24h | 7d | 30d

Overview

  • Meta
  • react-server-dom-webpack

03 Dec 2025
Published
11 Dec 2025
Updated

CVSS v3.1
CRITICAL (10.0)
EPSS
76.01%

Description

A pre-authentication remote code execution vulnerability exists in React Server Components versions 19.0.0, 19.1.0, 19.1.1, and 19.2.0 including the following packages: react-server-dom-parcel, react-server-dom-turbopack, and react-server-dom-webpack. The vulnerable code unsafely deserializes payloads from HTTP requests to Server Function endpoints.

Statistics

  • 12 Posts
  • 38 Interactions

Last activity: Last hour

Fediverse

Profile picture

Google is now tracking at least five Chinese cyber-espionage groups that are exploiting the React2Shell vulnerability for initial access.

The groups are UNC6600, UNC6586, UNC6588, UNC6595, and UNC6603. This is up from two at the beginning.

cloud.google.com/blog/topics/t

  • 9
  • 9
  • 0
  • 3h ago
Profile picture

React2shell CVE-2025-55182のせいで勝手にサーバでマイニングされてた(むしろその程度で済んでよかったねクラスのあかんやつ)という話をたくさん聞いてるのでお気をつけくださいまし…

DifyをセルフホストしたやつをパブリックなIPに少しでも晒したら即死とか聞いとるでな。

  • 5
  • 4
  • 0
  • 4h ago
Profile picture

Missed this yesterday - Google TIG published what they've been seeing on React2Shell.

Dovetails with @hrbrmstr 's tireless work lately.

#threatintel

cloud.google.com/blog/topics/t

  • 3
  • 6
  • 0
  • 16h ago
Profile picture

Il Day-One del Caos di React2Shell! Spie, criminali e cryptominer si contendono i server

Un recente resoconto del gruppo Google Threat Intelligence (GTIG) illustra gli esiti disordinati della diffusione di informazioni, mettendo in luce come gli avversari più esperti abbiano già preso piede all’interno delle reti dei soggetti colpiti.

Una vulnerabilità critica, identificata come CVE-2025-55182, è stata segnalata alla comunità della sicurezza il 3 dicembre 2025, riguardante React Server Components (RSC). Questa falla di sicurezza, con un punteggioCVSS massimo di 10,0, permette a malintenzionati di eseguire codice arbitrario su un server mediante l’invio di una sola richiesta HTTP appositamente strutturata, senza necessità di autenticazione.

Il mondo informatico ha reagito con prontezza. Subito dopo la notizia pubblica, numerosi cluster di minacce sono stati sfruttati diffusamente, come rilevato dal Google Threat Intelligence Group (GTIG), che ha notato attività sia di gruppi di criminali informatici opportunisti fino a presunti operatori di spionaggio.

Poiché React e Next.js sono fondamentali per il web moderno, la superficie di attacco è enorme. “GTIG considera CVE-2025-55182 una vulnerabilità a rischio critico”. L’attività più allarmante identificata nel rapporto proviene da autori di minacce collegate alla Cina, che hanno rapidamente integrato l’exploit nei loro arsenali per distribuire malware specializzati. Il GTIG ha identificato diverse campagne distinte:

  • Tunnelers di UNC6600: questo gruppo è stato visto utilizzare MINOCAT, un sofisticato tunneler. Hanno fatto di tutto per nascondere le proprie tracce, creando directory nascoste come $HOME/.systemd-utils e uccidendo spietatamente i processi legittimi per liberare risorse.
  • C2 “legittimo” (UNC6603): questo autore ha implementato una versione aggiornata della backdoor HISONIC. In un’astuta mossa per mimetizzarsi, HISONIC “utilizza servizi cloud legittimi, come Cloudflare Pages e GitLab, per recuperare la sua configurazione crittografata”.
  • The Masqueraders (UNC6595): Distribuendo un malware denominato ANGRYREBEL.LINUX, questo gruppo ha tentato di eludere il rilevamento “mascherando il malware come il legittimo demone OpenSSH (sshd) all’interno della directory /etc/” e utilizzando tecniche anti-forensi come il timestomping.
  • Vim Impostor (UNC6588): in un’altra ondata di attacchi, gli autori hanno utilizzato l’exploit per scaricare COMPOOD, una backdoor che si camuffava da popolare editor di testo Vim per evitare sospetti.

“GTIG ha identificato campagne distinte che sfruttano questa vulnerabilità per distribuire un tunneler MINOCAT, un downloader SNOWLIGHT, una backdoor HISONIC e una backdoor COMPOOD, nonché miner di criptovalute XMRIG, alcune delle quali si sovrappongono all’attività precedentemente segnalata da Huntress“.

Oltre allo spionaggio, a partire dal 5 dicembre si sono uniti alla mischia anche criminali motivati da interessi finanziari, che hanno utilizzato i miner XMRig per dirottare le risorse del server e generare criptovalute.

Il caos è stato ulteriormente aggravato da un’ondata di disinformazione. Nelle prime ore successive alla divulgazione, Internet è stato inondato di exploit falsi. Un importante repository “che inizialmente sosteneva di essere un exploit funzionale legittimo, ha ora aggiornato il proprio file README per etichettare correttamente le affermazioni iniziali della ricerca come generate dall’intelligenza artificiale e non funzionali”.

L'articolo Il Day-One del Caos di React2Shell! Spie, criminali e cryptominer si contendono i server proviene da Red Hot Cyber.

  • 0
  • 0
  • 0
  • 13h ago
Profile picture

An actively exploited GeoServer XXE vulnerability is prompting renewed discussion around breach readiness in public-sector and enterprise environments.

Experts note that unauthenticated flaws in widely deployed open-source platforms significantly increase exposure, especially where asset discovery and patch coordination are constrained.

Venky Raju, Field CTO at ColorTokens:
“The massive adoption of open-source software has significantly increased the attack surface of many enterprises, often without their knowledge. Unauthenticated vulnerabilities are particularly concerning because they bypass identity and application-level controls. The GeoServer vulnerability comes on the heels of a larger one called React2Shell (CVE-2025-55182), which scored a perfect 10 on the CVSS metric.

However, enterprises may not be able to patch servers quickly due to internal challenges, such as discovering affected assets, identifying affected applications, scheduling patch updates, etc. As an emergency measure, organizations should consider microsegmentation controls to isolate affected assets or zones with just enough policies to maintain business continuity while preventing lateral movement using commonly used techniques. The MITRE framework is an excellent guide for identifying the tactics hackers use to move laterally from the initially compromised system.”

How are teams handling containment when patching isn’t immediate?

Engage and follow @technadu for grounded infosec coverage.

  • 0
  • 0
  • 0
  • 13h ago
Profile picture

New React RSC Vulnerabilities Enable DoS and Source Code Exposure
thehackernews.com/2025/12/new-

The React team has released fixes for two new types of flaws in React Server
Components (RSC) that, if successfully exploited, could result in
denial-of-service (DoS) or source code exposure.

The team said the issues were found by the security community while attempting
to exploit the patches released for CVE-2025-55182 (CVSS score: 10.0), a
critical bug in RSC that has since been weaponized in the wild.

The three vulnerabilities are listed below -

CVE-2025-55184 (CVSS score: 7.5) - A pre-authentication denial of service
vulnerability arising from unsafe deserialization of payloads from HTTP
requests to Server Function endpoints, triggering an infinite loop that hangs
the server process and may prevent future HTTP requests from being served
CVE-2025-67779 (CVSS score: 7.5) - An incomplete fix for CVE-2025-55184 that
has the same impact
CVE-2025-55183 (CVSS score: 5.3) - An information leak vulnerability that may
cause a specifically crafted HTTP request sent to a vulnerable Server Function
to return the source code of any Server Function

However, successful exploitation of CVE-2025-55183 requires the existence of a
Server Function that explicitly or implicitly exposes an argument that has
been converted into a string format.

  • 0
  • 0
  • 0
  • 2h ago

Bluesky

Profile picture
between the ~1,400 networks we've seen exploiting React2Shell (CVE-2025-55182) we've captured about 100 different distinct malware payloads. Lots of vibe coded slop, coin miners, chinese comments, mirai variants, etc. hit us up if you're tracking this and want deets research@greynoise.io
  • 0
  • 2
  • 0
  • 12h ago
Profile picture
piyolog.hatenadiary.jp/ent... React Server Componentsの脆弱性 CVE-2025-55182(React2Shell)についてまとめてみた。 - piyolog
  • 0
  • 0
  • 0
  • 21h ago
Profile picture
かわいそうだけど参考になるのでありがたい。 「私の環境は Next.js 15.4.3 + React 19.1.0。ドンピシャで脆弱だった」 「攻撃者のMoneroウォレットアドレスも特定できたが、仮想通貨の匿名性により追跡は困難だ」 「発見したマルウェアはVirusTotalに提出済み」 「「VirusTotalで検出ゼロ=安全」ではない」 個人開発のEC2が乗っ取られてMoneroを掘られていた話【CVE-2025-55182】|ねころこ note.com/nekoroko/n/n...
  • 0
  • 0
  • 0
  • 18h ago
Profile picture
www.ipa.go.jp/security/sec... React Server Componentsにおける脆弱性について(CVE-2025-55182) | 情報セキュリティ | IPA 独立行政法人 情報処理推進機構
  • 0
  • 0
  • 0
  • 14h ago
Profile picture
CVE-2025-55182 Exposed: The React Server Components RCE Flaw That Could Have Owned Your Nodejs Backend + Video Introduction: The landscape of modern web application security faces a new frontier with the disclosure of CVE-2025-55182, a critical Remote Code Execution (RCE) vulnerability within the…
  • 0
  • 0
  • 0
  • 14h ago
Profile picture
React2Shell Unleashed: From CVE-2025-55182 to Full-System Takeover – A Hacker’s Deep Dive + Video Introduction: The public disclosure of CVE-2025-55182, dubbed React2Shell, triggered a cybersecurity firestorm. This critical vulnerability in React Server Components' Flight protocol allows…
  • 0
  • 0
  • 0
  • Last hour

Overview

  • Google
  • Chrome

12 Dec 2025
Published
13 Dec 2025
Updated

CVSS
Pending
EPSS
23.28%

Description

Out of bounds memory access in ANGLE in Google Chrome on Mac prior to 143.0.7499.110 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)

Statistics

  • 9 Posts
  • 34 Interactions

Last activity: 3 hours ago

Fediverse

Profile picture

I see that Brendan Eich from Brave is out lying about @Vivaldi again. He claims that Brave was pretty much the first out with a fix for CVE-2025-14174 and that Vivaldi still has not released a fix.

AFAIK we were actually first because we released 7.7.3862.88 (Android) based on 142.0.7444.237 from the Extended Support Release branch at 13:00 UTC (and for Desktop [7.7.3851.61] one hour later) on the 10th of December (the day before Brave and even before Chrome), which includes a fix for CVE-2025-14174. However since that CVE was not being publicly discussed yet, it was not initially listed in the changelog.

I have updated the Desktop announcement to mention the CVE now. Here it is:

vivaldi.com/blog/desktop/minor

Also FWIW my Masto bot which tracks various desktop browser updates announced us here:

social.vivaldi.net/@browserver

That bot has a sibling that looks at Vivaldi only releases (all platforms), which caught the Android release:

social.vivaldi.net/@vivaldiver

And here is when it detected the Brave annoucement, more than a day later:

social.vivaldi.net/@browserver

  • 21
  • 12
  • 0
  • 20h ago
Profile picture

Apple has released security updates for multiple operating systems and its Safari browser to address two WebKit flaws that have been exploited in the wild. One of these vulnerabilities, CVE-2025-14174, is the same flaw previously patched in Google Chrome.
thehackernews.com/2025/12/appl

  • 0
  • 0
  • 0
  • 3h ago
Profile picture

Apple Issues Security Updates After Two WebKit Flaws Found Exploited in the Wild

Apple has released security updates for multiple operating systems and its Safari browser to address two WebKit flaws that have been exploited in the wild. One of these vulnerabilities, CVE-2025-14174, is the same flaw previously patched in Google Chrome. thehackernews.com/2025/12/appl

  • 0
  • 0
  • 0
  • 3h ago
Profile picture

[VULN] "Sécurité : Apple comble deux failles « zero-day » avec iOS 26.2 et macOS 26.2"

"La première (CVE-2025-43529) concerne WebKit, le moteur de rendu de Safari. Il s'agit d'une faille de type use-after-free qui permet l'exécution de code arbitraire simplement en traitant un contenu web malveillant. La seconde (CVE-2025-14174) est une corruption de mémoire identifiée non seulement par les équipes d'Apple, mais aussi par le Threat Analysis Group de Google.

Fait intéressant, Google a également dû corriger Chrome en urgence mercredi dernier pour une faille similaire..."
👇
macg.co/ios/2025/12/securite-a
⬇️
cve.circl.lu/vuln/CVE-2025-141

💬
⬇️
infosec.pub/post/38999452

  • 1
  • 0
  • 0
  • 17h ago
Profile picture

Apple aggiorna due bug 0day critici in iOS, presumibilmente abusati dagli spyware

In seguito alla scoperta di due vulnerabilità zero-day estremamente critiche nel motore del browser WebKit, Apple ha pubblicato urgentemente degli aggiornamenti di sicurezza per gli utenti di iPhone e iPad.

Entrambe le vulnerabilità risiedono in WebKit, il motore che alimenta Safari e visualizza i contenuti web nell’ecosistema iOS.

Catalogate come CVE-2025-43529 e CVE-2025-14174, permettono agli attaccanti di attivare codice malevolo attraverso l’inganno della vittima che viene portata a visitare una specifica pagina web.

Per attivare l’exploit, non è necessario che un aggressore abbia un accesso fisico al dispositivo; è sufficiente che venga elaborato un contenuto web creato in modo dannoso, ad esempio un sito web compromesso o una pubblicità dannosa.

L’avviso di Apple riporta quanto segue: “Apple è a conoscenza di una segnalazione secondo cui questo problema potrebbe essere stato sfruttato in un attacco estremamente sofisticato contro individui specifici nelle versioni di iOS precedenti a iOS 26″.

Questa formulazione è solitamente riservata alle campagne di spyware mercenarie sponsorizzate dallo Stato, in cui vengono presi di mira obiettivi di alto valore come giornalisti, diplomatici e dissidenti.

Le due falle sfruttano debolezze diverse nel modo in cui il browser gestisce la memoria:

CVE-2025-43529 (Use-After-Free): scoperta dal Google Threat Analysis Group (TAG), questa vulnerabilità comporta un errore “use-after-free”. In parole povere, il programma tenta di utilizzare la memoria dopo che è stata liberata, consentendo agli hacker di manipolarla per eseguire codice arbitrario. Apple ha risolto questo problema migliorando la gestione della memoria (WebKit Bugzilla: 302502).

CVE-2025-14174 (Corruzione della memoria): attribuito sia ad Apple che a Google TAG, questo problema consente la corruzione della memoria, una condizione che può causare il crash di un sistema o aprire una backdoor per gli aggressori. È stato corretto con una convalida dell’input migliorata (WebKit Bugzilla: 303614).

L'articolo Apple aggiorna due bug 0day critici in iOS, presumibilmente abusati dagli spyware proviene da Red Hot Cyber.

  • 0
  • 0
  • 0
  • 20h ago

Bluesky

Profile picture
Apple issued security updates on December 13, 2025, addressing two WebKit vulnerabilities exploited in the wild. One flaw (CVE-2025-14174) is […]
  • 0
  • 0
  • 0
  • 21h ago
Profile picture
【UPDATE】利用者はアップデートの実施を 「Microsoft Edge」でもゼロデイ脆弱性「CVE-2025-14174」が修正、実環境での悪用を確認 forest.watch.impress.co.jp/docs/news/20... #SecurityUpdate
  • 0
  • 0
  • 0
  • 12h ago
Profile picture
Apple’s Emergency Zero-Day Patch Reveals New Spyware Attack Surface—Are You Already Compromised? + Video Introduction: Apple has issued emergency security updates to patch two critical zero-day vulnerabilities (CVE-2025-43529 and CVE-2025-14174) exploited in what the company describes as an…
  • 0
  • 0
  • 0
  • 19h ago
Profile picture
Apple fixes two zero-day flaws exploited in ‘sophisticated’ attacks Apple has released emergency updates to patch two zero-day vulnerabilities that were exploited in an “extremely sophisticated attack” targeting specific individuals. The zero-days are tracked as CVE-2025-43529 and CVE-2025-14174…
  • 0
  • 0
  • 0
  • 13h ago

Overview

  • Pending

Pending
Published
Pending
Updated

CVSS
Pending
EPSS
Pending

KEV

Description

This candidate has been reserved by a CVE Numbering Authority (CNA). This record will be updated by the assigning CNA once details are available.

Statistics

  • 4 Posts
  • 1 Interaction

Last activity: 13 hours ago

Fediverse

Profile picture

[VULN] "Sécurité : Apple comble deux failles « zero-day » avec iOS 26.2 et macOS 26.2"

"La première (CVE-2025-43529) concerne WebKit, le moteur de rendu de Safari. Il s'agit d'une faille de type use-after-free qui permet l'exécution de code arbitraire simplement en traitant un contenu web malveillant. La seconde (CVE-2025-14174) est une corruption de mémoire identifiée non seulement par les équipes d'Apple, mais aussi par le Threat Analysis Group de Google.

Fait intéressant, Google a également dû corriger Chrome en urgence mercredi dernier pour une faille similaire..."
👇
macg.co/ios/2025/12/securite-a
⬇️
cve.circl.lu/vuln/CVE-2025-141

💬
⬇️
infosec.pub/post/38999452

  • 1
  • 0
  • 0
  • 17h ago
Profile picture

Apple aggiorna due bug 0day critici in iOS, presumibilmente abusati dagli spyware

In seguito alla scoperta di due vulnerabilità zero-day estremamente critiche nel motore del browser WebKit, Apple ha pubblicato urgentemente degli aggiornamenti di sicurezza per gli utenti di iPhone e iPad.

Entrambe le vulnerabilità risiedono in WebKit, il motore che alimenta Safari e visualizza i contenuti web nell’ecosistema iOS.

Catalogate come CVE-2025-43529 e CVE-2025-14174, permettono agli attaccanti di attivare codice malevolo attraverso l’inganno della vittima che viene portata a visitare una specifica pagina web.

Per attivare l’exploit, non è necessario che un aggressore abbia un accesso fisico al dispositivo; è sufficiente che venga elaborato un contenuto web creato in modo dannoso, ad esempio un sito web compromesso o una pubblicità dannosa.

L’avviso di Apple riporta quanto segue: “Apple è a conoscenza di una segnalazione secondo cui questo problema potrebbe essere stato sfruttato in un attacco estremamente sofisticato contro individui specifici nelle versioni di iOS precedenti a iOS 26″.

Questa formulazione è solitamente riservata alle campagne di spyware mercenarie sponsorizzate dallo Stato, in cui vengono presi di mira obiettivi di alto valore come giornalisti, diplomatici e dissidenti.

Le due falle sfruttano debolezze diverse nel modo in cui il browser gestisce la memoria:

CVE-2025-43529 (Use-After-Free): scoperta dal Google Threat Analysis Group (TAG), questa vulnerabilità comporta un errore “use-after-free”. In parole povere, il programma tenta di utilizzare la memoria dopo che è stata liberata, consentendo agli hacker di manipolarla per eseguire codice arbitrario. Apple ha risolto questo problema migliorando la gestione della memoria (WebKit Bugzilla: 302502).

CVE-2025-14174 (Corruzione della memoria): attribuito sia ad Apple che a Google TAG, questo problema consente la corruzione della memoria, una condizione che può causare il crash di un sistema o aprire una backdoor per gli aggressori. È stato corretto con una convalida dell’input migliorata (WebKit Bugzilla: 303614).

L'articolo Apple aggiorna due bug 0day critici in iOS, presumibilmente abusati dagli spyware proviene da Red Hot Cyber.

  • 0
  • 0
  • 0
  • 20h ago

Bluesky

Profile picture
Apple’s Emergency Zero-Day Patch Reveals New Spyware Attack Surface—Are You Already Compromised? + Video Introduction: Apple has issued emergency security updates to patch two critical zero-day vulnerabilities (CVE-2025-43529 and CVE-2025-14174) exploited in what the company describes as an…
  • 0
  • 0
  • 0
  • 19h ago
Profile picture
Apple fixes two zero-day flaws exploited in ‘sophisticated’ attacks Apple has released emergency updates to patch two zero-day vulnerabilities that were exploited in an “extremely sophisticated attack” targeting specific individuals. The zero-days are tracked as CVE-2025-43529 and CVE-2025-14174…
  • 0
  • 0
  • 0
  • 13h ago

Overview

  • GIMP
  • GIMP

29 Oct 2025
Published
03 Nov 2025
Updated

CVSS v3.0
HIGH (7.8)
EPSS
0.08%

KEV

Description

GIMP HDR File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of HDR files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-27803.

Statistics

  • 1 Post

Last activity: 14 hours ago

Bluesky

Profile picture
Security Advisory: CVE-2025-10921 - GEGL Heap-Based Buffer Overflow #SUSE has released critical patches for a memory corruption vulnerability in the GEGL graphics library. Read more: tinyurl.com/5n8yct6c
  • 0
  • 0
  • 0
  • 14h ago

Overview

  • Growatt
  • ShineLan-X

13 Dec 2025
Published
13 Dec 2025
Updated

CVSS v4.0
CRITICAL (9.4)
EPSS
0.02%

KEV

Description

ShineLan-X contains a set of credentials for an FTP server was found within the firmware, allowing testers to establish an insecure FTP connection with the server. This may allow an attacker to replace legitimate files being deployed to devices with their own malicious versions, since the firmware signature verification is not enforced.

Statistics

  • 1 Post

Last activity: 19 hours ago

Fediverse

Profile picture

🚨 CVE-2025-36747 (CRITICAL, CVSS 9.4): Hard-coded FTP creds in Growatt ShineLan-X 3.6.0.0 allow file tampering—no signature checks! Patch, restrict FTP, and monitor for abuse. radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 19h ago

Overview

  • The Qt Company
  • Qt

03 Dec 2025
Published
03 Dec 2025
Updated

CVSS v4.0
HIGH (8.7)
EPSS
0.12%

KEV

Description

Allocation of Resources Without Limits or Throttling, Improper Validation of Specified Quantity in Input vulnerability in The Qt Company Qt on Windows, MacOS, Linux, iOS, Android, x86, ARM, 64 bit, 32 bit allows Excessive Allocation. This issue affects users of the Text component in Qt Quick. Missing validation of the width and height in the <img> tag could cause an application to become unresponsive. This issue affects Qt: from 5.0.0 through 6.5.10, from 6.6.0 through 6.8.5, from 6.9.0 through 6.10.0.

Statistics

  • 1 Post

Last activity: 22 hours ago

Bluesky

Profile picture
CVE-2025-12385 Improper validation of tag size in Text component parser scq.ms/49ZY4lR #SecQube #MicrosoftSecurity
  • 0
  • 0
  • 0
  • 22h ago

Overview

  • Oracle Corporation
  • Oracle Concurrent Processing

05 Oct 2025
Published
21 Oct 2025
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
74.64%

Description

Vulnerability in the Oracle Concurrent Processing product of Oracle E-Business Suite (component: BI Publisher Integration). Supported versions that are affected are 12.2.3-12.2.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Concurrent Processing. Successful attacks of this vulnerability can result in takeover of Oracle Concurrent Processing. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).

Statistics

  • 1 Post

Last activity: 12 hours ago

Bluesky

Profile picture
CL0P/FIN11 turned Oracle EBS into an Airbnb—no files, just memory. “TLSv3.1” beacons now, extortion emails later. Patch CVE-2025-61882 and choke egress before finance chokes you. 🔒🕵️ Read the breakdown—then subscribe: blog.alphahunt.io/cl0p-fin11-g... #AlphaHunt #CyberSecurity #Ransomware #Oracle
  • 0
  • 0
  • 0
  • 12h ago

Overview

  • rupok98
  • URL Shortener Plugin For WordPress

13 Dec 2025
Published
13 Dec 2025
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
0.05%

KEV

Description

The URL Shortener Plugin For WordPress plugin for WordPress is vulnerable to SQL Injection via the ‘analytic_id’ parameter in all versions up to, and including, 3.0.7 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

Statistics

  • 1 Post

Last activity: 21 hours ago

Fediverse

Profile picture

🚨 CVE-2025-10738 (CRITICAL, CVSS 9.8): Unauthenticated SQL Injection in rupok98 URL Shortener Plugin for WordPress (all versions). Exploitation risks full DB compromise. Disable or restrict plugin ASAP! radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 21h ago

Overview

  • jayarsiech
  • JAY Login & Register

13 Dec 2025
Published
13 Dec 2025
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
0.14%

KEV

Description

The JAY Login & Register plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 2.4.01. This is due to incorrect authentication checking in the 'jay_login_register_process_switch_back' function with the 'jay_login_register_process_switch_back' cookie value. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the user id.

Statistics

  • 1 Post

Last activity: 20 hours ago

Fediverse

Profile picture

🚨 CRITICAL: CVE-2025-14440 in JAY Login & Register plugin (≤2.4.01) enables auth bypass—attackers can hijack any WordPress account, incl. admin. Disable plugin & monitor now. No patch yet. radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 20h ago

Overview

  • recorp
  • Export WP Pages to HTML & PDF – Simply Create a Static Website

13 Dec 2025
Published
13 Dec 2025
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
0.08%

KEV

Description

The Export WP Page to Static HTML & PDF plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 4.3.4 through publicly exposed cookies.txt files containing authentication cookies. This makes it possible for unauthenticated attackers to cookies that may have been injected into the log file if the site administrator triggered a back-up using a specific user role like 'administrator.'

Statistics

  • 1 Post

Last activity: 23 hours ago

Fediverse

Profile picture

🚨 CVE-2025-11693 (CRITICAL, CVSS 9.8): recorp Export WP Pages to HTML & PDF plugin exposes admin cookies via cookies.txt — risk of WordPress site takeover. Disable plugin & secure backups. No patch yet. radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 23h ago
Showing 1 to 10 of 31 CVEs