Critical Vulnerabilities with Public Exploits

Updated 4h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,391 CVEs tracked 53,627 with exploits 4,859 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,294 vendors 43,856 researchers
4,101 results Clear all
CVE-2025-45953 9.1 CRITICAL 1 PoC 1 Writeup Analysis EPSS 0.00
PHPGurukul Hostel Mgt Sys 2.1 - Session Hijacking
A vulnerability was found in PHPGurukul Hostel Management System 2.1 in the /hostel/change-password.php file of the user panel - Change Password component. Improper handling of session data allows a Session Hijacking attack, exploitable remotely
CWE-384 Apr 28, 2025
CVE-2025-45949 9.8 CRITICAL 1 PoC 1 Writeup Analysis EPSS 0.00
PHPGurukul User Registration & Login and User Management System V3.3 - Session Hijacking
A critical vulnerability was found in PHPGurukul User Registration & Login and User Management System V3.3 in the /loginsystem/change-password.php file of the user panel - Change Password component. Improper handling of session data allows a Session Hijacking attack, exploitable remotely and leading to account takeover.
CWE-384 Apr 28, 2025
CVE-2025-45947 9.8 CRITICAL 1 PoC 1 Writeup Analysis EPSS 0.01
Phpgurukul Online Banquet Booking System - Code Injection
An issue in phpgurukul Online Banquet Booking System V1.2 allows an attacker to execute arbitrary code via the /obbs/change-password.php file of the My Account - Change Password component
CWE-94 Apr 28, 2025
CVE-2025-0316 9.8 CRITICAL 1 PoC Analysis EPSS 0.00
WP Directorybox Manager <2.5 - Auth Bypass
The WP Directorybox Manager plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 2.5. This is due to incorrect authentication in the 'wp_dp_enquiry_agent_contact_form_submit_callback' function. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the username.
CWE-288 Feb 08, 2025
CVE-2025-44136 9.8 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.11
Maptiler Tileserver Php - XSS
MapTiler Tileserver-php v2.0 is vulnerable to Cross Site Scripting (XSS). The GET parameter "layer" is reflected in an error message without html encoding. This leads to XSS and allows an unauthenticated attacker to execute arbitrary HTML or JavaScript code on a victim's browser.
CWE-79 Jul 29, 2025
CVE-2025-47933 9.0 CRITICAL 1 PoC 1 Writeup Analysis EPSS 0.00
Argoproj Argo CD < 2.13.8 - XSS
Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. Prior to versions 2.13.8, 2.14.13, and 3.0.4, an attacker can perform arbitrary actions on behalf of the victim via the API. Due to the improper filtering of URL protocols in the repository page, an attacker can achieve cross-site scripting with permission to edit the repository. This issue has been patched in versions 2.13.8, 2.14.13, and 3.0.4.
CWE-79 May 29, 2025
CVE-2025-47277 9.8 CRITICAL 1 PoC 1 Writeup Analysis EPSS 0.01
Vllm < 0.8.5 - Insecure Deserialization
vLLM, an inference and serving engine for large language models (LLMs), has an issue in versions 0.6.5 through 0.8.4 that ONLY impacts environments using the `PyNcclPipe` KV cache transfer integration with the V0 engine. No other configurations are affected. vLLM supports the use of the `PyNcclPipe` class to establish a peer-to-peer communication domain for data transmission between distributed nodes. The GPU-side KV-Cache transmission is implemented through the `PyNcclCommunicator` class, while CPU-side control message passing is handled via the `send_obj` and `recv_obj` methods on the CPU side.​ The intention was that this interface should only be exposed to a private network using the IP address specified by the `--kv-ip` CLI parameter. The vLLM documentation covers how this must be limited to a secured network. The default and intentional behavior from PyTorch is that the `TCPStore` interface listens on ALL interfaces, regardless of what IP address is provided. The IP address given was only used as a client-side address to use. vLLM was fixed to use a workaround to force the `TCPStore` instance to bind its socket to a specified private interface. As of version 0.8.5, vLLM limits the `TCPStore` socket to the private interface as configured.
CWE-502 May 20, 2025
CVE-2025-43859 9.1 CRITICAL 1 PoC 1 Writeup Analysis EPSS 0.00
Pypi H11 < 0.16.0 - HTTP Request Smuggling
h11 is a Python implementation of HTTP/1.1. Prior to version 0.16.0, a leniency in h11's parsing of line terminators in chunked-coding message bodies can lead to request smuggling vulnerabilities under certain conditions. This issue has been patched in version 0.16.0. Since exploitation requires the combination of buggy h11 with a buggy (reverse) proxy, fixing either component is sufficient to mitigate this issue.
CWE-444 Apr 24, 2025
CVE-2025-29783 9.0 CRITICAL 1 PoC 1 Writeup Analysis EPSS 0.02
Vllm < 0.8.0 - Insecure Deserialization
vLLM is a high-throughput and memory-efficient inference and serving engine for LLMs. When vLLM is configured to use Mooncake, unsafe deserialization exposed directly over ZMQ/TCP on all network interfaces will allow attackers to execute remote code on distributed hosts. This is a remote code execution vulnerability impacting any deployments using Mooncake to distribute KV across distributed hosts. This vulnerability is fixed in 0.8.0.
CWE-502 Mar 19, 2025
CVE-2025-25015 9.9 CRITICAL 1 PoC Analysis EPSS 0.01
Kibana <8.17.1 - RCE
Prototype pollution in Kibana leads to arbitrary code execution via a crafted file upload and specifically crafted HTTP requests. In Kibana versions >= 8.15.0 and < 8.17.1, this is exploitable by users with the Viewer role. In Kibana versions 8.17.1 and 8.17.2 , this is only exploitable by users that have roles that contain all the following privileges: fleet-all, integrations-all, actions:execute-advanced-connectors
CWE-1321 Mar 05, 2025
CVE-2025-0851 9.8 CRITICAL 2 PoCs Analysis EPSS 0.31
Ai.djl API < 0.31.1 - Path Traversal
A path traversal issue in ZipUtils.unzip and TarUtils.untar in Deep Java Library (DJL) on all platforms allows a bad actor to write files to arbitrary locations.
CWE-36 Jan 29, 2025
CVE-2025-4578 9.8 CRITICAL 1 PoC Analysis EPSS 0.01
Dimdavid File Provider < 1.2.3 - SQL Injection
The File Provider WordPress plugin through 1.2.3 does not properly sanitise and escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection
CWE-89 Jun 04, 2025
CVE-2025-29628 9.4 CRITICAL 1 PoC Analysis EPSS 0.00
Gardyn 4 - Info Disclosure, RCE
A Gardyn Azure IoT Hub connection string is downloaded over an insecure HTTP connection in Gardyn Home Kit firmware before master.619, Home Kit Mobile Application before 2.11.0, and Home Kit Cloud API before 2.12.2026 leaving the string vulnerable to interception and modification through a Man-in-the-Middle attack. This may result in the attacker capturing device credentials or taking control of vulnerable home kits.
CWE-200 Jul 25, 2025
CVE-2025-6543 9.8 CRITICAL KEV 3 PoCs Analysis EPSS 0.02
NetScaler ADC & Gateway < - Buffer Overflow
Memory overflow vulnerability leading to unintended control flow and Denial of Service in NetScaler ADC and NetScaler Gateway when configured as Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) OR AAA virtual server
CWE-119 Jun 25, 2025
CVE-2025-47577 10.0 CRITICAL 2 PoCs Analysis EPSS 0.01
TemplateInvaders TI WooCommerce Wishlist <2.10.0 - Code Injection
Unrestricted Upload of File with Dangerous Type vulnerability in templateinvaders TI WooCommerce Wishlist ti-woocommerce-wishlist allows Upload a Web Shell to a Web Server.This issue affects TI WooCommerce Wishlist: from n/a through <= 2.9.2.
CWE-434 May 19, 2025
CVE-2025-27558 9.1 CRITICAL 1 PoC Analysis EPSS 0.00
IEEE P802.11-REVme - FragAttacks
IEEE P802.11-REVme D1.1 through D7.0 allows FragAttacks against mesh networks. In mesh networks using Wi-Fi Protected Access (WPA, WPA2, or WPA3) or Wired Equivalent Privacy (WEP), an adversary can exploit this vulnerability to inject arbitrary frames towards devices that support receiving non-SSP A-MSDU frames. NOTE: this issue exists because of an incorrect fix for CVE-2020-24588. P802.11-REVme, as of early 2025, is a planned release of the 802.11 standard.
CWE-345 May 21, 2025
CVE-2025-46157 9.9 CRITICAL 1 PoC Analysis EPSS 0.01
Efrotech Timetrax - Unrestricted File Upload
An issue in EfroTech Time Trax v.1.0 allows a remote attacker to execute arbitrary code via the file attachment function in the leave request form
CWE-434 Jun 18, 2025
CVE-2025-42999 9.1 CRITICAL KEV RANSOMWARE 1 PoC Analysis EPSS 0.50
SAP NetWeaver Visual Composer Metadata Uploader - Code Injection
SAP NetWeaver Visual Composer Metadata Uploader is vulnerable when a privileged user can upload untrusted or malicious content which, when deserialized, could potentially lead to a compromise of confidentiality, integrity, and availability of the host system.
CWE-502 May 13, 2025
CVE-2025-52122 9.8 CRITICAL 1 PoC Analysis EPSS 0.00
Freeform <5.10.16 - Code Injection
Freeform 5.0.0 to before 5.10.16, a plugin for CraftCMS, contains an Server-side template injection (SSTI) vulnerability, resulting in arbitrary code injection for all users that have access to editing a form (submission title).
CWE-1336 Aug 27, 2025
CVE-2025-46816 9.4 CRITICAL 1 PoC Analysis EPSS 0.00
goshs <1.0.5 - Command Injection
goshs is a SimpleHTTPServer written in Go. Starting in version 0.3.4 and prior to version 1.0.5, running goshs without arguments makes it possible for anyone to execute commands on the server. The function `dispatchReadPump` does not checks the option cli `-c`, thus allowing anyone to execute arbitrary command through the use of websockets. Version 1.0.5 fixes the issue.
CWE-284 May 06, 2025