CVE & Exploit Intelligence Database

Updated 23m ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

337,123 CVEs tracked 53,223 with exploits 4,686 exploited in wild 1,539 CISA KEV 3,912 Nuclei templates 37,757 vendors 42,429 researchers
246 results Clear all
CVE-2026-28681 8.1 HIGH 1 Writeup EPSS 0.00
IRRd 4.4.0-4.4.4/4.5.0 - Open Redirect
Internet Routing Registry daemon version 4 is an IRR database server, processing IRR objects in the RPSL format. From version 4.4.0 to before version 4.4.5 and from version 4.5.0 to before version 4.5.1, an attacker can manipulate the HTTP Host header on a password reset or account creation request. The confirmation link in the resulting email can then point to an attacker-controlled domain. Opening the link in the email is sufficient to pass the token to the attacker, who can then use it on the real IRRD instance to take over the account. A compromised account can then be used to modify RPSL objects maintained by the account's mntners and perform other account actions. If the user had two-factor authentication configured, which is required for users with override access, an attacker is not able to log in, even after successfully resetting the password. This issue has been patched in versions 4.4.5 and 4.5.1.
CWE-601 Mar 06, 2026
CVE-2026-28268 9.8 CRITICAL 1 PoC 1 Writeup Analysis EPSS 0.00
Vikunja <2.1.0 - Auth Bypass
Vikunja is an open-source self-hosted task management platform. Versions prior to 2.1.0 have a business logic vulnerability exists in the password reset mechanism of vikunja/api that allows password reset tokens to be reused indefinitely. Due to a failure to invalidate tokens upon use and a critical logic bug in the token cleanup cron job, reset tokens remain valid forever. This allows an attacker who intercepts a single reset token (via logs, browser history, or phishing) to perform a complete, persistent account takeover at any point in the future, bypassing standard authentication controls. Version 2.1.0 contains a patch for the issue.
CWE-459 Feb 27, 2026
CVE-2026-28213 9.8 CRITICAL EPSS 0.00
EverShop <2.1.1 - Auth Bypass
EverShop is a TypeScript-first eCommerce platform. Versions prior to 2.1.1 have a vulnerability in the "Forgot Password" functionality. When specifying a target email address, the API response returns the password reset token. This allows an attacker to take over the associated account. Version 2.1.1 fixes the issue.
CWE-200 Feb 26, 2026
CVE-2026-27593 9.3 CRITICAL 1 Writeup EPSS 0.00
Statmatic <6.3.3/5.73.10 - Auth Bypass
Statmatic is a Laravel and Git powered content management system (CMS). Prior to versions 6.3.3 and 5.73.10, an attacker may leverage a vulnerability in the password reset feature to capture a user's token and reset the password on their behalf. The attacker must know the email address of a valid account on the site, and the actual user must blindly click the link in their email even though they didn't request the reset. This has been fixed in 6.3.3 and 5.73.10.
CWE-640 Feb 24, 2026
CVE-2026-2895 3.7 LOW EPSS 0.00
funadmin <=7.1.0-rc4 - Weak Password Recovery
A security flaw has been discovered in funadmin up to 7.1.0-rc4. Affected by this issue is the function repass of the file app/frontend/controller/Member.php. Performing a manipulation of the argument forget_code/vercode results in weak password recovery. Remote exploitation of the attack is possible. The attack's complexity is rated as high. The exploitation is known to be difficult. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
CWE-640 Feb 21, 2026
CVE-2026-2564 8.1 HIGH EPSS 0.00
Intelbras VIP 3260 Z IA 2.840.00IB005.0.T - Auth Bypass
A security flaw has been discovered in Intelbras VIP 3260 Z IA 2.840.00IB005.0.T. Affected by this vulnerability is an unknown functionality of the file /OutsideCmd. The manipulation results in weak password recovery. It is possible to launch the attack remotely. Attacks of this nature are highly complex. The exploitation appears to be difficult. It is recommended to upgrade the affected component.
CWE-640 Feb 16, 2026
CVE-2026-2543 2.7 LOW 1 Writeup EPSS 0.00
vichan-devel vichan <5.1.5 - Auth Bypass
A vulnerability was identified in vichan-devel vichan up to 5.1.5. This vulnerability affects unknown code of the file inc/mod/pages.php of the component Password Change Handler. The manipulation of the argument Password leads to unverified password change. The attack can be initiated remotely. The vendor was contacted early about this disclosure but did not respond in any way.
CWE-620 Feb 16, 2026
CVE-2026-26273 9.8 CRITICAL 1 Writeup EPSS 0.00
Idno Known < 1.6.3 - Information Disclosure
Known is a social publishing platform. Prior to 1.6.3, a Critical Broken Authentication vulnerability exists in Known 1.6.2 and earlier. The application leaks the password reset token within a hidden HTML input field on the password reset page. This allows any unauthenticated attacker to retrieve the reset token for any user by simply querying the user's email, leading to full Account Takeover (ATO) without requiring access to the victim's email inbox. This vulnerability is fixed in 1.6.3.
CWE-200 Feb 13, 2026
CVE-2020-37172 5.3 MEDIUM 1 PoC Analysis EPSS 0.00
AVideo Platform 8.1 - CSRF
AVideo Platform 8.1 contains a cross-site request forgery vulnerability that allows attackers to reset user passwords by exploiting the password recovery mechanism. Attackers can craft malicious requests to the recoverPass endpoint using the user's recovery token to change account credentials without authentication.
CWE-640 Feb 11, 2026
CVE-2020-37158 5.3 MEDIUM 1 PoC Analysis EPSS 0.00
AVideo Platform 8.1 - CSRF
AVideo Platform 8.1 contains a cross-site request forgery vulnerability that allows attackers to reset user passwords by exploiting the password recovery mechanism. Attackers can craft malicious requests to the recoverPass endpoint using the user's recovery token to change account credentials without authentication.
CWE-352 Feb 11, 2026
CVE-2026-25858 9.8 CRITICAL EPSS 0.00
macrozheng mall <1.0.3 - Auth Bypass
macrozheng mall version 1.0.3 and prior contains an authentication vulnerability in the mall-portal password reset workflow that allows an unauthenticated attacker to reset arbitrary user account passwords using only a victim’s telephone number. The password reset flow exposes the one-time password (OTP) directly in the API response and validates password reset requests solely by comparing the provided OTP to a value stored by telephone number, without verifying user identity or ownership of the telephone number. This enables remote account takeover of any user with a known or guessable telephone number.
CWE-640 Feb 07, 2026
CVE-2025-4320 10.0 CRITICAL EPSS 0.00
Birebirsoft Sufirmam <23012026 - Auth Bypass
Authentication Bypass by Primary Weakness, Weak Password Recovery Mechanism for Forgotten Password vulnerability in Birebirsoft Software and Technology Solutions Sufirmam allows Authentication Bypass, Password Recovery Exploitation.This issue affects Sufirmam: through 23012026. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
CWE-640 Jan 23, 2026
CVE-2025-4319 9.4 CRITICAL EPSS 0.00
Birebirsoft Sufirmam <23012026 - Auth Bypass
Improper Restriction of Excessive Authentication Attempts, Weak Password Recovery Mechanism for Forgotten Password vulnerability in Birebirsoft Software and Technology Solutions Sufirmam allows Brute Force, Password Recovery Exploitation.This issue affects Sufirmam: through 23012026. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
CWE-307 Jan 23, 2026
CVE-2026-1325 5.3 MEDIUM EPSS 0.00
Sangfor Operation And Maintenance Sec... - Password Reset Weakness
A security flaw has been discovered in Sangfor Operation and Maintenance Security Management System up to 3.0.12. This affects the function edit_pwd_mall of the file /fort/login/edit_pwd_mall. The manipulation of the argument flag results in weak password recovery. It is possible to launch the attack remotely. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
CWE-640 Jan 22, 2026
CVE-2022-50910 9.8 CRITICAL 1 PoC Analysis EPSS 0.00
Beehive Forum 1.5.2 - Host Header Injection
Beehive Forum 1.5.2 contains a host header injection vulnerability in the forgot password functionality that allows attackers to manipulate password reset requests. Attackers can inject a malicious host header to intercept password reset tokens and change victim account passwords without direct authentication.
CWE-640 Jan 13, 2026
CVE-2025-63314 10.0 CRITICAL 1 PoC Analysis EPSS 0.00
DDSN Interactive Acora CMS <10.7.1 - Code Injection
A static password reset token in the password reset function of DDSN Interactive Acora CMS v10.7.1 allows attackers to arbitrarily reset the user password and execute a full account takeover via a replay attack.
CWE-640 Jan 12, 2026
CVE-2025-15398 3.7 LOW EPSS 0.00
Uatech Badaso < 2.9.7 - Password Reset Weakness
A security vulnerability has been detected in Uasoft badaso up to 2.9.7. Affected is the function forgetPassword of the file src/Controllers/BadasoAuthController.php of the component Token Handler. Such manipulation leads to weak password recovery. The attack can be executed remotely. This attack is characterized by high complexity. The exploitability is told to be difficult. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
CWE-640 Dec 31, 2025
CVE-2025-14783 4.3 MEDIUM 1 PoC Analysis EPSS 0.00
Easy Digital Downloads <3.6.2 - Open Redirect
The Easy Digital Downloads plugin for WordPress is vulnerable to Unvalidated Redirect in all versions up to, and including, 3.6.2. This is due to insufficient validation on the redirect url supplied via the 'edd_redirect' parameter. This makes it possible for unauthenticated attackers to redirect users with the password reset email to potentially malicious sites if they can successfully trick them into performing an action.
CWE-640 Dec 31, 2025
CVE-2023-53958 7.5 HIGH 1 PoC Analysis EPSS 0.00
LDAP Tool Box Self Service Password 1.5.2 - SSRF
LDAP Tool Box Self Service Password 1.5.2 contains a password reset vulnerability that allows attackers to manipulate HTTP Host headers during token generation. Attackers can craft malicious password reset requests that generate tokens sent to a controlled server, enabling potential account takeover by intercepting and using stolen reset tokens.
CWE-640 Dec 19, 2025
CVE-2025-65203 7.1 HIGH EPSS 0.00
KeePassXC-Browser <1.9.9.2 - Info Disclosure
KeePassXC-Browser thru 1.9.9.2 autofills or prompts to fill stored credentials into documents rendered under a browser-enforced CSP directive and iframe attribute sandbox, allowing attacker-controlled script in the sandboxed document to access populated form fields and exfiltrate credentials.
CWE-353 Dec 17, 2025