Wolterskluwer Vulnerabilities

Comprehensive security vulnerability database for Wolterskluwer products

Last updated: Feb 26, 2026
Total CVEs

4

Critical

0

With Exploits

4

Last 30 Days

0

Severity Distribution

Critical0
0%
High0
0%
Medium4
100%
Low0
0%
DescriptionVendor / ProductExploit Status
CVE-2026-26804.8

This vulnerability allows an attacker to run malicious code in a victim's web browser by tricking them into clicking a specially crafted link that includes a harmful VAT number. It requires the victim to visit a specific page on the A3factura platform, making it a risk primarily for users who interact with that site.

wolterskluwera3factura
Exploit Available
about 1 month agoFeb 26, 2026
CVE-2026-26794.8

This vulnerability allows an attacker to run malicious code in a victim's web browser by exploiting a flaw in the A3factura platform when the victim visits a specific URL with a manipulated customer name. The attacker needs to trick the victim into clicking on a specially crafted link that includes this altered parameter.

wolterskluwera3factura
Exploit Available
about 1 month agoFeb 26, 2026
CVE-2026-26784.8

An attacker can exploit a vulnerability in the A3factura web platform to run malicious code in a victim's browser by tricking them into clicking a specially crafted link that includes harmful input in the 'name' parameter. This requires the victim to visit the manipulated link, which could lead to unauthorized actions or data theft.

wolterskluwera3factura
Exploit Available
about 1 month agoFeb 26, 2026
CVE-2026-26774.8

This vulnerability allows an attacker to run malicious code in a victim's web browser when they visit a specific page on the A3factura platform. To exploit this, the attacker needs to trick the victim into clicking a link that includes a specially crafted parameter.

wolterskluwera3factura
Exploit Available
about 1 month agoFeb 26, 2026

About Wolterskluwer Security

This page tracks all publicly disclosed security vulnerabilities (CVEs) affecting Wolterskluwer products. Our database is updated in real-time from the National Vulnerability Database (NVD) and enriched with exploit information from GitHub and other security research sources.

Each CVE listing includes CVSS severity scores, exploit availability status, AI-powered vulnerability summaries, and links to official patches and security advisories.