Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Security Vulnerabilities327746
CVE-2025-62267
Assigner-Liferay, Inc.
ShareView Details
Assigner-Liferay, Inc.
CVSS Score-4.6||MEDIUM
EPSS-0.04% / 13.95%
||
7 Day CHG+0.01%
Published-31 Oct, 2025 | 18:12
Updated-10 Nov, 2025 | 17:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple cross-site scripting (XSS) vulnerabilities in web content template’s select structure page in Liferay Portal 7.4.3.35 through 7.4.3.111, and Liferay DXP 2023.Q4.0 through 2023.Q4.10, 2023.Q3.1 through 2023.Q3.10, 7.4 update 35 through update 92 allow remote attackers to inject arbitrary web script or HTML via a crafted payload injected into a user’s (1) First Name, (2) Middle Name, or (3) Last Name text field.

Action-Not Available
Vendor-Liferay Inc.
Product-digital_experience_platformliferay_portalPortalDXP
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2025-62264
Assigner-Liferay, Inc.
ShareView Details
Assigner-Liferay, Inc.
CVSS Score-5.1||MEDIUM
EPSS-0.05% / 15.62%
||
7 Day CHG+0.01%
Published-31 Oct, 2025 | 17:32
Updated-10 Nov, 2025 | 17:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Reflected cross-site scripting (XSS) vulnerability in Languauge Override in Liferay Portal 7.4.3.8 through 7.4.3.111, and Liferay DXP 2023.Q4.0 through 2023.Q4.10, 2023.Q3.1 through 2023.Q3.10, and 7.4 update 4 through update 92 allows remote attackers to inject arbitrary web script or HTML via the `_com_liferay_portal_language_override_web_internal_portlet_PLOPortlet_selectedLanguageId` parameter.

Action-Not Available
Vendor-Liferay Inc.
Product-digital_experience_platformliferay_portalPortalDXP
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2025-59501
Assigner-Microsoft Corporation
ShareView Details
Assigner-Microsoft Corporation
CVSS Score-4.8||MEDIUM
EPSS-0.29% / 51.57%
||
7 Day CHG~0.00%
Published-31 Oct, 2025 | 16:45
Updated-02 Jan, 2026 | 19:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Microsoft Configuration Manager Spoofing Vulnerability

Authentication bypass by spoofing in Microsoft Configuration Manager allows an authorized attacker to perform spoofing over an adjacent network.

Action-Not Available
Vendor-Microsoft Corporation
Product-configuration_manager_2503configuration_manager_2409configuration_manager_2403Microsoft Configuration ManagerMicrosoft Configuration Manager 2409
CWE ID-CWE-290
Authentication Bypass by Spoofing
CVE-2025-6075
Assigner-Python Software Foundation
ShareView Details
Assigner-Python Software Foundation
CVSS Score-1.8||LOW
EPSS-0.02% / 3.91%
||
7 Day CHG~0.00%
Published-31 Oct, 2025 | 16:41
Updated-02 Dec, 2025 | 17:43
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Quadratic complexity in os.path.expandvars() with user-controlled template

If the value passed to os.path.expandvars() is user-controlled a performance degradation is possible when expanding environment variables.

Action-Not Available
Vendor-Python Software Foundation
Product-CPython
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2025-12554
Assigner-a0340c66-c385-4f8b-991b-3d05f6fd5220
ShareView Details
Assigner-a0340c66-c385-4f8b-991b-3d05f6fd5220
CVSS Score-6.9||MEDIUM
EPSS-0.09% / 25.74%
||
7 Day CHG~0.00%
Published-31 Oct, 2025 | 15:52
Updated-10 Nov, 2025 | 14:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Missing Security Headers

Missing Security Headers.This issue affects BLU-IC2: through 1.19.5; BLU-IC4: through 1.19.5.

Action-Not Available
Vendor-azure-accessAzure Access Technology
Product-blu-ic2blu-ic4_firmwareblu-ic2_firmwareblu-ic4BLU-IC2BLU-IC4
CWE ID-CWE-693
Protection Mechanism Failure
CVE-2025-12509
Assigner-Bizerba SE & Co. KG
ShareView Details
Assigner-Bizerba SE & Co. KG
CVSS Score-8.4||HIGH
EPSS-0.05% / 15.30%
||
7 Day CHG+0.01%
Published-31 Oct, 2025 | 15:51
Updated-04 Nov, 2025 | 15:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Scripts for the module Global_Shipping executable on BRAIN2 Server

On a client with an admin user, a Global_Shipping script can be implemented. The script could later be executed on the BRAIN2 server with administrator rights.

Action-Not Available
Vendor-Bizerba
Product-BRAIN2
CWE ID-CWE-829
Inclusion of Functionality from Untrusted Control Sphere
CVE-2025-12508
Assigner-Bizerba SE & Co. KG
ShareView Details
Assigner-Bizerba SE & Co. KG
CVSS Score-8.4||HIGH
EPSS-0.03% / 8.87%
||
7 Day CHG+0.01%
Published-31 Oct, 2025 | 15:49
Updated-04 Nov, 2025 | 15:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Unencrypted communication to Active Directory services

When using domain users as BRAIN2 users, communication with Active Directory services is unencrypted. This can lead to the interception of authentication data and compromise confidentiality.

Action-Not Available
Vendor-Bizerba
Product-BRAIN2
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2025-12507
Assigner-Bizerba SE & Co. KG
ShareView Details
Assigner-Bizerba SE & Co. KG
CVSS Score-8.8||HIGH
EPSS-0.02% / 4.33%
||
7 Day CHG~0.00%
Published-31 Oct, 2025 | 15:48
Updated-04 Nov, 2025 | 15:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Insecure service configuration – unquoted path

The service Bizerba Communication Server (BCS) has an unquoted service path. Due to the way Windows searches the executable for the BCS service, malicious programs can be executed.

Action-Not Available
Vendor-Bizerba
Product-_connect.BRAIN
CWE ID-CWE-428
Unquoted Search Path or Element
CVE-2025-12553
Assigner-a0340c66-c385-4f8b-991b-3d05f6fd5220
ShareView Details
Assigner-a0340c66-c385-4f8b-991b-3d05f6fd5220
CVSS Score-10||CRITICAL
EPSS-0.04% / 10.90%
||
7 Day CHG~0.00%
Published-31 Oct, 2025 | 15:48
Updated-10 Nov, 2025 | 14:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Server Certificate Verification Disabled

Email Server Certificate Verification Disabled.This issue affects BLU-IC2: through 1.19.5; BLU-IC4: through 1.19.5.

Action-Not Available
Vendor-azure-accessAzure Access Technology
Product-blu-ic2blu-ic4_firmwareblu-ic2_firmwareblu-ic4BLU-IC2BLU-IC4
CWE ID-CWE-599
Missing Validation of OpenSSL Certificate
CVE-2025-12552
Assigner-a0340c66-c385-4f8b-991b-3d05f6fd5220
ShareView Details
Assigner-a0340c66-c385-4f8b-991b-3d05f6fd5220
CVSS Score-6.9||MEDIUM
EPSS-0.07% / 20.57%
||
7 Day CHG~0.00%
Published-31 Oct, 2025 | 15:43
Updated-10 Nov, 2025 | 14:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Insufficient Password Policy

Insufficient Password Policy.This issue affects BLU-IC2: through 1.19.5; BLU-IC4: through 1.19.5.

Action-Not Available
Vendor-azure-accessAzure Access Technology
Product-blu-ic2blu-ic4_firmwareblu-ic2_firmwareblu-ic4BLU-IC2BLU-IC4
CWE ID-CWE-521
Weak Password Requirements
CVE-2025-12357
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-7.2||HIGH
EPSS-0.02% / 3.76%
||
7 Day CHG~0.00%
Published-31 Oct, 2025 | 15:33
Updated-08 Jan, 2026 | 15:29
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
International Standards Organization ISO 15118-2 Improper Restriction of Communication Channel to Intended Endpoints

By manipulating the Signal Level Attenuation Characterization (SLAC) protocol with spoofed measurements, an attacker can stage a man-in-the-middle attack between an electric vehicle and chargers that comply with the ISO 15118-2 part. This vulnerability may be exploitable wirelessly, within close proximity, via electromagnetic induction.

Action-Not Available
Vendor-ISO 15118-2 Network and Application Protocol Requirements
Product-EV Car Chargers
CWE ID-CWE-923
Improper Restriction of Communication Channel to Intended Endpoints
CVE-2025-64168
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-7.1||HIGH
EPSS-0.03% / 10.12%
||
7 Day CHG-0.00%
Published-31 Oct, 2025 | 14:58
Updated-04 Nov, 2025 | 15:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Agno session state overwrites between different sessions/users

Agno is a multi-agent framework, runtime and control plane. From 2.0.0 to before 2.2.2, under high concurrency, when session_state is passed to Agent or Team during run or arun calls, a race condition can occur, causing a session_state to be assigned and persisted to the incorrect session. This may result in user data from one session being exposed to another user. This has been patched in version 2.2.2.

Action-Not Available
Vendor-agno-agi
Product-agno
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CWE ID-CWE-668
Exposure of Resource to Wrong Sphere
CVE-2025-64385
Assigner-50b5080a-775f-442e-83b5-926b5ca517b6
ShareView Details
Assigner-50b5080a-775f-442e-83b5-926b5ca517b6
CVSS Score-9.2||CRITICAL
EPSS-0.27% / 49.78%
||
7 Day CHG+0.04%
Published-31 Oct, 2025 | 14:23
Updated-04 Nov, 2025 | 15:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
INCORRECT SECURITY VALIDATION IN SENDING UDP FRAMES

The equipment initially can be configured using the manufacturer's application, by Wi-Fi, by the web server or with the manufacturer’s software. Using the manufacturer's software, the device can be configured via UDP. Analyzing this communication, it has been observed that any aspect of the initial configuration can be changed by means of the device's MAC without the need for authentication.

Action-Not Available
Vendor-Circutor
Product-TCPRS1plus
CWE ID-CWE-20
Improper Input Validation
CVE-2025-64389
Assigner-50b5080a-775f-442e-83b5-926b5ca517b6
ShareView Details
Assigner-50b5080a-775f-442e-83b5-926b5ca517b6
CVSS Score-8.3||HIGH
EPSS-0.02% / 5.99%
||
7 Day CHG~0.00%
Published-31 Oct, 2025 | 14:19
Updated-04 Nov, 2025 | 15:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
EXCHANGE OF SENSITIVE INFORMATION IN CLEAR TEXT

The web server of the device performs exchanges of sensitive information in clear text through an insecure protocol.

Action-Not Available
Vendor-Circutor
Product-TCPRS1plus
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2025-64388
Assigner-50b5080a-775f-442e-83b5-926b5ca517b6
ShareView Details
Assigner-50b5080a-775f-442e-83b5-926b5ca517b6
CVSS Score-9.2||CRITICAL
EPSS-0.06% / 18.82%
||
7 Day CHG~0.00%
Published-31 Oct, 2025 | 14:17
Updated-04 Nov, 2025 | 15:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Denial of service through specific packets

Denial of service of the web server through specific requests to this protocol

Action-Not Available
Vendor-Circutor
Product-TCPRS1plus
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2025-64387
Assigner-50b5080a-775f-442e-83b5-926b5ca517b6
ShareView Details
Assigner-50b5080a-775f-442e-83b5-926b5ca517b6
CVSS Score-5.1||MEDIUM
EPSS-0.06% / 18.31%
||
7 Day CHG~0.00%
Published-31 Oct, 2025 | 14:12
Updated-04 Nov, 2025 | 15:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
CLICKJACKING

The web application is vulnerable to a so-called ‘clickjacking’ attack. In this type of attack, the vulnerable page is inserted into a page controlled by the attacker in order to deceive the victim. This deception can range from making the victim click on a button to making them enter their login credentials in a form that, a priori, appears legitimate.

Action-Not Available
Vendor-Circutor
Product-TCPRS1plus
CWE ID-CWE-1021
Improper Restriction of Rendered UI Layers or Frames
CVE-2025-12501
Assigner-Opera Norway AS
ShareView Details
Assigner-Opera Norway AS
CVSS Score-7.5||HIGH
EPSS-0.06% / 18.92%
||
7 Day CHG~0.00%
Published-31 Oct, 2025 | 14:10
Updated-04 Nov, 2025 | 15:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Integer overflow in GameMaker IDE below 2024.14.0 version can lead to can lead to application crashes through denial-of-service attacks (DoS). GameMaker users who use the network_create_server() function in their projects  are urged to update and recompile immediately.

Action-Not Available
Vendor-Opera Norway AS
Product-GameMaker IDE
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2025-12460
Assigner-ESET, spol. s r.o.
ShareView Details
Assigner-ESET, spol. s r.o.
CVSS Score-5.3||MEDIUM
EPSS-0.23% / 45.32%
||
7 Day CHG+0.01%
Published-31 Oct, 2025 | 13:53
Updated-04 Nov, 2025 | 15:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Stored XSS vulnerability in Afterlogic Aurora webmail

An XSS issue was discovered in Afterlogic Aurora webmail version 9.8.3 and below. An attacker can send a specially crafted HTML e-mail message with JavaScript in an img HTML tag. This could allow a remote attacker to load arbitrary JavaScript code in the context of a webmail user's browser window, and access user data.

Action-Not Available
Vendor-Afterlogic
Product-Aurora
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2025-12521
Assigner-Wordfence
ShareView Details
Assigner-Wordfence
CVSS Score-5.3||MEDIUM
EPSS-0.06% / 18.05%
||
7 Day CHG~0.00%
Published-31 Oct, 2025 | 13:48
Updated-04 Nov, 2025 | 15:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Analytify Pro <= 7.0.3 - Unauthenticated Information Exposure

The Analytify Pro plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 7.0.3 via the Analytify Tag HTML details. This makes it possible for unauthenticated attackers to extract usernames from source code. While we generally do not assign CVE IDs to username exposure issues, this vendor has specifically requested we consider it a vulnerability.

Action-Not Available
Vendor-Analytify
Product-Analytify Pro
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2025-64386
Assigner-50b5080a-775f-442e-83b5-926b5ca517b6
ShareView Details
Assigner-50b5080a-775f-442e-83b5-926b5ca517b6
CVSS Score-7.7||HIGH
EPSS-0.06% / 18.31%
||
7 Day CHG~0.00%
Published-31 Oct, 2025 | 13:42
Updated-04 Nov, 2025 | 15:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
HIJACKING OF THE TOKEN AND GAINING ACCESS

The equipment grants a JWT token for each connection in the timeline, but during an active valid session, a hijacking of the token can be done. This will allow an attacker with the token modify parameters of security, access or even steal the session without the legitimate and active session detecting it. The web server allows the attacker to reuse an old session JWT token while the legitimate session is active.

Action-Not Available
Vendor-Circutor
Product-TCPRS1plus
CWE ID-CWE-613
Insufficient Session Expiration
CVE-2025-36249
Assigner-IBM Corporation
ShareView Details
Assigner-IBM Corporation
CVSS Score-3.7||LOW
EPSS-0.02% / 3.00%
||
7 Day CHG~0.00%
Published-31 Oct, 2025 | 13:05
Updated-05 Nov, 2025 | 19:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
IBM Jazz for Service Management is vulnerable to "filter" cookie not sent over SSL

IBM Jazz for Service Management 1.1.3.0 through 1.1.3.25 does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site the user goes to. The cookie will be sent to the insecure link and the attacker can then obtain the cookie value by snooping the traffic.

Action-Not Available
Vendor-IBM Corporation
Product-jazz_for_service_managementJazz for Service Management
CWE ID-CWE-614
Sensitive Cookie in HTTPS Session Without 'Secure' Attribute
CVE-2025-33003
Assigner-IBM Corporation
ShareView Details
Assigner-IBM Corporation
CVSS Score-7.8||HIGH
EPSS-0.02% / 4.60%
||
7 Day CHG~0.00%
Published-31 Oct, 2025 | 13:04
Updated-05 Nov, 2025 | 19:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
IBM InfoSphere Information Server is vulnerable to privilege escalation

IBM InfoSphere Information Server 11.7.0.0 through 11.7.1.6 could allow a non-root user to gain higher privileges/capabilities within the scope of a container due to execution with unnecessary privileges.

Action-Not Available
Vendor-IBM Corporation
Product-infosphere_information_serverInfoSphere Information Server
CWE ID-CWE-250
Execution with Unnecessary Privileges
CVE-2024-13992
Assigner-VulnCheck
ShareView Details
Assigner-VulnCheck
CVSS Score-5.1||MEDIUM
EPSS-0.74% / 72.38%
||
7 Day CHG+0.10%
Published-31 Oct, 2025 | 12:35
Updated-17 Nov, 2025 | 18:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Nagios XI < 2024R1.1 XSS via Missing Page / 404

Nagios XI versions prior to < 2024R1.1 is vulnerable to a cross-site scripting (XSS) when a user visits the "missing page" (404) page after following a link from another website. The vulnerable component, page-missing.php, fails to properly validate or escape user-supplied input, allowing an attacker to craft a malicious link that, when visited by a victim, executes arbitrary JavaScript in the victim’s browser within the Nagios XI domain.

Action-Not Available
Vendor-Nagios Enterprises, LLC
Product-nagios_xiXI
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2025-4952
Assigner-ESET, spol. s r.o.
ShareView Details
Assigner-ESET, spol. s r.o.
CVSS Score-6.8||MEDIUM
EPSS-0.01% / 1.38%
||
7 Day CHG~0.00%
Published-31 Oct, 2025 | 12:28
Updated-04 Nov, 2025 | 15:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Denial-of-service vulnerability in ESET security products for Windows

Tampering of the registry entries might have led to preventing the ESET security products from starting correctly on the next system startup or to unauthorized changes in the product's configuration.

Action-Not Available
Vendor-ESET, spol. s r. o.
Product-ESET Mail Security for IBM DominoESET Mail Security for Microsoft Exchange ServerESET Small Business SecurityESET File Security for Microsoft AzureESET Security for Microsoft SharePoint ServerESET Internet SecurityESET Endpoint Security for WindowsESET Endpoint AntivirusESET Safe ServerESET Server Security for Windows ServerESET Security UltimateESET NOD32 AntivirusESET Smart Security Premium
CWE ID-CWE-732
Incorrect Permission Assignment for Critical Resource
CVE-2025-58149
Assigner-Xen Project
ShareView Details
Assigner-Xen Project
CVSS Score-7.5||HIGH
EPSS-0.05% / 15.09%
||
7 Day CHG~0.00%
Published-31 Oct, 2025 | 11:50
Updated-04 Nov, 2025 | 22:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Incorrect removal of permissions on PCI device unplug

When passing through PCI devices, the detach logic in libxl won't remove access permissions to any 64bit memory BARs the device might have. As a result a domain can still have access any 64bit memory BAR when such device is no longer assigned to the domain. For PV domains the permission leak allows the domain itself to map the memory in the page-tables. For HVM it would require a compromised device model or stubdomain to map the leaked memory into the HVM domain p2m.

Action-Not Available
Vendor-Xen Project
Product-Xen
CWE ID-CWE-672
Operation on a Resource after Expiration or Release
CVE-2025-58148
Assigner-Xen Project
ShareView Details
Assigner-Xen Project
CVSS Score-7.5||HIGH
EPSS-0.04% / 13.28%
||
7 Day CHG~0.00%
Published-31 Oct, 2025 | 11:50
Updated-04 Nov, 2025 | 22:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
x86: Incorrect input sanitisation in Viridian hypercalls

[This CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Some Viridian hypercalls can specify a mask of vCPU IDs as an input, in one of three formats. Xen has boundary checking bugs with all three formats, which can cause out-of-bounds reads and writes while processing the inputs. * CVE-2025-58147. Hypercalls using the HV_VP_SET Sparse format can cause vpmask_set() to write out of bounds when converting the bitmap to Xen's format. * CVE-2025-58148. Hypercalls using any input format can cause send_ipi() to read d->vcpu[] out-of-bounds, and operate on a wild vCPU pointer.

Action-Not Available
Vendor-Xen Project
Product-Xen
CWE ID-CWE-125
Out-of-bounds Read
CWE ID-CWE-787
Out-of-bounds Write
CVE-2025-58147
Assigner-Xen Project
ShareView Details
Assigner-Xen Project
CVSS Score-7.5||HIGH
EPSS-0.04% / 13.28%
||
7 Day CHG~0.00%
Published-31 Oct, 2025 | 11:50
Updated-04 Nov, 2025 | 22:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
x86: Incorrect input sanitisation in Viridian hypercalls

[This CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Some Viridian hypercalls can specify a mask of vCPU IDs as an input, in one of three formats. Xen has boundary checking bugs with all three formats, which can cause out-of-bounds reads and writes while processing the inputs. * CVE-2025-58147. Hypercalls using the HV_VP_SET Sparse format can cause vpmask_set() to write out of bounds when converting the bitmap to Xen's format. * CVE-2025-58148. Hypercalls using any input format can cause send_ipi() to read d->vcpu[] out-of-bounds, and operate on a wild vCPU pointer.

Action-Not Available
Vendor-Xen Project
Product-Xen
CWE ID-CWE-125
Out-of-bounds Read
CVE-2025-64368
Assigner-Patchstack
ShareView Details
Assigner-Patchstack
CVSS Score-5.4||MEDIUM
EPSS-0.02% / 4.12%
||
7 Day CHG~0.00%
Published-31 Oct, 2025 | 11:42
Updated-13 Nov, 2025 | 11:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WordPress Bard theme <= 1.6 - Cross Site Request Forgery (CSRF) vulnerability

Cross-Site Request Forgery (CSRF) vulnerability in Mikado-Themes Bard bardwp allows Cross Site Request Forgery.This issue affects Bard: from n/a through <= 1.6.

Action-Not Available
Vendor-Mikado-Themes
Product-Bard
CWE ID-CWE-352
Cross-Site Request Forgery (CSRF)
CVE-2025-64367
Assigner-Patchstack
ShareView Details
Assigner-Patchstack
CVSS Score-6.5||MEDIUM
EPSS-0.04% / 13.78%
||
7 Day CHG+0.01%
Published-31 Oct, 2025 | 11:42
Updated-13 Nov, 2025 | 11:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WordPress Groundhogg plugin <= 4.2.6 - Cross Site Scripting (XSS) vulnerability

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Adrian Tobey Groundhogg groundhogg allows Stored XSS.This issue affects Groundhogg: from n/a through <= 4.2.6.

Action-Not Available
Vendor-FormLift - Adrian Tobey (Groundhogg Inc.)
Product-Groundhogg
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2025-64366
Assigner-Patchstack
ShareView Details
Assigner-Patchstack
CVSS Score-7.6||HIGH
EPSS-0.04% / 13.48%
||
7 Day CHG+0.01%
Published-31 Oct, 2025 | 11:42
Updated-13 Nov, 2025 | 11:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WordPress MasterStudy LMS plugin <= 3.6.27 - SQL Injection vulnerability

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Stylemix MasterStudy LMS masterstudy-lms-learning-management-system allows Blind SQL Injection.This issue affects MasterStudy LMS: from n/a through <= 3.6.27.

Action-Not Available
Vendor-Stylemix
Product-MasterStudy LMS
CWE ID-CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CVE-2025-64365
Assigner-Patchstack
ShareView Details
Assigner-Patchstack
CVSS Score-6.5||MEDIUM
EPSS-0.05% / 15.13%
||
7 Day CHG+0.01%
Published-31 Oct, 2025 | 11:42
Updated-13 Nov, 2025 | 11:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WordPress Ohio Extra plugin <= 3.6.0 - Cross Site Scripting (XSS) vulnerability

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in colabrio Ohio Extra ohio-extra allows DOM-Based XSS.This issue affects Ohio Extra: from n/a through <= 3.6.0.

Action-Not Available
Vendor-colabrio
Product-Ohio Extra
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2025-64364
Assigner-Patchstack
ShareView Details
Assigner-Patchstack
CVSS Score-7.5||HIGH
EPSS-0.17% / 38.66%
||
7 Day CHG+0.02%
Published-31 Oct, 2025 | 11:42
Updated-13 Nov, 2025 | 11:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WordPress Masterstudy theme < 4.8.126 - Local File Inclusion vulnerability

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in StylemixThemes Masterstudy masterstudy allows PHP Local File Inclusion.This issue affects Masterstudy: from n/a through < 4.8.126.

Action-Not Available
Vendor-StylemixThemes
Product-Masterstudy
CWE ID-CWE-98
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion')
CVE-2025-64363
Assigner-Patchstack
ShareView Details
Assigner-Patchstack
CVSS Score-7.5||HIGH
EPSS-0.17% / 38.66%
||
7 Day CHG+0.02%
Published-31 Oct, 2025 | 11:42
Updated-13 Nov, 2025 | 11:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WordPress Kleo theme < 5.5.0 - Local File Inclusion vulnerability

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in SeventhQueen Kleo kleo allows PHP Local File Inclusion.This issue affects Kleo: from n/a through < 5.5.0.

Action-Not Available
Vendor-SeventhQueen
Product-Kleo
CWE ID-CWE-98
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion')
CVE-2025-64362
Assigner-Patchstack
ShareView Details
Assigner-Patchstack
CVSS Score-6.5||MEDIUM
EPSS-0.04% / 13.78%
||
7 Day CHG+0.01%
Published-31 Oct, 2025 | 11:42
Updated-13 Nov, 2025 | 11:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WordPress K Elements plugin < 5.5.0 - Cross Site Scripting (XSS) vulnerability

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in SeventhQueen K Elements k-elements allows DOM-Based XSS.This issue affects K Elements: from n/a through < 5.5.0.

Action-Not Available
Vendor-SeventhQueen
Product-K Elements
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2025-64361
Assigner-Patchstack
ShareView Details
Assigner-Patchstack
CVSS Score-6.5||MEDIUM
EPSS-0.04% / 13.78%
||
7 Day CHG+0.01%
Published-31 Oct, 2025 | 11:42
Updated-13 Nov, 2025 | 11:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WordPress Consulting Elementor Widgets plugin <= 1.4.2 - Cross Site Scripting (XSS) vulnerability

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in StylemixThemes Consulting Elementor Widgets consulting-elementor-widgets allows DOM-Based XSS.This issue affects Consulting Elementor Widgets: from n/a through <= 1.4.2.

Action-Not Available
Vendor-StylemixThemes
Product-Consulting Elementor Widgets
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2025-64360
Assigner-Patchstack
ShareView Details
Assigner-Patchstack
CVSS Score-7.5||HIGH
EPSS-0.06% / 20.12%
||
7 Day CHG~0.00%
Published-31 Oct, 2025 | 11:42
Updated-13 Nov, 2025 | 11:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WordPress Consulting Elementor Widgets plugin <= 1.4.2 - Local File Inclusion vulnerability

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in StylemixThemes Consulting Elementor Widgets consulting-elementor-widgets allows PHP Local File Inclusion.This issue affects Consulting Elementor Widgets: from n/a through <= 1.4.2.

Action-Not Available
Vendor-StylemixThemes
Product-Consulting Elementor Widgets
CWE ID-CWE-98
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion')
CVE-2025-64359
Assigner-Patchstack
ShareView Details
Assigner-Patchstack
CVSS Score-7.5||HIGH
EPSS-0.06% / 20.12%
||
7 Day CHG~0.00%
Published-31 Oct, 2025 | 11:42
Updated-13 Nov, 2025 | 11:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WordPress Consulting theme < 6.7.5 - Local File Inclusion vulnerability

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in StylemixThemes Consulting consulting allows PHP Local File Inclusion.This issue affects Consulting: from n/a through < 6.7.5.

Action-Not Available
Vendor-StylemixThemes
Product-Consulting
CWE ID-CWE-98
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion')
CVE-2025-64358
Assigner-Patchstack
ShareView Details
Assigner-Patchstack
CVSS Score-4.3||MEDIUM
EPSS-0.04% / 11.33%
||
7 Day CHG~0.00%
Published-31 Oct, 2025 | 11:42
Updated-13 Nov, 2025 | 11:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WordPress Smart Coupons for WooCommerce plugin <= 2.2.3 - Broken Access Control vulnerability

Missing Authorization vulnerability in WebToffee Smart Coupons for WooCommerce wt-smart-coupons-for-woocommerce allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Smart Coupons for WooCommerce: from n/a through <= 2.2.3.

Action-Not Available
Vendor-WebToffee
Product-Smart Coupons for WooCommerce
CWE ID-CWE-862
Missing Authorization
CVE-2025-64357
Assigner-Patchstack
ShareView Details
Assigner-Patchstack
CVSS Score-4.3||MEDIUM
EPSS-0.02% / 4.63%
||
7 Day CHG~0.00%
Published-31 Oct, 2025 | 11:42
Updated-13 Nov, 2025 | 11:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WordPress Advanced Database Cleaner plugin <= 3.1.6 - Cross Site Request Forgery (CSRF) vulnerability

Cross-Site Request Forgery (CSRF) vulnerability in Younes JFR. Advanced Database Cleaner advanced-database-cleaner allows Cross Site Request Forgery.This issue affects Advanced Database Cleaner: from n/a through <= 3.1.6.

Action-Not Available
Vendor-Younes JFR.
Product-Advanced Database Cleaner
CWE ID-CWE-352
Cross-Site Request Forgery (CSRF)
CVE-2025-64356
Assigner-Patchstack
ShareView Details
Assigner-Patchstack
CVSS Score-4.3||MEDIUM
EPSS-0.04% / 11.02%
||
7 Day CHG~0.00%
Published-31 Oct, 2025 | 11:42
Updated-13 Nov, 2025 | 11:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WordPress Insert PHP Code Snippet plugin <= 1.4.3 - Broken Access Control vulnerability

Missing Authorization vulnerability in f1logic Insert PHP Code Snippet insert-php-code-snippet allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Insert PHP Code Snippet: from n/a through <= 1.4.3.

Action-Not Available
Vendor-f1logic
Product-Insert PHP Code Snippet
CWE ID-CWE-862
Missing Authorization
CVE-2025-64354
Assigner-Patchstack
ShareView Details
Assigner-Patchstack
CVSS Score-6.5||MEDIUM
EPSS-0.04% / 13.78%
||
7 Day CHG+0.01%
Published-31 Oct, 2025 | 11:42
Updated-13 Nov, 2025 | 11:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WordPress Gutenberg plugin <= 21.8.2 - Cross Site Scripting (XSS) vulnerability

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Matias Ventura Gutenberg gutenberg allows Stored XSS.This issue affects Gutenberg: from n/a through <= 21.8.2.

Action-Not Available
Vendor-Matias Ventura
Product-Gutenberg
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2025-64353
Assigner-Patchstack
ShareView Details
Assigner-Patchstack
CVSS Score-8.8||HIGH
EPSS-0.07% / 22.00%
||
7 Day CHG+0.01%
Published-31 Oct, 2025 | 11:42
Updated-13 Nov, 2025 | 11:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WordPress Polylang plugin <= 3.7.3 - Deserialization of untrusted data vulnerability

Deserialization of Untrusted Data vulnerability in Chouby Polylang polylang allows Object Injection.This issue affects Polylang: from n/a through <= 3.7.3.

Action-Not Available
Vendor-Chouby
Product-Polylang
CWE ID-CWE-502
Deserialization of Untrusted Data
CVE-2025-64352
Assigner-Patchstack
ShareView Details
Assigner-Patchstack
CVSS Score-2.7||LOW
EPSS-0.04% / 10.48%
||
7 Day CHG~0.00%
Published-31 Oct, 2025 | 11:42
Updated-13 Nov, 2025 | 11:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WordPress Essential Addons for Elementor plugin <= 6.2.4 - Broken Access Control vulnerability

Missing Authorization vulnerability in WPDeveloper Essential Addons for Elementor essential-addons-for-elementor-lite allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Essential Addons for Elementor: from n/a through <= 6.2.4.

Action-Not Available
Vendor-WPDeveloper
Product-Essential Addons for Elementor
CWE ID-CWE-862
Missing Authorization
CVE-2025-64351
Assigner-Patchstack
ShareView Details
Assigner-Patchstack
CVSS Score-4.3||MEDIUM
EPSS-0.04% / 12.22%
||
7 Day CHG+0.01%
Published-31 Oct, 2025 | 11:42
Updated-13 Nov, 2025 | 11:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WordPress Rank Math SEO plugin <= 1.0.252.1 - Sensitive Data Exposure vulnerability

Insertion of Sensitive Information Into Sent Data vulnerability in Rank Math SEO Rank Math SEO seo-by-rank-math allows Retrieve Embedded Sensitive Data.This issue affects Rank Math SEO: from n/a through <= 1.0.252.1.

Action-Not Available
Vendor-Rank Math SEO
Product-Rank Math SEO
CWE ID-CWE-201
Insertion of Sensitive Information Into Sent Data
CVE-2025-64350
Assigner-Patchstack
ShareView Details
Assigner-Patchstack
CVSS Score-3.8||LOW
EPSS-0.02% / 2.83%
||
7 Day CHG~0.00%
Published-31 Oct, 2025 | 11:42
Updated-13 Nov, 2025 | 11:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WordPress Rank Math SEO plugin <= 1.0.252.1 - Broken Access Control vulnerability

Missing Authorization vulnerability in Rank Math SEO Rank Math SEO seo-by-rank-math allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Rank Math SEO: from n/a through <= 1.0.252.1.

Action-Not Available
Vendor-Rank Math SEO
Product-Rank Math SEO
CWE ID-CWE-862
Missing Authorization
CVE-2025-40603
Assigner-SonicWall, Inc.
ShareView Details
Assigner-SonicWall, Inc.
CVSS Score-4.5||MEDIUM
EPSS-0.06% / 18.36%
||
7 Day CHG+0.01%
Published-31 Oct, 2025 | 11:01
Updated-06 Nov, 2025 | 16:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A potential exposure of sensitive information in log files in SonicWall SMA100 Series appliances may allow a remote, authenticated administrator, under certain conditions to view partial users credential data.

Action-Not Available
Vendor-SonicWall Inc.
Product-sma_210_firmwaresma_410_firmwaresma_210sma_410sma_500v_firmwaresma_500vSMA100
CWE ID-CWE-532
Insertion of Sensitive Information into Log File
CVE-2025-11602
Assigner-3b236295-4ccd-4a1f-a1c1-a72eecc8d7b6
ShareView Details
Assigner-3b236295-4ccd-4a1f-a1c1-a72eecc8d7b6
CVSS Score-6.3||MEDIUM
EPSS-0.06% / 19.87%
||
7 Day CHG~0.00%
Published-31 Oct, 2025 | 10:20
Updated-04 Nov, 2025 | 15:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Untargeted information leak in Bolt protocol handshake

Potential information leak in bolt protocol handshake in Neo4j Enterprise and Community editions allows attacker to obtain one byte of information from previous connections. The attacker has no control over the information leaked in server responses.

Action-Not Available
Vendor-neo4j
Product-Community EditionEnterprise Edition
CWE ID-CWE-226
Sensitive Information in Resource Not Removed Before Reuse
CVE-2025-11843
Assigner-Canon EMEA
ShareView Details
Assigner-Canon EMEA
CVSS Score-8.8||HIGH
EPSS-0.06% / 19.38%
||
7 Day CHG~0.00%
Published-31 Oct, 2025 | 09:43
Updated-04 Nov, 2025 | 15:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Therefore™ Online and Therefore™ On-Premises contains an account impersonation issue, which could potentially allow the attacker to access all the stored data

Therefore Corporation GmbH has recently become aware that Therefore™ Online and Therefore™ On-Premises contain an account impersonation vulnerability. A malicious user may potentially be able to impersonate the web service account or the account of a service using the API when connecting to the Therefore™ Server. If the malicious user gains this impersonation user access, then it is possible for them to access the documents stored in Therefore™. This impersonation is at application level (Therefore access level), not the operating system level.

Action-Not Available
Vendor-Therefore Corporation GmbH
Product-Therefore Online and Therefore On-Premises
CWE ID-CWE-290
Authentication Bypass by Spoofing
CVE-2025-40106
Assigner-kernel.org
ShareView Details
Assigner-kernel.org
CVSS Score-Not Assigned
EPSS-0.05% / 16.75%
||
7 Day CHG~0.00%
Published-31 Oct, 2025 | 09:41
Updated-02 Jan, 2026 | 15:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
comedi: fix divide-by-zero in comedi_buf_munge()

In the Linux kernel, the following vulnerability has been resolved: comedi: fix divide-by-zero in comedi_buf_munge() The comedi_buf_munge() function performs a modulo operation `async->munge_chan %= async->cmd.chanlist_len` without first checking if chanlist_len is zero. If a user program submits a command with chanlist_len set to zero, this causes a divide-by-zero error when the device processes data in the interrupt handler path. Add a check for zero chanlist_len at the beginning of the function, similar to the existing checks for !map and CMDF_RAWDATA flag. When chanlist_len is zero, update munge_count and return early, indicating the data was handled without munging. This prevents potential kernel panics from malformed user commands.

Action-Not Available
Vendor-Linux Kernel Organization, Inc
Product-Linux
CVE-2025-12115
Assigner-Wordfence
ShareView Details
Assigner-Wordfence
CVSS Score-7.5||HIGH
EPSS-0.14% / 33.83%
||
7 Day CHG+0.01%
Published-31 Oct, 2025 | 09:27
Updated-04 Nov, 2025 | 15:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WPC Name Your Price for WooCommerce <= 2.1.9 - Unauthenticated Price Alteration

The WPC Name Your Price for WooCommerce plugin for WordPress is vulnerable to unauthorized price alteration in all versions up to, and including, 2.1.9. This is due to the plugin not disabling the ability to name a custom price when it has been specifically disabled for a product. This makes it possible for unauthenticated attackers to purchase products at prices less than they should be able to.

Action-Not Available
Vendor-wpclever
Product-WPC Name Your Price for WooCommerce
CWE ID-CWE-602
Client-Side Enforcement of Server-Side Security
CVE-2025-12041
Assigner-Wordfence
ShareView Details
Assigner-Wordfence
CVSS Score-5.3||MEDIUM
EPSS-0.07% / 21.58%
||
7 Day CHG~0.00%
Published-31 Oct, 2025 | 09:27
Updated-04 Nov, 2025 | 15:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
ERI File Library <= 1.1.0 - Missing Authorization to Unauthenticated Protected File Download

The ERI File Library plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'erifl_file' AJAX action in all versions up to, and including, 1.1.0. This makes it possible for unauthenticated attackers to download files restricted to specific user roles.

Action-Not Available
Vendor-apos37
Product-ERI File Library
CWE ID-CWE-862
Missing Authorization
  • Previous
  • 1
  • 2
  • ...
  • 207
  • 208
  • 209
  • ...
  • 6554
  • 6555
  • Next