A vulnerability has been found in PHPGurukul Complaint Management System 2.0 and classified as critical. Affected is an unknown function of the file user/reset-password.php. The manipulation of the argument mobileno leads to sql injection.
This vulnerability is traded as CVE-2025-57146. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability, which was classified as critical, was found in PHPGurukul Online Shopping Portal 2.0. This impacts an unknown function of the file /admin/insert-product.php. Executing manipulation can lead to unrestricted upload.
This vulnerability appears as CVE-2025-57148. The attack may be performed from remote. There is no available exploit.
A vulnerability, which was classified as problematic, has been found in Deetronix Booking Ultra Pro Plugin up to 1.1.21 on WordPress. This affects an unknown function. Performing manipulation results in cross site scripting.
This vulnerability is reported as CVE-2025-58633. The attack is possible to be carried out remotely. No exploit exists.
A vulnerability classified as problematic was found in Tickera Plugin up to 3.5.5.6 on WordPress. The impacted element is an unknown function. Such manipulation leads to cross-site request forgery.
This vulnerability is documented as CVE-2025-58611. The attack can be executed remotely. There is not any exploit available.
A vulnerability classified as problematic has been found in Mautic up to 4.4.16/5.2.7/6.0.4. The affected element is an unknown function of the file /s/ajax?action=lead:addLeadTags. This manipulation causes cross site scripting.
This vulnerability is registered as CVE-2025-9823. Remote exploitation of the attack is possible. No exploit is available.
It is recommended to upgrade the affected component.
A vulnerability described as critical has been identified in kamleshyadav Exit Intent Popup Plugin up to 1.0.1 on WordPress. Impacted is an unknown function. The manipulation results in server-side request forgery.
This vulnerability is cataloged as CVE-2025-58641. The attack may be launched remotely. There is no exploit available.
A vulnerability marked as problematic has been reported in Spiffy Plugins WP Flow Plus Plugin up to 5.2.5 on WordPress. This issue affects some unknown processing. The manipulation leads to cross site scripting.
This vulnerability is listed as CVE-2025-58625. The attack may be initiated remotely. There is no available exploit.
A vulnerability identified as problematic has been detected in rbaer Simple Matomo Tracking Code Plugin up to 1.1.0 on WordPress. This affects an unknown part. Performing manipulation results in cross site scripting.
This vulnerability is identified as CVE-2025-58630. The attack can be initiated remotely. There is not any exploit available.
A vulnerability categorized as problematic has been discovered in ZEEN101 IssueM Plugin up to 2.9.0 on WordPress. Affected by this issue is some unknown functionality. Such manipulation leads to cross site scripting.
This vulnerability is referenced as CVE-2025-58631. It is possible to launch the attack remotely. No exploit is available.
A vulnerability was found in gfazioli WP Bannerize Pro Plugin up to 1.10.0 on WordPress. It has been rated as critical. Affected by this vulnerability is an unknown functionality. This manipulation causes server-side request forgery.
The identification of this vulnerability is CVE-2025-58615. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability was found in MatrixAddons Document Engine Plugin up to 1.2 on WordPress. It has been declared as problematic. Affected is an unknown function. The manipulation results in cross site scripting.
This vulnerability was named CVE-2025-58640. The attack may be performed from remote. There is no available exploit.
A vulnerability was found in cJSON up to 1.7.18. It has been classified as critical. This impacts the function decode_array_index_from_pointer of the file cJSON_Utils.c. The manipulation leads to improper validation of array index.
This vulnerability is uniquely identified as CVE-2025-57052. The attack is possible to be carried out remotely. No exploit exists.
A vulnerability was found in PHPGurukul Complaint Management System 2.0 and classified as critical. This affects an unknown function of the file user/registration.php. Executing manipulation of the argument fullname/email/contactno can lead to sql injection.
This vulnerability is handled as CVE-2025-57147. The attack can be executed remotely. There is not any exploit available.
A vulnerability has been found in RumbleTalk Live Group Chat Plugin up to 6.3.5 on WordPress and classified as problematic. The impacted element is an unknown function. Performing manipulation results in cross site scripting.
This vulnerability is known as CVE-2025-58626. Remote exploitation of the attack is possible. No exploit is available.
A vulnerability, which was classified as problematic, was found in falselight Exchange Rates Plugin up to 1.2.5 on WordPress. The affected element is an unknown function. Such manipulation leads to cross site scripting.
This vulnerability is traded as CVE-2025-58624. The attack may be launched remotely. There is no exploit available.
A vulnerability, which was classified as problematic, has been found in add-ons PDF for WPForms Plugin up to 6.2.1 on WordPress. Impacted is an unknown function. This manipulation causes cross site scripting.
This vulnerability appears as CVE-2025-58620. The attack may be initiated remotely. There is no available exploit.