Total
5286 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2025-53230 | 2025-08-29 | N/A | 7.6 HIGH | ||
Missing Authorization vulnerability in honzat Page Manager for Elementor allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Page Manager for Elementor: from n/a through 2.0.5. | |||||
CVE-2025-58334 | 2025-08-29 | N/A | 8.1 HIGH | ||
In JetBrains IDE Services before 2025.5.0.1086, 2025.4.2.2164 users without appropriate permissions could assign high-privileged role for themselves | |||||
CVE-2025-54710 | 2025-08-29 | N/A | 7.1 HIGH | ||
Missing Authorization vulnerability in bPlugins Tiktok Feed allows Accessing Functionality Not Properly Constrained by ACLs. This issue affects Tiktok Feed: from n/a through 1.0.21. | |||||
CVE-2025-54733 | 2025-08-29 | N/A | 6.5 MEDIUM | ||
Missing Authorization vulnerability in Miles All Bootstrap Blocks allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects All Bootstrap Blocks: from n/a through 1.3.28. | |||||
CVE-2025-58201 | 2025-08-29 | N/A | 5.3 MEDIUM | ||
Missing Authorization vulnerability in AfterShip & Automizely AfterShip Tracking allows Accessing Functionality Not Properly Constrained by ACLs. This issue affects AfterShip Tracking: from n/a through 1.17.17. | |||||
CVE-2025-48350 | 2025-08-29 | N/A | 4.3 MEDIUM | ||
Missing Authorization vulnerability in Neuralabz LTD AutoWP allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects AutoWP: from n/a through 2.2.2. | |||||
CVE-2025-58193 | 2025-08-29 | N/A | 4.3 MEDIUM | ||
Missing Authorization vulnerability in Uncanny Owl Uncanny Automator allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Uncanny Automator: from n/a through 6.7.0.1. | |||||
CVE-2025-48327 | 2025-08-29 | N/A | 5.3 MEDIUM | ||
Missing Authorization vulnerability in inkthemes WP Mailgun SMTP allows Accessing Functionality Not Properly Constrained by ACLs. This issue affects WP Mailgun SMTP: from n/a through 1.0.7. | |||||
CVE-2025-58192 | 2025-08-29 | N/A | 4.3 MEDIUM | ||
Missing Authorization vulnerability in Xylus Themes WP Bulk Delete allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects WP Bulk Delete: from n/a through 1.3.6. | |||||
CVE-2025-58198 | 2025-08-29 | N/A | 6.5 MEDIUM | ||
Missing Authorization vulnerability in Xpro Xpro Theme Builder allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Xpro Theme Builder: from n/a through 1.2.9. | |||||
CVE-2025-0951 | 2025-08-29 | N/A | 4.3 MEDIUM | ||
Multiple plugins and/or themes for WordPress by LiquidThemes are vulnerable to unauthorized access due to a missing capability check on the liquid_reset_wordpress_before AJAX in various versions. This makes it possible for authenticated attackers, with Subscriber-level access and above, to deactivate all of a site's plugins. While we escalated this to Envato after not being able to establish contact, it appears the developer added a nonce check, however that is not sufficient protection as the nonce is exposed to all users with access to the dashboard. | |||||
CVE-2025-7956 | 2025-08-29 | N/A | 5.3 MEDIUM | ||
The Ajax Search Lite plugin for WordPress is vulnerable to Basic Information Exposure due to missing authorization in its AJAX search handler in all versions up to, and including, 4.13.1. This makes it possible for unauthenticated attackers to issue repeated AJAX requests to leak the content of any protected post in rolling 100‑character windows. | |||||
CVE-2025-1891 | 1 Qzw1210 | 1 Shishuocms | 2025-08-28 | 5.0 MEDIUM | 4.3 MEDIUM |
A vulnerability was found in shishuocms 1.1 and classified as problematic. This issue affects some unknown processing. The manipulation leads to cross-site request forgery. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. | |||||
CVE-2025-8992 | 1 Mtons | 1 Mblog | 2025-08-27 | 5.0 MEDIUM | 4.3 MEDIUM |
A vulnerability has been found in mtons mblog up to 3.5.0. Affected by this issue is some unknown functionality. The manipulation leads to cross-site request forgery. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. | |||||
CVE-2024-10824 | 1 Github | 1 Enterprise Server | 2025-08-27 | N/A | 6.5 MEDIUM |
An authorization bypass vulnerability was identified in GitHub Enterprise Server that allowed unauthorized internal users to access sensitive secret scanning alert data intended only for business owners. This issue could be exploited only by organization members with a personal access token (PAT) and required that secret scanning be enabled on user-owned repositories. This vulnerability affected GitHub Enterprise Server versions after 3.13.0 but prior to 3.14.0 and was fixed in version 3.13.2. | |||||
CVE-2025-5692 | 1 Smackcoders | 1 Lead Form Data Collection To Crm | 2025-08-27 | N/A | 6.3 MEDIUM |
The Lead Form Data Collection to CRM plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on several functions in the ~/includes/LB_admin_ajax.php file in all versions up to, and including, 3.1. This makes it possible for authenticated attackers, with Subscriber-level access and above, to perform several actions like updating settings. Initially this CVE was assigned specifically to all AJAX actions and the doFieldAjaxAction() function, however it was determined that CVE-2025-47690 is assigned to the doFieldAjaxAction() function that leads to arbitrary options updates. | |||||
CVE-2024-43090 | 1 Google | 1 Android | 2025-08-26 | N/A | 5.0 MEDIUM |
In multiple locations, there is a possible cross-user image read due to a missing permission check. This could lead to local information disclosure with User execution privileges needed. User interaction is needed for exploitation. | |||||
CVE-2025-7717 | 1 File Download Project | 1 File Download | 2025-08-26 | N/A | 7.5 HIGH |
Missing Authorization vulnerability in Drupal File Download allows Forceful Browsing.This issue affects File Download: from 0.0.0 before 1.9.0, from 2.0.0 before 2.0.1. | |||||
CVE-2025-2506 | 2025-08-26 | N/A | 5.3 MEDIUM | ||
When pglogical attempts to replicate data, it does not verify it is using a replication connection, which means a user with CONNECT access to a database configured for replication can execute the pglogical command to obtain read access to replicated tables. When pglogical runs it should verify it is running on a replication connection but does not perform this check. This vulnerability was introduced in the pglogical 3.x codebase, which is proprietary to EDB. The same code base has been integrated into BDR/PGD 4 and 5. To exploit the vulnerability the attacker needs at least CONNECT permissions to a database configured for replication and must understand a number of pglogical3/BDR specific commands and be able to decode the binary protocol. | |||||
CVE-2025-45854 | 1 Jehc | 1 Jehc-bpm | 2025-08-26 | N/A | 10.0 CRITICAL |
/server/executeExec of JEHC-BPM 2.0.1 allows attackers to execute arbitrary code via execParams. |