Latest CVE Feed
-
9.8
CRITICALCVE-2025-40554
SolarWinds Web Help Desk was found to be susceptible to an authentication bypass vulnerability that, if exploited, could allow an attacker to invoke specific actions within Web Help Desk.... Read more
Affected Products : web_help_desk- Published: Jan. 28, 2026
- Modified: Jan. 28, 2026
- Vuln Type: Authentication
-
9.8
CRITICALCVE-2025-40553
SolarWinds Web Help Desk was found to be susceptible to an untrusted data deserialization vulnerability that could lead to remote code execution, which would allow an attacker to run commands on the host machine. This could be exploited without authentica... Read more
Affected Products : web_help_desk- Published: Jan. 28, 2026
- Modified: Jan. 28, 2026
- Vuln Type: Injection
-
9.8
CRITICALCVE-2025-40552
SolarWinds Web Help Desk was found to be susceptible to an authentication bypass vulnerability that if exploited, would allow a malicious actor to execute actions and methods that should be protected by authentication.... Read more
Affected Products : web_help_desk- Published: Jan. 28, 2026
- Modified: Jan. 28, 2026
- Vuln Type: Authentication
-
9.8
CRITICALCVE-2025-40551
SolarWinds Web Help Desk was found to be susceptible to an untrusted data deserialization vulnerability that could lead to remote code execution, which would allow an attacker to run commands on the host machine. This could be exploited without authentica... Read more
Affected Products : web_help_desk- Published: Jan. 28, 2026
- Modified: Jan. 28, 2026
- Vuln Type: Information Disclosure
-
7.5
HIGHCVE-2025-40537
SolarWinds Web Help Desk was found to be susceptible to a hardcoded credentials vulnerability that, under certain situations, could allow access to administrative functions.... Read more
Affected Products : web_help_desk- Published: Jan. 28, 2026
- Modified: Jan. 28, 2026
- Vuln Type: Authentication
-
8.1
HIGHCVE-2025-40536
SolarWinds Web Help Desk was found to be susceptible to a security control bypass vulnerability that if exploited, could allow an unauthenticated attacker to gain access to certain restricted functionality.... Read more
Affected Products : web_help_desk- Published: Jan. 28, 2026
- Modified: Jan. 28, 2026
- Vuln Type: Authorization
-
6.1
MEDIUMCVE-2026-1466
Jirafeau normally prevents browser preview for text files due to the possibility that for example SVG and HTML documents could be exploited for cross site scripting. This was done by storing the MIME type of a file and allowing only browser preview for MI... Read more
Affected Products : jirafeau- Published: Jan. 28, 2026
- Modified: Jan. 28, 2026
- Vuln Type: Cross-Site Scripting
-
5.3
MEDIUMCVE-2026-1310
The Simple calendar for Elementor plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 1.6.6. This is due to missing capability checks on the `miga_ajax_editor_cal_delete` function that is hooked to the `miga_e... Read more
Affected Products :- Published: Jan. 28, 2026
- Modified: Jan. 28, 2026
- Vuln Type: Authorization
-
6.4
MEDIUMCVE-2026-1295
The Buy Now Plus – Buy Now buttons for Stripe plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'buynowplus' shortcode in all versions up to, and including, 1.0.2 due to insufficient input sanitization and output escaping on shortc... Read more
Affected Products :- Published: Jan. 28, 2026
- Modified: Jan. 28, 2026
- Vuln Type: Cross-Site Scripting
-
6.4
MEDIUMCVE-2026-1244
The Forms Bridge – Infinite integrations plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'id' shortcode attribute in the 'financoop_campaign' shortcode in all versions up to, and including, 4.2.5. This is due to insufficient inpu... Read more
Affected Products :- Published: Jan. 28, 2026
- Modified: Jan. 28, 2026
- Vuln Type: Cross-Site Scripting
-
7.3
HIGHCVE-2026-0832
The New User Approve plugin for WordPress is vulnerable to unauthorized access of data and modification of data due to a missing capability check on multiple REST API endpoints in all versions up to, and including, 3.2.2. This makes it possible for unauth... Read more
Affected Products :- Published: Jan. 28, 2026
- Modified: Jan. 28, 2026
- Vuln Type: Authorization
-
5.3
MEDIUMCVE-2026-0825
The Database for Contact Form 7, WPforms, Elementor forms plugin for WordPress is vulnerable to authorization bypass due to missing capability checks on the CSV export functionality in all versions up to, and including, 1.4.5. This makes it possible for u... Read more
Affected Products : database_for_contact_form_7\,_wpforms\,_elementor_forms- Published: Jan. 28, 2026
- Modified: Jan. 28, 2026
- Vuln Type: Authorization
-
6.4
MEDIUMCVE-2025-9082
The WPBITS Addons For Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via multiple widget parameters in versions up to, and including, 1.8 due to insufficient input sanitization and output escaping when dynamic content is enabl... Read more
Affected Products : wpbits_addons_for_elementor_page_builder- Published: Jan. 28, 2026
- Modified: Jan. 28, 2026
- Vuln Type: Cross-Site Scripting
-
6.4
MEDIUMCVE-2025-14039
The Simple Folio plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the '_simple_folio_item_client_name' and '_simple_folio_item_link' meta fields in all versions up to, and including, 1.1.1 due to insufficient input sanitization and ou... Read more
Affected Products :- Published: Jan. 28, 2026
- Modified: Jan. 28, 2026
- Vuln Type: Cross-Site Scripting
-
6.4
MEDIUMCVE-2025-12709
The Interactions – Create Interactive Experiences in the Block Editor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via event selectors in all versions up to, and including, 1.3.1 due to insufficient input sanitization and output escap... Read more
Affected Products :- Published: Jan. 28, 2026
- Modified: Jan. 28, 2026
- Vuln Type: Cross-Site Scripting
-
5.3
MEDIUMCVE-2026-1298
The Easy Replace Image plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 3.5.2. This is due to missing capability checks on the `image_replacement_from_url` function that is hooked to the `eri_from_url` AJAX... Read more
Affected Products :- Published: Jan. 28, 2026
- Modified: Jan. 28, 2026
- Vuln Type: Authorization
-
4.4
MEDIUMCVE-2026-1083
The Appointment Hour Booking – Booking Calendar plugin for WordPress is vulnerable to Stored Cross-Site Scripting via form field configuration parameters in all versions up to, and including, 1.5.60 due to insufficient input sanitization and output escapi... Read more
Affected Products :- Published: Jan. 28, 2026
- Modified: Jan. 28, 2026
- Vuln Type: Cross-Site Scripting
-
6.4
MEDIUMCVE-2025-8072
The Target Video Easy Publish plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘placeholder_img’ parameter in all versions up to, and including, 3.8.8 due to insufficient input sanitization and output escaping. This makes it possi... Read more
Affected Products :- Published: Jan. 28, 2026
- Modified: Jan. 28, 2026
- Vuln Type: Cross-Site Scripting
-
7.2
HIGHCVE-2025-14610
The TableMaster for Elementor plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 1.3.6. This is due to the plugin not restricting which URLs can be fetched when importing CSV data from a URL in the Data... Read more
Affected Products :- Published: Jan. 28, 2026
- Modified: Jan. 28, 2026
- Vuln Type: Server-Side Request Forgery
-
7.1
HIGHCVE-2025-36911
In key-based pairing, there is a possible ID due to a logic error in the code. This could lead to remote (proximal/adjacent) information disclosure of user's conversations and location with no additional execution privileges needed. User interaction is no... Read more
Affected Products : android- Published: Jan. 15, 2026
- Modified: Jan. 28, 2026
- Vuln Type: Information Disclosure