Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-25796

Publication date:
26/02/2025
SeaCMS v13.3 was discovered to contain a remote code execution (RCE) vulnerability via the component admin_template.php.
Severity CVSS v4.0: Pending analysis
Last modification:
28/03/2025

CVE-2025-25797

Publication date:
26/02/2025
SeaCMS v13.3 was discovered to contain a remote code execution (RCE) vulnerability via the component admin_smtp.php.
Severity CVSS v4.0: Pending analysis
Last modification:
28/03/2025

CVE-2025-25799

Publication date:
26/02/2025
SeaCMS 13.3 was discovered to contain an arbitrary file read vulnerability in the file_get_contents function at admin_safe.php.
Severity CVSS v4.0: Pending analysis
Last modification:
28/03/2025

CVE-2025-25800

Publication date:
26/02/2025
SeaCMS 13.3 was discovered to contain an arbitrary file read vulnerability in the file_get_contents function at admin_safe_file.php.
Severity CVSS v4.0: Pending analysis
Last modification:
28/03/2025

CVE-2025-25783

Publication date:
26/02/2025
An arbitrary file upload vulnerability in the component admin\plugin.php of Emlog Pro v2.5.3 allows attackers to execute arbitrary code via uploading a crafted Zip file.
Severity CVSS v4.0: Pending analysis
Last modification:
07/04/2025

CVE-2025-25784

Publication date:
26/02/2025
An arbitrary file upload vulnerability in the component \c\TemplateController.php of Jizhicms v2.5.4 allows attackers to execute arbitrary code via uploading a crafted Zip file.
Severity CVSS v4.0: Pending analysis
Last modification:
10/04/2025

CVE-2025-25785

Publication date:
26/02/2025
JizhiCMS v2.5.4 was discovered to contain a Server-Side Request Forgery (SSRF) via the component \c\PluginsController.php. This vulnerability allows attackers to perform an intranet scan via a crafted request.
Severity CVSS v4.0: Pending analysis
Last modification:
10/04/2025

CVE-2025-25789

Publication date:
26/02/2025
FoxCMS v1.2.5 was discovered to contain a remote code execution (RCE) vulnerability via the index() method at \controller\Sitemap.php.
Severity CVSS v4.0: Pending analysis
Last modification:
09/04/2025

CVE-2025-25790

Publication date:
26/02/2025
An arbitrary file upload vulnerability in the component \controller\LocalTemplate.php of FoxCMS v1.2.5 allows attackers to execute arbitrary code via uploading a crafted Zip file.
Severity CVSS v4.0: Pending analysis
Last modification:
09/04/2025

CVE-2025-1249

Publication date:
26/02/2025
Missing Authorization vulnerability in Pixelite Events Manager allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Events Manager: from n/a through 6.6.4.1.
Severity CVSS v4.0: Pending analysis
Last modification:
26/02/2025

CVE-2025-1716

Publication date:
26/02/2025
picklescan before 0.0.21 does not treat 'pip' as an unsafe global. An attacker could craft a malicious model that uses Pickle to pull in a malicious PyPI package (hosted, for example, on pypi.org or GitHub) via `pip.main()`. Because pip is not a restricted global, the model, when scanned with picklescan, would pass security checks and appear to be safe, when it could instead prove to be problematic.
Severity CVSS v4.0: MEDIUM
Last modification:
29/12/2025

CVE-2024-52925

Publication date:
26/02/2025
In OPSWAT MetaDefender Kiosk before 4.7.0, arbitrary code execution can be performed by an attacker via the MD Kiosk Unlock Device feature for software encrypted USB drives.
Severity CVSS v4.0: Pending analysis
Last modification:
26/02/2025