Latest CVE Feed

Following is the list of latest published vulnerabilities. You can filter the list based on the severity of the vulnerability, whether it is actively exploited (also known as CISA KEV List) or remotely exploitable. You can also sort the list based on the published date, last updated date, or CVSS score.
  • 6.4

    MEDIUM
    CVE-2025-5143

    The TableOn – WordPress Posts Table Filterable plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's tableon_popup_iframe_button shortcode in all versions up to, and including, 1.0.4.1 due to insufficient input sanitization an... Read more

    • Published: Jun. 21, 2025
    • Modified: Jul. 09, 2025
    • Vuln Type: Cross-Site Scripting
  • 6.4

    MEDIUM
    CVE-2025-4367

    The Download Manager plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's wpdm_user_dashboard shortcode in all versions up to, and including, 3.3.18 due to insufficient input sanitization and output escaping on user supplied ... Read more

    Affected Products : download_manager
    • Published: Jun. 19, 2025
    • Modified: Jul. 09, 2025
    • Vuln Type: Cross-Site Scripting
  • 6.1

    MEDIUM
    CVE-2025-48923

    Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Drupal Toc.Js allows Cross-Site Scripting (XSS).This issue affects Toc.Js: from 0.0.0 before 3.2.1.... Read more

    Affected Products : toc.js
    • Published: Jun. 26, 2025
    • Modified: Jul. 09, 2025
    • Vuln Type: Cross-Site Scripting
  • 9.8

    CRITICAL
    CVE-2025-1562

    The Recover WooCommerce Cart Abandonment, Newsletter, Email Marketing, Marketing Automation By FunnelKit plugin for WordPress is vulnerable to unauthorized arbitrary plugin installation due to a missing capability check on the install_or_activate_addon_pl... Read more

    Affected Products : funnelkit_automations
    • Published: Jun. 18, 2025
    • Modified: Jul. 09, 2025
    • Vuln Type: Authorization
  • 9.8

    CRITICAL
    CVE-2024-8856

    The Backup and Staging by WP Time Capsule plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the the UploadHandler.php file and no direct file access prevention in all versions up to, and including, 1.22.21... Read more

    • Published: Nov. 16, 2024
    • Modified: Jul. 09, 2025
  • 7.2

    HIGH
    CVE-2025-6220

    The Ultra Addons for Contact Form 7 plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'save_options' function in all versions up to, and including, 3.5.12. This makes it possible for authenticated atta... Read more

    • Published: Jun. 18, 2025
    • Modified: Jul. 09, 2025
    • Vuln Type: Authentication
  • 8.8

    HIGH
    CVE-2024-10728

    The Post Grid Gutenberg Blocks and WordPress Blog Plugin – PostX plugin for WordPress is vulnerable to unauthorized plugin installation/activation due to a missing capability check on the 'install_required_plugin_callback' function in all versions up to, ... Read more

    Affected Products : postx
    • Published: Nov. 16, 2024
    • Modified: Jul. 09, 2025
  • 6.1

    MEDIUM
    CVE-2024-10878

    The Sugar Calendar – Simple Event Management plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg & remove_query_arg without appropriate escaping on the URL in all versions up to, and including, 3.3.0. This ... Read more

    Affected Products : sugar_calendar
    • Published: Nov. 26, 2024
    • Modified: Jul. 09, 2025
  • 6.3

    MEDIUM
    CVE-2024-11002

    The The InPost Gallery plugin for WordPress is vulnerable to arbitrary shortcode execution via the inpost_gallery_get_shortcode_template AJAX action in all versions up to, and including, 2.1.4.2. This is due to the software allowing users to execute an ac... Read more

    Affected Products : inpost_gallery
    • Published: Nov. 26, 2024
    • Modified: Jul. 09, 2025
  • 9.8

    CRITICAL
    CVE-2025-49003

    DataEase is an open source business intelligence and data visualization tool. Prior to version 2.10.11, a threat actor may take advantage of a feature in Java in which the character "ı" becomes "I" when converted to uppercase, and the character "ſ" become... Read more

    Affected Products : dataease
    • Published: Jun. 26, 2025
    • Modified: Jul. 09, 2025
    • Vuln Type: Information Disclosure
  • 6.5

    MEDIUM
    CVE-2024-10857

    The Product Input Fields for WooCommerce plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 1.9 via the handle_downloads() function due to insufficient file path validation/sanitization. This makes it possible ... Read more

    • Published: Nov. 26, 2024
    • Modified: Jul. 09, 2025
  • 4.3

    MEDIUM
    CVE-2024-10778

    The BuddyPress Builder for Elementor – BuddyBuilder plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 1.7.4 via the 'elementor-template' shortcode due to insufficient restrictions on which posts can be includ... Read more

    Affected Products : buddybuilder
    • Published: Nov. 13, 2024
    • Modified: Jul. 09, 2025
  • 4.9

    MEDIUM
    CVE-2025-49015

    The Couchbase .NET SDK (client library) before 3.7.1 does not properly enable hostname verification for TLS certificates. In fact, the SDK was also using IP addresses instead of hostnames due to a configuration option that was incorrectly enabled by defau... Read more

    Affected Products : .net_sdk
    • Published: Jun. 18, 2025
    • Modified: Jul. 09, 2025
    • Vuln Type: Misconfiguration
  • 4.3

    MEDIUM
    CVE-2025-5682

    Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Drupal Klaro Cookie & Consent Management allows Cross-Site Scripting (XSS).This issue affects Klaro Cookie & Consent Management: from 0.0.0 before 3.0.7.... Read more

    • Published: Jun. 26, 2025
    • Modified: Jul. 09, 2025
    • Vuln Type: Cross-Site Scripting
  • 9.0

    HIGH
    CVE-2025-6393

    A vulnerability was found in TOTOLINK A702R, A3002R, A3002RU and EX1200T 3.0.0-B20230809.1615/4.0.0-B20230531.1404/4.0.0-B20230721.1521/4.1.2cu.5232_B20210713. It has been classified as critical. Affected is an unknown function of the file /boafrm/formIPv... Read more

    • Published: Jun. 21, 2025
    • Modified: Jul. 09, 2025
    • Vuln Type: Memory Corruption
  • 8.1

    HIGH
    CVE-2025-45786

    Real Estate Management 1.0 is vulnerable to Cross Site Scripting (XSS) in /store/index.php.... Read more

    Affected Products : real_estate_management
    • Published: Jun. 18, 2025
    • Modified: Jul. 09, 2025
    • Vuln Type: Cross-Site Scripting
  • 5.3

    MEDIUM
    CVE-2024-9578

    The Hide Links plugin for WordPress is vulnerable to unauthorized shortcode execution due to do_shortcode being hooked through the comment_text filter in all versions up to and including 1.4.2. This makes it possible for unauthenticated attackers to execu... Read more

    Affected Products : hide_links
    • Published: Nov. 13, 2024
    • Modified: Jul. 09, 2025
  • 6.4

    MEDIUM
    CVE-2024-10891

    The Save as PDF Plugin by Pdfcrowd plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'save_as_pdf_pdfcrowd' shortcode in all versions up to, and including, 4.2.1 due to insufficient input sanitization and output escaping o... Read more

    Affected Products : save_as_pdf
    • Published: Nov. 20, 2024
    • Modified: Jul. 09, 2025
  • 6.4

    MEDIUM
    CVE-2024-11195

    The Email Subscription Popup plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's print_email_subscribe_form shortcode in all versions up to, and including, 1.2.22 due to insufficient input sanitization and output escaping on... Read more

    Affected Products : email_subscription_popup
    • Published: Nov. 19, 2024
    • Modified: Jul. 09, 2025
  • 7.1

    HIGH
    CVE-2025-44951

    A missing length check in `ogs_pfcp_dev_add` function from PFCP library, used by both smf and upf in open5gs 2.7.2 and earlier, allows a local attacker to cause a Buffer Overflow by changing the `session.dev` field with a value with length greater than 32... Read more

    Affected Products : open5gs
    • Published: Jun. 18, 2025
    • Modified: Jul. 09, 2025
    • Vuln Type: Memory Corruption
Showing 20 of 293437 Results