Updated CVEs from Tenable

Updated CVEs from Tenable Get the latest CVE updates from Tenable

  • CVE-2025-12099
    on November 8, 2025 at 9:15 am

    High Severity Description The Academy LMS – WordPress LMS Plugin for Complete eLearning Solution plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 3.3.8 via deserialization of untrusted input in the ‘import_all_courses’ function. This makes it possible for authenticated attackers, with Administrator-level access and above, to inject a PHP Object. No known POP chain is present in the vulnerable software, which means this vulnerability has no impact unless another plugin or theme containing a POP chain is installed on the site. If a POP chain is present via an additional plugin or theme installed on the target system, it may allow the attacker to perform actions like delete arbitrary files, retrieve sensitive data, or execute code depending on the POP chain present. Read more at https://www.tenable.com/cve/CVE-2025-12099

  • CVE-2025-12098
    on November 8, 2025 at 9:15 am

    Medium Severity Description The Academy LMS – WordPress LMS Plugin for Complete eLearning Solution plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 3.3.8 via the ‘enqueue_social_login_script’ function. This makes it possible for unauthenticated attackers to extract sensitive data including the Facebook App Secret if Facebook Social Login is enabled. Read more at https://www.tenable.com/cve/CVE-2025-12098

  • CVE-2025-12498
    on November 8, 2025 at 7:15 am

    Medium Severity Description The EventPrime – Events Calendar, Bookings and Tickets plugin for WordPress is vulnerable to unauthorized booking note creation due to a missing capability check on the ‘booking_add_notes’ function in all versions up to, and including, 4.2.0.0. This makes it possible for authenticated attackers, with Subscriber-level access and above, to add a note to the backend view of any booking. Read more at https://www.tenable.com/cve/CVE-2025-12498

  • CVE-2025-9334
    on November 8, 2025 at 6:15 am

    High Severity Description The Better Find and Replace – AI-Powered Suggestions plugin for WordPress is vulnerable to Limited Code Injection in all versions up to, and including, 1.7.7. This is due to insufficient input validation and restriction on the ‘rtafar_ajax’ function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to call arbitrary plugin functions and execute code within those functions. Read more at https://www.tenable.com/cve/CVE-2025-9334

  • CVE-2025-12353
    on November 8, 2025 at 4:15 am

    Medium Severity Description The WPFunnels – The Easiest Funnel Builder For WordPress And WooCommerce To Collect Leads And Increase Sales plugin for WordPress is vulnerable to unauthorized user registration in all versions up to, and including, 3.6.2. This is due to the plugin relying on a user controlled value ‘optin_allow_registration’ to determine if user registration is allowed, instead of the site-specific setting. This makes it possible for unauthenticated attackers to register new user accounts, even when user registration is disabled. Read more at https://www.tenable.com/cve/CVE-2025-12353

  • CVE-2025-12193
    on November 8, 2025 at 4:15 am

    Medium Severity Description The Mang Board WP plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘mp’ parameter in all versions up to, and including, 2.3.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. Read more at https://www.tenable.com/cve/CVE-2025-12193

  • CVE-2025-12177
    on November 8, 2025 at 4:15 am

    Medium Severity Description The Download Manager plugin for WordPress is vulnerable to unauthorized access due to a hardcoded Cron key used in the deleteExpired() and clearTempDataCPCron() functions in all versions up to, and including, 3.3.30. This makes it possible for unauthenticated attackers to trigger these cron jobs leading to deletion of expired posts and clearing cache. Read more at https://www.tenable.com/cve/CVE-2025-12177

  • CVE-2025-7663
    on November 8, 2025 at 4:15 am

    Medium Severity Description The Ovatheme Events Manager plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on several functions in the /class-ovaem-ajax.php file in all versions up to, and including, 1.8.6. This makes it possible for unauthenticated attackers to delete ticket files, download tickets, and more. Read more at https://www.tenable.com/cve/CVE-2025-7663

  • CVE-2025-12161
    on November 8, 2025 at 4:15 am

    High Severity Description The Smart Auto Upload Images plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the auto-image creation functionality in all versions up to, and including, 1.2.0. This makes it possible for authenticated attackers, with Contributor-level access and above, to upload arbitrary files on the affected site’s server which may make remote code execution possible. Read more at https://www.tenable.com/cve/CVE-2025-12161

  • CVE-2025-12125
    on November 8, 2025 at 4:15 am

    Medium Severity Description The HTML Forms – Simple WordPress Forms Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 1.5.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled. Read more at https://www.tenable.com/cve/CVE-2025-12125

  • CVE-2025-12167
    on November 8, 2025 at 4:15 am

    Medium Severity Description The Contact Form 7 AWeber Extension plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the ‘wp_ajax_aweber_logreset’ AJAX endpoint in all versions up to, and including, 0.1.42. This makes it possible for authenticated attackers, with Subscriber-level access and above, to reset the AWeber logs. Read more at https://www.tenable.com/cve/CVE-2025-12167

  • CVE-2025-12112
    on November 8, 2025 at 4:15 am

    Medium Severity Description The Insert Headers and Footers Code – HT Script plugin for WordPress is vulnerable to Stored Cross-Site Scripting via adding scripts in all versions up to, and including, 1.1.6 due to insufficient capability checks. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. Read more at https://www.tenable.com/cve/CVE-2025-12112

  • CVE-2025-12064
    on November 8, 2025 at 4:15 am

    Medium Severity Description The WP2Social Auto Publish plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via PostMessage in all versions up to, and including, 2.4.7 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. Read more at https://www.tenable.com/cve/CVE-2025-12064

  • CVE-2025-12042
    on November 8, 2025 at 4:15 am

    Medium Severity Description The Course Booking System plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check in the csv-export.php file in all versions up to, and including, 6.1.5. This makes it possible for unauthenticated attackers to directly access the file and obtain an export of all booking data. Read more at https://www.tenable.com/cve/CVE-2025-12042

  • CVE-2025-12000
    on November 8, 2025 at 4:15 am

    Medium Severity Description The WPFunnels plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the wpfnl_delete_log() function in all versions up to, and including, 3.6.2. This makes it possible for authenticated attackers, with Administrator-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php). Read more at https://www.tenable.com/cve/CVE-2025-12000

  • CVE-2025-11972
    on November 8, 2025 at 4:15 am

    Medium Severity Description The Tag, Category, and Taxonomy Manager – AI Autotagger with OpenAI plugin for WordPress is vulnerable to SQL Injection via the ‘post_types’ parameter in all versions up to, and including, 3.40.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Editor-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. Read more at https://www.tenable.com/cve/CVE-2025-11972

  • CVE-2025-11748
    on November 8, 2025 at 4:15 am

    Medium Severity Description The Groups plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 6.7.0 via the ‘group_id’ parameter of the group_join function due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with Subscriber-level access and above, to register for groups other than ones set in the shortcode. Read more at https://www.tenable.com/cve/CVE-2025-11748

  • CVE-2025-12583
    on November 8, 2025 at 3:15 am

    Medium Severity Description The Simple Downloads List plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the ‘wp_ajax_neofix_sdl_edit’ AJAX endpoint along with many others in all versions up to, and including, 1.4.3. This makes it possible for authenticated attackers, with Subscriber-level access and above, to alter many of the plugin’s settings/downloads and inject malicious web scripts. Read more at https://www.tenable.com/cve/CVE-2025-12583

  • CVE-2025-11452
    on November 8, 2025 at 3:15 am

    High Severity Description The Asgaros Forum plugin for WordPress is vulnerable to SQL Injection via the ‘$_COOKIE[‘asgarosforum_unread_exclude’]’ cookie in all versions up to, and including, 3.1.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. Read more at https://www.tenable.com/cve/CVE-2025-11452

  • CVE-2025-64495
    on November 8, 2025 at 2:15 am

    High Severity Description Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. In versions 0.6.34 and below, the functionality that inserts custom prompts into the chat window is vulnerable to DOM XSS when ‘Insert Prompt as Rich Text’ is enabled, since the prompt body is assigned to the DOM sink .innerHtml without sanitisation. Any user with permissions to create prompts can abuse this to plant a payload that could be triggered by other users if they run the corresponding / command to insert the prompt. This issue is fixed in version 0.6.35. Read more at https://www.tenable.com/cve/CVE-2025-64495

  • CVE-2025-64494
    on November 8, 2025 at 2:15 am

    Medium Severity Description Soft Serve is a self-hostable Git server for the command line. In versions prior to 0.10.0, there are several places where the user can insert data (e.g. names) and ANSI escape sequences are not being removed, which can then be used, for example, to show fake alerts. In the same token, git messages, when printed, are also not being sanitized. This issue is fixed in version 0.10.0. Read more at https://www.tenable.com/cve/CVE-2025-64494

  • CVE-2025-64496
    on November 8, 2025 at 2:15 am

    High Severity Description Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Versions 0.6.224 and prior contain a code injection vulnerability in the Direct Connections feature that allows malicious external model servers to execute arbitrary JavaScript in victim browsers via Server-Sent Event (SSE) execute events. This leads to authentication token theft, complete account takeover, and when chained with the Functions API, enables remote code execution on the backend server. The attack requires the victim to enable Direct Connections (disabled by default) and add the attacker’s malicious model URL, achievable through social engineering of the admin and subsequent users. This issue is fixed in version 0.6.35. Read more at https://www.tenable.com/cve/CVE-2025-64496

  • CVE-2025-64493
    on November 8, 2025 at 2:15 am

    Medium Severity Description SuiteCRM is an open-source, enterprise-ready Customer Relationship Management (CRM) software application. In versions 8.6.0 through 8.9.0, there is an authenticated, blind (time-based) SQL-injection inside the appMetadata-operation of the GraphQL-API. This allows extraction of arbitrary data from the database, and does not require administrative access. This issue is fixed in version 8.9.1. Read more at https://www.tenable.com/cve/CVE-2025-64493

  • CVE-2025-64492
    on November 8, 2025 at 2:15 am

    High Severity Description SuiteCRM is an open-source, enterprise-ready Customer Relationship Management (CRM) software application. Versions 8.9.0 and below contain a time-based blind SQL Injection vulnerability. This vulnerability allows an authenticated attacker to infer data from the database by measuring response times, potentially leading to the extraction of sensitive information. It is possible for an attacker to enumerate database, table, and column names, extract sensitive data, or escalate privileges. This is fixed in version 8.9.1. Read more at https://www.tenable.com/cve/CVE-2025-64492

  • CVE-2025-64491
    on November 8, 2025 at 1:15 am

    Medium Severity Description SuiteCRM is an open-source, enterprise-ready Customer Relationship Management (CRM) software application. Versions 7.14.7 and below allow unauthenticated reflected Cross-Site Scripting (XSS). Successful exploitation could lead to full account takeover, for example by altering the login form to send credentials to an attacker-controlled server. As a reflected XSS issue, exploitation requires the victim to open a crafted malicious link, which can be delivered via phishing, social media, or other communication channels. This issue is fixed in version 7.14.8. Read more at https://www.tenable.com/cve/CVE-2025-64491

  • CVE-2025-64490
    on November 8, 2025 at 1:15 am

    High Severity Description SuiteCRM is an open-source, enterprise-ready Customer Relationship Management (CRM) software application. Versions 7.14.7 and prior, 8.0.0-beta.1 through 8.9.0 allow a low-privileged user with a restrictive role to view and create work items through the Resource Calendar and project screens, even when the related modules (Projects, Project Tasks, Tasks, Leads, Accounts, Meetings, Calls) are explicitly set to Disabled/None in Role Management. This indicates inconsistent ACL/RBAC enforcement across modules and views, resulting in unauthorized data exposure and modification. This issue is fixed in versions 7.14.8 and 8.9.1. Read more at https://www.tenable.com/cve/CVE-2025-64490

  • CVE-2025-64489
    on November 8, 2025 at 1:15 am

    High Severity Description SuiteCRM is an open-source, enterprise-ready Customer Relationship Management (CRM) software application. Versions 7.14.7 and prior, 8.0.0-beta.1 through 8.9.0 contain a privilege escalation vulnerability where user sessions are not invalidated upon account deactivation. An inactive user with an active session can continue to access the application and, critically, can self-reactivate their account. This undermines administrative controls and allows unauthorized persistence. This issue is fixed in versions 7.14.8 and 8.9.1. Read more at https://www.tenable.com/cve/CVE-2025-64489

  • CVE-2025-64486
    on November 8, 2025 at 12:15 am

    Critical Severity Description calibre is an e-book manager. In versions 8.13.0 and prior, calibre does not validate filenames when handling binary assets in FB2 files, allowing an attacker to write arbitrary files on the filesystem when viewing or converting a malicious FictionBook file. This can be leveraged to achieve arbitrary code execution. This issue is fixed in version 8.14.0. Read more at https://www.tenable.com/cve/CVE-2025-64486

  • CVE-2025-64488
    on November 8, 2025 at 12:15 am

    High Severity Description SuiteCRM is an open-source, enterprise-ready Customer Relationship Management (CRM) software application. In versions 7.14.7 and below and 8.0.0-beta.1 through 8.9.0 8.0.0-beta.1, an attacker can craft a malicious call_id that alters the logic of the SQL query or injects arbitrary SQL. An attack can lead to unauthorized data access and data ex-filtration, complete database compromise, and other various issues. This issue is fixed in versions 7.14.8 and 8.9.1. Read more at https://www.tenable.com/cve/CVE-2025-64488

  • CVE-2025-64485
    on November 8, 2025 at 12:15 am

    Medium Severity Description CVAT is an open source interactive video and image annotation tool for computer vision. In versions 2.4.0 through 2.48.1, a malicious CVAT user with at least the User global role may create files in the root of the mounted file share, or overwrite existing files. If no file share is mounted, the user will be able to create files in the share directory of the import worker container, potentially filling up disk space. This issue is fixed in version 2.49.0. Read more at https://www.tenable.com/cve/CVE-2025-64485

Share Websitecyber
We are an ethical website cyber security team and we perform security assessments to protect our clients.