Exploit Intelligence Platform
Updated 4h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
410 results
Clear all
CVE-2025-66294
8.8
HIGH
1 PoC
Analysis
EPSS 0.41
Grav <1.8.0-beta.27 - SSTI
Grav is a file-based Web platform. Prior to 1.8.0-beta.27, a Server-Side Template Injection (SSTI) vulnerability exists in Grav that allows authenticated attackers with editor permissions to execute arbitrary commands on the server and, under certain conditions, may also be exploited by unauthenticated attackers. This vulnerability stems from weak regex validation in the cleanDangerousTwig method. This vulnerability is fixed in 1.8.0-beta.27.
CWE-1336
Dec 01, 2025
CVE-2025-10351
CRITICAL
2 PoCs
Analysis
EPSS 0.00
Melisplatform Melis-cms < 5.3.4 - SQL Injection
SQL injection vulnerability based on the melis-cms module of the Melis platform from Melis Technology. This vulnerability allows an attacker to retrieve, create, update, and delete databases through the 'idPage' parameter in the '/melis/MelisCms/PageEdition/getTinyTemplates' endpoint.
CWE-89
Oct 08, 2025
CVE-2025-27515
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.00
Laravel - Info Disclosure
Laravel is a web application framework. When using wildcard validation to validate a given file or image field (`files.*`), a user-crafted malicious request could potentially bypass the validation rules. This vulnerability is fixed in 11.44.1 and 12.1.1.
CWE-155
Mar 05, 2025
CVE-2025-61922
9.1
CRITICAL
2 PoCs
Analysis
EPSS 0.00
Prestashop Checkout < 7.4.4.1 - Authentication Bypass
PrestaShop Checkout is the PrestaShop official payment module in partnership with PayPal. Starting in version 1.3.0 and prior to versions 4.4.1 and 5.0.5, missing validation on the Express Checkout feature allows silent login, enabling account takeover via email. The vulnerability is fixed in versions 4.4.1 and 5.0.5. No known workarounds exist.
CWE-287
Oct 16, 2025
CVE-2025-65346
9.1
CRITICAL
1 PoC
Analysis
EPSS 0.00
Alexusmai Laravel File Manager < 3.3.1 - Path Traversal
alexusmai laravel-file-manager 3.3.1 and below is vulnerable to Directory Traversal. The unzip/extraction functionality improperly allows archive contents to be written to arbitrary locations on the filesystem due to insufficient validation of extraction paths.
CWE-22
Dec 04, 2025
CVE-2025-65345
6.5
MEDIUM
1 PoC
Analysis
EPSS 0.00
Alexusmai Laravel File Manager < 3.3.1 - Path Traversal
alexusmai laravel-file-manager 3.3.1 and below is vulnerable to Directory Traversal. The zip/archiving functionality allows an attacker to create archives containing files and directories outside the intended scope due to improper path validation.
CWE-22
Dec 03, 2025
CVE-2025-64027
6.1
MEDIUM
1 PoC
Analysis
EPSS 0.00
Snipeitapp Snipe-it - XSS
Snipe-IT v8.3.4 (build 20218) contains a reflected cross-site scripting (XSS) vulnerability in the CSV Import workflow. When an invalid CSV file is uploaded, the application returns a progress_message value that is rendered as raw HTML in the admin interface. An attacker can intercept and modify the POST /livewire/update request to inject arbitrary HTML or JavaScript into the progress_message. Because the server accepts the modified input without sanitization and reflects it back to the user, arbitrary JavaScript executes in the browser of any authenticated admin who views the import page. NOTE: this is disputed by the Supplier because the report only demonstrates that an authenticated user can choose to conduct a man-in-the-middle attack against himself.
CWE-79
Nov 20, 2025
CVE-2025-51586
3.7
LOW
1 PoC
Analysis
NUCLEI
EPSS 0.01
PrestaShop <8.2.1 - Info Disclosure
An issue was discoverd in file controllers/admin/AdminLoginController.php in PrestaShop before 8.2.1 allowing attackers to gain sensitive information via the reset password feature.
CWE-359
Sep 08, 2025
CVE-2025-10909
2.4
LOW
1 PoC
Analysis
EPSS 0.00
Novosga - Code Injection
A security flaw has been discovered in Mangati NovoSGA up to 2.2.9. The impacted element is an unknown function of the file /admin of the component SVG File Handler. Performing manipulation of the argument logoNavbar/logoLogin results in cross site scripting. Remote exploitation of the attack is possible. The exploit has been released to the public and may be exploited.
CWE-79
Sep 24, 2025
CVE-2025-59713
6.8
MEDIUM
1 PoC
Analysis
EPSS 0.00
Snipeitapp Snipe-it < 8.1.18 - Insecure Deserialization
Snipe-IT before 8.1.18 allows unsafe deserialization.
CWE-502
Sep 19, 2025
CVE-2025-59712
6.4
MEDIUM
1 PoC
Analysis
EPSS 0.00
Snipeitapp Snipe-it < 8.1.18 - XSS
Snipe-IT before 8.1.18 allows XSS.
CWE-79
Sep 19, 2025
CVE-2025-8573
4.8
MEDIUM
1 PoC
Analysis
EPSS 0.00
Concretecms Concrete Cms < 9.4.3 - XSS
Concrete CMS versions 9 through 9.4.2 are vulnerable to Stored XSS from Home Folder on Members Dashboard page. Version 8 was not affected. A rogue admin could set up a malicious folder containing XSS to which users could be directed upon login. The Concrete CMS security team gave this vulnerability a CVSS v.4.0 score of 2.0 with vector CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N. Thanks sealldev (Noah Cooper) for reporting via HackerOne.
CWE-20
Aug 05, 2025
CVE-2025-8571
4.8
MEDIUM
1 PoC
Analysis
EPSS 0.00
Concretecms Concrete Cms < 8.5.21 - XSS
Concrete CMS 9 to 9.4.2 and versions below 8.5.21 are vulnerable to Reflected Cross-Site Scripting (XSS) in the Conversation Messages Dashboard Page. Unsanitized input could cause theft of session cookies or tokens, defacement of web content, redirection to malicious sites, and (if victim is an admin), the execution of unauthorized actions. The Concrete CMS security team gave this vulnerability a CVSS v.4.0 score of 4.8 with vector CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N. Thanks Fortbridge https://fortbridge.co.uk/ for performing a penetration test and vulnerability assessment on Concrete CMS and reporting this issue.
CWE-20
Aug 05, 2025
CVE-2025-22131
6.1
MEDIUM
2 PoCs
Analysis
EPSS 0.00
PhpSpreadsheet - XSS
PhpSpreadsheet is a PHP library for reading and writing spreadsheet files. Cross-Site Scripting (XSS) vulnerability in the code which translates the XLSX file into a HTML representation and displays it in the response.
CWE-79
Jan 20, 2025
CVE-2025-50383
8.1
HIGH
1 PoC
Analysis
EPSS 0.00
Easy!Appointments v1.5.1 - SQL Injection
alextselegidis Easy!Appointments v1.5.1 was discovered to contain a SQL injection vulnerability via the order_by parameter.
CWE-89
Aug 25, 2025
CVE-2025-43960
8.6
HIGH
1 PoC
Analysis
EPSS 0.00
Adminer - Insecure Deserialization
Adminer 4.8.1, when using Monolog for logging, allows a Denial of Service (memory consumption) via a crafted serialized payload (e.g., using s:1000000000), leading to a PHP Object Injection issue. Remote, unauthenticated attackers can trigger this by sending a malicious serialized object, which forces excessive memory usage, rendering Adminer’s interface unresponsive and causing a server-level DoS. While the server may recover after several minutes, multiple simultaneous requests can cause a complete crash requiring manual intervention.
CWE-502
Aug 25, 2025
CVE-2025-26529
8.3
HIGH
2 PoCs
Analysis
EPSS 0.01
Moodle < 4.1.16 - XSS
Description information displayed in the site administration live log
required additional sanitizing to prevent a stored XSS risk.
CWE-79
Feb 24, 2025
CVE-2025-52392
5.4
MEDIUM
2 PoCs
Analysis
EPSS 0.02
Soosyze - Brute Force
Soosyze CMS 2.0 allows brute-force login attacks via the /user/login endpoint due to missing rate-limiting and lockout mechanisms. An attacker can repeatedly submit login attempts without restrictions, potentially gaining unauthorized administrative access. This vulnerability corresponds to CWE-307: Improper Restriction of Excessive Authentication Attempts.
CWE-307
Aug 13, 2025
CVE-2025-45346
8.1
HIGH
1 PoC
Analysis
EPSS 0.00
Bacula-web < 9.7.1 - SQL Injection
SQL Injection vulnerability in Bacula-web before v.9.7.1 allows a remote attacker to execute arbitrary code via a crafted HTTP GET request.
CWE-89
Jul 29, 2025
CVE-2025-26159
6.1
MEDIUM
1 PoC
Analysis
EPSS 0.00
Nasirkhan Laravel-starter < 11.11.0 - XSS
Laravel Starter 11.11.0 is vulnerable to Cross Site Scripting (XSS) in the tags feature. Any user with the ability of create or modify tags can inject malicious JavaScript code in the name field.
CWE-79
Apr 22, 2025