<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[🔴 CVE-2026-7381 - Critical (9.1)]]></title><description><![CDATA[<p><img src="https://board.circlewithadot.net/assets/plugins/nodebb-plugin-emoji/emoji/android/1f534.png?v=28325c671da" class="not-responsive emoji emoji-android emoji--red_circle" style="height:23px;width:auto;vertical-align:middle" title="🔴" alt="🔴" /> CVE-2026-7381 - Critical (9.1)</p><p>Plack::Middleware::XSendfile versions through 1.0053 for Perl can allow client-controlled path rewriting.</p><p>Plack::Middleware::XSendfile allows the variation setting (sendfile type) to be set by the client via the X-Sendfile-Type header, if it is n...</p><p><img src="https://board.circlewithadot.net/assets/plugins/nodebb-plugin-emoji/emoji/android/1f517.png?v=28325c671da" class="not-responsive emoji emoji-android emoji--link" style="height:23px;width:auto;vertical-align:middle" title="🔗" alt="🔗" /> <a href="https://www.thehackerwire.com/vulnerability/CVE-2026-7381/" rel="nofollow noopener"><span>https://www.</span><span>thehackerwire.com/vulnerabilit</span><span>y/CVE-2026-7381/</span></a></p><p><a href="https://mastodon.social/tags/CVE" rel="tag">#<span>CVE</span></a> <a href="https://mastodon.social/tags/vulnerability" rel="tag">#<span>vulnerability</span></a> <a href="https://mastodon.social/tags/infosec" rel="tag">#<span>infosec</span></a> <a href="https://mastodon.social/tags/cybersecurity" rel="tag">#<span>cybersecurity</span></a> <a href="https://mastodon.social/tags/security" rel="tag">#<span>security</span></a> <a href="https://mastodon.social/tags/Tenda" rel="tag">#<span>Tenda</span></a> <a href="https://mastodon.social/tags/patchstack" rel="tag">#<span>patchstack</span></a></p>

<div class="row mt-3"><div class="col-12 mt-3"><img class="img-thumbnail" src="https://files.mastodon.social/media_attachments/files/116/495/430/764/955/946/original/fb323cfcf8951d82.jpg" alt="Link Preview Image" /></div></div>]]></description><link>https://board.circlewithadot.net/topic/738f3360-22c1-46b8-8663-774d1b385708/cve-2026-7381-critical-9.1</link><generator>RSS for Node</generator><lastBuildDate>Thu, 14 May 2026 23:37:08 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/topic/738f3360-22c1-46b8-8663-774d1b385708.rss" rel="self" type="application/rss+xml"/><pubDate>Thu, 30 Apr 2026 20:00:08 GMT</pubDate><ttl>60</ttl></channel></rss>