CVE-2025-9441 – WordPress iATS Online Forms SQL Injection

CVE ID : CVE-2025-9441 Published : Aug. 29, 2025, 5:15 a.m. | 1 hour, 24 minutes ago Description : The iATS Online Forms plugin for WordPress is vulnerable to time-based SQL Injection via the ‘order’ parameter in all versions up to, and including, 1.2 due to insufficient escaping on the user supplied parameter and lack of sufficient […]

CVE-2025-9374 – “Ultimate Tag Warrior Importer CSRF”

CVE ID : CVE-2025-9374 Published : Aug. 29, 2025, 5:15 a.m. | 1 hour, 24 minutes ago Description : The Ultimate Tag Warrior Importer plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 0.2. This is due to missing or incorrect nonce validation on a function. This makes it possible […]

CVE-2025-8619 – Elementor OSM Map Widget Stored Cross-Site Scripting Vulnerability

CVE ID : CVE-2025-8619 Published : Aug. 29, 2025, 5:15 a.m. | 1 hour, 24 minutes ago Description : The OSM Map Widget for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin’s Map Block URL in all versions up to, and including, 1.3.0 due to insufficient input sanitization and output escaping on […]

CVE-2025-8290 – WordPress List Subpages Stored Cross-Site Scripting Vulnerability

CVE ID : CVE-2025-8290 Published : Aug. 29, 2025, 5:15 a.m. | 1 hour, 24 minutes ago Description : The List Subpages plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘title’ parameter in all versions up to, and including, 1.0.6 due to insufficient input sanitization and output escaping. This makes it possible for authenticated […]

CVE-2025-53507 – iND Co.,Ltd iND Product Sensitive Information Disclosure

Multiple products provided by iND Co.,Ltd contain an insecure storage of sensitive information vulnerability. If exploited, configuration information, such as admin password, may be disclosed. As for the details of affected product names and versions, refer to the information under [Product Status].

CVE-2025-53508 – iND Co.,Ltd iND Command Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-53508 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 29, 2025 Action […]

CVE-2025-8147 – WordPress LWSCache Plugin Authorization Bypass

CVE ID : CVE-2025-8147 Published : Aug. 29, 2025, 5:15 a.m. | 1 hour, 24 minutes ago Description : The LWSCache plugin for WordPress is vulnerable to unauthorized modification of data due to improper authorization on the lwscache_activatePlugin() function in all versions up to, and including, 2.8.5. This makes it possible for authenticated attackers, with Subscriber-level access […]

CVE-2025-9639 – Ai3 QbiCRMGateway Arbitrary File Reading Vulnerability

The following table lists the changes that have been made to the CVE-2025-9639 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 29, 2025 Action […]

CVE-2025-9619 – Mercatus ERP Remote Resource ID Manipulation Vulnerability

The following table lists the changes that have been made to the CVE-2025-9619 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 29, 2025 Action […]

CVE-2025-9610 – Code-projects Online Event Judging System SQL Injection

The following table lists the changes that have been made to the CVE-2025-9610 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 29, 2025 Action […]