PatchDay Alert
Daily Digest · 3 min read · 5 CVEs · Issue 09 By PatchDay Alert

WordPress auth bypass in one GET request, plus RCE in Krayin CRM

CVE-2026-7567 (CVSS 9.8) lets anyone log into WordPress as a temporary user with a single crafted request. Krayin CRM's compose email function has RCE (CVSS 8.1), and the Pallets Click library has a command injection bug worth checking your Python tooling for.

Patch now
1
Within 24h
1
This week
3
Exploited
0
U SPEED N300 RouterNetwork ApplianceDbit N300 T1 ProKrayin CRMLinuxWindowsPallets ClickPythonMacOSWordPressTemporary Login Plugin

One ugly WordPress plugin bug sits at the top of today's list. CVE-2026-7567 is a CVSS 9.8 authentication bypass in the Temporary Login plugin that lets an unauthenticated attacker log in as any temporary user with a single crafted GET request. Not exploited in the wild yet, but the bar to exploit it is basically on the floor. Four more CVEs round out the day, including RCE in Krayin CRM and CSRF in two consumer routers.


Today's CVEs

Sorted by urgency

02

CVE-2026-36956

NVD
8.8
CVSS
Patch this week HIGH
Dbit N300 T1 ProNetwork Appliance

Same story, different router. The Dbit N300 T1 Pro V1.0.0 ships with no CSRF tokens or origin validation on its admin API. An attacker can trick a logged-in admin into visiting a crafted page that silently fires requests to endpoints like /api/setWlan, changing wireless settings or anything else the admin can do. No user interaction beyond visiting the malicious page is required.

Included because
prioritization factors: exploitation, exposure, prevalence, patch quality, and blast radius
Affected estate
Dbit N300 T1 Pro wireless router running firmware V1.0.0
How to check
Log into the router's web management page and verify the firmware version.
Action
Apply a firmware update if one exists. Otherwise, isolate the management interface from untrusted networks.
Urgency
Patch this week
Why it matters
A single malicious link can let an attacker reconfigure your wireless network and routing through an admin's session.
Source
NVD

Evidence trail

03

CVE-2026-36340

NVD
8.1
CVSS
Patch within 24h HIGH
Krayin CRMLinuxWindows

Krayin CRM v2.1.5 has a remote code execution bug in the compose email function. A remote attacker can run arbitrary code on your CRM server by exploiting this feature. The fix is in v2.1.6. Details are thin, but RCE in a CRM email function likely means a crafted email payload can break out of the application and hit the underlying OS.

Included because
prioritization factors: exploitation, exposure, prevalence, patch quality, and blast radius
Affected estate
Krayin CRM installations at version 2.1.5 or below
How to check
Check your Krayin CRM version in the admin dashboard or by running `composer show krayin/laravel-crm` in the project directory.
Action
Upgrade to Krayin CRM v2.1.6 using Composer or your deployment pipeline.
Urgency
Patch within 24 hours
Why it matters
An attacker with access to the email compose function can execute arbitrary code on the server hosting your CRM.
Source
NVD

Evidence trail

04

CVE-2026-7246

NVD
7.2
CVSS
Patch this week HIGH
Pallets ClickPythonLinuxWindowsMacOS

The Pallets Click library (versions 8.3.2 and below) has a command injection bug in the click.edit() function. An attacker with an unprivileged account on the system can pass OS commands through this function and get them executed. If any of your Python apps or internal tools use click.edit(), they're potentially a stepping stone to full system compromise.

Included because
prioritization factors: exploitation, exposure, prevalence, patch quality, and blast radius
Affected estate
Any Python application or tool using the Pallets Click library version 8.3.2 or below
How to check
Run `pip show click` or `pip list | grep click` in each relevant Python environment to check the installed version.
Action
Upgrade click to a patched version above 8.3.2 and test your applications.
Urgency
Patch this week
Why it matters
An unprivileged user can inject OS commands through click.edit(), potentially escalating to full system access.
Source
NVD

Evidence trail

05

CVE-2026-7567

NVD
9.8
CVSS
Patch now CRITICAL
WordPressTemporary Login PluginLinuxWindows

This is a nasty one. The Temporary Login WordPress plugin (v1.0.0 and below) has an authentication bypass that lets an unauthenticated attacker log in as any temporary user with a single crafted GET request. The bug is a type-juggling issue: sending the login token as an array instead of a string tricks the code into returning any user with a temporary login token. No credentials needed, no brute force, just one HTTP request.

Included because
prioritization factors: exploitation, exposure, prevalence, patch quality, and blast radius
Affected estate
WordPress sites with the Temporary Login plugin version 1.0.0 or earlier installed
How to check
In the WordPress admin panel, go to Plugins and check the version of 'Temporary Login.' Alternatively, check wp-content/plugins/temporary-login/ for the plugin version in the main PHP file header.
Action
Update to a patched version if available. If not, deactivate and remove the plugin immediately and delete all temporary login user accounts.
Urgency
Patch immediately
Why it matters
A single unauthenticated request can give an attacker full access to any temporary login account on your WordPress site, with no credentials required.
Source
NVD

Evidence trail


One email, every weekday morning.

You're in. Check your inbox.

Get the digest

Free. Weekday mornings. Plain English CVE triage.

Check your inbox to confirm.