Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2026-0574

Publication date:
04/01/2026
A weakness has been identified in yeqifu warehouse up to aaf29962ba407d22d991781de28796ee7b4670e4. This affects the function saveUserRole of the file warehouse\src\main\java\com\yeqifu\sys\controller\UserController.java of the component Request Handler. This manipulation causes improper authorization. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be used for attacks. This product adopts a rolling release strategy to maintain continuous delivery. Therefore, version details for affected or updated releases cannot be specified.
Severity CVSS v4.0: MEDIUM
Last modification:
17/02/2026

CVE-2025-3660

Publication date:
04/01/2026
Petlibro Smart Pet Feeder Platform versions up to 1.7.31 contains a broken access control vulnerability that allows authenticated users to access other users' pet data by exploiting missing ownership verification. Attackers can send requests to /member/pet/detailV2 with arbitrary pet IDs to retrieve sensitive information including pet details, member IDs, and avatar URLs without proper authorization checks.
Severity CVSS v4.0: MEDIUM
Last modification:
03/02/2026

CVE-2025-3654

Publication date:
04/01/2026
Petlibro Smart Pet Feeder Platform versions up to 1.7.31 contains an information disclosure vulnerability that allows unauthorized access to device hardware information by exploiting insecure API endpoints. Attackers can retrieve device serial numbers and MAC addresses through /device/devicePetRelation/getBoundDevices using pet IDs, enabling full device control without proper authorization checks.
Severity CVSS v4.0: MEDIUM
Last modification:
03/02/2026

CVE-2025-3653

Publication date:
04/01/2026
Petlibro Smart Pet Feeder Platform versions up to 1.7.31 contains an improper access control vulnerability that allows unauthorized device manipulation by accepting arbitrary serial numbers without ownership verification. Attackers can control any device by sending serial numbers to device control APIs to change feeding schedules, trigger manual feeds, access camera feeds, and modify device settings without authorization checks.
Severity CVSS v4.0: MEDIUM
Last modification:
03/02/2026

CVE-2025-3652

Publication date:
04/01/2026
Petlibro Smart Pet Feeder Platform versions up to 1.7.31 contains an information disclosure vulnerability that allows unauthorized access to private audio recordings by exploiting sequential audio IDs and insecure assignment endpoints. Attackers can send requests to /device/deviceAudio/use with arbitrary audio IDs to assign recordings to any device, then retrieve audio URLs to access other users' private recordings.
Severity CVSS v4.0: MEDIUM
Last modification:
03/02/2026

CVE-2025-3646

Publication date:
04/01/2026
Petlibro Smart Pet Feeder Platform versions up to 1.7.31 contains an authorization bypass vulnerability that allows unauthorized users to add users as shared owners to any device by exploiting missing permission checks. Attackers can send requests to the device share API to gain unauthorized access to devices and view owner information without proper authorization validation.
Severity CVSS v4.0: MEDIUM
Last modification:
03/02/2026

CVE-2025-15115

Publication date:
04/01/2026
Petlibro Smart Pet Feeder Platform versions up to 1.7.31 contains an authentication bypass vulnerability that allows unauthenticated attackers to access any user account by exploiting OAuth token validation flaws in the social login system. Attackers can send requests to /member/auth/thirdLogin with arbitrary Google IDs and phoneBrand parameters to obtain full session tokens and account access without proper OAuth verification.
Severity CVSS v4.0: MEDIUM
Last modification:
03/02/2026

CVE-2026-21645

Publication date:
03/01/2026
Rejected reason: Not used
Severity CVSS v4.0: Pending analysis
Last modification:
03/01/2026

CVE-2026-21646

Publication date:
03/01/2026
Rejected reason: Not used
Severity CVSS v4.0: Pending analysis
Last modification:
03/01/2026

CVE-2026-21647

Publication date:
03/01/2026
Rejected reason: Not used
Severity CVSS v4.0: Pending analysis
Last modification:
03/01/2026

CVE-2026-21648

Publication date:
03/01/2026
Rejected reason: Not used
Severity CVSS v4.0: Pending analysis
Last modification:
03/01/2026

CVE-2026-21649

Publication date:
03/01/2026
Rejected reason: Not used
Severity CVSS v4.0: Pending analysis
Last modification:
03/01/2026