CVE & Exploit Intelligence Database

Updated 2h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

337,867 CVEs tracked 53,243 with exploits 4,725 exploited in wild 1,540 CISA KEV 3,925 Nuclei templates 37,802 vendors 42,500 researchers
1,626 results Clear all
CVE-2025-41722 7.5 HIGH EPSS 0.00
wsc server - Info Disclosure
The wsc server uses a hard-coded certificate to check the authenticity of SOAP messages. An unauthenticated remote attacker can extract private keys from the Software of the affected devices.
CWE-798 Oct 22, 2025
CVE-2025-10639 8.8 HIGH EPSS 0.00
WorkExaminer Professional - RCE
The WorkExaminer Professional server installation comes with an FTP server that is used to receive the client logs on TCP port 12304. An attacker with network access to this port can use weak hardcoded credentials to login to the FTP server and modify or read data, log files and gain remote code execution as NT Authority\SYSTEM on the server by exchanging accessible service binaries in the WorkExaminer installation directory (e.g. "C:\Program File (x86)\Work Examiner Professional Server").
CWE-798 Oct 21, 2025
CVE-2025-6950 EPSS 0.00
Moxa - Use After Free
An Use of Hard-coded Credentials vulnerability has been identified in Moxa’s network security appliances and routers. The system employs a hard-coded secret key to sign JSON Web Tokens (JWT) used for authentication. This insecure implementation allows an unauthenticated attacker to forge valid tokens, thereby bypassing authentication controls and impersonating any user. Exploitation of this vulnerability can result in complete system compromise, enabling unauthorized access, data theft, and full administrative control over the affected device. While successful exploitation can severely impact the confidentiality, integrity, and availability of the affected device itself, there is no loss of confidentiality or integrity within any subsequent systems.
CWE-798 Oct 17, 2025
CVE-2025-60639 6.5 MEDIUM EPSS 0.00
gsigel14 ATLAS-EPIC - Info Disclosure
Hardcoded credentials in gsigel14 ATLAS-EPIC commit f29312c (2025-05-26).
CWE-798 Oct 16, 2025
CVE-2025-10850 9.8 CRITICAL EPSS 0.00
Felan Framework <1.1.4 - Auth Bypass
The Felan Framework plugin for WordPress is vulnerable to improper authentication in versions up to, and including, 1.1.4. This is due to the hardcoded password in the 'fb_ajax_login_or_register' function and in the 'google_ajax_login_or_register' function. This makes it possible for unauthenticated attackers to log in as any existing user on the site, if they registered with facebook or google social login and did not change their password.
CWE-798 Oct 16, 2025
CVE-2025-56749 9.4 CRITICAL EPSS 0.00
Creativeitem Academy Lms < 6.14 - Hard-coded Credentials
Creativeitem Academy LMS up to and including 6.14 uses a hardcoded default JWT secret for token signing. This predictable secret allows attackers to forge valid JWT tokens, leading to authentication bypass and unauthorized access to any user account.
CWE-798 Oct 15, 2025
CVE-2025-36087 8.1 HIGH EPSS 0.00
IBM Security Verify Access < 10.0.9 - Hard-coded Credentials
IBM Security Verify Access 10.0.0 through 10.0.9, 11.0.0, IBM Verify Identity Access Container 10.0.0 through 10.0.9, and 11.0.0, under certain configurations, contains hard-coded credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data.
CWE-798 Oct 13, 2025
CVE-2025-11643 3.7 LOW EPSS 0.00
Tomofun Furbo - Hard-coded Credentials
A security flaw has been discovered in Tomofun Furbo 360 and Furbo Mini. Affected by this vulnerability is an unknown functionality of the file /squashfs-root/furbo_img of the component MQTT Client Certificate. Performing manipulation results in hard-coded credentials. The attack may be initiated remotely. The attack's complexity is rated as high. The exploitation appears to be difficult. The firmware versions determined to be affected are Furbo 360 up to FB0035_FW_036 and Furbo Mini up to MC0020_FW_074. The vendor was contacted early about this disclosure but did not respond in any way.
CWE-259 Oct 12, 2025
CVE-2025-61926 1 Writeup EPSS 0.00
Allstar <4.5 - Auth Bypass
Allstar is a GitHub App to set and enforce security policies. In versions prior to 4.5, a vulnerability in Allstar’s Reviewbot component caused inbound webhook requests to be validated against a hard-coded, shared secret. The value used for the secret token was compiled into the Allstar binary and could not be configured at runtime. In practice, this meant that every deployment using Reviewbot would validate requests with the same secret unless the operator modified source code and rebuilt the component - an expectation that is not documented and is easy to miss. All Allstar releases prior to v4.5 that include the Reviewbot code path are affected. Deployments on v4.5 and later are not affected. Those who have not enabled or exposed the Reviewbot endpoint are not exposed to this issue.
CWE-453 Oct 09, 2025
CVE-2025-10609 5.9 MEDIUM EPSS 0.00
Logo Software Inc. TigerWings ERP <3.03.00 - Info Disclosure
Use of Hard-coded Credentials vulnerability in Logo Software Inc. TigerWings ERP allows Read Sensitive Constants Within an Executable.This issue affects TigerWings ERP: from 01.01.00 before 3.03.00.
CWE-798 Oct 03, 2025
CVE-2025-0642 6.3 MEDIUM EPSS 0.00
PosCube Hardware Software and Consulting Ltd. Co. Assist <10.02.202...
Use of Hard-coded Credentials, Authorization Bypass Through User-Controlled Key vulnerability in PosCube Hardware Software and Consulting Ltd. Co. Assist allows Excavation, Authentication Bypass.This issue affects Assist: through 10.02.2025.
CWE-639 Oct 02, 2025
CVE-2025-34223 9.8 CRITICAL EPSS 0.02
Vasion Virtual Appliance Application - Missing Authentication
Vasion Print (formerly PrinterLogic) Virtual Appliance Host prior to version 22.0.1049 and Application prior to version 20.0.2786 (VA/SaaS deployments) contain a default admin account and an installation‑time endpoint at `/admin/query/update_database.php` that can be accessed without authentication. An attacker who can reach the installation web interface can POST arbitrary `root_user` and `root_password` values, causing the script to replace the default admin credentials with attacker‑controlled ones. The script also contains hard‑coded SHA‑512 and SHA‑1 hashes of the default password, allowing the attacker to bypass password‑policy validation. As a result, an unauthenticated remote attacker can obtain full administrative control of the system during the initial setup. This vulnerability has been identified by the vendor as: V-2024-022 — Insecure Installation Credentials.
CWE-306 Sep 29, 2025
CVE-2025-34209 7.2 HIGH EPSS 0.00
Vasion Virtual Appliance Application - Hard-coded Credentials
Vasion Print (formerly PrinterLogic) Virtual Appliance Host prior to 22.0.862 and Application prior to 20.0.2014 (VA and SaaS deployments) contain Docker images with the private GPG key and passphrase for the account *no‑reply+virtual‑[email protected]*. The key is stored in cleartext and the passphrase is hardcoded in files. An attacker with administrative access to the appliance can extract the private key, import it into their own system, and subsequently decrypt GPG-encrypted files and sign arbitrary firmware update packages. A maliciously signed update can be uploaded by an admin‑level attacker and will be executed by the appliance, giving the attacker full control of the virtual appliance. This vulnerability has been identified by the vendor as: V-2023-010 — Hardcoded Private Key.
CWE-798 Sep 29, 2025
CVE-2025-34196 9.8 CRITICAL EPSS 0.00
Vasion Virtual Appliance Application < 25.1.1413 - Insufficiently Protected Credentials
Vasion Print (formerly PrinterLogic) Virtual Appliance Host versions prior to 25.1.102 and Application prior to 25.1.1413 (Windows client deployments) contain a hardcoded private key for the PrinterLogic Certificate Authority (CA) and a hardcoded password in product configuration files. The Windows client ships the CA certificate and its associated private key (and other sensitive settings such as a configured password) directly in shipped configuration files (for example clientsettings.dat and defaults.ini). An attacker who obtains these files can impersonate the CA, sign arbitrary certificates trusted by the Windows client, intercept or decrypt TLS-protected communications, and otherwise perform man-in-the-middle or impersonation attacks against the product's network communications. This vulnerability has been identified by the vendor as: V-2022-001 — Configuration File Contains CA & Private Key.
CWE-522 Sep 29, 2025
CVE-2025-11126 9.8 CRITICAL EPSS 0.00
Apeman ID71 - Info Disclosure
A security flaw has been discovered in Apeman ID71 218.53.203.117. This vulnerability affects unknown code of the file /system/www/system.ini. The manipulation results in hard-coded credentials. The attack may be performed from remote. The exploit has been released to the public and may be exploited. The vendor was contacted early about this disclosure but did not respond in any way.
CWE-259 Sep 29, 2025
CVE-2025-58385 7.1 HIGH EPSS 0.00
DOXENSE WATCHDOC <6.1.0.5094 - Info Disclosure
In DOXENSE WATCHDOC before 6.1.0.5094, private user puk codes can be disclosed for Active Directory registered users (there is hard-coded and predictable data).
CWE-798 Sep 26, 2025
CVE-2025-58659 5.3 MEDIUM EPSS 0.00
Essekia Helpie FAQ <1.39 - Info Disclosure
Use of Hard-coded Credentials vulnerability in Essekia Helpie FAQ allows Retrieve Embedded Sensitive Data. This issue affects Helpie FAQ: from n/a through 1.39.
CWE-798 Sep 22, 2025
CVE-2025-58656 5.3 MEDIUM EPSS 0.00
Estonian Shipping Methods for WooCommerce <1.7.2 - Info Disclosure
Use of Hard-coded Credentials vulnerability in Risto Niinemets Estonian Shipping Methods for WooCommerce allows Retrieve Embedded Sensitive Data. This issue affects Estonian Shipping Methods for WooCommerce: from n/a through 1.7.2.
CWE-798 Sep 22, 2025
CVE-2025-58269 5.3 MEDIUM EPSS 0.00
WP Project Manager <2.6.25 - Info Disclosure
Use of Hard-coded Credentials vulnerability in weDevs WP Project Manager allows Retrieve Embedded Sensitive Data. This issue affects WP Project Manager: from n/a through 2.6.25.
CWE-798 Sep 22, 2025
CVE-2025-57434 8.8 HIGH 1 Writeup EPSS 0.00
Creacast Creabox Manager - Authentication Bypass
Creacast Creabox Manager contains a critical authentication flaw that allows an attacker to bypass login validation. The system grants access when the username is creabox and the password begins with the string creacast, regardless of what follows.
CWE-287 Sep 22, 2025