CVE-2023-52163 (reserved 2023, disclosed 2025)
Digiever DS-2105 Pro Missing Authorization Vulnerability - Active in CISA KEV catalog.
Critical vulnerabilities, curated daily for security professionals
See how vulnerabilities affect your specific environment
CRS uses the System Security Context Vector (SSCV) Framework v1.0 to adjust CVSS scores based on your system's exposure level, network position, and business criticality. Learn more about SSCV Framework
Wednesday's brief contains 14 critical vulnerabilities, unchanged from the prior day's count. High-priority CVEs increased substantially to 88, a 49% rise from yesterday's 59 disclosures. Two actively exploited vulnerabilities require attention: CVE-2023-52163 affecting Digiever DS-2105 Pro and CVE-2025-14847 impacting MongoDB Server. Notable critical disclosures include CVE-2025-30996 (CVSS 9.9) in Themify WordPress plugins, multiple WordPress privilege escalation flaws (CVE-2025-14996, CVE-2025-15001), and CVE-2025-15471 affecting TRENDnet devices. Patch availability currently stands at 0%, requiring organizations to implement compensating controls until vendor fixes become available.
Immediate action: Organizations using WordPress with Themify, AS Password Field, or FS Registration Password plugins should restrict administrative access and monitor for unauthorized account changes. MongoDB Server and Digiever DS-2105 Pro deployments require immediate review given active exploitation, with network segmentation recommended until patches are released.
Digiever DS-2105 Pro Missing Authorization Vulnerability - Active in CISA KEV catalog.
MongoDB and MongoDB Server Improper Handling of Length Parameter Inconsistency Vulnerability - Active in CISA KEV catalog.
Unrestricted Upload of File with Dangerous Type vulnerability in Themify Themify Sidepane WordPress Theme, Themify Themify Newsy, Themify Themify Folo, Themify Themify Edmin, Themify Bloggie, Themify Photobox, Themify Wigi, Themify Rezo, Themify Slide allows Upload a Web Shell to a Web Server.This issue affects Themify Sidepane WordPress Theme: from n/a through 1.9.8; Themify Newsy: from n/a through 1.9.9; Themify Folo: from n/a through 1.9.6; Themify Edmin: from n/a through 2.0.0; Bloggie: from n/a through 2.0.8; Photobox: from n/a through 2.0.1; Wigi: from n/a through 2.0.1; Rezo: from n/a through 1.9.7; Slide: from n/a through 1.7.5.
The AS Password Field In Default Registration Form plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 2.0.0. This is due to the plugin not properly validating a user's identity prior to updating their password. This makes it possible for unauthenticated attackers to change arbitrary user's passwords, including administrators, and leverage that to gain access to their account.
The FS Registration Password plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 1.0.1. This is due to the plugin not properly validating a user's identity prior to updating their password. This makes it possible for unauthenticated attackers to change arbitrary user's passwords, including administrators, and leverage that to gain access to their account.
Crypt::Sodium::XS module versions prior toΒ 0.000042,Β for Perl, include a vulnerable version of libsodium libsodium <= 1.0.20 or a version of libsodium released before December 30, 2025 contains a vulnerability documented as CVE-2025-69277Β https://www.cve.org/CVERecord?id=CVE-2025-69277 . The libsodium vulnerability states: In atypical use cases involving certain custom cryptography or untrusted data to crypto_core_ed25519_is_valid_point, mishandles checks for whether an elliptic curve point is valid because it sometimes allows points that aren't in the main cryptographic group. 0.000042 includes a version ofΒ libsodium updated to 1.0.20-stable, released January 3, 2026, which includes a fix for the vulnerability.
An issue was discovered in NJHYST HY511 POE core before 2.1 and plugins before 0.1. The vulnerability stems from the device's insufficient cookie verification, allowing an attacker to directly request the configuration file address and download the core configuration file without logging into the device management backend. By reading the corresponding username and self-decrypted MD5 password in the core configuration file, the attacker can directly log in to the backend, thereby bypassing the front-end backend login page.
Blue Access Cobalt v02.000.195 suffers from an authentication bypass vulnerability, which allows an attacker to selectively proxy requests in order to operate functionality on the web application without the need to authenticate with legitimate credentials.
Arteco Web Client DVR/NVR contains a session hijacking vulnerability with insufficient session ID complexity that allows remote attackers to bypass authentication. Attackers can brute force session IDs within a specific numeric range to obtain valid sessions and access live camera streams without authorization.
An issue in H3C M102G HM1A0V200R010 wireless controller and BA1500L SWBA1A0V100R006 wireless access point, there is a misconfiguration vulnerability about vsftpd. Through this vulnerability, all files uploaded anonymously via the FTP protocol is automatically owned by the root user and remote attackers could gain root-level control over the devices.
A vulnerability was detected in TRENDnet TEW-713RE 1.02. The impacted element is an unknown function of the file /goformX/formFSrvX. The manipulation of the argument SZCMD results in os command injection. It is possible to launch the attack remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Insufficient Verification of Data Authenticity vulnerability in TECNO Mobile com.Afmobi.Boomplayer allows Authentication Bypass.This issue affects com.Afmobi.Boomplayer: 7.4.63.
iccDEV provides a set of libraries and tools for working with ICC color management profiles. Versions 2.3.1 and below contain a Use After Free vulnerability in the CIccXform::Create() function, where it deletes the hint. This issue is fixed in version 2.3.1.1.
Plexus anblick Digital Signage Management 3.1.13 contains an open redirect vulnerability in the 'PantallaLogin' script that allows attackers to manipulate the 'pagina' GET parameter. Attackers can craft malicious links that redirect users to arbitrary websites by exploiting improper input validation in the parameter.
Sony BRAVIA Digital Signage 1.7.8 contains an insecure direct object reference vulnerability that allows attackers to bypass authorization controls. Attackers can access hidden system resources like '/#/content-creation' by manipulating client-side access restrictions.
Missing Authorization vulnerability in Sfwebservice InWave Jobs allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects InWave Jobs: from n/a through 3.5.8.
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in jwsthemes FreeAgent allows PHP Local File Inclusion
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Elated-Themes FrappΓ© allows PHP Local File Inclusion
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Jwsthemes Issabella allows PHP Local File Inclusion
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Mojoomla WPCHURCH allows PHP Local File Inclusion
Incorrect Privilege Assignment vulnerability in AA-Team Premium Age Verification / Restriction for WordPress, AA-Team Responsive Coming Soon Landing Page / Holding Page for WordPress allows Privilege Escalation
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in VanKarWai Calafate calafate allows PHP Local File Inclusion
The Download Manager plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 3
The BuddyPress Xprofile Custom Field Types plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the 'delete_field' function in all versions up to, and including, 1
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in KlbTheme Machic Core allows DOM-Based XSS
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Corourke iPhone Webclip Manager allows Stored XSS
Dell Unisphere for PowerMax, version(s) 9
AIOHTTP is an asynchronous HTTP client/server framework for asyncio and Python
Deserialization of Untrusted Data vulnerability in Themify Themify Edmin allows Object Injection
Authentication bypass issue exists in OpenBlocks series versions prior to FW5
Deserialization of Untrusted Data vulnerability in Digital zoom studio DZS Video Gallery allows Object Injection
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in AA-Team Woocommerce Sales Funnel Builder, AA-Team Amazon Affiliates Addon for WPBakery Page Builder (formerly Visual Composer) allows Reflected XSS
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in AA-Team Premium SEO Pack allows SQL Injection
Frappe is a full-stack web application framework
DwyerOmega Isensix Advanced Remote Monitoring System (ARMS) 1
In display, there is a possible memory corruption due to use after free
In display, there is a possible memory corruption due to use after free
In c2ps, there is a possible memory corruption due to use after free
A malicious actor with access to the adjacent network could obtain unauthorized access to a UniFi Protect Camera by exploiting a discovery protocol vulnerability in the Unifi Protect Application (Version 6
muffon is a cross-platform music streaming client for desktop
iccDEV provides a set of libraries and tools for working with ICC color management profiles
iccDEV provides a set of libraries and tools for working with ICC color management profiles
iccDEV provides a set of libraries and tools for working with ICC color management profiles
Cayin Signage Media Player 3
TDM Digital Signage PC Player 4
iDS6 DSSPro Digital Signage System 6
A weakness has been identified in Tenda AC23 16
Authorization Bypass Through User-Controlled Key vulnerability in Rustaurius Five Star Restaurant Reservations allows Exploiting Incorrectly Configured Access Control Security Levels
In display, there is a possible use after free due to a race condition
An issue was discovered in the WiFi driver in Samsung Mobile Processor Exynos 1380, 1480, 2400, 1580
An issue was discovered in Samsung Mobile Processor Exynos 1380, 1480, 2400, and 1580
Vega is a visualization grammar, a declarative format for creating, saving, and sharing interactive visualization designs
Spinnaker is an open source, multi-cloud continuous delivery platform
An issue was discovered in Samsung Magician 6
In display, there is a possible out of bounds write due to a missing bounds check
In KeyInstall, there is a possible out of bounds write due to a missing bounds check
In imgsys, there is a possible out of bounds write due to improper input validation
In battery, there is a possible out of bounds write due to a missing bounds check
In battery, there is a possible out of bounds write due to a missing bounds check
In mminfra, there is a possible out of bounds write due to a missing bounds check
iccDEV provides a set of libraries and tools for working with ICC color management profiles
iccDEV provides a set of libraries and tools for working with ICC color management profiles
Forcepoint One DLP Client, version 23
Insertion of Sensitive Information Into Sent Data vulnerability in Brecht Custom Related Posts allows Retrieve Embedded Sensitive Data
Missing Authorization vulnerability in WPweb Follow My Blog Post allows Exploiting Incorrectly Configured Access Control Security Levels
Missing Authorization vulnerability in Codepeople Sell Downloads allows Exploiting Incorrectly Configured Access Control Security Levels
An issue in ComfyUI-Manager prior to version 3
Improper Validation of Specified Quantity in Input vulnerability in SaasProject Booking Package allows Accessing Functionality Not Properly Constrained by ACLs
Missing Authorization vulnerability in Marketing Fire LLC LoginWP - Pro allows Accessing Functionality Not Properly Constrained by ACLs
A Cross-Site Scripting (XSS) vulnerability in the UCRM Argentina AFIP invoices Plugin (v1
An issue was discovered in L2 in Samsung Mobile Processor, Wearable Processor, and Modem Exynos 980, 990, 850, 1080, 2400, 1580, 9110, W920, W930, Modem 5123, and Modem 5400
A Denial of Service (DoS) vulnerability in evershop 2
iccDEV provides a set of libraries and tools for working with ICC color management profiles
In Modem, there is a possible read of uninitialized heap data due to an uncaught exception
In Modem, there is a possible system crash due to incorrect error handling
In Modem, there is a possible system crash due to incorrect error handling
In Modem, there is a possible system crash due to incorrect error handling
In Modem, there is a possible system crash due to improper input validation
FIBARO System Home Center 5
Aerohive HiveOS contains a denial of service vulnerability in the NetConfig UI that allows unauthenticated attackers to render the web interface unusable
QiHang Media Web Digital Signage 3
Adtec Digital SignEdje Digital Signage Player v2
iDS6 DSSPro Digital Signage System 6
RED-V Super Digital Signage System 5
Sony BRAVIA Digital Signage 1
Sony BRAVIA Digital Signage 1
A security flaw has been discovered in code-projects Online Product Reservation System 1
A security vulnerability has been detected in code-projects Online Product Reservation System 1
A vulnerability was found in code-projects Online Product Reservation System 1
A security flaw has been discovered in code-projects Online Product Reservation System 1
A security vulnerability has been detected in code-projects Online Music Site 1
A vulnerability was detected in code-projects Online Music Site 1
A flaw has been found in code-projects Online Music Site 1
In the backup parameters, a user with high privilege is able to concatenate custom instructions to the backup setup
Zimbra Collaboration (ZCS) 10 before 10
vega-functions provides function implementations for the Vega expression language
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Tumult Inc Tumult Hype Animations allows DOM-Based XSS
An issue was discovered in the Camera in Samsung Mobile Processor and Wearable Processor Exynos 1330, 1380, 1480, 2400, 1580, and 2500
OpenCTI is an open source platform for managing cyber threat intelligence knowledge and observables
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Shazdeh Header Image Slider header-image-slider allows DOM-Based XSS
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in GT3 themes Photo Gallery allows Reflected XSS
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in e-plugins JobBank allows Reflected XSS
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Dasinfomedia WPCHURCH allows Reflected XSS
In seninf, there is a possible memory corruption due to a race condition