Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-14430

Publication date:
08/01/2026
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeMove Brook - Agency Business Creative brook allows PHP Local File Inclusion.This issue affects Brook - Agency Business Creative: from n/a through
Severity CVSS v4.0: Pending analysis
Last modification:
08/01/2026

CVE-2025-14431

Publication date:
08/01/2026
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in THEMELOGI Navian navian allows PHP Local File Inclusion.This issue affects Navian: from n/a through
Severity CVSS v4.0: Pending analysis
Last modification:
08/01/2026

CVE-2025-14984

Publication date:
08/01/2026
The Gutenverse Form plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG file upload in all versions up to, and including, 2.3.2. This is due to the plugin's framework component adding SVG to the allowed MIME types via the upload_mimes filter without implementing any sanitization of SVG file contents. This makes it possible for authenticated attackers, with Author-level access and above, to upload SVG files containing malicious JavaScript that executes when the file is viewed, leading to arbitrary JavaScript execution in victims' browsers.
Severity CVSS v4.0: Pending analysis
Last modification:
08/01/2026

CVE-2025-14524

Publication date:
08/01/2026
When an OAuth2 bearer token is used for an HTTP(S) transfer, and that transfer<br /> performs a cross-protocol redirect to a second URL that uses an IMAP, LDAP,<br /> POP3 or SMTP scheme, curl might wrongly pass on the bearer token to the new<br /> target host.
Severity CVSS v4.0: Pending analysis
Last modification:
08/01/2026

CVE-2025-14819

Publication date:
08/01/2026
When doing TLS related transfers with reused easy or multi handles and<br /> altering the `CURLSSLOPT_NO_PARTIALCHAIN` option, libcurl could accidentally<br /> reuse a CA store cached in memory for which the partial chain option was<br /> reversed. Contrary to the user&amp;#39;s wishes and expectations. This could make<br /> libcurl find and accept a trust chain that it otherwise would not.
Severity CVSS v4.0: Pending analysis
Last modification:
08/01/2026

CVE-2025-12550

Publication date:
08/01/2026
Improper Control of Filename for Include/Require Statement in PHP Program (&amp;#39;PHP Remote File Inclusion&amp;#39;) vulnerability in jwsthemes OchaHouse ochahouse allows PHP Local File Inclusion.This issue affects OchaHouse: from n/a through
Severity CVSS v4.0: Pending analysis
Last modification:
08/01/2026

CVE-2025-12551

Publication date:
08/01/2026
Improper Neutralization of Input During Web Page Generation (&amp;#39;Cross-site Scripting&amp;#39;) vulnerability in e-plugins ListingHub listinghub allows Reflected XSS.This issue affects ListingHub: from n/a through 1.2.6.
Severity CVSS v4.0: Pending analysis
Last modification:
08/01/2026

CVE-2025-13504

Publication date:
08/01/2026
Improper Neutralization of Input During Web Page Generation (&amp;#39;Cross-site Scripting&amp;#39;) vulnerability in e-plugins Real Estate Pro real-estate-pro allows Reflected XSS.This issue affects Real Estate Pro: from n/a through
Severity CVSS v4.0: Pending analysis
Last modification:
08/01/2026

CVE-2025-14358

Publication date:
08/01/2026
Missing Authorization vulnerability in sizam REHub Framework rehub-framework allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects REHub Framework: from n/a through
Severity CVSS v4.0: Pending analysis
Last modification:
08/01/2026

CVE-2025-14359

Publication date:
08/01/2026
Improper Control of Filename for Include/Require Statement in PHP Program (&amp;#39;PHP Remote File Inclusion&amp;#39;) vulnerability in brandexponents Oshine oshin allows PHP Local File Inclusion.This issue affects Oshine: from n/a through
Severity CVSS v4.0: Pending analysis
Last modification:
08/01/2026

CVE-2025-14017

Publication date:
08/01/2026
When doing multi-threaded LDAPS transfers (LDAP over TLS) with libcurl,<br /> changing TLS options in one thread would inadvertently change them globally<br /> and therefore possibly also affect other concurrently setup transfers.<br /> <br /> Disabling certificate verification for a specific transfer could<br /> unintentionally disable the feature for other threads as well.
Severity CVSS v4.0: Pending analysis
Last modification:
08/01/2026

CVE-2025-13034

Publication date:
08/01/2026
When using `CURLOPT_PINNEDPUBLICKEY` option with libcurl or `--pinnedpubkey`<br /> with the curl tool,curl should check the public key of the server certificate<br /> to verify the peer.<br /> <br /> This check was skipped in a certain condition that would then make curl allow<br /> the connection without performing the proper check, thus not noticing a<br /> possible impostor. To skip this check, the connection had to be done with QUIC<br /> with ngtcp2 built to use GnuTLS and the user had to explicitly disable the<br /> standard certificate verification.
Severity CVSS v4.0: Pending analysis
Last modification:
08/01/2026