Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-8749

Publication date:
08/08/2025
Path Traversal vulnerability in API Endpoint in Mobile Industrial Robots (MiR) Software Versions prior to 3.0.0 on MiR Robots allows authenticated users to extract files from the robot file system via a crafted API request.
Severity CVSS v4.0: Pending analysis
Last modification:
05/11/2025

CVE-2025-8748

Publication date:
08/08/2025
MiR software versions prior to version 3.0.0 are affected by a command injection vulnerability. A malicious <br /> HTTP request crafted by an authenticated user could allow the execution of arbitrary commands on the <br /> underlying operating system.
Severity CVSS v4.0: Pending analysis
Last modification:
05/11/2025

CVE-2025-53606

Publication date:
08/08/2025
Deserialization of Untrusted Data vulnerability in Apache Seata (incubating).<br /> <br /> This issue affects Apache Seata (incubating): 2.4.0.<br /> <br /> Users are recommended to upgrade to version 2.5.0, which fixes the issue.
Severity CVSS v4.0: Pending analysis
Last modification:
04/11/2025

CVE-2025-48913

Publication date:
08/08/2025
If untrusted users are allowed to configure JMS for Apache CXF, previously they could use RMI or LDAP URLs, potentially leading to code execution capabilities. This interface is now restricted to reject those protocols, removing this possibility.<br /> <br /> Users are recommended to upgrade to versions 3.6.8, 4.0.9 or 4.1.3, which fix this issue.
Severity CVSS v4.0: Pending analysis
Last modification:
04/11/2025

CVE-2025-6572

Publication date:
08/08/2025
The OpenStreetMap for Gutenberg and WPBakery Page Builder (formerly Visual Composer) WordPress plugin through 1.2.0 does not validate and escape some of its block options before outputting them back in a page/post where the block is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
Severity CVSS v4.0: Pending analysis
Last modification:
08/08/2025

CVE-2025-54940

Publication date:
08/08/2025
An HTML injection vulnerability exists in WordPress plugin "Advanced Custom Fields" prior to 6.4.3. If this vulnerability is exploited, crafted HTML code may be rendered and page display may be tampered.
Severity CVSS v4.0: MEDIUM
Last modification:
08/08/2025

CVE-2025-54958

Publication date:
08/08/2025
Powered BLUE 870 versions 0.20130927 and prior contain an OS command injection vulnerability. If this vulnerability is exploited, arbitrary OS commands may be executed on the affected product.
Severity CVSS v4.0: MEDIUM
Last modification:
08/08/2025

CVE-2025-54959

Publication date:
08/08/2025
Powered BLUE Server versions 0.20130927 and prior contain a path traversal vulnerability. If this vulnerability is exploited, an arbitrary file in the affected product may be disclosed.
Severity CVSS v4.0: MEDIUM
Last modification:
08/08/2025

CVE-2024-58257

Publication date:
08/08/2025
EnzoH has an OS command injection vulnerability. Successful exploitation of this vulnerability may lead to arbitrary command execution.
Severity CVSS v4.0: Pending analysis
Last modification:
08/08/2025

CVE-2024-58256

Publication date:
08/08/2025
EnzoH has an OS command injection vulnerability. Successful exploitation of this vulnerability may lead to arbitrary command execution.
Severity CVSS v4.0: Pending analysis
Last modification:
08/08/2025

CVE-2024-58255

Publication date:
08/08/2025
EnzoH has an OS command injection vulnerability. Successful exploitation of this vulnerability may lead to arbitrary command execution.
Severity CVSS v4.0: Pending analysis
Last modification:
08/08/2025

CVE-2025-8707

Publication date:
08/08/2025
A vulnerability was found in Huuge Box App 1.0.3 on Android. It has been classified as problematic. This affects an unknown part of the file AndroidManifest.xml of the component com.huuge.game.zjbox. The manipulation leads to improper export of android application components. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used.
Severity CVSS v4.0: MEDIUM
Last modification:
16/09/2025