The Week in Vulnerabilities: SharePoint, Fortinet, OpenClaw, and GPL Odorizers
![]()
Cyble Research & Intelligence Labs (CRIL) weekly vulnerability report tracked 1,675 vulnerabilities, last week, reflecting continued high disclosure volume across enterprise software, cloud services, and emerging AI ecosystems.
Of these, more than 205 vulnerabilities have publicly available Proof-of-Concept (PoC) exploits, significantly increasing the likelihood of exploitation and shortening attacker weaponization timelines.
Additionally, 2 vulnerabilities were actively discussed across underground forums and hidden communities, demonstrating continued adversarial focus on high-impact enterprise targets.
A total of 111 vulnerabilities were rated critical under CVSS v3.1, while 34 received critical severity under CVSS v4.0, underscoring the seriousness of newly disclosed issues.
Furthermore, CISA added 10 vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog, confirming active exploitation in the wild.
On the industrial side, CISA issued 3 ICS advisories covering 4 vulnerabilities, impacting Mitsubishi Electric, Contemporary Controls, Sedona Alliance, and GPL Odorizers.
Weekly Vulnerability Report’s Top Flaws
CVE-2026-32201 — Microsoft SharePoint Server (Critical)
CVE-2026-32201 is an actively exploited vulnerability affecting Microsoft SharePoint Server and was included in April 2026 Patch Tuesday disclosures.
Successful exploitation could allow attackers to compromise collaboration environments, access sensitive enterprise content, and establish persistent footholds inside corporate networks.
CVE-2026-21643 — Fortinet FortiClient EMS (Critical)
CVE-2026-21643 is a critical vulnerability affecting Fortinet FortiClient Endpoint Management Server (EMS).
Because EMS platforms centrally manage endpoints, successful exploitation can enable attackers to disrupt security operations, deploy malicious configurations, and gain broad enterprise access.
CVE-2026-35652 — OpenClaw AI Agent Framework (High)
CVE-2026-35652 is a high-severity authorization bypass vulnerability in OpenClaw, an open-source autonomous AI agent framework.
The flaw allows unauthorized external parties to manipulate the AI agent into executing restricted actions without proper authentication, creating risk of workflow abuse, credential exposure, and downstream compromise.
CVE-2026-27304 — Adobe ColdFusion (Critical)
CVE-2026-27304 is a critical improper input validation vulnerability in Adobe ColdFusion.
Attackers can exploit vulnerable web application environments to execute malicious actions, compromise servers, and move laterally through connected systems.
CVE-2026-29145 — Microsoft 365 Outlook Desktop Client (Critical)
CVE-2026-29145 affects Microsoft 365, specifically the Outlook desktop client.
Given Outlook’s role in enterprise communications, exploitation may enable phishing enhancement, malicious payload execution, or unauthorized access to user data.
Trending Exploitation Activity
CVE-2025-0520 — ShowDoc (Critical)
A remote code execution vulnerability in ShowDoc, a popular open-source IT documentation platform, saw a sharp rise in exploitation during April 2026. Attackers are reportedly targeting unpatched servers to deploy web shells and seize control of documentation environments.
CVE-2025-59528 — Flowise (Critical)
A remote code execution flaw in Flowise, a low-code platform for building AI agents and LLM workflows, has been linked to large-scale exploitation targeting more than 12,000 internet-exposed instances.
These cases reinforce the rapid expansion of the AI and developer tooling attack surface.
Vulnerabilities Added to CISA KEV
CISA expanded its KEV catalog with 10 newly listed vulnerabilities this week.
Notable additions include:
- CVE-2026-32201 — Microsoft SharePoint Server
- CVE-2026-21643 — Fortinet FortiClient EMS
- CVE-2026-1340 — Ivanti Endpoint Manager Mobile (EPMM)
The inclusion of collaboration tools, endpoint management systems, and mobile management platforms shows attackers are prioritizing centralized enterprise control layers.
Critical ICS Vulnerabilities
CISA issued 3 ICS advisories covering 4 vulnerabilities, with the majority falling into the high-severity category.
CVE-2025-13926 — Contemporary Controls BASControl20 (Critical)
This vulnerability affects a building automation controller widely deployed across energy facilities, manufacturing plants, and commercial buildings. With a CVSS score of 9.8 and no patch available because the product is obsolete, organizations face limited remediation options beyond replacement or network isolation.
Successful exploitation could allow attackers to manipulate physical systems, disrupt operations, or pivot deeper into OT networks.
CVE-2025-14815 / CVE-2025-14816 — Mitsubishi Electric Platforms (High)
These vulnerabilities expose sensitive configuration and authentication data in plaintext across multiple Mitsubishi Electric products.
An attacker with minimal access could harvest credentials and escalate privileges rapidly, broadening the impact of an initial compromise.
CVE-2026-4436 — GPL Odorizers (High)
A missing authentication flaw in GPL Odorizers could allow unauthorized access to critical functions in systems used within industrial environments.
Impacted Critical Infrastructure Sectors
Analysis of ICS disclosures shows:
- Critical Manufacturing was impacted in all reported cases
- Additional cross-sector exposure affected:
- Commercial Facilities
- Energy
This concentration highlights how industrial vulnerabilities can create cascading operational risk across interconnected sectors.
Conclusion
This week’s findings highlight several major trends:
- Continued high-volume vulnerability disclosures
- Active exploitation confirmed through KEV additions
- Rising attacks against AI frameworks and developer tooling
- Persistent weaknesses in industrial control environments
- Increased focus on centralized enterprise management systems
With 205+ public PoCs, active underground interest, and exploitable OT exposures, organizations face heightened risk across both IT and operational technology environments.
Key Recommendations
- Prioritize remediation of KEV-listed vulnerabilities immediately
- Patch externally exposed enterprise systems and collaboration platforms
- Secure AI agents, automation tools, and developer workflows
- Harden endpoint and mobile device management infrastructure
- Segment IT and OT environments to reduce lateral movement
- Replace or isolate obsolete industrial devices lacking patches
- Continuously monitor underground forums and threat intelligence feeds
- Conduct regular vulnerability assessments and penetration testing
Cyble’s attack surface management and vulnerability intelligence solutions help organizations identify exposed assets, prioritize remediation, and detect early indicators of compromise. By combining threat intelligence with proactive defense strategies, organizations can strengthen resilience across enterprise and critical infrastructure environments.
The post The Week in Vulnerabilities: SharePoint, Fortinet, OpenClaw, and GPL Odorizers appeared first on Cyble.




