8.5
CVE-2025-14314 - WordPress PopupKit plugin <= 2.1.5 - SQL Injection vulnerability
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Roxnor PopupKit popup-builder-block allows Blind SQL Injection.This issue affects PopupKit: from n/a through <= 2.1.5.
6.5
CVE-2025-10019 - WordPress Contact Form Email plugin <= 1.3.60 - Insecure Direct Object References (IDOR) vulnerabilβ¦
Authorization Bypass Through User-Controlled Key vulnerability in codepeople Contact Form Email contact-form-to-email allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Contact Form Email: from n/a through <= 1.3.60.
4.3
CVE-2025-13498 - Download Manager <= 3.3.32 - Missing Authorization to Authenticated (Subscriber+) Media Attachment β¦
The Download Manager plugin for WordPress is vulnerable to unauthorized access of sensitive information in all versions up to, and including, 3.3.32. This is due to missing authorization and capability checks on the `wpdm_media_access` AJAX action. This makes it possible for authenticated attackersβ¦
6.4
CVE-2025-12976 - Events Manager <= 7.2.2.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via 'events_liβ¦
The Events Manager β Calendar, Bookings, Tickets, and more! plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'events_list_grouped' shortcode in all versions up to, and including, 7.2.2.1 due to insufficient input sanitization and output escaping on user supplied atβ¦
8.6
CVE-2025-68459 -
RG - AP180, Indoor Wall Plate Wireless AP AP180 series provided by Ruijie Networks Co., Ltd. contain an OS command injection vulnerability. An arbitrary OS command may be executed on the product by an attacker who logs in to the CLI service.
4.9
CVE-2025-68463 - python-biopython: python-biopython: Information disclosure via XML External Entity (XXE) vulnerabilβ¦
Bio.Entrez in Biopython through 186 allows doctype XXE.
7.8
CVE-2025-47387 - Untrusted Pointer Dereference in Camera
Memory Corruption when processing IOCTLs for JPEG data without verification.
7.8
CVE-2025-47382 - Incorrect Authorization in Boot
Memory corruption while loading an invalid firmware in boot loader.
9
CVE-2025-47372 - Buffer Copy Without Checking Size of Input in Boot
Memory Corruption when a corrupted ELF image with an oversized file size is read into a buffer without authentication.
7.8
CVE-2025-47350 - Use After Free in DSP Service
Memory corruption while handling concurrent memory mapping and unmapping requests from a user-space application.