Threat and Vulnerability Intelligence Database

RSS Feed

Example Searches:

CVE-2025-4631

Description: The Profitori plugin for WordPress is vulnerable to Privilege Escalation due to a missing capability check on the stocktend_object endpoint in versions 2.0.6.0 to 2.1.1.3. This makes it possible to trigger the save_object_as_user() function for objects whose '_datatype' is set to 'users',. This allows unauthenticated attackers to write arbitrary strings straight into the user’s wp_capabilities meta field, potentially elevating the privileges of an existing user account or a newly created one to that of an administrator.

CVSS: CRITICAL (9.8)

EPSS Score: 0.09%

Source: CVE
May 31st, 2025 (2 days ago)

CVE-2025-4607

Description: The PSW Front-end Login & Registration plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 1.12 via the customer_registration() function. This is due to the use of a weak, low-entropy OTP mechanism in the forget() function. This makes it possible for unauthenticated attackers to initiate a password reset for any user, including administrators, and elevate their privileges for full site takeover.

CVSS: CRITICAL (9.8)

EPSS Score: 0.08%

Source: CVE
May 31st, 2025 (2 days ago)

CVE-2025-48336

Description: Deserialization of Untrusted Data vulnerability in ThimPress Course Builder allows Object Injection.This issue affects Course Builder: from n/a before 3.6.6.

CVSS: CRITICAL (9.8)

EPSS Score: 0.04%

Source: CVE
May 29th, 2025 (4 days ago)

CVE-2025-5058

Description: The eMagicOne Store Manager for WooCommerce plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the set_image() function in all versions up to, and including, 1.2.5. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible. This is only exploitable by unauthenticated attackers in default configurations where the the default password is left as 1:1, or where the attacker gains access to the credentials.

CVSS: CRITICAL (9.8)

EPSS Score: 0.18%

Source: CVE
May 24th, 2025 (9 days ago)

CVE-2025-4603

Description: The eMagicOne Store Manager for WooCommerce plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the delete_file() function in all versions up to, and including, 1.2.5. This makes it possible for unauthenticated attackers to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php). This is only exploitable by unauthenticated attackers in default configurations where the the default password is left as 1:1, or where the attacker gains access to the credentials.

CVSS: CRITICAL (9.1)

EPSS Score: 0.4%

Source: CVE
May 24th, 2025 (9 days ago)

CVE-2025-48289

Description: Deserialization of Untrusted Data vulnerability in AncoraThemes Kids Planet allows Object Injection. This issue affects Kids Planet: from n/a through 2.2.14.

CVSS: CRITICAL (9.8)

EPSS Score: 0.05%

Source: CVE
May 23rd, 2025 (10 days ago)

CVE-2025-48287

Description: Deserialization of Untrusted Data vulnerability in Pagaleve Pix 4x sem juros – Pagaleve allows Object Injection. This issue affects Pix 4x sem juros – Pagaleve: from n/a through 1.6.9.

CVSS: CRITICAL (9.8)

EPSS Score: 0.05%

Source: CVE
May 23rd, 2025 (10 days ago)

CVE-2025-48283

Description: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Majestic Support Majestic Support allows SQL Injection. This issue affects Majestic Support: from n/a through 1.1.0.

CVSS: CRITICAL (9.3)

EPSS Score: 0.04%

Source: CVE
May 23rd, 2025 (10 days ago)

CVE-2025-47687

Description: Unrestricted Upload of File with Dangerous Type vulnerability in StoreKeeper B.V. StoreKeeper for WooCommerce allows Upload a Web Shell to a Web Server. This issue affects StoreKeeper for WooCommerce: from n/a through 14.4.4.

CVSS: CRITICAL (10.0)

EPSS Score: 0.06%

Source: CVE
May 23rd, 2025 (10 days ago)

CVE-2025-47663

Description: Unrestricted Upload of File with Dangerous Type vulnerability in mojoomla Hospital Management System allows Upload a Web Shell to a Web Server. This issue affects Hospital Management System: from 47.0(20 through 11.

CVSS: CRITICAL (9.9)

EPSS Score: 0.05%

Source: CVE
May 23rd, 2025 (10 days ago)