Vulnerabilities Exploited in the Wild with Public PoC

Updated 3h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,363 CVEs tracked 53,626 with exploits 4,858 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,288 vendors 43,844 researchers
2,390 results Clear all
CVE-2025-44177 8.2 HIGH EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.09
WSS Protop - Path Traversal
A directory traversal vulnerability was discovered in White Star Software Protop version 4.4.2-2024-11-27, specifically in the /pt3upd/ endpoint. An unauthenticated attacker can remotely read arbitrary files on the underlying OS using encoded traversal sequences.
CWE-22 Jul 09, 2025
CVE-2025-34300 CRITICAL EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.68
Template Injection Vulnerability in Sawtooth Software
A template injection vulnerability exists in Sawtooth Software’s Lighthouse Studio versions prior to 9.16.14 via the  ciwweb.pl http://ciwweb.pl/  Perl web application. Exploitation allows an unauthenticated attacker can execute arbitrary commands.
CWE-1336 Jul 16, 2025
CVE-2025-53833 10.0 CRITICAL EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.17
LaRecipe <2.8.1 - SSRF/RCE
LaRecipe is an application that allows users to create documentation with Markdown inside a Laravel app. Versions prior to 2.8.1 are vulnerable to Server-Side Template Injection (SSTI), which could potentially lead to Remote Code Execution (RCE) in vulnerable configurations. Attackers could execute arbitrary commands on the server, access sensitive environment variables, and/or escalate access depending on server configuration. Users are strongly advised to upgrade to version v2.8.1 or later to receive a patch.
CWE-1336 Jul 14, 2025
CVE-2025-7771 HIGH EXPLOITED RANSOMWARE 12 PoCs Analysis EPSS 0.00
ThrottleStop.sys - Privilege Escalation
ThrottleStop.sys, a legitimate driver, exposes two IOCTL interfaces that allow arbitrary read and write access to physical memory via the MmMapIoSpace function. This insecure implementation can be exploited by a malicious user-mode application to patch the running Windows kernel and invoke arbitrary kernel functions with ring-0 privileges. The vulnerability enables local attackers to execute arbitrary code in kernel context, resulting in privilege escalation and potential follow-on attacks, such as disabling security software or bypassing kernel-level protections. ThrottleStop.sys version 3.0.0.0 and possibly others are affected. Apply updates per vendor instructions.
CWE-782 Aug 06, 2025
CVE-2025-49493 5.8 MEDIUM EXPLOITED 3 PoCs Analysis NUCLEI EPSS 0.01
Akamai CloudTest <60 - XXE Injection
Akamai CloudTest before 60 2025.06.02 (12988) allows file inclusion via XML External Entity (XXE) injection.
CWE-611 Jun 30, 2025
CVE-2025-2264 7.5 HIGH EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.64
Sante PACS Server Path Traversal (CVE-2025-2264)
A Path Traversal Information Disclosure vulnerability exists in "Sante PACS Server.exe". An unauthenticated remote attacker can exploit it to download arbitrary files on the disk drive where the application is installed.
CWE-22 Mar 13, 2025
CVE-2025-5394 9.8 CRITICAL EXPLOITED 5 PoCs Analysis NUCLEI EPSS 0.17
Alone - Charity Multipurpose Non-profit WordPress Theme <7.8.3 - RCE
The Alone – Charity Multipurpose Non-profit WordPress Theme theme for WordPress is vulnerable to arbitrary file uploads due to a missing capability check on the alone_import_pack_install_plugin() function in all versions up to, and including, 7.8.3. This makes it possible for unauthenticated attackers to upload zip files containing webshells disguised as plugins from remote locations to achieve remote code execution. CVE-2025-54019 is likely a duplicate of this.
CWE-862 Jul 15, 2025
CVE-2025-20281 10.0 CRITICAL KEV 4 PoCs Analysis NUCLEI EPSS 0.36
Cisco ISE - RCE
A vulnerability in a specific API of Cisco ISE and Cisco ISE-PIC could allow an unauthenticated, remote attacker to execute arbitrary code on the underlying operating system as root. The attacker does not require any valid credentials to exploit this vulnerability. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by submitting a crafted API request. A successful exploit could allow the attacker to obtain root privileges on an affected device.
CWE-74 Jun 25, 2025
CVE-2025-24000 8.8 HIGH EXPLOITED 1 PoC Analysis EPSS 0.00
WPExperts Post SMTP <3.2.0 - Auth Bypass
Authentication Bypass Using an Alternate Path or Channel vulnerability in Saad Iqbal Post SMTP post-smtp allows Authentication Bypass.This issue affects Post SMTP: from n/a through <= 3.2.0.
CWE-288 Aug 07, 2025
CVE-2025-54309 9.0 CRITICAL KEV 8 PoCs Analysis NUCLEI EPSS 0.78
CrushFTP <10.8.5-11.3.4.23 - RCE
CrushFTP 10 before 10.8.5 and 11 before 11.3.4_23, when the DMZ proxy feature is not used, mishandles AS2 validation and consequently allows remote attackers to obtain admin access via HTTPS, as exploited in the wild in July 2025.
CWE-420 Jul 18, 2025
CVE-2025-6558 8.8 HIGH KEV 2 PoCs Analysis EPSS 0.00
Google Chrome <138.0.7204.157 - RCE
Insufficient validation of untrusted input in ANGLE and GPU in Google Chrome prior to 138.0.7204.157 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)
CWE-20 Jul 15, 2025
CVE-2025-49706 6.5 MEDIUM KEV RANSOMWARE 3 PoCs Analysis NUCLEI EPSS 0.74
Microsoft Sharepoint Enterprise Server - Authentication Bypass
Improper authentication in Microsoft Office SharePoint allows an unauthorized attacker to perform spoofing over a network.
CWE-287 Jul 08, 2025
CVE-2025-2776 9.3 CRITICAL KEV 2 PoCs Analysis NUCLEI EPSS 0.63
SysAid On-Prem <= 23.3.40 - XML External Entity
SysAid On-Prem versions <= 23.3.40 are vulnerable to an unauthenticated XML External Entity (XXE) vulnerability in the Server URL processing functionality, allowing for administrator account takeover and file read primitives.
CWE-611 May 07, 2025
CVE-2025-2775 9.3 CRITICAL KEV 3 PoCs Analysis NUCLEI EPSS 0.69
SysAid On-Prem <= 23.3.40 - XML External Entity
SysAid On-Prem versions <= 23.3.40 are vulnerable to an unauthenticated XML External Entity (XXE) vulnerability in the Checkin processing functionality, allowing for administrator account takeover and file read primitives.
CWE-611 May 07, 2025
CVE-2025-52488 8.6 HIGH EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.24
Dnnsoftware Dotnetnuke < 10.0.1 - Information Disclosure
DNN (formerly DotNetNuke) is an open-source web content management platform (CMS) in the Microsoft ecosystem. In versions 6.0.0 to before 10.0.1, DNN.PLATFORM allows a specially crafted series of malicious interaction to potentially expose NTLM hashes to a third party SMB server. This issue has been patched in version 10.0.1.
CWE-200 Jun 21, 2025
CVE-2025-41646 9.8 CRITICAL EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.34
Software Package - Auth Bypass
An unauthorized remote attacker can bypass the authentication of the affected software package by misusing an incorrect type conversion. This leads to full compromise of the device
CWE-704 Jun 06, 2025
CVE-2025-4123 7.6 HIGH EXPLOITED 11 PoCs Analysis NUCLEI EPSS 0.04
Grafana < 10.4.18 - XSS
A cross-site scripting (XSS) vulnerability exists in Grafana caused by combining a client path traversal and open redirect. This allows attackers to redirect users to a website that hosts a frontend plugin that will execute arbitrary JavaScript. This vulnerability does not require editor permissions and if anonymous access is enabled, the XSS will work. If the Grafana Image Renderer plugin is installed, it is possible to exploit the open redirect to achieve a full read SSRF. The default Content-Security-Policy (CSP) in Grafana will block the XSS though the `connect-src` directive.
CWE-601 May 22, 2025
CVE-2025-53770 9.8 CRITICAL KEV RANSOMWARE 52 PoCs Analysis NUCLEI EPSS 0.90
Microsoft SharePoint Server - Code Injection
Deserialization of untrusted data in on-premises Microsoft SharePoint Server allows an unauthorized attacker to execute code over a network. Microsoft is aware that an exploit for CVE-2025-53770 exists in the wild. Microsoft is preparing and fully testing a comprehensive update to address this vulnerability. In the meantime, please make sure that the mitigation provided in this CVE documentation is in place so that you are protected from exploitation.
CWE-502 Jul 20, 2025
CVE-2025-25257 9.8 CRITICAL KEV 18 PoCs Analysis NUCLEI EPSS 0.22
Fortinet FortiWeb - SQL Injection
An improper neutralization of special elements used in an SQL command ('SQL Injection') vulnerability [CWE-89] vulnerability in Fortinet FortiWeb 7.6.0 through 7.6.3, FortiWeb 7.4.0 through 7.4.7, FortiWeb 7.2.0 through 7.2.10, FortiWeb 7.0.0 through 7.0.10 allows an unauthenticated attacker to execute unauthorized SQL code or commands via crafted HTTP or HTTPs requests.
CWE-89 Jul 17, 2025
CVE-2025-5287 7.5 HIGH EXPLOITED 5 PoCs Analysis NUCLEI EPSS 0.10
Likes and Dislikes Plugin <1.0.0 - SQL Injection
The Likes and Dislikes Plugin plugin for WordPress is vulnerable to SQL Injection via the 'post' parameter in all versions up to, and including, 1.0.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
CWE-89 May 28, 2025