Red Hot Cyber
Condividi la tua difesa. Incoraggia l'eccellenza. La vera forza della cybersecurity risiede nell'effetto moltiplicatore della conoscenza.
Cerca
Fortinet 970x120px
Banner Mobile

Lista CVE più critiche emesse negli ultimi 3 giorni

Di seguito sono riportate le vulnerabilità critiche pubblicate negli ultimi giorni dal National Vulnerability Database (NVD). Prestate massima attenzione per prevenire possibili sfruttamenti.
Ricerca singola vulnerabilità

08/11/2025

Unknown

HIGH (8.7)
CVE-2025-64495
Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. In versions 0.6.34 and below, the functionality...
Vendor/s:

Descrizione Completa

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. In versions 0.6.34 and below, the functionality that inserts custom prompts into the chat window is vulnerable to DOM XSS when 'Insert Prompt as Rich Text' is enabled, since the prompt body is assigned to the DOM sink .innerHtml without sanitisation. Any user with permissions to create prompts can abuse this to plant a payload that could be triggered by other users if they run the corresponding / command to insert the prompt. This issue is fixed in version 0.6.35.

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: NONE
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: REQUIRED / LOW
  • Scope: CHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N
  • Score Sfruttabilità/Impatto: 2.3 / 5.8
HIGH (8.8)
CVE-2025-64492
SuiteCRM is an open-source, enterprise-ready Customer Relationship Management (CRM) software application. Versions 8.9.0 and below contain a time-based blind SQL...
Vendor/s:

Descrizione Completa

SuiteCRM is an open-source, enterprise-ready Customer Relationship Management (CRM) software application. Versions 8.9.0 and below contain a time-based blind SQL Injection vulnerability. This vulnerability allows an authenticated attacker to infer data from the database by measuring response times, potentially leading to the extraction of sensitive information. It is possible for an attacker to enumerate database, table, and column names, extract sensitive data, or escalate privileges. This is fixed in version 8.9.1.

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: HIGH
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / LOW
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Score Sfruttabilità/Impatto: 2.8 / 5.9

Informazioni Aggiuntive

Pubblicato il: 08/11/2025 02:15:34
Ultima modifica: 08/11/2025 02:15:34

Fonti e Riferimenti

WordPress

HIGH (8.8)
CVE-2025-9334
The Better Find and Replace – AI-Powered Suggestions plugin for WordPress is vulnerable to Limited Code Injection in all versions...
Vendor/s: WordPress

Descrizione Completa

The Better Find and Replace – AI-Powered Suggestions plugin for WordPress is vulnerable to Limited Code Injection in all versions up to, and including, 1.7.7. This is due to insufficient input validation and restriction on the 'rtafar_ajax' function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to call arbitrary plugin functions and execute code within those functions.

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: HIGH
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / LOW
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Score Sfruttabilità/Impatto: 2.8 / 5.9
HIGH (8.8)
CVE-2025-12161
The Smart Auto Upload Images plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation...
Vendor/s: WordPress

Descrizione Completa

The Smart Auto Upload Images plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the auto-image creation functionality in all versions up to, and including, 1.2.0. This makes it possible for authenticated attackers, with Contributor-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: HIGH
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / LOW
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Score Sfruttabilità/Impatto: 2.8 / 5.9

07/11/2025

Unknown

CRITICAL (10.0)
CVE-2025-10230
A flaw was found in Samba, in the front-end WINS hook handling: NetBIOS names from registration packets are passed to...
Vendor/s:

Descrizione Completa

A flaw was found in Samba, in the front-end WINS hook handling: NetBIOS names from registration packets are passed to a shell without proper validation or escaping. Unsanitized NetBIOS name data from WINS registration packets are inserted into a shell command and executed by the Samba Active Directory Domain Controller’s wins hook, allowing an unauthenticated network attacker to achieve remote command execution as the Samba process.

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: HIGH
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / NONE
  • Scope: CHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
  • Score Sfruttabilità/Impatto: 3.9 / 6

Informazioni Aggiuntive

Pubblicato il: 07/11/2025 20:15:35
Ultima modifica: 07/11/2025 20:15:35

Fonti e Riferimenti

CRITICAL (10.0)
CVE-2025-63689
Multiple SQL injection vulnerabilitites in ycf1998 money-pos system before commit 11f276bd20a41f089298d804e43cb1c39d041e59 (2025-09-14) allows a remote attacker to execute arbitrary code...
Vendor/s:

Descrizione Completa

Multiple SQL injection vulnerabilitites in ycf1998 money-pos system before commit 11f276bd20a41f089298d804e43cb1c39d041e59 (2025-09-14) allows a remote attacker to execute arbitrary code via the orderby parameter

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: HIGH
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / NONE
  • Scope: CHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
  • Score Sfruttabilità/Impatto: 3.9 / 6

Informazioni Aggiuntive

Pubblicato il: 07/11/2025 16:15:42
Ultima modifica: 07/11/2025 16:15:42

Fonti e Riferimenti

CRITICAL (9.6)
CVE-2025-63691
In pig-mesh In Pig version 3.8.2 and below, within the Token Management function under the System Management module, the token...
Vendor/s:

Descrizione Completa

In pig-mesh In Pig version 3.8.2 and below, within the Token Management function under the System Management module, the token query interface (/api/admin/sys-token/page) has an improper permission verification issue, which leads to information leakage. This interface can be called by any user who has completed login authentication, and it returns the plaintext authentication Tokens of all users currently logged in to the system. As a result, ordinary users can obtain the administrator's authentication Token through this interface, thereby forging an administrator account, gaining the system's management permissions, and taking over the system.

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: NONE
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / LOW
  • Scope: CHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N
  • Score Sfruttabilità/Impatto: 3.1 / 5.8

Informazioni Aggiuntive

Pubblicato il: 07/11/2025 16:15:42
Ultima modifica: 07/11/2025 19:16:26

Fonti e Riferimenti

HIGH (8.8)
CVE-2025-10968
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection'), CWE - 564 - SQL Injection: Hibernate vulnerability...
Vendor/s:

Descrizione Completa

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection'), CWE - 564 - SQL Injection: Hibernate vulnerability in GG Soft Software Services Inc. PaperWork allows Blind SQL Injection, SQL Injection.This issue affects PaperWork: from 6.1.0.9390 before 6.1.0.9398.

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: HIGH
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / LOW
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Score Sfruttabilità/Impatto: 2.8 / 5.9

Informazioni Aggiuntive

Pubblicato il: 07/11/2025 13:15:38
Ultima modifica: 07/11/2025 13:15:38

Fonti e Riferimenti

CRITICAL (10.0)
CVE-2025-64180
Manager-io/Manager is accounting software. In Manager Desktop and Server versions 25.11.1.3085 and below, a critical vulnerability permits unauthorized access to...
Vendor/s:

Descrizione Completa

Manager-io/Manager is accounting software. In Manager Desktop and Server versions 25.11.1.3085 and below, a critical vulnerability permits unauthorized access to internal network resources. The flaw lies in the fundamental design of the DNS validation mechanism. A Time-of-Check Time-of-Use (TOCTOU) condition that allows attackers to bypass network isolation and access internal services, cloud metadata endpoints, and protected network segments. The Desktop edition requires no authentication; the Server edition requires only standard authentication. This issue is fixed in version 25.11.1.3086.

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: HIGH
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / NONE
  • Scope: CHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
  • Score Sfruttabilità/Impatto: 3.9 / 6

Informazioni Aggiuntive

Pubblicato il: 07/11/2025 04:15:46
Ultima modifica: 07/11/2025 04:15:46

Fonti e Riferimenti

HIGH (8.8)
CVE-2025-64184
Dosage is a comic strip downloader and archiver. When downloading comic images in versions 3.1 and below, Dosage constructs target...
Vendor/s:

Descrizione Completa

Dosage is a comic strip downloader and archiver. When downloading comic images in versions 3.1 and below, Dosage constructs target file names from different aspects of the remote comic (page URL, image URL, page content, etc.). While the basename is properly stripped of directory-traversing characters, the file extension is taken from the HTTP Content-Type header. This allows a remote attacker (or a Man-in-the-Middle, if the comic is served over HTTP) to write arbitrary files outside the target directory (if additional conditions are met). This issue is fixed in version 3.2.

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: HIGH
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: REQUIRED / NONE
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  • Score Sfruttabilità/Impatto: 2.8 / 5.9

Informazioni Aggiuntive

Pubblicato il: 07/11/2025 04:15:46
Ultima modifica: 07/11/2025 04:15:46

Fonti e Riferimenti

WordPress

HIGH (8.8)
CVE-2025-4519
The IDonate – Blood Donation, Request And Donor Management System plugin for WordPress is vulnerable to Privilege Escalation due to...
Vendor/s: WordPress

Descrizione Completa

The IDonate – Blood Donation, Request And Donor Management System plugin for WordPress is vulnerable to Privilege Escalation due to a missing capability check on the idonate_donor_password() function in versions 2.1.5 to 2.1.9. This makes it possible for authenticated attackers, with Subscriber-level access and above, to initiate a password reset for any user (including administrators) and elevate their privileges for full site takeover.

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: HIGH
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / LOW
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Score Sfruttabilità/Impatto: 2.8 / 5.9
CRITICAL (9.8)
CVE-2025-12352
The Gravity Forms plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the...
Vendor/s: WordPress

Descrizione Completa

The Gravity Forms plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the copy_post_image() function in all versions up to, and including, 2.9.20. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible. This only impacts sites that have allow_url_fopen set to `On`, the post creation form enabled along with a file upload field for the post

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: HIGH
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / NONE
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Score Sfruttabilità/Impatto: 3.9 / 5.9

Tomcat

CRITICAL (9.1)
CVE-2025-63690
In pig-mesh Pig versions 3.8.2 and below, when setting up scheduled tasks in the Quartz management function under the system...
Vendor/s: Tomcat

Descrizione Completa

In pig-mesh Pig versions 3.8.2 and below, when setting up scheduled tasks in the Quartz management function under the system management module, it is possible to execute any Java class with a parameterless constructor and its methods with parameter type String through reflection. At this time, the eval method in Tomcat's built-in class jakarta.el.ELProcessor can be used to execute commands, leading to a remote code execution vulnerability.

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: HIGH
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / HIGH
  • Scope: CHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
  • Score Sfruttabilità/Impatto: 2.3 / 6

Informazioni Aggiuntive

Pubblicato il: 07/11/2025 16:15:42
Ultima modifica: 07/11/2025 19:16:25

Fonti e Riferimenti

Elastic

HIGH (8.8)
CVE-2025-37736
Improper Authorization in Elastic Cloud Enterprise can lead to Privilege Escalation where the built-in readonly user can call APIs that...
Vendor/s: Elastic

Descrizione Completa

Improper Authorization in Elastic Cloud Enterprise can lead to Privilege Escalation where the built-in readonly user can call APIs that should not be allowed. The list of APIs that are affected by this issue is: post:/platform/configuration/security/service-accounts delete:/platform/configuration/security/service-accounts/{user_id} patch:/platform/configuration/security/service-accounts/{user_id} post:/platform/configuration/security/service-accounts/{user_id}/keys delete:/platform/configuration/security/service-accounts/{user_id}/keys/{api_key_id} patch:/user post:/users post:/users/auth/keys delete:/users/auth/keys delete:/users/auth/keys/_all delete:/users/auth/keys/{api_key_id} delete:/users/{user_id}/auth/keys delete:/users/{user_id}/auth/keys/{api_key_id} delete:/users/{user_name} patch:/users/{user_name}

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: HIGH
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / LOW
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Score Sfruttabilità/Impatto: 2.8 / 5.9

Informazioni Aggiuntive

Pubblicato il: 07/11/2025 23:15:44
Ultima modifica: 07/11/2025 23:15:44

Fonti e Riferimenti