CISA KEV Gaps — Exploited CVEs Missing from KEV

Updated 2h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,361 CVEs tracked 53,621 with exploits 4,857 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,288 vendors 43,840 researchers
607 results Clear all
CVE-2025-47813 4.3 MEDIUM KEV 1 Writeup NUCLEI EPSS 0.23
Wftpserver Wing FTP Server < 7.4.4 - Error Information Exposure
loginok.html in Wing FTP Server before 7.4.4 discloses the full local installation path of the application when using a long value in the UID cookie.
CWE-209 Jul 10, 2025
CVE-2025-34026 7.5 HIGH KEV NUCLEI EPSS 0.72
Versa Concerto <12.2.0 - Auth Bypass
The Versa Concerto SD-WAN orchestration platform is vulnerable to an authentication bypass in the Traefik reverse proxy configuration, allowing at attacker to access administrative endpoints. The internal Actuator endpoint can be leveraged for access to heap dumps and trace logs.This issue is known to affect Concerto from 12.1.2 through 12.2.0. Additional versions may be vulnerable.
CWE-288 May 21, 2025
CVE-2025-59374 9.8 CRITICAL KEV EPSS 0.35
ASUS Live Update - Unintended Actions
"UNSUPPORTED WHEN ASSIGNED" Certain versions of the ASUS Live Update client were distributed with unauthorized modifications introduced through a supply chain compromise. The modified builds could cause devices meeting specific targeting conditions to perform unintended actions. Only devices that met these conditions and installed the compromised versions were affected. The Live Update client has already reached End-of-Support (EOS) in October 2021, and no currently supported devices or products are affected by this issue.
CWE-506 Dec 17, 2025
CVE-2025-66644 7.2 HIGH KEV EPSS 0.03
Array Networks ArrayOS AG <9.4.5.9 - Command Injection
Array Networks ArrayOS AG before 9.4.5.9 allows command injection, as exploited in the wild in August through December 2025.
CWE-78 Dec 05, 2025
CVE-2025-48633 5.5 MEDIUM KEV EPSS 0.00
Android - Privilege Escalation
In hasAccountsOnAnyUser of DevicePolicyManagerService.java, there is a possible way to add a Device Owner after provisioning due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
Dec 08, 2025
CVE-2025-48572 7.8 HIGH KEV EPSS 0.00
Android - Privilege Escalation
In multiple locations, there is a possible way to launch activities from the background due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
CWE-306 Dec 08, 2025
CVE-2025-13223 8.8 HIGH KEV EPSS 0.03
Google Chrome < 142.0.7444.175 - Type Confusion
Type Confusion in V8 in Google Chrome prior to 142.0.7444.175 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
CWE-843 Nov 17, 2025
CVE-2025-12480 9.1 CRITICAL KEV 1 Writeup NUCLEI EPSS 0.78
Gladinet Triofox < 16.7.10368.56560 - Improper Access Control
Triofox versions prior to 16.7.10368.56560, are vulnerable to an Improper Access Control flaw that allows access to initial setup pages even after setup is complete.
CWE-284 Nov 10, 2025
CVE-2025-6205 9.1 CRITICAL KEV NUCLEI EPSS 0.78
DELMIA Apriso <2025 - Privilege Escalation
A missing authorization vulnerability affecting DELMIA Apriso from Release 2020 through Release 2025 could allow an attacker to gain privileged access to the application.
CWE-862 Aug 04, 2025
CVE-2025-6204 8.0 HIGH KEV NUCLEI EPSS 0.08
DELMIA Apriso <2025 - Code Injection
An Improper Control of Generation of Code (Code Injection) vulnerability affecting DELMIA Apriso from Release 2020 through Release 2025 could allow an attacker to execute arbitrary code.
CWE-94 Aug 04, 2025
CVE-2025-61932 9.8 CRITICAL KEV EPSS 0.01
Lanscope Endpoint Manager - SSRF
Lanscope Endpoint Manager (On-Premises) (Client program (MR) and Detection agent (DA)) improperly verifies the origin of incoming requests, allowing an attacker to execute arbitrary code by sending specially crafted packets.
CWE-940 Oct 20, 2025
CVE-2025-2747 9.8 CRITICAL KEV 1 Writeup NUCLEI EPSS 0.89
Kentico Xperience 13 CMS - Staging Service Authentication Bypass (WT-2025-0006)
An authentication bypass vulnerability in Kentico Xperience allows authentication bypass via the Staging Sync Server component password handling for the server defined None type. Authentication bypass allows an attacker to control administrative objects.This issue affects Xperience through 13.0.178.
CWE-288 Mar 24, 2025
CVE-2025-2746 9.8 CRITICAL KEV 1 Writeup NUCLEI EPSS 0.84
Kentico Xperience 13 CMS - Staging Service Authentication Bypass (WT-2025-0011)
An authentication bypass vulnerability in Kentico Xperience allows authentication bypass via the Staging Sync Server password handling of empty SHA1 usernames in digest authentication. Authentication bypass allows an attacker to control administrative objects.This issue affects Xperience through 13.0.172.
CWE-288 Mar 24, 2025
CVE-2025-59230 7.8 HIGH KEV EPSS 0.04
Microsoft Windows 10 1507 < 10.0.10240.21161 - Improper Access Control
Improper access control in Windows Remote Access Connection Manager allows an authorized attacker to elevate privileges locally.
CWE-284 Oct 14, 2025
CVE-2025-27915 5.4 MEDIUM KEV NUCLEI EPSS 0.26
Zimbra - Cross-Site Scripting via ICS Files
An issue was discovered in Zimbra Collaboration (ZCS) 9.0 and 10.0 and 10.1. A stored cross-site scripting (XSS) vulnerability exists in the Classic Web Client due to insufficient sanitization of HTML content in ICS files. When a user views an e-mail message containing a malicious ICS entry, its embedded JavaScript executes via an ontoggle event inside a <details> tag. This allows an attacker to run arbitrary JavaScript within the victim's session, potentially leading to unauthorized actions such as setting e-mail filters to redirect messages to an attacker-controlled address. As a result, an attacker can perform unauthorized actions on the victim's account, including e-mail redirection and data exfiltration.
CWE-79 Mar 12, 2025
CVE-2025-21043 8.8 HIGH KEV EPSS 0.05
Samsung Android - Out-of-Bounds Write
Out-of-bounds write in libimagecodec.quram.so prior to SMR Sep-2025 Release 1 allows remote attackers to execute arbitrary code.
CWE-787 Sep 12, 2025
CVE-2025-4008 8.8 HIGH KEV NUCLEI EPSS 0.44
Smartbedded Meteobridge VM < 6.2 - Command Injection
The Meteobridge web interface let meteobridge administrator manage their weather station data collection and administer their meteobridge system through a web application written in CGI shell scripts and C. This web interface exposes an endpoint that is vulnerable to command injection. Remote unauthenticated attackers can gain arbitrary command execution with elevated privileges ( root ) on affected devices.
CWE-306 May 21, 2025
CVE-2025-59689 6.1 MEDIUM KEV EPSS 0.06
Libraesva Email Security Gateway < 5.0.31 - Command Injection
Libraesva ESG 4.5 through 5.5.x before 5.5.7 allows command injection via a compressed e-mail attachment. For ESG 5.0 a fix has been released in 5.0.31. For ESG 5.1 a fix has been released in 5.1.20. For ESG 5.2 a fix has been released in 5.2.31. For ESG 5.4 a fix has been released in 5.4.8. For ESG 5.5. a fix has been released in 5.5.7.
CWE-77 Sep 19, 2025
CVE-2025-20362 6.5 MEDIUM KEV NUCLEI EPSS 0.51
Cisco Secure ASA/FDT - DoS
Update: On November 5, 2025, Cisco became aware of a new attack variant against devices running Cisco Secure ASA Software or Cisco Secure FTD Software releases that are affected by CVE-2025-20333 and CVE-2025-20362. This attack can cause unpatched devices to unexpectedly reload, leading to denial of service (DoS) conditions. Cisco strongly recommends that all customers upgrade to the fixed software releases that are listed in the Fixed Software ["#fs"] section of this advisory. A vulnerability in the VPN web server of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to access restricted URL endpoints that are related to remote access VPN that should otherwise be inaccessible without authentication. This vulnerability is due to improper validation of user-supplied input in HTTP(S) requests. An attacker could exploit this vulnerability by sending crafted HTTP requests to a targeted web server on a device. A successful exploit could allow the attacker to access a restricted URL without authentication.
CWE-862 Sep 25, 2025
CVE-2025-20333 9.9 CRITICAL KEV EPSS 0.41
Cisco Secure Firewall ASA/FTD - RCE
A vulnerability in the VPN web server of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow an authenticated, remote attacker to execute arbitrary code on an affected device. This vulnerability is due to improper validation of user-supplied input in HTTP(S) requests. An attacker with valid VPN user credentials could exploit this vulnerability by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code as root, possibly resulting in the complete compromise of the affected device.
CWE-120 Sep 25, 2025