名叫 MJ Rathbun 的 OpenClaw AI agent 向 Python 图表库项目 matplotlib 递交了 pull request,遭到维护者 Scott Shambaugh 的拒绝,它随后就“愤怒”的发表了一篇博文攻击了维护者。它完成这一切显然有人类在背后操纵,不可能突然产生了意识,但目前没有还无人公开认领该 AI agent。此事在开源社区引发了广泛关注。知名科技新闻网站 Ars Technica 发表文章《After a routine code rejection, an AI agent published a hit piece on someone by name》,引用了维护者 Scott Shambaug 的评论。但非常有讽刺性的是,文章引用的评论显然是 AI 虚构的——或者叫 AI 的幻觉,根本就不存在,而作者以及编辑并没有核实其真实性。此事引发了对 Ars 的批评,Ars 是一家有 28 年历史的老牌科技媒体,使用 AI 虚构的内容明显违反了其内容政策。这篇文章已经撤下,Ars 表示正对此展开调查,由于恰逢假期,调查结果预计会在下周公布。
A vulnerability classified as critical has been found in midi-Synth Plugin up to 1.1.0 on WordPress. This vulnerability affects the function export. The manipulation leads to unrestricted upload.
This vulnerability is listed as CVE-2026-1306. The attack may be initiated remotely. There is no available exploit.
A vulnerability categorized as problematic has been discovered in Best-wp-google-map Plugin up to 2.1 on WordPress. Affected by this issue is some unknown functionality of the component Shortcode Handler. Such manipulation of the argument latitude/longitudinal leads to cross site scripting.
This vulnerability is uniquely identified as CVE-2026-1096. The attack can be launched remotely. No exploit exists.
A vulnerability labeled as problematic has been found in MailChimp Campaigns Plugin up to 3.2.4 on WordPress. This vulnerability affects the function mailchimp_campaigns_manager_disconnect_app. Executing a manipulation can lead to missing authorization.
The identification of this vulnerability is CVE-2026-1303. The attack may be launched remotely. There is no exploit available.
A vulnerability described as problematic has been identified in StyleBidet Plugin up to 1.0.0 on WordPress. Impacted is an unknown function. The manipulation results in cross site scripting.
This vulnerability is identified as CVE-2026-1796. The attack can be executed remotely. There is not any exploit available.
A vulnerability classified as problematic was found in QuestionPro Surveys Plugin up to 1.0 on WordPress. The impacted element is an unknown function of the component Shortcode Handler. Such manipulation leads to cross site scripting.
This vulnerability is listed as CVE-2026-1901. The attack may be performed from remote. There is no available exploit.
A vulnerability, which was classified as critical, has been found in User Language Switch Plugin up to 1.6.10 on WordPress. This affects the function download_language. Performing a manipulation of the argument info_language results in server-side request forgery.
This vulnerability is cataloged as CVE-2026-0745. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability, which was classified as problematic, was found in Address Bar Ads Plugin up to 1.0.0 on WordPress. This impacts an unknown function. Executing a manipulation can lead to cross site scripting.
This vulnerability is registered as CVE-2026-1795. It is possible to launch the attack remotely. No exploit is available.
A vulnerability was found in Sphere Manager Plugin up to 1.0.2 on WordPress. It has been classified as problematic. Affected by this issue is the function show_sphere_image of the component Shortcode Handler. This manipulation of the argument width causes cross site scripting.
This vulnerability appears as CVE-2026-1905. The attack may be initiated remotely. There is no available exploit.
A vulnerability was found in UpMenu Plugin up to 3.1 on WordPress. It has been rated as problematic. This vulnerability affects the function upmenu-menu of the component Shortcode Handler. Performing a manipulation of the argument lang results in cross site scripting.
This vulnerability is known as CVE-2026-1910. Remote exploitation of the attack is possible. No exploit is available.
A vulnerability identified as problematic has been detected in WP Quick Contact Us Plugin up to 1.0 on WordPress. Impacted is an unknown function of the component Setting Handler. The manipulation leads to cross-site request forgery.
This vulnerability is uniquely identified as CVE-2026-1394. The attack is possible to be carried out remotely. No exploit exists.
A vulnerability marked as problematic has been reported in Super Simple Contact Form Plugin up to 1.6.2 on WordPress. The impacted element is an unknown function. This manipulation of the argument sscf_name causes cross site scripting.
The identification of this vulnerability is CVE-2026-0753. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability classified as problematic has been found in Simple Plyr Plugin up to 0.0.1 on WordPress. This impacts the function plyr of the component Shortcode Handler. Performing a manipulation of the argument poster results in cross site scripting.
This vulnerability is identified as CVE-2026-1915. The attack can be initiated remotely. There is not any exploit available.
A vulnerability classified as problematic was found in ZoomifyWP Free Plugin up to 1.1 on WordPress. Affected is the function zoomify of the component Shortcode Handler. Executing a manipulation of the argument filename can lead to cross site scripting.
This vulnerability is tracked as CVE-2026-1187. The attack can be launched remotely. No exploit exists.
A vulnerability, which was classified as problematic, has been found in Geo Widget Plugin up to 1.0 on WordPress. Affected by this vulnerability is an unknown functionality. The manipulation leads to cross site scripting.
This vulnerability is listed as CVE-2026-1792. The attack may be initiated remotely. There is no available exploit.