Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-5397

Publication date:
31/10/2025
The Noo JobMonster theme for WordPress is vulnerable to Authentication Bypass in all versions up to, and including, 4.8.1. This is due to the check_login() function not properly verifying a user's identity prior to successfully authenticating them This makes it possible for unauthenticated attackers to bypass standard authentication and access administrative user accounts. Please note social login needs to be enabled in order for a site to be impacted by this vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
04/11/2025

CVE-2025-58152

Publication date:
31/10/2025
FutureNet MA and IP-K series provided by Century Systems Co., Ltd. put the firmware version and the garbage collection information on the internal web page. With some crafted HTTP request, they can be accessed without authentication.
Severity CVSS v4.0: MEDIUM
Last modification:
04/11/2025

CVE-2025-54763

Publication date:
31/10/2025
FutureNet MA and IP-K series provided by Century Systems Co., Ltd. contain an OS command Injection vulnerability. A user who logs in to the Web UI of the product may execute an arbitrary OS command.
Severity CVSS v4.0: HIGH
Last modification:
04/11/2025

CVE-2025-11191

Publication date:
31/10/2025
The RealPress WordPress plugin before 1.1.0 registers the REST routes without proper permission checks, allowing the creation of pages and sending of emails from the site.
Severity CVSS v4.0: Pending analysis
Last modification:
09/01/2026

CVE-2025-11806

Publication date:
31/10/2025
The Qzzr Shortcode Plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'qzzr' shortcode in all versions up to, and including, 1.0.1. This is due to insufficient input sanitization and output escaping on the 'quiz' attribute. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Severity CVSS v4.0: Pending analysis
Last modification:
04/11/2025

CVE-2025-11975

Publication date:
31/10/2025
The FuseWP – WordPress User Sync to Email List & Marketing Automation (Mailchimp, Constant Contact, ActiveCampaign etc.) plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the save_changes() function in all versions up to, and including, 1.1.23.0. This makes it possible for unauthenticated attackers to add and edit sync rules.
Severity CVSS v4.0: Pending analysis
Last modification:
04/11/2025

CVE-2025-23050

Publication date:
31/10/2025
QLowEnergyController in Qt before 6.8.2 mishandles malformed Bluetooth ATT commands, leading to an out-of-bounds read (or division by zero). This is fixed in 5.15.19, 6.5.9, and 6.8.2.
Severity CVSS v4.0: Pending analysis
Last modification:
04/11/2025

CVE-2025-6176

Publication date:
31/10/2025
Scrapy versions up to 2.13.2 are vulnerable to a denial of service (DoS) attack due to a flaw in its brotli decompression implementation. The protection mechanism against decompression bombs fails to mitigate the brotli variant, allowing remote servers to crash clients with less than 80GB of available memory. This occurs because brotli can achieve extremely high compression ratios for zero-filled data, leading to excessive memory consumption during decompression.
Severity CVSS v4.0: Pending analysis
Last modification:
04/11/2025

CVE-2025-8849

Publication date:
31/10/2025
LibreChat version 0.7.9 is vulnerable to a Denial of Service (DoS) attack due to unbounded parameter values in the `/api/memories` endpoint. The `key` and `value` parameters accept arbitrarily large inputs without proper validation, leading to a null pointer error in the Rust-based backend when excessively large values are submitted. This results in the inability to create new memories, impacting the stability of the service.
Severity CVSS v4.0: Pending analysis
Last modification:
10/11/2025

CVE-2025-52665

Publication date:
31/10/2025
A malicious actor with access to the management network could exploit a misconfiguration in UniFi’s door access application, UniFi Access, that exposed a management API without proper authentication. This vulnerability was introduced in Version 3.3.22 and was fixed in Version 4.0.21 and later. <br /> <br /> Affected Products:<br /> UniFi Access Application (Version 3.3.22 through 3.4.31). 
 <br /> <br /> Mitigation:<br /> Update your UniFi Access Application to Version 4.0.21 or later.
Severity CVSS v4.0: Pending analysis
Last modification:
12/11/2025

CVE-2025-48984

Publication date:
31/10/2025
A vulnerability allowing remote code execution (RCE) on the Backup Server by an authenticated domain user.
Severity CVSS v4.0: Pending analysis
Last modification:
11/11/2025

CVE-2025-27208

Publication date:
31/10/2025
A reflected Cross-Site Scripting (XSS) vulnerability has been identified in Revive Adserver version 5.5.2. An attacker could trick a user with access to the user interface of a Revive Adserver instance into clicking on a specifically crafted URL and execute injected JavaScript code in the context of the victim&amp;#39;s browser. The session cookie cannot be accessed, but a number of other operations could be performed.<br /> <br /> The vulnerability is present in the admin-search.php file and can be exploited via the compact parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
01/12/2025