Red Hot Cyber
Condividi la tua difesa. Incoraggia l'eccellenza. La vera forza della cybersecurity risiede nell'effetto moltiplicatore della conoscenza.
Cerca
2nd Edition GlitchZone RHC 970x120 2
TM RedHotCyber 320x100 042514

Lista CVE più critiche emesse negli ultimi 3 giorni

Di seguito sono riportate le vulnerabilità critiche pubblicate negli ultimi giorni dal National Vulnerability Database (NVD). Prestate massima attenzione per prevenire possibili sfruttamenti.
Ricerca singola vulnerabilità

28/11/2025

Unknown

CRITICAL (9.3)
CVE-2025-64314
Permission control vulnerability in the memory management module. Impact: Successful exploitation of this vulnerability may affect confidentiality.
Vendor/s:

Descrizione Completa

Permission control vulnerability in the memory management module. Impact: Successful exploitation of this vulnerability may affect confidentiality.

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: HIGH
  • Vettore Attacco: LOCAL
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / NONE
  • Scope: CHANGED
  • Vector String: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
  • Score Sfruttabilità/Impatto: 2.5 / 6

Informazioni Aggiuntive

Pubblicato il: 28/11/2025 03:16:00
Ultima modifica: 28/11/2025 03:16:00

Fonti e Riferimenti

HIGH (8.5)
CVE-2025-66359
An issue was discovered in Logpoint before 7.7.0. Insufficient input validation and a lack of output escaping in multiple components...
Vendor/s:

Descrizione Completa

An issue was discovered in Logpoint before 7.7.0. Insufficient input validation and a lack of output escaping in multiple components leads to a cross-site scripting (XSS) vulnerability.

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: HIGH
  • Vettore Attacco: NETWORK
  • Complessità Attacco: HIGH
  • Interazione/Privilegi: NONE / LOW
  • Scope: CHANGED
  • Vector String: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
  • Score Sfruttabilità/Impatto: 1.8 / 6

Informazioni Aggiuntive

Pubblicato il: 28/11/2025 00:15:46
Ultima modifica: 28/11/2025 00:15:46

Fonti e Riferimenti

27/11/2025

WordPress

HIGH (8.8)
CVE-2025-13536
The Blubrry PowerPress plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file type validation in all...
Vendor/s: WordPress

Descrizione Completa

The Blubrry PowerPress plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file type validation in all versions up to, and including, 11.15.2. This is due to the plugin validating file extensions but not halting execution when validation fails in the 'powerpress_edit_post' function. This makes it possible for authenticated attackers, with Contributor-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: HIGH
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / LOW
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Score Sfruttabilità/Impatto: 2.8 / 5.9
CRITICAL (9.8)
CVE-2025-13675
The Tiger theme for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 101.2.1. This is...
Vendor/s: WordPress

Descrizione Completa

The Tiger theme for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 101.2.1. This is due to the 'paypal-submit.php' file not restricting what user roles a user can register with. This makes it possible for unauthenticated attackers to supply the 'administrator' role during registration and gain administrator access to the site.

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: HIGH
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / NONE
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Score Sfruttabilità/Impatto: 3.9 / 5.9
HIGH (8.8)
CVE-2025-13680
The Tiger theme for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 101.2.1. This is...
Vendor/s: WordPress

Descrizione Completa

The Tiger theme for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 101.2.1. This is due to the plugin allowing a user to update the user role through the $user->set_role() function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to elevate their privileges to that of an administrator.

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: HIGH
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / LOW
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Score Sfruttabilità/Impatto: 2.8 / 5.9
CRITICAL (9.8)
CVE-2025-13540
The Tiare Membership plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 1.2. This...
Vendor/s: WordPress

Descrizione Completa

The Tiare Membership plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 1.2. This is due to the 'tiare_membership_init_rest_api_register' function not restricting what user roles a user can register with. This makes it possible for unauthenticated attackers to supply the 'administrator' role during registration and gain administrator access to the site.

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: HIGH
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / NONE
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Score Sfruttabilità/Impatto: 3.9 / 5.9
CRITICAL (9.8)
CVE-2025-13539
The FindAll Membership plugin for WordPress is vulnerable to Authentication Bypass in all versions up to, and including, 1.0.4. This...
Vendor/s: WordPress

Descrizione Completa

The FindAll Membership plugin for WordPress is vulnerable to Authentication Bypass in all versions up to, and including, 1.0.4. This is due to the plugin not properly logging in a user with the data that was previously verified through the 'findall_membership_check_facebook_user' and the 'findall_membership_check_google_user' functions. This makes it possible for unauthenticated attackers to log in as administrative users, as long as they have an existing account on the site which can easily be created by default through the temp user functionality, and access to the administrative user's email.

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: HIGH
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / NONE
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Score Sfruttabilità/Impatto: 3.9 / 5.9
CRITICAL (9.8)
CVE-2025-13538
The FindAll Listing plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 1.0.5. This...
Vendor/s: WordPress

Descrizione Completa

The FindAll Listing plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 1.0.5. This is due to the 'findall_listing_user_registration_additional_params' function not restricting what user roles a user can register with. This makes it possible for unauthenticated attackers to supply the 'administrator' role during registration and gain administrator access to the site. Note: The vulnerability can only be exploited if the FindAll Membership plugin is also activated, because user registration is in that plugin.

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: HIGH
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / NONE
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Score Sfruttabilità/Impatto: 3.9 / 5.9

Unknown

CRITICAL (9.9)
CVE-2025-12421
Mattermost versions 11.0.x
Vendor/s:

Descrizione Completa

Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to to verify that the token used during the code exchange originates from the same authentication flow, which allows an authenticated user to perform account takeover via a specially crafted email address used when switching authentication methods and sending a request to the /users/login/sso/code-exchange endpoint. The vulnerability requires ExperimentalEnableAuthenticationTransfer to be enabled (default: enabled) and RequireEmailVerification to be disabled (default: disabled).

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: HIGH
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / LOW
  • Scope: CHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
  • Score Sfruttabilità/Impatto: 3.1 / 6

Informazioni Aggiuntive

Pubblicato il: 27/11/2025 18:15:46
Ultima modifica: 27/11/2025 18:15:46

Fonti e Riferimenti

CRITICAL (9.9)
CVE-2025-12419
Mattermost versions 10.12.x
Vendor/s:

Descrizione Completa

Mattermost versions 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12, 11.0.x <= 11.0.3 fail to properly validate OAuth state tokens during OpenID Connect authentication which allows an authenticated attacker with team creation privileges to take over a user account via manipulation of authentication data during the OAuth completion flow. This requires email verification to be disabled (default: disabled), OAuth/OpenID Connect to be enabled, and the attacker to control two users in the SSO system with one of them never having logged into Mattermost.

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: HIGH
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / LOW
  • Scope: CHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
  • Score Sfruttabilità/Impatto: 3.1 / 6

Informazioni Aggiuntive

Pubblicato il: 27/11/2025 16:15:46
Ultima modifica: 27/11/2025 18:15:45

Fonti e Riferimenti

26/11/2025

Unknown

CRITICAL (9.3)
CVE-2025-40934
XML-Sig versions 0.27 through 0.67 for Perl incorrectly validates XML files if signatures are omitted. An attacker can remove the signature...
Vendor/s:

Descrizione Completa

XML-Sig versions 0.27 through 0.67 for Perl incorrectly validates XML files if signatures are omitted. An attacker can remove the signature from the XML document to make it pass the verification check. XML-Sig is a Perl module to validate signatures on XML files.  An unsigned XML file should return an error message.  The affected versions return true when attempting to validate an XML file that contains no signatures.

Metriche CVSS v3.1

  • Impatto: Confid.: LOW, Integ.: HIGH, Disp.: NONE
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / NONE
  • Scope: CHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:N
  • Score Sfruttabilità/Impatto: 3.9 / 4.7

Informazioni Aggiuntive

Pubblicato il: 26/11/2025 23:15:47
Ultima modifica: 28/11/2025 19:15:45

Fonti e Riferimenti

CRITICAL (9.8)
CVE-2025-50433
An issue was discovered in imonnit.com (2025-04-24) allowing malicious actors to gain escalated privileges via crafted password reset to take...
Vendor/s:

Descrizione Completa

An issue was discovered in imonnit.com (2025-04-24) allowing malicious actors to gain escalated privileges via crafted password reset to take over arbitrary user accounts.

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: HIGH
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / NONE
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Score Sfruttabilità/Impatto: 3.9 / 5.9

Informazioni Aggiuntive

Pubblicato il: 26/11/2025 20:15:49
Ultima modifica: 28/11/2025 15:16:00

Fonti e Riferimenti

CRITICAL (9.8)
CVE-2025-64130
Zenitel TCIV-3+ is vulnerable to a reflected cross-site scripting vulnerability, which could allow a remote attacker to execute arbitrary JavaScript...
Vendor/s:

Descrizione Completa

Zenitel TCIV-3+ is vulnerable to a reflected cross-site scripting vulnerability, which could allow a remote attacker to execute arbitrary JavaScript on the victim's browser.

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: HIGH
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / NONE
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Score Sfruttabilità/Impatto: 3.9 / 5.9
CRITICAL (10.0)
CVE-2025-64126
An OS command injection vulnerability exists due to improper input validation. The application accepts a parameter directly from user input ...
Vendor/s:

Descrizione Completa

An OS command injection vulnerability exists due to improper input validation. The application accepts a parameter directly from user input without verifying it is a valid IP address or filtering potentially malicious characters. This could allow an unauthenticated attacker to inject arbitrary commands.

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: HIGH
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / NONE
  • Scope: CHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
  • Score Sfruttabilità/Impatto: 3.9 / 6
CRITICAL (10.0)
CVE-2025-64127
An OS command injection vulnerability exists due to insufficient sanitization of user-supplied input. The application accepts parameters that are later...
Vendor/s:

Descrizione Completa

An OS command injection vulnerability exists due to insufficient sanitization of user-supplied input. The application accepts parameters that are later incorporated into OS commands without adequate validation. This could allow an unauthenticated attacker to execute arbitrary commands remotely.

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: HIGH
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / NONE
  • Scope: CHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
  • Score Sfruttabilità/Impatto: 3.9 / 6
CRITICAL (10.0)
CVE-2025-64128
An OS command injection vulnerability exists due to incomplete validation of user-supplied input. Validation fails to enforce sufficient formatting rules,...
Vendor/s:

Descrizione Completa

An OS command injection vulnerability exists due to incomplete validation of user-supplied input. Validation fails to enforce sufficient formatting rules, which could permit attackers to append arbitrary data. This could allow an unauthenticated attacker to inject arbitrary commands.

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: HIGH
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / NONE
  • Scope: CHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
  • Score Sfruttabilità/Impatto: 3.9 / 6
CRITICAL (9.8)
CVE-2025-62354
Improper neutralization of special elements used in an OS command ('command injection') in Cursor allows an unauthorized attacker to execute...
Vendor/s:

Descrizione Completa

Improper neutralization of special elements used in an OS command ('command injection') in Cursor allows an unauthorized attacker to execute commands that are outside of those specified in the allowlist, resulting in arbitrary code execution.

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: HIGH
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / NONE
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Score Sfruttabilità/Impatto: 3.9 / 5.9

Informazioni Aggiuntive

Pubblicato il: 26/11/2025 16:15:49
Ultima modifica: 26/11/2025 16:15:49

Fonti e Riferimenti

HIGH (8.8)
CVE-2025-45311
Insecure permissions in fail2ban-client v0.11.2 allows attackers with limited sudo privileges to perform arbitrary operations as root. NOTE: this is...
Vendor/s:

Descrizione Completa

Insecure permissions in fail2ban-client v0.11.2 allows attackers with limited sudo privileges to perform arbitrary operations as root. NOTE: this is disputed by multiple parties because the action for a triggered rule can legitimately be an arbitrary operation as root. Thus, the software is behaving in accordance with its intended privilege model.

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: HIGH
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / LOW
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Score Sfruttabilità/Impatto: 2.8 / 5.9

Informazioni Aggiuntive

Pubblicato il: 26/11/2025 16:15:47
Ultima modifica: 28/11/2025 20:15:51

Fonti e Riferimenti

CRITICAL (9.6)
CVE-2025-66022
FACTION is a PenTesting Report Generation and Collaboration Framework. Prior to version 1.7.1, an extension execution path in Faction’s extension...
Vendor/s:

Descrizione Completa

FACTION is a PenTesting Report Generation and Collaboration Framework. Prior to version 1.7.1, an extension execution path in Faction’s extension framework permits untrusted extension code to execute arbitrary system commands on the server when a lifecycle hook is invoked, resulting in remote code execution (RCE) on the host running Faction. Due to a missing authentication check on the /portal/AppStoreDashboard endpoint, an attacker can access the extension management UI and upload a malicious extension without any authentication, making this vulnerability exploitable by unauthenticated users. This issue has been patched in version 1.7.1.

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: HIGH
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: REQUIRED / NONE
  • Scope: CHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
  • Score Sfruttabilità/Impatto: 2.8 / 6
CRITICAL (9.4)
CVE-2025-64656
Out-of-bounds read in Application Gateway allows an unauthorized attacker to elevate privileges over a network.
Vendor/s:

Descrizione Completa

Out-of-bounds read in Application Gateway allows an unauthorized attacker to elevate privileges over a network.

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: LOW
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / NONE
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L
  • Score Sfruttabilità/Impatto: 3.9 / 5.5

Informazioni Aggiuntive

Pubblicato il: 26/11/2025 01:16:07
Ultima modifica: 26/11/2025 01:16:07

Fonti e Riferimenti

Azure

CRITICAL (9.8)
CVE-2025-64657
Stack-based buffer overflow in Azure Application Gateway allows an unauthorized attacker to elevate privileges over a network.
Vendor/s: Azure

Descrizione Completa

Stack-based buffer overflow in Azure Application Gateway allows an unauthorized attacker to elevate privileges over a network.

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: HIGH
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / NONE
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Score Sfruttabilità/Impatto: 3.9 / 5.9

Informazioni Aggiuntive

Pubblicato il: 26/11/2025 01:16:07
Ultima modifica: 26/11/2025 01:16:07

Fonti e Riferimenti

WordPress

HIGH (8.6)
CVE-2025-12061
The TAX SERVICE Electronic HDM WordPress plugin before 1.2.1 does not authorization and CSRF checks in an AJAX action, allowing...
Vendor/s: WordPress

Descrizione Completa

The TAX SERVICE Electronic HDM WordPress plugin before 1.2.1 does not authorization and CSRF checks in an AJAX action, allowing unauthenticated users to import and execute arbitrary SQL statements

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: NONE, Disp.: NONE
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / NONE
  • Scope: CHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
  • Score Sfruttabilità/Impatto: 3.9 / 4

Informazioni Aggiuntive

Pubblicato il: 26/11/2025 06:15:44
Ultima modifica: 26/11/2025 15:15:51

Fonti e Riferimenti

Apache

CRITICAL (9.8)
CVE-2025-59390
Apache Druid’s Kerberos authenticator uses a weak fallback secret when the `druid.auth.authenticator.kerberos.cookieSignatureSecret` configuration is not explicitly set. In this case,...
Vendor/s: Apache

Descrizione Completa

Apache Druid’s Kerberos authenticator uses a weak fallback secret when the `druid.auth.authenticator.kerberos.cookieSignatureSecret` configuration is not explicitly set. In this case, the secret is generated using `ThreadLocalRandom`, which is not a crypto-graphically secure random number generator. This may allow an attacker to predict or brute force the secret used to sign authentication cookies, potentially enabling token forgery or authentication bypass. Additionally, each process generates its own fallback secret, resulting in inconsistent secrets across nodes. This causes authentication failures in distributed or multi-broker deployments, effectively leading to a incorrectly configured clusters. Users are advised to configure a strong `druid.auth.authenticator.kerberos.cookieSignatureSecret` This issue affects Apache Druid: through 34.0.0. Users are recommended to upgrade to version 35.0.0, which fixes the issue making it mandatory to set `druid.auth.authenticator.kerberos.cookieSignatureSecret` when using the Kerberos authenticator. Services will fail to come up if the secret is not set.

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: HIGH
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / NONE
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Score Sfruttabilità/Impatto: 3.9 / 5.9

Informazioni Aggiuntive

Pubblicato il: 26/11/2025 09:15:46
Ultima modifica: 26/11/2025 15:15:53

Fonti e Riferimenti

25/11/2025

Unknown

HIGH (8.8)
CVE-2025-62703
Fugue is a unified interface for distributed computing that lets users execute Python, Pandas, and SQL code on Spark, Dask,...
Vendor/s:

Descrizione Completa

Fugue is a unified interface for distributed computing that lets users execute Python, Pandas, and SQL code on Spark, Dask, and Ray with minimal rewrites. In version 0.9.2 and prior, there is a remote code execution vulnerability by pickle deserialization via FlaskRPCServer. The Fugue framework implements an RPC server system for distributed computing operations. In the core functionality of the RPC server implementation, I found that the _decode() function in fugue/rpc/flask.py directly uses cloudpickle.loads() to deserialize data without any sanitization. This creates a remote code execution vulnerability when malicious pickle data is processed by the RPC server. The vulnerability exists in the RPC communication mechanism where the client can send arbitrary serialized Python objects that will be deserialized on the server side, allowing attackers to execute arbitrary code on the victim's machine. This issue has been patched via commit 6f25326.

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: HIGH
  • Vettore Attacco: ADJACENT_NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / NONE
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Score Sfruttabilità/Impatto: 2.8 / 5.9
CRITICAL (9.8)
CVE-2025-51744
An issue was discovered in jishenghua JSH_ERP 2.3.1. The /user/addUser endpoint is vulnerable to fastjson deserialization attacks.
Vendor/s:

Descrizione Completa

An issue was discovered in jishenghua JSH_ERP 2.3.1. The /user/addUser endpoint is vulnerable to fastjson deserialization attacks.

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: HIGH
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / NONE
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Score Sfruttabilità/Impatto: 3.9 / 5.9

Informazioni Aggiuntive

Pubblicato il: 25/11/2025 21:15:56
Ultima modifica: 26/11/2025 15:15:52

Fonti e Riferimenti

CRITICAL (9.8)
CVE-2025-51745
An issue was discovered in jishenghua JSH_ERP 2.3.1. The /role/addcan endpoint is vulnerable to fastjson deserialization attacks.
Vendor/s:

Descrizione Completa

An issue was discovered in jishenghua JSH_ERP 2.3.1. The /role/addcan endpoint is vulnerable to fastjson deserialization attacks.

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: HIGH
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / NONE
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Score Sfruttabilità/Impatto: 3.9 / 5.9

Informazioni Aggiuntive

Pubblicato il: 25/11/2025 21:15:56
Ultima modifica: 26/11/2025 15:15:52

Fonti e Riferimenti

CRITICAL (9.8)
CVE-2025-51746
An issue was discovered in jishenghua JSH_ERP 2.3.1. The /serialNumber/addSerialNumber endpoint is vulnerable to fastjson deserialization attacks.
Vendor/s:

Descrizione Completa

An issue was discovered in jishenghua JSH_ERP 2.3.1. The /serialNumber/addSerialNumber endpoint is vulnerable to fastjson deserialization attacks.

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: HIGH
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / NONE
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Score Sfruttabilità/Impatto: 3.9 / 5.9

Informazioni Aggiuntive

Pubblicato il: 25/11/2025 21:15:56
Ultima modifica: 26/11/2025 15:15:53

Fonti e Riferimenti

CRITICAL (9.8)
CVE-2025-51743
An issue was discovered in jishenghua JSH_ERP 2.3.1. The /materialCategory/addMaterialCategory endpoint is vulnerable to fastjson deserialization attacks.
Vendor/s:

Descrizione Completa

An issue was discovered in jishenghua JSH_ERP 2.3.1. The /materialCategory/addMaterialCategory endpoint is vulnerable to fastjson deserialization attacks.

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: HIGH
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / NONE
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Score Sfruttabilità/Impatto: 3.9 / 5.9

Informazioni Aggiuntive

Pubblicato il: 25/11/2025 21:15:55
Ultima modifica: 26/11/2025 15:15:52

Fonti e Riferimenti

CRITICAL (9.8)
CVE-2025-51742
An issue was discovered in jishenghua JSH_ERP 2.3.1. The /material/getMaterialEnableSerialNumberList endpoint passes the search query parameter directly to parseObject(), introducing...
Vendor/s:

Descrizione Completa

An issue was discovered in jishenghua JSH_ERP 2.3.1. The /material/getMaterialEnableSerialNumberList endpoint passes the search query parameter directly to parseObject(), introducing a Fastjson deserialization vulnerability that can lead to RCE via JDBC payloads.

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: HIGH
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / NONE
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Score Sfruttabilità/Impatto: 3.9 / 5.9

Informazioni Aggiuntive

Pubblicato il: 25/11/2025 20:15:59
Ultima modifica: 26/11/2025 15:15:52

Fonti e Riferimenti

HIGH (8.6)
CVE-2025-12816
An interpretation-conflict (CWE-436) vulnerability in node-forge versions 1.3.1 and earlier enables unauthenticated attackers to craft ASN.1 structures to desynchronize schema...
Vendor/s:

Descrizione Completa

An interpretation-conflict (CWE-436) vulnerability in node-forge versions 1.3.1 and earlier enables unauthenticated attackers to craft ASN.1 structures to desynchronize schema validations, yielding a semantic divergence that may bypass downstream cryptographic verifications and security decisions.

Metriche CVSS v3.1

  • Impatto: Confid.: NONE, Integ.: HIGH, Disp.: NONE
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / NONE
  • Scope: CHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N
  • Score Sfruttabilità/Impatto: 3.9 / 4
CRITICAL (9.8)
CVE-2025-61168
An issue in the cms_rest.php component of SIGB PMB v8.0.1.14 allows attackers to execute arbitrary code via unserializing an arbitrary...
Vendor/s:

Descrizione Completa

An issue in the cms_rest.php component of SIGB PMB v8.0.1.14 allows attackers to execute arbitrary code via unserializing an arbitrary file.

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: HIGH
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / NONE
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Score Sfruttabilità/Impatto: 3.9 / 5.9
CRITICAL (9.8)
CVE-2025-64063
Primakon Pi Portal 1.0.18 API endpoints fail to enforce sufficient authorization checks when processing requests. Specifically, a standard user can...
Vendor/s:

Descrizione Completa

Primakon Pi Portal 1.0.18 API endpoints fail to enforce sufficient authorization checks when processing requests. Specifically, a standard user can exploit this flaw by sending direct HTTP requests to administrative endpoints, bypassing the UI restrictions. This allows the attacker to manipulate data outside their assigned scope, including: Unauthorized Account modification, modifying/deleting arbitrary user accounts and changing passwords by sending a direct request to the user management API endpoint; Confidential Data Access, accessing and downloading sensitive organizational documents via a direct request to the document retrieval API; Privilege escalation, This vulnerability can lead to complete compromise of data integrity and confidentiality, and Privilege Escalation by manipulating core system functions.

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: HIGH
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / NONE
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Score Sfruttabilità/Impatto: 3.9 / 5.9

Informazioni Aggiuntive

Pubblicato il: 25/11/2025 19:15:50
Ultima modifica: 26/11/2025 17:15:46

Fonti e Riferimenti

HIGH (8.8)
CVE-2025-64064
Primakon Pi Portal 1.0.18 /api/v2/pp_users endpoint fails to adequately check user permissions before processing a PATCH request to modify the...
Vendor/s:

Descrizione Completa

Primakon Pi Portal 1.0.18 /api/v2/pp_users endpoint fails to adequately check user permissions before processing a PATCH request to modify the PP_SECURITY_PROFILE_ID. Because of weak access controls any low level user can use this API and change their permission to Administrator by using PP_SECURITY_PROFILE_ID=2 inside body of request and escalate privileges.

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: HIGH
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / LOW
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Score Sfruttabilità/Impatto: 2.8 / 5.9

Informazioni Aggiuntive

Pubblicato il: 25/11/2025 19:15:50
Ultima modifica: 25/11/2025 22:16:16

Fonti e Riferimenti

HIGH (8.8)
CVE-2025-64065
The Primakon Pi Portal 1.0.18 API /api/V2/pp_udfv_admin endpoint, fails to perform necessary server-side validation. The administrative LoginAs or user impersonation...
Vendor/s:

Descrizione Completa

The Primakon Pi Portal 1.0.18 API /api/V2/pp_udfv_admin endpoint, fails to perform necessary server-side validation. The administrative LoginAs or user impersonation feature is vulnerable to a access control failure. This flaw allows any authenticated low-privileged user to execute a direct PATCH request, enabling them to impersonate any other arbitrary user, including application Administrators. This is due to a Broken Function Level Authorization failure (the function doesn't check the caller's privilege) compounded by an Insecure Design that permits a session switch without requiring the target user's password or an administrative token and only needs email of user.

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: HIGH
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / LOW
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Score Sfruttabilità/Impatto: 2.8 / 5.9

Informazioni Aggiuntive

Pubblicato il: 25/11/2025 19:15:50
Ultima modifica: 26/11/2025 15:15:54

Fonti e Riferimenti

HIGH (8.6)
CVE-2025-64066
Primakon Pi Portal 1.0.18 REST /api/v2/user/register endpoint suffers from a Broken Access Control vulnerability. The endpoint fails to implement any...
Vendor/s:

Descrizione Completa

Primakon Pi Portal 1.0.18 REST /api/v2/user/register endpoint suffers from a Broken Access Control vulnerability. The endpoint fails to implement any authorization checks, allowing unauthenticated attackers to perform POST requests to register new user accounts in the application's local database. This bypasses the intended security architecture, which relies on an external Identity Provider for initial user registration and assumes that internal user creation is an administrative-only function. This vector can also be chained with other vulnerabilities for privilege escalation and complete compromise of application. This specific request can be used to also enumerate already registered user accounts, aiding in social engineering or further targeted attacks.

Metriche CVSS v3.1

  • Impatto: Confid.: LOW, Integ.: HIGH, Disp.: LOW
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / NONE
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L
  • Score Sfruttabilità/Impatto: 3.9 / 4.7

Informazioni Aggiuntive

Pubblicato il: 25/11/2025 18:15:54
Ultima modifica: 25/11/2025 22:16:16

Fonti e Riferimenti

HIGH (8.8)
CVE-2025-64062
The Primakon Pi Portal 1.0.18 /api/V2/pp_users?email endpoint is used for user data filtering but lacks proper server-side validation against the...
Vendor/s:

Descrizione Completa

The Primakon Pi Portal 1.0.18 /api/V2/pp_users?email endpoint is used for user data filtering but lacks proper server-side validation against the authenticated session. By manipulating the email parameter to an arbitrary value (e.g., [email protected]), an attacker can assume the session and gain full access to the target user's data and privileges. Also, if the email parameter is left blank, the application defaults to the first user in the list, who is typically the application administrator, resulting in an immediate Privilege Escalation to the highest level.

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: HIGH
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / LOW
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Score Sfruttabilità/Impatto: 2.8 / 5.9

Informazioni Aggiuntive

Pubblicato il: 25/11/2025 18:15:53
Ultima modifica: 26/11/2025 15:15:54

Fonti e Riferimenti

CRITICAL (9.0)
CVE-2025-63729
An issue was discovered in Syrotech SY-GPON-1110-WDONT SYRO_3.7L_3.1.02-240517 allowing attackers to exctract the SSL Private Key, CA Certificate, SSL Certificate,...
Vendor/s:

Descrizione Completa

An issue was discovered in Syrotech SY-GPON-1110-WDONT SYRO_3.7L_3.1.02-240517 allowing attackers to exctract the SSL Private Key, CA Certificate, SSL Certificate, and Client Certificates in .pem format in firmware in etc folder.

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: NONE
  • Vettore Attacco: LOCAL
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / NONE
  • Scope: CHANGED
  • Vector String: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N
  • Score Sfruttabilità/Impatto: 2.5 / 5.8

Informazioni Aggiuntive

Pubblicato il: 25/11/2025 17:15:50
Ultima modifica: 25/11/2025 22:16:16

Fonti e Riferimenti

CRITICAL (9.6)
CVE-2025-60739
Cross Site Request Forgery (CSRF) vulnerability in Ilevia EVE X1 Server Firmware Version v4.7.18.0.eden and before, Logic Version v6.00 -...
Vendor/s:

Descrizione Completa

Cross Site Request Forgery (CSRF) vulnerability in Ilevia EVE X1 Server Firmware Version v4.7.18.0.eden and before, Logic Version v6.00 - 2025_07_21 allows a remote attacker to execute arbitrary code via the /bh_web_backend component

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: HIGH
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: REQUIRED / NONE
  • Scope: CHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
  • Score Sfruttabilità/Impatto: 2.8 / 6

Informazioni Aggiuntive

Pubblicato il: 25/11/2025 16:16:07
Ultima modifica: 25/11/2025 22:16:16

Fonti e Riferimenti

CRITICAL (9.8)
CVE-2025-62691
Security Point (Windows) of MaLion and MaLionCloud contains a stack-based buffer overflow vulnerability in processing HTTP headers. Receiving a specially...
Vendor/s:

Descrizione Completa

Security Point (Windows) of MaLion and MaLionCloud contains a stack-based buffer overflow vulnerability in processing HTTP headers. Receiving a specially crafted request from a remote unauthenticated attacker could lead to arbitrary code execution with SYSTEM privilege.

Metriche CVSS v3.0

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: HIGH
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / NONE
  • Scope: UNCHANGED
  • Vector String: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Score Sfruttabilità/Impatto: 3.9 / 5.9

Informazioni Aggiuntive

Pubblicato il: 25/11/2025 08:15:54
Ultima modifica: 25/11/2025 22:16:16

Fonti e Riferimenti

CRITICAL (9.8)
CVE-2025-64693
Security Point (Windows) of MaLion and MaLionCloud contains a heap-based buffer overflow vulnerability in processing Content-Length. Receiving a specially crafted...
Vendor/s:

Descrizione Completa

Security Point (Windows) of MaLion and MaLionCloud contains a heap-based buffer overflow vulnerability in processing Content-Length. Receiving a specially crafted request from a remote unauthenticated attacker could lead to arbitrary code execution with SYSTEM privilege.

Metriche CVSS v3.0

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: HIGH
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / NONE
  • Scope: UNCHANGED
  • Vector String: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Score Sfruttabilità/Impatto: 3.9 / 5.9

Informazioni Aggiuntive

Pubblicato il: 25/11/2025 08:15:54
Ultima modifica: 25/11/2025 22:16:16

Fonti e Riferimenti

HIGH (8.7)
CVE-2025-65951
Inside Track / Entropy Derby is a research-grade horse-racing betting engine. Prior to commit 2d38d2f, the VDF-based timelock encryption system...
Vendor/s:

Descrizione Completa

Inside Track / Entropy Derby is a research-grade horse-racing betting engine. Prior to commit 2d38d2f, the VDF-based timelock encryption system fails to enforce sequential delay against the betting operator. Bettors pre-compute the entire Wesolowski VDF and include vdfOutputHex in their encrypted bet ticket, allowing the house to decrypt immediately using fast proof verification instead of expensive VDF evaluation. This issue has been patched via commit 2d38d2f.

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: NONE
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / HIGH
  • Scope: CHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N
  • Score Sfruttabilità/Impatto: 2.3 / 5.8

Informazioni Aggiuntive

Pubblicato il: 25/11/2025 01:15:46
Ultima modifica: 25/11/2025 22:16:16

Fonti e Riferimenti

HIGH (8.5)
CVE-2025-62155
New API is a large language mode (LLM) gateway and artificial intelligence (AI) asset management system. Prior to version 0.9.6,...
Vendor/s:

Descrizione Completa

New API is a large language mode (LLM) gateway and artificial intelligence (AI) asset management system. Prior to version 0.9.6, a recently patched SSRF vulnerability contains a bypass method that can bypass the existing security fix and still allow SSRF to occur. Because the existing fix only applies security restrictions to the first URL request, a 302 redirect can bypass existing security measures and successfully access the intranet. This issue has been patched in version 0.9.6.

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: LOW, Disp.: NONE
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / LOW
  • Scope: CHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N
  • Score Sfruttabilità/Impatto: 3.1 / 4.7

Informazioni Aggiuntive

Pubblicato il: 25/11/2025 00:15:46
Ultima modifica: 25/11/2025 22:16:16

Fonti e Riferimenti

Google

CRITICAL (9.3)
CVE-2025-9803
lunary-ai/lunary version 1.9.34 is vulnerable to an account takeover due to improper authentication in the Google OAuth integration. The application...
Vendor/s: Google

Descrizione Completa

lunary-ai/lunary version 1.9.34 is vulnerable to an account takeover due to improper authentication in the Google OAuth integration. The application fails to verify the 'aud' (audience) field in the access token issued by Google, which is crucial for ensuring the token is intended for the application. This oversight allows attackers to use tokens issued to malicious applications to gain unauthorized access to user accounts. The issue is resolved in version 1.9.35.

Metriche CVSS v3.0

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: NONE
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: REQUIRED / NONE
  • Scope: CHANGED
  • Vector String: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N
  • Score Sfruttabilità/Impatto: 2.8 / 5.8

WordPress

CRITICAL (9.8)
CVE-2025-13597
The AI Feeds plugin for WordPress is vulnerable to arbitrary file uploads due to missing capability check in the 'actualizador_git.php'...
Vendor/s: WordPress, Github

Descrizione Completa

The AI Feeds plugin for WordPress is vulnerable to arbitrary file uploads due to missing capability check in the 'actualizador_git.php' file in all versions up to, and including, 1.0.11. This makes it possible for unauthenticated attackers to download arbitrary GitHub repositories and overwrite plugin files on the affected site's server which may make remote code execution possible.

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: HIGH
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / NONE
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Score Sfruttabilità/Impatto: 3.9 / 5.9
CRITICAL (9.8)
CVE-2025-13595
The CIBELES AI plugin for WordPress is vulnerable to arbitrary file uploads due to missing capability check in the 'actualizador_git.php'...
Vendor/s: WordPress, Github

Descrizione Completa

The CIBELES AI plugin for WordPress is vulnerable to arbitrary file uploads due to missing capability check in the 'actualizador_git.php' file in all versions up to, and including, 1.10.8. This makes it possible for unauthenticated attackers to download arbitrary GitHub repositories and overwrite plugin files on the affected site's server which may make remote code execution possible.

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: HIGH
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / NONE
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Score Sfruttabilità/Impatto: 3.9 / 5.9
CRITICAL (9.8)
CVE-2025-13559
The EduKart Pro plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 1.0.3. This...
Vendor/s: WordPress

Descrizione Completa

The EduKart Pro plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 1.0.3. This is due to the 'edukart_pro_register_user_front_end' function not restricting what user roles a user can register with. This makes it possible for unauthenticated attackers to supply the 'administrator' role during registration and gain administrator access to the site.

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: HIGH
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / NONE
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Score Sfruttabilità/Impatto: 3.9 / 5.9
CRITICAL (9.8)
CVE-2025-6389
The Sneeit Framework plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 8.3...
Vendor/s: WordPress

Descrizione Completa

The Sneeit Framework plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 8.3 via the sneeit_articles_pagination_callback() function. This is due to the function accepting user input and then passing that through call_user_func(). This makes it possible for unauthenticated attackers to execute code on the server which can be leveraged to inject backdoors or, for example, create new administrative user accounts.

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: HIGH
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / NONE
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Score Sfruttabilità/Impatto: 3.9 / 5.9

Nvidia

CRITICAL (9.3)
CVE-2025-33187
NVIDIA DGX Spark GB10 contains a vulnerability in SROOT, where an attacker could use privileged access to gain access to...
Vendor/s: Nvidia

Descrizione Completa

NVIDIA DGX Spark GB10 contains a vulnerability in SROOT, where an attacker could use privileged access to gain access to SoC protected areas. A successful exploit of this vulnerability might lead to code execution, information disclosure, data tampering, denial of service, or escalation of privileges.

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: HIGH
  • Vettore Attacco: LOCAL
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / NONE
  • Scope: CHANGED
  • Vector String: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
  • Score Sfruttabilità/Impatto: 2.5 / 6

Informazioni Aggiuntive

Pubblicato il: 25/11/2025 18:15:49
Ultima modifica: 28/11/2025 15:30:47

Fonti e Riferimenti

Ashlar

CRITICAL (9.8)
CVE-2025-65084
An Out-of-Bounds Write vulnerability is present in Ashlar-Vellum Cobalt, Xenon, Argon, Lithium, and Cobalt Share versions 12.6.1204.207 and prior that...
Vendor/s: Ashlar

Descrizione Completa

An Out-of-Bounds Write vulnerability is present in Ashlar-Vellum Cobalt, Xenon, Argon, Lithium, and Cobalt Share versions 12.6.1204.207 and prior that could allow an attacker to disclose information or execute arbitrary code.

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: HIGH
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / NONE
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Score Sfruttabilità/Impatto: 3.9 / 5.9

Informazioni Aggiuntive

Pubblicato il: 25/11/2025 18:15:54
Ultima modifica: 28/11/2025 16:24:28

Fonti e Riferimenti

CRITICAL (9.8)
CVE-2025-65085
A Heap-based Buffer Overflow vulnerability is present in Ashlar-Vellum Cobalt, Xenon, Argon, Lithium, and Cobalt Share versions 12.6.1204.207 and prior...
Vendor/s: Ashlar

Descrizione Completa

A Heap-based Buffer Overflow vulnerability is present in Ashlar-Vellum Cobalt, Xenon, Argon, Lithium, and Cobalt Share versions 12.6.1204.207 and prior that could allow an attacker to disclose information or execute arbitrary code.

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: HIGH
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / NONE
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Score Sfruttabilità/Impatto: 3.9 / 5.9

Informazioni Aggiuntive

Pubblicato il: 25/11/2025 18:15:54
Ultima modifica: 28/11/2025 16:24:43

Fonti e Riferimenti

Github

CRITICAL (9.8)
CVE-2025-13597
The AI Feeds plugin for WordPress is vulnerable to arbitrary file uploads due to missing capability check in the 'actualizador_git.php'...
Vendor/s: WordPress, Github

Descrizione Completa

The AI Feeds plugin for WordPress is vulnerable to arbitrary file uploads due to missing capability check in the 'actualizador_git.php' file in all versions up to, and including, 1.0.11. This makes it possible for unauthenticated attackers to download arbitrary GitHub repositories and overwrite plugin files on the affected site's server which may make remote code execution possible.

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: HIGH
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / NONE
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Score Sfruttabilità/Impatto: 3.9 / 5.9
CRITICAL (9.8)
CVE-2025-13595
The CIBELES AI plugin for WordPress is vulnerable to arbitrary file uploads due to missing capability check in the 'actualizador_git.php'...
Vendor/s: WordPress, Github

Descrizione Completa

The CIBELES AI plugin for WordPress is vulnerable to arbitrary file uploads due to missing capability check in the 'actualizador_git.php' file in all versions up to, and including, 1.10.8. This makes it possible for unauthenticated attackers to download arbitrary GitHub repositories and overwrite plugin files on the affected site's server which may make remote code execution possible.

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: HIGH
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / NONE
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Score Sfruttabilità/Impatto: 3.9 / 5.9