Vulnerabilities Exploited in the Wild with Public PoC

Updated 5h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,361 CVEs tracked 53,621 with exploits 4,857 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,288 vendors 43,840 researchers
2,390 results Clear all
CVE-2025-6218 7.8 HIGH KEV 6 PoCs Analysis EPSS 0.06
RARLAB WinRAR - RCE
RARLAB WinRAR Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of RARLAB WinRAR. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of file paths within archive files. A crafted file path can cause the process to traverse to unintended directories. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-27198.
CWE-22 Jun 21, 2025
CVE-2025-58443 9.1 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.12
FOG <1.5.10.1673 - Auth Bypass
FOG is a free open-source cloning/imaging/rescue suite/inventory management system. Versions 1.5.10.1673 and below contain an authentication bypass vulnerability. It is possible for an attacker to perform an unauthenticated DB dump where they could pull a full SQL DB without credentials. A fix is expected to be released 9/15/2025. To address this vulnerability immediately, upgrade to the latest version of either the dev-branch or working-1.6 branch. This will patch the issue for users concerned about immediate exposure. See the FOG Project documentation for step-by-step upgrade instructions: https://docs.fogproject.org/en/latest/install-fog-server#choosing-a-fog-version.
CWE-287 Sep 06, 2025
CVE-2025-55182 10.0 CRITICAL KEV RANSOMWARE 509 PoCs Analysis NUCLEI EPSS 0.84
React Server Components <19.2.0 - RCE
A pre-authentication remote code execution vulnerability exists in React Server Components versions 19.0.0, 19.1.0, 19.1.1, and 19.2.0 including the following packages: react-server-dom-parcel, react-server-dom-turbopack, and react-server-dom-webpack. The vulnerable code unsafely deserializes payloads from HTTP requests to Server Function endpoints.
CWE-502 Dec 03, 2025
CVE-2025-13390 10.0 CRITICAL EXPLOITED 3 PoCs Analysis NUCLEI EPSS 0.37
Wpdirectorykit WP Directory Kit < 1.4.4 - Authentication Bypass
The WP Directory Kit plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 1.4.4 due to incorrect implementation of the authentication algorithm in the "wdk_generate_auto_login_link" function. This is due to the feature using a cryptographically weak token generation mechanism. This makes it possible for unauthenticated attackers to gain administrative access and achieve full site takeover via the auto-login endpoint with a predictable token.
CWE-303 Dec 03, 2025
CVE-2025-13342 9.8 CRITICAL EXPLOITED 2 PoCs Analysis EPSS 0.00
Frontend Admin by DynamiApps <3.28.20 - Info Disclosure
The Frontend Admin by DynamiApps plugin for WordPress is vulnerable to unauthorized modification of arbitrary WordPress options in all versions up to, and including, 3.28.20. This is due to insufficient capability checks and input validation in the ActionOptions::run() save handler. This makes it possible for unauthenticated attackers to modify critical WordPress options such as users_can_register, default_role, and admin_email via submitting crafted form data to public frontend forms.
CWE-862 Dec 03, 2025
CVE-2025-13486 9.8 CRITICAL EXPLOITED 9 PoCs Analysis NUCLEI EPSS 0.73
Advanced Custom Fields: Extended <0.9.1.1 - RCE
The Advanced Custom Fields: Extended plugin for WordPress is vulnerable to Remote Code Execution in versions 0.9.0.5 through 0.9.1.1 via the prepare_form() function. This is due to the function accepting user input and then passing that through call_user_func_array(). This makes it possible for unauthenticated attackers to execute arbitrary code on the server, which can be leveraged to inject backdoors or create new administrative user accounts.
CWE-94 Dec 03, 2025
CVE-2025-22214 4.3 MEDIUM EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.00
Landray EIS <2006 - SQL Injection
Landray EIS 2001 through 2006 allows Message/fi_message_receiver.aspx?replyid= SQL injection.
CWE-89 Jan 02, 2025
CVE-2025-64095 10.0 CRITICAL EXPLOITED 3 PoCs Analysis NUCLEI EPSS 0.13
Dnnsoftware Dotnetnuke < 10.1.1 - Unrestricted File Upload
DNN (formerly DotNetNuke) is an open-source web content management platform (CMS) in the Microsoft ecosystem. Prior to 10.1.1, the default HTML editor provider allows unauthenticated file uploads and images can overwrite existing files. An unauthenticated user can upload and replace existing files allowing defacing a website and combined with other issue, injection XSS payloads. This vulnerability is fixed in 10.1.1.
CWE-434 Oct 28, 2025
CVE-2025-52472 CRITICAL EXPLOITED 1 PoC 1 Writeup Analysis NUCLEI EPSS 0.00
Org.xwiki.platform Xwiki-platform-rest-server < 17.4.2 - SQL Injection
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Starting in version 4.3-milestone-1 and prior to versions 16.10.9, 17.4.2, and 17.5.0, the REST search URL is vulnerable to HQL injection via the `orderField` parameter. The specified value is added twice in the query, though, once in the field list for the select and once in the order clause, so it's not that easy to exploit. The part of the query between the two fields can be enclosed in single quotes to effectively remove them, but the query still needs to remain valid with the query two times in it. This has been patched in versions 17.5.0, 17.4.2, and 16.10.9. No known workarounds are available.
CWE-89 Oct 06, 2025
CVE-2025-8943 9.8 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.85
Flowise < 3.0.1 - Missing Authorization
The Custom MCPs feature is designed to execute OS commands, for instance, using tools like `npx` to spin up local MCP Servers. However, Flowise's inherent authentication and authorization model is minimal and lacks role-based access controls (RBAC). Furthermore, in Flowise versions before 3.0.1 the default installation operates without authentication unless explicitly configured. This combination allows unauthenticated network attackers to execute unsandboxed OS commands.
CWE-862 Aug 14, 2025
CVE-2025-44137 8.2 HIGH EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.00
Maptiler Tileserver Php - Path Traversal
MapTiler Tileserver-php v2.0 is vulnerable to Directory Traversal. The renderTile function within tileserver.php is responsible for delivering tiles that are stored as files on the server via web request. Creating the path to a file allows the insertion of "../" and thus read any file on the web server. Affected GET parameters are "TileMatrix", "TileRow", "TileCol" and "Format"
CWE-22 Jul 29, 2025
CVE-2025-44136 9.8 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.11
Maptiler Tileserver Php - XSS
MapTiler Tileserver-php v2.0 is vulnerable to Cross Site Scripting (XSS). The GET parameter "layer" is reflected in an error message without html encoding. This leads to XSS and allows an unauthenticated attacker to execute arbitrary HTML or JavaScript code on a victim's browser.
CWE-79 Jul 29, 2025
CVE-2025-24354 5.3 MEDIUM EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.02
Imgproxy < 3.27.2 - SSRF
imgproxy is server for resizing, processing, and converting images. Imgproxy does not block the 0.0.0.0 address, even with IMGPROXY_ALLOW_LOOPBACK_SOURCE_ADDRESSES set to false. This can expose services on the local host. This vulnerability is fixed in 3.27.2.
CWE-918 Jan 27, 2025
CVE-2025-34299 9.8 CRITICAL EXPLOITED 5 PoCs Analysis NUCLEI EPSS 0.69
Monstaftp Monsta FTP < 2.11 - Unrestricted File Upload
Monsta FTP versions 2.11 and earlier contain a vulnerability that allows unauthenticated arbitrary file uploads. This flaw enables attackers to execute arbitrary code by uploading a specially crafted file from a malicious (S)FTP server.
CWE-434 Nov 07, 2025
CVE-2025-6389 9.8 CRITICAL EXPLOITED 6 PoCs Analysis EPSS 0.01
Sneeit Framework <8.3 - RCE
The Sneeit Framework plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 8.3 via the sneeit_articles_pagination_callback() function. This is due to the function accepting user input and then passing that through call_user_func(). This makes it possible for unauthenticated attackers to execute code on the server which can be leveraged to inject backdoors or, for example, create new administrative user accounts.
CWE-94 Nov 25, 2025
CVE-2025-12057 9.8 CRITICAL EXPLOITED 2 PoCs Analysis EPSS 0.00
WavePlayer WP <3.8.0 - Unauthenticated RCE
The WavePlayer WordPress plugin before 3.8.0 does not have authorization in an AJAX action as well as does not validate the file to be copied locally, allowing unauthenticated users to upload arbitrary file on the server and lead to RCE
CWE-434 Nov 19, 2025
CVE-2025-61757 9.8 CRITICAL KEV 3 PoCs Analysis NUCLEI EPSS 0.88
Oracle Identity Manager - Missing Authentication
Vulnerability in the Identity Manager product of Oracle Fusion Middleware (component: REST WebServices). Supported versions that are affected are 12.2.1.4.0 and 14.1.2.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Identity Manager. Successful attacks of this vulnerability can result in takeover of Identity Manager. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
CWE-306 Oct 21, 2025
CVE-2025-1302 9.8 CRITICAL EXPLOITED 3 PoCs Analysis NUCLEI EPSS 0.89
NPM Jsonpath-plus < 10.3.0 - Code Injection
Versions of the package jsonpath-plus before 10.3.0 are vulnerable to Remote Code Execution (RCE) due to improper input sanitization. An attacker can execute aribitrary code on the system by exploiting the unsafe default usage of eval='safe' mode. **Note:** This is caused by an incomplete fix for [CVE-2024-21534](https://security.snyk.io/vuln/SNYK-JS-JSONPATHPLUS-7945884).
CWE-94 Feb 15, 2025
CVE-2025-58034 7.2 HIGH KEV 5 PoCs Analysis EPSS 0.37
Fortinet Fortiweb < 7.0.12 - OS Command Injection
An Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability [CWE-78] vulnerability in Fortinet FortiWeb 8.0.0 through 8.0.1, FortiWeb 7.6.0 through 7.6.5, FortiWeb 7.4.0 through 7.4.10, FortiWeb 7.2.0 through 7.2.11, FortiWeb 7.0.0 through 7.0.11 may allow an authenticated attacker to execute unauthorized code on the underlying system via crafted HTTP requests or CLI commands.
CWE-78 Nov 18, 2025
CVE-2025-61666 HIGH EXPLOITED 1 PoC 1 Writeup Analysis NUCLEI EPSS 0.01
Traccar <6.8.1-6.0 - Local File Inclusion
Traccar is an open source GPS tracking system. Default installs of Traccar on Windows between versions 6.1- 6.8.1 and non default installs between versions 5.8 - 6.0 are vulnerable to unauthenticated local file inclusion attacks which can lead to leakage of passwords or any file on the file system including the Traccar configuration file. Versions 5.8 - 6.0 are only vulnerable if <entry key='web.override'>./override</entry> is set in the configuration file. Versions 6.1 - 6.8.1 are vulnerable by default as the web override is enabled by default. The vulnerable code is removed in version 6.9.0.
CWE-22 Oct 02, 2025