Updated CVEs from Tenable Get the latest CVE updates from Tenable
- CVE-2025-1470on February 21, 2025 at 10:15 am
Medium Severity Description In Eclipse OMR, from the initial contribution to version 0.4.0, some OMR internal port library and utilities consumers of z/OS atoe functions do not check their return values for NULL memory pointers or for memory allocation failures. This can lead to NULL pointer dereference crashes. Beginning in version 0.5.0, internal OMR consumers of atoe functions handle NULL return values and memory allocation failures correctly. Read more at https://www.tenable.com/cve/CVE-2025-1470
- CVE-2025-1471on February 21, 2025 at 10:15 am
High Severity Description In Eclipse OMR versions 0.2.0 to 0.4.0, some of the z/OS atoe print functions use a constant length buffer for string conversion. If the input format string and arguments are larger than the buffer size then buffer overflow occurs. Beginning in version 0.5.0, the conversion buffers are sized correctly and checked appropriately to prevent buffer overflows. Read more at https://www.tenable.com/cve/CVE-2025-1471
- CVE-2024-12452on February 21, 2025 at 10:15 am
Medium Severity Description The Ziggeo plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin’s ‘ziggeo_event’ shortcode in all versions up to, and including, 3.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. Read more at https://www.tenable.com/cve/CVE-2024-12452
- CVE-2024-12276on February 21, 2025 at 10:15 am
Medium Severity Description The Ultimate Member – User Profile, Registration, Login, Member Directory, Content Restriction & Membership Plugin plugin for WordPress is vulnerable to second-order SQL Injection via filenames in all versions up to, and including, 2.9.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with access to upload files and manage filenames through a third-party plugin like a File Manager, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. The risk of this vulnerability is very minimal as it requires a user to be able to manipulate filenames in order to successfully exploit. Read more at https://www.tenable.com/cve/CVE-2024-12276
- CVE-2024-13461on February 21, 2025 at 10:15 am
Medium Severity Description The Autoship Cloud for WooCommerce Subscription Products plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin’s ‘autoship-create-scheduled-order-action’ shortcode in all versions up to, and including, 2.8.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. Read more at https://www.tenable.com/cve/CVE-2024-13461
- CVE-2024-13353on February 21, 2025 at 10:15 am
High Severity Description The Responsive Addons for Elementor – Free Elementor Addons Plugin and Elementor Templates plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 1.6.4 via several widgets. This makes it possible for authenticated attackers, with Contributor-level access and above, to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included. Read more at https://www.tenable.com/cve/CVE-2024-13353
- CVE-2024-13648on February 21, 2025 at 10:15 am
Medium Severity Description The Maps for WP plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin’s ‘MapOnePoint’ shortcode in all versions up to, and including, 1.2.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. Read more at https://www.tenable.com/cve/CVE-2024-13648
- CVE-2025-1410on February 21, 2025 at 9:15 am
Medium Severity Description The Events Calendar Made Simple – Pie Calendar plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin’s piecal shortcode in all versions up to, and including, 1.2.5 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. Read more at https://www.tenable.com/cve/CVE-2025-1410
- CVE-2025-0728on February 21, 2025 at 9:15 am
Medium Severity Description In NetX HTTP server functionality of Eclipse ThreadX NetX Duo before version 6.4.2, an attacker can cause an integer underflow and a subsequent denial of service by writing a very large file, by specially crafted packets with Content-Length smaller than the data request size. A possible workaround is to disable HTTP PUT support. Read more at https://www.tenable.com/cve/CVE-2025-0728
- CVE-2025-0727on February 21, 2025 at 9:15 am
Medium Severity Description In NetX HTTP server functionality of Eclipse ThreadX NetX Duo before version 6.4.2, an attacker can cause an integer underflow and a subsequent denial of service by writing a very large file, by specially crafted packets with Content-Length in one packet smaller than the data request size of the other packet. A possible workaround is to disable HTTP PUT support. Read more at https://www.tenable.com/cve/CVE-2025-0727
- CVE-2025-0726on February 21, 2025 at 8:15 am
High Severity Description In NetX HTTP server functionality of Eclipse ThreadX NetX Duo before version 6.4.2, an attacker can cause a denial of service by specially crafted packets. The core issue is missing closing of a file in case of an error condition, resulting in the 404 error for each further file request. Users can work-around the issue by disabling the PUT request support. Read more at https://www.tenable.com/cve/CVE-2025-0726
- CVE-2024-13585on February 21, 2025 at 6:15 am
Medium Severity Description The Ajax Search Lite WordPress plugin before 4.12.5 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). Read more at https://www.tenable.com/cve/CVE-2024-13585
- CVE-2024-11260on February 21, 2025 at 6:15 am
High Severity Description The Events Manager – Calendar, Bookings, Tickets, and more! plugin for WordPress is vulnerable to time-based SQL Injection via the active_status parameter in all versions up to, and including, 6.6.3 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. Read more at https://www.tenable.com/cve/CVE-2024-11260
- CVE-2024-13314on February 21, 2025 at 6:15 am
Medium Severity Description The Carousel, Slider, Gallery by WP Carousel WordPress plugin before 2.7.4 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). Read more at https://www.tenable.com/cve/CVE-2024-13314
- CVE-2024-13883on February 21, 2025 at 4:15 am
Medium Severity Description The WPUpper Share Buttons plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.51. This is due to missing or incorrect nonce validation on the ‘save_custom_css_request’ function. This makes it possible for unauthenticated attackers to inject custom CSS to modify a site via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. Read more at https://www.tenable.com/cve/CVE-2024-13883
- CVE-2025-1407on February 21, 2025 at 4:15 am
Medium Severity Description The AMO Team Showcase plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin’s amoteam_skills shortcode in all versions up to, and including, 1.1.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. Read more at https://www.tenable.com/cve/CVE-2025-1407
- CVE-2025-1406on February 21, 2025 at 4:15 am
Medium Severity Description The Newpost Catch plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin’s npc shortcode in all versions up to, and including, 1.3.19 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. Read more at https://www.tenable.com/cve/CVE-2025-1406
- CVE-2024-13537on February 21, 2025 at 4:15 am
Medium Severity Description The C9 Blocks plugin for WordPress is vulnerable to Full Path Disclosure in all versions up to, and including, 1.7.7. This is due the plugin containing a publicly accessible composer-setup.php file with error display enabled. This makes it possible for unauthenticated attackers to retrieve the full path of the web application, which can be used to aid other attacks. The information displayed is not useful on its own, and requires another vulnerability to be present for damage to an affected website. Read more at https://www.tenable.com/cve/CVE-2024-13537
- CVE-2024-13388on February 21, 2025 at 4:15 am
Medium Severity Description The TCBD Tooltip plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin’s ‘tcbdtooltip_text’ shortcode in all versions up to, and including, 1.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. Read more at https://www.tenable.com/cve/CVE-2024-13388
- CVE-2024-13672on February 21, 2025 at 4:15 am
Medium Severity Description The Mini Course Generator | Embed mini-courses and interactive content plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin’s ‘mcg’ shortcode in all versions up to, and including, 1.0.5 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. Read more at https://www.tenable.com/cve/CVE-2024-13672
- CVE-2024-13751on February 21, 2025 at 4:15 am
Medium Severity Description The 3D Photo Gallery plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘des[]’ parameter in all versions up to, and including, 1.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Subscriber-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. Read more at https://www.tenable.com/cve/CVE-2024-13751
- CVE-2024-13818on February 21, 2025 at 4:15 am
Medium Severity Description The Registration Forms – User Registration Forms, Invitation-Based Registrations, Front-end User Profile, Login Form & Content Restriction plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 3.8.3.9 through publicly exposed log files. This makes it possible for unauthenticated attackers to view potentially sensitive information about users contained in the exposed log files. Read more at https://www.tenable.com/cve/CVE-2024-13818
- CVE-2024-13379on February 21, 2025 at 4:15 am
Medium Severity Description The C9 Admin Dashboard plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 1.3.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file. Read more at https://www.tenable.com/cve/CVE-2024-13379
- CVE-2024-13235on February 21, 2025 at 4:15 am
Medium Severity Description The Pinpoint Booking System – #1 WordPress Booking Plugin plugin for WordPress is vulnerable to SQL Injection via the ‘language’ parameter in all versions up to, and including, 2.9.9.5.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. Read more at https://www.tenable.com/cve/CVE-2024-13235
- CVE-2024-38657on February 21, 2025 at 2:15 am
Critical Severity Description External control of a file name in Ivanti Connect Secure before version 22.7R2.4 and Ivanti Policy Secure before version 22.7R1.3 allows a remote authenticated attacker with admin privileges to write arbitrary files. Read more at https://www.tenable.com/cve/CVE-2024-38657
- CVE-2025-1001on February 21, 2025 at 1:15 am
Medium Severity Description Medixant RadiAnt DICOM Viewer is vulnerable due to failure of the update mechanism to verify the update server’s certificate which could allow an attacker to alter network traffic and carry out a machine-in-the-middle attack (MITM). An attacker could modify the server’s response and deliver a malicious update to the user. Read more at https://www.tenable.com/cve/CVE-2025-1001
- CVE-2025-27100on February 21, 2025 at 12:15 am
Medium Severity Description lakeFS is an open-source tool that transforms your object storage into a Git-like repository. In affected versions an authenticated user can crash lakeFS by exhausting server memory. This is an authenticated denial-of-service issue. This problem has been patched in version 1.50.0. Users on versions 1.49.1 and below are affected. Users are advised to upgrade. Users unable to upgrade should either set the environment variable `LAKEFS_BLOCKSTORE_S3_DISABLE_PRE_SIGNED_MULTIPART` to `true` or configure the `disable_pre_signed_multipart` key to true in their config yaml. Read more at https://www.tenable.com/cve/CVE-2025-27100
- CVE-2025-25678on February 20, 2025 at 11:15 pm
Critical Severity Description Tenda i12 V1.0.0.10(3805) was discovered to contain a buffer overflow via the funcpara1 parameter in the formSetCfm function. Read more at https://www.tenable.com/cve/CVE-2025-25678
- CVE-2025-27088on February 20, 2025 at 11:15 pm
High Severity Description oxyno-zeta/s3-proxy is an aws s3 proxy written in go. In affected versions a Reflected Cross-site Scripting (XSS) vulnerability enables attackers to create malicious URLs that, when visited, inject scripts into the web application. This can lead to session hijacking or phishing attacks on a trusted domain, posing a moderate risk to all users. It’s possible to inject html elements, including scripts through the folder-list template. The affected template allows users to interact with the URL path provided by the `Request.URL.Path` variable, which is then rendered directly into the HTML without proper sanitization or escaping. This can be abused by attackers who craft a malicious URL containing injected HTML or JavaScript. When users visit such a URL, the malicious script will be executed in the user’s context. This issue has been addressed in version 4.18.1 and all users are advised to upgrade. There are no known workarounds for this vulnerability. Read more at https://www.tenable.com/cve/CVE-2025-27088
- CVE-2025-25679on February 20, 2025 at 11:15 pm
Critical Severity Description Tenda i12 V1.0.0.10(3805) was discovered to contain a buffer overflow via the index parameter in the formWifiMacFilterSet function. Read more at https://www.tenable.com/cve/CVE-2025-25679