Vulnerabilities Exploited in the Wild with Public PoC

Updated 3h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,363 CVEs tracked 53,626 with exploits 4,858 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,288 vendors 43,844 researchers
2,390 results Clear all
CVE-2025-25231 7.5 HIGH EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.04
Omnissa Workspace ONE UEM - Path Traversal
Omnissa Workspace ONE UEM contains a Secondary Context Path Traversal Vulnerability. A malicious actor may be able to gain access to sensitive information by sending crafted GET requests (read-only) to restricted API endpoints.
CWE-22 Aug 11, 2025
CVE-2025-48543 8.8 HIGH KEV 2 PoCs Analysis EPSS 0.00
Chrome - Use After Free
In multiple locations, there is a possible way to escape chrome sandbox to attack android system_server due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
CWE-416 Sep 04, 2025
CVE-2025-8311 CRITICAL EXPLOITED 1 PoC Analysis EPSS 0.02
dotCMS >=24.03.22 - SQL Injection
dotCMS versions 24.03.22 and after, identified a Boolean-based blind SQLi vulnerability in the /api/v1/contenttype endpoint. This endpoint uses the sites query parameter, which accepts a comma-separated list of site identifiers or keys. The vulnerability was triggered via the sites parameter, which was directly concatenated into a SQL query without proper sanitization. Exploitation allowed an authenticated attacker with low privileges to extract data from database, perform privilege escalation, or trigger denial-of-service conditions. The vulnerability was verified using tools such as SQLMap and confirmed to allow full database exfiltration and potential denial-of-service conditions via crafted payloads. The vulnerability is fixed in the following versions of dotCMS stack: 25.08.14 / 25.07.10-1v2 LTS / 24.12.27v10 LTS / 24.04.24v21 LTS
CWE-89 Sep 04, 2025
CVE-2025-53690 9.0 CRITICAL KEV 3 PoCs Analysis EPSS 0.09
Sitecore XM/X <9.0 - Code Injection
Deserialization of Untrusted Data vulnerability in Sitecore Experience Manager (XM), Sitecore Experience Platform (XP) allows Code Injection.This issue affects Experience Manager (XM): through 9.0; Experience Platform (XP): through 9.0.
CWE-502 Sep 03, 2025
CVE-2025-52970 8.1 HIGH EXPLOITED 3 PoCs Analysis NUCLEI EPSS 0.22
Fortinet FortiWeb <7.6.3 - Privilege Escalation
A improper handling of parameters in Fortinet FortiWeb versions 7.6.3 and below, versions 7.4.7 and below, versions 7.2.10 and below, and 7.0.10 and below may allow an unauthenticated remote attacker with non-public information pertaining to the device and targeted user to gain admin privileges on the device via a specially crafted request.
CWE-233 Aug 12, 2025
CVE-2025-42957 9.9 CRITICAL EXPLOITED 1 PoC Analysis EPSS 0.00
SAP S/4HANA - Code Injection
SAP S/4HANA allows an attacker with user privileges to exploit a vulnerability in the function module exposed via RFC. This flaw enables the injection of arbitrary ABAP code into the system, bypassing essential authorization checks. This vulnerability effectively functions as a backdoor, creating the risk of full system compromise, undermining the confidentiality, integrity and availability of the system.
CWE-94 Aug 12, 2025
CVE-2025-38352 7.4 HIGH KEV 7 PoCs Analysis EPSS 0.00
Linux Kernel < 5.4.295 - TOCTOU Race Condition
In the Linux kernel, the following vulnerability has been resolved: posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del() If an exiting non-autoreaping task has already passed exit_notify() and calls handle_posix_cpu_timers() from IRQ, it can be reaped by its parent or debugger right after unlock_task_sighand(). If a concurrent posix_cpu_timer_del() runs at that moment, it won't be able to detect timer->it.cpu.firing != 0: cpu_timer_task_rcu() and/or lock_task_sighand() will fail. Add the tsk->exit_state check into run_posix_cpu_timers() to fix this. This fix is not needed if CONFIG_POSIX_CPU_TIMERS_TASK_WORK=y, because exit_task_work() is called before exit_notify(). But the check still makes sense, task_work_add(&tsk->posix_cputimers_work.work) will fail anyway in this case.
CWE-367 Jul 22, 2025
CVE-2025-32969 9.8 CRITICAL EXPLOITED 1 PoC 1 Writeup Analysis NUCLEI EPSS 0.27
XWiki REST API Query - SQL Injection
XWiki is a generic wiki platform. In versions starting from 1.8 and prior to 15.10.16, 16.4.6, and 16.10.1, it is possible for a remote unauthenticated user to escape from the HQL execution context and perform a blind SQL injection to execute arbitrary SQL statements on the database backend, including when "Prevent unregistered users from viewing pages, regardless of the page rights" and "Prevent unregistered users from editing pages, regardless of the page rights" options are enabled. Depending on the used database backend, the attacker may be able to not only obtain confidential information such as password hashes from the database, but also execute UPDATE/INSERT/DELETE queries. This issue has been patched in versions 16.10.1, 16.4.6 and 15.10.16. There is no known workaround, other than upgrading XWiki.
CWE-89 Apr 23, 2025
CVE-2025-47165 7.8 HIGH EXPLOITED 1 PoC Analysis EPSS 0.01
Microsoft 365 Apps < 16.0.10417.20018 - Use After Free
Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
CWE-416 Jun 10, 2025
CVE-2025-55177 5.4 MEDIUM KEV 1 PoC Analysis EPSS 0.01
Whatsapp < 2.25.21.73 - Incorrect Authorization
Incomplete authorization of linked device synchronization messages in WhatsApp for iOS prior to v2.25.21.73, WhatsApp Business for iOS v2.25.21.78, and WhatsApp for Mac v2.25.21.78 could have allowed an unrelated user to trigger processing of content from an arbitrary URL on a target’s device. We assess that this vulnerability, in combination with an OS-level vulnerability on Apple platforms (CVE-2025-43300), may have been exploited in a sophisticated attack against specific targeted users.
CWE-863 Aug 29, 2025
CVE-2025-57819 9.8 CRITICAL KEV 13 PoCs Analysis NUCLEI EPSS 0.77
Sangoma Freepbx < 15.0.66 - SQL Injection
FreePBX is an open-source web-based graphical user interface. FreePBX 15, 16, and 17 endpoints are vulnerable due to insufficiently sanitized user-supplied data allowing unauthenticated access to FreePBX Administrator leading to arbitrary database manipulation and remote code execution. This issue has been patched in endpoint versions 15.0.66, 16.0.89, and 17.0.3.
CWE-288 Aug 28, 2025
CVE-2025-7775 9.8 CRITICAL KEV 4 PoCs Analysis EPSS 0.07
NetScaler ADC/Gateway - RCE/DoS
Memory overflow vulnerability leading to Remote Code Execution and/or Denial of Service in NetScaler ADC and NetScaler Gateway when NetScaler is configured as Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) or AAA virtual server (OR) NetScaler ADC and NetScaler Gateway 13.1, 14.1, 13.1-FIPS and NDcPP: LB virtual servers of type (HTTP, SSL or HTTP_QUIC) bound with IPv6 services or servicegroups bound with IPv6 servers (OR) NetScaler ADC and NetScaler Gateway 13.1, 14.1, 13.1-FIPS and NDcPP: LB virtual servers of type (HTTP, SSL or HTTP_QUIC) bound with DBS IPv6 services or servicegroups bound with IPv6 DBS servers (OR) CR virtual server with type HDX
CWE-119 Aug 26, 2025
CVE-2025-48384 8.0 HIGH KEV 55 PoCs Analysis EPSS 0.00
Git - Info Disclosure
Git is a fast, scalable, distributed revision control system with an unusually rich command set that provides both high-level operations and full access to internals. When reading a config value, Git strips any trailing carriage return and line feed (CRLF). When writing a config entry, values with a trailing CR are not quoted, causing the CR to be lost when the config is later read. When initializing a submodule, if the submodule path contains a trailing CR, the altered path is read resulting in the submodule being checked out to an incorrect location. If a symlink exists that points the altered path to the submodule hooks directory, and the submodule contains an executable post-checkout hook, the script may be unintentionally executed after checkout. This vulnerability is fixed in v2.43.7, v2.44.4, v2.45.4, v2.46.4, v2.47.3, v2.48.2, v2.49.1, and v2.50.1.
CWE-436 Jul 08, 2025
CVE-2025-43300 10.0 CRITICAL KEV 9 PoCs Analysis EPSS 0.03
iOS <15.8.5, <16.7.12 - Memory Corruption
An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in iOS 15.8.5 and iPadOS 15.8.5, iOS 16.7.12 and iPadOS 16.7.12, iOS 18.6.2 and iPadOS 18.6.2, iPadOS 17.7.10, macOS Sequoia 15.6.1, macOS Sonoma 14.7.8, macOS Ventura 13.7.8. Processing a malicious image file may result in memory corruption. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals.
CWE-787 Aug 21, 2025
CVE-2025-54782 8.8 HIGH EXPLOITED 5 PoCs 2 Writeups Analysis NUCLEI EPSS 0.30
Nestjs Devtools-integration < 0.2.1 - Command Injection
Nest is a framework for building scalable Node.js server-side applications. In versions 0.2.0 and below, a critical Remote Code Execution (RCE) vulnerability was discovered in the @nestjs/devtools-integration package. When enabled, the package exposes a local development HTTP server with an API endpoint that uses an unsafe JavaScript sandbox (safe-eval-like implementation). Due to improper sandboxing and missing cross-origin protections, any malicious website visited by a developer can execute arbitrary code on their local machine. The package adds HTTP endpoints to a locally running NestJS development server. One of these endpoints, /inspector/graph/interact, accepts JSON input containing a code field and executes the provided code in a Node.js vm.runInNewContext sandbox. This is fixed in version 0.2.1.
CWE-78 Aug 02, 2025
CVE-2025-7441 9.8 CRITICAL EXPLOITED 6 PoCs Analysis EPSS 0.77
StoryChief WordPress <1.0.42 - RCE
The StoryChief plugin for WordPress is vulnerable to arbitrary file uploads in all versions up to, and including, 1.0.42. This vulnerability occurs through the /wp-json/storychief/webhook REST-API endpoint that does not have sufficient filetype validation. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.
CWE-434 Aug 16, 2025
CVE-2025-8875 7.8 HIGH KEV 1 PoC Analysis EPSS 0.03
N-able N-central < 2025.3.1 - Insecure Deserialization
Deserialization of Untrusted Data vulnerability in N-able N-central allows Local Execution of Code.This issue affects N-central: before 2025.3.1.
CWE-502 Aug 14, 2025
CVE-2025-25256 9.8 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.45
Fortinet FortiSIEM - OS Command Injection
An improper neutralization of special elements used in an OS command ('OS Command Injection') vulnerability [CWE-78] in Fortinet FortiSIEM version 7.3.0 through 7.3.1, 7.2.0 through 7.2.5, 7.1.0 through 7.1.7, 7.0.0 through 7.0.3 and before 6.7.9 allows an unauthenticated attacker to execute unauthorized code or commands via crafted CLI requests.
CWE-78 Aug 12, 2025
CVE-2025-8088 8.8 HIGH KEV RANSOMWARE 43 PoCs Analysis EPSS 0.09
Rarlab Winrar < 7.13 - Path Traversal
A path traversal vulnerability affecting the Windows version of WinRAR allows the attackers to execute arbitrary code by crafting malicious archive files. This vulnerability was exploited in the wild and was discovered by Anton Cherepanov, Peter Košinár, and Peter Strýček from ESET.
CWE-35 Aug 08, 2025
CVE-2025-54254 8.6 HIGH EXPLOITED 1 PoC Analysis EPSS 0.00
Adobe Experience Manager Forms < 6.5.23.0 - XXE
Adobe Experience Manager versions 6.5.23 and earlier are affected by an Improper Restriction of XML External Entity Reference ('XXE') vulnerability that could lead to arbitrary file system read. An attacker could exploit this vulnerability to access sensitive files on the local file system, scope is changed. Exploitation of this issue does not require user interaction.
CWE-611 Aug 05, 2025