CVE & Exploit Intelligence Database

Updated 3h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

338,223 CVEs tracked 53,280 with exploits 4,730 exploited in wild 1,542 CISA KEV 3,929 Nuclei templates 37,826 vendors 42,569 researchers
2,435 results Clear all
CVE-2025-24601 9.8 CRITICAL EPSS 0.00
ThimPress FundPress <2.0.6 - Code Injection
Deserialization of Untrusted Data vulnerability in ThimPress FundPress allows Object Injection. This issue affects FundPress: from n/a through 2.0.6.
CWE-502 Jan 27, 2025
CVE-2024-12600 7.2 HIGH EPSS 0.01
Custom Product Tabs Lite for WooCommerce <1.9.0 - Code Injection
The Custom Product Tabs Lite for WooCommerce plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.9.0 via deserialization of untrusted input from the 'frs_woo_product_tabs' parameter. This makes it possible for authenticated attackers, with Shop Manager-level access and above, to inject a PHP Object. No known POP chain is present in the vulnerable software. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code.
CWE-502 Jan 25, 2025
CVE-2025-23006 9.8 CRITICAL KEV RANSOMWARE EPSS 0.63
Sonicwall Sma8200v < 12.4.3-02854 - Insecure Deserialization
Pre-authentication deserialization of untrusted data vulnerability has been identified in the SMA1000 Appliance Management Console (AMC) and Central Management Console (CMC), which in specific conditions could potentially enable a remote unauthenticated attacker to execute arbitrary OS commands.
CWE-502 Jan 23, 2025
CVE-2025-23914 9.8 CRITICAL EPSS 0.00
Muzaara Google Ads Report <3.1 - Object Injection
Deserialization of Untrusted Data vulnerability in NotFound Muzaara Google Ads Report allows Object Injection. This issue affects Muzaara Google Ads Report: from n/a through 3.1.
CWE-502 Jan 22, 2025
CVE-2024-31903 8.8 HIGH 1 PoC Analysis EPSS 0.18
IBM Sterling B2b Integrator < 6.1.2.5 - Insecure Deserialization
IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.1.2.5 and 6.2.0.0 through 6.2.0.2 allow an attacker on the local network to execute arbitrary code on the system, caused by the deserialization of untrusted data.
CWE-502 Jan 22, 2025
CVE-2025-23944 8.8 HIGH EPSS 0.00
WOOEXIM <5.0.0 - Code Injection
Deserialization of Untrusted Data vulnerability in WOOEXIM.COM WOOEXIM allows Object Injection. This issue affects WOOEXIM: from n/a through 5.0.0.
CWE-502 Jan 22, 2025
CVE-2025-23932 9.8 CRITICAL EPSS 0.00
NotFound Quick Count <3.00 - Code Injection
Deserialization of Untrusted Data vulnerability in NotFound Quick Count allows Object Injection. This issue affects Quick Count: from n/a through 3.00.
CWE-502 Jan 22, 2025
CVE-2025-0429 7.2 HIGH EPSS 0.00
WordPress AI Power: Complete AI Pack <1.8.96 - Code Injection
The "AI Power: Complete AI Pack" plugin for WordPress is vulnerable to PHP Object Injection in versions up to, and including, 1.8.96 via deserialization of untrusted input from the $form['post_content'] variable through the wpaicg_export_ai_forms() function. This allows authenticated attackers, with administrative privileges, to inject a PHP Object. No POP chain is present in the vulnerable plugin. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code.
CWE-502 Jan 22, 2025
CVE-2025-0428 7.2 HIGH EPSS 0.00
WordPress AI Power: Complete AI Pack <1.8.96 - Code Injection
The "AI Power: Complete AI Pack" plugin for WordPress is vulnerable to PHP Object Injection in versions up to, and including, 1.8.96 via deserialization of untrusted input from the $form['post_content'] variable through the wpaicg_export_prompts function. This allows authenticated attackers, with administrative privileges, to inject a PHP Object. No POP chain is present in the vulnerable plugin. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code.
CWE-502 Jan 22, 2025
CVE-2024-49699 8.8 HIGH 1 PoC Analysis EPSS 0.05
ARPrice <4.0.3 - Code Injection
Deserialization of Untrusted Data vulnerability in NotFound ARPrice allows Object Injection. This issue affects ARPrice: from n/a through 4.0.3.
CWE-502 Jan 21, 2025
CVE-2024-49688 9.8 CRITICAL EPSS 0.00
ARPrice <4.0.3 - Code Injection
Deserialization of Untrusted Data vulnerability in NotFound ARPrice allows Object Injection. This issue affects ARPrice: from n/a through 4.0.3.
CWE-502 Jan 21, 2025
CVE-2024-10936 8.8 HIGH EPSS 0.16
Instawp String Locator < 2.6.7 - Insecure Deserialization
The String locator plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 2.6.6 via deserialization of untrusted input in the 'recursive_unserialize_replace' function. This makes it possible for unauthenticated attackers to inject a PHP Object. No known POP chain is present in the vulnerable software. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code. An administrator must perform a search and replace action to trigger the exploit.
CWE-502 Jan 21, 2025
CVE-2025-0586 7.2 HIGH EPSS 0.02
aEnrich Technology - Insecure Deserialization
The a+HRD from aEnrich Technology has an Insecure Deserialization vulnerability, allowing remote attackers with database modification privileges and regular system privileges to perform arbitrary code execution.
CWE-502 Jan 20, 2025
CVE-2024-12703 7.8 HIGH EPSS 0.02
CWE-502 - Remote Code Execution
CWE-502: Deserialization of untrusted data vulnerability exists that could lead to loss of confidentiality, integrity and potential remote code execution on workstation when a non-admin authenticated user opens a malicious project file.
CWE-502 Jan 17, 2025
CVE-2024-56515 6.8 MEDIUM EPSS 0.00
Matrix Media Repo - RCE
Matrix Media Repo (MMR) is a highly configurable multi-homeserver media repository for Matrix. If SVG or JPEGXL thumbnailers are enabled (they are disabled by default), a user may upload a file which claims to be either of these types and request a thumbnail to invoke a different decoder in ImageMagick. In some ImageMagick installations, this includes the capability to run Ghostscript to decode the image/file. If MP4 thumbnailers are enabled (also disabled by default), the same issue as above may occur with the ffmpeg installation instead. MMR uses a number of other decoders for all other file types when preparing thumbnails. Theoretical issues are possible with these decoders, however in testing they were not possible to exploit. This is fixed in MMR v1.3.8. MMR now inspects the mimetype of media prior to thumbnailing, and picks a thumbnailer based on those results instead of relying on user-supplied values. This may lead to fewer thumbnails when obscure file shapes are used. This also helps narrow scope of theoretical issues with all decoders MMR uses for thumbnails. Users are advised to upgrade. Users unable to upgrade may disable the SVG, JPEGXL, and MP4 thumbnail types in the MMR config which prevents the decoders from being invoked. Further disabling uncommon file types on the server is recommended to limit risk surface. Containers and other similar technologies may also be used to limit the impact of vulnerabilities in external decoders, like ImageMagick and ffmpeg. Some installations of ImageMagick may disable "unsafe" file types, like PDFs, already. This option can be replicated to other environments as needed. ffmpeg may be compiled with limited decoders/codecs. The Docker image for MMR disables PDFs and similar formats by default.
CWE-502 Jan 16, 2025
CVE-2024-57766 9.1 CRITICAL 1 PoC EPSS 0.00
Wangl1989 Mysiteforme < 2025-01-01 - Insecure Deserialization
MSFM before 2025.01.01 was discovered to contain a fastjson deserialization vulnerability via the component system/table/editField.
CWE-502 Jan 15, 2025
CVE-2024-57764 9.1 CRITICAL 1 PoC EPSS 0.00
Wangl1989 Mysiteforme < 2025-01-01 - Insecure Deserialization
MSFM before 2025.01.01 was discovered to contain a fastjson deserialization vulnerability via the component system/table/add.
CWE-502 Jan 15, 2025
CVE-2024-57763 9.1 CRITICAL 1 PoC EPSS 0.00
Wangl1989 Mysiteforme < 2025-01-01 - Insecure Deserialization
MSFM before 2025.01.01 was discovered to contain a fastjson deserialization vulnerability via the component system/table/addField.
CWE-502 Jan 15, 2025
CVE-2024-57762 7.5 HIGH 1 PoC EPSS 0.00
Wangl1989 Mysiteforme < 2025-01-01 - Insecure Deserialization
MSFM before v2025.01.01 was discovered to contain a deserialization vulnerability via the pom.xml configuration file.
CWE-502 Jan 15, 2025
CVE-2024-49375 9.0 CRITICAL EPSS 0.03
Rasa - Remote Code Execution
Open source machine learning framework. A vulnerability has been identified in Rasa that enables an attacker who has the ability to load a maliciously crafted model remotely into a Rasa instance to achieve Remote Code Execution. The prerequisites for this are: 1. The HTTP API must be enabled on the Rasa instance eg with `--enable-api`. This is not the default configuration. 2. For unauthenticated RCE to be exploitable, the user must not have configured any authentication or other security controls recommended in our documentation. 3. For authenticated RCE, the attacker must posses a valid authentication token or JWT to interact with the Rasa API. This issue has been addressed in rasa version 3.6.21 and all users are advised to upgrade. Users unable to upgrade should ensure that they require authentication and that only trusted users are given access.
CWE-502 Jan 14, 2025