An issue in the flow
Description
An issue in the flow
Remediation
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Search and filter 8341 vulnerabilities with AI analyst insights
An issue in the flow
An issue in the flow
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
A GPU device-ID validation flaw in the flow
A GPU device-ID validation flaw in the flow
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Incorrect access control in the selectDept function of RuoYi v4
Incorrect access control in the selectDept function of RuoYi v4
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Incorrect access control in the update function of RuoYi v4.8.2 allows unauthorized attackers to arbitrarily modify data outside of their scope.
Incorrect access control in the update function of RuoYi v4.8.2 allows unauthorized attackers to arbitrarily modify data outside of their scope.
Update Incorrect access control in the update function of RuoYi Multiple Products to the latest version. Monitor for exploitation attempts and review access logs.
Incorrect access control in the authRoutes function of SpringBlade v4.5.0 allows attackers with low-level privileges to escalate privileges.
Incorrect access control in the authRoutes function of SpringBlade v4.5.0 allows attackers with low-level privileges to escalate privileges.
Update Incorrect access control in the authRoutes function of SpringBlade Multiple Products to the latest version. Monitor for exploitation attempts and review access logs.
Incorrect access control in the importUser function of SpringBlade v4.5.0 allows attackers with low-level privileges to arbitrarily import sensitive u...
Incorrect access control in the importUser function of SpringBlade v4.5.0 allows attackers with low-level privileges to arbitrarily import sensitive user data.
Update Incorrect access control in the importUser function of SpringBlade Multiple Products to the latest version. Monitor for exploitation attempts and review access logs.
Fastjson before 1.2.48 mishandles autoType because, when an @type key is in a JSON document, and the value of that key is the name of a Java class, th...
Fastjson before 1.2.48 mishandles autoType because, when an @type key is in a JSON document, and the value of that key is the name of a Java class, there may be calls to certain public methods of that class. Depending on the behavior of those methods, there may be JNDI injection with an attacker-supplied payload located elsewhere in that JSON document. This was exploited in the wild in 2023 through 2025. NOTE: this issue exists because of an incomplete fix for CVE-2017-18349. Also, a later bypass is covered by CVE-2022-25845.
Executive Summary:
A critical remote code execution vulnerability, identified as CVE-2025-70974, exists in older versions of the Fastjson library. This flaw allows an unauthenticated attacker to take complete control of an affected server by sending a specially crafted data request, potentially leading to data theft, service disruption, and further network compromise. Due to its critical severity and history of active exploitation, immediate remediation is strongly advised.
Vulnerability Details
CVE-ID: CVE-2025-70974
Affected Software: Multiple products using the Fastjson library
Affected Versions: All versions of Fastjson prior to 1.2.48
Vulnerability:
This vulnerability is an insecure deserialization flaw rooted in Fastjson's "autoType" feature. When autoType is enabled, an attacker can submit a malicious JSON payload containing an @type key. This key specifies the name of a Java class on the server's classpath that Fastjson will then instantiate.
An attacker can leverage "gadget chains" by pointing the @type key to a class with specific public methods (e.g., setters or constructors) that are automatically invoked during deserialization. By providing an attacker-controlled value elsewhere in the JSON, such as a JNDI lookup URL (e.g., ldap://attacker.com/a), the gadget class can be tricked into connecting to an attacker's server. This server then responds with a malicious serialized Java object, which is executed on the victim's machine, resulting in unauthenticated Remote Code Execution (RCE).
Business Impact
This vulnerability is rated as critical severity with a CVSS score of 10.0, reflecting the highest possible risk. Successful exploitation allows an unauthenticated attacker to execute arbitrary code with the permissions of the application server. This can lead to a complete system compromise, enabling the attacker to steal sensitive corporate or customer data, install ransomware, deploy cryptocurrency miners, or use the compromised server as a pivot point to attack other systems within the internal network. The potential consequences include severe financial loss, significant reputational damage, and potential regulatory fines.
Remediation Plan
Immediate Action:
The primary remediation is to upgrade the Fastjson library in all affected applications to version 1.2.48 or a later, secure version. After patching, administrators must monitor for any ongoing exploitation attempts by reviewing application, web server, and system access logs for suspicious JSON payloads or unusual outbound network activity.
Proactive Monitoring:
@type keyword followed by suspicious class names (e.g., com.sun.rowset.JdbcRowSetImpl, org.apache.xbean.propertyeditor.JndiConverter).sh, bash, cmd.exe, powershell.exe).Compensating Controls:
If immediate patching is not feasible, the following controls can help mitigate risk:
Exploitation Status
Public Exploit Available: true
Analyst Notes:
As of January 9, 2026, this vulnerability has a documented history of being actively exploited in the wild from 2023 through 2025, prior to its official public disclosure. This indicates that threat actors have been leveraging this flaw for an extended period, and many systems may already be compromised. The exploit is a bypass of a previous patch (CVE-2017-18349), and threat actors are highly proficient at weaponizing Fastjson vulnerabilities due to their prevalence and impact.
Analyst Recommendation
Given the critical CVSS score of 10.0 and confirmed long-term exploitation by threat actors, this vulnerability represents an extreme and immediate threat. All organizations must prioritize identifying and patching affected applications by upgrading the Fastjson library to version 1.2.48 or later without delay. While this CVE is not yet on the CISA KEV list as of its publication, its exploit history makes it a prime candidate for future inclusion. Due to the pre-disclosure exploitation, organizations should assume compromise and initiate incident response procedures, including hunting for indicators of compromise described in the Proactive Monitoring section.
Update Fastjson before Multiple Products to the latest version. Monitor for exploitation attempts and review access logs.
FreeImage 3.18.0 contains a Use After Free in PluginTARGA.cpp;loadRLE().
FreeImage 3.18.0 contains a Use After Free in PluginTARGA.cpp;loadRLE().
Executive Summary:
A critical Use-After-Free vulnerability has been identified in the FreeImage library, a widely used open-source component for image processing. An attacker can exploit this flaw by tricking a user or an automated process into opening a specially crafted TARGA (TGA) image file, which could lead to arbitrary code execution and a complete compromise of the affected system.
Vulnerability Details
CVE-ID: CVE-2025-70968
Affected Software: FreeImage Multiple Products
Affected Versions: Version 3.18.0 is confirmed vulnerable. See vendor advisory for a complete list of affected products and versions.
Vulnerability: The vulnerability is a Use-After-Free error within the loadRLE() function of the PluginTARGA.cpp component. This function is responsible for parsing Run-Length Encoded (RLE) data in TARGA image files. An attacker can create a malicious TGA image that, when processed by the vulnerable library, causes the application to deallocate a memory region and then attempt to use (read from or write to) that same freed memory. This memory corruption can be leveraged by the attacker to hijack the application's control flow, leading to arbitrary code execution in the security context of the user or service running the application.
Business Impact
This vulnerability is rated as critical severity with a CVSS score of 9.8. Successful exploitation could have a severe impact on the business, leading to a full system compromise. An attacker could execute malicious code to steal sensitive data, install ransomware or other malware, disrupt operations, or use the compromised system as a pivot point to move laterally within the network. Given that the FreeImage library is embedded in numerous third-party applications (e.g., content management systems, graphic design tools, server-side image processors), the attack surface could be extensive and difficult to identify, posing a significant risk to confidentiality, integrity, and availability.
Remediation Plan
Immediate Action: Immediately identify all applications and systems utilizing the vulnerable FreeImage library and update them to the latest patched version as recommended by the vendor. After patching, monitor for any signs of exploitation attempts by reviewing application and system access logs for unusual activity related to image file processing.
Proactive Monitoring: Implement enhanced monitoring for applications that process image files, particularly TGA files from untrusted sources. Look for signs of compromise such as unexpected application crashes, suspicious child processes being spawned by image-processing applications, or unauthorized outbound network connections from affected systems. Intrusion Detection Systems (IDS) and Security Information and Event Management (SIEM) systems should be configured with rules to detect anomalies associated with this type of exploit.
Compensating Controls: If immediate patching is not feasible, implement the following controls to mitigate risk:
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of the publication date (Jan 14, 2026), there are no known public proof-of-concept exploits or active exploitation campaigns targeting this vulnerability. However, due to the critical severity and the common nature of this vulnerability class in image parsing libraries, it is highly probable that threat actors will develop exploits in the near future.
Analyst Recommendation
Given the critical CVSS score of 9.8, this vulnerability poses a severe and immediate threat. We strongly recommend that organizations prioritize the patching of this vulnerability across all affected systems. A comprehensive inventory should be conducted to identify all instances of the FreeImage library, including those embedded within third-party software. Although this CVE is not currently listed on the CISA KEV list, its high impact score makes it a prime candidate for future inclusion and a high-value target for attackers. Remediate immediately to prevent potential system compromise.
Update FreeImage Multiple Products to the latest version. Monitor for exploitation attempts and review access logs.
A time-based blind SQL Injection vulnerability exists in PHPGurukul Cyber Cafe Management System v1
A time-based blind SQL Injection vulnerability exists in PHPGurukul Cyber Cafe Management System v1
Executive Summary:
A high-severity vulnerability has been identified in the PHPGurukul Cyber Cafe Management System, which could allow an unauthenticated attacker to steal sensitive information from the underlying database. Successful exploitation of this flaw could lead to a complete data breach, exposing customer records, credentials, and other confidential data. Organizations are urged to apply the vendor-supplied patch immediately to mitigate this critical risk.
Vulnerability Details
CVE-ID: CVE-2025-70893
Affected Software: PHPGurukul Cyber Cafe Management System
Affected Versions: v1
Vulnerability: The vulnerability is a time-based blind SQL Injection. An attacker can exploit this by sending specially crafted input to the application, which is then passed to a database query without proper sanitization. The crafted input includes SQL commands that instruct the database to pause or delay its response for a specific amount of time if a certain condition is true. By measuring the server's response time, the attacker can infer the result of the condition, allowing them to exfiltrate data from the database one character at a time, bypass authentication, or potentially gain control over the database server.
Business Impact
This vulnerability is rated as High severity with a CVSS score of 8.8. A successful attack could have significant business consequences, including unauthorized access to and exfiltration of sensitive data such as customer personal information, user credentials, and transaction history. This could lead to a major data breach, resulting in severe reputational damage, financial loss, and potential regulatory fines for non-compliance with data protection standards. If the database service account has excessive privileges, the attacker could also modify or delete data, or even escalate their privileges to compromise the underlying server.
Remediation Plan
Immediate Action: The primary and most effective remediation is to apply the security patches provided by the vendor immediately. In addition, conduct a thorough review of all database user accounts and access controls to ensure the application is operating with the principle of least privilege. It is also recommended to enable detailed database query logging to create an audit trail for detecting and investigating potential exploitation attempts.
Proactive Monitoring: Monitor web application and database logs for suspicious queries, particularly those containing SQL keywords like SLEEP, BENCHMARK, or other time-delay functions. Network traffic should be monitored for unusually long response times from the web server, which is a key indicator of time-based blind SQL injection exploitation.
Compensating Controls: If immediate patching is not feasible, deploy a Web Application Firewall (WAF) with a strict ruleset designed to detect and block common SQL injection patterns. This can serve as a temporary mitigation by filtering malicious requests before they reach the vulnerable application. However, a WAF should be considered a temporary measure and not a substitute for patching the underlying vulnerability.
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of January 16, 2026, there are no known public proof-of-concept exploits or reports of this vulnerability being actively exploited in the wild. The vulnerability is not currently listed on the CISA Known Exploited Vulnerabilities (KEV) catalog.
Analyst Recommendation
Given the high CVSS score of 8.8, this vulnerability presents a critical risk to the organization. We strongly recommend that the vendor-provided patch for CVE-2025-70893 be applied as a top priority across all affected systems. While there is no current evidence of active exploitation, the nature of SQL injection vulnerabilities makes them a prime target for attackers. In addition to patching, the recommended actions for reviewing access controls and enabling logging should be implemented to strengthen the overall security posture and improve detection capabilities.
Apply vendor patches immediately. Review database access controls and enable query logging.
Phpgurukul Cyber Cafe Management System v1.0 contains a SQL Injection vulnerability in the user management module. The application fails to properly v...
Phpgurukul Cyber Cafe Management System v1.0 contains a SQL Injection vulnerability in the user management module. The application fails to properly validate user-supplied input in the username parameter of the add-users.php endpoint.
Executive Summary:
A critical SQL Injection vulnerability, identified as CVE-2025-70892, has been discovered in Phpgurukul Cyber Cafe Management System v1.0. This flaw allows an unauthenticated attacker to execute arbitrary commands on the backend database by sending malicious input to the user management module. Successful exploitation could lead to a complete compromise of the system, resulting in data theft, data corruption, and unauthorized system access.
Vulnerability Details
CVE-ID: CVE-2025-70892
Affected Software: Phpgurukul Cyber Cafe Management System Multiple Products
Affected Versions: Version 1.0 is confirmed to be vulnerable. See vendor advisory for a complete list of affected products and versions.
Vulnerability: The vulnerability is a classic SQL Injection that exists within the user management module, specifically in the add-users.php endpoint. The application fails to properly sanitize or validate the username parameter before incorporating it into a database query. An attacker can craft a malicious username value containing SQL syntax, which will then be executed by the database, allowing them to bypass security controls, exfiltrate sensitive data, modify database records, or potentially gain remote code execution on the server.
Business Impact
This vulnerability presents a critical risk to the organization, reflected by its CVSS score of 9.8. Successful exploitation could lead to a severe data breach, exposing sensitive user information, administrative credentials, and financial records managed by the cyber cafe system. An attacker could gain full control over the application and its underlying database, leading to service disruption, reputational damage, financial loss, and potential legal or regulatory penalties. The ability for an unauthenticated attacker to achieve this level of compromise makes it a high-priority threat.
Remediation Plan
Immediate Action: Organizations must immediately update all instances of Phpgurukul Cyber Cafe Management System to the latest patched version as recommended by the vendor. After patching, review system and database access logs for any signs of compromise or suspicious activity related to the add-users.php endpoint.
Proactive Monitoring: Implement enhanced monitoring on web server and database logs. Specifically, look for requests to add-users.php containing SQL keywords (e.g., SELECT, UNION, DROP, SLEEP) or special characters (', --, ;) within the username parameter. Monitor for unusual database queries, unauthorized user account creation, or unexpected system behavior.
Compensating Controls: If immediate patching is not feasible, deploy a Web Application Firewall (WAF) with rules specifically designed to detect and block SQL Injection attacks. Enforce the principle of least privilege for the database user account connected to the application to limit the potential impact of an exploit.
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of the publication date, January 15, 2026, there are no known public exploits or active exploitation campaigns targeting this vulnerability. The vulnerability is not listed on the CISA Known Exploited Vulnerabilities (KEV) catalog. However, due to the ease of exploitation and high impact, it is highly likely that threat actors will develop exploits in the near future.
Analyst Recommendation
Given the critical severity (CVSS 9.8) and the potential for complete system compromise, it is strongly recommended that organizations prioritize the immediate application of the vendor-supplied patch. Although this vulnerability is not currently listed in the CISA KEV catalog, its high score indicates a significant risk. If patching is delayed, the implementation of compensating controls like a WAF is essential to mitigate the immediate threat. All internet-facing instances of this software should be considered at extreme risk and must be addressed without delay.
Update Phpgurukul Cyber Cafe Management System Multiple Products to the latest version. Monitor for exploitation attempts and review access logs.
Dokans SaaS platform allows unauthenticated attackers to download the `.env` file, exposing encryption keys, database credentials, and API keys, leadi...
Dokans SaaS platform allows unauthenticated attackers to download the `.env` file, exposing encryption keys, database credentials, and API keys, leading to total multi-tenant system compromise.
Description Summary:
Dokans SaaS platform allows unauthenticated attackers to download the .env file, exposing encryption keys, database credentials, and API keys, leading to total multi-tenant system compromise.
Executive Summary:
A critical information disclosure vulnerability in Dokans eCommerce SaaS allows unauthenticated attackers to steal sensitive configuration files, resulting in full compromise of all tenant data.
Vulnerability Details
CVE-ID: CVE-2025-70841
Affected Software: Dokans Multi-Tenancy Based eCommerce Platform SaaS
Affected Versions: 3.9.2
Vulnerability: The application permits unauthenticated remote attackers to access the /script/.env file directly. This file contains the Laravel APP_KEY, database credentials, and SMTP/SendGrid API keys.
Business Impact
The CVSS score of 10.0 reflects the absolute severity of this leak. Exposure of the APP_KEY allows for session token forgery and authentication bypass, while database credentials grant direct access to sensitive tenant information. Furthermore, the theft of API keys allows attackers to hijack email infrastructure, causing massive financial and reputational harm across the entire SaaS ecosystem.
Remediation Plan
Immediate Action: Update the platform to the latest version and immediately rotate all secrets, including the APP_KEY, database passwords, and API keys.
Proactive Monitoring: Inspect web server logs for any GET requests to the /script/.env path and monitor for unauthorized database logins.
Compensating Controls: Configure the web server (Nginx/Apache) to explicitly deny access to all hidden files and files starting with a dot (.) globally.
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of Feb 3, 2026, there is no public information indicating active exploitation. However, .env file exposure is a well-known and highly sought-after vulnerability by automated exploit scripts.
Analyst Recommendation
This is a "scorched earth" scenario; simply patching is insufficient. Administrators must rotate every single credential found in the .env file immediately after updating the software to prevent attackers who may have already harvested the data from maintaining access.
Update Arch Multiple Products to the latest version. Monitor for exploitation attempts and review access logs.
A vulnerability classified as critical has been found in Shenzhen Libituo Technology LBT-T300-T310 up to 2
A vulnerability classified as critical has been found in Shenzhen Libituo Technology LBT-T300-T310 up to 2
Tenda AX-1806 v1
Tenda AX-1806 v1
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Tenda AX-1806 v1
Tenda AX-1806 v1
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Tenda AX-1806 v1
Tenda AX-1806 v1
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Tenda AX-1806 v1
Tenda AX-1806 v1
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Tenda AX-1803 v1
Tenda AX-1803 v1
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Tenda AX-1806 v1
Tenda AX-1806 v1
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Tenda AX1803 v1
Tenda AX1803 v1
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Tenda AX1803 v1
Tenda AX1803 v1
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Tenda AX-1806 v1
Tenda AX-1806 v1
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Tenda AX-1806 v1
Tenda AX-1806 v1
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
The LatePoint plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 5
The LatePoint plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 5
Executive Summary:
A high-severity Cross-Site Request Forgery (CSRF) vulnerability has been identified in the LatePoint plugin for WordPress. This flaw could allow an unauthenticated attacker to trick a logged-in administrator into unknowingly executing malicious actions, potentially leading to a full compromise of the affected website's settings, user data, or functionality.
Vulnerability Details
CVE-ID: CVE-2025-7052
Affected Software: WordPress Multiple Products
Affected Versions: All versions of the LatePoint plugin up to, and including, version 5.
Vulnerability: The LatePoint plugin for WordPress is vulnerable to Cross-Site Request Forgery (CSRF). This is due to a lack of sufficient security nonces or other token-based validation on state-changing requests. An attacker can craft a malicious link, form, or script and trick an authenticated administrator into clicking it or visiting a malicious page. The administrator's browser would then automatically submit the forged request to the vulnerable website, executing actions with the administrator's privileges without their consent or knowledge.
Business Impact
This is a High severity vulnerability with a CVSS score of 8.8. Successful exploitation could have a significant negative impact on the business. An attacker could perform unauthorized actions such as modifying the plugin's configuration, deleting appointments and customer data, or potentially escalating privileges by creating a new rogue administrator account. This could lead to operational disruption, data breaches, reputational damage, and financial loss associated with remediation and customer notification.
Remediation Plan
Immediate Action: Immediately update the LatePoint WordPress plugin to the latest version provided by the vendor, which contains the necessary security patch. After updating, review all WordPress security settings to ensure they are correctly configured. If the plugin is no longer needed, it should be deactivated and uninstalled to reduce the overall attack surface.
Proactive Monitoring: Monitor web server access logs for unusual or unauthorized POST requests to the LatePoint plugin's administrative functions, especially those originating from unexpected referrers. Security teams should also set up alerts for the creation of new administrative user accounts or unexpected configuration changes within the WordPress dashboard.
Compensating Controls: If immediate patching is not feasible, implement a Web Application Firewall (WAF) with rules specifically designed to detect and block CSRF attacks. Enforce strict referrer policies and ensure administrators log out of their sessions when not in use. Restricting access to the WordPress administrative area (/wp-admin/) to trusted IP addresses can also reduce the risk of exploitation.
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of September 30, 2025, there are no known public exploits or active exploitation campaigns targeting this vulnerability. However, CSRF vulnerabilities are often straightforward to exploit once the weakness is identified. Organizations should assume that threat actors may develop and deploy exploits rapidly.
Analyst Recommendation
Given the high CVSS score of 8.8, this vulnerability poses a significant risk to affected WordPress sites. We strongly recommend that all organizations using the LatePoint plugin prioritize the immediate installation of the patched version. Although this vulnerability is not currently on the CISA Known Exploited Vulnerabilities (KEV) catalog, its high potential for impact warrants urgent attention. Proactive patching is the most effective defense against potential exploitation.
Update WordPress plugin/theme to the latest version. Review WordPress security settings and remove if no longer needed.
On N-central, it is possible for any authenticated user to read, write and modify syslog configuration across customers on an N-central server
On N-central, it is possible for any authenticated user to read, write and modify syslog configuration across customers on an N-central server
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
The Use-your-Drive | Google Drive plugin for WordPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'title' parameter in...
The Use-your-Drive | Google Drive plugin for WordPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'title' parameter in file metadata in all versions up to, and including, 3
Executive Summary:
A high-severity vulnerability has been identified in the "Use-your-Drive | Google Drive plugin for WordPress," which could allow an attacker to inject malicious code into a website. If exploited, this could lead to the compromise of user and administrator accounts, theft of sensitive data, or a complete takeover of the affected website. Organizations using this plugin are urged to apply security updates immediately to mitigate the significant risk to their web presence and data security.
Vulnerability Details
CVE-ID: CVE-2025-7050
Affected Software: Google Multiple Products (Specifically: Use-your-Drive | Google Drive plugin for WordPress)
Affected Versions: All versions up to, and including, version 3.
Vulnerability: The vulnerability is a Stored Cross-Site Scripting (XSS) flaw. An attacker with permissions to upload or manage files in the Google Drive account connected to the WordPress plugin can craft a malicious file title containing executable JavaScript code. When the plugin renders this file's metadata on the WordPress site, it fails to properly sanitize the 'title' parameter, causing the malicious script to be stored on the server and executed in the browser of any user who views the page displaying the file. This allows for session hijacking, credential theft, website defacement, or redirecting users to malicious websites.
Business Impact
This vulnerability is rated as High severity with a CVSS score of 7.2. Exploitation could have a significant business impact, including reputational damage resulting from a defaced website or compromised user data. An attacker could steal session cookies to impersonate logged-in users, including administrators, potentially leading to a full compromise of the WordPress site. This could result in the theft of sensitive business or customer information, unauthorized content changes, and the use of the compromised website to launch further attacks against its visitors.
Remediation Plan
Immediate Action: Immediately update the "Use-your-Drive | Google Drive plugin for WordPress" to a patched version (greater than 3) as recommended by the vendor. After patching, review web server and application logs for any signs of past exploitation attempts, such as suspicious script tags in requests or logs related to the plugin's file display functions.
Proactive Monitoring: Implement continuous monitoring of web application logs, specifically looking for patterns indicative of XSS attacks. This includes searching for HTML tags like <script>, <img>, or <iframe> and JavaScript event handlers like onerror or onload within data fields associated with the plugin. A properly configured Web Application Firewall (WAF) can be instrumental in detecting and blocking such malicious injection attempts in real-time.
Compensating Controls: If immediate patching is not feasible, consider implementing the following controls:
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of August 5, 2025, there are no known public proof-of-concept exploits or active malicious campaigns targeting this vulnerability. However, Stored XSS vulnerabilities in popular WordPress plugins are common targets for threat actors, and exploits can be developed with relative ease. Organizations should assume that this vulnerability will be targeted in the near future.
Analyst Recommendation
Given the high severity (CVSS 7.2) and the nature of the Stored XSS vulnerability, we strongly recommend that organizations identify all WordPress instances using the "Use-your-Drive | Google Drive" plugin and prioritize applying the vendor-supplied patch immediately. Although this CVE is not currently on the CISA KEV list, its potential impact on website integrity and data confidentiality is severe. Proactive patching is the most effective defense and should be completed urgently to prevent potential exploitation.
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
The WPGYM - Wordpress Gym Management System plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 67
The WPGYM - Wordpress Gym Management System plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 67
Executive Summary:
A high-severity privilege escalation vulnerability has been identified in the WPGYM - Wordpress Gym Management System plugin. This flaw could allow a low-privileged attacker, such as a subscriber, to gain unauthorized administrative access to the WordPress website. Successful exploitation would result in a complete compromise of the site, enabling the attacker to steal data, deface the site, or install malware.
Vulnerability Details
CVE-ID: CVE-2025-7049
Affected Software: WPGYM - Wordpress Gym Management System plugin for WordPress
Affected Versions: All versions up to, and including, 67
Vulnerability: The vulnerability allows for privilege escalation within the affected WordPress plugin. An authenticated attacker with low-level permissions (e.g., a subscriber account) can exploit a flaw in the plugin to elevate their privileges to that of an administrator. This typically occurs due to missing or improper authorization checks, allowing a user to access and execute administrative functions that should be restricted.
Business Impact
This vulnerability is rated as High severity with a CVSS score of 8.8, posing a significant risk to the organization. A successful exploit would grant an attacker full administrative control over the affected website. This could lead to severe business consequences, including the theft of sensitive customer data, website defacement causing reputational damage, distribution of malware to visitors, and potential financial losses. A compromised website could also be used as a pivot point to launch further attacks against the organization's internal network.
Remediation Plan
Immediate Action: Immediately update the WPGYM - Wordpress Gym Management System plugin to the latest version (greater than version 67). After patching, review all user accounts, especially those with administrative privileges, to ensure no unauthorized accounts have been created. If the plugin is no longer required for business operations, it should be deactivated and completely removed from the WordPress installation.
Proactive Monitoring: Monitor WordPress audit logs for any unexpected changes in user roles, particularly any escalation to an administrator role. Scrutinize logs for unusual activity from low-privileged accounts attempting to access administrative functions. System administrators should also monitor for the creation of suspicious files on the web server or unauthorized modifications to core WordPress files.
Compensating Controls: If immediate patching is not feasible, implement a Web Application Firewall (WAF) with rules designed to block privilege escalation attempts. Restrict access to the WordPress administrative dashboard (/wp-admin/) to trusted IP addresses only. Enforce the principle of least privilege for all user accounts and conduct regular security reviews of all installed plugins and themes.
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of September 10, 2025, there is no known public proof-of-concept exploit code or evidence of this vulnerability being actively exploited in the wild. However, vulnerabilities of this nature in popular WordPress plugins are often quickly weaponized by threat actors once details become public. The high CVSS score indicates that the vulnerability is relatively easy to exploit.
Analyst Recommendation
Given the high severity (CVSS 8.8) of this vulnerability, we strongly recommend that all instances of the WPGYM plugin be patched immediately. The potential for a complete website compromise presents a critical risk that must be addressed with urgency. Although this CVE is not currently on the CISA KEV list, its impact warrants immediate attention. After remediation, a thorough security audit should be performed to search for any indicators of compromise, such as newly created admin accounts or suspicious files.
Update Wordpress plugin/theme to the latest version. Review WordPress security settings and remove if no longer needed.
An Improper Input Validation vulnerability exists in the user websocket handler of MAAS
An Improper Input Validation vulnerability exists in the user websocket handler of MAAS
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Use After Free vulnerability exists in the IPT file reading procedure in SOLIDWORKS eDrawings on Release SOLIDWORKS Desktop 2025
Use After Free vulnerability exists in the IPT file reading procedure in SOLIDWORKS eDrawings on Release SOLIDWORKS Desktop 2025
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
The Cloud SAML SSO plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'set_organization_...
The Cloud SAML SSO plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'set_organization_settings' action of the csso_handle_actions() function in all versions up to, and including, 1
Executive Summary:
A high-severity vulnerability has been identified in the Cloud SAML SSO plugin for WordPress, which could allow an unauthorized user to modify critical organization settings. This flaw exists because the plugin fails to properly check user permissions before allowing changes, creating a risk of security misconfiguration, authentication bypass, or data manipulation. Organizations using this plugin should apply the recommended update immediately to prevent potential exploitation.
Vulnerability Details
CVE-ID: CVE-2025-7040
Affected Software: WordPress Cloud SAML SSO plugin
Affected Versions: All versions up to, and including, 1.
Vulnerability: The vulnerability is a missing capability check within the csso_handle_actions() function of the plugin. Specifically, when the function is called with the set_organization_settings action, it does not verify if the user initiating the request has the appropriate administrative privileges. A low-privileged authenticated attacker, such as a subscriber, can craft a malicious request to this function to modify the plugin's organizational settings, potentially altering SAML SSO configurations without authorization.
Business Impact
This vulnerability is rated as High severity with a CVSS score of 8.2. Successful exploitation could lead to significant business disruption and security compromise. An attacker could modify Single Sign-On (SSO) settings to lock out legitimate administrators, redirect users to malicious identity providers to steal credentials, or disable security features, thereby weakening the overall security posture of the WordPress site. This poses a direct risk to the confidentiality, integrity, and availability of the application and its associated user data.
Remediation Plan
Immediate Action: Immediately update the Cloud SAML SSO plugin to the latest available version, which will be a version greater than 1. If the plugin is not essential for business operations, consider deactivating and removing it to eliminate the attack surface entirely.
Proactive Monitoring: Monitor web server access logs for POST requests targeting the WordPress AJAX handler (/wp-admin/admin-ajax.php) that contain the action=set_organization_settings parameter. Scrutinize any such requests originating from IP addresses or user accounts that do not have administrative privileges. A sudden change in the plugin's configuration files should also trigger an alert.
Compensating Controls: If immediate patching is not feasible, implement a Web Application Firewall (WAF) rule to block or flag requests containing the set_organization_settings action from non-administrative users. Additionally, enforce the principle of least privilege for all WordPress user accounts, ensuring users only have the permissions necessary for their roles.
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of September 7, 2025, there are no known public proof-of-concept exploits or active exploitation campaigns targeting this vulnerability. However, given the ease of exploitation for authenticated users and the high-impact nature of the flaw, it is highly probable that threat actors will develop exploits in the near future.
Analyst Recommendation
Given the high CVSS score of 8.2, organizations are strongly advised to treat this vulnerability with high priority. The potential for an authenticated, low-privileged user to escalate privileges or compromise the site's authentication mechanism presents a significant risk. Although this CVE is not currently listed on the CISA KEV catalog, immediate patching is the most effective mitigation. All instances of the Cloud SAML SSO plugin should be identified and updated without delay.
Update WordPress plugin/theme to the latest version. Review WordPress security settings and remove if no longer needed.
The LatePoint plugin for WordPress is vulnerable to Authentication Bypass due to insufficient identity verification within the steps__load_step route...
The LatePoint plugin for WordPress is vulnerable to Authentication Bypass due to insufficient identity verification within the steps__load_step route of the latepoint_route_call AJAX endpoint in all versions up to, and including, 5
Executive Summary:
A high-severity authentication bypass vulnerability has been identified in the LatePoint plugin for WordPress. This flaw allows an unauthenticated attacker to bypass security checks and gain unauthorized access to functions within the plugin, potentially leading to data exposure, modification of appointments, and further compromise of the affected website. Immediate patching is required to mitigate the significant risk to data confidentiality and integrity.
Vulnerability Details
CVE-ID: CVE-2025-7038
Affected Software: LatePoint plugin for WordPress
Affected Versions: All versions up to, and including, 5
Vulnerability: The vulnerability exists due to insufficient identity verification in the latepoint_route_call AJAX action, specifically when handling the steps__load_step route. An unauthenticated attacker can send a specially crafted request to this endpoint. Because the endpoint fails to properly validate the user's session or privileges, the attacker can bypass authentication controls and execute functions that should be restricted to authenticated, privileged users.
Business Impact
This vulnerability is rated as High severity with a CVSS score of 8.2. Successful exploitation could lead to significant business disruption and data compromise. An attacker could potentially access and exfiltrate sensitive customer information and personally identifiable information (PII) stored by the booking plugin, modify or delete existing appointments, or create fraudulent ones. This poses a direct threat to data confidentiality and integrity, potentially resulting in reputational damage, customer distrust, and regulatory fines.
Remediation Plan
Immediate Action: Immediately update the LatePoint plugin to the latest version available (a version greater than 5) which contains the security patch for this vulnerability. After updating, review the WordPress site's security settings and user accounts for any signs of compromise. If the plugin is no longer required for business operations, it should be deactivated and removed completely.
Proactive Monitoring: Monitor web server and WAF (Web Application Firewall) logs for suspicious POST requests to the /wp-admin/admin-ajax.php endpoint. Specifically, look for requests containing action=latepoint_route_call and route_name=steps__load_step originating from untrusted or unusual IP addresses. Monitor for unauthorized changes to appointments or user data within the LatePoint system.
Compensating Controls: If immediate patching is not feasible, implement a Web Application Firewall (WAF) rule to block or flag requests to the vulnerable AJAX endpoint. Restrict access to the WordPress admin area (/wp-admin/) to trusted IP addresses only. Ensure the principle of least privilege is applied to all user accounts.
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of September 30, 2025, there are no known public exploits or active exploitation campaigns targeting this vulnerability. However, authentication bypass vulnerabilities in popular WordPress plugins are highly sought after by threat actors, and it is likely that a proof-of-concept exploit will be developed and published. The vulnerability is not currently listed on CISA's Known Exploited Vulnerabilities (KEV) catalog.
Analyst Recommendation
Given the high severity (CVSS 8.2) and the critical nature of an authentication bypass, it is strongly recommended that organizations prioritize the immediate update of the LatePoint plugin on all WordPress instances. Although there is no evidence of active exploitation at this time, the risk of compromise is significant. Proactive patching is the most effective defense to prevent potential unauthorized access and protect sensitive customer data.
Update WordPress plugin/theme to the latest version. Review WordPress security settings and remove if no longer needed.
The CleverReach® WP plugin for WordPress is vulnerable to time-based SQL Injection via the ‘title’ parameter in all versions up to, and including, 1
The CleverReach® WP plugin for WordPress is vulnerable to time-based SQL Injection via the ‘title’ parameter in all versions up to, and including, 1
Executive Summary:
A high-severity vulnerability has been identified in the CleverReach® WP WordPress plugin, which could allow an unauthenticated attacker to steal sensitive information from the website's database. This flaw, a time-based SQL Injection, can be exploited remotely to extract data such as user credentials, personal information, and confidential site content. Organizations using this plugin are at significant risk of a data breach and should take immediate action to mitigate the threat.
Vulnerability Details
CVE-ID: CVE-2025-7036
Affected Software: CleverReach® WP plugin for WordPress
Affected Versions: All versions up to, and including, 1
Vulnerability: The vulnerability is a time-based blind SQL Injection. An unauthenticated attacker can send specially crafted SQL queries through the 'title' parameter of the plugin. By injecting commands that cause a time delay in the database response (e.g., SLEEP()), the attacker can infer the contents of the database one character at a time based on how long the server takes to respond. This allows for the gradual exfiltration of sensitive data without directly seeing the query output.
Business Impact
This vulnerability is rated as High severity with a CVSS score of 7.5. Successful exploitation could lead to a complete compromise of the confidentiality of the website's database. The potential business impact includes the theft of sensitive customer data, user credentials, and proprietary business information, leading to significant reputational damage, financial loss, and potential regulatory penalties (e.g., under GDPR or CCPA). Furthermore, stolen administrator credentials could be used to gain full control over the affected WordPress site, enabling further malicious activities.
Remediation Plan
Immediate Action: The primary remediation is to update the CleverReach® WP plugin to the latest patched version (greater than version 1) as recommended by the vendor. If the plugin is not essential for business operations, the most secure course of action is to deactivate and completely remove it to eliminate the attack surface.
Proactive Monitoring: Monitor web server access logs for unusual or lengthy requests targeting the plugin's functionality, specifically looking for malicious payloads in the 'title' parameter. Implement and review Web Application Firewall (WAF) logs for alerts related to SQL Injection attempts. Database monitoring should be configured to flag abnormally long-running queries or those containing SLEEP or BENCHMARK commands.
Compensating Controls: If patching cannot be performed immediately, deploy a properly configured Web Application Firewall (WAF) with rules designed to detect and block SQL Injection attacks. This can serve as a virtual patch by inspecting incoming traffic and blocking malicious requests before they reach the vulnerable plugin. Additionally, ensure the database user associated with WordPress has the least privileges necessary, which can limit the scope of data an attacker can access if the exploit is successful.
Exploitation Status
Public Exploit Available: False
Analyst Notes: As of August 6, 2025, there are no known public exploits for this vulnerability. However, the CISA KEV status is "No", meaning it is not currently known to be actively exploited in the wild. Given the popularity of WordPress and the relative simplicity of exploiting SQL injection flaws, it is highly probable that threat actors will develop exploits and begin scanning for vulnerable systems in the near future.
Analyst Recommendation
Given the High severity rating (CVSS 7.5) and the risk of a complete database compromise, we strongly recommend that organizations immediately identify all WordPress instances running the vulnerable CleverReach® WP plugin. The plugin must be updated to the latest secure version without delay. If the plugin is no longer required, it should be removed entirely. The lack of a "Yes" on the CISA KEV list should not be a reason for inaction; proactive patching is critical to prevent exploitation by opportunistic attackers who actively target WordPress vulnerabilities.
Update WordPress plugin/theme to the latest version. Review WordPress security settings and remove if no longer needed.
An out-of-bounds read in the GSF demuxer filter component of GPAC v2
An out-of-bounds read in the GSF demuxer filter component of GPAC v2
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
A stack overflow in the dump_ttxt_sample function of GPAC v2
A stack overflow in the dump_ttxt_sample function of GPAC v2
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
A buffer overflow in the vobsub_get_subpic_duration() function of GPAC v2
A buffer overflow in the vobsub_get_subpic_duration() function of GPAC v2
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
GPAC v2
GPAC v2
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Improper Access Control vulnerability in Akın Software Computer Import Export Industry and Trade Ltd
Improper Access Control vulnerability in Akın Software Computer Import Export Industry and Trade Ltd
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
NULL Pointer Dereference vulnerability in Avast Antivirus on MacOS, Avast Anitvirus on Linux when scanning a malformed Windows PE file causes the anti...
NULL Pointer Dereference vulnerability in Avast Antivirus on MacOS, Avast Anitvirus on Linux when scanning a malformed Windows PE file causes the antivirus process to crash
Executive Summary:
A high-severity vulnerability has been identified in Avast Antivirus for MacOS and Linux. An attacker can exploit this flaw by sending a specially crafted file to a target system, causing the antivirus software to crash and creating a temporary gap in security protection. This denial-of-service condition leaves the system vulnerable to other malware until the antivirus service is restarted.
Vulnerability Details
CVE-ID: CVE-2025-7007
Affected Software: Avast Antivirus on Multiple Products
Affected Versions: See vendor advisory for specific affected versions
Vulnerability: The vulnerability is a NULL Pointer Dereference that occurs within the antivirus scanning engine on MacOS and Linux platforms. When the antivirus software attempts to scan a malformed Windows Portable Executable (PE) file, the engine tries to access a memory address that has not been properly initialized (a NULL pointer). This illegal memory access causes an unhandled exception, leading to the immediate termination and crash of the antivirus process. An attacker can trigger this vulnerability by delivering the malformed PE file to a target system via email, web download, or other vectors, resulting in a denial of service of the security software.
Business Impact
This vulnerability is rated as High severity with a CVSS score of 7.5. The primary business impact is a denial of service for a critical security control. Exploitation of this flaw will crash the antivirus service, leaving endpoints temporarily without active malware scanning and real-time protection. This creates a window of opportunity for attackers to deploy secondary payloads, such as ransomware, spyware, or remote access trojans, which would otherwise be detected and blocked. Repeated attacks could cause system instability and require manual intervention to restore protection, impacting user productivity and increasing the organization's risk of a more significant security breach.
Remediation Plan
Immediate Action: Apply the security updates provided by the vendor across all affected MacOS and Linux endpoints immediately to patch the vulnerability. After deployment, verify that the antivirus service is running and stable. Review system and application logs for evidence of recent antivirus process crashes which may indicate prior exploitation attempts.
Proactive Monitoring: Monitor endpoint security logs for unexpected crashes or restarts of the Avast antivirus service. Configure Endpoint Detection and Response (EDR) or Security Information and Event Management (SIEM) systems to generate alerts for repeated termination of the antivirus process. Network security monitoring can be used to inspect for an unusual influx of PE files targeting non-Windows systems.
Compensating Controls: If immediate patching is not feasible, implement stricter filtering at email gateways and web proxies to block or quarantine executable files (PE files) from untrusted sources. Ensure other security layers, such as host-based firewalls and EDR solutions, are enabled and fully updated to provide defense-in-depth and potentially detect follow-on malicious activity.
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of December 1, 2025, there are no known public proof-of-concept exploits or active exploitation campaigns targeting this vulnerability. However, denial-of-service vulnerabilities in security products are attractive to attackers as a method to disable defenses before launching a more sophisticated attack. Organizations should assume that an exploit could be developed with minimal effort.
Analyst Recommendation
Given the High severity rating (CVSS 7.5) and the critical role of antivirus software in an organization's defense-in-depth strategy, we recommend immediate action. The primary risk is the temporary disabling of endpoint protection, which could serve as a gateway for more damaging attacks. Although this vulnerability is not currently listed on the CISA KEV list, its potential impact on security posture warrants prioritizing the deployment of the vendor-provided patches to all affected systems.
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Improper use of encryption in the agent of Ivanti Endpoint Manager before version 2024 SU3 and 2022 SU8 Security Update 1 allows a local authenticated...
Improper use of encryption in the agent of Ivanti Endpoint Manager before version 2024 SU3 and 2022 SU8 Security Update 1 allows a local authenticated attacker to decrypt other users’ passwords
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Improper use of encryption in the agent of Ivanti Endpoint Manager before version 2024 SU3 and 2022 SU8 Security Update 1 allows a local authenticated...
Improper use of encryption in the agent of Ivanti Endpoint Manager before version 2024 SU3 and 2022 SU8 Security Update 1 allows a local authenticated attacker to decrypt other users’ passwords
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
The Reveal Listing plugin by smartdatasoft for WordPress is vulnerable to privilege escalation in versions up to, and including, 3.3. This is due to t...
The Reveal Listing plugin by smartdatasoft for WordPress is vulnerable to privilege escalation in versions up to, and including, 3.3. This is due to the plugin allowing users who are registering new a...
Executive Summary:
A critical privilege escalation vulnerability, identified as CVE-2025-6994, has been discovered in the Reveal Listing plugin for WordPress. This flaw allows a low-privileged user, such as a new registrant, to gain administrative access to the affected WordPress site during the registration process. Successful exploitation could result in a complete compromise of the website, leading to data theft, defacement, or further attacks originating from the compromised server.
Vulnerability Details
CVE-ID: CVE-2025-6994
Affected Software: The Reveal Listing plugin by smartdatasoft for WordPress
Affected Versions: All versions up to, and including, 3.3
Vulnerability: The vulnerability exists within the user registration functionality of the Reveal Listing plugin. The registration process fails to properly sanitize or validate the user role parameter submitted by a new user. An unauthenticated attacker can craft a special registration request, injecting a parameter to assign their new account the 'administrator' role, bypassing the default 'subscriber' role assignment. This grants the attacker full administrative privileges upon account creation.
Business Impact
This vulnerability is rated as critical severity with a CVSS score of 9.8. A successful exploit would grant an attacker complete control over the affected WordPress website. This could lead to severe business consequences, including the theft of sensitive customer data and intellectual property, reputational damage from website defacement, financial loss if the site is used for e-commerce, and legal or regulatory penalties. The compromised website could also be used to host malware, launch phishing campaigns against customers, or act as a pivot point for further attacks into the corporate network.
Remediation Plan
Immediate Action: Immediately update the Reveal Listing plugin to the latest patched version provided by the vendor, smartdatasoft. After patching, it is crucial to review all existing user accounts, especially those with high privileges, to identify and remove any unauthorized accounts that may have been created by exploiting this vulnerability.
Proactive Monitoring: System administrators should actively monitor web server access logs for suspicious POST requests to user registration endpoints. Specifically, look for registration attempts that contain unexpected parameters related to user roles (e.g., role=administrator). Additionally, implement alerts for the creation of any new user account with administrative-level privileges.
Compensating Controls: If immediate patching is not feasible, consider the following controls:
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of the publication date of August 6, 2025, there are no known public proof-of-concept exploits or active exploitation campaigns targeting this vulnerability. However, due to the critical CVSS score and the simplicity of exploitation, it is highly probable that threat actors will develop and deploy exploits rapidly.
Analyst Recommendation
Given the critical severity (CVSS 9.8) of this vulnerability, we strongly recommend that organizations using the affected plugin apply the vendor-supplied patch immediately. The risk of a full website compromise is high. Although this CVE is not currently on the CISA KEV list, its characteristics make it a prime candidate for future inclusion and widespread exploitation. Prioritize patching this vulnerability across all relevant assets without delay and conduct a thorough audit for signs of compromise.
Update The Reveal Listing plugin by smartdatasoft for WordPress is vulnerable to privilege escalation in versions up Multiple Products to the latest version. Monitor for exploitation attempts and review access logs.
The Ultimate WP Mail plugin for WordPress is vulnerable to Privilege Escalation due to improper authorization within the get_email_log_details() AJAX...
The Ultimate WP Mail plugin for WordPress is vulnerable to Privilege Escalation due to improper authorization within the get_email_log_details() AJAX handler in versions 1
Executive Summary:
A high-severity vulnerability exists within the Ultimate WP Mail plugin for WordPress, allowing for privilege escalation. An attacker with low-level access to a WordPress site could exploit this flaw to view sensitive email logs, potentially exposing confidential user data, password reset links, or other private communications. This poses a significant risk of a data breach and could lead to further unauthorized actions.
Vulnerability Details
CVE-ID: CVE-2025-6993
Affected Software: WordPress Multiple Products
Affected Versions: See vendor advisory for specific affected versions. The vulnerability is confirmed in versions within the 1.x branch.
Vulnerability: The vulnerability is an improper authorization flaw within the get_email_log_details() function, which is handled via an AJAX action. The function fails to properly verify that the user making the request has sufficient permissions to view email logs. An authenticated attacker, even with low-level privileges (e.g., a subscriber), can send a specially crafted AJAX request directly to this handler to retrieve the contents of email logs, which should be restricted to administrators.
Business Impact
This vulnerability is rated as High severity with a CVSS score of 7.5. Exploitation could lead to a significant data breach by exposing sensitive information transmitted via email, such as user registration details, password reset tokens, private messages, and order confirmations. The specific risks to the organization include reputational damage, loss of customer trust, non-compliance with data protection regulations (like GDPR), and the potential for attackers to leverage the exposed information to gain further access to user accounts or other systems.
Remediation Plan
Immediate Action: Immediately update the Ultimate WP Mail plugin to the latest available version, which contains a patch for this vulnerability. If the plugin is not critical to business operations, consider deactivating and removing it to eliminate the attack surface. Always back up your site before performing updates.
Proactive Monitoring: Monitor web server and WordPress audit logs for suspicious AJAX requests to wp-admin/admin-ajax.php, specifically looking for calls to the get_email_log_details action from non-administrative users. A sudden increase in such requests could indicate attempted or successful exploitation.
Compensating Controls: If patching cannot be performed immediately, implement a Web Application Firewall (WAF) rule to block or limit access to the vulnerable AJAX action (get_email_log_details) for users who are not administrators. Additionally, enforce the principle of least privilege by regularly reviewing user roles and capabilities to ensure they only have the access necessary for their function.
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of the publication date, July 16, 2025, there are no known public proof-of-concept exploits or active exploitation campaigns targeting this vulnerability. The vulnerability is not listed on the CISA Known Exploited Vulnerabilities (KEV) catalog, indicating it is not currently subject to widespread, active attacks.
Analyst Recommendation
Given the high severity rating (CVSS 7.5) and the direct risk of sensitive data exposure, we strongly recommend that all organizations using the Ultimate WP Mail plugin prioritize applying the security update immediately. Although there is no evidence of active exploitation at this time, the technical simplicity of the vulnerability means that exploits could be developed quickly. Proactive patching is the most effective defense to prevent potential data breaches and protect organizational and user data.
Update WordPress plugin/theme to the latest version. Review WordPress security settings and remove if no longer needed.
The kallyas theme for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 4
The kallyas theme for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 4
An unauthenticated information disclosure vulnerability in Newgen OmniApp allows attackers to enumerate valid privileged usernames via a publicly acce...
An unauthenticated information disclosure vulnerability in Newgen OmniApp allows attackers to enumerate valid privileged usernames via a publicly accessible client-side JavaScript resource
Executive Summary:
A high-severity vulnerability has been identified in multiple products from the vendor "accessible," specifically impacting the Newgen OmniApp component. This flaw allows an unauthenticated attacker to remotely discover valid, privileged usernames by accessing a publicly available JavaScript file. This information disclosure significantly aids attackers in conducting targeted follow-on attacks, such as password spraying or brute-forcing, to compromise high-value accounts.
Vulnerability Details
CVE-ID: CVE-2025-69908
Affected Software: accessible Multiple Products
Affected Versions: See vendor advisory for specific affected versions
Vulnerability: The vulnerability exists within a client-side JavaScript resource associated with the Newgen OmniApp functionality. This file is accessible without authentication and contains data or logic that allows an attacker to enumerate valid usernames, with a focus on those holding elevated privileges. An attacker can exploit this by simply browsing to the specific JavaScript file, analyzing its contents, and extracting the list of usernames, requiring no special tools or privileges.
Business Impact
This vulnerability is rated as High severity with a CVSS score of 7.5. While it does not directly lead to a system compromise, it provides attackers with the critical first step for a targeted attack: a list of valid, high-privilege usernames. This exposure dramatically increases the risk of successful account takeover through password spraying, credential stuffing, or brute-force attacks. A compromised privileged account could lead to a significant data breach, unauthorized system configuration changes, denial of service, or full administrative control over affected applications.
Remediation Plan
Immediate Action: The primary remediation is to apply the security updates provided by the vendor across all affected systems immediately. After patching, organizations should review web server and application access logs for any anomalous or repeated requests to the vulnerable JavaScript resource, which could indicate past or ongoing exploitation attempts.
Proactive Monitoring: Security teams should implement monitoring rules to detect and alert on multiple failed login attempts from a single source, especially against the privileged accounts that may have been exposed. Monitor network traffic for unusual patterns of access to client-side script files. SIEM (Security Information and Event Management) platforms should be configured to correlate access to the vulnerable resource with subsequent login failures.
Compensating Controls: If immediate patching is not feasible, organizations should implement compensating controls. Use a Web Application Firewall (WAF) or web server access controls to block or restrict external access to the specific vulnerable JavaScript file. Enforce Multi-Factor Authentication (MFA) and a strong, complex password policy for all administrative and privileged accounts to mitigate the risk of account compromise even if usernames are known.
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of January 24, 2026, there are no known public proof-of-concept exploits or observed in-the-wild attacks leveraging this vulnerability. However, due to the simplicity of exploitation (requiring only a web browser), it is highly likely that threat actors will develop exploits quickly.
Analyst Recommendation
Given the high severity (CVSS 7.5) and the critical reconnaissance advantage this vulnerability provides to attackers, we strongly recommend that organizations prioritize the immediate application of the vendor-supplied security patches. Although this CVE is not currently on the CISA KEV list, its nature as a precursor to more severe attacks on privileged accounts warrants urgent attention. Implementing compensating controls like MFA and access restrictions should be considered a temporary measure until patching is complete.
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
An unauthenticated information disclosure vulnerability exists in Newgen OmniDocs due to missing authentication and access control on the /omnidocs/Ge...
An unauthenticated information disclosure vulnerability exists in Newgen OmniDocs due to missing authentication and access control on the /omnidocs/GetListofCabinet API endpoint
Executive Summary:
A high-severity information disclosure vulnerability has been identified in Newgen OmniDocs. This flaw allows an unauthenticated attacker to remotely access a list of data repositories, known as "cabinets," by exploiting a missing security check on a specific API endpoint. Successful exploitation could provide an attacker with valuable reconnaissance information to facilitate further, more targeted attacks against the organization's data.
Vulnerability Details
CVE-ID: CVE-2025-69907
Affected Software: Newgen OmniDocs
Affected Versions: See vendor advisory for specific affected versions
Vulnerability: The vulnerability exists due to a lack of authentication and authorization on the /omnidocs/GetListofCabinet API endpoint. An unauthenticated remote attacker can send a direct request to this endpoint without providing any credentials. The server will improperly process this request and respond with a complete list of all configured "cabinets," which are high-level containers for documents and data within the OmniDocs platform. This exposes the internal data structure and naming conventions, which can be leveraged for reconnaissance and planning subsequent attacks.
Business Impact
This vulnerability is rated as High severity with a CVSS score of 7.5. While it does not allow for direct data exfiltration or system modification, the information disclosed is highly valuable for an attacker. By obtaining the list of cabinets, an attacker can map the organization's data layout, identify potentially high-value targets (e.g., cabinets named "Finance," "HR," or "Legal"), and refine social engineering or other targeted attacks. This exposure increases the risk of a future data breach and can reveal sensitive information about the organization's structure and operations.
Remediation Plan
Immediate Action: The primary remediation is to apply the security updates provided by the vendor to all affected Newgen OmniDocs instances immediately. After patching, administrators should review web server and application access logs for any evidence of unauthorized access to the vulnerable API endpoint prior to the patch being applied.
Proactive Monitoring: Implement monitoring and alerting for anomalous access patterns to the /omnidocs/GetListofCabinet API endpoint. Security teams should look for multiple requests from unknown or external IP addresses, which could indicate scanning or exploitation attempts. Monitor for any follow-on suspicious activity originating from IPs that accessed this endpoint.
Compensating Controls: If immediate patching is not feasible, implement the following controls to mitigate risk:
/omnidocs/GetListofCabinet URL.Exploitation Status
Public Exploit Available: false
Analyst Notes: As of January 25, 2026, there are no known public proof-of-concept exploits or active exploitation campaigns targeting this vulnerability. However, given the simplicity of exploitation (a single unauthenticated web request), it is highly likely that threat actors will develop exploits and begin scanning for vulnerable systems in the near future.
Analyst Recommendation
Given the High severity rating (CVSS 7.5) and the ease of exploitation, it is strongly recommended that organizations prioritize applying the vendor-supplied security patches to all vulnerable Newgen OmniDocs systems without delay. Although this vulnerability is not currently listed on the CISA KEV catalog, its reconnaissance value makes it an attractive target for attackers. If patching cannot be performed immediately, implement the suggested compensating controls, such as WAF rules, to block access to the vulnerable endpoint and reduce the attack surface.
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
The kallyas theme for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 4
The kallyas theme for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 4
Executive Summary:
A critical Remote Code Execution (RCE) vulnerability, identified as CVE-2025-6990, has been discovered in the Kallyas theme for WordPress. This flaw allows an unauthenticated attacker to execute arbitrary code on the server, potentially leading to a complete compromise of the affected website, data theft, and further network intrusion.
Vulnerability Details
CVE-ID: CVE-2025-6990
Affected Software: WordPress Kallyas Theme
Affected Versions: All versions up to, and including, 4.0
Vulnerability: The Kallyas theme contains a flaw that fails to properly sanitize user-supplied input. An unauthenticated remote attacker can exploit this by sending a specially crafted request to a vulnerable component within the theme. Successful exploitation allows the attacker to execute arbitrary commands on the underlying server with the privileges of the web server process, leading to a full system compromise.
Business Impact
This vulnerability is rated as High severity with a CVSS score of 8.8. A successful exploit would grant an attacker complete control over the affected website and potentially the underlying server. The consequences include, but are not limited to, theft of sensitive data (customer information, payment details, intellectual property), website defacement, service disruption, and the use of the compromised server to launch further attacks or host malicious content. Such an incident could result in significant financial loss, reputational damage, and regulatory penalties.
Remediation Plan
Immediate Action:
Proactive Monitoring:
www-data, apache).Compensating Controls:
exec, shell_exec, passthru, system) in the php.ini configuration file if they are not required for legitimate application functionality.Exploitation Status
Public Exploit Available: False
Analyst Notes:
As of November 1, 2025, there are no known public exploits or active attacks targeting this vulnerability. However, due to the high severity (CVSS 8.8) and the relative ease of exploitation for RCE vulnerabilities, it is highly probable that threat actors will develop and deploy exploits in the near future.
Analyst Recommendation
Given the high severity of this vulnerability, immediate patching is strongly recommended for all organizations using the affected Kallyas theme. While this vulnerability is not currently on CISA's Known Exploited Vulnerabilities (KEV) catalog, its critical nature makes it a prime candidate for future inclusion. Organizations must prioritize applying the vendor-supplied update to prevent a full system compromise. If patching is not immediately feasible, apply the recommended compensating controls and actively monitor for signs of exploitation.
Update WordPress plugin/theme to the latest version. Review WordPress security settings and remove if no longer needed.
The Kallyas theme for WordPress is vulnerable to arbitrary folder deletion due to insufficient file path validation in the delete_font() function in a...
The Kallyas theme for WordPress is vulnerable to arbitrary folder deletion due to insufficient file path validation in the delete_font() function in all versions up to, and including, 4
The HTMLSectionSplitter class in langchain-text-splitters version 0
The HTMLSectionSplitter class in langchain-text-splitters version 0
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
The langchain-ai/langchain project, specifically the EverNoteLoader component, is vulnerable to XML External Entity (XXE) attacks due to insecure XML...
The langchain-ai/langchain project, specifically the EverNoteLoader component, is vulnerable to XML External Entity (XXE) attacks due to insecure XML parsing
Executive Summary:
A high-severity XML External Entity (XXE) vulnerability in the Langchain project's EverNoteLoader component allows an attacker to read local files or conduct server-side request forgery (SSRF) attacks.
Vulnerability Details
CVE-ID: CVE-2025-6984
Affected Software: The Multiple Products
Affected Versions: See vendor advisory for specific affected versions
Vulnerability: The EverNoteLoader component in the langchain-ai/langchain project is vulnerable to XXE attacks due to insecure XML parsing. An attacker who can supply a specially crafted XML file to be processed by this component can force the application to parse external entities, leading to the disclosure of local file contents or interaction with internal or external network resources.
Business Impact
This vulnerability is rated high with a CVSS score of 7.5. Successful exploitation could lead to the exfiltration of sensitive data from the server, including source code, configuration files, and credentials. The SSRF aspect of XXE could allow an attacker to scan the internal network, interact with internal services, and potentially pivot to other systems, significantly expanding the scope of a compromise.
Remediation Plan
Immediate Action: Update the langchain library to a patched version where the XML parser has been configured to disable external entity processing.
Proactive Monitoring: Monitor application logs for errors related to XML parsing. Check network logs for unexpected outbound connections from the application server to internal or external addresses, which could indicate an SSRF attempt.
Compensating Controls: If immediate patching is not possible, use a Web Application Firewall (WAF) to inspect and block XML payloads containing external entity declarations. Egress filtering at the network firewall can also help prevent SSRF callbacks.
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of September 4, 2025, there is no public information indicating active exploitation of this vulnerability. XXE is a well-understood vulnerability class, and public exploits are often developed quickly once a flaw is disclosed.
Analyst Recommendation
XXE vulnerabilities pose a severe risk of data exfiltration and internal network compromise. It is imperative that developers and administrators update their langchain installations to a patched version immediately. This remediation should be treated as a high priority for any application utilizing the vulnerable component.
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
File Upload vulnerability in TMS Global Software TMS Management Console v.6.3.7.27386.20250818 allows a remote attacker to execute arbitrary code via...
File Upload vulnerability in TMS Global Software TMS Management Console v.6.3.7.27386.20250818 allows a remote attacker to execute arbitrary code via the Logo upload in /Customer/AddEdit
Update File Upload vulnerability in TMS Global Software TMS Management Console Multiple Products to the latest version. Monitor for exploitation attempts and review access logs.
An issue in Atomberg Atomberg Erica Smart Fan Firmware Version: V1
An issue in Atomberg Atomberg Erica Smart Fan Firmware Version: V1
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Executive Summary:
A critical vulnerability has been identified in the SpringBlade framework, which could impact multiple products within the organization. This flaw, designated CVE-2025-70982, allows a low-privileged user to improperly access a user import function, enabling them to create or modify user accounts, potentially granting themselves full administrative control. Successful exploitation could lead to a complete system compromise, resulting in significant data breaches and operational disruption.
Vulnerability Details
CVE-ID: CVE-2025-70982
Affected Software: SpringBlade Framework and dependent products
Affected Versions: Version 4.5.0. See vendor advisory for a complete list of affected versions and products.
Vulnerability: The
importUserfunction within the SpringBlade framework fails to properly enforce access control checks. This allows any authenticated user, regardless of their privilege level, to invoke this function. An attacker with low-level user credentials can craft a malicious data file (e.g., CSV or Excel) and use the import feature to add new users with elevated privileges or overwrite the details of existing users, including administrators. This effectively provides a direct path for a low-privilege attacker to escalate their privileges to the highest level within the application.Business Impact
This vulnerability is rated as critical severity with a CVSS score of 9.9. Exploitation of this flaw could have a severe and direct impact on the business. An attacker gaining administrative access could lead to a catastrophic data breach, involving the theft of sensitive customer information, intellectual property, and internal corporate data. This could result in significant financial losses from regulatory fines (e.g., GDPR, CCPA), loss of customer trust, and severe reputational damage. Furthermore, an attacker could disrupt business operations by maliciously altering or deleting data, causing service outages and impacting business continuity.
Remediation Plan
Immediate Action: The primary remediation is to immediately update all instances of SpringBlade and affected products to the latest version as recommended by the vendor. Before and after applying the patch, security teams must thoroughly review application and audit logs for any suspicious activity related to the
importUserfunction, looking for unauthorized user creation or modification events.Proactive Monitoring: Implement continuous monitoring of application logs, specifically focusing on API calls to the
importUserendpoint. Create alerts for any user import events initiated by non-administrative accounts or from untrusted IP addresses. Monitor for the creation of new user accounts with high privileges and validate their legitimacy with system owners.Compensating Controls: If immediate patching is not feasible, consider these temporary measures:
importUserfunction, allowing access only from a small whitelist of administrative IP addresses.Exploitation Status
Public Exploit Available: false
Analyst Notes: As of January 26, 2026, there are no known public proof-of-concept exploits or active exploitation campaigns targeting this vulnerability. However, due to the critical severity and the straightforward nature of an access control flaw, it is highly probable that exploit code will be developed and published in the near future. Organizations should assume that attackers will begin scanning for vulnerable systems imminently.
Analyst Recommendation
This vulnerability presents a critical and immediate threat to the organization. Given the CVSS score of 9.9, the risk of a full system compromise is extremely high. All system owners must prioritize the immediate application of the vendor-supplied security patches across all affected assets. Although this vulnerability is not yet listed on the CISA KEV catalog, its severity makes it a prime candidate for future inclusion. We strongly recommend treating this with the highest urgency to prevent potential data breaches and system takeovers.