CVE-2025-2871 |
Description: The WordPress Mega Menu – QuadMenu plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.2.0. This is due to missing or incorrect nonce validation on the ajax_dismiss_notice() function. This makes it possible for unauthenticated attackers to update any user meta to a value of one, including wp_capabilities which could result in a privilege deescalation of an administrator, via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
CVSS: MEDIUM (4.3) EPSS Score: 0.01%
April 12th, 2025 (9 days ago)
|
![]() |
Description: Impact
When using the ch-go library, under a specific condition when the query includes a large, uncompressed malicious external data, it is possible for an attacker in control of such data to smuggle another query packet into the connection stream.
Patches
If you are using ch-go library, we recommend you to update to at least version 0.65.0.
Credit
This issue was found by lixts and reported through our bugcrowd program.
References
https://github.com/ClickHouse/ch-go/security/advisories/GHSA-m454-3xv7-qj85
https://nvd.nist.gov/vuln/detail/CVE-2025-1386
https://github.com/ClickHouse/ch-go/commit/0e835663df32b09b828528c07a5507686e6d975e
https://github.com/advisories/GHSA-m454-3xv7-qj85
CVSS: MEDIUM (5.9) EPSS Score: 0.02%
April 12th, 2025 (9 days ago)
|
CVE-2025-2881 |
Description: The Developer Toolbar plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.0.3 through the publicly accessible phpinfo.php script. This makes it possible for unauthenticated attackers to view potentially sensitive information contained in the exposed file.
CVSS: MEDIUM (5.3) EPSS Score: 0.05%
April 12th, 2025 (9 days ago)
|
CVE-2025-2841 |
Description: The Cart66 Cloud plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.3.7 through the publicly accessible phpinfo.php script. This makes it possible for unauthenticated attackers to view potentially sensitive information contained in the exposed file.
CVSS: MEDIUM (5.3) EPSS Score: 0.05%
April 12th, 2025 (9 days ago)
|
CVE-2025-32726 |
Description: Improper access control in Visual Studio Code allows an authorized attacker to elevate privileges locally.
CVSS: MEDIUM (6.8) EPSS Score: 0.05%
April 12th, 2025 (9 days ago)
|
CVE-2025-2269 |
Description: The Photo Gallery by 10Web – Mobile-Friendly Image Gallery plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘image_id’ parameter in all versions up to, and including, 1.8.34 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick an administrative user into performing an action such as clicking on a link.
CVSS: MEDIUM (6.1) EPSS Score: 0.08%
April 12th, 2025 (9 days ago)
|
CVE-2024-0450 |
Description: An issue was found in the CPython `zipfile` module affecting versions 3.12.1, 3.11.7, 3.10.13, 3.9.18, and 3.8.18 and prior.
The zipfile module is vulnerable to “quoted-overlap” zip-bombs which exploit the zip format to create a zip-bomb with a high compression ratio. The fixed versions of CPython makes the zipfile module reject zip archives which overlap entries in the archive.
CVSS: MEDIUM (6.2) EPSS Score: 0.15% SSVC Exploitation: poc
April 11th, 2025 (9 days ago)
|
![]() |
Description: Impact
When importing a form from JSON, if the field label or handle contained malicious content, the output wasn't correctly escaped when viewing a preview of what was to be imported.
As imports are undertaking primarily by users who have themselves exported the form from one environment to another, and would require direct manipulation of the JSON export, this is marked as moderate. This vulnerability will not occur unless someone deliberately tampers with the export.
Patches
This has been fixed in Formie 2.1.44. Users should ensure they are running at least this version.
References
https://github.com/verbb/formie/security/advisories/GHSA-p9hh-mh5x-wvx3
https://nvd.nist.gov/vuln/detail/CVE-2025-32427
https://github.com/advisories/GHSA-p9hh-mh5x-wvx3
CVSS: MEDIUM (5.3) EPSS Score: 0.06%
April 11th, 2025 (10 days ago)
|
![]() |
Description: Impact
It is possible to inject malicious code into the HTML content of an email notification, which is then rendered on the preview. There is no issue when rendering the email via normal means (a delivered email).
This would require access to the form's email notification settings.
Patches
This has been fixed in Formie 2.1.44. Users should ensure they are running at least this version.
References
https://github.com/verbb/formie/security/advisories/GHSA-2xm2-23ff-p8ww
https://nvd.nist.gov/vuln/detail/CVE-2025-32426
https://github.com/advisories/GHSA-2xm2-23ff-p8ww
CVSS: MEDIUM (4.6) EPSS Score: 0.03%
April 11th, 2025 (10 days ago)
|
CVE-2024-11679 |
Description: An input validation weakness was reported in the TpmSetup module for some legacy System x server products that could allow a local attacker with elevated privileges to read the contents of memory.
CVSS: MEDIUM (6.7) EPSS Score: 0.02% SSVC Exploitation: none
April 11th, 2025 (10 days ago)
|