Critical Vulnerabilities with Public Exploits
Updated 3h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
4,101 results
Clear all
CVE-2025-56643
9.1
CRITICAL
1 PoC
Analysis
EPSS 0.00
Requarks Wiki.js - Insufficient Session Expiration
Requarks Wiki.js 2.5.307 does not properly revoke or invalidate active JWT tokens when a user logs out. As a result, previously issued tokens remain valid and can be reused to access the system, even after logout. This behavior affects session integrity and may allow unauthorized access if a token is compromised. The issue is present in the authentication resolver logic and affects both the GraphQL endpoint and the logout mechanism.
CWE-613
Nov 18, 2025
CVE-2025-53690
9.0
CRITICAL
KEV
3 PoCs
Analysis
EPSS 0.09
Sitecore XM/X <9.0 - Code Injection
Deserialization of Untrusted Data vulnerability in Sitecore Experience Manager (XM), Sitecore Experience Platform (XP) allows Code Injection.This issue affects Experience Manager (XM): through 9.0; Experience Platform (XP): through 9.0.
CWE-502
Sep 03, 2025
CVE-2025-53964
9.6
CRITICAL
1 PoC
Analysis
EPSS 0.00
GoldenDict <1.5.2 - Info Disclosure
GoldenDict 1.5.0 and 1.5.1 has an exposed dangerous method that allows reading and modifying files when a user adds a crafted dictionary and then searches for any term included in that dictionary.
CWE-749
Jul 17, 2025
CVE-2025-8760
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.00
INSTAR 2K+/4K <3.11.1.1124 - Buffer Overflow
A vulnerability was identified in INSTAR 2K+ and 4K 3.11.1 Build 1124. This affects the function base64_decode of the component fcgi_server. The manipulation of the argument Authorization leads to buffer overflow. It is possible to initiate the attack remotely.
CWE-119
Aug 13, 2025
CVE-2025-41656
10.0
CRITICAL
1 PoC
Analysis
EPSS 0.00
Node_RED - RCE
An unauthenticated remote attacker can run arbitrary commands on the affected devices with high privileges because the authentication for the Node_RED server is not configured by default.
CWE-306
Jul 01, 2025
CVE-2025-23968
9.1
CRITICAL
1 PoC
Analysis
EPSS 0.00
WPCenter AiBud WP <1.8.5 - Code Injection
Unrestricted Upload of File with Dangerous Type vulnerability in WebFactory AiBud WP aibuddy-openai-chatgpt allows Upload a Web Shell to a Web Server.This issue affects AiBud WP: from n/a through <= 1.9.
CWE-434
Jul 03, 2025
CVE-2025-0108
9.1
CRITICAL
KEV
7 PoCs
Analysis
NUCLEI
EPSS 0.94
Palo Alto Networks PAN-OS - Auth Bypass
An authentication bypass in the Palo Alto Networks PAN-OS software enables an unauthenticated attacker with network access to the management web interface to bypass the authentication otherwise required by the PAN-OS management web interface and invoke certain PHP scripts. While invoking these PHP scripts does not enable remote code execution, it can negatively impact integrity and confidentiality of PAN-OS.
You can greatly reduce the risk of this issue by restricting access to the management web interface to only trusted internal IP addresses according to our recommended best practices deployment guidelines https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431 .
This issue does not affect Cloud NGFW or Prisma Access software.
CWE-306
Feb 12, 2025
CVE-2025-59934
9.4
CRITICAL
1 PoC
1 Writeup
Analysis
EPSS 0.00
Formbricks <4.0.1 - Auth Bypass
Formbricks is an open source qualtrics alternative. Prior to version 4.0.1, Formbricks is missing JWT signature verification. This vulnerability stems from a token validation routine that only decodes JWTs (jwt.decode) without verifying their signatures. Both the email verification token login path and the password reset server action use the same validator, which does not check the token’s signature, expiration, issuer, or audience. If an attacker learns the victim’s actual user.id, they can craft an arbitrary JWT with an alg: "none" header and use it to authenticate and reset the victim’s password. This issue has been patched in version 4.0.1.
CWE-287
Sep 26, 2025
CVE-2025-1550
9.8
CRITICAL
2 PoCs
Analysis
NUCLEI
EPSS 0.08
Keras < 3.8.0 - Code Injection
The Keras Model.load_model function permits arbitrary code execution, even with safe_mode=True, through a manually constructed, malicious .keras archive. By altering the config.json file within the archive, an attacker can specify arbitrary Python modules and functions, along with their arguments, to be loaded and executed during model loading.
CWE-94
Mar 11, 2025
CVE-2025-53888
9.8
CRITICAL
1 PoC
1 Writeup
Analysis
EPSS 0.00
RIOT-OS <2025.04 - Buffer Overflow
RIOT-OS, an operating system that supports Internet of Things devices, has an ineffective size check implemented with `assert()` can lead to buffer overflow in versions up to and including 2025.04. Assertions are usually compiled out in production builds. If assertions are the only defense against untrusted inputs, the software may be exposed to attacks that utilize the lack of proper input checks. In the `l2filter_add()` function shown below, `addr_len` is checked using an assertion and is subsequently used as an argument in a `memcpy()` call. When assertions are disabled, there would be no size check for `addr_len`. As a consequence, if an attacker were to provide an `addr_len` value larger than `CONFIG_L2FILTER_ADDR_MAXLEN`, they can trigger a buffer overflow and write past the `list[i].addr` buffer. If the unchecked input is attacker-controlled, the impact of the buffer overflow can range from a denial of service to arbitrary code execution. Commit f6f7de4ccc107c018630e4c15500825caf02e1c2 contains a patch for the vulnerability.
CWE-120
Jul 18, 2025
CVE-2025-54874
9.8
CRITICAL
1 PoC
1 Writeup
Analysis
EPSS 0.00
OpenJPEG <2.5.4 - Memory Corruption
OpenJPEG is an open-source JPEG 2000 codec. In OpenJPEG from 2.5.1 through 2.5.3, a call to opj_jp2_read_header may lead to OOB heap memory write when the data stream p_stream is too short and p_image is not initialized.
CWE-457
Aug 05, 2025
CVE-2025-26199
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.03
Vishalmathur Cloudclassroom-php Project - Cleartext Transmission
CloudClassroom-PHP-Project v1.0 is affected by an insecure credential transmission vulnerability. The application transmits passwords over unencrypted HTTP during the login process, exposing sensitive credentials to potential interception by network-based attackers. A remote attacker with access to the same network (e.g., public Wi-Fi or compromised router) can capture login credentials via Man-in-the-Middle (MitM) techniques. If the attacker subsequently uses the credentials to log in and exploit administrative functions (e.g., file upload), this may lead to remote code execution depending on the environment.
CWE-319
Jun 18, 2025
CVE-2025-7775
9.8
CRITICAL
KEV
4 PoCs
Analysis
EPSS 0.07
NetScaler ADC/Gateway - RCE/DoS
Memory overflow vulnerability leading to Remote Code Execution and/or Denial of Service in NetScaler ADC and NetScaler Gateway when NetScaler is configured as Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) or AAA virtual server
(OR)
NetScaler ADC and NetScaler Gateway 13.1, 14.1, 13.1-FIPS and NDcPP: LB virtual servers of type (HTTP, SSL or HTTP_QUIC) bound with IPv6 services or servicegroups bound with IPv6 servers
(OR)
NetScaler ADC and NetScaler Gateway 13.1, 14.1, 13.1-FIPS and NDcPP: LB virtual servers of type (HTTP, SSL or HTTP_QUIC) bound with DBS IPv6 services or servicegroups bound with IPv6 DBS servers
(OR)
CR virtual server with type HDX
CWE-119
Aug 26, 2025
CVE-2025-42944
10.0
CRITICAL
1 PoC
Analysis
EPSS 0.00
SAP NetWeaver - Deserialization
Due to a deserialization vulnerability in SAP NetWeaver, an unauthenticated attacker could exploit the system through the RMI-P4 module by submitting malicious payload to an open port. The deserialization of such untrusted Java objects could lead to arbitrary OS command execution, posing a high impact to the application's confidentiality, integrity, and availability.
CWE-502
Sep 09, 2025
CVE-2025-26399
9.8
CRITICAL
KEV
1 PoC
Analysis
EPSS 0.27
Solarwinds Web Help Desk < 12.8.6 - Insecure Deserialization
SolarWinds Web Help Desk was found to be susceptible to an unauthenticated AjaxProxy deserialization remote code execution vulnerability that, if exploited, would allow an attacker to run commands on the host machine. This vulnerability is a patch bypass of CVE-2024-28988, which in turn is a patch bypass of CVE-2024-28986.
CWE-502
Sep 23, 2025
CVE-2025-5947
9.8
CRITICAL
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.46
Service Finder Bookings <6.0 - Privilege Escalation
The Service Finder Bookings plugin for WordPress is vulnerable to privilege escalation via authentication bypass in all versions up to, and including, 6.0. This is due to the plugin not properly validating a user's cookie value prior to logging them in through the service_finder_switch_back() function. This makes it possible for unauthenticated attackers to login as any user including admins.
CWE-639
Aug 01, 2025
CVE-2025-24204
9.8
CRITICAL
2 PoCs
Analysis
EPSS 0.00
Apple Macos < 15.4 - Information Disclosure
The issue was addressed with improved checks. This issue is fixed in macOS Sequoia 15.4. An app may be able to access protected user data.
CWE-200
Mar 31, 2025
CVE-2025-61622
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.00
pyfory <0.12.2 - Code Injection
Deserialization of untrusted data in python in pyfory versions 0.12.0 through 0.12.2, or the legacy pyfury versions from 0.1.0 through 0.10.3: allows arbitrary code execution. An application is vulnerable if it reads pyfory serialized data from untrusted sources. An attacker can craft a data stream that selects pickle-fallback serializer during deserialization, leading to the execution of `pickle.loads`, which is vulnerable to remote code execution.
Users are recommended to upgrade to pyfory version 0.12.3 or later, which has removed pickle fallback serializer and thus fixes this issue.
CWE-502
Oct 01, 2025
CVE-2025-6384
9.1
CRITICAL
2 PoCs
Analysis
EPSS 0.00
Craftercms < 4.3.0 - Remote Code Execution
Improper Control of Dynamically-Managed Code Resources vulnerability in Crafter Studio of CrafterCMS allows authenticated developers to execute OS commands via Groovy Sandbox Bypass.
By inserting malicious Groovy elements, an attacker may bypass Sandbox restrictions and obtain RCE (Remote Code Execution).
This issue affects CrafterCMS: from 4.0.0 through 4.2.2.
CWE-913
Jun 19, 2025
CVE-2025-9242
9.8
CRITICAL
KEV
1 PoC
1 Writeup
Analysis
NUCLEI
EPSS 0.69
WatchGuard Fireware OS <12.11.3 - RCE
An Out-of-bounds Write vulnerability in WatchGuard Fireware OS may allow a remote unauthenticated attacker to execute arbitrary code. This vulnerability affects both the Mobile User VPN with IKEv2 and the Branch Office VPN using IKEv2 when configured with a dynamic gateway peer.This vulnerability affects Fireware OS 11.10.2 up to and including 11.12.4_Update1, 12.0 up to and including 12.11.3 and 2025.1.
CWE-787
Sep 17, 2025