Latest CVE Feed
-
6.1
MEDIUMCVE-2025-9899
The Trust Reviews plugin for Google, Tripadvisor, Yelp, Airbnb and other platforms plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0. This is due to missing or incorrect nonce validation on the feed... Read more
Affected Products :- Published: Sep. 27, 2025
- Modified: Sep. 27, 2025
- Vuln Type: Cross-Site Request Forgery
-
4.3
MEDIUMCVE-2025-9898
The cForms – Light speed fast Form Builder plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.0.0. This is due to missing or incorrect nonce validation on the cforms_api function. This makes it possibl... Read more
Affected Products :- Published: Sep. 27, 2025
- Modified: Sep. 27, 2025
- Vuln Type: Cross-Site Request Forgery
-
4.3
MEDIUMCVE-2025-9896
The HidePost plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.3.8. This is due to missing or incorrect nonce validation on the options.php settings page. This makes it possible for unauthenticated at... Read more
Affected Products :- Published: Sep. 27, 2025
- Modified: Sep. 27, 2025
- Vuln Type: Cross-Site Request Forgery
-
4.3
MEDIUMCVE-2025-9894
The Sync Feedly plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0.1. This is due to missing or incorrect nonce validation on the crsf_cron_job_func function. This makes it possible for unauthenticat... Read more
Affected Products :- Published: Sep. 27, 2025
- Modified: Sep. 27, 2025
- Vuln Type: Cross-Site Request Forgery
-
4.3
MEDIUMCVE-2025-9893
The VM Menu Reorder plugin plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0.0. This is due to missing or incorrect nonce validation on the vm_set_to_default function. This makes it possible for una... Read more
Affected Products :- Published: Sep. 27, 2025
- Modified: Sep. 27, 2025
- Vuln Type: Cross-Site Request Forgery
-
7.5
HIGHCVE-2025-11052
A security flaw has been discovered in kidaze CourseSelectionSystem 1.0/5.php. The impacted element is an unknown function of the file /Profilers/PriProfile/COUNT3s5.php. Performing manipulation of the argument csslc results in sql injection. The attack c... Read more
Affected Products :- Published: Sep. 27, 2025
- Modified: Sep. 27, 2025
- Vuln Type: Injection
-
5.3
MEDIUMCVE-2025-11051
A vulnerability has been found in SourceCodester Pet Grooming Management Software 1.0. This vulnerability affects unknown code. The manipulation leads to cross-site request forgery. The attack is possible to be carried out remotely.... Read more
Affected Products : pet_grooming_management_software- Published: Sep. 27, 2025
- Modified: Sep. 27, 2025
- Vuln Type: Cross-Site Request Forgery
-
7.2
HIGHCVE-2025-9816
The WP Statistics – The Most Popular Privacy-Friendly Analytics Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the User-Agent Header in all versions up to, and including, 14.5.4 due to insufficient input sanitization and outp... Read more
Affected Products :- Published: Sep. 27, 2025
- Modified: Sep. 27, 2025
- Vuln Type: Cross-Site Scripting
-
5.9
MEDIUMCVE-2025-3193
Versions of the package algoliasearch-helper from 2.0.0-rc1 and before 3.11.2 are vulnerable to Prototype Pollution in the _merge() function in merge.js, which allows constructor.prototype to be written even though doing so throws an error. In the "extrem... Read more
Affected Products : algoliasearch-helper- Published: Sep. 27, 2025
- Modified: Sep. 27, 2025
- Vuln Type: Injection
-
6.5
MEDIUMCVE-2025-11050
A flaw has been found in Portabilis i-Educar up to 2.10. This affects an unknown part of the file /periodo-lancamento. Executing manipulation can lead to improper authorization. The attack can be executed remotely. The exploit has been published and may b... Read more
Affected Products : i-educar- Published: Sep. 27, 2025
- Modified: Sep. 27, 2025
- Vuln Type: Authorization
-
5.5
MEDIUMCVE-2025-10954
Versions of the package github.com/nyaruka/phonenumbers before 1.2.2 are vulnerable to Improper Validation of Syntactic Correctness of Input in the phonenumbers.Parse() function. An attacker can cause a panic by providing crafted input causing a "runtime ... Read more
Affected Products :- Published: Sep. 27, 2025
- Modified: Sep. 27, 2025
- Vuln Type: Denial of Service
-
6.5
MEDIUMCVE-2025-11049
A vulnerability was detected in Portabilis i-Educar up to 2.10. Affected by this issue is some unknown functionality of the file /unificacao-aluno. Performing manipulation results in improper authorization. Remote exploitation of the attack is possible. T... Read more
Affected Products : i-educar- Published: Sep. 27, 2025
- Modified: Sep. 27, 2025
- Vuln Type: Authorization
-
4.3
MEDIUMCVE-2025-10499
The Ninja Forms – The Contact Form Builder That Grows With You plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.12.0. This is due to missing or incorrect nonce validation on the maybe_opt_in() functi... Read more
Affected Products : ninja_forms- Published: Sep. 27, 2025
- Modified: Sep. 27, 2025
- Vuln Type: Cross-Site Request Forgery
-
4.3
MEDIUMCVE-2025-10498
The Ninja Forms – The Contact Form Builder That Grows With You plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 3.12.0. This is due to missing or incorrect nonce validation when exporting CSV files. This m... Read more
Affected Products : ninja_forms- Published: Sep. 27, 2025
- Modified: Sep. 27, 2025
- Vuln Type: Cross-Site Request Forgery
-
6.4
MEDIUMCVE-2025-8440
The Team Members plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the first and last name fields in all versions up to, and including, 5.3.5 due to insufficient input sanitization and output escaping. This makes it possible for authen... Read more
Affected Products :- Published: Sep. 27, 2025
- Modified: Sep. 27, 2025
- Vuln Type: Cross-Site Scripting
-
6.1
MEDIUMCVE-2025-36239
IBM Storage TS4500 Library 1.11.0.0 and 2.11.0.0 is vulnerable to cross-site scripting. This vulnerability allows an unauthenticated attacker to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading t... Read more
Affected Products :- Published: Sep. 27, 2025
- Modified: Sep. 27, 2025
- Vuln Type: Cross-Site Scripting
-
6.5
MEDIUMCVE-2024-43192
IBM Storage TS4500 Library 1.11.0.0 and 2.11.0.0 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts.... Read more
Affected Products :- Published: Sep. 27, 2025
- Modified: Sep. 27, 2025
- Vuln Type: Cross-Site Request Forgery
-
8.1
HIGHCVE-2025-59945
SysReptor is a fully customizable pentest reporting platform. In versions from 2024.74 to before 2025.83, authenticated and unprivileged (non-admin) users can assign the is_project_admin permission to their own user. This allows users to read, modify and ... Read more
Affected Products :- Published: Sep. 27, 2025
- Modified: Sep. 27, 2025
- Vuln Type: Authorization
-
8.8
HIGHCVE-2025-59939
WeGIA is a Web manager for charitable institutions. Prior to version 3.5.0, WeGIA is vulnerable to SQL Injection attacks in the control.php endpoint with the following parameters: nomeClasse=ProdutoControle&metodo=excluir&id_produto=[malicious command]. I... Read more
Affected Products : wegia- Published: Sep. 27, 2025
- Modified: Sep. 27, 2025
- Vuln Type: Injection
-
6.5
MEDIUMCVE-2025-59938
Wazuh is a free and open source platform used for threat prevention, detection, and response. In versions starting from 3.8.0 to before 4.11.0, wazuh-analysisd is vulnerable to a heap buffer overflow when parsing XML elements from Windows EventChannel mes... Read more
Affected Products : wazuh- Published: Sep. 27, 2025
- Modified: Sep. 27, 2025
- Vuln Type: Memory Corruption