Threat and Vulnerability Intelligence Database

RSS Feed

Example Searches:

CVE-2025-2871

Description: The WordPress Mega Menu – QuadMenu plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.2.0. This is due to missing or incorrect nonce validation on the ajax_dismiss_notice() function. This makes it possible for unauthenticated attackers to update any user meta to a value of one, including wp_capabilities which could result in a privilege deescalation of an administrator, via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

CVSS: MEDIUM (4.3)

EPSS Score: 0.01%

Source: CVE
April 12th, 2025 (9 days ago)
Description: Impact When using the ch-go library, under a specific condition when the query includes a large, uncompressed malicious external data, it is possible for an attacker in control of such data to smuggle another query packet into the connection stream. Patches If you are using ch-go library, we recommend you to update to at least version 0.65.0. Credit This issue was found by lixts and reported through our bugcrowd program. References https://github.com/ClickHouse/ch-go/security/advisories/GHSA-m454-3xv7-qj85 https://nvd.nist.gov/vuln/detail/CVE-2025-1386 https://github.com/ClickHouse/ch-go/commit/0e835663df32b09b828528c07a5507686e6d975e https://github.com/advisories/GHSA-m454-3xv7-qj85

CVSS: MEDIUM (5.9)

EPSS Score: 0.02%

Source: Github Advisory Database (Go)
April 12th, 2025 (9 days ago)

CVE-2025-2881

Description: The Developer Toolbar plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.0.3 through the publicly accessible phpinfo.php script. This makes it possible for unauthenticated attackers to view potentially sensitive information contained in the exposed file.

CVSS: MEDIUM (5.3)

EPSS Score: 0.05%

Source: CVE
April 12th, 2025 (9 days ago)

CVE-2025-2841

Description: The Cart66 Cloud plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.3.7 through the publicly accessible phpinfo.php script. This makes it possible for unauthenticated attackers to view potentially sensitive information contained in the exposed file.

CVSS: MEDIUM (5.3)

EPSS Score: 0.05%

Source: CVE
April 12th, 2025 (9 days ago)

CVE-2025-32726

Description: Improper access control in Visual Studio Code allows an authorized attacker to elevate privileges locally.

CVSS: MEDIUM (6.8)

EPSS Score: 0.05%

Source: CVE
April 12th, 2025 (9 days ago)

CVE-2025-2269

Description: The Photo Gallery by 10Web – Mobile-Friendly Image Gallery plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘image_id’ parameter in all versions up to, and including, 1.8.34 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick an administrative user into performing an action such as clicking on a link.

CVSS: MEDIUM (6.1)

EPSS Score: 0.08%

Source: CVE
April 12th, 2025 (9 days ago)

CVE-2024-0450

Description: An issue was found in the CPython `zipfile` module affecting versions 3.12.1, 3.11.7, 3.10.13, 3.9.18, and 3.8.18 and prior. The zipfile module is vulnerable to “quoted-overlap” zip-bombs which exploit the zip format to create a zip-bomb with a high compression ratio. The fixed versions of CPython makes the zipfile module reject zip archives which overlap entries in the archive.

CVSS: MEDIUM (6.2)

EPSS Score: 0.15%

SSVC Exploitation: poc

Source: CVE
April 11th, 2025 (9 days ago)
Description: Impact When importing a form from JSON, if the field label or handle contained malicious content, the output wasn't correctly escaped when viewing a preview of what was to be imported. As imports are undertaking primarily by users who have themselves exported the form from one environment to another, and would require direct manipulation of the JSON export, this is marked as moderate. This vulnerability will not occur unless someone deliberately tampers with the export. Patches This has been fixed in Formie 2.1.44. Users should ensure they are running at least this version. References https://github.com/verbb/formie/security/advisories/GHSA-p9hh-mh5x-wvx3 https://nvd.nist.gov/vuln/detail/CVE-2025-32427 https://github.com/advisories/GHSA-p9hh-mh5x-wvx3

CVSS: MEDIUM (5.3)

EPSS Score: 0.06%

Source: Github Advisory Database (Composer)
April 11th, 2025 (10 days ago)
Description: Impact It is possible to inject malicious code into the HTML content of an email notification, which is then rendered on the preview. There is no issue when rendering the email via normal means (a delivered email). This would require access to the form's email notification settings. Patches This has been fixed in Formie 2.1.44. Users should ensure they are running at least this version. References https://github.com/verbb/formie/security/advisories/GHSA-2xm2-23ff-p8ww https://nvd.nist.gov/vuln/detail/CVE-2025-32426 https://github.com/advisories/GHSA-2xm2-23ff-p8ww

CVSS: MEDIUM (4.6)

EPSS Score: 0.03%

Source: Github Advisory Database (Composer)
April 11th, 2025 (10 days ago)

CVE-2024-11679

Description: An input validation weakness was reported in the TpmSetup module for some legacy System x server products that could allow a local attacker with elevated privileges to read the contents of memory.

CVSS: MEDIUM (6.7)

EPSS Score: 0.02%

SSVC Exploitation: none

Source: CVE
April 11th, 2025 (10 days ago)