Latest Vulnerabilities with Public Exploits
Updated 1h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
53,640 results
Clear all
CVE-2025-43426
5.5
MEDIUM
1 PoC
Analysis
EPSS 0.00
macOS Tahoe <26.1 - Info Disclosure
A logging issue was addressed with improved data redaction. This issue is fixed in iOS 26.1 and iPadOS 26.1, macOS Tahoe 26.1. An app may be able to access sensitive user data.
CWE-532
Nov 04, 2025
CVE-2025-43400
6.3
MEDIUM
1 PoC
Analysis
EPSS 0.00
watchOS <26.1 - Memory Corruption
An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in iOS 18.7.1 and iPadOS 18.7.1, iOS 26.0.1 and iPadOS 26.0.1, macOS Sequoia 15.7.1, macOS Sonoma 14.8.1, macOS Tahoe 26.0.1, tvOS 26.1, visionOS 26.0.1, watchOS 26.1. Processing a maliciously crafted font may lead to unexpected app termination or corrupt process memory.
CWE-787
Sep 29, 2025
CVE-2025-66628
7.5
HIGH
1 PoC
Analysis
EPSS 0.00
ImageMagick <7.1.9 - Buffer Overflow
ImageMagick is a software suite to create, edit, compose, or convert bitmap images. In versions 7.1.2-9 and prior, the TIM (PSX TIM) image parser contains a critical integer overflow vulnerability in its ReadTIMImage function (coders/tim.c). The code reads width and height (16-bit values) from the file header and calculates image_size = 2 * width * height without checking for overflow. On 32-bit systems (or where size_t is 32-bit), this calculation can overflow if width and height are large (e.g., 65535), wrapping around to a small value. This results in a small heap allocation via AcquireQuantumMemory and later operations relying on the dimensions can trigger an out of bounds read. This issue is fixed in version 7.1.2-10.
CWE-125
Dec 10, 2025
CVE-2025-12539
10.0
CRITICAL
2 PoCs
Analysis
EPSS 0.01
WordPress TNC Toolbox: Web Performance <1.4.2 - Info Disclosure
The TNC Toolbox: Web Performance plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.4.2. This is due to the plugin storing cPanel API credentials (hostname, username, and API key) in files within the web-accessible wp-content directory without adequate protection in the "Tnc_Wp_Toolbox_Settings::save_settings" function. This makes it possible for unauthenticated attackers to retrieve these credentials and use them to interact with the cPanel API, which can lead to arbitrary file uploads, remote code execution, and full compromise of the hosting environment.
CWE-922
Nov 11, 2025
CVE-2025-11170
9.8
CRITICAL
2 PoCs
Analysis
EPSS 0.01
WP移行専用プラグイン for CPI 1.0.2 - RCE
The WP移行専用プラグイン for CPI plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the Cpiwm_Import_Controller::import function in all versions up to, and including, 1.0.2. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.
CWE-434
Nov 11, 2025
CVE-2025-10041
9.8
CRITICAL
2 PoCs
Analysis
EPSS 0.00
Flex QR Code Generator <1.2.5 - File Upload
The Flex QR Code Generator plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in thesave_qr_code_to_db() function in all versions up to, and including, 1.2.5. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.
CWE-434
Oct 15, 2025
CVE-2025-9286
9.8
CRITICAL
2 PoCs
Analysis
EPSS 0.00
Appy Pie Connect <1.1.2 - Privilege Escalation
The Appy Pie Connect for WooCommerce plugin for WordPress is vulnerable to Privilege Escalation due to missing authorization within the reset_user_password() REST handler in all versions up to, and including, 1.1.2. This makes it possible for unauthenticated attackers to to reset the password of arbitrary users, including administrators, thereby gaining administrative access.
CWE-620
Oct 03, 2025
CVE-2025-9209
9.8
CRITICAL
2 PoCs
Analysis
NUCLEI
EPSS 0.19
RestroPress - Auth Bypass
The RestroPress – Online Food Ordering System plugin for WordPress is vulnerable to Authentication Bypass in versions 3.0.0 to 3.1.9.2. This is due to the plugin exposing user private tokens and API data via the /wp-json/wp/v2/users REST API endpoint. This makes it possible for unauthenticated attackers to forge JWT tokens for other users, including administrators, and authenticate as them.
CWE-200
Oct 03, 2025
CVE-2025-8625
9.8
CRITICAL
3 PoCs
Analysis
EPSS 0.01
Copypress Rest API <1.2 - RCE
The Copypress Rest API plugin for WordPress is vulnerable to Remote Code Execution via copyreap_handle_image() Function in versions 1.1 to 1.2. The plugin falls back to a hard-coded JWT signing key when no secret is defined and does not restrict which file types can be fetched and saved as attachments. As a result, unauthenticated attackers can forge a valid token to gain elevated privileges and upload an arbitrary file (e.g. a PHP script) through the image handler, leading to remote code execution.
CWE-321
Sep 30, 2025
CVE-2025-8570
9.8
CRITICAL
3 PoCs
Analysis
EPSS 0.00
BeyondCart Connector <2.1.0 - Privilege Escalation
The BeyondCart Connector plugin for WordPress is vulnerable to Privilege Escalation due to improper JWT secret management and authorization within the determine_current_user filter in versions 1.4.2 through 3.0.1. This makes it possible for unauthenticated attackers to craft valid tokens and assume any user’s identity.
CWE-798
Sep 11, 2025
CVE-2025-8359
9.8
CRITICAL
2 PoCs
Analysis
EPSS 0.00
AdForest theme <6.0.9 - Auth Bypass
The AdForest theme for WordPress is vulnerable to Authentication Bypass in all versions up to, and including, 6.0.9. This is due to the plugin not properly verifying a user's identity prior to authenticating them. This makes it possible for unauthenticated attackers to log in as other users, including administrators, without access to a password.
CWE-288
Sep 06, 2025
CVE-2025-49388
9.8
CRITICAL
2 PoCs
Analysis
EPSS 0.00
Miraculous Core Plugin <2.0.7 - Privilege Escalation
Incorrect Privilege Assignment vulnerability in kamleshyadav Miraculous Core Plugin miraculouscore allows Privilege Escalation.This issue affects Miraculous Core Plugin: from n/a through <= 2.0.7.
CWE-266
Aug 28, 2025
CVE-2025-7955
9.8
CRITICAL
2 PoCs
Analysis
EPSS 0.01
RingCentral Communications <1.6.8 - Auth Bypass
The RingCentral Communications plugin for WordPress is vulnerable to Authentication Bypass due to improper validation within the ringcentral_admin_login_2fa_verify() function in versions 1.5 to 1.6.8. This makes it possible for unauthenticated attackers to log in as any user simply by supplying identical bogus codes.
CWE-287
Aug 28, 2025
CVE-2025-8723
9.8
CRITICAL
2 PoCs
Analysis
EPSS 0.02
Cloudflare Image Resizing <1.5.6 - RCE
The Cloudflare Image Resizing plugin for WordPress is vulnerable to Remote Code Execution due to missing authentication and insufficient sanitization within its hook_rest_pre_dispatch() method in all versions up to, and including, 1.5.6. This makes it possible for unauthenticated attackers to inject arbitrary PHP into the codebase, achieving remote code execution.
CWE-94
Aug 19, 2025
CVE-2025-4796
8.8
HIGH
3 PoCs
Analysis
EPSS 0.00
Themewinter Eventin < 4.0.35 - IDOR
The Eventin plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 4.0.34. This is due to the plugin not properly validating a user's identity or capability prior to updating their details like email in the 'Eventin\Speaker\Api\SpeakerController::update_item' function. This makes it possible for unauthenticated attackers with contributor-level and above permissions to change arbitrary user's email addresses, including administrators, and leverage that to reset the user's password and gain access to their account.
CWE-639
Aug 08, 2025
CVE-2025-7340
9.8
CRITICAL
3 PoCs
Analysis
EPSS 0.01
Hasthemes Download Contact Form 7 Wid... - Unrestricted File Upload
The HT Contact Form Widget For Elementor Page Builder & Gutenberg Blocks & Form Builder plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the temp_file_upload() function in all versions up to, and including, 2.2.1. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.
CWE-434
Jul 15, 2025
CVE-2025-6058
9.8
CRITICAL
4 PoCs
Analysis
NUCLEI
EPSS 0.22
WPBookit <1.0.4 - File Upload
The WPBookit plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the image_upload_handle() function hooked via the 'add_booking_type' route in all versions up to, and including, 1.0.4. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.
CWE-434
Jul 12, 2025
CVE-2025-7401
9.8
CRITICAL
2 PoCs
Analysis
EPSS 0.01
WordPress Premium Age Verification <3.0.2 - Info Disclosure
The Premium Age Verification / Restriction for WordPress plugin for WordPress is vulnerable to arbitrary file read and write due to the existence of an insufficiently protected remote support functionality in remote_tunnel.php in all versions up to, and including, 3.0.2. This makes it possible for unauthenticated attackers to read from or write to arbitrary files on the affected site's server which may make the exposure of sensitive information or remote code execution possible.
CWE-798
Jul 11, 2025
CVE-2025-5961
7.2
HIGH
3 PoCs
Analysis
NUCLEI
EPSS 0.02
Wpvivid Migration, Backup, Staging - Unrestricted File Upload
The Migration, Backup, Staging – WPvivid Backup & Migration plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'wpvivid_upload_import_files' function in all versions up to, and including, 0.9.116. This makes it possible for authenticated attackers, with Administrator-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible. NOTE: Uploaded files are only accessible on WordPress instances running on the NGINX web server as the existing .htaccess within the target file upload folder prevents access on Apache servers.
CWE-434
Jul 03, 2025
CVE-2025-49029
9.1
CRITICAL
2 PoCs
Analysis
NUCLEI
EPSS 0.01
bitto.Kazi Custom Login And Signup Widget <1.0 - Code Injection
Improper Control of Generation of Code ('Code Injection') vulnerability in bitto.kazi Custom Login And Signup Widget custom-login-and-signup-widget allows Code Injection.This issue affects Custom Login And Signup Widget: from n/a through <= 1.0.
CWE-94
Jul 01, 2025