Latest CVE Feed
-
5.3
MEDIUMCVE-2025-1766
The Event Manager, Events Calendar, Tickets, Registrations – Eventin plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'payment_complete' function in all versions up to, and including, 4.0.24.... Read more
Affected Products : eventin- Published: Mar. 20, 2025
- Modified: Aug. 11, 2025
- Vuln Type: Authorization
-
4.3
MEDIUMCVE-2025-1314
The Custom Twitter Feeds – A Tweets Widget or X Feed Widget plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.2.5. This is due to missing or incorrect nonce validation on the ctf_clear_cache_admin() f... Read more
Affected Products : custom_twitter_feeds- Published: Mar. 20, 2025
- Modified: Mar. 20, 2025
- Vuln Type: Cross-Site Request Forgery
-
7.1
HIGHCVE-2024-13881
The Link My Posts WordPress plugin through 1.0 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin.... Read more
Affected Products : linkmyposts- Published: Mar. 20, 2025
- Modified: Apr. 08, 2025
- Vuln Type: Cross-Site Scripting
-
7.1
HIGHCVE-2024-13880
The My Quota WordPress plugin through 1.0.8 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin.... Read more
Affected Products : my_quota- Published: Mar. 20, 2025
- Modified: Apr. 08, 2025
- Vuln Type: Cross-Site Scripting
-
7.1
HIGHCVE-2024-13878
The SpotBot WordPress plugin through 0.1.8 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin.... Read more
Affected Products : spotbot- Published: Mar. 20, 2025
- Modified: Apr. 08, 2025
- Vuln Type: Cross-Site Scripting
-
7.1
HIGHCVE-2024-13877
The Passbeemedia Web Push Notification WordPress plugin through 1.0.0 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admi... Read more
Affected Products : passbeemedia_web_push_notification- Published: Mar. 20, 2025
- Modified: Apr. 09, 2025
- Vuln Type: Cross-Site Scripting
-
7.1
HIGHCVE-2024-13876
The mEintopf WordPress plugin through 0.2.1 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin.... Read more
Affected Products : meintopf- Published: Mar. 20, 2025
- Modified: Apr. 09, 2025
- Vuln Type: Cross-Site Scripting
-
7.1
HIGHCVE-2024-13875
The WP-PManager WordPress plugin through 1.2 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin.... Read more
Affected Products : wp-pmanager- Published: Mar. 20, 2025
- Modified: Apr. 10, 2025
- Vuln Type: Cross-Site Scripting
-
3.5
LOWCVE-2025-30259
The WhatsApp cloud service before late 2024 did not block certain crafted PDF content that can defeat a sandbox protection mechanism and consequently allow remote access to messaging applications by third parties, as exploited in the wild in 2024 for inst... Read more
Affected Products :- Published: Mar. 20, 2025
- Modified: Mar. 20, 2025
- Vuln Type: Misconfiguration
-
6.1
MEDIUMCVE-2025-30092
Intrexx Portal Server 12.x <= 12.0.2 and 11.x <= 11.9.2 allows XSS in multiple Velocity scripts.... Read more
Affected Products :- Published: Mar. 19, 2025
- Modified: Mar. 24, 2025
- Vuln Type: Cross-Site Scripting
-
7.8
HIGHCVE-2025-27787
Applio is a voice conversion tool. Versions 3.2.8-bugfix and prior are vulnerable to denial of service (DoS) in restart.py. `model_name` in train.py takes user input, and passes it to the `stop_train` function in restart.py, which uses it construct a path... Read more
Affected Products : applio- Published: Mar. 19, 2025
- Modified: Aug. 01, 2025
- Vuln Type: Path Traversal
-
9.1
CRITICALCVE-2025-27786
Applio is a voice conversion tool. Versions 3.2.8-bugfix and prior are vulnerable to arbitrary file removal in core.py. `output_tts_path` in tts.py takes arbitrary user input and passes it to `run_tts_script` function in core.py, which checks if the path ... Read more
Affected Products : applio- Published: Mar. 19, 2025
- Modified: Aug. 01, 2025
- Vuln Type: Path Traversal
-
7.7
HIGHCVE-2025-27785
Applio is a voice conversion tool. Versions 3.2.8-bugfix and prior are vulnerable to arbitrary file read in train.py's `export_index` function. This issue may lead to reading arbitrary files on the Applio server. It can also be used in conjunction with bl... Read more
Affected Products : applio- Published: Mar. 19, 2025
- Modified: Aug. 01, 2025
- Vuln Type: Information Disclosure
-
7.7
HIGHCVE-2025-27784
Applio is a voice conversion tool. Versions 3.2.8-bugfix and prior are vulnerable to arbitrary file read in train.py's `export_pth` function. This issue may lead to reading arbitrary files on the Applio server. It can also be used in conjunction with blin... Read more
Affected Products : applio- Published: Mar. 19, 2025
- Modified: Aug. 01, 2025
- Vuln Type: Information Disclosure
-
9.8
CRITICALCVE-2025-27783
Applio is a voice conversion tool. Versions 3.2.8-bugfix and prior are vulnerable to arbitrary file write in train.py. This issue may lead to writing arbitrary files on the Applio server. It can also be used in conjunction with an unsafe deserialization t... Read more
Affected Products : applio- Published: Mar. 19, 2025
- Modified: Aug. 01, 2025
- Vuln Type: Misconfiguration
-
9.8
CRITICALCVE-2025-27782
Applio is a voice conversion tool. Versions 3.2.8-bugfix and prior are vulnerable to arbitrary file write in inference.py. This issue may lead to writing arbitrary files on the Applio server. It can also be used in conjunction with an unsafe deserializati... Read more
Affected Products : applio- Published: Mar. 19, 2025
- Modified: Aug. 01, 2025
- Vuln Type: Misconfiguration
-
9.8
CRITICALCVE-2025-27781
Applio is a voice conversion tool. Versions 3.2.8-bugfix and prior are vulnerable to unsafe deserialization in inference.py. `model_file` in inference.py as well as `model_file` in tts.py take user-supplied input (e.g. a path to a model) and pass that val... Read more
Affected Products : applio- Published: Mar. 19, 2025
- Modified: Aug. 01, 2025
- Vuln Type: Misconfiguration
-
9.8
CRITICALCVE-2025-27780
Applio is a voice conversion tool. Versions 3.2.8-bugfix and prior are vulnerable to unsafe deserialization in model_information.py. `model_name` in model_information.py takes user-supplied input (e.g. a path to a model) and pass that value to the `run_mo... Read more
Affected Products : applio- Published: Mar. 19, 2025
- Modified: Aug. 01, 2025
- Vuln Type: Misconfiguration
-
9.8
CRITICALCVE-2025-27779
Applio is a voice conversion tool. Versions 3.2.8-bugfix and prior are vulnerable to unsafe deserialization in `model_blender.py` lines 20 and 21. `model_fusion_a` and `model_fusion_b` from voice_blender.py take user-supplied input (e.g. a path to a model... Read more
Affected Products : applio- Published: Mar. 19, 2025
- Modified: Aug. 01, 2025
- Vuln Type: Misconfiguration
-
9.8
CRITICALCVE-2025-27778
Applio is a voice conversion tool. Versions 3.2.8-bugfix and prior are vulnerable to unsafe deserialization in `infer.py`. The issue can lead to remote code execution. As of time of publication, a fix is available on the `main` branch of the Applio reposi... Read more
Affected Products : applio- Published: Mar. 19, 2025
- Modified: Aug. 01, 2025
- Vuln Type: Misconfiguration