Recent CVE entries
Stay updated about the Latest Security Vulnerabilities
Showing 108 CVEs published in the last 12 hours.
| CVE ID & CVSS | Description |
|---|---|
|
CVE-2025-13515
6.1 (Medium)
Show References |
The Nouri.sh Newsletter plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the `$_SERVER['PHP_SELF']` parameter in all versions up to, and including, 1.0.1.3 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Published: December 5, 2025; 7:16:11 AM UTC
9 minutes ago
|
|
|
|
CVE-2025-12850
7.5 (High)
Show References |
The My auctions allegro plugin for WordPress is vulnerable to SQL Injection via the ‘auction_id’ parameter in all versions up to, and including, 3.6.32 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
Published: December 5, 2025; 7:16:11 AM UTC
9 minutes ago
|
|
CVE-2025-12374
9.8 (Critical)
Show References |
The Email Verification, Email OTP, Block Spam Email, Passwordless login, Hide Login, Magic Login – User Verification plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 2.0.39. This is due to the plugin not properly validating that an OTP was generated before comparing it to user input in the "user_verification_form_wrap_process_otpLogin" function. This makes it possible for unauthenticated attackers to log in as any user with a verified email address, such as an administrator, by submitting an empty OTP value.
Published: December 5, 2025; 7:16:11 AM UTC
9 minutes ago
|
|
CVE-2025-12373
4.3 (Medium)
Show References |
The Torod – The smart shipping and delivery portal for e-shops and retailers plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.9. This is due to missing or incorrect nonce validation on the save_settings function. This makes it possible for unauthenticated attackers to modify plugin's settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Published: December 5, 2025; 7:16:10 AM UTC
9 minutes ago
|
|
CVE-2025-12355
5.3 (Medium)
Show References |
The Payaza plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'wp_ajax_nopriv_update_order_status' AJAX endpoint in all versions up to, and including, 0.3.8. This makes it possible for unauthenticated attackers to update order statuses.
Published: December 5, 2025; 7:16:10 AM UTC
9 minutes ago
|
|
CVE-2025-12354
4.3 (Medium)
Show References |
The Live CSS Preview plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'wp_ajax_frontend_save' AJAX endpoint in all versions up to, and including, 2.0.0. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update the plugin's css setting.
Published: December 5, 2025; 7:16:10 AM UTC
9 minutes ago
|
|
CVE-2025-12186
4.4 (Medium)
Show References |
The Weekly Planner plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 1.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
Published: December 5, 2025; 7:16:10 AM UTC
9 minutes ago
|
|
CVE-2025-12093
5.3 (Medium)
Show References |
The Voidek Employee Portal plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on several AJAX actions in all versions up to, and including, 1.0.6. This makes it possible for unauthenticated attackers to perform several actions like registering an account, deleting users, and modifying details within the employee portal.
Published: December 5, 2025; 7:16:08 AM UTC
9 minutes ago
|
|
CVE-2025-66270
4.7 (Medium)
Show References |
The KDE Connect protocol 8 before 2025-11-28 does not correlate device IDs across two packets. This affects KDE Connect before 25.12 on desktop, KDE Connect before 0.5.4 on iOS, KDE Connect before 1.34.4 on Android, GSConnect before 68, and Valent before 1.0.0.alpha.49.
Published: December 5, 2025; 6:16:09 AM UTC
1 hour ago
|
|
|
|
CVE-2025-32900
4.3 (Medium)
Show References |
In the KDE Connect information-exchange protocol before 2025-04-18, a packet can be crafted to temporarily change the displayed information about a device, because broadcast UDP is used. This affects KDE Connect before 1.33.0 on Android, KDE Connect before 25.04 on desktop, KDE Connect before 0.5 on iOS, Valent before 1.0.0.alpha.47, and GSConnect before 59.
Published: December 5, 2025; 6:16:08 AM UTC
1 hour ago
|
|
CVE-2025-13860
6.4 (Medium)
Show References |
The Easy Jump Links Menus plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the `h_tags` parameter in all versions up to, and including, 1.0.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Published: December 5, 2025; 6:16:08 AM UTC
1 hour ago
|
|
|
|
CVE-2025-13625
6.1 (Medium)
Show References |
The WP-SOS-Donate Donation Sidebar Plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the `$_SERVER['PHP_SELF']` parameter in all versions up to, and including, 0.9.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Published: December 5, 2025; 6:16:08 AM UTC
1 hour ago
|
|
|
|
CVE-2025-13623
6.1 (Medium)
Show References |
The Twitscription plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the admin.php PATH_INFO in all versions up to, and including, 0.1.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Published: December 5, 2025; 6:16:08 AM UTC
1 hour ago
|
|
|
|
CVE-2025-13622
6.1 (Medium)
Show References |
The Jabbernotification plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the admin.php PATH_INFO in all versions up to, and including, 0.99-RC2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Published: December 5, 2025; 6:16:08 AM UTC
1 hour ago
|
|
|
|
CVE-2025-13621
6.1 (Medium)
Show References |
The dream gallery plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0. This is due to missing or incorrect nonce validation on the 'dreampluginsmain' AJAX action. This makes it possible for unauthenticated attackers to update the plugin's settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Published: December 5, 2025; 6:16:08 AM UTC
1 hour ago
|
|
|
|
CVE-2025-13528
5.3 (Medium)
Show References |
The Feedback Modal for Website plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'handle_export' function in all versions up to, and including, 1.0.1. This makes it possible for unauthenticated attackers to export all feedback data in CSV or JSON format via the 'export_data' parameter.
Published: December 5, 2025; 6:16:07 AM UTC
1 hour ago
|
|
|
|
CVE-2025-13512
6.1 (Medium)
Show References |
The CoSign Single Signon plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the `$_SERVER['PHP_SELF']` parameter in all versions up to, and including, 0.3.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Published: December 5, 2025; 6:16:07 AM UTC
1 hour ago
|
|
|
|
CVE-2025-13360
4.3 (Medium)
Show References |
The Quantic Social Image Hover plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0.8. This is due to missing nonce validation on the settings update functionality. This makes it possible for unauthenticated attackers to update the plugin's settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Published: December 5, 2025; 6:16:07 AM UTC
1 hour ago
|
|
|
|
CVE-2025-13144
4.3 (Medium)
Show References |
The ContentStudio plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.3.7. This is due to missing or insufficient nonce validation on the add_cstu_settings function. This makes it possible for unauthenticated attackers to modify plugin settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Published: December 5, 2025; 6:16:07 AM UTC
1 hour ago
|
|
|
|
CVE-2025-12370
4.3 (Medium)
Show References |
The Takeads plugin for WordPress is vulnerable to authorization bypass in all versions up to, and including, 1.0.13. This is due to the plugin not properly verifying that a user is authorized to perform an action. This makes it possible for authenticated attackers, with subscriber-level access and above, to delete the plugin's configuration options.
Published: December 5, 2025; 6:16:07 AM UTC
1 hour ago
|
|
CVE-2025-12368
6.4 (Medium)
Show References |
The Sermon Manager plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the `sermon-views` shortcode in all versions up to, and including, 2.30.0. This is due to insufficient input sanitization and output escaping on user-supplied attributes. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Published: December 5, 2025; 6:16:07 AM UTC
1 hour ago
|
|
|
|
CVE-2025-12191
5.4 (Medium)
Show References |
The PDF Catalog for WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'pdfcatalog' AJAX action in all versions up to, and including, 1.1.18 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Subscriber-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Published: December 5, 2025; 6:16:06 AM UTC
1 hour ago
|
|
CVE-2025-12190
4.3 (Medium)
Show References |
The Image Optimizer by wps.sk plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.2.0. This is due to missing or incorrect nonce validation on the imagopby_ajax_optimize_gallery() function. This makes it possible for unauthenticated attackers to trigger bulk optimization via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Published: December 5, 2025; 6:16:06 AM UTC
1 hour ago
|
|
|
|
CVE-2025-12189
4.3 (Medium)
Show References |
The Bread & Butter: Gate content + Capture leads + Collect first-party data + Nurture with Ai agents plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 7.10.1321. This is due to missing or incorrect nonce validation on the uploadImage() function. This makes it possible for unauthenticated attackers to upload arbitrary files that make remote code execution possible via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Published: December 5, 2025; 6:16:06 AM UTC
1 hour ago
|
|
|
|
CVE-2025-12181
8.8 (High)
Show References |
The ContentStudio plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the cstu_update_post() function in all versions up to, and including, 1.3.7. This makes it possible for authenticated attackers, with Author-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.
Published: December 5, 2025; 6:16:06 AM UTC
1 hour ago
|
|
CVE-2025-12165
4.3 (Medium)
Show References |
The Webcake – Landing Page Builder plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'webcake_save_config' AJAX endpoint in all versions up to, and including, 1.1. This makes it possible for authenticated attackers, with Subscriber-level access and above, to modify the plugin's settings.
Published: December 5, 2025; 6:16:06 AM UTC
1 hour ago
|
|
CVE-2025-12163
6.4 (Medium)
Show References |
The Omnipress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 1.6.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file.
Published: December 5, 2025; 6:16:06 AM UTC
1 hour ago
|
|
|
|
CVE-2025-12154
8.8 (High)
Show References |
The Auto Thumbnailer plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the uploadThumb() function in all versions up to, and including, 1.0. This makes it possible for authenticated attackers, with Contributor-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.
Published: December 5, 2025; 6:16:05 AM UTC
1 hour ago
|
|
CVE-2025-12153
8.8 (High)
Show References |
The Featured Image via URL plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation function in all versions up to, and including, 0.1. This makes it possible for authenticated attackers, with Contributor-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.
Published: December 5, 2025; 6:16:05 AM UTC
1 hour ago
|
|
CVE-2025-12133
4.3 (Medium)
Show References |
The EPROLO Dropshipping plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the wp_ajax_eprolo_delete_tracking and wp_ajax_eprolo_save_tracking_data AJAX endpoints in all versions up to, and including, 2.3.1. This makes it possible for authenticated attackers, with Subscriber-level access and above, to modify and delete tracking data.
Published: December 5, 2025; 6:16:05 AM UTC
1 hour ago
|
|
CVE-2025-12128
4.3 (Medium)
Show References |
The Hide Categories Or Products On Shop Page plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0.7. This is due to missing or incorrect nonce validation on the save_data_hcps() function. This makes it possible for unauthenticated attackers to update the plugin's settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Published: December 5, 2025; 6:16:05 AM UTC
1 hour ago
|
|
CVE-2025-12124
4.4 (Medium)
Show References |
The FitVids for WordPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 4.0.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
Published: December 5, 2025; 6:16:05 AM UTC
1 hour ago
|
|
CVE-2025-10055
4.3 (Medium)
Show References |
The Time Sheets plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.1.3. This is due to missing or incorrect nonce validation on several endpoints. This makes it possible for unauthenticated attackers to perform a variety of actions via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Published: December 5, 2025; 6:16:05 AM UTC
1 hour ago
|
|
CVE-2016-20023
5 (Medium)
Show References |
In CKSource CKFinder before 2.5.0.1 for ASP.NET, authenticated users could download any file from the server if the correct path to a file was provided.
Published: December 5, 2025; 6:16:03 AM UTC
1 hour ago
|
|
CVE-2025-32901
4.3 (Medium)
Show References |
In KDE Connect before 1.33.0 on Android, malicious device IDs (sent via broadcast UDP) could cause an application crash.
Published: December 5, 2025; 5:17:02 AM UTC
2 hours ago
|
|
CVE-2025-32899
4.3 (Medium)
Show References |
In KDE Connect before 1.33.0 on Android, a packet can be crafted that causes two paired devices to unpair. Specifically, it is an invalid discovery packet sent over broadcast UDP.
Published: December 5, 2025; 5:16:59 AM UTC
2 hours ago
|
|
CVE-2025-32898
4.7 (Medium)
Show References |
The KDE Connect verification-code protocol before 2025-04-18 uses only 8 characters and therefore allows brute-force attacks. This affects KDE Connect before 1.33.0 on Android, KDE Connect before 25.04 on desktop, KDE Connect before 0.5 on iOS, Valent before 1.0.0.alpha.47, and GSConnect before 59.
Published: December 5, 2025; 5:16:58 AM UTC
2 hours ago
|
|
CVE-2025-13494
5.3 (Medium)
Show References |
The SSP Debug plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.0.0. This is due to the plugin storing PHP error logs in a predictable, web-accessible location (wp-content/uploads/ssp-debug/ssp-debug.log) without any access controls. This makes it possible for unauthenticated attackers to view sensitive debugging information including full URLs, client IP addresses, User-Agent strings, WordPress user IDs, and internal filesystem paths.
Published: December 5, 2025; 5:16:58 AM UTC
2 hours ago
|
|
|
|
CVE-2025-13362
4.3 (Medium)
Show References |
The Norby AI plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0.3. This is due to missing nonce validation on the settings update functionality. This makes it possible for unauthenticated attackers to update the plugin's settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Published: December 5, 2025; 5:16:58 AM UTC
2 hours ago
|
|
|
|
CVE-2025-13313
9.8 (Critical)
Show References |
The CRM Memberships plugin for WordPress is vulnerable to privilege escalation via password reset in all versions up to, and including, 2.5. This is due to missing authorization and authentication checks on the `ntzcrm_changepassword` AJAX action. This makes it possible for unauthenticated attackers to reset arbitrary user passwords and gain unauthorized access to user accounts via the `ntzcrm_changepassword` endpoint, granted they can obtain or enumerate a target user's email address. The plugin also exposes the `ntzcrm_get_users` endpoint without authentication, allowing attackers to enumerate subscriber email addresses, facilitating the exploitation of the password reset vulnerability.
Published: December 5, 2025; 5:16:57 AM UTC
2 hours ago
|
|
|
|
CVE-2025-13312
5.3 (Medium)
Show References |
The CRM Memberships plugin for WordPress is vulnerable to unauthorized membership tag creation due to a missing capability check on the 'ntzcrm_add_new_tag' function in all versions up to, and including, 2.5. This makes it possible for unauthenticated attackers to create arbitrary membership tags and modify CRM configuration that should be restricted to administrators.
Published: December 5, 2025; 5:16:57 AM UTC
2 hours ago
|
|
|
|
CVE-2025-13006
5.3 (Medium)
Show References |
The SurveyFunnel – Survey Plugin for WordPress plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.1.5 via several unprotected /wp-json/surveyfunnel/v2/ REST API endpoints. This makes it possible for unauthenticated attackers to extract sensitive data from survey responses.
Published: December 5, 2025; 5:16:56 AM UTC
2 hours ago
|
|
|
|
CVE-2025-12417
6.4 (Medium)
Show References |
The SurveyFunnel – Survey Plugin for WordPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'surveyfunnel_lite_survey' shortcode in all versions up to, and including, 1.1.5 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Published: December 5, 2025; 5:16:55 AM UTC
2 hours ago
|
|
|
|
CVE-2025-27389
5.1 (Medium)
Show References |
A flaw exists in the verification of application installation sources within ColorOS. Under specific conditions, this issue may cause the risk detection mechanism to fail, which could allow malicious applications to be installed without proper warning.
Published: December 5, 2025; 4:16:00 AM UTC
3 hours ago
|
|
CVE-2025-13066
8.8 (High)
Show References |
The Demo Importer Plus plugin for WordPress is vulnerable to arbitrary file upload in all versions up to, and including, 2.0.6. This is due to insufficient file type validation detecting WXR files, allowing double extension files to bypass sanitization while being accepted as a valid WXR file. This makes it possible for authenticated attackers, with author-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.
Published: December 5, 2025; 4:15:59 AM UTC
3 hours ago
|
|
CVE-2025-12804
6.4 (Medium)
Show References |
The Booking Calendar plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin 'bookingcalendar' shortcode in all versions up to, and including, 10.14.6 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Published: December 5, 2025; 3:15:56 AM UTC
4 hours ago
|
|
CVE-2025-11759
4.3 (Medium)
Show References |
The Backup, Restore and Migrate your sites with XCloner plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 4.8.2. This is due to missing or incorrect nonce validation on the Xcloner_Remote_Storage:save() function. This makes it possible for unauthenticated attackers to add or modify an FTP backup configuration via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. Successful exploitation allows an attacker to set an attacker-controlled FTP site for backup storage and exfiltrate potentially sensitive site data.
Published: December 5, 2025; 3:15:56 AM UTC
4 hours ago
|
|
CVE-2025-62223
4.3 (Medium)
Show References |
User interface (ui) misrepresentation of critical information in Microsoft Edge for iOS allows an unauthorized attacker to perform spoofing over a network.
Published: December 5, 2025; 1:15:48 AM UTC
6 hours ago
|
|
CVE-2025-14052
5.3 (Medium)
Show References |
A vulnerability has been found in youlaitech youlai-mall 1.0.0/2.0.0. Affected by this vulnerability is the function getMemberById of the file /mall-ums/app-api/v1/members/. The manipulation of the argument memberId leads to improper access controls. The attack is possible to be carried out remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Published: December 5, 2025; 12:15:48 AM UTC
7 hours ago
|
|
CVE-2025-66564
7.5 (High)
Show References |
Sigstore Timestamp Authority is a service for issuing RFC 3161 timestamps. Prior to 2.0.3, Function api.ParseJSONRequest currently splits (via a call to strings.Split) an optionally-provided OID (which is untrusted data) on periods. Similarly, function api.getContentType splits the Content-Type header (which is also untrusted data) on an application string. As a result, in the face of a malicious request with either an excessively long OID in the payload containing many period characters or a malformed Content-Type header, a call to api.ParseJSONRequest or api.getContentType incurs allocations of O(n) bytes (where n stands for the length of the function's argument). This vulnerability is fixed in 2.0.3.
Published: December 4, 2025; 11:15:47 PM UTC
8 hours ago
|
|
CVE-2025-66563
7.1 (High)
Show References |
Monkeytype is a minimalistic and customizable typing test. In 25.49.0 and earlier, there is improper handling of user input which allows an attacker to execute malicious javascript on anyone viewing a malicious quote submission. quote.text and quote.source are user input, and they're inserted straight into the DOM. If they contain HTML tags, they will be rendered (after some escaping using quotes and textarea tags).
Published: December 4, 2025; 11:15:47 PM UTC
8 hours ago
|
|
CVE-2025-66561
7.3 (High)
Show References |
SysReptor is a fully customizable pentest reporting platform. Prior to 2025.102, there is a Stored Cross-Site Scripting (XSS) vulnerability allows authenticated users to execute malicious JavaScript in the context of other logged-in users by uploading malicious JavaScript files in the web UI. This vulnerability is fixed in 2025.102.
Published: December 4, 2025; 11:15:47 PM UTC
8 hours ago
|
|
CVE-2025-66559
8 (High)
Show References |
Taiko Alethia is an Ethereum-equivalent, permissionless, based rollup designed to scale Ethereum without compromising its fundamental properties. In 2.3.1 and earlier, TaikoInbox._verifyBatches (packages/protocol/contracts/layer1/based/TaikoInbox.sol:627-678) advanced the local tid to whatever transition matched the current blockHash before knowing whether that batch would actually be verified. When the loop later broke (e.g., cooldown window not yet passed or transition invalidated), the function still wrote that newer tid into batches[lastVerifiedBatchId].verifiedTransitionId after decrementing batchId. Result: the last verified batch could end up pointing at a transition index from the next batch (often zeroed), corrupting the verified chain pointer.
Published: December 4, 2025; 11:15:46 PM UTC
8 hours ago
|
|
CVE-2025-14051
5.3 (Medium)
Show References |
A flaw has been found in youlaitech youlai-mall 1.0.0/2.0.0. Affected is the function getById/updateAddress/deleteAddress of the file /mall-ums/app-api/v1/addresses/. Executing manipulation can lead to improper control of dynamically-identified variables. The attack can be executed remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Published: December 4, 2025; 11:15:46 PM UTC
8 hours ago
|
|
CVE-2025-13373
8.7 (High)
Show References |
Advantech iView versions 5.7.05.7057 and prior do not properly sanitize SNMP v1 trap (Port 162) requests, which could allow an attacker to inject SQL commands.
Published: December 4, 2025; 11:15:46 PM UTC
8 hours ago
|
|
CVE-2025-6946
4.8 (Medium)
Show References |
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in WatchGuard Fireware OS allows Stored XSS via the IPS module. This vulnerability requires an authenticated administrator session to a locally managed Firebox.
This issue affects Firebox: from 12.0 through 12.11.2.
Published: December 4, 2025; 10:15:49 PM UTC
9 hours ago
|
|
CVE-2025-66509
8.9 (High)
Show References |
LaraDashboard is an all-In-one solution to start a Laravel Application. In 2.3.0 and earlier, the password reset flow trusts the Host header, allowing attackers to redirect the administrator’s reset token to an attacker-controlled server. This can be combined with the module installation process to automatically execute the ServiceProvider::boot() method, enabling arbitrary PHP code execution.
Published: December 4, 2025; 10:15:49 PM UTC
9 hours ago
|
|
CVE-2025-66506
7.5 (High)
Show References |
Fulcio is a free-to-use certificate authority for issuing code signing certificates for an OpenID Connect (OIDC) identity. Prior to 1.8.3, function identity.extractIssuerURL splits (via a call to strings.Split) its argument (which is untrusted data) on periods. As a result, in the face of a malicious request with an (invalid) OIDC identity token in the payload containing many period characters, a call to extractIssuerURL incurs allocations to the tune of O(n) bytes (where n stands for the length of the function's argument), with a constant factor of about 16. This vulnerability is fixed in 1.8.3.
Published: December 4, 2025; 10:15:49 PM UTC
9 hours ago
|
|
CVE-2025-66238
7.4 (High)
Show References |
DCIM dcTrack allows an attacker to misuse certain remote access features. An authenticated user with access to the appliance's virtual console could exploit these features to redirect network traffic, potentially accessing restricted services or data on the host machine.
Published: December 4, 2025; 10:15:49 PM UTC
9 hours ago
|
|
CVE-2025-65900
N/A (Info)
Show References |
Kalmia CMS version 0.2.0 contains an Incorrect Access Control vulnerability in the /kal-api/auth/users API endpoint. Due to insufficient permission validation and excessive data exposure in the backend, an authenticated user with basic read permissions can retrieve sensitive information for all platform users.
Published: December 4, 2025; 10:15:49 PM UTC
9 hours ago
|
|
CVE-2025-65899
N/A (Info)
Show References |
Kalmia CMS version 0.2.0 contains a user enumeration vulnerability in its authentication mechanism. The application returns different error messages for invalid users (user_not_found) versus valid users with incorrect passwords (invalid_password). This observable response discrepancy allows unauthenticated attackers to enumerate valid usernames on the system.
Published: December 4, 2025; 10:15:48 PM UTC
9 hours ago
|
|
CVE-2025-53704
8.7 (High)
Show References |
The password reset mechanism for the Pivot client application is weak, and it may allow an attacker to take over the account.
Published: December 4, 2025; 10:15:48 PM UTC
9 hours ago
|
|
CVE-2025-1910
6.3 (Medium)
Show References |
The WatchGuard Mobile VPN with SSL Client on Windows allows a locally
authenticated non-administrative Windows user to escalate their
privileges to NT AUTHORITY/SYSTEM on the Windows machine where the VPN
Client is installed.This issue affects the Mobile VPN with SSL Client 12.0 up to and including 12.11.2.
Published: December 4, 2025; 10:15:48 PM UTC
9 hours ago
|
|
CVE-2025-1547
7.5 (High)
Show References |
A stack-based buffer overflow vulnerability [CWE-121] in WatchGuard Fireware OS's certificate request command could allow an authenticated privileged user to execute arbitrary code via specially crafted CLI commands.This issue affects Fireware OS: from 12.0 through 12.5.12+701324, from 12.6 through 12.11.2.
Published: December 4, 2025; 10:15:48 PM UTC
9 hours ago
|
|
CVE-2025-1545
8.2 (High)
Show References |
An XPath Injection vulnerability in WatchGuard Fireware OS may allow a remote unauthenticated attacker to retrieve sensitive information from the Firebox configuration through an exposed authentication or management web interface. This vulnerability only affects Firebox systems that have at least one authentication hotspot configured.This issue affects Fireware OS 11.11 up to and including 11.12.4+541730, 12.0 up to and including 12.11.4, 12.5 up to and including 12.5.13, and 2025.1 up to and including 2025.1.2.
Published: December 4, 2025; 10:15:48 PM UTC
9 hours ago
|
|
CVE-2025-13940
6.7 (Medium)
Show References |
An Expected Behavior Violation [CWE-440] vulnerability in WatchGuard Fireware OS may allow an attacker to bypass the Fireware OS boot time system integrity check and prevent the Firebox from shutting down in the event of a system integrity check failure. The on-demand system integrity check in the Fireware Web UI will correctly show a failed system integrity check message in the event of a failure.This issue affects Fireware OS: from 12.8.1 through 12.11.4, from 2025.1 through 2025.1.2.
Published: December 4, 2025; 10:15:48 PM UTC
9 hours ago
|
|
CVE-2025-13939
4.8 (Medium)
Show References |
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in WatchGuard Fireware OS (Gateway Wireless Controller module) allows Stored XSS.This issue affects Fireware OS 11.7.2 up to and including 11.12.4+541730, 12.0 up to and including 12.11.4, 12.5 up to and including 12.5.13, and 2025.1 up to and including 2025.1.2.
Published: December 4, 2025; 10:15:48 PM UTC
9 hours ago
|
|
CVE-2025-13938
4.8 (Medium)
Show References |
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in WatchGuard Fireware OS (Autotask Technology Integration module) allows Stored XSS.This issue affects Fireware OS 12.4 up to and including 12.11.4, 12.5 up to and including 12.5.13, and 2025.1 up to and including 2025.1.2.
Published: December 4, 2025; 10:15:47 PM UTC
9 hours ago
|
|
CVE-2025-13937
4.8 (Medium)
Show References |
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in WatchGuard Fireware OS (ConnectWise Technology Integration module) allows Stored XSS.This issue affects Fireware OS 12.4 up to and including 12.11.4, 12.5 up to and including 12.5.13, and 2025.1 up to and including 2025.1.2.
Published: December 4, 2025; 10:15:47 PM UTC
9 hours ago
|
|
CVE-2025-13936
4.8 (Medium)
Show References |
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in WatchGuard Fireware OS (Tigerpaw Technology Integration module) allows Stored XSS.This issue affects Fireware OS 12.4 up to and including 12.11.4, 12.5 up to and including 12.5.13, and 2025.1 up to and including 2025.1.2.
Published: December 4, 2025; 10:15:47 PM UTC
9 hours ago
|
|
CVE-2025-13932
8.3 (High)
Show References |
The SolisCloud API suffers from a Broken Access Control vulnerability, specifically an Insecure Direct Object Reference (IDOR), where any authenticated user can access detailed data of any plant by altering the plant_id in the request.
Published: December 4, 2025; 10:15:47 PM UTC
9 hours ago
|
|
CVE-2025-12986
6 (Medium)
Show References |
When a WF200/WGM160P device is configured to operate as an Access Point, it may be vulnerable to a denial of service triggered by a malformed packet. The device may recover automatically or require a hard reset.
Published: December 4, 2025; 10:15:47 PM UTC
9 hours ago
|
|
CVE-2025-12196
8.6 (High)
Show References |
An Out-of-bounds Write vulnerability in WatchGuard Fireware OS's CLI could allow an authenticated privileged user to execute arbitrary code via a specially crafted CLI command.This vulnerability affects Fireware OS 12.0 up to and including 12.11.4, 12.5 up to and including 12.5.13, and 2025.1 up to and including 2025.1.2.
Published: December 4, 2025; 10:15:47 PM UTC
9 hours ago
|
|
CVE-2025-12195
8.6 (High)
Show References |
An Out-of-bounds Write vulnerability in WatchGuard Fireware OS's CLI could allow an authenticated privileged user to execute arbitrary code via specially crafted IPSec configuration CLI commands.This vulnerability affects Fireware OS 11.0 up to and including 11.12.4+541730, 12.0 up to and including 12.11.4, 12.5 up to and including 12.5.13, and 2025.1 up to and including 2025.1.2.
Published: December 4, 2025; 10:15:46 PM UTC
9 hours ago
|
|
CVE-2025-12026
8.6 (High)
Show References |
An Out-of-bounds Write vulnerability in WatchGuard Fireware OS’s certificate request command could allow an authenticated privileged user to execute arbitrary code via specially crafted CLI commands.This vulnerability affects Fireware OS 12.0 up to and including 12.11.4, 12.5 up to and including 12.5.13, and 2025.1 up to and including 2025.1.2.
Published: December 4, 2025; 10:15:46 PM UTC
9 hours ago
|
|
CVE-2025-11838
8.7 (High)
Show References |
A memory corruption vulnerability in WatchGuard Fireware OS may allow an unauthenticated attacker to trigger a Denial of Service (DoS) condition in the Mobile User VPN with IKEv2 and the Branch Office VPN using IKEv2 when configured with a dynamic gateway peer.
This vulnerability affects Fireware OS 12.0 up to and including 12.11.4 and 2025.1 up to and including 2025.1.2.
Published: December 4, 2025; 10:15:46 PM UTC
9 hours ago
|
|
CVE-2025-10285
7.4 (High)
Show References |
The web interface of the Silicon Labs Simplicity Device Manager is exposed publicly and can be used to extract the NTLMv2 hash which an attacker could use to crack the user's domain password.
Published: December 4, 2025; 10:15:45 PM UTC
9 hours ago
|
|
CVE-2025-66576
8.9 (High)
Show References |
Remote Keyboard Desktop 1.0.1 enables remote attackers to execute system commands via the rundll32.exe exported function export, allowing unauthenticated code execution.
Published: December 4, 2025; 9:16:10 PM UTC
10 hours ago
|
|
CVE-2025-66575
8.5 (High)
Show References |
VeeVPN 1.6.1 contains an unquoted service path vulnerability in the VeePNService that allows remote attackers to execute code during startup or reboot with escalated privileges. Attackers can exploit this by providing a malicious service name, allowing them to inject commands and run as LocalSystem.
Published: December 4, 2025; 9:16:10 PM UTC
10 hours ago
|
|
CVE-2025-66574
5.3 (Medium)
Show References |
TranzAxis 3.2.41.10.26 allows authenticated users to inject cross-site scripting via the `Open Object in Tree` endpoint, allowing attackers to steal session cookies and potentially escalate privileges.
Published: December 4, 2025; 9:16:10 PM UTC
10 hours ago
|
|
CVE-2025-66573
6.9 (Medium)
Show References |
Solstice Pod API (version 5.5, 6.2) contains an unauthenticated API endpoint (`/api/config`) that exposes sensitive information such as the session key, server version, product details, and display name. Unauthorized users can extract live session information by accessing this endpoint without authentication.
Published: December 4, 2025; 9:16:10 PM UTC
10 hours ago
|
|
CVE-2025-66572
6.9 (Medium)
Show References |
Loaded Commerce 6.6 contains a client-side template injection vulnerability that allows unauthenticated attackers to execute code on the server via the search parameter.
Published: December 4, 2025; 9:16:09 PM UTC
10 hours ago
|
|
CVE-2025-66571
9.3 (Critical)
Show References |
UNA CMS versions 9.0.0-RC1 - 14.0.0-RC4 contain a PHP object injection vulnerability in BxBaseMenuSetAclLevel.php where the profile_id POST parameter is passed to PHP unserialize() without proper handling, allowing remote, unauthenticated attackers to inject arbitrary PHP objects and potentially write and execute arbitrary PHP code.
Published: December 4, 2025; 9:16:09 PM UTC
10 hours ago
|
|
CVE-2025-66555
8.8 (High)
Show References |
AirKeyboard iOS App 1.0.5 contains a missing authentication vulnerability that allows unauthenticated attackers to type arbitrary keystrokes directly into the victim's iOS device in real-time without user interaction, resulting in full remote input control.
Published: December 4, 2025; 9:16:09 PM UTC
10 hours ago
|
|
CVE-2025-66479
1.8 (Low)
Show References |
Anthropic Sandbox Runtime is a lightweight sandboxing tool for enforcing filesystem and network restrictions on arbitrary processes at the OS level, without requiring a container. Prior to 0.0.16, due to a bug in sandboxing logic, sandbox-runtime did not properly enforce a network sandbox if the sandbox policy did not configure any allowed domains. This could allow sandboxed code to make network requests outside of the sandbox. A patch for this was released in v0.0.16.
Published: December 4, 2025; 9:16:09 PM UTC
10 hours ago
|
|
CVE-2025-66237
8.4 (High)
Show References |
DCIM dcTrack platforms utilize default and hard-coded credentials for access. An attacker could use these credentials to administer the database, escalate privileges on the platform or execute system commands on the host.
Published: December 4, 2025; 9:16:09 PM UTC
10 hours ago
|
|
CVE-2025-65959
8.7 (High)
Show References |
Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.6.37, a Stored XSS vulnerability was discovered in Open-WebUI's Notes PDF download functionality. An attacker can import a Markdown file containing malicious SVG tags into Notes, allowing them to execute arbitrary JavaScript code and steal session tokens when a victim downloads the note as PDF. This vulnerability can be exploited by any authenticated user, and unauthenticated external attackers can steal session tokens from users (both admin and regular users) by sharing specially crafted markdown files. This vulnerability is fixed in 0.6.37.
Published: December 4, 2025; 9:16:08 PM UTC
10 hours ago
|
|
CVE-2025-63896
N/A (Info)
Show References |
An issue in the Bluetooth Human Interface Device (HID) of JXL 9 Inch Car Android Double Din Player Android v12.0 allows attackers to inject arbitrary keystrokes via a spoofed Bluetooth HID device.
Published: December 4, 2025; 9:16:08 PM UTC
10 hours ago
|
|
CVE-2025-55948
N/A (Info)
Show References |
This vulnerability fundamentally arises from yzcheng90 X-SpringBoot 6.0's implementation of role-based access control (RBAC) through dual dependency on frontend menu systems and backend permission tables, without enforcing atomic synchronization between these components. The critical flaw manifests when frontend menu updates (such as privilege revocation) fail to propagate to the backend permission table in real-time, creating a dangerous desynchronization. While users lose access to restricted functions through the web interface (as UI elements properly disappear), the stale permission records still validate unauthorized API requests when accessed directly through tools like Postman. Attackers exploiting this inconsistency can perform privileged operations including but not limited to: creating high-permission user accounts, accessing sensitive data beyond their clearance level, and executing admin-level commands.
Published: December 4, 2025; 9:16:08 PM UTC
10 hours ago
|
|
CVE-2025-27935
8.6 (High)
Show References |
The OTP Integration Kit for PingFederate fails to enforce HTTP method validation and state validation properly. The server advances the authentication state without verifying the OTP, thereby bypassing multi-factor authentication.
Published: December 4, 2025; 9:16:08 PM UTC
10 hours ago
|
|
CVE-2025-13543
8.8 (High)
Show References |
The PostGallery plugin for WordPress is vulnerable to arbitrary file uploads due to incorrect file type validation in the 'PostGalleryUploader' class functions in all versions up to, and including, 1.12.5. This makes it possible for authenticated attackers, with subscriber-level and above permissions, to upload arbitrary files on the affected site's server which may make remote code execution possible.
Published: December 4, 2025; 9:16:08 PM UTC
10 hours ago
|
|
CVE-2024-58278
8.5 (High)
Show References |
perl2exe <= V30.10C contains an arbitrary code execution vulnerability that allows local authenticated attackers to execute malicious scripts. Attackers can control the 0th argument of packed executables to execute another executable, allowing them to bypass restrictions and gain unauthorized access.
Published: December 4, 2025; 9:16:07 PM UTC
10 hours ago
|
|
CVE-2024-58277
8.7 (High)
Show References |
R Radio Network FM Transmitter 1.07 allows unauthenticated attackers to access the admin user's password through the system.cgi endpoint, enabling authentication bypass and FM station setup access.
Published: December 4, 2025; 9:16:07 PM UTC
10 hours ago
|
|
CVE-2024-58276
8.7 (High)
Show References |
Obi08/Enrollment System 1.0 contains a SQL injection vulnerability in the keyword parameter of /get_subject.php that allows unauthenticated attackers to execute arbitrary SQL queries. Attackers can use UNION-based injection to extract sensitive information from the users table including usernames and passwords.
Published: December 4, 2025; 9:16:07 PM UTC
10 hours ago
|
|
CVE-2024-58275
8.7 (High)
Show References |
Easywall 0.3.1 allows authenticated remote command execution via a command injection vulnerability in the /ports-save endpoint that suffers from a parameter injection flaw. Attackers can inject shell metacharacters to execute arbitrary commands on the server.
Published: December 4, 2025; 9:16:07 PM UTC
10 hours ago
|
|
CVE-2023-53735
5.3 (Medium)
Show References |
WEBIGniter 28.7.23 contains a cross-site scripting vulnerability in the user creation process that allows unauthenticated attackers to execute malicious JavaScript code, enabling potential XSS attacks.
Published: December 4, 2025; 9:16:07 PM UTC
10 hours ago
|
|
CVE-2023-53734
8.7 (High)
Show References |
dawa-pharma-1.0 allows unauthenticated attackers to execute SQL queries on the server, allowing them to access sensitive information and potentially gain administrative access.
Published: December 4, 2025; 9:16:06 PM UTC
10 hours ago
|
|
|
|
CVE-2025-65958
8.5 (High)
Show References |
Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.6.37, a Server-Side Request Forgery (SSRF) vulnerability in Open WebUI allows any authenticated user to force the server to make HTTP requests to arbitrary URLs. This can be exploited to access cloud metadata endpoints (AWS/GCP/Azure), scan internal networks, access internal services behind firewalls, and exfiltrate sensitive information. No special permissions beyond basic authentication are required. This vulnerability is fixed in 0.6.37.
Published: December 4, 2025; 8:16:19 PM UTC
11 hours ago
|
|
CVE-2025-65883
N/A (Info)
Show References |
A vulnerability has been identified in Genexis Platinum P4410 router (Firmware P4410-V2–1.41) that allows a local network attacker to achieve Remote Code Execution (RCE) with root privileges. The issue occurs due to improper session invalidation after administrator logout. When an administrator logs out, the session token remains valid. An attacker on the local network can reuse this stale token to send crafted requests via the router’s diagnostic endpoint, resulting in command execution as root.
Published: December 4, 2025; 8:16:19 PM UTC
11 hours ago
|
|
CVE-2025-65806
N/A (Info)
Show References |
The E-POINT CMS eagle.gsam-1169.1 file upload feature improperly handles nested archive files. An attacker can upload a nested ZIP (a ZIP containing another ZIP) where the inner archive contains an executable file (e.g. webshell.php). When the application extracts the uploaded archives, the executable may be extracted into a web-accessible directory. This can lead to remote code execution (RCE), data disclosure, account compromise, or further system compromise depending on the web server/process privileges. The issue arises from insufficient validation of archive contents and inadequate restrictions on extraction targets.
Published: December 4, 2025; 8:16:19 PM UTC
11 hours ago
|
|
CVE-2025-63499
N/A (Info)
Show References |
Alinto Sogo 5.12.3 is vulnerable to Cross Site Scripting (XSS) via the theme parameter.
Published: December 4, 2025; 8:16:19 PM UTC
11 hours ago
|
|
CVE-2025-29269
N/A (Info)
Show References |
ALLNET ALL-RUT22GW v3.3.8 was discovered to contain an OS command injection vulnerability via the command parameter in the popen.cgi endpoint.
Published: December 4, 2025; 8:16:17 PM UTC
11 hours ago
|
|
CVE-2025-29268
N/A (Info)
Show References |
ALLNET ALL-RUT22GW v3.3.8 was discovered to store hardcoded credentials in the libicos.so library.
Published: December 4, 2025; 8:16:17 PM UTC
11 hours ago
|
|
CVE-2025-12997
2.2 (Low)
Show References |
Insecure Direct Object Reference vulnerability in Medtronic CareLink Network which allows an authenticated attacker with access to specific device and user information to submit web requests to an API endpoint that would expose sensitive user information. This issue affects CareLink Network: before December 4, 2025.
Published: December 4, 2025; 8:16:17 PM UTC
11 hours ago
|
|
CVE-2025-12996
4.1 (Medium)
Show References |
Medtronic CareLink Network allows a local attacker with access to log files on an internal API server to view plaintext passwords from errors logged under certain circumstances. This issue affects CareLink Network: before December 4, 2025.
Published: December 4, 2025; 8:16:17 PM UTC
11 hours ago
|
|
CVE-2025-12995
8.1 (High)
Show References |
Medtronic CareLink Network allows an unauthenticated remote attacker to perform a brute force attack on an API endpoint that could be used to determine a valid password under certain circumstances. This issue affects CareLink Network: before December 4, 2025.
Published: December 4, 2025; 8:16:17 PM UTC
11 hours ago
|
|
CVE-2025-12994
5.3 (Medium)
Show References |
Medtronic CareLink Network allows an unauthenticated remote attacker to initiate a request for security questions to an API endpoint that could be used to determine a valid user account. This issue affects CareLink Network: before December 4, 2025.
Published: December 4, 2025; 8:16:17 PM UTC
11 hours ago
|
|
CVE-2025-12097
8.7 (High)
Show References |
There is a relative path traversal vulnerability in the NI System Web Server that may result in information disclosure. Successful exploitation requires an attacker to send a specially crafted request to the NI System Web Server, allowing the attacker to read arbitrary files. This vulnerability existed in the NI System Web Server 2012 and prior versions. It was fixed in 2013.
Published: December 4, 2025; 8:16:16 PM UTC
11 hours ago
|