CVE & Exploit Intelligence Database

Updated 5h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

337,847 CVEs tracked 53,242 with exploits 4,725 exploited in wild 1,540 CISA KEV 3,918 Nuclei templates 37,802 vendors 42,493 researchers
441 results Clear all
CVE-2025-9180 8.1 HIGH EPSS 0.00
Firefox <142 - SSRF
Same-origin policy bypass in the Graphics: Canvas2D component. This vulnerability affects Firefox < 142, Firefox ESR < 115.27, Firefox ESR < 128.14, Firefox ESR < 140.2, Thunderbird < 142, Thunderbird < 128.14, and Thunderbird < 140.2.
CWE-346 Aug 19, 2025
CVE-2025-52621 5.3 MEDIUM EPSS 0.00
Hcltech Bigfix Saas < 8.1.14 - Origin Validation Error
HCL BigFix SaaS Authentication Service is vulnerable to cache poisoning.  The BigFix SaaS's HTTP responses were observed to include the Origin header. Its presence alongside an unvalidated reflection of the Origin header value introduces a potential for cache poisoning.
CWE-346 Aug 15, 2025
CVE-2025-8881 6.5 MEDIUM EPSS 0.00
Google Chrome < 139.0.7258.127 - Origin Validation Error
Inappropriate implementation in File Picker in Google Chrome prior to 139.0.7258.127 allowed a remote attacker who convinced a user to engage in specific UI gestures to leak cross-origin data via a crafted HTML page. (Chromium security severity: Medium)
CWE-346 Aug 13, 2025
CVE-2025-53399 1 Writeup EPSS 0.00
Sipwise rtpengine <13.4.1.1 - Command Injection
In Sipwise rtpengine before 13.4.1.1, an origin-validation error in the endpoint-learning logic of the media-relay core allows remote attackers to inject or intercept RTP/SRTP media streams via RTP packets (except when the relay is configured for strict source and learning disabled). Version 13.4.1.1 fixes the heuristic mode by limiting exposure to the first five packets, and introduces a recrypt flag that fully prevents SRTP attacks when both mitigations are enabled.
CWE-346 Aug 01, 2025
CVE-2025-7365 7.1 HIGH EPSS 0.00
Redhat Keycloak < 26.0.13 - Origin Validation Error
A flaw was found in Keycloak. When an authenticated attacker attempts to merge accounts with another existing account during an identity provider (IdP) login, the attacker will subsequently be prompted to "review profile" information. This vulnerability allows the attacker to modify their email address to match that of a victim's account, triggering a verification email sent to the victim's email address. The attacker's email address is not present in the verification email content, making it a potential phishing opportunity. If the victim clicks the verification link, the attacker can gain access to the victim's account.
CWE-346 Jul 10, 2025
CVE-2025-53600 7.5 HIGH EPSS 0.00
Whale browser <4.32.315.22 - CSRF
Whale browser before 4.32.315.22 allow an attacker to bypass the Same-Origin Policy in a dual-tab environment.
CWE-346 Jul 04, 2025
CVE-2025-5824 7.5 HIGH EPSS 0.00
Autel MaxiCharger AC Wallbox Commercial - Auth Bypass
Autel MaxiCharger AC Wallbox Commercial Origin Validation Error Authentication Bypass Vulnerability. This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of Autel MaxiCharger AC Wallbox Commercial. An attacker must first obtain the ability to pair a malicious Bluetooth device with the target system in order to exploit this vulnerability. The specific flaw exists within the handling of bluetooth pairing requests. The issue results from insufficient validation of the origin of commands. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-26353.
CWE-346 Jun 25, 2025
CVE-2025-42998 5.3 MEDIUM EPSS 0.00
SAP Business One Integration Framework - Auth Bypass
The security settings in the SAP Business One Integration Framework are not adequately checked, allowing attackers to bypass the 403 Forbidden error and access restricted pages. This leads to low impact on confidentiality of the application, there is no impact on integrity and availability.
CWE-346 Jun 10, 2025
CVE-2024-31127 7.3 HIGH EPSS 0.00
Zscaler Client Connector <4.2.0.241 - Privilege Escalation
An improper verification of a loaded library in Zscaler Client Connector on Mac < 4.2.0.241 may allow a local attacker to elevate their privileges.
CWE-346 Jun 04, 2025
CVE-2025-30360 6.5 MEDIUM 1 Writeup EPSS 0.00
webpack-dev-server <5.2.1 - XSS
webpack-dev-server allows users to use webpack with a development server that provides live reloading. Prior to version 5.2.1, webpack-dev-server users' source code may be stolen when you access a malicious web site with non-Chromium based browser. The `Origin` header is checked to prevent Cross-site WebSocket hijacking from happening, which was reported by CVE-2018-14732. But webpack-dev-server always allows IP address `Origin` headers. This allows websites that are served on IP addresses to connect WebSocket. An attacker can obtain source code via a method similar to that used to exploit CVE-2018-14732. Version 5.2.1 contains a patch for the issue.
CWE-346 Jun 03, 2025
CVE-2025-30466 9.8 CRITICAL EPSS 0.00
Safari <18.4 - Open Redirect
This issue was addressed through improved state management. This issue is fixed in Safari 18.4, iOS 18.4 and iPadOS 18.4, visionOS 2.4, macOS Sequoia 15.4. A website may be able to bypass Same Origin Policy.
CWE-346 May 29, 2025
CVE-2025-5320 3.7 LOW EPSS 0.00
Pypi Gradio - Origin Validation Error
A vulnerability classified as problematic has been found in gradio-app gradio up to 5.29.1. This affects the function is_valid_origin of the component CORS Handler. The manipulation of the argument localhost_aliases leads to erweiterte Rechte. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
CWE-345 May 29, 2025
CVE-2025-5263 4.3 MEDIUM EPSS 0.00
Mozilla Firefox < 115.24.0 - Origin Validation Error
Error handling for script execution was incorrectly isolated from web content, which could have allowed cross-origin leak attacks. This vulnerability affects Firefox < 139, Firefox ESR < 115.24, Firefox ESR < 128.11, Thunderbird < 139, and Thunderbird < 128.11.
CWE-346 May 27, 2025
CVE-2025-4839 3.1 LOW 1 Writeup EPSS 0.00
Itwanger Paicoding - Permissive CORS Policy
A vulnerability has been found in itwanger paicoding 1.0.0/1.0.1/1.0.2/1.0.3 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /paicoding-core/src/main/java/com/github/paicoding/forum/core/util/CrossUtil.java. The manipulation leads to permissive cross-domain policy with untrusted domains. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used.
CWE-942 May 17, 2025
CVE-2025-46737 7.4 HIGH EPSS 0.00
SEL-5037 Grid Configurator - SSRF
SEL-5037 Grid Configurator contains an overly permissive Cross Origin Resource Sharing (CORS) configuration for a data gateway service in the application. This gateway service includes an API which is not properly configured to reject requests from unexpected sources.
CWE-346 May 12, 2025
CVE-2025-4542 3.1 LOW 1 Writeup EPSS 0.00
Freeebird Hotel < 1.2 - Permissive CORS Policy
A vulnerability, which was classified as problematic, has been found in Freeebird Hotel 酒店管理系统 API up to 1.2. Affected by this issue is some unknown functionality of the file /src/main/java/cn/mafangui/hotel/tool/SessionInterceptor.java. The manipulation leads to permissive cross-domain policy with untrusted domains. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used.
CWE-942 May 11, 2025
CVE-2025-4515 4.3 MEDIUM EPSS 0.00
Pribai Privategpt < 0.6.2 - Permissive CORS Policy
A vulnerability, which was classified as problematic, was found in Zylon PrivateGPT up to 0.6.2. This affects an unknown part of the file settings.yaml. The manipulation of the argument allow_origins leads to permissive cross-domain policy with untrusted domains. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
CWE-942 May 10, 2025
CVE-2025-3462 EPSS 0.00
ASUS DriverHub - SSRF
"This issue is limited to motherboards and does not affect laptops, desktop computers, or other endpoints." An insufficient validation in ASUS DriverHub may allow unauthorized sources to interact with the software's features via crafted HTTP requests. Refer to the 'Security Update for ASUS DriverHub' section on the ASUS Security Advisory for more information.
CWE-346 May 09, 2025
CVE-2025-43929 4.1 MEDIUM 1 PoC Analysis EPSS 0.00
Kovidgoyal Kitty < 0.41.0 - Origin Validation Error
open_actions.py in kitty before 0.41.0 does not ask for user confirmation before running a local executable file that may have been linked from an untrusted document (e.g., a document opened in KDE ghostwriter).
CWE-346 Apr 20, 2025
CVE-2025-3651 EPSS 0.00
Work Desktop for Mac <10.8.2.33 - RCE
Improper Verification of Source of a Communication Channel in Work Desktop for Mac versions 10.8.1.46 and earlier allows attackers to execute arbitrary commands via unauthorized access to the Agent service.  This has been remediated in Work Desktop for Mac version 10.8.2.33.
CWE-346 Apr 17, 2025