Updated CVEs from Tenable Get the latest CVE updates from Tenable
- CVE-2025-36367on November 1, 2025 at 12:15 pm
High Severity Description IBM i 7.6, 7.5, 7.4, 7.3, and 7.2 is vulnerable to privilege escalation caused by an invalid IBM i SQL services authorization check. A malicious actor can use the elevated privileges of another user profile to gain root access to the host operating system. Read more at https://www.tenable.com/cve/CVE-2025-36367
- CVE-2025-6988on November 1, 2025 at 8:15 am
Medium Severity Description The kallyas theme for WordPress is vulnerable to Stored Cross-Site Scripting via several of the plugin’s shortcodes in all versions up to, and including, 4.23.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. Read more at https://www.tenable.com/cve/CVE-2025-6988
- CVE-2025-6990on November 1, 2025 at 8:15 am
High Severity Description The kallyas theme for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 4.24.0 via the `TH_PhpCode` pagebuilder widget. This is due to the theme not restricting access to the code editor widget for non-administrators. This makes it possible for authenticated attackers, with Contributor-level access and above, to execute code on the server. Read more at https://www.tenable.com/cve/CVE-2025-6990
- CVE-2025-6574on November 1, 2025 at 7:15 am
High Severity Description The Service Finder Bookings plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and excluding, 6.1. This is due to the plugin not properly validating a user’s identity prior to updating their details like email. This makes it possible for authenticated attackers, with subscriber-level access and above, to change arbitrary user’s email addresses, including administrators, and leverage that to reset the user’s password and gain access to their account. Read more at https://www.tenable.com/cve/CVE-2025-6574
- CVE-2025-11755on November 1, 2025 at 7:15 am
High Severity Description The WP Delicious – Recipe Plugin for Food Bloggers (formerly Delicious Recipes) plugin for WordPress is vulnerable to arbitrary file uploads when importing recipes via CSV in all versions up to, and including, 1.9.0. This flaw allows an attacker with at least Contributor-level permissions to upload a malicious PHP file by providing a remote URL during a recipe import process, leading to Remote Code Execution (RCE). Read more at https://www.tenable.com/cve/CVE-2025-11755
- CVE-2025-12171on November 1, 2025 at 7:15 am
High Severity Description The RESTful Content Syndication plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the ingest_image() function in versions 1.1.0 to 1.5.0. This makes it possible for authenticated attackers, with Author-level access and above, to upload arbitrary files on the affected site’s server which may make remote code execution possible. This requires the attacker have access to a defined third-party server as specified in the settings, so it is unlikely that this will be exploitable by contributor-level users, and more likely to be exploited by administrators who also have access to the plugin’s settings. Read more at https://www.tenable.com/cve/CVE-2025-12171
- CVE-2025-12137on November 1, 2025 at 7:15 am
Medium Severity Description The Import WP – Export and Import CSV and XML files to WordPress plugin for WordPress is vulnerable to Arbitrary File Read in all versions up to, and including, 2.14.16. This is due to the plugin’s REST API endpoint accepting arbitrary absolute file paths without proper validation in the ‘attach_file()’ function when handling ‘file_local’ actions. This makes it possible for authenticated attackers, with administrator-level access and above, to read arbitrary files on the server’s filesystem, including sensitive configuration files and system files via the ‘local_url’ parameter. Read more at https://www.tenable.com/cve/CVE-2025-12137
- CVE-2025-11499on November 1, 2025 at 7:15 am
Critical Severity Description The Tablesome Table – Contact Form DB – WPForms, CF7, Gravity, Forminator, Fluent plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the set_featured_image_from_external_url() function in all versions up to, and including, 1.1.32. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site’s server which may make remote code execution possible in configurations where unauthenticated users have been provided with a method for adding featured images, and the workflow trigger is created. Read more at https://www.tenable.com/cve/CVE-2025-11499
- CVE-2025-10487on November 1, 2025 at 7:15 am
High Severity Description The Advanced Ads – Ad Manager & AdSense plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 2.0.12 via the select_one() function. This is due to the endpoint not properly restricting access to the AJAX endpoint or limiting the functions that can be called to safe functions. This makes it possible for unauthenticated attackers to call arbitrary functions beginning with get_the_ like get_the_excerpt which can make information exposure possible. Read more at https://www.tenable.com/cve/CVE-2025-10487
- CVE-2025-12180on November 1, 2025 at 6:15 am
Medium Severity Description The Qi Blocks plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 1.4.3. This is due to the plugin storing arbitrary CSS styles submitted via the `qi-blocks/v1/update-styles` REST API endpoint without proper sanitization in the `update_global_styles_callback()` function. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary CSS, which can be used to perform actions such as hiding content, overlaying fake UI elements, or exfiltrating sensitive information via CSS injection techniques. Read more at https://www.tenable.com/cve/CVE-2025-12180
- CVE-2025-12038on November 1, 2025 at 6:15 am
Medium Severity Description The Folderly plugin for WordPress is vulnerable to unauthorized modification of data due to an insufficient capability check on the /wp-json/folderly/v1/config/clear-all-data REST API endpoint in all versions up to, and including, 0.3. This makes it possible for authenticated attackers, with Author-level access and above, to clear all data like terms and categories. Read more at https://www.tenable.com/cve/CVE-2025-12038
- CVE-2025-12090on November 1, 2025 at 6:15 am
Medium Severity Description The Employee Spotlight – Team Member Showcase & Meet the Team Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting via Social URLs in all versions up to, and including, 5.1.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. Read more at https://www.tenable.com/cve/CVE-2025-12090
- CVE-2025-11983on November 1, 2025 at 6:15 am
Medium Severity Description The WP Discourse plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 2.5.9. This is due to the plugin unconditionally sending Discourse API credentials (Api-Key and Api-Username headers) to any host specified in a post’s discourse_permalink custom field during comment synchronization. This makes it possible for authenticated attackers, with author-level access and above, to exfiltrate sensitive Discourse API credentials to attacker-controlled servers, as well as query internal services and potentially perform further attacks. Read more at https://www.tenable.com/cve/CVE-2025-11983
- CVE-2025-11740on November 1, 2025 at 6:15 am
Medium Severity Description The wpForo Forum plugin for WordPress is vulnerable to SQL Injection via the Subscriptions Manager in all versions up to, and including, 2.4.9 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. Read more at https://www.tenable.com/cve/CVE-2025-11740
- CVE-2025-11502on November 1, 2025 at 6:15 am
Medium Severity Description The Schema & Structured Data for WP & AMP plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin’s ‘saswp_tiny_multiple_faq’ shortcode in all versions up to, and including, 1.51 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. Read more at https://www.tenable.com/cve/CVE-2025-11502
- CVE-2025-12118on November 1, 2025 at 5:16 am
Medium Severity Description The Schema Scalpel plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the post title in all versions up to, and including, 1.6.1 due to insufficient input sanitization and output escaping when outputting user-supplied data into JSON-LD schema markup. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. Read more at https://www.tenable.com/cve/CVE-2025-12118
- CVE-2025-11927on November 1, 2025 at 5:16 am
Medium Severity Description The Flying Images: Optimize and Lazy Load Images for Faster Page Speed plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 2.4.14 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled. Read more at https://www.tenable.com/cve/CVE-2025-11927
- CVE-2025-5949on November 1, 2025 at 5:16 am
High Severity Description The Service Finder Bookings plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 6.0. This is due to the plugin not properly validating a user’s identity prior to processing a password change request. This makes it possible for authenticated attackers with subscriber access or higher to reset other users’ passwords, including those of admins. Read more at https://www.tenable.com/cve/CVE-2025-5949
- CVE-2025-11995on November 1, 2025 at 5:16 am
High Severity Description The Community Events plugin for WordPress is vulnerable to Stored Cross-Site Scripting via event details parameter in all versions up to, and including, 1.5.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. Read more at https://www.tenable.com/cve/CVE-2025-11995
- CVE-2025-11377on November 1, 2025 at 5:16 am
Medium Severity Description The List category posts plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 0.92.0 via the ‘catlist’ shortcode due to insufficient restrictions on which posts can be included. This makes it possible for authenticated attackers, with contributor-level access and above, to extract data from password protected, private, or draft posts that they should not have access to. Read more at https://www.tenable.com/cve/CVE-2025-11377
- CVE-2025-12367on November 1, 2025 at 4:16 am
Medium Severity Description The SiteSEO – SEO Simplified plugin for WordPress is vulnerable to Missing Authorization in versions up to, and including, 1.3.1. This is due to the plugin not properly verifying that a user is authorized to perform an action. This makes it possible for authenticated attackers, with Author-level access and above, to enable or disable arbitrary SiteSEO features that they should not have access to. Read more at https://www.tenable.com/cve/CVE-2025-12367
- CVE-2025-11928on November 1, 2025 at 4:16 am
Medium Severity Description The CSS & JavaScript Toolbox plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 12.0.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled. Read more at https://www.tenable.com/cve/CVE-2025-11928
- CVE-2025-11833on November 1, 2025 at 4:15 am
Critical Severity Description The Post SMTP – Complete SMTP Solution with Logs, Alerts, Backup SMTP & Mobile App plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the __construct function in all versions up to, and including, 3.6.0. This makes it possible for unauthenticated attackers to read arbitrary logged emails sent through the Post SMTP plugin, including password reset emails containing password reset links, which can lead to account takeover. Read more at https://www.tenable.com/cve/CVE-2025-11833
- CVE-2025-62275on November 1, 2025 at 3:15 am
Medium Severity Description Blogs in Liferay Portal 7.4.0 through 7.4.3.111, and older unsupported versions, and Liferay DXP 2023.Q4.0 through 2023.Q4.10, 2023.Q3.1 through 2023.Q3.10, 7.4 GA through update 92, and older unsupported versions does not check permission of images in a blog entry, which allows remote attackers to view the images in a blog entry via crafted URL. Read more at https://www.tenable.com/cve/CVE-2025-62275
- CVE-2025-11920on November 1, 2025 at 2:15 am
High Severity Description The WPCOM Member plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 1.7.14 via the action parameter in one of its shortcodes. This makes it possible for authenticated attackers, with Contributor-level access and above, to include and execute arbitrary .php files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where .php file types can be uploaded and included. Read more at https://www.tenable.com/cve/CVE-2025-11920
- CVE-2025-11922on November 1, 2025 at 2:15 am
Medium Severity Description The Inactive Logout plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘ina_redirect_page_individual_user’ parameter in all versions up to, and including, 3.5.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with subscriber-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. Read more at https://www.tenable.com/cve/CVE-2025-11922
- CVE-2025-11816on November 1, 2025 at 2:15 am
Medium Severity Description The Privacy Policy Generator, Terms & Conditions Generator WordPress Plugin : WP Legal Pages plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the disconnect_account_request() function in all versions up to, and including, 3.5.1. This makes it possible for unauthenticated attackers to disconnect the site from its API plan. Read more at https://www.tenable.com/cve/CVE-2025-11816
- CVE-2025-11174on November 1, 2025 at 2:15 am
Medium Severity Description The Document Library Lite plugin for WordPress is vulnerable to Improper Authorization in all versions up to, and including, 1.1.6. This is due to the plugin exposing an unauthenticated AJAX action dll_load_posts which returns a JSON table of document data without performing nonce or capability checks. The handler accepts an attacker-controlled args array where the status option explicitly allows draft, pending, future, and any. This makes it possible for unauthenticated attackers to retrieve unpublished document titles and content via the AJAX endpoint. Read more at https://www.tenable.com/cve/CVE-2025-11174
- CVE-2025-62276on November 1, 2025 at 12:15 am
Medium Severity Description The Document Library and the Adaptive Media modules in Liferay Portal 7.4.0 through 7.4.3.111, and older unsupported versions, and Liferay DXP 2023.Q4.0 through 2023.Q4.10, 2023.Q3.1 through 2023.Q3.10, 7.4 GA through update 92, and older unsupported versions uses an incorrect cache-control header, which allows local users to obtain access to downloaded files via the browser’s cache. Read more at https://www.tenable.com/cve/CVE-2025-62276
- CVE-2025-12464on October 31, 2025 at 10:15 pm
Medium Severity Description A stack-based buffer overflow was found in the QEMU e1000 network device. The code for padding short frames was dropped from individual network devices and moved to the net core code. The issue stems from the device’s receive code still being able to process a short frame in loopback mode. This could lead to a buffer overrun in the e1000_receive_iov() function via the loopback code path. A malicious guest user could use this vulnerability to crash the QEMU process on the host, resulting in a denial of service. Read more at https://www.tenable.com/cve/CVE-2025-12464







