Latest CVE Feed
-
6.4
MEDIUMCVE-2025-8399
The Mmm Unity Loader plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘attributes’ parameter in all versions up to, and including, 1.0 due to insufficient input sanitization and output escaping. This makes it possible for authenti... Read more
Affected Products :- Published: Aug. 02, 2025
- Modified: Aug. 04, 2025
-
6.4
MEDIUMCVE-2025-8391
The Magic Edge – Lite plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘height’ parameter in all versions up to, and including, 1.1.6 due to insufficient input sanitization and output escaping. This makes it possible for authentic... Read more
Affected Products :- Published: Aug. 02, 2025
- Modified: Aug. 04, 2025
-
6.1
MEDIUMCVE-2025-6832
The All in One Time Clock Lite – Tracking Employee Time Has Never Been Easier plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'nonce' parameter in all versions up to, and including, 2.0 due to insufficient input sanitization a... Read more
Affected Products :- Published: Aug. 02, 2025
- Modified: Aug. 04, 2025
-
6.4
MEDIUMCVE-2025-8317
The Custom Word Cloud plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘angle’ parameter in all versions up to, and including, 0.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticate... Read more
Affected Products :- Published: Aug. 02, 2025
- Modified: Aug. 04, 2025
-
6.4
MEDIUMCVE-2025-8212
The Medical Addon for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Typewriter widget in all versions up to, and including, 1.6.3 due to insufficient input sanitization and output escaping on user supplied at... Read more
Affected Products :- Published: Aug. 02, 2025
- Modified: Aug. 04, 2025
-
5.3
MEDIUMCVE-2025-8152
The WP CTA – Call To Action Plugin, Sticky CTA, Sticky Buttons plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'update_cta_status' and 'change_sticky_sidebar_name' functions in all versions ... Read more
Affected Products :- Published: Aug. 02, 2025
- Modified: Aug. 04, 2025
-
8.8
HIGHCVE-2025-6754
The SEO Metrics plugin for WordPress is vulnerable to Privilege Escalation due to missing authorization checks in both the seo_metrics_handle_connect_button_click() AJAX handler and the seo_metrics_handle_custom_endpoint() function in versions 1.0.5 throu... Read more
Affected Products :- Published: Aug. 02, 2025
- Modified: Aug. 04, 2025
-
4.4
MEDIUMCVE-2025-6626
The ShortPixel Adaptive Images – WebP, AVIF, CDN, Image Optimization plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the API URL Setting in all versions up to, and including, 3.10.3 due to insufficient input sanitization and output e... Read more
Affected Products : shortpixel_adaptive_images- Published: Aug. 02, 2025
- Modified: Aug. 04, 2025
-
6.4
MEDIUMCVE-2025-4588
The 360 Photo Spheres plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'sphere' shortcode in all versions up to, and including, 1.3 due to insufficient input sanitization and output escaping on user supplied attributes. T... Read more
Affected Products :- Published: Aug. 02, 2025
- Modified: Aug. 04, 2025
-
6.4
MEDIUMCVE-2025-8146
The Qi Addons For Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's TypeOut Text widget in all versions up to, and including, 1.9.2 due to insufficient input sanitization and output escaping on user supplied attr... Read more
Affected Products : qi_addons_for_elementor- Published: Aug. 02, 2025
- Modified: Aug. 04, 2025
-
7.5
HIGHCVE-2025-7694
The Woffice Core plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the woffice_file_manager_delete() function in all versions up to, and including, 5.4.26. This makes it possible for authenticated at... Read more
Affected Products : woffice- Published: Aug. 02, 2025
- Modified: Aug. 12, 2025
-
5.4
MEDIUMCVE-2025-6078
Partner Software's Partner Software application and Partner Web application allows an authenticated user to add notes on the 'Notes' page when viewing a job but does not completely sanitize input, making it possible to add notes with HTML tags and JavaScr... Read more
Affected Products :- Published: Aug. 02, 2025
- Modified: Aug. 04, 2025
-
9.8
CRITICALCVE-2025-6077
Partner Software's Partner Software Product and corresponding Partner Web application use the same default username and password for the administrator account across all versions.... Read more
Affected Products :- Published: Aug. 02, 2025
- Modified: Aug. 05, 2025
-
8.8
HIGHCVE-2025-6076
Partner Software's Partner Software application and Partner Web application do not sanitize files uploaded on the "reports" tab, allowing an authenticated attacker to upload a malicious file and compromise the device. By default, the software runs as SYST... Read more
Affected Products :- Published: Aug. 02, 2025
- Modified: Aug. 04, 2025
-
7.5
HIGHCVE-2025-54796
Copyparty is a portable file server. Versions prior to 1.18.9, the filter parameter for the "Recent Uploads" page allows arbitrary RegExes. If this feature is enabled (which is the default), an attacker can craft a filter which deadlocks the server. This ... Read more
Affected Products : copyparty- Published: Aug. 02, 2025
- Modified: Aug. 04, 2025
-
9.2
CRITICALCVE-2025-54790
Files is a module for managing files inside spaces and user profiles. In versions 0.16.9 and below, Files does not have logic to prevent the exploitation of backend SQL queries without direct output, potentially allowing unauthorized data access. This is ... Read more
Affected Products :- Published: Aug. 02, 2025
- Modified: Aug. 04, 2025
-
5.1
MEDIUMCVE-2025-54789
Files is a module for managing files inside spaces and user profiles. In versions 0.16.9 and below, the File Move functionality does not contain logic that prevents injection of arbitrary JavaScript, which can lead to Browser JS code execution in the cont... Read more
Affected Products :- Published: Aug. 02, 2025
- Modified: Aug. 04, 2025
-
9.4
CRITICALCVE-2025-54782
Nest is a framework for building scalable Node.js server-side applications. In versions 0.2.0 and below, a critical Remote Code Execution (RCE) vulnerability was discovered in the @nestjs/devtools-integration package. When enabled, the package exposes a l... Read more
Affected Products : nest- Published: Aug. 02, 2025
- Modified: Aug. 04, 2025
-
2.8
LOWCVE-2025-54781
Himmelblau is an interoperability suite for Microsoft Azure Entra ID and Intune. When debugging is enabled for Himmelblau in version 1.0.0, the himmelblaud_tasks service leaks an Intune service access token to the system journal. This short-lived token ca... Read more
Affected Products :- Published: Aug. 02, 2025
- Modified: Aug. 04, 2025
-
7.3
HIGHCVE-2025-54386
Traefik is an HTTP reverse proxy and load balancer. In versions 2.11.27 and below, 3.0.0 through 3.4.4 and 3.5.0-rc1, a path traversal vulnerability was discovered in WASM Traefik’s plugin installation mechanism. By supplying a maliciously crafted ZIP arc... Read more
Affected Products : traefik- Published: Aug. 02, 2025
- Modified: Aug. 04, 2025