PHP

8861 CVEs product

Monthly

CVE-2025-50189 HIGH POC PATCH This Week

Chamilo is a learning management system. [CVSS 8.8 HIGH]

PHP Chamilo Lms
NVD GitHub
CVSS 3.1
8.8
EPSS
0.1%
CVE-2025-50188 HIGH POC PATCH This Week

Chamilo is a learning management system. [CVSS 7.2 HIGH]

PHP Chamilo Lms
NVD GitHub
CVSS 3.1
7.2
EPSS
0.1%
CVE-2026-26698 MEDIUM POC This Month

SQL injection in Simple Student Alumni System v1.0's modal_edit.php endpoint allows authenticated administrators to extract sensitive database information through unauthenticated network requests. Public exploit code exists for this vulnerability, though no patch is currently available. The attack requires high-level privileges but can bypass intended access controls to read confidential data.

PHP SQLi Simple Student Alumni System
NVD GitHub
CVSS 3.1
4.9
EPSS
0.0%
CVE-2026-26697 MEDIUM POC This Month

Simple Student Alumni System v1.0 contains a SQL injection vulnerability in the recordteacher_view.php endpoint that allows authenticated administrators to extract sensitive data from the underlying database. Public exploit code exists for this vulnerability, though a patch is currently unavailable. The attack requires high-level administrative privileges but can be executed remotely without user interaction.

PHP SQLi Simple Student Alumni System
NVD GitHub
CVSS 3.1
4.9
EPSS
0.0%
CVE-2026-3413 HIGH POC This Week

SQL injection in itsourcecode University Management System 1.0 via the ID parameter in /admin_single_student.php allows unauthenticated remote attackers to manipulate database queries with public exploit code currently available. The vulnerability enables attackers to read, modify, or delete sensitive academic and administrative data without authentication. No patch is currently available for this PHP-based application.

PHP SQLi University Management System
NVD GitHub VulDB
CVSS 3.1
7.3
EPSS
0.0%
CVE-2026-3412 MEDIUM POC This Month

University Management System versions up to 1.0 is affected by cross-site scripting (xss) (CVSS 4.3).

PHP XSS University Management System
NVD GitHub VulDB
CVSS 3.1
4.3
EPSS
0.0%
CVE-2026-3411 HIGH POC This Week

SQL injection in itsourcecode University Management System 1.0 via the ID parameter in /admin_single_student_update.php allows unauthenticated remote attackers to manipulate database queries and potentially extract or modify sensitive student records. Public exploit code exists for this vulnerability, and no patch is currently available, leaving affected institutions at immediate risk.

PHP SQLi University Management System
NVD GitHub VulDB
CVSS 3.1
7.3
EPSS
0.0%
CVE-2026-3410 HIGH POC This Week

Society Management System versions up to 1.0 contains a vulnerability that allows attackers to sql injection (CVSS 7.3).

PHP SQLi Society Management System
NVD GitHub VulDB
CVSS 3.1
7.3
EPSS
0.0%
CVE-2026-3406 HIGH POC This Week

SQL injection in Online Art Gallery Shop 1.0 via the fname parameter in /admin/registration.php enables unauthenticated remote attackers to manipulate database queries. Public exploit code exists for this vulnerability, and no patch is currently available, leaving affected PHP installations at immediate risk of data compromise or unauthorized access.

PHP SQLi Online Art Gallery Shop
NVD GitHub VulDB
CVSS 3.1
7.3
EPSS
0.0%
CVE-2026-3403 LOW POC Monitor

A vulnerability was detected in PHPGurukul Student Record Management System 1.0. This issue affects some unknown processing of the file /edit-subject.php. [CVSS 2.4 LOW]

PHP XSS
NVD GitHub VulDB
CVSS 3.1
2.4
EPSS
0.0%
CVE-2026-3402 LOW POC Monitor

A security vulnerability has been detected in PHPGurukul Student Record Management System up to 1.0. This vulnerability affects unknown code of the file /edit-course.php. [CVSS 2.4 LOW]

PHP XSS
NVD GitHub VulDB
CVSS 3.1
2.4
EPSS
0.0%
CVE-2026-3395 HIGH PATCH This Week

Maxsite Cms versions up to 109.1. contains a vulnerability that allows attackers to code injection (CVSS 7.3).

PHP React Code Injection Maxsite Cms
NVD GitHub VulDB
CVSS 3.1
7.3
EPSS
0.0%
CVE-2025-13673 HIGH This Week

The Tutor LMS - eLearning and online course solution plugin for WordPress is vulnerable to SQL Injection via the 'coupon_code' parameter in all versions up to, and including, 3.9.6 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. [CVSS 7.5 HIGH]

WordPress SQLi PHP
NVD
CVSS 3.1
7.5
EPSS
0.1%
CVE-2026-2471 HIGH This Week

Unauthenticated attackers can inject malicious serialized PHP objects into the WP Mail Logging plugin (versions up to 1.15.0) through email forms, exploiting unsafe deserialization in the BaseModel class. When administrators view the logged emails, the injected payload deserializes into arbitrary PHP objects, potentially enabling code execution if leveraged with gadget chains from other installed plugins or themes. No patch is currently available.

WordPress PHP Deserialization
NVD
CVSS 3.1
7.5
EPSS
0.0%
CVE-2026-1542 MEDIUM This Month

Super Stage WP WordPre versions up to 1.0.1 is affected by deserialization of untrusted data (CVSS 6.5).

WordPress PHP Deserialization
NVD WPScan
CVSS 3.1
6.5
EPSS
0.1%
CVE-2026-28517 CRITICAL POC PATCH Act Now

OS command injection in openDCIM 23.04 through commit 4467e9c4 via report_network_map.php allows authenticated users to execute arbitrary commands. EPSS 0.57% with PoC and patch available.

PHP Command Injection Opendcim
NVD GitHub
CVSS 3.1
9.8
EPSS
0.6%
CVE-2026-28516 HIGH POC PATCH This Week

Authenticated users can execute arbitrary SQL commands against openDCIM 23.04 and earlier through unsanitized input in the Config::UpdateParameter function, enabling complete database compromise. The vulnerability exists in install.php and container-install.php handlers that pass user input directly into SQL queries without prepared statements. Public exploit code is available for this SQL injection vulnerability affecting PHP-based deployments.

PHP SQLi Opendcim
NVD GitHub
CVSS 3.1
8.8
EPSS
0.0%
CVE-2026-28515 HIGH POC PATCH This Week

OpenDCIM through version 23.04 fails to enforce authorization checks in its installation and upgrade handlers, allowing any authenticated user to modify LDAP configuration settings regardless of their assigned roles. Public exploit code exists for this vulnerability, and in deployments where REMOTE_USER authentication is not enforced, unauthenticated attackers may also access these administrative functions. An attacker can exploit this to alter application configuration and potentially compromise directory services integration.

PHP Ldap Opendcim
NVD GitHub
CVSS 3.1
8.8
EPSS
0.2%
CVE-2026-28411 CRITICAL POC Act Now

Authentication bypass via unsafe extract() function in WeGIA before 3.6.5. The extract() call on user-controlled data allows overwriting authentication variables. EPSS 0.7% with PoC available.

PHP Authentication Bypass Wegia
NVD GitHub
CVSS 3.1
9.8
EPSS
0.7%
CVE-2026-28408 CRITICAL POC Act Now

Authentication bypass in WeGIA charitable institution management system before 3.6.5. The adicionar_tipo_docs_atendido.php script lacks authentication, allowing unauthorized access. PoC available.

PHP Golang Wegia
NVD GitHub
CVSS 3.1
9.8
EPSS
0.1%
CVE-2026-28354 MEDIUM POC This Month

Unauthorized collection manipulation in ClipBucket v5 prior to 5.5.3 #59 allows authenticated attackers to add or remove items from other users' collections due to missing and broken authorization checks in the add and delete item functions. An attacker with valid credentials can exploit this to alter collections they do not own without restriction. Public exploit code exists for this vulnerability, and no patch is currently available.

PHP Clipbucket
NVD GitHub
CVSS 3.1
6.5
EPSS
0.0%
CVE-2026-27832 HIGH This Week

SQL injection in Group Office email template selection endpoint allows authenticated attackers to extract sensitive data from the database through the unvalidated comparator parameter in advancedQueryData. An attacker with valid credentials can perform blind boolean-based attacks to exfiltrate password hashes from the core_auth_password table. Affected versions prior to 26.0.8, 25.0.87, and 6.8.153 require immediate patching.

PHP SQLi Group Office
NVD GitHub
CVSS 3.1
8.8
EPSS
0.0%
CVE-2019-25497 HIGH POC This Week

osCommerce 2.3.4.1 contains a SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the currency parameter. [CVSS 8.2 HIGH]

PHP SQLi Oscommerce
NVD Exploit-DB
CVSS 3.1
8.2
EPSS
0.1%
CVE-2019-25496 HIGH POC This Week

osCommerce 2.3.4.1 contains a SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the products_id parameter. [CVSS 8.2 HIGH]

PHP SQLi Oscommerce
NVD Exploit-DB
CVSS 3.1
8.2
EPSS
0.1%
CVE-2019-25495 HIGH POC This Week

osCommerce 2.3.4.1 contains a SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the reviews_id parameter. [CVSS 8.2 HIGH]

PHP SQLi Oscommerce
NVD Exploit-DB
CVSS 3.1
8.2
EPSS
0.1%
CVE-2019-25493 HIGH POC This Week

Homey BNB V4 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the 'val' parameter. [CVSS 8.2 HIGH]

PHP SQLi Airbnb Clone Script
NVD Exploit-DB
CVSS 3.1
8.2
EPSS
0.1%
CVE-2019-25492 HIGH POC This Week

Homey BNB V4 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the 'pt' parameter. [CVSS 8.2 HIGH]

PHP SQLi Airbnb Clone Script
NVD Exploit-DB
CVSS 3.1
8.2
EPSS
0.1%
CVE-2019-25491 HIGH POC This Week

Homey BNB V4 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the catid parameter. [CVSS 8.2 HIGH]

PHP SQLi Airbnb Clone Script
NVD Exploit-DB
CVSS 3.1
8.2
EPSS
0.1%
CVE-2019-25490 HIGH POC This Week

Homey BNB V4 contains a SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the 'id' parameter. [CVSS 8.2 HIGH]

PHP SQLi Airbnb Clone Script
NVD Exploit-DB
CVSS 3.1
8.2
EPSS
0.1%
CVE-2026-25147 HIGH POC PATCH This Week

OpenEMR versions prior to 8.0.0 allow authenticated portal users to access other patients' protected health information through insecure direct object references (IDOR) in the payment portal, enabling horizontal privilege escalation to view and modify another patient's demographics, invoices, and payment history. The vulnerability stems from accepting patient ID values from user-controlled request parameters instead of validating against the authenticated user's session. Public exploit code exists for this vulnerability.

PHP Privilege Escalation Openemr
NVD GitHub
CVSS 3.1
7.1
EPSS
0.1%
CVE-2025-14142 MEDIUM This Month

The Electric Enquiries plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'button' parameter of the electric-enquiry shortcode in all versions up to, and including, 1.1 due to insufficient input sanitization and output escaping. [CVSS 6.4 MEDIUM]

WordPress XSS PHP
NVD
CVSS 3.1
6.4
EPSS
0.0%
CVE-2024-10938 MEDIUM This Month

The OVRI Payment plugin for WordPress contains malicious .htaccess files in version 1.7.0. The files contain directives to prevent the execution of certain scripts while allowing execution of known malicious PHP files. [CVSS 6.5 MEDIUM]

WordPress PHP
NVD
CVSS 3.1
6.5
EPSS
0.1%
CVE-2026-3302 MEDIUM POC This Month

Cross-site scripting (XSS) in SourceCodester Doctor Appointment System 1.0 allows unauthenticated remote attackers to inject malicious scripts via the Email parameter in the /register.php Sign Up Page. Public exploit code exists for this vulnerability, increasing the risk of active exploitation. The lack of an available patch leaves affected systems vulnerable to session hijacking and credential theft.

PHP XSS Doctor Appointment System
NVD GitHub VulDB
CVSS 3.1
4.3
EPSS
0.0%
CVE-2025-14149 MEDIUM This Month

The Xpro Addons - 140+ Widgets for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Image Scroller widget box link attribute in all versions up to, and including, 1.4.24 due to insufficient input sanitization and output escaping on user supplied attributes. [CVSS 6.4 MEDIUM]

WordPress XSS PHP
NVD
CVSS 3.1
6.4
EPSS
0.0%
CVE-2025-14040 MEDIUM This Month

The Automotive Car Dealership Business WordPress Theme for WordPress is vulnerable to Stored Cross-Site Scripting via the 'Call to Action' custom fields in all versions up to, and including, 13.4. [CVSS 6.4 MEDIUM]

WordPress XSS PHP
NVD
CVSS 3.1
6.4
EPSS
0.0%
CVE-2025-12981 CRITICAL Act Now

Privilege escalation in Listee WordPress theme allows unauthenticated attackers to gain administrator access. All versions up to 1.1.6 affected.

WordPress Privilege Escalation PHP
NVD
CVSS 3.1
9.8
EPSS
0.1%
CVE-2026-3292 MEDIUM POC This Month

SQL injection in jizhiCMS up to version 2.5.6 via the findAll function in the Model.php batch interface allows authenticated remote attackers to manipulate database queries and potentially access or modify sensitive data. Public exploit code is available for this vulnerability, and no patch has been released despite vendor notification. The flaw requires valid user credentials but can be exploited over the network with minimal additional complexity.

PHP SQLi Jizhicms
NVD GitHub VulDB
CVSS 3.1
6.3
EPSS
0.0%
CVE-2026-2428 HIGH This Week

Fluent Forms Pro Add On Pack for WordPress versions up to 6.1.17 fail to verify PayPal Instant Payment Notifications by default, allowing unauthenticated attackers to forge payment confirmations and mark unpaid submissions as paid. An attacker can exploit this to trigger post-payment automation including email delivery, access grants, and digital product distribution without actual payment. The vulnerability affects all installations that have not manually enabled IPN verification and currently lacks a patch.

WordPress PHP
NVD
CVSS 3.1
7.5
EPSS
0.0%
CVE-2026-3261 HIGH POC This Week

SQL injection in itsourcecode School Management System 1.0 via the ID parameter in /settings/index.php allows unauthenticated remote attackers to manipulate database queries and potentially read or modify sensitive data. Public exploit code exists for this vulnerability, and no patch is currently available. Organizations running affected versions should implement access controls or upgrade immediately to mitigate the risk.

PHP SQLi School Management System
NVD GitHub VulDB
CVSS 3.1
7.3
EPSS
0.0%
CVE-2026-22206 HIGH This Week

SQL injection in SPIP prior to 4.4.10 enables authenticated users with low privileges to execute arbitrary SQL commands and achieve remote code execution through union-based injection combined with PHP tag processing. The vulnerability affects SPIP and PHP environments, requiring only network access and valid credentials to exploit. No patch is currently available, presenting significant risk to production SPIP installations.

PHP RCE SQLi Spip
NVD
CVSS 3.1
8.8
EPSS
0.2%
CVE-2026-22205 HIGH This Week

Spip versions up to 4.4.10 contains a vulnerability that allows attackers to access protected information (CVSS 7.5).

PHP Authentication Bypass Spip
NVD
CVSS 3.1
7.5
EPSS
0.3%
CVE-2025-50857 CRITICAL Act Now

Directory traversal in ZenTaoPMS v18.11 through v21.6.beta allows arbitrary code execution through /module/ai/control.php. EPSS 0.76%.

PHP Path Traversal AI / ML
NVD GitHub
CVSS 3.1
9.8
EPSS
0.8%
CVE-2025-56605 MEDIUM This Month

A reflected Cross-Site Scripting (XSS) vulnerability exists in the register.php backend script of PuneethReddyHC Event Management System 1.0. [CVSS 5.4 MEDIUM]

PHP XSS
NVD GitHub
CVSS 3.1
5.4
EPSS
0.0%
CVE-2026-1311 HIGH This Week

Remote code execution in WordPress Worry Proof Backup plugin through path traversal in the backup upload feature allows authenticated users with Subscriber privileges or higher to write arbitrary files, including PHP executables, to the server by uploading specially crafted ZIP archives. The vulnerability affects all versions up to 0.2.4 and currently has no available patch, enabling attackers to achieve full server compromise.

WordPress PHP RCE Path Traversal
NVD
CVSS 3.1
8.8
EPSS
0.3%
CVE-2026-27968 MEDIUM PATCH This Month

Packistry versions prior to 0.13.0 fail to validate token expiration in the RepositoryAwareController::authorize() function, allowing attackers with expired deploy tokens to maintain unauthorized access to repository endpoints and package metadata. An authenticated attacker can leverage an expired token with valid abilities to interact with Composer APIs and potentially download or access sensitive package information. This vulnerability affects self-hosted Packistry deployments and has been patched in version 0.13.0.

PHP Packistry
NVD GitHub
CVSS 3.1
4.3
EPSS
0.0%
CVE-2026-27954 MEDIUM This Month

Live Helper Chat is an open-source application that enables live support websites. [CVSS 6.5 MEDIUM]

PHP Privilege Escalation Live Helper Chat
NVD GitHub
CVSS 3.1
6.5
EPSS
0.0%
CVE-2026-27613 CRITICAL PATCH Act Now

Unauthenticated command injection in TinyWeb HTTP/HTTPS server for Win32 before 2.01 allows remote attackers to execute arbitrary commands. Patch available.

PHP RCE Tinyweb
NVD GitHub
CVSS 3.1
9.8
EPSS
0.1%
CVE-2026-25476 HIGH POC PATCH This Week

OpenEMR prior to version 8.0.0 fails to enforce session expiration when the skip_timeout_reset parameter is present in requests, allowing expired sessions to remain active indefinitely. An attacker with a stolen session cookie can exploit this by continuously sending the skip_timeout_reset parameter to maintain unauthorized access to sensitive health records without being logged out. Public exploit code exists for this vulnerability with a CVSS score of 7.5.

PHP Openemr
NVD GitHub
CVSS 3.1
7.5
EPSS
0.1%
CVE-2026-25220 MEDIUM POC PATCH This Month

OpenEMR versions prior to 8.0.0 allow any authenticated user to view all internal messages and notes from other users by exploiting insufficient authorization checks on the Message Center's `show_all` parameter. The vulnerability exists because the application does not verify administrator privileges before returning the complete message list, enabling unauthorized disclosure of sensitive medical communications. Public exploit code exists for this medium-severity information disclosure vulnerability.

PHP Openemr
NVD GitHub
CVSS 3.1
6.5
EPSS
0.1%
CVE-2026-25164 HIGH POC PATCH This Week

OpenEMR versions prior to 8.0.0 fail to enforce API authorization checks on document and insurance endpoints, allowing any authenticated API client to read and modify all patient PHI regardless of assigned access controls. Public exploit code exists for this vulnerability, which affects healthcare organizations using OpenEMR's REST API. An attacker with valid API credentials can access sensitive medical records and insurance information across the entire patient database.

PHP Openemr
NVD GitHub
CVSS 3.1
8.1
EPSS
0.1%
CVE-2026-2301 MEDIUM This Month

Protected post metadata injection in Post Duplicator plugin for WordPress allows authenticated contributors and higher-privileged users to arbitrarily set sensitive meta keys like _wp_page_template on duplicated posts by bypassing WordPress's standard metadata protection mechanisms. The vulnerability exists in versions up to 3.0.8 due to direct database insertion instead of using WordPress's protected metadata validation function. Attackers can exploit this through the customMetaData parameter in the REST API endpoint to manipulate post properties and potentially compromise site functionality.

WordPress PHP
NVD
CVSS 3.1
4.3
EPSS
0.0%
CVE-2025-14742 MEDIUM This Month

WP Recipe Maker (WordPress plugin) is affected by authorization bypass through user-controlled key (CVSS 4.3).

WordPress PHP
NVD
CVSS 3.1
4.3
EPSS
0.0%
CVE-2026-3171 LOW POC Monitor

Patients Waiting Area Queue Management System versions up to 1.0 is affected by cross-site scripting (xss) (CVSS 3.5).

PHP XSS
NVD GitHub VulDB
CVSS 3.1
3.5
EPSS
0.0%
CVE-2026-1929 HIGH This Week

Remote code execution in Advanced Woo Labels plugin for WordPress through version 2.37 allows authenticated users with Contributor access or higher to execute arbitrary PHP functions and system commands via an unsanitized callback parameter in an AJAX handler. The vulnerability stems from improper use of call_user_func_array() without adequate input validation or capability restrictions. No patch is currently available for this high-severity flaw affecting WordPress environments.

WordPress PHP RCE
NVD
CVSS 3.1
8.8
EPSS
0.3%
CVE-2026-3170 LOW POC Monitor

Patients Waiting Area Queue Management System versions up to 1.0 is affected by cross-site scripting (xss) (CVSS 2.4).

PHP XSS
NVD GitHub VulDB
CVSS 3.1
2.4
EPSS
0.0%
CVE-2026-3164 HIGH POC This Week

SQL injection in the News Portal Project 1.0 /admin/contactus.php endpoint allows unauthenticated remote attackers to manipulate the pagetitle parameter and execute arbitrary SQL queries. Public exploit code exists for this vulnerability, and no patch is currently available. Successful exploitation could enable data theft, modification, or denial of service against affected installations.

PHP SQLi News Portal Project
NVD GitHub VulDB
CVSS 3.1
7.3
EPSS
0.0%
CVE-2026-3153 HIGH POC This Week

SQL injection in itsourcecode Document Management System 1.0 via the Username parameter in /register.php allows unauthenticated remote attackers to execute arbitrary SQL queries. Public exploit code exists for this vulnerability, and no patch is currently available. Affected systems face potential data theft, modification, and denial of service through successful exploitation.

PHP SQLi Document Management System
NVD GitHub VulDB
CVSS 3.1
7.3
EPSS
0.0%
CVE-2026-3152 HIGH POC This Week

SQL injection in itsourcecode College Management System 1.0 via the teacher_id parameter in /admin/teacher-salary.php enables unauthenticated remote attackers to execute arbitrary database queries and manipulate sensitive payroll data. Public exploit code exists for this vulnerability, and no patch is currently available. The flaw affects confidentiality, integrity, and availability of the system.

PHP SQLi College Management System
NVD GitHub VulDB
CVSS 3.1
7.3
EPSS
0.0%
CVE-2026-3151 HIGH POC This Week

SQL injection in itsourcecode College Management System 1.0's login functionality allows remote attackers to manipulate the email parameter and execute arbitrary SQL queries without authentication. Public exploit code exists for this vulnerability, enabling immediate attack capability against unpatched systems. The flaw permits data disclosure, modification, and potential service disruption with a CVSS score of 7.3.

PHP SQLi College Management System
NVD GitHub VulDB
CVSS 3.1
7.3
EPSS
0.0%
CVE-2026-3150 MEDIUM POC This Month

SQL injection in itsourcecode College Management System 1.0's teacher management interface allows authenticated attackers to manipulate the teacher_id parameter in /admin/display-teacher.php and execute arbitrary database queries. Public exploit code exists for this vulnerability, enabling remote exploitation by users with administrative access. The vulnerability remains unpatched and carries medium severity with potential for data confidentiality, integrity, and availability compromise.

PHP SQLi College Management System
NVD GitHub VulDB
CVSS 3.1
6.3
EPSS
0.0%
CVE-2026-3149 MEDIUM POC This Month

College Management System versions up to 1.0 contains a vulnerability that allows attackers to sql injection (CVSS 6.3).

PHP SQLi College Management System
NVD GitHub VulDB
CVSS 3.1
6.3
EPSS
0.0%
CVE-2026-3148 HIGH POC This Week

Simple And Nice Shopping Cart Script versions up to 1.0 contains a security vulnerability (CVSS 7.3).

PHP SQLi Simple And Nice Shopping Cart Script
NVD GitHub VulDB
CVSS 3.1
7.3
EPSS
0.0%
CVE-2026-27747 HIGH PATCH This Week

SQL injection in the SPIP interface_traduction_objets plugin before version 2.2.2 allows authenticated editors to execute arbitrary database queries through unsanitized input in translation request parameters. Attackers can exploit this to read, modify, or delete database contents, or cause denial of service. A patch is available and should be applied immediately to affected installations.

PHP SQLi Denial Of Service Interface Traduction Objets
NVD
CVSS 3.1
8.8
EPSS
0.0%
CVE-2026-27636 HIGH POC PATCH This Week

Remote code execution in FreeScout prior to version 1.8.206 allows authenticated users to upload `.htaccess` files that bypass file upload restrictions, enabling arbitrary code execution on Apache servers with `AllowOverride All` enabled. Public exploit code exists for this vulnerability. The attack requires valid user credentials but affects all FreeScout installations using the vulnerable PHP Laravel framework configuration.

Apache PHP Laravel RCE Freescout
NVD GitHub
CVSS 3.1
8.8
EPSS
0.3%
CVE-2026-27632 LOW POC Monitor

Talishar is a fan-made Flesh and Blood project. Prior to commit 6be3871a14c192d1fb8146cdbc76f29f27c1cf48, the Talishar application lacks Cross-Site Request Forgery (CSRF) protections on critical state-changing endpoints, specifically within `SubmitChat.php` and other game interaction handlers. [CVSS 2.6 LOW]

PHP CSRF
NVD GitHub
CVSS 3.1
2.6
EPSS
0.0%
CVE-2026-25131 HIGH POC PATCH This Week

OpenEMR versions prior to 8.0.0 contain a broken access control flaw in the order types management system that allows low-privilege users (such as receptionists) to create and modify procedure types without proper authorization. Public exploit code exists for this vulnerability, which has a CVSS score of 8.8 and could enable unauthorized users to manipulate critical medical procedure data. The vulnerability has been patched in version 8.0.0 and later.

PHP Openemr
NVD GitHub
CVSS 3.1
8.8
EPSS
0.0%
CVE-2026-25124 MEDIUM POC PATCH This Month

OpenEMR prior to version 8.0.0 allows low-privileged users to export sensitive patient and medical data through the message_list.php report functionality due to missing access controls. The vulnerability affects receptionists and similar roles who can bypass authorization checks to extract entire message databases containing confidential information. Public exploit code exists for this issue, though a patch is available in version 8.0.0 and later.

PHP CSRF Openemr
NVD GitHub
CVSS 3.1
6.5
EPSS
0.0%
CVE-2026-24896 MEDIUM POC PATCH This Month

OpenEMR versions before 8.0.0 contain an improper access control flaw in the edih_main.php endpoint that allows any authenticated user, including low-privilege accounts like Receptionists, to retrieve sensitive EDI log files by manipulating the log_select parameter. The vulnerability bypasses role-based access controls that should restrict access through the GUI, enabling unauthorized disclosure of system logs. Public exploit code exists for this issue, which is fixed in version 8.0.0.

PHP Openemr
NVD GitHub
CVSS 3.1
6.5
EPSS
0.0%
CVE-2026-24849 CRITICAL POC PATCH Act Now

Path traversal in OpenEMR electronic health records before fix allows authenticated users to read arbitrary files on the server, potentially exposing patient health data. PoC and patch available.

PHP Openemr
NVD GitHub
CVSS 3.1
9.9
EPSS
0.0%
CVE-2026-3135 HIGH POC This Week

SQL injection in itsourcecode News Portal Project 1.0 via the Category parameter in /admin/add-category.php allows unauthenticated remote attackers to manipulate database queries. Public exploit code is available for this vulnerability, and no patch has been released, leaving affected installations vulnerable to data exfiltration, modification, or deletion. The attack requires no user interaction and can be executed over the network with a CVSS score of 7.3.

PHP SQLi News Portal Project
NVD GitHub VulDB
CVSS 3.1
7.3
EPSS
0.0%
CVE-2026-3134 HIGH POC This Week

SQL injection in itsourcecode News Portal Project 1.0's category editing functionality allows unauthenticated remote attackers to manipulate the Category parameter and execute arbitrary SQL queries. Public exploit code is available for this vulnerability, increasing the likelihood of active exploitation. Currently, no patch is available to remediate this issue.

PHP SQLi News Portal Project
NVD GitHub VulDB
CVSS 3.1
7.3
EPSS
0.0%
CVE-2026-3133 HIGH POC This Week

SQL injection in itsourcecode Document Management System 1.0 login functionality allows unauthenticated remote attackers to manipulate the Username parameter and execute arbitrary SQL queries. Public exploit code exists for this vulnerability, and no patch is currently available. The attack requires only network access with no user interaction, enabling attackers to potentially read, modify, or delete sensitive data within the application.

PHP SQLi Document Management System
NVD GitHub VulDB
CVSS 3.1
7.3
EPSS
0.0%
CVE-2026-26351 MEDIUM This Month

Stored XSS in GetSimpleCMS Community Edition 3.3.16 allows authenticated administrators to inject malicious JavaScript through the component slug field, which persists in XML storage and executes when other users access the Components page. An attacker with admin privileges can exploit this to hijack sessions, perform unauthorized administrative actions, and persistently compromise the CMS interface for all authenticated users. The vulnerability affects PHP-based GetSimpleCMS installations and currently has no available patch.

PHP XSS Getsimple Cms
NVD GitHub
CVSS 3.1
4.8
EPSS
0.0%
CVE-2025-62512 MEDIUM POC This Month

Piwigo is an open source photo gallery application for the web. In version 15.5.0 and likely earlier 15.x releases, the password reset functionality in Piwigo allows an unauthenticated attacker to determine whether a given username or email address exists in the system. [CVSS 5.3 MEDIUM]

PHP Golang Piwigo
NVD GitHub
CVSS 3.1
5.3
EPSS
0.1%
CVE-2026-27590 CRITICAL POC PATCH Act Now

FastCGI path splitting vulnerability in Caddy before 2.11.1 allows request smuggling or path confusion when proxying to FastCGI backends (PHP-FPM). EPSS 0.19% with PoC available.

PHP Tls RCE Caddy Suse
NVD GitHub
CVSS 3.1
9.8
EPSS
0.2%
CVE-2026-27732 HIGH PATCH This Week

Server-side request forgery in AVideo prior to version 22.0 allows authenticated users to make arbitrary outbound requests from the affected server via an unvalidated downloadURL parameter in the aVideoEncoder.json.php endpoint. An attacker can exploit this to probe internal network services, access metadata endpoints, and retrieve sensitive data, potentially leading to further system compromise. This affects PHP deployments running vulnerable AVideo versions.

PHP SSRF Avideo
NVD GitHub
CVSS 3.1
8.1
EPSS
0.0%
CVE-2025-14577 CRITICAL Act Now

PHP function injection in Slican NCP/IPL/IPM/IPU VOIP devices allows unauthenticated remote attackers to execute arbitrary PHP functions. Network telecommunications equipment vulnerability.

PHP Ipu 14 Firmware Ipm 032 Firmware Ipl 256 Firmware Ncp Firmware
NVD
CVSS 3.1
9.8
EPSS
0.1%
CVE-2025-15589 LOW POC Monitor

A vulnerability was determined in MuYuCMS 2.7. Affected is the function delete_dir_file of the file application/admin/controller/Template.php of the component Template Management Page. [CVSS 3.8 LOW]

PHP Path Traversal
NVD GitHub VulDB
CVSS 3.1
3.8
EPSS
0.1%
CVE-2025-15386 HIGH This Week

The Responsive Lightbox & Gallery WordPress plugin before 2.6.1 is vulnerable to an Unauthenticated Stored-XSS attack due to flawed regex replacement rules that can be abused by posting a comment with a malicious link when lightbox for comments are enabled and then approved. [CVSS 8.8 HIGH]

WordPress PHP
NVD WPScan
CVSS 3.1
8.8
EPSS
0.0%
CVE-2026-3070 MEDIUM POC This Month

Reflected XSS in SourceCodester Modern Image Gallery App 1.0 allows unauthenticated remote attackers to inject malicious scripts through the filename parameter in upload.php. Public exploit code exists for this vulnerability, though it requires user interaction to succeed. No patch is currently available.

PHP XSS Modern Image Gallery App
NVD GitHub VulDB
CVSS 3.1
4.3
EPSS
0.0%
CVE-2026-3069 HIGH POC This Week

SQL injection in itsourcecode Document Management System 1.0 via the field1 parameter in /edtlbls.php enables unauthenticated remote attackers to compromise data confidentiality, integrity, and availability. Public exploit code exists for this vulnerability, and no patch is currently available. The attack requires no user interaction and can be executed over the network with minimal complexity.

PHP SQLi Document Management System
NVD GitHub VulDB
CVSS 3.1
7.3
EPSS
0.0%
CVE-2026-3068 HIGH POC This Week

Document Management System versions up to 1.0 contains a vulnerability that allows attackers to sql injection (CVSS 7.3).

PHP SQLi Document Management System
NVD GitHub VulDB
CVSS 3.1
7.3
EPSS
0.0%
CVE-2026-3057 MEDIUM POC This Month

SQL injection in PearProjectApi up to version 2.8.10 allows authenticated attackers to execute arbitrary SQL queries through the projectCode parameter in the dateTotalForProject function. Public exploit code exists for this vulnerability, enabling remote attacks with potential to read, modify, or delete database contents. The vendor has not released a patch despite early notification.

PHP SQLi Pearprojectapi
NVD GitHub VulDB
CVSS 3.1
6.3
EPSS
0.0%
CVE-2026-3046 HIGH POC This Week

E-Logbook With Health Monitoring System For Covid-19 versions up to 1.0 contains a security vulnerability (CVSS 7.3).

PHP SQLi E Logbook With Health Monitoring System For Covid 19
NVD GitHub VulDB
CVSS 3.1
7.3
EPSS
0.0%
CVE-2026-3043 MEDIUM POC This Month

Reflected cross-site scripting in itsourcecode Event Management System 1.0 allows unauthenticated remote attackers to inject malicious scripts via the page parameter in /admin/navbar.php. Public exploit code exists for this vulnerability, enabling attackers to steal session tokens or perform actions on behalf of administrators. No patch is currently available.

PHP XSS Event Management System
NVD GitHub VulDB
CVSS 3.1
4.3
EPSS
0.0%
CVE-2026-3042 HIGH POC This Week

SQL injection in itsourcecode Event Management System 1.0 allows unauthenticated remote attackers to manipulate the ID parameter in /admin/index.php and execute arbitrary SQL queries. Public exploit code exists for this vulnerability, and no patch is currently available. Attackers can leverage this to access, modify, or delete sensitive data with confidentiality, integrity, and availability impact.

PHP SQLi Event Management System
NVD GitHub VulDB
CVSS 3.1
7.3
EPSS
0.0%
CVE-2026-23694 This Week

Aruba HiSpeed Cache (aruba-hispeed-cache) WordPress plugin versions prior to 3.0.5 contain a cross-site request forgery (CSRF) vulnerability affecting multiple administrative AJAX actions.

WordPress PHP CSRF
NVD
EPSS
0.0%
CVE-2026-26464 MEDIUM POC This Month

Society Management System Portal versions up to 1.0 is affected by cross-site scripting (xss) (CVSS 6.1).

PHP XSS Society Management System Portal
NVD GitHub
CVSS 3.1
6.1
EPSS
0.1%
CVE-2026-2984 MEDIUM POC This Month

Student Result Management System versions up to 1.0 is affected by improper resource shutdown or release (CVSS 6.5).

PHP Denial Of Service Student Result Management System
NVD GitHub VulDB
CVSS 3.1
6.5
EPSS
0.1%
CVE-2025-40986 This Week

Reflected Cross-Site Scripting (XSS) vulnerability in PideTuCita. This vulnerability allows an attacker to execute JavaScript code in the victim's browser by sending him/her a malicious URL using the endpoint 'cookies/indes.php/<XSS>'.

PHP XSS
NVD
EPSS
0.0%
CVE-2025-50189
EPSS 0% CVSS 8.8
HIGH POC PATCH This Week

Chamilo is a learning management system. [CVSS 8.8 HIGH]

PHP Chamilo Lms
NVD GitHub
CVE-2025-50188
EPSS 0% CVSS 7.2
HIGH POC PATCH This Week

Chamilo is a learning management system. [CVSS 7.2 HIGH]

PHP Chamilo Lms
NVD GitHub
CVE-2026-26698
EPSS 0% CVSS 4.9
MEDIUM POC This Month

SQL injection in Simple Student Alumni System v1.0's modal_edit.php endpoint allows authenticated administrators to extract sensitive database information through unauthenticated network requests. Public exploit code exists for this vulnerability, though no patch is currently available. The attack requires high-level privileges but can bypass intended access controls to read confidential data.

PHP SQLi Simple Student Alumni System
NVD GitHub
CVE-2026-26697
EPSS 0% CVSS 4.9
MEDIUM POC This Month

Simple Student Alumni System v1.0 contains a SQL injection vulnerability in the recordteacher_view.php endpoint that allows authenticated administrators to extract sensitive data from the underlying database. Public exploit code exists for this vulnerability, though a patch is currently unavailable. The attack requires high-level administrative privileges but can be executed remotely without user interaction.

PHP SQLi Simple Student Alumni System
NVD GitHub
CVE-2026-3413
EPSS 0% CVSS 7.3
HIGH POC This Week

SQL injection in itsourcecode University Management System 1.0 via the ID parameter in /admin_single_student.php allows unauthenticated remote attackers to manipulate database queries with public exploit code currently available. The vulnerability enables attackers to read, modify, or delete sensitive academic and administrative data without authentication. No patch is currently available for this PHP-based application.

PHP SQLi University Management System
NVD GitHub VulDB
CVE-2026-3412
EPSS 0% CVSS 4.3
MEDIUM POC This Month

University Management System versions up to 1.0 is affected by cross-site scripting (xss) (CVSS 4.3).

PHP XSS University Management System
NVD GitHub VulDB
CVE-2026-3411
EPSS 0% CVSS 7.3
HIGH POC This Week

SQL injection in itsourcecode University Management System 1.0 via the ID parameter in /admin_single_student_update.php allows unauthenticated remote attackers to manipulate database queries and potentially extract or modify sensitive student records. Public exploit code exists for this vulnerability, and no patch is currently available, leaving affected institutions at immediate risk.

PHP SQLi University Management System
NVD GitHub VulDB
CVE-2026-3410
EPSS 0% CVSS 7.3
HIGH POC This Week

Society Management System versions up to 1.0 contains a vulnerability that allows attackers to sql injection (CVSS 7.3).

PHP SQLi Society Management System
NVD GitHub VulDB
CVE-2026-3406
EPSS 0% CVSS 7.3
HIGH POC This Week

SQL injection in Online Art Gallery Shop 1.0 via the fname parameter in /admin/registration.php enables unauthenticated remote attackers to manipulate database queries. Public exploit code exists for this vulnerability, and no patch is currently available, leaving affected PHP installations at immediate risk of data compromise or unauthorized access.

PHP SQLi Online Art Gallery Shop
NVD GitHub VulDB
CVE-2026-3403
EPSS 0% CVSS 2.4
LOW POC Monitor

A vulnerability was detected in PHPGurukul Student Record Management System 1.0. This issue affects some unknown processing of the file /edit-subject.php. [CVSS 2.4 LOW]

PHP XSS
NVD GitHub VulDB
CVE-2026-3402
EPSS 0% CVSS 2.4
LOW POC Monitor

A security vulnerability has been detected in PHPGurukul Student Record Management System up to 1.0. This vulnerability affects unknown code of the file /edit-course.php. [CVSS 2.4 LOW]

PHP XSS
NVD GitHub VulDB
CVE-2026-3395
EPSS 0% CVSS 7.3
HIGH PATCH This Week

Maxsite Cms versions up to 109.1. contains a vulnerability that allows attackers to code injection (CVSS 7.3).

PHP React Code Injection +1
NVD GitHub VulDB
CVE-2025-13673
EPSS 0% CVSS 7.5
HIGH This Week

The Tutor LMS - eLearning and online course solution plugin for WordPress is vulnerable to SQL Injection via the 'coupon_code' parameter in all versions up to, and including, 3.9.6 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. [CVSS 7.5 HIGH]

WordPress SQLi PHP
NVD
CVE-2026-2471
EPSS 0% CVSS 7.5
HIGH This Week

Unauthenticated attackers can inject malicious serialized PHP objects into the WP Mail Logging plugin (versions up to 1.15.0) through email forms, exploiting unsafe deserialization in the BaseModel class. When administrators view the logged emails, the injected payload deserializes into arbitrary PHP objects, potentially enabling code execution if leveraged with gadget chains from other installed plugins or themes. No patch is currently available.

WordPress PHP Deserialization
NVD
CVE-2026-1542
EPSS 0% CVSS 6.5
MEDIUM This Month

Super Stage WP WordPre versions up to 1.0.1 is affected by deserialization of untrusted data (CVSS 6.5).

WordPress PHP Deserialization
NVD WPScan
CVE-2026-28517
EPSS 1% CVSS 9.8
CRITICAL POC PATCH Act Now

OS command injection in openDCIM 23.04 through commit 4467e9c4 via report_network_map.php allows authenticated users to execute arbitrary commands. EPSS 0.57% with PoC and patch available.

PHP Command Injection Opendcim
NVD GitHub
CVE-2026-28516
EPSS 0% CVSS 8.8
HIGH POC PATCH This Week

Authenticated users can execute arbitrary SQL commands against openDCIM 23.04 and earlier through unsanitized input in the Config::UpdateParameter function, enabling complete database compromise. The vulnerability exists in install.php and container-install.php handlers that pass user input directly into SQL queries without prepared statements. Public exploit code is available for this SQL injection vulnerability affecting PHP-based deployments.

PHP SQLi Opendcim
NVD GitHub
CVE-2026-28515
EPSS 0% CVSS 8.8
HIGH POC PATCH This Week

OpenDCIM through version 23.04 fails to enforce authorization checks in its installation and upgrade handlers, allowing any authenticated user to modify LDAP configuration settings regardless of their assigned roles. Public exploit code exists for this vulnerability, and in deployments where REMOTE_USER authentication is not enforced, unauthenticated attackers may also access these administrative functions. An attacker can exploit this to alter application configuration and potentially compromise directory services integration.

PHP Ldap Opendcim
NVD GitHub
CVE-2026-28411
EPSS 1% CVSS 9.8
CRITICAL POC Act Now

Authentication bypass via unsafe extract() function in WeGIA before 3.6.5. The extract() call on user-controlled data allows overwriting authentication variables. EPSS 0.7% with PoC available.

PHP Authentication Bypass Wegia
NVD GitHub
CVE-2026-28408
EPSS 0% CVSS 9.8
CRITICAL POC Act Now

Authentication bypass in WeGIA charitable institution management system before 3.6.5. The adicionar_tipo_docs_atendido.php script lacks authentication, allowing unauthorized access. PoC available.

PHP Golang Wegia
NVD GitHub
CVE-2026-28354
EPSS 0% CVSS 6.5
MEDIUM POC This Month

Unauthorized collection manipulation in ClipBucket v5 prior to 5.5.3 #59 allows authenticated attackers to add or remove items from other users' collections due to missing and broken authorization checks in the add and delete item functions. An attacker with valid credentials can exploit this to alter collections they do not own without restriction. Public exploit code exists for this vulnerability, and no patch is currently available.

PHP Clipbucket
NVD GitHub
CVE-2026-27832
EPSS 0% CVSS 8.8
HIGH This Week

SQL injection in Group Office email template selection endpoint allows authenticated attackers to extract sensitive data from the database through the unvalidated comparator parameter in advancedQueryData. An attacker with valid credentials can perform blind boolean-based attacks to exfiltrate password hashes from the core_auth_password table. Affected versions prior to 26.0.8, 25.0.87, and 6.8.153 require immediate patching.

PHP SQLi Group Office
NVD GitHub
CVE-2019-25497
EPSS 0% CVSS 8.2
HIGH POC This Week

osCommerce 2.3.4.1 contains a SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the currency parameter. [CVSS 8.2 HIGH]

PHP SQLi Oscommerce
NVD Exploit-DB
CVE-2019-25496
EPSS 0% CVSS 8.2
HIGH POC This Week

osCommerce 2.3.4.1 contains a SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the products_id parameter. [CVSS 8.2 HIGH]

PHP SQLi Oscommerce
NVD Exploit-DB
CVE-2019-25495
EPSS 0% CVSS 8.2
HIGH POC This Week

osCommerce 2.3.4.1 contains a SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the reviews_id parameter. [CVSS 8.2 HIGH]

PHP SQLi Oscommerce
NVD Exploit-DB
CVE-2019-25493
EPSS 0% CVSS 8.2
HIGH POC This Week

Homey BNB V4 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the 'val' parameter. [CVSS 8.2 HIGH]

PHP SQLi Airbnb Clone Script
NVD Exploit-DB
CVE-2019-25492
EPSS 0% CVSS 8.2
HIGH POC This Week

Homey BNB V4 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the 'pt' parameter. [CVSS 8.2 HIGH]

PHP SQLi Airbnb Clone Script
NVD Exploit-DB
CVE-2019-25491
EPSS 0% CVSS 8.2
HIGH POC This Week

Homey BNB V4 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the catid parameter. [CVSS 8.2 HIGH]

PHP SQLi Airbnb Clone Script
NVD Exploit-DB
CVE-2019-25490
EPSS 0% CVSS 8.2
HIGH POC This Week

Homey BNB V4 contains a SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the 'id' parameter. [CVSS 8.2 HIGH]

PHP SQLi Airbnb Clone Script
NVD Exploit-DB
CVE-2026-25147
EPSS 0% CVSS 7.1
HIGH POC PATCH This Week

OpenEMR versions prior to 8.0.0 allow authenticated portal users to access other patients' protected health information through insecure direct object references (IDOR) in the payment portal, enabling horizontal privilege escalation to view and modify another patient's demographics, invoices, and payment history. The vulnerability stems from accepting patient ID values from user-controlled request parameters instead of validating against the authenticated user's session. Public exploit code exists for this vulnerability.

PHP Privilege Escalation Openemr
NVD GitHub
CVE-2025-14142
EPSS 0% CVSS 6.4
MEDIUM This Month

The Electric Enquiries plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'button' parameter of the electric-enquiry shortcode in all versions up to, and including, 1.1 due to insufficient input sanitization and output escaping. [CVSS 6.4 MEDIUM]

WordPress XSS PHP
NVD
CVE-2024-10938
EPSS 0% CVSS 6.5
MEDIUM This Month

The OVRI Payment plugin for WordPress contains malicious .htaccess files in version 1.7.0. The files contain directives to prevent the execution of certain scripts while allowing execution of known malicious PHP files. [CVSS 6.5 MEDIUM]

WordPress PHP
NVD
CVE-2026-3302
EPSS 0% CVSS 4.3
MEDIUM POC This Month

Cross-site scripting (XSS) in SourceCodester Doctor Appointment System 1.0 allows unauthenticated remote attackers to inject malicious scripts via the Email parameter in the /register.php Sign Up Page. Public exploit code exists for this vulnerability, increasing the risk of active exploitation. The lack of an available patch leaves affected systems vulnerable to session hijacking and credential theft.

PHP XSS Doctor Appointment System
NVD GitHub VulDB
CVE-2025-14149
EPSS 0% CVSS 6.4
MEDIUM This Month

The Xpro Addons - 140+ Widgets for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Image Scroller widget box link attribute in all versions up to, and including, 1.4.24 due to insufficient input sanitization and output escaping on user supplied attributes. [CVSS 6.4 MEDIUM]

WordPress XSS PHP
NVD
CVE-2025-14040
EPSS 0% CVSS 6.4
MEDIUM This Month

The Automotive Car Dealership Business WordPress Theme for WordPress is vulnerable to Stored Cross-Site Scripting via the 'Call to Action' custom fields in all versions up to, and including, 13.4. [CVSS 6.4 MEDIUM]

WordPress XSS PHP
NVD
CVE-2025-12981
EPSS 0% CVSS 9.8
CRITICAL Act Now

Privilege escalation in Listee WordPress theme allows unauthenticated attackers to gain administrator access. All versions up to 1.1.6 affected.

WordPress Privilege Escalation PHP
NVD
CVE-2026-3292
EPSS 0% CVSS 6.3
MEDIUM POC This Month

SQL injection in jizhiCMS up to version 2.5.6 via the findAll function in the Model.php batch interface allows authenticated remote attackers to manipulate database queries and potentially access or modify sensitive data. Public exploit code is available for this vulnerability, and no patch has been released despite vendor notification. The flaw requires valid user credentials but can be exploited over the network with minimal additional complexity.

PHP SQLi Jizhicms
NVD GitHub VulDB
CVE-2026-2428
EPSS 0% CVSS 7.5
HIGH This Week

Fluent Forms Pro Add On Pack for WordPress versions up to 6.1.17 fail to verify PayPal Instant Payment Notifications by default, allowing unauthenticated attackers to forge payment confirmations and mark unpaid submissions as paid. An attacker can exploit this to trigger post-payment automation including email delivery, access grants, and digital product distribution without actual payment. The vulnerability affects all installations that have not manually enabled IPN verification and currently lacks a patch.

WordPress PHP
NVD
CVE-2026-3261
EPSS 0% CVSS 7.3
HIGH POC This Week

SQL injection in itsourcecode School Management System 1.0 via the ID parameter in /settings/index.php allows unauthenticated remote attackers to manipulate database queries and potentially read or modify sensitive data. Public exploit code exists for this vulnerability, and no patch is currently available. Organizations running affected versions should implement access controls or upgrade immediately to mitigate the risk.

PHP SQLi School Management System
NVD GitHub VulDB
CVE-2026-22206
EPSS 0% CVSS 8.8
HIGH This Week

SQL injection in SPIP prior to 4.4.10 enables authenticated users with low privileges to execute arbitrary SQL commands and achieve remote code execution through union-based injection combined with PHP tag processing. The vulnerability affects SPIP and PHP environments, requiring only network access and valid credentials to exploit. No patch is currently available, presenting significant risk to production SPIP installations.

PHP RCE SQLi +1
NVD
CVE-2026-22205
EPSS 0% CVSS 7.5
HIGH This Week

Spip versions up to 4.4.10 contains a vulnerability that allows attackers to access protected information (CVSS 7.5).

PHP Authentication Bypass Spip
NVD
CVE-2025-50857
EPSS 1% CVSS 9.8
CRITICAL Act Now

Directory traversal in ZenTaoPMS v18.11 through v21.6.beta allows arbitrary code execution through /module/ai/control.php. EPSS 0.76%.

PHP Path Traversal AI / ML
NVD GitHub
CVE-2025-56605
EPSS 0% CVSS 5.4
MEDIUM This Month

A reflected Cross-Site Scripting (XSS) vulnerability exists in the register.php backend script of PuneethReddyHC Event Management System 1.0. [CVSS 5.4 MEDIUM]

PHP XSS
NVD GitHub
CVE-2026-1311
EPSS 0% CVSS 8.8
HIGH This Week

Remote code execution in WordPress Worry Proof Backup plugin through path traversal in the backup upload feature allows authenticated users with Subscriber privileges or higher to write arbitrary files, including PHP executables, to the server by uploading specially crafted ZIP archives. The vulnerability affects all versions up to 0.2.4 and currently has no available patch, enabling attackers to achieve full server compromise.

WordPress PHP RCE +1
NVD
CVE-2026-27968
EPSS 0% CVSS 4.3
MEDIUM PATCH This Month

Packistry versions prior to 0.13.0 fail to validate token expiration in the RepositoryAwareController::authorize() function, allowing attackers with expired deploy tokens to maintain unauthorized access to repository endpoints and package metadata. An authenticated attacker can leverage an expired token with valid abilities to interact with Composer APIs and potentially download or access sensitive package information. This vulnerability affects self-hosted Packistry deployments and has been patched in version 0.13.0.

PHP Packistry
NVD GitHub
CVE-2026-27954
EPSS 0% CVSS 6.5
MEDIUM This Month

Live Helper Chat is an open-source application that enables live support websites. [CVSS 6.5 MEDIUM]

PHP Privilege Escalation Live Helper Chat
NVD GitHub
CVE-2026-27613
EPSS 0% CVSS 9.8
CRITICAL PATCH Act Now

Unauthenticated command injection in TinyWeb HTTP/HTTPS server for Win32 before 2.01 allows remote attackers to execute arbitrary commands. Patch available.

PHP RCE Tinyweb
NVD GitHub
CVE-2026-25476
EPSS 0% CVSS 7.5
HIGH POC PATCH This Week

OpenEMR prior to version 8.0.0 fails to enforce session expiration when the skip_timeout_reset parameter is present in requests, allowing expired sessions to remain active indefinitely. An attacker with a stolen session cookie can exploit this by continuously sending the skip_timeout_reset parameter to maintain unauthorized access to sensitive health records without being logged out. Public exploit code exists for this vulnerability with a CVSS score of 7.5.

PHP Openemr
NVD GitHub
CVE-2026-25220
EPSS 0% CVSS 6.5
MEDIUM POC PATCH This Month

OpenEMR versions prior to 8.0.0 allow any authenticated user to view all internal messages and notes from other users by exploiting insufficient authorization checks on the Message Center's `show_all` parameter. The vulnerability exists because the application does not verify administrator privileges before returning the complete message list, enabling unauthorized disclosure of sensitive medical communications. Public exploit code exists for this medium-severity information disclosure vulnerability.

PHP Openemr
NVD GitHub
CVE-2026-25164
EPSS 0% CVSS 8.1
HIGH POC PATCH This Week

OpenEMR versions prior to 8.0.0 fail to enforce API authorization checks on document and insurance endpoints, allowing any authenticated API client to read and modify all patient PHI regardless of assigned access controls. Public exploit code exists for this vulnerability, which affects healthcare organizations using OpenEMR's REST API. An attacker with valid API credentials can access sensitive medical records and insurance information across the entire patient database.

PHP Openemr
NVD GitHub
CVE-2026-2301
EPSS 0% CVSS 4.3
MEDIUM This Month

Protected post metadata injection in Post Duplicator plugin for WordPress allows authenticated contributors and higher-privileged users to arbitrarily set sensitive meta keys like _wp_page_template on duplicated posts by bypassing WordPress's standard metadata protection mechanisms. The vulnerability exists in versions up to 3.0.8 due to direct database insertion instead of using WordPress's protected metadata validation function. Attackers can exploit this through the customMetaData parameter in the REST API endpoint to manipulate post properties and potentially compromise site functionality.

WordPress PHP
NVD
CVE-2025-14742
EPSS 0% CVSS 4.3
MEDIUM This Month

WP Recipe Maker (WordPress plugin) is affected by authorization bypass through user-controlled key (CVSS 4.3).

WordPress PHP
NVD
CVE-2026-3171
EPSS 0% CVSS 3.5
LOW POC Monitor

Patients Waiting Area Queue Management System versions up to 1.0 is affected by cross-site scripting (xss) (CVSS 3.5).

PHP XSS
NVD GitHub VulDB
CVE-2026-1929
EPSS 0% CVSS 8.8
HIGH This Week

Remote code execution in Advanced Woo Labels plugin for WordPress through version 2.37 allows authenticated users with Contributor access or higher to execute arbitrary PHP functions and system commands via an unsanitized callback parameter in an AJAX handler. The vulnerability stems from improper use of call_user_func_array() without adequate input validation or capability restrictions. No patch is currently available for this high-severity flaw affecting WordPress environments.

WordPress PHP RCE
NVD
CVE-2026-3170
EPSS 0% CVSS 2.4
LOW POC Monitor

Patients Waiting Area Queue Management System versions up to 1.0 is affected by cross-site scripting (xss) (CVSS 2.4).

PHP XSS
NVD GitHub VulDB
CVE-2026-3164
EPSS 0% CVSS 7.3
HIGH POC This Week

SQL injection in the News Portal Project 1.0 /admin/contactus.php endpoint allows unauthenticated remote attackers to manipulate the pagetitle parameter and execute arbitrary SQL queries. Public exploit code exists for this vulnerability, and no patch is currently available. Successful exploitation could enable data theft, modification, or denial of service against affected installations.

PHP SQLi News Portal Project
NVD GitHub VulDB
CVE-2026-3153
EPSS 0% CVSS 7.3
HIGH POC This Week

SQL injection in itsourcecode Document Management System 1.0 via the Username parameter in /register.php allows unauthenticated remote attackers to execute arbitrary SQL queries. Public exploit code exists for this vulnerability, and no patch is currently available. Affected systems face potential data theft, modification, and denial of service through successful exploitation.

PHP SQLi Document Management System
NVD GitHub VulDB
CVE-2026-3152
EPSS 0% CVSS 7.3
HIGH POC This Week

SQL injection in itsourcecode College Management System 1.0 via the teacher_id parameter in /admin/teacher-salary.php enables unauthenticated remote attackers to execute arbitrary database queries and manipulate sensitive payroll data. Public exploit code exists for this vulnerability, and no patch is currently available. The flaw affects confidentiality, integrity, and availability of the system.

PHP SQLi College Management System
NVD GitHub VulDB
CVE-2026-3151
EPSS 0% CVSS 7.3
HIGH POC This Week

SQL injection in itsourcecode College Management System 1.0's login functionality allows remote attackers to manipulate the email parameter and execute arbitrary SQL queries without authentication. Public exploit code exists for this vulnerability, enabling immediate attack capability against unpatched systems. The flaw permits data disclosure, modification, and potential service disruption with a CVSS score of 7.3.

PHP SQLi College Management System
NVD GitHub VulDB
CVE-2026-3150
EPSS 0% CVSS 6.3
MEDIUM POC This Month

SQL injection in itsourcecode College Management System 1.0's teacher management interface allows authenticated attackers to manipulate the teacher_id parameter in /admin/display-teacher.php and execute arbitrary database queries. Public exploit code exists for this vulnerability, enabling remote exploitation by users with administrative access. The vulnerability remains unpatched and carries medium severity with potential for data confidentiality, integrity, and availability compromise.

PHP SQLi College Management System
NVD GitHub VulDB
CVE-2026-3149
EPSS 0% CVSS 6.3
MEDIUM POC This Month

College Management System versions up to 1.0 contains a vulnerability that allows attackers to sql injection (CVSS 6.3).

PHP SQLi College Management System
NVD GitHub VulDB
CVE-2026-3148
EPSS 0% CVSS 7.3
HIGH POC This Week

Simple And Nice Shopping Cart Script versions up to 1.0 contains a security vulnerability (CVSS 7.3).

PHP SQLi Simple And Nice Shopping Cart Script
NVD GitHub VulDB
CVE-2026-27747
EPSS 0% CVSS 8.8
HIGH PATCH This Week

SQL injection in the SPIP interface_traduction_objets plugin before version 2.2.2 allows authenticated editors to execute arbitrary database queries through unsanitized input in translation request parameters. Attackers can exploit this to read, modify, or delete database contents, or cause denial of service. A patch is available and should be applied immediately to affected installations.

PHP SQLi Denial Of Service +1
NVD
CVE-2026-27636
EPSS 0% CVSS 8.8
HIGH POC PATCH This Week

Remote code execution in FreeScout prior to version 1.8.206 allows authenticated users to upload `.htaccess` files that bypass file upload restrictions, enabling arbitrary code execution on Apache servers with `AllowOverride All` enabled. Public exploit code exists for this vulnerability. The attack requires valid user credentials but affects all FreeScout installations using the vulnerable PHP Laravel framework configuration.

Apache PHP Laravel +2
NVD GitHub
CVE-2026-27632
EPSS 0% CVSS 2.6
LOW POC Monitor

Talishar is a fan-made Flesh and Blood project. Prior to commit 6be3871a14c192d1fb8146cdbc76f29f27c1cf48, the Talishar application lacks Cross-Site Request Forgery (CSRF) protections on critical state-changing endpoints, specifically within `SubmitChat.php` and other game interaction handlers. [CVSS 2.6 LOW]

PHP CSRF
NVD GitHub
CVE-2026-25131
EPSS 0% CVSS 8.8
HIGH POC PATCH This Week

OpenEMR versions prior to 8.0.0 contain a broken access control flaw in the order types management system that allows low-privilege users (such as receptionists) to create and modify procedure types without proper authorization. Public exploit code exists for this vulnerability, which has a CVSS score of 8.8 and could enable unauthorized users to manipulate critical medical procedure data. The vulnerability has been patched in version 8.0.0 and later.

PHP Openemr
NVD GitHub
CVE-2026-25124
EPSS 0% CVSS 6.5
MEDIUM POC PATCH This Month

OpenEMR prior to version 8.0.0 allows low-privileged users to export sensitive patient and medical data through the message_list.php report functionality due to missing access controls. The vulnerability affects receptionists and similar roles who can bypass authorization checks to extract entire message databases containing confidential information. Public exploit code exists for this issue, though a patch is available in version 8.0.0 and later.

PHP CSRF Openemr
NVD GitHub
CVE-2026-24896
EPSS 0% CVSS 6.5
MEDIUM POC PATCH This Month

OpenEMR versions before 8.0.0 contain an improper access control flaw in the edih_main.php endpoint that allows any authenticated user, including low-privilege accounts like Receptionists, to retrieve sensitive EDI log files by manipulating the log_select parameter. The vulnerability bypasses role-based access controls that should restrict access through the GUI, enabling unauthorized disclosure of system logs. Public exploit code exists for this issue, which is fixed in version 8.0.0.

PHP Openemr
NVD GitHub
CVE-2026-24849
EPSS 0% CVSS 9.9
CRITICAL POC PATCH Act Now

Path traversal in OpenEMR electronic health records before fix allows authenticated users to read arbitrary files on the server, potentially exposing patient health data. PoC and patch available.

PHP Openemr
NVD GitHub
CVE-2026-3135
EPSS 0% CVSS 7.3
HIGH POC This Week

SQL injection in itsourcecode News Portal Project 1.0 via the Category parameter in /admin/add-category.php allows unauthenticated remote attackers to manipulate database queries. Public exploit code is available for this vulnerability, and no patch has been released, leaving affected installations vulnerable to data exfiltration, modification, or deletion. The attack requires no user interaction and can be executed over the network with a CVSS score of 7.3.

PHP SQLi News Portal Project
NVD GitHub VulDB
CVE-2026-3134
EPSS 0% CVSS 7.3
HIGH POC This Week

SQL injection in itsourcecode News Portal Project 1.0's category editing functionality allows unauthenticated remote attackers to manipulate the Category parameter and execute arbitrary SQL queries. Public exploit code is available for this vulnerability, increasing the likelihood of active exploitation. Currently, no patch is available to remediate this issue.

PHP SQLi News Portal Project
NVD GitHub VulDB
CVE-2026-3133
EPSS 0% CVSS 7.3
HIGH POC This Week

SQL injection in itsourcecode Document Management System 1.0 login functionality allows unauthenticated remote attackers to manipulate the Username parameter and execute arbitrary SQL queries. Public exploit code exists for this vulnerability, and no patch is currently available. The attack requires only network access with no user interaction, enabling attackers to potentially read, modify, or delete sensitive data within the application.

PHP SQLi Document Management System
NVD GitHub VulDB
CVE-2026-26351
EPSS 0% CVSS 4.8
MEDIUM This Month

Stored XSS in GetSimpleCMS Community Edition 3.3.16 allows authenticated administrators to inject malicious JavaScript through the component slug field, which persists in XML storage and executes when other users access the Components page. An attacker with admin privileges can exploit this to hijack sessions, perform unauthorized administrative actions, and persistently compromise the CMS interface for all authenticated users. The vulnerability affects PHP-based GetSimpleCMS installations and currently has no available patch.

PHP XSS Getsimple Cms
NVD GitHub
CVE-2025-62512
EPSS 0% CVSS 5.3
MEDIUM POC This Month

Piwigo is an open source photo gallery application for the web. In version 15.5.0 and likely earlier 15.x releases, the password reset functionality in Piwigo allows an unauthenticated attacker to determine whether a given username or email address exists in the system. [CVSS 5.3 MEDIUM]

PHP Golang Piwigo
NVD GitHub
CVE-2026-27590
EPSS 0% CVSS 9.8
CRITICAL POC PATCH Act Now

FastCGI path splitting vulnerability in Caddy before 2.11.1 allows request smuggling or path confusion when proxying to FastCGI backends (PHP-FPM). EPSS 0.19% with PoC available.

PHP Tls RCE +2
NVD GitHub
CVE-2026-27732
EPSS 0% CVSS 8.1
HIGH PATCH This Week

Server-side request forgery in AVideo prior to version 22.0 allows authenticated users to make arbitrary outbound requests from the affected server via an unvalidated downloadURL parameter in the aVideoEncoder.json.php endpoint. An attacker can exploit this to probe internal network services, access metadata endpoints, and retrieve sensitive data, potentially leading to further system compromise. This affects PHP deployments running vulnerable AVideo versions.

PHP SSRF Avideo
NVD GitHub
CVE-2025-14577
EPSS 0% CVSS 9.8
CRITICAL Act Now

PHP function injection in Slican NCP/IPL/IPM/IPU VOIP devices allows unauthenticated remote attackers to execute arbitrary PHP functions. Network telecommunications equipment vulnerability.

PHP Ipu 14 Firmware Ipm 032 Firmware +2
NVD
CVE-2025-15589
EPSS 0% CVSS 3.8
LOW POC Monitor

A vulnerability was determined in MuYuCMS 2.7. Affected is the function delete_dir_file of the file application/admin/controller/Template.php of the component Template Management Page. [CVSS 3.8 LOW]

PHP Path Traversal
NVD GitHub VulDB
CVE-2025-15386
EPSS 0% CVSS 8.8
HIGH This Week

The Responsive Lightbox & Gallery WordPress plugin before 2.6.1 is vulnerable to an Unauthenticated Stored-XSS attack due to flawed regex replacement rules that can be abused by posting a comment with a malicious link when lightbox for comments are enabled and then approved. [CVSS 8.8 HIGH]

WordPress PHP
NVD WPScan
CVE-2026-3070
EPSS 0% CVSS 4.3
MEDIUM POC This Month

Reflected XSS in SourceCodester Modern Image Gallery App 1.0 allows unauthenticated remote attackers to inject malicious scripts through the filename parameter in upload.php. Public exploit code exists for this vulnerability, though it requires user interaction to succeed. No patch is currently available.

PHP XSS Modern Image Gallery App
NVD GitHub VulDB
CVE-2026-3069
EPSS 0% CVSS 7.3
HIGH POC This Week

SQL injection in itsourcecode Document Management System 1.0 via the field1 parameter in /edtlbls.php enables unauthenticated remote attackers to compromise data confidentiality, integrity, and availability. Public exploit code exists for this vulnerability, and no patch is currently available. The attack requires no user interaction and can be executed over the network with minimal complexity.

PHP SQLi Document Management System
NVD GitHub VulDB
CVE-2026-3068
EPSS 0% CVSS 7.3
HIGH POC This Week

Document Management System versions up to 1.0 contains a vulnerability that allows attackers to sql injection (CVSS 7.3).

PHP SQLi Document Management System
NVD GitHub VulDB
CVE-2026-3057
EPSS 0% CVSS 6.3
MEDIUM POC This Month

SQL injection in PearProjectApi up to version 2.8.10 allows authenticated attackers to execute arbitrary SQL queries through the projectCode parameter in the dateTotalForProject function. Public exploit code exists for this vulnerability, enabling remote attacks with potential to read, modify, or delete database contents. The vendor has not released a patch despite early notification.

PHP SQLi Pearprojectapi
NVD GitHub VulDB
CVE-2026-3046
EPSS 0% CVSS 7.3
HIGH POC This Week

E-Logbook With Health Monitoring System For Covid-19 versions up to 1.0 contains a security vulnerability (CVSS 7.3).

PHP SQLi E Logbook With Health Monitoring System For Covid 19
NVD GitHub VulDB
CVE-2026-3043
EPSS 0% CVSS 4.3
MEDIUM POC This Month

Reflected cross-site scripting in itsourcecode Event Management System 1.0 allows unauthenticated remote attackers to inject malicious scripts via the page parameter in /admin/navbar.php. Public exploit code exists for this vulnerability, enabling attackers to steal session tokens or perform actions on behalf of administrators. No patch is currently available.

PHP XSS Event Management System
NVD GitHub VulDB
CVE-2026-3042
EPSS 0% CVSS 7.3
HIGH POC This Week

SQL injection in itsourcecode Event Management System 1.0 allows unauthenticated remote attackers to manipulate the ID parameter in /admin/index.php and execute arbitrary SQL queries. Public exploit code exists for this vulnerability, and no patch is currently available. Attackers can leverage this to access, modify, or delete sensitive data with confidentiality, integrity, and availability impact.

PHP SQLi Event Management System
NVD GitHub VulDB
CVE-2026-23694
EPSS 0%
This Week

Aruba HiSpeed Cache (aruba-hispeed-cache) WordPress plugin versions prior to 3.0.5 contain a cross-site request forgery (CSRF) vulnerability affecting multiple administrative AJAX actions.

WordPress PHP CSRF
NVD
CVE-2026-26464
EPSS 0% CVSS 6.1
MEDIUM POC This Month

Society Management System Portal versions up to 1.0 is affected by cross-site scripting (xss) (CVSS 6.1).

PHP XSS Society Management System Portal
NVD GitHub
CVE-2026-2984
EPSS 0% CVSS 6.5
MEDIUM POC This Month

Student Result Management System versions up to 1.0 is affected by improper resource shutdown or release (CVSS 6.5).

PHP Denial Of Service Student Result Management System
NVD GitHub VulDB
CVE-2025-40986
EPSS 0%
This Week

Reflected Cross-Site Scripting (XSS) vulnerability in PideTuCita. This vulnerability allows an attacker to execute JavaScript code in the victim's browser by sending him/her a malicious URL using the endpoint 'cookies/indes.php/<XSS>'.

PHP XSS
NVD
Prev Page 14 of 99 Next

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy