Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-30063

Publication date:
27/08/2025
The configuration file containing database logins and passwords is readable by any local user.
Severity CVSS v4.0: CRITICAL
Last modification:
29/08/2025

CVE-2025-30059

Publication date:
27/08/2025
In the PrepareCDExportJSON.pl service, the "getPerfServiceIds" function is vulnerable to SQL injection.
Severity CVSS v4.0: MEDIUM
Last modification:
29/08/2025

CVE-2025-30060

Publication date:
27/08/2025
In the ReturnUserUnitsXML.pl service, the "getUserInfo" function is vulnerable to SQL injection through the "UserID" parameter.
Severity CVSS v4.0: MEDIUM
Last modification:
29/08/2025

CVE-2025-30058

Publication date:
27/08/2025
In the PatientService.pl service, the "getPatientIdentifier" function is vulnerable to SQL injection through the "pesel" parameter.
Severity CVSS v4.0: MEDIUM
Last modification:
29/08/2025

CVE-2025-30056

Publication date:
27/08/2025
The RunCommand function accepts any parameter, which is then passed for execution in the shell. This allows an attacker to execute arbitrary code on the system.
Severity CVSS v4.0: CRITICAL
Last modification:
29/08/2025

CVE-2025-30057

Publication date:
27/08/2025
In UHCRTFDoc, the filename parameter can be exploited to execute arbitrary code via command injection into the system() call in the ConvertToPDF function.
Severity CVSS v4.0: CRITICAL
Last modification:
29/08/2025

CVE-2025-30048

Publication date:
27/08/2025
The "serverConfig" endpoint, which returns the module configuration including credentials, is accessible without authentication.
Severity CVSS v4.0: MEDIUM
Last modification:
29/08/2025

CVE-2025-30055

Publication date:
27/08/2025
The "system" function receives untrusted input from the user. If the "EnableJSCaching" option is enabled, it is possible to execute arbitrary code provided as the "Module" parameter.
Severity CVSS v4.0: CRITICAL
Last modification:
29/08/2025

CVE-2025-30041

Publication date:
27/08/2025
The paths "/cgi-bin/CliniNET.prd/utils/userlogstat.pl", "/cgi-bin/CliniNET.prd/utils/usrlogstat.pl", and "/cgi-bin/CliniNET.prd/utils/dblogstat.pl" expose data containing session IDs.
Severity CVSS v4.0: CRITICAL
Last modification:
29/08/2025

CVE-2025-30039

Publication date:
27/08/2025
Unauthenticated access to the "/cgi-bin/CliniNET.prd/GetActiveSessions.pl" endpoint allows takeover of any user session logged into the system, including users with admin privileges.
Severity CVSS v4.0: CRITICAL
Last modification:
29/08/2025

CVE-2025-30040

Publication date:
27/08/2025
The vulnerability allows unauthenticated users to download a file containing session ID data by directly accessing the "/cgi-bin/CliniNET.prd/utils/userlogxls.pl" endpoint.
Severity CVSS v4.0: CRITICAL
Last modification:
29/08/2025

CVE-2025-30038

Publication date:
27/08/2025
The vulnerability consists of a session ID leak when saving a file downloaded from CGM CLININET. The identifier is exposed through a built-in Windows security feature that stores additional metadata in an NTFS alternate data stream (ADS) for all files downloaded from potentially untrusted sources.
Severity CVSS v4.0: HIGH
Last modification:
29/08/2025