CVE & Exploit Intelligence Database

Updated 4h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

337,847 CVEs tracked 53,242 with exploits 4,725 exploited in wild 1,540 CISA KEV 3,918 Nuclei templates 37,802 vendors 42,493 researchers
4,084 results Clear all
CVE-2026-3053 7.3 HIGH EPSS 0.00
DataLinkDC dinky <1.2.5 - Auth Bypass
A vulnerability was determined in DataLinkDC dinky up to 1.2.5. This affects the function addInterceptors of the file dinky-admin/src/main/java/org/dinky/configure/AppConfig.java of the component OpenAPI Endpoint. Executing a manipulation can lead to missing authentication. It is possible to launch the attack remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.
CWE-306 Feb 24, 2026
CVE-2026-27197 9.1 CRITICAL EPSS 0.00
Sentry 21.12.0-26.1.0 - Auth Bypass
Sentry is a developer-first error tracking and performance monitoring tool. Versions 21.12.0 through 26.1.0 have a critical vulnerability in its SAML SSO implementation which allows an attacker to take over any user account by using a malicious SAML Identity Provider and another organization on the same Sentry instance. Self-hosted users are only at risk if the following criteria is met: ore than one organizations are configured (SENTRY_SINGLE_ORGANIZATION = True), or malicious user has existing access and permissions to modify SSO settings for another organization in a multo-organization instance. This issue has been fixed in version 26.2.0. To workaround this issue, implement user account-based two-factor authentication to prevent an attacker from being able to complete authentication with a victim's user account. Organization administrators cannot do this on a user's behalf, this requires individual users to ensure 2FA has been enabled for their account.
CWE-287 Feb 21, 2026
CVE-2026-27134 8.1 HIGH EPSS 0.00
Strimzi 0.49.0-0.50.0 - Auth Bypass
Strimzi provides a way to run an Apache Kafka cluster on Kubernetes or OpenShift in various deployment configurations. In versions 0.49.0 through 0.50.0, when using a custom Cluster or Clients CA with a multistage CA chain consisting of multiple CAs, Strimzi incorrectly configures the trusted certificates for mTLS authentication on the internal as well as user-configured listeners. All CAs from the CA chain will be trusted. And users with certificates signed by any of the CAs in the chain will be able to authenticate. This issue affects only users using a custom Cluster or Clients CA with a multistage CA chain consisting of multiple CAs. It does not affect users using the Strimzi-managed Cluster and Clients CAs. It also does not affect users using custom Cluster or Clients CA with only a single CA (i.e., no CA chain with multiple CAs). This issue has been fixed in version 0.50.1. To workaround this issue, instead of providing the full CA chain as the custom CA, users can provide only the single CA that should be used.
CWE-296 Feb 21, 2026
CVE-2025-70833 9.4 CRITICAL EPSS 0.00
Smanga 3.2.7 - Auth Bypass
An Authentication Bypass vulnerability in Smanga 3.2.7 allows an unauthenticated attacker to reset the password of any user (including the administrator) and fully takeover the account by manipulating POST parameters. The issue stems from insecure permission validation in check-power.php.
CWE-639 Feb 20, 2026
CVE-2025-41023 EPSS 0.00
AutoGPT - Auth Bypass
An authentication bypass vulnerability has been found in Thesamur's AutoGPT. This vulnerability allows an attacker to bypass authentication mechanisms. Once inside the web application, the attacker can use any of its features regardless of the authorisation method used.
CWE-287 Feb 19, 2026
CVE-2025-15586 1 Writeup EPSS 0.00
OGP-Website <52f865a - Auth Bypass
OGP-Website installs prior git commit 52f865a4fba763594453068acf8fa9e3fc38d663 are affected by a type juggling flaw which if exploited can result in authentication bypass without knowledge of the victim account's password.
CWE-287 Feb 19, 2026
CVE-2025-15581 EPSS 0.00
Orthanc <1.12.10 - Privilege Escalation
Orthanc versions before 1.12.10 are affected by an authorisation logic flaw in the application's HTTP Basic Authentication implementation. Successful exploitation could result in Privilege Escalation, potentially allowing full administrative access.
CWE-287 Feb 18, 2026
CVE-2025-7630 5.3 MEDIUM EPSS 0.00
Wispotter <2025.10.08.1 - Auth Bypass
Improper Restriction of Excessive Authentication Attempts, Improper Authentication vulnerability in Doruk Communication and Automation Industry and Trade Inc. Wispotter allows Password Brute Forcing, Brute Force.This issue affects Wispotter: from 1.0 before v2025.10.08.1.
CWE-307 Feb 18, 2026
CVE-2026-1368 7.5 HIGH EPSS 0.00
Zoom WordPress Plugin <4.6.6 - Auth Bypass
The Video Conferencing with Zoom WordPress plugin before 4.6.6 contains an AJAX handler that has its nonce verification commented out, allowing unauthenticated attackers to generate valid Zoom SDK signatures for any meeting ID and retrieve the site's Zoom SDK key.
CWE-287 Feb 18, 2026
CVE-2026-26119 8.8 HIGH EPSS 0.00
Windows Admin Center - Privilege Escalation
Improper authentication in Windows Admin Center allows an authorized attacker to elevate privileges over a network.
CWE-287 Feb 17, 2026
CVE-2026-25922 8.8 HIGH EPSS 0.00
authentik <2025.8.6, 2025.10.4, 2025.12.4 - SSRF
authentik is an open-source identity provider. Prior to 2025.8.6, 2025.10.4, and 2025.12.4, when using a SAML Source that has the option Verify Assertion Signature under Verification Certificate enabled and not Verify Response Signature, or does not have the Encryption Certificate setting under Advanced Protocol settings configured, it was possible for an attacker to inject a malicious assertion before the signed assertion that authentik would use instead. authentik 2025.8.6, 2025.10.4, and 2025.12.4 fix this issue.
CWE-347 Feb 12, 2026
CVE-2026-25748 8.6 HIGH EPSS 0.00
authentik <2025.10.4, <2025.12.4 - Auth Bypass
authentik is an open-source identity provider. Prior to 2025.10.4 and 2025.12.4, with a malformed cookie it was possible to bypass authentication when using forward authentication in the authentik Proxy Provider when used in conjunction with Traefik or Caddy as reverse proxy. When a malicious cookie was used, none of the authentik-specific X-Authentik-* headers were set which depending on application can grant access to an attacker. authentik 2025.10.4 and 2025.12.4 fix this issue.
CWE-287 Feb 12, 2026
CVE-2026-20655 5.5 MEDIUM EPSS 0.00
iOS <26.3-18.7.5 - Info Disclosure
An authorization issue was addressed with improved state management. This issue is fixed in iOS 26.3 and iPadOS 26.3, iOS 18.7.5 and iPadOS 18.7.5. An attacker with physical access to a locked device may be able to view sensitive user information.
CWE-287 Feb 11, 2026
CVE-2025-68663 5.3 MEDIUM EPSS 0.00
Outline <1.1.0 - SSRF
Outline is a service that allows for collaborative documentation. Prior to 1.1.0, a vulnerability was found in Outline's WebSocket authentication mechanism that allows suspended users to maintain or establish real-time WebSocket connections and continue receiving sensitive operational updates after their account has been suspended. This vulnerability is fixed in 1.1.0.
CWE-287 Feb 11, 2026
CVE-2025-65128 8.1 HIGH EPSS 0.00
Shenzhen Zhibotong Electronics ZBT WE2001 23.09.27 - Auth Bypass
A missing authentication mechanism in the web management API components of Shenzhen Zhibotong Electronics ZBT WE2001 23.09.27 allows unauthenticated attackers on the local network to modify router and network configurations. By invoking operations whose names end with "*_nocommit" and supplying the parameters expected by the invoked function, an attacker can change configuration data, including SSID, Wi-Fi credentials, and administrative passwords, without authentication or an existing session.
CWE-287 Feb 11, 2026
CVE-2025-65127 6.5 MEDIUM EPSS 0.00
Shenzhen Zhibotong Electronics ZBT WE2001 23.09.27 - Info Disclosure
A lack of session validation in the web API component of Shenzhen Zhibotong Electronics ZBT WE2001 23.09.27 allows remote unauthenticated attackers to access administrative information-retrieval functions intended for authenticated users. By invoking "get_*" operations, attackers can obtain device configuration data, including plaintext credentials, without authentication or an existing session.
CWE-287 Feb 11, 2026
CVE-2026-2249 9.8 CRITICAL 2 PoCs Analysis EPSS 0.00
METIS DFS <oscore 2.1.234-r18 - RCE
METIS DFS devices (versions <= oscore 2.1.234-r18) expose a web-based shell at the /console endpoint that does not require authentication. Accessing this endpoint allows a remote attacker to execute arbitrary operating system commands with 'daemon' privileges. This results in the compromise of the software, granting unauthorized access to modify configuration, read and alter sensitive data, or disrupt services.
CWE-306 Feb 11, 2026
CVE-2026-2248 9.8 CRITICAL 1 PoC Analysis EPSS 0.00
METIS WIC <= oscore 2.1.234-r18 - RCE
METIS WIC devices (versions <= oscore 2.1.234-r18) expose a web-based shell at the /console endpoint that does not require authentication. Accessing this endpoint allows a remote attacker to execute arbitrary operating system commands with root (UID 0) privileges. This results in full system compromise, allowing unauthorized access to modify system configuration, read sensitive data, or disrupt device operations
CWE-306 Feb 11, 2026
CVE-2026-21508 7.0 HIGH 1 PoC Analysis EPSS 0.00
Microsoft Windows 10 1607 < 10.0.14393.8868 - Authentication Bypass
Improper authentication in Windows Storage allows an authorized attacker to elevate privileges locally.
CWE-287 Feb 10, 2026
CVE-2026-23906 9.8 CRITICAL 1 PoC Analysis EPSS 0.00
Apache Druid <36.0.0 - Auth Bypass
Affected Products and Versions * Apache Druid * Affected Versions: 0.17.0 through 35.x (all versions prior to 36.0.0) * Prerequisites: * druid-basic-security extension enabled * LDAP authenticator configured * Underlying LDAP server permits anonymous bind                                                                                                                                                    Vulnerability Description An authentication bypass vulnerability exists in Apache Druid when using the druid-basic-security extension with LDAP authentication. If the underlying LDAP server is configured to allow anonymous binds, an attacker can bypass authentication by providing an existing username with an empty password. This allows unauthorized access to otherwise restricted Druid resources without valid credentials. The vulnerability stems from improper validation of LDAP authentication responses when anonymous binds are permitted, effectively treating anonymous bind success as valid user authentication. Impact A remote, unauthenticated attacker can: * Gain unauthorized access to the Apache Druid cluster * Access sensitive data stored in Druid datasources * Execute queries and potentially manipulate data * Access administrative interfaces if the bypassed account has elevated privileges * Completely compromise the confidentiality, integrity, and availability of the Druid deployment                                                                                                                                                                                     Mitigation   Immediate Mitigation (No Druid Upgrade Required):                                                                                                                                                   * Disable anonymous bind on your LDAP server. This prevents the vulnerability from being exploitable and is the recommended immediate action. Resolution * Upgrade Apache Druid to version 36.0.0 or later, which includes fixes to properly reject anonymous LDAP bind attempts.
CWE-287 Feb 10, 2026