CVE & Exploit Intelligence Database

Updated 3h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

337,867 CVEs tracked 53,243 with exploits 4,725 exploited in wild 1,540 CISA KEV 3,925 Nuclei templates 37,802 vendors 42,500 researchers
4,084 results Clear all
CVE-2026-21881 9.1 CRITICAL 1 PoC 1 Writeup Analysis EPSS 0.00
Kanboard < 1.2.49 - Authentication Bypass
Kanboard is project management software focused on Kanban methodology. Versions 1.2.48 and below is vulnerable to a critical authentication bypass when REVERSE_PROXY_AUTH is enabled. The application blindly trusts HTTP headers for user authentication without verifying the request originated from a trusted reverse proxy. An attacker can impersonate any user, including administrators, by simply sending a spoofed HTTP header. This issue is fixed in version 1.2.49.
CWE-287 Jan 08, 2026
CVE-2025-15346 1 Writeup EPSS 0.00
Pypi Wolfssl < 5.8.4.post0 - Missing Authentication
A vulnerability in the handling of verify_mode = CERT_REQUIRED in the wolfssl Python package (wolfssl-py) causes client certificate requirements to not be fully enforced.  Because the WOLFSSL_VERIFY_FAIL_IF_NO_PEER_CERT flag was not included, the behavior effectively matched CERT_OPTIONAL: a peer certificate was verified if presented, but connections were incorrectly authenticated when no client certificate was provided.  This results in improper authentication, allowing attackers to bypass mutual TLS (mTLS) client authentication by omitting a client certificate during the TLS handshake.  The issue affects versions up to and including 5.8.2.
CWE-287 Jan 08, 2026
CVE-2026-21854 9.8 CRITICAL 1 Writeup EPSS 0.01
Tarkov Data Manager < 2025-01-02 - Authentication Bypass
The Tarkov Data Manager is a tool to manage the Tarkov item data. Prior to 02 January 2025, an authentication bypass vulnerability in the login endpoint allows any unauthenticated user to gain full admin access to the Tarkov Data Manager admin panel by exploiting a JavaScript prototype property access vulnerability, combined with loose equality type coercion. A series of fix commits on 02 January 2025 fixed this and other vulnerabilities.
CWE-287 Jan 07, 2026
CVE-2025-14942 9.8 CRITICAL EPSS 0.00
Wolfssh < 1.4.22 - Authentication Bypass
wolfSSH’s key exchange state machine can be manipulated to leak the client’s password in the clear, trick the client to send a bogus signature, or trick the client into skipping user authentication. This affects client applications with wolfSSH version 1.4.21 and earlier. Users of wolfSSH must update or apply the fix patch and it’s recommended to update credentials used. This fix is also recommended for wolfSSH server applications. While there aren’t any specific attacks on server applications, the same defect is present. Thanks to Aina Toky Rasoamanana of Valeo and Olivier Levillain of Telecom SudParis for the report.
CWE-287 Jan 06, 2026
CVE-2025-60534 9.8 CRITICAL 1 Writeup EPSS 0.00
Blue Access Cobalt v02.000.195 - Auth Bypass
Blue Access Cobalt v02.000.195 suffers from an authentication bypass vulnerability, which allows an attacker to selectively proxy requests in order to operate functionality on the web application without the need to authenticate with legitimate credentials.
CWE-287 Jan 06, 2026
CVE-2025-69197 6.5 MEDIUM 1 Writeup EPSS 0.00
Pterodactyl <1.11.11 - Info Disclosure
Pterodactyl is a free, open-source game server management panel. Versions 1.11.11 and below allow TOTP to be used multiple times during its validity window. Users with 2FA enabled are prompted to enter a token during sign-in, and afterward it is not sufficiently marked as used in the system. This allows an attacker who intercepts that token to use it in addition to a known username/password during the 60-second token validity window. The attacker must have intercepted a valid 2FA token (for example, during a screen share). This issue is fixed in version 1.12.0.
CWE-287 Jan 06, 2026
CVE-2025-64423 8.8 HIGH EPSS 0.00
Coollabs Coolify < 4.0.0 - Authentication Bypass
Coolify is an open-source and self-hostable tool for managing servers, applications, and databases. In Coolify versions up to and including v4.0.0-beta.434, a low privileged user (member) can see and use invitation links sent to an administrator. When they use the link before the legitimate recipient does, they are able to log in as an administrator, meaning they have successfully escalated their privileges. As of time of publication, it is unclear if a patch is available.
CWE-287 Jan 05, 2026
CVE-2026-21633 8.8 HIGH EPSS 0.00
UI Unifi Protect < 6.2.72 - Authentication Bypass
A malicious actor with access to the adjacent network could obtain unauthorized access to a UniFi Protect Camera by exploiting a discovery protocol vulnerability in the Unifi Protect Application (Version 6.1.79 and earlier). Affected Products: UniFi Protect Application (Version 6.1.79 and earlier). Mitigation: Update your UniFi Protect Application to Version 6.2.72 or later.
CWE-287 Jan 05, 2026
CVE-2026-0589 7.3 HIGH 1 Writeup EPSS 0.00
Fabian Online Product Reservation System - Authentication Bypass
A vulnerability was found in code-projects Online Product Reservation System 1.0. Impacted is an unknown function of the component Administration Backend. The manipulation results in improper authentication. The attack may be performed from remote. The exploit has been made public and could be used.
CWE-287 Jan 05, 2026
CVE-2025-15458 7.3 HIGH EPSS 0.00
1234n Minicms < 1.8 - Authentication Bypass
A vulnerability was determined in bg5sbk MiniCMS up to 1.8. This affects an unknown function of the file /mc-admin/post-edit.php of the component Article Handler. Executing a manipulation can lead to improper authentication. It is possible to launch the attack remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.
CWE-287 Jan 05, 2026
CVE-2025-15457 7.3 HIGH EPSS 0.00
1234n Minicms < 1.8 - Authentication Bypass
A vulnerability was found in bg5sbk MiniCMS up to 1.8. The impacted element is an unknown function of the file /minicms/mc-admin/post.php of the component Trash File Restore Handler. Performing a manipulation results in improper authentication. It is possible to initiate the attack remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
CWE-287 Jan 05, 2026
CVE-2025-15456 7.3 HIGH EPSS 0.00
1234n Minicms < 1.8 - Authentication Bypass
A vulnerability has been found in bg5sbk MiniCMS up to 1.8. The affected element is an unknown function of the file /mc-admin/page-edit.php of the component Publish Page Handler. Such manipulation leads to improper authentication. The attack may be performed from remote. The exploit has been disclosed to the public and may be used. The existence of this vulnerability is still disputed at present. The vendor was contacted early about this disclosure but did not respond in any way.
CWE-287 Jan 05, 2026
CVE-2025-15455 6.5 MEDIUM EPSS 0.00
1234n Minicms < 1.8 - Authentication Bypass
A flaw has been found in bg5sbk MiniCMS up to 1.8. Impacted is the function delete_page of the file /minicms/mc-admin/page.php of the component File Recovery Request Handler. This manipulation causes improper authentication. The attack is possible to be carried out remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
CWE-287 Jan 05, 2026
CVE-2025-67158 7.5 HIGH 1 PoC Analysis EPSS 0.00
Revotech I6032w-fhw Firmware - Authentication Bypass
An authentication bypass in the /cgi-bin/jvsweb.cgi endpoint of Revotech I6032W-FHW v1.0.0014 - 20210517 allows attackers to access sensitive information and escalate privileges via a crafted HTTP request.
CWE-287 Jan 02, 2026
CVE-2025-68926 9.8 CRITICAL 2 PoCs Analysis NUCLEI EPSS 0.07
RustFS <1.0.0-alpha.78 - Auth Bypass
RustFS is a distributed object storage system built in Rust. In versions prior to 1.0.0-alpha.78, RustFS implements gRPC authentication using a hardcoded static token `"rustfs rpc"` that is publicly exposed in the source code repository, hardcoded on both client and server sides, non-configurable with no mechanism for token rotation, and universally valid across all RustFS deployments. Any attacker with network access to the gRPC port can authenticate using this publicly known token and execute privileged operations including data destruction, policy manipulation, and cluster configuration changes. Version 1.0.0-alpha.78 contains a fix for the issue.
CWE-287 Dec 30, 2025
CVE-2025-65925 6.5 MEDIUM 1 PoC Analysis EPSS 0.00
Zeroheight <2025-06-13 - Info Disclosure
An issue was discovered in Zeroheight (SaaS) prior to 2025-06-13. A legacy user creation API pathway allowed accounts to be created without completing the intended email verification step. While unverified accounts could not access product functionality, the behavior bypassed intended verification controls and allowed unintended account creation. This could have enabled spam/fake account creation or resource usage impact. No data exposure or unauthorized access to existing accounts was reported.
CWE-287 Dec 30, 2025
CVE-2025-56333 9.8 CRITICAL EPSS 0.00
Pangolin < 1.7.0 - Authentication Bypass
An issue in Fossorial fosrl/pangolin v.1.6.2 and before allows a remote attacker to escalate privileges via the 2FA component
CWE-287 Dec 29, 2025
CVE-2025-15069 7.1 HIGH EPSS 0.00
Gmission Web Fax < 4.0 - Authentication Bypass
Improper Authentication vulnerability in Gmission Web Fax allows Privilege Escalation.This issue affects Web Fax: from 3.0 before 3.0.1
CWE-287 Dec 29, 2025
CVE-2025-15135 6.3 MEDIUM EPSS 0.00
joey-zhou xiaozhi-esp32-server-java <4.0.0 - Auth Bypass
A weakness has been identified in joey-zhou xiaozhi-esp32-server-java up to 3.0.0. This impacts the function tryAuthenticateWithCookies of the file AuthenticationInterceptor.java of the component Cookie Handler. Executing manipulation can lead to improper authentication. The attack can be launched remotely. The exploit has been made available to the public and could be exploited. Upgrading to version 4.0.0 will fix this issue. It is recommended to upgrade the affected component.
CWE-287 Dec 28, 2025
CVE-2025-15099 7.3 HIGH 1 Writeup EPSS 0.00
Sim < 0.5.27 - Authentication Bypass
A vulnerability was identified in simstudioai sim up to 0.5.27. This vulnerability affects unknown code of the file apps/sim/lib/auth/internal.ts of the component CRON Secret Handler. The manipulation of the argument INTERNAL_API_SECRET leads to improper authentication. It is possible to initiate the attack remotely. The exploit is publicly available and might be used. The identifier of the patch is e359dc2946b12ed5e45a0ec9c95ecf91bd18502a. Applying a patch is the recommended action to fix this issue.
CWE-287 Dec 26, 2025