Latest Vulnerabilities with Public Exploits
Updated 4h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
53,633 results
Clear all
CVE-2025-2294
9.8
CRITICAL
EXPLOITED
13 PoCs
Analysis
NUCLEI
EPSS 0.57
Kubio AI Page Builder <2.5.1 - Local File Inclusion
The Kubio AI Page Builder plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 2.5.1 via thekubio_hybrid_theme_load_template function. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included.
CWE-22
Mar 28, 2025
CVE-2025-25975
7.5
HIGH
1 PoC
Analysis
EPSS 0.00
Jonschlinkert Parse-git-config - Information Disclosure
An issue in parse-git-config v.3.0.0 allows an attacker to obtain sensitive information via the expandKeys function
CWE-200
Mar 12, 2025
CVE-2025-25977
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.00
Canvg < 3.0.11 - Prototype Pollution
An issue in canvg v.4.0.2 allows an attacker to execute arbitrary code via the Constructor of the class StyleElement.
CWE-1321
Mar 10, 2025
CVE-2025-27152
5.3
MEDIUM
5 PoCs
Analysis
EPSS 0.00
axios <1.8.2 - SSRF
axios is a promise based HTTP client for the browser and node.js. The issue occurs when passing absolute URLs rather than protocol-relative URLs to axios. Even if baseURL is set, axios sends the request to the specified absolute URL, potentially causing SSRF and credential leakage. This issue impacts both server-side and client-side usage of axios. This issue is fixed in 1.8.2.
CWE-918
Mar 07, 2025
CVE-2025-23084
5.5
MEDIUM
1 PoC
Analysis
EPSS 0.01
Nodejs Node.js < 18.20.6 - Path Traversal
A vulnerability has been identified in Node.js, specifically affecting the handling of drive names in the Windows environment. Certain Node.js functions do not treat drive names as special on Windows. As a result, although Node.js assumes a relative path, it actually refers to the root directory.
On Windows, a path that does not start with the file separator is treated as relative to the current directory.
This vulnerability affects Windows users of `path.join` API.
CWE-22
Jan 28, 2025
CVE-2025-13943
8.8
HIGH
1 PoC
Analysis
EPSS 0.00
Zyxel EX3301-T0 <5.50(ABVY.7)C0 - Command Injection
A post-authentication command injection vulnerability in the log file download function of the Zyxel EX3301-T0 firmware versions through 5.50(ABVY.7)C0 could allow an authenticated attacker to execute operating system (OS) commands on an affected device.
CWE-78
Feb 24, 2026
CVE-2025-13942
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.00
Zyxel EX3510-B0 <5.17(ABUP.15.1)C0 - Command Injection
A command injection vulnerability in the UPnP function of the Zyxel EX3510-B0 firmware versions through 5.17(ABUP.15.1)C0 could allow a remote attacker to execute operating system (OS) commands on an affected device by sending specially crafted UPnP SOAP requests.
CWE-78
Feb 24, 2026
CVE-2025-40634
CRITICAL
2 PoCs
Analysis
EPSS 0.00
TP-Link Archer AX50 <1.0.15 - Buffer Overflow
Stack-based buffer overflow vulnerability in the 'conn-indicator' binary running as root on the TP-Link Archer AX50 router, in firmware versions prior to 1.0.15 build 241203 rel61480. This vulnerability allows an attacker to execute arbitrary code on the device over LAN and WAN networks.
CWE-121
May 20, 2025
CVE-2025-52691
10.0
CRITICAL
KEV
12 PoCs
Analysis
NUCLEI
EPSS 0.87
Smartertools Smartermail < 100.0.9413 - Unrestricted File Upload
Successful exploitation of the vulnerability could allow an unauthenticated attacker to upload arbitrary files to any location on the mail server, potentially enabling remote code execution.
CWE-434
Dec 29, 2025
CVE-2025-58360
8.2
HIGH
KEV
8 PoCs
Analysis
NUCLEI
EPSS 0.84
GeoServer WMS GetMap XXE Arbitrary File Read
GeoServer is an open source server that allows users to share and edit geospatial data. From version 2.26.0 to before 2.26.2 and before 2.25.6, an XML External Entity (XXE) vulnerability was identified. The application accepts XML input through a specific endpoint /geoserver/wms operation GetMap. However, this input is not sufficiently sanitized or restricted, allowing an attacker to define external entities within the XML request. This issue has been patched in GeoServer 2.25.6, GeoServer 2.26.3, and GeoServer 2.27.0.
CWE-611
Nov 25, 2025
CVE-2025-11001
7.8
HIGH
EXPLOITED
7 PoCs
Analysis
EPSS 0.00
7-Zip - Remote Code Execution
7-Zip ZIP File Parsing Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of 7-Zip. Interaction with this product is required to exploit this vulnerability but attack vectors may vary depending on the implementation.
The specific flaw exists within the handling of symbolic links in ZIP files. Crafted data in a ZIP file can cause the process to traverse to unintended directories. An attacker can leverage this vulnerability to execute code in the context of a service account. Was ZDI-CAN-26753.
CWE-22
Nov 19, 2025
CVE-2025-34299
9.8
CRITICAL
EXPLOITED
5 PoCs
Analysis
NUCLEI
EPSS 0.69
Monstaftp Monsta FTP < 2.11 - Unrestricted File Upload
Monsta FTP versions 2.11 and earlier contain a vulnerability that allows unauthenticated arbitrary file uploads. This flaw enables attackers to execute arbitrary code by uploading a specially crafted file from a malicious (S)FTP server.
CWE-434
Nov 07, 2025
CVE-2025-11953
9.8
CRITICAL
KEV
6 PoCs
Analysis
EPSS 0.19
React-native-community React Native C... - OS Command Injection
The Metro Development Server, which is opened by the React Native Community CLI, binds to external interfaces by default. The server exposes an endpoint that is vulnerable to OS command injection. This allows unauthenticated network attackers to send a POST request to the server and run arbitrary executables. On Windows, the attackers can also execute arbitrary shell commands with fully controlled arguments.
CWE-78
Nov 03, 2025
CVE-2025-61757
9.8
CRITICAL
KEV
3 PoCs
Analysis
NUCLEI
EPSS 0.88
Oracle Identity Manager - Missing Authentication
Vulnerability in the Identity Manager product of Oracle Fusion Middleware (component: REST WebServices). Supported versions that are affected are 12.2.1.4.0 and 14.1.2.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Identity Manager. Successful attacks of this vulnerability can result in takeover of Identity Manager. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
CWE-306
Oct 21, 2025
CVE-2025-61884
7.5
HIGH
KEV
RANSOMWARE
4 PoCs
Analysis
NUCLEI
EPSS 0.61
Oracle Configurator < 12.2.14 - SSRF
Vulnerability in the Oracle Configurator product of Oracle E-Business Suite (component: Runtime UI). Supported versions that are affected are 12.2.3-12.2.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Configurator. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Configurator accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
CWE-93
Oct 12, 2025
CVE-2025-48703
9.0
CRITICAL
KEV
5 PoCs
Analysis
NUCLEI
EPSS 0.62
CWP <0.9.8.1205 - RCE
CWP (aka Control Web Panel or CentOS Web Panel) before 0.9.8.1205 allows unauthenticated remote code execution via shell metacharacters in the t_total parameter in a filemanager changePerm request. A valid non-root username must be known.
CWE-78
Sep 19, 2025
CVE-2025-21042
8.8
HIGH
KEV
2 PoCs
Analysis
EPSS 0.02
Samsung Android - Out-of-Bounds Write
Out-of-bounds write in libimagecodec.quram.so prior to SMR Apr-2025 Release 1 allows remote attackers to execute arbitrary code.
CWE-787
Sep 12, 2025
CVE-2025-57819
9.8
CRITICAL
KEV
13 PoCs
Analysis
NUCLEI
EPSS 0.77
Sangoma Freepbx < 15.0.66 - SQL Injection
FreePBX is an open-source web-based graphical user interface. FreePBX 15, 16, and 17 endpoints are vulnerable due to insufficiently sanitized user-supplied data allowing unauthenticated access to FreePBX Administrator leading to arbitrary database manipulation and remote code execution. This issue has been patched in endpoint versions 15.0.66, 16.0.89, and 17.0.3.
CWE-288
Aug 28, 2025
CVE-2025-7441
9.8
CRITICAL
EXPLOITED
6 PoCs
Analysis
EPSS 0.77
StoryChief WordPress <1.0.42 - RCE
The StoryChief plugin for WordPress is vulnerable to arbitrary file uploads in all versions up to, and including, 1.0.42. This vulnerability occurs through the /wp-json/storychief/webhook REST-API endpoint that does not have sufficient filetype validation. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.
CWE-434
Aug 16, 2025
CVE-2025-54254
8.6
HIGH
EXPLOITED
1 PoC
Analysis
EPSS 0.00
Adobe Experience Manager Forms < 6.5.23.0 - XXE
Adobe Experience Manager versions 6.5.23 and earlier are affected by an Improper Restriction of XML External Entity Reference ('XXE') vulnerability that could lead to arbitrary file system read. An attacker could exploit this vulnerability to access sensitive files on the local file system, scope is changed. Exploitation of this issue does not require user interaction.
CWE-611
Aug 05, 2025