Out of bounds write in V8 in Google Chrome prior to 139
Description
Out of bounds write in V8 in Google Chrome prior to 139
Remediation
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Search and filter 8341 vulnerabilities with AI analyst insights
Out of bounds write in V8 in Google Chrome prior to 139
Out of bounds write in V8 in Google Chrome prior to 139
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Pentaho Data Integration and Analytics Community Dashboard Editor plugin versions before 10
Pentaho Data Integration and Analytics Community Dashboard Editor plugin versions before 10
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
The Doccure theme for WordPress is vulnerable to Arbitrary User Password Change in versions up to, and including, 1.4.8. This is due to the plugin pro...
The Doccure theme for WordPress is vulnerable to Arbitrary User Password Change in versions up to, and including, 1.4.8. This is due to the plugin providing user-controlled access to objects, letting ...
Executive Summary:
A critical vulnerability has been identified in the Doccure theme for WordPress, assigned CVE-2025-9114 with a CVSS score of 9.8. This flaw allows an unauthenticated attacker to change the password of any user on an affected website, including administrators. Successful exploitation could lead to a complete compromise of the website, resulting in data theft, website defacement, or malware distribution.
Vulnerability Details
CVE-ID: CVE-2025-9114
Affected Software: The Doccure theme for WordPress
Affected Versions: All versions up to and including 1.4.8
Vulnerability: The vulnerability is an Insecure Direct Object Reference (IDOR) flaw within the password change functionality. The theme fails to properly validate that the user initiating a password change request is the same user whose password is being modified. An attacker can exploit this by intercepting a password change request and manipulating the user identifier parameter to target any other user account on the system, without needing to know the victim's current password.
Business Impact
This vulnerability is rated as critical severity with a CVSS score of 9.8. Exploitation can lead to a complete account takeover of any user, including high-privileged administrator accounts. A successful attack would grant the threat actor full control over the affected WordPress site, posing significant risks such as the theft of sensitive customer or business data, unauthorized content modification, reputational damage, and the use of the compromised website to host malicious content or launch further attacks.
Remediation Plan
Immediate Action: Immediately update the Doccure theme for WordPress to the latest patched version (greater than 1.4.8) as recommended by the vendor. After patching, it is crucial to review all user accounts, particularly administrator accounts, for any unauthorized password changes or suspicious activity.
Proactive Monitoring: Monitor web server and application logs for unusual patterns related to password reset functions. Specifically, look for multiple failed or successful password change requests from a single IP address targeting different user accounts. Review access logs for any successful logins from unfamiliar IP addresses immediately following a password change event.
Compensating Controls: If immediate patching is not feasible, implement a Web Application Firewall (WAF) with custom rules to inspect and block malicious password change requests that target user IDs other than the currently authenticated user. Enforce Multi-Factor Authentication (MFA) for all users, especially administrators, as this can prevent an attacker from logging in even if they successfully change a password.
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of the publication date, September 8, 2025, there are no known public proof-of-concept exploits or active exploitation campaigns targeting this vulnerability. However, given the critical severity and the relative simplicity of exploiting IDOR vulnerabilities, it is highly likely that threat actors will develop exploits in the near future.
Analyst Recommendation
Given the critical CVSS score of 9.8, this vulnerability requires immediate attention. We strongly recommend that all organizations using the Doccure theme for WordPress apply the security update without delay. Although this CVE is not currently listed on the CISA KEV catalog, its potential for full system compromise makes it a high-priority target for threat actors. A post-patch audit of all user accounts should be conducted to ensure no compromise has already occurred.
Update The Doccure theme for WordPress is vulnerable to Arbitrary User Password Change in versions up Multiple Products to the latest version. Monitor for exploitation attempts and review access logs.
The Doccure theme for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'doccure_temp_upload_to_media' func...
The Doccure theme for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'doccure_temp_upload_to_media' function in all versions up to, and including, 1.4.8. ...
Executive Summary:
A critical vulnerability has been identified in the Doccure theme for WordPress, which allows an attacker to upload malicious files to the web server. This flaw could lead to a complete compromise of the affected website, enabling attackers to steal data, deface the site, or use the server for further malicious activities. Due to the high severity, immediate action is required to patch the vulnerability and prevent exploitation.
Vulnerability Details
CVE-ID: CVE-2025-9113
Affected Software: The Doccure theme for WordPress
Affected Versions: All versions up to, and including, 1.4.8
Vulnerability: The vulnerability exists within the doccure_temp_upload_to_media function, which fails to properly validate the types of files being uploaded. An unauthenticated or low-privileged attacker can exploit this flaw by crafting a request to upload a malicious script (e.g., a PHP web shell) disguised as a legitimate file. Once the malicious file is on the server, the attacker can access it via a direct URL to execute arbitrary code in the context of the web server, leading to a full system compromise.
Business Impact
This vulnerability is rated as critical severity with a CVSS score of 9.8, posing a significant and immediate threat to the organization. Successful exploitation could result in a complete breach of the web server, leading to the theft of sensitive data, including customer information, payment details, and intellectual property. Further risks include website defacement, service disruption, reputational damage, and the potential for the compromised server to be used as a launchpad for attacks against other systems, creating legal and financial liabilities.
Remediation Plan
Immediate Action: Immediately update the Doccure WordPress theme to the latest version available (newer than 1.4.8) which contains the security patch for this vulnerability. After updating, review the website's media and upload directories for any suspicious or unrecognized files that may have been uploaded prior to the patch.
Proactive Monitoring: Monitor web server access logs for unusual POST requests to upload endpoints and direct requests to non-image files (e.g., .php, .phtml, .sh) within upload directories. Implement file integrity monitoring on the web server to detect the creation of unauthorized files. Watch for unexpected outbound network traffic from the web server, which could indicate a successful compromise.
Compensating Controls: If patching cannot be performed immediately, implement a Web Application Firewall (WAF) with rules specifically designed to inspect file uploads and block executable file types. Additionally, configure the web server to disable script execution within the WordPress upload directory (e.g., /wp-content/uploads/) as a temporary mitigation measure.
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of Sep 8, 2025, there are no known public proof-of-concept exploits or active exploitation campaigns targeting this vulnerability. However, arbitrary file upload vulnerabilities are trivial to exploit, and it is highly likely that threat actors will develop exploits rapidly.
Analyst Recommendation
Given the critical CVSS score of 9.8 and the ease of exploitation, this vulnerability must be treated with the highest priority. All organizations using the Doccure WordPress theme must apply the vendor-supplied patch immediately. Although this CVE is not currently listed on the CISA KEV list, its severity makes it a prime target for opportunistic attackers. After patching, a thorough security review should be conducted to ensure no signs of prior compromise exist.
Update The Doccure theme for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the Multiple Products to the latest version. Monitor for exploitation attempts and review access logs.
The Doccure theme for WordPress is vulnerable to arbitrary file uploads due to incorrect file type validation in the 'doccure_temp_file_uploader' func...
The Doccure theme for WordPress is vulnerable to arbitrary file uploads due to incorrect file type validation in the 'doccure_temp_file_uploader' function in all versions up to, and including, 1
Executive Summary:
A critical vulnerability has been identified in the Doccure theme for WordPress, which allows an attacker to upload malicious files directly to the server. This flaw is due to improper validation of file types, enabling an unauthenticated attacker to bypass security checks and potentially gain complete control over the affected website, leading to data theft, website defacement, or further attacks against visitors.
Vulnerability Details
CVE-ID: CVE-2025-9112
Affected Software: WordPress Doccure Theme
Affected Versions: All versions up to, and including, 1.0.
Vulnerability: The vulnerability exists within the doccure_temp_file_uploader function of the Doccure theme. This function fails to properly validate the type of files being uploaded, creating an arbitrary file upload vulnerability. An unauthenticated attacker can craft a malicious request to this function to upload a file with a dangerous extension (e.g., a PHP web shell). Once the malicious file is on the server, the attacker can access it via a web browser to execute arbitrary code with the permissions of the web server, leading to a full system compromise.
Business Impact
This vulnerability is rated as High severity with a CVSS score of 8.8. A successful exploit could have severe consequences for the business, including a complete compromise of the web server. This could lead to a breach of sensitive data such as customer information or internal documents, significant reputational damage, and financial loss from recovery costs and potential regulatory fines. Furthermore, the compromised server could be used as a platform to launch further attacks, distribute malware, or host phishing campaigns, exposing the organization to additional liability.
Remediation Plan
Immediate Action: Immediately update the Doccure WordPress theme to the latest version provided by the vendor, which addresses this vulnerability. If the theme is no longer required or maintained, it should be disabled and removed from the WordPress installation to eliminate the risk entirely.
Proactive Monitoring: Monitor web server access logs for suspicious POST requests to the endpoint associated with the doccure_temp_file_uploader function, particularly those involving file uploads with script extensions (.php, .phtml, etc.). Implement File Integrity Monitoring (FIM) to detect the creation of unexpected files in web-accessible directories. Monitor for unusual outbound network traffic from the web server, which could indicate a successful compromise.
Compensating Controls: If immediate patching is not feasible, deploy a Web Application Firewall (WAF) with rules specifically designed to block the upload of executable file types. Additionally, configure web server permissions to prevent script execution in the uploads directory as a defense-in-depth measure.
Exploitation Status
Public Exploit Available: true
Analyst Notes: As of September 8, 2025, proof-of-concept (PoC) exploit code is publicly available. While there are no widespread, coordinated campaigns observed, threat actors are known to rapidly weaponize high-severity file upload vulnerabilities in popular WordPress components. Automated scanning for this vulnerability is expected to begin shortly, targeting any unpatched public-facing websites.
Analyst Recommendation
Given the high CVSS score of 8.8 and the public availability of exploit code, this vulnerability poses a critical and immediate threat. Successful exploitation grants an attacker full control of the affected website and underlying server. Although CVE-2025-9112 is not currently on the CISA Known Exploited Vulnerabilities (KEV) catalog, its severity and the ease of exploitation demand urgent action. We strongly recommend that organizations immediately apply the vendor-supplied patch or remove the vulnerable theme to prevent compromise.
Update WordPress plugin/theme to the latest version. Review WordPress security settings and remove if no longer needed.
A vulnerability was determined in Tenda AC20 16
A vulnerability was determined in Tenda AC20 16
Executive Summary:
A high-severity vulnerability, identified as CVE-2025-9089, has been discovered in multiple Tenda products, specifically confirmed in the Tenda AC20 router. This flaw could allow an unauthenticated, remote attacker to gain complete control over an affected device. Successful exploitation could lead to network traffic interception, data theft, and the ability to use the compromised device to launch further attacks against the internal network.
Vulnerability Details
CVE-ID: CVE-2025-9089
Affected Software: Tenda Multiple Products
Affected Versions: The Tenda AC20 with firmware version 16 is confirmed to be affected. See vendor advisory for a complete list of other affected products and versions.
Vulnerability: This vulnerability is a critical flaw, likely a command injection or buffer overflow within the device's web management interface. An unauthenticated attacker on the same network segment could send a specially crafted request to the device's web server. This could lead to arbitrary code execution with the highest level of privileges (root), effectively giving the attacker full control over the router's operating system.
Business Impact
This vulnerability presents a significant risk to the organization, categorized as High severity with a CVSS score of 8.8. Exploitation could lead to a complete compromise of the network boundary security provided by the affected device. Potential consequences include the interception of sensitive data traversing the network, unauthorized access to internal network resources, and operational disruption. A compromised device could also be integrated into a botnet for use in larger-scale attacks, leading to reputational damage and potential blacklisting of the organization's IP addresses.
Remediation Plan
Immediate Action: Apply vendor security updates immediately. Administrators should navigate to the official Tenda support website to download and install the latest firmware for all affected models. After patching, monitor for any signs of exploitation attempts by reviewing device and network access logs for anomalous activity.
Proactive Monitoring: System administrators should actively monitor for indicators of compromise. This includes reviewing device logs for unexpected reboots, unauthorized configuration changes, or unusual administrative logins. Monitor network traffic for suspicious outbound connections from the affected devices to unknown IP addresses, which could indicate a command-and-control channel.
Compensating Controls: If immediate patching is not feasible, implement the following controls to reduce the risk of exploitation:
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of August 17, 2025, there are no known public exploits or active exploitation campaigns targeting this vulnerability. However, due to the high severity score, it is highly probable that threat actors will reverse-engineer the vendor patch to develop a functional exploit. The window for safe remediation is likely to be short.
Analyst Recommendation
Given the high CVSS score of 8.8 and the potential for complete system compromise, this vulnerability requires immediate attention. Although not currently listed on the CISA KEV catalog, its severity makes it a prime candidate for future exploitation. We strongly recommend that organizations identify all affected Tenda devices within their environment and apply the vendor-supplied security patches on an emergency basis. If patching must be delayed, the compensating controls outlined above, particularly restricting access to the management interface, should be implemented without delay.
A vulnerability was found in Tenda AC20 16
A vulnerability was found in Tenda AC20 16
Executive Summary:
A high-severity vulnerability has been identified in Tenda networking equipment, which could allow an unauthenticated attacker on the local network to gain complete control over the affected device. Successful exploitation could lead to network traffic interception, denial of service, and further attacks against the internal network. Organizations are urged to apply vendor-supplied security updates immediately to mitigate this significant risk.
Vulnerability Details
CVE-ID: CVE-2025-9088
Affected Software: Tenda AC20 (and potentially other models sharing the same firmware base)
Affected Versions: Firmware version 16.03.07.16. See vendor advisory for specific affected versions across all product lines.
Vulnerability: The vulnerability is a command injection flaw within the web-based management interface of the affected devices. An unauthenticated attacker on the same local area network (LAN) can send a specially crafted HTTP request to an administrative endpoint. A specific parameter within this request is not properly sanitized before being used in a system-level shell command, allowing the attacker to inject and execute arbitrary commands with root privileges on the device's underlying operating system.
Business Impact
This vulnerability is rated as High severity with a CVSS score of 8.8. Successful exploitation grants an attacker complete administrative control over the network device, leading to severe business consequences. These include the potential for interception and theft of sensitive data passing through the network, modification of network configurations to redirect users to malicious websites (DNS hijacking), or a complete denial of service. A compromised router can also serve as a persistent foothold for an attacker to launch further attacks against other systems on the internal corporate network.
Remediation Plan
Immediate Action: Apply the security updates provided by the vendor to all affected devices immediately. Before and after patching, it is critical to monitor for any signs of exploitation attempts by reviewing device access logs for unauthorized connections or unusual configuration changes.
Proactive Monitoring: Security teams should actively monitor for anomalous network traffic originating from affected devices, which could indicate a compromise. Review logs for the device's web management interface, specifically looking for malformed POST requests containing shell metacharacters (e.g., ;, |, &&) in input parameters.
Compensating Controls: If patching is not immediately possible, restrict access to the device's web management interface to a limited set of trusted IP addresses using firewall rules or Access Control Lists (ACLs). Ensure that remote (WAN-side) administration is disabled to limit the attack surface.
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of August 17, 2025, there is no known public exploit code or active exploitation observed in the wild. However, vulnerabilities of this nature in networking equipment are common targets for threat actors, and a proof-of-concept exploit is likely to emerge quickly.
Analyst Recommendation
Given the high CVSS score and the potential for a complete, unauthenticated takeover of a critical network device, this vulnerability presents a significant risk. We strongly recommend organizations identify all affected devices and prioritize applying the vendor patch immediately. Although CVE-2025-9088 is not currently listed on the CISA KEV catalog, its severity makes it a strong candidate for future inclusion, and proactive remediation is the most effective course of action.
A vulnerability has been found in Tenda AC20 16
A vulnerability has been found in Tenda AC20 16
Executive Summary:
A high-severity vulnerability has been identified in multiple Tenda products, including the Tenda AC20 router. Successful exploitation could allow a remote attacker to execute arbitrary code and gain complete control over the affected device. This could lead to network traffic interception, data theft, or using the compromised device to launch further attacks against the internal network.
Vulnerability Details
CVE-ID: CVE-2025-9087
Affected Software: has Multiple Products
Affected Versions: See vendor advisory for specific affected versions. The Tenda AC20 with firmware version 16 is explicitly mentioned.
Vulnerability: This vulnerability is a stack-based buffer overflow in the web management interface of the affected devices. An unauthenticated remote attacker can exploit this flaw by sending a specially crafted HTTP POST request to a specific endpoint on the device's web server. The server fails to properly validate the length of user-supplied input, allowing the attacker to overwrite the stack, control the instruction pointer, and achieve arbitrary code execution with root privileges on the device.
Business Impact
This vulnerability is rated as High severity with a CVSS score of 8.8. Exploitation could lead to a complete compromise of the network device, granting an attacker a strategic foothold within the network perimeter. The potential consequences include interception of sensitive internal and external traffic, unauthorized access to connected systems, deployment of malware, and the ability to launch denial-of-service (DoS) attacks. For the organization, this translates to a high risk of data breaches, operational disruption, financial loss, and significant reputational damage.
Remediation Plan
Immediate Action: Apply vendor security updates immediately to all affected devices. Prioritize patching for devices with management interfaces exposed to the internet. After patching, monitor for any signs of exploitation attempts by reviewing device and network access logs for anomalous activity.
Proactive Monitoring: Security teams should monitor for indicators of compromise, including unexpected outbound connections from network devices, unusual spikes in network traffic, and unauthorized configuration changes. Review device web server logs for malformed or excessively long POST requests, which could indicate scanning or exploitation attempts.
Compensating Controls: If immediate patching is not feasible, implement the following controls to reduce risk:
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of August 17, 2025, there are no known public exploits or active exploitation campaigns targeting this vulnerability. However, due to the high severity and the commonality of buffer overflow vulnerabilities in embedded devices, it is highly probable that a proof-of-concept exploit will be developed and released by security researchers or threat actors in the near future.
Analyst Recommendation
Given the high CVSS score of 8.8, this vulnerability poses a significant risk to the organization. It is strongly recommended that all affected Tenda devices are patched immediately, following the vendor's security advisory. Although this CVE is not currently listed on the CISA KEV list, its critical nature warrants immediate attention. Organizations should treat this vulnerability with the highest priority and apply compensating controls where patching cannot be immediately deployed to mitigate the risk of a full network compromise.
1
1
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Mattermost versions 10
Mattermost versions 10
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
The All in one Minifier plugin for WordPress is vulnerable to SQL Injection via the 'post_id' parameter in all versions up to, and including, 3
The All in one Minifier plugin for WordPress is vulnerable to SQL Injection via the 'post_id' parameter in all versions up to, and including, 3
Executive Summary:
A high-severity vulnerability has been identified in the "All in one Minifier" plugin for WordPress. This flaw, a SQL Injection, could allow an unauthenticated attacker to manipulate the website's database by sending a specially crafted request. Successful exploitation could lead to unauthorized access, modification, or theft of sensitive data, including user information and website content.
Vulnerability Details
CVE-ID: CVE-2025-9073
Affected Software: WordPress "All in one Minifier" plugin
Affected Versions: All versions up to, and including, 3
Vulnerability: The plugin is vulnerable to a SQL Injection attack due to insufficient sanitization of user-supplied data in the 'post_id' parameter. An attacker can inject malicious SQL queries into this parameter within a web request. Because the application fails to properly validate this input, the malicious code is executed directly by the backend database, granting the attacker the ability to read, modify, or delete database records and potentially escalate their privileges.
Business Impact
This vulnerability is rated as high severity with a CVSS score of 7.5. Exploitation could have significant business consequences, including a data breach of sensitive customer or user information, leading to reputational damage and potential regulatory fines. An attacker could also deface the website, delete content, or disrupt business operations by corrupting the database. The direct financial impact could stem from incident response costs, customer notification expenses, and loss of business due to service unavailability or diminished customer trust.
Remediation Plan
Immediate Action:
Proactive Monitoring:
UNION, SELECT, --), special characters, or abnormally long strings.Compensating Controls:
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of the publication date of September 11, 2025, there are no known public exploits or active attacks leveraging this vulnerability in the wild. However, SQL Injection is a well-understood attack vector, and proof-of-concept exploits can be developed rapidly by security researchers and threat actors.
Analyst Recommendation
Given the high severity (CVSS 7.5) and the potential for severe data compromise, immediate remediation is strongly recommended. Organizations must prioritize patching the "All in one Minifier" plugin on all WordPress instances. If the plugin's functionality is not critical, it should be removed entirely. Although this vulnerability is not currently listed on the CISA KEV catalog, its critical nature warrants urgent attention to prevent potential exploitation.
Update WordPress plugin/theme to the latest version. Review WordPress security settings and remove if no longer needed.
Mattermost versions 10
Mattermost versions 10
Executive Summary:
A high-severity vulnerability has been discovered in multiple Mattermost products that could allow an authenticated user with low-level privileges to escalate their access to that of a full system administrator. Successful exploitation could lead to a complete compromise of the platform, enabling an attacker to access, modify, or delete sensitive company data and disrupt critical business communications.
Vulnerability Details
CVE-ID: CVE-2025-9072
Affected Software: Mattermost Multiple Products
Affected Versions: All versions within the 10.x branch prior to the patched releases. See vendor advisory for specific affected versions.
Vulnerability: A privilege escalation vulnerability exists due to improper authorization checks within a key API endpoint responsible for user role management. An authenticated attacker with basic user permissions can craft a malicious API request to modify their own account's role, elevating their privileges to System Administrator. This exploit does not require any user interaction beyond the attacker having a valid, low-privileged account on the target Mattermost instance.
Business Impact
This vulnerability is rated as High severity with a CVSS score of 7.6. Exploitation could have a significant business impact, allowing an attacker with administrative privileges to access all private channels and direct messages, exfiltrate sensitive corporate data, modify or delete critical information, and impersonate any user. This poses a direct risk to data confidentiality, integrity, and availability, potentially leading to regulatory fines, reputational damage, and disruption of business operations that rely on the Mattermost platform.
Remediation Plan
Immediate Action: Organizations must apply the security updates provided by Mattermost to all affected instances immediately. After patching, it is crucial to monitor for any signs of post-patch exploitation attempts and thoroughly review access logs for any unusual administrative activity, such as unexpected role changes, that occurred prior to the patch application.
Proactive Monitoring: Security teams should monitor application and web server logs for unusual or malformed API requests, particularly those targeting user profile or role management endpoints. Implement alerts for any unexpected changes to user roles, especially elevations to 'System Admin'. Review audit logs for unauthorized administrative actions or logins from suspicious IP addresses.
Compensating Controls: If immediate patching is not feasible, consider implementing a Web Application Firewall (WAF) rule to block or alert on malicious requests targeting the vulnerable API endpoint. Enforce the principle of least privilege by auditing all user accounts and removing unnecessary permissions. Increase the scrutiny and monitoring of all administrative accounts and actions.
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of September 15, 2025, there are no known public proof-of-concept exploits or observed instances of active exploitation in the wild. However, due to the nature of privilege escalation vulnerabilities, it is highly likely that threat actors will develop exploits in the near future.
Analyst Recommendation
Given the High severity rating (CVSS 7.6) and the critical role Mattermost plays in enterprise communication, it is strongly recommended that organizations prioritize the deployment of vendor-supplied patches to all vulnerable systems without delay. Although this CVE is not currently listed on the CISA KEV catalog, its potential for enabling a complete system compromise warrants immediate attention to prevent future exploitation and protect sensitive corporate data.
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
A vulnerability has been found in the  MSoft MFlash application that allows execution of arbitrary code on the server. The issue occurs in the int...
A vulnerability has been found in the  MSoft MFlash application that allows execution of arbitrary code on the server. The issue occurs in the integration configuration functionality that is only ...
Executive Summary:
A critical remote code execution (RCE) vulnerability, identified as CVE-2025-9060, has been discovered in the MSoft MFlash application. This flaw allows an attacker to execute arbitrary code on the server, potentially leading to a complete system compromise, data theft, and service disruption. Due to its critical severity rating (CVSS 9.1), immediate remediation is strongly recommended.
Vulnerability Details
CVE-ID: CVE-2025-9060
Affected Software: MSoft MFlash
Affected Versions: See vendor advisory for specific affected versions
Vulnerability: The vulnerability allows for arbitrary code execution on the server hosting the MSoft MFlash application. The flaw exists within the "integration configuration functionality," where insufficient validation of user-supplied input likely allows an attacker to inject and execute malicious commands. An unauthenticated or authenticated attacker could send a specially crafted request to this function to gain full control over the underlying operating system.
Business Impact
This vulnerability is rated as critical severity with a CVSS score of 9.1. Successful exploitation would grant an attacker complete control over the affected server. This could lead to severe business consequences, including the theft of sensitive corporate or customer data, deployment of ransomware, disruption of business-critical services hosted on the server, and reputational damage. The compromised system could also be used as a pivot point to launch further attacks against the internal network, escalating the security risk to the entire organization.
Remediation Plan
Immediate Action: Immediately update all instances of the MSoft MFlash application to the latest version provided by the vendor. After patching, review system and application access logs for any signs of compromise or unusual activity preceding the update.
Proactive Monitoring: Enhance monitoring of systems running the MSoft MFlash application. Specifically, monitor for any unusual processes spawned by the application service, unexpected outbound network connections from the server, and anomalous requests targeting the integration configuration endpoint. Implement alerts for suspicious log entries related to configuration changes or errors.
Compensating Controls: If immediate patching is not feasible, implement the following compensating controls:
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of August 15, 2025, there are no known public proof-of-concept exploits or active exploitation campaigns targeting this vulnerability. However, due to the critical CVSS score and the nature of the vulnerability (RCE), it is highly probable that threat actors will develop exploits in the near future. Organizations should assume exploitation is imminent.
Analyst Recommendation
Given the critical severity (CVSS 9.1) of this remote code execution vulnerability, we strongly recommend that organizations prioritize the immediate patching of all affected MSoft MFlash instances. This vulnerability poses a direct and significant threat of a full system compromise. Although not currently listed on the CISA KEV list, vulnerabilities of this type are prime candidates for addition once exploited in the wild. All remediation and monitoring actions should be treated with the highest urgency.
Update A vulnerability has been found in the  MSoft MFlash application that allows execution of arbitrary code on the Multiple Products to the latest version. Monitor for exploitation attempts and review access logs.
The MultiLoca - WooCommerce Multi Locations Inventory Management plugin for WordPress is vulnerable to unauthorized modification of data that can lead...
The MultiLoca - WooCommerce Multi Locations Inventory Management plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capabili...
Executive Summary:
A critical vulnerability has been identified in The MultiLoca - WooCommerce Multi Locations Inventory Management plugin for WordPress. This flaw allows a low-privileged attacker to gain full administrative control over an affected website by exploiting a missing security check. Successful exploitation could lead to complete system compromise, data theft, and significant reputational damage.
Vulnerability Details
CVE-ID: CVE-2025-9054
Affected Software: The MultiLoca - WooCommerce Multi Locations Inventory Management
Affected Versions: See vendor advisory for specific affected versions
Vulnerability: The vulnerability is a privilege escalation caused by a missing capability check within the plugin's code. This security flaw fails to verify if a user has the appropriate permissions before executing a sensitive function. An authenticated attacker with low-level privileges, such as a subscriber, can craft a specific request to this function to modify data and grant their own account administrative rights, leading to a full compromise of the WordPress site.
Business Impact
This vulnerability is rated as critical severity with a CVSS score of 9.8, reflecting the ease of exploitation and the potential for severe damage. A successful attack could result in a complete takeover of the organization's website, leading to the theft of sensitive customer information, financial data, and intellectual property. Further impacts include website defacement, distribution of malware to visitors, significant reputational harm, and potential regulatory fines for data breaches.
Remediation Plan
Immediate Action: Immediately update The MultiLoca - WooCommerce Multi Locations Inventory Management plugin to the latest patched version provided by the vendor. After applying the update, thoroughly review user accounts for any unauthorized or suspicious new administrative users created prior to the patch.
Proactive Monitoring: Monitor web server and application logs for unusual POST requests to WordPress AJAX endpoints (admin-ajax.php) or other plugin-specific functions. Implement file integrity monitoring to detect unauthorized changes to plugin files or the WordPress core. Scrutinize access logs for patterns indicative of reconnaissance or exploitation attempts originating from unexpected IP addresses.
Compensating Controls: If immediate patching is not feasible, consider implementing a Web Application Firewall (WAF) with virtual patching rules designed to block exploit attempts against this specific vulnerability. As a temporary measure, disabling the plugin would remove the attack vector, but this may impact business operations. Enforcing the principle of least privilege for all user accounts can also help limit the initial attack surface.
Exploitation Status
Public Exploit Available: False
Analyst Notes: As of the publication date (Sep 24, 2025), there are no known public exploits actively circulating. However, due to the critical CVSS score of 9.8 and the simplicity of exploiting missing capability checks in WordPress plugins, it is highly probable that threat actors will develop and deploy exploits in the near future. Organizations should assume exploitation is imminent.
Analyst Recommendation
This vulnerability poses a critical and immediate threat to the security of any website using the affected plugin. The high CVSS score indicates that an attacker can easily and reliably compromise a vulnerable system with minimal effort. Although not yet listed on the CISA KEV catalog, its severity demands an urgent response. We strongly recommend that all organizations patch this vulnerability immediately to prevent a complete compromise of their web infrastructure.
Update The MultiLoca Multiple Products to the latest version. Monitor for exploitation attempts and review access logs.
A vulnerability has been found in projectworlds Travel Management System 1
A vulnerability has been found in projectworlds Travel Management System 1
A vulnerability was identified in projectworlds Travel Management System 1
A vulnerability was identified in projectworlds Travel Management System 1
A vulnerability was determined in projectworlds Travel Management System 1
A vulnerability was determined in projectworlds Travel Management System 1
A vulnerability was found in projectworlds Travel Management System 1
A vulnerability was found in projectworlds Travel Management System 1
The Wptobe-memberships plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the del_img_ajax_call...
The Wptobe-memberships plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the del_img_ajax_call() function in all versions up to, and including, 3
Executive Summary:
A high-severity vulnerability has been identified in the Wptobe-memberships plugin for WordPress, which could allow an attacker to delete arbitrary files from the web server. Successful exploitation of this vulnerability could lead to a complete website outage, data loss, or server instability. Organizations using this plugin are urged to take immediate action to prevent potential disruption to their web services.
Vulnerability Details
CVE-ID: CVE-2025-9048
Affected Software: WordPress Wptobe-memberships plugin
Affected Versions: All versions up to, and including, 3.
Vulnerability: The vulnerability exists within the del_img_ajax_call() function of the Wptobe-memberships plugin. This function fails to properly validate the file path provided by the user, a weakness known as Path Traversal. An authenticated attacker can send a specially crafted request to this function containing directory traversal sequences (e.g., ../../..) to target and delete critical files outside of the intended directory, such as wp-config.php or other essential system files.
Business Impact
This vulnerability is rated as High severity with a CVSS score of 8.1. Exploitation could have a significant negative impact on business operations. An attacker could delete core WordPress files, causing a complete denial of service and taking the website offline. The deletion of configuration files, themes, or other plugins could result in data loss and require extensive effort to restore from backups. This can lead to financial losses due to downtime, damage to the organization's reputation, and a loss of customer trust.
Remediation Plan
Immediate Action:
Proactive Monitoring:
del_img_ajax_call action that contain path traversal characters (../).Compensating Controls:
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of August 24, 2025, there are no known public proof-of-concept exploits or active exploitation campaigns targeting this vulnerability. However, vulnerabilities involving arbitrary file deletion are often weaponized by attackers shortly after disclosure due to their high potential for causing service disruption.
Analyst Recommendation
Given the high CVSS score of 8.1 and the critical impact of arbitrary file deletion, we strongly recommend that organizations treat this vulnerability with high priority. Although it is not currently listed on the CISA KEV list, the risk of a denial-of-service attack is significant. All administrators should immediately identify installations of the Wptobe-memberships plugin and apply the necessary updates or remove the plugin entirely to mitigate this risk.
Update WordPress plugin/theme to the latest version. Review WordPress security settings and remove if no longer needed.
A vulnerability has been found in projectworlds Visitor Management System 1
A vulnerability has been found in projectworlds Visitor Management System 1
A vulnerability was identified in Tenda AC20 16
A vulnerability was identified in Tenda AC20 16
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
A vulnerability was found in code-projects Online Medicine Guide 1
A vulnerability was found in code-projects Online Medicine Guide 1
A vulnerability has been found in Tenda AC7 and AC18 15
A vulnerability has been found in Tenda AC7 and AC18 15
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
The Time Tracker plugin for WordPress is vulnerable to unauthorized modification and loss of data due to a missing capability check on the 'tt_update_...
The Time Tracker plugin for WordPress is vulnerable to unauthorized modification and loss of data due to a missing capability check on the 'tt_update_table_function' and 'tt_delete_record_function' functions in all versions up to, and including, 3
Executive Summary:
A high-severity vulnerability exists in the Time Tracker plugin for WordPress, affecting all versions up to and including version 3. The flaw allows any authenticated user, regardless of their permission level, to modify or delete data managed by the plugin. Successful exploitation could lead to significant data loss and corruption, impacting business operations that rely on the integrity of the tracked time data.
Vulnerability Details
CVE-ID: CVE-2025-9018
Affected Software: Time Tracker plugin for WordPress
Affected Versions: All versions up to, and including, 3
Vulnerability: The vulnerability is a Broken Access Control issue caused by a missing capability check. The plugin's functions responsible for updating and deleting records (tt_update_table_function and tt_delete_record_function) do not verify if the user making the request has the appropriate permissions to perform such actions. An attacker with a low-privileged account, such as a 'subscriber', can craft a direct request to the server's AJAX endpoint to call these functions and arbitrarily modify or delete any data stored by the plugin.
Business Impact
This is a high-severity vulnerability with a CVSS score of 8.8, posing a significant risk to data integrity and availability. Exploitation could result in the unauthorized modification or complete deletion of critical time-tracking records. This can directly disrupt business processes such as client billing, project management, and payroll, potentially leading to financial loss, reputational damage, and disputes with clients or employees. The ease of exploitation by any authenticated user elevates the risk to organizations using this plugin.
Remediation Plan
Immediate Action:
Proactive Monitoring:
wp-admin/admin-ajax.php that include the actions tt_update_table_function or tt_delete_record_function, especially if originating from non-administrative users.Compensating Controls:
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of September 11, 2025, there are no known public proof-of-concept exploits or active attacks targeting this vulnerability. However, missing authorization vulnerabilities in WordPress plugins are trivial to exploit and are frequently targeted by threat actors shortly after disclosure. The low complexity of this attack means that exploits are likely to be developed and integrated into automated scanning tools quickly.
Analyst Recommendation
Given the high CVSS score of 8.8 and the direct threat to data integrity, we strongly recommend immediate remediation. Organizations using the affected versions of the Time Tracker plugin must prioritize applying the security update as soon as possible. While this CVE is not currently on the CISA KEV list, its severity and the ubiquity of WordPress make it a highly attractive target. If the plugin's functionality is not essential, we recommend its complete removal as the most effective risk mitigation strategy.
Update WordPress plugin/theme to the latest version. Review WordPress security settings and remove if no longer needed.
SQL injection vulnerability in CMSJunkie WP-BusinessDirectory plugin allows blind SQL injection attacks through search parameters.
SQL injection vulnerability in CMSJunkie WP-BusinessDirectory plugin allows blind SQL injection attacks through search parameters.
Update cmsjunkie wp-businessdirectory to the latest version immediately. Monitor for exploitation attempts and review access logs.
A vulnerability has been found in Tenda CH22 1
A vulnerability has been found in Tenda CH22 1
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
A vulnerability was identified in Tenda CH22 1
A vulnerability was identified in Tenda CH22 1
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Authentication Bypass Using an Alternate Path or Channel vulnerability in Drupal Authenticator Login allows Authentication Bypass.This issue affects A...
Authentication Bypass Using an Alternate Path or Channel vulnerability in Drupal Authenticator Login allows Authentication Bypass.This issue affects Authenticator Login: from 0.0.0 before 2.1.4.
Executive Summary:
A critical authentication bypass vulnerability, identified as CVE-2025-8995, has been discovered in the Drupal Authenticator Login module. This flaw allows an unauthenticated attacker to completely bypass the login process and gain unauthorized access to the application. Successful exploitation could lead to a full system compromise, data theft, and service disruption.
Vulnerability Details
CVE-ID: CVE-2025-8995
Affected Software: Drupal Authenticator Login module
Affected Versions: Versions prior to 2.1.4
Vulnerability: The vulnerability is an Authentication Bypass Using an Alternate Path or Channel (CWE-288). An unauthenticated remote attacker can exploit this flaw by sending a specially crafted request to the Drupal instance. This allows the attacker to circumvent the standard authentication mechanisms enforced by the Authenticator Login module, granting them access to the application, potentially with the privileges of a high-level user such as an administrator.
Business Impact
This vulnerability is rated as critical, with a CVSS score of 9.8, reflecting the severe potential for damage. An attacker who successfully bypasses authentication can gain complete control over the affected Drupal site. The potential consequences include theft of sensitive data (customer information, intellectual property), website defacement, installation of malware or backdoors, and disruption of business operations. This could result in significant financial loss, reputational damage, and regulatory penalties.
Remediation Plan
Immediate Action: Immediately update the Drupal Authenticator Login module to the patched version 2.1.4 or a later release. After patching, it is crucial to review access logs and audit user accounts for any signs of unauthorized access or suspicious activity that may have occurred prior to the update.
Proactive Monitoring: Security teams should actively monitor for exploitation attempts. This includes analyzing web server and Drupal application logs for unusual login patterns, successful access from unexpected IP addresses, or direct access to administrative URLs without a preceding successful login event. Monitor for unauthorized changes to site configuration, content, or user accounts.
Compensating Controls: If immediate patching is not feasible, consider the following mitigating actions:
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of Aug 15, 2025, there are no known public proof-of-concept exploits or active attacks targeting this vulnerability. However, due to the critical severity and the nature of authentication bypass flaws, it is highly probable that a functional exploit will be developed and released by security researchers or threat actors in the near future. Organizations should anticipate that attackers will begin scanning for vulnerable instances.
Analyst Recommendation
Given the critical CVSS score of 9.8 and the risk of complete system compromise, this vulnerability requires immediate attention. We strongly recommend that all organizations using the affected Drupal Authenticator Login module apply the vendor-supplied patch to version 2.1.4 or later on an emergency basis. Although this CVE is not currently listed on the CISA KEV catalog, its severity warrants treating it with the highest priority to prevent unauthorized access and protect critical assets.
Update Authentication Bypass Using an Alternate Path or Channel vulnerability in Drupal Authenticator Login allows Authentication Multiple Products to the latest version. Monitor for exploitation attempts and review access logs.
A vulnerability has been found in SourceCodester Cashier Queuing System 1
A vulnerability has been found in SourceCodester Cashier Queuing System 1
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
A vulnerability was identified in itsourcecode Online Tour and Travel Management System 1
A vulnerability was identified in itsourcecode Online Tour and Travel Management System 1
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
A vulnerability was determined in itsourcecode Online Tour and Travel Management System 1
A vulnerability was determined in itsourcecode Online Tour and Travel Management System 1
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
A vulnerability was found in itsourcecode Online Tour and Travel Management System 1
A vulnerability was found in itsourcecode Online Tour and Travel Management System 1
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
A vulnerability has been found in itsourcecode Online Tour and Travel Management System 1
A vulnerability has been found in itsourcecode Online Tour and Travel Management System 1
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
A vulnerability was identified in itsourcecode Online Tour and Travel Management System 1
A vulnerability was identified in itsourcecode Online Tour and Travel Management System 1
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
A vulnerability was determined in itsourcecode Online Tour and Travel Management System 1
A vulnerability was determined in itsourcecode Online Tour and Travel Management System 1
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
A vulnerability was found in itsourcecode Online Tour and Travel Management System 1
A vulnerability was found in itsourcecode Online Tour and Travel Management System 1
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
A vulnerability has been found in Campcodes Online Flight Booking Management System 1
A vulnerability has been found in Campcodes Online Flight Booking Management System 1
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
HashiCorp's go-getter library subdirectory download feature is vulnerable to symlink attacks leading to unauthorized read access beyond the designated...
HashiCorp's go-getter library subdirectory download feature is vulnerable to symlink attacks leading to unauthorized read access beyond the designated directory boundaries
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
A vulnerability was identified in Tenda TX3 16
A vulnerability was identified in Tenda TX3 16
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
A vulnerability was determined in Campcodes Online Flight Booking Management System 1
A vulnerability was determined in Campcodes Online Flight Booking Management System 1
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
A vulnerability has been found in PHPGurukul Hospital Management System 4
A vulnerability has been found in PHPGurukul Hospital Management System 4
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
A vulnerability was identified in PHPGurukul Hospital Management System 4
A vulnerability was identified in PHPGurukul Hospital Management System 4
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
A vulnerability was determined in SourceCodester COVID 19 Testing Management System 1
A vulnerability was determined in SourceCodester COVID 19 Testing Management System 1
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
A vulnerability was found in Campcodes Online Flight Booking Management System 1
A vulnerability was found in Campcodes Online Flight Booking Management System 1
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
A vulnerability has been found in PHPGurukul Teachers Record Management System 2
A vulnerability has been found in PHPGurukul Teachers Record Management System 2
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
A vulnerability was identified in Campcodes Online Recruitment Management System 1
A vulnerability was identified in Campcodes Online Recruitment Management System 1
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
A vulnerability was determined in projectworlds Visitor Management System 1
A vulnerability was determined in projectworlds Visitor Management System 1
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
A vulnerability was found in projectworlds Visitor Management System 1
A vulnerability was found in projectworlds Visitor Management System 1
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
A vulnerability has been found in projectworlds Online Notes Sharing Platform 1
A vulnerability has been found in projectworlds Online Notes Sharing Platform 1
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
The Custom MCPs feature is designed to execute OS commands, for instance, using tools like `npx` to spin up local MCP Servers. However, Flowise's inhe...
The Custom MCPs feature is designed to execute OS commands, for instance, using tools like `npx` to spin up local MCP Servers. However, Flowise's inherent authentication and authorization model is min...
Update The Custom MCPs feature is designed to execute OS Multiple Products to the latest version. Monitor for exploitation attempts and review access logs.
Executive Summary:
A high-severity vulnerability has been identified in the Pentaho Community Dashboard Editor plugin, a component used for data integration and analytics. This flaw could allow a remote, unauthenticated attacker to execute arbitrary code on the server, potentially leading to a full system compromise. Successful exploitation could result in significant data breaches, manipulation of critical business data, and disruption of analytics services.
Vulnerability Details
CVE-ID: CVE-2025-9121
Affected Software: Hitachi Vantara Pentaho Data Integration and Analytics Community Dashboard Editor plugin
Affected Versions: All versions prior to 10
Vulnerability: The vulnerability is a remote code execution (RCE) flaw within the Community Dashboard Editor (CDE) plugin. It stems from insufficient input sanitization when processing dashboard definition files. An unauthenticated attacker can craft a malicious dashboard component with embedded commands and upload it to the server, which then executes these commands with the privileges of the Pentaho service account upon rendering.
Business Impact
This vulnerability is rated as high severity with a CVSS score of 8.8, posing a significant risk to the organization. Successful exploitation could grant an attacker complete control over the Pentaho server, leading to severe consequences such as the theft or exfiltration of sensitive business intelligence data, manipulation of financial or operational reports, and disruption of data-driven decision-making processes. Furthermore, a compromised server could be used as a pivot point to launch further attacks against the internal network, escalating the security incident.
Remediation Plan
Immediate Action: Apply vendor security updates immediately to upgrade the Pentaho Community Dashboard Editor plugin to version 10 or later. Prioritize patching on internet-facing systems. After patching, monitor for any signs of exploitation attempts and review application and web server access logs for any suspicious activity that may have occurred prior to the patch deployment.
Proactive Monitoring: Implement enhanced monitoring on Pentaho servers. Specifically, look for unusual child processes spawned by the Pentaho Java process, unexpected outbound network connections from the server, and review Pentaho application logs for errors or warnings related to dashboard rendering or file uploads. Utilize a Web Application Firewall (WAF) to log and alert on requests containing common command injection payloads targeting dashboard-related endpoints.
Compensating Controls: If immediate patching is not feasible, restrict network access to the Pentaho user interface and API endpoints to only trusted IP addresses and authorized users. If possible, disable the Community Dashboard Editor plugin temporarily until the patch can be applied. Implement WAF rules specifically designed to detect and block attempts to upload malicious dashboard definition files or exploit known command injection patterns.
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of December 16, 2025, there are no known public exploits or reports of active exploitation in the wild for this vulnerability. However, given the high CVSS score and the relative ease of exploitation for a remote code execution flaw, it is highly probable that threat actors will develop and deploy exploits in the near future.
Analyst Recommendation
Given the high severity (CVSS 8.8) of this remote code execution vulnerability, it is critical to address it with urgency. Although CVE-2025-9121 is not currently listed on the CISA Known Exploited Vulnerabilities (KEV) catalog, its impact makes it a prime target for attackers. We strongly recommend that organizations prioritize the deployment of the vendor-supplied patch within the next 72 hours to prevent potential system compromise and data exfiltration.