PatchDay Alert: 2026-05-08
PatchDay Alert

DAILY BRIEF · MAY 8, 2026

Two criticals landed this morning, neither exploited in the wild yet, but both ugly enough to move on now. CVE-2026-31718 is a use-after-free in ksmbd, the in-kernel Linux SMB server, with a CVSS 9.8 and no auth required. Right behind it, CVE-2026-35428 is a command injection bug in Azure Cloud Shell at CVSS 9.6. Three more round out the list, all 7.x, all worth a look before the weekend.

TOP THREAT TODAY

CVE-2026-8083

HIGH

7.3

CVSS

An attacker can remotely inject SQL through the user-save endpoint in SourceCodester Pharmacy Sales and Inventory System 1.0. No authentication appears to be required, and a public exploit already exists. If you're running this app, anyone on the network can read or modify your database.

Who's affected: Anyone running SourceCodester Pharmacy Sales and Inventory System 1.0

 

Patch immediately. Take the application offline or block access to /ajax.php?action=save_user immediately, then apply a vendor patch or replace the software. There is no known official fix at this time, so restricting network access is your best short-term move.

NVD Ref 1 Ref 2

CVE-2026-31718 CVSS 9.8 EPSS 0.06% CRITICAL

A use-after-free bug in ksmbd (the in-kernel SMB server on Linux) lets a remote attacker potentially execute code or crash the system by triggering a race condition through durable file handle scavenging. CVSS 9.8 makes this critical. If you expose ksmbd to the network, an attacker may not need credentials to trigger it.

Affects: Linux sysadmins running ksmbd, especially Azure Linux 3.0 with kernel 6.6.137.1-2

 

Patch within 24 hours. Update to the patched Azure Linux 3.0 kernel package. If you can't patch right away, disable ksmbd and fall back to Samba's userspace smbd.

NVD MSRC

CVE-2026-35428 CVSS 9.6 CRITICAL

A command injection bug in Azure Cloud Shell lets an unauthenticated attacker spoof actions over the network. CVSS 9.6 puts this near the top of the severity scale. Microsoft hasn't published deep technical details yet, but the combination of command injection and no auth requirement makes this one to act on fast.

Affects: Teams using Azure Cloud Shell in their Azure tenants

 

Patch immediately. Check the Microsoft Security Response Center for an updated advisory and apply any available mitigation or service-side fix. Review Azure Cloud Shell activity logs for anomalous commands.

NVD Ref 1

CVE-2026-43869 CVSS 7.3 EPSS 0.03% HIGH

Apache Thrift's TSSLTransportFactory in Java doesn't properly verify hostnames during TLS connections. An attacker in a network position to intercept traffic (think man-in-the-middle) could impersonate a Thrift service endpoint without triggering a certificate error. This only matters if your Java services use Thrift's built-in TLS transport.

Affects: Java developers and sysadmins running services that use Apache Thrift's TLS transport, especially Azure Linux 3.0 with thrift 0.15.0-5

 

Patch this week. Update the Apache Thrift package to a version with the hostname verification fix. On Azure Linux 3.0, update via your package manager.

NVD MSRC

CVE-2026-33111 CVSS 7.5 HIGH

A command injection flaw in Copilot Chat within Microsoft Edge lets an unauthenticated attacker leak information over the network. CVSS 7.5 with an information disclosure impact. If your users rely on Edge's Copilot Chat, an attacker could potentially extract sensitive data from chat sessions or the browser context.

Affects: Anyone managing Microsoft Edge deployments with Copilot Chat enabled

 

Patch this week. Update Microsoft Edge to the latest version through Windows Update, WSUS, or your browser management tool. If you can't update quickly, consider disabling Copilot Chat via Edge group policy.

NVD Ref 1

Community Signal Check

PAN-OS User-ID Authentication Portal RCE exploited in the wild, no patch yet

CVE-2026-0300 (CVSS 9.3) is an unauthenticated buffer overflow in PAN-OS's User-ID Authentication Portal that gives attackers root. Attackers are already exploiting it in limited attacks, and Palo Alto doesn't expect a patch until May 13. If your Authentication Portal is internet-facing, restrict it to trusted zones or disable it now.

Palo Alto Networks / Wiz • active_exploitation

Ivanti EPMM zero-day CVE-2026-6973 exploited in limited attacks

Ivanti confirmed limited exploitation of CVE-2026-6973 (CVSS 7.2), an input validation bug in on-prem EPMM that lets an authenticated admin get RCE. Update to EPMM 12.6.1.1, 12.7.0.1, or 12.8.0.1. Cloud-hosted Ivanti Neurons for MDM is not affected.

Cyberscoop / Ivanti • active_exploitation

Linux kernel 'Copy Fail' bug CVE-2026-31431 exploited for root escalation

CVE-2026-31431 (CVSS 7.8) is a logic flaw in the Linux kernel's crypto subsystem that lets a local attacker escalate to root. Public exploit code works across most major distros shipped since 2017, and attackers are using it for container breakout in multi-tenant cloud setups. Patch your kernels and audit for unexpected privilege changes on shared infrastructure.

Unit 42 • active_exploitation

April 2026 Windows Server patches cause LSASS crashes and reboot loops on DCs

KB5082063 is bricking domain controllers. LSASS crashes after install, sending Server 2025 DCs into reboot loops. Microsoft shipped out-of-band fixes, so grab those before you roll the April cumulative to any DC.

BleepingComputer • broken_patch

That's your patch day digest.

patchdayalert.com

Keep reading