CVE & Exploit Intelligence Database

Updated 52m ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

337,123 CVEs tracked 53,219 with exploits 4,686 exploited in wild 1,539 CISA KEV 3,912 Nuclei templates 37,757 vendors 42,422 researchers
207 results Clear all
CVE-2026-26416 8.8 HIGH 1 PoC Analysis EPSS 0.00
TCS Cognix Recon Client 3.0 - Privilege Escalation
An authorization bypass vulnerability in Tata Consultancy Services Cognix Recon Client v3.0 allows authenticated users to escalate privileges across role boundaries via crafted requests.
CWE-269 Mar 05, 2026
CVE-2026-1492 9.8 CRITICAL EXPLOITED 2 PoCs Analysis EPSS 0.00
WordPress User Registration & Membership Plugin <=5.1.2 - Privilege...
The User Registration & Membership – Custom Registration Form Builder, Custom Login Form, User Profile, Content Restriction & Membership Plugin plugin for WordPress is vulnerable to improper privilege management in all versions up to, and including, 5.1.2. This is due to the plugin accepting a user-supplied role during membership registration without properly enforcing a server-side allowlist. This makes it possible for unauthenticated attackers to create administrator accounts by supplying a role value during membership registration.
CWE-269 Mar 03, 2026
CVE-2026-27198 8.8 HIGH 1 PoC 1 Writeup Analysis EPSS 0.00
Formwork 2.0.0-2.3.3 - Privilege Escalation
Formwork is a flat file-based Content Management System (CMS). In versions 2.0.0 through 2.3.3, the application fails to properly enforce role-based authorization during account creation. Although the system validates that the specified role exists, it does not verify whether the current user has sufficient privileges to assign highly privileged roles such as admin. As a result, an authenticated user with the editor role can create a new account with administrative privileges, leading to full administrative access and complete compromise of the CMS. This issue has been fixed in version 2.3.4.
CWE-269 Feb 21, 2026
CVE-2025-8572 9.8 CRITICAL 2 PoCs Analysis EPSS 0.00
Truelysell Core <1.8.7 - Privilege Escalation
The Truelysell Core plugin for WordPress is vulnerable to privilege escalation in versions less than, or equal to, 1.8.7. This is due to insufficient validation of the user_role parameter during user registration. This makes it possible for unauthenticated attackers to create accounts with elevated privileges, including administrator access.
CWE-269 Feb 14, 2026
CVE-2026-2144 8.1 HIGH 2 PoCs Analysis EPSS 0.00
Magic Login Mail or QR Code <2.05 - Privilege Escalation
The Magic Login Mail or QR Code plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 2.05. This is due to the plugin storing the magic login QR code image with a predictable, static filename (QR_Code.png) in the publicly accessible WordPress uploads directory during the email sending process. The file is only deleted after wp_mail() completes, creating an exploitable race condition window. This makes it possible for unauthenticated attackers to trigger a login link request for any user, including administrators, and then exploit the race condition between QR code file creation and deletion to obtain the login URL encoded in the QR code, thereby gaining unauthorized access to the targeted user's account.
CWE-269 Feb 14, 2026
CVE-2026-21533 7.8 HIGH KEV 6 PoCs Analysis EPSS 0.03
Microsoft Windows 10 1607 - Improper Privilege Management
Improper privilege management in Windows Remote Desktop allows an authorized attacker to elevate privileges locally.
CWE-269 Feb 10, 2026
CVE-2026-25643 9.1 CRITICAL 4 PoCs Analysis EPSS 0.00
Frigate <0.16.4 - RCE
Frigate is a network video recorder (NVR) with realtime local object detection for IP cameras. Prior to 0.16.4, a critical Remote Command Execution (RCE) vulnerability has been identified in the Frigate integration with go2rtc. The application does not sanitize user input in the video stream configuration (config.yaml), allowing direct injection of system commands via the exec: directive. The go2rtc service executes these commands without restrictions. This vulnerability is only exploitable by an administrator or users who have exposed their Frigate install to the open internet with no authentication which allows anyone full administrative control. This vulnerability is fixed in 0.16.4.
CWE-78 Feb 06, 2026
CVE-2025-15030 9.8 CRITICAL EXPLOITED 4 PoCs Analysis EPSS 0.00
User Profile Builder <3.15.2 - Info Disclosure
The User Profile Builder WordPress plugin before 3.15.2 does not have a proper password reset process, allowing a few unauthenticated requests to reset the password of any user by knowing their username, such as administrator ones, and therefore gain access to their account
CWE-269 Feb 02, 2026
CVE-2026-0920 9.8 CRITICAL EXPLOITED 3 PoCs Analysis EPSS 0.00
LA-Studio Element Kit - Privilege Escalation
The LA-Studio Element Kit for Elementor plugin for WordPress is vulnerable to Administrative User Creation in all versions up to, and including, 1.5.6.3. This is due to the 'ajax_register_handle' function not restricting what user roles a user can register with. This makes it possible for unauthenticated attackers to supply the 'lakit_bkrole' parameter during registration and gain administrator access to the site.
CWE-269 Jan 22, 2026
CVE-2026-21957 7.5 HIGH 1 PoC Analysis EPSS 0.00
Oracle VM Virtualbox - Improper Privilege Management
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H).
CWE-269 Jan 20, 2026
CVE-2026-22804 8.0 HIGH 2 PoCs Analysis EPSS 0.00
Termix < 1.10.0 - XSS
Termix is a web-based server management platform with SSH terminal, tunneling, and file editing capabilities. From 1.7.0 to 1.9.0, Stored Cross-Site Scripting (XSS) vulnerability exists in the Termix File Manager component. The application fails to sanitize SVG file content before rendering it. This allows an attacker who has compromised a managed SSH server to plant a malicious file, which, when previewed by the Termix user, executes arbitrary JavaScript in the context of the application. The vulnerability is located in src/ui/desktop/apps/file-manager/components/FileViewer.tsx. This vulnerability is fixed in 1.10.0.
CWE-269 Jan 12, 2026
CVE-2025-14736 9.8 CRITICAL 1 PoC Analysis EPSS 0.00
Frontend Admin by DynamiApps <3.28.25 - Privilege Escalation
The Frontend Admin by DynamiApps plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 3.28.25. This is due to insufficient validation of user-supplied role values in the 'validate_value', 'pre_update_value', and 'get_fields_display' functions. This makes it possible for unauthenticated attackers to register as administrators and gain complete control of the site, granted they can access a user registration form containing a Role field.
CWE-269 Jan 09, 2026
CVE-2023-53908 6.5 MEDIUM 1 PoC Analysis EPSS 0.00
HiSecOS 04.0.01 - Privilege Escalation
HiSecOS 04.0.01 contains a privilege escalation vulnerability that allows authenticated users to modify their access role through XML-based NETCONF configuration. Attackers can send crafted XML payloads to the /mops_data endpoint with a specific role value to elevate their user privileges to administrative level.
CWE-269 Dec 17, 2025
CVE-2025-8489 9.8 CRITICAL EXPLOITED 1 PoC Analysis EPSS 0.44
King Addons for Elementor - Privilege Escalation
The King Addons for Elementor – Free Elements, Widgets, Templates, and Features for Elementor plugin for WordPress is vulnerable to privilege escalation in versions 24.12.92 to 51.1.14 . This is due to the plugin not properly restricting the roles that users can register with. This makes it possible for unauthenticated attackers to register with administrator-level user accounts.
CWE-269 Oct 31, 2025
CVE-2025-52915 7.2 HIGH 2 PoCs Analysis EPSS 0.00
K7RKScan.sys 23.0.0.10 - Privilege Escalation
K7RKScan.sys 23.0.0.10, part of the K7 Security Anti-Malware suite, allows an admin-privileged user to send crafted IOCTL requests to terminate processes that are protected through a third-party implementation. This is caused by insufficient caller validation in the driver's IOCTL handler, enabling unauthorized processes to perform those actions in kernel space. Successful exploitation can lead to denial of service by disrupting critical third-party services or applications.
CWE-269 Sep 09, 2025
CVE-2025-6758 9.8 CRITICAL 3 PoCs Analysis EPSS 0.00
The Real Spaces - WordPress Properties Directory Theme <3.6 - Privi...
The Real Spaces - WordPress Properties Directory Theme theme for WordPress is vulnerable to privilege escalation via the 'imic_agent_register' function in all versions up to, and including, 3.6. This is due to a lack of restriction in the registration role. This makes it possible for unauthenticated attackers to arbitrarily choose their role, including the Administrator role, during user registration.
CWE-269 Aug 19, 2025
CVE-2013-10052 2 PoCs Analysis EPSS 0.02
ZPanel - Privilege Escalation
ZPanel includes a helper binary named zsudo, intended to allow restricted privilege escalation for administrative tasks. However, when misconfigured in /etc/sudoers, zsudo can be invoked by low-privileged users to execute arbitrary commands as root. This flaw enables local attackers with shell access to escalate privileges by writing a payload to a writable directory and executing it via zsudo. The vulnerability is particularly impactful in post-exploitation scenarios following web server compromise, where the attacker inherits access to zsudo.
CWE-269 Aug 04, 2025
CVE-2012-10022 2 PoCs Analysis EPSS 0.01
Kloxo <6.1.12 - Privilege Escalation
Kloxo versions 6.1.12 and earlier contain two setuid root binaries—lxsuexec and lxrestart—that allow local privilege escalation from uid 48. The lxsuexec binary performs a uid check and permits execution of arbitrary commands as root if the invoking user matches uid 48. This flaw enables attackers with Apache-level access to escalate privileges to root without authentication.
CWE-269 Aug 01, 2025
CVE-2025-52289 8.0 HIGH 2 PoCs Analysis EPSS 0.00
Magnussolution Magnusbilling - Improper Access Control
A Broken Access Control vulnerability in MagnusBilling v7.8.5.3 allows newly registered users to gain escalated privileges by sending a crafted request to /mbilling/index.php/user/save to set their account status fom "pending" to "active" without requiring administrator approval.
CWE-284 Jul 31, 2025
CVE-2016-15045 3 PoCs Analysis EPSS 0.01
lastore-daemon <0.9.66-1 - Privilege Escalation
A local privilege escalation vulnerability exists in lastore-daemon, the system package manager daemon used in Deepin Linux (developed by Wuhan Deepin Technology Co., Ltd.). In versions 0.9.53-1 (Deepin 15.5) and 0.9.66-1 (Deepin 15.7), the D-Bus configuration permits any user in the sudo group to invoke the InstallPackage method without password authentication. By default, the first user created on Deepin is in the sudo group. An attacker with shell access can craft a .deb package containing a malicious post-install script and use dbus-send to install it via lastore-daemon, resulting in arbitrary code execution as root.
CWE-269 Jul 23, 2025