Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-6670

Publication date:
18/11/2025
A Cross-Site Request Forgery (CSRF) vulnerability exists in multiple WSO2 products due to the use of the HTTP GET method for state-changing operations within admin services, specifically in the event processor of the Carbon console. Although the SameSite=Lax cookie attribute is used as a mitigation, it is ineffective in this context because it allows cookies to be sent with cross-origin top-level navigations using GET requests.<br /> <br /> A malicious actor can exploit this vulnerability by tricking an authenticated user into visiting a crafted link, leading the browser to issue unintended state-changing requests. Successful exploitation could result in unauthorized operations such as data modification, account changes, or other administrative actions. According to WSO2 Secure Production Guidelines, exposure of Carbon console services to untrusted networks is discouraged, which may reduce the impact in properly secured deployments.
Severity CVSS v4.0: Pending analysis
Last modification:
18/11/2025

CVE-2025-13344

Publication date:
18/11/2025
A weakness has been identified in SourceCodester Train Station Ticketing System 1.0. Affected by this vulnerability is an unknown functionality of the file /ajax.php?action=login. This manipulation of the argument Username causes sql injection. The attack can be initiated remotely. The exploit has been made available to the public and could be exploited.
Severity CVSS v4.0: MEDIUM
Last modification:
18/11/2025

CVE-2025-13345

Publication date:
18/11/2025
A security vulnerability has been detected in SourceCodester Train Station Ticketing System 1.0. Affected by this issue is some unknown functionality of the file /ajax.php?action=save_ticket. Such manipulation leads to sql injection. The attack can be launched remotely. The exploit has been disclosed publicly and may be used.
Severity CVSS v4.0: MEDIUM
Last modification:
18/11/2025

CVE-2025-41348

Publication date:
18/11/2025
SQL injection vulnerability in WinPlus v24.11.27 by Informática del Este. This vulnerability allows an attacker recover, create, update an delete databases by sendng a POST request using the parameters &amp;#39;val1&amp;#39; and &amp;#39;cont in &amp;#39;/WinplusPortal/ws/sWinplus.svc/json/getacumper_post&amp;#39;.
Severity CVSS v4.0: HIGH
Last modification:
18/11/2025

CVE-2025-41349

Publication date:
18/11/2025
Stored Cross-site Scripting (XSS)vylnerability type in WinPlus v24.11.27 byInformática del Este that consist of an stored XSS of a stored XSS due to a lack of proper validation of user input by sending a POST request using the &amp;#39;descripcion&amp;#39; parameter in &amp;#39;/WinplusPortal/ws/sWinplus. svc/json/savesolpla_post&amp;#39;. This vulnerability could allow a remote user to send a specially crafted query to an authenticated user and steal their cookie session details.
Severity CVSS v4.0: MEDIUM
Last modification:
18/11/2025

CVE-2025-13343

Publication date:
18/11/2025
A security flaw has been discovered in SourceCodester Interview Management System 1.0. Affected is an unknown function of the file /editQuestion.php. The manipulation of the argument Question results in cross site scripting. It is possible to launch the attack remotely. The exploit has been released to the public and may be exploited.
Severity CVSS v4.0: MEDIUM
Last modification:
18/11/2025

CVE-2025-41735

Publication date:
18/11/2025
A low privileged remote attacker can upload any file to an arbitrary location due to missing file check resulting in remote code execution.
Severity CVSS v4.0: Pending analysis
Last modification:
18/11/2025

CVE-2025-41736

Publication date:
18/11/2025
A low privileged remote attacker can upload a new or overwrite an existing python script by using a path traversal of the target filename in php resulting in a remote code execution.
Severity CVSS v4.0: Pending analysis
Last modification:
18/11/2025

CVE-2025-41737

Publication date:
18/11/2025
Due to webserver misconfiguration an unauthenticated remote attacker is able to read the source of php modules.
Severity CVSS v4.0: Pending analysis
Last modification:
18/11/2025

CVE-2025-41347

Publication date:
18/11/2025
Unlimited upload vulnerability for dangerous file types in WinPlus v24.11.27 from Informática del Este. This vulnerability allows an attacker to upload a &amp;#39;webshell&amp;#39; by sending a POST request to &amp;#39;/WinplusPortal/ws/sWinplus.svc/json/uploadfile&amp;#39;.
Severity CVSS v4.0: HIGH
Last modification:
18/11/2025

CVE-2025-41733

Publication date:
18/11/2025
The commissioning wizard on the affected devices does not validate if the device is already initialized. An unauthenticated remote attacker can construct POST requests to set root credentials.
Severity CVSS v4.0: Pending analysis
Last modification:
18/11/2025

CVE-2025-41734

Publication date:
18/11/2025
An unauthenticated remote attacker can execute arbitrary php files and gain full access of the affected devices.
Severity CVSS v4.0: Pending analysis
Last modification:
18/11/2025