Updated CVEs from Tenable

Updated CVEs from Tenable Get the latest CVE updates from Tenable

  • CVE-2025-5815
    on June 13, 2025 at 4:15 am

    Medium Severity Description The Traffic Monitor plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the tfcm_maybe_set_bot_flags() function in all versions up to, and including, 3.2.2. This makes it possible for unauthenticated attackers to disabled bot logging. Read more at https://www.tenable.com/cve/CVE-2025-5815

  • CVE-2025-5282
    on June 13, 2025 at 4:15 am

    High Severity Description The WP Travel Engine – Tour Booking Plugin – Tour Operator Software plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the delete_package() function in all versions up to, and including, 6.5.1. This makes it possible for unauthenticated attackers to delete arbitrary posts. Read more at https://www.tenable.com/cve/CVE-2025-5282

  • CVE-2025-5939
    on June 13, 2025 at 3:15 am

    Medium Severity Description The Telegram for WP plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 1.6.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled. Read more at https://www.tenable.com/cve/CVE-2025-5939

  • CVE-2025-5938
    on June 13, 2025 at 3:15 am

    Medium Severity Description The Digital Marketing and Agency Templates Addons for Elementor plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.1.1. This is due to missing or incorrect nonce validation on the import_templates() function. This makes it possible for unauthenticated attackers to trigger an import via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. Read more at https://www.tenable.com/cve/CVE-2025-5938

  • CVE-2025-5950
    on June 13, 2025 at 3:15 am

    Medium Severity Description The IndieBlocks plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘kind’ parameter in all versions up to, and including, 0.13.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. Read more at https://www.tenable.com/cve/CVE-2025-5950

  • CVE-2025-5841
    on June 13, 2025 at 3:15 am

    Medium Severity Description The ACF Onyx Poll plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘class’ parameter in all versions up to, and including, 1.1.9 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. Read more at https://www.tenable.com/cve/CVE-2025-5841

  • CVE-2025-5926
    on June 13, 2025 at 3:15 am

    Medium Severity Description The Link Shield plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 0.5.4. This is due to missing or incorrect nonce validation on the link_shield_menu_options() function. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. Read more at https://www.tenable.com/cve/CVE-2025-5926

  • CVE-2025-5928
    on June 13, 2025 at 3:15 am

    Medium Severity Description The WP Sliding Login/Dashboard Panel plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.1.1. This is due to missing or incorrect nonce validation on the wp_sliding_panel_user_options() function. This makes it possible for unauthenticated attackers to update plugin settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. Read more at https://www.tenable.com/cve/CVE-2025-5928

  • CVE-2025-5930
    on June 13, 2025 at 3:15 am

    Medium Severity Description The WP2HTML plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0.2. This is due to missing or incorrect nonce validation on the save() function. This makes it possible for unauthenticated attackers to update plugin settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. Read more at https://www.tenable.com/cve/CVE-2025-5930

  • CVE-2025-5491
    on June 13, 2025 at 3:15 am

    High Severity Description Acer ControlCenter contains Remote Code Execution vulnerability. The program exposes a Windows Named Pipe that uses a custom protocol to invoke internal functions. However, this Named Pipe is misconfigured, allowing remote users with low privileges to interact with it and access its features. One such feature enables the execution of arbitrary programs as NT AUTHORITY/SYSTEM. By leveraging this, remote attackers can execute arbitrary code on the target system with elevated privileges. Read more at https://www.tenable.com/cve/CVE-2025-5491

  • CVE-2025-5288
    on June 13, 2025 at 3:15 am

    Critical Severity Description The REST API | Custom API Generator For Cross Platform And Import Export In WP plugin for WordPress is vulnerable to Privilege Escalation due to a missing capability check on the process_handler() function in versions 1.0.0 to 2.0.3. This makes it possible for unauthenticated attackers to POST an arbitrary import_api URL, import specially crafted JSON, and thereby create a new user with full Administrator privileges. Read more at https://www.tenable.com/cve/CVE-2025-5288

  • CVE-2025-5233
    on June 13, 2025 at 3:15 am

    Medium Severity Description The Color Palette plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘hex’ parameter in all versions up to, and including, 4.3.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. Read more at https://www.tenable.com/cve/CVE-2025-5233

  • CVE-2025-4584
    on June 13, 2025 at 3:15 am

    Medium Severity Description The IRM Newsroom plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin’s ‘irmeventlist’ shortcode in all versions up to, and including, 1.2.17 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. Read more at https://www.tenable.com/cve/CVE-2025-4584

  • CVE-2025-4585
    on June 13, 2025 at 3:15 am

    Medium Severity Description The IRM Newsroom plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin’s ‘irmflat’ shortcode in all versions up to, and including, 1.2.17 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. Read more at https://www.tenable.com/cve/CVE-2025-4585

  • CVE-2025-4586
    on June 13, 2025 at 3:15 am

    Medium Severity Description The IRM Newsroom plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin’s ‘irmcalendarview’ shortcode in all versions up to, and including, 1.2.17 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. Read more at https://www.tenable.com/cve/CVE-2025-4586

  • CVE-2025-5123
    on June 13, 2025 at 3:15 am

    Medium Severity Description The Contact Us Page – Contact People plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘style’ parameter in all versions up to, and including, 3.7.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. Read more at https://www.tenable.com/cve/CVE-2025-5123

  • CVE-2025-47959
    on June 13, 2025 at 2:15 am

    High Severity Description Improper neutralization of special elements used in a command (‘command injection’) in Visual Studio allows an authorized attacker to execute code over a network. Read more at https://www.tenable.com/cve/CVE-2025-47959

  • CVE-2025-30399
    on June 13, 2025 at 2:15 am

    High Severity Description Untrusted search path in .NET and Visual Studio allows an unauthorized attacker to execute code over a network. Read more at https://www.tenable.com/cve/CVE-2025-30399

  • CVE-2025-4228
    on June 13, 2025 at 12:15 am

    Medium Severity Description An incorrect privilege assignment vulnerability in Palo Alto Networks Cortex® XDR Broker VM allows an authenticated administrative user to execute certain files available within the Broker VM and escalate their privileges to root. Read more at https://www.tenable.com/cve/CVE-2025-4228

  • CVE-2025-4230
    on June 13, 2025 at 12:15 am

    High Severity Description A command injection vulnerability in Palo Alto Networks PAN-OS® software enables an authenticated administrator to bypass system restrictions and run arbitrary commands as a root user. To be able to exploit this issue, the user must have access to the PAN-OS CLI. The security risk posed by this issue is significantly minimized when CLI access is restricted to a limited group of administrators. Cloud NGFW and Prisma® Access are not affected by this vulnerability. Read more at https://www.tenable.com/cve/CVE-2025-4230

  • CVE-2025-4231
    on June 13, 2025 at 12:15 am

    High Severity Description A command injection vulnerability in Palo Alto Networks PAN-OS® enables an authenticated administrative user to perform actions as the root user. The attacker must have network access to the management web interface and successfully authenticate to exploit this issue. Cloud NGFW and Prisma Access are not impacted by this vulnerability. Read more at https://www.tenable.com/cve/CVE-2025-4231

  • CVE-2025-4232
    on June 13, 2025 at 12:15 am

    High Severity Description An improper neutralization of wildcards vulnerability in the log collection feature of Palo Alto Networks GlobalProtect™ app on macOS allows a non administrative user to escalate their privileges to root. Read more at https://www.tenable.com/cve/CVE-2025-4232

  • CVE-2025-49589
    on June 12, 2025 at 9:15 pm

    Medium Severity Description PCSX2 is a free and open-source PlayStation 2 (PS2) emulator. A stack-based buffer overflow exists in the Kprintf_HLE function of PCSX2 versions up to 2.3.414. Opening a disc image that logs a specially crafted message may allow a remote attacker to execute arbitrary code if the user enabled IOP Console Logging. This vulnerability is fixed in 2.3.414. Read more at https://www.tenable.com/cve/CVE-2025-49589

  • CVE-2025-5485
    on June 12, 2025 at 8:15 pm

    High Severity Description User names used to access the web management interface are limited to the device identifier, which is a numerical identifier no more than 10 digits. A malicious actor can enumerate potential targets by incrementing or decrementing from known identifiers or through enumerating random digit sequences. Read more at https://www.tenable.com/cve/CVE-2025-5485

  • CVE-2025-5484
    on June 12, 2025 at 8:15 pm

    High Severity Description A username and password are required to authenticate to the central SinoTrack device management interface. The username for all devices is an identifier printed on the receiver. The default password is well-known and common to all devices. Modification of the default password is not enforced during device setup. A malicious actor can retrieve device identifiers with either physical access or by capturing identifiers from pictures of the devices posted on publicly accessible websites such as eBay. Read more at https://www.tenable.com/cve/CVE-2025-5484

  • CVE-2025-6031
    on June 12, 2025 at 8:15 pm

    High Severity Description Amazon Cloud Cam is a home security camera that was deprecated on December 2, 2022, is end of life, and is no longer actively supported. When a user powers on the Amazon Cloud Cam, the device attempts to connect to a remote service infrastructure that has been deprecated due to end-of-life status. The device defaults to a pairing status in which an arbitrary user can bypass SSL pinning to associate the device to an arbitrary network, allowing for network traffic interception and modification. We recommend customers discontinue usage of any remaining Amazon Cloud Cams. Read more at https://www.tenable.com/cve/CVE-2025-6031

  • CVE-2025-48699
    on June 12, 2025 at 8:15 pm

    Severity Not Scored Description Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. Reason: This candidate was issued in error. Notes: All references and descriptions in this candidate have been removed to prevent accidental usage. Read more at https://www.tenable.com/cve/CVE-2025-48699

  • CVE-2025-49575
    on June 12, 2025 at 7:15 pm

    Medium Severity Description Citizen is a MediaWiki skin that makes extensions part of the cohesive experience. Multiple system messages are inserted into the CommandPaletteFooter as raw HTML, allowing anybody who can edit those messages to insert arbitrary HTML into the DOM. This impacts wikis where a group has the `editinterface` but not the `editsitejs` user right. This vulnerability is fixed in 3.3.1. Read more at https://www.tenable.com/cve/CVE-2025-49575

  • CVE-2025-49576
    on June 12, 2025 at 7:15 pm

    Medium Severity Description Citizen is a MediaWiki skin that makes extensions part of the cohesive experience. The citizen-search-noresults-title and citizen-search-noresults-desc system messages are inserted into raw HTML, allowing anybody who can edit those messages to insert arbitrary HTML into the DOM. This vulnerability is fixed in 3.3.1. Read more at https://www.tenable.com/cve/CVE-2025-49576

  • CVE-2025-49577
    on June 12, 2025 at 7:15 pm

    Medium Severity Description Citizen is a MediaWiki skin that makes extensions part of the cohesive experience. Various preferences messages are inserted into raw HTML, allowing anybody who can edit those messages to insert arbitrary HTML into the DOM. This vulnerability is fixed in 3.3.1. Read more at https://www.tenable.com/cve/CVE-2025-49577

Share Websitecyber
We are an ethical website cyber security team and we perform security assessments to protect our clients.