Latest Vulnerabilities with Public Exploits

Updated 2h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,589 CVEs tracked 53,640 with exploits 4,860 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,361 vendors 43,897 researchers
53,640 results Clear all
CVE-2025-63888 9.8 CRITICAL 1 PoC Analysis EPSS 0.00
ThinkPHP 5.0.24 - RCE
The read function in file thinkphp\library\think\template\driver\File.php in ThinkPHP 5.0.24 contains a remote code execution vulnerability.
CWE-98 Nov 20, 2025
CVE-2025-7892 5.3 MEDIUM 1 PoC Analysis EPSS 0.00
IDnow App <9.6.0 - Info Disclosure
A vulnerability classified as problematic has been found in IDnow App up to 9.6.0 on Android. This affects an unknown part of the file AndroidManifest.xml of the component de.idnow. The manipulation leads to improper export of android application components. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
CWE-926 Jul 20, 2025
CVE-2025-61765 6.4 MEDIUM 1 PoC Analysis EPSS 0.01
Pypi Python-socketio < 5.14.0 - Insecure Deserialization
python-socketio is a Python implementation of the Socket.IO realtime client and server. A remote code execution vulnerability in python-socketio versions prior to 5.14.0 allows attackers to execute arbitrary Python code through malicious pickle deserialization in multi-server deployments on which the attacker previously gained access to the message queue that the servers use for internal communications. When Socket.IO servers are configured to use a message queue backend such as Redis for inter-server communication, messages sent between the servers are encoded using the `pickle` Python module. When a server receives one of these messages through the message queue, it assumes it is trusted and immediately deserializes it. The vulnerability stems from deserialization of messages using Python's `pickle.loads()` function. Having previously obtained access to the message queue, the attacker can send a python-socketio server a crafted pickle payload that executes arbitrary code during deserialization via Python's `__reduce__` method. This vulnerability only affects deployments with a compromised message queue. The attack can lead to the attacker executing random code in the context of, and with the privileges of a Socket.IO server process. Single-server systems that do not use a message queue, and multi-server systems with a secure message queue are not vulnerable. In addition to making sure standard security practices are followed in the deployment of the message queue, users of the python-socketio package can upgrade to version 5.14.0 or newer, which remove the `pickle` module and use the much safer JSON encoding for inter-server messaging.
CWE-502 Oct 06, 2025
CVE-2025-13380 6.5 MEDIUM 1 PoC Analysis EPSS 0.00
AI Engine for WordPress: ChatGPT - Arbitrary File Read
The AI Engine for WordPress: ChatGPT, GPT Content Generator plugin for WordPress is vulnerable to Arbitrary File Read in all versions up to, and including, 1.0.1. This is due to insufficient validation of user-supplied file paths in the 'lqdai_update_post' AJAX endpoint and the use of file_get_contents() with user-controlled URLs without protocol restrictions in the insert_image() function. This makes it possible for authenticated attackers, with Contributor-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information.
CWE-73 Nov 25, 2025
CVE-2025-13374 9.8 CRITICAL 1 PoC Analysis EPSS 0.00
Kalrav AI Agent <2.3.3 - File Upload
The Kalrav AI Agent plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the kalrav_upload_file AJAX action in all versions up to, and including, 2.3.3. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.
CWE-434 Jan 24, 2026
CVE-2025-54110 8.8 HIGH 1 PoC Analysis EPSS 0.00
Microsoft Windows 10 1507 < 10.0.10240.21128 - Integer Overflow
Integer overflow or wraparound in Windows Kernel allows an authorized attacker to elevate privileges locally.
CWE-190 Sep 09, 2025
CVE-2025-31931 6.7 MEDIUM 1 PoC Analysis EPSS 0.00
ITT API <3.25.4 - Privilege Escalation
Uncontrolled search path for the Instrumentation and Tracing Technology API (ITT API) software before version 3.25.4 within Ring 3: User Applications may allow an escalation of privilege. Unprivileged software adversary with an authenticated user combined with a high complexity attack may enable escalation of privilege. This result may potentially occur via local access when attack requirements are present without special internal knowledge and requires active user interaction. The potential vulnerability may impact the confidentiality (high), integrity (high) and availability (high) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (none) impacts.
CWE-427 Nov 11, 2025
CVE-2025-44823 9.9 CRITICAL 2 PoCs Analysis EPSS 0.01
Nagios Log Server <2024R1.3.2 - Info Disclosure
Nagios Log Server before 2024R1.3.2 allows authenticated users to retrieve cleartext administrative API keys via a /nagioslogserver/index.php/api/system/get_users call. This is GL:NLS#475.
CWE-497 Oct 07, 2025
CVE-2025-64027 6.1 MEDIUM 1 PoC Analysis EPSS 0.00
Snipeitapp Snipe-it - XSS
Snipe-IT v8.3.4 (build 20218) contains a reflected cross-site scripting (XSS) vulnerability in the CSV Import workflow. When an invalid CSV file is uploaded, the application returns a progress_message value that is rendered as raw HTML in the admin interface. An attacker can intercept and modify the POST /livewire/update request to inject arbitrary HTML or JavaScript into the progress_message. Because the server accepts the modified input without sanitization and reflects it back to the user, arbitrary JavaScript executes in the browser of any authenticated admin who views the import page. NOTE: this is disputed by the Supplier because the report only demonstrates that an authenticated user can choose to conduct a man-in-the-middle attack against himself.
CWE-79 Nov 20, 2025
CVE-2025-12762 9.1 CRITICAL 1 PoC Analysis EPSS 0.00
pgAdmin <9.9 - RCE
pgAdmin versions up to 9.9 are affected by a Remote Code Execution (RCE) vulnerability that occurs when running in server mode and performing restores from PLAIN-format dump files. This issue allows attackers to inject and execute arbitrary commands on the server hosting pgAdmin, posing a critical risk to the integrity and security of the database management system and underlying data.
CWE-94 Nov 13, 2025
CVE-2025-62950 4.3 MEDIUM 1 PoC Analysis EPSS 0.00
Contest Gallery <28.0.0 - CSRF
Cross-Site Request Forgery (CSRF) vulnerability in Wasiliy Strecker / ContestGallery developer Contest Gallery contest-gallery allows Cross Site Request Forgery.This issue affects Contest Gallery: from n/a through <= 28.0.0.
CWE-352 Nov 06, 2025
CVE-2025-10720 6.5 MEDIUM 2 PoCs Analysis EPSS 0.00
WP Private Content Plus <3.6.2 - Auth Bypass
The WP Private Content Plus through 3.6.2 provides a global content protection feature that requires a password. However, the access control check is based only on the presence of an unprotected client-side cookie. As a result, an unauthenticated attacker can completely bypass the password protection by manually setting the cookie value in their browser.
Oct 13, 2025
CVE-2025-56526 6.1 MEDIUM 1 PoC Analysis EPSS 0.00
Cinnamon Kotaemon < 0.11.0 - XSS
Cross site scripting (XSS) vulnerability in Kotaemon 0.11.0 allowing attackers to execute arbitrary code via a crafted PDF.
CWE-79 Nov 18, 2025
CVE-2025-56499 6.5 MEDIUM 1 PoC Analysis EPSS 0.00
Metacubex Mihomo - Improper Access Control
Incorrect access control in mihomo v1.19.11 allows authenticated attackers with low-level privileges to read arbitrary files with elevated privileges via obtaining the external control key from the config file.
CWE-284 Nov 18, 2025
CVE-2025-54321 9.8 CRITICAL 1 PoC Analysis EPSS 0.00
Ascertia SigningHub <8.6.8 - DoS
In Ascertia SigningHub through 8.6.8, there is a lack of rate limiting on the reset password function, leading to an email bombing vulnerability. An authenticated attacker can exploit this by automating reset password requests.
CWE-799 Nov 18, 2025
CVE-2025-54320 4.3 MEDIUM 1 PoC Analysis EPSS 0.00
Ascertia Signinghub < 8.6.8 - Resource Allocation Without Limits
In Ascertia SigningHub through 8.6.8, there is a lack of rate limiting on the invite user function, leading to an email bombing vulnerability. An authenticated attacker can exploit this by automating invite requests.
CWE-770 Nov 18, 2025
CVE-2025-48060 7.5 HIGH 1 PoC Analysis EPSS 0.01
JQ < 1.7.1 - Out-of-Bounds Write
jq is a command-line JSON processor. In versions up to and including 1.7.1, a heap-buffer-overflow is present in function `jv_string_vfmt` in the jq_fuzz_execute harness from oss-fuzz. This crash happens on file jv.c, line 1456 `void* p = malloc(sz);`. As of time of publication, no patched versions are available.
CWE-121 May 21, 2025
CVE-2025-63497 7.1 HIGH 1 PoC 1 Writeup Analysis EPSS 0.00
Rickxy Hospital Management System <1.0 - SQL Injection
The patient prescription viewing functionality in his_doc_view_single_patient.php of rickxy Hospital Management System version 1.0 contains an SQL injection vulnerability. The pat_number GET parameter is directly concatenated into SQL queries without proper sanitization, allowing authenticated attackers (doctor role) to execute arbitrary SQL queries.
CWE-89 Nov 10, 2025
CVE-2025-34227 8.8 HIGH 1 PoC Analysis EPSS 0.03
Nagios XI < 2026 - OS Command Injection
Nagios XI < 2026R1 is vulnerable to an authenticated command injection vulnerability within the MongoDB Database, MySQL Query, MySQL Server, Postgres Server, and Postgres Query wizards. It is possible to inject shell characters into arguments provided to the service and execute arbitrary system commands on the underlying host as the `nagios` user.
CWE-78 Sep 25, 2025
CVE-2025-41088 MEDIUM 1 PoC Analysis EPSS 0.00
Xibo Signage Xibo CMS v4.1.2 - XSS
Stored Cross-Site Scripting (XSS) in Xibo Signage's Xibo CMS v4.1.2, due to a lack of proper validation of user input. To exploit the vulnerability, the attacker must create a template in the 'Templates' section, then add a text element in the 'Global Elements' section, and finally modify the 'Text' field in the section with the malicious payload.
CWE-79 Oct 10, 2025