Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Security Vulnerabilities326039
CVE-2025-20726
Assigner-MediaTek, Inc.
ShareView Details
Assigner-MediaTek, Inc.
CVSS Score-7.5||HIGH
EPSS-0.26% / 49.87%
||
7 Day CHG~0.00%
Published-04 Nov, 2025 | 06:19
Updated-05 Nov, 2025 | 17:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Modem, there is a possible out of bounds write due to an incorrect bounds check. This could lead to remote escalation of privilege, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01672598; Issue ID: MSV-4622.

Action-Not Available
Vendor-MediaTek Inc.
Product-mt8675mt8678mt6855mt6983mt2737mt8795tmt8793mt6835mt6895mt6875mt6980mt6877tmt6769nr15mt6895ttmt6899mt6813mt6875tmt6769tmt6833mt8676mt8765mt8883mt8786mt6877ttmt6880mt8766mt6853mt6990mt6991mt6873mt8791mt6878mt6893mt6835tmt6989tmt8667mt6891mt6762mt6769kmt8893mt6985tmt6769zmt8792mt8771mt8788emt6767mt6886mt6983tmt6877mt8798mt6765nr16mt6762mmt6878mmt6853tmt6897mt6989mt6985mt8788mt8673mt6762dmt6769smt6980dmt8766rmt2735mt6739mt6879mt8797mt6833pmt8873mt6855tmt6896mt6761mt6889mt8666mt8863lr12anr17rmt6768nr17mt6771mt6765tmt8768mt6883mt6890mt6763mt8791tmt6885MT2735, MT2737, MT6739, MT6761, MT6762, MT6762D, MT6762M, MT6763, MT6765, MT6765T, MT6767, MT6768, MT6769, MT6769K, MT6769S, MT6769T, MT6769Z, MT6771, MT6813, MT6833, MT6833P, MT6835, MT6835T, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6878, MT6878M, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6897, MT6899, MT6980, MT6980D, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT6991, MT8666, MT8667, MT8673, MT8675, MT8676, MT8678, MT8765, MT8766, MT8766R, MT8768, MT8771, MT8786, MT8788, MT8788E, MT8791, MT8791T, MT8792, MT8793, MT8795T, MT8797, MT8798, MT8863, MT8873, MT8883, MT8893
CWE ID-CWE-122
Heap-based Buffer Overflow
CWE ID-CWE-787
Out-of-bounds Write
CVE-2025-20727
Assigner-MediaTek, Inc.
ShareView Details
Assigner-MediaTek, Inc.
CVSS Score-7.5||HIGH
EPSS-0.19% / 41.16%
||
7 Day CHG~0.00%
Published-04 Nov, 2025 | 06:19
Updated-05 Nov, 2025 | 18:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Modem, there is a possible out of bounds write due to a heap buffer overflow. This could lead to remote escalation of privilege, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01672601; Issue ID: MSV-4623.

Action-Not Available
Vendor-MediaTek Inc.
Product-mt8675mt8678mt6855mt6983mt2737mt8795tmt8793mt6835mt6895mt6875mt6980mt6877tmt6769nr15mt6895ttmt6899mt6813mt6875tmt6769tmt6833mt8676mt8765mt8883mt8786mt6877ttmt6880mt8766mt6853mt6990mt6991mt6873mt8791mt6878mt6893mt6835tmt6989tmt8667mt6891mt6762mt6769kmt8893mt6985tmt6769zmt8792mt8771mt8788emt6767mt6886mt6983tmt6877mt8798mt6765nr16mt6762mmt6878mmt6853tmt6897mt6989mt6985mt8788mt8673mt6762dmt6769smt6980dmt8766rmt2735mt6739mt6879mt8797mt6833pmt8873mt6855tmt6896mt6761mt6889mt8666mt8863lr12anr17rmt6768nr17mt6771mt6765tmt8768mt6883mt6890mt6763mt8791tmt6885MT2735, MT2737, MT6739, MT6761, MT6762, MT6762D, MT6762M, MT6763, MT6765, MT6765T, MT6767, MT6768, MT6769, MT6769K, MT6769S, MT6769T, MT6769Z, MT6771, MT6813, MT6833, MT6833P, MT6835, MT6835T, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6878, MT6878M, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6897, MT6899, MT6980, MT6980D, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT6991, MT8666, MT8667, MT8673, MT8675, MT8676, MT8678, MT8765, MT8766, MT8766R, MT8768, MT8771, MT8786, MT8788, MT8788E, MT8791, MT8791T, MT8792, MT8793, MT8795T, MT8797, MT8798, MT8863, MT8873, MT8883, MT8893
CWE ID-CWE-787
Out-of-bounds Write
CVE-2025-12396
Assigner-Wordfence
ShareView Details
Assigner-Wordfence
CVSS Score-4.4||MEDIUM
EPSS-0.03% / 8.61%
||
7 Day CHG~0.00%
Published-04 Nov, 2025 | 04:27
Updated-04 Nov, 2025 | 15:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Clubmember <= 0.2 - Authenticated (Admin+) Stored Cross-Site Scripting

The clubmember plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 0.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.

Action-Not Available
Vendor-alaminopu
Product-clubmember
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2025-11812
Assigner-Wordfence
ShareView Details
Assigner-Wordfence
CVSS Score-6.4||MEDIUM
EPSS-0.04% / 10.78%
||
7 Day CHG~0.00%
Published-04 Nov, 2025 | 04:27
Updated-04 Nov, 2025 | 15:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Reuse Builder <= 1.7 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode

The Reuse Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'reuse_builder_single_post_title' shortcode in all versions up to, and including, 1.7. This is due to insufficient input sanitization and output escaping on the 'style' attribute. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

Action-Not Available
Vendor-redq
Product-Reuse Builder
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2025-12403
Assigner-Wordfence
ShareView Details
Assigner-Wordfence
CVSS Score-6.1||MEDIUM
EPSS-0.01% / 2.11%
||
7 Day CHG~0.00%
Published-04 Nov, 2025 | 04:27
Updated-04 Nov, 2025 | 15:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Associados Amazon Plugin <= 0.8 - Cross-Site Request Forgery to Stored Cross-Site Scripting

The Associados Amazon Plugin plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 0.8. This is due to missing or incorrect nonce validation on the brzon_admin_panel() function. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

Action-Not Available
Vendor-revokee
Product-Associados Amazon Plugin
CWE ID-CWE-352
Cross-Site Request Forgery (CSRF)
CVE-2025-11753
Assigner-Wordfence
ShareView Details
Assigner-Wordfence
CVSS Score-4.4||MEDIUM
EPSS-0.03% / 8.50%
||
7 Day CHG~0.00%
Published-04 Nov, 2025 | 04:27
Updated-04 Nov, 2025 | 15:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Multi-language Responsive Portfolio WordPress <= 1.0 - Authenticated (Admin+) Stored Cross-Site Scripting

The Bootstrap Multi-language Responsive Portfolio plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 1.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.

Action-Not Available
Vendor-augustinfotech
Product-Bootstrap Multi-language Responsive Portfolio
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2025-12158
Assigner-Wordfence
ShareView Details
Assigner-Wordfence
CVSS Score-9.8||CRITICAL
EPSS-0.13% / 33.78%
||
7 Day CHG~0.00%
Published-04 Nov, 2025 | 04:27
Updated-04 Nov, 2025 | 15:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Simple User Capabilities <= 1.0 - Missing Authorization to Authenticated (Subscriber+) Privilege Escalation

The Simple User Capabilities plugin for WordPress is vulnerable to Privilege Escalation due to a missing capability check on the suc_submit_capabilities() function in all versions up to, and including, 1.0. This makes it possible for unauthenticated attackers to elevate the role of any user account to administrator.

Action-Not Available
Vendor-tanvirahmed1984
Product-Simple User Capabilities
CWE ID-CWE-862
Missing Authorization
CVE-2025-12452
Assigner-Wordfence
ShareView Details
Assigner-Wordfence
CVSS Score-6.1||MEDIUM
EPSS-0.01% / 2.18%
||
7 Day CHG~0.00%
Published-04 Nov, 2025 | 04:27
Updated-04 Nov, 2025 | 15:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Visit Counter 1.0 - Cross-Site Request Forgery to Stored Cross-Site Scripting

The Visit Counter plugin for WordPress is vulnerable to Cross-Site Request Forgery in version 1.0. This is due to missing or incorrect nonce validation on the widgets.php page. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

Action-Not Available
Vendor-bestiadurmiente
Product-Visit Counter
CWE ID-CWE-352
Cross-Site Request Forgery (CSRF)
CVE-2025-11733
Assigner-Wordfence
ShareView Details
Assigner-Wordfence
CVSS Score-7.2||HIGH
EPSS-0.14% / 35.00%
||
7 Day CHG~0.00%
Published-04 Nov, 2025 | 04:27
Updated-04 Nov, 2025 | 15:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Footnotes Made Easy <= 3.0.7 - Unauthenticated Stored Cross-Site Scripting

The Footnotes Made Easy plugin for WordPress is vulnerable to Stored Cross-Site Scripting via plugin settings in all versions up to, and including, 3.0.7 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

Action-Not Available
Vendor-lumiblog
Product-Footnotes Made Easy
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2025-12065
Assigner-Wordfence
ShareView Details
Assigner-Wordfence
CVSS Score-4.4||MEDIUM
EPSS-0.04% / 11.33%
||
7 Day CHG~0.00%
Published-04 Nov, 2025 | 04:27
Updated-04 Nov, 2025 | 15:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WP Carticon <= 1.0.0 - Authenticated (Admin+) Stored Cross-Site Scripting

The WP Carticon plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'carticon_js_script' parameter in all versions up to, and including, 1.0.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level access, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.

Action-Not Available
Vendor-carticon
Product-WP Carticon
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2025-12371
Assigner-Wordfence
ShareView Details
Assigner-Wordfence
CVSS Score-4.4||MEDIUM
EPSS-0.03% / 8.61%
||
7 Day CHG~0.00%
Published-04 Nov, 2025 | 04:27
Updated-04 Nov, 2025 | 15:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Nari Accountant <= 1.0.12 - Authenticated (Editor+) Stored Cross-Site Scripting

The Nari Accountant plugin for WordPress is vulnerable to Stored Cross-Site Scripting via account settings in all versions up to, and including, 1.0.12 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with editor-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.

Action-Not Available
Vendor-shakhi
Product-Nari Accountant
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2025-12389
Assigner-Wordfence
ShareView Details
Assigner-Wordfence
CVSS Score-4.3||MEDIUM
EPSS-0.03% / 9.65%
||
7 Day CHG~0.00%
Published-04 Nov, 2025 | 04:27
Updated-04 Nov, 2025 | 15:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Import Export For WooCommerce <= 1.6.2 - Missing Authorization to Authenticated (Subscriber+) Settings Update

The Import Export For WooCommerce plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the update_setting() function in all versions up to, and including, 1.6.2. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update the plugin's record setting.

Action-Not Available
Vendor-sidngr
Product-Import Export For WooCommerce
CWE ID-CWE-862
Missing Authorization
CVE-2025-11704
Assigner-Wordfence
ShareView Details
Assigner-Wordfence
CVSS Score-7.5||HIGH
EPSS-0.10% / 28.47%
||
7 Day CHG~0.00%
Published-04 Nov, 2025 | 04:27
Updated-04 Nov, 2025 | 15:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Elegance Menu <= 1.9 - Authenticated (Contributor+) Local File Inclusion

The Elegance Menu plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 1.9 via the 'elegance-menu' attribute of the `elegance-menu` shortcode. This makes it possible for authenticated attackers, with Contributor-level access and above, to include and execute arbitrary .php files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where .php file types can be uploaded and included.

Action-Not Available
Vendor-impacttechlab
Product-Elegance Menu
CWE ID-CWE-98
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion')
CVE-2025-12402
Assigner-Wordfence
ShareView Details
Assigner-Wordfence
CVSS Score-6.1||MEDIUM
EPSS-0.01% / 2.11%
||
7 Day CHG~0.00%
Published-04 Nov, 2025 | 04:27
Updated-04 Nov, 2025 | 15:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
LinkedIn Resume <= 2.00 - Cross-Site Request Forgery to Stored Cross-Site Scripting

The LinkedIn Resume plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.00. This is due to missing or incorrect nonce validation on the linkedinresume_printAdminPage() function. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

Action-Not Available
Vendor-bondnono
Product-LinkedIn Resume
CWE ID-CWE-352
Cross-Site Request Forgery (CSRF)
CVE-2025-12415
Assigner-Wordfence
ShareView Details
Assigner-Wordfence
CVSS Score-6.1||MEDIUM
EPSS-0.01% / 2.11%
||
7 Day CHG~0.00%
Published-04 Nov, 2025 | 04:27
Updated-04 Nov, 2025 | 15:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
MapMap <= 1.1 - Cross-Site Request Forgery to Settings Update and Stored Cross-Site Scripting

The MapMap plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.1. This is due to missing or incorrect nonce validation on the admin_shortcode_submit, admin_configuration_submit, and admin_shortcode_delete functions. This makes it possible for unauthenticated attackers to update the plugin's settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

Action-Not Available
Vendor-sugiartha
Product-MapMap
CWE ID-CWE-352
Cross-Site Request Forgery (CSRF)
CVE-2025-12156
Assigner-Wordfence
ShareView Details
Assigner-Wordfence
CVSS Score-4.3||MEDIUM
EPSS-0.03% / 9.65%
||
7 Day CHG~0.00%
Published-04 Nov, 2025 | 04:27
Updated-04 Nov, 2025 | 16:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Ai Auto Tool Content Writing Assistant (Gemini Writer, ChatGPT ) All in One 2.0.7 - 2.2.6 - Missing Authorization to Authenticated (Subscriber+) Post Creation

The Ai Auto Tool Content Writing Assistant (Gemini Writer, ChatGPT ) All in One plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the save_post_data() function in versions 2.0.7 to 2.2.6. This makes it possible for authenticated attackers, with Subscriber-level access and above, to create and publish arbitrary posts.

Action-Not Available
Vendor-aitool
Product-Ai Auto Tool Content Writing Assistant (Gemini Writer, ChatGPT ) All in One
CWE ID-CWE-862
Missing Authorization
CVE-2025-11724
Assigner-Wordfence
ShareView Details
Assigner-Wordfence
CVSS Score-8.8||HIGH
EPSS-0.28% / 51.54%
||
7 Day CHG~0.00%
Published-04 Nov, 2025 | 04:27
Updated-04 Nov, 2025 | 16:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
EM Beer Manager <= 3.2.3 - Authenticated (Subscriber+) Arbitrary File Upload

The EM Beer Manager plugin for WordPress is vulnerable to arbitrary file upload leading to remote code execution in all versions up to, and including, 3.2.3. This is due to missing file type validation in the EMBM_Admin_Untappd_Import_image() function and missing authorization checks on the wp_ajax_embm-untappd-import action. This makes it possible for authenticated attackers, with subscriber-level access and above, to upload arbitrary files including PHP files and execute code on the server granted they can provide a mock HTTP server that responds with specific JSON data.

Action-Not Available
Vendor-erinmorelli
Product-EM Beer Manager
CWE ID-CWE-434
Unrestricted Upload of File with Dangerous Type
CVE-2025-12456
Assigner-Wordfence
ShareView Details
Assigner-Wordfence
CVSS Score-6.1||MEDIUM
EPSS-0.01% / 2.62%
||
7 Day CHG~0.00%
Published-04 Nov, 2025 | 04:27
Updated-04 Nov, 2025 | 16:43
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Centangle Team Showcase <= 1.0.0 - Cross-Site Request Forgery To Plugin's Settings Modification And Stored Cross-Site Scripting

The Centangle-Team plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0.0. This is due to missing or incorrect nonce validation on a function. This makes it possible for unauthenticated attackers to modify plugin's settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. Additionally, due to insufficient input sanitization and output escaping on cai_name_color parameter, this issue allows to inject arbitrary web scripts in pages, that will execute whenever a user accesses an injected page.

Action-Not Available
Vendor-centangle
Product-Centangle-Team
CWE ID-CWE-352
Cross-Site Request Forgery (CSRF)
CVE-2025-12400
Assigner-Wordfence
ShareView Details
Assigner-Wordfence
CVSS Score-6.1||MEDIUM
EPSS-0.01% / 2.11%
||
7 Day CHG~0.00%
Published-04 Nov, 2025 | 04:27
Updated-04 Nov, 2025 | 16:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
LMB^Box Smileys <= 3.2 - Cross-Site Request Forgery to Stored Cross-Site Scripting

The LMB^Box Smileys plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.2. This is due to missing or incorrect nonce validation on the manage_page() function. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

Action-Not Available
Vendor-lmbbox
Product-LMB^Box Smileys
CWE ID-CWE-352
Cross-Site Request Forgery (CSRF)
CVE-2025-12369
Assigner-Wordfence
ShareView Details
Assigner-Wordfence
CVSS Score-6.4||MEDIUM
EPSS-0.04% / 11.70%
||
7 Day CHG~0.00%
Published-04 Nov, 2025 | 04:27
Updated-04 Nov, 2025 | 16:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Extensions for Leaflet Map <= 4.7 - Authenticated (Contributor+) Stored Cross-Site Scripting

The Extensions for Leaflet Map plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the `geojsonmarker` shortcode in all versions up to, and including, 4.7. This is due to insufficient input sanitization and output escaping on user-supplied attributes. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

Action-Not Available
Vendor-hupe13
Product-Extensions for Leaflet Map
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2025-11890
Assigner-Wordfence
ShareView Details
Assigner-Wordfence
CVSS Score-7.5||HIGH
EPSS-0.09% / 26.18%
||
7 Day CHG~0.00%
Published-04 Nov, 2025 | 04:27
Updated-04 Nov, 2025 | 16:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Crypto Payment Gateway with Payeer for WooCommerce <= 1.0.3 - Unauthenticated Payment Bypass

The Crypto Payment Gateway with Payeer for WooCommerce plugin for WordPress is vulnerable to payment bypass in all versions up to, and including, 1.0.3. This is due to the plugin not properly verifying a payments status through server-side validation though the /wc-api/bp-payeer-gateway-callback endpoint. This makes it possible for unauthenticated attackers to update unpaid order statuses to paid resulting in a loss of revenue.

Action-Not Available
Vendor-beycanpress
Product-Crypto Payment Gateway with Payeer for WooCommerce
CWE ID-CWE-862
Missing Authorization
CVE-2025-12157
Assigner-Wordfence
ShareView Details
Assigner-Wordfence
CVSS Score-5.3||MEDIUM
EPSS-0.09% / 25.34%
||
7 Day CHG~0.00%
Published-04 Nov, 2025 | 04:27
Updated-04 Nov, 2025 | 17:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Simple User Capabilities <= 1.0 - Missing Authorization to Unauthenticated Capability Reset

The Simple User Capabilities plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'wp_ajax_nopriv_reset_capability' AJAX endpoint in all versions up to, and including, 1.0. This makes it possible for unauthenticated attackers to reset any user's capabilities.

Action-Not Available
Vendor-tanvirahmed1984
Product-Simple User Capabilities
CWE ID-CWE-862
Missing Authorization
CVE-2025-12410
Assigner-Wordfence
ShareView Details
Assigner-Wordfence
CVSS Score-6.1||MEDIUM
EPSS-0.01% / 2.11%
||
7 Day CHG~0.00%
Published-04 Nov, 2025 | 04:27
Updated-04 Nov, 2025 | 21:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
SH Contextual Help <= 3.2.1 - Cross-Site Request Forgery to Stored Cross-Site Scripting

The SH Contextual Help plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.2.1. This is due to missing or incorrect nonce validation in the sh_contextual_help_dashboard_widget() function. This makes it possible for unauthenticated attackers to update the plugin's settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

Action-Not Available
Vendor-samhoamt
Product-SH Contextual Help
CWE ID-CWE-352
Cross-Site Request Forgery (CSRF)
CVE-2025-11758
Assigner-Wordfence
ShareView Details
Assigner-Wordfence
CVSS Score-6.5||MEDIUM
EPSS-0.09% / 26.29%
||
7 Day CHG~0.00%
Published-04 Nov, 2025 | 04:27
Updated-04 Nov, 2025 | 21:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
All in One Time Clock Lite – Tracking Employee Time Has Never Been Easier <= 2.0.3 - Missing Authorization to Page Creation and Information Exposure

The All in One Time Clock Lite plugin for WordPress is vulnerable to unauthorized access due to a missing authorization check in all versions up to, and including, 2.0.3. This is due to the plugin exposing admin-level AJAX actions to unauthenticated users via wp_ajax_nopriv_ hooks, while relying only on a nonce check without capability checks. This makes it possible for unauthenticated attackers to create published pages, create shift records with integrity issues, and download time reports containing PII (employee names and work schedules).

Action-Not Available
Vendor-codebangers
Product-All in One Time Clock Lite – Tracking Employee Time Has Never Been Easier
CWE ID-CWE-862
Missing Authorization
CVE-2025-12413
Assigner-Wordfence
ShareView Details
Assigner-Wordfence
CVSS Score-5.4||MEDIUM
EPSS-0.02% / 2.77%
||
7 Day CHG~0.00%
Published-04 Nov, 2025 | 04:27
Updated-04 Nov, 2025 | 21:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Social Media WPCF7 Stop Words <= 1.1.3 - Cross-Site Request Forgery to Settings Update

The Social Media WPCF7 Stop Words plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.1.3. This is due to missing or incorrect nonce validation on the smWpCfSwOptions() function. This makes it possible for unauthenticated attackers to update the plugin's settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

Action-Not Available
Vendor-socialmedialtd
Product-WPCF7 Stop words
CWE ID-CWE-352
Cross-Site Request Forgery (CSRF)
CVE-2025-12350
Assigner-Wordfence
ShareView Details
Assigner-Wordfence
CVSS Score-5.3||MEDIUM
EPSS-0.11% / 31.04%
||
7 Day CHG~0.00%
Published-04 Nov, 2025 | 04:27
Updated-04 Nov, 2025 | 20:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
DominoKit <= 1.1.0 - Missing Authorization to Unauthenticated Settings Update

The DominoKit plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on the wp_ajax_nopriv_dominokit_option_admin_action AJAX endpoint in all versions up to, and including, 1.1.0. This makes it possible for unauthenticated attackers to update plugin settings.

Action-Not Available
Vendor-domiinodev
Product-DominoKit
CWE ID-CWE-862
Missing Authorization
CVE-2025-12393
Assigner-Wordfence
ShareView Details
Assigner-Wordfence
CVSS Score-4.4||MEDIUM
EPSS-0.03% / 8.61%
||
7 Day CHG~0.00%
Published-04 Nov, 2025 | 04:27
Updated-04 Nov, 2025 | 20:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Free Quotation <= 3.1.6 - Authenticated (Admin+) Stored Cross-Site Scripting

The Free Quotation plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 3.1.6 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.

Action-Not Available
Vendor-kris_iv
Product-Free Quotation
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2025-12416
Assigner-Wordfence
ShareView Details
Assigner-Wordfence
CVSS Score-6.1||MEDIUM
EPSS-0.01% / 1.78%
||
7 Day CHG~0.00%
Published-04 Nov, 2025 | 04:27
Updated-04 Nov, 2025 | 20:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Pagerank Tools <= 1.1.5 - Cross-Site Request Forgery to Stored Cross-Site Scripting

The Pagerank Tools plugin for WordPress is vulnerable to Stored Cross-Site Scripting via Cross-Site Request Forgery in all versions up to, and including, 1.1.5. This is due to missing nonce validation on the pr_save_settings() function and insufficient input sanitization. This makes it possible for unauthenticated attackers to inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. The injected scripts will execute whenever a user accesses the plugin's settings page.

Action-Not Available
Vendor-mahype
Product-Pagerank tools
CWE ID-CWE-352
Cross-Site Request Forgery (CSRF)
CVE-2025-10896
Assigner-Wordfence
ShareView Details
Assigner-Wordfence
CVSS Score-8.8||HIGH
EPSS-0.26% / 49.01%
||
7 Day CHG~0.00%
Published-04 Nov, 2025 | 04:27
Updated-04 Nov, 2025 | 20:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Multiple Plugins <= Multiple Versions - Missing Authorization to Authenticated (Subscriber+) Arbitrary Plugin Upload

Multiple plugins for WordPress with the Jewel Theme Recommended Plugins Library are vulnerable to Unrestricted Upload of File with Dangerous Type via arbitrary plugin installation in all versions up to, and including, 1.0.2.3. This is due to missing capability checks on the '*_recommended_upgrade_plugin' function which allows arbitrary plugin URLs to be installed. This makes it possible for authenticated attackers with subscriber-level access and above to upload arbitrary plugin packages to the affected site's server via a crafted plugin URL, which may make remote code execution possible.

Action-Not Available
Vendor-litonice13
Product-Content Locker for ElementorImage Hover Effects for ElementorImage Comparison Addon for ElementorMaster Blocks – Ultimate Gutenberg Blocks for Marketers
CWE ID-CWE-862
Missing Authorization
CVE-2025-12412
Assigner-Wordfence
ShareView Details
Assigner-Wordfence
CVSS Score-6.1||MEDIUM
EPSS-0.01% / 1.78%
||
7 Day CHG~0.00%
Published-04 Nov, 2025 | 04:27
Updated-04 Nov, 2025 | 20:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Top Bar Notification <= 1.12 - Cross-Site Request Forgery to Stored Cross-Site Scripting

The Top Bar Notification plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.12. This is due to missing or incorrect nonce validation on th tbn_ajax_add() function. This makes it possible for unauthenticated attackers to update the plugin's settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

Action-Not Available
Vendor-josereyev
Product-Top Bar Notification
CWE ID-CWE-352
Cross-Site Request Forgery (CSRF)
CVE-2025-12188
Assigner-Wordfence
ShareView Details
Assigner-Wordfence
CVSS Score-4.3||MEDIUM
EPSS-0.01% / 2.51%
||
7 Day CHG~0.00%
Published-04 Nov, 2025 | 04:27
Updated-04 Nov, 2025 | 20:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Posts Navigation Links for Sections and Headings - Free by WP Masters <= 1.0.1 - Cross-Site Request Forgery to Settings Update

The Posts Navigation Links for Sections and Headings – Free by WP Masters plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0.1. This is due to missing or incorrect nonce validation on the 'wpm_navigation_links_settings' page. This makes it possible for unauthenticated attackers to update the plugin's settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

Action-Not Available
Vendor-wpmasterscom
Product-Posts Navigation Links for Sections and Headings – Free by WP Masters
CWE ID-CWE-352
Cross-Site Request Forgery (CSRF)
CVE-2025-12683
Assigner-Gridware Cybersecurity
ShareView Details
Assigner-Gridware Cybersecurity
CVSS Score-5.8||MEDIUM
EPSS-0.02% / 3.23%
||
7 Day CHG~0.00%
Published-04 Nov, 2025 | 04:23
Updated-04 Nov, 2025 | 20:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
NULL DACL assigned to Named Pipe communicating with SYSTEM Service

The service employed by Everything, running as SYSTEM, communicates with the lower privileged Everything GUI via a named pipe. The named pipe has a NULL DACL and thus provides all users full permission over it; leading to potential Service Denial Of Service or Privilege escalation(only if chained with other elements) for a local low privilege user.

Action-Not Available
Vendor-Voidtools
Product-Everything
CWE ID-CWE-269
Improper Privilege Management
CVE-2025-12069
Assigner-Wordfence
ShareView Details
Assigner-Wordfence
CVSS Score-4.3||MEDIUM
EPSS-0.01% / 2.51%
||
7 Day CHG~0.00%
Published-04 Nov, 2025 | 03:26
Updated-04 Nov, 2025 | 18:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WP Global Screen Options <= 0.2 - Cross-Site Request Forgery to Screen Options Update

The WP Global Screen Options plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 0.2. This is due to missing nonce validation on the `updatewpglobalscreenoptions` action handler. This makes it possible for unauthenticated attackers to modify global screen options for all users via a forged request granted they can trick an administrator into performing an action such as clicking on a link.

Action-Not Available
Vendor-stiand
Product-WP Global Screen Options
CWE ID-CWE-352
Cross-Site Request Forgery (CSRF)
CVE-2025-11008
Assigner-Wordfence
ShareView Details
Assigner-Wordfence
CVSS Score-9.8||CRITICAL
EPSS-0.19% / 41.29%
||
7 Day CHG~0.00%
Published-04 Nov, 2025 | 03:26
Updated-04 Nov, 2025 | 18:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
CE21 Suite <= 2.3.1 - Unauthenticated Sensitive Information Exposure to Privilege Escalation

The CE21 Suite plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.3.1 via the log file. This makes it possible for unauthenticated attackers to extract sensitive data including authentication credentials, which can be used to log in as other users as long as they have used the plugin's custom authentication feature before. This may include administrators, which makes a complete site takeover possible.

Action-Not Available
Vendor-CE21, LLC.
Product-CE21 Suite
CWE ID-CWE-532
Insertion of Sensitive Information into Log File
CVE-2025-12401
Assigner-Wordfence
ShareView Details
Assigner-Wordfence
CVSS Score-6.1||MEDIUM
EPSS-0.01% / 2.11%
||
7 Day CHG~0.00%
Published-04 Nov, 2025 | 03:26
Updated-04 Nov, 2025 | 18:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Label Plugins <= 0.5 - Cross-Site Request Forgery to Stored Cross-Site Scripting

The Label Plugins plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 0.5. This is due to missing or incorrect nonce validation on the label_plugins_options() function. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

Action-Not Available
Vendor-theode
Product-Label Plugins
CWE ID-CWE-352
Cross-Site Request Forgery (CSRF)
CVE-2025-11007
Assigner-Wordfence
ShareView Details
Assigner-Wordfence
CVSS Score-9.8||CRITICAL
EPSS-0.26% / 48.88%
||
7 Day CHG~0.00%
Published-04 Nov, 2025 | 03:26
Updated-04 Nov, 2025 | 18:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
CE21 Suite 2.2.1 - 2.3.1 - Missing Authorization to Unauthenticated Privilege Escalation via Plugin Settings Update

The CE21 Suite plugin for WordPress is vulnerable to unauthorized plugin settings update due to a missing capability check on the wp_ajax_nopriv_ce21_single_sign_on_save_api_settings AJAX action in versions 2.2.1 to 2.3.1. This makes it possible for unauthenticated attackers to update the plugin's API settings including a secret key used for authentication. This allows unauthenticated attackers to create new admin accounts on an affected site.

Action-Not Available
Vendor-CE21, LLC.
Product-CE21 Suite
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2025-12070
Assigner-Wordfence
ShareView Details
Assigner-Wordfence
CVSS Score-4.3||MEDIUM
EPSS-0.01% / 2.51%
||
7 Day CHG~0.00%
Published-04 Nov, 2025 | 03:26
Updated-04 Nov, 2025 | 18:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
ViaAds <= 2.1.1 - Cross-Site Request Forgery to API Key Update

The ViaAds plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.1.1. This is due to missing nonce validation on the `ViaAds_pluginHandler` function. This makes it possible for unauthenticated attackers to modify the plugin's API key and cookie consent settings via a forged request granted they can trick an administrator into performing an action such as clicking on a link.

Action-Not Available
Vendor-viaads
Product-ViaAds
CWE ID-CWE-352
Cross-Site Request Forgery (CSRF)
CVE-2025-47370
Assigner-Qualcomm, Inc.
ShareView Details
Assigner-Qualcomm, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.03% / 9.14%
||
7 Day CHG~0.00%
Published-04 Nov, 2025 | 03:19
Updated-05 Nov, 2025 | 17:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Reachable Assertion in BT Controller

Transient DOS when a remote device sends an invalid connection request during BT connectable LE scan.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qcs9100_firmwareqcs6490sm7675qcs5430qamsrv1m_firmwaresa8150p_firmwarewcd9385wsa8835_firmwareqcc2073_firmwaresc8380xpsm8750_firmwaresnapdragon_ar1_gen_1_platform_firmwareqfw7114ar8035_firmwareqca6698aq_firmwaresnapdragon_8\+_gen_2_mobile_platform_firmwareqca6391qam8775p_firmwaresm8550psa8145p_firmwareqca8081_firmwarefastconnect_6900sa9000pqam8295p_firmwareqca8081sa8770pqca6574snapdragon_778g_5g_mobile_platform_firmwareqcs5430_firmwareqcm6490qcs8550_firmwaresa8775pwsa8830sm8735wcd9340qcc2073qcc7226snapdragon_auto_5g_modem-rf_gen_2_firmwareqcs8550sa7775p_firmwareqcs4490sa8775p_firmwaresm8550p_firmwareqcc5161_firmwarewcd9380_firmwaresnapdragon_auto_5g_modem-rf_firmwaresm7675pqca6595auqcn9012_firmwareqcm4490snapdragon_8_gen_3_mobile_platform_firmwaresa8255pqcm6490_firmwarewcd9395_firmwareqca8695ausm7325pqca6678aqwsa8845_firmwareqcn7605_firmwarewcd9370_firmwareqcn9011_firmwaresa6150p_firmwareqfw7124snapdragon_782g_mobile_platform_\(sm7325-af\)fastconnect_6900_firmwareqmp1000_firmwaresm8650q_firmwarewcn7750_firmwareqamsrv1ms3_sound_platformwsa8810_firmwaresxr2350p_firmwaresnapdragon_8_gen_2_mobile_platformsa8150psxr2250pqmp1000qcc710_firmwaresa4155pwcd9360snapdragon_ar2_gen_1_platformqca6777aq_firmwarewsa8810s5_sound_platformwcd9395snapdragon_x72_5g_modem-rf_systemwcd9378_firmwares5_sound_platform_firmwareqcc5161ar8035snapdragon_778g\+_5g_mobile_platform_\(sm7325-ae\)wsa8832_firmwarewcn6755_firmwareqcn7605sa8195p_firmwaresnapdragon_auto_4g_modemsa6150pqca6678aq_firmwaresnapdragon_8_gen_3_mobile_platformsa8155psnapdragon_778g_5g_mobile_platformssg2125p_firmwaresdx55_firmwareqca6696_firmwarewsa8832wcn3950_firmwaresnapdragon_ar1_gen_1_platformwcd9375video_collaboration_vc3_platformqcs615_firmwaresnapdragon_auto_5g_modem-rf_gen_2sm8735_firmwarewcd9390_firmwaresm7325p_firmwarewsa8815wcd9370wsa8815_firmwareqcc7225qcc7225_firmwaresnapdragon_x75_5g_modem-rf_system_firmwareqcc7228sa8145psnapdragon_7c\+_gen_3_compute_firmwaresnapdragon_ar1_gen_1_platform_\"luna1\"_firmwaresrv1hcsrb31024_firmwareqca6574_firmwareqca6698aqsxr1230psxr2230psa8155qca6584auqfw7124_firmwarewsa8845h_firmwaresnapdragon_auto_5g_modem-rfqam8650psa8620pqca6777aqsm8750p_firmwaresm8635ssg2125pqcn9012snapdragon_778g\+_5g_mobile_platform_\(sm7325-ae\)_firmwaresa7255p_firmwarewsa8845fastconnect_7800_firmwareqca6391_firmwaresa8255p_firmwaresa4150ps3_gen_2_sound_platformqca6595snapdragon_782g_mobile_platform_\(sm7325-af\)_firmwarewcn7750qcn6274_firmwarefastconnect_6700srv1h_firmwareqam8295psm8635_firmwaresa6155wsa8840sa8650pwcd9385_firmwareqam8775psnapdragon_8\+_gen_2_mobile_platformwsa8830_firmwareqca6688aqs5_gen_2_sound_platform_firmwareqam8255p_firmwaresm7675p_firmwaresa8650p_firmwaresm8635pqca6554a_firmwaressg2115p_firmwarewcd9378qca6797aq_firmwaresxr2350psnapdragon_x75_5g_modem-rf_systemqca6584au_firmwareqcs4490_firmwaresnapdragon_auto_4g_modem_firmwareqca6688aq_firmwareqcn7606_firmwaresa8620p_firmwareqam8255psa8155p_firmwareqca6595au_firmwaresa6155pqcm4490_firmwaresnapdragon_ar2_gen_1_platform_firmwaresxr2250p_firmwareqcc2076qcn6274snapdragon_7c\+_gen_3_computewsa8845hqfw7114_firmwareqca6574a_firmwareqcc710sm8635p_firmwaresnapdragon_x72_5g_modem-rf_system_firmwaresm8750snapdragon_8_gen_2_mobile_platform_firmwaresnapdragon_ar1_gen_1_platform_\"luna1\"sxr1230p_firmwareqam8650p_firmwareqca6797aqsa8770p_firmwaresm8750psm7675_firmwaresm8650qqca6554aqca8337qcn6224_firmwares3_gen_2_sound_platform_firmwaresc8380xp_firmwareqcc7226_firmwaresxr2230p_firmwareqca8695au_firmwareqca6595_firmwareqcc2076_firmwareqamsrv1hqca6574au_firmwareqcn9011wsa8835sa8155_firmwaresa6145pwcd9390srv1m_firmwaresa4150p_firmwares5_gen_2_sound_platformsa9000p_firmwareqca6787aqwcd9340_firmwaresa7775psa8195psrv1mssg2115pvideo_collaboration_vc3_platform_firmwaresa6155_firmwaresdx55sa8295pfastconnect_6700_firmwarewcd9375_firmwareqcm5430_firmwareqcm5430wcd9380qamsrv1h_firmwareqca6574ausa4155p_firmwaresa6145p_firmwaresa7255psa6155p_firmwarecsrb31024qcn7606qcs615qca8337_firmwareqca6787aq_firmwarefastconnect_7800wcd9360_firmwareqca6564au_firmwares3_sound_platform_firmwareqca6696wcn6755qca6574aqcs9100sxr2330p_firmwareqcn6224wsa8840_firmwareqca6564auqcc7228_firmwaresa8295p_firmwareqcs6490_firmwarewcn3950sxr2330pSnapdragon
CWE ID-CWE-617
Reachable Assertion
CVE-2025-47368
Assigner-Qualcomm, Inc.
ShareView Details
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.01% / 2.21%
||
7 Day CHG~0.00%
Published-04 Nov, 2025 | 03:19
Updated-05 Nov, 2025 | 17:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Over-read in DSP Service

Memory corruption when dereferencing an invalid userspace address in a user buffer during MCDM IOCTL processing.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-fastconnect_6900wsa8845hwsa8840wcd9380_firmwarewsa8845_firmwaresc8380xp_firmwarewsa8840_firmwarewcd9385_firmwarewcd9385wsa8845fastconnect_6900_firmwarefastconnect_7800sc8380xpfastconnect_7800_firmwarewcd9380wsa8845h_firmwareSnapdragon
CWE ID-CWE-126
Buffer Over-read
CVE-2025-47367
Assigner-Qualcomm, Inc.
ShareView Details
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.01% / 2.21%
||
7 Day CHG~0.00%
Published-04 Nov, 2025 | 03:19
Updated-05 Nov, 2025 | 17:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Out-of-bounds Write in WinBlast Driver

Memory corruption while accessing a buffer during IOCTL processing.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qcc2072x2000094_firmwareqcs6490wcd9375video_collaboration_vc3_platformwcd9380_firmwarex2000090x2000086_firmwaresc8380xp_firmwareqcs5430x2000090_firmwarewsa8845snapdragon_8cx_gen_3_compute_platform_\(sc8280xp-ab\)_firmwarewcd9385x2000077_firmwarewsa8835_firmwarefastconnect_7800sc8380xpfastconnect_7800_firmwarewsa8835wcd9370xg101039fastconnect_6900qcc2072_firmwareqcm6490_firmwaresnapdragon_7c\+_gen_3_computex2000086wsa8845hx2000092snapdragon_8cx_gen_3_compute_platform_\(sc8280xp-bb\)_firmwarexg101039_firmwarexg101002fastconnect_6700snapdragon_8cx_gen_3_compute_platform_\(sc8280xp-bb\)snapdragon_7c\+_gen_3_compute_firmwareqcs5430_firmwareqcm6490wsa8830wsa8840wsa8845_firmwarewcd9370_firmwarewsa8840_firmwarewcd9378cxg101032wcd9385_firmwarewcd9378c_firmwaresnapdragon_8cx_gen_3_compute_platform_\(sc8280xp-ab\)video_collaboration_vc3_platform_firmwarex2000077wsa8830_firmwarex2000094fastconnect_6900_firmwarexg101032_firmwarewcd9375_firmwarexg101002_firmwarex2000092_firmwarefastconnect_6700_firmwareqcm5430_firmwareqcm5430qcs6490_firmwarewcd9380wsa8845h_firmwareSnapdragon
CWE ID-CWE-787
Out-of-bounds Write
CVE-2025-47365
Assigner-Qualcomm, Inc.
ShareView Details
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.01% / 2.21%
||
7 Day CHG~0.00%
Published-04 Nov, 2025 | 03:19
Updated-05 Nov, 2025 | 17:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Integer Overflow or Wraparound in Automotive Platform

Memory corruption while processing large input data from a remote source via a communication interface.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sa8150pqam8650psa8620psa8770p_firmwaresrv1l_firmwareqamsrv1m_firmwaresa7255p_firmwaresa8150p_firmwareqca8695au_firmwareqca6595_firmwareqamsrv1hqca6574au_firmwareqca6698aq_firmwaresa8255p_firmwareqam8775p_firmwareqca6595sa6145psa8145p_firmwaresa9000pqam8295p_firmwaresrv1m_firmwaresa8770psa9000p_firmwaresrv1h_firmwaresa7775pqam8295psa8775psa8650psa8195psrv1mqam8775pqca6688aqsa8540p_firmwaresa8195p_firmwaresa8295psa6150pqam8255p_firmwaresa8155psa8650p_firmwaresa7775p_firmwareqamsrv1h_firmwareqca6574ausa8775p_firmwareqam8620p_firmwareqca6797aq_firmwareqca6696_firmwaresa6145p_firmwaresa7255psa6155p_firmwareqca6688aq_firmwaresa8620p_firmwareqam8255psa8155p_firmwareqca6797aqsrv1lqca6595au_firmwareqca6595ausa6155pqca6696sa8255pqca8695ausa8145pqam8620psrv1hsa6150p_firmwareqca6698aqqamsrv1msa8540psa8295p_firmwareqam8650p_firmwareSnapdragon
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2025-47362
Assigner-Qualcomm, Inc.
ShareView Details
Assigner-Qualcomm, Inc.
CVSS Score-6.1||MEDIUM
EPSS-0.01% / 1.48%
||
7 Day CHG~0.00%
Published-04 Nov, 2025 | 03:19
Updated-05 Nov, 2025 | 17:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Over-read in Automotive Software platform based on QNX

Information disclosure while processing message from client with invalid payload.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sa8150pmsm8996auqam8650psa8620psa8770p_firmwaresrv1l_firmwareqamsrv1m_firmwaresa7255p_firmwaresa8150p_firmwaresnapdragon_820_automotive_platformqca8695au_firmwareqca6595_firmwareqamsrv1hqca6574au_firmwareqca6698aq_firmwaresa8255p_firmwareqam8775p_firmwareqca6595sa6145psa8145p_firmwaresa9000pqam8295p_firmwaresrv1m_firmwaresa8770psa9000p_firmwaresrv1h_firmwaresa7775pqam8295psa8775psa8650psa8195psrv1mqam8775pqca6688aqsa8540p_firmwaresa8195p_firmwaresa8295psa6150pqam8255p_firmwaresa8155psa8650p_firmwaresa7775p_firmwareqamsrv1h_firmwareqca6574ausa8775p_firmwareqam8620p_firmwareqca6797aq_firmwareqca6696_firmwaresa6145p_firmwaresa7255pqca6584au_firmwaresa6155p_firmwareqca6688aq_firmwaresa8620p_firmwareqam8255psa8155p_firmwareqca6797aqsrv1lqca6595au_firmwareqca6595ausa6155pqca6696sa8255psnapdragon_820_automotive_platform_firmwareqca8695ausa8145pmsm8996au_firmwareqam8620psrv1hsa6150p_firmwareqca6698aqqamsrv1msa8540psa8295p_firmwareqca6584auqam8650p_firmwareSnapdragon
CWE ID-CWE-126
Buffer Over-read
CVE-2025-47361
Assigner-Qualcomm, Inc.
ShareView Details
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.01% / 2.21%
||
7 Day CHG~0.00%
Published-04 Nov, 2025 | 03:19
Updated-05 Nov, 2025 | 17:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improper Validation of Array Index in Automotive Software platform based on QNX

Memory corruption when triggering a subsystem crash with an out-of-range identifier.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sa8775p_firmwareqam8620p_firmwareqca6797aq_firmwareqca6696_firmwareqam8650psa8620psa8770p_firmwaresa7255psa8295p_firmwaresrv1l_firmwareqamsrv1m_firmwareqca6688aq_firmwaresa7255p_firmwaresa8620p_firmwareqam8255pqca8695au_firmwaresrv1lqca6595au_firmwareqca6595_firmwareqca6595auqamsrv1hqca6574au_firmwareqca6698aq_firmwaresa8255p_firmwareqca6696qam8775p_firmwareqca6595sa8255psa8650p_firmwaresa9000pqam8295p_firmwaresrv1m_firmwareqca8695ausa8770psa9000p_firmwaresrv1h_firmwaresa7775pqam8295psa8775pqam8620psa8650psrv1hsrv1mqam8775pqca6688aqqca6698aqsa8540p_firmwaresa8295pqamsrv1msa8540pqam8255p_firmwareqca6797aqqam8650p_firmwaresa7775p_firmwareqamsrv1h_firmwareqca6574auSnapdragon
CWE ID-CWE-129
Improper Validation of Array Index
CVE-2025-47360
Assigner-Qualcomm, Inc.
ShareView Details
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.01% / 2.21%
||
7 Day CHG~0.00%
Published-04 Nov, 2025 | 03:19
Updated-05 Nov, 2025 | 17:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Stack-based Buffer Overflow in Automotive Software platform based on QNX

Memory corruption while processing client message during device management.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sa8150pqam8650psa8620psa8770p_firmwaresrv1l_firmwareqamsrv1m_firmwaresa7255p_firmwaresa8150p_firmwareqca8695au_firmwareqca6595_firmwareqamsrv1hqca6574au_firmwareqca6698aq_firmwaresa8255p_firmwareqam8775p_firmwareqca6595sa6145psa8145p_firmwaresa9000pqam8295p_firmwaresrv1m_firmwaresa8770psa9000p_firmwaresrv1h_firmwaresa7775pqam8295psa8775psa8650psa8195psrv1mqam8775pqca6688aqsa8540p_firmwaresa8195p_firmwaresa8295psa6150pqam8255p_firmwaresa8155psa8650p_firmwaresa7775p_firmwareqamsrv1h_firmwareqca6574ausa8775p_firmwareqam8620p_firmwareqca6797aq_firmwareqca6696_firmwaresa6145p_firmwaresa7255psa6155p_firmwareqca6688aq_firmwaresa8620p_firmwareqam8255psa8155p_firmwareqca6797aqsrv1lqca6595au_firmwareqca6595ausa6155pqca6696sa8255pqca8695ausa8145pqam8620psrv1hsa6150p_firmwareqca6698aqqamsrv1msa8540psa8295p_firmwareqam8650p_firmwareSnapdragon
CWE ID-CWE-121
Stack-based Buffer Overflow
CVE-2025-47357
Assigner-Qualcomm, Inc.
ShareView Details
Assigner-Qualcomm, Inc.
CVSS Score-8||HIGH
EPSS-0.01% / 1.31%
||
7 Day CHG~0.00%
Published-04 Nov, 2025 | 03:19
Updated-05 Nov, 2025 | 17:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Missing Authentication for Critical Function in SMSS

Information Disclosure when a user-level driver performs QFPROM read or write operations on Fuse regions.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sa8775p_firmwareqam8620p_firmwareqca6797aq_firmwareqca6696_firmwareqcs9100_firmwareqam8650psa8620psa8770p_firmwaresa7255psrv1l_firmwareqamsrv1m_firmwaresa7255p_firmwaresa8620p_firmwareqam8255pqca6797aqsrv1lqca6595au_firmwareqca6595_firmwareqca6595auqamsrv1hqca6698aq_firmwaresa8255p_firmwareqca6696qam8775p_firmwareqca6595sa8255psa8650p_firmwaresa9000psrv1m_firmwaresa8770psa9000p_firmwareqcs9100srv1h_firmwaresa7775psa8775pqca6678aqqam8620psa8650psrv1hsrv1mqam8775pqca6698aqqamsrv1mqam8255p_firmwareqca6678aq_firmwareqam8650p_firmwaresa7775p_firmwareqamsrv1h_firmwareSnapdragon
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2025-47353
Assigner-Qualcomm, Inc.
ShareView Details
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.01% / 2.21%
||
7 Day CHG~0.00%
Published-04 Nov, 2025 | 03:19
Updated-05 Nov, 2025 | 17:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Exposed Dangerous Method or Function in Automotive Software platform based on QNX

Memory corruption while processing request sent from GVM.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sa8775p_firmwareqca6797aq_firmwareqam8650psa8620psa8770p_firmwaresa7255pqamsrv1m_firmwaresa7255p_firmwaresa8620p_firmwareqam8255pqca6595_firmwareqamsrv1hqca6698aq_firmwaresa8255p_firmwareqam8775p_firmwareqca6595sa8255psa8650p_firmwaresa9000psrv1m_firmwaresa8770psa9000p_firmwaresrv1h_firmwaresa7775psa8775psa8650psrv1hsrv1mqam8775pqca6698aqqamsrv1mqam8255p_firmwareqca6797aqqam8650p_firmwaresa7775p_firmwareqamsrv1h_firmwareSnapdragon
CWE ID-CWE-749
Exposed Dangerous Method or Function
CVE-2025-47352
Assigner-Qualcomm, Inc.
ShareView Details
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.01% / 2.21%
||
7 Day CHG~0.00%
Published-04 Nov, 2025 | 03:19
Updated-05 Nov, 2025 | 17:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improper Validation of Array Index in Audio

Memory corruption while processing audio streaming operations.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qcc2072_firmwareqcc2072x2000086wsa8845hx2000092x2000094_firmwarexg101039_firmwarexg101002wsa8840wsa8845_firmwarex2000090x2000086_firmwarex2000090_firmwarewsa8840_firmwarewcd9378cwsa8845xg101032wcd9378c_firmwarex2000077x2000077_firmwarex2000094fastconnect_7800xg101032_firmwarefastconnect_7800_firmwarexg101002_firmwarex2000092_firmwarexg101039wsa8845h_firmwareSnapdragon
CWE ID-CWE-129
Improper Validation of Array Index
CVE-2025-27074
Assigner-Qualcomm, Inc.
ShareView Details
Assigner-Qualcomm, Inc.
CVSS Score-8.8||HIGH
EPSS-0.01% / 2.21%
||
7 Day CHG~0.00%
Published-04 Nov, 2025 | 03:19
Updated-05 Nov, 2025 | 17:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Incorrect Calculation of Buffer Size in SCE-Mink

Memory corruption while processing a GP command response.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-mdm9650msm8996auipq8076a_firmwareqcn9001ipq5010pmp8074snapdragon_821_mobile_platform_firmwareqcn5064_firmwareqca6320_firmwareipq8078a_firmwareipq8078aqcn9022_firmwareqcn9070_firmwareqcn9012ipq5028_firmwaresd821_firmwareqca8075qcn6024_firmwareqcn9074_firmwaresnapdragon_429_mobile_platformqca8075_firmwareipq8074_firmwareqcn5052_firmwarewcn3660bipq9008qca8081_firmwareqcn9003qca8081qca6574qcn6112_firmwarepmp8074_firmwareqcn5054ipq8072a_firmwarecsr8811immersive_home_318_platform_firmwareqcn5550ipq8070aqca6564aqcn9001_firmwareqcn5164qcn9002ipq8076qcn9072_firmwareqcn9100_firmwareqcn9070snapdragon_820_mobile_platform_firmwareqcn5154_firmwareqcn5164_firmwaresd820apq8064au_firmwareqca6438qcn6023qca4024_firmwareqca6584au_firmwareqca6234_firmwareqcn6023_firmwareimmersive_home_214_platformsnapdragon_wear_4100\+_platformsnapdragon_wear_4100\+_platform_firmwareipq8173_firmwaresnapdragon_429_mobile_platform_firmwareqca6310_firmwareipq8174_firmwareqcn9012_firmwareqcn5154qcn5124immersive_home_316_platformqcn6024ipq9574apq8064aumsm8996au_firmwaremdm9650_firmwareipq8173qca9984_firmwareqca6574a_firmwareqcn5152_firmwareqcn5152qcn6100_firmwareqcn6100ipq8070_firmwarecsr8811_firmwareqca4024wsa8810_firmwarewcn3620_firmwareipq8071a_firmwareqcn5054_firmwareqcn5550_firmwareqca6174a_firmwareqcn6102qcn9000_firmwarewcn3620wcn3980_firmwareqcn5024_firmwarewcn3610_firmwareqca6438_firmwareqca9984wcn3680b_firmwareqcn6132snapdragon_820_automotive_platformipq8071aqcn6112ipq8174wsa8810ipq8072sdm429w_firmwareqca6310qca6574au_firmwareqcn9024ipq8070a_firmwarewcn3680bqcn9022wcd9335_firmwaresd820_firmwareipq8078qca6174aqca9889ipq8074aqca9888immersive_home_216_platformqcn9074qcn6132_firmwarewcn3980qca6428sdx55immersive_home_216_platform_firmwareimmersive_home_318_platformqca6564a_firmwareqcn9072qcn5122sdm429wwcn3660b_firmwareqca8072qca6574ausdx55_firmwareipq5010_firmwareipq8074a_firmwareipq8078_firmwaresnapdragon_820_mobile_platformqcn9003_firmwareqcn9024_firmwareipq8076aqcn6102_firmwareqca6428_firmwareqcn9000ipq8070qcn9274snapdragon_821_mobile_platformqca9889_firmwareipq8071immersive_home_316_platform_firmwarewcn3610qca6694ipq8072asd821ipq8072_firmwareqca9888_firmwareqcn5022qcn9100qca6564au_firmwarewsa8815ipq8074qcn5022_firmwareqca6320wsa8815_firmwaremdm9640ipq9008_firmwareqcn5052qca6694_firmwareipq8076_firmwaresnapdragon_820_automotive_platform_firmwareqca6574aqcn9274_firmwaremdm9640_firmwareimmersive_home_214_platform_firmwarewcd9335qcn5124_firmwareqcn6122ipq5028qca6234ipq9574_firmwareqca6564auqcn5122_firmwareqcn6122_firmwareqca6574_firmwareqcn5064qcn9002_firmwareqca8072_firmwareipq8071_firmwareqca6584auqcn5024Snapdragon
CWE ID-CWE-131
Incorrect Calculation of Buffer Size
CVE-2025-27070
Assigner-Qualcomm, Inc.
ShareView Details
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.01% / 0.68%
||
7 Day CHG~0.00%
Published-04 Nov, 2025 | 03:19
Updated-05 Nov, 2025 | 17:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Out-of-bounds Write in Windows Compute

Memory corruption while performing encryption and decryption commands.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-snapdragon_x32_5g_modem-rf_system_firmwareqcs9100_firmwareqdu1000_firmwareqca6426_firmwareqcs6490wcn7861snapdragon_x65_5g_modem-rf_system_firmwaresm7675snapdragon_765g_5g_mobile_platform_\(sm7250-ab\)qcs5430qamsrv1m_firmwaresa8150p_firmwarewcd9385qcn6024_firmwarewsa8835_firmwaresc8380xpsm8750_firmwaresnapdragon_ar1_gen_1_platform_firmwareqfw7114ar8035_firmwareqca6698aq_firmwaresnapdragon_8\+_gen_2_mobile_platform_firmwareqca6391qam8775p_firmwaresm8550psa8145p_firmwareqca8081_firmwarefastconnect_6900sa9000pqam8295p_firmwareqca8081sa8770pqca6574qca6431snapdragon_8cx_gen_3_compute_platform_\(sc8280xp-bb\)_firmwareqca6436_firmwaresa8775pwsa8830qcs5430_firmwareqcm6490qcs8550_firmwaresm8735snapdragon_695_5g_mobile_platformwcd9340snapdragon_auto_5g_modem-rf_gen_2_firmwareqcs8550qdu1110_firmwaresa8540p_firmwareqcs8300wcn6450sm4635_firmwarewcn7860_firmwareqdu1210sa7775p_firmwaresnapdragon_x62_5g_modem-rf_systemsa8775p_firmwareqam8620p_firmwaresm8550p_firmwaresnapdragon_695_5g_mobile_platform_firmwareqru1052_firmwareqru1062qdx1010_firmwarewcd9380_firmwaresm7675pqru1032_firmwaresa8530pqca6595ausm6650p_firmwareqcn9012_firmwaresnapdragon_8_gen_3_mobile_platform_firmwaresnapdragon_888\+_5g_mobile_platform_\(sm8350-ac\)_firmwaresa8255pqdx1011qcm6490_firmwarewcd9395_firmwaresm7250p_firmwaresnapdragon_8cx_gen_3_compute_platform_\(sc8280xp-bb\)qca6678aqwsa8845_firmwarefastconnect_6200sa6150p_firmwareqcn9011_firmwaresnapdragon_888_5g_mobile_platformwcd9370_firmwaresnapdragon_480_5g_mobile_platformqfw7124sm6650wcn7750_firmwareqmp1000_firmwaresnapdragon_662_mobile_platformfastconnect_6900_firmwaresm8650q_firmwareqamsrv1mwsa8810_firmwaresnapdragon_8_gen_2_mobile_platformsa8150psxr2250pqmp1000sa4155pqcc710_firmwareqca6174a_firmwaresnapdragon_ar2_gen_1_platformwsa8810sm7635qcn9024wcd9395snapdragon_x72_5g_modem-rf_systemwcd9378_firmwareqcm4325_firmwareqru1032ar8035sm6650_firmwareqcm8550wsa8832_firmwaresm4635wcn6755_firmwaresa8195p_firmwaresa6150pwcn3988_firmwareqca6678aq_firmwaresnapdragon_8_gen_3_mobile_platformsa8155pssg2125p_firmwareqca6696_firmwaresnapdragon_460_mobile_platformwsa8832sdx61_firmwarewcn3950_firmwaresnapdragon_ar1_gen_1_platformqcn9274video_collaboration_vc3_platformwcd9375qcs615_firmwaresnapdragon_auto_5g_modem-rf_gen_2sm8735_firmwaresnapdragon_865_5g_mobile_platform_firmwarewcd9390_firmwaresrv1lwsa8815wcd9370sd865_5g_firmwarewsa8815_firmwaresnapdragon_8_gen_1_mobile_platformsnapdragon_768g_5g_mobile_platform_\(sm7250-ac\)_firmwaresnapdragon_x65_5g_modem-rf_systemsnapdragon_x75_5g_modem-rf_system_firmwarewcn3988sdx61snapdragon_662_mobile_platform_firmwaresa8145psnapdragon_ar1_gen_1_platform_\"luna1\"_firmwaresrv1hqcs8300_firmwaresnapdragon_865\+_5g_mobile_platform_\(sm8250-ab\)snapdragon_xr2_5g_platform_firmwaresd_8_gen1_5gqdx1010fastconnect_6800qca6421_firmwareqca6574_firmwareqdu1110qca6698aqsxr1230psxr2230pqca6584auwcn7880qfw7124_firmwareqru1052wsa8845h_firmwareqam8650psa8620psm8750p_firmwaresg4150p_firmwaresm8635ssg2125pqcn9012sa7255p_firmwarewsa8845qep8111fastconnect_7800_firmwareqca6391_firmwaresa8255p_firmwaresa4150pqca6595wcn7750wcn6650qcn6274_firmwarefastconnect_6700srv1h_firmwareqam8295psm8635_firmwarewsa8840sa8650pwcn6650_firmwaresnapdragon_xr2_5g_platformwcd9385_firmwaresnapdragon_680_4g_mobile_platformsnapdragon_x62_5g_modem-rf_system_firmwaresnapdragon_x35_5g_modem-rf_systemsnapdragon_685_4g_mobile_platform_\(sm6225-ad\)_firmwareqam8775pwsa8830_firmwaresnapdragon_8\+_gen_2_mobile_platformqca6688aqsm7635_firmwareqam8255p_firmwaresm7675p_firmwaresa8650p_firmwareqdu1010qdu1000sg4150psm8635pqca6797aq_firmwaressg2115p_firmwarewcd9378fastconnect_6800_firmwareqep8111_firmwaresnapdragon_4_gen_1_mobile_platform_firmwaresnapdragon_x75_5g_modem-rf_systemfastconnect_6200_firmwareqca6584au_firmwareqca6421snapdragon_685_4g_mobile_platform_\(sm6225-ad\)qca6688aq_firmwaresnapdragon_680_4g_mobile_platform_firmwaresg8275psa8620p_firmwareqam8255psa8155p_firmwareqca6595au_firmwaresa6155pqru1062_firmwaresnapdragon_ar2_gen_1_platform_firmwaresxr2250p_firmwareqcn6274qca6426wsa8845hqdu1010_firmwareqcn6024qfw7114_firmwareqca6574a_firmwaresnapdragon_8cx_gen_3_compute_platform_\(sc8280xp-ab\)sxr2130qcc710sm8635p_firmwaresnapdragon_x72_5g_modem-rf_system_firmwaresnapdragon_x55_5g_modem-rf_system_firmwareqdx1011_firmwaresa8540psm8750qca6797aqsnapdragon_8_gen_2_mobile_platform_firmwaresnapdragon_x32_5g_modem-rf_systemqam8650p_firmwaresnapdragon_870_5g_mobile_platform_\(sm8250-ac\)_firmwaresnapdragon_ar1_gen_1_platform_\"luna1\"sxr1230p_firmwarewcn7861_firmwareqdu1210_firmwareqsm8350_firmwaresnapdragon_x35_5g_modem-rf_system_firmwaresa8770p_firmwaresm8750psm7675_firmwaresrv1l_firmwaresnapdragon_x55_5g_modem-rf_systemsc8380xp_firmwaresd_8_gen1_5g_firmwaresm8650qqca8337qcn6224_firmwaresxr2230p_firmwareqca6595_firmwarewcn7881qcn9011qamsrv1hqca6574au_firmwareqcm8550_firmwarewcn7880_firmwarewsa8835snapdragon_480\+_5g_mobile_platform_\(sm4350-ac\)sa6145pwcd9390srv1m_firmwaresa4150p_firmwaresa9000p_firmwareqca6174aqcm4325wcn7860wcn7881_firmwaresa7775pwcd9340_firmwarewcn6450_firmwaresnapdragon_865\+_5g_mobile_platform_\(sm8250-ab\)_firmwaresa8195psrv1msnapdragon_768g_5g_mobile_platform_\(sm7250-ac\)ssg2115pvideo_collaboration_vc3_platform_firmwaresnapdragon_765_5g_mobile_platform_\(sm7250-aa\)_firmwaresa8295pfastconnect_6700_firmwareqcm5430_firmwareqcm5430wcd9375_firmwareqsm8350sg8275p_firmwarewcd9380qamsrv1h_firmwareqca6574ausa4155p_firmwaresa6145p_firmwareqcn9024_firmwaresa7255pqca6436sa6155p_firmwaresnapdragon_8_gen_1_mobile_platform_firmwareqcs615sm7250pqca6431_firmwaresnapdragon_8cx_gen_3_compute_platform_\(sc8280xp-ab\)_firmwareqca8337_firmwaresd865_5gsnapdragon_765_5g_mobile_platform_\(sm7250-aa\)sxr2130_firmwarefastconnect_7800snapdragon_460_mobile_platform_firmwareqca6696snapdragon_865_5g_mobile_platformwcn6755qca6574aqcs9100snapdragon_4_gen_1_mobile_platformsnapdragon_480_5g_mobile_platform_firmwareqcn9274_firmwaresnapdragon_870_5g_mobile_platform_\(sm8250-ac\)qam8620pqcn6224sxr2330p_firmwaresm6650pwsa8840_firmwaresnapdragon_480\+_5g_mobile_platform_\(sm4350-ac\)_firmwaresa8530p_firmwaresnapdragon_888_5g_mobile_platform_firmwaresnapdragon_765g_5g_mobile_platform_\(sm7250-ab\)_firmwaresa8295p_firmwareqcs6490_firmwarewcn3950sxr2330psnapdragon_888\+_5g_mobile_platform_\(sm8350-ac\)Snapdragon
CWE ID-CWE-787
Out-of-bounds Write
CVE-2025-27064
Assigner-Qualcomm, Inc.
ShareView Details
Assigner-Qualcomm, Inc.
CVSS Score-6.1||MEDIUM
EPSS-0.01% / 1.48%
||
7 Day CHG~0.00%
Published-04 Nov, 2025 | 03:19
Updated-05 Nov, 2025 | 17:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Over-read in Core Services

Information disclosure while registering commands from clients with diag through diagHal.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca8111qam8650pqcn9012sa7255p_firmwareqca8101qca8075qca8386_firmwareqcn9074_firmwareqcn9160_firmwarewsa8835_firmwareqca8075_firmwareipq9048_firmwarefastconnect_7800_firmwareqca8084qca6698aq_firmwaresa8255p_firmwaresa4150pwcn3660bqcf8001ipq9008qca8081_firmwarefastconnect_6900sa9000pqca8081ipq5302_firmwarewsa8830qca8386sa8650pipq9554_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmwarewsa8830_firmwareqca6688aqsa8540p_firmwareqca6564aqca8080_firmwareqcn9160qam8255p_firmwaresa8650p_firmwareqca8111_firmwareipq5302ipq5424_firmwareqca6584au_firmwareqca8102_firmwarewcd9380_firmwareqca6688aq_firmwareqam8255pqcn6432sa8155p_firmwaresa8530pqca8112qca6595au_firmwareqca6595ausa6155pqcn9012_firmwareipq5300_firmwaresa8255pqcn5124qcn5224sxr2250p_firmwareimmersive_home_326_platform_firmwareqcf8000ipq5332qca0000_firmwareipq9574ipq5424ipq5312_firmwareipq9570qca6678aqqca6574a_firmwarefastconnect_6900_firmwaresa8540pqca8385_firmwareqam8650p_firmwareqcn6402qca9377immersive_home_3210_platform_firmwareqcn6412_firmwaresxr2250psa4155pqca8384_firmwareqcn9000_firmwarewcn3980_firmwareqcn6422_firmwarewcn3680b_firmwareqca8082qca8112_firmwareqcn6422qca6574au_firmwareqcn9024wsa8835wcn3680bqca8102sa4150p_firmwaresa9000p_firmwareipq9570_firmwareipq5332_firmwareqca0000qcn9074sa8195pqca8084_firmwarewcn3980qca9367_firmwareqca9367qca9377_firmwaresa8195p_firmwareqca6564a_firmwareqca6678aq_firmwarewcn3660b_firmwareqca8085_firmwaresa8155pwcd9380qcf8000_firmwareqca6574auqcn6432_firmwaresa4155p_firmwaremdm9628ipq5300qcf8001_firmwareqcn9024_firmwareqca8080qcn9000qcn9274qcn6412sa7255psa6155p_firmwaresnapdragon_8_gen_1_mobile_platform_firmwaresnapdragon_auto_5g_modem-rf_gen_2ipq9048qca8082_firmwareqxm8083fastconnect_7800immersive_home_3210_platformqcn5224_firmwareqca6564au_firmwaresnapdragon_8_gen_1_mobile_platformipq5312ipq9008_firmwareqca8101_firmwaremdm9628_firmwareqca6574aqcn9274_firmwareqcn6402_firmwareimmersive_home_326_platformqca8385qca8085qcn5124_firmwareipq9554qxm8083_firmwareqca6564auipq9574_firmwaresa8530p_firmwareqca6698aqqca8384qca6584auSnapdragon
CWE ID-CWE-126
Buffer Over-read
CVE-2025-12324
Assigner-Wordfence
ShareView Details
Assigner-Wordfence
CVSS Score-6.4||MEDIUM
EPSS-0.04% / 10.92%
||
7 Day CHG~0.00%
Published-04 Nov, 2025 | 02:26
Updated-05 Nov, 2025 | 14:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
TablePress – Tables in WordPress made easy <= 3.2.4 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode Attributes

The TablePress – Tables in WordPress made easy plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's `table` shortcode attributes in all versions up to, and including, 3.2.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

Action-Not Available
Vendor-tobiasbg
Product-TablePress – Tables in WordPress made easy
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
  • Previous
  • 1
  • 2
  • ...
  • 168
  • 169
  • 170
  • ...
  • 6520
  • 6521
  • Next