Red Hot Cyber
La cybersecurity è condivisione. Riconosci il rischio, combattilo, condividi le tue esperienze ed incentiva gli altri a fare meglio di te.
Cerca
Red Hot Cyber Academy

Lista delle CVE più critiche emesse negli ultimi 3 giorni

Di seguito sono riportate le vulnerabilità critiche pubblicate negli ultimi giorni dal National Vulnerability Database degli Stati Uniti d'America. Se la vostra infrastruttura utilizza questi prodotti, è fondamentale prestare la massima attenzione per prevenire possibili sfruttamenti da parte di malintenzionati che potrebbero compromettere la sicurezza dei vostri sistemi.

📅 2025-07-21

🔧 Unknown

CVE-2024-6107 (score: 9.6, severity: CRITICAL)
Due to insufficient verification, an attacker could use a malicious client to bypass authentication checks and run RPC commands in a region. This has been addressed in MAAS and updated in the corresponding snaps.
Source Identifier: [email protected]
Pubblicato il: 21/07/2025 09:15:23
Ultima modifica: 21/07/2025 09:15:23
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2024-6107

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:H
  • Base Severity: CRITICAL
  • Attack Vector: ADJACENT_NETWORK
  • Attack Complexity: LOW
  • Privileges Required: NONE
  • User Interaction: NONE
  • Scope: CHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: LOW
  • Availability Impact: HIGH
  • Exploitability Score: 2.8
  • Impact Score: 6
Fonti:
CVE-2025-7921 (score: 9.8, severity: CRITICAL)
Certain modem models developed by Askey has a Stack-based Buffer Overflow vulnerability, allowing unauthenticated remote attackers to control the program's execution flow and potentially execute arbitrary code.
Source Identifier: [email protected]
Pubblicato il: 21/07/2025 07:15:25
Ultima modifica: 21/07/2025 07:15:25
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-7921

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Base Severity: CRITICAL
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: NONE
  • User Interaction: NONE
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 3.9
  • Impact Score: 5.9
Fonti:
CVE-2025-7343 (score: 9.8, severity: CRITICAL)
The SFT developed by Digiwin has a SQL Injection vulnerability, allowing unauthenticated remote attackers to inject arbitrary SQL commands to read, modify, and delete database contents.
Source Identifier: [email protected]
Pubblicato il: 21/07/2025 07:15:24
Ultima modifica: 21/07/2025 07:15:24
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-7343

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Base Severity: CRITICAL
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: NONE
  • User Interaction: NONE
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 3.9
  • Impact Score: 5.9
Fonti:
CVE-2025-7344 (score: 8.8, severity: HIGH)
The EAI developed by Digiwin has a Privilege Escalation vulnerability, allowing remote attackers with regular privileges to elevate their privileges to administrator level via a specific API.
Source Identifier: [email protected]
Pubblicato il: 21/07/2025 07:15:24
Ultima modifica: 21/07/2025 07:15:24
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-7344

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Base Severity: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: LOW
  • User Interaction: NONE
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 2.8
  • Impact Score: 5.9
Fonti:
CVE-2025-7918 (score: 9.8, severity: CRITICAL)
WinMatrix3 Web package developed by Simopro Technology has a SQL Injection vulnerability, allowing unauthenticated remote attackers to inject arbitrary SQL commands to read, modify, and delete database contents.
Source Identifier: [email protected]
Pubblicato il: 21/07/2025 06:15:29
Ultima modifica: 21/07/2025 07:15:24
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-7918

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Base Severity: CRITICAL
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: NONE
  • User Interaction: NONE
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 3.9
  • Impact Score: 5.9
Fonti:
CVE-2025-7916 (score: 9.8, severity: CRITICAL)
WinMatrix3 developed by Simopro Technology has an Insecure Deserialization vulnerability, allowing unauthenticated remote attackers to execute arbitrary code on the server by sending maliciously crafted serialized contents.
Source Identifier: [email protected]
Pubblicato il: 21/07/2025 06:15:27
Ultima modifica: 21/07/2025 06:15:27
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-7916

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Base Severity: CRITICAL
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: NONE
  • User Interaction: NONE
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 3.9
  • Impact Score: 5.9
Fonti:
CVE-2025-7914 (score: 8.8, severity: HIGH)
A vulnerability has been found in Tenda AC6 15.03.06.50 and classified as critical. Affected by this vulnerability is the function setparentcontrolinfo of the component httpd. The manipulation leads to buffer overflow. The attack can be launched remotely.
Source Identifier: cna@vuldb.com
Pubblicato il: 21/07/2025 01:15:22
Ultima modifica: 21/07/2025 01:15:22
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-7914

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Base Severity: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: LOW
  • User Interaction: NONE
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 2.8
  • Impact Score: 5.9
Fonti:
CVE-2025-7913 (score: 8.8, severity: HIGH)
A vulnerability, which was classified as critical, was found in TOTOLINK T6 4.1.5cu.748_B20211015. Affected is the function updateWifiInfo of the component MQTT Service. The manipulation of the argument serverIp leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
Source Identifier: [email protected]
Pubblicato il: 21/07/2025 00:15:23
Ultima modifica: 21/07/2025 00:15:23
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-7913

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Base Severity: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: LOW
  • User Interaction: NONE
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 2.8
  • Impact Score: 5.9
Fonti:

📅 2025-07-20

🔧 Unknown

CVE-2025-7912 (score: 8.8, severity: HIGH)
A vulnerability, which was classified as critical, has been found in TOTOLINK T6 4.1.5cu.748_B20211015. This issue affects the function recvSlaveUpgstatus of the component MQTT Service. The manipulation of the argument s leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
Source Identifier: [email protected]
Pubblicato il: 20/07/2025 23:15:32
Ultima modifica: 20/07/2025 23:15:32
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-7912

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Base Severity: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: LOW
  • User Interaction: NONE
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 2.8
  • Impact Score: 5.9
Fonti:
CVE-2025-7911 (score: 8.8, severity: HIGH)
A vulnerability classified as critical was found in D-Link DI-8100 1.0. This vulnerability affects the function sprintf of the file /upnp_ctrl.asp of the component jhttpd. The manipulation of the argument remove_ext_proto/remove_ext_port leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
Source Identifier: [email protected]
Pubblicato il: 20/07/2025 23:15:31
Ultima modifica: 20/07/2025 23:15:31
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-7911

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Base Severity: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: LOW
  • User Interaction: NONE
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 2.8
  • Impact Score: 5.9
Fonti:
CVE-2025-7909 (score: 8.8, severity: HIGH)
A vulnerability was found in D-Link DIR-513 1.0. It has been rated as critical. Affected by this issue is the function sprintf of the file /goform/formLanSetupRouterSettings of the component Boa Webserver. The manipulation of the argument curTime leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
Source Identifier: [email protected]
Pubblicato il: 20/07/2025 22:15:23
Ultima modifica: 20/07/2025 22:15:23
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-7909

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Base Severity: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: LOW
  • User Interaction: NONE
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 2.8
  • Impact Score: 5.9
Fonti:
CVE-2025-7910 (score: 8.8, severity: HIGH)
A vulnerability classified as critical has been found in D-Link DIR-513 1.10. This affects the function sprintf of the file /goform/formSetWanNonLogin of the component Boa Webserver. The manipulation of the argument curTime leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
Source Identifier: [email protected]
Pubblicato il: 20/07/2025 22:15:23
Ultima modifica: 20/07/2025 22:15:23
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-7910

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Base Severity: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: LOW
  • User Interaction: NONE
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 2.8
  • Impact Score: 5.9
Fonti:
CVE-2025-7908 (score: 8.8, severity: HIGH)
A vulnerability was found in D-Link DI-8100 1.0. It has been declared as critical. Affected by this vulnerability is the function sprintf of the file /ddns.asp?opt=add of the component jhttpd. The manipulation of the argument mx leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
Source Identifier: [email protected]
Pubblicato il: 20/07/2025 21:15:23
Ultima modifica: 20/07/2025 21:15:23
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-7908

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Base Severity: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: LOW
  • User Interaction: NONE
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 2.8
  • Impact Score: 5.9
Fonti:
CVE-2025-47917 (score: 8.9, severity: HIGH)
Mbed TLS before 3.6.4 allows a use-after-free in certain situations of applications that are developed in accordance with the documentation. The function mbedtls_x509_string_to_names() takes a head argument that is documented as an output argument. The documentation does not suggest that the function will free that pointer; however, the function does call mbedtls_asn1_free_named_data_list() on that argument, which performs a deep free(). As a result, application code that uses this function (relying only on documented behavior) is likely to still hold pointers to the memory blocks that were freed, resulting in a high risk of use-after-free or double-free. In particular, the two sample programs x509/cert_write and x509/cert_req are affected (use-after-free if the san string contains more than one DN).
Source Identifier: [email protected]
Pubblicato il: 20/07/2025 19:15:23
Ultima modifica: 20/07/2025 19:15:23
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-47917

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:H/A:H
  • Base Severity: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: HIGH
  • Privileges Required: NONE
  • User Interaction: NONE
  • Scope: CHANGED
  • Confidentiality Impact: LOW
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 2.2
  • Impact Score: 6
Fonti:
CVE-2025-46384 (score: 8.8, severity: HIGH)
CWE-434 Unrestricted Upload of File with Dangerous Type
Source Identifier: [email protected]
Pubblicato il: 20/07/2025 15:15:24
Ultima modifica: 20/07/2025 15:15:24
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-46384

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Base Severity: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: LOW
  • User Interaction: NONE
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 2.8
  • Impact Score: 5.9
Fonti:
CVE-2025-46385 (score: 8.6, severity: HIGH)
CWE-918 Server-Side Request Forgery (SSRF)
Source Identifier: [email protected]
Pubblicato il: 20/07/2025 15:15:24
Ultima modifica: 20/07/2025 15:15:24
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-46385

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N
  • Base Severity: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: NONE
  • User Interaction: NONE
  • Scope: CHANGED
  • Confidentiality Impact: NONE
  • Integrity Impact: HIGH
  • Availability Impact: NONE
  • Exploitability Score: 3.9
  • Impact Score: 4
Fonti:
CVE-2025-53770 (score: 9.8, severity: CRITICAL)
Deserialization of untrusted data in on-premises Microsoft SharePoint Server allows an unauthorized attacker to execute code over a network. Microsoft is aware that an exploit for CVE-2025-53770 exists in the wild. Microsoft is preparing and fully testing a comprehensive update to address this vulnerability. In the meantime, please make sure that the mitigation provided in this CVE documentation is in place so that you are protected from exploitation.
Source Identifier: [email protected]
Pubblicato il: 20/07/2025 01:15:30
Ultima modifica: 21/07/2025 01:00:02
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-53770

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Base Severity: CRITICAL
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: NONE
  • User Interaction: NONE
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 3.9
  • Impact Score: 5.9
Fonti:

📅 2025-07-19

🔧 Unknown

CVE-2025-7854 (score: 8.8, severity: HIGH)
A vulnerability classified as critical has been found in Tenda FH451 1.0.0.9. Affected is the function fromVirtualSer of the file /goform/VirtualSer. The manipulation of the argument page leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
Source Identifier: [email protected]
Pubblicato il: 19/07/2025 21:15:24
Ultima modifica: 19/07/2025 21:15:24
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-7854

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Base Severity: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: LOW
  • User Interaction: NONE
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 2.8
  • Impact Score: 5.9
Fonti:
CVE-2025-7855 (score: 8.8, severity: HIGH)
A vulnerability classified as critical was found in Tenda FH451 1.0.0.9. Affected by this vulnerability is the function fromqossetting of the file /goform/qossetting. The manipulation of the argument page leads to stack-based buffer overflow. The attack can be launched remotely.
Source Identifier: [email protected]
Pubblicato il: 19/07/2025 21:15:24
Ultima modifica: 19/07/2025 21:15:24
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-7855

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Base Severity: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: LOW
  • User Interaction: NONE
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 2.8
  • Impact Score: 5.9
Fonti:
CVE-2025-7853 (score: 8.8, severity: HIGH)
A vulnerability was found in Tenda FH451 1.0.0.9. It has been rated as critical. This issue affects the function fromSetIpBind of the file /goform/SetIpBind. The manipulation of the argument page leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
Source Identifier: [email protected]
Pubblicato il: 19/07/2025 20:15:23
Ultima modifica: 19/07/2025 20:15:23
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-7853

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Base Severity: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: LOW
  • User Interaction: NONE
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 2.8
  • Impact Score: 5.9
Fonti:
CVE-2025-7837 (score: 8.8, severity: HIGH)
A vulnerability was found in TOTOLINK T6 4.1.5cu.748_B20211015 and classified as critical. Affected by this issue is the function recvSlaveStaInfo of the component MQTT Service. The manipulation of the argument dest leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
Source Identifier: [email protected]
Pubblicato il: 19/07/2025 17:15:24
Ultima modifica: 19/07/2025 17:15:24
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-7837

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Base Severity: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: LOW
  • User Interaction: NONE
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 2.8
  • Impact Score: 5.9
Fonti:
CVE-2015-10139 (score: 8.8, severity: HIGH)
The WPLMS theme for WordPress is vulnerable to Privilege Escalation in versions 1.5.2 to 1.8.4.1 via the 'wp_ajax_import_data' AJAX action. This makes it possible for authenticated attackers to change otherwise restricted settings and potentially create a new accessible admin account.
Source Identifier: [email protected]
Pubblicato il: 19/07/2025 12:15:35
Ultima modifica: 19/07/2025 12:15:35
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2015-10139

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Base Severity: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: LOW
  • User Interaction: NONE
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 2.8
  • Impact Score: 5.9
Fonti:
CVE-2015-10138 (score: 9.8, severity: CRITICAL)
The Work The Flow File Upload plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the jQuery-File-Upload-9.5.0 server and test files in versions up to, and including, 2.5.2. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected sites server which may make remote code execution possible.
Source Identifier: [email protected]
Pubblicato il: 19/07/2025 12:15:34
Ultima modifica: 19/07/2025 12:15:34
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2015-10138

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Base Severity: CRITICAL
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: NONE
  • User Interaction: NONE
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 3.9
  • Impact Score: 5.9
Fonti:
CVE-2015-10135 (score: 9.8, severity: CRITICAL)
The WPshop 2 – E-Commerce plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the ajaxUpload function in versions before 1.3.9.6. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected sites server which may make remote code execution possible.
Source Identifier: [email protected]
Pubblicato il: 19/07/2025 10:15:23
Ultima modifica: 19/07/2025 10:15:23
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2015-10135

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Base Severity: CRITICAL
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: NONE
  • User Interaction: NONE
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 3.9
  • Impact Score: 5.9
Fonti:
CVE-2016-15043 (score: 9.8, severity: CRITICAL)
The WP Mobile Detector plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in resize.php file in versions up to, and including, 3.5. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected sites server which may make remote code execution possible.
Source Identifier: [email protected]
Pubblicato il: 19/07/2025 10:15:23
Ultima modifica: 19/07/2025 10:15:23
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2016-15043

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Base Severity: CRITICAL
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: NONE
  • User Interaction: NONE
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 3.9
  • Impact Score: 5.9
Fonti:
CVE-2012-10019 (score: 9.8, severity: CRITICAL)
The Front End Editor plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation via the upload.php file in versions before 2.3. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected sites server which may make remote code execution possible.
Source Identifier: [email protected]
Pubblicato il: 19/07/2025 10:15:22
Ultima modifica: 19/07/2025 10:15:22
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2012-10019

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Base Severity: CRITICAL
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: NONE
  • User Interaction: NONE
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 3.9
  • Impact Score: 5.9
Fonti:
CVE-2025-7696 (score: 9.8, severity: CRITICAL)
The Integration for Pipedrive and Contact Form 7, WPForms, Elementor, Ninja Forms plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.2.3 via deserialization of untrusted input within the verify_field_val() function. This makes it possible for unauthenticated attackers to inject a PHP Object. The additional presence of a POP chain in the Contact Form 7 plugin, which is likely to be used alongside, allows attackers to delete arbitrary files, leading to a denial of service or remote code execution when the wp-config.php file is deleted.
Source Identifier: [email protected]
Pubblicato il: 19/07/2025 05:15:22
Ultima modifica: 19/07/2025 05:15:22
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-7696

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Base Severity: CRITICAL
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: NONE
  • User Interaction: NONE
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 3.9
  • Impact Score: 5.9
Fonti:
CVE-2025-7697 (score: 9.8, severity: CRITICAL)
The Integration for Google Sheets and Contact Form 7, WPForms, Elementor, Ninja Forms plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.1.1 via deserialization of untrusted input within the verify_field_val() function. This makes it possible for unauthenticated attackers to inject a PHP Object. The additional presence of a POP chain in the Contact Form 7 plugin, which is likely to be used alongside, allows attackers to delete arbitrary files, leading to a denial of service or remote code execution when the wp-config.php file is deleted.
Source Identifier: [email protected]
Pubblicato il: 19/07/2025 05:15:22
Ultima modifica: 19/07/2025 05:15:22
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-7697

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Base Severity: CRITICAL
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: NONE
  • User Interaction: NONE
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 3.9
  • Impact Score: 5.9
Fonti:

📅 2025-07-18

🔧 Unknown

CVE-2025-7806 (score: 8.8, severity: HIGH)
A vulnerability classified as critical was found in Tenda FH451 1.0.0.9. This vulnerability affects the function fromSafeClientFilter of the file /goform/SafeClientFilter. The manipulation of the argument Go/page leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
Source Identifier: [email protected]
Pubblicato il: 18/07/2025 21:15:25
Ultima modifica: 18/07/2025 21:15:25
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-7806

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Base Severity: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: LOW
  • User Interaction: NONE
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 2.8
  • Impact Score: 5.9
Fonti:
CVE-2025-7807 (score: 8.8, severity: HIGH)
A vulnerability, which was classified as critical, has been found in Tenda FH451 1.0.0.9. This issue affects the function fromSafeUrlFilter of the file /goform/SafeUrlFilter. The manipulation of the argument Go/page leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
Source Identifier: [email protected]
Pubblicato il: 18/07/2025 21:15:25
Ultima modifica: 18/07/2025 21:15:25
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-7807

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Base Severity: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: LOW
  • User Interaction: NONE
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 2.8
  • Impact Score: 5.9
Fonti:
CVE-2025-7805 (score: 8.8, severity: HIGH)
A vulnerability classified as critical has been found in Tenda FH451 1.0.0.9. This affects the function fromPptpUserSetting of the file /goform/PPTPUserSetting. The manipulation of the argument delno leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
Source Identifier: [email protected]
Pubblicato il: 18/07/2025 20:15:25
Ultima modifica: 18/07/2025 20:15:25
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-7805

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Base Severity: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: LOW
  • User Interaction: NONE
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 2.8
  • Impact Score: 5.9
Fonti:
CVE-2025-54309 (score: 9, severity: CRITICAL)
CrushFTP 10 before 10.8.5 and 11 before 11.3.4_23, when the DMZ proxy feature is not used, mishandles AS2 validation and consequently allows remote attackers to obtain admin access via HTTPS, as exploited in the wild in July 2025.
Source Identifier: [email protected]
Pubblicato il: 18/07/2025 19:15:25
Ultima modifica: 19/07/2025 01:15:21
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-54309

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
  • Base Severity: CRITICAL
  • Attack Vector: NETWORK
  • Attack Complexity: HIGH
  • Privileges Required: NONE
  • User Interaction: NONE
  • Scope: CHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 2.2
  • Impact Score: 6
Fonti:
CVE-2025-7796 (score: 8.8, severity: HIGH)
A vulnerability, which was classified as critical, was found in Tenda FH451 1.0.0.9. This affects the function fromPptpUserAdd of the file /goform/PPTPDClient. The manipulation of the argument Username leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
Source Identifier: [email protected]
Pubblicato il: 18/07/2025 18:15:25
Ultima modifica: 18/07/2025 18:15:25
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-7796

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Base Severity: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: LOW
  • User Interaction: NONE
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 2.8
  • Impact Score: 5.9
Fonti:
CVE-2025-7795 (score: 8.8, severity: HIGH)
A vulnerability, which was classified as critical, has been found in Tenda FH451 1.0.0.9. Affected by this issue is the function fromP2pListFilter of the file /goform/P2pListFilter. The manipulation of the argument page leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
Source Identifier: [email protected]
Pubblicato il: 18/07/2025 18:15:24
Ultima modifica: 18/07/2025 18:15:24
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-7795

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Base Severity: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: LOW
  • User Interaction: NONE
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 2.8
  • Impact Score: 5.9
Fonti:
CVE-2025-7792 (score: 8.8, severity: HIGH)
A vulnerability was found in Tenda FH451 1.0.0.9. It has been rated as critical. This issue affects the function formSafeEmailFilter of the file /goform/SafeEmailFilter. The manipulation of the argument page leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
Source Identifier: [email protected]
Pubblicato il: 18/07/2025 17:15:45
Ultima modifica: 18/07/2025 17:15:45
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-7792

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Base Severity: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: LOW
  • User Interaction: NONE
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 2.8
  • Impact Score: 5.9
Fonti:
CVE-2025-7793 (score: 8.8, severity: HIGH)
A vulnerability classified as critical has been found in Tenda FH451 1.0.0.9. Affected is the function formWebTypeLibrary of the file /goform/webtypelibrary. The manipulation of the argument webSiteId leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
Source Identifier: [email protected]
Pubblicato il: 18/07/2025 17:15:45
Ultima modifica: 18/07/2025 17:15:45
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-7793

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Base Severity: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: LOW
  • User Interaction: NONE
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 2.8
  • Impact Score: 5.9
Fonti:
CVE-2025-7794 (score: 8.8, severity: HIGH)
A vulnerability classified as critical was found in Tenda FH451 1.0.0.9. Affected by this vulnerability is the function fromNatStaticSetting of the file /goform/NatStaticSetting. The manipulation of the argument page leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
Source Identifier: [email protected]
Pubblicato il: 18/07/2025 17:15:45
Ultima modifica: 18/07/2025 17:15:45
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-7794

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Base Severity: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: LOW
  • User Interaction: NONE
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 2.8
  • Impact Score: 5.9
Fonti:
CVE-2025-53762 (score: 8.7, severity: HIGH)
Permissive list of allowed inputs in Microsoft Purview allows an authorized attacker to elevate privileges over a network.
Source Identifier: [email protected]
Pubblicato il: 18/07/2025 17:15:44
Ultima modifica: 18/07/2025 17:15:44
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-53762

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N
  • Base Severity: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: HIGH
  • User Interaction: NONE
  • Scope: CHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: NONE
  • Exploitability Score: 2.3
  • Impact Score: 5.8
Fonti:
CVE-2025-49746 (score: 9.9, severity: CRITICAL)
Improper authorization in Azure Machine Learning allows an authorized attacker to elevate privileges over a network.
Source Identifier: [email protected]
Pubblicato il: 18/07/2025 17:15:43
Ultima modifica: 18/07/2025 17:15:43
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-49746

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
  • Base Severity: CRITICAL
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: LOW
  • User Interaction: NONE
  • Scope: CHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 3.1
  • Impact Score: 6
Fonti:
CVE-2025-49747 (score: 9.9, severity: CRITICAL)
Missing authorization in Azure Machine Learning allows an authorized attacker to elevate privileges over a network.
Source Identifier: [email protected]
Pubblicato il: 18/07/2025 17:15:43
Ultima modifica: 18/07/2025 17:15:43
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-49747

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
  • Base Severity: CRITICAL
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: LOW
  • User Interaction: NONE
  • Scope: CHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 3.1
  • Impact Score: 6
Fonti:
CVE-2025-47158 (score: 9, severity: CRITICAL)
Authentication bypass by assumed-immutable data in Azure DevOps allows an unauthorized attacker to elevate privileges over a network.
Source Identifier: [email protected]
Pubblicato il: 18/07/2025 17:15:31
Ultima modifica: 18/07/2025 17:15:31
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-47158

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
  • Base Severity: CRITICAL
  • Attack Vector: NETWORK
  • Attack Complexity: HIGH
  • Privileges Required: NONE
  • User Interaction: NONE
  • Scope: CHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 2.2
  • Impact Score: 6
Fonti:
CVE-2025-7790 (score: 8.8, severity: HIGH)
A vulnerability was found in D-Link DI-8100 16.07.26A1. It has been classified as critical. This affects an unknown part of the file /menu_nat.asp of the component HTTP Request Handler. The manipulation of the argument out_addr/in_addr/out_port/proto leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
Source Identifier: [email protected]
Pubblicato il: 18/07/2025 16:15:31
Ultima modifica: 18/07/2025 16:15:31
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-7790

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Base Severity: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: LOW
  • User Interaction: NONE
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 2.8
  • Impact Score: 5.9
Fonti:
CVE-2025-7444 (score: 9.8, severity: CRITICAL)
The LoginPress Pro plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 5.0.1. This is due to insufficient verification on the user being returned by the social login token. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the email and the user does not have an already-existing account for the service returning the token.
Source Identifier: [email protected]
Pubblicato il: 18/07/2025 09:15:27
Ultima modifica: 18/07/2025 09:15:27
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-7444

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Base Severity: CRITICAL
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: NONE
  • User Interaction: NONE
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 3.9
  • Impact Score: 5.9
Fonti:
CVE-2025-7643 (score: 9.1, severity: CRITICAL)
The Attachment Manager plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the handle_actions() function in all versions up to, and including, 2.1.2. This makes it possible for unauthenticated attackers to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).
Source Identifier: [email protected]
Pubblicato il: 18/07/2025 06:15:28
Ultima modifica: 18/07/2025 06:15:28
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-7643

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
  • Base Severity: CRITICAL
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: NONE
  • User Interaction: NONE
  • Scope: UNCHANGED
  • Confidentiality Impact: NONE
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 3.9
  • Impact Score: 5.2
Fonti:
CVE-2025-6718 (score: 8.8, severity: HIGH)
The B1.lt plugin for WordPress is vulnerable to SQL Injection due to a missing capability check on the b1_run_query AJAX action in all versions up to, and including, 2.2.56. This makes it possible for authenticated attackers, with Subscriber-level access and above, to execute and run arbitrary SQL commands.
Source Identifier: [email protected]
Pubblicato il: 18/07/2025 06:15:27
Ultima modifica: 18/07/2025 06:15:27
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-6718

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Base Severity: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: LOW
  • User Interaction: NONE
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 2.8
  • Impact Score: 5.9
Fonti:
CVE-2025-6222 (score: 9.8, severity: CRITICAL)
The WooCommerce Refund And Exchange with RMA - Warranty Management, Refund Policy, Manage User Wallet theme for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'ced_rnx_order_exchange_attach_files' function in all versions up to, and including, 3.2.6. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.
Source Identifier: [email protected]
Pubblicato il: 18/07/2025 06:15:26
Ultima modifica: 18/07/2025 06:15:26
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-6222

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Base Severity: CRITICAL
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: NONE
  • User Interaction: NONE
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 3.9
  • Impact Score: 5.9
Fonti:
CVE-2025-6813 (score: 8.8, severity: HIGH)
The aapanel WP Toolkit plugin for WordPress is vulnerable to Privilege Escalation due to missing authorization checks within the auto_login() function in versions 1.0 to 1.1. This makes it possible for authenticated attackers, with Subscriber-level access and above, to bypass all role checks and gain full admin privileges.
Source Identifier: [email protected]
Pubblicato il: 18/07/2025 05:15:32
Ultima modifica: 18/07/2025 05:15:32
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-6813

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Base Severity: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: LOW
  • User Interaction: NONE
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 2.8
  • Impact Score: 5.9
Fonti:
CVE-2025-3740 (score: 8.8, severity: HIGH)
The School Management System for WordPress plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 93.1.0 via the 'page' parameter. This makes it possible for authenticated attackers, with Subscriber-level access and above, to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included. The Local File Inclusion exploit can be chained to include various dashboard view files in the plugin. One such chain can be leveraged to update the password of Super Administrator accounts in Multisite environments making privilege escalation possible. The vendor has updated the version numbers beginning with `1.93.1 (02-07-2025)` for the patched version. This version comes after version 93.1.0.
Source Identifier: [email protected]
Pubblicato il: 18/07/2025 05:15:30
Ultima modifica: 18/07/2025 05:15:30
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-3740

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Base Severity: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: LOW
  • User Interaction: NONE
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 2.8
  • Impact Score: 5.9
Fonti:
CVE-2025-6185 (score: 9.3, severity: CRITICAL)
Leviton AcquiSuite and Energy Monitoring Hub are susceptible to a cross-site scripting vulnerability, allowing an attacker to craft a malicious payload in URL parameters, which would execute in a client browser when accessed by a user, steal session tokens, and control the service.
Source Identifier: [email protected]
Pubblicato il: 18/07/2025 00:15:24
Ultima modifica: 18/07/2025 00:15:24
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-6185

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N
  • Base Severity: CRITICAL
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: NONE
  • User Interaction: REQUIRED
  • Scope: CHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: NONE
  • Exploitability Score: 2.8
  • Impact Score: 5.8
Fonti: