CVE-2025-31935 |
Description: Subnet Solutions
PowerSYSTEM Center is affected by a mishandling of exceptional conditions vulnerability. Crafted data that is passed to the API may trigger an exception, resulting in a denial-of-service condition.
CVSS: MEDIUM (6.2) EPSS Score: 0.02%
April 11th, 2025 (10 days ago)
|
CVE-2025-31354 |
Description: Subnet Solutions PowerSYSTEM Center's SMTPS notification service can be affected by importing an EC certificate with crafted F2m parameters, which can lead to excessive CPU consumption during the evaluation of the curve parameters.
CVSS: MEDIUM (4.3) EPSS Score: 0.01%
April 11th, 2025 (10 days ago)
|
![]() |
Description: Summary
The contents of arbitrary files can be returned to the browser if the dev server is running on Node or Bun.
Impact
Only apps with the following conditions are affected.
explicitly exposing the Vite dev server to the network (using --host or server.host config option)
running the Vite dev server on runtimes that are not Deno (e.g. Node, Bun)
Details
HTTP 1.1 spec (RFC 9112) does not allow # in request-target. Although an attacker can send such a request. For those requests with an invalid request-line (it includes request-target), the spec recommends to reject them with 400 or 301. The same can be said for HTTP 2 (ref1, ref2, ref3).
On Node and Bun, those requests are not rejected internally and is passed to the user land. For those requests, the value of http.IncomingMessage.url contains #. Vite assumed req.url won't contain # when checking server.fs.deny, allowing those kinds of requests to bypass the check.
On Deno, those requests are not rejected internally and is passed to the user land as well. But for those requests, the value of http.IncomingMessage.url did not contain #.
PoC
npm create vite@latest
cd vite-project/
npm install
npm run dev
send request to read /etc/passwd
curl --request-target /@fs/Users/doggy/Desktop/vite-project/#/../../../../../etc/passwd http://127.0.0.1:5173
References
https://github.com/vitejs/vite/security/advisories/GHSA-356w-63v5-8wf4
https://nvd.nist.gov/vuln/detail/CVE-2025-32395
https://github.com/vitejs/vite/commit/175a8390...
CVSS: MEDIUM (6.0) EPSS Score: 0.06%
April 11th, 2025 (10 days ago)
|
![]() |
Description: Impact
Affected versions of yiisoft/yii are vulnerable to Reflected XSS in specific scenarios where the fallback error renderer is used.
Patches
Upgrade yiisoft/yii to version 1.1.31 or higher.
References
Git commit
If you have any questions or comments about this advisory, contact us through security form.
References
https://github.com/yiisoft/yii/security/advisories/GHSA-7r2v-8wxr-3ch5
https://nvd.nist.gov/vuln/detail/CVE-2025-32027
https://github.com/yiisoft/yii/commit/d386d737861c9014269b7ed8c36c65eadb387368
https://github.com/advisories/GHSA-7r2v-8wxr-3ch5
CVSS: MEDIUM (6.1) EPSS Score: 0.03%
April 11th, 2025 (10 days ago)
|
CVE-2025-32427 |
Description: Formie is a Craft CMS plugin for creating forms. Prior to 2.1.44, when importing a form from JSON, if the field label or handle contained malicious content, the output wasn't correctly escaped when viewing a preview of what was to be imported. As imports are undertaking primarily by users who have themselves exported the form from one environment to another, and would require direct manipulation of the JSON export, this is marked as moderate. This vulnerability will not occur unless someone deliberately tampers with the export. This vulnerability is fixed in 2.1.44.
CVSS: MEDIUM (5.3) EPSS Score: 0.06%
April 11th, 2025 (10 days ago)
|
CVE-2025-32426 |
Description: Formie is a Craft CMS plugin for creating forms. Prior to version 2.1.44, it is possible to inject malicious code into the HTML content of an email notification, which is then rendered on the preview. There is no issue when rendering the email via normal means (a delivered email). This would require access to the form's email notification settings. This has been fixed in Formie 2.1.44.
CVSS: MEDIUM (4.6) EPSS Score: 0.03%
April 11th, 2025 (10 days ago)
|
CVE-2025-3422 |
Description: The The Everest Forms – Contact Form, Quiz, Survey, Newsletter & Payment Form Builder for WordPress plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 3.1.1. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for authenticated attackers, with Subscriber-level access and above, to execute arbitrary shortcodes.
CVSS: MEDIUM (5.4) EPSS Score: 0.05%
April 11th, 2025 (10 days ago)
|
CVE-2025-3421 |
Description: The Everest Forms – Contact Form, Quiz, Survey, Newsletter & Payment Form Builder for WordPress plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'form_id' parameter in all versions up to, and including, 3.1.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
CVSS: MEDIUM (6.1) EPSS Score: 0.08%
April 11th, 2025 (10 days ago)
|
CVE-2025-2575 |
Description: The Z Companion plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 1.1.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file. Note: This requires Royal Shop theme to be installed.
CVSS: MEDIUM (6.4) EPSS Score: 0.04%
April 11th, 2025 (10 days ago)
|
CVE-2025-2541 |
Description: The WP Project Manager plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 2.6.22 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file.
CVSS: MEDIUM (6.4) EPSS Score: 0.03%
April 11th, 2025 (10 days ago)
|