Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-46784

Publication date:
05/11/2025
A denial of service vulnerability exists in the lasso_node_init_from_message_with_format functionality of Entr'ouvert Lasso 2.5.1. A specially crafted SAML response can lead to a memory depletion, resulting in denial of service. An attacker can send a malformed SAML response to trigger this vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2025

CVE-2025-61084

Publication date:
05/11/2025
MDaemon Mail Server 23.5.2 validates SPF, DKIM, and DMARC using the email enclosed in angle brackets () in the From: header of SMTP DATA. An attacker can craft a From: header with multiple invisible Unicode thin spaces to display a spoofed sender while passing validation, allowing email spoofing even when anti-spoofing protections are in place. NOTE: this is disputed by the Supplier because UI spoofing occurs in a client, not in a server such as MDaemon's product or any other server implementation. Also, if a client without its own spoofing protection must be used, the Header Screening feature in MDaemon's product can be employed to mitigate the client-side vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
13/11/2025

CVE-2025-52602

Publication date:
05/11/2025
HCL BigFix Query is affected by a sensitive information disclosure in the WebUI Query application.  An HTTP GET endpoint request returns discoverable responses that may disclose: group names, active user names (or IDs).  An attacker can use that information to target individuals with phishing or other social-engineering attacks.
Severity CVSS v4.0: Pending analysis
Last modification:
06/11/2025

CVE-2025-46705

Publication date:
05/11/2025
A denial of service vulnerability exists in the g_assert_not_reached functionality of Entr'ouvert Lasso 2.5.1 and 2.8.2. A specially crafted SAML assertion response can lead to a denial of service. An attacker can send a malformed SAML response to trigger this vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2025

CVE-2025-46404

Publication date:
05/11/2025
A denial of service vulnerability exists in the lasso_provider_verify_saml_signature functionality of Entr'ouvert Lasso 2.5.1. A specially crafted SAML response can lead to a denial of service. An attacker can send a malformed SAML response to trigger this vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2025

CVE-2025-3125

Publication date:
05/11/2025
An arbitrary file upload vulnerability exists in multiple WSO2 products due to improper input validation in the CarbonAppUploader admin service endpoint. An authenticated attacker with appropriate privileges can upload a malicious file to a user-controlled location on the server, potentially leading to remote code execution (RCE).<br /> <br /> This functionality is restricted by default to admin users; therefore, successful exploitation requires valid credentials with administrative permissions.
Severity CVSS v4.0: Pending analysis
Last modification:
04/12/2025

CVE-2025-12497

Publication date:
05/11/2025
The Premium Portfolio Features for Phlox theme plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 2.3.10 via the &amp;#39;args[extra_template_path]&amp;#39; parameter. This makes it possible for unauthenticated attackers to include and execute arbitrary .php files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where .php file types can be uploaded and included.
Severity CVSS v4.0: Pending analysis
Last modification:
06/11/2025

CVE-2025-11745

Publication date:
05/11/2025
The Ad Inserter – Ad Manager &amp; AdSense Ads plugin for WordPress is vulnerable to Stored Cross-Site Scripting via custom field through the plugin&amp;#39;s &amp;#39;adinserter&amp;#39; shortcode in all versions up to, and including, 2.8.7 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Severity CVSS v4.0: Pending analysis
Last modification:
06/11/2025

CVE-2025-58337

Publication date:
05/11/2025
An attacker with a valid read-only account can bypass Doris MCP Server’s read-only mode due to improper access control, allowing modifications that should have been prevented by read-only restrictions.<br /> <br /> <br /> Impact:<br /> <br /> Bypasses read-only mode; attackers with read-only access may perform unauthorized modifications.<br /> <br /> <br /> <br /> <br /> Recommended action for operators: Upgrade to version 0.6.0 as soon as possible (this release contains the fix).
Severity CVSS v4.0: Pending analysis
Last modification:
12/11/2025

CVE-2025-12192

Publication date:
05/11/2025
The Events Calendar plugin for WordPress is vulnerable to information disclosure in versions up to, and including, 6.15.9. The sysinfo REST endpoint compares the provided key to the stored opt-in key using a loose comparison, allowing unauthenticated attackers to send a boolean value and obtain the full system report whenever "Yes, automatically share my system information with The Events Calendar support team" setting is enabled.
Severity CVSS v4.0: Pending analysis
Last modification:
06/11/2025

CVE-2025-12468

Publication date:
05/11/2025
The FunnelKit Automations – Email Marketing Automation and CRM for WordPress &amp; WooCommerce plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 3.6.4.1 via the &amp;#39;/wc-coupons/&amp;#39; REST API endpoint. This is due to the endpoint being marked as a public API (`public_api = true`), which results in the endpoint being registered with `permission_callback =&gt; &amp;#39;__return_true&amp;#39;`, bypassing all authentication and capability checks. This makes it possible for unauthenticated attackers to extract sensitive data including all WooCommerce coupon codes, coupon IDs, and expiration status.
Severity CVSS v4.0: Pending analysis
Last modification:
04/12/2025

CVE-2025-12469

Publication date:
05/11/2025
The FunnelKit Automations – Email Marketing Automation and CRM for WordPress &amp; WooCommerce plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 3.6.4.1. This is due to the plugin not properly verifying that a user is authorized to perform administrative actions in the `bwfan_test_email` AJAX handler. The nonce used for verification is publicly exposed to all visitors (including unauthenticated users) via the frontend JavaScript localization, and the `check_nonce()` function accepts low-privilege authenticated users who possess this nonce. This makes it possible for authenticated attackers, with Subscriber-level access and above, to send arbitrary emails from the site with attacker-controlled subject and body content.
Severity CVSS v4.0: Pending analysis
Last modification:
04/12/2025