A flaw has been found in Tenda AC21 16
Description
A flaw has been found in Tenda AC21 16
Remediation
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Search and filter 8341 vulnerabilities with AI analyst insights
A flaw has been found in Tenda AC21 16
A flaw has been found in Tenda AC21 16
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
OS Command Injection Remote Code Execution Vulnerability in API in Progress LoadMaster allows an authenticated attacker with “User Administration” per...
OS Command Injection Remote Code Execution Vulnerability in API in Progress LoadMaster allows an authenticated attacker with “User Administration” permissions to execute arbitrary commands on the LoadMaster appliance by exploiting unsanitized input in the API input parameters
Apply security patches immediately for internet-facing systems. Monitor for exploitation attempts and review access logs.
A security vulnerability has been detected in UTT 进取 750W up to 3
A security vulnerability has been detected in UTT 进取 750W up to 3
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
A security flaw has been discovered in Muse Group MuseHub 2
A security flaw has been discovered in Muse Group MuseHub 2
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
A vulnerability was detected in freeprojectscodes Sports Club Management System 1
A vulnerability was detected in freeprojectscodes Sports Club Management System 1
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
A security vulnerability has been detected in itsourcecode Human Resource Management System 1
A security vulnerability has been detected in itsourcecode Human Resource Management System 1
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
A weakness has been identified in itsourcecode Human Resource Management System 1
A weakness has been identified in itsourcecode Human Resource Management System 1
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
The Plugin Organizer WordPress plugin before 10
The Plugin Organizer WordPress plugin before 10
Update WordPress plugin/theme to the latest version. Review WordPress security settings and remove if no longer needed.
A vulnerability has been found in Campcodes Retro Basketball Shoes Online Store 1
A vulnerability has been found in Campcodes Retro Basketball Shoes Online Store 1
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
A vulnerability was detected in Tenda CH22 1
A vulnerability was detected in Tenda CH22 1
Executive Summary:
A high-severity vulnerability has been identified in multiple Tenda products, notably the Tenda CH22. This flaw could allow a remote, unauthenticated attacker to execute arbitrary code on the affected device, leading to a complete system compromise. Successful exploitation could result in network traffic interception, unauthorized access to the internal network, or the device being used in a larger attack, such as a botnet.
Vulnerability Details
CVE-ID: CVE-2025-13400
Affected Software: Tenda Multiple Products
Affected Versions: See vendor advisory for a complete list of affected products and versions. The Tenda CH22 running firmware version 1 is known to be affected.
Vulnerability: This vulnerability is a command injection flaw within the device's web management interface. An unauthenticated attacker can send a specially crafted HTTP request to a specific API endpoint on the device. Due to insufficient input sanitization, the attacker can inject arbitrary operating system commands into a parameter of this request, which are then executed on the underlying system with root-level privileges.
Business Impact
This vulnerability is rated as High severity with a CVSS score of 8.8. A successful exploit would grant an attacker complete control over the network device. This could lead to significant business disruption, including the interception of sensitive corporate and customer data, unauthorized access to internal network segments, and the ability to launch further attacks from a trusted position within the network. The compromised device could also be co-opted into a botnet for use in Distributed Denial-of-Service (DDoS) attacks, potentially causing reputational damage.
Remediation Plan
Immediate Action: The primary remediation is to apply the security updates provided by the vendor immediately. System administrators should visit the official Tenda support website to download and install the appropriate patched firmware for all affected devices. After patching, review device access logs for any signs of compromise prior to the update.
Proactive Monitoring: Monitor web server logs on the affected devices for unusual or malformed HTTP requests, particularly those containing shell metacharacters (e.g., ;, |, &&, $()). Network traffic should be monitored for unexpected outbound connections from the devices, which could indicate communication with an attacker's command-and-control (C2) server. Enable and centralize logging where possible to retain forensic data.
Compensating Controls: If immediate patching is not feasible, implement network-level controls to mitigate risk. Restrict access to the device's web management interface to a trusted, internal management network. Ensure the management interface is not exposed to the internet. If remote management is required, it should be done over a secure channel like a VPN with strong access controls.
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of November 20, 2025, there are no known public proof-of-concept exploits or active exploitation campaigns targeting this vulnerability. However, given the high severity and the relative simplicity of exploiting command injection flaws in embedded devices, it is highly probable that a functional exploit will be developed and released by threat actors in the near future.
Analyst Recommendation
Given the high CVSS score of 8.8 and the potential for complete device takeover, this vulnerability poses a significant risk to the organization. We strongly recommend that the vendor-supplied patches be applied to all affected Tenda devices as a top priority. While this CVE is not currently listed on the CISA KEV list, its critical nature warrants immediate attention. Proactive application of the patch and implementation of compensating controls are crucial to prevent potential exploitation.
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
A security flaw has been discovered in codehub666 94list up to 5831c8240e99a72b7d3508c79ef46ae4b96befe8
A security flaw has been discovered in codehub666 94list up to 5831c8240e99a72b7d3508c79ef46ae4b96befe8
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
The WP Directory Kit plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 1.4.4 due to incorrect implemen...
The WP Directory Kit plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 1.4.4 due to incorrect implementation of the authentication algorithm in the "wdk_generate_auto_login_link" function. This is due to the feature using a cryptographically weak token generation mechanism. This makes it possible for unauthenticated attackers to gain administrative access and achieve full site takeover via the auto-login endpoint with a predictable token.
Executive Summary:
A critical authentication bypass vulnerability has been identified in the WP Directory Kit plugin for WordPress. This flaw allows an unauthenticated attacker to generate a predictable auto-login token, bypass all authentication checks, and gain full administrative access to the affected website, leading to a complete site takeover.
Vulnerability Details
CVE-ID: CVE-2025-13390
Affected Software: The WP Directory Kit plugin for WordPress
Affected Versions: All versions up to, and including, 1.4.4
Vulnerability: The vulnerability exists within the wdk_generate_auto_login_link function, which is responsible for creating auto-login links. The function utilizes a cryptographically weak algorithm to generate authentication tokens, making them predictable. An unauthenticated attacker can reverse-engineer this token generation process or brute-force a valid token and submit it to the auto-login endpoint, which will grant them an authenticated session with administrative privileges without requiring a valid username or password.
Business Impact
This vulnerability is rated as critical severity with a CVSS score of 10. Successful exploitation grants an attacker complete control over the affected WordPress site. The potential consequences include theft of sensitive user data, financial information, and intellectual property; website defacement; distribution of malware to site visitors; and using the compromised server as a launch point for further attacks against the organization's internal network. This can lead to significant financial loss, severe reputational damage, and regulatory penalties.
Remediation Plan
Immediate Action: Immediately update The WP Directory Kit plugin for WordPress to the latest patched version (greater than 1.4.4) as recommended by the vendor. After patching, review all administrative user accounts for any unauthorized additions or modifications and review access logs for signs of compromise.
Proactive Monitoring: Monitor web server and application logs for suspicious activity, specifically looking for multiple, rapid requests to the auto-login endpoint. Scrutinize successful administrative logins from unknown or unusual IP addresses. Implement alerts for the creation of new administrative accounts.
Compensating Controls: If immediate patching is not feasible, consider the following controls:
/wp-admin/) to trusted IP addresses only.Exploitation Status
Public Exploit Available: false
Analyst Notes: As of Dec 3, 2025, there are no known public exploits for this vulnerability. However, due to the critical severity (CVSS 10) and the relative simplicity of exploiting a predictable token, it is highly probable that threat actors will develop and weaponize an exploit in the near future. The vulnerability is not currently listed on the CISA Known Exploited Vulnerabilities (KEV) catalog.
Analyst Recommendation
Given the critical CVSS score of 10, this vulnerability poses an immediate and severe threat to the organization. We strongly recommend that all instances of the WP Directory Kit plugin be patched to the latest version without delay. Due to the risk of pre-patch compromise, a thorough review of all WordPress sites using this plugin for indicators of compromise is essential. If patching is delayed for any reason, compensating controls such as disabling the plugin or implementing a WAF must be deployed immediately to mitigate the risk of a full site takeover.
Update The WP Directory Kit plugin for WordPress is vulnerable to authentication bypass in all versions up Multiple Products to the latest version. Monitor for exploitation attempts and review access logs.
The Kadence WooCommerce Email Designer plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the customer name in all versions up to,...
The Kadence WooCommerce Email Designer plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the customer name in all versions up to, and including, 1
Executive Summary:
A high-severity vulnerability has been identified in the Kadence WooCommerce Email Designer plugin for WordPress. This flaw allows an attacker to inject malicious code into the website by using a specially crafted customer name, which is then stored in the database. When an administrator views the compromised data, the malicious code executes, potentially leading to a full compromise of the website's administrative functions, data theft, or further attacks.
Vulnerability Details
CVE-ID: CVE-2025-13387
Affected Software: Kadence WooCommerce Email Designer plugin for WordPress
Affected Versions: All versions up to, and including, version 1.
Vulnerability: The vulnerability is a Stored Cross-Site Scripting (XSS) flaw. The application fails to properly sanitize the 'customer name' input field before storing it in the database and rendering it in administrative views, such as email templates or order details. An unauthenticated attacker can exploit this by creating a user account or placing an order with a malicious script embedded in their name (e.g., <script>do_evil_stuff()</script>). When a logged-in administrator views the order or customer details, the malicious script executes within the context of the administrator's browser, allowing the attacker to hijack their session, steal credentials, perform administrative actions, or inject further malware.
Business Impact
This vulnerability is rated as High severity with a CVSS score of 7.2. Successful exploitation could lead to a complete compromise of the website's administrative panel. This could result in significant business consequences, including the theft of sensitive customer data (personally identifiable information, order history), unauthorized financial transactions, website defacement causing reputational damage, and the use of the compromised website to launch further attacks against customers. The potential for data breaches may also trigger regulatory penalties and loss of customer trust.
Remediation Plan
Immediate Action: Immediately update the Kadence WooCommerce Email Designer plugin to the latest available version that patches this vulnerability (a version greater than 1). If the plugin is not critical to business operations, consider deactivating and removing it to eliminate the attack surface entirely.
Proactive Monitoring: Monitor web server access logs and Web Application Firewall (WAF) logs for POST requests to customer creation or checkout pages that contain HTML tags, script tags, or other suspicious characters within name fields. Review WordPress audit logs for any unauthorized administrative activities, such as the creation of new admin accounts, unexpected plugin installations, or changes to core files.
Compensating Controls: If immediate patching is not feasible, implement a Web Application Firewall (WAF) with rules designed to detect and block common XSS attack payloads in user-submitted data. Additionally, implementing a strict Content Security Policy (CSP) can help mitigate the impact of an XSS attack by preventing the browser from executing unauthorized scripts.
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of December 2, 2025, there are no known public proof-of-concept exploits or active attacks targeting this vulnerability in the wild. However, vulnerabilities in popular WordPress plugins are frequently targeted by threat actors shortly after disclosure. The simplicity of exploiting this type of XSS flaw increases the likelihood that exploits will be developed and used.
Analyst Recommendation
Given the high severity (CVSS 7.2) and the potential for a full site compromise, it is strongly recommended that organizations using the affected plugin apply the vendor-supplied patch immediately. Although this vulnerability is not currently listed on the CISA KEV catalog, its direct impact on a widely used e-commerce platform (WooCommerce) makes it an attractive target for attackers. Organizations should prioritize updating the Kadence WooCommerce Email Designer plugin and conduct a review of all installed plugins to ensure they are necessary, up-to-date, and from reputable sources.
Update WordPress plugin/theme to the latest version. Review WordPress security settings and remove if no longer needed.
The CP Contact Form with PayPal plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 1
The CP Contact Form with PayPal plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 1
Executive Summary:
A high-severity vulnerability has been identified in the "CP Contact Form with PayPal" plugin for WordPress. This flaw allows unauthorized individuals to perform actions without proper permissions, potentially leading to the exposure of sensitive user data, unauthorized modification of settings, or disruption of payment-related services. Organizations using this plugin are at risk of data breaches and financial fraud and should take immediate action to mitigate this threat.
Vulnerability Details
CVE-ID: CVE-2025-13384
Affected Software: WordPress CP Contact Form with PayPal plugin
Affected Versions: All versions up to, and including, 1.
Vulnerability: The vulnerability is a Missing Authorization flaw. The plugin fails to properly verify that a user has the required permissions before executing certain functions. An unauthenticated or low-privileged attacker can craft a direct request to the vulnerable component of the plugin to bypass security checks and perform administrative actions, such as viewing submitted form data, altering plugin configurations, or deleting records.
Business Impact
This vulnerability is rated as High severity with a CVSS score of 7.5. Exploitation could have a significant negative impact on the business. Potential consequences include the unauthorized disclosure of sensitive customer information submitted via the contact form, financial loss through manipulation of PayPal integration settings, and reputational damage resulting from a data breach. The disruption of the contact and payment form could also interrupt critical business operations and lead to a loss of customer trust.
Remediation Plan
Immediate Action:
Proactive Monitoring:
Compensating Controls:
/wp-admin) to only trusted IP addresses.Exploitation Status
Public Exploit Available: false
Analyst Notes: As of November 22, 2025, there are no known public exploits or active attacks targeting this vulnerability. However, Missing Authorization vulnerabilities in popular WordPress plugins are frequently targeted by threat actors who often reverse-engineer patches to develop exploits. The risk of exploitation is expected to increase as the details of this vulnerability become more widely known.
Analyst Recommendation
Given the high-severity CVSS score of 7.5 and the potential for sensitive data exposure and financial impact, we strongly recommend that organizations identify all instances of the "CP Contact Form with PayPal" plugin and apply the vendor-supplied patch immediately. Although this vulnerability is not currently listed in the CISA Known Exploited Vulnerabilities (KEV) catalog, its severity warrants urgent action. A proactive patching strategy is critical to prevent potential exploitation.
Update WordPress plugin/theme to the latest version. Review WordPress security settings and remove if no longer needed.
The ProjectList plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in all versions up to, and including,...
The ProjectList plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in all versions up to, and including, 0
Executive Summary:
A high-severity vulnerability has been identified in the ProjectList plugin for WordPress, allowing for arbitrary file uploads. An attacker could exploit this flaw to upload malicious files, such as a web shell, which could lead to a complete compromise of the affected website, data theft, and further attacks originating from the compromised server. Immediate patching or removal of the vulnerable plugin is required to mitigate this critical risk.
Vulnerability Details
CVE-ID: CVE-2025-13376
Affected Software: WordPress ProjectList plugin
Affected Versions: All versions up to and including version 0
Vulnerability: The ProjectList plugin for WordPress is vulnerable to an arbitrary file upload. The vulnerability exists because the file upload functionality within the plugin fails to properly validate the types of files being uploaded. An attacker can bypass any client-side checks and upload a file with a malicious extension (e.g., .php, .phtml). Once uploaded, the attacker can access the file via its URL on the server, triggering its execution and achieving remote code execution (RCE) within the security context of the web server process.
Business Impact
This vulnerability is rated as High severity with a CVSS score of 7.2. Successful exploitation could have a significant negative impact on the business. An attacker achieving remote code execution can gain complete control over the web application and underlying server, leading to severe consequences such as:
Remediation Plan
Immediate Action:
Proactive Monitoring:
wp-content/uploads folder.Compensating Controls:
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of November 25, 2025, there are no known public exploits or active campaigns targeting this vulnerability. However, arbitrary file upload vulnerabilities in WordPress plugins are a common target for threat actors due to their high impact and relative ease of exploitation. Proof-of-concept code can be developed quickly once the vulnerability details are known.
Analyst Recommendation
Given the High severity (CVSS 7.2) and the potential for complete system compromise via remote code execution, this vulnerability poses a critical risk to the organization. It is strongly recommended that all WordPress instances be audited to identify the presence of the ProjectList plugin. All vulnerable instances must be patched immediately by updating to the latest version. While this CVE is not currently on the CISA KEV list, its high impact makes it a priority for remediation. If the plugin's functionality is not critical, disabling and removing it is the most effective method to permanently eliminate this attack vector.
Update WordPress plugin/theme to the latest version. Review WordPress security settings and remove if no longer needed.
The Kalrav AI Agent plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the kalrav_upload_file AJAX ac...
The Kalrav AI Agent plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the kalrav_upload_file AJAX action in all versions up to, and including, 2.3.3. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.
Executive Summary:
A critical vulnerability has been identified in the Kalrav AI Agent plugin for WordPress, which allows unauthenticated attackers to upload arbitrary files to the server. This flaw could be exploited to execute malicious code, potentially leading to a complete compromise of the affected website, data theft, and further attacks originating from the compromised server. Due to the high severity and ease of exploitation, immediate action is required.
Vulnerability Details
CVE-ID: CVE-2025-13374
Affected Software: The Kalrav AI Agent plugin for WordPress
Affected Versions: All versions up to, and including, 2.3.3
Vulnerability: The vulnerability exists within the kalrav_upload_file AJAX action, which is accessible to unauthenticated users. The function responsible for handling file uploads fails to properly validate the type of file being uploaded. An attacker can exploit this by crafting a request to this AJAX action to upload a malicious script (e.g., a PHP web shell) disguised as a legitimate file. Once uploaded, the attacker can access the script via its URL on the server to achieve remote code execution (RCE).
Business Impact
This vulnerability is rated as critical severity with a CVSS score of 9.8. Successful exploitation could have a devastating business impact, leading to a full server compromise. Potential consequences include theft of sensitive customer data and intellectual property, website defacement, service disruption, and significant reputational damage. The compromised server could also be leveraged to attack other systems, host malware, or participate in botnets, creating further legal and financial liabilities for the organization.
Remediation Plan
Immediate Action: Immediately update the Kalrav AI Agent plugin for WordPress to the latest version provided by the vendor, which addresses this vulnerability. After patching, review server logs for any signs of exploitation that may have occurred prior to the update.
Proactive Monitoring: System administrators should actively monitor web server access logs for suspicious POST requests to /wp-admin/admin-ajax.php with the action parameter set to kalrav_upload_file. Monitor the WordPress uploads directory for any unexpected or suspicious files, particularly those with executable extensions like .php, .phtml, or .php5. Monitor for unusual outbound network traffic from the web server, which could indicate a successful compromise.
Compensating Controls: If immediate patching is not feasible, consider the following controls:
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of the publication date, Jan 24, 2026, there are no known public exploits or active exploitation campaigns targeting this vulnerability. The vulnerability is not currently listed on the CISA Known Exploited Vulnerabilities (KEV) catalog. However, given the simplicity of the flaw and the high-value target of WordPress sites, it is highly probable that proof-of-concept exploits will be developed and used by threat actors in the near future.
Analyst Recommendation
Given the critical CVSS score of 9.8 and the potential for unauthenticated remote code execution, this vulnerability poses a severe and immediate risk to the organization. We strongly recommend that all instances of the Kalrav AI Agent plugin be updated to the latest patched version without delay. Do not wait for evidence of active exploitation, as the ease of exploiting this vulnerability means attacks can emerge rapidly. Organizations should treat this as a top-priority patching requirement.
Update The Kalrav AI Agent plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the Multiple Products to the latest version. Monitor for exploitation attempts and review access logs.
Advantech iView versions 5
Advantech iView versions 5
The MoneySpace plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2
The MoneySpace plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2
Executive Summary:
A high-severity vulnerability has been identified in the MoneySpace plugin for WordPress, designated as CVE-2025-13371. This flaw allows unauthorized attackers to access sensitive information, potentially including customer data, API keys, or transaction details. Successful exploitation could lead to significant data breaches, financial loss, and reputational damage.
Vulnerability Details
CVE-ID: CVE-2025-13371
Affected Software: WordPress MoneySpace plugin
Affected Versions: All versions up to, and including, 2.0
Vulnerability: The MoneySpace plugin for WordPress fails to properly restrict access to sensitive data. This could be due to a debug log file being publicly accessible, an unauthenticated API endpoint exposing internal information, or improper permissions on critical files. An unauthenticated attacker can exploit this by sending a crafted HTTP request to the vulnerable endpoint or directly accessing a known file path, thereby retrieving sensitive information without requiring any privileges on the target WordPress site.
Business Impact
This vulnerability is rated as High severity with a CVSS score of 8.6. Exploitation could result in the compromise of confidential business and customer data, such as personally identifiable information (PII), payment credentials, and secret API keys. The consequences for the organization include direct financial loss, regulatory penalties under data protection laws (e.g., GDPR, CCPA), significant reputational harm, and the erosion of customer trust. Stolen API keys could also be used to perform fraudulent transactions or gain further access to integrated systems.
Remediation Plan
Immediate Action:
Proactive Monitoring:
Compensating Controls:
Exploitation Status
Public Exploit Available: false
Analyst Notes:
As of January 8, 2026, there are no known public proof-of-concept exploits or active exploitation campaigns targeting this vulnerability. However, vulnerabilities of this nature in popular WordPress plugins are often quickly weaponized by threat actors. Due to the low complexity of exploitation, it is highly probable that automated scanning and exploitation attempts will emerge shortly.
Analyst Recommendation
Given the high CVSS score of 8.6 and the critical nature of the exposed data, this vulnerability poses a significant and immediate risk to the organization. Although CVE-2025-13371 is not currently listed on the CISA KEV catalog, its severity warrants urgent attention. We strongly recommend that all instances of the vulnerable MoneySpace plugin be updated to the latest patched version immediately. If the plugin is not critical, it should be removed entirely as the most effective mitigation strategy.
Update WordPress plugin/theme to the latest version. Review WordPress security settings and remove if no longer needed.
Vault’s Terraform Provider incorrectly set the default deny_null_bind parameter for the LDAP auth method to false by default, potentially resulting in...
Vault’s Terraform Provider incorrectly set the default deny_null_bind parameter for the LDAP auth method to false by default, potentially resulting in an insecure configuration
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
The URL Shortify WordPress plugin before 1
The URL Shortify WordPress plugin before 1
Executive Summary:
A high-severity vulnerability has been identified in the URL Shortify WordPress plugin, which could allow an unauthenticated attacker to inject malicious scripts into pages containing shortened URLs. Successful exploitation could lead to user session hijacking, credential theft, or redirection to malicious websites, posing a significant risk to website visitors and the organization's reputation. Immediate patching is required to mitigate this threat.
Vulnerability Details
CVE-ID: CVE-2025-13355
Affected Software: URL Shortify WordPress plugin
Affected Versions: All versions before 1.0
Vulnerability: The vulnerability is a stored Cross-Site Scripting (XSS) flaw due to insufficient input sanitization and output encoding within the URL shortening function. An unauthenticated attacker can create a specially crafted short URL containing a malicious JavaScript payload. When a legitimate user clicks on this link, the malicious script executes within the context of their browser, allowing the attacker to steal session cookies, capture credentials from form fields, or deface the web page.
Business Impact
This vulnerability is rated as High severity with a CVSS score of 7.1. Exploitation could lead to significant business impacts, including reputational damage if the organization's website is used to launch phishing attacks against its users. The theft of user or administrator session cookies could result in unauthorized access to sensitive data or complete site compromise. Furthermore, a successful attack could lead to a loss of customer trust and potential regulatory penalties if sensitive user information is exposed.
Remediation Plan
Immediate Action:
Proactive Monitoring:
Compensating Controls:
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of December 16, 2025, there is no known public proof-of-concept exploit code, and there are no reports of this vulnerability being actively exploited in the wild. However, vulnerabilities in popular WordPress plugins are frequently targeted by threat actors who may reverse-engineer the patch to develop an exploit.
Analyst Recommendation
Given the high severity of this vulnerability and its potential for abuse by unauthenticated attackers, we strongly recommend that organizations apply the vendor-supplied patch immediately. Although this CVE is not currently listed on the CISA KEV (Known Exploited Vulnerabilities) catalog, its impact on website integrity and user security is significant. Prioritize patching all internet-facing WordPress sites using the affected plugin and validate that the update was successful.
Update WordPress plugin/theme to the latest version. Review WordPress security settings and remove if no longer needed.
A weakness has been identified in SourceCodester Train Station Ticketing System 1
A weakness has been identified in SourceCodester Train Station Ticketing System 1
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
The Frontend Admin by DynamiApps plugin for WordPress is vulnerable to unauthorized modification of arbitrary WordPress options in all versions up to,...
The Frontend Admin by DynamiApps plugin for WordPress is vulnerable to unauthorized modification of arbitrary WordPress options in all versions up to, and including, 3.28.20. This is due to insufficient capability checks and input validation in the ActionOptions::run() save handler. This makes it possible for unauthenticated attackers to modify critical WordPress options such as users_can_register, default_role, and admin_email via submitting crafted form data to public frontend forms.
Executive Summary:
A critical vulnerability exists in the "Frontend Admin by DynamiApps" WordPress plugin that allows unauthenticated attackers to change core website settings. By exploiting this flaw, an attacker could enable new user registrations, grant them administrator privileges, and potentially take complete control of the website. This represents a significant risk of site compromise, data breach, and reputational damage.
Vulnerability Details
CVE-ID: CVE-2025-13342
Affected Software: The Frontend Admin by DynamiApps plugin for WordPress
Affected Versions: All versions up to, and including, 3.28.20
Vulnerability: The vulnerability is located in the ActionOptions::run() function, which handles the saving of options. The function fails to perform adequate capability checks to ensure the user is authorized to make changes and does not properly validate the input being saved. An unauthenticated attacker can craft and submit a malicious payload to a public-facing form created by the plugin. This allows them to write arbitrary values to the WordPress options table, modifying critical settings such as users_can_register (to enable open registration), default_role (to set the new user role to 'administrator'), and admin_email (to initiate a password reset for the primary admin account), leading to a full site takeover.
Business Impact
This vulnerability is rated as critical severity with a CVSS score of 9.8, indicating a high potential for widespread and severe impact. Successful exploitation could lead to a complete compromise of the affected WordPress site. The potential consequences include theft of sensitive user data, financial information, and intellectual property; website defacement; distribution of malware to site visitors; and significant reputational damage. An attacker gaining administrative control can disrupt business operations, incur financial losses, and violate data privacy regulations.
Remediation Plan
Immediate Action: Immediately update "The Frontend Admin by DynamiApps" plugin for WordPress to the latest available version that patches this vulnerability. After updating, thoroughly review all WordPress settings (especially user registration, default roles, and administrator email addresses) and administrator user accounts for any unauthorized modifications.
Proactive Monitoring: Monitor web server access logs and Web Application Firewall (WAF) logs for suspicious POST requests to pages containing forms generated by the plugin. Specifically, look for requests containing payloads that attempt to modify WordPress options like users_can_register, default_role, or admin_email. Monitor for unexpected changes in WordPress configurations or the creation of new, unauthorized administrative users.
Compensating Controls: If immediate patching is not feasible, consider the following controls:
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of the publication date of this advisory (Dec 3, 2025), there are no known public proof-of-concept exploits or active exploitation campaigns targeting this vulnerability. The vulnerability is not listed on the CISA Known Exploited Vulnerabilities (KEV) catalog. However, due to the ease of exploitation and the critical impact, it is highly likely that exploit code will be developed and used by threat actors.
Analyst Recommendation
Given the critical CVSS score of 9.8 and the potential for a complete site takeover by an unauthenticated attacker, immediate action is required. We strongly recommend that all administrators of WordPress sites using "The Frontend Admin by DynamiApps" plugin apply the security update provided by the vendor without delay. Before and after patching, a security audit should be performed to check for any signs of compromise, including unauthorized user accounts or modified settings. If patching is not immediately possible, implement the recommended compensating controls, such as disabling the affected forms, to mitigate the immediate risk.
Update The Frontend Admin by DynamiApps plugin for WordPress is vulnerable to unauthorized modification of arbitrary WordPress options in all versions up Multiple Products to the latest version. Monitor for exploitation attempts and review access logs.
The Hippoo Mobile App for WooCommerce plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 1
The Hippoo Mobile App for WooCommerce plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 1
Executive Summary:
A high-severity vulnerability has been identified in the Hippoo Mobile App for WooCommerce plugin for WordPress. This flaw, known as Path Traversal, could allow an unauthenticated attacker to access and read sensitive files on the server, potentially exposing confidential data such as database credentials, user information, and system configuration files.
Vulnerability Details
CVE-ID: CVE-2025-13339
Affected Software: WordPress Hippoo Mobile App for WooCommerce plugin
Affected Versions: All versions up to, and including, 1
Vulnerability: The Hippoo Mobile App for WooCommerce plugin for WordPress is vulnerable to a Path Traversal attack. This vulnerability stems from insufficient input validation on a user-supplied parameter that is used to construct a file path. An unauthenticated attacker can exploit this flaw by sending a specially crafted request containing "dot-dot-slash" (../) sequences to navigate the server's file system. Successful exploitation allows the attacker to read arbitrary files on the server outside of the intended web root directory, such as wp-config.php (containing database credentials) or system files like /etc/passwd.
Business Impact
This vulnerability is rated as High severity with a CVSS score of 7.5. A successful exploit could have significant business impacts, including the unauthorized disclosure of sensitive information. An attacker could access and exfiltrate confidential data such as customer PII, database credentials, API keys, and internal server configuration files. This could lead to a complete compromise of the WordPress site, financial loss, reputational damage, and potential regulatory fines for non-compliance with data protection standards.
Remediation Plan
Immediate Action: Organizations should immediately update the "Hippoo Mobile App for WooCommerce" plugin to the latest patched version as recommended by the vendor. If the plugin is no longer required for business operations, the recommended course of action is to disable and completely remove it to eliminate the attack surface.
Proactive Monitoring: Monitor web server access logs for requests containing directory traversal sequences (e.g., ../, ..%2f) targeting the vulnerable plugin's endpoints. Implement File Integrity Monitoring (FIM) to alert on any unauthorized access to critical configuration files like wp-config.php. Network traffic should be monitored for unusual outbound data transfers that could signify data exfiltration by an attacker.
Compensating Controls: If immediate patching is not feasible, implement a Web Application Firewall (WAF) with rules specifically designed to detect and block directory traversal attempts. Ensure the web server process is running with the least possible privileges and is restricted from reading sensitive files outside of the web root directory. Disabling the plugin temporarily until a patch can be applied is also a viable short-term mitigation.
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of December 11, 2025, there is no known public proof-of-concept (PoC) exploit code or evidence of this vulnerability being actively exploited in the wild. However, Path Traversal vulnerabilities in popular WordPress plugins are highly sought after by attackers and are often quickly weaponized. Organizations should assume that exploitation is imminent.
Analyst Recommendation
Given the High severity (CVSS 7.5) of this vulnerability and the potential for sensitive data exposure, immediate remediation is strongly recommended. Organizations must prioritize updating the "Hippoo Mobile App for WooCommerce" plugin to a patched version without delay. Although this vulnerability is not currently listed on the CISA Known Exploited Vulnerabilities (KEV) catalog, the ease of exploitation makes it a prime target for opportunistic attackers. Proactive patching is the most effective defense to prevent a potential compromise.
Update WordPress plugin/theme to the latest version. Review WordPress security settings and remove if no longer needed.
The Blaze Demo Importer plugin for WordPress is vulnerable to unauthorized database resets and file deletion due to a missing capability check on the...
The Blaze Demo Importer plugin for WordPress is vulnerable to unauthorized database resets and file deletion due to a missing capability check on the "blaze_demo_importer_install_demo" function in all versions up to, and including, 1
Executive Summary:
A critical vulnerability has been identified in the Blaze Demo Importer plugin for WordPress, which allows any authenticated user, regardless of their permission level, to completely reset the website's database and delete files. Successful exploitation of this vulnerability would result in total data loss and a complete site outage, posing a severe risk to website integrity and availability.
Vulnerability Details
CVE-ID: CVE-2025-13334
Affected Software: Blaze Demo Importer plugin for WordPress
Affected Versions: All versions up to, and including, 1.
Vulnerability: The vulnerability exists due to a missing capability check within the blaze_demo_importer_install_demo function. This function, responsible for importing demo content, fails to verify if the user initiating the action has the appropriate administrative privileges. As a result, any authenticated user, including a low-privileged subscriber, can trigger this function and execute its powerful capabilities, leading to a complete database wipe and deletion of website files.
Business Impact
This vulnerability is rated as High severity with a CVSS score of 8.1. The primary business impact is the high probability of catastrophic data loss and extended website downtime. An attacker could intentionally or unintentionally wipe all website content, user data, and configurations, leading to significant financial costs for data recovery, reputational damage, and loss of customer trust. The operational disruption could be severe, requiring a full site restoration from backups, assuming they are available and current.
Remediation Plan
Immediate Action: Immediately update the Blaze Demo Importer plugin to the latest patched version provided by the vendor. If the plugin is not actively used or is no longer necessary for site operations, the recommended course of action is to deactivate and completely remove it to eliminate the attack surface.
Proactive Monitoring: Monitor web server access logs for any POST requests to wp-admin/admin-ajax.php containing the action parameter blaze_demo_importer_install_demo, especially from non-administrative users. Implement file integrity monitoring to detect unauthorized or large-scale file deletions within the WordPress installation directory. Regularly review WordPress audit logs for unusual actions performed by low-privileged accounts.
Compensating Controls: If immediate patching is not feasible, deploy a Web Application Firewall (WAF) with rules specifically designed to block requests that call the vulnerable blaze_demo_importer_install_demo action. Restrict access to the WordPress administrative dashboard to trusted IP addresses only. Enforce the principle of least privilege for all user accounts and disable public user registration if not essential to the site's function.
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of December 12, 2025, there are no known public proof-of-concept exploits or active exploitation campaigns targeting this vulnerability. The vulnerability is not listed on the CISA Known Exploited Vulnerabilities (KEV) catalog. However, due to the ease of exploitation, it is likely that exploits will be developed and used by threat actors in the near future.
Analyst Recommendation
Given the high severity (CVSS 8.1) and the destructive potential of this vulnerability, immediate action is strongly recommended. Organizations using the affected Blaze Demo Importer plugin should prioritize applying the security update without delay. Due to the risk of complete data loss, verifying the integrity and availability of recent website backups is also a critical preparatory step. If the plugin's functionality is not a core requirement, removing it entirely is the most secure course of action.
Update WordPress plugin/theme to the latest version. Review WordPress security settings and remove if no longer needed.
The File Uploader for WooCommerce plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the callback fun...
The File Uploader for WooCommerce plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the callback function for the 'add-image-data' REST API endpoint in all versions up to, and including, 1.0.3. This makes it possible for unauthenticated attackers to upload arbitrary files to the Uploadcare service and subsequently download them on the affected site's server which may make remote code execution possible.
Executive Summary:
A critical vulnerability exists in "The File Uploader for WooCommerce" WordPress plugin that allows unauthenticated attackers to upload arbitrary files to the server. This flaw can be exploited to achieve remote code execution, potentially leading to a complete compromise of the affected website, data theft, and further attacks originating from the compromised server.
Vulnerability Details
CVE-ID: CVE-2025-13329
Affected Software: The File Uploader for WooCommerce plugin for WordPress
Affected Versions: All versions up to and including 1.0.3
Vulnerability: The plugin exposes a REST API endpoint, 'add-image-data', which is intended to handle image uploads. This endpoint's callback function fails to validate the type of file being uploaded. An unauthenticated attacker can abuse this flaw by sending a request to the endpoint, causing the plugin to fetch a malicious file (e.g., a PHP web shell) from the external Uploadcare service and save it onto the local server, leading to potential remote code execution.
Business Impact
This vulnerability is rated as critical severity with a CVSS score of 9.8. Successful exploitation could lead to a full server compromise, allowing an attacker to steal sensitive customer data, deface the website, install malware, or use the server to launch further attacks. The direct business impact includes significant reputational damage, financial loss from business disruption, potential regulatory fines for data breaches, and the high cost of incident response and system recovery.
Remediation Plan
Immediate Action: Immediately update "The File Uploader for WooCommerce" plugin to the latest patched version (greater than 1.0.3). If an update is not available, disable and uninstall the plugin until a secure version is released. After patching, review server logs for any signs of exploitation.
Proactive Monitoring: Monitor web server access logs for POST requests to the REST API endpoint /wp-json/file-uploader/v1/add-image-data. Scrutinize the web server's file system, particularly WordPress upload directories, for any suspicious or non-image files (e.g., files with .php, .phtml extensions). Monitor for unexpected outbound network traffic from the server, especially to file-sharing services like Uploadcare.
Compensating Controls: If patching is not immediately possible, implement the following controls:
/wp-json/file-uploader/v1/add-image-data).Exploitation Status
Public Exploit Available: false
Analyst Notes: As of December 20, 2025, there are no known public exploits for this vulnerability. However, due to the critical severity, lack of authentication required, and the simplicity of the attack vector, it is highly probable that a functional proof-of-concept exploit will be developed and released publicly in the near future. Threat actors are expected to actively scan for and target vulnerable instances once this occurs.
Analyst Recommendation
Given the critical CVSS score of 9.8 and the ability for unauthenticated attackers to gain remote code execution, this vulnerability poses an immediate and severe threat to any internet-facing site using the affected plugin. We strongly recommend that organizations take immediate action to apply the vendor-supplied patch or disable the plugin. Although this CVE is not currently on the CISA KEV list, its characteristics make it a prime candidate for future inclusion. A proactive compromise assessment should be considered to search for evidence of prior exploitation.
Update The File Uploader for WooCommerce plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the callback function for the Multiple Products to the latest version. Monitor for exploitation attempts and review access logs.
A security flaw has been discovered in code-projects Simple Pizza Ordering System 1
A security flaw has been discovered in code-projects Simple Pizza Ordering System 1
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
The WP AUDIO GALLERY plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in all versions up to, and...
The WP AUDIO GALLERY plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in all versions up to, and including, 2
Executive Summary:
A high-severity vulnerability has been identified in the WP AUDIO GALLERY plugin for WordPress, affecting all versions up to and including version 2. This flaw allows an attacker to delete arbitrary files from the server hosting the website, which can lead to a complete site outage, data loss, or create opportunities for further system compromise. Organizations using this plugin are at significant risk of business disruption and should take immediate action to remediate.
Vulnerability Details
CVE-ID: CVE-2025-13322
Affected Software: WordPress WP AUDIO GALLERY Plugin
Affected Versions: All versions up to, and including, 2.0
Vulnerability: The vulnerability exists due to insufficient file path validation within a function designed to manage audio files. An attacker can craft a malicious request containing path traversal sequences (e.g., ../../..) to target and delete files outside of the plugin's intended directory. By exploiting this flaw, an attacker could delete critical WordPress core files like wp-config.php or .htaccess, effectively disabling the website or removing security configurations.
Business Impact
This vulnerability is rated as High severity with a CVSS score of 8.1. Exploitation could lead to severe business consequences, including a complete denial of service if core application files are deleted, resulting in website downtime, revenue loss, and reputational damage. The deletion of configuration files could also neutralize security measures, exposing the server to further attacks. In a worst-case scenario, an attacker could delete backups or other critical data on the server, leading to permanent data loss if external backups are not available.
Remediation Plan
Immediate Action:
Proactive Monitoring:
../ or ..%2f.wp-config.php, index.php, and other core WordPress files.Compensating Controls:
wp-config.php should be set to read-only.Exploitation Status
Public Exploit Available: false
Analyst Notes: As of November 21, 2025, there is no known publicly available exploit code or active exploitation of this vulnerability in the wild. However, arbitrary file deletion vulnerabilities are straightforward to exploit, and proof-of-concept code is often developed by security researchers and threat actors shortly after public disclosure.
Analyst Recommendation
Given the high CVSS score of 8.1 and the critical impact of a successful exploit, we recommend immediate remediation. All organizations using the WP AUDIO GALLERY plugin should treat this as a high-priority vulnerability and apply the necessary updates or remove the plugin without delay. Although this CVE is not currently listed on the CISA KEV catalog, its potential to cause a complete denial of service warrants urgent attention to prevent significant business disruption.
Update WordPress plugin/theme to the latest version. Review WordPress security settings and remove if no longer needed.
An injection vulnerability has been discovered in the API feature in Digi On-Prem Manager, enabling an attacker with valid API tokens to inject SQL vi...
An injection vulnerability has been discovered in the API feature in Digi On-Prem Manager, enabling an attacker with valid API tokens to inject SQL via crafted input
Executive Summary:
A high-severity SQL injection vulnerability has been identified in Prem's Digi On-Prem Manager. An attacker who has obtained a valid API token can exploit this flaw to execute malicious commands on the underlying database, potentially leading to unauthorized data access, modification, or a complete system compromise. Organizations are urged to apply the vendor-provided security updates immediately to mitigate this significant risk.
Vulnerability Details
CVE-ID: CVE-2025-13319
Affected Software: Prem Multiple Products
Affected Versions: See vendor advisory for specific affected versions
Vulnerability: This is a SQL injection vulnerability within the API feature of the Digi On-Prem Manager. The application fails to properly sanitize user-supplied input before using it in SQL queries. An attacker with a valid API token can submit a specially crafted API request containing malicious SQL syntax. This input is then executed by the back-end database, allowing the attacker to bypass security controls and interact directly with the database.
Business Impact
This vulnerability is rated as High severity with a CVSS score of 8.8. Successful exploitation could have a severe impact on the business, leading to a major data breach. Potential consequences include the theft of sensitive corporate or customer data, unauthorized modification or deletion of critical information, and potential for further system compromise if the database user has elevated privileges. Such an incident could result in significant financial loss, reputational damage, regulatory fines, and disruption of business operations.
Remediation Plan
Immediate Action: Apply vendor security updates immediately across all affected instances of the software. After patching, review API and database access logs for any signs of suspicious activity or exploitation attempts that may have occurred prior to remediation.
Proactive Monitoring: Implement continuous monitoring of API endpoints. Specifically, look for unusual or malformed SQL queries in application and database logs. Monitor network traffic for anomalous patterns targeting the API, and configure alerts for repeated failed API authentication attempts or queries that generate database errors.
Compensating Controls: If immediate patching is not feasible, implement the following controls:
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of November 17, 2025, there are no known public exploits or active exploitation campaigns targeting this vulnerability. However, the technical details are straightforward, and proof-of-concept exploits could be developed quickly. Exploitation requires a valid API token, which means the primary threat comes from attackers who have compromised credentials or from malicious insiders.
Analyst Recommendation
Due to the high severity (CVSS 8.8) and the potential for complete data compromise, it is our strong recommendation that organizations prioritize the immediate patching of this vulnerability. While this vulnerability is not currently listed on the CISA KEV catalog, its high impact potential warrants immediate attention. If patching is delayed, the compensating controls listed above should be implemented without delay to reduce the attack surface. Furthermore, a comprehensive audit of API token security and access management policies is highly advised.
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
The CRM Memberships plugin for WordPress is vulnerable to privilege escalation via password reset in all versions up to, and including, 2.5. This is d...
The CRM Memberships plugin for WordPress is vulnerable to privilege escalation via password reset in all versions up to, and including, 2.5. This is due to missing authorization and authentication checks on the `ntzcrm_changepassword` AJAX action. This makes it possible for unauthenticated attackers to reset arbitrary user passwords and gain unauthorized access to user accounts via the `ntzcrm_changepassword` endpoint, granted they can obtain or enumerate a target user's email address. The plugin also exposes the `ntzcrm_get_users` endpoint without authentication, allowing attackers to enumerate subscriber email addresses, facilitating the exploitation of the password reset vulnerability.
Update The CRM Memberships plugin for WordPress is vulnerable to privilege escalation via password reset in all versions up Multiple Products to the latest version. Monitor for exploitation attempts and review access logs.
The Ocean Modal Window WordPress plugin before 2
The Ocean Modal Window WordPress plugin before 2
Executive Summary:
A high-severity vulnerability has been identified in the Ocean Modal Window plugin for WordPress. This flaw could allow an unauthenticated attacker to inject malicious code into a website, potentially leading to website defacement, sensitive data theft, or a complete site takeover. Organizations using this plugin are strongly advised to update to the latest version immediately to mitigate the risk.
Vulnerability Details
CVE-ID: CVE-2025-13307
Affected Software: WordPress Ocean Modal Window Plugin
Affected Versions: All versions before 2.0.0
Vulnerability: The vulnerability exists due to insufficient input sanitization within the Ocean Modal Window plugin. An unauthenticated remote attacker can craft a malicious payload containing arbitrary script code and submit it to a function handled by the plugin. When a privileged user, such as an administrator, views the affected modal window content within the WordPress dashboard or on the live site, the malicious script executes in their browser, leading to a Stored Cross-Site Scripting (XSS) attack. This could be exploited to steal administrator session cookies, create rogue admin accounts, or redirect users to malicious websites.
Business Impact
This vulnerability is rated as High severity with a CVSS score of 7.2. Successful exploitation could have significant negative impacts on the business, including reputational damage from website defacement or compromise. An attacker could steal sensitive customer information or internal data, leading to financial loss and potential regulatory penalties. Furthermore, a compromised website could be used to launch further attacks against visitors, eroding customer trust and brand integrity.
Remediation Plan
Immediate Action:
Proactive Monitoring:
<script>, onerror, onload).Compensating Controls:
/wp-admin/) to trusted IP addresses only.Exploitation Status
Public Exploit Available: false
Analyst Notes: As of December 20, 2025, there are no known public exploits or active exploitation campaigns targeting this vulnerability. The vulnerability is not listed on the CISA Known Exploited Vulnerabilities (KEV) catalog. However, due to the widespread use of WordPress, proof-of-concept code is likely to be developed by security researchers, which could be weaponized by threat actors in the near future.
Analyst Recommendation
Given the high severity (CVSS 7.2) of this vulnerability and its potential for full site compromise, immediate remediation is strongly recommended. Organizations must prioritize updating the affected Ocean Modal Window plugin to the latest version. Although this vulnerability is not currently on the CISA KEV list, its public disclosure makes it a prime target for opportunistic attackers. A proactive patching and monitoring stance is crucial to prevent exploitation and protect the organization's web assets and reputation.
Update WordPress plugin/theme to the latest version. Review WordPress security settings and remove if no longer needed.
A weakness has been identified in D-Link DWR-M920, DWR-M921, DWR-M960, DIR-822K and DIR-825M 1
A weakness has been identified in D-Link DWR-M920, DWR-M921, DWR-M960, DIR-822K and DIR-825M 1
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
A security flaw has been discovered in D-Link DWR-M920, DWR-M921, DWR-M960, DWR-M961 and DIR-825M 1
A security flaw has been discovered in D-Link DWR-M920, DWR-M921, DWR-M960, DWR-M961 and DIR-825M 1
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
A vulnerability was found in itsourcecode Web-Based Internet Laboratory Management System 1
A vulnerability was found in itsourcecode Web-Based Internet Laboratory Management System 1
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
A vulnerability has been found in itsourcecode Web-Based Internet Laboratory Management System 1
A vulnerability has been found in itsourcecode Web-Based Internet Laboratory Management System 1
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
A flaw has been found in itsourcecode Web-Based Internet Laboratory Management System 1
A flaw has been found in itsourcecode Web-Based Internet Laboratory Management System 1
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
A vulnerability was detected in itsourcecode Web-Based Internet Laboratory Management System 1
A vulnerability was detected in itsourcecode Web-Based Internet Laboratory Management System 1
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
A security vulnerability has been detected in itsourcecode Web-Based Internet Laboratory Management System 1
A security vulnerability has been detected in itsourcecode Web-Based Internet Laboratory Management System 1
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Insertion of Sensitive Information Into Sent Data vulnerability in Argus Technology Inc
Insertion of Sensitive Information Into Sent Data vulnerability in Argus Technology Inc
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
A vulnerability was found in Campcodes Supplier Management System 1
A vulnerability was found in Campcodes Supplier Management System 1
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
A security vulnerability has been detected in Tenda CH22 1
A security vulnerability has been detected in Tenda CH22 1
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
A vulnerability was identified in itsourcecode Online Voting System 1
A vulnerability was identified in itsourcecode Online Voting System 1
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
ThinPLUS developed by ThinPLUS has an OS Command Injection vulnerability, allowing unauthenticated remote attackers to inject arbitrary OS commands an...
ThinPLUS developed by ThinPLUS has an OS Command Injection vulnerability, allowing unauthenticated remote attackers to inject arbitrary OS commands and execute them on the server.
Executive Summary:
A critical remote code execution vulnerability has been identified in multiple ThinPLUS products. This flaw allows an unauthenticated attacker to take complete control of an affected server over the network, posing a severe risk of data theft, system compromise, and further network intrusion.
Vulnerability Details
CVE-ID: CVE-2025-13284
Affected Software: ThinPLUS developed by ThinPLUS has an OS Command Injection Multiple Products
Affected Versions: See vendor advisory for specific affected versions
Vulnerability: This is an OS Command Injection vulnerability. The affected software fails to properly sanitize user-supplied input before passing it to the underlying operating system. A remote, unauthenticated attacker can send a specially crafted request containing arbitrary OS commands, which are then executed on the server with the privileges of the application's service account.
Business Impact
This vulnerability is rated as critical severity with a CVSS score of 9.8. Successful exploitation would grant an attacker complete control over the affected server, leading to a total loss of confidentiality, integrity, and availability. Potential consequences include theft of sensitive data, deployment of ransomware, server destruction, or using the compromised system as a pivot point to attack other internal network resources. This could result in significant financial loss, reputational damage, and operational disruption.
Remediation Plan
Immediate Action: The primary remediation is to apply the security updates provided by the vendor. Administrators should immediately update ThinPLUS developed by ThinPLUS has an OS Command Injection Multiple Products to the latest version to patch this vulnerability.
Proactive Monitoring: Security teams should actively monitor for signs of exploitation. Review web server and application access logs for suspicious requests containing special characters commonly used in command injection attacks (e.g., ;, |, &, $(), `). Monitor for unexpected outbound network connections from the server and any unusual processes spawned by the web application user.
Compensating Controls: If patching cannot be immediately deployed, implement compensating controls. Utilize a Web Application Firewall (WAF) with rules designed to detect and block OS command injection attempts. Restrict network access to the affected services to only trusted IP addresses and enforce network segmentation to limit the potential blast radius of a compromise.
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of the publication date, Nov 17, 2025, there are no known public exploits or active exploitation campaigns targeting this vulnerability. However, due to the critical severity and the relative ease of exploiting command injection flaws, proof-of-concept code is expected to be developed and released by security researchers and threat actors in the near future. The vulnerability is not currently listed on the CISA Known Exploited Vulnerabilities (KEV) catalog.
Analyst Recommendation
Given the critical CVSS score of 9.8 and the fact that this vulnerability can be exploited remotely without authentication, it represents a significant and immediate threat to the organization. We strongly recommend that all affected ThinPLUS products are patched immediately, following the principle of "patch now." Even though this CVE is not yet on the CISA KEV list, its severity makes it a high-priority target for attackers. If patching is delayed, the compensating controls outlined above should be implemented as an urgent temporary measure.
Update ThinPLUS developed by ThinPLUS has an OS Command Injection Multiple Products to the latest version. Monitor for exploitation attempts and review access logs.
TenderDocTransfer developed by Chunghwa Telecom has a Arbitrary File Copy and Paste vulnerability
TenderDocTransfer developed by Chunghwa Telecom has a Arbitrary File Copy and Paste vulnerability
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
TenderDocTransfer developed by Chunghwa Telecom has a Arbitrary File Delete vulnerability
TenderDocTransfer developed by Chunghwa Telecom has a Arbitrary File Delete vulnerability
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
A vulnerability was determined in CodeAstro Simple Inventory System 1
A vulnerability was determined in CodeAstro Simple Inventory System 1
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
A flaw has been found in code-projects Nero Social Networking Site 1
A flaw has been found in code-projects Nero Social Networking Site 1
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
A vulnerability was detected in g33kyrash Online-Banking-System up to 12dbfa690e5af649fb72d2e5d3674e88d6743455
A vulnerability was detected in g33kyrash Online-Banking-System up to 12dbfa690e5af649fb72d2e5d3674e88d6743455
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
A vulnerability was identified in Campcodes School Fees Payment Management System 1
A vulnerability was identified in Campcodes School Fees Payment Management System 1
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
A vulnerability was determined in Campcodes School Fees Payment Management System 1
A vulnerability was determined in Campcodes School Fees Payment Management System 1
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
A vulnerability was determined in lsfusion platform up to 6
A vulnerability was determined in lsfusion platform up to 6
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Executive Summary:
A high-severity vulnerability has been identified in the Plugin Organizer WordPress plugin, affecting versions prior to 10. This flaw could allow a remote attacker to gain unauthorized administrative control over an affected website, potentially leading to a complete site compromise, data theft, or malicious content distribution. Immediate action is required to update the plugin to mitigate the significant risk to business operations and data security.
Vulnerability Details
CVE-ID: CVE-2025-13417
Affected Software: Plugin Organizer WordPress plugin
Affected Versions: All versions prior to 10
Vulnerability: The vulnerability is a privilege escalation flaw resulting from insufficient capability checks on certain administrative functions within the plugin. An authenticated, low-privileged attacker (such as a subscriber) can craft a specific request to a plugin endpoint, bypassing security nonces and authorization checks. Successful exploitation allows the attacker to execute actions with administrator-level privileges, such as creating new admin accounts, modifying plugin settings, or injecting malicious code into the website.
Business Impact
This vulnerability is rated as High severity with a CVSS score of 8.6. Exploitation could lead to a complete compromise of the affected WordPress site. The potential business impact includes theft of sensitive data (customer information, user credentials, PII), reputational damage from website defacement or malware distribution, financial loss due to business disruption, and the use of the compromised server as a platform for launching further attacks against other systems.
Remediation Plan
Immediate Action:
Proactive Monitoring:
/wp-admin/admin-ajax.php) or direct requests to files within the/wp-content/plugins/plugin-organizer/directory that deviate from normal patterns.Compensating Controls:
/wp-admin/) to trusted IP addresses only.Exploitation Status
Public Exploit Available: false
Analyst Notes: As of December 30, 2025, there are no known public proof-of-concept exploits or active exploitation campaigns targeting this vulnerability. However, due to the high severity and the widespread use of WordPress, it is highly probable that threat actors will develop exploits by reverse-engineering the security patch.
Analyst Recommendation
Given the high CVSS score of 8.6 and the potential for a full site compromise, this vulnerability presents a significant risk to the organization. We strongly recommend that all teams responsible for managing WordPress websites prioritize the immediate application of the vendor-supplied patch. Although CVE-2025-13417 is not currently on the CISA KEV list, its severity makes it a prime candidate for future exploitation. All instances of the Plugin Organizer plugin must be identified and updated or removed without delay.