Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-26530

Publication date:
24/02/2025
The question bank filter required additional sanitizing to prevent a reflected XSS risk.
Severity CVSS v4.0: Pending analysis
Last modification:
11/08/2025

CVE-2025-26531

Publication date:
24/02/2025
Insufficient capability checks made it possible to disable badges a user does not have permission to access.
Severity CVSS v4.0: Pending analysis
Last modification:
07/08/2025

CVE-2025-27112

Publication date:
24/02/2025
Navidrome is an open source web-based music collection server and streamer. Starting in version 0.52.0 and prior to version 0.54.5, in certain Subsonic API endpoints, a flaw in the authentication check process allows an attacker to specify any arbitrary username that does not exist on the system, along with a salted hash of an empty password. Under these conditions, Navidrome treats the request as authenticated, granting access to various Subsonic endpoints without requiring valid credentials. An attacker can use any non-existent username to bypass the authentication system and gain access to various read-only data in Navidrome, such as user playlists. However, any attempt to modify data fails with a "permission denied" error due to insufficient permissions, limiting the impact to unauthorized viewing of information. Version 0.54.5 contains a patch for this issue.
Severity CVSS v4.0: MEDIUM
Last modification:
27/02/2025

CVE-2025-27133

Publication date:
24/02/2025
WeGIA is a Web manager for charitable institutions. A SQL Injection vulnerability was discovered in the WeGIA application prior to version 3.2.15 at the `adicionar_tipo_exame.php` endpoint. This vulnerability allows an authorized attacker to execute arbitrary SQL queries, allowing access to sensitive information. Version 3.2.15 contains a patch for the issue.
Severity CVSS v4.0: CRITICAL
Last modification:
28/02/2025

CVE-2025-27364

Publication date:
24/02/2025
In MITRE Caldera through 4.2.0 and 5.0.0 before 35bc06e, a Remote Code Execution (RCE) vulnerability was found in the dynamic agent (implant) compilation functionality of the server. This allows remote attackers to execute arbitrary code on the server that Caldera is running on via a crafted web request to the Caldera server API used for compiling and downloading of Caldera's Sandcat or Manx agent (implants). This web request can use the gcc -extldflags linker flag with sub-commands.
Severity CVSS v4.0: Pending analysis
Last modification:
24/02/2025

CVE-2024-57026

Publication date:
24/02/2025
TawkTo Widget Version
Severity CVSS v4.0: Pending analysis
Last modification:
03/03/2025

CVE-2024-54820

Publication date:
24/02/2025
XOne Web Monitor v02.10.2024.530 framework 1.0.4.9 was discovered to contain a SQL injection vulnerability in the login page. This vulnerability allows attackers to extract all usernames and passwords via a crafted input.
Severity CVSS v4.0: Pending analysis
Last modification:
24/02/2025

CVE-2025-26200

Publication date:
24/02/2025
SQL injection in SLIMS v.9.6.1 allows a remote attacker to escalate privileges via the month parameter in the visitor_report_day.php component.
Severity CVSS v4.0: Pending analysis
Last modification:
01/05/2025

CVE-2025-26201

Publication date:
24/02/2025
Credential disclosure vulnerability via the /staff route in GreaterWMS
Severity CVSS v4.0: Pending analysis
Last modification:
24/02/2025

CVE-2025-22495

Publication date:
24/02/2025
An improper input validation vulnerability was discovered in the NTP server configuration field of the Network-M2 card. This could result in an authenticated high privileged user having the ability to execute arbitrary commands. The vulnerability has been resolved in the version 3.0.4. <br /> Note - Network-M2 has been declared end-of-life in early 2024 and Network-M3 has been released as a fit-and-functional replacement.
Severity CVSS v4.0: Pending analysis
Last modification:
26/08/2025

CVE-2025-26803

Publication date:
24/02/2025
The http parser in Phusion Passenger 6.0.21 through 6.0.25 before 6.0.26 allows a denial of service during parsing of a request with an invalid HTTP method.
Severity CVSS v4.0: Pending analysis
Last modification:
28/02/2025

CVE-2025-25460

Publication date:
24/02/2025
A stored Cross-Site Scripting (XSS) vulnerability was identified in FlatPress 1.3.1 within the "Add Entry" feature. This vulnerability allows authenticated attackers to inject malicious JavaScript payloads into blog posts, which are executed when other users view the posts. The issue arises due to improper input sanitization of the "TextArea" field in the blog entry submission form.
Severity CVSS v4.0: Pending analysis
Last modification:
12/06/2025