Latest Vulnerabilities with Public Exploits

Updated 1h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,589 CVEs tracked 53,640 with exploits 4,860 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,361 vendors 43,897 researchers
53,640 results Clear all
CVE-2025-34323 7.8 HIGH 1 PoC Analysis EPSS 0.00
Nagios Log Server < 2026 - Incorrect Permission Assignment
Nagios Log Server versions prior to 2026R1.0.1 are vulnerable to local privilege escalation due to a combination of sudo misconfiguration and group-writable application directories. The 'www-data' user is a member of the 'nagios' group, which has write access to '/usr/local/nagioslogserver/scripts', while several scripts in this directory are owned by root and may be executed via sudo without a password. A local attacker running as 'www-data' can move one of these root-owned scripts to a backup name and create a replacement script with attacker-controlled content at the original path, then invoke it with sudo. This allows arbitrary commands to be executed with root privileges, providing full compromise of the underlying operating system.
CWE-732 Nov 17, 2025
CVE-2025-34322 7.2 HIGH 1 PoC Analysis EPSS 0.00
Nagios Log Server < 2026 - OS Command Injection
Nagios Log Server versions prior to 2026R1.0.1 contain an authenticated command injection vulnerability in the experimental 'Natural Language Queries' feature. When this feature is configured, certain user-controlled settings—including model selection and connection parameters—are read from the global configuration and concatenated into a shell command that is executed via shell_exec() without proper input handling or command-line argument sanitation. An authenticated user with access to the 'Global Settings' page can supply crafted values in these fields to inject additional shell commands, resulting in arbitrary command execution as the 'www-data' user and compromise of the Log Server host.
CWE-78 Nov 17, 2025
CVE-2025-32421 3.7 LOW 3 PoCs Analysis EPSS 0.00
Vercel Next.js < 14.2.24 - Race Condition
Next.js is a React framework for building full-stack web applications. Versions prior to 14.2.24 and 15.1.6 have a race-condition vulnerability. This issue only affects the Pages Router under certain misconfigurations, causing normal endpoints to serve `pageProps` data instead of standard HTML. This issue was patched in versions 15.1.6 and 14.2.24 by stripping the `x-now-route-matches` header from incoming requests. Applications hosted on Vercel's platform are not affected by this issue, as the platform does not cache responses based solely on `200 OK` status without explicit `cache-control` headers. Those who self-host Next.js deployments and are unable to upgrade immediately can mitigate this vulnerability by stripping the `x-now-route-matches` header from all incoming requests at the content development network and setting `cache-control: no-store` for all responses under risk. The maintainers of Next.js strongly recommend only caching responses with explicit cache-control headers.
CWE-362 May 14, 2025
CVE-2025-2598 5.5 MEDIUM 2 PoCs Analysis EPSS 0.00
AWS CDK CLI - Info Disclosure
When the AWS Cloud Development Kit (AWS CDK) Command Line Interface (AWS CDK CLI) is used with a credential plugin which returns an expiration property with the retrieved AWS credentials, the credentials are printed to the console output. To mitigate this issue, users should upgrade to version 2.178.2 or later and ensure any forked or derivative code is patched to incorporate the new fixes.
CWE-497 Mar 21, 2025
CVE-2025-13595 9.8 CRITICAL 1 PoC Analysis EPSS 0.00
CIBELES AI <1.10.8 - File Upload
The CIBELES AI plugin for WordPress is vulnerable to arbitrary file uploads due to missing capability check in the 'actualizador_git.php' file in all versions up to, and including, 1.10.8. This makes it possible for unauthenticated attackers to download arbitrary GitHub repositories and overwrite plugin files on the affected site's server which may make remote code execution possible.
CWE-434 Nov 25, 2025
CVE-2025-13597 9.8 CRITICAL 1 PoC Analysis EPSS 0.00
AI Feeds <1.0.11 - File Upload
The AI Feeds plugin for WordPress is vulnerable to arbitrary file uploads due to missing capability check in the 'actualizador_git.php' file in all versions up to, and including, 1.0.11. This makes it possible for unauthenticated attackers to download arbitrary GitHub repositories and overwrite plugin files on the affected site's server which may make remote code execution possible.
CWE-434 Nov 25, 2025
CVE-2025-63498 6.1 MEDIUM 1 PoC Analysis EPSS 0.00
alinto SOGo <5.12.3 - XSS
alinto SOGo 5.12.3 is vulnerable to Cross Site Scripting (XSS) via the "userName" parameter.
CWE-79 Nov 24, 2025
CVE-2025-65670 4.3 MEDIUM 1 PoC Analysis EPSS 0.00
classroomio <0.1.13 - Info Disclosure
An Insecure Direct Object Reference (IDOR) in classroomio 0.1.13 allows students to access sensitive admin/teacher endpoints by manipulating course IDs in URLs, resulting in unauthorized disclosure of sensitive course, admin, and student data. The leak occurs momentarily before the system reverts to a normal state restricting access.
CWE-639 Nov 26, 2025
CVE-2025-65669 9.1 CRITICAL 1 PoC Analysis EPSS 0.00
Classroomio <0.1.13 - Auth Bypass
An issue was discovered in classroomio 0.1.13. Student accounts are able to delete courses from the Explore page without any authorization or authentication checks, bypassing the expected admin-only deletion restriction.
CWE-862 Nov 26, 2025
CVE-2025-54381 9.9 CRITICAL 2 PoCs Analysis EPSS 0.01
Bentoml < 1.4.19 - SSRF
BentoML is a Python library for building online serving systems optimized for AI apps and model inference. In versions 1.4.0 until 1.4.19, the file upload processing system contains an SSRF vulnerability that allows unauthenticated remote attackers to force the server to make arbitrary HTTP requests. The vulnerability stems from the multipart form data and JSON request handlers, which automatically download files from user-provided URLs without validating whether those URLs point to internal network addresses, cloud metadata endpoints, or other restricted resources. The documentation explicitly promotes this URL-based file upload feature, making it an intended design that exposes all deployed services to SSRF attacks by default. Version 1.4.19 contains a patch for the issue.
CWE-918 Jul 29, 2025
CVE-2025-65681 3.3 LOW 1 PoC Analysis EPSS 0.00
Overhang.IO <20.0.2 - Info Disclosure
An issue was discovered in Overhang.IO (tutor-open-edx) (overhangio/tutor) 20.0.2 allowing local unauthorized attackers to gain access to sensitive information due to the absence of proper cache-control HTTP headers and client-side session checks.
CWE-524 Nov 26, 2025
CVE-2025-65676 5.4 MEDIUM 1 PoC Analysis EPSS 0.00
Classroomio LMS 0.1.13 - XSS
Stored Cross site scripting (XSS) vulnerability in Classroomio LMS 0.1.13 allows authenticated attackers to execute arbitrary code via crafted SVG cover images.
CWE-79 Nov 26, 2025
CVE-2025-65675 5.4 MEDIUM 1 PoC Analysis EPSS 0.00
Classroomio LMS 0.1.13 - XSS
Stored Cross site scripting (XSS) vulnerability in Classroomio LMS 0.1.13 allows authenticated attackers to execute arbitrary code via crafted SVG profile pictures.
CWE-79 Nov 26, 2025
CVE-2025-65672 7.5 HIGH 1 PoC Analysis EPSS 0.00
classroomio <0.1.13 - Info Disclosure
Insecure Direct Object Reference (IDOR) in classroomio 0.1.13 allows unauthorized share and invite access to course settings.
CWE-639 Nov 26, 2025
CVE-2025-47827 4.6 MEDIUM KEV 1 PoC Analysis EPSS 0.01
Igel OS < 11.01.100 - Signature Verification Bypass
In IGEL OS before 11, Secure Boot can be bypassed because the igel-flash-driver module improperly verifies a cryptographic signature. Ultimately, a crafted root filesystem can be mounted from an unverified SquashFS image.
CWE-347 Jun 05, 2025
CVE-2025-63735 6.1 MEDIUM 1 PoC Analysis EPSS 0.00
Ruckus Unleashed 200.13.6.1.319 - XSS
A reflected Cross site scripting (XSS) vulnerability in Ruckus Unleashed 200.13.6.1.319 via the name parameter to the the captive-portal endpoint selfguestpass/guestAccessSubmit.jsp.
CWE-79 Nov 25, 2025
CVE-2025-63729 9.0 CRITICAL 1 PoC Analysis EPSS 0.00
Syrotech SY-GPON-1110-WDONT SYRO_3.7L_3.1.02-240517 - Info Disclosure
An issue was discovered in Syrotech SY-GPON-1110-WDONT SYRO_3.7L_3.1.02-240517 allowing attackers to exctract the SSL Private Key, CA Certificate, SSL Certificate, and Client Certificates in .pem format in firmware in etc folder.
CWE-532 Nov 25, 2025
CVE-2025-30749 8.1 HIGH 1 PoC Analysis EPSS 0.01
Oracle Java SE <24.0.1 - Info Disclosure
Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: 2D). Supported versions that are affected are Oracle Java SE: 8u451, 8u451-perf, 11.0.27, 17.0.15, 21.0.7, 24.0.1; Oracle GraalVM for JDK: 17.0.15, 21.0.7 and 24.0.1; Oracle GraalVM Enterprise Edition: 21.3.14. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in takeover of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 8.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).
Jul 15, 2025
CVE-2025-12916 6.3 MEDIUM 1 PoC Analysis EPSS 0.00
Sangfor Operation And Maintenance Security Management System < 3.0.11 - Command Injection
A vulnerability was determined in Sangfor Operation and Maintenance Security Management System 3.0. Impacted is an unknown function of the file /fort/portal_login of the component Frontend. This manipulation of the argument loginUrl causes command injection. The attack may be initiated remotely. The exploit has been publicly disclosed and may be utilized. Upgrading to version 3.0.11 and 3.0.12 is recommended to address this issue. It is advisable to upgrade the affected component.
CWE-74 Nov 09, 2025
CVE-2025-63848 6.1 MEDIUM 1 PoC Analysis EPSS 0.00
SWISH Prolog <2.2.0 - XSS
Stored cross site scripting (xss) vulnerability in SWISH prolog thru 2.2.0 allowing attackers to execute arbitrary code via crafted web IDE notebook.
CWE-79 Nov 20, 2025