Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-64368

Publication date:
31/10/2025
Cross-Site Request Forgery (CSRF) vulnerability in Mikado-Themes Bard bardwp allows Cross Site Request Forgery.This issue affects Bard: from n/a through
Severity CVSS v4.0: Pending analysis
Last modification:
13/11/2025

CVE-2025-64357

Publication date:
31/10/2025
Cross-Site Request Forgery (CSRF) vulnerability in Younes JFR. Advanced Database Cleaner advanced-database-cleaner allows Cross Site Request Forgery.This issue affects Advanced Database Cleaner: from n/a through
Severity CVSS v4.0: Pending analysis
Last modification:
13/11/2025

CVE-2025-64358

Publication date:
31/10/2025
Missing Authorization vulnerability in WebToffee Smart Coupons for WooCommerce wt-smart-coupons-for-woocommerce allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Smart Coupons for WooCommerce: from n/a through
Severity CVSS v4.0: Pending analysis
Last modification:
13/11/2025

CVE-2025-64359

Publication date:
31/10/2025
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in StylemixThemes Consulting consulting allows PHP Local File Inclusion.This issue affects Consulting: from n/a through
Severity CVSS v4.0: Pending analysis
Last modification:
13/11/2025

CVE-2025-64360

Publication date:
31/10/2025
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in StylemixThemes Consulting Elementor Widgets consulting-elementor-widgets allows PHP Local File Inclusion.This issue affects Consulting Elementor Widgets: from n/a through
Severity CVSS v4.0: Pending analysis
Last modification:
13/11/2025

CVE-2025-64361

Publication date:
31/10/2025
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in StylemixThemes Consulting Elementor Widgets consulting-elementor-widgets allows DOM-Based XSS.This issue affects Consulting Elementor Widgets: from n/a through
Severity CVSS v4.0: Pending analysis
Last modification:
13/11/2025

CVE-2025-64362

Publication date:
31/10/2025
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in SeventhQueen K Elements k-elements allows DOM-Based XSS.This issue affects K Elements: from n/a through
Severity CVSS v4.0: Pending analysis
Last modification:
13/11/2025

CVE-2025-64363

Publication date:
31/10/2025
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in SeventhQueen Kleo kleo allows PHP Local File Inclusion.This issue affects Kleo: from n/a through
Severity CVSS v4.0: Pending analysis
Last modification:
13/11/2025

CVE-2025-64364

Publication date:
31/10/2025
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in StylemixThemes Masterstudy masterstudy allows PHP Local File Inclusion.This issue affects Masterstudy: from n/a through
Severity CVSS v4.0: Pending analysis
Last modification:
13/11/2025

CVE-2025-58148

Publication date:
31/10/2025
[This CNA information record relates to multiple CVEs; the<br /> text explains which aspects/vulnerabilities correspond to which CVE.]<br /> <br /> Some Viridian hypercalls can specify a mask of vCPU IDs as an input, in<br /> one of three formats. Xen has boundary checking bugs with all three<br /> formats, which can cause out-of-bounds reads and writes while processing<br /> the inputs.<br /> <br /> * CVE-2025-58147. Hypercalls using the HV_VP_SET Sparse format can<br /> cause vpmask_set() to write out of bounds when converting the bitmap<br /> to Xen&amp;#39;s format.<br /> <br /> * CVE-2025-58148. Hypercalls using any input format can cause<br /> send_ipi() to read d-&gt;vcpu[] out-of-bounds, and operate on a wild<br /> vCPU pointer.
Severity CVSS v4.0: Pending analysis
Last modification:
04/11/2025

CVE-2025-58149

Publication date:
31/10/2025
When passing through PCI devices, the detach logic in libxl won&amp;#39;t remove<br /> access permissions to any 64bit memory BARs the device might have. As a<br /> result a domain can still have access any 64bit memory BAR when such<br /> device is no longer assigned to the domain.<br /> <br /> For PV domains the permission leak allows the domain itself to map the memory<br /> in the page-tables. For HVM it would require a compromised device model or<br /> stubdomain to map the leaked memory into the HVM domain p2m.
Severity CVSS v4.0: Pending analysis
Last modification:
04/11/2025

CVE-2025-64350

Publication date:
31/10/2025
Missing Authorization vulnerability in Rank Math SEO Rank Math SEO seo-by-rank-math allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Rank Math SEO: from n/a through
Severity CVSS v4.0: Pending analysis
Last modification:
13/11/2025