CVD INFRASTRUCTURE

CVD Portal
Infrastructure
Framework

REGULATORY DEADLINE APPROACHING
REGULATORY TIMELINE

EU Cyber Resilience Act Compliance Roadmap

Nov 2024

CRA Published

Regulation (EU) 2024/2847 published in the Official Journal; enters into force 11 December 2024

Sept 2026

Art. 14 Enforcement Begins

Vulnerability reporting obligations apply to all products in scope

48h Acknowledgment (ISO/IEC 29147 · Art. 13 Best Practice)
24h Early Warning to Authorities (Art. 14, Actively Exploited / Severe Incidents Only)
72h Full Notification Report (Art. 14, Actively Exploited / Severe Incidents Only)
Dec 2027

Full Conformity Deadline

Design and production requirements (Annex I, CE marking) apply to new products placed on the market

REFERENCE
Official Journal of the European Union, 20 November 2024
SOLUTION ARCHITECTURE

Three Pillars of CRA CVD Compliance

A complete vulnerability disclosure infrastructure designed for economic operators subject to the Cyber Resilience Act.

Automated Disclosure

Dual-Track SLA Compliance

48-hour acknowledgment per CVD best practice (ISO/IEC 29147, Art. 13), plus mandatory 24-hour early warning and 72-hour full notification to authorities under Article 14 of the CRA.

48h Acknowledgment (ISO/IEC 29147 · Art. 13)
24h Authority Warning (Art. 14)
72h Full Report (Art. 14)
SPOC Portal

Single Point of Contact

A unified, branded vulnerability intake portal for your organization. Security researchers submit reports through a standardized, encrypted channel.

HTTPS Encrypted
Structured Intake
Audit-Ready Logs
Professional Coordination

ENISA-Aligned Triage

All submissions follow ENISA coordinated vulnerability disclosure (CVD) best practices with CVSS scoring, reporter communication, and mitigation tracking.

CVSS Scoring
Researcher Coordination
Mitigation Tracking
COMPLIANCE CHECKLIST

Are You CRA Ready?

Loading...

EU Vulnerability Database (EUVD) Pulse

Official feed of the latest critical and actively exploited vulnerabilities tracked by European authorities.

Latest Critical Vulnerabilities

CVSS 9.0+
EUVD-2026-22830CVSS 9.8

The WebStack theme for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the io_img_upload() function in all versions up to, and including, 1.2024. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.

4/15/2026WebStack
EUVD-2026-22806CVSS 10

OpenRemote is an open-source IoT platform. Versions 1.21.0 and below contain two interrelated expression injection vulnerabilities in the rules engine that allow arbitrary code execution on the server. The JavaScript rules engine executes user-supplied scripts via Nashorn's ScriptEngine.eval() without sandboxing, class filtering, or access restrictions, and the authorization check in RulesResourceImpl only restricts Groovy rules to superusers while leaving JavaScript rules unrestricted for any user with the write:rules role. Additionally, the Groovy rules engine has a GroovyDenyAllFilter security filter that is defined but never registered, as the registration code is commented out, rendering the SandboxTransformer ineffective for superuser-created Groovy rules. A non-superuser attacker with the write:rules role can create JavaScript rulesets that execute with full JVM access, enabling remote code execution as root, arbitrary file read, environment variable theft including database credentials, and complete multi-tenant isolation bypass to access data across all realms. This issue has been fixed in version 1.22.0.

4/14/2026openremote
EUVD-2026-22805CVSS 9.6

NuGet Gallery is a package repository that powers nuget.org. A security vulnerability exists in the NuGetGallery backend job’s handling of .nuspec files within NuGet packages. An attacker can supply a crafted nuspec file with malicious metadata, leading to cross package metadata injection that may result in remote code execution (RCE) and/or arbitrary blob writes due to insufficient input validation. The issue is exploitable via URI fragment injection using unsanitized package identifiers, allowing an attacker to control the resolved blob path. This enables writes to arbitrary blobs within the storage container, not limited to .nupkg files, resulting in potential tampering of existing content. This issue has been patched in commit 0e80f87628349207cdcaf55358491f8a6f1ca276.

4/14/2026NuGetGallery
EUVD-2026-17241CVSS 9.8

Kyverno has SSRF via CEL http.Get/http.Post in NamespacedValidatingPolicy allows cross-namespace data access

4/14/2026kyverno

Actively Exploited (KEV)

In the wild
EUVD-2026-5681CVSS 9.1

An improper neutralization of special elements used in an sql command ('sql injection') vulnerability in Fortinet FortiClientEMS 7.4.4 may allow an unauthenticated attacker to execute unauthorized code or commands via specifically crafted HTTP requests.

Exploited: 4/13/2026Fortinet
EUVD-2026-21675CVSS 8.6

Acrobat Reader versions 24.001.30356, 26.001.21367 and earlier are affected by an Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

Exploited: 4/13/2026Adobe
EUVD-2023-25697CVSS 8.8

Microsoft Exchange Server Remote Code Execution Vulnerability

Exploited: 4/13/2026Microsoft
EUVD-2023-40389CVSS 7.8

Windows Common Log File System Driver Elevation of Privilege Vulnerability

Exploited: 4/13/2026Microsoft
ISO 29147 Aligned
ISO 29147 Aligned
EU Hosted
EU Hosted
GDPR Compliant
GDPR Compliant
Secured by Cloudflare
Secured by Cloudflare
CSAF 2.0 Compatible
CSAF 2.0 Compatible

The Trusted CVD Platform for CRA Compliance

A definitive standard for economic operators to satisfy CRA Article 13 requirements out-of-the-box. Deploy your compliant portal in minutes.