Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-64408

Publication date:
19/11/2025
Apache Causeway faces Java deserialization vulnerabilities that allow remote code execution (RCE) through user-controllable URL parameters. These vulnerabilities affect all applications using Causeway&amp;#39;s ViewModel functionality and can be exploited by authenticated attackers to execute arbitrary code with application privileges. <br /> <br /> This issue affects all current versions.<br /> <br /> Users are recommended to upgrade to version 3.5.0, which fixes the issue.
Severity CVSS v4.0: Pending analysis
Last modification:
19/11/2025

CVE-2025-12472

Publication date:
19/11/2025
An attacker with a Looker Developer role could manipulate a LookML project to exploit a race condition during Git directory deletion, leading to arbitrary command execution on the Looker instance.<br /> <br /> <br /> <br /> Looker-hosted and Self-hosted were found to be vulnerable.<br /> This issue has already been mitigated for Looker-hosted instances. No user action is required for these.<br /> <br /> <br /> Self-hosted instances must be upgraded as soon as possible. This vulnerability has been patched in all supported versions of Self-hosted.<br /> The versions below have all been updated to protect from this vulnerability. You can download these versions at the Looker download page https://download.looker.com/ :<br /> * 24.12.103+<br /> * 24.18.195+<br /> * 25.0.72+<br /> * 25.6.60+<br /> * 25.8.42+<br /> * 25.10.22+
Severity CVSS v4.0: HIGH
Last modification:
19/11/2025

CVE-2025-11230

Publication date:
19/11/2025
Inefficient algorithm complexity in mjson in HAProxy allows remote attackers to cause a denial of service via specially crafted JSON requests.
Severity CVSS v4.0: Pending analysis
Last modification:
19/11/2025

CVE-2025-58412

Publication date:
19/11/2025
A improper neutralization of script-related html tags in a web page (basic xss) vulnerability in Fortinet FortiADC 8.0.0, FortiADC 7.6.0 through 7.6.3, FortiADC 7.4 all versions, FortiADC 7.2 all versions may allow attacker to execute unauthorized code or commands via crafted URL.
Severity CVSS v4.0: Pending analysis
Last modification:
20/11/2025

CVE-2025-0351

Publication date:
19/11/2025
Rejected reason: Voluntarily withdrawn
Severity CVSS v4.0: Pending analysis
Last modification:
19/11/2025

CVE-2025-11446

Publication date:
19/11/2025
Insertion of Sensitive Information into Log File vulnerability in upKeeper Solutions upKeeper Manager allows Use of Known Domain Credentials.This issue affects upKeeper Manager: from 5.2.0 before 5.2.12.
Severity CVSS v4.0: HIGH
Last modification:
19/11/2025

CVE-2025-13206

Publication date:
19/11/2025
The GiveWP – Donation Plugin and Fundraising Platform plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘name’ parameter in all versions up to, and including, 4.13.0 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. Avatars must be enabled in the WordPress install in order to exploit the vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
19/11/2025

CVE-2025-12484

Publication date:
19/11/2025
The Giveaways and Contests by RafflePress – Get More Website Traffic, Email Subscribers, and Social Followers plugin for WordPress is vulnerable to Stored Cross-Site Scripting via multiple social media username parameters in all versions up to, and including, 1.12.19 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Severity CVSS v4.0: Pending analysis
Last modification:
19/11/2025

CVE-2025-13035

Publication date:
19/11/2025
The Code Snippets plugin for WordPress is vulnerable to PHP Code Injection in all versions up to, and including, 3.9.1. This is due to the plugin&amp;#39;s use of extract() on attacker-controlled shortcode attributes within the `evaluate_shortcode_from_flat_file` method, which can be used to overwrite the `$filepath` variable and subsequently passed to require_once. This makes it possible for authenticated attackers, with Contributor-level access and above, to execute arbitrary PHP code on the server via the `[code_snippet]` shortcode using PHP filter chains granted they can trick an administrator into enabling the "Enable file-based execution" setting and creating at least one active Content snippet.
Severity CVSS v4.0: Pending analysis
Last modification:
19/11/2025

CVE-2025-13085

Publication date:
19/11/2025
The SiteSEO – SEO Simplified plugin for WordPress is vulnerable to Improper Authorization leading to Sensitive Post Meta Disclosure in versions up to and including 1.3.2. This is due to missing object-level authorization checks in the resolve_variables() AJAX handler. This makes it possible for authenticated attackers with the siteseo_manage capability (e.g., Author-level users who have been granted SiteSEO access by an administrator) to read arbitrary post metadata from any post, page, attachment, or WooCommerce order they cannot edit, via the custom field variable resolution feature granted they have been given access to SiteSEO by an administrator and legacy storage is enabled. In affected WooCommerce installations, this exposes sensitive customer billing information including names, email addresses, phone numbers, physical addresses, and payment methods.
Severity CVSS v4.0: Pending analysis
Last modification:
19/11/2025

CVE-2025-12056

Publication date:
19/11/2025
Out-of-bounds Read in Shelly Pro 3EM (before v1.4.4) allows Overread Buffers.
Severity CVSS v4.0: HIGH
Last modification:
19/11/2025

CVE-2025-12535

Publication date:
19/11/2025
The SureForms plugin for WordPress is vulnerable to Cross-Site Request Forgery Bypass in all versions up to, and including, 1.13.1. This is due to the plugin distributing generic WordPress REST API nonces (wp_rest) to unauthenticated users via the &amp;#39;wp_ajax_nopriv_rest-nonce&amp;#39; action. While the plugin legitimately needs to support unauthenticated form submissions, it incorrectly uses generic REST nonces instead of form-specific nonces. This makes it possible for unauthenticated attackers to bypass CSRF protection on REST API endpoints that rely solely on nonce verification without additional authentication checks, allowing them to trigger unauthorized actions such as the plugin&amp;#39;s own post-submission hooks and potentially other plugins&amp;#39; REST endpoints.
Severity CVSS v4.0: Pending analysis
Last modification:
19/11/2025