CVE & Exploit Intelligence Database

Updated 2h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

337,123 CVEs tracked 53,219 with exploits 4,686 exploited in wild 1,539 CISA KEV 3,912 Nuclei templates 37,757 vendors 42,422 researchers
6,958 results Clear all
CVE-2026-25045
Budibase - Privilege Escalation
Budibase is a low code platform for creating internal tools, workflows, and admin panels. This issue is a combination of Vertical Privilege Escalation and IDOR (Insecure Direct Object Reference) due to missing server-side RBAC checks in the /api/global/users endpoints. A Creator-level user, who should have no permissions to manage users or organizational roles, can instead promote an App Viewer to Tenant Admin, demote a Tenant Admin to App Viewer, or modify the Owner’s account details and all orders (e.g., change name). This is because the API accepts these actions without validating the requesting role, a Creator can replay Owner-only requests using their own session tokens. This leads to full tenant compromise.
CWE-862 Mar 09, 2026
CVE-2026-3638 5.9 MEDIUM
Devolutions Server <2025.3.11.0 - Privilege Escalation
Improper access control in user and role restore API endpoints in Devolutions Server 2025.3.11.0 and earlier allows a low-privileged authenticated user to restore deleted users and roles via crafted API requests.
CWE-862 Mar 09, 2026
CVE-2025-41765 9.1 CRITICAL EPSS 0.00
wwwupload.cgi - Auth Bypass
Due to insufficient authorization enforcement, an unauthorized remote attacker can exploit the wwwupload.cgi endpoint to upload and apply arbitrary data. This includes, but is not limited to, contact images, HTTPS certificates, system backups for restoration, server peer configurations, and BACnet/SC server certificates and keys.
CWE-862 Mar 09, 2026
CVE-2025-41764 9.1 CRITICAL EPSS 0.00
wwwupdate.cgi - Auth Bypass
Due to insufficient authorization enforcement, an unauthorized remote attacker can exploit the wwwupdate.cgi endpoint to upload and apply arbitrary updates.
CWE-862 Mar 09, 2026
CVE-2026-3770 4.3 MEDIUM EPSS 0.00
SourceCodester CLMS 1.0 - CSRF
A flaw has been found in SourceCodester Computer Laboratory Management System 1.0. This affects an unknown part. This manipulation causes cross-site request forgery. The attack is possible to be carried out remotely. The exploit has been published and may be used.
CWE-862 Mar 08, 2026
CVE-2026-30850 EPSS 0.00
Parse Server <8.6.9/9.5.0-alpha.9 - Auth Bypass
Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to versions 8.6.9 and 9.5.0-alpha.9, the file metadata endpoint (GET /files/:appId/metadata/:filename) does not enforce beforeFind / afterFind file triggers. When these triggers are used as access-control gates, the metadata endpoint bypasses them entirely, allowing unauthorized access to file metadata. This issue has been patched in versions 8.6.9 and 9.5.0-alpha.9.
CWE-862 Mar 07, 2026
CVE-2026-30842 4.3 MEDIUM 1 Writeup EPSS 0.00
Wallos <4.6.2 - Privilege Escalation
Wallos is an open-source, self-hostable personal subscription tracker. Prior to version 4.6.2, Wallos allows an authenticated user to delete avatar files uploaded by other users. The avatar deletion endpoint does not verify that the requested avatar belongs to the current user. As a result, any authenticated user who knows or can discover another user's uploaded avatar filename can delete that file. This issue has been patched in version 4.6.2.
CWE-862 Mar 07, 2026
CVE-2026-30823 8.8 HIGH EPSS 0.00
Flowise <3.0.13 - IDOR
Flowise is a drag & drop user interface to build a customized large language model flow. Prior to version 3.0.13, there is an IDOR vulnerability, leading to account takeover and enterprise feature bypass via SSO configuration. This issue has been patched in version 3.0.13.
CWE-862 Mar 07, 2026
CVE-2026-27796 5.3 MEDIUM 1 Writeup EPSS 0.00
Homarr <1.54.0 - Info Disclosure
Homarr is an open-source dashboard. Prior to version 1.54.0, the integration.all tRPC endpoint in Homarr is exposed as a publicProcedure, allowing unauthenticated users to retrieve a complete list of configured integrations. This metadata includes sensitive information such as internal service URLs, integration names, and service types. This issue has been patched in version 1.54.0.
CWE-200 Mar 07, 2026
CVE-2026-2488 4.3 MEDIUM EPSS 0.00
ProfileGrid WordPress Plugin <=5.9.8.1 - Auth Bypass
The ProfileGrid – User Profiles, Groups and Communities plugin for WordPress is vulnerable to unauthorized message deletion due to a missing capability check on the pg_delete_msg() function in all versions up to, and including, 5.9.8.1. This is due to the function not verifying that the requesting user has permission to delete the targeted message. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete arbitrary messages belonging to any user by sending a direct request with a valid message ID (mid parameter).
CWE-862 Mar 07, 2026
CVE-2026-1650 5.3 MEDIUM EPSS 0.00
MDJM Event Management Plugin <1.7.8.1 - Auth Bypass
The MDJM Event Management plugin for WordPress is vulnerable to unauthorized data modification due to a missing capability check on the 'custom_fields_controller' function in all versions up to, and including, 1.7.8.1. This makes it possible for unauthenticated attackers to delete arbitrary custom event fields via the 'delete_custom_field' and 'id' parameters.
CWE-862 Mar 07, 2026
CVE-2026-2371 5.3 MEDIUM EPSS 0.00
Greenshift Plugin <12.8.3 - Insecure Direct Object Reference
The Greenshift – animation and page builder blocks plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 12.8.3. This is due to missing authorization and post status validation in the `gspb_el_reusable_load()` AJAX handler. The handler accepts an arbitrary `post_id` parameter and renders the content of any `wp_block` post without checking `current_user_can('read_post', $post_id)` or verifying the post status. Combined with the nonce being exposed to unauthenticated users on any public page using the `[wp_reusable_render]` shortcode with `ajax="1"`, this makes it possible for unauthenticated attackers to retrieve the rendered HTML content of private, draft, or password-protected reusable blocks.
CWE-862 Mar 07, 2026
CVE-2026-1981 4.3 MEDIUM EPSS 0.00
HUMN-1 AI Website Scanner 0.0.3 - Auth Bypass
The HUMN-1 AI Website Scanner & Human Certification by Winston AI plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the winston_disconnect() function in all versions up to, and including, 0.0.3. This makes it possible for authenticated attackers, with Subscriber-level access and above, to reset the plugin's API connection settings via the 'winston_disconnect' AJAX action.
CWE-862 Mar 07, 2026
CVE-2026-30233 6.5 MEDIUM 1 Writeup EPSS 0.00
OliveTin <3000.11.1 - Auth Bypass
OliveTin gives access to predefined shell commands from a web interface. Prior to version 3000.11.1, an authorization flaw in OliveTin allows authenticated users with view: false permission to enumerate action bindings and metadata via dashboard and API endpoints. Although execution (exec) may be correctly denied, the backend does not enforce IsAllowedView() when constructing dashboard and action binding responses. As a result, restricted users can retrieve action titles, IDs, icons, and argument metadata. This issue has been patched in version 3000.11.1.
CWE-200 Mar 06, 2026
CVE-2026-29789 9.9 CRITICAL 1 Writeup EPSS 0.00
Vito <3.20.3 - Privilege Escalation
Vito is a self-hosted web application that helps manage servers and deploy PHP applications into production servers. Prior to version 3.20.3, a missing authorization check in workflow site-creation actions allows an authenticated attacker with workflow write access in one project to create/manage sites on servers belonging to other projects by supplying a foreign server_id. This issue has been patched in version 3.20.3.
CWE-862 Mar 06, 2026
CVE-2026-30845 1 Writeup EPSS 0.00
Wekan 8.31.0-8.33 - Info Disclosure
Wekan is an open source kanban tool built with Meteor. In versions 8.31.0 through 8.33, the board composite publication in Wekan publishes all integration data for a board without any field filtering, exposing sensitive fields including webhook URLs and authentication tokens to any subscriber. Since board publications are accessible to all board members regardless of their role (including read-only and comment-only users), and even to unauthenticated DDP clients for public boards, any user who can access a board can retrieve its webhook credentials. This token leak allows attackers to make unauthenticated requests to the exposed webhooks, potentially triggering unauthorized actions in connected external services. This issue has been fixed in version 8.34.
CWE-200 Mar 06, 2026
CVE-2026-28080 4.3 MEDIUM EPSS 0.00
Rank Math SEO PRO <3.0.95 - Privilege Escalation
Missing Authorization vulnerability in Rank Math Rank Math SEO PRO allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Rank Math SEO PRO: from n/a through 3.0.95.
CWE-862 Mar 06, 2026
CVE-2026-29073 EPSS 0.00
SiYuan <3.6.0 - SQL Injection
SiYuan is a personal knowledge management system. Prior to version 3.6.0, the /api/query/sql lets a user run sql directly, but it only checks basic auth, not admin rights, any logged-in user, even readers, can run any sql query on the database. This issue has been patched in version 3.6.0.
CWE-89 Mar 06, 2026
CVE-2026-2446 9.8 CRITICAL EPSS 0.00
PowerPack for LearnDash <1.3.0 - Privilege Escalation
The PowerPack for LearnDash WordPress plugin before 1.3.0 does not have authorization and CRSF checks in an AJAX action, allowing unauthenticated users to update arbitrary WordPress options (such as default_role etc) and create arbitrary admin users
CWE-862 Mar 06, 2026
CVE-2025-59544 4.3 MEDIUM EPSS 0.00
Chamilo <1.11.34 - Privilege Escalation
Chamilo is a learning management system. Prior to version 1.11.34, the functionality for the user to update the category does not implement authorization checks for the "category_id" parameter which allows users to update the category of any user by replacing the "category_id" parameter. This issue has been patched in version 1.11.34.
CWE-862 Mar 06, 2026