CyberAlerts is shutting down on June 30th, 2025. Thank you for your support!

Threat and Vulnerability Intelligence Database

RSS Feed

Example Searches:

CVE-2025-22297

Description: Cross-Site Request Forgery (CSRF) vulnerability in AIpost AI WP Writer allows Cross Site Request Forgery.This issue affects AI WP Writer: from n/a through 3.8.4.4.

CVSS: MEDIUM (4.3)

EPSS Score: 0.04%

Source: CVE
January 8th, 2025 (6 months ago)

CVE-2025-22296

Description: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in HashThemes Hash Elements.This issue affects Hash Elements: from n/a through 1.4.9.

CVSS: MEDIUM (6.5)

EPSS Score: 0.04%

Source: CVE
January 8th, 2025 (6 months ago)

CVE-2025-22294

Description: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Gravity Master Custom Field For WP Job Manager allows Reflected XSS.This issue affects Custom Field For WP Job Manager: from n/a through 1.3.

CVSS: HIGH (7.1)

EPSS Score: 0.04%

Source: CVE
January 8th, 2025 (6 months ago)

CVE-2025-22293

Description: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Gutentor Gutentor allows DOM-Based XSS.This issue affects Gutentor: from n/a through 3.4.0.

CVSS: MEDIUM (6.5)

EPSS Score: 0.04%

Source: CVE
January 8th, 2025 (6 months ago)

CVE-2025-22261

Description: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Pixelite WP FullCalendar allows Stored XSS.This issue affects WP FullCalendar: from n/a through 1.5.

CVSS: MEDIUM (6.5)

EPSS Score: 0.04%

Source: CVE
January 8th, 2025 (6 months ago)

CVE-2025-22133

Description: WeGIA is a web manager for charitable institutions. Prior to 3.2.8, a critical vulnerability was identified in the /WeGIA/html/socio/sistema/controller/controla_xlsx.php endpoint. The endpoint accepts file uploads without proper validation, allowing the upload of malicious files, such as .phar, which can then be executed by the server. This vulnerability is fixed in 3.2.8.

CVSS: CRITICAL (10.0)

EPSS Score: 0.04%

Source: CVE
January 8th, 2025 (6 months ago)

CVE-2025-22132

Description: WeGIA is a web manager for charitable institutions. A Cross-Site Scripting (XSS) vulnerability was identified in the file upload functionality of the WeGIA/html/socio/sistema/controller/controla_xlsx.php endpoint. By uploading a file containing malicious JavaScript code, an attacker can execute arbitrary scripts in the context of a victim's browser. This can lead to information theft, session hijacking, and other forms of client-side exploitation. This vulnerability is fixed in 3.2.7.

CVSS: HIGH (8.3)

EPSS Score: 0.04%

Source: CVE
January 8th, 2025 (6 months ago)

CVE-2025-21624

Description: ClipBucket V5 provides open source video hosting with PHP. Prior to 5.5.1 - 239, a file upload vulnerability exists in the Manage Playlist functionality of the application, specifically surrounding the uploading of playlist cover images. Without proper checks, an attacker can upload a PHP script file instead of an image file, thus allowing a webshell or other malicious files to be stored and executed on the server. This attack vector exists in both the admin area and low-level user area. This vulnerability is fixed in 5.5.1 - 239.

CVSS: CRITICAL (9.8)

EPSS Score: 0.04%

Source: CVE
January 8th, 2025 (6 months ago)

CVE-2025-21623

Description: ClipBucket V5 provides open source video hosting with PHP. Prior to 5.5.1 - 238, ClipBucket V5 allows unauthenticated attackers to change the template directory via a directory traversal, which results in a denial of service.

CVSS: HIGH (7.5)

EPSS Score: 0.04%

Source: CVE
January 8th, 2025 (6 months ago)

CVE-2025-21622

Description: ClipBucket V5 provides open source video hosting with PHP. During the user avatar upload workflow, a user can choose to upload and change their avatar at any time. During deletion, ClipBucket checks for the avatar_url as a filepath within the avatars subdirectory. If the URL path exists within the avatars directory, ClipBucket will delete it. There is no check for path traversal sequences in the provided user input (stored in the DB as avatar_url) therefore the final $file variable could be tainted with path traversal sequences. This leads to file deletion outside of the intended scope of the avatars folder. This vulnerability is fixed in 5.5.1 - 237.

CVSS: HIGH (7.5)

EPSS Score: 0.04%

Source: CVE
January 8th, 2025 (6 months ago)