Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-10895

Publication date:
02/10/2025
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
Severity CVSS v4.0: Pending analysis
Last modification:
02/10/2025

CVE-2025-61600

Publication date:
02/10/2025
Stalwart is a mail and collaboration server. Versions 0.13.3 and below contain an unbounded memory allocation vulnerability in the IMAP protocol parser which allows remote attackers to exhaust server memory, potentially triggering the system's out-of-memory (OOM) killer and causing a denial of service. The CommandParser implementation enforces size limits on its dynamic buffer in most parsing states, but several state handlers omit these validation checks. This issue is fixed in version 0.13.4. A workaround for this issue is to implement rate limiting and connection monitoring at the network level, however this does not provide complete protection.
Severity CVSS v4.0: Pending analysis
Last modification:
06/10/2025

CVE-2025-61666

Publication date:
02/10/2025
Traccar is an open source GPS tracking system. Default installs of Traccar on Windows between versions 6.1- 6.8.1 and non default installs between versions 5.8 - 6.0 are vulnerable to unauthenticated local file inclusion attacks which can lead to leakage of passwords or any file on the file system including the Traccar configuration file. Versions 5.8 - 6.0 are only vulnerable if ./override is set in the configuration file. Versions 6.1 - 6.8.1 are vulnerable by default as the web override is enabled by default. The vulnerable code is removed in version 6.9.0.
Severity CVSS v4.0: HIGH
Last modification:
06/10/2025

CVE-2025-61668

Publication date:
02/10/2025
Volto is a ReactJS-based frontend for the Plone Content Management System. Versions 16.34.0 and below, 17.0.0 through 17.22.1, 18.0.0 through 18.27.1, and 19.0.0-alpha.1 through 19.0.0-alpha.5, an anonymous user could cause the NodeJS server part of Volto to quit with an error when visiting a specific URL. This issue is fixed in versions 16.34.1, 17.22.2, 18.27.2 and 19.0.0-alpha.6.
Severity CVSS v4.0: HIGH
Last modification:
06/10/2025

CVE-2025-61605

Publication date:
02/10/2025
WeGIA is an open source web manager with a focus on charitable institutions. Versions 3.4.12 and below contain an SQL Injection vulnerability which was identified in the /pet/profile_pet.php endpoint, specifically in the id_pet parameter. This vulnerability allows attackers to execute arbitrary SQL commands, compromising the confidentiality, integrity, and availability of the database. This issue is fixed in version 3.5.0.
Severity CVSS v4.0: CRITICAL
Last modification:
07/10/2025

CVE-2025-61606

Publication date:
02/10/2025
WeGIA is an open source web manager with a focus on charitable institutions. Versions 3.4.12 and below contain an Open Redirect vulnerability, identified in the control.php endpoint, specifically in the nextPage parameter (metodo=listarUmnomeClasse=FuncionarioControle). This vulnerability allows attackers to redirect users to arbitrary external domains, enabling phishing campaigns, malicious payload distribution, or user credential theft. This issue is fixed in version 3.5.0.
Severity CVSS v4.0: MEDIUM
Last modification:
07/10/2025

CVE-2025-61665

Publication date:
02/10/2025
WeGIA is an open source web manager with a focus on charitable institutions. Versions 3.4.12 and below contain a Broken Access Control vulnerability, identified in the get_relatorios_socios.php endpoint. This vulnerability allows unauthenticated attackers to directly access sensitive personal and financial information of members without requiring authentication or authorization. This issue is fixed in version 3.5.0.
Severity CVSS v4.0: HIGH
Last modification:
07/10/2025

CVE-2025-54088

Publication date:
02/10/2025
CVE-2025-54088 is an open-redirect vulnerability in Secure<br /> Access prior to version 14.10. Attackers with access to the console can<br /> redirect victims to an arbitrary URL. The attack complexity is low, attack<br /> requirements are present, no privileges are required, and users must actively<br /> participate in the attack. Impact to confidentiality is low and there is no<br /> impact to integrity or availability. There are high severity impacts to<br /> confidentiality, integrity, availability in subsequent systems.
Severity CVSS v4.0: MEDIUM
Last modification:
16/10/2025

CVE-2025-54089

Publication date:
02/10/2025
CVE-2025-54089 is a cross-site scripting vulnerability in versions<br /> of secure access prior to 14.10. Attackers with administrative access to the<br /> console can interfere with another administrator’s access to the console. The<br /> attack complexity is low; there are no attack requirements. Privileges required<br /> to execute the attack are high and the victim must actively participate in the<br /> attack sequence. There is no impact to confidentiality or availability, there<br /> is a low impact to integrity.
Severity CVSS v4.0: MEDIUM
Last modification:
16/10/2025

CVE-2025-61595

Publication date:
02/10/2025
MANTRA is a purpose-built RWA Layer 1 Blockchain, capable of adherence to real world regulatory requirements. Versions 4.0.1 and below do not enforce the tx gas limit in its send hooks. Send hooks can spend more gas than what remains in tx, combined with recursive calls in the wasm contract, potentially amplifying the gas consumption exponentially. This is fixed in version 4.0.2.
Severity CVSS v4.0: HIGH
Last modification:
06/10/2025

CVE-2025-61603

Publication date:
02/10/2025
WeGIA is a Web manager for charitable institutions. Versions 3.4.12 and below include an SQL Injection vulnerability which was identified in the /controle/control.php endpoint, specifically in the descricao parameter. This vulnerability allows attackers to execute arbitrary SQL commands, compromising the confidentiality, integrity, and availability of the database. This issue is fixed in version 3.5.0.
Severity CVSS v4.0: CRITICAL
Last modification:
07/10/2025

CVE-2025-61604

Publication date:
02/10/2025
WeGIA is an open source web manager with a focus on charitable institutions. Versions 3.4.12 and below contain a Cross-Site Request Forgery (CSRF) vulnerability. The delete operation for the Almoxarifado entity is exposed via HTTP GET without CSRF protection, allowing a third-party site to trigger the action using the victim’s authenticated session. This issue is fixed in version 3.5.0.
Severity CVSS v4.0: HIGH
Last modification:
07/10/2025