CVE-2025-11953
React Native Community CLI OS Command Injection Vulnerability - Active in CISA KEV catalog.
Critical vulnerabilities, curated daily for security professionals
See how vulnerabilities affect your specific environment
CRS uses the System Security Context Vector (SSCV) Framework v1.0 to adjust CVSS scores based on your system's exposure level, network position, and business criticality. Learn more about SSCV Framework
Yesterday's disclosures include 11 critical vulnerabilities spanning SolarWinds Serv-U, WordPress plugins, Apache Camel, and Zyxel networking equipment, marking a significant jump from the prior day's single critical CVE. 68 high-priority vulnerabilities were also disclosed, a modest 8% increase. Among the most severe, CVE-2026-23693 carries a maximum CVSS 10.0 score affecting WordPress plugin versions, while four SolarWinds Serv-U flaws (CVE-2025-40538 through CVE-2025-40541) each score 9.1 and CVE-2025-13942 targets Zyxel EX3510 devices at CVSS 9.8. Multiple Microsoft Windows and Office vulnerabilities have confirmed active exploitation, alongside Roundcube Webmail, Google Chromium, and Apple OS zero-days. No patches are currently available for the disclosed vulnerabilities, requiring defenders to prioritize compensating controls and monitoring.
Immediate action: Prioritize compensating controls for SolarWinds Serv-U, WordPress plugin, Zyxel EX3510, and Microsoft Windows/Office deployments, as no patches are currently available for any disclosed vulnerabilities. Monitor vendor advisories closely for patch releases on the 11 critical CVEs, and apply network segmentation and enhanced logging for systems with confirmed active exploitation including Roundcube Webmail and Google Chromium.
React Native Community CLI OS Command Injection Vulnerability - Active in CISA KEV catalog.
SmarterTools SmarterMail Missing Authentication for Critical Function Vulnerability - Active in CISA KEV catalog.
A protection mechanism failure in the MSHTML Framework allows an unauthenticated attacker to bypass security features over a network, potentially leading to unauthorized system access.
Microsoft Windows NULL Pointer Dereference Vulnerability - Active in CISA KEV catalog.
A protection mechanism failure in the Windows Shell allows an unauthenticated attacker to bypass security features over a network connection.
Improper privilege management in Windows Remote Desktop allows an authorized attacker to elevate their privileges locally on the affected system.
A type confusion vulnerability in the Desktop Window Manager (DWM) allows an authorized local attacker to elevate their privileges to a higher level.
A security feature bypass vulnerability in Microsoft Office Word exists due to reliance on untrusted inputs, allowing an unauthorized local attacker to circumvent security protections.
A memory corruption vulnerability in Apple software was addressed through improved state management to prevent potential exploitation.
Microsoft Configuration Manager SQL Injection Vulnerability - Active in CISA KEV catalog.
Notepad++ Download of Code Without Integrity Check Vulnerability - Active in CISA KEV catalog.
Synacor Zimbra Collaboration Suite (ZCS) Server-Side Request Forgery Vulnerability - Active in CISA KEV catalog.
TeamT5 ThreatSonar Anti-Ransomware Unrestricted Upload of File with Dangerous Type Vulnerability - Active in CISA KEV catalog.
Microsoft Windows Video ActiveX Control Remote Code Execution Vulnerability - Active in CISA KEV catalog.
Google Chrome is vulnerable to a "Use After Free" condition in its CSS engine, which could allow a remote attacker to execute arbitrary code via a crafted webpage.
GitLab Server-Side Request Forgery (SSRF) Vulnerability - Active in CISA KEV catalog.
RoundCube Webmail Deserialization of Untrusted Data Vulnerability - Active in CISA KEV catalog.
RoundCube Webmail Cross-site Scripting Vulnerability - Active in CISA KEV catalog.
An unauthenticated SQL injection vulnerability exists in the Order Up Online Ordering System 1.0 via the store_id parameter in the /api/integrations/getintegrations endpoint.
Ormar ORM aggregate queries lack sanitization in `min()` and `max()` methods, allowing unauthenticated attackers to inject raw SQL and extract entire database contents via subqueries.
The ElementsKit Lite plugin for WordPress exposes a REST endpoint without authentication, allowing unauthenticated attackers to use the site as an open proxy for Mailchimp API requests.
A broken access control vulnerability in Serv-U allows domain or group administrators to escalate privileges, create system admin users, and execute arbitrary code as a privileged account.
A type confusion vulnerability in Serv-U enables authenticated administrative users to execute arbitrary native code with the privileges of the service account.
A critical type confusion vulnerability in Serv-U allows an authenticated administrative user to execute arbitrary native code, potentially compromising the host system.
An Insecure Direct Object Reference (IDOR) vulnerability in Serv-U allows authenticated administrators to execute native code as a privileged account by manipulating object identifiers.
Apache Camel Keycloak fails to validate the issuer claim of JWT tokens, allowing tokens from one realm to be accepted by another, thereby breaking tenant isolation.
A command injection vulnerability in the UPnP function of the Zyxel EX3510-B0 router allows remote attackers to execute arbitrary OS commands via crafted SOAP requests.
The Ayms node-To master application disables TLS/SSL certificate validation by setting 'rejectUnauthorized' to false, facilitating Man-in-the-Middle (MitM) attacks.
Crypt::NaCl::Sodium for Perl contains an integer overflow on 32-bit systems when casting length pointers, potentially leading to memory corruption or cryptographic failures.
Ashop Shopping Cart Software contains a time-based blind SQL injection vulnerability that allows attackers to manipulate database queries through the blacklistitemid parameter
WebIncorp ERP contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the prod_id parameter
Inventory Webapp contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through GET parameters
DIGIT CENTRIS ERP contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the datum1, datum2, KID, and PID parameters
Web Ofisi Platinum E-Ticaret v5 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the 'q' parameter
A security flaw in ImageMagick, a popular image manipulation software, allows for potential exploitation during the processing of digital images.
Web Ofisi E-Ticaret v3 contains an unauthenticated SQL injection vulnerability in the 'a' parameter, allowing for unauthorized database manipulation.
Web Ofisi Emlak v2 is vulnerable to an unauthenticated SQL injection via the 'ara' GET parameter, enabling attackers to manipulate database queries.
Web Ofisi Firma v13 contains an unauthenticated SQL injection vulnerability via the 'oz' array parameter, allowing for the manipulation of backend database queries.
Web Ofisi Firma Rehberi v1 is vulnerable to an unauthenticated SQL injection through various GET parameters, allowing attackers to manipulate database queries.
Web Ofisi Emlak V2 contains multiple SQL injection vulnerabilities in its endpoints, allowing unauthenticated attackers to manipulate database queries via GET parameters.
Web Ofisi Platinum E-Ticaret v5 is vulnerable to an unauthenticated SQL injection via the 'q' GET parameter, allowing for unauthorized database manipulation.
Web Ofisi Rent a Car v3 contains an unauthenticated SQL injection vulnerability in the 'klima' parameter, allowing attackers to execute arbitrary SQL commands.
Valkey is a distributed key-value database
Improper validation of user-supplied input in the ZIA Admin UI could allow an authenticated administrator to initiate backend functions through specific input fields in limited scenarios
A vulnerability in the Valkey distributed key-value database could allow attackers to compromise database operations or data integrity.
A security issue in the Valkey key-value database management system may lead to unauthorized exploitation of database functions or service disruption.
Improper certificate validation (CWE-295) in JXcore JXM master allows for potential Man-in-the-Middle (MitM) attacks and data interception.
XOOPS CMS 2
Dolibarr ERP/CRM 10
A security flaw has been discovered in Tosei Online Store Management System ãããåēčįŽĄįãˇãšãã 1
A flaw has been found in Vaelsys 4
A vulnerability was determined in SourceCodester Student Result Management System 1
Dell Repository Manager (DRM), versions prior to 3
Dolibarr ERP/CRM 10
A vulnerability was detected in itsourcecode Event Management System 1
A security vulnerability has been detected in itsourcecode E-Logbook with Health Monitoring System for COVID-19 1
A weakness has been identified in itsourcecode Document Management System 1
A security vulnerability has been detected in itsourcecode Document Management System 1
Zohocorp ManageEngine ADSelfService Plus versions 6522 and below are vulnerable to authenticated SQL Injection in the search report option
NoviSmart CMS is vulnerable to a high-severity SQL injection via the Referer HTTP header, allowing remote attackers to execute arbitrary SQL queries against the database.
A security vulnerability has been detected in D-Link DWR-M960 1
A vulnerability was detected in D-Link DWR-M960 1
A flaw has been found in D-Link DWR-M960 1
A vulnerability has been found in D-Link DWR-M960 1
A vulnerability was found in D-Link DWR-M960 1
A vulnerability has been found in Tenda AC8 16
A post-authentication command injection vulnerability in the log file download function of the Zyxel EX3301-T0 firmware versions through 5
Tenda FH1203 V2
A post-authentication command injection vulnerability in the TR-369 certificate download CGI program of the Zyxel VMG3625-T50B firmware versions through 5
A vulnerability in the New API large language model (LLM) gateway and AI asset management system could allow for unauthorized access or manipulation of AI resources.
An unauthenticated SQL injection vulnerability in microASP Portal+ CMS allows remote attackers to execute arbitrary SQL queries via the explode_tree parameter.
A privilege escalation (PE) vulnerability in the Tencent iOA app thru 210
A privilege escalation (PE) vulnerability in the Tencent PC Manager app thru 17
A vulnerability was found in UTT HiPER 810G up to 1
A vulnerability was determined in UTT HiPER 810G up to 1
A vulnerability was identified in UTT HiPER 810G up to 1
yt-dlp is a command-line audio/video downloader
Versions of the Traccar open-source GPS tracking system starting with 6
ImageMagick is free and open-source software used for editing and manipulating digital images
Web Wiz Forums 12
ImageMagick is free and open-source software used for editing and manipulating digital images
TOTOLink X5000R v9
A DLL Hijacking vulnerability in eAI Technologies ERP allows authenticated local attackers to execute arbitrary code by placing a malicious DLL in the application directory.
When the "Silent Just-In-Time Provisioning" feature is enabled for a federated identity provider (IDP) there is a risk that a local user store user's information may be replaced during the account provisioning process in cases where federated users share the same username as local users
ImageMagick is free and open-source software used for editing and manipulating digital images
ImageMagick is free and open-source software used for editing and manipulating digital images
ImageMagick is free and open-source software used for editing and manipulating digital images
ImageMagick is free and open-source software used for editing and manipulating digital images
ImageMagick is free and open-source software used for editing and manipulating digital images
A vulnerability was determined in Zaher1307 tiny_web_server up to 8d77b1044a0ca3a5297d8726ac8aa2cf944d481b
A flaw has been found in ShuoRen Smart Heating Integrated Management Platform 1
A vulnerability has been found in erzhongxmu JEEWMS 3
Versions of the Traccar open-source GPS tracking system up to and including 6
A vulnerability was determined in DataLinkDC dinky up to 1
A vulnerability has been found in UTT HiPER 810G up to 1
A flaw was found in the 389-ds-base server
Versions of the Traccar open-source GPS tracking system up to and including 6