Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-11743

Publication date:
20/01/2026
A denial-of-service security issue in the affected product. The security issue occurs when a malformed CIP forward open message is sent. This could result in a major nonrecoverable fault a restart is required to recover.
Severity CVSS v4.0: HIGH
Last modification:
20/01/2026

CVE-2026-1180

Publication date:
20/01/2026
A flaw was identified in Keycloak’s OpenID Connect Dynamic Client Registration feature when clients authenticate using private_key_jwt. The issue allows a client to specify an arbitrary jwks_uri, which Keycloak then retrieves without validating the destination. This enables attackers to coerce the Keycloak server into making HTTP requests to internal or restricted network resources. As a result, attackers can probe internal services and cloud metadata endpoints, creating an information disclosure and reconnaissance risk.
Severity CVSS v4.0: Pending analysis
Last modification:
20/01/2026

CVE-2026-1183

Publication date:
20/01/2026
HTML injection vulnerability in multiple Botble products such as TransP, Athena, Martfury, and Homzen, consisting of an HTML injection due to a lack of proper validation of user input by sending a request to '/search' using the 'q' parameter.
Severity CVSS v4.0: MEDIUM
Last modification:
20/01/2026

CVE-2025-41025

Publication date:
20/01/2026
Stored Cross-Site Scripting (XSS) in Poultry Farm Management System v1.0 due to the lack of proper validation of user input by sending a POST request. The relationship between parameters and assigned identifiers is as follows:  <br /> <br /> &amp;#39;category&amp;#39; y &amp;#39;product&amp;#39; parameters in &amp;#39;/farm/sell_product.php&amp;#39;.
Severity CVSS v4.0: MEDIUM
Last modification:
20/01/2026

CVE-2025-41081

Publication date:
20/01/2026
Reflected Cross-Site Scripting (XSS) vulnerability in IsMyGym by Zuinq Studio. This vulnerability allows an attacker to execute JavaScript code in the victim&amp;#39;s browser by sending them a malicious URL with &amp;#39;/.php/&amp;#39;. This vulnerability can be exploited to steal sensitive user data, such as session cookies, or to perform actions on behalf of the user.
Severity CVSS v4.0: MEDIUM
Last modification:
20/01/2026

CVE-2025-40644

Publication date:
20/01/2026
Reflected Cross-Site Scripting (XSS) vulnerability in Riftzilla&amp;#39;s QRGen. This vulnerability allows an attavker to execute JavaScript code in the victim&amp;#39;s browser by sending them a malicious URL using the &amp;#39;id&amp;#39; parameter in &amp;#39;/article.php&amp;#39;. This vulnerability can be exploited to steal sensitive user data, such as session cookies, or to perform actions on behalf of the user.
Severity CVSS v4.0: MEDIUM
Last modification:
20/01/2026

CVE-2025-40679

Publication date:
20/01/2026
HTML <br /> <br /> Injection vulnerability in Isshue by Bdtask, consisting os an HTML injection due to a lack os proper validation of user input by sending a POST request to &amp;#39;/category_product_search&amp;#39;, affecting the &amp;#39;product_name&amp;#39; parameter.
Severity CVSS v4.0: MEDIUM
Last modification:
20/01/2026

CVE-2025-41024

Publication date:
20/01/2026
Stored Cross-Site Scripting (XSS) in Poultry Farm Management System v1.0 due to the lack of proper validation of user input by sending a POST request. The relationship between parameters and assigned identifiers is as follows: <br /> <br /> &amp;#39;companyaddress&amp;#39;, &amp;#39;companyemail&amp;#39;, &amp;#39;companyname&amp;#39;, &amp;#39;country&amp;#39;, &amp;#39;mobilenumber&amp;#39; y &amp;#39;regno&amp;#39; parameters in &amp;#39;/farm/farmprofile.php&amp;#39;.
Severity CVSS v4.0: MEDIUM
Last modification:
20/01/2026

CVE-2025-14369

Publication date:
20/01/2026
dr_flac, an audio decoder within the dr_libs toolset, contains an integer overflow vulnerability flaw due to trusting the totalPCMFrameCount field from FLAC metadata before calculating buffer size, allowing an attacker with a specially crafted file to perform DoS against programs using the tool.
Severity CVSS v4.0: Pending analysis
Last modification:
20/01/2026

CVE-2025-14533

Publication date:
20/01/2026
The Advanced Custom Fields: Extended plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 0.9.2.1. This is due to the &amp;#39;insert_user&amp;#39; function not restricting the roles with which a user can register. This makes it possible for unauthenticated attackers to supply the &amp;#39;administrator&amp;#39; role during registration and gain administrator access to the site. Note: The vulnerability can only be exploited if &amp;#39;role&amp;#39; is mapped to the custom field.
Severity CVSS v4.0: Pending analysis
Last modification:
20/01/2026

CVE-2025-41084

Publication date:
20/01/2026
Stored Cross-Site Scripting (XSS) vulnerability in Sesame web application, due to the fact that uploaded SVG images are not properly sanitized. This allows attackers to embed malicious scripts in SVG files by sending a POST request using the &amp;#39;logo&amp;#39; parameter in &amp;#39;/api/v3/companies//logo&amp;#39;, which are then stored on the server and executed in the context of any user who accesses the compromised resource.
Severity CVSS v4.0: MEDIUM
Last modification:
20/01/2026

CVE-2025-41768

Publication date:
20/01/2026
On an instance of TwinCAT 3 HMI Server running on a device an authenticated administrator can inject arbitrary content into the custom CSS field which is persisted on the device and later returned via the login page and error page.
Severity CVSS v4.0: Pending analysis
Last modification:
20/01/2026