CyberAlerts is shutting down on June 30th, 2025. Thank you for your support!

Threat and Vulnerability Intelligence Database

RSS Feed

Example Searches:

CVE-2024-13908

Description: The SMTP by BestWebSoft plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'save_options' function in all versions up to, and including, 1.1.9. This makes it possible for authenticated attackers, with Administrator-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.

CVSS: HIGH (7.2)

EPSS Score: 0.3%

Source: CVE
March 8th, 2025 (4 months ago)

CVE-2024-11087

Description: The miniOrange Social Login and Register (Discord, Google, Twitter, LinkedIn) Pro Addon plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 200.3.9. This is due to insufficient verification on the user being returned by the social login token. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the username and the user does not have an already-existing account for the service returning the token.

CVSS: HIGH (8.1)

EPSS Score: 0.1%

Source: CVE
March 8th, 2025 (4 months ago)

CVE-2024-13890

Description: The Allow PHP Execute plugin for WordPress is vulnerable to PHP Code Injection in all versions up to, and including, 1.0. This is due to allowing PHP code to be entered by all users for whom unfiltered HTML is allowed. This makes it possible for authenticated attackers, with Editor-level access and above, to inject PHP code into posts and pages.

CVSS: HIGH (7.2)

EPSS Score: 0.06%

Source: CVE
March 8th, 2025 (4 months ago)

CVE-2024-13835

Description: The Post Meta Data Manager plugin for WordPress is vulnerable to multisite privilege escalation in all versions up to, and including, 1.4.3. This is due to the plugin not properly verifying the existence of a multisite installation prior to allowing user meta to be added/modified. This makes it possible for authenticated attackers, with Administrator-level access and above, to gain elevated privileges on subsites that would otherwise be inaccessible.

CVSS: HIGH (7.2)

EPSS Score: 0.05%

Source: CVE
March 8th, 2025 (4 months ago)

CVE-2025-2097

Description: A vulnerability, which was classified as critical, has been found in TOTOLINK EX1800T 9.1.0cu.2112_B20220316. This issue affects the function setRptWizardCfg of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument loginpass leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Eine Schwachstelle wurde in TOTOLINK EX1800T 9.1.0cu.2112_B20220316 entdeckt. Sie wurde als kritisch eingestuft. Davon betroffen ist die Funktion setRptWizardCfg der Datei /cgi-bin/cstecgi.cgi. Durch Manipulieren des Arguments loginpass mit unbekannten Daten kann eine stack-based buffer overflow-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung.

CVSS: HIGH (8.7)

EPSS Score: 0.17%

Source: CVE
March 7th, 2025 (4 months ago)

CVE-2025-27822

Description: An issue was discovered in the Masquerade module before 1.x-1.0.1 for Backdrop CMS. It allows people to temporarily switch to another user account. The module provides a "Masquerade as admin" permission to restrict people (who can masquerade) from switching to an account with administrative privileges. This permission is not always honored and may allow non-administrative users to masquerade as an administrator. This vulnerability is mitigated by the fact that an attacker must have a role with the "Masquerade as user" permission.

CVSS: HIGH (7.5)

EPSS Score: 0.04%

Source: CVE
March 7th, 2025 (4 months ago)

CVE-2025-2024

Description: Trimble SketchUp SKP File Parsing Uninitialized Variable Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Trimble SketchUp. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of SKP files. The issue results from the lack of proper initialization of memory prior to accessing it. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-25210.

CVSS: HIGH (7.8)

EPSS Score: 0.04%

SSVC Exploitation: none

Source: CVE
March 7th, 2025 (4 months ago)

CVE-2025-27607

Description: Python JSON Logger is a JSON Formatter for Python Logging. Between 30 December 2024 and 4 March 2025 Python JSON Logger was vulnerable to RCE through a missing dependency. This occurred because msgspec-python313-pre was deleted by the owner leaving the name open to being claimed by a third party. If the package was claimed, it would allow them RCE on any Python JSON Logger user who installed the development dependencies on Python 3.13 (e.g. pip install python-json-logger[dev]). This issue has been resolved with 3.3.0.

CVSS: HIGH (8.8)

EPSS Score: 0.61%

Source: CVE
March 7th, 2025 (4 months ago)

CVE-2025-27604

Description: XWiki Confluence Migrator Pro helps admins to import confluence packages into their XWiki instance. The homepage of the application is public which enables a guest to download the package which might contain sensitive information. This vulnerability is fixed in 1.11.7.

CVSS: HIGH (7.5)

EPSS Score: 0.05%

Source: CVE
March 7th, 2025 (4 months ago)

CVE-2025-0162

Description: IBM Aspera Shares 1.9.9 through 1.10.0 PL7 is vulnerable to an XML external entity injection (XXE) attack when processing XML data. A remote authenticated attacker could exploit this vulnerability to expose sensitive information or consume memory resources.

CVSS: HIGH (7.1)

EPSS Score: 0.12%

Source: CVE
March 7th, 2025 (4 months ago)