XWiki through version 17
Description
XWiki through version 17
Remediation
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Search and filter 8341 vulnerabilities with AI analyst insights
XWiki through version 17
XWiki through version 17
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
HTML injection vulnerability in the registration interface in Evolution Consulting Kft
HTML injection vulnerability in the registration interface in Evolution Consulting Kft
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
An issue was discovered in the demo/LINUXTCP implementation of cwalter-at freemodbus v
An issue was discovered in the demo/LINUXTCP implementation of cwalter-at freemodbus v
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
A SQL Injection vulnerability exists in the action
A SQL Injection vulnerability exists in the action
Apply vendor patches immediately. Review database access controls and enable query logging.
aelsantex runcommand 2014-04-01, a plugin for DokuWiki, allows unauthenticated attackers to execute arbitrary system commands via lib/plugins/runcomma...
aelsantex runcommand 2014-04-01, a plugin for DokuWiki, allows unauthenticated attackers to execute arbitrary system commands via lib/plugins/runcommand/postaction.php.
Executive Summary:
A critical remote code execution vulnerability has been identified in the aelsantex runcommand plugin for DokuWiki. This flaw allows an unauthenticated attacker to execute arbitrary commands on the underlying server, potentially leading to a complete system compromise, data theft, and service disruption. Due to the ease of exploitation and the critical severity, immediate remediation is required.
Vulnerability Details
CVE-ID: CVE-2025-51958
Affected Software: aelsantex runcommand Multiple Products
Affected Versions: The version 2014-04-01 is explicitly vulnerable. See vendor advisory for a complete list of affected versions across different products.
Vulnerability: The vulnerability exists within the lib/plugins/runcommand/postaction.php file of the aelsantex runcommand plugin. This script fails to properly validate and sanitize user-supplied input before passing it to a system command execution function. An unauthenticated attacker can send a specially crafted HTTP POST request to this endpoint, embedding malicious system commands which are then executed on the server with the privileges of the web server's user account.
Business Impact
This vulnerability is rated as critical severity with a CVSS score of 9.8. Successful exploitation could lead to a complete compromise of the affected web server. Potential consequences include theft of sensitive data stored on the DokuWiki or the server itself, deployment of ransomware, destruction of data, and using the compromised server as a pivot point to attack other internal systems. This poses a significant risk to data confidentiality, integrity, and availability, and could result in severe reputational damage and financial loss.
Remediation Plan
Immediate Action:
Proactive Monitoring:
/lib/plugins/runcommand/postaction.php URI.www-data, apache).Compensating Controls:
postaction.php file..htaccess or Nginx configuration) to deny all external access to the /lib/plugins/runcommand/ directory.Exploitation Status
Public Exploit Available: false
Analyst Notes: As of Jan 30, 2026, there are no known public exploits or active exploitation campaigns targeting this vulnerability. However, given the critical severity and the simplicity of exploiting this type of flaw, it is highly probable that proof-of-concept exploits will be developed and used by threat actors in the near future. The vulnerability is not currently listed on the CISA Known Exploited Vulnerabilities (KEV) catalog.
Analyst Recommendation
Due to the critical CVSS score of 9.8 and the risk of unauthenticated remote code execution, this vulnerability represents a severe and immediate threat to the organization. We strongly recommend that all affected DokuWiki instances are patched immediately without delay. If patching cannot be performed, the compensating controls, such as disabling the plugin or restricting access via a WAF, must be implemented as a top priority to mitigate the risk of a full system compromise.
Update aelsantex runcommand Multiple Products to the latest version. Monitor for exploitation attempts and review access logs.
Ai2 playground web service (playground
Ai2 playground web service (playground
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
An issue was discovered in Veal98 Echo Open-Source Community System 2
An issue was discovered in Veal98 Echo Open-Source Community System 2
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
CSV formula injection vulnerability in HCL Technologies Ltd
CSV formula injection vulnerability in HCL Technologies Ltd
Executive Summary:
A high-severity vulnerability has been identified in multiple HCL Technologies products, allowing for CSV formula injection. An attacker could exploit this by tricking a user into opening a malicious CSV file, which could lead to the execution of arbitrary commands, data theft, or compromise of the user's workstation.
Vulnerability Details
CVE-ID: CVE-2025-51735
Affected Software: HCL Technologies CSV Multiple Products
Affected Versions: See vendor advisory for specific affected versions
Vulnerability: The vulnerability exists because the affected HCL products do not properly sanitize data before exporting it to a CSV file format. An attacker can embed malicious formulas (e.g., starting with =, +, -, or @) into data fields that will be included in a CSV export. When a victim opens this specially crafted CSV file using a spreadsheet application like Microsoft Excel or LibreOffice Calc, the application may interpret and execute these formulas, leading to consequences such as remote code execution, data exfiltration via hyperlink functions, or execution of local system commands.
Business Impact
This vulnerability is rated as High severity with a CVSS score of 7.5. Successful exploitation could have a significant negative impact on the organization. Potential consequences include the exfiltration of sensitive corporate or customer data, compromise of user credentials, and the deployment of malware or ransomware on an employee's computer. This could lead to financial loss, regulatory penalties, reputational damage, and provide a foothold for an attacker to move laterally within the corporate network.
Remediation Plan
Immediate Action: Apply the security updates released by HCL Technologies immediately across all affected products. After patching, it is critical to monitor for any signs of attempted exploitation by reviewing application and access logs for suspicious activity that may have occurred prior to remediation.
Proactive Monitoring: Implement enhanced monitoring to detect potential exploitation attempts. Security teams should look for unusual outbound network connections from workstations immediately after a user opens a CSV file. Monitor endpoint security logs for spreadsheet applications (e.g., EXCEL.EXE) spawning unexpected child processes, such as cmd.exe, powershell.exe, or mshta.exe.
Compensating Controls: If immediate patching is not feasible, implement the following compensating controls:
=, +, -, or @ with a single quote (') to prevent formula execution.Exploitation Status
Public Exploit Available: false
Analyst Notes: As of November 28, 2025, there are no known public proof-of-concept exploits or active exploitation campaigns targeting this vulnerability in the wild. However, CSV injection is a well-understood attack vector, and threat actors could develop exploits for this specific vulnerability with minimal effort.
Analyst Recommendation
Given the high severity (CVSS 7.5) and the potential for remote code execution and data exfiltration, this vulnerability poses a significant risk to the organization. While it is not currently listed on the CISA KEV catalog, its impact warrants immediate attention. We strongly recommend that all affected HCL products are patched on an emergency basis. In parallel, security teams should implement the proactive monitoring and compensating controls detailed above to reduce the attack surface and improve detection capabilities until patching is complete.
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
CyberGhostVPNSetup
CyberGhostVPNSetup
Executive Summary:
A high-severity vulnerability, identified as CVE-2025-51726, has been discovered in the CyberGhost VPN installation process. This flaw could allow a local attacker with basic user permissions to gain full administrative control over a targeted system. Successful exploitation could lead to complete system compromise, data theft, or the deployment of further malware like ransomware.
Vulnerability Details
CVE-ID: CVE-2025-51726
Affected Software: Unknown Multiple Products (Primary analysis indicates CyberGhost VPN)
Affected Versions: See vendor advisory for specific affected versions
Vulnerability: The vulnerability exists within the CyberGhostVPNSetup installer component. The installer process runs with elevated privileges but improperly handles file permissions or loads external libraries from user-writable locations. An attacker with low-level access to a system could exploit this by placing a malicious library (e.g., a DLL) in a specific path, which the installer would then execute with system-level privileges. This constitutes a local privilege escalation, allowing the attacker to elevate their access from a standard user to a full administrator, thereby gaining complete control over the affected endpoint.
Business Impact
This vulnerability is rated as High severity with a CVSS score of 8.4. A successful exploit would grant an attacker full control over the compromised workstation or server. This could lead to severe business consequences, including the exfiltration of sensitive corporate data, installation of persistent backdoors, deployment of ransomware, and disruption of business operations. Since the affected software is a VPN client, a compromised endpoint could serve as a critical pivot point for an attacker to gain access to the broader internal corporate network, bypassing perimeter security controls.
Remediation Plan
Immediate Action:
Organizations must apply the security updates provided by the vendor immediately across all affected systems. Use enterprise patch management systems to ensure timely and complete deployment. After patching, review system and application logs for any signs of compromise that may have occurred prior to the update.
Proactive Monitoring:
Security teams should monitor for indicators of exploitation. This includes looking for unusual process creation originating from the CyberGhostVPNSetup installer, unexpected file modifications in system directories during software installation, and anomalous network connections from endpoints where the VPN client is being installed or updated. Endpoint Detection and Response (EDR) systems should be configured to alert on privilege escalation techniques.
Compensating Controls:
If immediate patching is not feasible, implement compensating controls to mitigate risk. Enforce the principle of least privilege by restricting users from installing software. Utilize application control or whitelisting solutions (e.g., AppLocker) to prevent the execution of unauthorized executables and libraries in user-writable directories.
Exploitation Status
Public Exploit Available: false
Analyst Notes:
As of August 5, 2025, there are no known public proof-of-concept exploits or active exploitation campaigns targeting this vulnerability. The vulnerability is not currently listed on the CISA Known Exploited Vulnerabilities (KEV) catalog. However, given the high severity score and the common nature of this vulnerability class, it is highly probable that threat actors will reverse-engineer the patch to develop a functional exploit.
Analyst Recommendation
Given the high CVSS score of 8.4 and the potential for complete system compromise via local privilege escalation, this vulnerability poses a significant risk to the organization. We strongly recommend that all system administrators prioritize the immediate deployment of the vendor-supplied patches to all endpoints with the CyberGhost VPN client installed. Although there is no evidence of active exploitation at this time, the risk profile for this vulnerability is expected to increase rapidly. Organizations should treat this as a critical priority for their patch management cycle.
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
An issue was discovered in simple-admin-core v1
An issue was discovered in simple-admin-core v1
Executive Summary:
A high-severity vulnerability has been discovered in the simple-admin-core component, which affects multiple products from the vendor 'issue'. Successful exploitation could allow a remote attacker to execute arbitrary code on an affected system without authentication, potentially leading to a complete compromise of the system's confidentiality, integrity, and availability.
Vulnerability Details
CVE-ID: CVE-2025-51667
Affected Software: issue Multiple Products
Affected Versions: simple-admin-core v1. See vendor advisory for specific affected products and versions.
Vulnerability: The vulnerability exists within the simple-admin-core component due to improper input sanitization in an administrative API endpoint. An unauthenticated remote attacker can send a specially crafted request containing malicious commands to this endpoint. The server-side code fails to properly validate this input, allowing the commands to be executed on the underlying operating system with the privileges of the web service, resulting in remote code execution.
Business Impact
This vulnerability is rated as High severity with a CVSS score of 7.0. A successful exploit could lead to significant business disruption, including unauthorized access to and exfiltration of sensitive data, modification of critical system files, and the deployment of malicious software such as ransomware. The compromise of a core administrative component could allow an attacker to establish a persistent foothold in the network, pivot to other internal systems, and cause widespread damage to business operations and organizational reputation.
Remediation Plan
Immediate Action: Apply the security updates provided by the vendor 'issue' to all affected systems immediately. After patching, verify that the updates have been successfully installed and the vulnerability has been mitigated.
Proactive Monitoring: Security teams should actively monitor for signs of exploitation. Review web server access logs for unusual or malformed requests targeting administrative API endpoints. Implement enhanced monitoring for unexpected processes being spawned by the web server user account and scrutinize outbound network traffic from affected servers for suspicious connections.
Compensating Controls: If immediate patching is not feasible, deploy a Web Application Firewall (WAF) with rules designed to detect and block the malicious request patterns associated with this vulnerability. Additionally, restrict network access to the administrative interfaces of the affected products, allowing connections only from trusted IP addresses or dedicated management networks.
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of August 27, 2025, there are no known public exploits or active exploitation campaigns targeting this vulnerability. However, given the high severity and potential for a straightforward exploit, proof-of-concept code is likely to be developed by security researchers and threat actors in the near future.
Analyst Recommendation
Given the high severity (CVSS 7.0) of this vulnerability and its potential for remote code execution, we strongly recommend that all organizations using the affected products apply the vendor-supplied patches as an immediate priority. Although this vulnerability is not currently listed on the CISA Known Exploited Vulnerabilities (KEV) catalog, its impact is significant. Proactive patching is the most effective defense and will prevent potential future exploitation that could lead to a full system compromise.
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
A vulnerability found in IPRateLimit implementation of FileCodeBox up to 2
A vulnerability found in IPRateLimit implementation of FileCodeBox up to 2
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
A path Traversal vulnerability found in FileCodeBox v2
A path Traversal vulnerability found in FileCodeBox v2
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
TOTOLINK N350RT V9.3.5u.6139_B20201216 was discovered to contain a buffer overflow via the ePort parameter in the function setIpPortFilterRules.
TOTOLINK N350RT V9.3.5u.6139_B20201216 was discovered to contain a buffer overflow via the ePort parameter in the function setIpPortFilterRules.
Executive Summary:
A critical vulnerability has been identified in multiple TOTOLINK networking products. This flaw, a buffer overflow, can be exploited by an unauthenticated remote attacker to execute arbitrary code and gain complete control over the affected device, posing a severe risk to network security and integrity.
Vulnerability Details
CVE-ID: CVE-2025-51630
Affected Software: TOTOLINK Multiple Products
Affected Versions: Version N350RT V9.3.5u.6139_B20201216 is confirmed vulnerable. See vendor advisory for a complete list of affected products and versions.
Vulnerability: The vulnerability is a stack-based buffer overflow within the setIpPortFilterRules function, which is part of the device's web management interface. An attacker can send a specially crafted HTTP request containing an overly long string in the ePort parameter. Because the function does not properly validate the input length, the excessive data overwrites adjacent memory on the stack, allowing the attacker to corrupt critical data structures and hijack the program's execution flow to run arbitrary code with the privileges of the device's firmware, typically root.
Business Impact
This vulnerability is rated as critical severity with a CVSS score of 9.8, reflecting the potential for complete system compromise with no user interaction required. Successful exploitation would allow an attacker to take full administrative control of the network device. This could lead to severe consequences, including interception and redirection of network traffic, disabling network access for the organization, using the compromised device as a pivot point to attack other internal systems, or incorporating the device into a botnet for use in larger-scale attacks like Distributed Denial-of-Service (DDoS).
Remediation Plan
Immediate Action: Identify all vulnerable TOTOLINK devices within the environment and update the firmware to the latest version as recommended by the vendor. Prioritize patching for externally-facing or critical network infrastructure devices. After patching, review device logs for any signs of compromise that may have occurred prior to the update.
Proactive Monitoring: Configure network monitoring and firewall logging to detect and alert on exploitation attempts. Specifically, monitor for inbound web requests to the device's management interface that contain unusually long values for the ePort parameter. System administrators should also monitor affected devices for anomalous behavior such as unexpected reboots, high CPU usage, or unusual outbound traffic patterns.
Compensating Controls: If immediate patching is not feasible, implement the following controls to reduce the risk of exploitation:
ePort parameter.Exploitation Status
Public Exploit Available: False
Analyst Notes: As of Jul 17, 2025, there are no known public proof-of-concept exploits or active exploitation campaigns targeting this vulnerability. The vulnerability is not listed on the CISA Known Exploited Vulnerabilities (KEV) catalog. However, given the critical severity and the straightforward nature of buffer overflow vulnerabilities, it is highly probable that threat actors will develop an exploit in the near future.
Analyst Recommendation
Given the critical CVSS score of 9.8, this vulnerability presents a significant and immediate risk to the organization. We strongly recommend that all affected TOTOLINK devices be patched immediately without delay. Although this vulnerability is not yet listed in the CISA KEV, its severity warrants an emergency patching cycle. If patching cannot be performed immediately, the compensating controls listed above, particularly restricting access to the management interface, must be implemented as a top priority to mitigate the high risk of compromise.
Update TOTOLINK Multiple Products to the latest version. Monitor for exploitation attempts and review access logs.
A cross-site scripting (XSS) vulnerability in the PdfViewer component of Agenzia Impresa Eccobook 2
A cross-site scripting (XSS) vulnerability in the PdfViewer component of Agenzia Impresa Eccobook 2
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Insecure Direct Object Reference (IDOR) vulnerability in PdfHandler component in Agenzia Impresa Eccobook v2
Insecure Direct Object Reference (IDOR) vulnerability in PdfHandler component in Agenzia Impresa Eccobook v2
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Cross-site scripting (XSS) vulnerability in Zone Bitaqati thru 3
Cross-site scripting (XSS) vulnerability in Zone Bitaqati thru 3
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
hippo4j 1
hippo4j 1
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
An issue was discovered in Shopizer 3
An issue was discovered in Shopizer 3
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
A SQL Injection was found in the /exam/user/profile.php page of kashipara Online Exam System V1.0, which allows remote attackers to execute arbitrary...
A SQL Injection was found in the /exam/user/profile.php page of kashipara Online Exam System V1.0, which allows remote attackers to execute arbitrary SQL command to get unauthorized database access via the rname, rcollage, rnumber, rgender and rpassword parameters in a POST HTTP request.
Executive Summary:
A critical SQL Injection vulnerability has been identified in the kashipara Online Exam System. This flaw allows a remote, unauthenticated attacker to execute arbitrary commands on the application's database, potentially leading to a complete compromise of sensitive student and exam data. Due to the high severity and ease of exploitation, immediate remediation is required to prevent a significant data breach.
Vulnerability Details
CVE-ID: CVE-2025-51567
Affected Software: kashipara Online Exam System
Affected Versions: V1.0
Vulnerability: The vulnerability exists within the user profile update page, specifically /exam/user/profile.php. The application fails to properly sanitize user-supplied input for the rname, rcollage, rnumber, rgender, and rpassword parameters in a POST request. An attacker can inject malicious SQL commands into these parameters, which are then executed directly by the backend database, granting them unauthorized access and control.
Business Impact
This vulnerability is rated as critical severity with a CVSS score of 9.1, posing a significant threat to the organization. Successful exploitation could lead to a catastrophic data breach, exposing sensitive personally identifiable information (PII) of users, exam results, and administrative credentials. The potential consequences include severe reputational damage, financial loss from regulatory fines (e.g., GDPR, FERPA), and the complete loss of data integrity within the exam system.
Remediation Plan
Immediate Action: Update the kashipara Online Exam System to the latest version as recommended by the vendor. After patching, immediately monitor for any signs of exploitation attempts by reviewing server and application access logs for suspicious activity targeting the vulnerable page.
Proactive Monitoring: Implement enhanced monitoring of HTTP traffic to the web server. Specifically, look for POST requests to /exam/user/profile.php that contain common SQL injection payloads (e.g., ', --, UNION, SELECT, SLEEP()). Utilize a Web Application Firewall (WAF) with rulesets designed to detect and block SQL injection attacks in real-time.
Compensating Controls: If patching cannot be performed immediately, implement a WAF rule to specifically block malicious requests to the /exam/user/profile.php endpoint. Restrict access to this page from untrusted networks if feasible. As a last resort, temporarily disable the user profile update functionality until a patch can be applied.
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of the published date, Jan 12, 2026, there are no known public exploits or reports of this vulnerability being actively exploited in the wild. However, SQL Injection vulnerabilities are trivial to exploit, and proof-of-concept code is likely to emerge quickly.
Analyst Recommendation
Given the critical CVSS score of 9.1 and the high potential for a complete database compromise, this vulnerability requires immediate attention. Although it is not currently listed on the CISA KEV (Known Exploited Vulnerabilities) catalog, its severity warrants treating it with the highest priority. We strongly recommend that the organization apply the vendor-supplied patch immediately and implement proactive monitoring to detect and prevent any exploitation attempts.
Update A SQL Injection was found in the Multiple Products to the latest version. Monitor for exploitation attempts and review access logs.
An issue was discovered in Cicool builder 3.4.4 allowing attackers to reset the administrator's password via the /administrator/auth/reset_password en...
An issue was discovered in Cicool builder 3.4.4 allowing attackers to reset the administrator's password via the /administrator/auth/reset_password endpoint.
Update An issue was discovered in Cicool builder Multiple Products to the latest version. Monitor for exploitation attempts and review access logs.
Austrian Archaeological Institute (AI) OpenAtlas v8.11.0 as discovered to contain a hardcoded Administrator password.
Austrian Archaeological Institute (AI) OpenAtlas v8.11.0 as discovered to contain a hardcoded Administrator password.
Executive Summary:
A critical vulnerability has been identified in Austrian Archaeological Institute's OpenAtlas software, which contains a hardcoded, unchangeable password for the administrator account. This flaw allows any attacker with knowledge of this password to easily gain complete control over the system. Successful exploitation could lead to a total compromise of the application, resulting in data theft, data destruction, and significant operational disruption.
Vulnerability Details
CVE-ID: CVE-2025-51536
Affected Software: Austrian Archaeological Institute OpenAtlas
Affected Versions: v8.11.0. See vendor advisory for a complete list of all affected versions and products.
Vulnerability: The OpenAtlas application contains a hardcoded credential (CWE-798: Use of Hard-coded Credentials) for the 'Administrator' user account. This means a static, default password is built directly into the software's code and cannot be changed by users. An unauthenticated remote attacker can exploit this vulnerability by simply obtaining the hardcoded password from public sources and using it to log into the application's administrative interface, granting them the highest level of privilege.
Business Impact
This vulnerability is rated as Critical with a CVSS score of 9.8, reflecting its extreme severity and ease of exploitation. An attacker with administrative access can perform any action within the OpenAtlas application, including viewing, modifying, and deleting all archaeological project data, user information, and system configurations. The potential consequences include a severe data breach of sensitive research, intellectual property theft, complete data loss, and significant reputational damage to the organization. The risk is exceptionally high as no sophisticated tools are required for exploitation, only knowledge of the publicly available password.
Remediation Plan
Immediate Action: Immediately apply the security update provided by the Austrian Archaeological Institute to patch the vulnerability. After patching, it is critical to thoroughly review all system and application access logs for any unauthorized or suspicious logins to the administrator account that may have occurred prior to the update.
Proactive Monitoring: Implement continuous monitoring of application logs with a specific focus on administrator account activity. Configure alerts for any successful administrator logins, especially from unknown or external IP addresses. Monitor for unusual activities such as mass data exports, significant configuration changes, or the creation of new privileged accounts.
Compensating Controls: If immediate patching is not feasible, implement the following compensating controls to reduce the risk of exploitation:
Exploitation Status
Public Exploit Available: true
Analyst Notes: As of the publication date of August 4, 2025, this vulnerability is publicly disclosed. The "exploit" for a hardcoded password is the password itself, which is now considered public knowledge. Due to the simplicity of exploitation, organizations should assume that active scanning and exploitation attempts are already underway or will begin imminently.
Analyst Recommendation
Given the critical CVSS score of 9.8 and the public availability of the exploit, this vulnerability poses an immediate and severe threat to the organization. We strongly recommend that all affected instances of Austrian Archaeological Institute products be patched immediately as the highest priority. Organizations must operate under the assumption of compromise and conduct a thorough investigation of access logs to identify any malicious activity. Although this CVE is not currently on the CISA KEV list, its characteristics make it a prime candidate for future inclusion, and it must be treated with the utmost urgency.
Update Austrian Archaeological Institute Multiple Products to the latest version. Monitor for exploitation attempts and review access logs.
Austrian Archaeological Institute (AI) OpenAtlas v8.11.0 as discovered to contain a SQL injection vulnerability.
Austrian Archaeological Institute (AI) OpenAtlas v8.11.0 as discovered to contain a SQL injection vulnerability.
Executive Summary:
A critical SQL injection vulnerability has been discovered in multiple products from the Austrian Archaeological Institute, including OpenAtlas v8.11.0. This flaw allows an unauthenticated attacker to execute arbitrary commands on the backend database, potentially leading to a complete compromise of the application's data. Successful exploitation could result in the theft, modification, or deletion of sensitive archaeological research data.
Vulnerability Details
CVE-ID: CVE-2025-51535
Affected Software: Austrian Archaeological Institute Multiple Products
Affected Versions: OpenAtlas version 8.11.0 is confirmed to be affected. Other products and versions may also be vulnerable; refer to the vendor advisory for a complete list.
Vulnerability: The application is vulnerable to SQL injection. An unauthenticated remote attacker can inject malicious SQL queries into user-supplied input fields that are not properly sanitized before being passed to the database. By crafting a specific payload, the attacker can bypass security controls and directly interact with the database to exfiltrate sensitive information, modify or delete records, and in some configurations, execute commands on the underlying operating system.
Business Impact
This vulnerability is rated as Critical with a CVSS score of 9.1. Exploitation could have a severe impact on the organization's operations and reputation. An attacker could gain unauthorized access to the entire database, which may contain irreplaceable historical and archaeological research data. The specific risks include the theft of intellectual property, manipulation of research data leading to a loss of academic integrity, complete data destruction, and potential disruption of the OpenAtlas service.
Remediation Plan
Immediate Action: Immediately apply the security updates provided by the Austrian Archaeological Institute to all affected products. Prioritize patching public-facing instances of OpenAtlas and other vulnerable applications to the latest secure version.
Proactive Monitoring: Implement enhanced monitoring on web and database servers. Review web server access logs and Web Application Firewall (WAF) logs for suspicious patterns indicative of SQL injection attempts, such as ' OR '1'='1', UNION SELECT, SLEEP(), and other SQL keywords in request parameters. Monitor database logs for unusual or unauthorized queries.
Compensating Controls: If immediate patching is not feasible, implement a Web Application Firewall (WAF) with strict rules designed to detect and block SQL injection attacks. Restrict access to the application at the network level, allowing connections only from trusted IP ranges. Ensure the application's database user account adheres to the principle of least privilege, limiting its permissions to prevent severe damage.
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of August 4, 2025, there are no known public exploits or active exploitation campaigns targeting this vulnerability. However, given the critical severity and the straightforward nature of SQL injection flaws, it is highly probable that a functional exploit will be developed and made public quickly. The vulnerability is not currently listed on the CISA Known Exploited Vulnerabilities (KEV) catalog.
Analyst Recommendation
Due to the critical severity (CVSS 9.1) of this vulnerability, immediate action is required. We strongly recommend that the organization prioritizes patching all affected systems without delay. Although there is no evidence of active exploitation, the risk of data compromise is significant. Until patching is complete, the compensating controls listed above should be implemented to reduce the attack surface and mitigate potential impact.
Update Austrian Archaeological Institute Multiple Products to the latest version. Monitor for exploitation attempts and review access logs.
A cross-site scripting (XSS) vulnerability in Austrian Archaeological Institute (AI) OpenAtlas v8
A cross-site scripting (XSS) vulnerability in Austrian Archaeological Institute (AI) OpenAtlas v8
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Incorrect access control in Sage DPW v2024
Incorrect access control in Sage DPW v2024
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Cadmium CMS v.0.4.9 has a background arbitrary file upload vulnerability in /admin/content/filemanager/uploads.
Cadmium CMS v.0.4.9 has a background arbitrary file upload vulnerability in /admin/content/filemanager/uploads.
Update Cadmium CMS Multiple Products to the latest version. Monitor for exploitation attempts and review access logs.
Microweber CMS 2
Microweber CMS 2
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
A Stored Cross-Site Scripting (XSS) vulnerability in Microweber CMS 2
A Stored Cross-Site Scripting (XSS) vulnerability in Microweber CMS 2
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
An integer overflow vulnerability exists in the WebSocket component of Mongoose 7
An integer overflow vulnerability exists in the WebSocket component of Mongoose 7
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Remote Code Execution in letta
Remote Code Execution in letta
Apply security patches immediately for internet-facing systems. Monitor for exploitation attempts and review access logs.
Path Traversal vulnerability in onnx
Path Traversal vulnerability in onnx
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Cross-site Scripting (XSS) in aimhubio Aim 3
Cross-site Scripting (XSS) in aimhubio Aim 3
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Path Traversal in restore_run_backup() in AIM 3
Path Traversal in restore_run_backup() in AIM 3
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
In TOTOLINK A7000R firmware 9.1.0u.6115_B20201022, an attacker can bypass login by sending a specific request through formLoginAuth.htm.
In TOTOLINK A7000R firmware 9.1.0u.6115_B20201022, an attacker can bypass login by sending a specific request through formLoginAuth.htm.
Update In TOTOLINK Multiple Products to the latest version. Monitor for exploitation attempts and review access logs.
In TOTOLINK EX1200T firmware 4.1.2cu.5215, an attacker can bypass login by sending a specific request through formLoginAuth.htm.
In TOTOLINK EX1200T firmware 4.1.2cu.5215, an attacker can bypass login by sending a specific request through formLoginAuth.htm.
Update In TOTOLINK Multiple Products to the latest version. Monitor for exploitation attempts and review access logs.
TOTOLINK N600R V4.3.0cu.7647_B20210106 was discovered to contain a command injection vulnerability via the pin parameter in the setWiFiWpsConfig funct...
TOTOLINK N600R V4.3.0cu.7647_B20210106 was discovered to contain a command injection vulnerability via the pin parameter in the setWiFiWpsConfig function.
Executive Summary:
A critical command injection vulnerability has been discovered in multiple TOTOLINK products, rated with a CVSS score of 9.8. This flaw allows an unauthenticated attacker to remotely execute arbitrary commands on the affected device by sending a specially crafted request, potentially leading to a complete system compromise. Successful exploitation could result in data theft, network disruption, and the use of the compromised router in further attacks.
Vulnerability Details
CVE-ID: CVE-2025-51390
Affected Software: TOTOLINK Multiple Products
Affected Versions: The specific version TOTOLINK N600R V4.3.0cu.7647_B20210106 is confirmed to be vulnerable. See vendor advisory for a complete list of specific affected products and versions.
Vulnerability: This is a command injection vulnerability within the setWiFiWpsConfig function of the device's firmware. The pin parameter, used for WPS configuration, fails to properly sanitize user-supplied input before passing it to a system shell command. An attacker can craft a request containing malicious shell commands (e.g., 12345678; reboot) within the pin parameter. When the router processes this request, it executes the injected command with the privileges of the system, leading to remote code execution (RCE).
Business Impact
The vulnerability is rated as critical severity with a CVSS score of 9.8, indicating a high risk of compromise with low attack complexity. An attacker who successfully exploits this vulnerability can gain full administrative (root) control over the network device. This level of access could lead to severe consequences, including the interception and theft of all network traffic (e.g., credentials, financial information), redirection of users to malicious websites via DNS hijacking, deployment of malware on the internal network, and using the device as part of a botnet for DDoS attacks. The integrity, confidentiality, and availability of the network are all at significant risk.
Remediation Plan
Immediate Action: The primary remediation is to apply vendor-supplied firmware updates immediately. Organizations should identify all affected TOTOLINK devices and update them to the latest patched version as specified in the vendor's security advisory. After patching, monitor devices for any signs of compromise and review historical access logs for suspicious requests targeting the setWiFiWpsConfig function.
Proactive Monitoring:
setWiFiWpsConfig function. Look for any pin parameter values containing shell metacharacters such as ;, |, &, $(...), or `.Compensating Controls: If patching cannot be performed immediately, implement the following controls to reduce risk:
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of August 4, 2025, there are no known public exploits or active "in-the-wild" attacks leveraging this vulnerability. However, vulnerabilities in network edge devices like routers are highly attractive targets for threat actors seeking to build botnets or gain initial access to a network. Due to the critical CVSS score and low attack complexity, it is highly probable that a functional exploit will be developed and used by attackers in the near future.
Analyst Recommendation
Given the critical severity (CVSS 9.8) of this vulnerability, we recommend that organizations treat this as a high-priority issue and take immediate action. The primary course of action is to apply the vendor-provided firmware updates across all affected TOTOLINK devices without delay. If patching is not immediately feasible, the compensating controls listed above, particularly disabling remote management and the WPS feature, should be implemented as a temporary measure. Although this CVE is not currently on the CISA KEV list, its critical nature warrants an urgent response to prevent potential device compromise and network intrusion.
Update TOTOLINK Multiple Products to the latest version. Check vendor security advisory for specific patch details. Monitor for exploitation attempts and review access logs.
The GitKraken Desktop 10.8.0 and 11.1.0 is susceptible to code injection due to misconfigured Electron Fuses. Specifically, the following insecure set...
The GitKraken Desktop 10.8.0 and 11.1.0 is susceptible to code injection due to misconfigured Electron Fuses. Specifically, the following insecure settings were observed: RunAsNode is enabled and Enab...
Update The GitKraken Desktop Multiple Products to the latest version. Monitor for exploitation attempts and review access logs.
D-Link DI-8100 16
D-Link DI-8100 16
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
A sandbox escape vulnerability was identified in huggingface/smolagents version 1
A sandbox escape vulnerability was identified in huggingface/smolagents version 1
In Eclipse Jetty, versions <=9
In Eclipse Jetty, versions <=9
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Tenda AC8V4 V16
Tenda AC8V4 V16
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
An unrestricted file upload vulnerability in Vedo Suite version 2024
An unrestricted file upload vulnerability in Vedo Suite version 2024
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Insecure Data Storage of credentials has been found in /api_vedo/configuration/config
Insecure Data Storage of credentials has been found in /api_vedo/configuration/config
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Electrolink FM/DAB/TV Transmitter Web Management System Unauthorized access vulnerability via the /FrameSetCore
Electrolink FM/DAB/TV Transmitter Web Management System Unauthorized access vulnerability via the /FrameSetCore
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Within tcpreplay's tcprewrite, a double free vulnerability has been identified in the dlt_linuxsll2_cleanup() function in plugins/dlt_linuxsll2/linuxs...
Within tcpreplay's tcprewrite, a double free vulnerability has been identified in the dlt_linuxsll2_cleanup() function in plugins/dlt_linuxsll2/linuxsll2
A heap-buffer-overflow vulnerability exists in the tcpliveplay utility of the tcpreplay-4
A heap-buffer-overflow vulnerability exists in the tcpliveplay utility of the tcpreplay-4
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
OPNsense 25
OPNsense 25
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
SQL Injection vulnerability exists in the sortKey parameter of the GET /api/v1/wanted/cutoff API endpoint in readarr 0
SQL Injection vulnerability exists in the sortKey parameter of the GET /api/v1/wanted/cutoff API endpoint in readarr 0
Executive Summary:
A high-severity SQL Injection vulnerability, identified as CVE-2025-50983, has been discovered in the readarr application. This flaw allows a remote attacker to execute arbitrary commands on the application's database by sending a malicious request, potentially leading to unauthorized data access, modification, or deletion, and posing a significant risk to data confidentiality and integrity.
Vulnerability Details
CVE-ID: CVE-2025-50983
Affected Software: readarr
Affected Versions: See vendor advisory for specific affected versions. The vulnerability was discovered in a version identified as "readarr 0".
Vulnerability: This is a SQL Injection vulnerability that exists in the sortKey parameter of the /api/v1/wanted/cutoff API endpoint. The application fails to properly sanitize user-supplied input to this parameter before incorporating it into a database query. A remote, unauthenticated attacker can exploit this by crafting a malicious GET request containing specially formatted SQL commands within the sortKey parameter, allowing them to execute arbitrary queries against the back-end database.
Business Impact
This vulnerability is rated as High severity with a CVSS score of 8.3. Successful exploitation could have a severe impact on the business by compromising the confidentiality, integrity, and availability of data managed by the readarr application. An attacker could potentially extract sensitive user information, modify or delete critical application data leading to service disruption, or in some configurations, escalate privileges to compromise the underlying server. This poses a significant risk of data breach, operational disruption, and reputational damage.
Remediation Plan
Immediate Action: Apply the security patches released by the vendor for readarr immediately to remediate the vulnerability. As a best practice, review database user permissions and ensure the application's database account operates under the principle of least privilege. It is also recommended to enable and centralize database query logging to assist in detecting and investigating potential exploitation attempts.
Proactive Monitoring: Security teams should actively monitor web server logs for suspicious requests to the /api/v1/wanted/cutoff endpoint, specifically looking for unusual or malformed data in the sortKey parameter. Database activity monitoring should be configured to alert on abnormal query structures, excessive data requests, or errors originating from the readarr application's user account.
Compensating Controls: If immediate patching is not feasible, implement a Web Application Firewall (WAF) with a ruleset configured to detect and block common SQL Injection attack patterns targeting the vulnerable endpoint and parameter. Restrict network access to the readarr web interface, limiting it to trusted IP addresses only.
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of August 27, 2025, there are no known public exploits or reports of this vulnerability being actively exploited in the wild. However, SQL Injection is a well-understood vulnerability class, and it is highly probable that proof-of-concept exploit code will be developed and released by security researchers in the near future.
Analyst Recommendation
Given the High severity (CVSS 8.3) of this vulnerability and the potential for complete database compromise, organizations are strongly advised to treat this as a high-priority issue. The immediate application of vendor-supplied patches is the most effective course of action. While this CVE is not currently on the CISA KEV list, the critical nature of the flaw warrants urgent remediation to prevent potential data breaches and system compromise.
Apply vendor patches immediately. Review database access controls and enable query logging.
NodeBB v4
NodeBB v4
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
SQL Injection vulnerability in AbanteCart 1.4.2, allows unauthenticated attackers to execute arbitrary SQL commands via the tmpl_id parameter to index...
SQL Injection vulnerability in AbanteCart 1.4.2, allows unauthenticated attackers to execute arbitrary SQL commands via the tmpl_id parameter to index.php. Three techniques have been demonstrated: err...
Executive Summary:
A critical SQL Injection vulnerability, identified as CVE-2025-50972, has been discovered in AbanteCart e-commerce platform. This flaw allows an unauthenticated attacker to remotely execute arbitrary commands on the backend database, potentially leading to a complete compromise of sensitive customer data, financial information, and administrative control over the affected online store.
Vulnerability Details
CVE-ID: CVE-2025-50972
Affected Software: AbanteCart
Affected Versions: Version 1.4.2 is confirmed vulnerable. See vendor advisory for a complete list of affected versions.
Vulnerability: The vulnerability is a classic SQL Injection that exists due to insufficient input sanitization of the tmpl_id parameter in the index.php file. An unauthenticated remote attacker can exploit this by sending a specially crafted HTTP request to the web server. By injecting malicious SQL syntax into the tmpl_id parameter, the attacker can manipulate the database queries executed by the application, allowing for data exfiltration, modification, or deletion, and in some database configurations, achieve remote code execution on the server.
Business Impact
This vulnerability is rated as critical severity with a CVSS score of 9.8. Exploitation could have a devastating impact on the business, leading to a severe data breach of customer personally identifiable information (PII), credentials, and payment card data. Such an incident would result in significant reputational damage, loss of customer trust, and potential regulatory fines under frameworks like GDPR or CCPA. Furthermore, an attacker could deface the website, disrupt business operations by altering product or order information, or use the compromised server as a pivot point to attack other systems within the corporate network.
Remediation Plan
Immediate Action: Update all instances of AbanteCart to the latest patched version provided by the vendor immediately. After patching, it is crucial to monitor for any ongoing exploitation attempts and thoroughly review historical web server and application access logs for any indicators of compromise preceding the update.
Proactive Monitoring: Security teams should actively monitor for signs of exploitation. Review web server access logs for requests to index.php containing SQL keywords (e.g., UNION, SELECT, SLEEP, '--) within the tmpl_id parameter. Monitor for unusual outbound network traffic from the database server, which could indicate data exfiltration, and watch for unexpected spikes in database CPU utilization.
Compensating Controls: If immediate patching is not feasible, implement a Web Application Firewall (WAF) with rules specifically designed to block SQL injection attacks targeting the tmpl_id parameter. Additionally, ensure the database user account leveraged by AbanteCart operates under the principle of least privilege, restricting its ability to perform system-level commands or access sensitive database tables outside of its operational scope.
Exploitation Status
Public Exploit Available: true
Analyst Notes: As of August 27, 2025, this vulnerability has been publicly disclosed, and Proof-of-Concept (PoC) exploit code is available. Due to the ease of exploitation and its unauthenticated nature, it is highly probable that threat actors will quickly weaponize this vulnerability for mass scanning and opportunistic attacks against internet-facing AbanteCart installations.
Analyst Recommendation
Given the critical 9.8 CVSS score and the public availability of exploit code, this vulnerability poses an immediate and severe threat to the organization. We recommend that all vulnerable AbanteCart instances be patched immediately as the highest priority. Although this CVE is not currently listed on the CISA KEV list, its characteristics make it a prime candidate for future inclusion. Organizations should treat this vulnerability with the same urgency as a known exploited vulnerability and initiate incident response procedures to hunt for evidence of compromise that may have occurred prior to applying the patch.
Update SQL Injection vulnerability in AbanteCart Multiple Products to the latest version. Monitor for exploitation attempts and review access logs.
FontForge v20230101 was discovered to contain a memory leak via the utf7toutf8_copy function at /fontforge/sfd
FontForge v20230101 was discovered to contain a memory leak via the utf7toutf8_copy function at /fontforge/sfd
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Executive Summary:
A high-severity vulnerability has been identified in multiple SQL products, allowing for SQL Injection attacks. An unauthenticated attacker could exploit this flaw to manipulate database queries, leading to unauthorized access, modification, or deletion of sensitive data. This could result in a significant data breach, service disruption, and compromise of the underlying server.
Vulnerability Details
CVE-ID: CVE-2025-51970
Affected Software: SQL Multiple Products
Affected Versions: See vendor advisory for specific affected versions
Vulnerability: The vulnerability is a classic SQL Injection (SQLi). It exists because the application fails to properly sanitize user-supplied input within a specific "action" parameter before using it to construct a database query. An attacker can submit a specially crafted string to this parameter, which the database will execute as a malicious command. This could allow the attacker to bypass authentication, exfiltrate the entire contents of the database, modify or delete records, and in some configurations, execute commands on the host operating system.
Business Impact
This vulnerability is rated as High severity with a CVSS score of 7.7. Successful exploitation could have severe consequences for the organization, including the theft of confidential customer data, intellectual property, or financial records, leading to direct financial loss and significant reputational damage. The ability to modify or delete data could compromise business operations and data integrity. Furthermore, a data breach resulting from this vulnerability could trigger regulatory fines under frameworks such as GDPR or CCPA.
Remediation Plan
Immediate Action:
Proactive Monitoring:
UNION,SELECT,DROP,--, or sleep/wait commands.Compensating Controls:
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of July 30, 2025, there are no known public proof-of-concept exploits or active attacks leveraging this vulnerability. However, SQL injection is a well-understood vulnerability class, and threat actors are likely to reverse-engineer vendor patches to develop exploits quickly. The absence of a public exploit should not diminish the urgency of remediation.
Analyst Recommendation
Given the high severity (CVSS 7.7) and the potentially devastating impact of a successful SQL injection attack, we strongly recommend that organizations prioritize the immediate application of vendor-supplied patches. Although this CVE is not currently on the CISA KEV list, its fundamental nature makes it a prime target for future exploitation. Organizations should immediately identify all affected assets and deploy patches according to a prioritized schedule. Where patching is delayed, compensating controls such as a WAF and enhanced monitoring must be implemented without delay to reduce the risk of compromise.