CVE & Exploit Intelligence Database

Updated 2h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

337,123 CVEs tracked 53,219 with exploits 4,686 exploited in wild 1,539 CISA KEV 3,912 Nuclei templates 37,757 vendors 42,422 researchers
174 results Clear all
CVE-2025-11175 EPSS 0.00
Mediawiki - DiscussionTools Extension <1.44-1.43 - Code Injection
Improper Neutralization of Special Elements used in an Expression Language Statement ('Expression Language Injection') vulnerability in The Wikimedia Foundation Mediawiki - DiscussionTools Extension allows Regular Expression Exponential Blowup.This issue affects Mediawiki - DiscussionTools Extension: 1.44, 1.43.
CWE-917 Jan 30, 2026
CVE-2025-41253 7.5 HIGH EPSS 0.00
Spring Cloud Gateway Server Webflux - Info Disclosure
The following versions of Spring Cloud Gateway Server Webflux may be vulnerable to the ability to expose environment variables and system properties to attackers. An application should be considered vulnerable when all the following are true: * The application is using Spring Cloud Gateway Server Webflux (Spring Cloud Gateway Server WebMVC is not vulnerable). * An admin or untrusted third party using Spring Expression Language (SpEL) to access environment variables or system properties via routes. * An untrusted third party could create a route that uses SpEL to access environment variables or system properties if: * The Spring Cloud Gateway Server Webflux actuator web endpoint is enabled via management.endpoints.web.exposure.include=gateway and management.endpoint.gateway.enabled=trueor management.endpoint.gateway.access=unrestricte. * The actuator endpoints are available to attackers. * The actuator endpoints are unsecured.
CWE-917 Oct 16, 2025
CVE-2025-41243 10.0 CRITICAL 1 PoC Analysis NUCLEI EPSS 0.02
Spring Cloud Gateway Server Webflux - Info Disclosure
Spring Cloud Gateway Server Webflux may be vulnerable to Spring Environment property modification. An application should be considered vulnerable when all the following are true: * The application is using Spring Cloud Gateway Server Webflux (Spring Cloud Gateway Server WebMVC is not vulnerable). * Spring Boot actuator is a dependency. * The Spring Cloud Gateway Server Webflux actuator web endpoint is enabled via management.endpoints.web.exposure.include=gateway. * The actuator endpoints are available to attackers. * The actuator endpoints are unsecured.
CWE-917 Sep 16, 2025
CVE-2025-3322 EPSS 0.01
Product - Code Injection
An improper neutralization of inputs used in expression language allows remote code execution with the highest privileges on the server.
CWE-917 Jun 06, 2025
CVE-2024-51466 9.0 CRITICAL EPSS 0.00
IBM Cognos Analytics <11.2.4 FP4-12.0.4 - Code Injection
IBM Cognos Analytics 11.2.0 through 11.2.4 FP4 and 12.0.0 through 12.0.4 is vulnerable to an Expression Language (EL) Injection vulnerability. A remote attacker could exploit this vulnerability to expose sensitive information, consume memory resources, and/or cause the server to crash when using a specially crafted EL statement.
CWE-917 Dec 20, 2024
CVE-2024-12798 EPSS 0.00
JaninoEventEvaluator <1.3.14, <1.5.12 - RCE
ACE vulnerability in JaninoEventEvaluator by QOS.CH logback-core upto including version 0.1 to 1.3.14 and 1.4.0 to 1.5.12 in Java applications allows attacker to execute arbitrary code by compromising an existing logback configuration file or by injecting an environment variable before program execution. Malicious logback configuration files can allow the attacker to execute arbitrary code using the JaninoEventEvaluator extension. A successful attack requires the user to have write access to a configuration file. Alternatively, the attacker could inject a malicious environment variable pointing to a malicious configuration file. In both cases, the attack requires existing privilege.
CWE-917 Dec 19, 2024
CVE-2024-9672 5.4 MEDIUM EPSS 0.01
Papercut MF < 24.1.1 - XSS
A reflected cross-site scripting (XSS) vulnerability exists in PaperCut NG/MF. This issue can be used to execute specially created JavaScript payloads in the browser. A user must click on a malicious link for this issue to occur.
CWE-917 Dec 10, 2024
CVE-2024-7552 6.3 MEDIUM 1 PoC EPSS 0.00
DataGear <5.0.0 - Improper Neutralization
A vulnerability was found in DataGear up to 5.0.0. It has been declared as critical. Affected by this vulnerability is the function evaluateVariableExpression of the file ConversionSqlParamValueMapper.java of the component Data Schema Page. The manipulation leads to improper neutralization of special elements used in an expression language statement. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-273697 was assigned to this vulnerability.
CWE-917 Aug 06, 2024
CVE-2024-5828 8.6 HIGH EPSS 0.01
Hitachi Tuning Manager <8.8.7-00 - Code Injection
Expression Language Injection vulnerability in Hitachi Tuning Manager on Windows, Linux, Solaris allows Code Injection.This issue affects Hitachi Tuning Manager: before 8.8.7-00.
CWE-917 Aug 06, 2024
CVE-2024-4286 4.9 MEDIUM 1 Writeup EPSS 0.00
Mintplex-Labs' anything-llm - Info Disclosure
Mintplex-Labs' anything-llm application is vulnerable to improper neutralization of special elements used in an expression language statement, identified in the commit id `57984fa85c31988b2eff429adfc654c46e0c342a`. The vulnerability arises from the application's handling of user modifications by managers or admins, allowing for the modification of all existing attributes of the `user` database entity without proper checks or sanitization. This flaw can be exploited to delete user threads, denying users access to their previously submitted data, or to inject fake threads and/or chat history for social engineering attacks.
CWE-917 May 26, 2024
CVE-2023-51593 9.8 CRITICAL EPSS 0.03
Voltronic Power ViewPower Pro - RCE
Voltronic Power ViewPower Pro Expression Language Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Voltronic Power ViewPower Pro. Authentication is not required to exploit this vulnerability. The specific flaw exists within the Struts2 dependency. The issue results from the use of a library that is vulnerable to expression language injection. An attacker can leverage this vulnerability to execute code in the context of LOCAL SERVICE. Was ZDI-CAN-22095.
CWE-917 May 03, 2024
CVE-2024-0715 7.6 HIGH EPSS 0.01
Hitachi Global Link Manager <8.8.7-03 - Code Injection
Expression Language Injection vulnerability in Hitachi Global Link Manager on Windows allows Code Injection.This issue affects Hitachi Global Link Manager: before 8.8.7-03.
CWE-917 Feb 20, 2024
CVE-2023-42658 8.8 HIGH EPSS 0.00
Chef InSpec <4.56.58, 5.22.29 - Command Injection
Archive command in Chef InSpec prior to 4.56.58 and 5.22.29 allow local command execution via maliciously crafted profile.
CWE-917 Oct 31, 2023
CVE-2023-41331 9.8 CRITICAL EPSS 0.04
SOFARPC <5.11.0 - Command Injection
SOFARPC is a Java RPC framework. Versions prior to 5.11.0 are vulnerable to remote command execution. Through a carefully crafted payload, an attacker can achieve JNDI injection or system command execution. In the default configuration of the SOFARPC framework, a blacklist is used to filter out dangerous classes encountered during the deserialization process. However, the blacklist is not comprehensive, and an actor can exploit certain native JDK classes and common third-party packages to construct gadget chains capable of achieving JNDI injection or system command execution attacks. Version 5.11.0 contains a fix for this issue. As a workaround, users can add `-Drpc_serialize_blacklist_override=javax.sound.sampled.AudioFileFormat` to the blacklist.
CWE-917 Sep 12, 2023
CVE-2022-4146 7.3 HIGH EPSS 0.00
Hitachi Replication Manager <8.8.5-02 - Code Injection
Expression Language Injection vulnerability in Hitachi Replication Manager on Windows, Linux, Solaris allows Code Injection.This issue affects Hitachi Replication Manager: before 8.8.5-02.
CWE-917 Jul 18, 2023
CVE-2022-45855 8.0 HIGH EPSS 0.00
Apache Ambari <2.7.7 - RCE
SpringEL injection in the metrics source in Apache Ambari version 2.7.0 to 2.7.6 allows a malicious authenticated user to execute arbitrary code remotely. Users are recommended to upgrade to 2.7.7.
CWE-917 Jul 12, 2023
CVE-2022-42009 8.0 HIGH EPSS 0.00
Apache Ambari <2.7.7 - RCE
SpringEL injection in the server agent in Apache Ambari version 2.7.0 to 2.7.6 allows a malicious authenticated user to execute arbitrary code remotely. Users are recommended to upgrade to 2.7.7.
CWE-917 Jul 12, 2023
CVE-2023-32200 8.8 HIGH EPSS 0.01
Apache Jena <4.8.0 - RCE
There is insufficient restrictions of called script functions in Apache Jena versions 4.8.0 and earlier. It allows a remote user to execute javascript via a SPARQL query. This issue affects Apache Jena: from 3.7.0 through 4.8.0.
CWE-917 Jul 12, 2023
CVE-2023-22665 5.4 MEDIUM EPSS 0.01
Apache Jena <4.7.0 - XSS
There is insufficient checking of user queries in Apache Jena versions 4.7.0 and earlier, when invoking custom scripts. It allows a remote user to execute arbitrary javascript via a SPARQL query.
CWE-917 Apr 25, 2023
CVE-2023-20863 6.5 MEDIUM EPSS 0.01
Vmware Spring Framework < 5.2.24 - Denial of Service
In spring framework versions prior to 5.2.24 release+ ,5.3.27+ and 6.0.8+ , it is possible for a user to provide a specially crafted SpEL expression that may cause a denial-of-service (DoS) condition.
CWE-917 Apr 13, 2023