CVE-2025-7725 – WordPress OpenAI Plugin Stored Cross-Site Scripting Vulnerability
CVE ID : CVE-2025-7725 Published : Aug. 1, 2025, 5:15 a.m. | 1 hour, 1 minute ago Description : The Photos, Files, YouTube, Twitter, Instagram, TikTok, Ecommerce Contest Gallery – Upload, Vote, Sell via PayPal or Stripe, Social Share Buttons, OpenAI plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the comment feature in all versions […]
CVE-2025-7443 – BerqWP Arbitrary File Upload Vulnerability
CVE ID : CVE-2025-7443 Published : Aug. 1, 2025, 5:15 a.m. | 1 hour, 1 minute ago Description : The BerqWP – Automated All-In-One Page Speed Optimization for Core Web Vitals, Cache, CDN, Images, CSS, and JavaScript plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation via the store_javascript_cache.php file in […]
CVE-2025-7845 – Stratum Elementor Widgets Stored Cross-Site Scripting Vulnerability
CVE ID : CVE-2025-7845 Published : Aug. 1, 2025, 5:15 a.m. | 1 hour, 1 minute ago Description : The Stratum – Elementor Widgets plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin’s Advanced Google Maps and Image Hotspot widgets in all versions up to, and including, 1.6.0 due to insufficient input sanitization and […]
CVE-2025-4523 – IDonate WordPress Plugin Unauthorized Data Access Vulnerability
CVE ID : CVE-2025-4523 Published : Aug. 1, 2025, 5:15 a.m. | 1 hour, 1 minute ago Description : The IDonate – Blood Donation, Request And Donor Management System plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the admin_donor_profile_view() function in versions 2.0.0 to 2.1.9. This makes it […]
CVE-2025-8434 – Apache Code-projects Online Movie Streaming Remote File Inclusion Vulnerability
The following table lists the changes that have been made to the CVE-2025-8434 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 01, 2025 Action […]
CVE-2025-8433 – Dell Document Management System Path Traversal Vulnerability
The following table lists the changes that have been made to the CVE-2025-8433 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 01, 2025 Action […]
CVE-2025-5947 – WordPress Service Finder Bookings Privilege Escalation
The following table lists the changes that have been made to the CVE-2025-5947 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 01, 2025 Action […]
CVE-2025-54847 – Apache HTTP Server Cross-Site Request Forgery
The following table lists the changes that have been made to the CVE-2025-54847 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. CVE Rejected by [email protected] Aug. 01, 2025 Action Type […]
CVE-2025-54846 – Apache HTTP Server HTTP Request Smuggling
The following table lists the changes that have been made to the CVE-2025-54846 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. CVE Rejected by [email protected] Aug. 01, 2025 Action Type […]
CVE-2025-54845 – Adobe Flash Memory Corruption Vulnerability
The following table lists the changes that have been made to the CVE-2025-54845 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. CVE Rejected by [email protected] Aug. 01, 2025 Action Type […]