CyberAlerts is shutting down on June 30th, 2025. Thank you for your support!

Threat and Vulnerability Intelligence Database

RSS Feed

Example Searches:

CVE-2025-4379

Description: DobryCMS in versions 2.* and lower is vulnerable to Reflected Cross-Site Scripting (XSS). Improper input validation in szukaj parameter allows arbitrary JavaScript to be executed on victim's browser when specially crafted URL is opened. A hotfix for affected versions was released on 29.04.2025. It removes the vulnerability without incrementing the version.

CVSS: MEDIUM (5.1)

EPSS Score: 0.06%

Source: CVE
May 23rd, 2025 (27 days ago)

CVE-2025-3894

Description: Text editor embedded into MegaBIP software does not neutralize user input allowing Stored XSS attacks on other users. In order to use the editor high privileges are required.   Version 5.20 of MegaBIP fixes this issue.

CVSS: MEDIUM (4.8)

EPSS Score: 0.05%

Source: CVE
May 23rd, 2025 (27 days ago)

CVE-2025-47149

Description: The optional feature 'Anti-Virus & Sandbox' of i-FILTER contains an issue with improper pattern file validation. If exploited, the product may treat an unauthorized pattern file as an authorized. If the product uses a specially crafted pattern file, information in the server where the product is running may be retrieved, and/or cause a denial of service (DoS) condition.

CVSS: MEDIUM (5.3)

EPSS Score: 0.02%

Source: CVE
May 23rd, 2025 (27 days ago)

CVE-2025-5096

Description: The TablePress plugin for WordPress is vulnerable to DOM-Based Stored Cross-Site Scripting via the 'data-caption', 'data-s-content-padding', 'data-s-title', and 'data-footer' data-attributes in all versions up to, and including, 3.1.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

CVSS: MEDIUM (6.4)

EPSS Score: 0.06%

Source: CVE
May 23rd, 2025 (27 days ago)

CVE-2025-48695

Description: An issue was discovered in CyberDAVA before 1.1.20. A privilege escalation vulnerability allows a low-privileged user to escalate their privilege by abusing the following API due to the lack of access control: /api/v2/users/user//role/ROLE/ (admin access can be achieved).

CVSS: MEDIUM (6.4)

EPSS Score: 0.03%

Source: CVE
May 23rd, 2025 (27 days ago)

CVE-2025-48701

Description: openDCIM through 23.04 allows SQL injection in people_depts.php because prepared statements are not used.

CVSS: MEDIUM (5.4)

EPSS Score: 0.03%

Source: CVE
May 23rd, 2025 (28 days ago)

CVE-2025-4594

Description: The Tournamatch plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'trn-ladder-registration-button' shortcode in all versions up to, and including, 4.6.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

CVSS: MEDIUM (6.4)

EPSS Score: 0.03%

Source: CVE
May 23rd, 2025 (28 days ago)

CVE-2025-4692

Description: Actors can use a maliciously crafted JavaScript object notation (JSON) web token (JWT) to perform privilege escalation by submitting the malicious JWT to a vulnerable method exposed on the cloud platform. If the exploit is successful, the user can escalate privileges to access any device managed by the ABUP Cloud Update Platform.

CVSS: MEDIUM (6.8)

EPSS Score: 0.03%

Source: CVE
May 23rd, 2025 (28 days ago)

CVE-2025-4338

Description: Lantronix Device installer is vulnerable to XML external entity (XXE) attacks in configuration files read from the network device. An attacker could obtain credentials, access these network devices, and modify their configurations. An attacker may also gain access to the host running the Device Installer software or the password hash of the user running the application.

CVSS: MEDIUM (6.8)

EPSS Score: 0.02%

Source: CVE
May 23rd, 2025 (28 days ago)

CVE-2025-48371

Description: OpenFGA is an authorization/permission engine. OpenFGA versions 1.8.0 through 1.8.12 (corresponding to Helm chart openfga-0.2.16 through openfga-0.2.30 and docker 1.8.0 through 1.8.12) are vulnerable to authorization bypass when certain Check and ListObject calls are executed. Users are affected under four specific conditions: First, calling Check API or ListObjects with an authorization model that has a relationship directly assignable by both type bound public access and userset; second, there are check or list object queries with contextual tuples for the relationship that can be directly assignable by both type bound public access and userset; third, those contextual tuples’s user field is an userset; and finally, type bound public access tuples are not assigned to the relationship. Users should upgrade to version 1.8.13 to receive a patch. The upgrade is backwards compatible.

CVSS: MEDIUM (5.8)

EPSS Score: 0.04%

Source: CVE
May 22nd, 2025 (28 days ago)