Vulnerabilities Exploited in the Wild with Public PoC
Updated 3h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
2,390 results
Clear all
CVE-2025-44177
8.2
HIGH
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.09
WSS Protop - Path Traversal
A directory traversal vulnerability was discovered in White Star Software Protop version 4.4.2-2024-11-27, specifically in the /pt3upd/ endpoint. An unauthenticated attacker can remotely read arbitrary files on the underlying OS using encoded traversal sequences.
CWE-22
Jul 09, 2025
CVE-2025-34300
CRITICAL
EXPLOITED
2 PoCs
Analysis
NUCLEI
EPSS 0.68
Template Injection Vulnerability in Sawtooth Software
A template injection vulnerability exists in Sawtooth Software’s Lighthouse Studio versions prior to 9.16.14 via the ciwweb.pl http://ciwweb.pl/ Perl web application. Exploitation allows an unauthenticated attacker can execute arbitrary commands.
CWE-1336
Jul 16, 2025
CVE-2025-53833
10.0
CRITICAL
EXPLOITED
2 PoCs
Analysis
NUCLEI
EPSS 0.17
LaRecipe <2.8.1 - SSRF/RCE
LaRecipe is an application that allows users to create documentation with Markdown inside a Laravel app. Versions prior to 2.8.1 are vulnerable to Server-Side Template Injection (SSTI), which could potentially lead to Remote Code Execution (RCE) in vulnerable configurations. Attackers could execute arbitrary commands on the server, access sensitive environment variables, and/or escalate access depending on server configuration. Users are strongly advised to upgrade to version v2.8.1 or later to receive a patch.
CWE-1336
Jul 14, 2025
CVE-2025-7771
HIGH
EXPLOITED
RANSOMWARE
12 PoCs
Analysis
EPSS 0.00
ThrottleStop.sys - Privilege Escalation
ThrottleStop.sys, a legitimate driver, exposes two IOCTL interfaces that allow arbitrary read and write access to physical memory via the MmMapIoSpace function. This insecure implementation can be exploited by a malicious user-mode application to patch the running Windows kernel and invoke arbitrary kernel functions with ring-0 privileges. The vulnerability enables local attackers to execute arbitrary code in kernel context, resulting in privilege escalation and potential follow-on attacks, such as disabling security software or bypassing kernel-level protections. ThrottleStop.sys version 3.0.0.0 and possibly others are affected. Apply updates per vendor instructions.
CWE-782
Aug 06, 2025
CVE-2025-49493
5.8
MEDIUM
EXPLOITED
3 PoCs
Analysis
NUCLEI
EPSS 0.01
Akamai CloudTest <60 - XXE Injection
Akamai CloudTest before 60 2025.06.02 (12988) allows file inclusion via XML External Entity (XXE) injection.
CWE-611
Jun 30, 2025
CVE-2025-2264
7.5
HIGH
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.64
Sante PACS Server Path Traversal (CVE-2025-2264)
A Path Traversal Information Disclosure vulnerability exists in "Sante PACS Server.exe". An unauthenticated remote attacker can exploit it to download arbitrary files on the disk drive where the application is installed.
CWE-22
Mar 13, 2025
CVE-2025-5394
9.8
CRITICAL
EXPLOITED
5 PoCs
Analysis
NUCLEI
EPSS 0.17
Alone - Charity Multipurpose Non-profit WordPress Theme <7.8.3 - RCE
The Alone – Charity Multipurpose Non-profit WordPress Theme theme for WordPress is vulnerable to arbitrary file uploads due to a missing capability check on the alone_import_pack_install_plugin() function in all versions up to, and including, 7.8.3. This makes it possible for unauthenticated attackers to upload zip files containing webshells disguised as plugins from remote locations to achieve remote code execution. CVE-2025-54019 is likely a duplicate of this.
CWE-862
Jul 15, 2025
CVE-2025-20281
10.0
CRITICAL
KEV
4 PoCs
Analysis
NUCLEI
EPSS 0.36
Cisco ISE - RCE
A vulnerability in a specific API of Cisco ISE and Cisco ISE-PIC could allow an unauthenticated, remote attacker to execute arbitrary code on the underlying operating system as root. The attacker does not require any valid credentials to exploit this vulnerability.
This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by submitting a crafted API request. A successful exploit could allow the attacker to obtain root privileges on an affected device.
CWE-74
Jun 25, 2025
CVE-2025-24000
8.8
HIGH
EXPLOITED
1 PoC
Analysis
EPSS 0.00
WPExperts Post SMTP <3.2.0 - Auth Bypass
Authentication Bypass Using an Alternate Path or Channel vulnerability in Saad Iqbal Post SMTP post-smtp allows Authentication Bypass.This issue affects Post SMTP: from n/a through <= 3.2.0.
CWE-288
Aug 07, 2025
CVE-2025-54309
9.0
CRITICAL
KEV
8 PoCs
Analysis
NUCLEI
EPSS 0.78
CrushFTP <10.8.5-11.3.4.23 - RCE
CrushFTP 10 before 10.8.5 and 11 before 11.3.4_23, when the DMZ proxy feature is not used, mishandles AS2 validation and consequently allows remote attackers to obtain admin access via HTTPS, as exploited in the wild in July 2025.
CWE-420
Jul 18, 2025
CVE-2025-6558
8.8
HIGH
KEV
2 PoCs
Analysis
EPSS 0.00
Google Chrome <138.0.7204.157 - RCE
Insufficient validation of untrusted input in ANGLE and GPU in Google Chrome prior to 138.0.7204.157 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)
CWE-20
Jul 15, 2025
CVE-2025-49706
6.5
MEDIUM
KEV
RANSOMWARE
3 PoCs
Analysis
NUCLEI
EPSS 0.74
Microsoft Sharepoint Enterprise Server - Authentication Bypass
Improper authentication in Microsoft Office SharePoint allows an unauthorized attacker to perform spoofing over a network.
CWE-287
Jul 08, 2025
CVE-2025-2776
9.3
CRITICAL
KEV
2 PoCs
Analysis
NUCLEI
EPSS 0.63
SysAid On-Prem <= 23.3.40 - XML External Entity
SysAid On-Prem versions <= 23.3.40 are vulnerable to an unauthenticated XML External Entity (XXE) vulnerability in the Server URL processing functionality, allowing for administrator account takeover and file read primitives.
CWE-611
May 07, 2025
CVE-2025-2775
9.3
CRITICAL
KEV
3 PoCs
Analysis
NUCLEI
EPSS 0.69
SysAid On-Prem <= 23.3.40 - XML External Entity
SysAid On-Prem versions <= 23.3.40 are vulnerable to an unauthenticated XML External Entity (XXE) vulnerability in the Checkin processing functionality, allowing for administrator account takeover and file read primitives.
CWE-611
May 07, 2025
CVE-2025-52488
8.6
HIGH
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.24
Dnnsoftware Dotnetnuke < 10.0.1 - Information Disclosure
DNN (formerly DotNetNuke) is an open-source web content management platform (CMS) in the Microsoft ecosystem. In versions 6.0.0 to before 10.0.1, DNN.PLATFORM allows a specially crafted series of malicious interaction to potentially expose NTLM hashes to a third party SMB server. This issue has been patched in version 10.0.1.
CWE-200
Jun 21, 2025
CVE-2025-41646
9.8
CRITICAL
EXPLOITED
2 PoCs
Analysis
NUCLEI
EPSS 0.34
Software Package - Auth Bypass
An unauthorized remote attacker can bypass the authentication of the affected software package by misusing an incorrect type conversion. This leads to full compromise of the device
CWE-704
Jun 06, 2025
CVE-2025-4123
7.6
HIGH
EXPLOITED
11 PoCs
Analysis
NUCLEI
EPSS 0.04
Grafana < 10.4.18 - XSS
A cross-site scripting (XSS) vulnerability exists in Grafana caused by combining a client path traversal and open redirect. This allows attackers to redirect users to a website that hosts a frontend plugin that will execute arbitrary JavaScript. This vulnerability does not require editor permissions and if anonymous access is enabled, the XSS will work. If the Grafana Image Renderer plugin is installed, it is possible to exploit the open redirect to achieve a full read SSRF.
The default Content-Security-Policy (CSP) in Grafana will block the XSS though the `connect-src` directive.
CWE-601
May 22, 2025
CVE-2025-53770
9.8
CRITICAL
KEV
RANSOMWARE
52 PoCs
Analysis
NUCLEI
EPSS 0.90
Microsoft SharePoint Server - Code Injection
Deserialization of untrusted data in on-premises Microsoft SharePoint Server allows an unauthorized attacker to execute code over a network.
Microsoft is aware that an exploit for CVE-2025-53770 exists in the wild.
Microsoft is preparing and fully testing a comprehensive update to address this vulnerability. In the meantime, please make sure that the mitigation provided in this CVE documentation is in place so that you are protected from exploitation.
CWE-502
Jul 20, 2025
CVE-2025-25257
9.8
CRITICAL
KEV
18 PoCs
Analysis
NUCLEI
EPSS 0.22
Fortinet FortiWeb - SQL Injection
An improper neutralization of special elements used in an SQL command ('SQL Injection') vulnerability [CWE-89] vulnerability in Fortinet FortiWeb 7.6.0 through 7.6.3, FortiWeb 7.4.0 through 7.4.7, FortiWeb 7.2.0 through 7.2.10, FortiWeb 7.0.0 through 7.0.10 allows an unauthenticated attacker to execute unauthorized SQL code or commands via crafted HTTP or HTTPs requests.
CWE-89
Jul 17, 2025
CVE-2025-5287
7.5
HIGH
EXPLOITED
5 PoCs
Analysis
NUCLEI
EPSS 0.10
Likes and Dislikes Plugin <1.0.0 - SQL Injection
The Likes and Dislikes Plugin plugin for WordPress is vulnerable to SQL Injection via the 'post' parameter in all versions up to, and including, 1.0.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
CWE-89
May 28, 2025