CVE & Exploit Intelligence Database

Updated 5h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

337,847 CVEs tracked 53,242 with exploits 4,725 exploited in wild 1,540 CISA KEV 3,918 Nuclei templates 37,802 vendors 42,493 researchers
352 results Clear all
CVE-2021-4472 6.5 MEDIUM EPSS 0.00
Mistral-OpenStack - Info Disclosure
The mistral-dashboard plugin for openstack has a local file inclusion vulnerability through the 'Create Workbook' feature that may result in disclosure of arbitrary local files content.
CWE-73 Nov 26, 2025
CVE-2025-66257 9.1 CRITICAL EPSS 0.00
DB Electronica Telecomunicazioni S.p.A. Mozart FM Transmitter - Pat...
Unauthenticated Arbitrary File Deletion (patch_contents.php) in DB Electronica Telecomunicazioni S.p.A. Mozart FM Transmitter versions 30, 50, 100, 300, 500, 1000, 2000, 3000, 3500, 6000, 7000 allows an attacker to perform The deletepatch parameter allows unauthenticated deletion of arbitrary files. The `deletepatch` parameter in `patch_contents.php` allows unauthenticated deletion of arbitrary files in `/var/www/patch/` directory without sanitization or access control checks.
CWE-73 Nov 26, 2025
CVE-2025-66254 9.1 CRITICAL EPSS 0.00
DB Electronica Telecomunicazioni S.p.A. Mozart FM Transmitter - Una...
Unauthenticated Arbitrary File Deletion (upgrade_contents.php) in DB Electronica Telecomunicazioni S.p.A. Mozart FM Transmitter versions 30, 50, 100, 300, 500, 1000, 2000, 3000, 3500, 6000, 7000 allows an attacker to perform The deleteupgrade parameter allows unauthenticated deletion of arbitrary files.  The `deleteupgrade` parameter in `/var/www/upgrade_contents.php` allows unauthenticated deletion of arbitrary files in `/var/www/upload/` without any extension restriction or path sanitization, enabling attackers to remove critical system files.
CWE-73 Nov 26, 2025
CVE-2025-13380 6.5 MEDIUM 1 PoC Analysis EPSS 0.00
AI Engine for WordPress: ChatGPT - Arbitrary File Read
The AI Engine for WordPress: ChatGPT, GPT Content Generator plugin for WordPress is vulnerable to Arbitrary File Read in all versions up to, and including, 1.0.1. This is due to insufficient validation of user-supplied file paths in the 'lqdai_update_post' AJAX endpoint and the use of file_get_contents() with user-controlled URLs without protocol restrictions in the insert_image() function. This makes it possible for authenticated attackers, with Contributor-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information.
CWE-73 Nov 25, 2025
CVE-2025-30201 7.7 HIGH 1 Writeup EPSS 0.00
Wazuh <4.13.0 - Privilege Escalation
Wazuh is a free and open source platform used for threat prevention, detection, and response. Prior to version 4.13.0, a vulnerability in Wazuh Agent allows authenticated attackers to force NTLM authentication through malicious UNC paths in various agent configuration settings, potentially leading NTLM relay attacks that would result privilege escalation and remote code execution. This issue has been patched in version 4.13.0.
CWE-294 Nov 21, 2025
CVE-2025-11973 4.9 MEDIUM EPSS 0.00
简数采集器 WordPress Plugin <=2.6.3 - Info Disclosure
The 简数采集器 plugin for WordPress is vulnerable to Arbitrary File Read in all versions up to, and including, 2.6.3 via the __kds_flag functionality that imports featured images. This makes it possible for authenticated attackers, with Adminstrator-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information.
CWE-73 Nov 21, 2025
CVE-2025-13322 8.1 HIGH EPSS 0.00
WP AUDIO GALLERY <2.0 - Privilege Escalation
The WP AUDIO GALLERY plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in all versions up to, and including, 2.0. This is due to the `wpag_uploadaudio_callback()` AJAX handler not properly validating user-supplied file paths in the `audio_upload` parameter before passing them to `unlink()`. This makes it possible for authenticated attackers, with subscriber-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when critical files like wp-config.php are deleted.
CWE-73 Nov 21, 2025
CVE-2025-64714 5.8 MEDIUM 1 Writeup EPSS 0.00
Privatebin < 2.0.3 - Remote Code Execution
PrivateBin is an online pastebin where the server has zero knowledge of pasted data. Starting in version 1.7.7 and prior to version 2.0.3, an unauthenticated Local File Inclusion exists in the template-switching feature. If `templateselection` is enabled in the configuration, the server trusts the `template` cookie and includes the referenced PHP file. An attacker can read sensitive data or, if they manage to drop a PHP file elsewhere, gain remote code execution. The constructed path of the template file is checked for existence, then included. For PrivateBin project files this does not leak any secrets due to data files being created with PHP code that prevents execution, but if a configuration file without that line got created or the visitor figures out the relative path to a PHP script that directly performs an action without appropriate privilege checking, those might execute or leak information. The issue has been patched in version 2.0.3. As a workaround, set `templateselection = false` (which is the default) in `cfg/conf.php` or remove it entirely
CWE-98 Nov 13, 2025
CVE-2025-64739 4.3 MEDIUM EPSS 0.00
Zoom Client - Info Disclosure
External control of file name or path in certain Zoom Clients may allow an unauthenticated user to conduct a disclosure of information via network access.
CWE-73 Nov 13, 2025
CVE-2025-64738 5.0 MEDIUM EPSS 0.00
Zoom Workplace for macOS <6.5.10 - Info Disclosure
External control of file name or path in Zoom Workplace for macOS before version 6.5.10 may allow an authenticated user to conduct a disclosure of information via local access.
CWE-73 Nov 13, 2025
CVE-2022-4983 EPSS 0.00
TEC-IT TBarCode 11.15 - RCE
TEC-IT TBarCode version 11.15 contains a vulnerability in the TBarCode11.ocx ActiveX/OCX control's licensing handling (INI-file based) that can be abused to cause remote creation of files on the host filesystem. Depending on where files can be created and which filenames are allowed, this can allow attackers to write files that lead to code execution or persistence under the context of the hosting process.
CWE-73 Nov 12, 2025
CVE-2025-59511 7.8 HIGH EPSS 0.00
Windows WLAN Service - Privilege Escalation
External control of file name or path in Windows WLAN Service allows an authorized attacker to elevate privileges locally.
CWE-73 Nov 11, 2025
CVE-2025-20614 6.7 MEDIUM EPSS 0.00
Intel(R) CIP <WIN_DCA_2.4.0.11001 - Privilege Escalation
External control of file name or path for some Intel(R) CIP software before version WIN_DCA_2.4.0.11001 within Ring 3: User Applications may allow an escalation of privilege. Unprivileged software adversary with a privileged user combined with a low complexity attack may enable escalation of privilege. This result may potentially occur via local access when attack requirements are present without special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (high), integrity (low) and availability (none) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (none) impacts.
CWE-73 Nov 11, 2025
CVE-2025-8998 3.1 LOW EPSS 0.00
Unknown - Info Disclosure
It was possible to upload files with a specific name to a temporary directory, which may result in process crashes and impact usability. This flaw can only be exploited after authenticating with an operator- or administrator-privileged service account.
CWE-73 Nov 11, 2025
CVE-2025-11451 7.5 HIGH EPSS 0.00
Auto Amazon Links - Amazon Associates Affiliate Plugin <5.4.3 - Inf...
The Auto Amazon Links – Amazon Associates Affiliate Plugin plugin for WordPress is vulnerable to arbitrary files reads in all versions up to, and including, 5.4.3 via the '/wp-json/wp/v2/aal_ajax_unit_loading' RST API endpoint. This makes it possible for unauthenticated attackers to read the contents of arbitrary files on the server, which can contain sensitive information.
CWE-73 Nov 11, 2025
CVE-2025-12915 6.4 MEDIUM 1 Writeup EPSS 0.00
70mai X200 <20251019 - File Inclusion
A vulnerability was found in 70mai X200 up to 20251019. This issue affects some unknown processing of the component Init Script Handler. The manipulation results in file inclusion. The attack requires a local approach. A high complexity level is associated with this attack. The exploitability is assessed as difficult. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
CWE-73 Nov 08, 2025
CVE-2025-64486 1 Writeup EPSS 0.00
calibre <8.13.0 - Code Injection
calibre is an e-book manager. In versions 8.13.0 and prior, calibre does not validate filenames when handling binary assets in FB2 files, allowing an attacker to write arbitrary files on the filesystem when viewing or converting a malicious FictionBook file. This can be leveraged to achieve arbitrary code execution. This issue is fixed in version 8.14.0.
CWE-73 Nov 08, 2025
CVE-2025-12137 4.9 MEDIUM 1 Writeup EPSS 0.00
Import WP - Path Traversal
The Import WP – Export and Import CSV and XML files to WordPress plugin for WordPress is vulnerable to Arbitrary File Read in all versions up to, and including, 2.14.16. This is due to the plugin's REST API endpoint accepting arbitrary absolute file paths without proper validation in the 'attach_file()' function when handling 'file_local' actions. This makes it possible for authenticated attackers, with administrator-level access and above, to read arbitrary files on the server's filesystem, including sensitive configuration files and system files via the 'local_url' parameter.
CWE-73 Nov 01, 2025
CVE-2020-36868 7.8 HIGH EPSS 0.00
Nagios XI <5.7.3 - Privilege Escalation
Nagios XI versions prior to 5.7.3 contain a privilege escalation vulnerability in the getprofile.sh helper script. The script performed profile retrieval and initialization routines using insecure file/command handling and insufficient validation of attacker-controlled inputs, and in some deployments executed with elevated privileges. A local attacker with low-level access could exploit these weaknesses to cause the script to execute arbitrary commands or modify privileged files, resulting in privilege escalation.
CWE-250 Oct 30, 2025
CVE-2025-62611 1 Writeup EPSS 0.00
aiomysql <0.3.0 - Code Injection
aiomysql is a library for accessing a MySQL database from the asyncio. Prior to version 0.3.0, the client-side settings are not checked before sending local files to MySQL server, which allows obtaining arbitrary files from the client using a rogue server. It is possible to create a rogue MySQL server that emulates authorization, ignores client flags and requests arbitrary files from the client by sending a LOAD_LOCAL instruction packet. This issue has been patched in version 0.3.0.
CWE-73 Oct 22, 2025