Top 100 Recent CVEs

CVE-2025-13813 5.6
Published: 2025-12-01T07:16:01.493

What it does:

This vulnerability allows an attacker to remotely access and manipulate files in the "/storage/" directory of the Mogu Blog v2 Storage Management Endpoint without proper authorization, due to a missing authorization check in the system.

Why it's a problem:

This is a problem because it enables unauthorized access to potentially sensitive data, which could lead to data breaches, tampering, or other malicious activities, and the fact that the exploit is publicly available increases the risk of it being used by attackers.

Steps to mitigate:

  • Update Mogu Blog to a version later than 5.2 if available
  • [Implement additional access controls and authentication mechanisms for the Storage Management Endpoint]
  • [Monitor the system for suspicious activity and signs of exploitation
  • [Consider contacting a security expert or the community for alternative solutions since the vendor is unresponsive].
CVE-2025-13811 6.3
Published: 2025-12-01T07:16:01.203

What it does:

This vulnerability allows an attacker to inject malicious SQL code into the WebStack-Guns application by manipulating the "sort" argument, potentially leading to unauthorized access or modification of sensitive data.

Why it's a problem:

This vulnerability is a problem because it enables remote attackers to exploit the application's database, potentially resulting in data breaches, tampering, or disruption of service, which can have significant consequences for the application's users and the organization hosting it.

Steps to mitigate:

  • Update WebStack-Guns to a patched version if available
  • Implement input validation and sanitization for the "sort" argument to prevent malicious input
  • Use a Web Application Firewall (WAF) to detect and block potential SQL injection attacks
  • Limit remote access to the application and its database to trusted IP addresses and users
  • Monitor application logs for suspicious activity and respond promptly to potential security incidents.
CVE-2025-13810 5.3
Published: 2025-12-01T07:16:00.690

What it does:

This vulnerability allows an attacker to manipulate the `renderPicture` function in the `KaptchaController` of the WebStack-Guns 1.0 application, resulting in path traversal, which can be initiated remotely.

Why it's a problem:

This vulnerability is a problem because it enables attackers to access and potentially modify sensitive files and directories on the server by traversing the file system, which could lead to data breaches, unauthorized access, and other malicious activities.

Steps to mitigate:

  • Update WebStack-Guns to a patched version if available
  • Implement security measures to restrict remote access to the `renderPicture` function
  • Use a web application firewall (WAF) to detect and prevent path traversal attacks
  • Monitor server logs for suspicious activity
  • Consider replacing the vulnerable `KaptchaController` with a secure alternative.
CVE-2025-13809 6.3
Published: 2025-12-01T06:15:58.280

What it does:

This vulnerability allows an attacker to manipulate the SSH connection handler in the orion-ops software, leading to server-side request forgery by altering arguments such as host, SSH port, username, password, and authentication type, which can be done remotely.

Why it's a problem:

This vulnerability is a problem because it enables remote attackers to potentially access and manipulate sensitive data or systems by exploiting the SSH connection handler, which could lead to unauthorized access, data breaches, or other malicious activities.

Steps to mitigate:

  • Apply the available patch to the orion-ops software
  • [Verify that the vendor has released an official update and install it as soon as possible]
  • [Implement additional security measures to monitor and restrict SSH connections to prevent potential exploitation]
  • [Consider reaching out to the vendor or a security expert for further guidance on securing the orion-ops software]
CVE-2025-13808 7.3
Published: 2025-12-01T05:16:04.070

What it does:

This vulnerability allows an attacker to manipulate the ID argument in the UserController function of the orion-ops application, bypassing proper authorization and potentially gaining unauthorized access to user profiles.

Why it's a problem:

This vulnerability is a problem because it enables remote attackers to exploit the improper authorization, allowing them to access or modify sensitive user data without permission, which can lead to security breaches and data theft.

Steps to mitigate:

  • Update orion-ops to a version later than 5925824997a3109651bbde07460958a7be249ed1
  • [Apply proper input validation and authorization checks to the UserController function]
  • Implement remote access controls and monitoring to detect potential exploits
  • [Contact a security expert or the vendor for further guidance and support]
CVE-2025-13807 4.3
Published: 2025-12-01T05:16:02.987

What it does:

The CVE-2025-13807 vulnerability allows for improper authorization in the MachineKeyController function of the orion-ops API, which can be exploited remotely.

Why it's a problem:

This vulnerability is a problem because it enables unauthorized access to the system, potentially allowing attackers to perform malicious actions without proper credentials, which can lead to data breaches, system compromise, or other security issues.

Steps to mitigate:

  • Update orion-ops to a version later than 5925824997a3109651bbde07460958a7be249ed1
  • [Contact the vendor for a patch or workaround]
  • Implement additional authentication and authorization measures to limit potential damage
  • [Monitor system logs for suspicious activity]
  • Consider implementing a web application firewall (WAF) to detect and prevent exploitation attempts.
CVE-2025-13806 7.3
Published: 2025-12-01T05:16:00.013

What it does:

The CVE-2025-13806 vulnerability allows for improper authorization in the NutzBoot Transaction API due to the manipulation of the "from/to/wei" argument in the EthModule.java file, potentially enabling remote exploitation.

Why it's a problem:

This vulnerability is a problem because it can be exploited remotely, allowing unauthorized access and potentially leading to malicious activities, such as unauthorized transactions or data breaches, which can compromise the security and integrity of the system.

Steps to mitigate:

  • Update NutzBoot to a version later than 2.6.0-SNAPSHOT
  • [Verify and validate user input to prevent argument manipulation]
  • [Implement additional authorization and authentication measures to prevent improper access]
  • [Monitor the system for potential exploitation attempts and have an incident response plan in place]
CVE-2025-13805 3.7
Published: 2025-12-01T04:16:05.643

What it does:

The CVE-2025-13805 vulnerability allows an attacker to manipulate the deserialization process in the LiteRpc-Serializer component of NutzBoot, potentially leading to remote code execution.

Why it's a problem:

This vulnerability is a problem because it could allow an attacker to remotely execute malicious code, potentially gaining unauthorized access to sensitive data or systems, and it has been made publicly available, making it a target for exploitation.

Steps to mitigate:

  • Update NutzBoot to a version later than 2.6.0-SNAPSHOT
  • [Implement secure deserialization practices to limit the attack surface]
  • [Monitor systems for signs of exploitation and have an incident response plan in place]
  • [Limit remote access to the affected component to reduce the risk of attack].
CVE-2025-13804 4.3
Published: 2025-12-01T04:16:05.393

What it does:

The CVE-2025-13804 vulnerability allows an attacker to manipulate the Ethereum Wallet Handler in NutzBoot versions up to 2.6.0-SNAPSHOT, resulting in the disclosure of sensitive information, and this attack can be initiated remotely.

Why it's a problem:

This vulnerability is a problem because it enables unauthorized access to sensitive information, potentially leading to financial loss, identity theft, or other malicious activities, and since the exploit has been made public, attackers can easily use it to target vulnerable systems.

Steps to mitigate:

  • Update NutzBoot to a version later than 2.6.0-SNAPSHOT
  • [Monitor network traffic for suspicious activity]
  • [Implement additional security measures to protect sensitive information]
  • [Keep software and systems up to date with the latest security patches]
CVE-2025-13803 7.3
Published: 2025-12-01T03:15:46.390

What it does:

The CVE-2025-13803 vulnerability allows an attacker to manipulate the "Host" argument in the MediaCrush 1.0.0/1.0.1 Header Handler, leading to improper neutralization of HTTP headers for scripting syntax, which can be exploited remotely.

Why it's a problem:

This vulnerability is a problem because it enables remote attackers to potentially inject malicious scripts or headers, allowing them to execute unauthorized actions, steal sensitive information, or take control of the affected system, which could lead to significant security breaches and data compromises.

Steps to mitigate:

  • Update MediaCrush to a version later than 1.0.1
  • [Apply security patches to the Header Handler component
  • [Implement proper input validation and sanitization for the "Host" argument
  • [Monitor system logs for suspicious activity
  • [Consider implementing a Web Application Firewall (WAF) to detect and prevent similar attacks]
CVE-2025-13802 4.3
Published: 2025-12-01T03:15:46.140

What it does:

This vulnerability allows an attacker to manipulate the "selected_date" argument in the "Make a Reservation" component of the jairiidriss RestaurantWebsite, leading to a cross-site scripting (XSS) attack that can be initiated remotely.

Why it's a problem:

This vulnerability is a problem because it enables attackers to inject malicious code into the website, potentially stealing user data, taking control of user sessions, or performing other malicious actions, all of which can compromise the security and privacy of users interacting with the website.

Steps to mitigate:

  • Update the website to the latest version if available
  • [Avoid using the "Make a Reservation" component until a fix is released]
  • [Implement web application firewall (WAF) rules to detect and prevent XSS attacks]
  • [Monitor website traffic for signs of malicious activity]
  • [Contact the vendor or a security expert for further guidance and support]
CVE-2025-13800 6.3
Published: 2025-12-01T02:15:45.677

What it does:

This vulnerability allows an attacker to inject commands into the system by manipulating the "mac" argument in the set_mesh_disconnect function of the /send_order.cgi file, which can be exploited remotely.

Why it's a problem:

This vulnerability is a problem because it enables remote attackers to execute arbitrary commands on the system, potentially leading to unauthorized access, data theft, or other malicious activities, and the fact that the exploit has been made public increases the risk of attack.

Steps to mitigate:

  • Update the ADSLR NBR1005GPEV2 firmware to a version that fixes this vulnerability if available
  • [Apply network segmentation to limit access to the vulnerable device
  • [Implement a web application firewall (WAF) to detect and prevent command injection attacks
  • [Monitor the system for suspicious activity and be prepared to respond to potential incidents.
CVE-2025-64772 0
Published: 2025-12-01T01:16:00.877

What it does:

The installer for INZONE Hub versions 1.0.10.3 to 1.0.17.0 has a flaw that allows it to load Dynamic Link Libraries (DLLs) from unsafe locations, potentially leading to the execution of arbitrary code with the same privileges as the user running the installer.

Why it's a problem:

This vulnerability is a problem because it could allow an attacker to run malicious code on a user's system, potentially leading to data theft, system compromise, or other harmful activities, all under the guise of the user's own privileges.

Steps to mitigate:

  • Update INZONE Hub to a version later than 1.0.17.0]
  • [Avoid running the installer from untrusted locations]
  • [Use an antivirus program to scan for and remove any potential malware that may have been installed as a result of this vulnerability]
CVE-2025-13799 6.3
Published: 2025-12-01T01:16:00.620

What it does:

This vulnerability allows an attacker to inject commands into the system by manipulating the "mac" argument in the ap_macfilter_del function of the /send_order.cgi file, potentially giving them unauthorized control over the device.

Why it's a problem:

This vulnerability is a problem because it can be exploited remotely, allowing attackers to execute arbitrary commands on the device without physical access, which could lead to data theft, device takeover, or other malicious activities, especially since the exploit has been publicly disclosed.

Steps to mitigate:

  • Update the device to the latest firmware version if available
  • [contact the vendor for a patch or workaround]
  • Implement network segmentation to limit access to the device
  • [use a web application firewall (WAF) to detect and prevent command injection attacks]
  • Monitor device logs for suspicious activity.
CVE-2025-13798 6.3
Published: 2025-12-01T01:16:00.383

What it does:

This vulnerability allows an attacker to inject commands into the system by manipulating the "mac" argument in the ap_macfilter_add function of the /send_order.cgi file in ADSLR NBR1005GPEV2 devices.

Why it's a problem:

This is a problem because it enables remote attackers to execute arbitrary commands on the device, potentially leading to unauthorized access, data theft, or disruption of service, which can compromise the security and integrity of the system.

Steps to mitigate:

  • Update device firmware to the latest version if available
  • [Apply network segmentation to limit access to vulnerable devices
  • [Implement intrusion detection and prevention systems to monitor for suspicious activity
  • [Contact the vendor or a security expert for customized guidance and support].
CVE-2025-13797 6.3
Published: 2025-12-01T01:16:00.147

What it does:

This vulnerability allows an attacker to inject commands into a system by manipulating the "del_swifimac" argument in the "/send_order.cgi" file, which can be done remotely.

Why it's a problem:

This vulnerability is a problem because it enables remote attackers to execute arbitrary commands on the system, potentially leading to unauthorized access, data breaches, or other malicious activities, and the exploit is publicly available.

Steps to mitigate:

  • Update the ADSLR B-QE2W401 firmware to a version that fixes this issue if available
  • [contact the vendor for a patch or workaround]
  • implement network segmentation to limit access to the vulnerable system
  • [monitor the system for suspicious activity and have an incident response plan in place]
CVE-2025-13796 6.3
Published: 2025-12-01T00:15:46.670

What it does:

This vulnerability allows an attacker to manipulate the "url" argument in the AnalyticsScript function of the deco-cx app, leading to server-side request forgery, which can be executed remotely.

Why it's a problem:

This vulnerability is a problem because it enables attackers to trick the server into making unauthorized requests, potentially allowing them to access sensitive data, disrupt service, or execute malicious actions, all from a remote location.

Steps to mitigate:

  • Upgrade to version 0.120.2 of the deco-cx app
  • Update the affected Parameter Handler component
  • Apply the latest security patches to prevent exploitation of this vulnerability.
CVE-2025-13795 2.4
Published: 2025-11-30T23:15:47.107

What it does:

The CVE-2025-13795 vulnerability allows an attacker to manipulate the "First Name" field in the Edit Student Info Page of the codingWithElias School Management System, leading to a cross-site scripting (XSS) attack. This means an attacker can inject malicious code into the system, potentially stealing user data or taking control of user sessions.

Why it's a problem:

This vulnerability is a problem because it enables remote attackers to exploit the system, potentially leading to unauthorized access to sensitive student information, session hijacking, or further malicious activities. The fact that the exploit is publicly available increases the risk of attack, and the vendor's lack of response exacerbates the issue.

Steps to mitigate:

  • Update the codingWithElias School Management System to the latest version available
  • [Implement input validation and sanitization for all user-input fields, especially the "First Name" field]
  • Restrict access to the Edit Student Info Page to authorized personnel only
  • Monitor the system for suspicious activity and implement a web application firewall (WAF) to detect and prevent XSS attacks.
CVE-2025-35028 9.1
Published: 2025-11-30T22:15:46.653

What it does:

This vulnerability allows an attacker to execute arbitrary commands with root privileges on a HexStrike AI MCP server by providing a specially crafted command-line argument starting with a semi-colon ; to a specific API endpoint.

Why it's a problem:

This vulnerability is a problem because it enables attackers to gain unrestricted access to the server, allowing them to perform malicious actions, steal sensitive data, or disrupt the system's operation, all with the highest level of privilege.

Steps to mitigate:

  • Update the HexStrike AI MCP server to a version that sanitizes command-line arguments]
  • [Configure the EnhancedCommandExecutor class to sanitize inputs]
  • [Implement additional security measures, such as input validation and authentication, to restrict access to the API endpoint]
  • [Monitor server logs for suspicious activity and signs of exploitation.
CVE-2025-13793 4.3
Published: 2025-11-30T17:15:45.273

What it does:

This vulnerability allows attackers to manipulate the "Error" argument in the GET Parameter Handler of the winston-dsouza Ecommerce-Website, leading to cross-site scripting (XSS) attacks, which can be executed remotely.

Why it's a problem:

This vulnerability is a problem because it enables attackers to inject malicious code into the website, potentially allowing them to steal user data, take control of user sessions, or perform other malicious actions, all of which can be done remotely without the need for physical access to the system.

Steps to mitigate:

  • Update the winston-dsouza Ecommerce-Website to a version that fixes this vulnerability if available
  • [validate and sanitize all user input to prevent malicious code injection]
  • [implement a Web Application Firewall (WAF) to detect and prevent XSS attacks]
  • [monitor the website for suspicious activity and have an incident response plan in place]
CVE-2025-13792 7.3
Published: 2025-11-30T16:15:47.260

What it does:

The CVE-2025-13792 vulnerability allows an attacker to inject code into the Qualitor system by manipulating the "passageiros" argument in the /html/st/stdeslocamento/request/getResumo.php file, potentially leading to remote code execution.

Why it's a problem:

This vulnerability is a problem because it enables remote attackers to inject malicious code, potentially allowing them to access sensitive data, disrupt system operations, or gain unauthorized control over the affected system, which could have serious security and privacy implications.

Steps to mitigate:

  • Update Qualitor to a patched version if available
  • Implement input validation and sanitization for the "passageiros" argument
  • Restrict access to the /html/st/stdeslocamento/request/getResumo.php file
  • Monitor system logs for suspicious activity
  • Consider implementing a Web Application Firewall (WAF) to detect and prevent code injection attacks.
CVE-2025-13791 6.3
Published: 2025-11-30T16:15:46.277

What it does:

The CVE-2025-13791 vulnerability allows an attacker to manipulate the Common.getHomeDir function in Scada-LTS, leading to path traversal, which enables them to access and potentially modify files outside the intended directory.

Why it's a problem:

This vulnerability is a problem because it can be exploited remotely, allowing attackers to access sensitive files and potentially disrupt or take control of the system, and the fact that the exploit is publicly available increases the likelihood of an attack.

Steps to mitigate:

  • Update Scada-LTS to a version later than 2.7.8.1.
  • Implement network security measures to restrict remote access.
  • Monitor the system for suspicious activity and potential exploitation attempts.
CVE-2025-13790 4.3
Published: 2025-11-30T15:15:46.003

What it does:

This vulnerability allows an attacker to perform a cross-site request forgery (CSRF) attack on Scada-LTS versions up to 2.7.8.1, which can be initiated remotely, potentially allowing unauthorized actions to be taken on behalf of a user.

Why it's a problem:

This vulnerability is a problem because it enables attackers to trick users into performing unintended actions, potentially leading to unauthorized access, data modification, or other malicious activities, and since the exploit has been publicly disclosed, attackers may already be utilizing it.

Steps to mitigate:

  • Update Scada-LTS to a version later than 2.7.8.1 if available
  • [Verify with the vendor for a patch or fix]
  • Implement CSRF protection measures such as token-based validation
  • Monitor system activity for suspicious requests
  • Limit user privileges to minimize potential damage.
CVE-2025-13789 6.3
Published: 2025-11-30T14:16:29.640

What it does:

This vulnerability allows an attacker to manipulate the "Base" argument in the makeRequest function of the ZenTao module/ai/model.php file, resulting in server-side request forgery, which can be launched remotely.

Why it's a problem:

This vulnerability is a problem because it enables attackers to trick the server into making unintended requests, potentially leading to unauthorized access to sensitive data, disruption of services, or other malicious activities, all of which can be initiated remotely without the need for physical access to the system.

Steps to mitigate:

  • Upgrade to ZenTao version 21.7.6 or later
  • Regularly monitor the system for signs of unauthorized access or unusual activity
  • Apply additional security measures to prevent server-side request forgery attacks, such as implementing strict input validation and secure request routing.
CVE-2025-13788 7.3
Published: 2025-11-30T13:15:59.877

What it does:

The CVE-2025-13788 vulnerability allows an attacker to inject malicious SQL code into the Chanjet CRM system by manipulating the "gblOrgID" argument in the /tools/upgradeattribute.php file, which can be done remotely.

Why it's a problem:

This vulnerability is a problem because it enables attackers to access and manipulate sensitive data in the CRM system, potentially leading to data breaches, unauthorized access, and other malicious activities, which can compromise the security and integrity of the system.

Steps to mitigate:

  • Update Chanjet CRM to the latest version
  • [Apply patches or fixes provided by the vendor, if available]
  • Implement a Web Application Firewall (WAF) to detect and prevent SQL injection attacks
  • Limit remote access to the /tools/upgradeattribute.php file
  • Monitor system logs for suspicious activity
  • Consider contacting a security expert or the vendor for further guidance and support.
CVE-2025-13787 5.4
Published: 2025-11-30T11:15:48.567

What it does:

The CVE-2025-13787 is a vulnerability in ZenTao versions up to 21.7.6-8564 that allows an attacker to manipulate the fileID argument in the file deletion function, potentially bypassing privilege checks and deleting files without proper authorization.

Why it's a problem:

This vulnerability is a problem because it enables remote attackers to exploit improper privilege management, potentially leading to unauthorized file deletion, data loss, and disruption of service, which can have significant consequences for the security and integrity of the affected system.

Steps to mitigate:

  • Upgrade to ZenTao version 21.7.7 or later
  • Ensure all affected components are updated to the latest version
  • Monitor system logs for suspicious file deletion activity to detect potential exploitation attempts.
CVE-2025-13786 7.3
Published: 2025-11-30T09:15:45.480

What it does:

This vulnerability allows an attacker to inject code into the taosir WTCMS system by manipulating the "content" argument in the fetch function of the /index.php file, which can be done remotely.

Why it's a problem:

This vulnerability is a problem because it enables remote code injection, allowing attackers to execute malicious code on the system, potentially leading to data breaches, system compromise, or other security incidents.

Steps to mitigate:

  • Update to the latest version of taosir WTCMS if available
  • [Apply patches or fixes provided by the community or third-party sources]
  • Implement a Web Application Firewall (WAF) to detect and prevent code injection attacks
  • Limit remote access to the system and implement strict input validation
  • Monitor system logs for suspicious activity and signs of exploitation.
CVE-2025-13785 4.3
Published: 2025-11-30T08:15:45.403

What it does:

The CVE-2025-13785 vulnerability allows an attacker to manipulate the Image Handler component in the yungifez Skuul School Management System, specifically targeting the /user/profile file, which can lead to the disclosure of sensitive information. This attack can be performed remotely.

Why it's a problem:

This vulnerability is a problem because it enables unauthorized access to sensitive information, potentially compromising the privacy and security of the individuals whose data is stored in the system. The fact that the exploit has been publicly disclosed and the vendor has not responded increases the risk of exploitation.

Steps to mitigate:

  • Update the yungifez Skuul School Management System to a version later than 2.6.5 if available
  • [Apply security patches or temporary fixes to the Image Handler component
  • [Implement additional security measures such as access controls and monitoring to detect potential exploitation
  • [Consider contacting a security expert or a trusted vendor for alternative solutions and support.
CVE-2025-13784 2.4
Published: 2025-11-30T07:15:44.743

What it does:

The CVE-2025-13784 vulnerability allows an attacker to perform a cross-site scripting (XSS) attack on the yungifez Skuul School Management System, specifically targeting the SVG File Handler component when editing school information. This can be done remotely.

Why it's a problem:

This vulnerability is a problem because it enables malicious actors to inject harmful scripts into the system, potentially stealing user data, taking control of user sessions, or disrupting the system's functionality. The fact that the exploit is publicly available and the vendor has not responded increases the risk of exploitation.

Steps to mitigate:

  • Update the yungifez Skuul School Management System to a version later than 2.6.5 if available
  • [Implement a web application firewall (WAF) to detect and prevent XSS attacks]
  • Restrict access to the /dashboard/schools/1/edit page and SVG File Handler component to authorized personnel only
  • Monitor system logs for suspicious activity and signs of exploitation
  • Consider using alternative school management systems with better security support.
CVE-2025-13783 6.3
Published: 2025-11-30T06:15:45.410

What it does:

The CVE-2025-13783 vulnerability allows an attacker to inject malicious SQL code into the taosir WTCMS system by manipulating the "ids" argument in the CommentadminController component, which can be executed remotely.

Why it's a problem:

This vulnerability is a problem because it enables attackers to access and manipulate sensitive data in the database, potentially leading to data breaches, unauthorized access, and other malicious activities, and since the exploit has been made public, it increases the likelihood of the vulnerability being exploited.

Steps to mitigate:

  • Update to a patched version of taosir WTCMS if available
  • [Apply input validation and sanitization to the "ids" argument in the CommentadminController component
  • [Implement a Web Application Firewall (WAF) to detect and prevent SQL injection attacks
  • [Limit remote access to the CommentadminController component
  • [Monitor database activity for suspicious behavior]
CVE-2025-66433 4.2
Published: 2025-11-30T05:16:12.110

What it does:

The CVE-2025-66433 vulnerability allows an authenticated user to submit a batch job that impersonates other users on the local machine, using HTCondor Access Point versions before 25.3.1.

Why it's a problem:

This vulnerability is a problem because it enables malicious users to gain unauthorized access to other users' accounts and potentially sensitive information, by pretending to be someone else on the same machine.

Steps to mitigate:

  • Update HTCondor Access Point to version 25.3.1 or later
  • Alternatively, update to version 24.12.14 or 25.0.3 for earlier release branches
  • Ensure that only trusted users have authentication privileges to minimize potential damage.
CVE-2025-66432 5.0
Published: 2025-11-30T05:16:08.353

What it does:

The CVE-2025-66432 vulnerability allows API tokens in Oxide control plane versions 15 through 17 (before 17.1) to be renewed beyond their intended expiration date.

Why it's a problem:

This vulnerability is a problem because it could enable unauthorized access to systems and data by allowing expired tokens to remain valid, potentially leading to security breaches and data compromises.

Steps to mitigate:

  • Update Oxide control plane to version 17.1 or later
  • Implement additional authentication and authorization measures to restrict access
  • Monitor API token usage and expiration dates to detect potential security issues
CVE-2025-13782 7.3
Published: 2025-11-30T04:15:58.387

What it does:

This vulnerability allows an attacker to inject malicious SQL code into the taosir WTCMS system by manipulating the "ids" argument in the SlideController, potentially leading to unauthorized data access or modification.

Why it's a problem:

This vulnerability is a problem because it enables remote attackers to exploit the system, potentially allowing them to extract or modify sensitive data, disrupt system operations, or gain unauthorized access to the system, which could have serious security and data integrity implications.

Steps to mitigate:

  • Update taosir WTCMS to the latest version available
  • [apply input validation and sanitization to the "ids" argument in the SlideController]
  • implement a Web Application Firewall (WAF) to detect and prevent SQL injection attacks
  • restrict access to the SlideController and related components to authorized personnel only
  • monitor system logs for suspicious activity and signs of exploitation.
CVE-2025-66424 6.5
Published: 2025-11-30T03:15:48.360

What it does:

The Tryton trytond version 6.0 before 7.6.11 has a vulnerability that allows unauthorized data export because it fails to enforce access rights.

Why it's a problem:

This vulnerability is a problem because it can lead to sensitive data being accessed and exported by unauthorized users, potentially resulting in data breaches and confidentiality issues.

Steps to mitigate:

  • Update Tryton trytond to version 7.6.11 or later
  • Update to version 7.4.21 if using the 7.4 series
  • Update to version 7.0.40 if using the 7.0 series
  • Update to version 6.0.70 if using the 6.0 series
CVE-2025-66423 7.1
Published: 2025-11-30T03:15:48.163

What it does:

The Tryton trytond version 6.0 before 7.6.11 has a vulnerability that fails to enforce access rights for the route of the HTML editor, allowing unauthorized access.

Why it's a problem:

This vulnerability is a problem because it can allow attackers to bypass security restrictions and potentially gain unauthorized access to sensitive data or functions, leading to data breaches or other malicious activities.

Steps to mitigate:

  • Update Tryton trytond to version 7.6.11 or later
  • Update to version 7.4.21 if using the 7.4 series
  • Update to version 7.0.40 if using the 7.0 series
  • Update to version 6.0.70 if using the 6.0 series
CVE-2025-66422 4.3
Published: 2025-11-30T03:15:47.970

What it does:

The CVE-2025-66422 vulnerability in Tryton trytond allows remote attackers to obtain sensitive server setup information, including trace-back data, when using versions prior to 7.6.11.

Why it's a problem:

This vulnerability is a problem because it exposes sensitive information about the server setup, which could be used by attackers to plan and execute further attacks, potentially leading to unauthorized access or data breaches.

Steps to mitigate:

  • Update Tryton trytond to version 7.6.11 or later
  • Alternatively, update to version 7.4.21, 7.0.40, or 6.0.70, depending on your current version
  • Ensure that all instances of Tryton trytond are updated to a patched version to prevent exploitation.
CVE-2025-66421 5.4
Published: 2025-11-30T03:15:47.757

What it does:

The Tryton sao vulnerability allows an attacker to inject malicious code into the system through unescaped completion values, leading to a Cross-Site Scripting (XSS) attack.

Why it's a problem:

This vulnerability is a problem because it enables an attacker to execute malicious scripts on a user's browser, potentially stealing sensitive information, taking control of the user's session, or performing unauthorized actions.

Steps to mitigate:

  • Update Tryton sao to version 7.6.11 or later
  • Update to version 7.4.21 if using the 7.4 series
  • Update to version 7.0.40 if using the 7.0 series
  • Update to version 6.0.69 if using the 6.0 series
CVE-2025-66420 5.4
Published: 2025-11-30T03:15:46.107

What it does:

The CVE-2025-66420 vulnerability allows an attacker to perform a Cross-Site Scripting (XSS) attack by sending an HTML attachment to the Tryton sao application, versions prior to 7.6.9.

Why it's a problem:

This vulnerability is a problem because it enables an attacker to inject malicious code into the application, potentially stealing user data, taking control of user sessions, or performing other unauthorized actions, which can compromise the security and integrity of the system.

Steps to mitigate:

  • Update Tryton sao to version 7.6.9 or later
  • Update to version 7.4.19 if using the 7.4 series
  • Update to version 7.0.38 if using the 7.0 series
  • Update to version 6.0.67 if using the 6.0 series
  • Avoid opening suspicious HTML attachments from untrusted sources.
CVE-2025-13615 9.8
Published: 2025-11-30T02:15:58.233

What it does:

The StreamTube Core plugin for WordPress allows unauthenticated attackers to change user passwords, potentially taking over administrator accounts, due to a vulnerability that lets users bypass authorization and access system resources.

Why it's a problem:

This vulnerability is a significant problem because it enables attackers to gain control of administrator accounts, allowing them to make malicious changes to the website, steal sensitive information, or disrupt its operation, which can lead to severe security breaches and reputational damage.

Steps to mitigate:

  • Update the StreamTube Core plugin to a version above 4.78
  • [Disable the 'registration password fields' option in theme settings if an update is not immediately available
  • [Implement additional security measures, such as two-factor authentication and monitoring of user account activity
  • [Consider temporarily removing the StreamTube Core plugin until a patched version is installed].
CVE-2025-6666 2.0
Published: 2025-11-29T09:15:44.757

What it does:

The CVE-2025-6666 vulnerability allows an attacker to exploit a hard-coded cryptographic key in the NFC Handler component of the motogadget mo.lock Ignition Lock, potentially giving them unauthorized access to the device.

Why it's a problem:

This vulnerability is a problem because it could allow an attacker to bypass security measures and gain control of the physical device, which could have serious consequences depending on how the device is used. The fact that the vendor has not responded to the disclosure makes it difficult for users to obtain an official patch or fix.

Steps to mitigate:

  • Contact motogadget support to inquire about a potential patch or fix_
  • Use alternative security measures to protect the device, such as physical locks or alarms_
  • Avoid using the NFC Handler component until a fix is available_
  • Monitor the device for any suspicious activity and report it immediately if detected.
CVE-2025-66291 0
Published: 2025-11-29T04:15:58.200

What it does:

The CVE-2025-66291 vulnerability in OrangeHRM versions 5.0 to 5.7 allows an authenticated user with limited access to directly request and receive confidential interview documents, including candidate CVs and evaluations, without needing permission to access the associated interview record.

Why it's a problem:

This vulnerability is a problem because it exposes sensitive information to unauthorized users, potentially leading to data breaches and confidentiality issues, as users who should not have access to certain recruitment documents can still obtain them.

Steps to mitigate:

  • Update OrangeHRM to version 5.8 or later
  • [Restrict access to the Recruitment module to only authorized personnel]
  • [Monitor user activity and interview attachment requests for suspicious behavior]
  • [Implement additional authorization checks and validation for user access to recruitment records and associated documents]
CVE-2025-66290 0
Published: 2025-11-29T04:15:58.040

What it does:

The OrangeHRM system has a vulnerability that allows any authenticated user to access and download sensitive candidate documents, such as CVs, without proper authorization, by directly requesting the attachment endpoint.

Why it's a problem:

This vulnerability is a problem because it exposes sensitive applicant data to unauthorized users, potentially leading to data breaches and confidentiality issues, even if the users do not have the necessary permissions to view the Recruitment module.

Steps to mitigate:

  • Update OrangeHRM to version 5.8 or later
  • [Restrict access to the recruitment attachment endpoint until the update can be applied]
  • Monitor system logs for suspicious activity related to the attachment endpoint
  • Limit user access to only necessary modules and permissions to minimize potential damage.
CVE-2025-66289 0
Published: 2025-11-29T04:15:57.893

What it does:

The OrangeHRM system fails to invalidate existing user sessions when a user's account is disabled or their password is changed, allowing active session cookies to remain valid and enabling access to protected pages and operations even after the account has been disabled or the password has been reset.

Why it's a problem:

This vulnerability is a problem because it allows unauthorized users to retain full access to the system even after their account has been closed or their password has been reset, exposing the system to prolonged unauthorized use and increasing the impact of account takeover scenarios, making administrative disable actions ineffective.

Steps to mitigate:

  • Update OrangeHRM to version 5.8 or later]
  • [Implement a manual session revocation process for disabled or password-changed accounts]
  • [Monitor system activity for suspicious behavior and take immediate action if unauthorized access is detected]
CVE-2025-66225 0
Published: 2025-11-29T04:15:57.740

What it does:

The CVE-2025-66225 vulnerability in OrangeHRM versions 5.0 to 5.7 allows an attacker to change the password of any account, including privileged ones, by exploiting a flaw in the password reset workflow where the system does not verify if the username in the final reset request matches the original account.

Why it's a problem:

This vulnerability is a problem because it enables an attacker to take full control of any account, including those with administrative privileges, by simply obtaining a valid password reset link for any account and then altering the username to target a different user, potentially leading to unauthorized access and malicious activities.

Steps to mitigate:

  • Update OrangeHRM to version 5.8 or later]
  • [Implement additional security measures such as two-factor authentication to prevent unauthorized account access]
  • [Monitor system logs for suspicious password reset activities to detect potential exploitation attempts.
CVE-2025-66224 0
Published: 2025-11-29T04:15:57.497

What it does:

The OrangeHRM application has a flaw that allows user-controlled input to directly affect the system's sendmail command, potentially leading to unintended behaviors such as writing files on the server, which can result in the execution of attacker-controlled content if those files are stored in web-accessible locations.

Why it's a problem:

This vulnerability is a problem because it enables attackers to potentially execute malicious code on the server, allowing them to gain unauthorized access, steal sensitive data, or disrupt the system's operations, which can have severe consequences for the security and integrity of the application and its data.

Steps to mitigate:

  • Update OrangeHRM to version 5.8 or later
  • [Verify that all input values are properly sanitized and constrained before being used in command execution]
  • [Implement additional security measures, such as restricting file writing permissions and limiting access to sensitive areas of the server]
  • [Regularly monitor the system for suspicious activity and update security protocols as necessary]
CVE-2025-65892 0
Published: 2025-11-29T04:15:57.367

What it does:

This vulnerability allows an attacker to execute arbitrary JavaScript code in a victim's browser by crafting a specific URL that targets the krpano software, particularly when the xml parameter is enabled in the passQueryParameters function.

Why it's a problem:

This is a problem because it enables remote, unauthenticated attackers to inject malicious scripts into a user's browser session, potentially leading to unauthorized actions, data theft, or further exploitation of the user's system.

Steps to mitigate:

  • Update krpano to version 1.23.2 or later
  • [Disable the xml parameter in the passQueryParameters function if updating is not immediately possible]
  • [Implement web application firewall (WAF) rules to detect and block suspicious URL patterns]
  • Use browser extensions that provide XSS protection to add an extra layer of defense against such attacks.
CVE-2025-65540 0
Published: 2025-11-29T04:15:56.417

What it does:

The CVE-2025-65540 vulnerability allows attackers to inject and execute malicious scripts on the xmall v1.1 platform by exploiting improper handling of user-supplied data in input fields such as username and description.

Why it's a problem:

This vulnerability is a problem because it enables attackers to perform Cross-Site Scripting (XSS) attacks, which can lead to unauthorized access to user data, session hijacking, and other malicious activities, ultimately compromising the security and integrity of the platform.

Steps to mitigate:

  • Update to a patched version of xmall]
  • [Implement proper input validation and sanitization for all user-supplied data]
  • [Use output encoding to prevent malicious scripts from being executed]
  • [Limit user privileges to minimize potential damage from XSS attacks]
CVE-2025-66223 0
Published: 2025-11-29T03:16:00.227

What it does:

The OpenObserve cloud-native observability platform has a vulnerability where organization invitation tokens do not expire after they are issued, allowing removed or demoted users to regain access or escalate privileges using previously issued links.

Why it's a problem:

This vulnerability is a problem because it breaks access control, enabling unauthorized users to access the system or gain higher privileges, which can lead to security breaches and data compromises.

Steps to mitigate:

  • Update OpenObserve to version 0.16.0 or later
  • Review and remove any unnecessary organization invitations
  • Regularly audit user access and roles to ensure they are up-to-date and aligned with current organizational needs.
CVE-2025-66221 0
Published: 2025-11-29T03:16:00.050

What it does:

The Werkzeug library's safe_join function has a vulnerability that allows it to serve files with Windows device names, such as CON or AUX, which can cause the application to hang indefinitely when trying to read from these files.

Why it's a problem:

This vulnerability is a problem because it can lead to a denial-of-service (DoS) attack, where an attacker can cause the application to become unresponsive by requesting files with special device names, potentially disrupting the service and causing inconvenience to users.

Steps to mitigate:

  • Update Werkzeug to version 3.1.4 or later
  • Avoid using the send_from_directory function with user-specified paths on Windows
  • Use alternative methods to serve files that do not rely on the safe_join function.
CVE-2025-66217 0
Published: 2025-11-29T03:15:59.880

What it does:

The CVE-2025-66217 vulnerability is an integer underflow issue in the MQTT parsing logic of AIS-catcher, a multi-platform AIS receiver, which allows an attacker to send a malformed MQTT packet and trigger a heap buffer overflow, leading to a Denial of Service (DoS) and potentially Remote Code Execution (RCE).

Why it's a problem:

This vulnerability is a problem because it can cause an immediate disruption of service and potentially allow an attacker to execute arbitrary code, giving them control over the system, which can lead to severe consequences such as data breaches, system compromise, and unauthorized access.

Steps to mitigate:

  • Update AIS-catcher to version 0.64 or later
  • Avoid using AIS-catcher as a library until the update is applied
  • Implement network traffic monitoring to detect and block malformed MQTT packets
  • Keep systems and software up-to-date to prevent exploitation of known vulnerabilities.
CVE-2025-66216 0
Published: 2025-11-29T03:15:59.710

What it does:

The CVE-2025-66216 vulnerability is a heap buffer overflow in the AIS-catcher AIS::Message class, which allows an attacker to write a large amount of arbitrary data into a small buffer, potentially causing the program to crash or execute malicious code.

Why it's a problem:

This vulnerability is a problem because it can be exploited by an attacker to gain control over the system, steal sensitive information, or disrupt the normal functioning of the AIS-catcher application, which could have serious consequences in maritime or other industries that rely on AIS data.

Steps to mitigate:

  • Update AIS-catcher to version 0.64 or later/
  • Avoid using versions of AIS-catcher prior to 0.64/
  • Regularly monitor AIS-catcher for updates and security patches to ensure the latest security fixes are applied.
CVE-2025-61915 6.0
Published: 2025-11-29T03:15:59.520

What it does:

The CVE-2025-61915 vulnerability allows a user in the lpadmin group to modify the configuration of the OpenPrinting CUPS printing system through the web interface, inserting malicious lines that can cause an out-of-bounds write when the cupsd process, running as root, parses the new configuration.

Why it's a problem:

This vulnerability is a problem because it enables a user with limited privileges to potentially execute arbitrary code with root privileges, leading to a significant escalation of privileges and potential system compromise.

Steps to mitigate:

  • Update OpenPrinting CUPS to version 2.4.15 or later
  • Restrict access to the lpadmin group to trusted users only
  • Monitor system logs for suspicious activity related to the cupsd process.
CVE-2025-58436 5.1
Published: 2025-11-29T03:15:59.323

What it does:

The CVE-2025-58436 vulnerability affects the OpenPrinting CUPS printing system, allowing a client to slow down the cupsd service by sending messages at a very slow rate, such as one byte per second, which in turn delays the entire service.

Why it's a problem:

This vulnerability is a problem because it can render the cupsd service unusable for other clients, effectively causing a denial-of-service (DoS) condition, which can disrupt printing operations and impact productivity.

Steps to mitigate:

  • Update OpenPrinting CUPS to version 2.4.15 or later
  • [Monitor network traffic for slow or unusual message patterns
  • [Implement rate limiting or traffic shaping to prevent slow message attacks
  • [Consider configuring cupsd to timeout or drop slow connections to prevent service disruption]
CVE-2025-53939 6.3
Published: 2025-11-29T03:15:59.153

What it does:

The CVE-2025-53939 vulnerability allows an attacker to elevate another user's permissions on a shared folder in Kiteworks, a private data network, due to improper input validation when managing roles.

Why it's a problem:

This vulnerability is a problem because it can lead to unauthorized access to sensitive data, allowing malicious users to view, modify, or delete files without permission, potentially compromising confidentiality, integrity, and security.

Steps to mitigate:

  • Update Kiteworks to version 9.1.0 or later
  • [regularly review and audit user permissions on shared folders
  • [implement additional access controls and monitoring to detect suspicious activity]
  • contact Kiteworks support for guidance on patching and securing the private data network.
CVE-2025-53900 6.5
Published: 2025-11-29T03:15:58.983

What it does:

The CVE-2025-53900 vulnerability in Kiteworks MFT allows authorized users to potentially escalate their privileges unexpectedly due to a flawed definition of roles and permissions when managing connections.

Why it's a problem:

This vulnerability is a problem because it could allow users to gain unauthorized access to sensitive information or perform actions that they should not be able to, potentially leading to data breaches or other security issues.

Steps to mitigate:

  • Update Kiteworks MFT to version 9.1.0 or later
  • Review and verify the roles and permissions of all authorized users
  • Monitor system activity for any signs of unauthorized access or privilege escalation
CVE-2025-53899 7.2
Published: 2025-11-29T03:15:58.817

What it does:

The Kiteworks MFT system has a vulnerability that allows an attacker with administrative privileges to intercept communication between the system and other channels, potentially leading to an escalation of privileges.

Why it's a problem:

This vulnerability is a problem because it can be exploited by an attacker to gain higher levels of access to the system, potentially allowing them to perform malicious actions, such as stealing sensitive data or disrupting system operations.

Steps to mitigate:

  • Update Kiteworks MFT to version 9.1.0 or later
  • Limit administrative privileges to only necessary users
  • Monitor system communications for suspicious activity
CVE-2025-53897 6.8
Published: 2025-11-29T03:15:58.653

What it does:

This vulnerability allows an external attacker to gain access to log information from the Kiteworks MFT system by tricking an administrator into visiting a specifically crafted fake page.

Why it's a problem:

This is a problem because it could allow unauthorized access to sensitive log information, potentially revealing confidential data or system vulnerabilities that an attacker could exploit for further malicious activities.

Steps to mitigate:

  • Update Kiteworks MFT to version 9.1.0 or later
  • Ensure administrators are cautious when clicking on links or visiting pages from unknown sources
  • Implement additional security measures to monitor and restrict access to log information.
CVE-2025-53896 7.1
Published: 2025-11-29T03:15:58.473

What it does:

The Kiteworks MFT software has a bug that prevents a user's active session from timing out due to inactivity under certain circumstances, allowing the session to remain active indefinitely.

Why it's a problem:

This vulnerability is a problem because it could allow unauthorized access to sensitive information if a user's session remains active on an unattended device, potentially leading to data breaches or other malicious activities.

Steps to mitigate:

  • Update Kiteworks MFT to version 9.1.0 or later
  • [Monitor user activity and sessions for unusual behavior]
  • [Implement additional security measures such as multi-factor authentication to prevent unauthorized access]
CVE-2025-66219 0
Published: 2025-11-29T02:15:52.577

What it does:

The CVE-2025-66219 vulnerability allows for command injection in the "willitmerge" command line tool, which checks if pull requests are mergeable. This happens because the tool uses an insecure method to execute child processes, combining user input with commands, whether the input comes from command-line flags or the target repository.

Why it's a problem:

This vulnerability is a problem because it enables attackers to inject and execute arbitrary commands, potentially leading to unauthorized access, data tampering, or other malicious activities on the system running the "willitmerge" tool.

Steps to mitigate:

  • Avoid using versions 0.2.1 and prior of the willitmerge tool
  • Validate and sanitize all user input before passing it to the tool
  • Use alternative tools or methods to check pull request mergeability until a fixed version of willitmerge is available
  • Monitor for updates and apply a patch as soon as a fixed version is released.
CVE-2025-66201 0
Published: 2025-11-29T02:15:52.420

What it does:

The CVE-2025-66201 vulnerability allows an authenticated user to trick the LibreChat server into making unauthorized requests to internal URLs, such as cloud metadata services, by passing specially crafted OpenAPI specs to its "Actions" feature.

Why it's a problem:

This vulnerability is a problem because it could be used to access sensitive information or impersonate the server, potentially leading to unauthorized actions or data breaches.

Steps to mitigate:

  • Update LibreChat to version 0.8.1-rc2 or later
  • [Restrict access to the "Actions" feature to trusted users only]
  • [Monitor server logs for suspicious activity and implement additional security measures to prevent SSRF attacks]
CVE-2025-66036 6.1
Published: 2025-11-29T02:15:52.257

What it does:

The CVE-2025-66036 vulnerability allows an attacker to inject malicious code into the Retro online platform through its input handling component, prior to version 2.4.7, which can lead to cross-site scripting (XSS) attacks.

Why it's a problem:

This vulnerability is a problem because it enables attackers to execute malicious scripts on users' browsers, potentially stealing sensitive information, hijacking user sessions, or performing unauthorized actions on the platform.

Steps to mitigate:

  • Update Retro to version 2.4.7 or later
  • Validate and sanitize all user input to prevent malicious code injection
  • Implement a Web Application Firewall (WAF) to detect and block XSS attacks
  • Monitor user activity and platform logs for suspicious behavior
  • Keep software and plugins up-to-date to prevent exploitation of known vulnerabilities.
CVE-2025-66034 6.3
Published: 2025-11-29T01:16:02.967

What it does:

The fontTools library has a vulnerability that allows an attacker to write arbitrary files and execute remote code when a malicious .designspace file is processed using the fonttools varLib script.

Why it's a problem:

This vulnerability is a problem because it can be exploited by attackers to gain control over a system, allowing them to execute malicious code and potentially steal sensitive information or disrupt operations.

Steps to mitigate:

  • Update fontTools to version 4.60.2 or later
  • Avoid processing untrusted .designspace files with the fonttools varLib script
  • Use alternative font manipulation libraries until the vulnerability is patched.
CVE-2025-66027 0
Published: 2025-11-29T01:16:02.807

What it does:

The CVE-2025-66027 vulnerability in Rallly, an open-source scheduling and collaboration tool, exposes participant details such as names and email addresses through a specific API endpoint, even when privacy features are enabled.

Why it's a problem:

This vulnerability is a problem because it bypasses intended privacy controls, allowing participants to view other users' personal information, which could lead to unauthorized access and potential misuse of sensitive data.

Steps to mitigate:

  • Update Rallly to version 4.5.6 or later
  • [Check API endpoint configurations to ensure privacy features are properly enabled]
  • Monitor user activity for suspicious access to participant information.
CVE-2025-65113 6.5
Published: 2025-11-29T01:16:02.640

What it does:

The CVE-2025-65113 vulnerability allows any unauthenticated user to flag any content, including users, videos, photos, and collections, on the ClipBucket v5 video sharing platform due to an authorization bypass in the AJAX flagging system.

Why it's a problem:

This vulnerability is a problem because it enables mass flagging attacks, disrupts content, and can be used to abuse the moderation system, potentially leading to unnecessary removal of legitimate content and undermining the platform's integrity.

Steps to mitigate:

  • Update ClipBucket to version 5.5.2 - #164 or later
  • Monitor the platform for unusual flagging activity
  • Implement additional security measures to detect and prevent mass flagging attacks.
CVE-2025-65112 9.4
Published: 2025-11-29T01:16:02.467

What it does:

The CVE-2025-65112 vulnerability allows unauthenticated users to upload packages to PubNet as if they were any other user, by providing a fake author ID, enabling them to impersonate others and potentially upload malicious packages.

Why it's a problem:

This vulnerability is a problem because it enables identity spoofing, privilege escalation, and supply chain attacks, which can lead to unauthorized access, data breaches, and the distribution of malicious software, putting users and systems at risk.

Steps to mitigate:

  • Update PubNet to version 1.1.3 or later
  • Verify the authenticity of uploaded packages
  • Monitor system logs for suspicious upload activity
  • Limit access to the /api/storage/upload endpoint to authenticated users only
  • Regularly review and update user permissions and access controls.
CVE-2025-64715 4.0
Published: 2025-11-29T01:16:01.427

What it does:

The CVE-2025-64715 vulnerability in Cilium affects how network policies are enforced, specifically when referencing non-existent or unattached AWS security group IDs. This can cause the policy to unintentionally allow broader outbound access than intended.

Why it's a problem:

This vulnerability is a problem because it can lead to unauthorized outbound traffic, potentially exposing sensitive data or allowing malicious activity. The issue arises when the policy fails to generate the necessary restrictions, resulting in more permissive access than the policy authors intended.

Steps to mitigate:

  • Update Cilium to version 1.16.17 or later
  • Update Cilium to version 1.17.10 or later
  • Update Cilium to version 1.18.4 or later
CVE-2025-13683 0
Published: 2025-11-28T17:16:08.437

What it does:

The CVE-2025-13683 vulnerability allows the exposure of credentials in unintended requests in Devolutions Server and Remote Desktop Manager on Windows, specifically affecting versions of Devolutions Server up to 2025.3.8.0 and Remote Desktop Manager up to 2025.3.23.0.

Why it's a problem:

This vulnerability is a problem because it could potentially allow unauthorized access to sensitive information, including login credentials, which could be used for malicious purposes such as data theft or system compromise.

Steps to mitigate:

  • Update Devolutions Server to a version later than 2025.3.8.0
  • Update Remote Desktop Manager to a version later than 2025.3.23.0
  • Change all exposed credentials to new, secure ones
  • Monitor system logs for any suspicious activity
  • Consider implementing additional security measures such as multi-factor authentication.
CVE-2025-12183 0
Published: 2025-11-28T16:15:51.823

What it does:

The CVE-2025-12183 vulnerability allows remote attackers to perform out-of-bounds memory operations in the lz4-java library version 1.8.0 and earlier, by sending specially crafted compressed input, which can cause the system to crash (denial of service) and potentially reveal adjacent memory contents.

Why it's a problem:

This vulnerability is a problem because it can be exploited by remote attackers to disrupt the service, causing it to become unavailable, and potentially gain access to sensitive information stored in the adjacent memory, compromising the system's security and integrity.

Steps to mitigate:

  • Update to a version of lz4-java later than 1.8.0/
  • Validate and sanitize all compressed input from untrusted sources/
  • Implement memory protection mechanisms to prevent out-of-bounds access/
  • Monitor system logs for potential exploitation attempts and denial of service incidents.
CVE-2025-59792 5.3
Published: 2025-11-28T15:16:03.140

What it does:

The CVE-2025-59792 vulnerability in Apache Kvrocks exposes plaintext credentials when the MONITOR command is used, allowing unauthorized access to sensitive information.

Why it's a problem:

This vulnerability is a problem because it compromises the security of user credentials, potentially leading to unauthorized data access, modification, or theft, which can have serious consequences for individuals and organizations.

Steps to mitigate:

  • Upgrade to Apache Kvrocks version 2.14.0 or later
  • Avoid using the MONITOR command until the upgrade is complete
  • Monitor system logs for suspicious activity to detect potential exploitation of the vulnerability
CVE-2025-59790 0
Published: 2025-11-28T15:16:02.973

What it does:

The CVE-2025-59790 vulnerability is an Improper Privilege Management issue in Apache Kvrocks, affecting versions from 2.9.0 to 2.13.0, which can potentially allow unauthorized access or elevated privileges.

Why it's a problem:

This vulnerability is a problem because it can lead to unauthorized users gaining access to sensitive data or performing actions that they should not be allowed to, potentially compromising the security and integrity of the system.

Steps to mitigate:

  • Upgrade to Apache Kvrocks version 2.14.0 or later'
  • Verify that all instances of Apache Kvrocks are updated to the latest version'
  • Monitor system logs for any suspicious activity related to Apache Kvrocks
CVE-2025-51736 0
Published: 2025-11-28T15:16:01.543

What it does:

The CVE-2025-51736 vulnerability allows unauthorized file uploads in HCL Technologies Ltd. Unica version 12.0.0, potentially enabling attackers to upload malicious files to the system.

Why it's a problem:

This vulnerability is a problem because it could allow attackers to upload malicious files, such as viruses, malware, or backdoors, which could then be used to compromise the system, steal sensitive data, or disrupt operations.

Steps to mitigate:

  • Update HCL Unica to the latest version
  • [Apply security patches from HCL Technologies Ltd.]
  • Implement strict file upload validation and sanitization
  • [Configure the system to only allow authorized file uploads]
  • Monitor system logs for suspicious file upload activity.
CVE-2025-51735 0
Published: 2025-11-28T15:16:01.410

What it does:

The CVE-2025-51735 vulnerability allows an attacker to inject malicious formulas into CSV files used by HCL Technologies Ltd. Unica 12.0.0, potentially executing unauthorized actions.

Why it's a problem:

This vulnerability is a problem because it could enable attackers to manipulate data, execute arbitrary code, or gain unauthorized access to sensitive information, compromising the security and integrity of the system.

Steps to mitigate:

  • Update HCL Unica to the latest version
  • [patch the vulnerability with the latest security fixes]
  • implement strict input validation and sanitization for CSV files
  • use secure protocols for importing and exporting CSV files
  • restrict access to authorized personnel only.
CVE-2025-51734 0
Published: 2025-11-28T15:16:01.280

What it does:

The CVE-2025-51734 vulnerability allows an attacker to inject malicious code into a website using cross-site scripting (XSS), affecting HCL Technologies Ltd. Unica version 12.0.0.

Why it's a problem:

This vulnerability is a problem because it enables attackers to steal user data, take control of user sessions, or perform unauthorized actions on the affected website, potentially leading to security breaches and data theft.

Steps to mitigate:

  • Update HCL Unica to the latest version
  • [Apply security patches provided by HCL Technologies Ltd.]
  • Implement a Web Application Firewall (WAF) to detect and prevent XSS attacks
  • Use input validation and sanitization to prevent malicious code injection
  • Monitor website traffic for suspicious activity and signs of XSS attacks.
CVE-2025-51733 0
Published: 2025-11-28T15:16:01.140

What it does:

The CVE-2025-51733 vulnerability allows an attacker to trick a user into performing unintended actions on the HCL Technologies Ltd. Unica 12.0.0 platform, by exploiting a Cross-Site Request Forgery (CSRF) weakness.

Why it's a problem:

This vulnerability is a problem because it enables attackers to bypass security measures and perform actions that the user did not intend to do, potentially leading to unauthorized data modification, deletion, or other malicious activities.

Steps to mitigate:

  • Update to a patched version of HCL Unica
  • [Implement CSRF token validation]
  • [Configure web application firewalls to detect and prevent CSRF attacks]
  • [Educate users to be cautious of suspicious links and requests]
  • [Monitor system logs for unusual activity]
CVE-2025-12638 0
Published: 2025-11-28T15:16:00.270

What it does:

The Keras version 3.11.3 has a path traversal vulnerability in the keras.utils.get_file() function when extracting tar archives, allowing files to be written outside the intended extraction directory due to a security bypass.

Why it's a problem:

This vulnerability is a problem because it enables arbitrary file writes outside the cache directory, which can lead to potential system compromise or malicious code execution, putting the system and its data at risk.

Steps to mitigate:

  • Update Keras to a version that uses the tarfile.extractall() method with the security-critical filter='data' parameter
  • [Avoid using the get_file() function to extract tar archives until the vulnerability is patched]
  • [Manually validate and filter file paths before extraction to prevent potential security bypasses].
CVE-2025-11156 0
Published: 2025-11-28T15:15:59.900

What it does:

The CVE-2025-11156 vulnerability allows a local, authenticated user with Administrator privileges on Windows systems to improperly load a driver, causing a system crash (Blue-Screen-of-Death) and resulting in a Denial of Service (DoS) for the affected machine.

Why it's a problem:

This vulnerability is a problem because it can be exploited by an attacker with Administrator privileges to intentionally crash a Windows system, disrupting service and causing potential data loss or downtime, which can have significant operational and financial impacts.

Steps to mitigate:

  • Update the Netskope agent (NS Client) to the latest version
  • [apply patches or fixes provided by Netskope]
  • [restrict Administrator privileges to trusted users only]
  • [monitor system logs for suspicious activity related to driver loading].
CVE-2025-12143 6.1
Published: 2025-11-28T12:16:03.350

What it does:

The CVE-2025-12143 is a Stack-based Buffer Overflow vulnerability found in ABB Terra AC wallbox devices, specifically those with versions up to 1.8.33, allowing potential overflows of data on the stack.

Why it's a problem:

This vulnerability is a problem because it could be exploited by attackers to execute arbitrary code, potentially leading to unauthorized access, data breaches, or disruption of the device's functionality, which in the context of charging stations, could have significant security and safety implications.

Steps to mitigate:

  • Update ABB Terra AC wallbox devices to a version later than 1.8.33 '
  • ' Contact the manufacturer for patches or updates '
  • ' Implement network segmentation to limit the attack surface of vulnerable devices '
  • ' Monitor device logs for suspicious activity related to buffer overflow attempts.
CVE-2025-13771 6.5
Published: 2025-11-28T08:15:54.127

What it does:

This vulnerability allows authenticated remote attackers to read and download arbitrary system files from a WebITR system developed by Uniong, by exploiting a Relative Path Traversal weakness.

Why it's a problem:

This vulnerability is a problem because it enables attackers to access sensitive system files, potentially revealing confidential information, disrupting system operations, or gaining unauthorized access to the system.

Steps to mitigate:

  • Update WebITR to the latest version
  • [Apply security patches from Uniong]
  • Implement strict access controls and authentication mechanisms
  • [Monitor system logs for suspicious activity]
  • Limit remote access to the WebITR system to trusted users only
CVE-2025-13770 6.5
Published: 2025-11-28T08:15:53.930

What it does:

This vulnerability allows attackers to inject arbitrary SQL commands into the WebITR system, giving them unauthorized access to read sensitive database contents.

Why it's a problem:

This vulnerability is a problem because it enables malicious actors to extract confidential information from the database, potentially leading to data breaches, identity theft, and other security incidents, even if they only have authenticated access.

Steps to mitigate:

  • Update WebITR to the latest version
  • [Apply patches provided by Uniong]
  • Implement a Web Application Firewall (WAF) to detect and prevent SQL injection attacks
  • Limit database privileges to the minimum required for authenticated users
  • Monitor database activity for suspicious SQL commands.
CVE-2025-13769 6.5
Published: 2025-11-28T08:15:53.713

What it does:

This vulnerability allows attackers to inject arbitrary SQL commands into the WebITR system, giving them unauthorized access to read the database contents.

Why it's a problem:

This is a problem because it enables authenticated remote attackers to extract sensitive information from the database, potentially leading to data breaches, unauthorized data access, and other malicious activities.

Steps to mitigate:

  • Update WebITR to the latest version
  • [Apply security patches provided by Uniong]
  • Implement input validation and sanitization to prevent SQL injection
  • [Limit database privileges to authorized users]
  • Monitor database activity for suspicious transactions.
CVE-2025-13768 7.5
Published: 2025-11-28T08:15:52.560

What it does:

This vulnerability allows remote attackers to bypass authentication in the WebITR system by modifying a specific parameter, enabling them to log in as any user once they have obtained a valid user ID.

Why it's a problem:

This vulnerability is a problem because it allows unauthorized access to the system, potentially leading to sensitive data breaches, malicious activities, and compromised user accounts, which can have severe security and privacy implications.

Steps to mitigate:

  • Update WebITR to the latest patched version
  • Implement additional authentication measures, such as two-factor authentication
  • Monitor system logs for suspicious activity and restrict access to sensitive areas of the system
  • Limit user ID exposure to prevent attackers from obtaining required information.
CVE-2025-66386 4.1
Published: 2025-11-28T07:15:59.900

What it does:

The CVE-2025-66386 vulnerability allows an attacker with site-admin privileges to manipulate file paths in the MISP application, specifically when viewing pictures, potentially accessing files outside the intended directory.

Why it's a problem:

This vulnerability is a problem because it could enable an attacker to access sensitive files or data that they should not have access to, potentially leading to data breaches or other security incidents.

Steps to mitigate:

  • Update MISP to version 2.5.27 or later
  • Restrict site-admin privileges to only trusted users
  • Monitor file access logs for suspicious activity
CVE-2025-66385 0
Published: 2025-11-28T07:15:59.700

What it does:

This vulnerability allows an authenticated non-privileged user to escalate their privileges by modifying certain fields, such as role_id or organisation_id, in the user-edit request to the UsersController::edit endpoint in Cerebrate versions before 1.30.

Why it's a problem:

This vulnerability is a problem because it enables non-privileged users to gain higher levels of access, such as admin roles, without proper authorization, potentially leading to unauthorized data access, modification, or other malicious activities.

Steps to mitigate:

  • Update Cerebrate to version 1.30 or later
  • [Restrict access to the user-edit endpoint to privileged users only]
  • [Implement input validation and sanitization for the role_id and organisation_id fields to prevent unauthorized modifications]
CVE-2025-66384 8.2
Published: 2025-11-28T07:15:59.483

What it does:

The CVE-2025-66384 vulnerability allows attackers to bypass file upload validation in MISP versions before 2.5.24 due to incorrect logic in the EventsController.php file, specifically related to the handling of temporary file names (tmp_name).

Why it's a problem:

This vulnerability is a problem because it enables malicious actors to upload unauthorized or malicious files to the system, potentially leading to code execution, data breaches, or other security compromises.

Steps to mitigate:

  • Update MISP to version 2.5.24 or later
  • [Verify the integrity of all uploaded files]
  • [Monitor system logs for suspicious file upload activity]
  • [Implement additional file upload validation and sanitization measures]
CVE-2025-66382 2.9
Published: 2025-11-28T07:15:57.900

What it does:

The CVE-2025-66382 vulnerability allows an attacker to create a specially crafted file that can cause the libexpat library to consume excessive processing time, with files as small as 2 MiB potentially leading to delays of dozens of seconds.

Why it's a problem:

This vulnerability is a problem because it can be used for denial-of-service (DoS) attacks, where an attacker intentionally overwhelms a system with crafted files, leading to significant performance degradation or even complete system unavailability.

Steps to mitigate:

  • Update libexpat to a version later than 2.7.3
  • Implement filtering to detect and block suspiciously large or crafted files
  • Monitor system performance for unusual delays or spikes in processing time
  • Consider implementing rate limiting or quotas to prevent excessive resource consumption.
CVE-2025-66372 2.8
Published: 2025-11-28T04:16:01.470

What it does:

The CVE-2025-66372 vulnerability in Mustang versions before 2.16.3 allows attackers to exfiltrate files using XML External Entity (XXE) attacks, which can lead to unauthorized access to sensitive data.

Why it's a problem:

This vulnerability is a problem because it enables malicious actors to extract confidential files from a system, potentially leading to data breaches, intellectual property theft, and other security incidents, compromising the confidentiality and integrity of the affected system.

Steps to mitigate:

  • Update Mustang to version 2.16.3 or later
  • [Implement XXE attack protection mechanisms, such as input validation and sanitization]
  • [Configure the system to use a secure XML parser that is not vulnerable to XXE attacks]
  • [Monitor system logs for suspicious activity and signs of XXE attacks]
CVE-2025-66371 5.0
Published: 2025-11-28T04:16:01.293

What it does:

The CVE-2025-66371 vulnerability in Peppol-py before version 1.1.1 allows an attacker to perform an XML eXternal Entity (XXE) attack, which enables the reading of files from the filesystem and exposes their content to a remote host when validating XML-based invoices.

Why it's a problem:

This vulnerability is a problem because it allows unauthorized access to sensitive files on the system, potentially leading to data breaches and exposing confidential information to remote attackers.

Steps to mitigate:

  • Update Peppol-py to version 1.1.1 or later
  • Configure the Saxon parser to prevent XXE attacks
  • Validate and sanitize all XML input to prevent malicious entities
  • Implement network security measures to restrict access to sensitive files and systems.
CVE-2025-66370 5.0
Published: 2025-11-28T04:16:01.110

What it does:

The CVE-2025-66370 vulnerability allows an attacker to inject malicious XML code (XXE injection) into the Kivitendo system by uploading a specially crafted electronic invoice in the ZUGFeRD format, enabling them to read and extract files from the server's filesystem.

Why it's a problem:

This vulnerability is a problem because it enables unauthorized access to sensitive files on the server, potentially leading to data breaches, intellectual property theft, and other malicious activities, compromising the security and confidentiality of the system.

Steps to mitigate:

  • Update Kivitendo to version 3.9.2 or later
  • Implement input validation and sanitization for uploaded files
  • Restrict access to the invoice upload feature to trusted users
  • Monitor server logs for suspicious activity
  • Consider implementing a Web Application Firewall (WAF) to detect and prevent XXE injection attacks.
CVE-2025-64312 4.9
Published: 2025-11-28T04:16:00.963

What it does:

The CVE-2025-64312 vulnerability allows unauthorized access to files due to a weakness in permission controls within the file management module.

Why it's a problem:

This vulnerability is a problem because it can compromise the confidentiality of sensitive information and services, potentially leading to unauthorized data access or leaks.

Steps to mitigate:

  • Update the file management module to the latest version
  • [Apply security patches to fix permission control issues]
  • [Implement strict access controls and monitor file access activity]
  • [Conduct regular security audits to identify similar vulnerabilities]
CVE-2025-58311 5.8
Published: 2025-11-28T04:16:00.807

What it does:

The CVE-2025-58311 is a Use-After-Free (UAF) vulnerability in the USB driver module, which allows an attacker to access and manipulate memory that has already been freed, potentially leading to unauthorized actions.

Why it's a problem:

This vulnerability is a problem because it can affect the availability and confidentiality of a system, allowing attackers to disrupt services, steal sensitive information, or gain unauthorized access, which can lead to significant security breaches and data losses.

Steps to mitigate:

  • Update the USB driver module to the latest version
  • Implement memory safety measures to prevent UAF exploits
  • Disable unnecessary USB driver modules to reduce the attack surface
  • Monitor system logs for suspicious activity related to the USB driver module.
CVE-2025-58308 7.3
Published: 2025-11-28T04:16:00.650

What it does:

The CVE-2025-58308 vulnerability is caused by an improper security check in the call module, which can lead to abnormal feature performance when exploited.

Why it's a problem:

This vulnerability is a problem because it can cause features to malfunction, potentially leading to unexpected behavior, errors, or even more severe security issues, which can compromise the overall security and reliability of the system.

Steps to mitigate:

  • Update the call module to the latest version
  • [apply security patches released by the vendor]
  • implement additional security checks to ensure proper validation of user input
  • monitor system behavior for signs of abnormal feature performance
  • contact the vendor for specific guidance on mitigation and remediation.
CVE-2025-58305 6.2
Published: 2025-11-28T04:16:00.500

What it does:

This vulnerability allows an attacker to bypass identity authentication in the Gallery app, potentially giving them unauthorized access to sensitive information.

Why it's a problem:

This vulnerability is a problem because it compromises the confidentiality of the service, allowing attackers to access data they shouldn't have permission to see, which can lead to data breaches and other security issues.

Steps to mitigate:

  • Update the Gallery app to the latest version
  • [Check for and install any available security patches]
  • Use alternative authentication methods until the vulnerability is fixed
  • Monitor account activity for suspicious behavior
  • Change passwords and authentication credentials as a precaution.
CVE-2025-58304 4.9
Published: 2025-11-28T04:16:00.347

What it does:

The CVE-2025-58304 vulnerability allows unauthorized access to files due to a weakness in permission control within the file management module, potentially exposing sensitive information.

Why it's a problem:

This vulnerability is a problem because it can compromise the confidentiality of services, allowing unauthorized parties to access restricted files and data, which could lead to data breaches or other security incidents.

Steps to mitigate:

  • Update the file management module to the latest version
  • [Apply security patches to fix the permission control weakness]
  • Implement additional access controls and monitoring to detect unauthorized file access
  • Limit user permissions to the minimum required for their roles
  • Regularly review and audit file access logs to identify potential security incidents.
CVE-2025-58302 8.4
Published: 2025-11-28T04:16:00.193

What it does:

The CVE-2025-58302 vulnerability allows unauthorized access to the Settings module due to a flaw in permission control, potentially exposing sensitive information.

Why it's a problem:

This vulnerability is a problem because it can compromise the confidentiality of services, allowing unauthorized parties to access restricted data, which can lead to security breaches and data theft.

Steps to mitigate:

  • Review and update permission settings in the Settings module
  • Implement access controls and authentication measures
  • Regularly monitor system logs for suspicious activity
  • Apply security patches or updates as soon as they become available
CVE-2025-13737 4.3
Published: 2025-11-28T04:16:00.010

What it does:

The Nextend Social Login and Register plugin for WordPress has a vulnerability that allows attackers to trick site administrators into unlinking a user's social login account through a forged request, due to a lack of proper validation.

Why it's a problem:

This vulnerability is a problem because it enables unauthenticated attackers to manipulate site administrators into performing unintended actions, potentially leading to unauthorized access or disruption of social login accounts, which can compromise user identity and security.

Steps to mitigate:

  • Update the Nextend Social Login and Register plugin to a version higher than 3.1.21
  • [Verify that all site administrators are aware of the vulnerability and cautious of suspicious links or requests]
  • [Monitor user accounts for any unusual activity related to social login linking or unlinking]
CVE-2025-64315 4.4
Published: 2025-11-28T03:16:01.023

What it does:

The CVE-2025-64315 vulnerability is a configuration defect in the file management module, which can be exploited to compromise the security of an application's data.

Why it's a problem:

This vulnerability is a problem because it can allow unauthorized access to sensitive application data, potentially leading to a breach of confidentiality and integrity, which can have serious consequences for users and the application itself.

Steps to mitigate:

  • Update the file management module to the latest version
  • Implement secure configuration settings for the module
  • Monitor application data for any signs of unauthorized access
  • Apply additional security measures such as encryption and access controls to protect sensitive data.
CVE-2025-64314 9.3
Published: 2025-11-28T03:16:00.867

What it does:

The CVE-2025-64314 vulnerability allows unauthorized access to sensitive areas of a system's memory due to a flaw in permission control within the memory management module.

Why it's a problem:

This vulnerability is a problem because it can compromise the confidentiality of sensitive information stored in the system's memory, potentially leading to data breaches or unauthorized exposure of confidential data.

Steps to mitigate:

  • Update the memory management module to the latest version
  • [apply security patches provided by the vendor]
  • implement strict access controls to sensitive areas of the system's memory
  • monitor system logs for suspicious activity related to memory access.
CVE-2025-64313 5.3
Published: 2025-11-28T03:16:00.700

What it does:

This vulnerability allows an attacker to cause a denial of service (DoS) in the office service, which means they can disrupt or shut down the service, making it unavailable to users.

Why it's a problem:

This vulnerability is a problem because it can affect the availability of the office service, leading to downtime and potential losses in productivity, which can have significant impacts on businesses or organizations that rely on the service.

Steps to mitigate:

  • Update the office service to the latest version
  • [apply patches or fixes provided by the vendor]
  • implement network traffic monitoring and filtering to detect and block potential DoS attacks
  • contact the vendor for guidance on temporary workarounds until a patch is available.
CVE-2025-64311 5.1
Published: 2025-11-28T03:16:00.543

What it does:

The CVE-2025-64311 is a permission control vulnerability found in the Notepad module, which allows unauthorized access to sensitive information.

Why it's a problem:

This vulnerability is a problem because it can compromise service confidentiality, meaning that sensitive data may be exposed to unauthorized parties, potentially leading to data breaches or other security issues.

Steps to mitigate:

  • Update the Notepad module to the latest version
  • [Apply security patches to fix the permission control issue]
  • Limit access to the Notepad module to authorized personnel only
  • Monitor system logs for suspicious activity related to the Notepad module
CVE-2025-58316 7.3
Published: 2025-11-28T03:16:00.383

What it does:

This vulnerability allows an attacker to launch a Denial of Service (DoS) attack on the video-related system service module, potentially crashing or disrupting the service.

Why it's a problem:

This vulnerability is a problem because it can affect the availability of the system or service, making it inaccessible to users, which can lead to downtime, loss of productivity, and other negative consequences.

Steps to mitigate:

  • Update the system service module to the latest version
  • Implement network traffic filtering to block malicious requests
  • Monitor system logs for signs of attempted exploitation
  • Apply security patches as soon as they become available
  • Limit access to the video-related system service module to trusted users and networks.