Top 100 Recent CVEs

CVE-2025-66372 2.8
Published: 2025-11-28T04:16:01.470

What it does:

The CVE-2025-66372 vulnerability in Mustang versions before 2.16.3 allows attackers to exfiltrate files using XML External Entity (XXE) attacks, which can lead to unauthorized access to sensitive data.

Why it's a problem:

This vulnerability is a problem because it enables malicious actors to extract confidential files from a system, potentially leading to data breaches, intellectual property theft, and other security incidents, compromising the confidentiality and integrity of the affected system.

Steps to mitigate:

  • Update Mustang to version 2.16.3 or later
  • [Implement XXE attack protection mechanisms, such as input validation and sanitization]
  • [Configure the system to use a secure XML parser that is not vulnerable to XXE attacks]
  • [Monitor system logs for suspicious activity and signs of XXE attacks]
CVE-2025-66371 5.0
Published: 2025-11-28T04:16:01.293

What it does:

The CVE-2025-66371 vulnerability in Peppol-py before version 1.1.1 allows an attacker to perform an XML eXternal Entity (XXE) attack, which enables the reading of files from the filesystem and exposes their content to a remote host when validating XML-based invoices.

Why it's a problem:

This vulnerability is a problem because it allows unauthorized access to sensitive files on the system, potentially leading to data breaches and exposing confidential information to remote attackers.

Steps to mitigate:

  • Update Peppol-py to version 1.1.1 or later
  • Configure the Saxon parser to prevent XXE attacks
  • Validate and sanitize all XML input to prevent malicious entities
  • Implement network security measures to restrict access to sensitive files and systems.
CVE-2025-66370 5.0
Published: 2025-11-28T04:16:01.110

What it does:

The CVE-2025-66370 vulnerability allows an attacker to inject malicious XML code (XXE injection) into the Kivitendo system by uploading a specially crafted electronic invoice in the ZUGFeRD format, enabling them to read and extract files from the server's filesystem.

Why it's a problem:

This vulnerability is a problem because it enables unauthorized access to sensitive files on the server, potentially leading to data breaches, intellectual property theft, and other malicious activities, compromising the security and confidentiality of the system.

Steps to mitigate:

  • Update Kivitendo to version 3.9.2 or later
  • Implement input validation and sanitization for uploaded files
  • Restrict access to the invoice upload feature to trusted users
  • Monitor server logs for suspicious activity
  • Consider implementing a Web Application Firewall (WAF) to detect and prevent XXE injection attacks.
CVE-2025-64312 4.9
Published: 2025-11-28T04:16:00.963

What it does:

The CVE-2025-64312 vulnerability allows unauthorized access to files due to a weakness in permission controls within the file management module.

Why it's a problem:

This vulnerability is a problem because it can compromise the confidentiality of sensitive information and services, potentially leading to unauthorized data access or leaks.

Steps to mitigate:

  • Update the file management module to the latest version
  • [Apply security patches to fix permission control issues]
  • [Implement strict access controls and monitor file access activity]
  • [Conduct regular security audits to identify similar vulnerabilities]
CVE-2025-58311 5.8
Published: 2025-11-28T04:16:00.807

What it does:

The CVE-2025-58311 is a Use-After-Free (UAF) vulnerability in the USB driver module, which allows an attacker to access and manipulate memory that has already been freed, potentially leading to unauthorized actions.

Why it's a problem:

This vulnerability is a problem because it can affect the availability and confidentiality of a system, allowing attackers to disrupt services, steal sensitive information, or gain unauthorized access, which can lead to significant security breaches and data losses.

Steps to mitigate:

  • Update the USB driver module to the latest version
  • Implement memory safety measures to prevent UAF exploits
  • Disable unnecessary USB driver modules to reduce the attack surface
  • Monitor system logs for suspicious activity related to the USB driver module.
CVE-2025-58308 7.3
Published: 2025-11-28T04:16:00.650

What it does:

The CVE-2025-58308 vulnerability is caused by an improper security check in the call module, which can lead to abnormal feature performance when exploited.

Why it's a problem:

This vulnerability is a problem because it can cause features to malfunction, potentially leading to unexpected behavior, errors, or even more severe security issues, which can compromise the overall security and reliability of the system.

Steps to mitigate:

  • Update the call module to the latest version
  • [apply security patches released by the vendor]
  • implement additional security checks to ensure proper validation of user input
  • monitor system behavior for signs of abnormal feature performance
  • contact the vendor for specific guidance on mitigation and remediation.
CVE-2025-58305 6.2
Published: 2025-11-28T04:16:00.500

What it does:

This vulnerability allows an attacker to bypass identity authentication in the Gallery app, potentially giving them unauthorized access to sensitive information.

Why it's a problem:

This vulnerability is a problem because it compromises the confidentiality of the service, allowing attackers to access data they shouldn't have permission to see, which can lead to data breaches and other security issues.

Steps to mitigate:

  • Update the Gallery app to the latest version
  • [Check for and install any available security patches]
  • Use alternative authentication methods until the vulnerability is fixed
  • Monitor account activity for suspicious behavior
  • Change passwords and authentication credentials as a precaution.
CVE-2025-58304 4.9
Published: 2025-11-28T04:16:00.347

What it does:

The CVE-2025-58304 vulnerability allows unauthorized access to files due to a weakness in permission control within the file management module, potentially exposing sensitive information.

Why it's a problem:

This vulnerability is a problem because it can compromise the confidentiality of services, allowing unauthorized parties to access restricted files and data, which could lead to data breaches or other security incidents.

Steps to mitigate:

  • Update the file management module to the latest version
  • [Apply security patches to fix the permission control weakness]
  • Implement additional access controls and monitoring to detect unauthorized file access
  • Limit user permissions to the minimum required for their roles
  • Regularly review and audit file access logs to identify potential security incidents.
CVE-2025-58302 8.4
Published: 2025-11-28T04:16:00.193

What it does:

The CVE-2025-58302 vulnerability allows unauthorized access to the Settings module due to a flaw in permission control, potentially exposing sensitive information.

Why it's a problem:

This vulnerability is a problem because it can compromise the confidentiality of services, allowing unauthorized parties to access restricted data, which can lead to security breaches and data theft.

Steps to mitigate:

  • Review and update permission settings in the Settings module
  • Implement access controls and authentication measures
  • Regularly monitor system logs for suspicious activity
  • Apply security patches or updates as soon as they become available
CVE-2025-13737 4.3
Published: 2025-11-28T04:16:00.010

What it does:

The Nextend Social Login and Register plugin for WordPress has a vulnerability that allows attackers to trick site administrators into unlinking a user's social login account through a forged request, due to a lack of proper validation.

Why it's a problem:

This vulnerability is a problem because it enables unauthenticated attackers to manipulate site administrators into performing unintended actions, potentially leading to unauthorized access or disruption of social login accounts, which can compromise user identity and security.

Steps to mitigate:

  • Update the Nextend Social Login and Register plugin to a version higher than 3.1.21
  • [Verify that all site administrators are aware of the vulnerability and cautious of suspicious links or requests]
  • [Monitor user accounts for any unusual activity related to social login linking or unlinking]
CVE-2025-64315 4.4
Published: 2025-11-28T03:16:01.023

What it does:

The CVE-2025-64315 vulnerability is a configuration defect in the file management module, which can be exploited to compromise the security of an application's data.

Why it's a problem:

This vulnerability is a problem because it can allow unauthorized access to sensitive application data, potentially leading to a breach of confidentiality and integrity, which can have serious consequences for users and the application itself.

Steps to mitigate:

  • Update the file management module to the latest version
  • Implement secure configuration settings for the module
  • Monitor application data for any signs of unauthorized access
  • Apply additional security measures such as encryption and access controls to protect sensitive data.
CVE-2025-64314 9.3
Published: 2025-11-28T03:16:00.867

What it does:

The CVE-2025-64314 vulnerability allows unauthorized access to sensitive areas of a system's memory due to a flaw in permission control within the memory management module.

Why it's a problem:

This vulnerability is a problem because it can compromise the confidentiality of sensitive information stored in the system's memory, potentially leading to data breaches or unauthorized exposure of confidential data.

Steps to mitigate:

  • Update the memory management module to the latest version
  • [apply security patches provided by the vendor]
  • implement strict access controls to sensitive areas of the system's memory
  • monitor system logs for suspicious activity related to memory access.
CVE-2025-64313 5.3
Published: 2025-11-28T03:16:00.700

What it does:

This vulnerability allows an attacker to cause a denial of service (DoS) in the office service, which means they can disrupt or shut down the service, making it unavailable to users.

Why it's a problem:

This vulnerability is a problem because it can affect the availability of the office service, leading to downtime and potential losses in productivity, which can have significant impacts on businesses or organizations that rely on the service.

Steps to mitigate:

  • Update the office service to the latest version
  • [apply patches or fixes provided by the vendor]
  • implement network traffic monitoring and filtering to detect and block potential DoS attacks
  • contact the vendor for guidance on temporary workarounds until a patch is available.
CVE-2025-64311 5.1
Published: 2025-11-28T03:16:00.543

What it does:

The CVE-2025-64311 is a permission control vulnerability found in the Notepad module, which allows unauthorized access to sensitive information.

Why it's a problem:

This vulnerability is a problem because it can compromise service confidentiality, meaning that sensitive data may be exposed to unauthorized parties, potentially leading to data breaches or other security issues.

Steps to mitigate:

  • Update the Notepad module to the latest version
  • [Apply security patches to fix the permission control issue]
  • Limit access to the Notepad module to authorized personnel only
  • Monitor system logs for suspicious activity related to the Notepad module
CVE-2025-58316 7.3
Published: 2025-11-28T03:16:00.383

What it does:

This vulnerability allows an attacker to launch a Denial of Service (DoS) attack on the video-related system service module, potentially crashing or disrupting the service.

Why it's a problem:

This vulnerability is a problem because it can affect the availability of the system or service, making it inaccessible to users, which can lead to downtime, loss of productivity, and other negative consequences.

Steps to mitigate:

  • Update the system service module to the latest version
  • Implement network traffic filtering to block malicious requests
  • Monitor system logs for signs of attempted exploitation
  • Apply security patches as soon as they become available
  • Limit access to the video-related system service module to trusted users and networks.
CVE-2025-58315 5.5
Published: 2025-11-28T03:16:00.230

What it does:

This vulnerability allows unauthorized access to the Wi-Fi module due to a flaw in permission control, potentially exposing sensitive information.

Why it's a problem:

This vulnerability is a problem because it can compromise the confidentiality of services, allowing unauthorized parties to access restricted data, which can lead to security breaches and data theft.

Steps to mitigate:

  • Update the Wi-Fi module software to the latest version
  • Implement strict access controls and authentication mechanisms
  • Limit network access to authorized devices and users
  • Monitor network activity for suspicious behavior
  • Consider resetting Wi-Fi module settings to their default configuration.
CVE-2025-58314 6.6
Published: 2025-11-28T03:16:00.070

What it does:

This vulnerability allows unauthorized access to invalid memory in a component driver module, potentially causing the system to crash or reveal sensitive information.

Why it's a problem:

This vulnerability is a problem because it can impact the availability and confidentiality of a system, meaning that it could cause the system to become unresponsive or leak sensitive data, which can lead to significant disruptions and security breaches.

Steps to mitigate:

  • Update the component driver module to the latest version
  • Implement memory access controls to prevent invalid memory access
  • Monitor system logs for signs of exploitation and take immediate action if suspicious activity is detected
  • Apply security patches as soon as they become available
  • Limit access to the system to authorized personnel only
CVE-2025-58312 5.1
Published: 2025-11-28T03:15:59.910

What it does:

The CVE-2025-58312 vulnerability affects the App Lock module by allowing unauthorized access due to a permission control issue, potentially disrupting the normal functioning of the application.

Why it's a problem:

This vulnerability is a problem because it could lead to a loss of availability, meaning that users may not be able to access the application or its features when needed, which can cause inconvenience, loss of productivity, or even financial losses.

Steps to mitigate:

  • Update the App Lock module to the latest version
  • [Apply security patches provided by the vendor]
  • Implement additional access controls to restrict unauthorized access
  • [Monitor application logs for suspicious activity]
  • Contact the application vendor for guidance on securing the App Lock module.
CVE-2025-58310 8.0
Published: 2025-11-28T03:15:59.743

What it does:

The CVE-2025-58310 is a permission control vulnerability in a distributed component, which means it can allow unauthorized access to sensitive areas of a system or service.

Why it's a problem:

This vulnerability is a problem because it can compromise the confidentiality of a service, potentially allowing attackers to access sensitive information that they should not have permission to access, which can lead to data breaches or other security issues.

Steps to mitigate:

  • Update the distributed component to the latest version
  • [apply security patches to fix the permission control issue]
  • [implement additional access controls and monitoring to detect and prevent unauthorized access]
  • [conduct a thorough security audit to identify and address any other potential vulnerabilities].
CVE-2025-58309 6.8
Published: 2025-11-28T03:15:59.590

What it does:

This vulnerability allows unauthorized access to the startup recovery module due to a flaw in permission control, potentially disrupting the system's normal functioning and exposing sensitive information.

Why it's a problem:

This vulnerability is a problem because it can compromise the availability and confidentiality of the system, allowing attackers to disrupt services, steal data, or carry out other malicious activities, which can lead to significant financial and reputational damage.

Steps to mitigate:

  • Update the startup recovery module to the latest version
  • Implement strict access controls and permissions
  • Monitor system logs for suspicious activity
  • Apply security patches as soon as they become available
  • Limit user privileges to prevent exploitation.
CVE-2025-58307 6.4
Published: 2025-11-28T03:15:59.430

What it does:

This vulnerability, known as a Use-After-Free (UAF) vulnerability, occurs in the screen recording framework module, allowing an attacker to potentially access and manipulate memory that has already been freed.

Why it's a problem:

This vulnerability is a problem because it could lead to a denial-of-service attack, causing the system to become unstable or crash, which may affect the availability of the system, resulting in downtime and potential data loss.

Steps to mitigate:

  • Update the screen recording framework module to the latest version
  • Implement memory safety checks to prevent UAF vulnerabilities
  • Monitor system logs for suspicious activity related to screen recording functions
  • Apply security patches as soon as they become available.
CVE-2025-58303 8.4
Published: 2025-11-28T03:15:59.267

What it does:

This vulnerability allows an attacker to exploit a Use-After-Free (UAF) flaw in the screen recording framework module, potentially enabling them to access or manipulate sensitive data or system resources after they have been freed.

Why it's a problem:

This vulnerability is a problem because it could be used by attackers to disrupt system availability, potentially leading to crashes, freezes, or other service disruptions, which can result in data loss, downtime, and other significant consequences.

Steps to mitigate:

  • Update software to the latest version
  • [Apply security patches from the vendor]
  • Disable screen recording framework module until a fix is available
  • Implement network monitoring to detect potential exploitation attempts
  • Limit user privileges to reduce the attack surface.
CVE-2025-58294 6.2
Published: 2025-11-28T03:15:59.077

What it does:

The CVE-2025-58294 vulnerability allows unauthorized access to the print module due to inadequate permission controls, potentially exposing sensitive information.

Why it's a problem:

This vulnerability is a problem because it can compromise the confidentiality of services, allowing unauthorized users to access restricted data, which can lead to security breaches and data leaks.

Steps to mitigate:

  • Update the print module to the latest version with patched permission controls
  • Implement strict access controls and authentication mechanisms for the print module
  • Regularly monitor print module activity for suspicious behavior
  • Limit user privileges to only necessary permissions for the print module.
CVE-2025-66361 0
Published: 2025-11-28T00:15:46.430

What it does:

The Logpoint system before version 7.7.0 has a vulnerability where sensitive information is exposed in System Processes for a longer period than usual when the system is under high CPU load.

Why it's a problem:

This vulnerability is a problem because it allows unauthorized access to sensitive information, potentially leading to data breaches or other security issues, especially during periods of high system stress.

Steps to mitigate:

  • Update Logpoint to version 7.7.0 or later
  • Monitor system CPU load and take steps to reduce it if necessary
  • Implement additional security measures to protect sensitive information, such as access controls and encryption.
CVE-2025-66360 0
Published: 2025-11-28T00:15:46.253

What it does:

The CVE-2025-66360 vulnerability occurs in Logpoint versions before 7.7.0, where an improperly configured access control policy allows li-admin users to access sensitive internal service information, specifically Redis data, which can be used for privilege escalation.

Why it's a problem:

This vulnerability is a problem because it exposes sensitive information to users who should not have access to it, potentially allowing them to gain higher levels of access and control within the system, which can lead to unauthorized actions and data breaches.

Steps to mitigate:

  • Update Logpoint to version 7.7.0 or later
  • Review and configure access control policies to ensure proper restrictions
  • Limit li-admin user privileges to necessary levels
  • Monitor system logs for suspicious activity related to Redis access.
CVE-2025-66359 8.5
Published: 2025-11-28T00:15:46.003

What it does:

The CVE-2025-66359 vulnerability allows an attacker to inject malicious code into Logpoint systems before version 7.7.0, due to insufficient input validation and lack of output escaping, leading to cross-site scripting (XSS) attacks.

Why it's a problem:

This vulnerability is a problem because it enables attackers to execute malicious scripts on users' browsers, potentially stealing sensitive information, hijacking user sessions, or performing unauthorized actions, which can compromise the security and integrity of the system.

Steps to mitigate:

  • Update Logpoint to version 7.7.0 or later
  • Implement input validation and output escaping mechanisms
  • Use web application firewalls (WAFs) to detect and prevent XSS attacks
  • Use browser extensions that provide XSS protection
  • Regularly monitor system logs for suspicious activity
CVE-2025-13338 0
Published: 2025-11-27T23:15:50.550

What it does:

This CVE ID has been rejected or withdrawn by its CVE Numbering Authority, indicating it is not a valid vulnerability.

Why it's a problem:

It's not a problem as the CVE has been rejected, and no actual vulnerability exists to exploit.

Steps to mitigate:

  • No action required
  • Monitor official CVE sources for valid vulnerabilities
  • Continue with regular security updates and patches.
CVE-2025-3261 0
Published: 2025-11-27T18:15:46.403

What it does:

The CVE-2025-3261 vulnerability allows an authenticated user to upload malicious SVG images to ThingsBoard, which can lead to Stored Cross-Site Scripting (XSS) attacks when other users access these images through the public API endpoint or embedded iframes.

Why it's a problem:

This vulnerability is a problem because it enables attackers to execute malicious code in the context of other users' sessions, potentially compromising their accounts and allowing unauthorized actions, such as data theft or system manipulation.

Steps to mitigate:

  • Update ThingsBoard to version v4.2.1 or later
  • [Restrict user permissions to upload images]
  • [Implement additional security measures, such as input validation and sanitization, to prevent malicious image uploads]
  • [Monitor user activity and system logs for suspicious behavior]
  • [Consider using a Web Application Firewall (WAF) to detect and prevent XSS attacks]
CVE-2025-12421 9.9
Published: 2025-11-27T18:15:46.223

What it does:

This vulnerability allows an authenticated user to take over another user's account by exploiting a flaw in the authentication process, specifically when switching authentication methods and using a specially crafted email address to send a request to the code-exchange endpoint.

Why it's a problem:

This vulnerability is a problem because it enables account takeover, which can lead to unauthorized access to sensitive information and potential data breaches, compromising the security and integrity of the affected system.

Steps to mitigate:

  • Update Mattermost to a version outside the vulnerable range (11.0.3 or later, 10.12.2 or later, 10.11.5 or later, 10.5.13 or later)
  • Disable ExperimentalEnableAuthenticationTransfer if not necessary
  • Enable RequireEmailVerification to add an extra layer of security
  • Monitor user authentication activity for suspicious behavior.
CVE-2025-12559 4.3
Published: 2025-11-27T17:15:46.530

What it does:

This vulnerability in Mattermost allows any authenticated user to view team email addresses that should only be visible to Team Admins, by accessing a specific endpoint (/api/v4/channels/{channel_id}/common_teams) via a GET request.

Why it's a problem:

This is a problem because it exposes sensitive information (team email addresses) to unauthorized users, potentially leading to spam, phishing attacks, or other security breaches.

Steps to mitigate:

  • Update Mattermost to a version outside the vulnerable range (above 11.0.2, 10.12.1, 10.11.4, or 10.5.12)
  • Restrict access to the /api/v4/channels/{channel_id}/common_teams endpoint to only authorized users
  • Implement additional security measures to protect sensitive team email addresses, such as using email address obfuscation or access controls.
CVE-2025-13765 0
Published: 2025-11-27T16:15:47.387

What it does:

The CVE-2025-13765 vulnerability exposes email service credentials to users without administrative rights in Devolutions Server, specifically affecting versions before 2025.2.21 and 2025.3.9.

Why it's a problem:

This vulnerability is a problem because it allows unauthorized access to sensitive email service credentials, potentially leading to email account compromise, data breaches, and other malicious activities.

Steps to mitigate:

  • Update Devolutions Server to version 2025.2.21 or later
  • Update Devolutions Server to version 2025.3.9 or later
  • Restrict user access to sensitive areas of the server until an update can be applied
  • Monitor email accounts for suspicious activity
  • Change email service credentials as a precautionary measure
CVE-2025-13758 0
Published: 2025-11-27T16:15:47.257

What it does:

The CVE-2025-13758 vulnerability exposes credentials in unintended requests in Devolutions Server, affecting versions through 2025.2.20 and 2025.3.8.

Why it's a problem:

This vulnerability is a problem because it allows unauthorized access to sensitive credentials, potentially leading to data breaches, unauthorized account access, and other security threats.

Steps to mitigate:

  • Update Devolutions Server to a version later than 2025.2.20 and 2025.3.8
  • Change all exposed credentials immediately
  • Monitor server logs for suspicious activity to detect potential exploitation.
CVE-2025-13757 0
Published: 2025-11-27T16:15:47.117

What it does:

The CVE-2025-13757 vulnerability allows an attacker to inject malicious SQL code into the last usage logs of Devolutions Server, potentially enabling them to access or manipulate sensitive data.

Why it's a problem:

This vulnerability is a problem because it could allow unauthorized access to sensitive information, compromise the integrity of the data, or even lead to a full takeover of the affected system, ultimately putting the security and privacy of the users' data at risk.

Steps to mitigate:

  • Update Devolutions Server to a version later than 2025.2.20 or 2025.3.8
  • Implement a Web Application Firewall (WAF) to detect and prevent SQL injection attacks
  • Use parameterized queries or prepared statements to prevent user-input data from being executed as SQL code
  • Limit database privileges to the minimum required for the application to function
  • Monitor system logs for suspicious activity and signs of potential SQL injection attacks.
CVE-2025-12419 9.9
Published: 2025-11-27T16:15:46.957

What it does:

This vulnerability allows an authenticated attacker with certain privileges to take over any user account in Mattermost by manipulating authentication data during the OpenID Connect authentication process, due to the failure to properly validate OAuth state tokens.

Why it's a problem:

This is a significant problem because it enables an attacker to gain unauthorized access to user accounts, potentially leading to sensitive data breaches, privilege escalation, and other malicious activities, especially given the high severity score of 9.9.

Steps to mitigate:

  • Update Mattermost to a version outside the vulnerable range (above 10.12.1, 10.11.4, 10.5.12, or 11.0.3)
  • Restrict team creation and admin privileges to trusted users
  • Monitor user account activity for signs of unauthorized access and take immediate action if suspicious behavior is detected
CVE-2025-8890 0
Published: 2025-11-27T14:15:52.183

What it does:

This vulnerability allows an attacker to inject shell commands into the network diagnostics tool of SDMC NE6037 routers with firmware prior to version 7.1.12.2.44, potentially giving them control over the device.

Why it's a problem:

This vulnerability is a problem because it could allow an attacker who has access to the router's administrative portal to execute arbitrary commands, potentially leading to unauthorized access, data theft, or disruption of the network.

Steps to mitigate:

  • Update the firmware to version 7.1.12.2.44 or later
  • Limit access to the router's administrative portal to trusted individuals
  • Change the default login credentials for the administrative portal and ensure they are strong and unique.
CVE-2025-13692 7.2
Published: 2025-11-27T14:15:51.853

What it does:

The Unlimited Elements For Elementor plugin for WordPress allows attackers to upload malicious SVG files, which can inject arbitrary web scripts into pages, executing them whenever a user accesses the file.

Why it's a problem:

This vulnerability is a problem because it enables unauthenticated attackers to inject malicious scripts, potentially leading to unauthorized access, data theft, or other harmful activities, even after the premium version of the plugin is deactivated or uninstalled.

Steps to mitigate:

  • Update the Unlimited Elements For Elementor plugin to a version above 2.0
  • [Remove any existing forms with file upload fields created with the premium version of the plugin]
  • Implement proper input validation and output escaping for all file uploads
  • [Monitor user access and file uploads for suspicious activity]
  • Consider using a web application firewall (WAF) to detect and prevent XSS attacks.
CVE-2025-12140 0
Published: 2025-11-27T14:15:50.813

What it does:

The application has a vulnerability in its 'redirectToUrl' mechanism, which allows an attacker to execute arbitrary code by manipulating the 'redirectUrlParameter' parameter, as it incorrectly interprets user input as Java code.

Why it's a problem:

This vulnerability is a problem because it enables unauthenticated attackers to perform arbitrary code execution, potentially leading to unauthorized access, data breaches, or other malicious activities, compromising the security and integrity of the application.

Steps to mitigate:

  • Update the application to version wu#2016.1.5513#0#20251014_113353 or later
  • Validate and sanitize user input for the 'redirectUrlParameter' parameter to prevent code injection
  • Implement additional security measures, such as authentication and authorization checks, to restrict access to sensitive functionality.
CVE-2025-12971 4.3
Published: 2025-11-27T13:15:58.547

What it does:

The Folders plugin for WordPress has a vulnerability that allows authenticated attackers with Contributor-level access or higher to move any folder contents to any other folder without proper authorization.

Why it's a problem:

This vulnerability is a problem because it enables attackers to modify and reorganize sensitive data within a WordPress site, potentially disrupting the site's organization and functionality, and possibly leading to further malicious activities.

Steps to mitigate:

  • Update the Folders plugin to a version higher than 3.1.5
  • [limit Contributor-level access to trusted users
  • [monitor site activity for suspicious folder modifications
  • [consider implementing additional security measures, such as role-based access control, to restrict folder management capabilities.
CVE-2025-59454 0
Published: 2025-11-27T12:15:47.550

What it does:

This vulnerability in Apache CloudStack allows authorized users to access information beyond their intended scope through certain APIs, including createNetworkACL, listNetworkACLs, listResourceDetails, listVirtualMachinesUsageHistory, and listVolumesUsageHistory, due to insufficient permission validation.

Why it's a problem:

This vulnerability is a problem because it can lead to unauthorized disclosure of sensitive information, potentially allowing malicious actors to gain valuable insights into the system's configuration and usage patterns, which could be used for further exploitation.

Steps to mitigate:

  • Upgrade to Apache CloudStack 4.20.2.0 or 4.22.0.0
  • Verify that all users have the correct permissions and access controls in place
  • Monitor system logs for suspicious activity related to the affected APIs.
CVE-2025-59302 0
Published: 2025-11-27T12:15:47.410

What it does:

The CVE-2025-59302 vulnerability allows for improper control of code generation, specifically code injection, in certain Apache CloudStack APIs that are only accessible to administrators, including quotaTariffCreate, quotaTariffUpdate, createSecondaryStorageSelector, updateSecondaryStorageSelector, updateHost, and updateStorage.

Why it's a problem:

This vulnerability is a problem because it enables potential attackers with administrative access to inject malicious code, which could lead to unauthorized control and manipulation of the system, compromising its security and integrity.

Steps to mitigate:

  • Upgrade to Apache CloudStack version 4.20.2 or 4.22.0
  • [Configure the new global configuration flag 'js.interpretation.enabled' to control JavaScript expression interpretation in the affected APIs]
  • [Monitor system activity for signs of code injection attempts and update security protocols accordingly]
CVE-2025-54057 0
Published: 2025-11-27T12:15:47.253

What it does:

The CVE-2025-54057 vulnerability allows for improper neutralization of script-related HTML tags in a web page, leading to a basic Cross-Site Scripting (XSS) attack in Apache SkyWalking versions 10.2.0 and earlier.

Why it's a problem:

This vulnerability is a problem because it enables attackers to inject malicious scripts into web pages, potentially allowing them to steal user data, take control of user sessions, or perform other unauthorized actions.

Steps to mitigate:

  • Upgrade to Apache SkyWalking version 10.3.0 or later
  • Regularly check for and apply security updates to Apache SkyWalking
  • Monitor web application security for signs of XSS attacks
CVE-2025-59890 7.3
Published: 2025-11-27T11:15:48.080

What it does:

The CVE-2025-59890 vulnerability allows an attacker with local access to exploit improper input sanitization in the Eaton Galileo software's file archives upload functionality, potentially enabling them to execute unauthorized code or commands by traversing paths.

Why it's a problem:

This vulnerability is a problem because it could allow an attacker to gain unauthorized access to the system, execute malicious code, or run commands that could compromise the security and integrity of the data and system, potentially leading to data breaches, system crashes, or other malicious activities.

Steps to mitigate:

  • Update to the latest version of Galileo software available on the Eaton download center
  • Ensure that only authorized personnel have local access to the system
  • Implement additional security measures to monitor and restrict file uploads and system access.
CVE-2025-13742 0
Published: 2025-11-27T11:15:47.760

What it does:

The CVE-2025-13742 vulnerability allows an attacker to inject HTML or Markdown formatting into emails sent by pretix by including maliciously formatted text in their name, which can then be rendered as HTML in the resulting email.

Why it's a problem:

This vulnerability is a problem because it can be used to manipulate emails and make user-provided content appear trustworthy and credible, potentially leading to phishing attacks where attackers can trick recipients into taking unintended actions.

Steps to mitigate:

  • Validate and sanitize user input for HTML or Markdown formatting
  • Implement additional email templating security measures to prevent rendering of user-provided HTML
  • Monitor emails sent by pretix for suspicious content and formatting
  • Update pretix to the latest version with patched vulnerability fixes if available.
CVE-2025-10476 4.3
Published: 2025-11-27T11:15:45.863

What it does:

The WP Fastest Cache plugin for WordPress has a vulnerability that allows authenticated attackers with Subscriber-level access or higher to modify data without proper authorization, potentially initiating database fix actions.

Why it's a problem:

This vulnerability is a problem because it enables low-level users to perform actions that could compromise the integrity of the database, potentially leading to data corruption or other security issues, especially on sites with the premium version activated.

Steps to mitigate:

  • Update the WP Fastest Cache plugin to a version higher than 1.4.0
  • [Monitor database activity for suspicious changes]
  • [Restrict Subscriber-level access to necessary privileges only]
  • [Consider disabling the premium version of the plugin until the update is applied]
CVE-2025-59026 5.4
Published: 2025-11-27T10:15:52.007

What it does:

This vulnerability allows malicious files to be uploaded and used to execute script code when a user clicks on a link controlled by an attacker, enabling unintended actions to be performed within the user's account.

Why it's a problem:

This is a problem because it can lead to the execution of unauthorized actions in the context of a user's account, potentially resulting in the theft of sensitive information.

Steps to mitigate:

  • Deploy the provided updates
  • Apply the latest patch releases
  • Avoid clicking on suspicious links from untrusted sources
CVE-2025-59025 6.1
Published: 2025-11-27T10:15:51.830

What it does:

This vulnerability allows malicious email content to execute script code, enabling unintended actions to be performed under the user's account, potentially leading to the theft of sensitive information.

Why it's a problem:

This vulnerability is a problem because it can be used to gain unauthorized access to a user's account and sensitive data, which could result in data breaches, identity theft, and other malicious activities.

Steps to mitigate:

  • Update email client software to the latest version with improved sanitization
  • [Avoid opening suspicious or unfamiliar emails]
  • [Use antivirus software to scan emails for malware]
  • Implement additional security measures such as two-factor authentication to protect user accounts.
CVE-2025-30190 5.4
Published: 2025-11-27T10:15:51.640

What it does:

This vulnerability allows malicious script code to be injected into office documents, which can then be executed when the document is edited, potentially leading to unintended actions being taken on the user's account.

Why it's a problem:

This is a problem because it could result in sensitive information being stolen (exfiltrated) from the user's account, and other unauthorized actions being performed, all without the user's knowledge or consent.

Steps to mitigate:

  • Deploy the provided updates
  • Apply patch releases
  • Exercise caution when opening and editing office documents from unknown or untrusted sources
CVE-2025-30186 5.4
Published: 2025-11-27T10:15:51.420

What it does:

This vulnerability allows malicious script code to be executed when a user follows a link to malicious content that was uploaded as a file, potentially leading to unintended actions being taken within the user's account.

Why it's a problem:

This is a problem because it could result in sensitive information being stolen (exfiltrated) from the user's account, and the malicious actions would appear to come from the legitimate user, potentially causing further security issues.

Steps to mitigate:

  • Deploy the provided updates
  • Apply the latest patch releases
  • Avoid following suspicious links from untrusted sources
CVE-2025-13381 5.3
Published: 2025-11-27T10:15:51.220

What it does:

The AI ChatBot with ChatGPT and Content Generator plugin for WordPress has a vulnerability that allows unauthorized access to upload media files due to a missing capability check in the 'ays_chatgpt_save_wp_media' function.

Why it's a problem:

This vulnerability is a problem because it enables unauthenticated attackers to upload malicious media files to a WordPress site, potentially leading to security breaches, malware distribution, or other malicious activities.

Steps to mitigate:

  • Update the AI ChatBot with ChatGPT and Content Generator plugin to a version higher than 2.7.0
  • [Remove the plugin if an update is not available]
  • [Restrict access to the WordPress site's media upload functionality to authenticated users only]
  • [Monitor the site for suspicious media uploads and remove any malicious files].
CVE-2025-13378 6.5
Published: 2025-11-27T10:15:50.993

What it does:

The AI ChatBot with ChatGPT and Content Generator plugin for WordPress has a vulnerability that allows unauthorized attackers to make requests to any location on the internet from the WordPress website, potentially accessing or modifying internal services.

Why it's a problem:

This vulnerability is a problem because it enables attackers to use the website as a proxy to access internal networks or services, potentially leading to data breaches, unauthorized modifications, or other malicious activities, all without needing to authenticate with the website.

Steps to mitigate:

  • Update the AI ChatBot with ChatGPT and Content Generator plugin to a version higher than 2.7.0
  • Restrict access to the plugin's functionality to authenticated users only
  • Implement network segmentation and firewall rules to limit the plugin's ability to make requests to internal services
  • Monitor website traffic and logs for suspicious activity
  • Consider disabling the plugin until a secure update is available.
CVE-2025-12584 5.3
Published: 2025-11-27T10:15:50.760

What it does:

The Quick View for WooCommerce plugin for WordPress has a vulnerability that allows unauthorized access to private product information through a specific AJAX endpoint, potentially exposing sensitive data.

Why it's a problem:

This vulnerability is a problem because it enables attackers to extract data from private products without authentication, compromising the confidentiality of sensitive information and potentially leading to unauthorized access or misuse.

Steps to mitigate:

  • Update the Quick View for WooCommerce plugin to a version later than 2.2.17
  • [check WordPress and plugin configurations for any other potential vulnerabilities
  • [monitor website traffic and user activity for suspicious behavior
  • [consider implementing additional access controls and restrictions on private products].
CVE-2025-13536 8.8
Published: 2025-11-27T09:15:45.687

What it does:

The Blubrry PowerPress plugin for WordPress allows attackers to upload any type of file to the site's server, even if the file type is not supposed to be allowed, because the plugin doesn't properly check and stop invalid file uploads.

Why it's a problem:

This vulnerability is a problem because it lets attackers with certain levels of access upload malicious files that could allow them to take control of the site remotely, potentially leading to data theft, site defacement, or other harmful activities.

Steps to mitigate:

  • Update the Blubrry PowerPress plugin to a version higher than 11.15.2
  • Limit Contributor-level access and above to only trusted users
  • Monitor site uploads and server activity for suspicious files or behavior
  • Consider implementing additional security measures such as file upload validation and remote code execution protection.
CVE-2025-13441 5.3
Published: 2025-11-27T07:15:55.820

What it does:

The Hide Category by User Role for WooCommerce plugin for WordPress has a vulnerability that allows unauthorized users to clear the site's object cache by sending fake requests, which can be done without needing to log in to the site.

Why it's a problem:

This vulnerability is a problem because it can be used by attackers to intentionally slow down or disrupt the performance of a WordPress site, potentially causing issues for users and administrators.

Steps to mitigate:

  • Update the Hide Category by User Role for WooCommerce plugin to a version higher than 2.3.1
  • [Monitor site performance for unusual activity]
  • [Implement authentication and authorization checks on critical functions like cache flushing]
  • [Limit access to the admin_init hook to authorized users only]
CVE-2025-13157 5.3
Published: 2025-11-27T07:15:54.943

What it does:

The QODE Wishlist for WooCommerce plugin for WordPress has a vulnerability that allows unauthorized users to modify and update the public view of any wishlist, due to a lack of validation on a user-controlled key in the 'qode_wishlist_for_woocommerce_wishlist_table_item_callback' function.

Why it's a problem:

This vulnerability is a problem because it enables attackers to alter wishlists without permission, potentially leading to unauthorized changes, data manipulation, and exposure of sensitive information, which can compromise the security and integrity of the WordPress site and its users' data.

Steps to mitigate:

  • Update the QODE Wishlist for WooCommerce plugin to a version later than 1.2.7
  • [Monitor wishlist activity for suspicious changes]
  • [Limit user access to wishlists and implement additional security measures to prevent unauthorized modifications]
  • [Consider implementing a web application firewall (WAF) to detect and prevent exploit attempts]
CVE-2025-13525 6.1
Published: 2025-11-27T06:15:46.830

What it does:

The WP Directory Kit plugin for WordPress has a vulnerability that allows attackers to inject arbitrary web scripts into pages through a parameter called 'order_by', which can be executed if a user is tricked into clicking on a malicious link.

Why it's a problem:

This vulnerability is a problem because it enables unauthenticated attackers to perform Reflected Cross-Site Scripting attacks, potentially stealing user data, taking control of user sessions, or performing other malicious actions on the affected website.

Steps to mitigate:

  • Update the WP Directory Kit plugin to a version higher than 1.4.5
  • [Verify that input sanitization and output escaping are properly implemented in the plugin]
  • Implement web application firewall (WAF) rules to detect and block potential Cross-Site Scripting attacks
  • Limit user access to the plugin's functionality to only those who need it
  • Monitor website traffic for suspicious activity.
CVE-2025-13143 4.3
Published: 2025-11-27T06:15:46.657

What it does:

The Poll, Survey & Quiz Maker Plugin by Opinion Stage for WordPress has a vulnerability that allows an attacker to trick a site administrator into disconnecting the site from the Opinion Stage platform integration via a forged request, without needing to be authenticated.

Why it's a problem:

This vulnerability is a problem because it enables unauthenticated attackers to interfere with the site's integration with the Opinion Stage platform, potentially disrupting the site's functionality and causing unintended changes, all by tricking an administrator into taking a simple action like clicking on a link.

Steps to mitigate:

  • Update the Poll, Survey & Quiz Maker Plugin to a version later than 19.12.0]
  • [Verify the authenticity of links and requests before taking actions]
  • [Use security plugins or tools to monitor and block suspicious requests]
  • [Limit administrator access to trusted users and devices only]
CVE-2025-12185 4.4
Published: 2025-11-27T06:15:46.487

What it does:

The StaffList plugin for WordPress has a vulnerability that allows attackers with administrator-level permissions to inject malicious scripts into website pages through the admin settings, due to poor input validation and output escaping.

Why it's a problem:

This vulnerability is a problem because it enables authenticated attackers to execute arbitrary web scripts on pages, potentially leading to unauthorized actions, data theft, or malware distribution, affecting users who access the compromised pages, particularly in multi-site installations or where unfiltered_html has been disabled.

Steps to mitigate:

  • Update the StaffList plugin to a version above 3.2.6
  • [Limit administrator-level permissions to trusted users]
  • [Enable unfiltered_html if necessary and applicable]
  • [Monitor website activity for suspicious script executions]
  • [Consider disabling the StaffList plugin until a secure version is installed]
CVE-2025-12123 6.1
Published: 2025-11-27T06:15:45.360

What it does:

The Customer Reviews Collector for WooCommerce plugin for WordPress has a vulnerability that allows attackers to inject malicious scripts into website pages through a parameter called 'email-text', which can be executed when a user clicks on a specially crafted link.

Why it's a problem:

This vulnerability is a problem because it enables unauthenticated attackers to trick users into performing actions that can lead to the execution of arbitrary web scripts, potentially stealing sensitive information, taking control of user accounts, or conducting other malicious activities.

Steps to mitigate:

  • Update the Customer Reviews Collector for WooCommerce plugin to a version higher than 4.6.1
  • [Verify that input sanitization and output escaping are properly implemented in the plugin]
  • [Avoid clicking on suspicious links from untrusted sources]
  • [Keep WordPress and all plugins up to date to prevent exploitation of known vulnerabilities]
CVE-2025-7820 7.5
Published: 2025-11-27T05:16:17.913

What it does:

The SKT PayPal for WooCommerce plugin for WordPress has a vulnerability that allows attackers to bypass payment processing, enabling them to make confirmed purchases without actually paying for them.

Why it's a problem:

This vulnerability is a problem because it can lead to significant financial losses for online businesses using the affected plugin, as attackers can exploit it to obtain products or services without making payments, undermining the integrity of the payment process.

Steps to mitigate:

  • Update the SKT PayPal for WooCommerce plugin to a version newer than 1.4
  • [contact the plugin developer for a patch or workaround if an update is not available]
  • [implement server-side controls to validate payment processing]
  • [monitor transaction logs for suspicious activity]
  • [consider temporarily disabling the plugin until a fix is applied]
CVE-2025-3784 5.5
Published: 2025-11-27T05:16:15.467

What it does:

The Cleartext Storage of Sensitive Information Vulnerability in GX Works2 allows an attacker to access credential information stored in plaintext from project files, potentially enabling them to open protected project files and obtain or modify sensitive project information.

Why it's a problem:

This vulnerability is a problem because it exposes sensitive credential information, which can be used by attackers to gain unauthorized access to project files, potentially leading to data breaches, tampering, or theft of confidential information.

Steps to mitigate:

  • Update GX Works2 to a patched version if available
  • [Apply encryption to project files to protect sensitive information]
  • [Implement additional authentication measures, such as multi-factor authentication, to protect project files]
  • [Regularly monitor project files for unauthorized access and modify credentials immediately if a breach is suspected]
CVE-2025-13680 8.8
Published: 2025-11-27T05:16:15.253

What it does:

The Tiger theme for WordPress has a vulnerability that allows authenticated users with Subscriber-level access or higher to elevate their privileges to administrator level by exploiting the $user->set_role() function.

Why it's a problem:

This vulnerability is a problem because it enables attackers to gain high-level access to a WordPress site, potentially allowing them to modify sensitive data, install malicious plugins, or take control of the entire site, compromising its security and integrity.

Steps to mitigate:

  • Update the Tiger theme to a version higher than 101.2.1
  • [patch the vulnerability by restricting access to the $user->set_role() function]
  • limit Subscriber-level access to only necessary users
  • monitor site activity for suspicious behavior
  • consider switching to a different theme if an update is not available.
CVE-2025-13675 9.8
Published: 2025-11-27T05:16:15.060

What it does:

The Tiger theme for WordPress has a vulnerability that allows attackers to gain administrator access to a site by exploiting a weakness in the 'paypal-submit.php' file, which does not properly restrict user roles during registration, enabling unauthenticated attackers to register as administrators.

Why it's a problem:

This vulnerability is a significant issue because it allows unauthorized users to gain full control over a WordPress site, potentially leading to data breaches, malware distribution, and other malicious activities, posing a substantial risk to the site's security and integrity.

Steps to mitigate:

  • Update the Tiger theme to a version higher than 101.2.1
  • [patch the 'paypal-submit.php' file to restrict user roles during registration
  • [implement additional security measures such as two-factor authentication and role-based access control
  • [monitor site activity for suspicious behavior and regularly update all plugins and themes to prevent similar vulnerabilities].
CVE-2025-13540 9.8
Published: 2025-11-27T05:16:14.293

What it does:

The Tiare Membership plugin for WordPress has a vulnerability that allows unauthenticated attackers to gain administrator access to a site by registering with the 'administrator' role, due to a lack of restriction on user roles during registration.

Why it's a problem:

This vulnerability is a significant issue because it enables attackers to easily gain full control over a WordPress site, potentially leading to data breaches, malware distribution, and other malicious activities, without requiring any authentication or prior access.

Steps to mitigate:

  • Update the Tiare Membership plugin to a version later than 1.2]
  • [Remove the Tiare Membership plugin if an update is not available]
  • [Restrict user registration to approved roles through alternative security measures]
  • [Monitor site activity for suspicious administrator account creations]
CVE-2025-13539 9.8
Published: 2025-11-27T05:16:13.333

What it does:

The FindAll Membership plugin for WordPress has a vulnerability that allows unauthorized users to bypass authentication and log in as administrative users, given they have an existing account on the site and access to the administrative user's email.

Why it's a problem:

This vulnerability is a significant issue because it enables attackers to gain administrative access to a WordPress site without needing a password, allowing them to perform malicious actions such as modifying site content, installing malware, or stealing sensitive data.

Steps to mitigate:

  • Update the FindAll Membership plugin to a version higher than 1.0.4
  • [Remove the FindAll Membership plugin if an update is not available]
  • [Monitor site activity for suspicious login attempts and restrict account creation to prevent attackers from easily creating temp user accounts]
  • Change administrative user email addresses to ones that are not accessible to potential attackers
  • Limit access to the site's administrative dashboard to trusted IP addresses or users.
CVE-2025-13538 9.8
Published: 2025-11-27T05:16:12.453

What it does:

The FindAll Listing plugin for WordPress has a vulnerability that allows unauthenticated attackers to register as administrators on a site by exploiting a function that doesn't restrict user roles during registration, potentially giving them full control over the site.

Why it's a problem:

This vulnerability is a significant issue because it enables attackers to gain administrator access to a WordPress site, allowing them to perform any action they want, including modifying content, installing malware, and stealing sensitive information, which can lead to severe consequences for the site's security and integrity.

Steps to mitigate:

  • Update the FindAll Listing plugin to a version higher than 1.0.5
  • [Verify that the FindAll Membership plugin is not activated, as the vulnerability can only be exploited if it is]
  • [Monitor user registrations and role assignments closely to detect any suspicious activity
  • [Consider implementing additional security measures, such as two-factor authentication and role-based access control, to further protect the site from unauthorized access.
CVE-2025-12758 7.5
Published: 2025-11-27T05:16:12.193

What it does:

The CVE-2025-12758 vulnerability affects versions of the package validator before 13.15.22, where the isLength() function fails to properly account for Unicode variation selectors, leading to incorrect string length calculations. This allows strings to be accepted as valid even if they are significantly longer than intended.

Why it's a problem:

This vulnerability is a problem because it can cause issues such as data truncation in databases, buffer overflows in other system components, or denial-of-service attacks, ultimately compromising the security and reliability of the application.

Steps to mitigate:

  • Update the package validator to version 13.15.22 or later
  • Implement additional input validation mechanisms to detect and prevent excessively long strings
  • Regularly review and test application inputs to identify potential vulnerabilities
  • Consider using alternative validation functions that properly handle Unicode characters.
CVE-2025-12151 6.4
Published: 2025-11-27T05:16:08.650

What it does:

The Simple Folio plugin for WordPress has a vulnerability that allows attackers to inject malicious scripts into pages using the 'portfolio_name' parameter, due to poor input validation and output escaping, which can lead to the execution of arbitrary web scripts when a user visits the infected page.

Why it's a problem:

This vulnerability is a problem because it enables authenticated attackers with minimal permissions (Subscriber-level access or higher) to inject harmful scripts, potentially leading to unauthorized actions, data theft, or further exploitation of the website.

Steps to mitigate:

  • Update the Simple Folio plugin to a version above 1.1.0
  • [Remove the Simple Folio plugin if an update is not available]
  • [Limit Subscriber-level access and monitor user activity]
  • [Implement a Web Application Firewall (WAF) to detect and prevent XSS attacks]
CVE-2025-66314 7.5
Published: 2025-11-27T03:15:58.967

What it does:

The CVE-2025-66314 vulnerability allows unauthorized access to certain functionalities in ZTE ElasticNet UME R32 on Linux due to improper privilege management, bypassing the normal access controls defined by Access Control Lists (ACLs).

Why it's a problem:

This vulnerability is a problem because it enables attackers to perform actions that they should not be able to, potentially leading to data breaches, system compromise, or disruption of services, which can have serious consequences for the security and integrity of the affected systems.

Steps to mitigate:

  • Update to a patched version of ElasticNet UME R32
  • [Apply interim security fixes if available]
  • Implement additional access controls and monitoring to detect and prevent unauthorized access
  • [Contact ZTE support for specific guidance on addressing the vulnerability]
CVE-2025-34351 0
Published: 2025-11-27T03:15:58.790

What it does:

The Anyscale Ray 2.52.0 has a default configuration that disables token-based authentication for management interfaces, allowing remote attackers to submit jobs and execute arbitrary code on the cluster if they have network access.

Why it's a problem:

This vulnerability is a problem because it allows unauthorized access to the Ray cluster, enabling attackers to execute arbitrary code and potentially gain control over the system, leading to security breaches and data compromises.

Steps to mitigate:

  • Enable token authentication by setting RAY_AUTH_MODE=token
  • Update to a future release where token authentication is enabled by default
  • Restrict network access to Ray management interfaces to prevent unauthorized access.
CVE-2025-13762 0
Published: 2025-11-27T03:15:58.613

What it does:

The CVE-2025-13762 vulnerability allows an attacker to cause a Denial of Service (DoS) when a user tries to start a new Secure Web Sessions (SWS) session using the CyberArk Secure Web Sessions Extension on Chrome or Edge browsers, due to improper input validation.

Why it's a problem:

This vulnerability is a problem because it can prevent users from accessing secure web sessions, potentially disrupting business operations and causing inconvenience to users who rely on these sessions.

Steps to mitigate:

  • Update the CyberArk Secure Web Sessions Extension to version 2.2.30305 or later
  • Ensure all users are running the updated extension to prevent DoS attacks
  • Monitor browser extensions for any suspicious activity or errors when starting new SWS sessions.
CVE-2025-12713 6.4
Published: 2025-11-27T03:15:58.293

What it does:

The Soundslides plugin for WordPress has a vulnerability that allows attackers to inject malicious scripts into pages using the soundslides shortcode, due to poor input validation and output escaping of user-supplied attributes.

Why it's a problem:

This vulnerability is a problem because it enables authenticated attackers with Contributor-level access or higher to execute arbitrary web scripts on pages, potentially leading to unauthorized actions, data theft, or other malicious activities whenever a user visits the compromised page.

Steps to mitigate:

  • Update the Soundslides plugin to a version higher than 1.4.2
  • [Restrict Contributor-level access to trusted users only]
  • [Implement additional input validation and output escaping measures on user-supplied attributes]
  • [Monitor WordPress pages for suspicious script injections and remove them promptly]
CVE-2025-12712 6.4
Published: 2025-11-27T03:15:58.110

What it does:

The Shouty plugin for WordPress allows attackers to inject arbitrary web scripts into pages due to a vulnerability in the shouty shortcode, which doesn't properly sanitize and escape user-supplied input, enabling the execution of malicious scripts when a user accesses an infected page.

Why it's a problem:

This vulnerability is a problem because it enables authenticated attackers with Contributor-level access or higher to inject malicious scripts into WordPress pages, potentially leading to unauthorized access, data theft, or other malicious activities, compromising the security and integrity of the website.

Steps to mitigate:

  • Update the Shouty plugin to a version higher than 0.2.1
  • [Verify that all user input is properly sanitized and escaped]
  • Restrict Contributor-level access to trusted users only
  • Monitor website activity for suspicious script injections
  • Consider removing the Shouty plugin if an update is not available.
CVE-2025-12670 6.4
Published: 2025-11-27T03:15:57.933

What it does:

The wp-twitpic plugin for WordPress has a vulnerability that allows attackers to inject malicious scripts into pages using the 'twitpic' shortcode, due to insufficient input sanitization and output escaping, affecting all versions up to 1.0.

Why it's a problem:

This vulnerability is a problem because it enables authenticated attackers with Contributor-level access or higher to inject arbitrary web scripts that will execute when a user accesses the compromised page, potentially leading to unauthorized actions, data theft, or further malicious activities.

Steps to mitigate:

  • Update the wp-twitpic plugin to a version above 1.0 if available
  • [limit Contributor-level access to trusted users]
  • [implement input validation and output escaping for all user-input data]
  • [monitor website traffic for suspicious activity and signs of scripting injection]
CVE-2025-12666 6.4
Published: 2025-11-27T03:15:57.733

What it does:

The Google Drive upload and download link plugin for WordPress has a vulnerability that allows attackers to inject malicious scripts into pages via a specific shortcode, which can then execute when a user visits the infected page.

Why it's a problem:

This vulnerability is a problem because it enables authenticated attackers with certain access levels to inject arbitrary web scripts, potentially leading to unauthorized actions, data theft, or further exploitation of the website.

Steps to mitigate:

  • Update the Google Drive upload and download link plugin to a version above 1.0
  • [Limit Contributor-level access to trusted users]
  • Implement input sanitization and output escaping for all user-input data
  • [Monitor website traffic for suspicious activity]
  • Consider removing the plugin if an update is not available.
CVE-2025-12649 6.4
Published: 2025-11-27T03:15:57.530

What it does:

The SortTable Post plugin for WordPress has a vulnerability that allows attackers to inject malicious scripts into pages using the 'id' parameter in the sorttablepost shortcode, due to insufficient input sanitization and output escaping.

Why it's a problem:

This vulnerability is a problem because it enables authenticated attackers with contributor-level access or higher to inject arbitrary web scripts that will execute when a user interacts with an infected page, potentially leading to unauthorized actions, data theft, or other malicious activities.

Steps to mitigate:

  • Update the SortTable Post plugin to a version above 4.2
  • [Limit contributor-level access to trusted users]
  • Implement additional input validation and output escaping measures to prevent cross-site scripting attacks
  • Monitor website activity for suspicious script injections
  • Consider using a web application firewall (WAF) to detect and block malicious traffic.
CVE-2025-12579 5.3
Published: 2025-11-27T03:15:57.360

What it does:

The Reuters Direct plugin for WordPress has a vulnerability that allows unauthorized modification of its data, specifically enabling unauthenticated attackers to reset the plugin's settings by exploiting a missing capability check on the 'logoff' action.

Why it's a problem:

This vulnerability is a problem because it allows attackers to alter the plugin's settings without permission, potentially disrupting the functionality of the WordPress site and causing unintended changes or security issues.

Steps to mitigate:

  • Update the Reuters Direct plugin to a version higher than 3.0.0]
  • [Monitor site activity for unusual changes to plugin settings]
  • [Restrict access to the WordPress site's administration area to trusted users only
CVE-2025-12578 4.3
Published: 2025-11-27T03:15:57.150

What it does:

The Reuters Direct plugin for WordPress has a vulnerability that allows attackers to trick site administrators into resetting the plugin's settings without their knowledge or consent, by sending forged requests to the site.

Why it's a problem:

This vulnerability is a problem because it enables unauthenticated attackers to alter the plugin's settings, potentially disrupting the site's functionality or leading to unauthorized access, which could compromise the site's security and integrity.

Steps to mitigate:

  • Update the Reuters Direct plugin to a version higher than 3.0.0]
  • [Verify the authenticity of links and requests before clicking or taking action]
  • [Implement additional security measures, such as CSRF protection plugins, to enhance site security]
  • [Monitor site activity for suspicious behavior and reset plugin settings to their default values if necessary]
CVE-2025-0658 0
Published: 2025-11-27T01:15:46.583

What it does:

A vulnerability in Automated Logic and Carrier's Zone Controller, which uses the BACnet protocol, can cause the device to crash and enter a fault state. After resetting, a second malicious packet can render the device permanently unresponsive, requiring a manual power cycle to recover.

Why it's a problem:

This vulnerability is a problem because it allows an attacker to disrupt the functionality of the Zone Controller, potentially leading to loss of control over building automation systems, causing inconvenience, and requiring manual intervention to restore functionality.

Steps to mitigate:

  • Update device firmware to the latest version
  • Implement network segmentation to limit access to the Zone Controller
  • Use intrusion detection and prevention systems to detect and block malicious BACnet packets
  • Perform regular security audits and vulnerability assessments
  • Ensure physical access control to prevent unauthorized manual power cycles.
CVE-2025-0657 0
Published: 2025-11-27T01:15:46.437

What it does:

The CVE-2025-0657 vulnerability allows an attacker to send malformed packets through a BACnet MS/TP network to Automated Logic and Carrier i-Vu Gen5 routers, causing the devices to enter a fault state and lose network visibility.

Why it's a problem:

This vulnerability is a problem because it can disrupt the normal functioning of affected devices, requiring a manual power cycle to restore network connectivity, which can lead to downtime, increased maintenance costs, and potential security risks.

Steps to mitigate:

  • Update driver version to the latest patch
  • [Apply network segmentation to limit access to vulnerable devices
  • [Implement packet inspection and filtering on BACnet MS/TP networks
  • [Manually monitor device status and perform power cycles as needed
  • [Contact Automated Logic and Carrier for additional guidance and support].
CVE-2024-5540 0
Published: 2025-11-27T01:15:46.300

What it does:

This vulnerability allows a malicious actor to inject malicious code into the login panels of ALC WebCTRL and Carrier i-Vu systems (versions older than 8.0), which can lead to reflective cross-site scripting (XSS) attacks that compromise the client browser.

Why it's a problem:

This vulnerability is a problem because it enables attackers to manipulate the client browser, potentially stealing sensitive information, taking control of user sessions, or performing unauthorized actions on behalf of the user, which can lead to security breaches and data theft.

Steps to mitigate:

  • Update ALC WebCTRL and Carrier i-Vu systems to version 8.0 or later
  • Implement input validation and sanitization to prevent malicious code injection
  • Use web application firewalls (WAFs) to detect and block XSS attacks
  • Enable browser-based security features, such as XSS filtering, to reduce the risk of successful attacks.
CVE-2024-5539 0
Published: 2025-11-27T01:15:46.120

What it does:

This vulnerability allows an attacker to bypass security restrictions in ALC WebCTRL and Carrier i-Vu systems, potentially exposing sensitive information through the web-based building automation server.

Why it's a problem:

This vulnerability is a problem because it can give unauthorized access to sensitive information and systems, potentially leading to data breaches, unauthorized changes to building automation systems, and other security incidents.

Steps to mitigate:

  • Update ALC WebCTRL and Carrier i-Vu systems to a version later than 8.5
  • Implement additional access controls and authentication measures to prevent unauthorized access
  • Monitor system logs and network traffic for suspicious activity
  • Limit access to the web-based building automation server to only necessary personnel and systems.
CVE-2025-66040 3.6
Published: 2025-11-27T00:15:55.343

What it does:

The CVE-2025-66040 vulnerability allows attackers to inject JavaScript code into a user's browser during the OAuth authentication process for the Spotify Web API, using the Spotipy Python library, by exploiting an unsanitized error parameter in the OAuth callback server.

Why it's a problem:

This vulnerability is a problem because it enables attackers to execute arbitrary JavaScript code in the user's browser, potentially leading to unauthorized access, data theft, or other malicious activities, compromising the security and privacy of users' accounts and information.

Steps to mitigate:

  • Update Spotipy to version 2.25.2 or later
  • [Verify that your application is using a sanitized error parameter in the OAuth callback server]
  • [Implement additional security measures, such as input validation and output encoding, to prevent cross-site scripting (XSS) attacks]
CVE-2025-66035 0
Published: 2025-11-26T23:15:49.550

What it does:

The CVE-2025-66035 vulnerability allows for the leakage of a Cross-Site Request Forgery (XSRF) token in Angular applications using protocol-relative URLs in HTTP clients, potentially disclosing sensitive information to an attacker-controlled domain.

Why it's a problem:

This vulnerability is a problem because it can lead to unauthorized access and actions on a user's behalf, as the leaked XSRF token can be used by an attacker to bypass security measures and perform malicious requests.

Steps to mitigate:

  • Update to patched Angular versions 19.2.16, 20.3.14, or 21.0.1
  • Avoid using protocol-relative URLs (starting with //) in HttpClient requests
  • Use relative paths (starting with a single /) or fully qualified, trusted absolute URLs for all backend communication.
CVE-2025-66031 0
Published: 2025-11-26T23:15:49.397

What it does:

The CVE-2025-66031 vulnerability allows attackers to craft special input that causes the node-forge library to recursively parse it without limits, leading to a Denial-of-Service (DoS) attack when handling untrusted data.

Why it's a problem:

This vulnerability is a problem because it enables remote, unauthenticated attackers to cause a service disruption by exhausting the system's resources, making it unavailable to legitimate users.

Steps to mitigate:

  • Update node-forge to version 1.3.2 or later-
  • Verify that your application is not using a vulnerable version of node-forge-
  • Avoid parsing untrusted DER inputs until the update is applied
CVE-2025-66030 0
Published: 2025-11-26T23:15:49.237

What it does:

The CVE-2025-66030 vulnerability is an Integer Overflow issue in the node-forge library, which allows remote attackers to manipulate ASN.1 structures and disguise untrusted identifiers as trusted ones by exploiting 32-bit bitwise truncation.

Why it's a problem:

This vulnerability is a problem because it enables attackers to bypass security checks that rely on identifier verification, potentially leading to unauthorized access or malicious activities, as the truncated identifiers may be mistakenly trusted by downstream security mechanisms.

Steps to mitigate:

  • Update node-forge to version 1.3.2 or later
  • Verify the integrity of ASN.1 structures in your application
  • Monitor for suspicious activity related to identifier verification and OID-based security decisions.
CVE-2025-64344 7.5
Published: 2025-11-26T23:15:49.080

What it does:

The CVE-2025-64344 vulnerability in Suricata, a network security engine, allows a stack overflow to occur when working with large buffers in Lua scripts, which can be triggered by users of Lua rules and output scripts, particularly when a rule passes a large buffer to a Lua script.

Why it's a problem:

This vulnerability is a problem because it can lead to a stack overflow, potentially causing the system to crash or become unstable, and may allow attackers to execute arbitrary code, compromising the security of the network.

Steps to mitigate:

  • Update Suricata to version 7.0.13 or 8.0.2
  • [Disable Lua rules and output scripts]
  • [Set limits such as stream.depth.reassembly and HTTP response body limits (response-body-limit) to less than half the stack size]
CVE-2025-64335 7.5
Published: 2025-11-26T23:15:48.913

What it does:

The CVE-2025-64335 vulnerability causes a NULL dereference in Suricata, a network security engine, when a specific keyword ("entropy") is used together with "base64_data". This occurs in Suricata versions 8.0.0 to 8.0.1.

Why it's a problem:

This vulnerability is a problem because it can potentially cause Suricata to crash or become unstable when encountering specific rules, which can lead to a disruption in network security monitoring and protection, allowing potential threats to go undetected.

Steps to mitigate:

  • Update Suricata to version 8.0.2 or later
  • Disable rules that use "entropy" in conjunction with "base64_data" as a temporary workaround
  • Monitor network security logs for any signs of instability or crashes related to Suricata.
CVE-2025-64334 7.5
Published: 2025-11-26T23:15:48.750

What it does:

The CVE-2025-64334 vulnerability allows compressed HTTP data to cause unbounded memory growth during decompression in Suricata, a network security engine, affecting versions 8.0.0 to 8.0.2.

Why it's a problem:

This vulnerability is a problem because it can lead to excessive memory consumption, potentially causing the system to crash or become unresponsive, which can disrupt network security monitoring and protection.

Steps to mitigate:

  • Update Suricata to version 8.0.2 or later
  • Disable LZMA decompression
  • Limit response-body-limit size to prevent excessive memory growth.
CVE-2025-64333 7.5
Published: 2025-11-26T23:15:48.590

What it does:

The CVE-2025-64333 vulnerability causes Suricata, a network security engine, to crash due to a stack overflow when logging large HTTP content types.

Why it's a problem:

This vulnerability is a problem because it can lead to a denial-of-service (DoS) condition, where Suricata becomes unresponsive and unable to inspect network traffic, potentially allowing malicious activity to go undetected.

Steps to mitigate:

  • Update Suricata to version 7.0.13 or 8.0.2
  • [Limit stream.reassembly.depth to less than half the stack size as a temporary workaround]
  • Increase the process stack size to make it less likely for the bug to trigger.
CVE-2025-64332 7.5
Published: 2025-11-26T23:15:48.430

What it does:

The CVE-2025-64332 vulnerability causes a stack overflow in Suricata, a network security engine, when SWF decompression is enabled, leading to a crash.

Why it's a problem:

This vulnerability is a problem because it can be exploited to disrupt the normal functioning of Suricata, potentially allowing malicious traffic to go undetected and compromising the security of the network.

Steps to mitigate:

  • Update Suricata to version 7.0.13 or 8.0.2
  • Disable SWF decompression by setting swf-decompression to false in suricata.yaml
  • Set decompress-depth to a value lower than half of the stack size if SWF decompression must be enabled.
CVE-2025-64331 7.5
Published: 2025-11-26T23:15:48.263

What it does:

The CVE-2025-64331 vulnerability allows a stack overflow to occur in Suricata, a network security engine, when handling large HTTP file transfers with increased response body limits and enabled logging of printable HTTP bodies.

Why it's a problem:

This vulnerability is a problem because it can cause a stack overflow, potentially leading to a crash or allowing an attacker to execute arbitrary code, which could compromise the security of the system and allow unauthorized access or data breaches.

Steps to mitigate:

  • Update Suricata to version 7.0.13 or 8.0.2
  • [Use default HTTP response body limits]
  • [Disable http-body-printable logging, which is disabled by default anyway, to prevent potential exploitation until an update can be applied].
CVE-2025-64330 7.5
Published: 2025-11-26T23:15:48.093

What it does:

The CVE-2025-64330 vulnerability is a heap overflow issue in the Suricata network IDS, IPS, and NSM engine that occurs when logging verdicts in certain records, potentially causing the system to crash. This happens when the per-packet alert queue is filled with alerts and followed by a pass rule.

Why it's a problem:

This vulnerability is a problem because it can lead to system crashes, resulting in downtime and potential security breaches. An attacker could exploit this issue to disrupt the normal functioning of the Suricata engine, compromising the security of the network it is supposed to protect.

Steps to mitigate:

  • Update Suricata to version 7.0.13 or 8.0.2
  • [Increase the alert queue size by modifying the packet-alert-max setting in suricata.yaml to reduce the likelihood of the issue occurring]
  • Enable monitoring to quickly detect and respond to potential crashes or security breaches.
CVE-2025-62593 0
Published: 2025-11-26T23:15:47.927

What it does:

The CVE-2025-62593 vulnerability allows attackers to exploit a critical Remote Code Execution (RCE) flaw in the Ray AI compute engine, versions prior to 2.52.0, by manipulating the User-Agent header in browser requests, making it possible to execute malicious code when a developer visits a malicious website or is served a malicious advertisement.

Why it's a problem:

This vulnerability is a problem because it enables attackers to execute arbitrary code on a developer's system, potentially leading to unauthorized access, data theft, or other malicious activities, simply by tricking the developer into visiting a malicious website or serving them a malicious ad, which can be done through various means, including DNS rebinding attacks.

Steps to mitigate:

  • Update Ray to version 2.52.0 or later
  • Avoid visiting suspicious websites or clicking on untrusted links
  • Use an ad blocker to reduce the risk of malvertising
  • Implement additional security measures, such as network segmentation and access controls, to limit the potential damage in case of an exploit.
CVE-2025-40934 0
Published: 2025-11-26T23:15:47.773

What it does:

The XML-Sig vulnerability for Perl allows an attacker to bypass validation checks by removing the signature from an XML document, causing the module to incorrectly verify the file as valid even though it lacks a signature.

Why it's a problem:

This vulnerability is a problem because it enables attackers to manipulate XML files without being detected, potentially leading to fraudulent activities or data tampering, as unsigned XML files are not properly validated and can be passed off as legitimate.

Steps to mitigate:

  • Update XML-Sig to a version later than 0.67
  • [Verify the integrity of XML files manually]
  • Implement additional validation checks to ensure XML files contain signatures before processing them.
CVE-2020-36874 0
Published: 2025-11-26T23:15:47.550

What it does:

This vulnerability allows an unauthenticated remote attacker to download a compressed configuration backup from the ACE SECURITY WIP-90113 HD camera through the /web/cgi-bin/hi3510/backup.cgi endpoint, which may contain administrative credentials and sensitive device settings.

Why it's a problem:

This is a problem because it enables an attacker to obtain sensitive information, including administrative credentials, without needing any authentication or authorization, which could be used to further compromise the camera or the connected network.

Steps to mitigate:

  • Update camera firmware to the latest version available
  • [Disable remote access to the camera until a patch is available]
  • Change administrative credentials and other sensitive settings to prevent potential misuse
  • [Limit network access to the camera to trusted devices and users]
  • Monitor camera and network activity for signs of unauthorized access.
CVE-2020-36873 0
Published: 2025-11-26T23:15:47.397

What it does:

The CVE-2020-36873 vulnerability allows an unauthenticated remote attacker to download a compressed configuration backup from Astak CM-818T3 wireless security surveillance cameras without needing a password or permission, potentially exposing administrative credentials and sensitive device settings.

Why it's a problem:

This vulnerability is a problem because it enables attackers to obtain sensitive information, including administrative credentials, which could be used to further compromise the camera or the connected network, potentially leading to unauthorized access, data breaches, or other malicious activities.

Steps to mitigate:

  • Update camera firmware to the latest version
  • [Disable remote access to the camera until a patch is available]
  • Change default administrative credentials and use strong passwords
  • Limit network access to the camera
  • Monitor camera and network activity for suspicious behavior
CVE-2020-36872 0
Published: 2025-11-26T23:15:47.227

What it does:

The CVE-2020-36872 vulnerability allows a remote attacker to crash the BACnet Test Server by sending a malformed packet with an incorrect BVLC Length value, causing the server to fail and resulting in a denial of service.

Why it's a problem:

This vulnerability is a problem because it enables an unauthenticated attacker to disrupt the service of the BACnet Test Server, potentially causing significant disruptions to building automation and control systems that rely on this server, and leading to downtime and potential security breaches.

Steps to mitigate:

  • Update the BACnet Test Server to a version later than 1.01
  • [Implement network segmentation to limit access to the BACnet Test Server]
  • [Configure firewalls to block incoming UDP traffic on port 47808 from untrusted sources]
  • [Monitor server logs for signs of attempted exploitation and denial of service attacks].
CVE-2020-36871 0
Published: 2025-11-26T23:15:47.060

What it does:

The CVE-2020-36871 vulnerability allows anyone to remotely download a backup of the camera's configuration from the ESCAM QD-900 WIFI HD camera without needing a password or permission, potentially exposing sensitive information like admin credentials and device settings.

Why it's a problem:

This vulnerability is a problem because it lets unauthorized people access sensitive camera settings and credentials, which could be used to further compromise the camera or the network it's connected to, potentially leading to unauthorized access, data theft, or other malicious activities.

Steps to mitigate:

  • Update the camera's firmware to the latest version if available
  • [contact the manufacturer for a patch or fix]
  • [change the default administrative credentials and limit network access to the camera]
  • [use a firewall or network segmentation to restrict access to the camera]
  • [monitor the camera and network for suspicious activity]
CVE-2019-25227 0
Published: 2025-11-26T23:15:46.880

What it does:

The CVE-2019-25227 vulnerability allows unauthorized access to the configuration files of Tellion HN-2204AP routers through a specific endpoint, enabling the download of a compressed archive containing sensitive device settings without requiring a password or authentication.

Why it's a problem:

This vulnerability is a problem because it exposes sensitive information such as administrative credentials, wireless keys, and other critical settings, which can be used by attackers to gain further access to the device or the entire network, potentially leading to more severe security breaches.

Steps to mitigate:

  • Update the router's firmware to the latest version
  • [Apply patches or fixes provided by the manufacturer]
  • Change default administrative credentials and wireless keys
  • [Limit access to the router's management interface through firewall rules or VPN]
  • Regularly monitor the device for suspicious activity.
CVE-2019-25226 0
Published: 2025-11-26T23:15:45.857

What it does:

The CVE-2019-25226 vulnerability allows an attacker to remotely access and download the configuration files of a Dongyoung Media DM-AP240T/W wireless access point without needing a password or any authorization. This configuration file is a compressed archive that may contain sensitive information such as admin credentials.

Why it's a problem:

This vulnerability is a problem because it enables an unauthorized attacker to obtain sensitive information about the device and its network settings, which can be used to launch further attacks or take control of the device and network.

Steps to mitigate:

  • Update the device firmware to the latest version
  • [Apply security patches from the manufacturer]
  • Change default administrative credentials and ensure strong passwords are used
  • Limit access to the device through network segmentation and firewall rules
  • Regularly monitor device and network activity for suspicious behavior.