CVE-2025-3514 – “SureForms WordPress Stored Cross-Site Scripting Vulnerability”

CVE ID : CVE-2025-3514 Published : May 2, 2025, 6:15 a.m. | 1 hour, 17 minutes ago Description : The SureForms WordPress plugin before 1.4.4 does not sanitise and escape some of its Form settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed […]

CVE-2025-3513 – “SureForms WordPress Stored Cross-Site Scripting”

CVE ID : CVE-2025-3513 Published : May 2, 2025, 6:15 a.m. | 1 hour, 17 minutes ago Description : The SureForms WordPress plugin before 1.4.4 does not sanitise and escape some of its Form settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed […]

CVE-2025-3488 – WordPress WPML Stored Cross-Site Scripting Vulnerability

CVE ID : CVE-2025-3488 Published : May 2, 2025, 6:15 a.m. | 1 hour, 17 minutes ago Description : The WPML plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin’s wpml_language_switcher shortcode in versions 3.6.0 – 4.7.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for […]

CVE-2025-3438 – WordPress WCFM Marketplace MStore API Privilege Escalation

CVE ID : CVE-2025-3438 Published : May 2, 2025, 6:15 a.m. | 1 hour, 17 minutes ago Description : The MStore API – Create Native Android & iOS Apps On The Cloud plugin for WordPress is vulnerable to limited privilege escalation in all versions up to, and including, 4.17.4. This is due to a lack of restriction […]

AI and automation shift the cybersecurity balance toward attackers

AI and automation shift the cybersecurity balance toward attackers Threat actors are increasingly harnessing automation, commoditized tools, and AI to systematically erode the traditional advantages held by defenders, according to Fortinet. “Our latest Global Threat … Read more Published Date: May 02, 2025 (3 hours, 38 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2024-20439

Windows Security in 2025: Battling Sophisticated Threats with Advanced Defenses

Windows Security in 2025: Battling Sophisticated Threats with Advanced Defenses The Windows security landscape has dramatically evolved in early 2025, marked by increasingly sophisticated attack vectors and Microsoft’s accelerated defensive innovations. February 2025 witnessed a … Read more Published Date: May 02, 2025 (1 hour, 47 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2025-29824 CVE-2025-0289

CVE-2025-3858 – WordPress Formality Plugin Stored Cross-Site Scripting Vulnerability

CVE ID : CVE-2025-3858 Published : May 2, 2025, 4:15 a.m. | 1 hour, 21 minutes ago Description : The Formality plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘align’ parameter in all versions up to, and including, 1.5.8 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, […]

CVE-2025-3748 – WordPress Taxonomy Chain Menu Stored Cross-Site Scripting

CVE ID : CVE-2025-3748 Published : May 2, 2025, 4:15 a.m. | 1 hour, 21 minutes ago Description : The Taxonomy Chain Menu plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin’s pn_chain_menu shortcode in all versions up to, and including, 1.0.8 due to insufficient input sanitization and output escaping on user supplied attributes. […]

CVE-2025-3709 – Agentflow from Flowring Technology Account Lockout Bypass Vulnerability

The following table lists the changes that have been made to the CVE-2025-3709 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 02, 2025 Action […]

CVE-2025-3708 – Le-Yan Le-Show Medical SQL Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-3708 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 02, 2025 Action […]