CVE & Exploit Intelligence Database

Updated 3h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

337,847 CVEs tracked 53,242 with exploits 4,725 exploited in wild 1,540 CISA KEV 3,918 Nuclei templates 37,802 vendors 42,493 researchers
370 results Clear all
CVE-2025-48817 8.8 HIGH EPSS 0.00
Remote Desktop Client - Path Traversal
Relative path traversal in Remote Desktop Client allows an unauthorized attacker to execute code over a network.
CWE-284 Jul 08, 2025
CVE-2025-7146 7.5 HIGH EPSS 0.00
iPublish System - Info Disclosure
The iPublish System developed by Jhenggao has an Arbitrary File Reading vulnerability, allowing unauthenticated remote attackers to read arbitrary system file.
CWE-23 Jul 08, 2025
CVE-2025-52207 9.9 CRITICAL EXPLOITED 1 Writeup NUCLEI EPSS 0.06
MikoPBX <2024.1.114 - Code Injection
PBXCoreREST/Controllers/Files/PostController.php in MikoPBX through 2024.1.114 allows uploading a PHP script to an arbitrary directory.
CWE-23 Jun 27, 2025
CVE-2025-44163 6.3 MEDIUM 1 Writeup EPSS 0.00
Raspap-webgui < 3.3.6 - Path Traversal
RaspAP raspap-webgui 3.3.1 is vulnerable to Directory Traversal in ajax/networking/get_wgkey.php. An authenticated attacker can send a crafted POST request with a path traversal payload in the `entity` parameter to overwrite arbitrary files writable by the web server via abuse of the `tee` command used in shell execution.
CWE-23 Jun 27, 2025
CVE-2025-52922 7.4 HIGH EPSS 0.00
Innoshop <0.4.1 - Path Traversal
Innoshop through 0.4.1 allows directory traversal via FileManager API endpoints. An authenticated attacker with access to the admin panel could abuse this to: (1) fully map the filesystem structure via the /api/file_manager/files?base_folder= endpoint, (2) create arbitrary directories on the server via the /api/file_manager/directories endpoint, (3) read arbitrary files from the server by copying the file to a readable location within the application via the /api/file_manager/copy_files endpoint, {4) delete arbitrary files from the server via a DELETE request to /api/file_manager/files, or (5) create arbitrary files on the server by uploading them and then leveraging the /api/file_manager/move_files endpoint to move them anywhere in the filesystem.
CWE-23 Jun 23, 2025
CVE-2025-34510 8.8 HIGH EXPLOITED EPSS 0.87
Sitecore XP CVE-2025-34510 Post-Authentication Remote Code Execution
Sitecore Experience Manager (XM), Experience Platform (XP), and Experience Commerce (XC) versions 9.0 through 9.3 and 10.0 through 10.4 are affected by a Zip Slip vulnerability. A remote, authenticated attacker can exploit this issue by sending a crafted HTTP request to upload a ZIP archive containing path traversal sequences, allowing arbitrary file writes and leading to code execution.
CWE-23 Jun 17, 2025
CVE-2025-33112 8.4 HIGH EPSS 0.00
IBM AIX 7.3 & VIOS 4.1.1 - Code Injection
IBM AIX 7.3 and IBM VIOS 4.1.1 Perl implementation could allow a non-privileged local user to exploit a vulnerability to execute arbitrary code due to improper neutralization of pathname input.
CWE-23 Jun 10, 2025
CVE-2025-3365 9.8 CRITICAL EPSS 0.00
Product <Version - Path Traversal
A missing protection against path traversal allows to access any file on the server.
CWE-23 Jun 06, 2025
CVE-2025-49466 5.8 MEDIUM EPSS 0.00
aerc <93bec0d - Path Traversal
aerc before 93bec0d allows directory traversal in commands/msgview/open.go because of direct path concatenation of the name of an attachment part,
CWE-23 Jun 05, 2025
CVE-2025-48957 7.5 HIGH 1 PoC 1 Writeup Analysis EPSS 0.00
AstrBot <3.5.12 - Path Traversal
AstrBot is a large language model chatbot and development framework. A path traversal vulnerability present in versions 3.4.4 through 3.5.12 may lead to information disclosure, such as API keys for LLM providers, account passwords, and other sensitive data. The vulnerability has been addressed in Pull Request #1676 and is included in version 3.5.13. As a workaround, users can edit the `cmd_config.json` file to disable the dashboard feature as a temporary workaround. However, it is strongly recommended to upgrade to version v3.5.13 or later to fully resolve this issue.
CWE-22 Jun 02, 2025
CVE-2025-47788 1 Writeup EPSS 0.01
Atheos <v602 - Path Traversal
Atheos is a self-hosted browser-based cloud IDE. Prior to v602, similar to GHSA-rgjm-6p59-537v/CVE-2025-22152, the `$target` parameter in `/controller.php` was not properly validated, which could allow an attacker to execute arbitrary files on the server via path traversal. v602 contains a fix for the issue.
CWE-22 May 15, 2025
CVE-2025-47445 7.5 HIGH EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.09
Themewinter Eventin < 4.0.27 - Path Traversal
Relative Path Traversal vulnerability in Themewinter Eventin allows Path Traversal.This issue affects Eventin: from n/a through 4.0.26.
CWE-23 May 14, 2025
CVE-2025-31493 9.1 CRITICAL EPSS 0.01
Kirby < 3.9.8.3 - Path Traversal
Kirby is an open-source content management system. A vulnerability in versions prior to 3.9.8.3, 3.10.1.2, and 4.7.1 affects all Kirby sites that use the `collection()` helper or `$kirby->collection()` method with a dynamic collection name (such as a collection name that depends on request or user data). Sites that only use fixed calls to the `collection()` helper/`$kirby->collection()` method (i.e. calls with a simple string for the collection name) are *not* affected. A missing path traversal check allowed attackers to navigate and access all files on the server that were accessible to the PHP process, including files outside of the collections root or even outside of the Kirby installation. PHP code within such files was executed. Such attacks first require an attack vector in the site code that is caused by dynamic collection names, such as `collection('tags-' . get('tags'))`. It generally also requires knowledge of the site structure and the server's file system by the attacker, although it can be possible to find vulnerable setups through automated methods such as fuzzing. In a vulnerable setup, this could cause damage to the confidentiality and integrity of the server. The problem has been patched in Kirby 3.9.8.3, Kirby 3.10.1.2, and Kirby 4.7.1. In all of the mentioned releases, the maintainers of Kirby have added a check for the collection path that ensures that the resulting path is contained within the configured collections root. Collection paths that point outside of the collections root will not be loaded.
CWE-22 May 13, 2025
CVE-2025-30207 7.5 HIGH EPSS 0.01
Kirby <3.9.8.3, <3.10.1.2, <4.7.1 - Path Traversal
Kirby is an open-source content management system. A vulnerability in versions prior to 3.9.8.3, 3.10.1.2, and 4.7.1 affects all Kirby setups that use PHP's built-in server. Such setups are commonly only used during local development. Sites that use other server software (such as Apache, nginx or Caddy) are not affected. A missing path traversal check allowed attackers to navigate all files on the server that were accessible to the PHP process, including files outside of the Kirby installation. The vulnerable implementation delegated all existing files to PHP, including existing files outside of the document root. This leads to a different response that allows attackers to determine whether the requested file exists. Because Kirby's router only delegates such requests to PHP and does not load or execute them, contents of the files were not exposed as PHP treats requests to files outside of the document root as invalid. The problem has been patched in Kirby 3.9.8.3, Kirby 3.10.1.2, and Kirby 4.7.1. In all of the mentioned releases, the maintainers of Kirby have updated the router to check if existing static files are within the document root. Requests to files outside the document root are treated as page requests of the error page and will no longer allow to determine whether the file exists or not.
CWE-22 May 13, 2025
CVE-2025-30159 9.1 CRITICAL EPSS 0.01
Kirby <3.9.8.3, 3.10.1.2, 4.7.1 - Path Traversal
Kirby is an open-source content management system. A vulnerability in versions prior to 3.9.8.3, 3.10.1.2, and 4.7.1 affects all Kirby sites that use the `snippet()` helper or `$kirby->snippet()` method with a dynamic snippet name (such as a snippet name that depends on request or user data). Sites that only use fixed calls to the `snippet()` helper/`$kirby->snippet()` method (i.e. calls with a simple string for the snippet name) are *not* affected. A missing path traversal check allowed attackers to navigate and access all files on the server that were accessible to the PHP process, including files outside of the snippets root or even outside of the Kirby installation. PHP code within such files was executed. Such attacks first require an attack vector in the site code that is caused by dynamic snippet names, such as `snippet('tags-' . get('tags'))`. It generally also requires knowledge of the site structure and the server's file system by the attacker, although it can be possible to find vulnerable setups through automated methods such as fuzzing. In a vulnerable setup, this could cause damage to the confidentiality and integrity of the server. The problem has been patched in Kirby 3.9.8.3, Kirby 3.10.1.2, and Kirby 4.7.1. In all of the mentioned releases, Kirby maintainers have added a check for the snippet path that ensures that the resulting path is contained within the configured snippets root. Snippet paths that point outside of the snippets root will not be loaded.
CWE-22 May 13, 2025
CVE-2025-22859 5.3 MEDIUM EPSS 0.00
Fortinet Forticlientems < 7.4.3 - Path Traversal
A Relative Path Traversal vulnerability [CWE-23] in FortiClientEMS 7.4.0 through 7.4.1 and FortiClientEMS Cloud 7.4.0 through 7.4.1 may allow a remote unauthenticated attacker to perform a limited arbitrary file write on the system via upload requests.
CWE-23 May 13, 2025
CVE-2025-24350 7.1 HIGH EPSS 0.00
ctrlX OS - Path Traversal
A vulnerability in the “Certificates and Keys” functionality of the web application of ctrlX OS allows a remote authenticated (low-privileged) attacker to write arbitrary certificates in arbitrary file system paths via a crafted HTTP request.
CWE-23 Apr 30, 2025
CVE-2025-24343 5.4 MEDIUM EPSS 0.00
ctrlX OS - Path Traversal
A vulnerability in the “Manages app data” functionality of the web application of ctrlX OS allows a remote authenticated (low-privileged) attacker to write arbitrary files in arbitrary file system paths via a crafted HTTP request.
CWE-23 Apr 30, 2025
CVE-2023-35816 3.5 LOW EPSS 0.00
DevExpress <23.1.3 - Code Injection
DevExpress before 23.1.3 allows arbitrary TypeConverter conversion.
CWE-23 Apr 28, 2025
CVE-2025-46433 4.9 MEDIUM EPSS 0.00
JetBrains TeamCity <2025.03.1 - Path Traversal
In JetBrains TeamCity before 2025.03.1 improper path validation in loggingPreset parameter was possible
CWE-22 Apr 25, 2025