Writeup Exploits

60,258 exploits tracked across all sources.

Sort: Activity Stars
CVE-2025-57244 WRITEUP MEDIUM
Openkm - XSS
OpenKM Community Edition 6.3.12 is vulnerable to stored cross-site scripting (XSS) in the user account creation interface. The Name field accepts script tags and the Email field is vulnerable when the POST request is modified to include encoded script tags, by passing frontend validation.
CVSS 5.4
CVE-2025-57310 WRITEUP HIGH
Salmen Simple Faucet Script - CSRF
A Cross-Site Request Forgery (CSRF) vulnerability in Salmen2/Simple-Faucet-Script v1.07 via crafted POST request to admin.php?p=ads&c=1 allowing attackers to execute arbitrary code.
CVSS 8.8
CVE-2025-57353 WRITEUP MEDIUM
Messageformat Runtime < 3.0.2 - Prototype Pollution
The Runtime components of messageformat package for Node.js before 3.0.2 contain a prototype pollution vulnerability. Due to insufficient validation of nested message keys during the processing of message data, an attacker can manipulate the prototype chain of JavaScript objects by providing specially crafted input. This can result in the injection of arbitrary properties into the Object.prototype, potentially leading to denial of service conditions or unexpected application behavior. The vulnerability allows attackers to alter the prototype of base objects, impacting all subsequent object instances throughout the application's lifecycle.
CVSS 5.3
CVE-2025-57330 WRITEUP HIGH
Web3js Web3-core-subscriptions < 1.10.4 - Prototype Pollution
The web3-core-subscriptions is a package designed to manages web3 subscriptions. A Prototype Pollution vulnerability in the attachToObject function of web3-core-subscriptions version 1.10.4 and before allows attackers to inject properties on Object.prototype via supplying a crafted payload, causing denial of service (DoS) as the minimum consequence.
CVSS 7.5
CVE-2025-57329 WRITEUP HIGH
Web3js Web3-core-method < 1.10.4 - Prototype Pollution
web3-core-method is a package designed to creates the methods on the web3 modules. A Prototype Pollution vulnerability in the attachToObject function of web3-core-method version 1.10.4 and before allows attackers to inject properties on Object.prototype via supplying a crafted payload, causing denial of service (DoS) as the minimum consequence.
CVSS 7.5
CVE-2025-57328 WRITEUP HIGH
Jonschlinkert Toggle-array < 1.0.1 - Prototype Pollution
toggle-array is a package designed to enables a property on the object at the specified index, while disabling the property on all other objects. A Prototype Pollution vulnerability in the enable and disable function of toggle-array v1.0.1 and before allows attackers to inject properties on Object.prototype via supplying a crafted payload, causing denial of service (DoS) as the minimum consequence.
CVSS 7.5
CVE-2025-57327 WRITEUP HIGH
Spmjs Spmrc < 1.2.0 - Prototype Pollution
spmrc is a package that provides the rc manager for spm. A Prototype Pollution vulnerability in the set and config function of spmrc version 1.2.0 and before allows attackers to inject properties on Object.prototype via supplying a crafted payload, causing denial of service (DoS) as the minimum consequence.
CVSS 7.5
CVE-2025-57326 WRITEUP HIGH
Sassdoc-extras < 2.5.1 - Prototype Pollution
A Prototype Pollution vulnerability in the byGroupAndType function of sassdoc-extras v2.5.1 and before allows attackers to inject properties on Object.prototype via supplying a crafted payload, causing denial of service (DoS) as the minimum consequence.
CVSS 7.5
CVE-2025-57325 WRITEUP HIGH
Rollbar < 2.26.4 - Prototype Pollution
rollbar is a package designed to effortlessly track and debug errors in JavaScript applications. This package includes advanced error tracking features and an intuitive interface to help you identify and fix issues more quickly. A Prototype Pollution vulnerability in the utility.set function of rollbar v2.26.4 and before allows attackers to inject properties on Object.prototype via supplying a crafted payload, causing denial of service (DoS) as the minimum consequence.
CVSS 7.5
CVE-2025-57324 WRITEUP MEDIUM
Parseplatform Parse Javascript SDK < 5.3.0 - Prototype Pollution
parse is a package designed to parse JavaScript SDK. A Prototype Pollution vulnerability in the SingleInstanceStateController.initializeState function of parse version 5.3.0 and before allows attackers to inject properties on Object.prototype via supplying a crafted payload, causing denial of service (DoS) as the minimum consequence.
CVSS 6.5
CVE-2025-57323 WRITEUP HIGH
Regularjs Mpregular < 0.2.0 - Prototype Pollution
mpregular is a package that provides a small program development framework based on RegularJS. A Prototype Pollution vulnerability in the mp.addEventHandler function of mpregular version 0.2.0 and before allows attackers to inject properties on Object.prototype via supplying a crafted payload, causing denial of service (DoS) as the minimum consequence.
CVSS 7.5
CVE-2025-57321 WRITEUP CRITICAL
Magix-combine-ex < 1.2.10 - Prototype Pollution
A Prototype Pollution vulnerability in the util-deps.addFileDepend function of magix-combine-ex versions thru 1.2.10 allows attackers to inject properties on Object.prototype via supplying a crafted payload, causing denial of service (DoS) as the minimum consequence.
CVSS 9.8
CVE-2025-57320 WRITEUP MEDIUM
Open-federation Json-schema-editor-visual - Prototype Pollution
json-schema-editor-visual is a package that provides jsonschema editor. A Prototype Pollution vulnerability in the setData and deleteData function of json-schema-editor-visual versions thru 1.1.1 allows attackers to inject or delete properties on Object.prototype via supplying a crafted payload, causing denial of service (DoS) as the minimum consequence.
CVSS 6.5
CVE-2025-57319 WRITEUP HIGH
NPM Fast-redact - Denial of Service
fast-redact is a package that provides do very fast object redaction. A Prototype Pollution vulnerability in the nestedRestore function of fast-redact version 3.5.0 and before allows attackers to inject properties on Object.prototype via supplying a crafted payload, causing denial of service (DoS) as the minimum consequence. NOTE: the Supplier disputes this because the reporter only demonstrated access to properties by an internal utility function, and there is no means for achieving prototype pollution via the public API.
CVSS 7.5
CVE-2025-57318 WRITEUP HIGH
Pradeep-mishra Csvjson < 5.1.0 - Prototype Pollution
A Prototype Pollution vulnerability in the toCsv function of csvjson versions thru 5.1.0 allows attackers to inject properties on Object.prototype via supplying a crafted payload, causing denial of service (DoS) as the minimum consequence.
CVSS 7.5
CVE-2025-57389 WRITEUP MEDIUM
Luci OpenWRT <v19.07.0 - XSS
A reflected cross-site scripting (XSS) vulnerability in the /admin/system/packages endpoint of Luci OpenWRT v18.06.2 allows attackers to execute arbitrary Javascript in the context of a user's browser via a crafted payload. This vulnerability was fixed in OpenWRT v19.07.0.
CVSS 5.4
CVE-2025-57392 WRITEUP HIGH
Benimpos - Incorrect Permission Assignment
BenimPOS Masaustu 3.0.x is affected by insecure file permissions. The application installation directory grants Everyone and BUILTIN\Users groups FILE_ALL_ACCESS, allowing local users to replace or modify .exe and .dll files. This may lead to privilege escalation or arbitrary code execution upon launch by another user or elevated context.
CVSS 7.8
CVE-2025-57423 WRITEUP MEDIUM
MyClub 0.5 - SQL Injection
A SQL injection vulnerability was discovered in the /articles endpoint of MyClub 0.5, affecting the query parameters Content, GroupName, PersonName, lastUpdate, pool, and title. Due to insufficient input sanitisation, an unauthenticated remote attacker could inject arbitrary SQL commands via a crafted GET request, potentially leading to information disclosure or manipulation of the database.
CVSS 6.5
CVE-2025-57460 WRITEUP CRITICAL
Machsol Machpanel - Unrestricted File Upload
File upload vulnerability in machsol machpanel 8.0.32 allows attacker to gain a webshell.
CVSS 9.8
CVE-2025-57462 WRITEUP MEDIUM
Machsol Machpanel - XSS
Stored cross-site scripting (xss) in machsol machpanel 8.0.32 allows attackers to execute arbitrary web scripts or HTML via a crafted PDF file.
CVSS 6.1
CVE-2025-57483 WRITEUP HIGH
tawk.to chatbox widget <4 - XSS
A reflected cross-site scripting (XSS) vulnerability in tawk.to chatbox widget v4 allows attackers to execute arbitrary Javascript in the context of the user's browser via injecting a crafted payload into the vulnerable parameter.
CVSS 8.1
CVE-2025-57515 WRITEUP CRITICAL
Uniclare Student Portal <v2 - SQL Injection
A SQL injection vulnerability has been identified in Uniclare Student Portal v2. This flaw allows remote attackers to inject arbitrary SQL commands via vulnerable input fields, enabling the execution of time-delay functions to infer database responses.
CVSS 9.8
CVE-2025-57529 WRITEUP CRITICAL
Youdatasum Cpas Audit Management System < 4.9 - SQL Injection
YouDataSum CPAS Audit Management System <=v4.9 is vulnerable to SQL Injection in /cpasList/findArchiveReportByDah due to insufficient input validation. This allows remote unauthenticated attackers to execute arbitrary SQL commands via crafted input to the parameter. Successful exploitation could lead to unauthorized data access
CVSS 9.8
CVE-2025-57529 WRITEUP CRITICAL
Youdatasum Cpas Audit Management System < 4.9 - SQL Injection
YouDataSum CPAS Audit Management System <=v4.9 is vulnerable to SQL Injection in /cpasList/findArchiveReportByDah due to insufficient input validation. This allows remote unauthenticated attackers to execute arbitrary SQL commands via crafted input to the parameter. Successful exploitation could lead to unauthorized data access
CVSS 9.8
CVE-2025-57564 WRITEUP HIGH
CubeAPM nightly-2025-08-01-1 - Code Injection
CubeAPM nightly-2025-08-01-1 allow unauthenticated attackers to inject arbitrary log entries into production systems via the /api/logs/insert/elasticsearch/_bulk endpoint. This endpoint accepts bulk log data without requiring authentication or input validation, allowing remote attackers to perform unauthorized log injection. Exploitation may lead to false log entries, log poisoning, alert obfuscation, and potential performance degradation of the observability pipeline. The issue is present in the core CubeAPM platform and is not limited to specific deployment configurations.
CVSS 8.2