Latest Vulnerabilities with Public Exploits

Updated 4h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,453 CVEs tracked 53,634 with exploits 4,859 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,330 vendors 43,881 researchers
53,634 results Clear all
CVE-2025-48272 5.3 MEDIUM 1 PoC Analysis EPSS 0.00
WP Job Portal <2.3.2 - Info Disclosure
Missing Authorization vulnerability in wpjobportal WP Job Portal wp-job-portal allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WP Job Portal: from n/a through <= 2.3.2.
CWE-862 May 19, 2025
CVE-2025-26935 7.5 HIGH 1 PoC Analysis EPSS 0.00
Wpjobportal WP Job Portal < 2.2.8 - Path Traversal
Path Traversal: '.../...//' vulnerability in wpjobportal WP Job Portal wp-job-portal allows PHP Local File Inclusion.This issue affects WP Job Portal: from n/a through <= 2.2.8.
CWE-22 Feb 25, 2025
CVE-2025-0822 6.5 MEDIUM 1 PoC Analysis EPSS 0.00
Bitapps Bit Assist < 1.5.3 - Path Traversal
Bit Assist plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 1.5.2 via the fileID Parameter. This makes it possible for authenticated attackers, with Subscriber-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information.
CWE-22 Feb 15, 2025
CVE-2025-0821 6.5 MEDIUM 1 PoC Analysis EPSS 0.00
Bitapps Bit Assist < 1.5.3 - SQL Injection
Bit Assist plugin for WordPress is vulnerable to time-based SQL Injection via the ‘id’ parameter in all versions up to, and including, 1.5.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
CWE-89 Feb 14, 2025
CVE-2025-0394 8.8 HIGH 1 PoC Analysis EPSS 0.09
Groundhogg <3.7.3.5 - RCE
The WordPress CRM, Email & Marketing Automation for WordPress | Award Winner — Groundhogg plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the gh_big_file_upload() function in all versions up to, and including, 3.7.3.5. This makes it possible for authenticated attackers, with Author-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.
CWE-434 Jan 14, 2025
CVE-2025-47445 7.5 HIGH EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.09
Themewinter Eventin < 4.0.27 - Path Traversal
Relative Path Traversal vulnerability in Arraytics Eventin wp-event-solution allows Path Traversal.This issue affects Eventin: from n/a through <= 4.0.26.
CWE-23 May 14, 2025
CVE-2025-65964 8.8 HIGH 6 PoCs Analysis EPSS 0.00
n8n <1.119.1 - RCE
n8n is an open source workflow automation platform. Versions 0.123.1 through 1.119.1 do not have adequate protections to prevent RCE through the project's pre-commit hooks. The Add Config operation allows workflows to set arbitrary Git configuration values, including core.hooksPath, which can point to a malicious Git hook that executes arbitrary commands on the n8n host during subsequent Git operations. Exploitation requires the ability to create or modify an n8n workflow using the Git node. This issue is fixed in version 1.119.2. Workarounds include excluding the Git Node (Docs) and avoiding cloning or interacting with untrusted repositories using the Git Node.
CWE-829 Dec 09, 2025
CVE-2025-58180 8.8 HIGH 2 PoCs Analysis EPSS 0.02
Octoprint < 1.11.3 - OS Command Injection
OctoPrint provides a web interface for controlling consumer 3D printers. OctoPrint versions up until and including 1.11.2 contain a vulnerability that allows an authenticated attacker to upload a file under a specially crafted filename that will allow arbitrary command execution if said filename becomes included in a command defined in a system event handler and said event gets triggered. If no event handlers executing system commands with uploaded filenames as parameters have been configured, this vulnerability does not have an impact. The vulnerability is patched in version 1.11.3. As a workaround, OctoPrint administrators who have event handlers configured that include any kind of filename based placeholders should disable those by setting their `enabled` property to `False` or unchecking the "Enabled" checkbox in the GUI based Event Manager. Alternatively, OctoPrint administrators should set `feature.enforceReallyUniversalFilenames` to `true` in `config.yaml` and restart OctoPrint, then vet the existing uploads and make sure to delete any suspicious looking files. As always, OctoPrint administrators are advised to not expose OctoPrint on hostile networks like the public internet, and to vet who has access to their instance.
CWE-78 Sep 09, 2025
CVE-2025-32023 7.0 HIGH 5 PoCs Analysis EPSS 0.13
Redis < 6.2.19 - Remote Code Execution
Redis is an open source, in-memory database that persists on disk. From 2.8 to before 8.0.3, 7.4.5, 7.2.10, and 6.2.19, an authenticated user may use a specially crafted string to trigger a stack/heap out of bounds write on hyperloglog operations, potentially leading to remote code execution. The bug likely affects all Redis versions with hyperloglog operations implemented. This vulnerability is fixed in 8.0.3, 7.4.5, 7.2.10, and 6.2.19. An additional workaround to mitigate the problem without patching the redis-server executable is to prevent users from executing hyperloglog operations. This can be done using ACL to restrict HLL commands.
CWE-680 Jul 07, 2025
CVE-2025-24514 8.8 HIGH 5 PoCs Analysis NUCLEI EPSS 0.23
K8s.io Ingress-nginx < 1.11.5 - Improper Input Validation
A security issue was discovered in ingress-nginx https://github.com/kubernetes/ingress-nginx where the `auth-url` Ingress annotation can be used to inject configuration into nginx. This can lead to arbitrary code execution in the context of the ingress-nginx controller, and disclosure of Secrets accessible to the controller. (Note that in the default installation, the controller can access all Secrets cluster-wide.)
CWE-20 Mar 25, 2025
CVE-2025-1098 8.8 HIGH 4 PoCs Analysis NUCLEI EPSS 0.34
Ingress-Nginx - RCE
A security issue was discovered in ingress-nginx https://github.com/kubernetes/ingress-nginx where the `mirror-target` and `mirror-host` Ingress annotations can be used to inject arbitrary configuration into nginx. This can lead to arbitrary code execution in the context of the ingress-nginx controller, and disclosure of Secrets accessible to the controller. (Note that in the default installation, the controller can access all Secrets cluster-wide.)
CWE-20 Mar 25, 2025
CVE-2025-1097 8.8 HIGH 4 PoCs Analysis NUCLEI EPSS 0.21
Ingress-Nginx - RCE
A security issue was discovered in ingress-nginx https://github.com/kubernetes/ingress-nginx where the `auth-tls-match-cn` Ingress annotation can be used to inject configuration into nginx. This can lead to arbitrary code execution in the context of the ingress-nginx controller, and disclosure of Secrets accessible to the controller. (Note that in the default installation, the controller can access all Secrets cluster-wide.)
CWE-20 Mar 25, 2025
CVE-2025-10878 10.0 CRITICAL 1 PoC Analysis EPSS 0.00
Omran Fikir Odalari Adminpando < 1.0.1 - SQL Injection
A SQL injection vulnerability exists in the login functionality of Fikir Odalari AdminPando 1.0.1 before 2026-01-26. The username and password parameters are vulnerable to SQL injection, allowing unauthenticated attackers to bypass authentication completely. Successful exploitation grants full administrative access to the application, including the ability to manipulate the public-facing website content (HTML/DOM manipulation).
CWE-89 Feb 03, 2026
CVE-2025-70849 6.1 MEDIUM 1 PoC Analysis EPSS 0.00
Stefanprodan Podinfo < 6.9.0 - XSS
Arbitrary File Upload in podinfo thru 6.9.0 allows unauthenticated attackers to upload arbitrary files via crafted POST request to the /store endpoint. The application renders uploaded content without a restrictive Content-Security-Policy (CSP) or adequate Content-Type validation, leading to Stored Cross-Site Scripting (XSS).
CWE-79 Feb 03, 2026
CVE-2025-67779 7.5 HIGH 1 PoC Analysis EPSS 0.00
Facebook React < 14.2.35 - Insecure Deserialization
It was found that the fix addressing CVE-2025-55184 in React Server Components was incomplete and does not prevent a denial of service attack in a specific case. React Server Components versions 19.0.2, 19.1.3 and 19.2.2 are affected, allowing unsafe deserialization of payloads from HTTP requests to Server Function endpoints. This can cause an infinite loop that hangs the server process and may prevent future HTTP requests from being served.
CWE-502 Dec 12, 2025
CVE-2025-2995 5.3 MEDIUM 1 PoC Analysis EPSS 0.00
Tenda FH1202 1.2.0.14(408) - Info Disclosure
A vulnerability has been found in Tenda FH1202 1.2.0.14(408) and classified as critical. This vulnerability affects unknown code of the file /goform/SysToolChangePwd of the component Web Management Interface. The manipulation leads to improper access controls. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
CWE-284 Mar 31, 2025
CVE-2025-14321 9.8 CRITICAL 1 PoC Analysis EPSS 0.00
WebRTC: Signaling - Use After Free
Use-after-free in the WebRTC: Signaling component. This vulnerability was fixed in Firefox 146, Firefox ESR 140.6, Thunderbird 146, and Thunderbird 140.6.
CWE-416 Dec 09, 2025
CVE-2025-69848 5.4 MEDIUM 1 PoC Analysis EPSS 0.00
Netbox < 3.7.8 - XSS
NetBox is an open-source infrastructure resource modeling and IP address management platform. A reflected cross-site scripting (XSS) vulnerability exists in versions 2.11.0 through 3.7.x in the ProtectedError handling logic, where object names are included in HTML error messages without proper escaping. This allows user-controlled content to be rendered in the web interface when a delete operation fails due to protected relationships, potentially enabling execution of arbitrary client-side code in the context of a privileged user.
CWE-79 Feb 03, 2026
CVE-2025-61506 9.8 CRITICAL 1 PoC Analysis EPSS 0.00
MediaCrush <1.0.1 - RCE
An issue was discovered in MediaCrush thru 1.0.1 allowing remote unauthenticated attackers to upload arbitrary files of any size to the /upload endpoint.
CWE-434 Feb 03, 2026
CVE-2025-61505 6.5 MEDIUM 1 PoC Analysis EPSS 0.00
e107 CMS <2.3.3 - Deserialization
e107 CMS thru 2.3.3 are vulnerable to insecure deserialization in the `install.php` script. The script processes user-controlled input in the `previous_steps` POST parameter using `unserialize(base64_decode())` without validation, allowing attackers to craft malicious serialized data. This could lead to remote code execution, arbitrary file operations, or denial of service, depending on available PHP object gadgets in the codebase.
CWE-502 Oct 10, 2025