Loading HuntDB...

Recent Vulnerabilities with Exploits

Exploitable

Recently discovered vulnerabilities with known exploit templates, ordered by discovery date.

CVE-2025-34141 1 month, 2 weeks ago

A reflected cross-site scripting (XSS) vulnerability exists in ETQ Reliance CG (legacy) platform within the `SQLConverterServlet` component. This vulnerability requires user interaction, such as clicking a crafted link, and may result in execution of unauthorized scripts in the user's context. The affected servlet was unnecessarily exposed to authenticated users and has since been disabled in version SE.2025.1.

UNKNOWN (0.0) 1 exploit
ETQ Reliance - Reflected XSS …
CVE-2025-53770 1 month, 3 weeks ago

No description available

CRITICAL (9.8) 1 exploit
Microsoft SharePoint Server -…
CVE-2025-34300 1 month, 3 weeks ago

A template injection vulnerability exists in Sawtooth Software’s Lighthouse Studio versions prior to 9.16.14 via the  ciwweb.pl http://ciwweb.pl/  Perl web application. Exploitation allows an unauthenticated attacker can execute arbitrary commands.

UNKNOWN (0.0) 1 exploit
SawtoothSoftware Lighthouse S…
CVE-2025-6058 1 month, 4 weeks ago

The WPBookit plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the image_upload_handle() function hooked via the 'add_booking_type' route in all versions up to, and including, 1.0.4. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.

CRITICAL (9.8) 1 exploit
WPBookit <= 1.0.4 - Unauthent…
CVE-2025-6851 1 month, 4 weeks ago

The Broken Link Notifier plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 1.3.0 via the ajax_blinks() function which ultimately calls the check_url_status_code() function. This makes it possible for unauthenticated attackers to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.

HIGH (7.2) 1 exploit
WordPress Broken Link Notifie…
CVE-2025-6970 2 months ago

The Events Manager – Calendar, Bookings, Tickets, and more! plugin for WordPress is vulnerable to time-based SQL Injection via the ‘orderby’ parameter in all versions up to, and including, 7.0.3 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

HIGH (7.5) 1 exploit
WordPress Events Manager <= 7…
CVE-2025-53624 2 months ago

The Docusaurus gists plugin adds a page to your Docusaurus instance, displaying all public gists of a GitHub user. docusaurus-plugin-content-gists versions prior to 4.0.0 are vulnerable to exposing GitHub Personal Access Tokens in production build artifacts when passed through plugin configuration options. The token, intended for build-time API access only, is inadvertently included in client-side JavaScript bundles, making it accessible to anyone who can view the website's source code. This vulnerability is fixed in 4.0.0.

CRITICAL (10.0) 1 exploit
Docusaurus Gists Plugin < 4.0…
CVE-2025-34085 2 months ago

No description available

UNKNOWN (0.0) 1 exploit
WordPress Simple File List <=…
CVE-2025-34077 2 months ago

An authentication bypass vulnerability exists in the WordPress Pie Register plugin ≤ 3.7.1.4 that allows unauthenticated attackers to impersonate arbitrary users by submitting a crafted POST request to the login endpoint. By setting social_site=true and manipulating the user_id_social_site parameter, an attacker can generate a valid WordPress session cookie for any user ID, including administrators. Once authenticated, the attacker may exploit plugin upload functionality to install a malicious plugin containing arbitrary PHP code, resulting in remote code execution on the underlying server.

UNKNOWN (0.0) 1 exploit
WordPress Pie Register <= 3.7…
CVE-2025-4380 2 months ago

The Ads Pro Plugin - Multi-Purpose WordPress Advertising Manager plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 4.89 via the 'bsa_template' parameter of the `bsa_preview_callback` function. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases .php files can can be uploaded and included, or already exist on the site.

HIGH (8.1) 1 exploit
Ads Pro Plugin <= 4.89 - Loca…
CVE-2025-41646 2 months ago

An unauthorized remote attacker can bypass the authentication of the affected software package by misusing an incorrect type conversion. This leads to full compromise of the device

CRITICAL (9.8) 1 exploit
RevPi Webstatus <= v2.4.5 - A…
CVE-2024-51978 2 months, 1 week ago

An unauthenticated attacker who knows the target device's serial number, can generate the default administrator password for the device. An unauthenticated attacker can first discover the target device's serial number via CVE-2024-51977 over HTTP/HTTPS/IPP, or via a PJL request, or via an SNMP request.

CRITICAL (9.8) 1 exploit
Brother Printers – Authentica…
CVE-2025-34040 2 months, 1 week ago

An arbitrary file upload vulnerability exists in the Zhiyuan OA platform 5.0, 5.1 - 5.6sp1, 6.0 - 6.1sp2, 7.0, 7.0sp1 - 7.1, 7.1sp1, and 8.0 - 8.0sp2 via the wpsAssistServlet interface. The realFileType and fileId parameters are improperly validated during multipart file uploads, allowing unauthenticated attackers to upload crafted JSP files outside of intended directories using path traversal. Successful exploitation enables remote code execution as the uploaded file can be accessed and executed through the web server.

UNKNOWN (0.0) 1 exploit
Zhiyuan OA Platform - Arbitra…
CVE-2025-34031 2 months, 1 week ago

A path traversal vulnerability exists in the Moodle LMS Jmol plugin version 6.1 and prior via the query parameter in jsmol.php. The script directly passes user input to the file_get_contents() function without proper validation, allowing attackers to read arbitrary files from the server's filesystem by crafting a malicious query value. This vulnerability can be exploited without authentication and may expose sensitive configuration data, including database credentials.

UNKNOWN (0.0) 1 exploit
Moodle Jmol Filter 6.1 - Loca…
CVE-2025-34035 2 months, 1 week ago

An OS command injection vulnerability exists in EnGenius EnShare Cloud Service version 1.4.11 and earlier. The usbinteract.cgi script fails to properly sanitize user input passed to the path parameter, allowing unauthenticated remote attackers to inject arbitrary shell commands. The injected commands are executed with root privileges, leading to full system compromise.

UNKNOWN (0.0) 1 exploit
EnGenius EnShare IoT Gigabit …
CVE-2025-34032 2 months, 1 week ago

A reflected cross-site scripting (XSS) vulnerability exists in the Moodle LMS Jmol plugin version 6.1 and prior via the data parameter in jsmol.php. The application fails to properly sanitize user input before embedding it into the HTTP response, allowing an attacker to execute arbitrary JavaScript in the victim's browser by crafting a malicious link. This can be used to hijack user sessions or manipulate page content.

UNKNOWN (0.0) 1 exploit
Moodle LMS Jmol Plugin <= 6.1…
CVE-2025-49029 2 months, 1 week ago

Improper Control of Generation of Code ('Code Injection') vulnerability in bitto.Kazi Custom Login And Signup Widget allows Code Injection.This issue affects Custom Login And Signup Widget: from n/a through 1.0.

CRITICAL (9.1) 1 exploit
WordPress Custom Login And Si…
CVE-2025-49493 2 months, 1 week ago

Akamai CloudTest before 60 2025.06.02 (12988) allows file inclusion via XML External Entity (XXE) injection.

MEDIUM (5.8) 1 exploit
Akamai CloudTest < 60 2025.06…
CVE-2025-4334 2 months, 2 weeks ago

The Simple User Registration plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 6.3. This is due to insufficient restrictions on user meta values that can be supplied during registration. This makes it possible for unauthenticated attackers to register as an administrator.

CRITICAL (9.8) 1 exploit
Simple User Registration <= 6…
CVE-2025-1562 2 months, 3 weeks ago

The Recover WooCommerce Cart Abandonment, Newsletter, Email Marketing, Marketing Automation By FunnelKit plugin for WordPress is vulnerable to unauthorized arbitrary plugin installation due to a missing capability check on the install_or_activate_addon_plugins() function and a weak nonce hash in all versions up to, and including, 3.5.3. This makes it possible for unauthenticated attackers to install arbitrary plugins on the site that can be leveraged to further infect a vulnerable site.

CRITICAL (9.8) EPSS: 0.1% 1 exploit
Recover WooCommerce Cart Aban…