Critical Vulnerabilities with Public Exploits

Updated 1h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,391 CVEs tracked 53,627 with exploits 4,859 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,294 vendors 43,856 researchers
4,101 results Clear all
CVE-2025-5352 9.6 CRITICAL 1 PoC Analysis EPSS 0.00
Lunary < 1.9.25 - XSS
A critical stored Cross-Site Scripting (XSS) vulnerability exists in the Analytics component of lunary-ai/lunary versions up to 1.9.23, where the NEXT_PUBLIC_CUSTOM_SCRIPT environment variable is directly injected into the DOM using dangerouslySetInnerHTML without any sanitization or validation. This allows arbitrary JavaScript execution in all users' browsers if an attacker can control the environment variable during deployment or through server compromise. The vulnerability can lead to complete account takeover, data exfiltration, malware distribution, and persistent attacks affecting all users until the environment variable is cleaned. The issue is fixed in version 1.9.25.
CWE-79 Aug 23, 2025
CVE-2025-65346 9.1 CRITICAL 1 PoC Analysis EPSS 0.00
Alexusmai Laravel File Manager < 3.3.1 - Path Traversal
alexusmai laravel-file-manager 3.3.1 and below is vulnerable to Directory Traversal. The unzip/extraction functionality improperly allows archive contents to be written to arbitrary locations on the filesystem due to insufficient validation of extraction paths.
CWE-22 Dec 04, 2025
CVE-2025-41115 10.0 CRITICAL 2 PoCs Analysis EPSS 0.00
Grafana < 12.2.1 - Incorrect Privilege Assignment
SCIM provisioning was introduced in Grafana Enterprise and Grafana Cloud in April to improve how organizations manage users and teams in Grafana by introducing automated user lifecycle management. In Grafana versions 12.x where SCIM provisioning is enabled and configured, a vulnerability in user identity handling allows a malicious or compromised SCIM client to provision a user with a numeric externalId, which in turn could allow to override internal user IDs and lead to impersonation or privilege escalation. This vulnerability applies only if all of the following conditions are met: - `enableSCIM` feature flag set to true - `user_sync_enabled` config option in the `[auth.scim]` block set to true
CWE-266 Nov 21, 2025
CVE-2025-41744 9.1 CRITICAL 2 PoCs Analysis EPSS 0.00
Sprecher Automations SPRECON-E - Info Disclosure
Sprecher Automations SPRECON-E series uses default cryptographic keys that allow an unprivileged remote attacker to access all encrypted communications, thereby compromising confidentiality and integrity.
CWE-1394 Dec 02, 2025
CVE-2025-66022 9.6 CRITICAL 1 PoC EPSS 0.01
FACTION <1.7.1 - RCE
FACTION is a PenTesting Report Generation and Collaboration Framework. Prior to version 1.7.1, an extension execution path in Faction’s extension framework permits untrusted extension code to execute arbitrary system commands on the server when a lifecycle hook is invoked, resulting in remote code execution (RCE) on the host running Faction. Due to a missing authentication check on the /portal/AppStoreDashboard endpoint, an attacker can access the extension management UI and upload a malicious extension without any authentication, making this vulnerability exploitable by unauthenticated users. This issue has been patched in version 1.7.1.
CWE-862 Nov 26, 2025
CVE-2025-39401 10.0 CRITICAL 1 PoC Analysis EPSS 0.01
Mojoomla WPAMS <44.0 - Code Injection
Unrestricted Upload of File with Dangerous Type vulnerability in mojoomla WPAMS apartment-management allows Upload a Web Shell to a Web Server.This issue affects WPAMS: from n/a through <= 44.0 (17-08-2023).
CWE-434 May 19, 2025
CVE-2025-12735 9.8 CRITICAL 3 PoCs Analysis EPSS 0.00
expr-eval - RCE
The expr-eval library is a JavaScript expression parser and evaluator designed to safely evaluate mathematical expressions with user-defined variables. However, due to insufficient input validation, an attacker can pass a crafted context object or use MEMBER of the context object into the evaluate() function and trigger arbitrary code execution.
CWE-94 Nov 05, 2025
CVE-2025-50433 9.8 CRITICAL 1 PoC Analysis EPSS 0.00
imonnit.com - Privilege Escalation
An issue was discovered in imonnit.com (2025-04-24) allowing malicious actors to gain escalated privileges via crafted password reset to take over arbitrary user accounts.
CWE-640 Nov 26, 2025
CVE-2025-13595 9.8 CRITICAL 1 PoC Analysis EPSS 0.00
CIBELES AI <1.10.8 - File Upload
The CIBELES AI plugin for WordPress is vulnerable to arbitrary file uploads due to missing capability check in the 'actualizador_git.php' file in all versions up to, and including, 1.10.8. This makes it possible for unauthenticated attackers to download arbitrary GitHub repositories and overwrite plugin files on the affected site's server which may make remote code execution possible.
CWE-434 Nov 25, 2025
CVE-2025-13597 9.8 CRITICAL 1 PoC Analysis EPSS 0.00
AI Feeds <1.0.11 - File Upload
The AI Feeds plugin for WordPress is vulnerable to arbitrary file uploads due to missing capability check in the 'actualizador_git.php' file in all versions up to, and including, 1.0.11. This makes it possible for unauthenticated attackers to download arbitrary GitHub repositories and overwrite plugin files on the affected site's server which may make remote code execution possible.
CWE-434 Nov 25, 2025
CVE-2025-65669 9.1 CRITICAL 1 PoC Analysis EPSS 0.00
Classroomio <0.1.13 - Auth Bypass
An issue was discovered in classroomio 0.1.13. Student accounts are able to delete courses from the Explore page without any authorization or authentication checks, bypassing the expected admin-only deletion restriction.
CWE-862 Nov 26, 2025
CVE-2025-54381 9.9 CRITICAL 2 PoCs Analysis EPSS 0.01
Bentoml < 1.4.19 - SSRF
BentoML is a Python library for building online serving systems optimized for AI apps and model inference. In versions 1.4.0 until 1.4.19, the file upload processing system contains an SSRF vulnerability that allows unauthenticated remote attackers to force the server to make arbitrary HTTP requests. The vulnerability stems from the multipart form data and JSON request handlers, which automatically download files from user-provided URLs without validating whether those URLs point to internal network addresses, cloud metadata endpoints, or other restricted resources. The documentation explicitly promotes this URL-based file upload feature, making it an intended design that exposes all deployed services to SSRF attacks by default. Version 1.4.19 contains a patch for the issue.
CWE-918 Jul 29, 2025
CVE-2025-63729 9.0 CRITICAL 1 PoC Analysis EPSS 0.00
Syrotech SY-GPON-1110-WDONT SYRO_3.7L_3.1.02-240517 - Info Disclosure
An issue was discovered in Syrotech SY-GPON-1110-WDONT SYRO_3.7L_3.1.02-240517 allowing attackers to exctract the SSL Private Key, CA Certificate, SSL Certificate, and Client Certificates in .pem format in firmware in etc folder.
CWE-532 Nov 25, 2025
CVE-2025-63888 9.8 CRITICAL 1 PoC Analysis EPSS 0.00
ThinkPHP 5.0.24 - RCE
The read function in file thinkphp\library\think\template\driver\File.php in ThinkPHP 5.0.24 contains a remote code execution vulnerability.
CWE-98 Nov 20, 2025
CVE-2025-13374 9.8 CRITICAL 1 PoC Analysis EPSS 0.00
Kalrav AI Agent <2.3.3 - File Upload
The Kalrav AI Agent plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the kalrav_upload_file AJAX action in all versions up to, and including, 2.3.3. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.
CWE-434 Jan 24, 2026
CVE-2025-44823 9.9 CRITICAL 2 PoCs Analysis EPSS 0.01
Nagios Log Server <2024R1.3.2 - Info Disclosure
Nagios Log Server before 2024R1.3.2 allows authenticated users to retrieve cleartext administrative API keys via a /nagioslogserver/index.php/api/system/get_users call. This is GL:NLS#475.
CWE-497 Oct 07, 2025
CVE-2025-12762 9.1 CRITICAL 1 PoC Analysis EPSS 0.00
pgAdmin <9.9 - RCE
pgAdmin versions up to 9.9 are affected by a Remote Code Execution (RCE) vulnerability that occurs when running in server mode and performing restores from PLAIN-format dump files. This issue allows attackers to inject and execute arbitrary commands on the server hosting pgAdmin, posing a critical risk to the integrity and security of the database management system and underlying data.
CWE-94 Nov 13, 2025
CVE-2025-54321 9.8 CRITICAL 1 PoC Analysis EPSS 0.00
Ascertia SigningHub <8.6.8 - DoS
In Ascertia SigningHub through 8.6.8, there is a lack of rate limiting on the reset password function, leading to an email bombing vulnerability. An authenticated attacker can exploit this by automating reset password requests.
CWE-799 Nov 18, 2025
CVE-2025-11492 9.6 CRITICAL 1 PoC Analysis EPSS 0.00
Connectwise Automate < 2025.9 - Cleartext Transmission
In the ConnectWise Automate Agent, communications could be configured to use HTTP instead of HTTPS. In such cases, an on-path threat actor with a man-in-the-middle network position could intercept, modify, or replay agent-server traffic. Additionally, the encryption method used to obfuscate some communications over the HTTP channel is updated in the Automate 2025.9 patch to enforce HTTPS for all agent communications.
CWE-319 Oct 16, 2025
CVE-2025-20260 9.8 CRITICAL 1 PoC Analysis EPSS 0.01
ClamAV - Buffer Overflow
A vulnerability in the PDF scanning processes of ClamAV could allow an unauthenticated, remote attacker to cause a buffer overflow condition, cause a denial of service (DoS) condition, or execute arbitrary code on an affected device. This vulnerability exists because memory buffers are allocated incorrectly when PDF files are processed. An attacker could exploit this vulnerability by submitting a crafted PDF file to be scanned by ClamAV on an affected device. A successful exploit could allow the attacker to trigger a buffer overflow, likely resulting in the termination of the ClamAV scanning process and a DoS condition on the affected software. Although unproven, there is also a possibility that an attacker could leverage the buffer overflow to execute arbitrary code with the privileges of the ClamAV process.
CWE-122 Jun 18, 2025