CWE-424

Improper Protection of Alternate Path

10 CVEs Avg CVSS 6.3 MITRE
3
CRITICAL
0
HIGH
6
MEDIUM
1
LOW
4
POC
1
KEV

Monthly

CVE-2026-4270 MEDIUM PATCH This Month

AWS API MCP Server versions 0.2.14 through 1.3.9 contain an improper path protection flaw in the no-access and workdir features that allows local attackers to bypass file access restrictions and read arbitrary files accessible to the MCP client application. An attacker with local access and user interaction can exploit this vulnerability to expose sensitive local file contents. Users should upgrade to version 1.3.9 or later to remediate this issue.

Authentication Bypass Aws Api Mcp Server
NVD GitHub VulDB
CVSS 3.1
5.5
EPSS
0.0%
CVE-2025-4617 LOW Monitor

An insufficient policy enforcement vulnerability in Palo Alto Networks Prisma® Browser on Windows allows a locally authenticated non-admin user to bypass the screenshot control feature of the. Rated low severity (CVSS 1.1), this vulnerability is low attack complexity. No vendor patch available.

Paloalto Microsoft Authentication Bypass Windows
NVD
CVSS 4.0
1.1
EPSS
0.0%
CVE-2025-49163 MEDIUM This Month

CVE-2025-49163 is a security vulnerability (CVSS 6.7) that allows booting an arbitrary image. Remediation should follow standard vulnerability management procedures.

Information Disclosure
NVD
CVSS 3.1
6.7
EPSS
0.0%
CVE-2025-49162 MEDIUM This Month

CVE-2025-49162 is a security vulnerability (CVSS 6.4) that allows file overwrite. Remediation should follow standard vulnerability management procedures.

Information Disclosure
NVD
CVSS 3.1
6.4
EPSS
0.0%
CVE-2025-48828 CRITICAL POC THREAT Act Now

vBulletin 5.0.0 through 5.7.5 and 6.0.0 through 6.0.3 running on PHP 8.1 or later allow unauthenticated access to protected API controllers. The /api.php endpoint fails to properly enforce method visibility on PHP 8.1+, enabling attackers to invoke internal API methods that should be restricted, as exploited in the wild in May 2025.

PHP RCE Vbulletin
NVD
CVSS 3.1
9.0
EPSS
73.7%
CVE-2025-48827 CRITICAL POC THREAT Act Now

vBulletin versions 5.0.0 through 5.7.5 and 6.0.0 through 6.0.3 are vulnerable to remote code execution through crafted template conditional expressions. Attackers abuse PHP's alternative function invocation syntax to bypass template engine security checks and execute arbitrary PHP code, as actively exploited in the wild in May 2025.

Information Disclosure PHP Vbulletin
NVD
CVSS 3.1
10.0
EPSS
69.4%
CVE-2025-46655 MEDIUM This Month

CodiMD through 2.5.4 has a CSP-based protection mechanism against XSS through uploaded SVG documents containing JavaScript, but it can be bypassed in certain cases of different-origin file storage,. Rated medium severity (CVSS 4.9), this vulnerability is remotely exploitable. No vendor patch available.

XSS
NVD GitHub
CVSS 3.1
4.9
EPSS
0.2%
CVE-2025-46654 MEDIUM POC This Month

CodiMD through 2.2.0 has a CSP-based protection mechanism against XSS through uploaded JavaScript content, but it can be bypassed by uploading a .html file that references an uploaded .js file. Rated medium severity (CVSS 4.9), this vulnerability is remotely exploitable. Public exploit code available and no vendor patch available.

XSS Codimd
NVD GitHub
CVSS 3.1
4.9
EPSS
0.2%
CVE-2024-58136 CRITICAL POC KEV PATCH THREAT Act Now

Yii Framework 2 before 2.0.52 contains a behavior attachment regression that allows attackers to exploit the __class array key for arbitrary class instantiation, exploited in the wild February-April 2025.

Information Disclosure Yii
NVD GitHub
CVSS 3.1
9.0
EPSS
57.5%
CVE-2025-0113 MEDIUM This Month

A problem with the network isolation mechanism of the Palo Alto Networks Cortex XDR Broker VM allows attackers unauthorized access to Docker containers from the host network used by Broker VM. Rated medium severity (CVSS 5.3), this vulnerability is no authentication required, low attack complexity. No vendor patch available.

Docker Authentication Bypass Paloalto
NVD
CVSS 4.0
5.3
EPSS
0.2%
CVE-2026-4270
EPSS 0% CVSS 5.5
MEDIUM PATCH This Month

AWS API MCP Server versions 0.2.14 through 1.3.9 contain an improper path protection flaw in the no-access and workdir features that allows local attackers to bypass file access restrictions and read arbitrary files accessible to the MCP client application. An attacker with local access and user interaction can exploit this vulnerability to expose sensitive local file contents. Users should upgrade to version 1.3.9 or later to remediate this issue.

Authentication Bypass Aws Api Mcp Server
NVD GitHub VulDB
CVE-2025-4617
EPSS 0% CVSS 1.1
LOW Monitor

An insufficient policy enforcement vulnerability in Palo Alto Networks Prisma® Browser on Windows allows a locally authenticated non-admin user to bypass the screenshot control feature of the. Rated low severity (CVSS 1.1), this vulnerability is low attack complexity. No vendor patch available.

Paloalto Microsoft Authentication Bypass +1
NVD
CVE-2025-49163
EPSS 0% CVSS 6.7
MEDIUM This Month

CVE-2025-49163 is a security vulnerability (CVSS 6.7) that allows booting an arbitrary image. Remediation should follow standard vulnerability management procedures.

Information Disclosure
NVD
CVE-2025-49162
EPSS 0% CVSS 6.4
MEDIUM This Month

CVE-2025-49162 is a security vulnerability (CVSS 6.4) that allows file overwrite. Remediation should follow standard vulnerability management procedures.

Information Disclosure
NVD
CVE-2025-48828
EPSS 74% CVSS 9.0
CRITICAL POC THREAT Act Now

vBulletin 5.0.0 through 5.7.5 and 6.0.0 through 6.0.3 running on PHP 8.1 or later allow unauthenticated access to protected API controllers. The /api.php endpoint fails to properly enforce method visibility on PHP 8.1+, enabling attackers to invoke internal API methods that should be restricted, as exploited in the wild in May 2025.

PHP RCE Vbulletin
NVD
CVE-2025-48827
EPSS 69% CVSS 10.0
CRITICAL POC THREAT Act Now

vBulletin versions 5.0.0 through 5.7.5 and 6.0.0 through 6.0.3 are vulnerable to remote code execution through crafted template conditional expressions. Attackers abuse PHP's alternative function invocation syntax to bypass template engine security checks and execute arbitrary PHP code, as actively exploited in the wild in May 2025.

Information Disclosure PHP Vbulletin
NVD
CVE-2025-46655
EPSS 0% CVSS 4.9
MEDIUM This Month

CodiMD through 2.5.4 has a CSP-based protection mechanism against XSS through uploaded SVG documents containing JavaScript, but it can be bypassed in certain cases of different-origin file storage,. Rated medium severity (CVSS 4.9), this vulnerability is remotely exploitable. No vendor patch available.

XSS
NVD GitHub
CVE-2025-46654
EPSS 0% CVSS 4.9
MEDIUM POC This Month

CodiMD through 2.2.0 has a CSP-based protection mechanism against XSS through uploaded JavaScript content, but it can be bypassed by uploading a .html file that references an uploaded .js file. Rated medium severity (CVSS 4.9), this vulnerability is remotely exploitable. Public exploit code available and no vendor patch available.

XSS Codimd
NVD GitHub
CVE-2024-58136
EPSS 58% CVSS 9.0
CRITICAL POC KEV PATCH THREAT Act Now

Yii Framework 2 before 2.0.52 contains a behavior attachment regression that allows attackers to exploit the __class array key for arbitrary class instantiation, exploited in the wild February-April 2025.

Information Disclosure Yii
NVD GitHub
CVE-2025-0113
EPSS 0% CVSS 5.3
MEDIUM This Month

A problem with the network isolation mechanism of the Palo Alto Networks Cortex XDR Broker VM allows attackers unauthorized access to Docker containers from the host network used by Broker VM. Rated medium severity (CVSS 5.3), this vulnerability is no authentication required, low attack complexity. No vendor patch available.

Docker Authentication Bypass Paloalto
NVD

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy