🚨 CVE-2025-11171
The Chartify – WordPress Chart Plugin for WordPress is vulnerable to Missing Authentication for Critical Function in all versions up to, and including, 3.5.9. This is due to the plugin registering an unauthenticated AJAX action that dispatches to admin-class methods based on a request parameter, without any nonce or capability checks. This makes it possible for unauthenticated attackers to execute administrative functions via the wp-admin/admin-ajax.php endpoint granted they can identify callable method names.
🎖@cveNotify
The Chartify – WordPress Chart Plugin for WordPress is vulnerable to Missing Authentication for Critical Function in all versions up to, and including, 3.5.9. This is due to the plugin registering an unauthenticated AJAX action that dispatches to admin-class methods based on a request parameter, without any nonce or capability checks. This makes it possible for unauthenticated attackers to execute administrative functions via the wp-admin/admin-ajax.php endpoint granted they can identify callable method names.
🎖@cveNotify
🚨 CVE-2025-11435
A security vulnerability has been detected in JhumanJ OpnForm up to 1.9.3. Affected by this vulnerability is an unknown functionality of the file /show/submissions. The manipulation leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed publicly and may be used. The identifier of the patch is a2af1184e53953afa8cb052f4055f288adcaa608. To fix this issue, it is recommended to deploy a patch.
🎖@cveNotify
A security vulnerability has been detected in JhumanJ OpnForm up to 1.9.3. Affected by this vulnerability is an unknown functionality of the file /show/submissions. The manipulation leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed publicly and may be used. The identifier of the patch is a2af1184e53953afa8cb052f4055f288adcaa608. To fix this issue, it is recommended to deploy a patch.
🎖@cveNotify
Google Docs
OpnFormv1.9.3_Vulnerability_Findings
OpnForm v1.9.3 Vulnerability Findings Reporter: balejin Date: September 25, 2025 Table of Contents Table of Contents
2 Technical Findings
3 Unauthenticated Stored XSS on Form Text Input
3 Unrestricted File Upload…
2 Technical Findings
3 Unauthenticated Stored XSS on Form Text Input
3 Unrestricted File Upload…
🚨 CVE-2025-11436
A vulnerability was detected in JhumanJ OpnForm up to 1.9.3. Affected by this issue is some unknown functionality of the file /answer. The manipulation results in unrestricted upload. The attack can be launched remotely. The exploit is now public and may be used. The patch is identified as 95c3e23856465d202e6aec10bdb6ee0688b5305a. It is advisable to implement a patch to correct this issue.
🎖@cveNotify
A vulnerability was detected in JhumanJ OpnForm up to 1.9.3. Affected by this issue is some unknown functionality of the file /answer. The manipulation results in unrestricted upload. The attack can be launched remotely. The exploit is now public and may be used. The patch is identified as 95c3e23856465d202e6aec10bdb6ee0688b5305a. It is advisable to implement a patch to correct this issue.
🎖@cveNotify
Google Docs
OpnFormv1.9.3_Vulnerability_Findings
OpnForm v1.9.3 Vulnerability Findings Reporter: balejin Date: September 25, 2025 Table of Contents Table of Contents
2 Technical Findings
3 Unauthenticated Stored XSS on Form Text Input
3 Unrestricted File Upload…
2 Technical Findings
3 Unauthenticated Stored XSS on Form Text Input
3 Unrestricted File Upload…
🚨 CVE-2025-11437
A flaw has been found in JhumanJ OpnForm up to 1.9.3. This affects an unknown part of the file /api/open/forms/ of the component Form Editor. This manipulation causes cross site scripting. The attack may be initiated remotely. The exploit has been published and may be used. This issue is currently under review for additional handling. As of right now the vendor has stated that the feature is disabled until the user has configured their own domain which will mitigate this attack vector.
🎖@cveNotify
A flaw has been found in JhumanJ OpnForm up to 1.9.3. This affects an unknown part of the file /api/open/forms/ of the component Form Editor. This manipulation causes cross site scripting. The attack may be initiated remotely. The exploit has been published and may be used. This issue is currently under review for additional handling. As of right now the vendor has stated that the feature is disabled until the user has configured their own domain which will mitigate this attack vector.
🎖@cveNotify
Google Docs
OpnFormv1.9.3_Vulnerability_Findings
OpnForm v1.9.3 Vulnerability Findings Reporter: balejin Date: September 25, 2025 Table of Contents Table of Contents
2 Technical Findings
3 Unauthenticated Stored XSS on Form Text Input
3 Unrestricted File Upload…
2 Technical Findings
3 Unauthenticated Stored XSS on Form Text Input
3 Unrestricted File Upload…
🚨 CVE-2025-11438
A vulnerability has been found in JhumanJ OpnForm up to 1.9.3. This vulnerability affects unknown code of the file /custom-domains of the component API Endpoint. Such manipulation leads to missing authorization. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The name of the patch is beb153ce52dceb971c1518f98333328c95f1ba20. It is best practice to apply a patch to resolve this issue.
🎖@cveNotify
A vulnerability has been found in JhumanJ OpnForm up to 1.9.3. This vulnerability affects unknown code of the file /custom-domains of the component API Endpoint. Such manipulation leads to missing authorization. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The name of the patch is beb153ce52dceb971c1518f98333328c95f1ba20. It is best practice to apply a patch to resolve this issue.
🎖@cveNotify
Google Docs
OpnFormv1.9.3_Vulnerability_Findings
OpnForm v1.9.3 Vulnerability Findings Reporter: balejin Date: September 25, 2025 Table of Contents Table of Contents
2 Technical Findings
3 Unauthenticated Stored XSS on Form Text Input
3 Unrestricted File Upload…
2 Technical Findings
3 Unauthenticated Stored XSS on Form Text Input
3 Unrestricted File Upload…
🚨 CVE-2025-11439
A vulnerability was found in JhumanJ OpnForm up to 1.9.3. This issue affects some unknown processing of the file /show/integrations. Performing manipulation results in missing authorization. Remote exploitation of the attack is possible. The exploit has been made public and could be used. The patch is named 11d97d78f2de2cb49f79baed6bde8b611ec1f384. It is recommended to apply a patch to fix this issue.
🎖@cveNotify
A vulnerability was found in JhumanJ OpnForm up to 1.9.3. This issue affects some unknown processing of the file /show/integrations. Performing manipulation results in missing authorization. Remote exploitation of the attack is possible. The exploit has been made public and could be used. The patch is named 11d97d78f2de2cb49f79baed6bde8b611ec1f384. It is recommended to apply a patch to fix this issue.
🎖@cveNotify
Google Docs
OpnFormv1.9.3_Vulnerability_Findings
OpnForm v1.9.3 Vulnerability Findings Reporter: balejin Date: September 25, 2025 Table of Contents Table of Contents
2 Technical Findings
3 Unauthenticated Stored XSS on Form Text Input
3 Unrestricted File Upload…
2 Technical Findings
3 Unauthenticated Stored XSS on Form Text Input
3 Unrestricted File Upload…
🚨 CVE-2025-11440
A vulnerability was determined in JhumanJ OpnForm up to 1.9.3. Impacted is an unknown function of the file /edit. Executing manipulation can lead to improper access controls. The attack can be executed remotely. The exploit has been publicly disclosed and may be utilized. This patch is called b15e29021d326be127193a5dbbd528c4e37e6324. Applying a patch is advised to resolve this issue.
🎖@cveNotify
A vulnerability was determined in JhumanJ OpnForm up to 1.9.3. Impacted is an unknown function of the file /edit. Executing manipulation can lead to improper access controls. The attack can be executed remotely. The exploit has been publicly disclosed and may be utilized. This patch is called b15e29021d326be127193a5dbbd528c4e37e6324. Applying a patch is advised to resolve this issue.
🎖@cveNotify
Google Docs
OpnFormv1.9.3_Vulnerability_Findings
OpnForm v1.9.3 Vulnerability Findings Reporter: balejin Date: September 25, 2025 Table of Contents Table of Contents
2 Technical Findings
3 Unauthenticated Stored XSS on Form Text Input
3 Unrestricted File Upload…
2 Technical Findings
3 Unauthenticated Stored XSS on Form Text Input
3 Unrestricted File Upload…
🚨 CVE-2025-11441
A vulnerability was identified in JhumanJ OpnForm up to 1.9.3. The affected element is an unknown function of the component HTTP Header Handler. The manipulation of the argument X-Forwarded-For leads to improper restriction of excessive authentication attempts. The attack is possible to be carried out remotely. A high degree of complexity is needed for the attack. The exploitability is described as difficult. The exploit is publicly available and might be used. The identifier of the patch is 11e99960e14ca986b1a001a56e7533223d2cfa5b. It is suggested to install a patch to address this issue.
🎖@cveNotify
A vulnerability was identified in JhumanJ OpnForm up to 1.9.3. The affected element is an unknown function of the component HTTP Header Handler. The manipulation of the argument X-Forwarded-For leads to improper restriction of excessive authentication attempts. The attack is possible to be carried out remotely. A high degree of complexity is needed for the attack. The exploitability is described as difficult. The exploit is publicly available and might be used. The identifier of the patch is 11e99960e14ca986b1a001a56e7533223d2cfa5b. It is suggested to install a patch to address this issue.
🎖@cveNotify
Google Docs
OpnFormv1.9.3_Vulnerability_Findings
OpnForm v1.9.3 Vulnerability Findings Reporter: balejin Date: September 25, 2025 Table of Contents Table of Contents
2 Technical Findings
3 Unauthenticated Stored XSS on Form Text Input
3 Unrestricted File Upload…
2 Technical Findings
3 Unauthenticated Stored XSS on Form Text Input
3 Unrestricted File Upload…
🚨 CVE-2025-48464
Successful exploitation of the vulnerability could allow an unauthenticated attacker to gain access to a victim’s Sync account data such as account credentials and email protection information.
🎖@cveNotify
Successful exploitation of the vulnerability could allow an unauthenticated attacker to gain access to a victim’s Sync account data such as account credentials and email protection information.
🎖@cveNotify
Tux-plorer Blog
Don't Leave Me Outdated!
We frequently receive operating system (OS) updates on our devices. While these updates can be annoying and often involving only minor changes or introducing of new features, others are critical security patches (CVE-2025-48464).
🚨 CVE-2025-11442
A security flaw has been discovered in JhumanJ OpnForm up to 1.9.3. The impacted element is an unknown function of the component API Endpoint. The manipulation results in cross-site request forgery. The attack may be performed from remote. The exploit has been released to the public and may be exploited. The vendor has stated that API calls require authentication through Authorization Bearer Tokens, so classic CSRF attacks do not apply here. An attacker would need to possess the JWT through means such as XSS which were mitigated, disabling any form of initial access.
🎖@cveNotify
A security flaw has been discovered in JhumanJ OpnForm up to 1.9.3. The impacted element is an unknown function of the component API Endpoint. The manipulation results in cross-site request forgery. The attack may be performed from remote. The exploit has been released to the public and may be exploited. The vendor has stated that API calls require authentication through Authorization Bearer Tokens, so classic CSRF attacks do not apply here. An attacker would need to possess the JWT through means such as XSS which were mitigated, disabling any form of initial access.
🎖@cveNotify
Google Docs
OpnFormv1.9.3_Vulnerability_Findings
OpnForm v1.9.3 Vulnerability Findings Reporter: balejin Date: September 25, 2025 Table of Contents Table of Contents
2 Technical Findings
3 Unauthenticated Stored XSS on Form Text Input
3 Unrestricted File Upload…
2 Technical Findings
3 Unauthenticated Stored XSS on Form Text Input
3 Unrestricted File Upload…
🚨 CVE-2025-11443
A weakness has been identified in JhumanJ OpnForm up to 1.9.3. This affects an unknown function of the file /api/password/email of the component Forgotten Password Handler. This manipulation causes information exposure through discrepancy. It is possible to initiate the attack remotely. The attack is considered to have high complexity. The exploitability is reported as difficult. The exploit has been made available to the public and could be exploited. This issue is currently aligned with Laravel issue #46465, which is why no mitigation action was taken.
🎖@cveNotify
A weakness has been identified in JhumanJ OpnForm up to 1.9.3. This affects an unknown function of the file /api/password/email of the component Forgotten Password Handler. This manipulation causes information exposure through discrepancy. It is possible to initiate the attack remotely. The attack is considered to have high complexity. The exploitability is reported as difficult. The exploit has been made available to the public and could be exploited. This issue is currently aligned with Laravel issue #46465, which is why no mitigation action was taken.
🎖@cveNotify
Google Docs
OpnFormv1.9.3_Vulnerability_Findings
OpnForm v1.9.3 Vulnerability Findings Reporter: balejin Date: September 25, 2025 Table of Contents Table of Contents
2 Technical Findings
3 Unauthenticated Stored XSS on Form Text Input
3 Unrestricted File Upload…
2 Technical Findings
3 Unauthenticated Stored XSS on Form Text Input
3 Unrestricted File Upload…
🚨 CVE-2025-11444
A security vulnerability has been detected in TOTOLINK N600R up to 4.3.0cu.7866_B20220506. This impacts the function setWiFiBasicConfig of the file /cgi-bin/cstecgi.cgi of the component HTTP Request Handler. Such manipulation of the argument wepkey leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed publicly and may be used.
🎖@cveNotify
A security vulnerability has been detected in TOTOLINK N600R up to 4.3.0cu.7866_B20220506. This impacts the function setWiFiBasicConfig of the file /cgi-bin/cstecgi.cgi of the component HTTP Request Handler. Such manipulation of the argument wepkey leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed publicly and may be used.
🎖@cveNotify
GitHub
BinaryAudit/PoC/BOF/TOTOLINK/wepkey/wepkey.md at main · z472421519/BinaryAudit
Contribute to z472421519/BinaryAudit development by creating an account on GitHub.
🚨 CVE-2023-5347
An Improper Verification of Cryptographic Signature vulnerability in the update process of Korenix JetNet Series allows replacing the whole operating system including Trusted Executables. This issue affects JetNet devices older than firmware version 2024/01.
🎖@cveNotify
An Improper Verification of Cryptographic Signature vulnerability in the update process of Korenix JetNet Series allows replacing the whole operating system including Trusted Executables. This issue affects JetNet devices older than firmware version 2024/01.
🎖@cveNotify
packetstorm.news
Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories, and Whitepapers
🚨 CVE-2025-11445
A vulnerability was detected in Kilo Code up to 4.86.0. Affected is the function ClineProvider of the file src/core/webview/ClineProvider.ts of the component Prompt Handler. Performing manipulation results in injection. The attack can be initiated remotely. The exploit is now public and may be used. Applying a patch is the recommended action to fix this issue.
🎖@cveNotify
A vulnerability was detected in Kilo Code up to 4.86.0. Affected is the function ClineProvider of the file src/core/webview/ClineProvider.ts of the component Prompt Handler. Performing manipulation results in injection. The attack can be initiated remotely. The exploit is now public and may be used. Applying a patch is the recommended action to fix this issue.
🎖@cveNotify
GitHub
Prevent writing to files outside workspace by default to enhance security by hassoncs · Pull Request #2244 · Kilo-Org/kilocode
The alwaysAllowWriteOutsideWorkspace flag in ClineProvider was set to true by default, allowing Kilo Code to write to arbitrary files outside the workspace. This change sets it to false by default,...
🚨 CVE-2023-5376
An Improper Authentication vulnerability in Korenix JetNet TFTP allows abuse of this service. This issue affects JetNet devices older than firmware version 2024/01.
🎖@cveNotify
An Improper Authentication vulnerability in Korenix JetNet TFTP allows abuse of this service. This issue affects JetNet devices older than firmware version 2024/01.
🎖@cveNotify
packetstorm.news
Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories, and Whitepapers
🚨 CVE-2024-5411
Missing input validation and OS command integration of the input in the ORing IAP-420 web-interface allows authenticated command injection.This issue affects IAP-420 version 2.01e and below.
🎖@cveNotify
Missing input validation and OS command integration of the input in the ORing IAP-420 web-interface allows authenticated command injection.This issue affects IAP-420 version 2.01e and below.
🎖@cveNotify
seclists.org
Full Disclosure: CyberDanube Security Research 20240528-0 | Multiple Vulnerabilities in ORing IAP-420
🚨 CVE-2024-5420
Missing input validation in the SEH Computertechnik utnserver Pro, SEH Computertechnik utnserver ProMAX, SEH Computertechnik INU-100 web-interface allows stored Cross-Site Scripting (XSS)..This issue affects utnserver Pro, utnserver ProMAX, INU-100 version 20.1.22 and below.
🎖@cveNotify
Missing input validation in the SEH Computertechnik utnserver Pro, SEH Computertechnik utnserver ProMAX, SEH Computertechnik INU-100 web-interface allows stored Cross-Site Scripting (XSS)..This issue affects utnserver Pro, utnserver ProMAX, INU-100 version 20.1.22 and below.
🎖@cveNotify
seclists.org
Full Disclosure: CyberDanube Security Research 20240604-0 | Multiple Vulnerabilities in utnserver Pro/ProMAX/INU-100
🚨 CVE-2024-55544
Missing input validation in the ORing IAP-420 web-interface allows authenticated Command Injections on OS level.This issue affects IAP-420 version 2.01e and below.
🎖@cveNotify
Missing input validation in the ORing IAP-420 web-interface allows authenticated Command Injections on OS level.This issue affects IAP-420 version 2.01e and below.
🎖@cveNotify
CyberDanube
St. Pölten UAS | Multiple Vulnerabilities in ORing IAP | CyberDanube
The Oring IAP-420 is prone to multiple vulnerabilities. This allows an attacker to exploit weaknesses such as authenticated command injection, cross-site scripting, remote command execution and denial of service to gain unauthorized control, compromise user…
🚨 CVE-2025-4646
Incorrect Authorization vulnerability in Centreon web (API Token creation form modules) allows Privilege Escalation.This issue affects web: from 24.04.0 before 24.04.10, from 24.10.0 before 24.10.4.
🎖@cveNotify
Incorrect Authorization vulnerability in Centreon web (API Token creation form modules) allows Privilege Escalation.This issue affects web: from 24.04.0 before 24.04.10, from 24.10.0 before 24.10.4.
🎖@cveNotify
GitHub
Releases · centreon/centreon
Centreon is a network, system and application monitoring tool. Centreon is the only AIOps Platform Providing Holistic Visibility to Complex IT Workflows from Cloud to Edge. - centreon/centreon
🚨 CVE-2025-4648
The content of a SVG file, received as input
in Centreon web, was not properly checked. Allows Reflected XSS.
A user with elevated privileges can inject JS script by altering the content of a SVG media, during the submit request.
This issue affects web: from 24.10.0 before 24.10.5, from 24.04.0 before 24.04.11, from 23.10.0 before 23.10.22, from 23.04.0 before 23.04.27, from 22.10.0 before 22.10.29.
🎖@cveNotify
The content of a SVG file, received as input
in Centreon web, was not properly checked. Allows Reflected XSS.
A user with elevated privileges can inject JS script by altering the content of a SVG media, during the submit request.
This issue affects web: from 24.10.0 before 24.10.5, from 24.04.0 before 24.04.11, from 23.10.0 before 23.10.22, from 23.04.0 before 23.04.27, from 22.10.0 before 22.10.29.
🎖@cveNotify
GitHub
Releases · centreon/centreon
Centreon is a network, system and application monitoring tool. Centreon is the only AIOps Platform Providing Holistic Visibility to Complex IT Workflows from Cloud to Edge. - centreon/centreon
🚨 CVE-2025-4975
When a notification relating to low battery appears for a user with whom the device has been shared, tapping the notification grants full access to the power settings of that device.
🎖@cveNotify
When a notification relating to low battery appears for a user with whom the device has been shared, tapping the notification grants full access to the power settings of that device.
🎖@cveNotify
Google Play
TP-Link Tapo - Apps on Google Play
Control your Tapo smart devices from anywhere.