Vulnerabilities Exploited in the Wild with Public PoC
Updated 5h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
2,390 results
Clear all
CVE-2025-14436
7.2
HIGH
EXPLOITED
1 PoC
Analysis
EPSS 0.00
Brevo for WooCommerce <4.0.49 - XSS
The Brevo for WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘user_connection_id’ parameter in all versions up to, and including, 4.0.49 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
CWE-79
Jan 08, 2026
CVE-2025-37164
10.0
CRITICAL
KEV
5 PoCs
Analysis
NUCLEI
EPSS 0.84
HPE OneView unauthenticated RCE
A remote code execution issue exists in HPE OneView.
CWE-94
Dec 16, 2025
CVE-2025-14998
9.8
CRITICAL
EXPLOITED
1 PoC
Analysis
EPSS 0.00
Branda WordPress <3.4.24 - Privilege Escalation
The Branda plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 3.4.24. This is due to the plugin not properly validating a user's identity prior to updating their password. This makes it possible for unauthenticated attackers to change arbitrary user's passwords, including administrators, and leverage that to gain access to their account.
CWE-639
Jan 02, 2026
CVE-2025-14847
7.5
HIGH
KEV
47 PoCs
Analysis
NUCLEI
EPSS 0.74
MongoDB Memory Disclosure (CVE-2025-14847) - Mongobleed
Mismatched length fields in Zlib compressed protocol headers may allow a read of uninitialized heap memory by an unauthenticated client. This issue affects all MongoDB Server v7.0 prior to 7.0.28 versions, MongoDB Server v8.0 versions prior to 8.0.17, MongoDB Server v8.2 versions prior to 8.2.3, MongoDB Server v6.0 versions prior to 6.0.27, MongoDB Server v5.0 versions prior to 5.0.32, MongoDB Server v4.4 versions prior to 4.4.30, MongoDB Server v4.2 versions greater than or equal to 4.2.0, MongoDB Server v4.0 versions greater than or equal to 4.0.0, and MongoDB Server v3.6 versions greater than or equal to 3.6.0.
CWE-130
Dec 19, 2025
CVE-2025-49619
8.5
HIGH
EXPLOITED
4 PoCs
Analysis
EPSS 0.74
Skyvern SSTI Remote Code Execution
Skyvern through 0.1.85 is vulnerable to server-side template injection (SSTI) in the Prompt field of workflow blocks such as the Navigation v2 Block. Improper sanitization of Jinja2 template input allows authenticated users to inject crafted expressions that are evaluated on the server, leading to blind remote code execution (RCE).
CWE-1336
Jun 07, 2025
CVE-2025-49844
9.9
CRITICAL
EXPLOITED
RANSOMWARE
24 PoCs
Analysis
NUCLEI
EPSS 0.14
Redis < 6.2.20 - Use After Free
Redis is an open source, in-memory database that persists on disk. Versions 8.2.1 and below allow an authenticated user to use a specially crafted Lua script to manipulate the garbage collector, trigger a use-after-free and potentially lead to remote code execution. The problem exists in all versions of Redis with Lua scripting. This issue is fixed in version 8.2.2. To workaround this issue without patching the redis-server executable is to prevent users from executing Lua scripts. This can be done using ACL to restrict EVAL and EVALSHA commands.
CWE-416
Oct 03, 2025
CVE-2025-32778
CRITICAL
EXPLOITED
2 PoCs
Analysis
EPSS 0.32
Web Check - Command Injection
Web-Check is an all-in-one OSINT tool for analyzing any website. A command injection vulnerability exists in the screenshot API of the Web Check project (Lissy93/web-check). The issue stems from user-controlled input (url) being passed unsanitized into a shell command using exec(), allowing attackers to execute arbitrary system commands on the underlying host. This could be exploited by sending crafted url parameters to extract files or even establish remote access. The vulnerability has been patched by replacing exec() with execFile(), which avoids using a shell and properly isolates arguments.
CWE-78
Apr 15, 2025
CVE-2025-14733
9.8
CRITICAL
KEV
2 PoCs
Analysis
EPSS 0.29
Watchguard Fireware < 12.5.15 - Out-of-Bounds Write
An Out-of-bounds Write vulnerability in WatchGuard Fireware OS may allow a remote unauthenticated attacker to execute arbitrary code. This vulnerability affects both the Mobile User VPN with IKEv2 and the Branch Office VPN using IKEv2 when configured with a dynamic gateway peer.This vulnerability affects Fireware OS 11.10.2 up to and including 11.12.4_Update1, 12.0 up to and including 12.11.5 and 2025.1 up to and including 2025.1.3.
CWE-787
Dec 19, 2025
CVE-2025-40602
6.6
MEDIUM
KEV
RANSOMWARE
2 PoCs
Analysis
EPSS 0.00
Sonicwall Sma6200 Firmware < 12.4.3-03245 - Privilege Escalation
A local privilege escalation vulnerability due to insufficient authorization in the SonicWall SMA1000 appliance management console (AMC).
CWE-862
Dec 18, 2025
CVE-2025-20393
10.0
CRITICAL
KEV
5 PoCs
Analysis
EPSS 0.07
Cisco AsyncOS - RCE
A vulnerability in the Spam Quarantine feature of Cisco AsyncOS Software for Cisco Secure Email Gateway and Cisco Secure Email and Web Manager could allow an unauthenticated, remote attacker to execute arbitrary system commands on an affected device with root privileges.
This vulnerability is due to insufficient validation of HTTP requests by the Spam Quarantine feature. An attacker could exploit this vulnerability by sending a crafted HTTP request to the affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with root privileges.
CWE-20
Dec 17, 2025
CVE-2025-59718
9.8
CRITICAL
KEV
3 PoCs
Analysis
EPSS 0.08
Fortinet Fortiproxy < 7.0.22 - Signature Verification Bypass
A improper verification of cryptographic signature vulnerability in Fortinet FortiOS 7.6.0 through 7.6.3, FortiOS 7.4.0 through 7.4.8, FortiOS 7.2.0 through 7.2.11, FortiOS 7.0.0 through 7.0.17, FortiProxy 7.6.0 through 7.6.3, FortiProxy 7.4.0 through 7.4.10, FortiProxy 7.2.0 through 7.2.14, FortiProxy 7.0.0 through 7.0.21, FortiSwitchManager 7.2.0 through 7.2.6, FortiSwitchManager 7.0.0 through 7.0.5 allows an unauthenticated attacker to bypass the FortiCloud SSO login authentication via a crafted SAML response message.
CWE-347
Dec 09, 2025
CVE-2025-43529
8.8
HIGH
KEV
8 PoCs
Analysis
EPSS 0.00
Apple watchOS <26.2 - Code Injection
A use-after-free issue was addressed with improved memory management. This issue is fixed in Safari 26.2, iOS 18.7.3 and iPadOS 18.7.3, iOS 26.2 and iPadOS 26.2, macOS Tahoe 26.2, tvOS 26.2, visionOS 26.2, watchOS 26.2. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals on versions of iOS before iOS 26. CVE-2025-14174 was also issued in response to this report.
CWE-416
Dec 17, 2025
CVE-2025-14611
9.8
CRITICAL
KEV
1 PoC
Analysis
NUCLEI
EPSS 0.59
Gladinet CentreStack & Triofox <16.12.10420.56791 - Code Injection
Gladinet CentreStack and Triofox prior to version 16.12.10420.56791 used hardcoded values for their implementation of the AES cryptoscheme. This degrades security for public exposed endpoints that may make use of it and may offer arbitrary local file inclusion when provided a specially crafted request without authentication. This opens the door for future exploitation and can be leveraged with previous vulnerabilities to gain a full system compromise.
CWE-798
Dec 12, 2025
CVE-2025-59719
9.8
CRITICAL
EXPLOITED
1 PoC
Analysis
EPSS 0.00
Fortinet Fortiweb < 7.4.9 - Signature Verification Bypass
An improper verification of cryptographic signature vulnerability in Fortinet FortiWeb 8.0.0, FortiWeb 7.6.0 through 7.6.4, FortiWeb 7.4.0 through 7.4.9 may allow an unauthenticated attacker to bypass the FortiCloud SSO login authentication via a crafted SAML response message.
CWE-347
Dec 09, 2025
CVE-2025-13315
9.8
CRITICAL
EXPLOITED
3 PoCs
Analysis
NUCLEI
EPSS 0.84
Twonky Server Log Leak Authentication Bypass
Twonky Server 8.5.2 on Linux and Windows is vulnerable to an access control flaw. An unauthenticated attacker can bypass web service API authentication controls to leak a log file and read the administrator's username and encrypted password.
CWE-420
Nov 19, 2025
CVE-2025-9316
MEDIUM
EXPLOITED
2 PoCs
Analysis
NUCLEI
EPSS 0.81
N-central <2025.4 - Info Disclosure
N-central < 2025.4 can generate sessionIDs for unauthenticated users
This issue affects N-central: before 2025.4.
CWE-1284
Nov 12, 2025
CVE-2025-11700
7.5
HIGH
EXPLOITED
2 PoCs
Analysis
NUCLEI
EPSS 0.47
N-able N-Central Authentication Bypass and XXE Scanner
N-central versions < 2025.4 are vulnerable to multiple XML External Entities injection leading to information disclosure
CWE-611
Nov 12, 2025
CVE-2025-14174
8.8
HIGH
KEV
6 PoCs
Analysis
EPSS 0.01
Google Chrome <143.0.7499.110 - Memory Corruption
Out of bounds memory access in ANGLE in Google Chrome on Mac prior to 143.0.7499.110 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)
CWE-119
Dec 12, 2025
CVE-2025-58360
8.2
HIGH
KEV
8 PoCs
Analysis
NUCLEI
EPSS 0.84
GeoServer WMS GetMap XXE Arbitrary File Read
GeoServer is an open source server that allows users to share and edit geospatial data. From version 2.26.0 to before 2.26.2 and before 2.25.6, an XML External Entity (XXE) vulnerability was identified. The application accepts XML input through a specific endpoint /geoserver/wms operation GetMap. However, this input is not sufficiently sanitized or restricted, allowing an attacker to define external entities within the XML request. This issue has been patched in GeoServer 2.25.6, GeoServer 2.26.3, and GeoServer 2.27.0.
CWE-611
Nov 25, 2025
CVE-2025-62221
7.8
HIGH
KEV
1 PoC
Analysis
EPSS 0.03
Microsoft Windows 10 1809 < 10.0.17763.8146 - Use After Free
Use after free in Windows Cloud Files Mini Filter Driver allows an authorized attacker to elevate privileges locally.
CWE-416
Dec 09, 2025