Critical Vulnerabilities with Public Exploits

Updated 6h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,378 CVEs tracked 53,627 with exploits 4,858 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,288 vendors 43,849 researchers
4,101 results Clear all
CVE-2025-14611 9.8 CRITICAL KEV 1 PoC Analysis NUCLEI EPSS 0.59
Gladinet CentreStack & Triofox <16.12.10420.56791 - Code Injection
Gladinet CentreStack and Triofox prior to version 16.12.10420.56791 used hardcoded values for their implementation of the AES cryptoscheme. This degrades security for public exposed endpoints that may make use of it and may offer arbitrary local file inclusion when provided a specially crafted request without authentication. This opens the door for future exploitation and can be leveraged with previous vulnerabilities to gain a full system compromise.
CWE-798 Dec 12, 2025
CVE-2025-56513 9.8 CRITICAL 1 PoC Analysis EPSS 0.00
Nicehash Quickminer - Download Without Integrity Check
NiceHash QuickMiner 6.12.0 perform software updates over HTTP without validating digital signatures or hash checks. An attacker capable of intercepting or redirecting traffic to the update url and can hijack the update process and deliver arbitrary executables that are automatically executed, resulting in full remote code execution. This constitutes a critical supply chain attack vector.
CWE-494 Sep 30, 2025
CVE-2025-57460 9.8 CRITICAL 1 PoC Analysis EPSS 0.00
Machsol Machpanel - Unrestricted File Upload
File upload vulnerability in machsol machpanel 8.0.32 allows attacker to gain a webshell.
CWE-434 Dec 29, 2025
CVE-2025-59719 9.8 CRITICAL EXPLOITED 1 PoC Analysis EPSS 0.00
Fortinet Fortiweb < 7.4.9 - Signature Verification Bypass
An improper verification of cryptographic signature vulnerability in Fortinet FortiWeb 8.0.0, FortiWeb 7.6.0 through 7.6.4, FortiWeb 7.4.0 through 7.4.9 may allow an unauthenticated attacker to bypass the FortiCloud SSO login authentication via a crafted SAML response message.
CWE-347 Dec 09, 2025
CVE-2025-66209 9.9 CRITICAL 1 PoC Analysis EPSS 0.00
Coolify <4.0.0-beta.451 - Command Injection
Coolify is an open-source and self-hostable tool for managing servers, applications, and databases. Prior to version 4.0.0-beta.451, an authenticated command injection vulnerability in the Database Backup functionality allows users with application/service management permissions to execute arbitrary commands as root on managed servers. Database names used in backup operations are passed directly to shell commands without sanitization, enabling full remote code execution. Version 4.0.0-beta.451 fixes the issue.
CWE-78 Dec 23, 2025
CVE-2025-45146 9.8 CRITICAL 1 PoC 2 Writeups Analysis EPSS 0.00
Codefuse Modelcache < 0.2.0 - Insecure Deserialization
ModelCache for LLM through v0.2.0 was discovered to contain an deserialization vulnerability via the component /manager/data_manager.py. This vulnerability allows attackers to execute arbitrary code via supplying crafted data.
CWE-502 Aug 11, 2025
CVE-2025-63665 9.8 CRITICAL 1 PoC 1 Writeup Analysis EPSS 0.00
GT Edge AI CE <v2.0.12 - RCE
An issue in GT Edge AI Community Edition Versions before v2.0.12 allows attackers to execute arbitrary code via injecting a crafted JSON payload into the Prompt window.
CWE-94 Dec 19, 2025
CVE-2025-63666 9.8 CRITICAL 1 PoC Analysis EPSS 0.00
Tenda AC15 v15.03.05.18_multi - Info Disclosure
Tenda AC15 v15.03.05.18_multi) issues an authentication cookie that exposes the account password hash to the client and uses a short, low-entropy suffix as the session identifier. An attacker with network access or the ability to run JS in a victim browser can steal the cookie and replay it to access protected resources.
CWE-284 Nov 12, 2025
CVE-2025-65099 9.8 CRITICAL 1 PoC Analysis EPSS 0.00
Anthropic Claude Code < 1.0.39 - Code Injection
Claude Code is an agentic coding tool. Prior to version 1.0.39, when running on a machine with Yarn 3.0 or above, Claude Code could have been tricked to execute code contained in a project via yarn plugins before the user accepted the startup trust dialog. Exploiting this would have required a user to start Claude Code in an untrusted directory and to be using Yarn 3.0 or above. This issue has been patched in version 1.0.39.
CWE-94 Nov 19, 2025
CVE-2025-14440 9.8 CRITICAL 1 PoC Analysis EPSS 0.00
JAY Login & Register <2.4.01 - Auth Bypass
The JAY Login & Register plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 2.4.01. This is due to incorrect authentication checking in the 'jay_login_register_process_switch_back' function with the 'jay_login_register_process_switch_back' cookie value. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the user id.
CWE-565 Dec 13, 2025
CVE-2025-14156 9.8 CRITICAL 1 PoC Analysis EPSS 0.00
Fox LMS - WordPress LMS Plugin <1.0.5.1 - Privilege Escalation
The Fox LMS – WordPress LMS Plugin plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 1.0.5.1. This is due to the plugin not properly validating the 'role' parameter when creating new users via the `/fox-lms/v1/payments/create-order` REST API endpoint. This makes it possible for unauthenticated attackers to create new user accounts with arbitrary roles, including administrator, leading to complete site compromise.
CWE-20 Dec 15, 2025
CVE-2025-21628 9.1 CRITICAL 1 PoC EPSS 0.00
Chatwoot < 3.16.0 - SQL Injection
Chatwoot is a customer engagement suite. Prior to 3.16.0, conversation and contact filters endpoints did not sanitize the input of query_operator passed from the frontend or the API. This provided any actor who is authenticated, an attack vector to run arbitrary SQL within the filter query by adding a tautological WHERE clause. This issue is patched with v3.16.0.
CWE-89 Jan 09, 2025
CVE-2025-48952 9.4 CRITICAL 1 PoC Analysis EPSS 0.00
NetAlertX <25.6.7 - Auth Bypass
NetAlertX is a network, presence scanner, and alert framework. Prior to version 25.6.7, a vulnerability in the authentication logic allows users to bypass password verification using SHA-256 magic hashes, due to loose comparison in PHP. In vulnerable versions of the application, a password comparison is performed using the `==` operator at line 40 in front/index.php. This introduces a security issue where specially crafted "magic hash" values that evaluate to true in a loose comparison can bypass authentication. Because of the use of `==` instead of the strict `===`, different strings that begin with 0e and are followed by only digits can be interpreted as scientific notation (i.e., zero) and treated as equal. This issue falls under the Login Bypass vulnerability class. Users with certain "weird" passwords that produce magic hashes are particularly affected. Services relying on this logic are at risk of unauthorized access. Version 25.6.7 fixes the vulnerability.
CWE-697 Jul 04, 2025
CVE-2025-22252 9.8 CRITICAL 1 PoC Analysis EPSS 0.00
Fortinet Fortiproxy < 7.4.7 - Missing Authentication
A missing authentication for critical function in Fortinet FortiProxy versions 7.6.0 through 7.6.1, FortiSwitchManager version 7.2.5, and FortiOS versions 7.4.4 through 7.4.6 and version 7.6.0 may allow an attacker with knowledge of an existing admin account to access the device as a valid admin via an authentication bypass.
CWE-306 May 28, 2025
CVE-2025-2005 9.8 CRITICAL 5 PoCs Analysis EPSS 0.01
Etoilewebdesign Front End Users < 3.2.32 - Unrestricted File Upload
The Front End Users plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the file uploads field of the registration form in all versions up to, and including, 3.2.32. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.
CWE-434 Apr 02, 2025
CVE-2025-66039 9.8 CRITICAL 2 PoCs Analysis EPSS 0.35
FreePBX firmware file upload
FreePBX Endpoint Manager is a module for managing telephony endpoints in FreePBX systems. Versions are vulnerable to authentication bypass when the authentication type is set to "webserver." When providing an Authorization header with an arbitrary value, a session is associated with the target user regardless of valid credentials. This issue is fixed in versions 16.0.44 and 17.0.23.
CWE-287 Dec 09, 2025
CVE-2025-65318 9.1 CRITICAL 1 PoC Analysis EPSS 0.00
Canary Mail <5.1.40 - Info Disclosure
When using the attachment interaction functionality, Canary Mail 5.1.40 and below saves documents to a file system without a Mark-of-the-Web tag, which allows attackers to bypass the built-in file protection mechanisms of both Windows OS and third-party software.
CWE-693 Dec 16, 2025
CVE-2025-12539 10.0 CRITICAL 2 PoCs Analysis EPSS 0.01
WordPress TNC Toolbox: Web Performance <1.4.2 - Info Disclosure
The TNC Toolbox: Web Performance plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.4.2. This is due to the plugin storing cPanel API credentials (hostname, username, and API key) in files within the web-accessible wp-content directory without adequate protection in the "Tnc_Wp_Toolbox_Settings::save_settings" function. This makes it possible for unauthenticated attackers to retrieve these credentials and use them to interact with the cPanel API, which can lead to arbitrary file uploads, remote code execution, and full compromise of the hosting environment.
CWE-922 Nov 11, 2025
CVE-2025-11170 9.8 CRITICAL 2 PoCs Analysis EPSS 0.01
WP移行専用プラグイン for CPI 1.0.2 - RCE
The WP移行専用プラグイン for CPI plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the Cpiwm_Import_Controller::import function in all versions up to, and including, 1.0.2. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.
CWE-434 Nov 11, 2025
CVE-2025-10041 9.8 CRITICAL 2 PoCs Analysis EPSS 0.00
Flex QR Code Generator <1.2.5 - File Upload
The Flex QR Code Generator plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in thesave_qr_code_to_db() function in all versions up to, and including, 1.2.5. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.
CWE-434 Oct 15, 2025