Instituto Nacional de ciberseguridad. Sección Incibe
Instituto Nacional de Ciberseguridad. Sección INCIBE-CERT

Vulnerabilidades

Con el objetivo de informar, advertir y ayudar a los profesionales sobre las ultimas vulnerabilidades de seguridad en sistemas tecnológicos, ponemos a disposición de los usuarios interesados en esta información una base de datos con información en castellano sobre cada una de las ultimas vulnerabilidades documentadas y conocidas.

Este repositorio con más de 75.000 registros esta basado en la información de NVD (National Vulnerability Database) – en función de un acuerdo de colaboración – por el cual desde INCIBE realizamos la traducción al castellano de la información incluida. En ocasiones este listado mostrará vulnerabilidades que aún no han sido traducidas debido a que se recogen en el transcurso del tiempo en el que el equipo de INCIBE realiza el proceso de traducción.

Se emplea el estándar de nomenclatura de vulnerabilidades CVE (Common Vulnerabilities and Exposures), con el fin de facilitar el intercambio de información entre diferentes bases de datos y herramientas. Cada una de las vulnerabilidades recogidas enlaza a diversas fuentes de información así como a parches disponibles o soluciones aportadas por los fabricantes y desarrolladores. Es posible realizar búsquedas avanzadas teniendo la opción de seleccionar diferentes criterios como el tipo de vulnerabilidad, fabricante, tipo de impacto entre otros, con el fin de acortar los resultados.

Mediante suscripción RSS o Boletines podemos estar informados diariamente de las ultimas vulnerabilidades incorporadas al repositorio.

CVE-2025-14249

Fecha de publicación:
08/12/2025
Idioma:
Inglés
*** Pendiente de traducción *** A security flaw has been discovered in code-projects Online Ordering System 1.0. The affected element is an unknown function of the file /user_school.php. The manipulation of the argument product_id results in sql injection. The attack may be performed from remote. The exploit has been released to the public and may be exploited.
Gravedad CVSS v4.0: MEDIA
Última modificación:
08/12/2025

CVE-2025-14247

Fecha de publicación:
08/12/2025
Idioma:
Inglés
*** Pendiente de traducción *** A vulnerability was determined in code-projects Simple Shopping Cart 1.0. This issue affects some unknown processing of the file /Admin/additems.php. Executing manipulation of the argument item_name can lead to sql injection. The attack can be executed remotely. The exploit has been publicly disclosed and may be utilized.
Gravedad CVSS v4.0: MEDIA
Última modificación:
08/12/2025

CVE-2025-14246

Fecha de publicación:
08/12/2025
Idioma:
Inglés
*** Pendiente de traducción *** A vulnerability was found in code-projects Simple Shopping Cart 1.0. This vulnerability affects unknown code of the file /Customers/settings.php. Performing manipulation of the argument user_id results in sql injection. Remote exploitation of the attack is possible. The exploit has been made public and could be used.
Gravedad CVSS v4.0: MEDIA
Última modificación:
08/12/2025

CVE-2025-42616

Fecha de publicación:
08/12/2025
Idioma:
Inglés
*** Pendiente de traducción *** Some endpoints in vulnerability-lookup that modified <br /> application state (e.g. changing database entries, user data, <br /> configurations, or other privileged actions) may have been accessible <br /> via HTTP GET requests without requiring a CSRF token. This flaw leaves <br /> the application vulnerable to Cross-Site Request Forgery (CSRF) attacks:<br /> an attacker who tricks a logged-in user into visiting a malicious <br /> website could cause the user’s browser to issue GET requests that <br /> perform unintended state-changing operations in the context of their <br /> authenticated session.<br /> <br /> <br /> Because the server would treat these GET requests as valid (since no <br /> CSRF protection or POST method enforcement was in place), the attacker <br /> could exploit this to escalate privileges, change settings, or carry out<br /> other unauthorized actions without needing the user’s explicit consent <br /> or awareness. <br /> The fix ensures that all state-changing endpoints now require HTTP POST <br /> requests and include a valid CSRF token. This enforces that state <br /> changes cannot be triggered by arbitrary cross-site GET requests. This issue affects Vulnerability-Lookup: before 2.18.0.
Gravedad CVSS v4.0: ALTA
Última modificación:
08/12/2025

CVE-2025-42620

Fecha de publicación:
08/12/2025
Idioma:
Inglés
*** Pendiente de traducción *** In affected versions, vulnerability-lookup handled user-controlled <br /> content in comments and bundles in an unsafe way, which could lead to <br /> stored Cross-Site Scripting (XSS).<br /> <br /> <br /> <br /> <br /> On the backend, the related_vulnerabilities field of bundles accepted <br /> arbitrary strings without format validation or proper sanitization. On <br /> the frontend, comment and bundle descriptions were converted from <br /> Markdown to HTML and then injected directly into the DOM using string <br /> templates and innerHTML. This combination allowed an attacker who could <br /> create or edit comments or bundles to store crafted HTML/JavaScript <br /> payloads which would later be rendered and executed in the browser of <br /> any user visiting the affected profile page (user.html). <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> This issue affects Vulnerability-Lookup: before 2.18.0.
Gravedad CVSS v4.0: ALTA
Última modificación:
08/12/2025

CVE-2025-14245

Fecha de publicación:
08/12/2025
Idioma:
Inglés
*** Pendiente de traducción *** A vulnerability has been found in IdeaCMS up to 1.8. This affects the function whereRaw of the file app/common/logic/index/Coupon.php. Such manipulation of the argument params leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
Gravedad CVSS v4.0: MEDIA
Última modificación:
08/12/2025

CVE-2025-14244

Fecha de publicación:
08/12/2025
Idioma:
Inglés
*** Pendiente de traducción *** A flaw has been found in GreenCMS 2.3.0603. Affected by this issue is some unknown functionality of the file /Admin/Controller/CustomController.class.php of the component Menu Management Page. This manipulation of the argument Link causes cross site scripting. The attack may be initiated remotely. The exploit has been published and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
Gravedad CVSS v4.0: MEDIA
Última modificación:
08/12/2025

CVE-2025-42615

Fecha de publicación:
08/12/2025
Idioma:
Inglés
*** Pendiente de traducción *** In affected versions, vulnerability-lookup did not track or limit failed<br /> One-Time Password (OTP) attempts during Two-Factor Authentication (2FA)<br /> verification. An attacker who already knew or guessed a valid username <br /> and password could submit an arbitrary number of OTP codes without <br /> causing the account to be locked or generating any specific alert for <br /> administrators.<br /> <br /> <br /> This lack of rate-limiting and lockout on OTP failures significantly <br /> lowers the cost of online brute-force attacks against 2FA codes and <br /> increases the risk of successful account takeover, especially if OTP <br /> entropy is reduced (e.g. short numeric codes, user reuse, or predictable<br /> tokens). Additionally, administrators had no direct visibility into <br /> accounts experiencing repeated 2FA failures, making targeted attacks <br /> harder to detect and investigate.<br /> <br /> <br /> The patch introduces a persistent failed_otp_attempts counter on user <br /> accounts, locks the user after 5 invalid OTP submissions, resets the <br /> counter on successful verification, and surfaces failed 2FA attempts in <br /> the admin user list. This enforces an account lockout policy for OTP <br /> brute-force attempts and improves monitoring capabilities for suspicious<br /> 2FA activity.This issue affects Vulnerability-Lookup: before 2.18.0.
Gravedad CVSS v4.0: ALTA
Última modificación:
08/12/2025

CVE-2025-14230

Fecha de publicación:
08/12/2025
Idioma:
Inglés
*** Pendiente de traducción *** A vulnerability was detected in code-projects Daily Time Recording System 4.5.0. The impacted element is an unknown function of the file /admin/add_payroll.php. Performing manipulation of the argument detail_Id results in sql injection. The attack can be initiated remotely. The exploit is now public and may be used.
Gravedad CVSS v4.0: MEDIA
Última modificación:
08/12/2025

CVE-2025-14229

Fecha de publicación:
08/12/2025
Idioma:
Inglés
*** Pendiente de traducción *** A security vulnerability has been detected in SourceCodester Inventory Management System 1.0. The affected element is an unknown function of the component SVC Report Export. Such manipulation leads to csv injection. It is possible to launch the attack remotely. The exploit has been disclosed publicly and may be used.
Gravedad CVSS v4.0: MEDIA
Última modificación:
08/12/2025

CVE-2025-14228

Fecha de publicación:
08/12/2025
Idioma:
Inglés
*** Pendiente de traducción *** A weakness has been identified in Yealink SIP-T21P E2 52.84.0.15. Impacted is an unknown function of the component Local Directory Page. This manipulation causes cross site scripting. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way. This vulnerability only affects products that are no longer supported by the maintainer.
Gravedad CVSS v4.0: MEDIA
Última modificación:
08/12/2025

CVE-2025-14262

Fecha de publicación:
08/12/2025
Idioma:
Inglés
*** Pendiente de traducción *** A wrong permission check in KNIME Business Hub before version 1.17.0 allowed an authenticated user to save jobs of other users as if there were saved by the job owner. The attacker must have permissions to access the jobs but then they were saved into the catalog service using the wrong owner permissions. Therefore it may have been possible to save into spaces where the attacker does not have write permissions.<br /> <br /> There is no workaround.
Gravedad CVSS v4.0: MEDIA
Última modificación:
08/12/2025