Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-6190

Publication date:
23/07/2025
The Realty Portal – Agent plugin for WordPress is vulnerable to Privilege Escalation due to missing authorization within the rp_user_profile() AJAX handler in versions 0.1.0 through 0.3.9. The handler reads the client-supplied meta key and value pairs from $_POST and passes them directly to update_user_meta() without restricting to a safe whitelist. This makes it possible for authenticated attackers, with Subscriber-level access and above, to overwrite the wp_capabilities meta and grant themselves the administrator role.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2025-8060

Publication date:
23/07/2025
A vulnerability has been found in Tenda AC23 16.03.07.52 and classified as critical. Affected by this vulnerability is the function sub_46C940 of the file /goform/setMacFilterCfg of the component httpd. The manipulation of the argument deviceList leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
Severity CVSS v4.0: HIGH
Last modification:
01/08/2025

CVE-2025-54120

Publication date:
23/07/2025
PCL (Plain Craft Launcher) Community Edition is a Minecraft launcher. In PCL CE versions 2.12.0-beta.5 to 2.12.0-beta.9, the login credentials used during the third-party login process are accidentally recorded in the local log file. Although the log file is not automatically uploaded or shared, if the user manually sends the log file, there is a risk of leakage. This is fixed in version 2.12.0-beta.10.
Severity CVSS v4.0: CRITICAL
Last modification:
15/04/2026

CVE-2025-43485

Publication date:
23/07/2025
A potential security<br /> vulnerability has been identified in the Poly Clariti Manager for versions<br /> prior to 10.12.2. The vulnerability could potentially allow a privileged<br /> user to retrieve credentials from the log files. HP has addressed the issue in<br /> the latest software update.
Severity CVSS v4.0: MEDIUM
Last modification:
02/10/2025

CVE-2025-43486

Publication date:
23/07/2025
A potential stored cross-site scripting vulnerability has been<br /> identified in the Poly Clariti Manager for versions prior to 10.12.1. The<br /> website allows user input to be stored and rendered without proper<br /> sanitization. HP has addressed the issue in the latest software update.
Severity CVSS v4.0: MEDIUM
Last modification:
02/10/2025

CVE-2025-43487

Publication date:
23/07/2025
A potential privilege escalation through Sudo vulnerability has been identified in the Poly Clariti Manager for versions prior to 10.12.2. The firmware flaw does not properly implement access controls. HP has addressed the issue in the latest software update.
Severity CVSS v4.0: MEDIUM
Last modification:
02/10/2025

CVE-2025-43488

Publication date:
23/07/2025
A potential security vulnerability has been identified in the Poly Clariti Manager for versions prior to 10.12.2. The vulnerability could allow a bypass of the application&amp;#39;s XSS filter by submitting untrusted characters. HP has addressed the issue in the latest software update.
Severity CVSS v4.0: LOW
Last modification:
02/10/2025

CVE-2025-43489

Publication date:
23/07/2025
A potential security vulnerability has been identified in the Poly Clariti Manager for versions prior to 10.12.1. The vulnerability could deserialize untrusted data without validation. HP has addressed the issue in the latest software update.
Severity CVSS v4.0: LOW
Last modification:
02/10/2025

CVE-2025-54139

Publication date:
23/07/2025
HAX CMS allows users to manage their microsite universe with a NodeJS or PHP backend. In haxcms-nodejs versions 11.0.12 and below and in haxcms-php versions 11.0.7 and below, all pages within the HAX CMS application do not contain headers to prevent other websites from loading the site within an iframe. This applies to both the CMS and generated sites. An unauthenticated attacker can load the standalone login page or other sensitive functionality within an iframe, performing a UI redressing attack (clickjacking). This can be used to perform social engineering attacks to attempt to coerce users into performing unintended actions within the HAX CMS application. This is fixed in haxcms-nodejs version 11.0.13 and haxcms-php 11.0.8.
Severity CVSS v4.0: Pending analysis
Last modification:
22/08/2025

CVE-2025-43483

Publication date:
23/07/2025
A potential security vulnerability has been<br /> identified in the Poly Clariti Manager for versions prior to 10.12.1. The<br /> vulnerability could allow the retrieval of hardcoded cryptographic keys. HP has<br /> addressed the issue in the latest software update.
Severity CVSS v4.0: MEDIUM
Last modification:
02/10/2025

CVE-2025-43484

Publication date:
23/07/2025
A potential reflected cross-site scripting vulnerability has been<br /> identified in the Poly Clariti Manager for versions prior to 10.12.1. The<br /> website does not validate or sanitize the user input before rendering it in the<br /> response. HP has addressed the issue in the latest software update.
Severity CVSS v4.0: MEDIUM
Last modification:
02/10/2025

CVE-2025-43022

Publication date:
22/07/2025
A potential SQL injection vulnerability has been identified in the Poly<br /> Clariti Manager for versions prior to 10.12.1. The vulnerability could allow<br /> a privileged user to execute SQL commands. HP has addressed the issue in<br /> the latest software update.
Severity CVSS v4.0: HIGH
Last modification:
02/10/2025