CVE Feeds
Latest CVEs
Updates on the latest vulnerabilities detected.
-
CVE-2025-15005 - CouchCMS reCAPTCHA config.example.php hard-coded key
CVE ID :CVE-2025-15005
Published : Dec. 22, 2025, 12:32 a.m. | 48 minutes ago
Description :A security flaw has been discovered in CouchCMS up to 2.4. Affected is an unknown function of the file couch/config.example.php of the component reCAPTCHA Handler. The manipulation of the argument K_RECAPTCHA_SITE_KEY/K_RECAPTCHA_SECRET_KEY results in use of hard-coded cryptographic key . It is possible to launch the attack remotely. This attack is characterized by high complexity. The exploitability is told to be difficult. The exploit has been released to the public and may be exploited.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2025-15003 - SeaCMS admin_video.php sql injection
CVE ID :CVE-2025-15003
Published : Dec. 22, 2025, 12:15 a.m. | 1 hour, 5 minutes ago
Description :A vulnerability was found in SeaCMS up to 13.3. The impacted element is an unknown function of the file admin_video.php. Performing manipulation of the argument e_id results in sql injection. The attack is possible to be carried out remotely. The exploit has been made public and could be used.
Severity: 5.8 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2025-15004 - DedeCMS freelist_main.php sql injection
CVE ID :CVE-2025-15004
Published : Dec. 22, 2025, 12:02 a.m. | 1 hour, 18 minutes ago
Description :A vulnerability was identified in DedeCMS up to 5.7.118. This impacts an unknown function of the file /freelist_main.php. The manipulation of the argument orderby leads to sql injection. It is possible to initiate the attack remotely. The exploit is publicly available and might be used.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2025-15002 - SeaCMS mysqli.class.php sql injection
CVE ID :CVE-2025-15002
Published : Dec. 21, 2025, 11:15 p.m. | 2 hours, 5 minutes ago
Description :A vulnerability has been found in SeaCMS up to 13.3. The affected element is an unknown function of the file js/player/dmplayer/dmku/class/mysqli.class.php. Such manipulation of the argument page/limit leads to sql injection. The attack can be executed remotely. The exploit has been disclosed to the public and may be used.
Severity: 7.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2025-62926 - WordPress TempTool plugin ability
CVE ID :CVE-2025-62926
Published : Dec. 21, 2025, 10:15 p.m. | 3 hours, 5 minutes ago
Description :Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in HappyDevs TempTool allows Stored XSS.This issue affects TempTool: from n/a through 1.3.1.
Severity: 6.5 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2025-62901 - WordPress WP Microdata plugin y
CVE ID :CVE-2025-62901
Published : Dec. 21, 2025, 10:15 p.m. | 3 hours, 5 minutes ago
Description :Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Tormorten WP Microdata allows Stored XSS.This issue affects WP Microdata: from n/a through 1.0.
Severity: 6.5 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2025-62955 - WordPress TempTool plugin lity
CVE ID :CVE-2025-62955
Published : Dec. 21, 2025, 9:15 p.m. | 4 hours, 5 minutes ago
Description :Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in HappyDevs TempTool allows Retrieve Embedded Sensitive Data.This issue affects TempTool: from n/a through 1.3.1.
Severity: 4.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2025-14995 - Tenda FH1201 SetIpBind sprintf stack-based overflow
CVE ID :CVE-2025-14995
Published : Dec. 21, 2025, 9:15 a.m. | 16 hours, 5 minutes ago
Description :A vulnerability has been found in Tenda FH1201 1.2.0.14(408). Affected is the function sprintf of the file /goform/SetIpBind. Such manipulation of the argument page leads to stack-based buffer overflow. The attack may be performed from remote. The exploit has been disclosed to the public and may be used.
Severity: 9.0 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2025-14994 - Tenda FH1201/FH1206 HTTP Request webtypelibrary strcat stack-based overflow
CVE ID :CVE-2025-14994
Published : Dec. 21, 2025, 8:15 a.m. | 17 hours, 5 minutes ago
Description :A flaw has been found in Tenda FH1201 and FH1206 1.2.0.14(408)/1.2.0.8(8155). This impacts the function strcat of the file /goform/webtypelibrary of the component HTTP Request Handler. This manipulation of the argument webSiteId causes stack-based buffer overflow. The attack is possible to be carried out remotely. The exploit has been published and may be used.
Severity: 9.0 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2025-14855 - SureForms tored Cross-Site Scripting
CVE ID :CVE-2025-14855
Published : Dec. 21, 2025, 8:15 a.m. | 17 hours, 5 minutes ago
Description :The SureForms plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the form field parameters in all versions up to, and including, 2.2.0 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Severity: 7.2 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2025-14800 - Redirection for Contact Form 7 a move_file_to_upload
CVE ID :CVE-2025-14800
Published : Dec. 21, 2025, 8:15 a.m. | 17 hours, 5 minutes ago
Description :The Redirection for Contact Form 7 plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'move_file_to_upload' function in all versions up to, and including, 3.2.7. This makes it possible for unauthenticated attackers to copy arbitrary files on the affected site's server. If 'allow_url_fopen' is set to 'On', it is possible to upload a remote file to the server.
Severity: 8.1 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2025-14993 - Tenda AC18 HTTP Request SetDlnaCfg sprintf stack-based overflow
CVE ID :CVE-2025-14993
Published : Dec. 21, 2025, 5:16 a.m. | 20 hours, 4 minutes ago
Description :A vulnerability was detected in Tenda AC18 15.03.05.05. This affects the function sprintf of the file /goform/SetDlnaCfg of the component HTTP Request Handler. The manipulation of the argument scanList results in stack-based buffer overflow. The attack can be executed remotely. The exploit is now public and may be used.
Severity: 9.0 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2025-9343 - ELEX WordPress HelpDesk & Customer Ticketing System
CVE ID :CVE-2025-9343
Published : Dec. 21, 2025, 4:16 a.m. | 21 hours, 4 minutes ago
Description :The ELEX WordPress HelpDesk & Customer Ticketing System plugin for WordPress is vulnerable to Stored Cross-Site Scripting via ticket subjects in all versions up to, and including, 3.3.4 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Severity: 7.2 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2025-68644 - Yealink Information Disclosure
CVE ID :CVE-2025-68644
Published : Dec. 21, 2025, 4:16 a.m. | 21 hours, 4 minutes ago
Description :Yealink RPS before 2025-06-27 allows unauthorized access to information, including AutoP URL addresses. This was fixed by deploying an enhanced authentication mechanism through a security update to all cloud instances.
Severity: 7.4 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2025-14992 - Tenda AC18 HTTP Request GetParentControlInfo strcpy stack-based overflow
CVE ID :CVE-2025-14992
Published : Dec. 21, 2025, 4:16 a.m. | 21 hours, 4 minutes ago
Description :A security vulnerability has been detected in Tenda AC18 15.03.05.05. The impacted element is the function strcpy of the file /goform/GetParentControlInfo of the component HTTP Request Handler. The manipulation of the argument mac leads to stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been disclosed publicly and may be used.
Severity: 9.0 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2025-14991 - Campcodes Complete Online Beauty Parlor Management System bwdates-reports-details.php cross site scripting
CVE ID :CVE-2025-14991
Published : Dec. 21, 2025, 4:16 a.m. | 21 hours, 4 minutes ago
Description :A weakness has been identified in Campcodes Complete Online Beauty Parlor Management System 1.0. The affected element is an unknown function of the file /admin/bwdates-reports-details.php. Executing manipulation of the argument fromdate can lead to cross site scripting. The attack may be launched remotely. The exploit has been made available to the public and could be exploited.
Severity: 4.8 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2025-14990 - Campcodes Complete Online Beauty Parlor Management System view-appointment.php sql injection
CVE ID :CVE-2025-14990
Published : Dec. 21, 2025, 4:16 a.m. | 21 hours, 4 minutes ago
Description :A security flaw has been discovered in Campcodes Complete Online Beauty Parlor Management System 1.0. Impacted is an unknown function of the file /admin/view-appointment.php. Performing manipulation of the argument viewid results in sql injection. The attack may be initiated remotely. The exploit has been released to the public and may be exploited.
Severity: 7.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2025-13693 - Image Photo Gallery Final Tiles Grid ripting via 'Custom Scripts' Setting
CVE ID :CVE-2025-13693
Published : Dec. 21, 2025, 4:16 a.m. | 21 hours, 4 minutes ago
Description :The Image Photo Gallery Final Tiles Grid plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'Custom scripts' setting in all versions up to, and including, 3.6.8 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Severity: 6.4 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2025-13361 - Web to SugarCRM Lead o Custom Field Deletion
CVE ID :CVE-2025-13361
Published : Dec. 21, 2025, 4:16 a.m. | 21 hours, 4 minutes ago
Description :The Web to SugarCRM Lead plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0.0. This is due to missing nonce validation on the custom field deletion functionality. This makes it possible for unauthenticated attackers to delete custom fields via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Severity: 4.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2025-13220 - Ultimate Member utor+) Stored Cross-Site Scripting via Shortcode Attributes
CVE ID :CVE-2025-13220
Published : Dec. 21, 2025, 4:16 a.m. | 21 hours, 4 minutes ago
Description :The Ultimate Member – User Profile, Registration, Login, Member Directory, Content Restriction & Membership Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's shortcode attributes in all versions up to, and including, 2.11.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Severity: 6.4 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
Information
Vortech Consulting is a network security and design consulting firm originally founded in 1997. Over our nearly 30 year history we have provided security services and products for a wide variety of companies around the globe.
Company
Who's Online
We have 349 guests and no members online