Latest CVE Feed
-
6.1
MEDIUMCVE-2025-46553
@misskey-dev/summaly is a tool for getting a summary of a web page. Starting in version 3.0.1 and prior to version 5.2.1, a logic error in the main `summaly` function causes the `allowRedirects` option to never be passed to any plugins, and as a result, i... Read more
Affected Products : misskey- Published: May. 05, 2025
- Modified: Sep. 03, 2025
- Vuln Type: Misconfiguration
-
7.5
HIGHCVE-2025-46559
Misskey is an open source, federated social media platform. Starting in version 12.31.0 and prior to version 2025.4.1, missing validation in `Mk:api` allows malicious AiScript code to access additional endpoints that it isn't designed to have access to. T... Read more
Affected Products : misskey- Published: May. 05, 2025
- Modified: Sep. 03, 2025
- Vuln Type: Authorization
-
6.8
MEDIUMCVE-2025-46730
MobSF is a mobile application security testing tool used. Typically, MobSF is deployed on centralized internal or cloud-based servers that also host other security tools and web applications. Access to the MobSF web interface is often granted to internal ... Read more
Affected Products : mobile_security_framework- Published: May. 05, 2025
- Modified: Sep. 03, 2025
- Vuln Type: Denial of Service
-
7.3
HIGHCVE-2025-46731
Craft is a content management system. Versions of Craft CMS on the 4.x branch prior to 4.14.13 and on the 5.x branch prior to 5.6.16 contains a potential remote code execution vulnerability via Twig SSTI. One must have administrator access and `ALLOW_ADMI... Read more
Affected Products : craft_cms- Published: May. 05, 2025
- Modified: Sep. 03, 2025
- Vuln Type: Injection
-
5.3
MEDIUMCVE-2025-46736
Umbraco is a free and open source .NET content management system. Prior to versions 10.8.10 and 13.8.1, based on an analysis of the timing of post login API responses, it's possible to determine whether an account exists. The issue is patched in versions ... Read more
Affected Products : umbraco_cms- Published: May. 06, 2025
- Modified: Sep. 03, 2025
- Vuln Type: Authentication
-
5.3
MEDIUMCVE-2025-46821
Envoy is a cloud-native edge/middle/service proxy. Prior to versions 1.34.1, 1.33.3, 1.32.6, and 1.31.8, Envoy's URI template matcher incorrectly excludes the `*` character from a set of valid characters in the URI path. As a result URI path containing th... Read more
Affected Products : envoy- Published: May. 07, 2025
- Modified: Sep. 03, 2025
- Vuln Type: Authorization
-
5.3
MEDIUMCVE-2025-46554
XWiki is a generic wiki platform. In versions starting from 1.8.1 to before 14.10.22, from 15.0-rc-1 to before 15.10.12, from 16.0.0-rc-1 to before 16.4.3, and from 16.5.0-rc-1 to before 16.7.0, anyone can access the metadata of any attachment in the wiki... Read more
Affected Products : xwiki- Published: Apr. 30, 2025
- Modified: Sep. 03, 2025
- Vuln Type: Authorization
-
9.8
CRITICALCVE-2025-46557
XWiki is a generic wiki platform. In versions starting from 15.3-rc-1 to before 15.10.14, from 16.0.0-rc-1 to before 16.4.6, and from 16.5.0-rc-1 to before 16.10.0-rc-1, a user who can access pages located in the XWiki space (by default, anyone) can acces... Read more
Affected Products : xwiki- Published: Apr. 30, 2025
- Modified: Sep. 03, 2025
- Vuln Type: Authentication
-
9.8
CRITICALCVE-2024-56158
XWiki is a generic wiki platform. It's possible to execute any SQL query in Oracle by using the function like DBMS_XMLGEN or DBMS_XMLQUERY. The XWiki query validator does not sanitize functions that would be used in a simple select and Hibernate allows us... Read more
Affected Products : xwiki- Published: Jun. 12, 2025
- Modified: Sep. 03, 2025
- Vuln Type: Injection
-
8.5
HIGHCVE-2025-49580
XWiki is a generic wiki platform. From 8.2 and 7.4.5 until 17.1.0-rc-1, 16.10.4, and 16.4.7, pages can gain script or programming rights when they contain a link and the target of the link is renamed or moved. This might lead to execution of scripts conta... Read more
Affected Products : xwiki- Published: Jun. 13, 2025
- Modified: Sep. 03, 2025
- Vuln Type: Authorization
-
8.8
HIGHCVE-2025-49581
XWiki is a generic wiki platform. Any user with edit right on a page (could be the user's profile) can execute code (Groovy, Python, Velocity) with programming right by defining a wiki macro. This allows full access to the whole XWiki installation. The ma... Read more
Affected Products : xwiki- Published: Jun. 13, 2025
- Modified: Sep. 03, 2025
- Vuln Type: Authentication
-
8.6
HIGHCVE-2025-49582
XWiki is a generic wiki platform. When editing content that contains "dangerous" macros like malicious script macros that were authored by a user with fewer rights, XWiki warns about the execution of these macros since XWiki 15.9RC1. These required rights... Read more
Affected Products : xwiki- Published: Jun. 13, 2025
- Modified: Sep. 03, 2025
- Vuln Type: Authorization
-
5.1
MEDIUMCVE-2025-49583
XWiki is a generic wiki platform. When a user without script right creates a document with an `XWiki.Notifications.Code.NotificationEmailRendererClass` object, and later an admin edits and saves that document, the email templates in this object will be us... Read more
Affected Products : xwiki- Published: Jun. 13, 2025
- Modified: Sep. 03, 2025
- Vuln Type: Misconfiguration
-
8.7
HIGHCVE-2025-49584
XWiki is a generic wiki platform. In XWiki Platform versions 10.9 through 16.4.6, 16.5.0-rc-1 through 16.10.2, and 17.0.0-rc-1, the title of every single page whose reference is known can be accessed through the REST API as long as an XClass with a page p... Read more
Affected Products : xwiki- Published: Jun. 13, 2025
- Modified: Sep. 03, 2025
- Vuln Type: Information Disclosure
-
8.6
HIGHCVE-2025-49585
XWiki is a generic wiki platform. In versions before 15.10.16, 16.0.0-rc-1 through 16.4.6, and 16.5.0-rc-1 through 16.10.1, when an attacker without script or programming right creates an XClass definition in XWiki (requires edit right), and that same doc... Read more
Affected Products : xwiki- Published: Jun. 13, 2025
- Modified: Sep. 03, 2025
- Vuln Type: Authentication
-
8.8
HIGHCVE-2025-49586
XWiki is an open-source wiki software platform. Any XWiki user with edit right on at least one App Within Minutes application (the default for all users XWiki) can obtain programming right/perform remote code execution by editing the application. This vul... Read more
Affected Products : xwiki- Published: Jun. 13, 2025
- Modified: Sep. 03, 2025
- Vuln Type: Authorization
-
8.0
HIGHCVE-2025-49587
XWiki is an open-source wiki software platform. When a user without script right creates a document with an XWiki.Notifications.Code.NotificationDisplayerClass object, and later an admin edits and saves that document, the possibly malicious content of tha... Read more
Affected Products : xwiki- Published: Jun. 13, 2025
- Modified: Sep. 03, 2025
- Vuln Type: Cross-Site Scripting
-
7.2
HIGHCVE-2025-57811
Craft is a platform for creating digital experiences. From versions 4.0.0-RC1 to 4.16.5 and 5.0.0-RC1 to 5.8.6, there is a potential remote code execution vulnerability via Twig SSTI (Server-Side Template Injection). This is a follow-up to CVE-2024-52293.... Read more
Affected Products : craft_cms- Published: Aug. 25, 2025
- Modified: Sep. 03, 2025
- Vuln Type: Injection
-
9.8
CRITICALCVE-2025-32429
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In versions 9.4-rc-1 through 16.10.5 and 17.0.0-rc-1 through 17.2.2, it's possible for anyone to inject SQL using the parameter sort of the getdeleted... Read more
Affected Products : xwiki- Published: Jul. 24, 2025
- Modified: Sep. 03, 2025
- Vuln Type: Injection
-
7.0
HIGHCVE-2025-8447
An improper access control vulnerability was identified in GitHub Enterprise Server that allowed users with access to any repository to retrieve limited code content from another repository by creating a diff between the repositories. To exploit this vuln... Read more
Affected Products : enterprise_server- Published: Aug. 26, 2025
- Modified: Sep. 03, 2025
- Vuln Type: Authorization