CVE & Exploit Intelligence Database

Updated 1h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

338,223 CVEs tracked 53,274 with exploits 4,730 exploited in wild 1,542 CISA KEV 3,929 Nuclei templates 37,826 vendors 42,563 researchers
2,435 results Clear all
CVE-2025-50460 9.8 CRITICAL 1 PoC Analysis EPSS 0.03
ms-swift 3.3.0 - RCE
A remote code execution (RCE) vulnerability exists in the ms-swift project version 3.3.0 due to unsafe deserialization in tests/run.py using yaml.load() from the PyYAML library (versions = 5.3.1). If an attacker can control the content of the YAML configuration file passed to the --run_config parameter, arbitrary code can be executed during deserialization. This can lead to full system compromise. The vulnerability is triggered when a malicious YAML file is loaded, allowing the execution of arbitrary Python commands such as os.system(). It is recommended to upgrade PyYAML to version 5.4 or higher, and to use yaml.safe_load() to mitigate the issue.
CWE-502 Aug 01, 2025
CVE-2025-49083 7.2 HIGH EPSS 0.00
Absolute Secure Access < 13.56 - Insecure Deserialization
CVE-2025-49083 is a vulnerability in the management console of Absolute Secure Access after version 12.00 and prior to version 13.56. Attackers with administrative access to the console can cause unsafe content to be deserialized and executed in the security context of the console. The attack complexity is low and there are no attack requirements. Privileges required are high and there is no user interaction required. The impact to confidentiality is low, impact to integrity is high and there is no impact to availability. The impact to the confidentiality and integrity of subsequent systems is low and there is no subsequent system impact to availability.
CWE-502 Jul 31, 2025
CVE-2025-25692 6.5 MEDIUM 1 Writeup EPSS 0.00
Prestashop - Command Injection
A PHAR deserialization vulnerability in the _getHeaders function of PrestaShop v8.2.0 allows attackers to execute arbitrary code via a crafted POST request.
CWE-502 Jul 30, 2025
CVE-2025-25691 6.5 MEDIUM 1 Writeup EPSS 0.00
Prestashop - Command Injection
A PHAR deserialization vulnerability in the component /themes/import of PrestaShop v8.2.0 allows attackers to execute arbitrary code via a crafted POST request.
CWE-502 Jul 30, 2025
CVE-2025-53078 8.0 HIGH EPSS 0.00
Samsung Data Management Server Firmware - Insecure Deserialization
Deserialization of Untrusted Data in Samsung DMS(Data Management Server) allows attackers to execute arbitrary code via write file to system
CWE-502 Jul 29, 2025
CVE-2025-8266 6.3 MEDIUM 2 PoCs Analysis NUCLEI EPSS 0.01
Chancms < 3.1.3 - Insecure Deserialization
A vulnerability has been found in yanyutao0402 ChanCMS up to 3.1.2 and classified as critical. Affected by this vulnerability is the function getArticle of the file app/modules/cms/controller/collect.js. The manipulation of the argument targetUrl leads to deserialization. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 3.1.3 is able to address this issue. It is recommended to upgrade the affected component.
CWE-502 Jul 28, 2025
CVE-2025-8227 6.3 MEDIUM 2 PoCs EPSS 0.00
Chancms < 3.1.3 - Insecure Deserialization
A vulnerability was found in yanyutao0402 ChanCMS up to 3.1.2. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /collect/getArticle. The manipulation of the argument taskUrl leads to deserialization. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 3.1.3 is able to address this issue. The patch is named 33d9bb464353015aaaba84e27638ac9a3912795d. It is recommended to upgrade the affected component.
CWE-502 Jul 27, 2025
CVE-2025-54366 8.8 HIGH 1 Writeup EPSS 0.04
Freescout < 1.8.86 - Insecure Deserialization
FreeScout is a lightweight free open source help desk and shared inbox built with PHP (Laravel framework). In versions 1.8.185 and below, there is a critical deserialization vulnerability in the /conversation/ajax endpoint that allows authenticated users with knowledge of the APP_KEY to achieve remote code execution. The vulnerability occurs when the application processes the attachments_all and attachments POST parameters through the insecure Helper::decrypt() function, which performs unsafe deserialization of user-controlled data without proper validation. This flaw enables attackers to create arbitrary objects and manipulate their properties, leading to complete compromise of the web application. This is fixed in version 1.8.186.
CWE-502 Jul 26, 2025
CVE-2025-26397 7.8 HIGH EPSS 0.00
Solarwinds Observability Self-hosted - Insecure Deserialization
SolarWinds Observability Self-Hosted is susceptible to Deserialization of Untrusted Data Local Privilege Escalation vulnerability. An attacker with low privileges can escalate privileges to run malicious files copied to a permission-protected folder. This vulnerability requires authentication from a low-level account and local access to the host server.
CWE-502 Jul 24, 2025
CVE-2025-4393 6.5 MEDIUM EPSS 0.00
Medtronic MyCareLink Patient Monitor <June 25, 2025 - Use After Free
Medtronic MyCareLink Patient Monitor has an internal service that deserializes data, which allows a local attacker to interact with the service by crafting a binary payload to crash the service or elevate privileges. This issue affects MyCareLink Patient Monitor models 24950 and 24952: before June 25, 2025
CWE-502 Jul 24, 2025
CVE-2016-15044 3 PoCs Analysis EPSS 0.64
Kaltura <11.1.0-2 - Code Injection
A remote code execution vulnerability exists in Kaltura versions prior to 11.1.0-2 due to unsafe deserialization of user-controlled data within the keditorservices module. An unauthenticated remote attacker can exploit this issue by sending a specially crafted serialized PHP object in the kdata GET parameter to the redirectWidgetCmd endpoint. Successful exploitation leads to execution of arbitrary PHP code in the context of the web server process.
CWE-502 Jul 23, 2025
CVE-2025-43489 5.2 MEDIUM EPSS 0.00
Poly Clariti Manager <10.12.1 - Deserialization
A potential security vulnerability has been identified in the Poly Clariti Manager for versions prior to 10.12.1. The vulnerability could deserialize untrusted data without validation. HP has addressed the issue in the latest software update.
CWE-502 Jul 23, 2025
CVE-2025-7916 9.8 CRITICAL EPSS 0.02
WinMatrix3 - Code Injection
WinMatrix3 developed by Simopro Technology has an Insecure Deserialization vulnerability, allowing unauthenticated remote attackers to execute arbitrary code on the server by sending maliciously crafted serialized contents.
CWE-502 Jul 21, 2025
CVE-2025-7876 6.3 MEDIUM 1 Writeup EPSS 0.00
MetaCRM <6.4.2 - Deserialization
A vulnerability classified as critical was found in Metasoft 美特软件 MetaCRM up to 6.4.2. This vulnerability affects the function AnalyzeParam of the file download.jsp. The manipulation of the argument p leads to deserialization. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
CWE-502 Jul 20, 2025
CVE-2025-53770 9.8 CRITICAL KEV RANSOMWARE 49 PoCs Analysis NUCLEI EPSS 0.90
Microsoft SharePoint Server - Code Injection
Deserialization of untrusted data in on-premises Microsoft SharePoint Server allows an unauthorized attacker to execute code over a network. Microsoft is aware that an exploit for CVE-2025-53770 exists in the wild. Microsoft is preparing and fully testing a comprehensive update to address this vulnerability. In the meantime, please make sure that the mitigation provided in this CVE documentation is in place so that you are protected from exploitation.
CWE-502 Jul 20, 2025
CVE-2025-7697 9.8 CRITICAL EPSS 0.02
WordPress Plugin - Code Injection
The Integration for Google Sheets and Contact Form 7, WPForms, Elementor, Ninja Forms plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.1.1 via deserialization of untrusted input within the verify_field_val() function. This makes it possible for unauthenticated attackers to inject a PHP Object. The additional presence of a POP chain in the Contact Form 7 plugin, which is likely to be used alongside, allows attackers to delete arbitrary files, leading to a denial of service or remote code execution when the wp-config.php file is deleted.
CWE-502 Jul 19, 2025
CVE-2025-7696 9.8 CRITICAL EPSS 0.02
WordPress Plugin <1.2.3 - Code Injection
The Integration for Pipedrive and Contact Form 7, WPForms, Elementor, Ninja Forms plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.2.3 via deserialization of untrusted input within the verify_field_val() function. This makes it possible for unauthenticated attackers to inject a PHP Object. The additional presence of a POP chain in the Contact Form 7 plugin, which is likely to be used alongside, allows attackers to delete arbitrary files, leading to a denial of service or remote code execution when the wp-config.php file is deleted.
CWE-502 Jul 19, 2025
CVE-2025-7433 8.8 HIGH EPSS 0.00
Sophos Intercept X for Windows <2025.1 - Privilege Escalation
A local privilege escalation vulnerability in Sophos Intercept X for Windows with Central Device Encryption 2025.1 and older allows arbitrary code execution.
CWE-502 Jul 17, 2025
CVE-2025-31422 8.8 HIGH EPSS 0.00
designthemes Visual Art | Gallery WP <2.4 - Code Injection
Deserialization of Untrusted Data vulnerability in designthemes Visual Art | Gallery WordPress Theme allows Object Injection. This issue affects Visual Art | Gallery WordPress Theme: from n/a through 2.4.
CWE-502 Jul 16, 2025
CVE-2025-30973 9.8 CRITICAL EPSS 0.00
CoSchool LMS <1.4.3 - Object Injection
Deserialization of Untrusted Data vulnerability in Codexpert, Inc CoSchool LMS allows Object Injection. This issue affects CoSchool LMS: from n/a through 1.4.3.
CWE-502 Jul 16, 2025