Latest CVE Feed
- 
                                
                                
6.5
MEDIUMCVE-2025-10175
The WP Links Page plugin for WordPress is vulnerable to SQL Injection via the 'id' parameter in all versions up to, and including, 4.9.6 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL que... Read more
Affected Products : wp_links_page- Published: Oct. 11, 2025
 - Modified: Oct. 14, 2025
 - Vuln Type: Injection
 
 - 
                                
                                
5.5
MEDIUMCVE-2025-11594
A vulnerability has been found in ywxbear PHP-Bookstore-Website-Example and PHP Basic BookStore Website up to 0e0b9f542f7a2d90a8d7f8c83caca69294e234e4. This issue affects some unknown processing of the file /index.php of the component Quantity Handler. Su... Read more
Affected Products :- Published: Oct. 11, 2025
 - Modified: Oct. 14, 2025
 - Vuln Type: Injection
 
 - 
                                
                                
6.4
MEDIUMCVE-2025-11197
The Draft List plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'drafts' shortcode in all versions up to, and including, 2.6.1 due to insufficient input sanitization and output escaping on user supplied attributes. This m... Read more
Affected Products :- Published: Oct. 11, 2025
 - Modified: Oct. 14, 2025
 - Vuln Type: Cross-Site Scripting
 
 - 
                                
                                
4.3
MEDIUMCVE-2025-8682
The Newsup theme for WordPress is vulnerable to unauthorized plugin installation due to a missing capability check on the newsup_admin_info_install_plugin() function in all versions up to, and including, 5.0.10. This makes it possible for unauthenticated ... Read more
Affected Products :- Published: Oct. 11, 2025
 - Modified: Oct. 14, 2025
 - Vuln Type: Authorization
 
 - 
                                
                                
4.9
MEDIUMCVE-2025-9947
The Custom 404 Pro plugin for WordPress is vulnerable to time-based SQL Injection via the ‘path’ parameter in all versions up to, and including, 3.12.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the e... Read more
Affected Products : custom_404_pro- Published: Oct. 11, 2025
 - Modified: Oct. 14, 2025
 - Vuln Type: Injection
 
 - 
                                
                                
8.6
HIGHCVE-2025-48043
Incorrect Authorization vulnerability in ash-project ash allows Authentication Bypass. This vulnerability is associated with program files lib/ash/policy/authorizer/authorizer.ex and program routines 'Elixir.Ash.Policy.Authorizer':strict_filters/2. This ... Read more
Affected Products : ash- Published: Oct. 10, 2025
 - Modified: Oct. 14, 2025
 - Vuln Type: Authorization
 
 - 
                                
                                
6.8
MEDIUMCVE-2025-9975
The WP Scraper plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 5.8.1 via the wp_scraper_extract_content function. This makes it possible for authenticated attackers, with Administrator-level access a... Read more
Affected Products :- Published: Oct. 11, 2025
 - Modified: Oct. 14, 2025
 - Vuln Type: Server-Side Request Forgery
 
 - 
                                
                                
5.5
MEDIUMCVE-2025-61912
python-ldap is a lightweight directory access protocol (LDAP) client API for Python. In versions prior to 3.4.5, ldap.dn.escape_dn_chars() escapes \x00 incorrectly by emitting a backslash followed by a literal NUL byte instead of the RFC-4514 hex form \00... Read more
Affected Products :- Published: Oct. 10, 2025
 - Modified: Oct. 14, 2025
 - Vuln Type: Denial of Service
 
 - 
                                
                                
9.6
CRITICALCVE-2025-61929
Cherry Studio is a desktop client that supports for multiple LLM providers. Cherry Studio registers a custom protocol called `cherrystudio://`. When handling the MCP installation URL, it parses the base64-encoded configuration data and directly executes t... Read more
Affected Products :- Published: Oct. 10, 2025
 - Modified: Oct. 14, 2025
 - Vuln Type: Injection
 
 - 
                                
                                
6.5
MEDIUMCVE-2025-61925
Astro is a web framework. Prior to version 5.14.2, Astro reflects the value in `X-Forwarded-Host` in output when using `Astro.url` without any validation. It is common for web servers such as nginx to route requests via the `Host` header, and forward on o... Read more
Affected Products :- Published: Oct. 10, 2025
 - Modified: Oct. 14, 2025
 - Vuln Type: Misconfiguration
 
 - 
                                
                                
8.3
HIGHCVE-2025-55903
A HTML injection vulnerability exists in Perfex CRM v3.3.1. The application fails to sanitize user input in the "Bill To" address field within the estimate module. As a result, arbitrary HTML can be injected and rendered unescaped in client-facing documen... Read more
Affected Products :- Published: Oct. 10, 2025
 - Modified: Oct. 14, 2025
 - Vuln Type: Cross-Site Scripting
 
 - 
                                
                                
6.1
MEDIUMCVE-2025-8887
Authorization Bypass Through User-Controlled Key, Missing Authorization, Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Usta Information Systems Inc. Aybs Interaktif allows Forceful Browsing, Parameter Injection, Input Data Ma... Read more
Affected Products :- Published: Oct. 10, 2025
 - Modified: Oct. 14, 2025
 - Vuln Type: Authorization
 
 - 
                                
                                
5.8
MEDIUMCVE-2025-11628
A flaw has been found in jimit105 Project-Online-Shopping-Website up to 7d892f442bd8a96dd242dbe2b9bd5ed641e13e64. This affects an unknown function of the file /delete.php of the component Product Inventory Handler. This manipulation of the argument produc... Read more
Affected Products :- Published: Oct. 12, 2025
 - Modified: Oct. 14, 2025
 - Vuln Type: Injection
 
 - 
                                
                                
6.4
MEDIUMCVE-2025-9560
The Colibri Page Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's colibri_newsletter shortcode in all versions up to, and including, 1.0.334 due to insufficient input sanitization and output escaping on user suppl... Read more
Affected Products : colibri_page_builder- Published: Oct. 11, 2025
 - Modified: Oct. 14, 2025
 - Vuln Type: Cross-Site Scripting
 
 - 
                                
                                
9.8
CRITICALCVE-2025-6553
The Ovatheme Events Manager plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the process_checkout() function in all versions up to, and including, 1.8.5. This makes it possible for unauthenticated attacke... Read more
Affected Products :- Published: Oct. 11, 2025
 - Modified: Oct. 14, 2025
 - Vuln Type: Misconfiguration
 
 - 
                                
                                
6.1
MEDIUMCVE-2025-52885
Poppler ia a library for rendering PDF files, and examining or modifying their structure. A use-after-free (write) vulnerability has been detected in versions Poppler prior to 25.10.0 within the StructTreeRoot class. The issue arises from the use of raw p... Read more
Affected Products : poppler- Published: Oct. 10, 2025
 - Modified: Oct. 14, 2025
 - Vuln Type: Memory Corruption
 
 - 
                                
                                
6.4
MEDIUMCVE-2025-10190
The WP Easy Toggles plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'toggles' shortcode in all versions up to, and including, 1.9.0 due to insufficient input sanitization and output escaping on user supplied attributes. ... Read more
Affected Products :- Published: Oct. 11, 2025
 - Modified: Oct. 14, 2025
 - Vuln Type: Cross-Site Scripting
 
 - 
                                
                                
8.8
HIGHCVE-2025-8593
The GSheetConnector For Gravity Forms plugin for WordPress is vulnerable to authorization bypass in versions less than, or equal to, 1.3.27. This is due to a missing capability check on the 'install_plugin' function. This makes it possible for authenticat... Read more
Affected Products :- Published: Oct. 11, 2025
 - Modified: Oct. 14, 2025
 - Vuln Type: Authorization
 
 - 
                                
                                
4.6
MEDIUMCVE-2025-31992
HCL Unica MaxAI Assistant is susceptible to a HTML injection vulnerability. An attacker could insert special characters that are processed client-side in the context of the user's session.... Read more
Affected Products :- Published: Oct. 12, 2025
 - Modified: Oct. 14, 2025
 - Vuln Type: Cross-Site Scripting
 
 - 
                                
                                
9.0
HIGHCVE-2025-11653
A vulnerability was determined in UTT HiPER 2620G up to 3.1.4. Impacted is the function strcpy of the file /goform/fNTP. This manipulation of the argument NTPServerIP causes buffer overflow. It is possible to initiate the attack remotely. The exploit has ... Read more
Affected Products :- Published: Oct. 13, 2025
 - Modified: Oct. 14, 2025
 - Vuln Type: Memory Corruption