A vulnerability, which was classified as problematic, has been found in Flexible Map Plugin up to 1.18.0 on WordPress. This issue affects some unknown processing of the component Shortcode Handler. The manipulation leads to cross site scripting.
This vulnerability is traded as CVE-2025-8622. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability classified as critical was found in JS Archive List Plugin up to 6.1.5 on WordPress. This vulnerability affects the function build_sql_where. Executing manipulation can lead to sql injection.
This vulnerability appears as CVE-2025-7670. The attack may be performed from a remote location. There is no available exploit.
A vulnerability classified as critical has been found in Infility Global Plugin up to 2.14.7 on WordPress. This affects an unknown part. Performing manipulation results in path traversal.
This vulnerability is reported as CVE-2025-47650. The attack is possible to be carried out remotely. No exploit exists.
A vulnerability described as critical has been identified in School Management System Plugin up to 93.1.0 on WordPress. Affected by this issue is some unknown functionality. Such manipulation leads to improper control of resource identifiers.
This vulnerability is documented as CVE-2025-49896. The attack can be executed remotely. There is not any exploit available.
A vulnerability marked as critical has been reported in FunnelKit Plugin on WordPress. Affected by this vulnerability is the function wf_get_cookie of the component Woofunnel Library. This manipulation causes information disclosure.
This vulnerability is registered as CVE-2025-7654. Remote exploitation of the attack is possible. No exploit is available.
A vulnerability labeled as critical has been found in Real Spaces Plugin up to 3.6 on WordPress. Affected is the function imic_agent_register. The manipulation results in improper privilege management.
This vulnerability is cataloged as CVE-2025-6758. The attack may be launched remotely. There is no exploit available.
A vulnerability categorized as critical has been discovered in Cloudflare Image Resizing Plugin up to 1.5.6 on WordPress. This affects the function hook_rest_pre_dispatch. Executing manipulation can lead to missing authentication.
This vulnerability is tracked as CVE-2025-8723. The attack can be launched remotely. No exploit exists.
A vulnerability was found in vcita Online Booking & Scheduling Calendar Plugin up to 4.5.3 on WordPress. It has been rated as critical. The impacted element is an unknown function. Performing manipulation results in unrestricted upload.
This vulnerability is identified as CVE-2025-54677. The attack can be initiated remotely. There is not any exploit available.
A vulnerability was found in Real Spaces Plugin up to 3.5 on WordPress. It has been declared as critical. The affected element is an unknown function. Such manipulation of the argument change_role_member leads to improper privilege management.
This vulnerability is referenced as CVE-2025-8218. It is possible to launch the attack remotely. No exploit is available.
A vulnerability was found in Add Custom Codes Plugin up to 4.80 on WordPress. It has been classified as critical. Impacted is an unknown function. This manipulation causes privilege escalation.
The identification of this vulnerability is CVE-2025-30975. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability was found in LibreNMS up to 25.7.x and classified as problematic. This issue affects some unknown processing of the component Alert Template Handler. The manipulation results in cross site scripting.
This vulnerability was named CVE-2025-55296. The attack may be performed from a remote location. There is no available exploit.
It is suggested to upgrade the affected component.
A vulnerability has been found in Shaarli up to 0.14.x and classified as problematic. This vulnerability affects unknown code. The manipulation leads to basic cross site scripting.
This vulnerability is uniquely identified as CVE-2025-55291. Local access is required to approach this attack. No exploit exists.
The affected component should be upgraded.
A vulnerability, which was classified as problematic, was found in Liferay Portal and DXP. This affects an unknown part of the component Message Board. Executing manipulation can lead to cross site scripting.
This vulnerability is handled as CVE-2025-43731. The attack can be executed remotely. There is not any exploit available.
A vulnerability, which was classified as problematic, has been found in Rockwell Automation PLC. Affected by this issue is some unknown functionality. Performing manipulation results in denial of service.
This vulnerability is known as CVE-2025-7693. Remote exploitation of the attack is possible. No exploit is available.
The threat actors behind the Noodlophile malware are leveraging spear-phishing emails and updated delivery mechanisms to deploy the information stealer in attacks aimed at enterprises located in the U.S., Europe, Baltic countries, and the Asia-Pacific (APAC) region.
"The Noodlophile campaign, active for over a year, now leverages advanced spear-phishing emails posing as copyright infringement
A vulnerability classified as critical was found in 7ritn VaulTLS up to 0.9.0. Affected by this vulnerability is an unknown functionality. Such manipulation leads to weak password requirements.
This vulnerability is traded as CVE-2025-55299. The attack may be launched remotely. There is no exploit available.
Upgrading the affected component is advised.
The next three posts will cover high severity vulnerabilities in the Amazon Q Developer VS Code Extension (Amazon Q Developer), which is a very popular coding agent, with over 1 million downloads.
It is vulnerable to prompt injection from untrusted data and its security depends heavily on model behavior.
At a high level Amazon Q Developer can leak sensitive information from a developer’s machine, e.g. API keys, to external servers via DNS requests.