Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-66232

Publication date:
26/11/2025
Rejected reason: Not used
Severity CVSS v4.0: Pending analysis
Last modification:
26/11/2025

CVE-2025-66233

Publication date:
26/11/2025
Rejected reason: Not used
Severity CVSS v4.0: Pending analysis
Last modification:
26/11/2025

CVE-2025-66234

Publication date:
26/11/2025
Rejected reason: Not used
Severity CVSS v4.0: Pending analysis
Last modification:
26/11/2025

CVE-2025-66235

Publication date:
26/11/2025
Rejected reason: Not used
Severity CVSS v4.0: Pending analysis
Last modification:
26/11/2025

CVE-2025-66228

Publication date:
26/11/2025
Rejected reason: Not used
Severity CVSS v4.0: Pending analysis
Last modification:
26/11/2025

CVE-2025-66026

Publication date:
26/11/2025
REDAXO is a PHP-based CMS. Prior to version 5.20.1, a reflected Cross-Site Scripting (XSS) vulnerability exists in the Mediapool view where the request parameter args[types] is rendered into an info banner without HTML-escaping. This allows arbitrary JavaScript execution in the backend context when an authenticated user visits a crafted link while logged in. This issue has been patched in version 5.20.1.
Severity CVSS v4.0: Pending analysis
Last modification:
26/11/2025

CVE-2025-66025

Publication date:
26/11/2025
Caido is a web security auditing toolkit. Prior to version 0.53.0, the Markdown renderer used in Caido’s Findings page improperly handled user-supplied Markdown, allowing attacker-controlled links to be rendered without confirmation. When a user opened a finding generated through the scanner, or other plugins, clicking these injected links could redirect the Caido application to an attacker-controlled domain, enabling phishing style attacks. This issue has been patched in version 0.53.0.
Severity CVSS v4.0: Pending analysis
Last modification:
26/11/2025

CVE-2025-66022

Publication date:
26/11/2025
FACTION is a PenTesting Report Generation and Collaboration Framework. Prior to version 1.7.1, an extension execution path in Faction’s extension framework permits untrusted extension code to execute arbitrary system commands on the server when a lifecycle hook is invoked, resulting in remote code execution (RCE) on the host running Faction. Due to a missing authentication check on the /portal/AppStoreDashboard endpoint, an attacker can access the extension management UI and upload a malicious extension without any authentication, making this vulnerability exploitable by unauthenticated users. This issue has been patched in version 1.7.1.
Severity CVSS v4.0: Pending analysis
Last modification:
26/11/2025

CVE-2025-66269

Publication date:
26/11/2025
The RupsMon and USBMate services in UPSilon 2000 run with SYSTEM privileges and contain unquoted service paths. This allows a local attacker to perform path interception and escalate privileges if they have write permissions to the directories proceeding that of which the real service executables live in
Severity CVSS v4.0: HIGH
Last modification:
26/11/2025

CVE-2025-66021

Publication date:
26/11/2025
OWASP Java HTML Sanitizer is a configureable HTML Sanitizer written in Java, allowing inclusion of HTML authored by third-parties in web applications while protecting against XSS. In version 20240325.1, OWASP java html sanitizer is vulnerable to XSS if HtmlPolicyBuilder allows noscript and style tags with allowTextIn inside the style tag. This could lead to XSS if the payload is crafted in such a way that it does not sanitise the CSS and allows tags which is not mentioned in HTML policy. At time of publication no known patch is available.
Severity CVSS v4.0: HIGH
Last modification:
26/11/2025

CVE-2025-66020

Publication date:
26/11/2025
Valibot helps validate data using a schema. In versions from 0.31.0 to 1.1.0, the EMOJI_REGEX used in the emoji action is vulnerable to a Regular Expression Denial of Service (ReDoS) attack. A short, maliciously crafted string (e.g.,
Severity CVSS v4.0: Pending analysis
Last modification:
26/11/2025

CVE-2025-66266

Publication date:
26/11/2025
The RupsMon.exe service executable in UPSilon 2000 has insecure permissions, allowing the 'Everyone' group Full Control. A local attacker can replace the executable with a malicious binary to execute code with SYSTEM privileges or simply change the config path of the service to a command; starting and stopping the service to immediately achieve code execution and privilege escalation
Severity CVSS v4.0: CRITICAL
Last modification:
26/11/2025