Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-43808

Publication date:
19/09/2025
The Commerce component in Liferay Portal 7.3.0 through 7.4.3.112, and Liferay DXP 2023.Q4.0 through 2023.Q4.8, 2023.Q3.1 through 2023.Q3.10, 7.4 GA through update 92, and 7.3 service pack 3 through update 35 saves virtual products uploaded to Documents and Media with guest view permission, which allows remote attackers to access and download virtual products for free via a crafted URL.
Severity CVSS v4.0: MEDIUM
Last modification:
22/09/2025

CVE-2025-57396

Publication date:
19/09/2025
Tandoor Recipes 2.0.0-alpha-1, fixed in 2.0.0-alpha-2, is vulnerable to privilege escalation. This is due to the rework of the API, which resulted in the User Profile API Endpoint containing two boolean values indicating whether a user is staff or administrative. Consequently, any user can escalate their privileges to the highest level.
Severity CVSS v4.0: Pending analysis
Last modification:
22/09/2025

CVE-2025-59431

Publication date:
19/09/2025
MapServer is a system for developing web-based GIS applications. Prior to 8.4.1, the XML Filter Query directive PropertyName is vulnerably to Boolean-based SQL injection. It seems like expression checking is bypassed by introducing double quote characters in the PropertyName. Allowing to manipulate backend database queries. This vulnerability is fixed in 8.4.1.
Severity CVSS v4.0: HIGH
Last modification:
22/09/2025

CVE-2025-59689

Publication date:
19/09/2025
Libraesva ESG 4.5 through 5.5.x before 5.5.7 allows command injection via a compressed e-mail attachment. For ESG 5.0 a fix has been released in 5.0.31. For ESG 5.1 a fix has been released in 5.1.20. For ESG 5.2 a fix has been released in 5.2.31. For ESG 5.4 a fix has been released in 5.4.8. For ESG 5.5. a fix has been released in 5.5.7.
Severity CVSS v4.0: Pending analysis
Last modification:
22/09/2025

CVE-2025-9079

Publication date:
19/09/2025
Mattermost versions 10.8.x
Severity CVSS v4.0: Pending analysis
Last modification:
22/09/2025

CVE-2025-9081

Publication date:
19/09/2025
Mattermost versions 10.5.x
Severity CVSS v4.0: Pending analysis
Last modification:
22/09/2025

CVE-2025-43809

Publication date:
19/09/2025
Cross-Site Request Forgery (CSRF) vulnerability in the server (license) registration page in Liferay Portal 7.4.0 through 7.4.3.111, and older unsupported versions, and Liferay DXP 2023.Q4.0 through 2023.Q4.7, 2023.Q3.1 through 2023.Q3.9, 7.4 GA through update 92, and older unsupported versions allows remote attackers to register a server license via the 'orderUuid' parameter.
Severity CVSS v4.0: MEDIUM
Last modification:
22/09/2025

CVE-2025-52159

Publication date:
19/09/2025
Hardcoded credentials in default configuration of PPress 0.0.9.
Severity CVSS v4.0: Pending analysis
Last modification:
22/09/2025

CVE-2025-54761

Publication date:
19/09/2025
An issue was discovered in PPress 0.0.9 allowing attackers to gain escilated privlidges via crafted session cookie.
Severity CVSS v4.0: Pending analysis
Last modification:
22/09/2025

CVE-2025-54815

Publication date:
19/09/2025
Server-side template injection (SSTI) vulnerability in PPress 0.0.9 allows attackers to execute arbitrary code via crafted themes.
Severity CVSS v4.0: Pending analysis
Last modification:
22/09/2025

CVE-2025-56762

Publication date:
19/09/2025
Paracrawl KeOPs v2 is vulnerable to Cross Site Scripting (XSS) in error.php.
Severity CVSS v4.0: Pending analysis
Last modification:
22/09/2025

CVE-2025-10568

Publication date:
19/09/2025
HyperX NGENUITY software is potentially vulnerable to arbitrary code execution. HP is releasing updated software to address the potential vulnerability.
Severity CVSS v4.0: MEDIUM
Last modification:
22/09/2025