CVE & Exploit Intelligence Database

Updated 5h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

338,223 CVEs tracked 53,278 with exploits 4,730 exploited in wild 1,542 CISA KEV 3,929 Nuclei templates 37,826 vendors 42,568 researchers
2,435 results Clear all
CVE-2025-30065 9.8 CRITICAL 6 PoCs Analysis EPSS 0.01
Apache Parquet <1.15.1 - RCE
Schema parsing in the parquet-avro module of Apache Parquet 1.15.0 and previous versions allows bad actors to execute arbitrary code Users are recommended to upgrade to version 1.15.1, which fixes the issue.
CWE-502 Apr 01, 2025
CVE-2025-31087 9.8 CRITICAL EPSS 0.00
Multiple Shipping And Billing Address For Woocommerce <1.5 - Code I...
Deserialization of Untrusted Data vulnerability in silverplugins217 Multiple Shipping And Billing Address For Woocommerce allows Object Injection. This issue affects Multiple Shipping And Billing Address For Woocommerce: from n/a through 1.5.
CWE-502 Apr 01, 2025
CVE-2025-31084 9.8 CRITICAL EPSS 0.00
Sunshinephotocart Sunshine Photo Cart - Insecure Deserialization
Deserialization of Untrusted Data vulnerability in sunshinephotocart Sunshine Photo Cart allows Object Injection. This issue affects Sunshine Photo Cart: from n/a through 3.4.10.
CWE-502 Apr 01, 2025
CVE-2025-31074 8.8 HIGH EPSS 0.00
MDJM Event Management <1.7.5.2 - Object Injection
Deserialization of Untrusted Data vulnerability in MDJM MDJM Event Management allows Object Injection. This issue affects MDJM Event Management: from n/a through 1.7.5.2.
CWE-502 Apr 01, 2025
CVE-2025-31129 8.8 HIGH 1 PoC Analysis EPSS 0.00
Io.jooby Jooby-pac4j < 2.17.0 - Insecure Deserialization
Jooby is a web framework for Java and Kotlin. The pac4j io.jooby.internal.pac4j.SessionStoreImpl#get module deserializes untrusted data. This vulnerability is fixed in 2.17.0 (2.x) and 3.7.0 (3.x).
CWE-502 Mar 31, 2025
CVE-2025-31103 7.5 HIGH EXPLOITED EPSS 0.00
Appleple A-blog Cms < 2.8.80 - Insecure Deserialization
Untrusted data deserialization vulnerability exists in a-blog cms. Processing a specially crafted request may store arbitrary files on the server where the product is running. This can be leveraged to execute an arbitrary script on the server.
CWE-502 Mar 31, 2025
CVE-2025-22526 9.8 CRITICAL EPSS 0.00
PHP/MySQL CPU performance statistics <1.2.1 - Object Injection
Deserialization of Untrusted Data vulnerability in NotFound PHP/MySQL CPU performance statistics allows Object Injection. This issue affects PHP/MySQL CPU performance statistics: from n/a through 1.2.1.
CWE-502 Mar 28, 2025
CVE-2025-2485 7.5 HIGH EXPLOITED EPSS 0.04
Contact Form 7 <1.3.8.7 - Code Injection
The Drag and Drop Multiple File Upload for Contact Form 7 plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.3.8.7 via deserialization of untrusted input from the 'dnd_upload_cf7_upload' function. This makes it possible for attackers to inject a PHP Object through a PHAR file. No known POP chain is present in the vulnerable software, which means this vulnerability has no impact unless another plugin or theme containing a POP chain is installed on the site. If a POP chain is present via an additional plugin or theme installed on the target system, it may allow the attacker to perform actions like delete arbitrary files, retrieve sensitive data, or execute code depending on the POP chain present. This vulnerability may be exploited by unauthenticated attackers when a form is present on the site with the file upload action. The Flamingo plugin must be installed and activated in order to exploit the vulnerability. The vulnerability was partially patched in version 1.3.8.8.
CWE-502 Mar 28, 2025
CVE-2025-26873 9.0 CRITICAL EPSS 0.00
Shine theme Traveler <3.2.1 - Use After Free
Deserialization of Untrusted Data vulnerability in Shine theme Traveler.This issue affects Traveler: from n/a before 3.2.1.
CWE-502 Mar 27, 2025
CVE-2025-2855 4.7 MEDIUM EPSS 0.01
Eladmin < 2.7 - Insecure Deserialization
A vulnerability, which was classified as problematic, has been found in elunez eladmin up to 2.7. Affected by this issue is the function checkFile of the file /api/deploy/upload. The manipulation of the argument servers leads to deserialization. The attack may be launched remotely.
CWE-502 Mar 27, 2025
CVE-2025-30773 7.2 HIGH EPSS 0.00
Cozmoslabs TranslatePress <2.9.6 - Object Injection
Deserialization of Untrusted Data vulnerability in Cozmoslabs TranslatePress allows Object Injection. This issue affects TranslatePress: from n/a through 2.9.6.
CWE-502 Mar 27, 2025
CVE-2025-2332 9.8 CRITICAL EPSS 0.02
Export All Posts, Products, Orders, Refunds & Users <2.13 - Code In...
The Export All Posts, Products, Orders, Refunds & Users plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 2.13 via deserialization of untrusted input in the 'returnMetaValueAsCustomerInput' function. This makes it possible for unauthenticated attackers to inject a PHP Object. No known POP chain is present in the vulnerable software, which means this vulnerability has no impact unless another plugin or theme containing a POP chain is installed on the site. If a POP chain is present via an additional plugin or theme installed on the target system, it may allow the attacker to perform actions like delete arbitrary files, retrieve sensitive data, or execute code depending on the POP chain present.
CWE-502 Mar 27, 2025
CVE-2025-1913 7.2 HIGH 1 PoC Analysis EPSS 0.02
Product Import Export for WooCommerce - Code Injection
The Product Import Export for WooCommerce – Import Export Product CSV Suite plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 2.5.0 via deserialization of untrusted input from the 'form_data' parameter This makes it possible for authenticated attackers, with Administrator-level access and above, to inject a PHP Object. No known POP chain is present in the vulnerable software, which means this vulnerability has no impact unless another plugin or theme containing a POP chain is installed on the site. If a POP chain is present via an additional plugin or theme installed on the target system, it may allow the attacker to perform actions like delete arbitrary files, retrieve sensitive data, or execute code depending on the POP chain present.
CWE-502 Mar 26, 2025
CVE-2024-13889 7.2 HIGH EPSS 0.01
WordPress Importer <0.8.3 - Code Injection
The WordPress Importer plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 0.8.3 via deserialization of untrusted input in the 'maybe_unserialize' function. This makes it possible for authenticated attackers, with Administrator-level access and above, to inject a PHP Object. No known POP chain is present in the vulnerable software, which means this vulnerability has no impact unless another plugin or theme containing a POP chain is installed on the site. If a POP chain is present via an additional plugin or theme installed on the target system, it may allow the attacker to perform actions like delete arbitrary files, retrieve sensitive data, or execute code depending on the POP chain present.
CWE-502 Mar 26, 2025
CVE-2025-29310 9.8 CRITICAL EPSS 0.00
Opennetworking Onos - Insecure Deserialization
An issue in onos v2.7.0 allows attackers to trigger a packet deserialization problem when supplying a crafted LLDP packet. This vulnerability allows attackers to execute arbitrary commands or access network information.
CWE-502 Mar 24, 2025
CVE-2025-2690 6.3 MEDIUM 1 Writeup EPSS 0.00
Yii2 <2.0.39 - Deserialization
A vulnerability, which was classified as critical, was found in yiisoft Yii2 up to 2.0.39. This affects the function Generate of the file phpunit\src\Framework\MockObject\MockClass.php. The manipulation leads to deserialization. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
CWE-502 Mar 24, 2025
CVE-2025-2689 6.3 MEDIUM 1 Writeup EPSS 0.00
Yii2 < 2.0.45 - Deserialization
A vulnerability, which was classified as critical, has been found in yiisoft Yii2 up to 2.0.45. Affected by this issue is the function getIterator of the file symfony\finder\Iterator\SortableIterator.php. The manipulation leads to deserialization. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
CWE-502 Mar 24, 2025
CVE-2025-2622 6.3 MEDIUM EPSS 0.00
aizuda snail-job 1.4.0 - Deserialization
A vulnerability was found in aizuda snail-job 1.4.0. It has been classified as critical. Affected is the function getRuntime of the file /snail-job/workflow/check-node-expression of the component Workflow-Task Management Module. The manipulation of the argument nodeExpression leads to deserialization. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
CWE-502 Mar 22, 2025
CVE-2025-1971 7.2 HIGH EPSS 0.02
WordPress <2.6.2 - Code Injection
The Export and Import Users and Customers plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 2.6.2 via deserialization of untrusted input from the 'form_data' parameter. This makes it possible for authenticated attackers, with Administrator-level access and above, to inject a PHP Object. No known POP chain is present in the vulnerable software, which means this vulnerability has no impact unless another plugin or theme containing a POP chain is installed on the site. If a POP chain is present via an additional plugin or theme installed on the target system, it may allow the attacker to perform actions like delete arbitrary files, retrieve sensitive data, or execute code depending on the POP chain present.
CWE-502 Mar 22, 2025
CVE-2025-0724 8.8 HIGH EPSS 0.01
ProfileGrid - WordPress <5.9.4.5 - Code Injection
The ProfileGrid – User Profiles, Groups and Communities plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 5.9.4.5 via deserialization of untrusted input in the get_user_meta_fields_html function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to inject a PHP Object. No known POP chain is present in the vulnerable software, which means this vulnerability has no impact unless another plugin or theme containing a POP chain is installed on the site. If a POP chain is present via an additional plugin or theme installed on the target system, it may allow the attacker to perform actions like delete arbitrary files, retrieve sensitive data, or execute code depending on the POP chain present.
CWE-502 Mar 22, 2025