Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-5123

Publication date:
13/06/2025
The Contact Us Page – Contact People plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘style’ parameter in all versions up to, and including, 3.7.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Severity CVSS v4.0: Pending analysis
Last modification:
10/07/2025

CVE-2025-47959

Publication date:
13/06/2025
Improper neutralization of special elements used in a command ('command injection') in Visual Studio allows an authorized attacker to execute code over a network.
Severity CVSS v4.0: Pending analysis
Last modification:
10/07/2025

CVE-2025-30399

Publication date:
13/06/2025
Untrusted search path in .NET and Visual Studio allows an unauthorized attacker to execute code over a network.
Severity CVSS v4.0: Pending analysis
Last modification:
10/07/2025

CVE-2025-4228

Publication date:
13/06/2025
An incorrect privilege assignment vulnerability in Palo Alto Networks Cortex® XDR Broker VM allows an authenticated administrative user to execute certain files available within the Broker VM and escalate their privileges to root.
Severity CVSS v4.0: MEDIUM
Last modification:
16/06/2025

CVE-2025-4230

Publication date:
13/06/2025
A command injection vulnerability in Palo Alto Networks PAN-OS® software enables an authenticated administrator to bypass system restrictions and run arbitrary commands as a root user. To be able to exploit this issue, the user must have access to the PAN-OS CLI.<br /> <br /> The security risk posed by this issue is significantly minimized when CLI access is restricted to a limited group of administrators. <br /> <br /> Cloud NGFW and Prisma® Access are not affected by this vulnerability.
Severity CVSS v4.0: HIGH
Last modification:
16/06/2025

CVE-2025-4231

Publication date:
13/06/2025
A command injection vulnerability in Palo Alto Networks PAN-OS® enables an authenticated administrative user to perform actions as the root user.<br /> <br /> The attacker must have network access to the management web interface and successfully authenticate to exploit this issue.<br /> <br /> Cloud NGFW and Prisma Access are not impacted by this vulnerability.
Severity CVSS v4.0: HIGH
Last modification:
22/10/2025

CVE-2025-4232

Publication date:
13/06/2025
An improper neutralization of wildcards vulnerability in the log collection feature of Palo Alto Networks GlobalProtect™ app on macOS allows a non administrative user to escalate their privileges to root.
Severity CVSS v4.0: HIGH
Last modification:
27/06/2025

CVE-2025-4233

Publication date:
12/06/2025
An insufficient implementation of cache vulnerability in Palo Alto Networks Prisma® Access Browser enables users to bypass certain data control policies.
Severity CVSS v4.0: MEDIUM
Last modification:
16/06/2025

CVE-2025-41234

Publication date:
12/06/2025
Description<br /> <br /> In Spring Framework, versions 6.0.x as of 6.0.5, versions 6.1.x and 6.2.x, an application is vulnerable to a reflected file download (RFD) attack when it sets a “Content-Disposition” header with a non-ASCII charset, where the filename attribute is derived from user-supplied input.<br /> <br /> Specifically, an application is vulnerable when all the following are true:<br /> <br /> * The header is prepared with org.springframework.http.ContentDisposition.<br /> * The filename is set via ContentDisposition.Builder#filename(String, Charset).<br /> * The value for the filename is derived from user-supplied input.<br /> * The application does not sanitize the user-supplied input.<br /> * The downloaded content of the response is injected with malicious commands by the attacker (see RFD paper reference for details).<br /> <br /> <br /> An application is not vulnerable if any of the following is true:<br /> <br /> * The application does not set a “Content-Disposition” response header.<br /> * The header is not prepared with org.springframework.http.ContentDisposition.<br /> * The filename is set via one of: * ContentDisposition.Builder#filename(String), or<br /> * ContentDisposition.Builder#filename(String, ASCII)<br /> <br /> <br /> <br /> * The filename is not derived from user-supplied input.<br /> * The filename is derived from user-supplied input but sanitized by the application.<br /> * The attacker cannot inject malicious content in the downloaded content of the response.<br /> <br /> <br /> Affected Spring Products and VersionsSpring Framework:<br /> <br /> * 6.2.0 - 6.2.7<br /> * 6.1.0 - 6.1.20<br /> * 6.0.5 - 6.0.28<br /> * Older, unsupported versions are not affected<br /> <br /> <br /> MitigationUsers of affected versions should upgrade to the corresponding fixed version.<br /> <br /> Affected version(s)Fix versionAvailability6.2.x6.2.8OSS6.1.x6.1.21OSS6.0.x6.0.29 Commercial https://enterprise.spring.io/ No further mitigation steps are necessary.<br /> <br /> <br /> CWE-113 in `Content-Disposition` handling in VMware Spring Framework versions 6.0.5 to 6.2.7 allows remote attackers to launch Reflected File Download (RFD) attacks via unsanitized user input in `ContentDisposition.Builder#filename(String, Charset)` with non-ASCII charsets.
Severity CVSS v4.0: Pending analysis
Last modification:
16/06/2025

CVE-2025-41233

Publication date:
12/06/2025
Description:<br /> <br /> VMware AVI Load Balancer contains an authenticated blind SQL Injection vulnerability. VMware has evaluated the severity of the issue to be in the Moderate severity range https://www.broadcom.com/support/vmware-services/security-response  with a maximum CVSSv3 base score of 6.8 https://www.first.org/cvss/calculator/3-0#CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N .<br /> <br /> Known Attack Vectors:<br /> <br /> An authenticated malicious user with network access may be able to use specially crafted SQL queries to gain database access.<br /> <br /> Resolution:<br /> <br /> To remediate CVE-2025-41233 apply the patches to the Avi Controller listed in the &amp;#39;Fixed Version&amp;#39; column of the &amp;#39;Response Matrix&amp;#39; found below.<br /> <br /> Workarounds:<br /> <br /> None.<br /> <br /> Additional Documentation:<br /> <br /> None.<br /> <br /> Acknowledgements:<br /> <br /> VMware would like to thank Alexandru Copaceanu https://www.linkedin.com/in/alexandru-copaceanu-b39aaa1a8/  for reporting this issue to us.<br /> <br /> Notes:<br /> <br /> None.<br /> <br />  <br /> <br /> Response Matrix:<br /> <br /> ProductVersionRunning OnCVECVSSv4SeverityFixed VersionWorkaroundsAdditional DocumentsVMware Avi Load Balancer30.1.1AnyCVE-2025-41233 6.8 https://www.first.org/cvss/calculator/3-0#CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N Moderate 30.1.2-2p3 https://techdocs.broadcom.com/us/en/vmware-security-load-balancing/avi-load-balancer/avi-load-balancer/30-1/vmware-avi-load-balancer-release-notes/release-notes-30-1-2.html NoneNoneVMware Avi Load Balancer30.1.2AnyCVE-2025-41233 6.8 https://www.first.org/cvss/calculator/3-0#CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N Moderate 30.1.2-2p3 https://techdocs.broadcom.com/us/en/vmware-security-load-balancing/avi-load-balancer/avi-load-balancer/30-1/vmware-avi-load-balancer-release-notes/release-notes-30-1-2.html NoneNoneVMware Avi Load Balancer30.2.1AnyCVE-2025-41233 6.8 https://www.first.org/cvss/calculator/3-0#CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N Moderate 30.2.1-2p6 https://techdocs.broadcom.com/us/en/vmware-security-load-balancing/avi-load-balancer/avi-load-balancer/30-2/vmware-avi-load-balancer-release-notes/release-notes-for-avi-load-balancer-version-30-2-1.html NoneNoneVMware Avi Load Balancer30.2.2AnyCVE-2025-41233 6.8 https://www.first.org/cvss/calculator/3-0#CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N Moderate 30.2.2-2p5 https://techdocs.broadcom.com/us/en/vmware-security-load-balancing/avi-load-balancer/avi-load-balancer/30-2/vmware-avi-load-balancer-release-notes/release-notes-for-avi-load-balancer-version-30-2-2.html NoneNoneVMware Avi Load Balancer30.2.3AnyCVE-2025-41233N/AN/AUnaffectedNoneNoneVMware Avi Load Balancer31.1.1AnyCVE-2025-41233 6.8 https://www.first.org/cvss/calculator/3-0#CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N Moderate 31.1.1-2p2 https://techdocs.broadcom.com/us/en/vmware-security-load-balancing/avi-load-balancer/avi-load-balancer/31-1/vmware-avi-load-balancer-release-notes/Release-Note-Section-20627.html NoneNone<br /> <br /> CWE-89 in the Avi Load Balancer component of VMware allows an authenticated attacker to execute blind SQL injections in versions 30.1.1, 30.1.2, 30.2.1, and 30.2.2 due to improper input validation, enabling unauthorized database access.
Severity CVSS v4.0: Pending analysis
Last modification:
16/06/2025

CVE-2025-44091

Publication date:
12/06/2025
yangyouwang crud v1.0.0 is vulnerable to Cross Site Scripting (XSS) via the role management function.
Severity CVSS v4.0: Pending analysis
Last modification:
02/07/2025

CVE-2025-49589

Publication date:
12/06/2025
PCSX2 is a free and open-source PlayStation 2 (PS2) emulator. A stack-based buffer overflow exists in the Kprintf_HLE function of PCSX2 versions up to 2.3.414. Opening a disc image that logs a specially crafted message may allow a remote attacker to execute arbitrary code if the user enabled IOP Console Logging. This vulnerability is fixed in 2.3.414.
Severity CVSS v4.0: MEDIUM
Last modification:
16/06/2025