CVE & Exploit Intelligence Database

Updated 3h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

338,223 CVEs tracked 53,274 with exploits 4,730 exploited in wild 1,542 CISA KEV 3,929 Nuclei templates 37,826 vendors 42,563 researchers
2,435 results Clear all
CVE-2025-30949 9.8 CRITICAL EPSS 0.00
Guru Team Site Chat <1.0.4 - Code Injection
Deserialization of Untrusted Data vulnerability in Guru Team Site Chat on Telegram allows Object Injection. This issue affects Site Chat on Telegram: from n/a through 1.0.4.
CWE-502 Jul 16, 2025
CVE-2025-28961 9.8 CRITICAL EPSS 0.00
Md Yeasin Ul Haider URL Shortener <3.0.7 - Object Injection
Deserialization of Untrusted Data vulnerability in Md Yeasin Ul Haider URL Shortener allows Object Injection. This issue affects URL Shortener: from n/a through 3.0.7.
CWE-502 Jul 16, 2025
CVE-2025-24779 8.8 HIGH EPSS 0.00
NooTheme Yogi <2.9.0 - Code Injection
Deserialization of Untrusted Data vulnerability in NooTheme Yogi allows Object Injection. This issue affects Yogi: from n/a through 2.9.0.
CWE-502 Jul 16, 2025
CVE-2025-24777 8.8 HIGH EPSS 0.00
awethemes Hillter <3.0.7 - Object Injection
Deserialization of Untrusted Data vulnerability in awethemes Hillter allows Object Injection. This issue affects Hillter: from n/a through 3.0.7.
CWE-502 Jul 16, 2025
CVE-2025-53990 7.2 HIGH EPSS 0.00
JetFormBuilder <3.5.1.2 - Object Injection
Deserialization of Untrusted Data vulnerability in jetmonsters JetFormBuilder allows Object Injection. This issue affects JetFormBuilder: from n/a through 3.5.1.2.
CWE-502 Jul 16, 2025
CVE-2025-49841 9.8 CRITICAL 1 Writeup EPSS 0.00
Rvc-boss Gpt-sovits-webui < 20250228v3 - Insecure Deserialization
GPT-SoVITS-WebUI is a voice conversion and text-to-speech webUI. In versions 20250228v3 and prior, there is an unsafe deserialization vulnerability in process_ckpt.py. The SoVITS_dropdown variable takes user input and passes it to the load_sovits_new function in process_ckpt.py. In load_sovits_new, the user input, here sovits_path is used to load a model with torch.load, leading to unsafe deserialization. At time of publication, no known patched versions are available.
CWE-502 Jul 15, 2025
CVE-2025-49840 9.8 CRITICAL 1 Writeup EPSS 0.00
Rvc-boss Gpt-sovits-webui < 20250228v3 - Insecure Deserialization
GPT-SoVITS-WebUI is a voice conversion and text-to-speech webUI. In versions 20250228v3 and prior, there is an unsafe deserialization vulnerability in inference_webui.py. The GPT_dropdown variable takes user input and passes it to the change_gpt_weights function. In change_gpt_weights, the user input, here gpt_path is used to load a model with torch.load, leading to unsafe deserialization. At time of publication, no known patched versions are available.
CWE-502 Jul 15, 2025
CVE-2025-49839 9.8 CRITICAL 1 Writeup EPSS 0.00
Rvc-boss Gpt-sovits-webui < 20250228v3 - Insecure Deserialization
GPT-SoVITS-WebUI is a voice conversion and text-to-speech webUI. In versions 20250228v3 and prior, there is an unsafe deserialization vulnerability in bsroformer.py. The model_choose variable takes user input (e.g. a path to a model) and passes it to the uvr function. In uvr, a new instance of Roformer_Loader class is created with the model_path attribute containing the aformentioned user input (here called locally model_name). Note that in this step the .ckpt extension is added to the path. In the Roformer_Loader class, the user input, here called model_path, is used to load the model on that path with torch.load, which can lead to unsafe deserialization. At time of publication, no known patched versions are available.
CWE-502 Jul 15, 2025
CVE-2025-49838 9.8 CRITICAL 1 Writeup EPSS 0.00
Rvc-boss Gpt-sovits-webui < 20250228v3 - Insecure Deserialization
GPT-SoVITS-WebUI is a voice conversion and text-to-speech webUI. In versions 20250228v3 and prior, there is an unsafe deserialization vulnerability in vr.py AudioPreDeEcho. The model_choose variable takes user input (e.g. a path to a model) and passes it to the uvr function. In uvr, a new instance of AudioPreDeEcho class is created with the model_path attribute containing the aforementioned user input (here called locally model_name). Note that in this step the .pth extension is added to the path. In the AudioPreDeEcho class, the user input, here called model_path, is used to load the model on that path with torch.load, which can lead to unsafe deserialization. At time of publication, no known patched versions are available.
CWE-502 Jul 15, 2025
CVE-2025-49837 9.8 CRITICAL 1 Writeup EPSS 0.00
Rvc-boss Gpt-sovits-webui < 20250228v3 - Insecure Deserialization
GPT-SoVITS-WebUI is a voice conversion and text-to-speech webUI. In versions 20250228v3 and prior, there is an unsafe deserialization vulnerability in vr.py AudioPre. The model_choose variable takes user input (e.g. a path to a model) and passes it to the uvr function. In uvr, a new instance of AudioPre class is created with the model_path attribute containing the aforementioned user input (here called locally model_name). Note that in this step the .pth extension is added to the path. In the AudioPre class, the user input, here called model_path, is used to load the model on that path with torch.load, which can lead to unsafe deserialization. At time of publication, no known patched versions are available.
CWE-502 Jul 15, 2025
CVE-2025-30761 5.9 MEDIUM EPSS 0.00
Oracle Jre - Insecure Deserialization
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Scripting). Supported versions that are affected are Oracle Java SE: 8u451, 8u451-perf and 11.0.27; Oracle GraalVM Enterprise Edition: 21.3.14. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).
CWE-502 Jul 15, 2025
CVE-2025-7504 7.5 HIGH EPSS 0.01
Friends WordPress Plugin 3.5.1 - Code Injection
The Friends plugin for WordPress is vulnerable to PHP Object Injection in version 3.5.1 via deserialization of untrusted input of the query_vars parameter This makes it possible for authenticated attackers, with subscriber-level access and above, to inject a PHP Object. No known POP chain is present in the vulnerable software, which means this vulnerability has no impact unless another plugin or theme containing a POP chain is installed on the site. If a POP chain is present via an additional plugin or theme installed on the target system, it may allow the attacker to perform actions like delete arbitrary files, retrieve sensitive data, or execute code depending on the POP chain present. This requires access to the sites SALT_NONCE and and SALT_KEY to exploit.
CWE-502 Jul 12, 2025
CVE-2025-30025 7.8 HIGH EPSS 0.00
Server Process - Privilege Escalation
The communication protocol used between the server process and the service control had a flaw that could lead to a local privilege escalation.
CWE-502 Jul 11, 2025
CVE-2025-30023 9.0 CRITICAL EPSS 0.02
Client-Server - Authenticated RCE
The communication protocol used between client and server had a flaw that could lead to an authenticated user performing a remote code execution attack.
CWE-502 Jul 11, 2025
CVE-2025-6742 7.5 HIGH EPSS 0.01
Brainstormforce Sureforms < 0.0.14 - Insecure Deserialization
The SureForms – Drag and Drop Form Builder for WordPress plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.7.3 via the use of file_exists() in the delete_entry_files() function without restriction on the path provided. This makes it possible for unauthenticated attackers to inject a PHP Object. No known POP chain is present in the vulnerable software, which means this vulnerability has no impact unless another plugin or theme containing a POP chain is installed on the site. If a POP chain is present via an additional plugin or theme installed on the target system, it may allow the attacker to perform actions like delete arbitrary files, retrieve sensitive data, or execute code depending on the POP chain present.
CWE-502 Jul 09, 2025
CVE-2025-7216 7.3 HIGH EPSS 0.00
lty628 Aidigu <1.8.2 - Deserialization
A vulnerability, which was classified as critical, was found in lty628 Aidigu up to 1.8.2. This affects the function checkUserCookie of the file /application/common.php of the component PHP Object Handler. The manipulation of the argument rememberMe leads to deserialization. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
CWE-502 Jul 09, 2025
CVE-2025-49533 9.8 CRITICAL EXPLOITED NUCLEI EPSS 0.48
Adobe Experience Manager < 6.5.23.0 - Insecure Deserialization
Adobe Experience Manager (MS) versions 6.5.23.0 and earlier are affected by a Deserialization of Untrusted Data vulnerability that could lead to arbitrary code execution by an attacker. Exploitation of this issue does not require user interaction. Scope is unchanged.
CWE-502 Jul 08, 2025
CVE-2025-27203 9.6 CRITICAL EPSS 0.15
Adobe Connect <24.0 - Code Injection
Adobe Connect versions 24.0 and earlier are affected by a Deserialization of Untrusted Data vulnerability that could lead to arbitrary code execution by an attacker. Exploitation of this issue does require user interaction and scope is changed.
CWE-502 Jul 08, 2025
CVE-2025-47994 7.8 HIGH EPSS 0.00
Microsoft 365 Apps - Insecure Deserialization
Deserialization of untrusted data in Microsoft Office allows an unauthorized attacker to elevate privileges locally.
CWE-502 Jul 08, 2025
CVE-2025-42980 9.1 CRITICAL EPSS 0.00
SAP NetWeaver Enterprise Portal Federated Portal Network - Deserial...
SAP NetWeaver Enterprise Portal Federated Portal Network is vulnerable when a privileged user can upload untrusted or malicious content which, when deserialized, could potentially lead to a compromise of confidentiality, integrity, and availability of the host system.
CWE-502 Jul 08, 2025