CVE & Exploit Intelligence Database

Updated 4h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

338,223 CVEs tracked 53,274 with exploits 4,730 exploited in wild 1,542 CISA KEV 3,929 Nuclei templates 37,826 vendors 42,555 researchers
8,801 results Clear all
CVE-2025-68573 8.8 HIGH EPSS 0.00
Alessandro Piconi Simple Keyword to Link <=1.5 - CSRF
Cross-Site Request Forgery (CSRF) vulnerability in Alessandro Piconi Simple Keyword to Link simple-keyword-to-link allows Cross Site Request Forgery.This issue affects Simple Keyword to Link: from n/a through <= 1.5.
CWE-352 Dec 24, 2025
CVE-2025-68567 8.8 HIGH EPSS 0.00
wphocus My auctions allegro free edition <= 3.6.32 - CSRF
Cross-Site Request Forgery (CSRF) vulnerability in wphocus My auctions allegro my-auctions-allegro-free-edition allows Cross Site Request Forgery.This issue affects My auctions allegro: from n/a through <= 3.6.32.
CWE-352 Dec 24, 2025
CVE-2025-68529 8.8 HIGH EPSS 0.00
Rhys Wynne WP Email Capture <= 3.12.5 - CSRF
Cross-Site Request Forgery (CSRF) vulnerability in Rhys Wynne WP Email Capture wp-email-capture allows Cross Site Request Forgery.This issue affects WP Email Capture: from n/a through <= 3.12.5.
CWE-352 Dec 24, 2025
CVE-2025-67625 8.8 HIGH EPSS 0.00
tmtraderunner <3.15 - CSRF
Cross-Site Request Forgery (CSRF) vulnerability in tmtraderunner Trade Runner traderunner allows Cross Site Request Forgery.This issue affects Trade Runner: from n/a through <= 3.14.
CWE-352 Dec 24, 2025
CVE-2025-67622 8.8 HIGH EPSS 0.00
titopandub Evergreen Post Tweeter <=1.8.9 - CSRF
Cross-Site Request Forgery (CSRF) vulnerability in titopandub Evergreen Post Tweeter evergreen-post-tweeter allows Stored XSS.This issue affects Evergreen Post Tweeter: from n/a through <= 1.8.9.
CWE-352 Dec 24, 2025
CVE-2021-47722 3.5 LOW 1 PoC Analysis EPSS 0.00
Zucchetti Axess CLOKI Access Control 1.64 - CSRF
Zucchetti Axess CLOKI Access Control 1.64 contains a cross-site request forgery vulnerability that allows attackers to manipulate access control settings without user interaction. Attackers can craft malicious web pages with hidden forms to disable or modify access control parameters by tricking authenticated users into loading the page.
CWE-352 Dec 23, 2025
CVE-2025-14163 4.3 MEDIUM EPSS 0.00
Premium Addons for Elementor <4.11.53 - CSRF
The Premium Addons for Elementor plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 4.11.53. This is due to missing nonce validation in the 'insert_inner_template' function. This makes it possible for unauthenticated attackers to create arbitrary Elementor templates via a forged request granted they can trick a site administrator or other user with the edit_posts capability into performing an action such as clicking on a link.
CWE-352 Dec 23, 2025
CVE-2023-53961 4.3 MEDIUM 1 PoC Analysis EPSS 0.00
SOUND4 IMPACT/FIRST/PULSE/Eco v2.x - CSRF
SOUND4 IMPACT/FIRST/PULSE/Eco v2.x contains a cross-site request forgery vulnerability that allows attackers to perform administrative actions without user consent. Attackers can craft malicious web pages that submit HTTP requests to the radio processing interface, triggering unintended administrative operations when a logged-in user visits the page.
CWE-352 Dec 22, 2025
CVE-2025-62880 4.3 MEDIUM EPSS 0.00
Kunal Nagar Custom 404 Pro <3.12.0 - CSRF
Cross-Site Request Forgery (CSRF) vulnerability in Kunal Nagar Custom 404 Pro allows Cross Site Request Forgery.This issue affects Custom 404 Pro: from n/a through 3.12.0.
CWE-352 Dec 22, 2025
CVE-2025-62107 4.3 MEDIUM EPSS 0.00
PluginOps Feather <1.1.7 - CSRF
Cross-Site Request Forgery (CSRF) vulnerability in PluginOps Feather Login Page allows Cross Site Request Forgery.This issue affects Feather Login Page: from n/a through 1.1.7.
CWE-352 Dec 22, 2025
CVE-2025-13361 4.3 MEDIUM EPSS 0.00
Web to SugarCRM Lead plugin <1.0.0 - CSRF
The Web to SugarCRM Lead plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0.0. This is due to missing nonce validation on the custom field deletion functionality. This makes it possible for unauthenticated attackers to delete custom fields via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
CWE-352 Dec 21, 2025
CVE-2025-14734 5.4 MEDIUM EPSS 0.00
Amazon affiliate lite Plugin <1.0.0 - CSRF
The Amazon affiliate lite Plugin plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0.0. This is due to missing or incorrect nonce validation on the 'ADAL_settings_page' function. This makes it possible for unauthenticated attackers to update plugin settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
CWE-352 Dec 20, 2025
CVE-2025-14168 4.3 MEDIUM EPSS 0.00
WP DB Booster <1.0.2 - CSRF
The WP DB Booster plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0.1. This is due to missing nonce validation on the cleanup_all AJAX action. This makes it possible for unauthenticated attackers to delete database records including post drafts, revisions, comments, and metadata via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
CWE-352 Dec 20, 2025
CVE-2025-14164 4.3 MEDIUM EPSS 0.00
Quran Gateway <1.5 - CSRF
The Quran Gateway plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.5. This is due to missing nonce validation in the quran_gateway_options function. This makes it possible for unauthenticated attackers to modify the plugin's display settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
CWE-352 Dec 20, 2025
CVE-2025-13365 6.1 MEDIUM EPSS 0.00
WP Hallo Welt <1.4 - CSRF
The WP Hallo Welt plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.4. This is due to missing or incorrect nonce validation on the 'hallo_welt_seite' function. This makes it possible for unauthenticated attackers to update plugin settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. Due to the insufficient input sanitization and output escaping, this can lead to Stored Cross-Site Scripting.
CWE-352 Dec 20, 2025
CVE-2025-68481 5.9 MEDIUM 1 Writeup EPSS 0.00
Pypi Fastapi-users < 15.0.2 - Improper Authorization
FastAPI Users allows users to quickly add a registration and authentication system to their FastAPI project. Prior to version 15.0.2, the OAuth login state tokens are completely stateless and carry no per-request entropy or any data that could link them to the session that initiated the OAuth flow. `generate_state_token()` is always called with an empty `state_data` dict, so the resulting JWT only contains the fixed audience claim plus an expiration timestamp. On callback, the library merely checks that the JWT verifies under `state_secret` and is unexpired; there is no attempt to match the state value to the browser that initiated the OAuth request, no correlation cookie, and no server-side cache. Any attacker can hit `/authorize`, capture the server-generated state, finish the upstream OAuth flow with their own provider account, and then trick a victim into loading `.../callback?code=<attacker_code>&state=<attacker_state>`. Because the state JWT is valid for any client for \~1 hour, the victim’s browser will complete the flow. This leads to login CSRF. Depending on the app’s logic, the login CSRF can lead to an account takeover of the victim account or to the victim user getting logged in to the attacker's account. Version 15.0.2 contains a patch for the issue.
CWE-352 Dec 19, 2025
CVE-2025-66906 6.1 MEDIUM 1 Writeup EPSS 0.00
Turms - CSRF
Cross Site Request Forgery (CSRF) vulnerability in Turms Admin API thru v0.10.0-SNAPSHOT allows attackers to gain escalated privileges.
CWE-352 Dec 19, 2025
CVE-2025-1927 7.1 HIGH EPSS 0.00
Restajet Online Food Delivery System <19122025 - CSRF
Cross-Site Request Forgery (CSRF) vulnerability in Restajet Information Technologies Inc. Online Food Delivery System allows Cross Site Request Forgery.This issue affects Online Food Delivery System: through 19122025.
CWE-352 Dec 19, 2025
CVE-2025-59949 5.3 MEDIUM EPSS 0.00
Freshrss < 1.27.1 - CSRF
FreshRSS is a free, self-hostable RSS aggregator. Versions prior to 1.27.1 have a logout cross-site request forgery vulnerability that can lead to denial of service via <track src>. Version 1.27.1 patches the issue.
CWE-352 Dec 18, 2025
CVE-2025-68434 8.8 HIGH 1 PoC Analysis EPSS 0.00
Opensourcepos Open Source Point OF Sale < 3.4.2 - CSRF
Open Source Point of Sale (opensourcepos) is a web based point of sale application written in PHP using CodeIgniter framework. Starting in version 3.4.0 and prior to version 3.4.2, a Cross-Site Request Forgery (CSRF) vulnerability exists in the application's filter configuration. The CSRF protection mechanism was **explicitly disabled**, allowing the application to process state-changing requests (POST) without verifying a valid CSRF token. An unauthenticated remote attacker can exploit this by hosting a malicious web page. If a logged-in administrator visits this page, their browser is forced to send unauthorized requests to the application. A successful exploit allows the attacker to silently create a new Administrator account with full privileges, leading to a complete takeover of the system and loss of confidentiality, integrity, and availability. The vulnerability has been patched in version 3.4.2. The fix re-enables the CSRF filter in `app/Config/Filters.php` and resolves associated AJAX race conditions by adjusting token regeneration settings. As a workaround, administrators can manually re-enable the CSRF filter in `app/Config/Filters.php` by uncommenting the protection line. However, this is not recommended without applying the full patch, as it may cause functionality breakage in the Sales module due to token synchronization issues.
CWE-352 Dec 17, 2025