Vulnerabilities Exploited in the Wild with Public PoC
Updated 5h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
2,390 results
Clear all
CVE-2025-6218
7.8
HIGH
KEV
6 PoCs
Analysis
EPSS 0.06
RARLAB WinRAR - RCE
RARLAB WinRAR Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of RARLAB WinRAR. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the handling of file paths within archive files. A crafted file path can cause the process to traverse to unintended directories. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-27198.
CWE-22
Jun 21, 2025
CVE-2025-58443
9.1
CRITICAL
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.12
FOG <1.5.10.1673 - Auth Bypass
FOG is a free open-source cloning/imaging/rescue suite/inventory management system. Versions 1.5.10.1673 and below contain an authentication bypass vulnerability. It is possible for an attacker to perform an unauthenticated DB dump where they could pull a full SQL DB without credentials. A fix is expected to be released 9/15/2025. To address this vulnerability immediately, upgrade to the latest version of either the dev-branch or working-1.6 branch. This will patch the issue for users concerned about immediate exposure. See the FOG Project documentation for step-by-step upgrade instructions: https://docs.fogproject.org/en/latest/install-fog-server#choosing-a-fog-version.
CWE-287
Sep 06, 2025
CVE-2025-55182
10.0
CRITICAL
KEV
RANSOMWARE
509 PoCs
Analysis
NUCLEI
EPSS 0.84
React Server Components <19.2.0 - RCE
A pre-authentication remote code execution vulnerability exists in React Server Components versions 19.0.0, 19.1.0, 19.1.1, and 19.2.0 including the following packages: react-server-dom-parcel, react-server-dom-turbopack, and react-server-dom-webpack. The vulnerable code unsafely deserializes payloads from HTTP requests to Server Function endpoints.
CWE-502
Dec 03, 2025
CVE-2025-13390
10.0
CRITICAL
EXPLOITED
3 PoCs
Analysis
NUCLEI
EPSS 0.37
Wpdirectorykit WP Directory Kit < 1.4.4 - Authentication Bypass
The WP Directory Kit plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 1.4.4 due to incorrect implementation of the authentication algorithm in the "wdk_generate_auto_login_link" function. This is due to the feature using a cryptographically weak token generation mechanism. This makes it possible for unauthenticated attackers to gain administrative access and achieve full site takeover via the auto-login endpoint with a predictable token.
CWE-303
Dec 03, 2025
CVE-2025-13342
9.8
CRITICAL
EXPLOITED
2 PoCs
Analysis
EPSS 0.00
Frontend Admin by DynamiApps <3.28.20 - Info Disclosure
The Frontend Admin by DynamiApps plugin for WordPress is vulnerable to unauthorized modification of arbitrary WordPress options in all versions up to, and including, 3.28.20. This is due to insufficient capability checks and input validation in the ActionOptions::run() save handler. This makes it possible for unauthenticated attackers to modify critical WordPress options such as users_can_register, default_role, and admin_email via submitting crafted form data to public frontend forms.
CWE-862
Dec 03, 2025
CVE-2025-13486
9.8
CRITICAL
EXPLOITED
9 PoCs
Analysis
NUCLEI
EPSS 0.73
Advanced Custom Fields: Extended <0.9.1.1 - RCE
The Advanced Custom Fields: Extended plugin for WordPress is vulnerable to Remote Code Execution in versions 0.9.0.5 through 0.9.1.1 via the prepare_form() function. This is due to the function accepting user input and then passing that through call_user_func_array(). This makes it possible for unauthenticated attackers to execute arbitrary code on the server, which can be leveraged to inject backdoors or create new administrative user accounts.
CWE-94
Dec 03, 2025
CVE-2025-22214
4.3
MEDIUM
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.00
Landray EIS <2006 - SQL Injection
Landray EIS 2001 through 2006 allows Message/fi_message_receiver.aspx?replyid= SQL injection.
CWE-89
Jan 02, 2025
CVE-2025-64095
10.0
CRITICAL
EXPLOITED
3 PoCs
Analysis
NUCLEI
EPSS 0.13
Dnnsoftware Dotnetnuke < 10.1.1 - Unrestricted File Upload
DNN (formerly DotNetNuke) is an open-source web content management platform (CMS) in the Microsoft ecosystem. Prior to 10.1.1, the default HTML editor provider allows unauthenticated file uploads and images can overwrite existing files. An unauthenticated user can upload and replace existing files allowing defacing a website and combined with other issue, injection XSS payloads. This vulnerability is fixed in 10.1.1.
CWE-434
Oct 28, 2025
CVE-2025-52472
CRITICAL
EXPLOITED
1 PoC
1 Writeup
Analysis
NUCLEI
EPSS 0.00
Org.xwiki.platform Xwiki-platform-rest-server < 17.4.2 - SQL Injection
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Starting in version 4.3-milestone-1 and prior to versions 16.10.9, 17.4.2, and 17.5.0, the REST search URL is vulnerable to HQL injection via the `orderField` parameter. The specified value is added twice in the query, though, once in the field list for the select and once in the order clause, so it's not that easy to exploit. The part of the query between the two fields can be enclosed in single quotes to effectively remove them, but the query still needs to remain valid with the query two times in it. This has been patched in versions 17.5.0, 17.4.2, and 16.10.9. No known workarounds are available.
CWE-89
Oct 06, 2025
CVE-2025-8943
9.8
CRITICAL
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.85
Flowise < 3.0.1 - Missing Authorization
The Custom MCPs feature is designed to execute OS commands, for instance, using tools like `npx` to spin up local MCP Servers. However, Flowise's inherent authentication and authorization model is minimal and lacks role-based access controls (RBAC). Furthermore, in Flowise versions before 3.0.1 the default installation operates without authentication unless explicitly configured. This combination allows unauthenticated network attackers to execute unsandboxed OS commands.
CWE-862
Aug 14, 2025
CVE-2025-44137
8.2
HIGH
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.00
Maptiler Tileserver Php - Path Traversal
MapTiler Tileserver-php v2.0 is vulnerable to Directory Traversal. The renderTile function within tileserver.php is responsible for delivering tiles that are stored as files on the server via web request. Creating the path to a file allows the insertion of "../" and thus read any file on the web server. Affected GET parameters are "TileMatrix", "TileRow", "TileCol" and "Format"
CWE-22
Jul 29, 2025
CVE-2025-44136
9.8
CRITICAL
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.11
Maptiler Tileserver Php - XSS
MapTiler Tileserver-php v2.0 is vulnerable to Cross Site Scripting (XSS). The GET parameter "layer" is reflected in an error message without html encoding. This leads to XSS and allows an unauthenticated attacker to execute arbitrary HTML or JavaScript code on a victim's browser.
CWE-79
Jul 29, 2025
CVE-2025-24354
5.3
MEDIUM
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.02
Imgproxy < 3.27.2 - SSRF
imgproxy is server for resizing, processing, and converting images. Imgproxy does not block the 0.0.0.0 address, even with IMGPROXY_ALLOW_LOOPBACK_SOURCE_ADDRESSES set to false. This can expose services on the local host. This vulnerability is fixed in 3.27.2.
CWE-918
Jan 27, 2025
CVE-2025-34299
9.8
CRITICAL
EXPLOITED
5 PoCs
Analysis
NUCLEI
EPSS 0.69
Monstaftp Monsta FTP < 2.11 - Unrestricted File Upload
Monsta FTP versions 2.11 and earlier contain a vulnerability that allows unauthenticated arbitrary file uploads. This flaw enables attackers to execute arbitrary code by uploading a specially crafted file from a malicious (S)FTP server.
CWE-434
Nov 07, 2025
CVE-2025-6389
9.8
CRITICAL
EXPLOITED
6 PoCs
Analysis
EPSS 0.01
Sneeit Framework <8.3 - RCE
The Sneeit Framework plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 8.3 via the sneeit_articles_pagination_callback() function. This is due to the function accepting user input and then passing that through call_user_func(). This makes it possible for unauthenticated attackers to execute code on the server which can be leveraged to inject backdoors or, for example, create new administrative user accounts.
CWE-94
Nov 25, 2025
CVE-2025-12057
9.8
CRITICAL
EXPLOITED
2 PoCs
Analysis
EPSS 0.00
WavePlayer WP <3.8.0 - Unauthenticated RCE
The WavePlayer WordPress plugin before 3.8.0 does not have authorization in an AJAX action as well as does not validate the file to be copied locally, allowing unauthenticated users to upload arbitrary file on the server and lead to RCE
CWE-434
Nov 19, 2025
CVE-2025-61757
9.8
CRITICAL
KEV
3 PoCs
Analysis
NUCLEI
EPSS 0.88
Oracle Identity Manager - Missing Authentication
Vulnerability in the Identity Manager product of Oracle Fusion Middleware (component: REST WebServices). Supported versions that are affected are 12.2.1.4.0 and 14.1.2.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Identity Manager. Successful attacks of this vulnerability can result in takeover of Identity Manager. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
CWE-306
Oct 21, 2025
CVE-2025-1302
9.8
CRITICAL
EXPLOITED
3 PoCs
Analysis
NUCLEI
EPSS 0.89
NPM Jsonpath-plus < 10.3.0 - Code Injection
Versions of the package jsonpath-plus before 10.3.0 are vulnerable to Remote Code Execution (RCE) due to improper input sanitization. An attacker can execute aribitrary code on the system by exploiting the unsafe default usage of eval='safe' mode.
**Note:**
This is caused by an incomplete fix for [CVE-2024-21534](https://security.snyk.io/vuln/SNYK-JS-JSONPATHPLUS-7945884).
CWE-94
Feb 15, 2025
CVE-2025-58034
7.2
HIGH
KEV
5 PoCs
Analysis
EPSS 0.37
Fortinet Fortiweb < 7.0.12 - OS Command Injection
An Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability [CWE-78] vulnerability in Fortinet FortiWeb 8.0.0 through 8.0.1, FortiWeb 7.6.0 through 7.6.5, FortiWeb 7.4.0 through 7.4.10, FortiWeb 7.2.0 through 7.2.11, FortiWeb 7.0.0 through 7.0.11 may allow an authenticated attacker to execute unauthorized code on the underlying system via crafted HTTP requests or CLI commands.
CWE-78
Nov 18, 2025
CVE-2025-61666
HIGH
EXPLOITED
1 PoC
1 Writeup
Analysis
NUCLEI
EPSS 0.01
Traccar <6.8.1-6.0 - Local File Inclusion
Traccar is an open source GPS tracking system. Default installs of Traccar on Windows between versions 6.1- 6.8.1 and non default installs between versions 5.8 - 6.0 are vulnerable to unauthenticated local file inclusion attacks which can lead to leakage of passwords or any file on the file system including the Traccar configuration file. Versions 5.8 - 6.0 are only vulnerable if <entry key='web.override'>./override</entry> is set in the configuration file. Versions 6.1 - 6.8.1 are vulnerable by default as the web override is enabled by default. The vulnerable code is removed in version 6.9.0.
CWE-22
Oct 02, 2025