CVE-2025-68613
n8n Improper Control of Dynamically-Managed Code Resources Vulnerability - Active in CISA KEV catalog.
Critical vulnerabilities, curated daily for security professionals
See how vulnerabilities affect your specific environment
CRS uses the System Security Context Vector (SSCV) Framework v1.0 to adjust CVSS scores based on your system's exposure level, network position, and business criticality. Learn more about SSCV Framework
Tuesday's disclosures reveal 21 critical vulnerabilities, a 425% increase from Monday's 4, with HP AVideo accounting for six of the top critical entries including a CVSS 10.0 flaw (CVE-2026-33478). High-priority disclosures also climbed significantly to 100, up 113% from 47 the prior day, bringing the total to 121 CVEs requiring triage. WordPress plugin vulnerabilities (CVE-2026-4001, CVE-2026-4283) and a Tenda A15 router flaw (CVE-2026-4567) round out the critical tier, while 15 actively exploited vulnerabilities target Apple, Google Chrome, n8n, and Zimbra. No patches are currently available for the newly disclosed critical issues, requiring defenders to prioritize compensating controls and network-level mitigations.
Immediate action: Organizations running HP AVideo, WordPress with affected plugins, or Tenda A15 routers should apply network segmentation and restrict access immediately given the absence of patches. Review exposure to the 15 actively exploited vulnerabilities targeting Apple products, Google Chrome, n8n, Zimbra, and Wing FTP Server, and apply any available vendor updates for those KEV entries as a priority.
n8n Improper Control of Dynamically-Managed Code Resources Vulnerability - Active in CISA KEV catalog.
Hikvision Multiple Products Improper Authentication Vulnerability - Active in CISA KEV catalog.
Rockwell Multiple Products Insufficient Protected Credentials Vulnerability - Active in CISA KEV catalog.
Apple Multiple products Use-After-Free Vulnerability - Active in CISA KEV catalog.
Apple Multiple Products Integer Overflow or Wraparound Vulnerability - Active in CISA KEV catalog.
Apple iOS and iPadOS Use-After-Free Vulnerability - Active in CISA KEV catalog.
Google Chrome versions prior to 146 feature an inappropriate implementation in the V8 JavaScript engine that is currently being exploited in the wild to achieve code execution.
Google Chrome versions prior to 146 contain an out-of-bounds write vulnerability in the Skia graphics engine, which is currently being exploited in the wild.
Wing FTP Server Information Disclosure Vulnerability - Active in CISA KEV catalog.
Synacor Zimbra Collaboration Suite (ZCS) Cross-Site Scripting Vulnerability - Active in CISA KEV catalog.
Craft CMS Code Injection Vulnerability - Active in CISA KEV catalog.
Laravel Livewire Code Injection Vulnerability - Active in CISA KEV catalog.
Apple Multiple Products Improper Locking Vulnerability - Active in CISA KEV catalog.
Apple Multiple Products Classic Buffer Overflow Vulnerability - Active in CISA KEV catalog.
Apple Multiple Products Buffer Overflow Vulnerability - Active in CISA KEV catalog.
The Woocommerce Custom Product Addons Pro plugin for WordPress is vulnerable to unauthenticated Remote Code Execution (RCE) via the PHP eval() function in custom pricing formulas.
WWBN AVideo contains a vulnerability chain allowing unauthenticated remote code execution via exposed clone secrets, database dumps, and OS command injection.
An unauthenticated Server-Side Request Forgery (SSRF) vulnerability in WWBN AVideo's Live plugin allows attackers to probe internal networks and cloud metadata endpoints.
WWBN AVideo is vulnerable to an unauthenticated SQL injection in the getAllCategories() method due to insufficient sanitization of the doNotShowCats parameter.
A critical improper input validation vulnerability (CWE-20) in MolotovCherry Android-ImageMagick7 can lead to severe system instability or unauthorized code execution.
WWBN AVideo contains an authentication bypass in the Live plugin's standalone control endpoint. Attackers can redirect token verification to a malicious server to gain control over live streams.
A logic error in AVideo's CustomizeUser plugin causes non-numeric passwords to be stored as "0". This allows any visitor to bypass channel access controls by entering the integer zero.
WWBN AVideo is vulnerable to unauthenticated Server-Side Request Forgery (SSRF) via the `webSiteRootURL` parameter. Attackers can use the server to fetch internal resources.
The WP DSGVO Tools (GDPR) plugin for WordPress allows unauthenticated attackers to permanently destroy non-administrator accounts by bypassing the email confirmation flow via AJAX.
A stack-based buffer overflow in the Tenda A15 UploadCfg function allows remote attackers to execute arbitrary code via a malicious File argument.
An unauthenticated remote attacker can escape a restricted CLI interface in certain Linux-based operating systems to gain root access.
An unauthenticated remote attacker can exploit an OS command injection vulnerability in the SAP com_mb24sysapi module, leading to full system compromise and remote code execution.
Tiandy Easy7 Integrated Management Platform contains an OS command injection vulnerability in its Configuration Handler, allowing remote attackers to execute commands via the File argument.
OpenClaw fails to properly validate headers during cross-origin redirects, leading to the leakage of sensitive authorization headers like API keys to untrusted destinations.
Census CSWeb 8.0.1 exposes the "app/config" directory via HTTP, allowing unauthenticated attackers to download configuration files and obtain sensitive secrets.
Graphiti framework versions prior to 1.10.2 are vulnerable to arbitrary method execution, allowing attackers to invoke destructive operations on underlying models via malicious JSONAPI payloads.
Tekton Pipelines project provides k8s-style resources for declaring CI/CD-style pipelines. Starting in version 1.0.0 and prior to versions 1.0.1, 1.3.3, 1.6.1, 1.9.2, and 1.10.2, the Tekton Pipelines git resolver is vulnerable to path traversal via the `pathInRepo` parameter. A tenant with permission to create `ResolutionRequests` (e.g. by creating `TaskRuns` or `PipelineRuns` that use the git resolver) can read arbitrary files from the resolver pod's filesystem, including ServiceAccount tokens. The file contents are returned base64-encoded in `resolutionrequest.status.data`. Versions 1.0.1, 1.3.3, 1.6.1, 1.9.2, and 1.10.2 contain a patch.
GoHarbor Harbor version 2.15.0 and below uses hard-coded credentials, allowing unauthenticated attackers to gain administrative access to the web user interface.
The jsrsasign library is vulnerable to incomplete comparison checks in cryptographic functions, allowing attackers to bias DSA nonces and recover private keys.
Out-of-bounds Read vulnerability in fabiangreffrath woof.This issue affects woof: before woof_15.3.0.
Out-of-bounds Read vulnerability in slajerek RetroDebugger.This issue affects RetroDebugger: before v0.64.72.
Heap buffer overflow in WebAudio in Google Chrome prior to 146
Heap buffer overflow in WebGL in Google Chrome prior to 146
Use after free in Dawn in Google Chrome prior to 146
Use after free in WebGPU in Google Chrome prior to 146
Use after free in FedCM in Google Chrome prior to 146
Out of bounds read in CSS in Google Chrome prior to 146
Inappropriate implementation in WebAudio in Google Chrome prior to 146
Integer overflow in Fonts in Google Chrome prior to 146
WWBN AVideo, an open-source video platform, is affected by a high-severity vulnerability that could lead to unauthorized access or data compromise.
Mod_gnutls is a TLS module for Apache HTTPD based on GnuTLS
The ReviewX WordPress plugin is vulnerable to arbitrary method calls, which could allow attackers to execute unauthorized functions within the application.
The Contest Gallery plugin for WordPress is vulnerable to an authentication bypass leading to admin account takeover in all versions up to, and including, 28
The WP Maps WordPress plugin is vulnerable to time-based SQL Injection via the âorderbyâ parameter, allowing attackers to extract sensitive database information.
The WP Job Portal plugin for WordPress is vulnerable to SQL Injection via the 'radius' parameter in all versions up to, and including, 2
The JetEngine plugin for WordPress is vulnerable to SQL Injection via the `listing_load_more` AJAX action in all versions up to, and including, 3
The Jupiter X Core plugin for WordPress is vulnerable to limited file uploads due to missing authorization on import_popup_templates() function as well as insufficient file type validation in the upload_files() function in all versions up to, and including, 4
Out-of-bounds Write vulnerability in MolotovCherry Android-ImageMagick7
WWBN AVideo is an open source video platform
WWBN AVideo is an open source video platform
WWBN AVideo is an open source video platform
Out-of-bounds Write vulnerability in MolotovCherry Android-ImageMagick7
WWBN AVideo is an open source video platform
Ella Core is a 5G core designed for private networks
Missing Release of Memory after Effective Lifetime vulnerability in MolotovCherry Android-ImageMagick7
Missing Release of Memory after Effective Lifetime vulnerability in MolotovCherry Android-ImageMagick7
Easy Chat Server 3
WWBN AVideo is an open source video platform
A security flaw has been discovered in MacCMS 2025
A vulnerability was identified in code-projects Simple Laundry System 1
A security flaw has been discovered in code-projects Simple Laundry System 1
A weakness has been identified in code-projects Simple Laundry System 1
WWBN AVideo is an open source video platform
A weakness has been identified in SourceCodester Patients Waiting Area Queue Management System 1
A security vulnerability has been detected in DefaultFuction Jeson-Customer-Relationship-Management-System up to 1b4679c4d06b90d31dd521c2b000bfdec5a36e00
WWBN AVideo is an open source video platform
WWBN AVideo is an open source video platform
WWBN AVideo is an open source video platform
WWBN AVideo, an open-source video platform, is affected by a high-severity vulnerability. The flaw could permit unauthorized access or administrative bypass.
WWBN AVideo is an open source video platform
WWBN AVideo is an open source video platform
WWBN AVideo is an open source video platform
WWBN AVideo is an open source video platform
WWBN AVideo is an open source video platform
WWBN AVideo is an open source video platform
WWBN AVideo is an open source video platform
WWBN AVideo is an open source video platform
A vulnerability has been found in itsourcecode Free Hotel Reservation System 1
A high-severity vulnerability has been identified in Axessh 4. This security flaw could allow for unauthorized remote access or command execution via the SSH service.
A vulnerability was found in Tenda F453 1
A vulnerability was determined in Tenda F453 1
A vulnerability was identified in Tenda F453 1
A weakness has been identified in D-Link DIR-513 1
A flaw has been found in Linksys MR9600 2
A vulnerability was detected in Tenda AC21 16
Vulnerability in Spring Cloud when substituting the profile parameter from a request made to the Spring Cloud Config Server configured to the native file system as a backend, because it was possible to access files outside of the configured search directories
An unauthenticated remote attacker can exploit a Pre-Auth blind SQL Injection vulnerability in the userinfo endpointâs authentication method due to improper neutralization of special elements in a SQL SELECT command
Vitals ESP developed by Galaxy Software Services has a Incorrect Authorization vulnerability, allowing authenticated remote attackers to perform certain administrative functions, thereby escalating privileges
Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in linkingvision rapidvms
Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in linkingvision rapidvms
A low-privileged remote attacker may be able to replace the boot application of the CODESYS Control runtime system, enabling unauthorized code execution
The Intel EPT paging code uses an optimization to defer flushing of any cached EPT state until the p2m lock is dropped, so that multiple modifications done under the same locked region only issue a single flush
Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in linkingvision rapidvms
A vulnerability was found in SourceCodester E-Commerce Site 1
Vitals ESP developed by Galaxy Software Services has a Missing Authentication vulnerability, allowing unauthenticated remote attackers to execute certain functions to obtain sensitive information
An unauthenticated remote attacker may be able to control the format string of messages processed by the Audit Log of the CODESYS Control runtime system, potentially resulting in a denialâofâservice (DoS) condition
MiniFtp contains a buffer overflow vulnerability in the `parseconf_load_setting` function. This flaw allows local attackers to execute arbitrary code by providing oversized configuration values.
A high-severity flaw has been identified in the Belkin F9K1122 router, which could allow for unauthorized access or device compromise.
WWBN AVideo is an open source video platform
Census CSWeb 8
Census CSWeb 8
Connect-CMS is a content management system
Versions of the package jsrsasign before 11
Connect-CMS is a content management system
TuneClone 2
DVDXPlayer Pro 5
Iperius Backup 6
JetAudio jetCast Server 2
Lavavo CD Ripper 4
FTP Shell Server 6
cgltf version 1
Connect-CMS is a content management system
Connect-CMS is a content management system
Admin Express 1
llama
Out-of-bounds Write vulnerability in WujekFoliarz DualSenseY-v2
Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in joncampbell123 doslib
EquityPandit 1
Versions of the package jsrsasign before 11
Versions of the package jsrsasign before 11
A flaw was found in the `github
A NULL pointer dereference in the daap_reply_playlists function (src/httpd_daap
A NULL pointer dereference in the safe_atou64 function (src/misc
strongSwan versions 4
cbor2 provides encoding and decoding for the Concise Binary Object Representation (CBOR) serialization format
Connect-CMS is a content management system
Salvo is a Rust web framework
Freeciv21 is a free open source, turn-based, empire-building strategy game
Versions of the package jsrsasign before 11
A vulnerability has been found in erupts erupt up to 1
A vulnerability was identified in SourceCodester Online Catering Reservation 1