Critical Vulnerabilities with Public Exploits

Updated 3h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,378 CVEs tracked 53,627 with exploits 4,858 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,288 vendors 43,849 researchers
4,101 results Clear all
CVE-2025-40552 9.8 CRITICAL 1 PoC Analysis NUCLEI EPSS 0.09
Solarwinds Web Help Desk < 2026.1 - Authentication Bypass
SolarWinds Web Help Desk was found to be susceptible to an authentication bypass vulnerability that if exploited, would allow a malicious actor to execute actions and methods that should be protected by authentication.
CWE-1390 Jan 28, 2026
CVE-2025-49001 9.8 CRITICAL 1 PoC Analysis EPSS 0.00
Dataease < 2.10.10 - Authentication Bypass
DataEase is an open source business intelligence and data visualization tool. Prior to version 2.10.10, secret verification does not take effect successfully, so a user can use any secret to forge a JWT token. The vulnerability has been fixed in v2.10.10. No known workarounds are available.
CWE-287 Jun 03, 2025
CVE-2025-4524 9.8 CRITICAL 2 PoCs Analysis NUCLEI EPSS 0.03
Madara WordPress <2.2.2 - Local File Inclusion
The Madara – Responsive and modern WordPress theme for manga sites theme for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 2.2.2 via the 'template' parameter. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included.
CWE-22 May 21, 2025
CVE-2025-20188 10.0 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.04
Cisco IOS XE - Unauthenticated RCE
A vulnerability in the Out-of-Band Access Point (AP) Image Download, the Clean Air Spectral Recording, and the client debug bundles features of Cisco IOS XE Software for Wireless LAN Controllers (WLCs) could allow an unauthenticated, remote attacker to upload arbitrary files to an affected system. This vulnerability is due to the presence of a hard-coded JSON Web Token (JWT) on an affected system. An attacker could exploit this vulnerability by sending crafted HTTPS requests to the AP file upload interface. A successful exploit could allow the attacker to upload files, perform path traversal, and execute arbitrary commands with root privileges.
CWE-798 May 07, 2025
CVE-2025-2775 9.3 CRITICAL KEV 3 PoCs Analysis NUCLEI EPSS 0.69
SysAid On-Prem <= 23.3.40 - XML External Entity
SysAid On-Prem versions <= 23.3.40 are vulnerable to an unauthenticated XML External Entity (XXE) vulnerability in the Checkin processing functionality, allowing for administrator account takeover and file read primitives.
CWE-611 May 07, 2025
CVE-2025-32969 9.8 CRITICAL EXPLOITED 1 PoC 1 Writeup Analysis NUCLEI EPSS 0.27
XWiki REST API Query - SQL Injection
XWiki is a generic wiki platform. In versions starting from 1.8 and prior to 15.10.16, 16.4.6, and 16.10.1, it is possible for a remote unauthenticated user to escape from the HQL execution context and perform a blind SQL injection to execute arbitrary SQL statements on the database backend, including when "Prevent unregistered users from viewing pages, regardless of the page rights" and "Prevent unregistered users from editing pages, regardless of the page rights" options are enabled. Depending on the used database backend, the attacker may be able to not only obtain confidential information such as password hashes from the database, but also execute UPDATE/INSERT/DELETE queries. This issue has been patched in versions 16.10.1, 16.4.6 and 15.10.16. There is no known workaround, other than upgrading XWiki.
CWE-89 Apr 23, 2025
CVE-2025-34028 10.0 CRITICAL KEV 5 PoCs Analysis NUCLEI EPSS 0.63
Commvault Command Center Innovation Release <11.38.20 - Path Traversal
The Commvault Command Center Innovation Release allows an unauthenticated actor to upload ZIP files that represent install packages that, when expanded by the target server, are vulnerable to path traversal vulnerability that can result in Remote Code Execution via malicious JSP. This issue affects Command Center Innovation Release: 11.38.0 to 11.38.20. The vulnerability is fixed in 11.38.20 with SP38-CU20-433 and SP38-CU20-436 and also fixed in 11.38.25 with SP38-CU25-434 and SP38-CU25-438.
CWE-22 Apr 22, 2025
CVE-2025-2266 9.8 CRITICAL 3 PoCs Analysis EPSS 0.01
Checkout Mestres do WP for WooCommerce <8.7.5 - Privilege Escalation
The Checkout Mestres do WP for WooCommerce plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check on the cwmpUpdateOptions() function in versions 8.6.5 to 8.7.5. This makes it possible for unauthenticated attackers to update arbitrary options on the WordPress site. This can be leveraged to update the default role for registration to administrator and enable user registration for attackers to gain administrative user access to a vulnerable site.
CWE-862 Mar 29, 2025
CVE-2025-1661 9.8 CRITICAL EXPLOITED 4 PoCs Analysis NUCLEI EPSS 0.93
Pluginus Husky - Products Filter Prof... - Path Traversal
The HUSKY – Products Filter Professional for WooCommerce plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 1.3.6.5 via the 'template' parameter of the woof_text_search AJAX action. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included.
CWE-22 Mar 11, 2025
CVE-2025-5394 9.8 CRITICAL EXPLOITED 5 PoCs Analysis NUCLEI EPSS 0.17
Alone - Charity Multipurpose Non-profit WordPress Theme <7.8.3 - RCE
The Alone – Charity Multipurpose Non-profit WordPress Theme theme for WordPress is vulnerable to arbitrary file uploads due to a missing capability check on the alone_import_pack_install_plugin() function in all versions up to, and including, 7.8.3. This makes it possible for unauthenticated attackers to upload zip files containing webshells disguised as plugins from remote locations to achieve remote code execution. CVE-2025-54019 is likely a duplicate of this.
CWE-862 Jul 15, 2025
CVE-2025-65856 9.8 CRITICAL 2 PoCs Analysis EPSS 0.01
Xiongmaitech Xm530v200 X6-weq 8M Firmware - Missing Authentication
Authentication bypass vulnerability in Xiongmai XM530 IP cameras on Firmware V5.00.R02.000807D8.10010.346624.S.ONVIF 21.06 allows unauthenticated remote attackers to access sensitive device information and live video streams. The ONVIF implementation fails to enforce authentication on 31 critical endpoints, enabling direct unauthorized video stream access.
CWE-306 Dec 22, 2025
CVE-2025-68723 9.0 CRITICAL 1 PoC Analysis EPSS 0.00
Axigen Mail Server <10.5.57 - XSS
Axigen Mail Server before 10.5.57 contains multiple stored Cross-Site Scripting (XSS) vulnerabilities in the WebAdmin interface. Three instances exist: (1) the log file name parameter in the Local Services Log page, (2) certificate file content in the SSL Certificates View Usage feature, and (3) the Certificate File name parameter in the WebMail Listeners SSL settings. Attackers can inject malicious JavaScript payloads that execute in administrators' browsers when they access affected pages or features, enabling privilege escalation attacks where low-privileged admins can force high-privileged admins to perform unauthorized actions.
CWE-79 Feb 05, 2026
CVE-2025-55853 9.1 CRITICAL 1 PoC 1 Writeup Analysis EPSS 0.00
SoftVision webPDF <10.0.2 - SSRF
SoftVision webPDF before 10.0.2 is vulnerable to Server-Side Request Forgery (SSRF). The PDF converter function does not check if internal or external resources are requested in the uploaded files and allows for protocols such as http:// and file:///. This allows an attacker to upload an XML or HTML file in the application, which when rendered to a PDF allows for internal port scanning and Local File Inclusion (LFI).
CWE-918 Feb 19, 2026
CVE-2025-10878 10.0 CRITICAL 1 PoC Analysis EPSS 0.00
Omran Fikir Odalari Adminpando < 1.0.1 - SQL Injection
A SQL injection vulnerability exists in the login functionality of Fikir Odalari AdminPando 1.0.1 before 2026-01-26. The username and password parameters are vulnerable to SQL injection, allowing unauthenticated attackers to bypass authentication completely. Successful exploitation grants full administrative access to the application, including the ability to manipulate the public-facing website content (HTML/DOM manipulation).
CWE-89 Feb 03, 2026
CVE-2025-14321 9.8 CRITICAL 1 PoC Analysis EPSS 0.00
WebRTC: Signaling - Use After Free
Use-after-free in the WebRTC: Signaling component. This vulnerability was fixed in Firefox 146, Firefox ESR 140.6, Thunderbird 146, and Thunderbird 140.6.
CWE-416 Dec 09, 2025
CVE-2025-61506 9.8 CRITICAL 1 PoC Analysis EPSS 0.00
MediaCrush <1.0.1 - RCE
An issue was discovered in MediaCrush thru 1.0.1 allowing remote unauthenticated attackers to upload arbitrary files of any size to the /upload endpoint.
CWE-434 Feb 03, 2026
CVE-2025-57529 9.8 CRITICAL 1 PoC Analysis EPSS 0.00
Youdatasum Cpas Audit Management System < 4.9 - SQL Injection
YouDataSum CPAS Audit Management System <=v4.9 is vulnerable to SQL Injection in /cpasList/findArchiveReportByDah due to insufficient input validation. This allows remote unauthenticated attackers to execute arbitrary SQL commands via crafted input to the parameter. Successful exploitation could lead to unauthorized data access
CWE-89 Feb 03, 2026
CVE-2025-40554 9.8 CRITICAL 2 PoCs Analysis NUCLEI EPSS 0.06
Solarwinds Web Help Desk < 2026.1 - Authentication Bypass
SolarWinds Web Help Desk was found to be susceptible to an authentication bypass vulnerability that, if exploited, could allow an attacker to invoke specific actions within Web Help Desk.
CWE-1390 Jan 28, 2026
CVE-2025-55130 9.1 CRITICAL 1 PoC Analysis EPSS 0.00
Node.js <20 - Privilege Escalation
A flaw in Node.js’s Permissions model allows attackers to bypass `--allow-fs-read` and `--allow-fs-write` restrictions using crafted relative symlink paths. By chaining directories and symlinks, a script granted access only to the current directory can escape the allowed path and read sensitive files. This breaks the expected isolation guarantees and enables arbitrary file read/write, leading to potential system compromise. This vulnerability affects users of the permission model on Node.js v20, v22, v24, and v25.
CWE-289 Jan 20, 2026
CVE-2025-56005 9.8 CRITICAL 2 PoCs Analysis EPSS 0.01
PLY 3.11 - RCE
An undocumented and unsafe feature in the PLY (Python Lex-Yacc) library 3.11 allows Remote Code Execution (RCE) via the `picklefile` parameter in the `yacc()` function. This parameter accepts a `.pkl` file that is deserialized with `pickle.load()` without validation. Because `pickle` allows execution of embedded code via `__reduce__()`, an attacker can achieve code execution by passing a malicious pickle file. The parameter is not mentioned in official documentation or the GitHub repository, yet it is active in the PyPI version. This introduces a stealthy backdoor and persistence risk. NOTE: A third-party states that this vulnerability should be rejected because the proof of concept does not demonstrate arbitrary code execution and fails to complete successfully.
CWE-502 Jan 20, 2026