Latest Vulnerabilities with Public Exploits

Updated 55m ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,402 CVEs tracked 53,629 with exploits 4,859 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,301 vendors 43,863 researchers
53,629 results Clear all
CVE-2025-69213 8.8 HIGH 1 PoC Analysis EPSS 0.00
Devcode-it Openstamanager - SQL Injection
OpenSTAManager is an open source management software for technical assistance and invoicing. In version 2.9.8 and prior, a SQL Injection vulnerability exists in the ajax_complete.php endpoint when handling the get_sedi operation. An authenticated attacker can inject malicious SQL code through the idanagrafica parameter, leading to unauthorized database access. At time of publication, no known patch exists.
CWE-89 Feb 04, 2026
CVE-2025-69215 8.8 HIGH 1 PoC Analysis EPSS 0.00
Devcode-it Openstamanager - SQL Injection
OpenSTAManager is an open source management software for technical assistance and invoicing. In version 2.9.8 and prior, there is a SQL Injection vulnerability in the Stampe Module. At time of publication, no known patch exists.
CWE-89 Feb 04, 2026
CVE-2025-69216 6.5 MEDIUM 1 PoC Analysis EPSS 0.00
Devcode Openstamanager < 2.9.8 - SQL Injection
OpenSTAManager is an open source management software for technical assistance and invoicing. In 2.9.8 and earlier, an authenticated SQL injection vulnerability in OpenSTAManager's Scadenzario (Payment Schedule) print template allows any authenticated user to extract sensitive data from the database, including admin credentials, customer information, and financial records. The vulnerability exists in templates/scadenzario/init.php, where the id_anagrafica parameter is directly concatenated into an SQL query without proper sanitization. The vulnerability enables complete database read access through error-based SQL injection techniques.
CWE-89 Feb 06, 2026
CVE-2025-65950 8.8 HIGH 1 PoC 1 Writeup Analysis EPSS 0.00
WBCE CMS <1.6.4 - SQL Injection
WBCE CMS is a content management system. In versions 1.6.4 and below, the user management module allows a low-privileged authenticated user with permissions to modify users to execute arbitrary SQL queries. This can be escalated to a full database compromise, data exfiltration, effectively bypassing all security controls. The vulnerability exists in the admin/users/save.php script, which handles updates to user profiles. The script improperly processes the groups[] parameter sent from the user edit form. This issue is fixed in version 1.6.5.
CWE-89 Dec 10, 2025
CVE-2025-68400 8.8 HIGH 1 PoC Analysis EPSS 0.00
Churchcrm < 6.5.3 - SQL Injection
ChurchCRM is an open-source church management system. A SQL Injection vulnerability exists in the legacy endpoint `/Reports/ConfirmReportEmail.php` in ChurchCRM prior to version 6.5.3. Although the feature was removed from the UI, the file remains deployed and reachable directly via URL. This is a classic case of *dead but reachable code*. Any authenticated user - including one with zero assigned permissions - can exploit SQL injection through the `familyId` parameter. Version 6.5.3 fixes the issue.
CWE-89 Dec 17, 2025
CVE-2025-69212 8.8 HIGH 1 PoC Analysis EPSS 0.00
Devcode Openstamanager < 2.9.8 - OS Command Injection
OpenSTAManager is an open source management software for technical assistance and invoicing. In 2.9.8 and earlier, a critical OS Command Injection vulnerability exists in the P7M (signed XML) file decoding functionality. An authenticated attacker can upload a ZIP file containing a .p7m file with a malicious filename to execute arbitrary system commands on the server.
CWE-78 Feb 06, 2026
CVE-2025-14018 7.3 HIGH 1 PoC Analysis EPSS 0.00
NetBT Consulting Services Inc. E-Fatura <1.2.15 - Path Traversal
Unquoted Search Path or Element vulnerability in NetBT Consulting Services Inc. E-Fatura allows Leveraging/Manipulating Configuration File Search Paths, Redirect Access to Libraries.This issue affects e-Fatura: before 1.2.15.
CWE-428 Dec 22, 2025
CVE-2025-48957 7.5 HIGH 2 PoCs 1 Writeup Analysis EPSS 0.01
AstrBot <3.5.12 - Path Traversal
AstrBot is a large language model chatbot and development framework. A path traversal vulnerability present in versions 3.4.4 through 3.5.12 may lead to information disclosure, such as API keys for LLM providers, account passwords, and other sensitive data. The vulnerability has been addressed in Pull Request #1676 and is included in version 3.5.13. As a workaround, users can edit the `cmd_config.json` file to disable the dashboard feature as a temporary workaround. However, it is strongly recommended to upgrade to version v3.5.13 or later to fully resolve this issue.
CWE-22 Jun 02, 2025
CVE-2025-5548 7.3 HIGH 32 PoCs Analysis EPSS 0.02
FreeFloat FTP Server 1.0 - Buffer Overflow
A vulnerability, which was classified as critical, was found in FreeFloat FTP Server 1.0. Affected is an unknown function of the component NOOP Command Handler. The manipulation leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
CWE-119 Jun 04, 2025
CVE-2025-54328 10.0 CRITICAL 1 PoC Analysis EPSS 0.00
Samsung Exynos Modem - Buffer Overflow
An issue was discovered in SMS in Samsung Mobile Processor, Wearable Processor, and Modem Exynos 980, 990, 850, 1080, 2100, 1280, 2200, 1330, 1380, 1480, 2400, 1580, 2500, 9110, W920, W930, W1000, Modem 5123, Modem 5300, and Modem 5400. A Stack-based Buffer Overflow occurs while parsing SMS RP-DATA messages.
CWE-121 Apr 06, 2026
CVE-2025-49596 CRITICAL EXPLOITED 5 PoCs Analysis NUCLEI EPSS 0.03
Modelcontextprotocol Inspector < 0.14.1 - Missing Authentication
The MCP inspector is a developer tool for testing and debugging MCP servers. Versions of MCP Inspector below 0.14.1 are vulnerable to remote code execution due to lack of authentication between the Inspector client and proxy, allowing unauthenticated requests to launch MCP commands over stdio. Users should immediately upgrade to version 0.14.1 or later to address these vulnerabilities.
CWE-306 Jun 13, 2025
CVE-2025-63353 9.8 CRITICAL 3 PoCs Analysis EPSS 0.01
FiberHome GPON ONU HG6145F1 RP4423 - Info Disclosure
A vulnerability in FiberHome GPON ONU HG6145F1 RP4423 allows the device's factory default Wi-Fi password (WPA/WPA2 pre-shared key) to be predicted from the SSID. The device generates default passwords using a deterministic algorithm that derives the router passphrase from the SSID, enabling an attacker who can observe the SSID to predict the default password without authentication or user interaction.
CWE-284 Nov 12, 2025
CVE-2025-60709 7.8 HIGH 2 PoCs Analysis EPSS 0.00
Windows Common Log File System Driver - Privilege Escalation
Out-of-bounds read in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally.
CWE-125 Nov 11, 2025
CVE-2025-34077 CRITICAL 6 PoCs Analysis NUCLEI EPSS 0.72
WordPress Pie Register <3.7.1.4 - Auth Bypass
An authentication bypass vulnerability exists in the WordPress Pie Register plugin ≤ 3.7.1.4 that allows unauthenticated attackers to impersonate arbitrary users by submitting a crafted POST request to the login endpoint. By setting social_site=true and manipulating the user_id_social_site parameter, an attacker can generate a valid WordPress session cookie for any user ID, including administrators. Once authenticated, the attacker may exploit plugin upload functionality to install a malicious plugin containing arbitrary PHP code, resulting in remote code execution on the underlying server.
CWE-306 Jul 09, 2025
CVE-2025-14325 7.3 HIGH 1 PoC Analysis EPSS 0.00
Firefox < 146 - Memory Corruption
JIT miscompilation in the JavaScript Engine: JIT component. This vulnerability was fixed in Firefox 146, Firefox ESR 140.6, Thunderbird 146, and Thunderbird 140.6.
CWE-843 Dec 09, 2025
CVE-2025-14893 6.4 MEDIUM 1 PoC Analysis EPSS 0.00
IndieWeb plugin for WordPress <4.0.5 - XSS
The IndieWeb plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'Telephone' parameter in all versions up to, and including, 4.0.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with author level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
CWE-79 Jan 09, 2026
CVE-2025-15260 6.5 MEDIUM 1 PoC Analysis EPSS 0.00
MyRewards for WooCommerce - Missing Authorization in Ajax Function
The MyRewards – Loyalty Points and Rewards for WooCommerce plugin for WordPress is vulnerable to missing authorization in all versions up to, and including, 5.6.1. This is due to the plugin not properly verifying that a user is authorized to perform an action in the 'ajax' function. This makes it possible for authenticated attackers, with subscriber level access and above, to modify, add, or delete loyalty program earning rules, including manipulating point multipliers to arbitrary values.
CWE-862 Feb 04, 2026
CVE-2025-55320 6.8 MEDIUM 1 PoC Analysis EPSS 0.00
Microsoft Configuration Manager - SQL Injection
Improper neutralization of special elements used in an sql command ('sql injection') in Microsoft Configuration Manager allows an authorized attacker to elevate privileges over an adjacent network.
CWE-89 Oct 14, 2025
CVE-2025-32433 10.0 CRITICAL KEV 50 PoCs Analysis NUCLEI EPSS 0.54
Erlang OTP Pre-Auth RCE Scanner and Exploit
Erlang/OTP is a set of libraries for the Erlang programming language. Prior to versions OTP-27.3.3, OTP-26.2.5.11, and OTP-25.3.2.20, a SSH server may allow an attacker to perform unauthenticated remote code execution (RCE). By exploiting a flaw in SSH protocol message handling, a malicious actor could gain unauthorized access to affected systems and execute arbitrary commands without valid credentials. This issue is patched in versions OTP-27.3.3, OTP-26.2.5.11, and OTP-25.3.2.20. A temporary workaround involves disabling the SSH server or to prevent access via firewall rules.
CWE-306 Apr 16, 2025
CVE-2025-66034 6.3 MEDIUM 9 PoCs 1 Writeup Analysis EPSS 0.00
fontTools <4.60.2 - RCE
fontTools is a library for manipulating fonts, written in Python. In versions from 4.33.0 to before 4.60.2, the fonttools varLib (or python3 -m fontTools.varLib) script has an arbitrary file write vulnerability that leads to remote code execution when a malicious .designspace file is processed. The vulnerability affects the main() code path of fontTools.varLib, used by the fonttools varLib CLI and any code that invokes fontTools.varLib.main(). This issue has been patched in version 4.60.2.
CWE-91 Nov 29, 2025