CVE Feeds
CVE News Feed
Updates on the latest vulnerabilities detected.
-
CVE-2025-13526 - OneClick Chat to Order ce to Unauthenticated Sensitive Information Exposure
CVE ID :CVE-2025-13526
Published : Nov. 22, 2025, 11:15 a.m. | 1 hour, 55 minutes ago
Description :The OneClick Chat to Order plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 1.0.8 via the 'wa_order_thank_you_override' function due to missing validation on a user controlled key. This makes it possible for unauthenticated attackers to view sensitive customer information including names, email addresses, phone numbers, billing/shipping addresses, order contents, and payment methods by simply changing the order ID in the URL.
Severity: 7.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2025-13318 - Booking Calendar Contact Form ated Arbitrary Booking Confirmation via 'dex_bccf_ipn' Parameter
CVE ID :CVE-2025-13318
Published : Nov. 22, 2025, 9:15 a.m. | 3 hours, 55 minutes ago
Description :The Booking Calendar Contact Form plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 1.2.60. This is due to missing authorization checks and payment verification in the `dex_bccf_check_IPN_verification` function. This makes it possible for unauthenticated attackers to arbitrarily confirm bookings and bypass payment requirements via the 'dex_bccf_ipn' parameter.
Severity: 5.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2025-13136 - GSheetConnector For Ninja Forms (Subscriber+) System Information Exposure
CVE ID :CVE-2025-13136
Published : Nov. 22, 2025, 9:15 a.m. | 3 hours, 55 minutes ago
Description :The GSheetConnector For Ninja Forms plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'njform-google-sheet-config ' page in all versions up to, and including, 2.0.1. This makes it possible for authenticated attackers, with Subscriber-level access and above, to retrieve information about the system.
Severity: 4.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2025-13384 - CP Contact Form with PayPal icated Arbitrary Payment Confirmation
CVE ID :CVE-2025-13384
Published : Nov. 22, 2025, 8:15 a.m. | 4 hours, 55 minutes ago
Description :The CP Contact Form with PayPal plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 1.3.56. This is due to the plugin exposing an unauthenticated IPN-like endpoint (via the 'cp_contactformpp_ipncheck' query parameter) that processes payment confirmations without any authentication, nonce verification, or PayPal IPN signature validation. This makes it possible for unauthenticated attackers to mark form submissions as paid without making actual payments by sending forged payment notification requests with arbitrary POST data (payment_status, txn_id, payer_email).
Severity: 7.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2025-13317 - Appointment Booking Calendar Booking Confirmation via 'cpabc_ipncheck' Parameter
CVE ID :CVE-2025-13317
Published : Nov. 22, 2025, 8:15 a.m. | 4 hours, 55 minutes ago
Description :The Appointment Booking Calendar plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 1.3.96. This is due to the plugin exposing an unauthenticated booking processing endpoint (cpabc_appointments_check_IPN_verification) that trusts attacker-supplied payment notifications without verifying their origin, authenticity, or requiring proper authorization checks. This makes it possible for unauthenticated attackers to arbitrarily confirm bookings and insert them into the live calendar via the 'cpabc_ipncheck' parameter, triggering administrative and customer notification emails and disrupting operations.
Severity: 5.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2025-12877 - IDonate – Blood Donation, Request And Donor Management System
CVE ID :CVE-2025-12877
Published : Nov. 22, 2025, 8:15 a.m. | 4 hours, 55 minutes ago
Description :The IDonate – Blood Donation, Request And Donor Management System plugin for WordPress is vulnerable to unauthorized modification od data due to a missing capability check on the panding_blood_request_action() function in all versions up to, and including, 2.1.15. This makes it possible for unauthenticated attackers to delete arbitrary posts.
Severity: 5.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2025-12752 - Subscriptions & Memberships for PayPal
CVE ID :CVE-2025-12752
Published : Nov. 22, 2025, 8:15 a.m. | 4 hours, 55 minutes ago
Description :The Subscriptions & Memberships for PayPal plugin for WordPress is vulnerable to fake payment creation in all versions up to, and including, 1.1.7. This is due to the plugin not properly verifying the authenticity of an IPN request. This makes it possible for unauthenticated attackers to create fake payment entries that have not actually occurred.
Severity: 5.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2025-11186 - Cookie Notice & Compliance for GDPR / CCPA ipting via Shortcode
CVE ID :CVE-2025-11186
Published : Nov. 22, 2025, 5:15 a.m. | 7 hours, 54 minutes ago
Description :The Cookie Notice & Compliance for GDPR / CCPA plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's cookies_accepted shortcode in all versions up to, and including, 2.5.8 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Severity: 6.4 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2025-12889 - TLS 1.2 Client Can Downgrade Digest Used
CVE ID :CVE-2025-12889
Published : Nov. 22, 2025, 12:15 a.m. | 12 hours, 55 minutes ago
Description :With TLS 1.2 connections a client can use any digest, specifically a weaker digest that is supported, rather than those in the CertificateRequest.
Severity: 2.3 | LOW
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2025-65947 - thread-amount is Vulnerable to Resource Exhaustion (Memory and Handle Leaks) on Windows and macOS
CVE ID :CVE-2025-65947
Published : Nov. 21, 2025, 11:15 p.m. | 13 hours, 55 minutes ago
Description :thread-amount is a tool that gets the amount of threads in the current process. Prior to version 0.2.2, there are resource leaks when querying thread counts on Windows and Apple platforms. In Windows platforms, the thread_amount function calls CreateToolhelp32Snapshot but fails to close the returned HANDLE using CloseHandle. Repeated calls to this function will cause the handle count of the process to grow indefinitely, eventually leading to system instability or process termination when the handle limit is reached. In Apple platforms, the thread_amount function calls task_threads (via Mach kernel APIs) which allocates memory for the thread list. The function fails to deallocate this memory using vm_deallocate. Repeated calls will result in a steady memory leak, eventually causing the process to be killed by the OOM (Out of Memory) killer. This issue has been patched in version 0.2.2.
Severity: 8.7 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2025-65946 - Roo Code is Vulnerable to Potential Remote Code Execution via zsh Command Validation Bug
CVE ID :CVE-2025-65946
Published : Nov. 21, 2025, 11:15 p.m. | 13 hours, 55 minutes ago
Description :Roo Code is an AI-powered autonomous coding agent that lives in users' editors. Prior to version 3.26.7, Due to an error in validation it was possible for Roo to automatically execute commands that did not match the allow list prefixes. This issue has been patched in version 3.26.7.
Severity: 8.1 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2025-12888 - Constant Time Issue with Xtensa-based ESP32 and X22519
CVE ID :CVE-2025-12888
Published : Nov. 21, 2025, 11:15 p.m. | 13 hours, 55 minutes ago
Description :Vulnerability in X25519 constant-time cryptographic implementations due to timing side channels introduced by compiler optimizations and CPU architecture limitations, specifically with the Xtensa-based ESP32 chips. If targeting Xtensa it is recommended to use the low memory implementations of X25519, which is now turned on as the default for Xtensa.
Severity: 1.0 | LOW
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2025-12678 - CVE-2022-1234: Apache HTTP Server Remote Code Execution Vulnerability
CVE ID :CVE-2025-12678
Published : Nov. 21, 2025, 11:15 p.m. | 13 hours, 55 minutes ago
Description :Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2025-11936 - Potential DoS Vulnerability through Multiple KeyShareEntry with Same Group in TLS 1.3 ClientHello
CVE ID :CVE-2025-11936
Published : Nov. 21, 2025, 11:15 p.m. | 13 hours, 55 minutes ago
Description :Improper input validation in the TLS 1.3 KeyShareEntry parsing in wolfSSL v5.8.2 on multiple platforms allows a remote unauthenticated attacker to cause a denial-of-service by sending a crafted ClientHello message containing duplicate KeyShareEntry values for the same supported group, leading to excessive CPU and memory consumption during ClientHello processing.
Severity: 6.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2025-11934 - Improper Validation of Signature Algorithm Used in TLS 1.3 CertificateVerify
CVE ID :CVE-2025-11934
Published : Nov. 21, 2025, 11:15 p.m. | 13 hours, 55 minutes ago
Description :Improper input validation in the TLS 1.3 CertificateVerify signature algorithm negotiation in wolfSSL 5.8.2 and earlier on multiple platforms allows for downgrading the signature algorithm used. For example when a client sends ECDSA P521 as the supported signature algorithm the server previously could respond as ECDSA P256 being the accepted signature algorithm and the connection would continue with using ECDSA P256, if the client supports ECDSA P256.
Severity: 2.1 | LOW
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2025-11933 - DoS Vulnerability in wolfSSL TLS 1.3 CKS Extension
CVE ID :CVE-2025-11933
Published : Nov. 21, 2025, 11:15 p.m. | 13 hours, 55 minutes ago
Description :Improper Input Validation in the TLS 1.3 CKS extension parsing in wolfSSL 5.8.2 and earlier on multiple platforms allows a remote unauthenticated attacker to potentially cause a denial-of-service via a crafted ClientHello message with duplicate CKS extensions.
Severity: 2.3 | LOW
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2025-11932 - Timing Side-Channel in PSK Binder Verification
CVE ID :CVE-2025-11932
Published : Nov. 21, 2025, 11:15 p.m. | 13 hours, 55 minutes ago
Description :The server previously verified the TLS 1.3 PSK binder using a non-constant time method which could potentially leak information about the PSK binder
Severity: 2.3 | LOW
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2025-11931 - Integer Underflow Leads to Out-of-Bounds Access in XChaCha20-Poly1305 Decrypt
CVE ID :CVE-2025-11931
Published : Nov. 21, 2025, 11:15 p.m. | 13 hours, 55 minutes ago
Description :Integer Underflow Leads to Out-of-Bounds Access in XChaCha20-Poly1305 Decrypt. This issue is hit specifically with a call to the function wc_XChaCha20Poly1305_Decrypt() which is not used with TLS connections, only from direct calls from an application.
Severity: 2.1 | LOW
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2025-65111 - SpiceDB's LookupResources with Multiple Entrypoints across Different Definitions Can Return Incomplete Results
CVE ID :CVE-2025-65111
Published : Nov. 21, 2025, 10:16 p.m. | 14 hours, 54 minutes ago
Description :SpiceDB is an open source database system for creating and managing security-critical application permissions. Prior to version 1.47.1, if a schema includes the following characteristics: permission defined in terms of a union (+) and that union references the same relation on both sides (but one side arrows to a different permission). Then SpiceDB may have missing LookupResources results when checking the permission. This only affects LookupResources; other APIs calculate permissionship correctly. The issue is fixed in version 1.47.1.
Severity: 2.9 | LOW
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2025-65109 - Minder does not sandbox http.send in Rego programs
CVE ID :CVE-2025-65109
Published : Nov. 21, 2025, 10:16 p.m. | 14 hours, 54 minutes ago
Description :Minder is an open source software supply chain security platform. In Minder Helm version 0.20241106.3386+ref.2507dbf and Minder Go versions from 0.0.72 to 0.0.83, Minder users may fetch content in the context of the Minder server, which may include URLs which the user would not normally have access to. This issue has been patched in Minder Helm version 0.20250203.3849+ref.fdc94f0 and Minder Go version 0.0.84.
Severity: 8.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
Information
Vortech Consulting is a network security and design consulting firm originally founded in 1997. Over our nearly 30 year history we have provided security services and products for a wide variety of companies around the globe.
Company
Who's Online
We have 244 guests and no members online