7.4

CVSS4.0

CVE-2025-66297 - Grav vulnerable to Privilege Escalation and Authenticated Remote Code Execution via Twig Injection

Grav is a file-based Web platform. Prior to 1.8.0-beta.27, a user with admin panel access and permissions to create or edit pages in Grav CMS can enable Twig processing in the page frontmatter. By injecting malicious Twig expressions, the user can escalate their privileges to admin or execute arbit…

📅 Published: Dec. 1, 2025, 9:05 p.m. 🔄 Last Modified: Dec. 3, 2025, 3:58 p.m.

8.8

CVSS3.1

CVE-2025-66296 - Grav vulnerable to Privilege Escalation in Grav Admin: Missing Username Uniqueness Check Allows Adm…

Grav is a file-based Web platform. Prior to 1.8.0-beta.27, a privilege escalation vulnerability exists in Grav’s Admin plugin due to the absence of username uniqueness validation when creating users. A user with the create user permission can create a new account using the same username as an exist…

📅 Published: Dec. 1, 2025, 9:03 p.m. 🔄 Last Modified: Dec. 4, 2025, 6:33 p.m.

8.7

CVSS4.0

CVE-2025-66294 - Grav is vulnerable to RCE via SSTI through Twig Sandbox Bypass

Grav is a file-based Web platform. Prior to 1.8.0-beta.27, a Server-Side Template Injection (SSTI) vulnerability exists in Grav that allows authenticated attackers with editor permissions to execute arbitrary commands on the server and, under certain conditions, may also be exploited by unauthentic…

📅 Published: Dec. 1, 2025, 8:52 p.m. 🔄 Last Modified: Dec. 4, 2025, 6:36 p.m.

8.8

CVSS3.1

CVE-2025-66295 - Grav vulnerable to Path traversal / arbitrary YAML write via user creation leading to Account Takeo…

Grav is a file-based Web platform. Prior to 1.8.0-beta.27, when a user with privilege of user creation creates a new user through the Admin UI and supplies a username containing path traversal sequences (for example ..\Nijat or ../Nijat), Grav writes the account YAML file to an unintended path outs…

📅 Published: Dec. 1, 2025, 8:46 p.m. 🔄 Last Modified: Dec. 4, 2025, 6:34 p.m.

7.5

CVSS3.1

CVE-2025-14874 - Nodemailer: nodemailer: denial of service via crafted email address header

A flaw was found in Nodemailer. This vulnerability allows a denial of service (DoS) via a crafted email address header that triggers infinite recursion in the address parser.

📅 Published: Dec. 1, 2025, 8:44 p.m. 🔄 Last Modified: Jan. 8, 2026, 3:15 a.m.

6.8

CVSS3.1

CVE-2025-66206 - Frappe vulnerable to a path traversal allowing reading certain files

Frappe is a full-stack web application framework. Prior to 15.86.0 and 14.99.2, certain requests were vulnerable to path traversal attacks, wherein some files from the server could be retrieved if the full path was known. Sites hosted on Frappe Cloud, and even other setups that are behind a reverse…

📅 Published: Dec. 1, 2025, 8:29 p.m. 🔄 Last Modified: Dec. 4, 2025, 6:41 p.m.

7.1

CVSS3.1

CVE-2025-66205 - Frappe has the possibility of SQL Injection due to improper validations

Frappe is a full-stack web application framework. Prior to 15.86.0 and 14.99.2, a certain endpoint was vulnerable to error-based SQL injection due to lack of validation of parameters. Some information like version could be retrieved. This vulnerability is fixed in 15.86.0 and 14.99.2.

📅 Published: Dec. 1, 2025, 8:26 p.m. 🔄 Last Modified: Dec. 4, 2025, 6:49 p.m.

0.0

CVE-2024-51999 - express improperly controls modification of query properties

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. Reason: This candidate was issued in error and is not a valid vulnerability. Notes: All references and descriptions in this candidate have been removed to prevent accidental usage.

📅 Published: Dec. 1, 2025, 8:17 p.m. 🔄 Last Modified: Dec. 2, 2025, 3:15 p.m.

5.5

CVSS4.0

CVE-2025-58044 - JumpServer has an Open Redirect Vulnerability

JumpServer is an open source bastion host and an operation and maintenance security audit system. Prior to v3.10.19 and v4.10.5, The /core/i18n// endpoint uses the Referer header as the redirection target without proper validation, which could lead to an Open Redirect vulnerability. This vulnerabil…

📅 Published: Dec. 1, 2025, 8:17 p.m. 🔄 Last Modified: Dec. 5, 2025, 7:48 p.m.

8.7

CVSS4.0

CVE-2025-55749 - The XWiki Jetty package (XJetty) allows accessing any application file through URL

XWiki is an open-source wiki software platform. From 16.7.0 to 16.10.11, 17.4.4, or 17.7.0, in an instance which is using the XWiki Jetty package (XJetty), a context is exposed to statically access any file located in the webapp/ folder. It allows accessing files which might contains credentials. F…

📅 Published: Dec. 1, 2025, 8:09 p.m. 🔄 Last Modified: March 2, 2026, 10:02 p.m.
Total resulsts: 343921
Page 2340 of 34,393
« previous page » next page
Filters