in HTTP redirect handler forwards Cookie and Proxy-Authorization headers when it follows a redirect to a different host. If your app talks to an external API that issues a cross-host redirect, those credentials leak to the second server. Exploitation requires a redirect scenario, but that's easy for an attacker who controls or compromises the target API.

Affects: Developers using Microsoft Kiota client libraries in Java, .NET, Python, TypeScript, or Go

 

Patch this week. Upgrade your Kiota HTTP or abstractions package to the latest fixed version in your language's package manager (Maven, NuGet, pip, npm, or Go modules) and rebuild.

NVD Ref 1 Ref 2

CVE-2026-42596 CVSS 9.4 CRITICAL

Gotenberg's downloadFrom and webhook features have a server-side request forgery (SSRF) bug that bypasses the default deny-list. An unauthenticated attacker can make your Gotenberg instance fetch internal URLs, potentially reaching cloud metadata endpoints, internal APIs, or other services behind your firewall. CVSS 9.4, so treat this seriously.

Affects: Anyone running Gotenberg v8 (the Go-based document conversion service), especially instances exposed to untrusted input or the internet

 

Patch immediately. Upgrade to the fixed version of Gotenberg v8 immediately and verify your deny-list configuration blocks internal/metadata endpoints.

NVD Ref 1 Ref 2

Community Signal Check

PAN-OS User-ID Portal: Unauthenticated RCE Exploited in the Wild (CVE-2026-0300)

Unauthenticated root-level RCE in the PAN-OS User-ID Authentication Portal, already exploited in the wild and on CISA's KEV list. Patches start rolling out May 13. Until then, restrict portal access to trusted zones or disable it entirely if you run PA-Series or VM-Series firewalls with the portal exposed to the internet.

Palo Alto Networks • active_exploitation

Weaver E-cology 10.0 RCE (CVE-2026-22679) Exploited Since March

Attackers are hitting an unauthenticated RCE in Weaver E-cology 10.0 (CVSS 9.8) through an exposed debug endpoint. Exploitation started just 5 days after the vendor shipped a fix back in March, so unpatched instances have been wide open for months. If you run E-cology, patch immediately and check for signs of compromise.

The Hacker News • active_exploitation

Linux Kernel Privilege Escalation (CVE-2026-31431) Added to CISA KEV

CISA added this 9-year-old local privilege escalation bug to KEV on May 3 after confirmed exploitation in the wild. A 732-byte PoC gives unprivileged users root via a logic flaw in the kernel crypto template. Update to kernel 6.18.22, 6.19.12, or 7.0 if you haven't already.

The Hacker News • active_exploitation

That's your patch day digest.

patchdayalert.com

Arnold Schwarzenegger has a newsletter.

Yeah. That Arnold Schwarzenegger.

So do Codie Sanchez, Scott Galloway, Colin & Samir, Shaan Puri, and Jay Shetty. And none of them are doing it for fun. They're doing it because a list you own compounds in ways that social media never will.

beehiiv is where they built it. You can start yours for 30% off your first 3 months with code PLATFORM30. Start building today.

Keep reading