A vulnerability, which was classified as problematic, was found in Feedback Modal for Website Plugin up to 1.0.1 on WordPress. Impacted is the function handle_export. The manipulation of the argument export_data results in missing authorization.
This vulnerability is known as CVE-2025-13528. It is possible to launch the attack remotely. No exploit is available.
A vulnerability, which was classified as problematic, was found in Jabbernotification Plugin up to 0.99-RC2 on WordPress. Affected by this issue is some unknown functionality of the file admin.php. The manipulation of the argument PATH_INFO results in cross site scripting.
This vulnerability is cataloged as CVE-2025-13622. The attack may be launched remotely. There is no exploit available.
A vulnerability categorized as problematic has been discovered in Twitscription Plugin up to 0.1.1 on WordPress. The impacted element is an unknown function of the file admin.php. The manipulation of the argument PATH_INFO results in cross site scripting.
This vulnerability is known as CVE-2025-13623. It is possible to launch the attack remotely. No exploit is available.
A vulnerability identified as problematic has been detected in Live CSS Preview Plugin up to 2.0.0 on WordPress. This affects the function wp_ajax_frontend_save of the component AJAX Endpoint. This manipulation causes missing authorization.
This vulnerability is handled as CVE-2025-12354. The attack can be initiated remotely. There is not any exploit available.
A vulnerability marked as critical has been reported in Voidek Employee Portal Plugin up to 1.0.6 on WordPress. Affected is an unknown function. Performing manipulation results in missing authorization.
This vulnerability was named CVE-2025-12093. The attack may be initiated remotely. There is no available exploit.
A vulnerability described as problematic has been identified in Payaza Plugin up to 0.3.8 on WordPress. Affected by this vulnerability is the function wp_ajax_nopriv_update_order_status of the component AJAX Endpoint. Executing manipulation can lead to missing authorization.
The identification of this vulnerability is CVE-2025-12355. The attack may be launched remotely. There is no exploit available.
A vulnerability classified as problematic was found in WP-SOS-Donate Donation Sidebar Plugin up to 0.9.2 on WordPress. This affects an unknown part. The manipulation of the argument $_SERVER['PHP_SELF'] results in cross site scripting.
This vulnerability is identified as CVE-2025-13625. The attack can be executed remotely. There is not any exploit available.
A vulnerability was found in Easy Jump Links Menus Plugin up to 1.0.0 on WordPress and classified as problematic. The affected element is an unknown function of the component Shortcode Handler. Executing manipulation of the argument h_tags can lead to cross site scripting.
This vulnerability is registered as CVE-2025-13860. It is possible to launch the attack remotely. No exploit is available.
A vulnerability categorized as problematic has been discovered in Weekly Planner Plugin up to 1.0 on WordPress. Affected is an unknown function of the component Setting Handler. Such manipulation leads to cross site scripting.
This vulnerability is traded as CVE-2025-12186. The attack may be launched remotely. There is no exploit available.
A vulnerability identified as problematic has been detected in Torod Plugin up to 1.9 on WordPress. Affected by this vulnerability is the function save_settings of the component Setting Handler. Performing manipulation results in cross-site request forgery.
This vulnerability is known as CVE-2025-12373. Remote exploitation of the attack is possible. No exploit is available.
A vulnerability was found in Dream Gallery Plugin up to 1.0 on WordPress and classified as problematic. This impacts the function dreampluginsmain of the component Setting Handler. The manipulation results in cross-site request forgery.
This vulnerability is cataloged as CVE-2025-13621. The attack may be launched remotely. There is no exploit available.
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday formally added a critical security flaw impacting React Server Components (RSC) to its Known Exploited Vulnerabilities (KEV) catalog following reports of active exploitation in the wild.
The vulnerability, CVE-2025-55182 (CVSS score: 10.0), relates to a case of remote code execution that could be triggered by an
A vulnerability classified as problematic has been found in Alinto Sogo 5.12.3. This impacts an unknown function. Performing manipulation of the argument theme results in cross site scripting.
This vulnerability is identified as CVE-2025-63499. The attack can be initiated remotely. There is not any exploit available.
A vulnerability was found in Linux Kernel up to 5.4.301/6.6.117/6.12.59/6.17.9 and classified as critical. Affected by this issue is the function sg_finish_rem_req of the component scsi. Executing manipulation can lead to privilege escalation.
The identification of this vulnerability is CVE-2025-40259. The attack needs to be done within the local network. There is no exploit available.
It is suggested to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 5.4.301/6.6.117/6.12.59/6.17.9. It has been classified as critical. Affected is the function nsh_key_put_from_nlattr. Performing manipulation results in null pointer dereference.
This vulnerability is identified as CVE-2025-40254. The attack can only be performed from the local network. There is not any exploit available.
Upgrading the affected component is recommended.
A vulnerability identified as problematic has been detected in Apache Tika Core, Tika Parsers and Tika PDF Parser Module. This vulnerability affects unknown code of the component XFA File Parser. This manipulation causes xml external entity reference.
This vulnerability is registered as CVE-2025-66516. Remote exploitation of the attack is possible. No exploit is available.
You should upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.6.117/6.12.59/6.17.9. It has been declared as critical. This vulnerability affects the function imx_sc_key_action. The manipulation results in memory corruption.
This vulnerability is identified as CVE-2025-40262. The attack can only be performed from the local network. There is not any exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical has been found in Linux Kernel up to 6.17.9. This issue affects the function msm_vma_job_free. Performing manipulation results in null pointer dereference.
This vulnerability is known as CVE-2025-40247. Access to the local network is required for this attack. No exploit is available.
It is recommended to upgrade the affected component.