CVE-2025-32432
Craft CMS Code Injection Vulnerability - Active in CISA KEV catalog.
Critical vulnerabilities, curated daily for security professionals
See how vulnerabilities affect your specific environment
CRS uses the System Security Context Vector (SSCV) Framework v1.0 to adjust CVSS scores based on your system's exposure level, network position, and business criticality. Learn more about SSCV Framework
Thursday's vulnerability disclosures include a CVSS 10.0 flaw in Canonical Juju and multiple critical Cisco and Google Chrome vulnerabilities requiring immediate attention. The day's 28 critical CVEs represent a 65% increase from the prior day's 17, alongside a steady 100 high-priority vulnerabilities. Notable disclosures include CVE-2026-4370 (Canonical Juju, CVSS 10.0), CVE-2026-20093 and CVE-2026-20160 (Cisco management platforms, both CVSS 9.8), and three Google Chrome flaws each scoring CVSS 9.6. Attack patterns center on code injection, remote code execution, and management interface compromise across enterprise infrastructure. With 0% patch availability reported at disclosure time, organizations should monitor vendor advisories closely and apply mitigations as they become available.
Immediate action: Prioritize monitoring vendor advisories for Canonical Juju, Cisco IMC, Cisco Smart Software Manager, and Google Chrome, as these carry the highest severity scores. With no patches currently available, apply any published workarounds or network-level mitigations and restrict access to affected management interfaces until fixes are released.
Craft CMS Code Injection Vulnerability - Active in CISA KEV catalog.
Laravel Livewire Code Injection Vulnerability - Active in CISA KEV catalog.
Apple Multiple Products Improper Locking Vulnerability - Active in CISA KEV catalog.
Apple Multiple Products Classic Buffer Overflow Vulnerability - Active in CISA KEV catalog.
Apple Multiple Products Buffer Overflow Vulnerability - Active in CISA KEV catalog.
Langflow Code Injection Vulnerability - Active in CISA KEV catalog.
Aquasecurity Trivy Embedded Malicious Code Vulnerability - Active in CISA KEV catalog.
A flaw in Reviactyl's OAuth flow allows unauthenticated account takeover by linking social accounts via matching email addresses without password verification.
MetInfo CMS versions 7.9, 8.0, and 8.1 contain an unauthenticated PHP code injection vulnerability that allows remote attackers to execute arbitrary code by sending crafted requests with malicious PHP code. Attackers can exploit insufficient input neutralization in the execution path to achieve remote code execution and gain full control over the affected server.
A use-after-free vulnerability in Google Chrome's Android WebView allows remote attackers to execute a sandbox escape via crafted HTML content.
A use-after-free vulnerability in the Navigation component of Google Chrome allows a remote attacker to perform a sandbox escape via a crafted HTML page.
A use-after-free vulnerability in the Compositing component of Google Chrome enables a remote attacker to achieve a sandbox escape through crafted HTML content.
Juju's internal Dqlite database fails to validate TLS certificates, allowing unauthenticated attackers to join the cluster and gain full read/write access to the database.
The Order Notification for WooCommerce WordPress plugin before 3.6.3 overrides permission checks, granting unauthenticated users full read/write access to store resources.
A Stored Cross-Site Scripting (XSS) vulnerability in the CI4MS backend user management allows attackers to inject malicious JavaScript, leading to full administrative account compromise.
An authentication bypass in Cisco IMC's password change functionality allows unauthenticated remote attackers to reset any user's password and gain administrative access.
The exposure of an internal service in Cisco SSM On-Prem allows unauthenticated remote attackers to execute arbitrary commands with root privileges via crafted API requests.
CI4MS versions prior to 0.31.0.0 are vulnerable to Stored XSS in the blog category title field, allowing malicious scripts to execute on both public and administrative pages.
CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready, modular architecture with RBAC authorization and theme support. Prior to version 0.31.0.0, the application fails to properly sanitize user-controlled input when creating or editing blog tags. An attacker can inject a malicious JavaScript payload into the tag name field, which is then stored server-side. This stored payload is later rendered unsafely across public tag pages and administrative interfaces without proper output encoding, leading to stored cross-site scripting (XSS). This issue has been patched in version 0.31.0.0.
CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready, modular architecture with RBAC authorization and theme support. Prior to version 0.31.0.0, the application fails to properly sanitize user-controlled input when handling backup uploads and processing backup metadata. An attacker can inject a malicious JavaScript payload into the backup filename via the uploaded xss.sql, which uses SQL functionality to insert the XSS payload server-side. This stored payload is later rendered unsafely in multiple backup management views without proper output encoding, leading to stored blind cross-site scripting (Blind XSS). This issue has been patched in version 0.31.0.0.
CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready, modular architecture with RBAC authorization and theme support. Prior to version 0.31.0.0, the application fails to properly sanitize user-controlled input within the Page Management functionality when creating or editing pages. Multiple input fields accept attacker-controlled JavaScript payloads that are stored server-side. These stored values are later rendered without proper output encoding across administrative page lists and public-facing page views, leading to stored DOM-based cross-site scripting (XSS). This issue has been patched in version 0.31.0.0.
CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready, modular architecture with RBAC authorization and theme support. Prior to version 0.31.0.0, the application fails to properly sanitize user-controlled input when creating or editing blog posts within the Categories section. An attacker can inject a malicious JavaScript payload into the Categories content, which is then stored server-side. This stored payload is later rendered unsafely when the Categories are viewed via blog posts, without proper output encoding, leading to stored cross-site scripting (XSS). This issue has been patched in version 0.31.0.0.
CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready, modular architecture with RBAC authorization and theme support. Prior to version 0.31.0.0, the application fails to properly sanitize user-controlled input when creating or editing blog posts. An attacker can inject a malicious JavaScript payload into blog post content, which is then stored server-side. This stored payload is later rendered unsafely in multiple application views without proper output encoding, leading to stored cross-site scripting (XSS). This issue has been patched in version 0.31.0.0.
A buffer overflow vulnerability in Mbed TLS and TF-PSA-Crypto occurs during FFDH public key export, potentially leading to remote code execution.
TOTOlink A3600R v5.9c.4959 contains a buffer overflow vulnerability in the setAppEasyWizardConfig interface of /lib/cste_modules/app.so. The vulnerability occurs because the rootSsid parameter is not properly validated for length, allowing remote attackers to trigger a buffer overflow, potentially leading to arbitrary code execution or denial of service.
An unauthenticated attacker can achieve remote code execution and ASLR bypass in llama.cpp by exploiting a lack of bounds validation in the RPC backend's tensor deserialization.
Improper input validation in Mbed TLS FFDH allows attackers to force shared secrets into a small set of values, compromising protocols that rely on contributory behavior.
XenForo versions prior to 2.3.7 contain a critical security flaw in Passkey-based authentication that could allow attackers to compromise user accounts.
There is an injection vulnerability in jeecg boot versions 3.0.0 to 3.5.3 due to lax character filtering, which allows attackers to execute arbitrary code on components through specially crafted HTTP requests.
A command injection vulnerability in the component /jmreport/show of jeecg boot v3.0.0 to v3.5.3 allows attackers to execute arbitrary code via a crafted HTTP request.
A Remote Code Execution (RCE) vulnerability exists in DedeCMS 5.7.118. Attackers can execute arbitrary code by utilizing crafted setup tag values during a module upload process.
Payload is a free and open source headless content management system. Prior to version 3.79.1 in @payloadcms/graphql and payload, a vulnerability in the password recovery flow could allow an unauthenticated attacker to perform actions on behalf of a user who initiates a password reset. This issue has been patched in version 3.79.1 for @payloadcms/graphql and payload.
CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready, modular architecture with RBAC authorization and theme support. Prior to version 0.31.0.0, the application renders user-controlled input unsafely within the logs interface. If any stored XSS payload exists within logged data, it is rendered without proper output encoding. This issue becomes a Blind XSS scenario because the attacker does not see immediate execution. Instead, the payload is stored within application logs and only executes later when an administrator views the logs page. This issue has been patched in version 0.31.0.0.
CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready, modular architecture with RBAC authorization and theme support. Prior to version 0.31.0.0, the application fails to properly sanitize user-controlled input when adding Pages to navigation menus through the Menu Management functionality. Page-related data selected via the Pages section is stored server-side and rendered without proper output encoding. This stored payload is later rendered unsafely within administrative interfaces and public-facing navigation menus, leading to stored DOM-based cross-site scripting (XSS). This issue has been patched in version 0.31.0.0.
CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready, modular architecture with RBAC authorization and theme support. Prior to version 0.31.0.0, the application fails to properly sanitize user-controlled input when adding Posts to navigation menus through the Menu Management functionality. Post-related data selected via the Posts section is stored server-side and rendered without proper output encoding. These stored values are later rendered unsafely within administrative dashboards and public-facing navigation menus, resulting in stored DOM-based cross-site scripting (XSS). This issue has been patched in version 0.31.0.0.
A use-after-free vulnerability exists in the Dawn component of Google Chrome. This flaw allows attackers to potentially execute arbitrary code or cause a denial-of-service via a crafted HTML page.
Auth0-PHP is a PHP SDK for Auth0 Authentication and Management APIs
Heap buffer overflow in GPU in Google Chrome prior to 146
Heap buffer overflow in ANGLE in Google Chrome on Mac prior to 146
Use after free in Web MIDI in Google Chrome on Android prior to 146
Use after free in WebCodecs in Google Chrome prior to 146
Use after free in WebGL in Google Chrome prior to 146
Use after free in Dawn in Google Chrome prior to 146
Use after free in PDF in Google Chrome prior to 146
Use after free in Dawn in Google Chrome prior to 146
Integer overflow in Codecs in Google Chrome prior to 146
Object corruption in V8 in Google Chrome prior to 146
Out of bounds read in WebCodecs in Google Chrome prior to 146
Out of bounds read in WebCodecs in Google Chrome prior to 146
Integer overflow in ANGLE in Google Chrome on Windows prior to 146
A vulnerability in the web-based management interface of Cisco IMC could allow an authenticated, remote attacker with read-only privileges to perform command injection attacks on an affected system and execute arbitrary commands as the root user
A vulnerability in the web-based management interface of Cisco Evolved Programmable Network Manager (EPNM) could allow an authenticated, remote attacker with low privileges to access sensitive information that they are not authorized to access
Open Neural Network Exchange (ONNX) is an open standard for machine learning interoperability
An arbitrary file overwrite vulnerability in Ora Tools PDF Reader ' Reader & Editor APPv4
An arbitrary file overwrite vulnerability in Docudepot PDF Reader: PDF Viewer APP v1
The MW WP Form plugin for WordPress is vulnerable to arbitrary file moving due to insufficient file path validation via the 'generate_user_filepath' function and the 'move_temp_file_to_upload_dir' function in all versions up to, and including, 5
JOSE is a Javascript Object Signing and Encryption (JOSE) library
FastGPT, an AI Agent building platform, contains a security vulnerability that could lead to unauthorized access or manipulation of AI agent configurations.
Admidio is an open-source user management solution
WWBN AVideo is an open source video platform
A Business Logic vulnerability exists in SourceCodester Pharmacy Product Management System 1
A flaw has been found in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20260205
A vulnerability has been found in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20260205
A vulnerability was determined in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20260205
A vulnerability was found in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20260205
Mbed TLS before 3
WWBN AVideo is an open source video platform
NVIDIA BioNeMo contains a vulnerability where a user could cause a deserialization of untrusted data
NVIDIA BioNeMo contains a vulnerability where a user could cause a deserialization of untrusted data
A vulnerability was determined in Tenda CH22 1
Mbed TLS 3
An issue was discovered in Mbed TLS through 3
NVIDIA Jetson for JetPack contains a vulnerability in the system initialization logic, where an unprivileged attacker could cause the initialization of a resource with an insecure default
IBM Verify Identity Access Container 11
The application's update service, when checking for updates, loads certain system libraries from a search path that includes directories writable by lowâprivileged users and is not strictly restricted to trusted system locations
NVIDIA Jetson Linux has vulnerability in initrd, where an unprivileged attacker with physical access coul inject incorrect command line arguments
IBM Storage Protect Server 8
OpenClaw before 2026
PdfDing is a selfhosted PDF manager, viewer and editor offering a seamless user experience on multiple devices
XenForo before 2
XenForo before 2
ByteDance Deer-Flow versions prior to commit 92c7a20 contain a sandbox escape vulnerability in bash tool handling that allows attackers to execute arbitrary commands on the host system by bypassing regex-based validation using shell features such as directory changes and relative paths
A flaw was found in libinput
CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready, modular architecture with RBAC authorization and theme support
HCL BigFix Platform is affected by insecure permissions on private cryptographic keys
A Stored Cross-site Scripting (XSS) vulnerability affecting Document Management in ENOVIA Collaborative Industry Innovator from Release 3DEXPERIENCE R2023x through Release 3DEXPERIENCE R2025x allows an attacker to execute arbitrary script code in user's browser session
A Stored Cross-site Scripting (XSS) vulnerability affecting Factory Resource Management in DELMIA Factory Resource Manager from Release 3DEXPERIENCE R2023x through Release 3DEXPERIENCE R2025x allows an attacker to execute arbitrary script code in user's browser session
Payload is a free and open source headless content management system
An arbitrary file overwrite vulnerability in UXGROUP LLC Voice Recorder v10
SiYuan is a personal knowledge management system
Payload is a free and open source headless content management system
OpenClaw before 2026
An arbitrary file overwrite vulnerability in Deep Thought Industries ACE Scanner PDF Scanner v1
An arbitrary file overwrite vulnerability in Tinybeans Private Family Album App v5
OpenClaw before 2026
SciTokens C++ is a minimal library for creating and using SciTokens from C or C++
Cr*nMaster (cronmaster) is a Cronjob management UI with human readable syntax, live logging and log history for cronjobs
A flaw was found in Corosync
Improper authentication in the OAuth login functionality in Devolutions Server 2026
Improper authentication in the two-factor authentication (2FA) feature in Devolutions Server 2026
Sereal::Decoder versions from 4
Sereal::Encoder versions from 4
OpenClaw before 2026
OpenClaw before 2026
OpenClaw before 2026
SciTokens C++ is a minimal library for creating and using SciTokens from C or C++
Impact: The fix for CVE-2021-23337 (https://github
Tina is a headless content management system
File Browser is a file managing interface for uploading, deleting, previewing, renaming, and editing files within a specified directory
An integer overflow vulnerability in 'pdf-image
InfCode's terminal auto-execution module contains a critical command filtering vulnerability that renders its blacklist security mechanism completely ineffective
The application's list box calculate array logic keeps stale references to page or form objects after they are deleted or re-created, which allows crafted documents to trigger a use-after-free when the calculation runs and can potentially lead to arbitrary code execution
V-SFT versions 6
V-SFT versions 6
V-SFT versions 6
V-SFT versions 6
V-SFT versions 6
Trino is a distributed SQL query engine for big data analytics
Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline
Payload is a free and open source headless content management system
A directory traversal vulnerability in the agentic-context-engine project versions up to 0
InvoiceShelf is an open-source web & mobile app that helps track expenses, payments and create professional invoices and estimates
InvoiceShelf is an open-source web & mobile app that helps track expenses, payments and create professional invoices and estimates
InvoiceShelf is an open-source web & mobile app that helps track expenses, payments and create professional invoices and estimates
File Browser is a file managing interface for uploading, deleting, previewing, renaming, and editing files within a specified directory
A flaw was found in the gdk-pixbuf library
OpenClaw before 2026
mppx is a TypeScript interface for machine payments protocol
PAGI::Middleware::Session::Store::Cookie versions through 0
Out-of-bounds write in the streaming decoder component in aws-c-event-stream before 0
Parse Server is an open source backend that can be deployed to any infrastructure that can run Node
SiYuan is a personal knowledge management system
XenForo before 2
A regression in the way hashes were calculated caused rules containing the address range syntax (x
A flaw was found in Corosync