PatchDayAlert: 2026-04-23
PatchDayAlert

DAILY BRIEF · APRIL 23, 2026

Five fresh CVEs today, and the top one deserves your full attention. CVE-2026-41679 is an unauthenticated RCE in Paperclip scoring a perfect CVSS 10.0. No creds, no user interaction, just 6 API calls. It's not exploited in the wild yet, but the attack is trivially automatable, so expect scanners to light up fast. Below that: a WordPress plugin RCE, a Froxlor path traversal to code execution, and two CVSS 9.8s in a product that's been dead since 2008.

TOP THREAT TODAY

CVE-2026-41679

CRITICAL

10.0

CVSS

An unauthenticated attacker can get full remote code execution on any network-reachable Paperclip instance running the default 'authenticated' mode config. No credentials, no user interaction: just 6 API calls and the target's address. CVSS 10.0, and the attack is trivially automatable, so expect scanners to pick this up fast.

Who's affected: Anyone running Paperclip (Node.js/React AI agent platform) versions prior to 2026.416.0, especially instances exposed to the internet

 

Patch immediately. Upgrade Paperclip to version 2026.416.0 right now. If you can't upgrade immediately, pull the instance off the network until you can.

CVE-2026-39440 CVSS 9.9 CRITICAL

An attacker can inject and execute arbitrary code remotely through FunnelFormsPro, the WordPress plugin. This is a code injection bug with a CVSS of 9.9. All versions through 3.8.1 are vulnerable.

Affects: WordPress site owners and hosts running FunnelFormsPro plugin version 3.8.1 or earlier

 

Patch immediately. Update FunnelFormsPro to the latest patched version above 3.8.1 immediately. If no patch is available yet, deactivate and remove the plugin until one ships.

CVE-2026-41228 CVSS 9.9 CRITICAL

An authenticated Froxlor customer (not just admins) can set their language preference to a path traversal payload. Froxlor then blindly passes that value into a PHP 'require' call on the next request, which lets the attacker execute arbitrary PHP code as the web server user. This requires a valid customer account and the ability to upload a file to a known path, but the exploitation itself is straightforward once those conditions are met. CVSS 9.9.

Affects: Anyone running Froxlor server management panel versions prior to 2.3.6

 

Patch within 24 hours. Upgrade Froxlor to version 2.3.6. Review your customer accounts for any suspicious 'def_language' values in the database as a sign of prior exploitation.

CVE-2026-6887 CVSS 9.8 CRITICAL

Borg SPM 2007 has an unauthenticated SQL injection bug that lets a remote attacker read, modify, or delete anything in the database. No credentials needed. CVSS 9.8. This product's sales ended in 2008, so there will be no patch.

Affects: Anyone still running Borg SPM 2007 by BorG Technology Corporation

 

Patch immediately. Take Borg SPM 2007 offline permanently. This product is end-of-life since 2008 and will not receive a fix. Migrate to a supported alternative.

CVE-2026-6886 CVSS 9.8 CRITICAL

Borg SPM 2007 has an authentication bypass that lets any remote attacker log in as any user without credentials. CVSS 9.8. Combined with CVE-2026-6887 (SQL injection in the same product), this thing is completely wide open. No patch is coming since the product has been end-of-life since 2008.

Affects: Anyone still running Borg SPM 2007 by BorG Technology Corporation

 

Patch immediately. Decommission Borg SPM 2007 immediately. No fix will be released for this end-of-life product. If you absolutely cannot shut it down today, block all external access to it at the firewall level as a stopgap.

That's your patch day digest.

patchdayalert.com

Keep reading