CVE & Exploit Intelligence Database

Updated 23m ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

337,123 CVEs tracked 53,223 with exploits 4,686 exploited in wild 1,539 CISA KEV 3,912 Nuclei templates 37,757 vendors 42,429 researchers
69 results Clear all
CVE-2026-27757 7.1 HIGH EPSS 0.00
SODOLA SL902-SWTGW124AS <200.1.20 - Auth Bypass
SODOLA SL902-SWTGW124AS firmware versions through 200.1.20 contain an authentication vulnerability that allows authenticated users to change account passwords without verifying the current password. Attackers who gain access to an authenticated session can modify credentials to maintain persistent access to the management interface.
CWE-620 Feb 27, 2026
CVE-2026-24443 8.8 HIGH EPSS 0.00
EventSentry <6.0.1.20 - Auth Bypass
EventSentry versions prior to 6.0.1.20 contain an unverified password change vulnerability in the account management functionality of the Web Reports interface. The password change mechanism does not require validation of the current password before allowing a new password to be set. An attacker who gains temporary access to an authenticated user session can change the account password without knowledge of the original credentials. This enables persistent account takeover and, if administrative accounts are affected, may result in privilege escalation.
CWE-620 Feb 24, 2026
CVE-2026-2543 2.7 LOW 1 Writeup EPSS 0.00
vichan-devel vichan <5.1.5 - Auth Bypass
A vulnerability was identified in vichan-devel vichan up to 5.1.5. This vulnerability affects unknown code of the file inc/mod/pages.php of the component Password Change Handler. The manipulation of the argument Password leads to unverified password change. The attack can be initiated remotely. The vendor was contacted early about this disclosure but did not respond in any way.
CWE-620 Feb 16, 2026
CVE-2026-24440 8.8 HIGH EPSS 0.00
Shenzhen Tenda W30E V2 - Info Disclosure
Shenzhen Tenda W30E V2 firmware versions up to and including V16.01.0.19(5037) allow account passwords to be changed through the maintenance interface without requiring verification of the existing password. This enables unauthorized password changes when access to the affected endpoint is obtained.
CWE-620 Jan 26, 2026
CVE-2025-14751 EPSS 0.00
Product - Privilege Escalation
A low-privileged user can bypass account credentials without confirming the user's current authentication state, which may lead to unauthorized privilege escalation.
CWE-620 Jan 22, 2026
CVE-2025-11235 3.7 LOW EPSS 0.00
Progress MOVEit Transfer <2023.1.3-2022.0.10 - Unverified Password ...
Unverified Password Change vulnerability in Progress MOVEit Transfer on Windows (REST API modules).This issue affects MOVEit Transfer: from 2023.1.0 before 2023.1.3, from 2023.0.0 before 2023.0.8, from 2022.1.0 before 2022.1.11, from 2022.0.0 before 2022.0.10.
CWE-620 Jan 07, 2026
CVE-2025-13148 8.1 HIGH EPSS 0.00
IBM Aspera Orchestrator <4.1.0 - Privilege Escalation
IBM Aspera Orchestrator 4.0.0 through 4.1.0 could allow could an authenticated user to change the password of another user without prior knowledge of that password.
CWE-620 Dec 11, 2025
CVE-2025-67719 1 Writeup EPSS 0.00
Ibexa <5.0.3 - Privilege Escalation
Ibexa is a composable end-to-end DXP (Digital Experience Platform). Versions 5.0.0-beta1 through 5.0.3 do not have password validation. During the transition from v4 to v5 an error was introduced into validation code which causes the validation of the previous password not to run as expected. This makes it possible for a logged in user to change their password in the back office without knowing the previous password. For example, if a user logs into their account and walks away without locking their workstation, an attacker could access the unattended session and change the password, therefore locking the legitimate user out. This issue is fixed in version 5.0.4.
CWE-620 Dec 11, 2025
CVE-2025-59808 6.8 MEDIUM EPSS 0.00
Fortinet FortiSOAR <7.6.2 - Info Disclosure
An unverified password change vulnerability [CWE-620] vulnerability in Fortinet FortiSOAR PaaS 7.6.0 through 7.6.2, FortiSOAR PaaS 7.5.0 through 7.5.1, FortiSOAR PaaS 7.4 all versions, FortiSOAR PaaS 7.3 all versions, FortiSOAR on-premise 7.6.0 through 7.6.2, FortiSOAR on-premise 7.5.0 through 7.5.1, FortiSOAR on-premise 7.4 all versions, FortiSOAR on-premise 7.3 all versions may allow an attacker who has already gained access to a victim's user account to reset the account credentials without being prompted for the account's password
CWE-620 Dec 09, 2025
CVE-2025-63362 9.8 CRITICAL EPSS 0.00
Waveshare RS232/485 TO WIFI ETH (B) Serial to Ethernet/Wi-Fi Gatewa...
Waveshare RS232/485 TO WIFI ETH (B) Serial to Ethernet/Wi-Fi Gateway Firmware V3.1.1.0: HW 4.3.2.1: Webpage V7.04T.07.002880.0301 allows attackers to set the Administrator password and username as blank values, allowing attackers to bypass authentication.
CWE-620 Dec 04, 2025
CVE-2025-61132 7.1 HIGH 1 Writeup EPSS 0.00
levlaz braindump <0.4.14 - Host Header Injection
A Host Header Injection vulnerability in the password reset component in levlaz braindump v0.4.14 allows remote attackers to conduct password reset poisoning and account takeover via manipulation of the Host header when Flask's url_for(_external=True) generates reset links without a fixed SERVER_NAME.
CWE-620 Oct 23, 2025
CVE-2025-62425 8.3 HIGH 1 Writeup EPSS 0.00
MAS <1.4.0 - Privilege Escalation
MAS (Matrix Authentication Service) is a user management and authentication service for Matrix homeservers, written and maintained by Element. A logic flaw in matrix-authentication-service 0.20.0 through 1.4.0 allows an attacker with access to an authenticated MAS session to perform sensitive operations without entering the current password. These include changing the current password, adding or removing an e-mail address and deactivating the account. The vulnerability only affects instances which have the local password database feature enabled (passwords section in the config). Patched in matrix-authentication-service 1.4.1.
CWE-620 Oct 16, 2025
CVE-2025-61536 8.2 HIGH 2 Writeups EPSS 0.00
FelixRiddle dev-jobs-handlebars 1.0 - Info Disclosure
FelixRiddle dev-jobs-handlebars 1.0 uses absolute password-reset (magic) links using the untrusted `req.headers.host` header and forces the `http://` scheme. An attacker who can control the `Host` header (or exploit a misconfigured proxy/load-balancer that forwards the header unchanged) can cause reset links to point to attacker-controlled domains or be delivered via insecure HTTP, enabling token theft, phishing, and account takeover.
CWE-620 Oct 16, 2025
CVE-2025-22381 8.2 HIGH 1 PoC Analysis EPSS 0.00
Aggie 2.6.1 - Open Redirect
Aggie 2.6.1 has a Host Header injection vulnerability in the forgot password functionality, allowing an attacker to reset a user's password.
CWE-620 Oct 16, 2025
CVE-2025-9286 9.8 CRITICAL 2 PoCs Analysis EPSS 0.00
Appy Pie Connect <1.1.2 - Privilege Escalation
The Appy Pie Connect for WooCommerce plugin for WordPress is vulnerable to Privilege Escalation due to missing authorization within the reset_user_password() REST handler in all versions up to, and including, 1.1.2. This makes it possible for unauthenticated attackers to to reset the password of arbitrary users, including administrators, thereby gaining administrative access.
CWE-620 Oct 03, 2025
CVE-2025-10159 9.8 CRITICAL EPSS 0.00
Sophos AP6 - Privilege Escalation
An authentication bypass vulnerability allows remote attackers to gain administrative privileges on Sophos AP6 Series Wireless Access Points older than firmware version 1.7.2563 (MR7).
CWE-620 Sep 09, 2025
CVE-2025-46389 6.5 MEDIUM EPSS 0.00
Product - Privilege Escalation
CWE-620: Unverified Password Change
CWE-620 Aug 06, 2025
CVE-2025-4606 9.8 CRITICAL 4 PoCs Analysis EPSS 0.00
The Sala - Startup & SaaS WordPress Theme <1.1.4 - Privilege Escala...
The Sala - Startup & SaaS WordPress Theme theme for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 1.1.4. This is due to the theme not properly validating a user's identity prior to updating their details like password. This makes it possible for unauthenticated attackers to change arbitrary user's passwords, including administrators, and leverage that to gain access to their account.
CWE-620 Jul 09, 2025
CVE-2024-12827 9.8 CRITICAL EPSS 0.00
DWT - Directory & Listing WordPress Theme <3.3.6 - Privilege Escala...
The DWT - Directory & Listing WordPress Theme theme for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 3.3.6. This is due to the plugin not properly checking for an empty token value prior to resetting a user's password through the dwt_listing_reset_password() function. This makes it possible for unauthenticated attackers to change arbitrary user's passwords, including administrators, and leverage that to gain access to their account.
CWE-620 Jun 27, 2025
CVE-2025-6097 5.3 MEDIUM 1 Writeup EPSS 0.00
UTT 进取 750W <5.0 - Auth Bypass
A vulnerability was found in UTT 进取 750W up to 5.0 and classified as critical. Affected by this issue is the function formDefineManagement of the file /goform/setSysAdm of the component Administrator Password Handler. The manipulation of the argument passwd1 leads to unverified password change. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
CWE-620 Jun 16, 2025