CVE & Exploit Intelligence Database

Updated 4h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

337,847 CVEs tracked 53,242 with exploits 4,725 exploited in wild 1,540 CISA KEV 3,918 Nuclei templates 37,802 vendors 42,493 researchers
352 results Clear all
CVE-2025-66292 8.1 HIGH 1 Writeup EPSS 0.00
DPanel <1.9.2 - Path Traversal
DPanel is an open source server management panel written in Go. Prior to 1.9.2, DPanel has an arbitrary file deletion vulnerability in the /api/common/attach/delete interface. Authenticated users can delete arbitrary files on the server via path traversal. When a user logs into the administrative backend, this interface can be used to delete files. The vulnerability lies in the Delete function within the app/common/http/controller/attach.go file. The path parameter submitted by the user is directly passed to storage.Local{}.GetSaveRealPath and subsequently to os.Remove without proper sanitization or checking for path traversal characters (../). And the helper function in common/service/storage/local.go uses filepath.Join, which resolves ../ but does not enforce a chroot/jail. This vulnerability is fixed in 1.9.2.
CWE-73 Jan 15, 2026
CVE-2026-20931 8.0 HIGH EXPLOITED EPSS 0.01
Windows Telephony Service - Privilege Escalation
External control of file name or path in Windows Telephony Service allows an authorized attacker to elevate privileges over an adjacent network.
CWE-73 Jan 13, 2026
CVE-2026-20925 6.5 MEDIUM EPSS 0.00
Windows NTLM - Path Traversal
External control of file name or path in Windows NTLM allows an unauthorized attacker to perform spoofing over a network.
CWE-73 Jan 13, 2026
CVE-2026-20872 6.5 MEDIUM EPSS 0.00
Windows NTLM - Path Traversal
External control of file name or path in Windows NTLM allows an unauthorized attacker to perform spoofing over a network.
CWE-73 Jan 13, 2026
CVE-2026-22783 9.6 CRITICAL 1 Writeup EPSS 0.00
Iris <2.4.24 - Privilege Escalation
Iris is a web collaborative platform that helps incident responders share technical details during investigations. Prior to 2.4.24, the DFIR-IRIS datastore file management system has a vulnerability where mass assignment of the file_local_name field combined with path trust in the delete operation enables authenticated users to delete arbitrary filesystem paths. The vulnerability manifests through a three-step attack chain: authenticated users upload a file to the datastore, update the file's file_local_name field to point to an arbitrary filesystem path through mass assignment, then trigger the delete operation which removes the target file without path validation. This vulnerability is fixed in 2.4.24.
CWE-434 Jan 12, 2026
CVE-2025-66003 EPSS 0.00
smb4k <4.0.5 - Local Root Exploit
An External Control of File Name or Path vulnerability in smb4k allowsl ocal users to perform a local root exploit via smb4k mounthelper if they can access and control the contents of a Samba shareThis issue affects smb4k: from ? before 4.0.5.
CWE-73 Jan 08, 2026
CVE-2025-14059 6.5 MEDIUM EPSS 0.00
EmailKit plugin <1.6.1 - Path Traversal
The EmailKit plugin for WordPress is vulnerable to Arbitrary File Read via Path Traversal in all versions up to, and including, 1.6.1. This is due to missing path validation in the create_template REST API endpoint where user-controlled input from the emailkit-editor-template parameter is passed directly to file_get_contents() without sanitization. This makes it possible for authenticated attackers with Author-level permissions or higher to read arbitrary files on the server, including sensitive configuration files like /etc/passwd and wp-config.php, via the REST API. The file contents are stored in post meta and can be exfiltrated through MetForm's email confirmation feature.
CWE-73 Jan 07, 2026
CVE-2025-68428 7.5 HIGH 2 PoCs Analysis EPSS 0.00
Parall Jspdf < 4.0.0 - Path Traversal
jsPDF is a library to generate PDFs in JavaScript. Prior to version 4.0.0, user control of the first argument of the loadFile method in the node.js build allows local file inclusion/path traversal. If given the possibility to pass unsanitized paths to the loadFile method, a user can retrieve file contents of arbitrary files in the local file system the node process is running in. The file contents are included verbatim in the generated PDFs. Other affected methods are `addImage`, `html`, and `addFont`. Only the node.js builds of the library are affected, namely the `dist/jspdf.node.js` and `dist/jspdf.node.min.js` files. The vulnerability has been fixed in [email protected]. This version restricts file system access per default. This semver-major update does not introduce other breaking changes. Some workarounds areavailable. With recent node versions, jsPDF recommends using the `--permission` flag in production. The feature was introduced experimentally in v20.0.0 and is stable since v22.13.0/v23.5.0/v24.0.0. For older node versions, sanitize user-provided paths before passing them to jsPDF.
CWE-22 Jan 05, 2026
CVE-2025-62842 7.8 HIGH EPSS 0.00
HBS 3 Hybrid Backup Sync <26.2.0.938 - Path Traversal
An external control of file name or path vulnerability has been reported to affect HBS 3 Hybrid Backup Sync. If an attacker gains local network access, they can then exploit the vulnerability to read or modify files or directories. We have already fixed the vulnerability in the following version: HBS 3 Hybrid Backup Sync 26.2.0.938 and later
CWE-73 Jan 02, 2026
CVE-2025-12654 2.7 LOW EPSS 0.00
WPvivid Backup & Migration <0.9.120 - Path Traversal
The Migration, Backup, Staging – WPvivid Backup & Migration plugin for WordPress is vulnerable to arbitrary directory creation in all versions up to, and including, 0.9.120. This is due to the check_filesystem_permissions() function not properly restricting the directories that can be created, or in what location. This makes it possible for authenticated attackers, with Administrator-level access and above, to create arbitrary directories.
CWE-73 Dec 21, 2025
CVE-2025-68478 7.1 HIGH EPSS 0.00
Langflow <1.7.0 - Path Traversal
Langflow is a tool for building and deploying AI-powered agents and workflows. Prior to version 1.7.0, if an arbitrary path is specified in the request body's `fs_path`, the server serializes the Flow object into JSON and creates/overwrites a file at that path. There is no path restriction, normalization, or allowed directory enforcement, so absolute paths (e.g., /etc/poc.txt) are interpreted as is. Version 1.7.0 fixes the issue.
CWE-610 Dec 19, 2025
CVE-2025-68155 7.5 HIGH 1 Writeup EPSS 0.01
@vitejs/plugin-rs <0.5.8 - Info Disclosure
@vitejs/plugin-rs provides React Server Components (RSC) support for Vite. Prior to version 0.5.8, the `/__vite_rsc_findSourceMapURL` endpoint in `@vitejs/plugin-rsc` allows unauthenticated arbitrary file read during development mode. An attacker can read any file accessible to the Node.js process by sending a crafted HTTP request with a `file://` URL in the `filename` query parameter. Version 0.5.8 fixes the issue.
CWE-22 Dec 16, 2025
CVE-2025-66449 8.8 HIGH 1 Writeup EPSS 0.00
ConvertX <0.16.0 - Code Injection
ConvertXis a self-hosted online file converter. In versions prior to 0.16.0, the endpoint `/upload` allows an authenticated user to write arbitrary files on the system, overwriting binaries and allowing code execution. The upload function takes `file.name` directly from user supplied data without doing any sanitization on the name thus allowing for arbitrary file write. This can be used to overwrite system binaries with ones provided from an attacker allowing full code execution. Version 0.16.0 contains a patch for the issue.
CWE-22 Dec 16, 2025
CVE-2025-13320 6.8 MEDIUM EPSS 0.00
WP User Manager <2.9.12 - Privilege Escalation
The WP User Manager plugin for WordPress is vulnerable to Arbitrary File Deletion in all versions up to, and including, 2.9.12. This is due to insufficient validation of user-supplied file paths in the profile update functionality combined with improper handling of array inputs by PHP's filter_input() function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete arbitrary files on the server via the 'current_user_avatar' parameter in a two-stage attack which can make remote code execution possible. This only affects sites with the custom avatar setting enabled.
CWE-73 Dec 12, 2025
CVE-2025-65473 9.1 CRITICAL EPSS 0.00
EasyImages <2.8.6 - Code Injection
An arbitrary file rename vulnerability in the /admin/filer.php component of EasyImages 2.0 v2.8.6 and below allows attackers with Administrator privileges to execute arbitrary code via injecting a crafted payload into an uploaded file name.
CWE-73 Dec 11, 2025
CVE-2025-67461 5.0 MEDIUM EPSS 0.00
Zoom Rooms for macOS <6.6.0 - Info Disclosure
External control of file name or path in Zoom Rooms for macOS before version 6.6.0 may allow an authenticated user to conduct a disclosure of information via local access.
CWE-73 Dec 10, 2025
CVE-2025-59516 7.8 HIGH EPSS 0.00
Windows Storage VSP Driver - Privilege Escalation
Missing authentication for critical function in Windows Storage VSP Driver allows an authorized attacker to elevate privileges locally.
CWE-306 Dec 09, 2025
CVE-2025-65799 4.3 MEDIUM EPSS 0.00
usememos memos <0.25.2 - Path Traversal
A lack of file name validation or verification in the Attachment service of usememos memos v0.25.2 allows attackers to execute a path traversal.
CWE-73 Dec 08, 2025
CVE-2020-36878 1 PoC Analysis EPSS 0.00
ReQuest Serious Play Media Player 3.0 - Info Disclosure
ReQuest Serious Play Media Player 3.0 contains an unauthenticated file disclosure vulnerability when input passed through the 'file' parameter in and script is not properly verified before being used to read web log files. Attackers can exploit this to disclose contents of files from local resources.
CWE-73 Dec 05, 2025
CVE-2025-12529 8.8 HIGH EPSS 0.00
WordPress Cost Calculator Builder <3.6.3 - RCE
The Cost Calculator Builder plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the deleteOrdersFiles() function in all versions up to, and including, 3.6.3. This makes it possible for unauthenticated attackers to inject arbitrary file paths into the orders that are removed, when an administrator deletes them. This can lead to remote code execution when the right file is deleted (such as wp-config.php). This vulnerability requires the Cost Calculator Builder Pro version to be installed along with the free version in order to be exploitable.
CWE-73 Dec 02, 2025