CVE Monitor
3.44K subscribers
33.1K links
Download Telegram
{
"Source": "CVE FEED",
"Title": "CVE-2025-67728 - Fireshare Public Uploads feature is vulnerable to OS Command Injection (RCE)",
"Content": "CVE ID : CVE-2025-67728
Published : Dec. 12, 2025, 7:15 a.m. | 32 minutes ago
Description : Fireshare facilitates self-hosted media and link sharing. Versions 1.2.30 and below allow an authenticated user, or unauthenticated user if the Public Uploads setting is enabled, to craft a malicious filename when uploading a video file. The malicious filename is then concatenated directly into a shell command, which can be used for uploading files to arbitrary directories via path traversal, or executing system commands for Remote Code Execution (RCE). This issue is fixed in version 1.3.0.
Severity: 9.8 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "12 Dec 2025",
"Type": "Vulnerability"
}
šŸ”¹ t.me/cvedetector šŸ”¹
{
"Source": "CVE FEED",
"Title": "CVE-2025-67737 - AzuraCast Vulnerable to Pre-Auth File Deletion & Admin RCE",
"Content": "CVE ID : CVE-2025-67737
Published : Dec. 12, 2025, 7:15 a.m. | 32 minutes ago
Description : AzuraCast is a self-hosted, all-in-one web radio management suite. Versions 0.23.1 mistakenly include an API endpoint that is intended for internal use by the SFTP software sftpgo, exposing it to the public-facing HTTP API for AzuraCast installations. A user with specific internal knowledge of a station's operations can craft a custom HTTP request that would affect the contents of a station's database, without revealing any internal information about the station. In order to carry out an attack, a malicious user would need to know a valid SFTP station username and the coordinating internal filesystem structure. This issue is fixed in version 0.23.2.
Severity: 3.1 | LOW
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "12 Dec 2025",
"Type": "Vulnerability"
}
šŸ”¹ t.me/cvedetector šŸ”¹
{
"Source": "CVE FEED",
"Title": "CVE-2025-13660 - Guest Support <= 1.2.3 - unauthenticated user email disclosure in guest_support_handler ajax endpoint",
"Content": "CVE ID : CVE-2025-13660
Published : Dec. 12, 2025, 7:15 a.m. | 32 minutes ago
Description : The Guest Support plugin for WordPress is vulnerable to User Email Disclosure in versions up to, and including, 1.2.3. This is due to the plugin exposing a public AJAX endpoint that allows anyone to search for and retrieve user email addresses without any authentication or capability checks. This makes it possible for unauthenticated attackers to enumerate user accounts and extract email addresses via the guest_support_handler=ajax endpoint with the request=get_users parameter.
Severity: 5.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "12 Dec 2025",
"Type": "Vulnerability"
}
šŸ”¹ t.me/cvedetector šŸ”¹
{
"Source": "CVE FEED",
"Title": "CVE-2025-14356 - Ultra Addons for Contact Form 7 <= 3.5.33 - missing authorization to authenticated (subscriber+) to generate form submission pdf",
"Content": "CVE ID : CVE-2025-14356
Published : Dec. 12, 2025, 7:15 a.m. | 32 minutes ago
Description : The Ultra Addons for Contact Form 7 plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'uacf7_get_generated_pdf' function in all versions up to, and including, 3.5.33. This makes it possible for authenticated attackers, with Subscriber-level access and above, to generate and get form submission PDF, when the "PDF Generator" and the "Database" addons are enabled (disabled by default).
Severity: 4.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "12 Dec 2025",
"Type": "Vulnerability"
}
šŸ”¹ t.me/cvedetector šŸ”¹
ā¤1
{
"Source": "CVE FEED",
"Title": "CVE-2025-67726 - Tornado is Vulnerable to Quadratic DoS via Crafted Multipart Parameters",
"Content": "CVE ID : CVE-2025-67726
Published : Dec. 12, 2025, 7:15 a.m. | 32 minutes ago
Description : Tornado is a Python web framework and asynchronous networking library. Versions 6.5.2 and below use an inefficient algorithm when parsing parameters for HTTP header values, potentially causing a DoS. The _parseparam function in httputil.py is used to parse specific HTTP header values, such as those in multipart/form-data and repeatedly calls string.count() within a nested loop while processing quoted semicolons. If an attacker sends a request with a large number of maliciously crafted parameters in a Content-Disposition header, the server's CPU usage increases quadratically (O(n²)) during parsing. Due to Tornado's single event loop architecture, a single malicious request can cause the entire server to become unresponsive for an extended period. This issue is fixed in version 6.5.3.
Severity: 7.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "12 Dec 2025",
"Type": "Vulnerability"
}
šŸ”¹ t.me/cvedetector šŸ”¹
{
"Source": "CVE FEED",
"Title": "CVE-2025-12655 - Hippoo Mobile App for WooCommerce <= 1.7.1 - missing authorization to unauthenticated limited file write",
"Content": "CVE ID : CVE-2025-12655
Published : Dec. 12, 2025, 7:15 a.m. | 32 minutes ago
Description : The Hippoo Mobile App for WooCommerce plugin for WordPress is vulnerable to arbitrary file write via a missing authorization check in all versions up to, and including, 1.7.1. This is due to the REST API endpoint `/wp-json/hippoo/v1/wc/token/save_callback/{token_id}` being registered with `permission_callback => '__return_true'`, which allows unauthenticated access. This makes it possible for unauthenticated attackers to write arbitrary JSON content to the server's publicly accessible upload directory via the vulnerable endpoint.
Severity: 5.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "12 Dec 2025",
"Type": "Vulnerability"
}
šŸ”¹ t.me/cvedetector šŸ”¹
{
"Source": "CVE FEED",
"Title": "CVE-2025-14068 - WPNakama <= 0.6.3 - unauthenticated sql injection via 'order_by' parameter",
"Content": "CVE ID : CVE-2025-14068
Published : Dec. 12, 2025, 7:15 a.m. | 32 minutes ago
Description : The WPNakama plugin for WordPress is vulnerable to time-based SQL Injection via the 'order_by' parameter in all versions up to, and including, 0.6.3 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
Severity: 7.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "12 Dec 2025",
"Type": "Vulnerability"
}
šŸ”¹ t.me/cvedetector šŸ”¹
{
"Source": "CVE FEED",
"Title": "CVE-2025-12570 - Fancy Product Designer <= 6.4.8 - unauthenticated stored cross-site scripting via svg file upload",
"Content": "CVE ID : CVE-2025-12570
Published : Dec. 12, 2025, 7:15 a.m. | 32 minutes ago
Description : The Fancy Product Designer plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 6.4.8 due to insufficient input sanitization and output escaping in the data-to-image.php and pdf-to-image.php files. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file.
Severity: 7.2 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "12 Dec 2025",
"Type": "Vulnerability"
}
šŸ”¹ t.me/cvedetector šŸ”¹
{
"Source": "CVE FEED",
"Title": "CVE-2025-67725 - Tornado is Vulnerable to Quadratic DoS via Repeated Header Coalescing",
"Content": "CVE ID : CVE-2025-67725
Published : Dec. 12, 2025, 6:15 a.m. | 1 hour, 32 minutes ago
Description : Tornado is a Python web framework and asynchronous networking library. In versions 6.5.2 and below, a single maliciously crafted HTTP request can block the server's event loop for an extended period, caused by the HTTPHeaders.add method. The function accumulates values using string concatenation when the same header name is repeated, causing a Denial of Service (DoS). Due to Python string immutability, each concatenation copies the entire string, resulting in O(n²) time complexity. The severity can vary from high if max_header_size has been increased from its default, to low if it has its default value of 64KB. This issue is fixed in version 6.5.3.
Severity: 7.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "12 Dec 2025",
"Type": "Vulnerability"
}
šŸ”¹ t.me/cvedetector šŸ”¹
{
"Source": "CVE FEED",
"Title": "CVE-2025-10684 - Construction Light < 1.6.8 - Subscriber+ Arbitrary Plugin Activation",
"Content": "CVE ID : CVE-2025-10684
Published : Dec. 12, 2025, 6:15 a.m. | 1 hour, 32 minutes ago
Description : The Construction Light WordPress theme before 1.6.8 does not have authorisation and CSRF when activating via an AJAX action, allowing any authenticated users, such as subscriber to activate arbitrary .
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "12 Dec 2025",
"Type": "Vulnerability"
}
šŸ”¹ t.me/cvedetector šŸ”¹
{
"Source": "CVE FEED",
"Title": "CVE-2025-26866 - Apache HugeGraph-Server: RAFT and deserialization vulnerability",
"Content": "CVE ID : CVE-2025-26866
Published : Dec. 12, 2025, 9:23 a.m. | 26 minutes ago
Description : A remote code execution vulnerability exists where a malicious Raft node can exploit insecure Hessian deserialization within the PD store. The fix enforces IP-based authentication to restrict cluster membership and implements a strict class whitelist to harden the Hessian serialization process against object injection attacks.




Users are recommended to upgrade to version 1.7.0, which fixes the issue.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "12 Dec 2025",
"Type": "Vulnerability"
}
šŸ”¹ t.me/cvedetector šŸ”¹
{
"Source": "CVE FEED",
"Title": "CVE-2025-58137 - Apache Fineract: IDOR via self-service API",
"Content": "CVE ID : CVE-2025-58137
Published : Dec. 12, 2025, 9:21 a.m. | 28 minutes ago
Description : Authorization Bypass Through User-Controlled Key vulnerability in Apache Fineract.

This issue affects Apache Fineract: through 1.11.0. The issue is fixed in version 1.12.1.

Users are encouraged to upgrade to version 1.13.0, the latest release.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "12 Dec 2025",
"Type": "Vulnerability"
}
šŸ”¹ t.me/cvedetector šŸ”¹
{
"Source": "CVE FEED",
"Title": "CVE-2025-13993 - MailerLite – Signup forms (official) <= 1.7.16 - authenticated (administrator+) stored cross-site scripting",
"Content": "CVE ID : CVE-2025-13993
Published : Dec. 12, 2025, 9:20 a.m. | 28 minutes ago
Description : The MailerLite – Signup forms (official) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'form_description' and 'success_message' parameters in versions up to, and including, 1.7.16 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator access or higher, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "12 Dec 2025",
"Type": "Vulnerability"
}
šŸ”¹ t.me/cvedetector šŸ”¹
{
"Source": "CVE FEED",
"Title": "CVE-2025-12348 - Email Subscribers & Newsletters <= 5.9.10 - missing authentication to unauthenticated action scheduler task execution",
"Content": "CVE ID : CVE-2025-12348
Published : Dec. 12, 2025, 9:20 a.m. | 28 minutes ago
Description : The Icegram Express - Email Subscribers, Newsletters and Marketing Automation Plugin for WordPress is vulnerable to Missing Authorization in versions up to, and including, 5.9.10. This is due to the plugin not properly verifying that a user is authorized to perform an action in the `run_action_scheduler_task` function. This makes it possible for unauthenticated attackers to execute scheduled actions early or repeatedly by guessing action IDs, potentially triggering email sends, maintenance tasks, or other privileged operations, causing unexpected state changes and resource usage.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "12 Dec 2025",
"Type": "Vulnerability"
}
šŸ”¹ t.me/cvedetector šŸ”¹
{
"Source": "CVE FEED",
"Title": "CVE-2025-14074 - PDF for Contact Form 7 + Drag and Drop Template Builder <= 6.3.3 - missing authorization to authenticated (subscriber+) arbitrary post duplication",
"Content": "CVE ID : CVE-2025-14074
Published : Dec. 12, 2025, 9:20 a.m. | 28 minutes ago
Description : The PDF for Contact Form 7 + Drag and Drop Template Builder plugin for WordPress is vulnerable to unauthorized post duplication due to a missing capability check on the 'rednumber_duplicate' function in all versions up to, and including, 6.3.3. This makes it possible for authenticated attackers, with Subscriber-level access and above, to duplicate arbitrary posts, including password protected or private ones.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "12 Dec 2025",
"Type": "Vulnerability"
}
šŸ”¹ t.me/cvedetector šŸ”¹
{
"Source": "CVE FEED",
"Title": "CVE-2025-58130 - Apache Fineract: Server Key not masked",
"Content": "CVE ID : CVE-2025-58130
Published : Dec. 12, 2025, 9:20 a.m. | 29 minutes ago
Description : Insufficiently Protected Credentials vulnerability in Apache Fineract.

This issue affects Apache Fineract: through 1.11.0. The issue is fixed in version 1.12.1.

Users are encouraged to upgrade to version 1.13.0, the latest release.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "12 Dec 2025",
"Type": "Vulnerability"
}
šŸ”¹ t.me/cvedetector šŸ”¹
{
"Source": "CVE FEED",
"Title": "CVE-2025-23408 - Apache Fineract: weak password policy",
"Content": "CVE ID : CVE-2025-23408
Published : Dec. 12, 2025, 9:18 a.m. | 30 minutes ago
Description : Weak Password Requirements vulnerability in Apache Fineract.

This issue affects Apache Fineract: through 1.10.1. The issue is fixed in version 1.11.0.

Users are encouraged to upgrade to version 1.13.0, the latest release.
Severity: 8.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "12 Dec 2025",
"Type": "Vulnerability"
}
šŸ”¹ t.me/cvedetector šŸ”¹
{
"Source": "CVE FEED",
"Title": "CVE-2025-12960 - Simple CSV Table <= 1.0.1 - directory traversal to authenticated (contributor+) arbitrary file read",
"Content": "CVE ID : CVE-2025-12960
Published : Dec. 12, 2025, 9:15 a.m. | 33 minutes ago
Description : The Simple CSV Table plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 1.0.1 via the `href` parameter in the `[csv]` shortcode. This is due to insufficient path validation before concatenating user-supplied input to a base directory path. This makes it possible for authenticated attackers, with Contributor-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information such as database credentials and authentication keys.
Severity: 6.5 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "12 Dec 2025",
"Type": "Vulnerability"
}
šŸ”¹ t.me/cvedetector šŸ”¹
{
"Source": "CVE FEED",
"Title": "CVE-2025-40829 - Simcenter Femap Uninitialized Memory Code Execution",
"Content": "CVE ID : CVE-2025-40829
Published : Dec. 12, 2025, 9:15 a.m. | 33 minutes ago
Description : A vulnerability has been identified in Simcenter Femap (All versions < V2512). The affected applications contains an uninitialized memory vulnerability while parsing specially crafted SLDPRT files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-27146)
Severity: 7.8 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "12 Dec 2025",
"Type": "Vulnerability"
}
šŸ”¹ t.me/cvedetector šŸ”¹
{
"Source": "CVE FEED",
"Title": "CVE-2025-67731 - Servify Express does not enforce rate limiting when parsing JSON",
"Content": "CVE ID : CVE-2025-67731
Published : Dec. 12, 2025, 8:15 a.m. | 1 hour, 33 minutes ago
Description : Servify Express is a Node.js package to start an Express server and log the port it's running on. Prior to 1.2, the Express server used express.json() without a size limit, which could allow attackers to send extremely large request bodies. This can cause excessive memory usage, degraded performance, or process crashes, resulting in a Denial of Service (DoS). Any application using the JSON parser without limits and exposed to untrusted clients is affected. The issue is not a flaw in Express itself, but in configuration. This issue is fixed in version 1.2. To work around, consider adding a limit option to the JSON parser, rate limiting at the application or reverse-proxy level, rejecting unusually large requests before parsing, or using a reverse proxy (such as NGINX) to enforce maximum request body sizes.
Severity: 8.7 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "12 Dec 2025",
"Type": "Vulnerability"
}
šŸ”¹ t.me/cvedetector šŸ”¹
{
"Source": "CVE FEED",
"Title": "CVE-2025-12841 - Bookit < 2.5.1 – Unauthenticated Settings Update",
"Content": "CVE ID : CVE-2025-12841
Published : Dec. 12, 2025, 11:15 a.m. | 36 minutes ago
Description : The Bookit WordPress plugin before 2.5.1 has a publicly accessible REST endpoint that allows unauthenticated update of the plugins Stripe payment options.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "12 Dec 2025",
"Type": "Vulnerability"
}
šŸ”¹ t.me/cvedetector šŸ”¹