Latest CVE Feed
- 
                                
                                5.4MEDIUMCVE-2025-9030The Majestic Before After Image plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'before_label' and 'after_label' parameters in versions less than, or equal to, 2.0.1 due to insufficient input sanitization and output escaping. Thi... Read more Affected Products :- Published: Oct. 04, 2025
- Modified: Oct. 06, 2025
- Vuln Type: Cross-Site Scripting
 
- 
                                
                                4.3MEDIUMCVE-2025-9029The WDesignKit – Elementor & Gutenberg Starter Templates, Patterns, Cloud Workspace & Widget Builder plugin for WordPress is vulnerable to missing authorization via the wdkit_handle_review_submission function in versions less than, or equal to, 1.2.16. Th... Read more Affected Products :- Published: Oct. 04, 2025
- Modified: Oct. 06, 2025
- Vuln Type: Authorization
 
- 
                                
                                5.4MEDIUMCVE-2025-8726The WP Photo Album Plus plugin for WordPress is vulnerable to Cross-Site Scripting in all versions up to, and including, 9.0.11.006 due to insufficient input sanitization and output escaping in the wppa_user_upload function. This makes it possible for aut... Read more Affected Products : wp_photo_album_plus- Published: Oct. 04, 2025
- Modified: Oct. 06, 2025
- Vuln Type: Cross-Site Scripting
 
- 
                                
                                5.9MEDIUMCVE-2025-61962In fetchmail before 6.5.6, the SMTP client can crash when authenticating upon receiving a 334 status code in a malformed context.... Read more Affected Products : fetchmail- Published: Oct. 04, 2025
- Modified: Oct. 06, 2025
- Vuln Type: Authentication
 
- 
                                
                                5.3MEDIUMCVE-2025-11228The GiveWP – Donation Plugin and Fundraising Platform plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the `registerAssociateFormsWithCampaign` function in all versions up to, and including, 4.10... Read more Affected Products : givewp- Published: Oct. 04, 2025
- Modified: Oct. 06, 2025
- Vuln Type: Authorization
 
- 
                                
                                6.5MEDIUMCVE-2025-11227The GiveWP – Donation Plugin and Fundraising Platform plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 4.10.0 via the 'registerGetForm', 'registerGetForms', 'registerGetCampaign' and 'registerGetCampaigns' f... Read more Affected Products : givewp- Published: Oct. 04, 2025
- Modified: Oct. 06, 2025
- Vuln Type: Information Disclosure
 
- 
                                
                                6.5MEDIUMCVE-2025-10746The Integrate Dynamics 365 CRM plugin for WordPress is vulnerable to unauthorized access in all versions up to, and including, 1.0.9. This is due to missing capability checks and nonce verification on functions hooked to 'init'. This makes it possible for... Read more Affected Products :- Published: Oct. 04, 2025
- Modified: Oct. 06, 2025
- Vuln Type: Authentication
 
- 
                                
                                9.3CRITICALCVE-2025-10751MacForge contains an insecure XPC service that allows local, unprivileged users to escalate their privileges to root.This issue affects MacForge: 1.2.0 Beta 1.... Read more Affected Products : macforge- Published: Oct. 04, 2025
- Modified: Oct. 17, 2025
- Vuln Type: Authorization
 
- 
                                
                                6.5MEDIUMCVE-2025-61685Mastra is a Typescript framework for building AI agents and assistants. Versions 0.13.8 through 0.13.20-alpha.0 are vulnerable to a Directory Traversal attack that results in the disclosure of directory listings. The code contains a security check to prev... Read more Affected Products :- Published: Oct. 03, 2025
- Modified: Oct. 06, 2025
- Vuln Type: Path Traversal
 
- 
                                
                                5.4MEDIUMCVE-2025-61681KUNO CMS is a fully deployable full-stack blog application. Versions 1.3.13 and below contain validation flaws in its file upload functionality that can be exploited for stored XSS. The upload endpoint only validates file types based on Content-Type heade... Read more Affected Products :- Published: Oct. 03, 2025
- Modified: Oct. 06, 2025
- Vuln Type: Cross-Site Scripting
 
- 
                                
                                6.6MEDIUMCVE-2025-61680Minecraft RCON Terminal is a VS Code extension that streamlines Minecraft server management. Versions 0.1.0 through 2.0.6 stores passwords using VS Code's configuration API which writes to settings.json in plaintext. This issue is fixed in version 2.1.0.... Read more Affected Products :- Published: Oct. 03, 2025
- Modified: Oct. 06, 2025
- Vuln Type: Misconfiguration
 
- 
                                
                                7.7HIGHCVE-2025-61679Anyquery is an SQL query engine built on top of SQLite. Versions 0.4.3 and below allow attackers who have already gained access to localhost, even with low privileges, to use the http server through the port unauthenticated, and access private integration... Read more Affected Products :- Published: Oct. 03, 2025
- Modified: Oct. 06, 2025
- Vuln Type: Authentication
 
- 
                                
                                2.5LOWCVE-2025-61677DataChain is a Python-based AI-data warehouse for transforming and analyzing unstructured data. Versions 0.34.1 and below allow for deseriaization of untrusted data because of the way the DataChain library reads serialized objects from environment variabl... Read more Affected Products :- Published: Oct. 03, 2025
- Modified: Oct. 06, 2025
- Vuln Type: Authentication
 
- 
                                
                                8.6HIGHCVE-2025-61673Karapace is an open-source implementation of Kafka REST and Schema Registry. Versions 5.0.0 and 5.0.1 contain an authentication bypass vulnerability when configured to use OAuth 2.0 Bearer Token authentication. If a request is sent without an Authorizatio... Read more Affected Products :- Published: Oct. 03, 2025
- Modified: Oct. 06, 2025
- Vuln Type: Authentication
 
- 
                                
                                4.6MEDIUMCVE-2025-43825A vulnerability in Liferay Portal 7.4.0 through 7.4.3.132, and Liferay DXP 2025.Q1.0 through 2025.Q1.4, 2024.Q4.0 through 2024.Q4.5, 2024.Q3.0 through 2024.Q3.13, 2024.Q2.1 through 2024.Q2.13, 2024.Q1.1 through 2024.Q1.12, 2023.Q4.0 through 2023.Q4.10, 20... Read more - Published: Oct. 03, 2025
- Modified: Oct. 06, 2025
- Vuln Type: Information Disclosure
 
- 
                                
                                9.8CRITICALCVE-2025-59944Cursor is a code editor built for programming with AI. Versions 1.6.23 and below contain case-sensitive checks in the way Cursor IDE protects its sensitive files (e.g., */.cursor/mcp.json), which allows attackers to modify the content of these files throu... Read more Affected Products : cursor- Published: Oct. 03, 2025
- Modified: Oct. 16, 2025
- Vuln Type: Injection
 
- 
                                
                                9.8CRITICALCVE-2025-59943phpMyFAQ is an open source FAQ web application. Versions 4.0-nightly-2025-10-03 and below do not enforce uniqueness of email addresses during user registration. This allows multiple distinct accounts to be created with the same email. Because email is oft... Read more Affected Products : phpmyfaq- Published: Oct. 03, 2025
- Modified: Oct. 10, 2025
- Vuln Type: Authentication
 
- 
                                
                                7.1HIGHCVE-2025-10696OpenSupports exposes an endpoint that allows the list of 'supervised users' for any account to be edited, but it does not validate whether the actor is the owner of that list. A Level 1 staff member can modify the supervision relationship of a third party... Read more Affected Products : opensupports- Published: Oct. 03, 2025
- Modified: Oct. 06, 2025
- Vuln Type: Authorization
 
- 
                                
                                6.9MEDIUMCVE-2025-10695Two unauthenticated diagnostic endpoints allow arbitrary backend-initiated network connections to an attacker‑supplied destination. Both endpoints are exposed with permission => 'any', enabling unauthenticated SSRF for internal network scanning and servic... Read more Affected Products : opensupports- Published: Oct. 03, 2025
- Modified: Oct. 06, 2025
- Vuln Type: Server-Side Request Forgery
 
- 
                                
                                7.1HIGHCVE-2025-10692The endpoint POST /api/staff/get-new-tickets concatenates the user-controlled parameter departmentId directly into the SQL WHERE clause without parameter binding. As a result, an authenticated staff user (level ≥ 1) can inject SQL to alter the filter logi... Read more Affected Products : opensupports- Published: Oct. 03, 2025
- Modified: Oct. 06, 2025
- Vuln Type: Injection
 
 
                         
                         
                         
                                             
                                            