Vulnerabilities Exploited in the Wild with Public PoC

Updated 1h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,378 CVEs tracked 53,627 with exploits 4,858 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,288 vendors 43,849 researchers
2,390 results Clear all
CVE-2025-24813 9.8 CRITICAL KEV 61 PoCs Analysis NUCLEI EPSS 0.94
Tomcat Partial PUT Java Deserialization
Path Equivalence: 'file.Name' (Internal Dot) leading to Remote Code Execution and/or Information disclosure and/or malicious content added to uploaded files via write enabled Default Servlet in Apache Tomcat. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.2, from 10.1.0-M1 through 10.1.34, from 9.0.0.M1 through 9.0.98. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.0 though 8.5.100. Other, older, EOL versions may also be affected. If all of the following were true, a malicious user was able to view security sensitive files and/or inject content into those files: - writes enabled for the default servlet (disabled by default) - support for partial PUT (enabled by default) - a target URL for security sensitive uploads that was a sub-directory of a target URL for public uploads - attacker knowledge of the names of security sensitive files being uploaded - the security sensitive files also being uploaded via partial PUT If all of the following were true, a malicious user was able to perform remote code execution: - writes enabled for the default servlet (disabled by default) - support for partial PUT (enabled by default) - application was using Tomcat's file based session persistence with the default storage location - application included a library that may be leveraged in a deserialization attack Users are recommended to upgrade to version 11.0.3, 10.1.35 or 9.0.99, which fixes the issue.
CWE-502 Mar 10, 2025
CVE-2025-26319 9.8 CRITICAL EXPLOITED 4 PoCs Analysis NUCLEI EPSS 0.87
FlowiseAI Flowise <= 2.2.6 - Arbitrary File Upload
FlowiseAI Flowise v2.2.6 was discovered to contain an arbitrary file upload vulnerability in /api/v1/attachments.
CWE-434 Mar 04, 2025
CVE-2025-29927 9.1 CRITICAL EXPLOITED 138 PoCs Analysis NUCLEI EPSS 0.93
Next.js Middleware Bypass
Next.js is a React framework for building full-stack web applications. Starting in version 1.11.4 and prior to versions 12.3.5, 13.5.9, 14.2.25, and 15.2.3, it is possible to bypass authorization checks within a Next.js application, if the authorization check occurs in middleware. If patching to a safe version is infeasible, it is recommend that you prevent external user requests which contain the x-middleware-subrequest header from reaching your Next.js application. This vulnerability is fixed in 12.3.5, 13.5.9, 14.2.25, and 15.2.3.
CWE-285 Mar 21, 2025
CVE-2025-2294 9.8 CRITICAL EXPLOITED 13 PoCs Analysis NUCLEI EPSS 0.57
Kubio AI Page Builder <2.5.1 - Local File Inclusion
The Kubio AI Page Builder plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 2.5.1 via thekubio_hybrid_theme_load_template function. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included.
CWE-22 Mar 28, 2025
CVE-2025-2783 8.3 HIGH KEV 5 PoCs Analysis EPSS 0.39
Mojo in Google Chrome <134.0.6998.177 - RCE
Incorrect handle provided in unspecified circumstances in Mojo in Google Chrome on Windows prior to 134.0.6998.177 allowed a remote attacker to perform a sandbox escape via a malicious file. (Chromium security severity: High)
Mar 26, 2025
CVE-2025-27218 5.3 MEDIUM EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.76
Sitecore Experience Manager (XM)/Experience Platform (XP) 10.4 - Insecure Deserialization
Sitecore Experience Manager (XM) and Experience Platform (XP) 10.4 before KB1002844 allow remote code execution through insecure deserialization.
CWE-94 Feb 20, 2025
CVE-2025-2563 8.1 HIGH EXPLOITED 5 PoCs Analysis NUCLEI EPSS 0.88
User Registration & Membership <= 4.1.1 - Unauthenticated Privilege Escalation
The User Registration & Membership WordPress plugin before 4.1.2 does not prevent users to set their account role when the Membership Addon is enabled, leading to a privilege escalation issue and allowing unauthenticated users to gain admin privileges
Apr 14, 2025
CVE-2025-30349 7.2 HIGH EXPLOITED 1 PoC Analysis EPSS 0.19
Horde IMP <6.2.27 - XSS
Horde IMP through 6.2.27, as used with Horde Application Framework through 5.2.23, allows XSS that leads to account takeover via a crafted text/html e-mail message with an onerror attribute (that may use base64-encoded JavaScript code), as exploited in the wild in March 2025.
CWE-79 Mar 21, 2025
CVE-2025-30066 8.6 HIGH KEV 2 PoCs Analysis EPSS 0.92
tj-actions <46 - Info Disclosure
tj-actions changed-files before 46 allows remote attackers to discover secrets by reading actions logs. (The tags v1 through v45.0.7 were affected on 2025-03-14 and 2025-03-15 because they were modified by a threat actor to point at commit 0e58ed8, which contained malicious updateFeatures code.)
CWE-506 Mar 15, 2025
CVE-2025-24201 10.0 CRITICAL KEV 3 PoCs Analysis EPSS 0.00
Apple Safari < 18.3.1 - Out-of-Bounds Write
An out-of-bounds write issue was addressed with improved checks to prevent unauthorized actions. This issue is fixed in Safari 18.3.1, iOS 15.8.4 and iPadOS 15.8.4, iOS 16.7.11 and iPadOS 16.7.11, iOS 18.3.2 and iPadOS 18.3.2, iPadOS 17.7.6, macOS Sequoia 15.3.2, visionOS 2.3.2, watchOS 11.4. Maliciously crafted web content may be able to break out of Web Content sandbox. This is a supplementary fix for an attack that was blocked in iOS 17.2. (Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals on versions of iOS before iOS 17.2.).
CWE-787 Mar 11, 2025
CVE-2025-26633 7.0 HIGH KEV RANSOMWARE 3 PoCs Analysis EPSS 0.33
Microsoft Management Console - Auth Bypass
Improper neutralization in Microsoft Management Console allows an unauthorized attacker to bypass a security feature locally.
CWE-707 Mar 11, 2025
CVE-2025-24985 7.8 HIGH KEV 1 PoC Analysis EPSS 0.02
Windows Fast FAT Driver - Code Injection
Integer overflow or wraparound in Windows Fast FAT Driver allows an unauthorized attacker to execute code locally.
CWE-190 Mar 11, 2025
CVE-2025-1661 9.8 CRITICAL EXPLOITED 4 PoCs Analysis NUCLEI EPSS 0.93
Pluginus Husky - Products Filter Prof... - Path Traversal
The HUSKY – Products Filter Professional for WooCommerce plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 1.3.6.5 via the 'template' parameter of the woof_text_search AJAX action. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included.
CWE-22 Mar 11, 2025
CVE-2025-0108 9.1 CRITICAL KEV 7 PoCs Analysis NUCLEI EPSS 0.94
Palo Alto Networks PAN-OS - Auth Bypass
An authentication bypass in the Palo Alto Networks PAN-OS software enables an unauthenticated attacker with network access to the management web interface to bypass the authentication otherwise required by the PAN-OS management web interface and invoke certain PHP scripts. While invoking these PHP scripts does not enable remote code execution, it can negatively impact integrity and confidentiality of PAN-OS. You can greatly reduce the risk of this issue by restricting access to the management web interface to only trusted internal IP addresses according to our recommended best practices deployment guidelines https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431 . This issue does not affect Cloud NGFW or Prisma Access software.
CWE-306 Feb 12, 2025
CVE-2025-1094 8.1 HIGH EXPLOITED 8 PoCs Analysis EPSS 0.83
PostgreSQL - SQL Injection
Improper neutralization of quoting syntax in PostgreSQL libpq functions PQescapeLiteral(), PQescapeIdentifier(), PQescapeString(), and PQescapeStringConn() allows a database input provider to achieve SQL injection in certain usage patterns. Specifically, SQL injection requires the application to use the function result to construct input to psql, the PostgreSQL interactive terminal. Similarly, improper neutralization of quoting syntax in PostgreSQL command line utility programs allows a source of command line arguments to achieve SQL injection when client_encoding is BIG5 and server_encoding is one of EUC_TW or MULE_INTERNAL. Versions before PostgreSQL 17.3, 16.7, 15.11, 14.16, and 13.19 are affected.
CWE-149 Feb 13, 2025
CVE-2025-0994 8.8 HIGH KEV 1 PoC Analysis EPSS 0.75
Trimble Cityworks < 15.8.9 - Insecure Deserialization
Trimble Cityworks versions prior to 15.8.9 and Cityworks with office companion versions prior to 23.10 are vulnerable to a deserialization vulnerability. This could allow an authenticated user to perform a remote code execution attack against a customer’s Microsoft Internet Information Services (IIS) web server.
CWE-502 Feb 06, 2025
CVE-2025-0411 7.0 HIGH KEV 8 PoCs Analysis EPSS 0.52
7-Zip - RCE
7-Zip Mark-of-the-Web Bypass Vulnerability. This vulnerability allows remote attackers to bypass the Mark-of-the-Web protection mechanism on affected installations of 7-Zip. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of archived files. When extracting files from a crafted archive that bears the Mark-of-the-Web, 7-Zip does not propagate the Mark-of-the-Web to the extracted files. An attacker can leverage this vulnerability to execute arbitrary code in the context of the current user. Was ZDI-CAN-25456.
CWE-693 Jan 25, 2025
CVE-2025-24752 7.1 HIGH EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.04
Wpdeveloper Essential Addons For Elementor < 6.0.15 - XSS
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WPDeveloper Essential Addons for Elementor essential-addons-for-elementor-lite allows Reflected XSS.This issue affects Essential Addons for Elementor: from n/a through <= 6.0.14.
CWE-79 Apr 17, 2025
CVE-2025-24085 10.0 CRITICAL KEV 4 PoCs Analysis EPSS 0.15
Apple Ipados < 17.7.6 - Use After Free
A use after free issue was addressed with improved memory management. This issue is fixed in iOS 18.3 and iPadOS 18.3, iPadOS 17.7.6, macOS Sequoia 15.3, macOS Sonoma 14.7.5, macOS Ventura 13.7.5, tvOS 18.3, visionOS 2.3, watchOS 11.3. A malicious application may be able to elevate privileges. Apple is aware of a report that this issue may have been actively exploited against versions of iOS before iOS 17.2.
CWE-416 Jan 27, 2025
CVE-2025-21333 7.8 HIGH KEV 5 PoCs Analysis EPSS 0.81
Microsoft Windows 10 21h2 < 10.0.19044.5371 - Heap Buffer Overflow
Windows Hyper-V NT Kernel Integration VSP Elevation of Privilege Vulnerability
CWE-122 Jan 14, 2025