Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-41081

Publication date:
20/01/2026
Reflected Cross-Site Scripting (XSS) vulnerability in IsMyGym by Zuinq Studio. This vulnerability allows an attacker to execute JavaScript code in the victim's browser by sending them a malicious URL with '/.php/'. This vulnerability can be exploited to steal sensitive user data, such as session cookies, or to perform actions on behalf of the user.
Severity CVSS v4.0: MEDIUM
Last modification:
26/01/2026

CVE-2025-41025

Publication date:
20/01/2026
Stored Cross-Site Scripting (XSS) in Poultry Farm Management System v1.0 due to the lack of proper validation of user input by sending a POST request. The relationship between parameters and assigned identifiers is as follows:  <br /> <br /> &amp;#39;category&amp;#39; y &amp;#39;product&amp;#39; parameters in &amp;#39;/farm/sell_product.php&amp;#39;.
Severity CVSS v4.0: MEDIUM
Last modification:
05/02/2026

CVE-2025-40644

Publication date:
20/01/2026
Reflected Cross-Site Scripting (XSS) vulnerability in Riftzilla&amp;#39;s QRGen. This vulnerability allows an attavker to execute JavaScript code in the victim&amp;#39;s browser by sending them a malicious URL using the &amp;#39;id&amp;#39; parameter in &amp;#39;/article.php&amp;#39;. This vulnerability can be exploited to steal sensitive user data, such as session cookies, or to perform actions on behalf of the user.
Severity CVSS v4.0: MEDIUM
Last modification:
26/01/2026

CVE-2025-40679

Publication date:
20/01/2026
HTML <br /> <br /> Injection vulnerability in Isshue by Bdtask, consisting os an HTML injection due to a lack os proper validation of user input by sending a POST request to &amp;#39;/category_product_search&amp;#39;, affecting the &amp;#39;product_name&amp;#39; parameter.
Severity CVSS v4.0: MEDIUM
Last modification:
26/01/2026

CVE-2025-41024

Publication date:
20/01/2026
Stored Cross-Site Scripting (XSS) in Poultry Farm Management System v1.0 due to the lack of proper validation of user input by sending a POST request. The relationship between parameters and assigned identifiers is as follows: <br /> <br /> &amp;#39;companyaddress&amp;#39;, &amp;#39;companyemail&amp;#39;, &amp;#39;companyname&amp;#39;, &amp;#39;country&amp;#39;, &amp;#39;mobilenumber&amp;#39; y &amp;#39;regno&amp;#39; parameters in &amp;#39;/farm/farmprofile.php&amp;#39;.
Severity CVSS v4.0: MEDIUM
Last modification:
05/02/2026

CVE-2025-14369

Publication date:
20/01/2026
dr_flac, an audio decoder within the dr_libs toolset, contains an integer overflow vulnerability flaw due to trusting the totalPCMFrameCount field from FLAC metadata before calculating buffer size, allowing an attacker with a specially crafted file to perform DoS against programs using the tool.
Severity CVSS v4.0: Pending analysis
Last modification:
26/01/2026

CVE-2025-14533

Publication date:
20/01/2026
The Advanced Custom Fields: Extended plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 0.9.2.1. This is due to the &amp;#39;insert_user&amp;#39; function not restricting the roles with which a user can register. This makes it possible for unauthenticated attackers to supply the &amp;#39;administrator&amp;#39; role during registration and gain administrator access to the site. Note: The vulnerability can only be exploited if &amp;#39;role&amp;#39; is mapped to the custom field.
Severity CVSS v4.0: Pending analysis
Last modification:
26/01/2026

CVE-2025-41084

Publication date:
20/01/2026
Stored Cross-Site Scripting (XSS) vulnerability in Sesame web application, due to the fact that uploaded SVG images are not properly sanitized. This allows attackers to embed malicious scripts in SVG files by sending a POST request using the &amp;#39;logo&amp;#39; parameter in &amp;#39;/api/v3/companies//logo&amp;#39;, which are then stored on the server and executed in the context of any user who accesses the compromised resource.
Severity CVSS v4.0: MEDIUM
Last modification:
26/01/2026

CVE-2025-41768

Publication date:
20/01/2026
On an instance of TwinCAT 3 HMI Server running on a device an authenticated administrator can inject arbitrary content into the custom CSS field which is persisted on the device and later returned via the login page and error page.
Severity CVSS v4.0: Pending analysis
Last modification:
26/01/2026

CVE-2026-0895

Publication date:
20/01/2026
The extension extends TYPO3’ FileSpool component, which was vulnerable to Insecure Deserialization prior to TYPO3-CORE-SA-2026-004 https://typo3.org/security/advisory/typo3-core-sa-2026-004 . Since the related fix is overwritten by the extension, using the extension with a patched TYPO3 core version still allows for Insecure Deserialization, because the affected vulnerable code was extracted from TYPO3 core to the extension. More information about this vulnerability can be found in the related TYPO3 Core Security Advisory TYPO3-CORE-SA-2026-004 https://typo3.org/security/advisory/typo3-core-sa-2026-004 .
Severity CVSS v4.0: MEDIUM
Last modification:
26/01/2026

CVE-2026-1221

Publication date:
20/01/2026
PrismX MX100 AP controller developed by BROWAN COMMUNICATIONS has a Use of Hard-coded Credentials vulnerability, allowing unauthenticated remote attackers to log in to the database using hardcoded database credentials stored in the firmware.
Severity CVSS v4.0: CRITICAL
Last modification:
26/01/2026

CVE-2026-1222

Publication date:
20/01/2026
PrismX MX100 AP controller developed by BROWAN COMMUNICATIONS has an Arbitrary File Upload vulnerability, allowing privileged remote attackers to upload and execute web shell backdoors, thereby enabling arbitrary code execution on the server.
Severity CVSS v4.0: HIGH
Last modification:
26/01/2026