Latest Vulnerabilities with Public Exploits

Updated 1h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,534 CVEs tracked 53,639 with exploits 4,859 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,342 vendors 43,887 researchers
53,640 results Clear all
CVE-2025-43426 5.5 MEDIUM 1 PoC Analysis EPSS 0.00
macOS Tahoe <26.1 - Info Disclosure
A logging issue was addressed with improved data redaction. This issue is fixed in iOS 26.1 and iPadOS 26.1, macOS Tahoe 26.1. An app may be able to access sensitive user data.
CWE-532 Nov 04, 2025
CVE-2025-43400 6.3 MEDIUM 1 PoC Analysis EPSS 0.00
watchOS <26.1 - Memory Corruption
An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in iOS 18.7.1 and iPadOS 18.7.1, iOS 26.0.1 and iPadOS 26.0.1, macOS Sequoia 15.7.1, macOS Sonoma 14.8.1, macOS Tahoe 26.0.1, tvOS 26.1, visionOS 26.0.1, watchOS 26.1. Processing a maliciously crafted font may lead to unexpected app termination or corrupt process memory.
CWE-787 Sep 29, 2025
CVE-2025-66628 7.5 HIGH 1 PoC Analysis EPSS 0.00
ImageMagick <7.1.9 - Buffer Overflow
ImageMagick is a software suite to create, edit, compose, or convert bitmap images. In versions 7.1.2-9 and prior, the TIM (PSX TIM) image parser contains a critical integer overflow vulnerability in its ReadTIMImage function (coders/tim.c). The code reads width and height (16-bit values) from the file header and calculates image_size = 2 * width * height without checking for overflow. On 32-bit systems (or where size_t is 32-bit), this calculation can overflow if width and height are large (e.g., 65535), wrapping around to a small value. This results in a small heap allocation via AcquireQuantumMemory and later operations relying on the dimensions can trigger an out of bounds read. This issue is fixed in version 7.1.2-10.
CWE-125 Dec 10, 2025
CVE-2025-12539 10.0 CRITICAL 2 PoCs Analysis EPSS 0.01
WordPress TNC Toolbox: Web Performance <1.4.2 - Info Disclosure
The TNC Toolbox: Web Performance plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.4.2. This is due to the plugin storing cPanel API credentials (hostname, username, and API key) in files within the web-accessible wp-content directory without adequate protection in the "Tnc_Wp_Toolbox_Settings::save_settings" function. This makes it possible for unauthenticated attackers to retrieve these credentials and use them to interact with the cPanel API, which can lead to arbitrary file uploads, remote code execution, and full compromise of the hosting environment.
CWE-922 Nov 11, 2025
CVE-2025-11170 9.8 CRITICAL 2 PoCs Analysis EPSS 0.01
WP移行専用プラグイン for CPI 1.0.2 - RCE
The WP移行専用プラグイン for CPI plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the Cpiwm_Import_Controller::import function in all versions up to, and including, 1.0.2. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.
CWE-434 Nov 11, 2025
CVE-2025-10041 9.8 CRITICAL 2 PoCs Analysis EPSS 0.00
Flex QR Code Generator <1.2.5 - File Upload
The Flex QR Code Generator plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in thesave_qr_code_to_db() function in all versions up to, and including, 1.2.5. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.
CWE-434 Oct 15, 2025
CVE-2025-9286 9.8 CRITICAL 2 PoCs Analysis EPSS 0.00
Appy Pie Connect <1.1.2 - Privilege Escalation
The Appy Pie Connect for WooCommerce plugin for WordPress is vulnerable to Privilege Escalation due to missing authorization within the reset_user_password() REST handler in all versions up to, and including, 1.1.2. This makes it possible for unauthenticated attackers to to reset the password of arbitrary users, including administrators, thereby gaining administrative access.
CWE-620 Oct 03, 2025
CVE-2025-9209 9.8 CRITICAL 2 PoCs Analysis NUCLEI EPSS 0.19
RestroPress - Auth Bypass
The RestroPress – Online Food Ordering System plugin for WordPress is vulnerable to Authentication Bypass in versions 3.0.0 to 3.1.9.2. This is due to the plugin exposing user private tokens and API data via the /wp-json/wp/v2/users REST API endpoint. This makes it possible for unauthenticated attackers to forge JWT tokens for other users, including administrators, and authenticate as them.
CWE-200 Oct 03, 2025
CVE-2025-8625 9.8 CRITICAL 3 PoCs Analysis EPSS 0.01
Copypress Rest API <1.2 - RCE
The Copypress Rest API plugin for WordPress is vulnerable to Remote Code Execution via copyreap_handle_image() Function in versions 1.1 to 1.2. The plugin falls back to a hard-coded JWT signing key when no secret is defined and does not restrict which file types can be fetched and saved as attachments. As a result, unauthenticated attackers can forge a valid token to gain elevated privileges and upload an arbitrary file (e.g. a PHP script) through the image handler, leading to remote code execution.
CWE-321 Sep 30, 2025
CVE-2025-8570 9.8 CRITICAL 3 PoCs Analysis EPSS 0.00
BeyondCart Connector <2.1.0 - Privilege Escalation
The BeyondCart Connector plugin for WordPress is vulnerable to Privilege Escalation due to improper JWT secret management and authorization within the determine_current_user filter in versions 1.4.2 through 3.0.1. This makes it possible for unauthenticated attackers to craft valid tokens and assume any user’s identity.
CWE-798 Sep 11, 2025
CVE-2025-8359 9.8 CRITICAL 2 PoCs Analysis EPSS 0.00
AdForest theme <6.0.9 - Auth Bypass
The AdForest theme for WordPress is vulnerable to Authentication Bypass in all versions up to, and including, 6.0.9. This is due to the plugin not properly verifying a user's identity prior to authenticating them. This makes it possible for unauthenticated attackers to log in as other users, including administrators, without access to a password.
CWE-288 Sep 06, 2025
CVE-2025-49388 9.8 CRITICAL 2 PoCs Analysis EPSS 0.00
Miraculous Core Plugin <2.0.7 - Privilege Escalation
Incorrect Privilege Assignment vulnerability in kamleshyadav Miraculous Core Plugin miraculouscore allows Privilege Escalation.This issue affects Miraculous Core Plugin: from n/a through <= 2.0.7.
CWE-266 Aug 28, 2025
CVE-2025-7955 9.8 CRITICAL 2 PoCs Analysis EPSS 0.01
RingCentral Communications <1.6.8 - Auth Bypass
The RingCentral Communications plugin for WordPress is vulnerable to Authentication Bypass due to improper validation within the ringcentral_admin_login_2fa_verify() function in versions 1.5 to 1.6.8. This makes it possible for unauthenticated attackers to log in as any user simply by supplying identical bogus codes.
CWE-287 Aug 28, 2025
CVE-2025-8723 9.8 CRITICAL 2 PoCs Analysis EPSS 0.02
Cloudflare Image Resizing <1.5.6 - RCE
The Cloudflare Image Resizing plugin for WordPress is vulnerable to Remote Code Execution due to missing authentication and insufficient sanitization within its hook_rest_pre_dispatch() method in all versions up to, and including, 1.5.6. This makes it possible for unauthenticated attackers to inject arbitrary PHP into the codebase, achieving remote code execution.
CWE-94 Aug 19, 2025
CVE-2025-4796 8.8 HIGH 3 PoCs Analysis EPSS 0.00
Themewinter Eventin < 4.0.35 - IDOR
The Eventin plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 4.0.34. This is due to the plugin not properly validating a user's identity or capability prior to updating their details like email in the 'Eventin\Speaker\Api\SpeakerController::update_item' function. This makes it possible for unauthenticated attackers with contributor-level and above permissions to change arbitrary user's email addresses, including administrators, and leverage that to reset the user's password and gain access to their account.
CWE-639 Aug 08, 2025
CVE-2025-7340 9.8 CRITICAL 3 PoCs Analysis EPSS 0.01
Hasthemes Download Contact Form 7 Wid... - Unrestricted File Upload
The HT Contact Form Widget For Elementor Page Builder & Gutenberg Blocks & Form Builder plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the temp_file_upload() function in all versions up to, and including, 2.2.1. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.
CWE-434 Jul 15, 2025
CVE-2025-6058 9.8 CRITICAL 4 PoCs Analysis NUCLEI EPSS 0.22
WPBookit <1.0.4 - File Upload
The WPBookit plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the image_upload_handle() function hooked via the 'add_booking_type' route in all versions up to, and including, 1.0.4. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.
CWE-434 Jul 12, 2025
CVE-2025-7401 9.8 CRITICAL 2 PoCs Analysis EPSS 0.01
WordPress Premium Age Verification <3.0.2 - Info Disclosure
The Premium Age Verification / Restriction for WordPress plugin for WordPress is vulnerable to arbitrary file read and write due to the existence of an insufficiently protected remote support functionality in remote_tunnel.php in all versions up to, and including, 3.0.2. This makes it possible for unauthenticated attackers to read from or write to arbitrary files on the affected site's server which may make the exposure of sensitive information or remote code execution possible.
CWE-798 Jul 11, 2025
CVE-2025-5961 7.2 HIGH 3 PoCs Analysis NUCLEI EPSS 0.02
Wpvivid Migration, Backup, Staging - Unrestricted File Upload
The Migration, Backup, Staging – WPvivid Backup & Migration plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'wpvivid_upload_import_files' function in all versions up to, and including, 0.9.116. This makes it possible for authenticated attackers, with Administrator-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible. NOTE: Uploaded files are only accessible on WordPress instances running on the NGINX web server as the existing .htaccess within the target file upload folder prevents access on Apache servers.
CWE-434 Jul 03, 2025
CVE-2025-49029 9.1 CRITICAL 2 PoCs Analysis NUCLEI EPSS 0.01
bitto.Kazi Custom Login And Signup Widget <1.0 - Code Injection
Improper Control of Generation of Code ('Code Injection') vulnerability in bitto.kazi Custom Login And Signup Widget custom-login-and-signup-widget allows Code Injection.This issue affects Custom Login And Signup Widget: from n/a through <= 1.0.
CWE-94 Jul 01, 2025