Instituto Nacional de ciberseguridad. Sección Incibe
Instituto Nacional de Ciberseguridad. Sección INCIBE-CERT

Vulnerabilidades

Con el objetivo de informar, advertir y ayudar a los profesionales sobre las ultimas vulnerabilidades de seguridad en sistemas tecnológicos, ponemos a disposición de los usuarios interesados en esta información una base de datos con información en castellano sobre cada una de las ultimas vulnerabilidades documentadas y conocidas.

Este repositorio con más de 75.000 registros esta basado en la información de NVD (National Vulnerability Database) – en función de un acuerdo de colaboración – por el cual desde INCIBE realizamos la traducción al castellano de la información incluida. En ocasiones este listado mostrará vulnerabilidades que aún no han sido traducidas debido a que se recogen en el transcurso del tiempo en el que el equipo de INCIBE realiza el proceso de traducción.

Se emplea el estándar de nomenclatura de vulnerabilidades CVE (Common Vulnerabilities and Exposures), con el fin de facilitar el intercambio de información entre diferentes bases de datos y herramientas. Cada una de las vulnerabilidades recogidas enlaza a diversas fuentes de información así como a parches disponibles o soluciones aportadas por los fabricantes y desarrolladores. Es posible realizar búsquedas avanzadas teniendo la opción de seleccionar diferentes criterios como el tipo de vulnerabilidad, fabricante, tipo de impacto entre otros, con el fin de acortar los resultados.

Mediante suscripción RSS o Boletines podemos estar informados diariamente de las ultimas vulnerabilidades incorporadas al repositorio.

CVE-2025-3125

Fecha de publicación:
05/11/2025
Idioma:
Inglés
*** Pendiente de traducción *** An arbitrary file upload vulnerability exists in multiple WSO2 products due to improper input validation in the CarbonAppUploader admin service endpoint. An authenticated attacker with appropriate privileges can upload a malicious file to a user-controlled location on the server, potentially leading to remote code execution (RCE).<br /> <br /> This functionality is restricted by default to admin users; therefore, successful exploitation requires valid credentials with administrative permissions.
Gravedad CVSS v3.1: MEDIA
Última modificación:
04/12/2025

CVE-2025-12497

Fecha de publicación:
05/11/2025
Idioma:
Inglés
*** Pendiente de traducción *** The Premium Portfolio Features for Phlox theme plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 2.3.10 via the &amp;#39;args[extra_template_path]&amp;#39; parameter. This makes it possible for unauthenticated attackers to include and execute arbitrary .php files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where .php file types can be uploaded and included.
Gravedad CVSS v3.1: ALTA
Última modificación:
06/11/2025

CVE-2025-11745

Fecha de publicación:
05/11/2025
Idioma:
Inglés
*** Pendiente de traducción *** The Ad Inserter – Ad Manager &amp; AdSense Ads plugin for WordPress is vulnerable to Stored Cross-Site Scripting via custom field through the plugin&amp;#39;s &amp;#39;adinserter&amp;#39; shortcode in all versions up to, and including, 2.8.7 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Gravedad CVSS v3.1: MEDIA
Última modificación:
06/11/2025

CVE-2025-58337

Fecha de publicación:
05/11/2025
Idioma:
Inglés
*** Pendiente de traducción *** An attacker with a valid read-only account can bypass Doris MCP Server’s read-only mode due to improper access control, allowing modifications that should have been prevented by read-only restrictions.<br /> <br /> <br /> Impact:<br /> <br /> Bypasses read-only mode; attackers with read-only access may perform unauthorized modifications.<br /> <br /> <br /> <br /> <br /> Recommended action for operators: Upgrade to version 0.6.0 as soon as possible (this release contains the fix).
Gravedad CVSS v3.1: MEDIA
Última modificación:
12/11/2025

CVE-2025-12192

Fecha de publicación:
05/11/2025
Idioma:
Inglés
*** Pendiente de traducción *** The Events Calendar plugin for WordPress is vulnerable to information disclosure in versions up to, and including, 6.15.9. The sysinfo REST endpoint compares the provided key to the stored opt-in key using a loose comparison, allowing unauthenticated attackers to send a boolean value and obtain the full system report whenever "Yes, automatically share my system information with The Events Calendar support team" setting is enabled.
Gravedad CVSS v3.1: MEDIA
Última modificación:
06/11/2025

CVE-2025-12468

Fecha de publicación:
05/11/2025
Idioma:
Inglés
*** Pendiente de traducción *** The FunnelKit Automations – Email Marketing Automation and CRM for WordPress &amp; WooCommerce plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 3.6.4.1 via the &amp;#39;/wc-coupons/&amp;#39; REST API endpoint. This is due to the endpoint being marked as a public API (`public_api = true`), which results in the endpoint being registered with `permission_callback =&gt; &amp;#39;__return_true&amp;#39;`, bypassing all authentication and capability checks. This makes it possible for unauthenticated attackers to extract sensitive data including all WooCommerce coupon codes, coupon IDs, and expiration status.
Gravedad CVSS v3.1: MEDIA
Última modificación:
04/12/2025

CVE-2025-12469

Fecha de publicación:
05/11/2025
Idioma:
Inglés
*** Pendiente de traducción *** The FunnelKit Automations – Email Marketing Automation and CRM for WordPress &amp; WooCommerce plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 3.6.4.1. This is due to the plugin not properly verifying that a user is authorized to perform administrative actions in the `bwfan_test_email` AJAX handler. The nonce used for verification is publicly exposed to all visitors (including unauthenticated users) via the frontend JavaScript localization, and the `check_nonce()` function accepts low-privilege authenticated users who possess this nonce. This makes it possible for authenticated attackers, with Subscriber-level access and above, to send arbitrary emails from the site with attacker-controlled subject and body content.
Gravedad CVSS v3.1: MEDIA
Última modificación:
04/12/2025

CVE-2025-11820

Fecha de publicación:
05/11/2025
Idioma:
Inglés
*** Pendiente de traducción *** The Graphina – Elementor Charts and Graphs plugin for WordPress is vulnerable to Stored Cross-Site Scripting via multiple chart widgets in all versions up to, and including, 3.1.8 due to insufficient input sanitization and output escaping on data attributes. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. The vulnerability affects multiple chart widgets including Area Chart, Line Chart, Column Chart, Donut Chart, Heatmap Chart, Radar Chart, Polar Chart, Pie Chart, Radial Chart, and Advance Data Table widgets.
Gravedad CVSS v3.1: MEDIA
Última modificación:
06/11/2025

CVE-2025-11987

Fecha de publicación:
05/11/2025
Idioma:
Inglés
*** Pendiente de traducción *** The Visual Link Preview plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin&amp;#39;s visual-link-preview shortcode in versions up to, and including, 2.2.7 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Gravedad CVSS v3.1: MEDIA
Última modificación:
06/11/2025

CVE-2025-55108

Fecha de publicación:
05/11/2025
Idioma:
Inglés
*** Pendiente de traducción *** The Control-M/Agent is vulnerable to unauthenticated remote code execution, arbitrary file read and write and similar unauthorized actions when mutual SSL/TLS authentication is not enabled (i.e. in the default configuration).<br /> <br /> <br /> NOTE: <br /> <br /> * The vendor believes that this vulnerability only occurs when documented security best practices are not followed. BMC has always strongly recommended to use security best practices such as configuring SSL/TLS between Control-M Server and Agent.<br /> <br /> * The vendor notifies that Control-M/Agent is not impacted in Control-M SaaS
Gravedad CVSS v4.0: CRÍTICA
Última modificación:
18/11/2025

CVE-2025-12674

Fecha de publicación:
05/11/2025
Idioma:
Inglés
*** Pendiente de traducción *** The KiotViet Sync plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the create_media() function in all versions up to, and including, 1.8.5. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site&amp;#39;s server which may make remote code execution possible.
Gravedad CVSS v3.1: CRÍTICA
Última modificación:
06/11/2025

CVE-2025-12675

Fecha de publicación:
05/11/2025
Idioma:
Inglés
*** Pendiente de traducción *** The KiotViet Sync plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the saveConfig() function in all versions up to, and including, 1.8.5. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update the plugin&amp;#39;s config.
Gravedad CVSS v3.1: MEDIA
Última modificación:
06/11/2025