Latest CVE Feed
-
5.3
MEDIUMCVE-2025-8991
A vulnerability was identified in linlinjava litemall up to 1.8.0. Affected by this vulnerability is an unknown functionality of the file /admin/config/express of the component Business Logic Handler. The manipulation of the argument litemall_express_frei... Read more
Affected Products : litemall- Published: Aug. 15, 2025
- Modified: Aug. 15, 2025
- Vuln Type: Misconfiguration
-
8.1
HIGHCVE-2025-8342
The WooCommerce OTP Login With Phone Number, OTP Verification plugin for WordPress is vulnerable to authentication bypass due to insufficient empty value checking in the lwp_ajax_register function in all versions up to, and including, 1.8.47. This makes i... Read more
Affected Products :- Published: Aug. 15, 2025
- Modified: Aug. 15, 2025
- Vuln Type: Authentication
-
4.3
MEDIUMCVE-2025-8680
The B Slider- Gutenberg Slider Block for WP plugin for WordPress is vulnerable to Server-Side Request Forgery in version less than, or equal to, 2.0.0 via the fs_api_request function. This makes it possible for authenticated attackers, with subscriber-lev... Read more
Affected Products :- Published: Aug. 15, 2025
- Modified: Aug. 15, 2025
- Vuln Type: Server-Side Request Forgery
-
6.4
MEDIUMCVE-2025-8867
The Graphina - Elementor Charts and Graphs plugin for WordPress is vulnerable to Stored Cross-Site Scripting via multiple chart widget parameters in version 3.1.3 and below. This is due to insufficient input sanitization and output escaping on user suppli... Read more
Affected Products :- Published: Aug. 15, 2025
- Modified: Aug. 15, 2025
- Vuln Type: Cross-Site Scripting
-
3.8
LOWCVE-2025-8013
The Quttera Web Malware Scanner plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 3.5.1.41 via the 'RunExternalScan' function. This makes it possible for authenticated attackers, with Administrator-lev... Read more
Affected Products : quttera_web_malware_scanner- Published: Aug. 15, 2025
- Modified: Aug. 15, 2025
- Vuln Type: Server-Side Request Forgery
-
6.4
MEDIUMCVE-2025-8451
The Essential Addons for Elementor – Popular Elementor Templates & Widgets plugin for WordPress is vulnerable to DOM-Based Stored Cross-Site Scripting via the ‘data-gallery-items’ parameter in all versions up to, and including, 6.2.2 due to insufficient i... Read more
Affected Products : essential_addons_for_elementor- Published: Aug. 15, 2025
- Modified: Aug. 15, 2025
- Vuln Type: Cross-Site Scripting
-
6.4
MEDIUMCVE-2025-5844
The Radius Blocks plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘subHeadingTagName’ parameter in all versions up to, and including, 2.2.1 due to insufficient input sanitization and output escaping. This makes it possible for au... Read more
Affected Products :- Published: Aug. 15, 2025
- Modified: Aug. 15, 2025
- Vuln Type: Cross-Site Scripting
-
7.5
HIGHCVE-2025-7641
The Assistant for NextGEN Gallery plugin for WordPress is vulnerable to arbitrary directory deletion due to insufficient file path validation in the /wp-json/nextgenassistant/v1.0.0/control REST endpoint in all versions up to, and including, 1.0.9. This m... Read more
Affected Products :- Published: Aug. 15, 2025
- Modified: Aug. 15, 2025
- Vuln Type: Path Traversal
-
6.5
MEDIUMCVE-2025-7662
The Gestion de tarifs plugin for WordPress is vulnerable to SQL Injection via the 'tarif' and 'intitule' shortcodes in all versions up to, and including, 1.4 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on... Read more
Affected Products :- Published: Aug. 15, 2025
- Modified: Aug. 15, 2025
- Vuln Type: Injection
-
6.1
MEDIUMCVE-2025-7688
The Add User Meta plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0.1. This is due to missing or incorrect nonce validation on the 'add-user-meta' page. This makes it possible for unauthenticated at... Read more
Affected Products :- Published: Aug. 15, 2025
- Modified: Aug. 15, 2025
- Vuln Type: Cross-Site Request Forgery
-
4.4
MEDIUMCVE-2025-8080
The Alobaidi Captcha plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin settings in all versions up to, and including, 1.0.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated... Read more
Affected Products :- Published: Aug. 15, 2025
- Modified: Aug. 15, 2025
- Vuln Type: Cross-Site Scripting
-
6.4
MEDIUMCVE-2025-8720
The Plugin README Parser plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘target’ parameter in all versions up to, and including, 1.3.15 due to insufficient input sanitization and output escaping. This makes it possible for authe... Read more
Affected Products :- Published: Aug. 15, 2025
- Modified: Aug. 15, 2025
- Vuln Type: Cross-Site Scripting
-
6.3
MEDIUMCVE-2025-8905
The Inpersttion For Theme plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 1.0 via the theme_section_shortcode() function. This is due to the plugin not restricting what functions can be called. This makes ... Read more
Affected Products :- Published: Aug. 15, 2025
- Modified: Aug. 15, 2025
- Vuln Type: Authentication
-
9.0
HIGHCVE-2025-9023
A vulnerability has been found in Tenda AC7 and AC18 15.03.05.19/15.03.06.44. Affected is the function formSetSchedLed of the file /goform/SetLEDCfg. The manipulation of the argument Time leads to buffer overflow. It is possible to launch the attack remot... Read more
- Published: Aug. 15, 2025
- Modified: Aug. 15, 2025
- Vuln Type: Memory Corruption
-
5.7
MEDIUMCVE-2025-26709
There is an unauthorized access vulnerability in ZTE F50. Due to improper permission control of the Web module interface, an unauthorized attacker can obtain sensitive information through the interface... Read more
Affected Products :- Published: Aug. 15, 2025
- Modified: Aug. 15, 2025
- Vuln Type: Authorization
-
7.2
HIGHCVE-2025-1929
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Risk Yazılım Teknolojileri Ltd. Şti. Reel Sektör Hazine ve Risk Yönetimi Yazılımı allows SQL Injection, CAPEC - 7 - Blind SQL Injection.This issue affect... Read more
Affected Products :- Published: Aug. 15, 2025
- Modified: Aug. 15, 2025
- Vuln Type: Injection
-
9.2
CRITICALCVE-2025-54473
An authenticated RCE vulnerability in Phoca Commander component 1.0.0-4.0.0 and 5.0.0-5.0.1 for Joomla was discovered. The issue allows code execution via the unzip feature.... Read more
Affected Products :- Published: Aug. 15, 2025
- Modified: Aug. 15, 2025
- Vuln Type: Authentication
-
8.5
HIGHCVE-2025-54474
A SQLi vulnerability in DJ-Classifieds component 3.9.2-3.10.1 for Joomla was discovered. The issue allows privileged users to execute arbitrary SQL commands.... Read more
Affected Products :- Published: Aug. 15, 2025
- Modified: Aug. 15, 2025
- Vuln Type: Injection
-
7.3
HIGHCVE-2025-29984
Dell Trusted Device, versions prior to 7.0.3.0, contain an Incorrect Default Permissions vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of privileges.... Read more
Affected Products : trusted_device_agent- Published: Apr. 15, 2025
- Modified: Aug. 15, 2025
- Vuln Type: Misconfiguration
-
7.3
HIGHCVE-2025-29983
Dell Trusted Device, versions prior to 7.0.3.0, contain an Improper Link Resolution Before File Access ('Link Following') vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of priv... Read more
Affected Products : trusted_device_agent- Published: Apr. 15, 2025
- Modified: Aug. 15, 2025
- Vuln Type: Authorization