Privilege Escalation

2402 CVEs technique

Monthly

CVE-2025-30025 HIGH This Week

CVE-2025-30025 is a local privilege escalation vulnerability in the inter-process communication (IPC) protocol between a server process and its service control mechanism, caused by insecure deserialization (CWE-502). An authenticated local attacker with limited privileges can exploit this flaw to escalate to higher privileges, potentially gaining complete system compromise including confidentiality, integrity, and availability impact. While the CVSS score of 7.8 indicates high severity, the local attack vector and requirement for prior authentication mean this affects primarily multi-user systems or scenarios where an attacker has already gained initial local access.

Privilege Escalation Camera Station Pro Device Manager
NVD
CVSS 3.1
7.8
EPSS
0.1%
CVE-2025-34097 HIGH POC THREAT Act Now

ProcessMaker BPM platform versions prior to 3.5.4 contain an unrestricted file upload vulnerability in the plugin installation mechanism. An admin can upload a malicious .tar plugin containing arbitrary PHP code that executes during the plugin's install() method, achieving remote code execution on the workflow automation server.

File Upload PHP RCE Privilege Escalation
NVD Exploit-DB
CVSS 4.0
8.6
EPSS
28.3%
Threat
4.1
CVE-2025-53503 HIGH This Week

CVE-2025-53503 is a privilege escalation vulnerability in Trend Micro Cleaner One Pro that allows a local attacker with low privileges to delete critical Trend Micro system files, potentially including the security software itself. The CVSS 7.8 score reflects high impact across confidentiality, integrity, and availability. No public exploit code or active exploitation in the wild has been confirmed at this time, but the vulnerability requires only low privileges and no user interaction, making it a material risk for environments running this product.

Privilege Escalation Trendmicro Cleaner One
NVD
CVSS 3.1
7.8
EPSS
0.0%
CVE-2025-52837 HIGH This Week

Trend Micro Password Manager (Consumer) versions 5.8.0.1327 and below contains a privilege escalation vulnerability exploiting symbolic link following and file/folder deletion capabilities. An authenticated local attacker with low privileges can leverage this vulnerability to delete arbitrary files and escalate privileges on the affected system. While no active exploitation in the wild has been publicly confirmed as of this analysis, the local attack vector and straightforward nature of symbolic link exploitation represent meaningful risk to Password Manager users.

Privilege Escalation Password Manager
NVD
CVSS 3.1
7.8
EPSS
0.1%
CVE-2025-52521 HIGH This Week

Trend Micro Security 17.8 for consumer platforms contains a local privilege escalation vulnerability via improper symlink handling (CWE-64: Improper Link Resolution Before File Access) that allows a local attacker with limited privileges to delete or modify critical Trend Micro system files without user interaction. The vulnerability affects Trend Micro Security 17.8 specifically and carries a CVSS 3.1 score of 7.8 (High) with local attack vector; KEV status, EPSS score, and active exploitation data are not provided in available sources, limiting real-world risk quantification.

Privilege Escalation Trendmicro Path Traversal Maximum Security 2022
NVD
CVSS 3.1
7.8
EPSS
0.1%
CVE-2025-47812 CRITICAL POC KEV THREAT Emergency

Wing FTP Server before 7.4.4 contains a critical remote code execution vulnerability (CVE-2025-47812, CVSS 10.0) through null byte injection in user/admin web interfaces that enables arbitrary Lua code execution in session files. With EPSS 92.7% and KEV listing, this vulnerability guarantees unauthenticated root/SYSTEM code execution on affected servers, as the FTP service runs with maximum privileges by default.

RCE Code Injection Ftp Remote Code Execution Privilege Escalation +1
NVD Exploit-DB
CVSS 3.1
10.0
EPSS
92.7%
Threat
7.8
CVE-2025-47811 MEDIUM POC This Month

In Wing FTP Server through 7.4.4, the administrative web interface (listening by default on port 5466) runs as root or SYSTEM by default. The web application itself offers several legitimate ways to execute arbitrary system commands (i.e., through the web console or the task scheduler), and they are automatically executed in the highest possible privilege context. Because administrative users of the web interface are not necessarily also system administrators, one might argue that this is a privilege escalation. (If a privileged application role is not available to an attacker, CVE-2025-47812 can be leveraged.) NOTE: the vendor reportedly considers this behavior "fine to keep."

Privilege Escalation Wing Ftp Server
NVD
CVSS 3.1
4.1
EPSS
0.1%
CVE-2025-0141 HIGH This Week

CVE-2025-0141 is a security vulnerability (CVSS 8.4) that allows a locally authenticated non administrative user. High severity vulnerability requiring prompt remediation.

Microsoft Google Paloalto Apple Privilege Escalation +4
NVD
CVSS 4.0
8.4
EPSS
0.0%
CVE-2025-0139 MEDIUM This Month

CVE-2025-0139 is a security vulnerability (CVSS 6.3) that allows a locally authenticated low privileged user. Remediation should follow standard vulnerability management procedures.

Paloalto Apple Privilege Escalation macOS
NVD
CVSS 4.0
6.3
EPSS
0.0%
CVE-2025-7204 MEDIUM This Month

In ConnectWise PSA versions older than 2025.9, a vulnerability exists where authenticated users could gain access to sensitive user information. Specific API requests were found to return an overly verbose user object, which included encrypted password hashes for other users. Authenticated users could then retrieve these hashes.  An attacker or privileged user could then use these exposed hashes to conduct offline brute-force or dictionary attacks. Such attacks could lead to credential compromise, allowing unauthorized access to accounts, and potentially privilege escalation within the system.

Privilege Escalation Authentication Bypass Professional Service Automation
NVD
CVSS 3.1
6.5
EPSS
0.1%
CVE-2025-4606 CRITICAL Act Now

The Sala - Startup & SaaS WordPress Theme theme for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 1.1.4. This is due to the theme not properly validating a user's identity prior to updating their details like password. This makes it possible for unauthenticated attackers to change arbitrary user's passwords, including administrators, and leverage that to gain access to their account.

WordPress Privilege Escalation PHP
NVD
CVSS 3.1
9.8
EPSS
0.1%
CVE-2025-6759 HIGH This Week

Local Privilege escalation allows a low-privileged user to gain SYSTEM privileges in Windows Virtual Delivery Agent for CVAD and Citrix DaaS

Microsoft Citrix Privilege Escalation Virtual Apps And Desktops Windows
NVD
CVSS 3.1
7.8
EPSS
0.0%
CVE-2025-49551 HIGH This Week

ColdFusion versions 2025.2, 2023.14, 2021.20 and earlier are affected by a Use of Hard-coded Credentials vulnerability that could result in privilege escalation. An attacker could leverage this vulnerability to gain unauthorized access to sensitive systems or data. Exploitation of this issue does not require user interaction. The vulnerable component is restricted to internal IP addresses.

Privilege Escalation Authentication Bypass Coldfusion
NVD
CVSS 3.1
8.8
EPSS
0.0%
CVE-2025-43019 HIGH This Week

A potential security vulnerability has been identified in the HP Support Assistant, which allows a local attacker to escalate privileges via an arbitrary file deletion.

Privilege Escalation Support Assistant
NVD
CVSS 3.1
7.8
EPSS
0.0%
CVE-2025-47422 HIGH This Week

Advanced Installer before 22.6 has an uncontrolled search path element local privilege escalation vulnerability. When running as SYSTEM in certain configurations, Advanced Installer looks in standard-user writable locations for non-existent binaries and executes them as SYSTEM. A low-privileged attacker can place a malicious binary in a targeted folder; when the installer is executed, the attacker achieves arbitrary SYSTEM code execution.

RCE Privilege Escalation
NVD
CVSS 3.1
7.5
EPSS
0.1%
CVE-2025-41665 MEDIUM This Month

An low privileged remote attacker can enforce the watchdog of the affected devices to reboot the PLC due to incorrect default permissions of a config file.

Privilege Escalation
NVD
CVSS 3.1
6.5
EPSS
0.1%
CVE-2025-25269 HIGH This Week

An unauthenticated local attacker can inject a command that is subsequently executed as root, leading to a privilege escalation.

Command Injection Privilege Escalation Charx Sec 3000 Firmware Charx Sec 3150 Firmware Charx Sec 3100 Firmware +1
NVD
CVSS 3.1
8.4
EPSS
0.1%
CVE-2025-24006 HIGH This Week

A low privileged local attacker can leverage insecure permissions via SSH on the affected devices to escalate privileges to root.

Privilege Escalation Charx Sec 3000 Firmware Charx Sec 3150 Firmware Charx Sec 3050 Firmware Charx Sec 3100 Firmware
NVD
CVSS 3.1
7.8
EPSS
0.0%
CVE-2025-24005 HIGH This Week

A local attacker with a local user account can leverage a vulnerable script via SSH to escalate privileges to root due to improper input validation.

Privilege Escalation Charx Sec 3000 Firmware Charx Sec 3150 Firmware Charx Sec 3100 Firmware Charx Sec 3050 Firmware
NVD
CVSS 3.1
7.8
EPSS
0.0%
CVE-2025-20684 CRITICAL Act Now

In wlan AP driver, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00416939; Issue ID: MSV-3422.

Buffer Overflow Memory Corruption Privilege Escalation Software Development Kit
NVD
CVSS 3.1
9.8
EPSS
0.2%
CVE-2025-20683 CRITICAL Act Now

In wlan AP driver, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00416938; Issue ID: MSV-3444.

Buffer Overflow Memory Corruption Privilege Escalation Software Development Kit Openwrt
NVD
CVSS 3.1
9.8
EPSS
0.2%
CVE-2025-20682 CRITICAL Act Now

In wlan AP driver, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00416937; Issue ID: MSV-3445.

Buffer Overflow Memory Corruption Privilege Escalation Software Development Kit Openwrt
NVD
CVSS 3.1
9.8
EPSS
0.2%
CVE-2025-20681 CRITICAL Act Now

In wlan AP driver, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00416936; Issue ID: MSV-3446.

Buffer Overflow Memory Corruption Privilege Escalation Software Development Kit Openwrt
NVD
CVSS 3.1
9.8
EPSS
0.2%
CVE-2025-20680 CRITICAL Act Now

In Bluetooth driver, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00418044; Issue ID: MSV-3482.

Heap Overflow Buffer Overflow Privilege Escalation Nbiot Sdk
NVD
CVSS 3.1
9.8
EPSS
0.2%
CVE-2025-43001 MEDIUM This Month

SAPCAR allows an attacker logged in with high privileges to override the permissions of the current and parent directories of the user or process extracting the archive, leading to privilege escalation. On successful exploitation, an attacker could modify the critical files by tampering with signed archives without breaking the signature, but it has a low impact on the confidentiality and availability of the system.

Privilege Escalation
NVD
CVSS 3.1
6.9
EPSS
0.0%
CVE-2025-42992 MEDIUM This Month

SAPCAR allows an attacker logged in with high privileges to create a malicious SAR archive in SAPCAR. This could enable the attacker to exploit critical files and directory permissions without breaking signature validation, resulting in potential privilege escalation. This has high impact on integrity, but low impact on confidentiality and availability of the system.

Privilege Escalation
NVD
CVSS 3.1
6.9
EPSS
0.0%
CVE-2025-1351 MEDIUM This Month

IBM Storage Virtualize 8.5, 8.6, and 8.7 products could allow a user to escalate their privileges to that of another user logging in at the same time due to a race condition in the login function.

Race Condition Privilege Escalation IBM Storage Virtualize
NVD
CVSS 3.1
6.7
EPSS
0.0%
CVE-2025-53186 MEDIUM This Month

Vulnerability that allows third-party call apps to send broadcasts without verification in the audio framework module Impact: Successful exploitation of this vulnerability may affect availability.

Privilege Escalation Harmonyos Emui
NVD
CVSS 3.1
5.9
EPSS
0.0%
CVE-2025-53178 MEDIUM This Month

Permission bypass vulnerability in the calendar storage module Impact: Successful exploitation of this vulnerability may affect the schedule reminder function of head units.

Privilege Escalation Emui Harmonyos
NVD
CVSS 3.1
4.8
EPSS
0.0%
CVE-2025-53177 LOW Monitor

Permission bypass vulnerability in the calendar storage module Impact: Successful exploitation of this vulnerability may affect the schedule syncing function of watches.

Privilege Escalation
NVD
CVSS 3.1
3.9
EPSS
0.0%
CVE-2025-26850 CRITICAL Act Now

The agent in Quest KACE Systems Management Appliance (SMA) before 14.0.97 and 14.1.x before 14.1.19 potentially allows privilege escalation on managed systems.

Privilege Escalation Authentication Bypass
NVD
CVSS 3.1
9.3
EPSS
0.0%
CVE-2025-49867 CRITICAL Act Now

Incorrect Privilege Assignment vulnerability in InspiryThemes RealHomes allows Privilege Escalation. This issue affects RealHomes: from n/a through 4.4.0.

Privilege Escalation
NVD
CVSS 3.1
9.8
EPSS
0.1%
CVE-2025-28983 CRITICAL Act Now

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in ClickandPledge Click & Pledge Connect allows Privilege Escalation. This issue affects Click & Pledge Connect: from 25.04010101 through WP6.8.

Privilege Escalation SQLi
NVD
CVSS 3.1
9.8
EPSS
0.0%
CVE-2025-23970 CRITICAL Act Now

Incorrect Privilege Assignment vulnerability in aonetheme Service Finder Booking allows Privilege Escalation. This issue affects Service Finder Booking: from n/a through 6.0.

Privilege Escalation
NVD
CVSS 3.1
9.8
EPSS
0.1%
CVE-2025-5953 HIGH This Week

The WP Human Resource Management plugin for WordPress is vulnerable to Privilege Escalation due to missing authorization in the ajax_insert_employee() and update_empoyee() functions in versions 2.0.0 through 2.2.17. The AJAX handler reads the client-supplied $_POST['role'] and, after basic cleaning via hrm_clean(), passes it directly to wp_insert_user() and later to $user->set_role() without verifying that the current user is allowed to assign that role. This makes it possible for authenticated attackers, with Employee-level access and above, to elevate their privileges to administrator.

WordPress Privilege Escalation Authentication Bypass Wp Human Resource Management PHP
NVD
CVSS 3.1
8.8
EPSS
0.1%
CVE-2025-43713 MEDIUM This Month

ASNA Assist and ASNA Registrar before 2025-03-31 allow deserialization attacks against .NET remoting. These are Windows system services that support license key management and deprecated Windows network authentication. The services are implemented with .NET remoting and can be exploited via well-known deserialization techniques inherent in the technology. Because the services run with SYSTEM-level rights, exploits can be crafted to achieve escalation of privilege and arbitrary code execution. This affects DataGate for SQL Server 17.0.36.0 and 16.0.89.0, DataGate Component Suite 17.0.36.0 and 16.0.89.0, DataGate Monitor 17.0.26.0 and 16.0.65.0, DataGate WebPak 17.0.37.0 and 16.0.90.0, Monarch for .NET 11.4.50.0 and 10.0.62.0, Encore RPG 4.1.36.0, Visual RPG .NET FW 17.0.37.0 and 16.0.90.0, Visual RPG .NET FW Windows Deployment 17.0.36.0 and 16.0.89.0, WingsRPG 11.0.38.0 and 10.0.95.0, Mobile RPG 11.0.35.0 and 10.0.94.0, Monarch Framework for .NET FW 11.0.36.0 and 10.0.89.0, Browser Terminal 17.0.37.0 and 16.0.90.0, Visual RPG Classic 5.2.7.0 and 5.1.17.0, Visual RPG Deployment 5.2.7.0 and 5.1.17.0, and DataGate Studio 17.0.38.0 and 16.0.104.0.

Deserialization RCE Microsoft Privilege Escalation Windows
NVD
CVSS 3.1
6.5
EPSS
0.3%
CVE-2025-34078 HIGH POC This Week

A local privilege escalation vulnerability exists in NSClient++ 0.5.2.35 when both the web interface and ExternalScripts features are enabled. The configuration file (nsclient.ini) stores the administrative password in plaintext and is readable by local users. By extracting this password, an attacker can authenticate to the NSClient++ web interface (typically accessible on port 8443) and abuse the ExternalScripts plugin to inject and execute arbitrary commands as SYSTEM by registering a custom script, saving the configuration, and triggering it via the API. This behavior is documented but insecure, as the plaintext credential exposure undermines access isolation between local users and administrative functions.

Privilege Escalation
NVD Exploit-DB
CVSS 3.1
7.8
EPSS
2.3%
CVE-2025-6943 LOW Monitor

Secret Server version 11.7 and earlier is vulnerable to a SQL report creation vulnerability that allows an administrator to gain access to restricted tables.

Privilege Escalation
NVD
CVSS 3.1
3.8
EPSS
0.0%
CVE-2025-24331 MEDIUM This Month

A security vulnerability in capabilities (CVSS 6.4). Remediation should follow standard vulnerability management procedures.

Privilege Escalation
NVD
CVSS 3.1
6.4
EPSS
0.0%
CVE-2025-36630 HIGH This Week

In Tenable Nessus versions prior to 10.8.5 on a Windows host, it was found that a non-administrative user could overwrite arbitrary local system files with log content at SYSTEM privilege.

Microsoft Privilege Escalation Nessus Windows
NVD
CVSS 3.1
8.4
EPSS
0.0%
CVE-2025-6934 CRITICAL Act Now

The Opal Estate Pro - Property Management and Submission plugin for WordPress, used by the FullHouse - Real Estate Responsive WordPress Theme, is vulnerable to privilege escalation via in all versions up to, and including, 1.7.5. This is due to a lack of role restriction during registration in the 'on_regiser_user' function. This makes it possible for unauthenticated attackers to arbitrarily choose the role, including the Administrator role, assigned when registering.

WordPress Privilege Escalation PHP
NVD
CVSS 3.1
9.8
EPSS
23.6%
CVE-2025-46014 HIGH POC This Week

Several services in Honor Device Co., Ltd Honor PC Manager v16.0.0.118 was discovered to connect services to the named pipe iMateBookAssistant with default or overly permissive security attributes, leading to a privilege escalation.

Privilege Escalation Pc Manager
NVD GitHub
CVSS 3.1
8.8
EPSS
0.1%
CVE-2025-24289 HIGH This Week

A Cross-Site Request Forgery (CSRF) leading to Cross-Site Scripting (XSS) vulnerability in the UCRM Client Signup Plugin (v1.3.4 and earlier) could allow privilege escalation if an Administrator is tricked into visiting a crafted malicious page. The plugin is disabled by default.

XSS CSRF Privilege Escalation
NVD
CVSS 3.0
7.5
EPSS
0.0%
CVE-2025-5304 CRITICAL Act Now

The PT Project Notebooks plugin for WordPress is vulnerable to Privilege Escalation due to missing authorization in the wpnb_pto_new_users_add() function in versions 1.0.0 through 1.1.3. This makes it possible for unauthenticated attackers to elevate their privileges to that of an administrator.

WordPress Privilege Escalation Authentication Bypass Pt Project Notebooks PHP
NVD
CVSS 3.1
9.8
EPSS
0.4%
CVE-2025-52991 LOW PATCH Monitor

The Nix, Lix, and Guix package managers default to using temporary build directories in a world-readable and world-writable location. This allows standard users to deceive the package manager into using directories with pre-existing content, potentially leading to unauthorized actions or data manipulation. This affects Nix before 2.24.15, 2.26.4, 2.28.4, and 2.29.1; Lix before 2.91.2, 2.92.2, and 2.93.1; and Guix before 1.4.0-38.0e79d5b.

Privilege Escalation Ubuntu Debian
NVD
CVSS 3.1
3.2
EPSS
0.0%
CVE-2025-52726 HIGH This Week

Incorrect Privilege Assignment vulnerability in pebas CouponXxL Custom Post Types allows Privilege Escalation. This issue affects CouponXxL Custom Post Types: from n/a through 3.0.

Privilege Escalation
NVD
CVSS 3.1
8.6
EPSS
0.1%
CVE-2025-32281 CRITICAL Act Now

Missing Authorization vulnerability in FocuxTheme WPKit For Elementor allows Privilege Escalation. This issue affects WPKit For Elementor: from n/a through 1.1.0.

Privilege Escalation Authentication Bypass
NVD
CVSS 3.1
9.8
EPSS
0.1%
CVE-2024-12827 CRITICAL Act Now

The DWT - Directory & Listing WordPress Theme theme for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 3.3.6. This is due to the plugin not properly checking for an empty token value prior to resetting a user's password through the dwt_listing_reset_password() function. This makes it possible for unauthenticated attackers to change arbitrary user's passwords, including administrators, and leverage that to gain access to their account.

WordPress Privilege Escalation
NVD
CVSS 3.1
9.8
EPSS
0.3%
CVE-2025-45737 MEDIUM POC This Month

An issue in NetEase (Hangzhou) Network Co., Ltd NeacSafe64 Driver before v1.0.0.8 allows attackers to escalate privileges via sending crafted IOCTL commands to the NeacSafe64.sys component.

Privilege Escalation Neacsafe64
NVD GitHub
CVSS 3.1
6.5
EPSS
0.1%
CVE-2025-52555 MEDIUM PATCH This Month

Ceph is a distributed object, block, and file storage platform. In versions 17.2.7, 18.2.1 through 18.2.4, and 19.0.0 through 19.2.2, an unprivileged user can escalate to root privileges in a ceph-fuse mounted CephFS by chmod 777 a directory owned by root to gain access. The result of this is that a user could read, write and execute to any directory owned by root as long as they chmod 777 it. This impacts confidentiality, integrity, and availability. It is patched in versions 17.2.8, 18.2.5, and 19.2.3.

Privilege Escalation Ubuntu Debian Redhat Suse
NVD GitHub
CVSS 3.1
6.5
EPSS
0.0%
CVE-2014-7210 CRITICAL PATCH Act Now

pdns specific as packaged in Debian in version before 3.3.1-1 creates a too privileged MySQL user. It was discovered that the maintainer scripts of pdns-backend-mysql grant too wide database permissions for the pdns user. Other backends are not affected.

Debian Privilege Escalation Ubuntu Debian Linux Pdns
NVD
CVSS 3.1
9.8
EPSS
0.1%
CVE-2025-5995 MEDIUM This Month

Canon EOS Webcam Utility Pro for MAC OS version 2.3d (2.3.29) and earlier contains an improper directory permissions vulnerability. Exploitation of this vulnerability requires administrator access by a malicious user. An attacker could modify the directory, potentially resulting in code execution and ultimately leading to privilege escalation.

Privilege Escalation macOS
NVD
CVSS 4.0
4.6
EPSS
0.0%
CVE-2025-52900 MEDIUM POC PATCH This Month

File Browser provides a file managing interface within a specified directory and it can be used to upload, delete, preview, rename and edit files. The file access permissions for files uploaded to or created from File Browser are never explicitly set by the application. The same is true for the database used by File Browser. On standard servers using File Browser prior to version 2.33.7 where the umask configuration has not been hardened before, this makes all the stated files readable by any operating system account. Version 2.33.7 fixes the issue.

Privilege Escalation Filebrowser Suse
NVD GitHub
CVSS 3.1
5.5
EPSS
0.0%
CVE-2025-37101 HIGH This Week

A potential security vulnerability has been identified in HPE OneView for VMware vCenter (OV4VC). This vulnerability could be exploited allowing an attacker with read only privilege to cause Vertical Privilege Escalation (operator can perform admin actions).

VMware Privilege Escalation
NVD
CVSS 3.1
8.7
EPSS
0.1%
CVE-2025-4334 CRITICAL Act Now

The Simple User Registration plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 6.3. This is due to insufficient restrictions on user meta values that can be supplied during registration. This makes it possible for unauthenticated attackers to register as an administrator.

WordPress Privilege Escalation
NVD
CVSS 3.1
9.8
EPSS
29.3%
CVE-2025-5834 HIGH This Week

CVE-2025-5834 is a local privilege escalation vulnerability in Pioneer DMH-WT7600NEX infotainment systems caused by a missing hardware root of trust in the SoC configuration. An attacker with local access and valid authentication credentials can bypass the existing authentication mechanism and execute arbitrary code during boot with elevated privileges. The vulnerability has a CVSS score of 7.8 (High) and was previously tracked as ZDI-CAN-26078; exploitation likelihood and active exploitation status depend on public POC availability and EPSS scoring.

RCE Privilege Escalation Dmh Wt7600nex Firmware
NVD
CVSS 3.1
7.8
EPSS
0.0%
CVE-2025-5822 HIGH This Week

CVE-2025-5822 is a privilege escalation vulnerability in the Autel MaxiCharger AC Wallbox Commercial Technician API that allows authenticated attackers to escalate from low-privileged users to higher privilege levels, potentially gaining unauthorized access to administrative functions and sensitive charging station data. The vulnerability requires an attacker to first obtain a valid low-privileged API token, after which they can bypass authorization controls to access restricted resources. With a CVSS score of 8.8 and network-accessible attack vector, this represents a significant risk to commercial EV charging infrastructure.

Privilege Escalation Maxicharger Ac Ultra Firmware Maxicharger Single Charger Firmware Maxicharger Dc Compact Mobile Firmware Maxicharger Dc Compact Pedestal Firmware +5
NVD
CVSS 3.1
8.8
EPSS
0.1%
CVE-2025-52890 HIGH PATCH This Week

CVE-2025-52890 is a network-layer security bypass in Incus 6.12 and 6.13 where improper nftables rule generation on bridge-connected ACL devices allows attackers to circumvent MAC filtering, IPv4 filtering, and IPv6 filtering security controls. This enables ARP spoofing and full VM/container impersonation on the same bridge. The vulnerability requires administrative privilege and local network access but results in high confidentiality and availability impact across the container/VM infrastructure.

Authentication Bypass Linux Privilege Escalation Suse
NVD GitHub
CVSS 3.1
8.1
EPSS
0.0%
CVE-2025-20282 CRITICAL CERT-EU Act Now

CVE-2025-20282 is a critical remote code execution vulnerability in Cisco ISE and ISE-PIC that allows unauthenticated attackers to upload arbitrary files to privileged directories and execute them as root via an internal API lacking file validation. This is a CVSS 10.0 vulnerability with complete system compromise impact; organizations running affected Cisco ISE deployments face immediate risk of total infrastructure takeover without authentication requirements or user interaction.

RCE Cisco Privilege Escalation Authentication Bypass Identity Services Engine Passive Identity Connector +1
NVD
CVSS 3.1
10.0
EPSS
0.3%
CVE-2025-20281 CRITICAL POC KEV THREAT CERT-EU Emergency

Cisco ISE and ISE-PIC contain a critical input injection vulnerability (CVE-2025-20281, CVSS 10.0) that allows unauthenticated remote attackers to execute arbitrary code as root on the underlying operating system. With EPSS 30.4% and KEV listing, this vulnerability targets the network access control platform that governs who and what can access the enterprise network — compromising ISE means controlling network admission for the entire organization.

RCE Cisco Privilege Escalation Authentication Bypass Identity Services Engine Passive Identity Connector +1
NVD
CVSS 3.1
10.0
EPSS
30.4%
Threat
5.9
CVE-2025-49797 HIGH This Week

CVE-2025-49797 is a privilege escalation vulnerability in multiple Brother device driver installers for Windows that allows a local attacker with limited user privileges to execute arbitrary code with administrative rights without user interaction. The vulnerability affects various Brother printer and multifunction device driver packages across multiple versions. While the CVSS score of 7.8 indicates significant severity, real-world exploitability depends on whether an attacker has local access to a system during driver installation or can manipulate installer processes.

Microsoft Privilege Escalation Windows
NVD
CVSS 3.0
7.8
EPSS
0.0%
CVE-2025-36004 HIGH This Week

CVE-2025-36004 is a privilege escalation vulnerability in IBM Facsimile Support for i affecting IBM i 7.2, 7.3, 7.4, and 7.5. The vulnerability stems from an unqualified library call that allows authenticated users to execute arbitrary code with administrator privileges. With a CVSS score of 8.8 and network accessibility, this represents a critical privilege escalation risk for organizations running affected IBM i systems.

IBM Privilege Escalation RCE
NVD
CVSS 3.1
8.8
EPSS
0.1%
CVE-2025-32976 HIGH This Week

CVE-2025-32976 is a security vulnerability (CVSS 8.8) that allows authenticated users. High severity vulnerability requiring prompt remediation.

Authentication Bypass Privilege Escalation
NVD
CVSS 3.1
8.8
EPSS
0.2%
CVE-2025-39201 MEDIUM This Month

A vulnerability exists in MicroSCADA X SYS600 product. If exploited this could allow a local unauthenticated attacker to tamper a system file, making denial of Notify service.

Privilege Escalation Microscada X Sys600
NVD
CVSS 3.1
6.1
EPSS
0.1%
CVE-2025-48470 MEDIUM This Month

Successful exploitation of the stored cross-site scripting vulnerability could allow an attacker to inject malicious scripts into device fields and executed in other users’ browser, potentially leading to session hijacking, defacement, credential theft, or privilege escalation.

XSS Privilege Escalation Wise 4060lan Firmware Wise 4010lan Firmware Wise 4050lan Firmware
NVD
CVSS 3.1
4.1
EPSS
0.0%
CVE-2025-48469 CRITICAL POC Act Now

A privilege escalation vulnerability (CVSS 9.6) that allows an unauthenticated attacker. Risk factors: public PoC available.

Privilege Escalation Authentication Bypass RCE Wise 4060lan Firmware Wise 4010lan Firmware +1
NVD
CVSS 3.1
9.6
EPSS
0.1%
CVE-2025-49144 HIGH This Week

CVE-2025-49144 is a privilege escalation vulnerability in Notepad++ v8.8.1 and earlier that exploits insecure executable search paths in the installer to allow unprivileged local users to execute arbitrary code with SYSTEM privileges. An attacker can leverage social engineering to colocate a malicious executable with the legitimate installer in a writable directory (e.g., Downloads), and upon installer execution, the malicious payload runs with elevated privileges. The vulnerability is fixed in version 8.8.2.

Privilege Escalation
NVD GitHub
CVSS 3.1
7.3
EPSS
0.0%
CVE-2023-47031 CRITICAL Act Now

CVE-2023-47031 is a critical privilege escalation vulnerability in NCR Terminal Handler v1.5.1 that allows unauthenticated remote attackers to gain administrative privileges by crafting malicious POST requests to SOAP API endpoints (grantRolesToUsers, grantRolesToGroups, grantRolesToOrganization). With a CVSS score of 9.8 and attack vector requiring no authentication or user interaction, this vulnerability poses an immediate threat to exposed NCR Terminal Handler installations. The vulnerability has been confirmed with public disclosure and is listed in CISA's Known Exploited Vulnerabilities catalog, indicating active exploitation in the wild.

Privilege Escalation Terminal Handler
NVD
CVSS 3.1
9.8
EPSS
0.2%
CVE-2025-4563 LOW PATCH Monitor

A vulnerability exists in the NodeRestriction admission controller where nodes can bypass dynamic resource allocation authorization checks. When the DynamicResourceAllocation feature gate is enabled, the controller properly validates resource claim statuses during pod status updates but fails to perform equivalent validation during pod creation. This allows a compromised node to create mirror pods that access unauthorized dynamic resources, potentially leading to privilege escalation.

Privilege Escalation Ubuntu Debian
NVD GitHub
CVSS 3.1
2.7
EPSS
0.0%
CVE-2023-50450 HIGH This Week

A privilege escalation vulnerability in Sensopart VISOR Vision Sensors (CVSS 8.4) that allows local users. High severity vulnerability requiring prompt remediation.

Privilege Escalation Visor Vision Sensors Firmware
NVD
CVSS 3.1
8.4
EPSS
0.0%
CVE-2025-6513 CRITICAL Act Now

CVE-2025-6513 is a local privilege escalation vulnerability in the BRAIN2 application where standard Windows users can access and decrypt the application's database configuration file without authentication. This allows unprivileged local users to obtain database credentials and potentially compromise sensitive data, with a CVSS score of 9.3 indicating critical severity. The vulnerability affects system confidentiality, integrity, and availability across trust boundaries.

Microsoft Information Disclosure Windows Privilege Escalation
NVD
CVSS 3.1
9.3
EPSS
0.0%
CVE-2025-6512 CRITICAL Act Now

CVE-2025-6512 is a critical privilege escalation vulnerability in BRAIN2 where unauthenticated attackers can inject malicious scripts into reports on non-admin client systems, which are then executed with administrator privileges on the BRAIN2 server. This represents a complete system compromise with CVSS 10.0 severity, affecting all users regardless of their local privilege level. No authentication is required to exploit this vulnerability, making it immediately exploitable in network environments.

RCE Code Injection Privilege Escalation
NVD
CVSS 3.1
10.0
EPSS
0.1%
CVE-2025-5121 HIGH PATCH CERT-EU This Week

GitLab CE/EE contains a missing authorization check (CWE-862) in its compliance frameworks feature that allows authenticated users with limited privileges to apply compliance frameworks to projects outside the intended scope of the framework's group, potentially affecting confidentiality, integrity, and availability. This vulnerability affects GitLab versions 17.11 before 17.11.4 and 18.0 before 18.0.2. The CVSS 8.5 score reflects high severity due to the scope change and multiple impact categories, though exploitation requires low-level user authentication and higher-than-typical attack complexity.

Gitlab Privilege Escalation
NVD
CVSS 3.1
8.5
EPSS
0.0%
CVE-2025-52825 HIGH This Week

A privilege escalation vulnerability in Rameez Iqbal Real Estate Manager allows Privilege Escalation (CVSS 8.8). High severity vulnerability requiring prompt remediation.

CSRF Privilege Escalation
NVD
CVSS 3.1
8.8
EPSS
0.0%
CVE-2025-4102 HIGH This Week

The Beaver Builder Plugin (Starter Version) for WordPress contains an arbitrary file upload vulnerability in the 'save_enabled_icons' function due to missing file type validation, affecting all versions up to and including 2.9.1. Authenticated attackers with Administrator-level access can upload arbitrary files to the server, potentially enabling remote code execution. The vulnerability was only partially patched in version 2.9.1, indicating residual risk in the latest release.

WordPress RCE PHP Privilege Escalation Beaver Builder
NVD
CVSS 3.1
7.2
EPSS
0.5%
CVE-2025-5963 MEDIUM This Month

The Postbox's configuration on macOS, specifically the presence of entitlements: "com.apple.security.cs.allow-dyld-environment-variables" and "com.apple.security.cs.disable-library-validation" allows for Dynamic Library (Dylib) injection. A local attacker with unprivileged access can use environment variables like DYLD_INSERT_LIBRARIES to successfully inject code in application's context and bypass Transparency, Consent, and Control (TCC). Acquired resource access is limited to previously granted permissions by the user. Access to other resources beyond granted-permissions requires user interaction with a system prompt asking for permission. The original company behind Postbox is no longer operational, the software will no longer receive updates. The acquiring company (em Client) did not cooperate in vulnerability disclosure.

Apple Privilege Escalation macOS
NVD
CVSS 4.0
4.8
EPSS
0.0%
CVE-2025-5255 MEDIUM This Month

The Phoenix Code's configuration on macOS, specifically the presence of entitlements: "com.apple.security.cs.allow-dyld-environment-variables" and "com.apple.security.cs.disable-library-validation" allows for Dynamic Library (Dylib) injection. A local attacker with unprivileged access can use environment variables like DYLD_INSERT_LIBRARIES to successfully inject code in application's context and bypass Transparency, Consent, and Control (TCC). Acquired resource access is limited to previously granted permissions by the user. Access to other resources beyond granted-permissions requires user interaction with a system prompt asking for permission. This issue was fixed in commit 0c75fb57f89d0b7d9b180026bc2624b7dcf807da

Apple Privilege Escalation macOS
NVD GitHub
CVSS 4.0
4.8
EPSS
0.0%
CVE-2025-6264 MEDIUM POC PATCH This Month

Velociraptor allows collection of VQL queries packaged into Artifacts from endpoints. These artifacts can be used to do anything and usually run with elevated permissions.  To limit access to some dangerous artifact, Velociraptor allows for those to require high permissions like EXECVE to launch. The Admin.Client.UpdateClientConfig is an artifact used to update the client's configuration. This artifact did not enforce an additional required permission, allowing users with COLLECT_CLIENT permissions (normally given by the "Investigator" role) to collect it from endpoints and update the configuration. This can lead to arbitrary command execution and endpoint takeover. To successfully exploit this vulnerability the user must already have access to collect artifacts from the endpoint (i.e. have the COLLECT_CLIENT given typically by the "Investigator' role).

Privilege Escalation Velociraptor Suse
NVD GitHub
CVSS 3.1
5.5
EPSS
0.1%
CVE-2025-33117 CRITICAL Act Now

IBM QRadar SIEM versions 7.5 through 7.5.0 Update Package 12 contains a privilege escalation vulnerability that allows authenticated administrative users to modify configuration files and upload malicious autoupdate packages, leading to arbitrary command execution with system-level privileges. This is a high-severity vulnerability (CVSS 9.1) affecting SIEM infrastructure; while it requires high privileges (PR:H), the network-accessible attack vector (AV:N) and lack of user interaction (UI:N) make it a significant risk in multi-user enterprise environments where administrative credentials may be compromised or misused.

IBM Privilege Escalation RCE Qradar Security Information And Event Manager
NVD
CVSS 3.1
9.1
EPSS
0.1%
CVE-2025-6019 HIGH PATCH This Week

Local privilege escalation vulnerability in libblockdev that allows an unprivileged user with Polkit 'allow_active' permissions to escalate to root privileges by crafting a malicious XFS filesystem image and exploiting udisks' mounting behavior. The vulnerability affects users with active session permissions on systems running vulnerable libblockdev versions, enabling complete system compromise through execution of SUID-root binaries embedded in specially crafted disk images. While carrying a moderate CVSS score of 7.0, the attack requires local access and user interaction with filesystem resizing operations, limiting real-world exploitation scope.

Privilege Escalation Redhat Suse
NVD
CVSS 3.1
7.0
EPSS
0.0%
CVE-2025-5071 HIGH PATCH This Week

The AI Engine WordPress plugin (versions 2.8.0-2.8.3) contains a missing capability check in the 'Meow_MWAI_Labs_MCP::can_access_mcp' function, allowing authenticated subscribers and above to access the Model Context Protocol (MCP) interface and execute arbitrary WordPress administrative commands. This enables privilege escalation, unauthorized user creation/modification, and data destruction through post and comment manipulation. The vulnerability has a CVSS score of 8.8 (High) and poses immediate risk to any WordPress installation running affected versions with user registration enabled.

WordPress Privilege Escalation PHP Ai Engine
NVD
CVSS 3.1
8.8
EPSS
0.1%
CVE-2025-24286 HIGH PATCH This Week

Privilege escalation vulnerability in backup management systems that permits authenticated users with the Backup Operator role to modify backup job configurations and execute arbitrary code with system privileges. The vulnerability affects backup software implementations that fail to properly validate backup job modifications; attackers must possess valid Backup Operator credentials but face no additional complexity once authenticated. This vulnerability is not currently listed in CISA's KEV catalog, but the high CVSS score of 7.2 and code execution capability indicate significant risk to organizations managing sensitive backup infrastructure.

RCE Privilege Escalation
NVD
CVSS 3.1
7.2
EPSS
0.1%
CVE-2025-23172 HIGH This Week

CVE-2025-23172 is an authenticated Server-Side Request Forgery (SSRF) vulnerability in Versa Director SD-WAN orchestration platform that allows authenticated users with high privileges to abuse the Webhook feature to send crafted HTTP requests to localhost endpoints. This can be exploited to execute arbitrary commands on behalf of the 'versa' user who holds sudo privileges, resulting in potential remote code execution and privilege escalation. While no active exploitation has been reported in the wild, a proof-of-concept has been publicly disclosed, presenting an elevated risk for organizations running vulnerable Versa Director instances.

RCE Privilege Escalation
NVD
CVSS 3.1
7.2
EPSS
0.6%
CVE-2025-36048 HIGH This Week

Privilege escalation vulnerability in IBM webMethods Integration Server affecting versions 10.5, 10.7, 10.11, and 10.15, where a privileged user can escalate their privileges when the system handles external entities due to unnecessary privilege execution. With a CVSS score of 7.2 and high impact across confidentiality, integrity, and availability, this vulnerability requires administrative credentials to exploit but provides complete system compromise potential. No public confirmation of active exploitation (KEV status) or proof-of-concept availability is evident, making this a moderate-to-high priority based on the barrier to entry (privileged user requirement) despite the severe impact if exploited.

Privilege Escalation IBM Webmethods Integration
NVD
CVSS 3.1
7.2
EPSS
0.2%
CVE-2022-50014 HIGH PATCH This Week

A remote code execution vulnerability (CVSS 7.0). High severity vulnerability requiring prompt remediation. Vendor patch is available.

Linux Privilege Escalation Memory Corruption Linux Kernel Redhat +1
NVD
CVSS 3.1
7.0
EPSS
0.0%
CVE-2022-49961 HIGH PATCH This Week

CVE-2022-49961 is a security vulnerability (CVSS 7.1). High severity vulnerability requiring prompt remediation. Vendor patch is available.

Linux Privilege Escalation Memory Corruption Linux Kernel Redhat +1
NVD
CVSS 3.1
7.1
EPSS
0.0%
CVE-2025-4413 HIGH This Week

The Pixabay Images plugin for WordPress versions up to 3.4 contains an arbitrary file upload vulnerability in the pixabay_upload function due to missing file type validation. Authenticated attackers with Author-level access or higher can upload arbitrary files to the server, potentially enabling remote code execution. This vulnerability has a CVSS score of 8.8 (High) and represents a significant risk to WordPress installations using this plugin.

WordPress RCE PHP Privilege Escalation
NVD
CVSS 3.1
8.8
EPSS
0.5%
CVE-2025-49843 LOW Monitor

conda-smithy is a tool for combining a conda recipe with configurations to build using freely hosted CI services into a single repository. Prior to version 3.47.1, the travis_headers function in the conda-smithy repository creates files with permissions exceeding 0o600, allowing read and write access beyond the intended user/owner. This violates the principle of least privilege, which mandates restricting file permissions to the minimum necessary. An attacker could exploit this to access configuration files in shared hosting environments. This issue has been patched in version 3.47.1.

Privilege Escalation
NVD GitHub
CVSS 4.0
2.7
EPSS
0.1%
CVE-2025-49385 HIGH This Week

Local privilege escalation vulnerability in Trend Micro Security 17.8 (Consumer) that exploits insecure link following to allow a low-privileged local attacker to delete privileged Trend Micro files, potentially compromising the security product's integrity. With a CVSS score of 7.8 and low attack complexity (AC:L), this vulnerability poses a significant risk to consumer systems where privilege escalation could disable or corrupt critical security components. No active exploitation (KEV status) or public POC has been reported at this time, but the low barrier to exploitation (local access with low privileges required) warrants prompt patching.

Privilege Escalation Trendmicro Windows Maximum Security 2022
NVD
CVSS 3.1
7.8
EPSS
0.1%
CVE-2025-49384 HIGH This Week

Local privilege escalation vulnerability in Trend Micro Security 17.8 (Consumer) that exploits improper link following (symlink/junction attack) to allow a low-privileged local attacker to delete privileged Trend Micro system files without user interaction. This vulnerability carries a CVSS 7.8 high severity rating due to high impact on confidentiality, integrity, and availability; however, real-world exploitability depends on KEV status, EPSS probability data, and proof-of-concept availability, which are not provided in the available intelligence.

Privilege Escalation Trendmicro Path Traversal Maximum Security 2022
NVD
CVSS 3.1
7.8
EPSS
0.0%
CVE-2025-30025
EPSS 0% CVSS 7.8
HIGH This Week

CVE-2025-30025 is a local privilege escalation vulnerability in the inter-process communication (IPC) protocol between a server process and its service control mechanism, caused by insecure deserialization (CWE-502). An authenticated local attacker with limited privileges can exploit this flaw to escalate to higher privileges, potentially gaining complete system compromise including confidentiality, integrity, and availability impact. While the CVSS score of 7.8 indicates high severity, the local attack vector and requirement for prior authentication mean this affects primarily multi-user systems or scenarios where an attacker has already gained initial local access.

Privilege Escalation Camera Station Pro Device Manager
NVD
CVE-2025-34097
EPSS 28% 4.1 CVSS 8.6
HIGH POC THREAT Act Now

ProcessMaker BPM platform versions prior to 3.5.4 contain an unrestricted file upload vulnerability in the plugin installation mechanism. An admin can upload a malicious .tar plugin containing arbitrary PHP code that executes during the plugin's install() method, achieving remote code execution on the workflow automation server.

File Upload PHP RCE +1
NVD Exploit-DB
CVE-2025-53503
EPSS 0% CVSS 7.8
HIGH This Week

CVE-2025-53503 is a privilege escalation vulnerability in Trend Micro Cleaner One Pro that allows a local attacker with low privileges to delete critical Trend Micro system files, potentially including the security software itself. The CVSS 7.8 score reflects high impact across confidentiality, integrity, and availability. No public exploit code or active exploitation in the wild has been confirmed at this time, but the vulnerability requires only low privileges and no user interaction, making it a material risk for environments running this product.

Privilege Escalation Trendmicro Cleaner One
NVD
CVE-2025-52837
EPSS 0% CVSS 7.8
HIGH This Week

Trend Micro Password Manager (Consumer) versions 5.8.0.1327 and below contains a privilege escalation vulnerability exploiting symbolic link following and file/folder deletion capabilities. An authenticated local attacker with low privileges can leverage this vulnerability to delete arbitrary files and escalate privileges on the affected system. While no active exploitation in the wild has been publicly confirmed as of this analysis, the local attack vector and straightforward nature of symbolic link exploitation represent meaningful risk to Password Manager users.

Privilege Escalation Password Manager
NVD
CVE-2025-52521
EPSS 0% CVSS 7.8
HIGH This Week

Trend Micro Security 17.8 for consumer platforms contains a local privilege escalation vulnerability via improper symlink handling (CWE-64: Improper Link Resolution Before File Access) that allows a local attacker with limited privileges to delete or modify critical Trend Micro system files without user interaction. The vulnerability affects Trend Micro Security 17.8 specifically and carries a CVSS 3.1 score of 7.8 (High) with local attack vector; KEV status, EPSS score, and active exploitation data are not provided in available sources, limiting real-world risk quantification.

Privilege Escalation Trendmicro Path Traversal +1
NVD
CVE-2025-47812
EPSS 93% 7.8 CVSS 10.0
CRITICAL POC KEV THREAT Emergency

Wing FTP Server before 7.4.4 contains a critical remote code execution vulnerability (CVE-2025-47812, CVSS 10.0) through null byte injection in user/admin web interfaces that enables arbitrary Lua code execution in session files. With EPSS 92.7% and KEV listing, this vulnerability guarantees unauthenticated root/SYSTEM code execution on affected servers, as the FTP service runs with maximum privileges by default.

RCE Code Injection Ftp +3
NVD Exploit-DB
CVE-2025-47811
EPSS 0% CVSS 4.1
MEDIUM POC This Month

In Wing FTP Server through 7.4.4, the administrative web interface (listening by default on port 5466) runs as root or SYSTEM by default. The web application itself offers several legitimate ways to execute arbitrary system commands (i.e., through the web console or the task scheduler), and they are automatically executed in the highest possible privilege context. Because administrative users of the web interface are not necessarily also system administrators, one might argue that this is a privilege escalation. (If a privileged application role is not available to an attacker, CVE-2025-47812 can be leveraged.) NOTE: the vendor reportedly considers this behavior "fine to keep."

Privilege Escalation Wing Ftp Server
NVD
CVE-2025-0141
EPSS 0% CVSS 8.4
HIGH This Week

CVE-2025-0141 is a security vulnerability (CVSS 8.4) that allows a locally authenticated non administrative user. High severity vulnerability requiring prompt remediation.

Microsoft Google Paloalto +6
NVD
CVE-2025-0139
EPSS 0% CVSS 6.3
MEDIUM This Month

CVE-2025-0139 is a security vulnerability (CVSS 6.3) that allows a locally authenticated low privileged user. Remediation should follow standard vulnerability management procedures.

Paloalto Apple Privilege Escalation +1
NVD
CVE-2025-7204
EPSS 0% CVSS 6.5
MEDIUM This Month

In ConnectWise PSA versions older than 2025.9, a vulnerability exists where authenticated users could gain access to sensitive user information. Specific API requests were found to return an overly verbose user object, which included encrypted password hashes for other users. Authenticated users could then retrieve these hashes.  An attacker or privileged user could then use these exposed hashes to conduct offline brute-force or dictionary attacks. Such attacks could lead to credential compromise, allowing unauthorized access to accounts, and potentially privilege escalation within the system.

Privilege Escalation Authentication Bypass Professional Service Automation
NVD
CVE-2025-4606
EPSS 0% CVSS 9.8
CRITICAL Act Now

The Sala - Startup & SaaS WordPress Theme theme for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 1.1.4. This is due to the theme not properly validating a user's identity prior to updating their details like password. This makes it possible for unauthenticated attackers to change arbitrary user's passwords, including administrators, and leverage that to gain access to their account.

WordPress Privilege Escalation PHP
NVD
CVE-2025-6759
EPSS 0% CVSS 7.8
HIGH This Week

Local Privilege escalation allows a low-privileged user to gain SYSTEM privileges in Windows Virtual Delivery Agent for CVAD and Citrix DaaS

Microsoft Citrix Privilege Escalation +2
NVD
CVE-2025-49551
EPSS 0% CVSS 8.8
HIGH This Week

ColdFusion versions 2025.2, 2023.14, 2021.20 and earlier are affected by a Use of Hard-coded Credentials vulnerability that could result in privilege escalation. An attacker could leverage this vulnerability to gain unauthorized access to sensitive systems or data. Exploitation of this issue does not require user interaction. The vulnerable component is restricted to internal IP addresses.

Privilege Escalation Authentication Bypass Coldfusion
NVD
CVE-2025-43019
EPSS 0% CVSS 7.8
HIGH This Week

A potential security vulnerability has been identified in the HP Support Assistant, which allows a local attacker to escalate privileges via an arbitrary file deletion.

Privilege Escalation Support Assistant
NVD
CVE-2025-47422
EPSS 0% CVSS 7.5
HIGH This Week

Advanced Installer before 22.6 has an uncontrolled search path element local privilege escalation vulnerability. When running as SYSTEM in certain configurations, Advanced Installer looks in standard-user writable locations for non-existent binaries and executes them as SYSTEM. A low-privileged attacker can place a malicious binary in a targeted folder; when the installer is executed, the attacker achieves arbitrary SYSTEM code execution.

RCE Privilege Escalation
NVD
CVE-2025-41665
EPSS 0% CVSS 6.5
MEDIUM This Month

An low privileged remote attacker can enforce the watchdog of the affected devices to reboot the PLC due to incorrect default permissions of a config file.

Privilege Escalation
NVD
CVE-2025-25269
EPSS 0% CVSS 8.4
HIGH This Week

An unauthenticated local attacker can inject a command that is subsequently executed as root, leading to a privilege escalation.

Command Injection Privilege Escalation Charx Sec 3000 Firmware +3
NVD
CVE-2025-24006
EPSS 0% CVSS 7.8
HIGH This Week

A low privileged local attacker can leverage insecure permissions via SSH on the affected devices to escalate privileges to root.

Privilege Escalation Charx Sec 3000 Firmware Charx Sec 3150 Firmware +2
NVD
CVE-2025-24005
EPSS 0% CVSS 7.8
HIGH This Week

A local attacker with a local user account can leverage a vulnerable script via SSH to escalate privileges to root due to improper input validation.

Privilege Escalation Charx Sec 3000 Firmware Charx Sec 3150 Firmware +2
NVD
CVE-2025-20684
EPSS 0% CVSS 9.8
CRITICAL Act Now

In wlan AP driver, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00416939; Issue ID: MSV-3422.

Buffer Overflow Memory Corruption Privilege Escalation +1
NVD
CVE-2025-20683
EPSS 0% CVSS 9.8
CRITICAL Act Now

In wlan AP driver, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00416938; Issue ID: MSV-3444.

Buffer Overflow Memory Corruption Privilege Escalation +2
NVD
CVE-2025-20682
EPSS 0% CVSS 9.8
CRITICAL Act Now

In wlan AP driver, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00416937; Issue ID: MSV-3445.

Buffer Overflow Memory Corruption Privilege Escalation +2
NVD
CVE-2025-20681
EPSS 0% CVSS 9.8
CRITICAL Act Now

In wlan AP driver, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00416936; Issue ID: MSV-3446.

Buffer Overflow Memory Corruption Privilege Escalation +2
NVD
CVE-2025-20680
EPSS 0% CVSS 9.8
CRITICAL Act Now

In Bluetooth driver, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00418044; Issue ID: MSV-3482.

Heap Overflow Buffer Overflow Privilege Escalation +1
NVD
CVE-2025-43001
EPSS 0% CVSS 6.9
MEDIUM This Month

SAPCAR allows an attacker logged in with high privileges to override the permissions of the current and parent directories of the user or process extracting the archive, leading to privilege escalation. On successful exploitation, an attacker could modify the critical files by tampering with signed archives without breaking the signature, but it has a low impact on the confidentiality and availability of the system.

Privilege Escalation
NVD
CVE-2025-42992
EPSS 0% CVSS 6.9
MEDIUM This Month

SAPCAR allows an attacker logged in with high privileges to create a malicious SAR archive in SAPCAR. This could enable the attacker to exploit critical files and directory permissions without breaking signature validation, resulting in potential privilege escalation. This has high impact on integrity, but low impact on confidentiality and availability of the system.

Privilege Escalation
NVD
CVE-2025-1351
EPSS 0% CVSS 6.7
MEDIUM This Month

IBM Storage Virtualize 8.5, 8.6, and 8.7 products could allow a user to escalate their privileges to that of another user logging in at the same time due to a race condition in the login function.

Race Condition Privilege Escalation IBM +1
NVD
CVE-2025-53186
EPSS 0% CVSS 5.9
MEDIUM This Month

Vulnerability that allows third-party call apps to send broadcasts without verification in the audio framework module Impact: Successful exploitation of this vulnerability may affect availability.

Privilege Escalation Harmonyos Emui
NVD
CVE-2025-53178
EPSS 0% CVSS 4.8
MEDIUM This Month

Permission bypass vulnerability in the calendar storage module Impact: Successful exploitation of this vulnerability may affect the schedule reminder function of head units.

Privilege Escalation Emui Harmonyos
NVD
CVE-2025-53177
EPSS 0% CVSS 3.9
LOW Monitor

Permission bypass vulnerability in the calendar storage module Impact: Successful exploitation of this vulnerability may affect the schedule syncing function of watches.

Privilege Escalation
NVD
CVE-2025-26850
EPSS 0% CVSS 9.3
CRITICAL Act Now

The agent in Quest KACE Systems Management Appliance (SMA) before 14.0.97 and 14.1.x before 14.1.19 potentially allows privilege escalation on managed systems.

Privilege Escalation Authentication Bypass
NVD
CVE-2025-49867
EPSS 0% CVSS 9.8
CRITICAL Act Now

Incorrect Privilege Assignment vulnerability in InspiryThemes RealHomes allows Privilege Escalation. This issue affects RealHomes: from n/a through 4.4.0.

Privilege Escalation
NVD
CVE-2025-28983
EPSS 0% CVSS 9.8
CRITICAL Act Now

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in ClickandPledge Click & Pledge Connect allows Privilege Escalation. This issue affects Click & Pledge Connect: from 25.04010101 through WP6.8.

Privilege Escalation SQLi
NVD
CVE-2025-23970
EPSS 0% CVSS 9.8
CRITICAL Act Now

Incorrect Privilege Assignment vulnerability in aonetheme Service Finder Booking allows Privilege Escalation. This issue affects Service Finder Booking: from n/a through 6.0.

Privilege Escalation
NVD
CVE-2025-5953
EPSS 0% CVSS 8.8
HIGH This Week

The WP Human Resource Management plugin for WordPress is vulnerable to Privilege Escalation due to missing authorization in the ajax_insert_employee() and update_empoyee() functions in versions 2.0.0 through 2.2.17. The AJAX handler reads the client-supplied $_POST['role'] and, after basic cleaning via hrm_clean(), passes it directly to wp_insert_user() and later to $user->set_role() without verifying that the current user is allowed to assign that role. This makes it possible for authenticated attackers, with Employee-level access and above, to elevate their privileges to administrator.

WordPress Privilege Escalation Authentication Bypass +2
NVD
CVE-2025-43713
EPSS 0% CVSS 6.5
MEDIUM This Month

ASNA Assist and ASNA Registrar before 2025-03-31 allow deserialization attacks against .NET remoting. These are Windows system services that support license key management and deprecated Windows network authentication. The services are implemented with .NET remoting and can be exploited via well-known deserialization techniques inherent in the technology. Because the services run with SYSTEM-level rights, exploits can be crafted to achieve escalation of privilege and arbitrary code execution. This affects DataGate for SQL Server 17.0.36.0 and 16.0.89.0, DataGate Component Suite 17.0.36.0 and 16.0.89.0, DataGate Monitor 17.0.26.0 and 16.0.65.0, DataGate WebPak 17.0.37.0 and 16.0.90.0, Monarch for .NET 11.4.50.0 and 10.0.62.0, Encore RPG 4.1.36.0, Visual RPG .NET FW 17.0.37.0 and 16.0.90.0, Visual RPG .NET FW Windows Deployment 17.0.36.0 and 16.0.89.0, WingsRPG 11.0.38.0 and 10.0.95.0, Mobile RPG 11.0.35.0 and 10.0.94.0, Monarch Framework for .NET FW 11.0.36.0 and 10.0.89.0, Browser Terminal 17.0.37.0 and 16.0.90.0, Visual RPG Classic 5.2.7.0 and 5.1.17.0, Visual RPG Deployment 5.2.7.0 and 5.1.17.0, and DataGate Studio 17.0.38.0 and 16.0.104.0.

Deserialization RCE Microsoft +2
NVD
CVE-2025-34078
EPSS 2% CVSS 7.8
HIGH POC This Week

A local privilege escalation vulnerability exists in NSClient++ 0.5.2.35 when both the web interface and ExternalScripts features are enabled. The configuration file (nsclient.ini) stores the administrative password in plaintext and is readable by local users. By extracting this password, an attacker can authenticate to the NSClient++ web interface (typically accessible on port 8443) and abuse the ExternalScripts plugin to inject and execute arbitrary commands as SYSTEM by registering a custom script, saving the configuration, and triggering it via the API. This behavior is documented but insecure, as the plaintext credential exposure undermines access isolation between local users and administrative functions.

Privilege Escalation
NVD Exploit-DB
CVE-2025-6943
EPSS 0% CVSS 3.8
LOW Monitor

Secret Server version 11.7 and earlier is vulnerable to a SQL report creation vulnerability that allows an administrator to gain access to restricted tables.

Privilege Escalation
NVD
CVE-2025-24331
EPSS 0% CVSS 6.4
MEDIUM This Month

A security vulnerability in capabilities (CVSS 6.4). Remediation should follow standard vulnerability management procedures.

Privilege Escalation
NVD
CVE-2025-36630
EPSS 0% CVSS 8.4
HIGH This Week

In Tenable Nessus versions prior to 10.8.5 on a Windows host, it was found that a non-administrative user could overwrite arbitrary local system files with log content at SYSTEM privilege.

Microsoft Privilege Escalation Nessus +1
NVD
CVE-2025-6934
EPSS 24% CVSS 9.8
CRITICAL Act Now

The Opal Estate Pro - Property Management and Submission plugin for WordPress, used by the FullHouse - Real Estate Responsive WordPress Theme, is vulnerable to privilege escalation via in all versions up to, and including, 1.7.5. This is due to a lack of role restriction during registration in the 'on_regiser_user' function. This makes it possible for unauthenticated attackers to arbitrarily choose the role, including the Administrator role, assigned when registering.

WordPress Privilege Escalation PHP
NVD
CVE-2025-46014
EPSS 0% CVSS 8.8
HIGH POC This Week

Several services in Honor Device Co., Ltd Honor PC Manager v16.0.0.118 was discovered to connect services to the named pipe iMateBookAssistant with default or overly permissive security attributes, leading to a privilege escalation.

Privilege Escalation Pc Manager
NVD GitHub
CVE-2025-24289
EPSS 0% CVSS 7.5
HIGH This Week

A Cross-Site Request Forgery (CSRF) leading to Cross-Site Scripting (XSS) vulnerability in the UCRM Client Signup Plugin (v1.3.4 and earlier) could allow privilege escalation if an Administrator is tricked into visiting a crafted malicious page. The plugin is disabled by default.

XSS CSRF Privilege Escalation
NVD
CVE-2025-5304
EPSS 0% CVSS 9.8
CRITICAL Act Now

The PT Project Notebooks plugin for WordPress is vulnerable to Privilege Escalation due to missing authorization in the wpnb_pto_new_users_add() function in versions 1.0.0 through 1.1.3. This makes it possible for unauthenticated attackers to elevate their privileges to that of an administrator.

WordPress Privilege Escalation Authentication Bypass +2
NVD
CVE-2025-52991
EPSS 0% CVSS 3.2
LOW PATCH Monitor

The Nix, Lix, and Guix package managers default to using temporary build directories in a world-readable and world-writable location. This allows standard users to deceive the package manager into using directories with pre-existing content, potentially leading to unauthorized actions or data manipulation. This affects Nix before 2.24.15, 2.26.4, 2.28.4, and 2.29.1; Lix before 2.91.2, 2.92.2, and 2.93.1; and Guix before 1.4.0-38.0e79d5b.

Privilege Escalation Ubuntu Debian
NVD
CVE-2025-52726
EPSS 0% CVSS 8.6
HIGH This Week

Incorrect Privilege Assignment vulnerability in pebas CouponXxL Custom Post Types allows Privilege Escalation. This issue affects CouponXxL Custom Post Types: from n/a through 3.0.

Privilege Escalation
NVD
CVE-2025-32281
EPSS 0% CVSS 9.8
CRITICAL Act Now

Missing Authorization vulnerability in FocuxTheme WPKit For Elementor allows Privilege Escalation. This issue affects WPKit For Elementor: from n/a through 1.1.0.

Privilege Escalation Authentication Bypass
NVD
CVE-2024-12827
EPSS 0% CVSS 9.8
CRITICAL Act Now

The DWT - Directory & Listing WordPress Theme theme for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 3.3.6. This is due to the plugin not properly checking for an empty token value prior to resetting a user's password through the dwt_listing_reset_password() function. This makes it possible for unauthenticated attackers to change arbitrary user's passwords, including administrators, and leverage that to gain access to their account.

WordPress Privilege Escalation
NVD
CVE-2025-45737
EPSS 0% CVSS 6.5
MEDIUM POC This Month

An issue in NetEase (Hangzhou) Network Co., Ltd NeacSafe64 Driver before v1.0.0.8 allows attackers to escalate privileges via sending crafted IOCTL commands to the NeacSafe64.sys component.

Privilege Escalation Neacsafe64
NVD GitHub
CVE-2025-52555
EPSS 0% CVSS 6.5
MEDIUM PATCH This Month

Ceph is a distributed object, block, and file storage platform. In versions 17.2.7, 18.2.1 through 18.2.4, and 19.0.0 through 19.2.2, an unprivileged user can escalate to root privileges in a ceph-fuse mounted CephFS by chmod 777 a directory owned by root to gain access. The result of this is that a user could read, write and execute to any directory owned by root as long as they chmod 777 it. This impacts confidentiality, integrity, and availability. It is patched in versions 17.2.8, 18.2.5, and 19.2.3.

Privilege Escalation Ubuntu Debian +2
NVD GitHub
CVE-2014-7210
EPSS 0% CVSS 9.8
CRITICAL PATCH Act Now

pdns specific as packaged in Debian in version before 3.3.1-1 creates a too privileged MySQL user. It was discovered that the maintainer scripts of pdns-backend-mysql grant too wide database permissions for the pdns user. Other backends are not affected.

Debian Privilege Escalation Ubuntu +2
NVD
CVE-2025-5995
EPSS 0% CVSS 4.6
MEDIUM This Month

Canon EOS Webcam Utility Pro for MAC OS version 2.3d (2.3.29) and earlier contains an improper directory permissions vulnerability. Exploitation of this vulnerability requires administrator access by a malicious user. An attacker could modify the directory, potentially resulting in code execution and ultimately leading to privilege escalation.

Privilege Escalation macOS
NVD
CVE-2025-52900
EPSS 0% CVSS 5.5
MEDIUM POC PATCH This Month

File Browser provides a file managing interface within a specified directory and it can be used to upload, delete, preview, rename and edit files. The file access permissions for files uploaded to or created from File Browser are never explicitly set by the application. The same is true for the database used by File Browser. On standard servers using File Browser prior to version 2.33.7 where the umask configuration has not been hardened before, this makes all the stated files readable by any operating system account. Version 2.33.7 fixes the issue.

Privilege Escalation Filebrowser Suse
NVD GitHub
CVE-2025-37101
EPSS 0% CVSS 8.7
HIGH This Week

A potential security vulnerability has been identified in HPE OneView for VMware vCenter (OV4VC). This vulnerability could be exploited allowing an attacker with read only privilege to cause Vertical Privilege Escalation (operator can perform admin actions).

VMware Privilege Escalation
NVD
CVE-2025-4334
EPSS 29% CVSS 9.8
CRITICAL Act Now

The Simple User Registration plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 6.3. This is due to insufficient restrictions on user meta values that can be supplied during registration. This makes it possible for unauthenticated attackers to register as an administrator.

WordPress Privilege Escalation
NVD
CVE-2025-5834
EPSS 0% CVSS 7.8
HIGH This Week

CVE-2025-5834 is a local privilege escalation vulnerability in Pioneer DMH-WT7600NEX infotainment systems caused by a missing hardware root of trust in the SoC configuration. An attacker with local access and valid authentication credentials can bypass the existing authentication mechanism and execute arbitrary code during boot with elevated privileges. The vulnerability has a CVSS score of 7.8 (High) and was previously tracked as ZDI-CAN-26078; exploitation likelihood and active exploitation status depend on public POC availability and EPSS scoring.

RCE Privilege Escalation Dmh Wt7600nex Firmware
NVD
CVE-2025-5822
EPSS 0% CVSS 8.8
HIGH This Week

CVE-2025-5822 is a privilege escalation vulnerability in the Autel MaxiCharger AC Wallbox Commercial Technician API that allows authenticated attackers to escalate from low-privileged users to higher privilege levels, potentially gaining unauthorized access to administrative functions and sensitive charging station data. The vulnerability requires an attacker to first obtain a valid low-privileged API token, after which they can bypass authorization controls to access restricted resources. With a CVSS score of 8.8 and network-accessible attack vector, this represents a significant risk to commercial EV charging infrastructure.

Privilege Escalation Maxicharger Ac Ultra Firmware Maxicharger Single Charger Firmware +7
NVD
CVE-2025-52890
EPSS 0% CVSS 8.1
HIGH PATCH This Week

CVE-2025-52890 is a network-layer security bypass in Incus 6.12 and 6.13 where improper nftables rule generation on bridge-connected ACL devices allows attackers to circumvent MAC filtering, IPv4 filtering, and IPv6 filtering security controls. This enables ARP spoofing and full VM/container impersonation on the same bridge. The vulnerability requires administrative privilege and local network access but results in high confidentiality and availability impact across the container/VM infrastructure.

Authentication Bypass Linux Privilege Escalation +1
NVD GitHub
CVE-2025-20282
EPSS 0% CVSS 10.0
CRITICAL Act Now

CVE-2025-20282 is a critical remote code execution vulnerability in Cisco ISE and ISE-PIC that allows unauthenticated attackers to upload arbitrary files to privileged directories and execute them as root via an internal API lacking file validation. This is a CVSS 10.0 vulnerability with complete system compromise impact; organizations running affected Cisco ISE deployments face immediate risk of total infrastructure takeover without authentication requirements or user interaction.

RCE Cisco Privilege Escalation +3
NVD
CVE-2025-20281
EPSS 30% 5.9 CVSS 10.0
CRITICAL POC KEV THREAT Emergency

Cisco ISE and ISE-PIC contain a critical input injection vulnerability (CVE-2025-20281, CVSS 10.0) that allows unauthenticated remote attackers to execute arbitrary code as root on the underlying operating system. With EPSS 30.4% and KEV listing, this vulnerability targets the network access control platform that governs who and what can access the enterprise network — compromising ISE means controlling network admission for the entire organization.

RCE Cisco Privilege Escalation +3
NVD
CVE-2025-49797
EPSS 0% CVSS 7.8
HIGH This Week

CVE-2025-49797 is a privilege escalation vulnerability in multiple Brother device driver installers for Windows that allows a local attacker with limited user privileges to execute arbitrary code with administrative rights without user interaction. The vulnerability affects various Brother printer and multifunction device driver packages across multiple versions. While the CVSS score of 7.8 indicates significant severity, real-world exploitability depends on whether an attacker has local access to a system during driver installation or can manipulate installer processes.

Microsoft Privilege Escalation Windows
NVD
CVE-2025-36004
EPSS 0% CVSS 8.8
HIGH This Week

CVE-2025-36004 is a privilege escalation vulnerability in IBM Facsimile Support for i affecting IBM i 7.2, 7.3, 7.4, and 7.5. The vulnerability stems from an unqualified library call that allows authenticated users to execute arbitrary code with administrator privileges. With a CVSS score of 8.8 and network accessibility, this represents a critical privilege escalation risk for organizations running affected IBM i systems.

IBM Privilege Escalation RCE
NVD
CVE-2025-32976
EPSS 0% CVSS 8.8
HIGH This Week

CVE-2025-32976 is a security vulnerability (CVSS 8.8) that allows authenticated users. High severity vulnerability requiring prompt remediation.

Authentication Bypass Privilege Escalation
NVD
CVE-2025-39201
EPSS 0% CVSS 6.1
MEDIUM This Month

A vulnerability exists in MicroSCADA X SYS600 product. If exploited this could allow a local unauthenticated attacker to tamper a system file, making denial of Notify service.

Privilege Escalation Microscada X Sys600
NVD
CVE-2025-48470
EPSS 0% CVSS 4.1
MEDIUM This Month

Successful exploitation of the stored cross-site scripting vulnerability could allow an attacker to inject malicious scripts into device fields and executed in other users’ browser, potentially leading to session hijacking, defacement, credential theft, or privilege escalation.

XSS Privilege Escalation Wise 4060lan Firmware +2
NVD
CVE-2025-48469
EPSS 0% CVSS 9.6
CRITICAL POC Act Now

A privilege escalation vulnerability (CVSS 9.6) that allows an unauthenticated attacker. Risk factors: public PoC available.

Privilege Escalation Authentication Bypass RCE +3
NVD
CVE-2025-49144
EPSS 0% CVSS 7.3
HIGH This Week

CVE-2025-49144 is a privilege escalation vulnerability in Notepad++ v8.8.1 and earlier that exploits insecure executable search paths in the installer to allow unprivileged local users to execute arbitrary code with SYSTEM privileges. An attacker can leverage social engineering to colocate a malicious executable with the legitimate installer in a writable directory (e.g., Downloads), and upon installer execution, the malicious payload runs with elevated privileges. The vulnerability is fixed in version 8.8.2.

Privilege Escalation
NVD GitHub
CVE-2023-47031
EPSS 0% CVSS 9.8
CRITICAL Act Now

CVE-2023-47031 is a critical privilege escalation vulnerability in NCR Terminal Handler v1.5.1 that allows unauthenticated remote attackers to gain administrative privileges by crafting malicious POST requests to SOAP API endpoints (grantRolesToUsers, grantRolesToGroups, grantRolesToOrganization). With a CVSS score of 9.8 and attack vector requiring no authentication or user interaction, this vulnerability poses an immediate threat to exposed NCR Terminal Handler installations. The vulnerability has been confirmed with public disclosure and is listed in CISA's Known Exploited Vulnerabilities catalog, indicating active exploitation in the wild.

Privilege Escalation Terminal Handler
NVD
CVE-2025-4563
EPSS 0% CVSS 2.7
LOW PATCH Monitor

A vulnerability exists in the NodeRestriction admission controller where nodes can bypass dynamic resource allocation authorization checks. When the DynamicResourceAllocation feature gate is enabled, the controller properly validates resource claim statuses during pod status updates but fails to perform equivalent validation during pod creation. This allows a compromised node to create mirror pods that access unauthorized dynamic resources, potentially leading to privilege escalation.

Privilege Escalation Ubuntu Debian
NVD GitHub
CVE-2023-50450
EPSS 0% CVSS 8.4
HIGH This Week

A privilege escalation vulnerability in Sensopart VISOR Vision Sensors (CVSS 8.4) that allows local users. High severity vulnerability requiring prompt remediation.

Privilege Escalation Visor Vision Sensors Firmware
NVD
CVE-2025-6513
EPSS 0% CVSS 9.3
CRITICAL Act Now

CVE-2025-6513 is a local privilege escalation vulnerability in the BRAIN2 application where standard Windows users can access and decrypt the application's database configuration file without authentication. This allows unprivileged local users to obtain database credentials and potentially compromise sensitive data, with a CVSS score of 9.3 indicating critical severity. The vulnerability affects system confidentiality, integrity, and availability across trust boundaries.

Microsoft Information Disclosure Windows +1
NVD
CVE-2025-6512
EPSS 0% CVSS 10.0
CRITICAL Act Now

CVE-2025-6512 is a critical privilege escalation vulnerability in BRAIN2 where unauthenticated attackers can inject malicious scripts into reports on non-admin client systems, which are then executed with administrator privileges on the BRAIN2 server. This represents a complete system compromise with CVSS 10.0 severity, affecting all users regardless of their local privilege level. No authentication is required to exploit this vulnerability, making it immediately exploitable in network environments.

RCE Code Injection Privilege Escalation
NVD
CVE-2025-5121
EPSS 0% CVSS 8.5
HIGH PATCH This Week

GitLab CE/EE contains a missing authorization check (CWE-862) in its compliance frameworks feature that allows authenticated users with limited privileges to apply compliance frameworks to projects outside the intended scope of the framework's group, potentially affecting confidentiality, integrity, and availability. This vulnerability affects GitLab versions 17.11 before 17.11.4 and 18.0 before 18.0.2. The CVSS 8.5 score reflects high severity due to the scope change and multiple impact categories, though exploitation requires low-level user authentication and higher-than-typical attack complexity.

Gitlab Privilege Escalation
NVD
CVE-2025-52825
EPSS 0% CVSS 8.8
HIGH This Week

A privilege escalation vulnerability in Rameez Iqbal Real Estate Manager allows Privilege Escalation (CVSS 8.8). High severity vulnerability requiring prompt remediation.

CSRF Privilege Escalation
NVD
CVE-2025-4102
EPSS 1% CVSS 7.2
HIGH This Week

The Beaver Builder Plugin (Starter Version) for WordPress contains an arbitrary file upload vulnerability in the 'save_enabled_icons' function due to missing file type validation, affecting all versions up to and including 2.9.1. Authenticated attackers with Administrator-level access can upload arbitrary files to the server, potentially enabling remote code execution. The vulnerability was only partially patched in version 2.9.1, indicating residual risk in the latest release.

WordPress RCE PHP +2
NVD
CVE-2025-5963
EPSS 0% CVSS 4.8
MEDIUM This Month

The Postbox's configuration on macOS, specifically the presence of entitlements: "com.apple.security.cs.allow-dyld-environment-variables" and "com.apple.security.cs.disable-library-validation" allows for Dynamic Library (Dylib) injection. A local attacker with unprivileged access can use environment variables like DYLD_INSERT_LIBRARIES to successfully inject code in application's context and bypass Transparency, Consent, and Control (TCC). Acquired resource access is limited to previously granted permissions by the user. Access to other resources beyond granted-permissions requires user interaction with a system prompt asking for permission. The original company behind Postbox is no longer operational, the software will no longer receive updates. The acquiring company (em Client) did not cooperate in vulnerability disclosure.

Apple Privilege Escalation macOS
NVD
CVE-2025-5255
EPSS 0% CVSS 4.8
MEDIUM This Month

The Phoenix Code's configuration on macOS, specifically the presence of entitlements: "com.apple.security.cs.allow-dyld-environment-variables" and "com.apple.security.cs.disable-library-validation" allows for Dynamic Library (Dylib) injection. A local attacker with unprivileged access can use environment variables like DYLD_INSERT_LIBRARIES to successfully inject code in application's context and bypass Transparency, Consent, and Control (TCC). Acquired resource access is limited to previously granted permissions by the user. Access to other resources beyond granted-permissions requires user interaction with a system prompt asking for permission. This issue was fixed in commit 0c75fb57f89d0b7d9b180026bc2624b7dcf807da

Apple Privilege Escalation macOS
NVD GitHub
CVE-2025-6264
EPSS 0% CVSS 5.5
MEDIUM POC PATCH This Month

Velociraptor allows collection of VQL queries packaged into Artifacts from endpoints. These artifacts can be used to do anything and usually run with elevated permissions.  To limit access to some dangerous artifact, Velociraptor allows for those to require high permissions like EXECVE to launch. The Admin.Client.UpdateClientConfig is an artifact used to update the client's configuration. This artifact did not enforce an additional required permission, allowing users with COLLECT_CLIENT permissions (normally given by the "Investigator" role) to collect it from endpoints and update the configuration. This can lead to arbitrary command execution and endpoint takeover. To successfully exploit this vulnerability the user must already have access to collect artifacts from the endpoint (i.e. have the COLLECT_CLIENT given typically by the "Investigator' role).

Privilege Escalation Velociraptor Suse
NVD GitHub
CVE-2025-33117
EPSS 0% CVSS 9.1
CRITICAL Act Now

IBM QRadar SIEM versions 7.5 through 7.5.0 Update Package 12 contains a privilege escalation vulnerability that allows authenticated administrative users to modify configuration files and upload malicious autoupdate packages, leading to arbitrary command execution with system-level privileges. This is a high-severity vulnerability (CVSS 9.1) affecting SIEM infrastructure; while it requires high privileges (PR:H), the network-accessible attack vector (AV:N) and lack of user interaction (UI:N) make it a significant risk in multi-user enterprise environments where administrative credentials may be compromised or misused.

IBM Privilege Escalation RCE +1
NVD
CVE-2025-6019
EPSS 0% CVSS 7.0
HIGH PATCH This Week

Local privilege escalation vulnerability in libblockdev that allows an unprivileged user with Polkit 'allow_active' permissions to escalate to root privileges by crafting a malicious XFS filesystem image and exploiting udisks' mounting behavior. The vulnerability affects users with active session permissions on systems running vulnerable libblockdev versions, enabling complete system compromise through execution of SUID-root binaries embedded in specially crafted disk images. While carrying a moderate CVSS score of 7.0, the attack requires local access and user interaction with filesystem resizing operations, limiting real-world exploitation scope.

Privilege Escalation Redhat Suse
NVD
CVE-2025-5071
EPSS 0% CVSS 8.8
HIGH PATCH This Week

The AI Engine WordPress plugin (versions 2.8.0-2.8.3) contains a missing capability check in the 'Meow_MWAI_Labs_MCP::can_access_mcp' function, allowing authenticated subscribers and above to access the Model Context Protocol (MCP) interface and execute arbitrary WordPress administrative commands. This enables privilege escalation, unauthorized user creation/modification, and data destruction through post and comment manipulation. The vulnerability has a CVSS score of 8.8 (High) and poses immediate risk to any WordPress installation running affected versions with user registration enabled.

WordPress Privilege Escalation PHP +1
NVD
CVE-2025-24286
EPSS 0% CVSS 7.2
HIGH PATCH This Week

Privilege escalation vulnerability in backup management systems that permits authenticated users with the Backup Operator role to modify backup job configurations and execute arbitrary code with system privileges. The vulnerability affects backup software implementations that fail to properly validate backup job modifications; attackers must possess valid Backup Operator credentials but face no additional complexity once authenticated. This vulnerability is not currently listed in CISA's KEV catalog, but the high CVSS score of 7.2 and code execution capability indicate significant risk to organizations managing sensitive backup infrastructure.

RCE Privilege Escalation
NVD
CVE-2025-23172
EPSS 1% CVSS 7.2
HIGH This Week

CVE-2025-23172 is an authenticated Server-Side Request Forgery (SSRF) vulnerability in Versa Director SD-WAN orchestration platform that allows authenticated users with high privileges to abuse the Webhook feature to send crafted HTTP requests to localhost endpoints. This can be exploited to execute arbitrary commands on behalf of the 'versa' user who holds sudo privileges, resulting in potential remote code execution and privilege escalation. While no active exploitation has been reported in the wild, a proof-of-concept has been publicly disclosed, presenting an elevated risk for organizations running vulnerable Versa Director instances.

RCE Privilege Escalation
NVD
CVE-2025-36048
EPSS 0% CVSS 7.2
HIGH This Week

Privilege escalation vulnerability in IBM webMethods Integration Server affecting versions 10.5, 10.7, 10.11, and 10.15, where a privileged user can escalate their privileges when the system handles external entities due to unnecessary privilege execution. With a CVSS score of 7.2 and high impact across confidentiality, integrity, and availability, this vulnerability requires administrative credentials to exploit but provides complete system compromise potential. No public confirmation of active exploitation (KEV status) or proof-of-concept availability is evident, making this a moderate-to-high priority based on the barrier to entry (privileged user requirement) despite the severe impact if exploited.

Privilege Escalation IBM Webmethods Integration
NVD
CVE-2022-50014
EPSS 0% CVSS 7.0
HIGH PATCH This Week

A remote code execution vulnerability (CVSS 7.0). High severity vulnerability requiring prompt remediation. Vendor patch is available.

Linux Privilege Escalation Memory Corruption +3
NVD
CVE-2022-49961
EPSS 0% CVSS 7.1
HIGH PATCH This Week

CVE-2022-49961 is a security vulnerability (CVSS 7.1). High severity vulnerability requiring prompt remediation. Vendor patch is available.

Linux Privilege Escalation Memory Corruption +3
NVD
CVE-2025-4413
EPSS 1% CVSS 8.8
HIGH This Week

The Pixabay Images plugin for WordPress versions up to 3.4 contains an arbitrary file upload vulnerability in the pixabay_upload function due to missing file type validation. Authenticated attackers with Author-level access or higher can upload arbitrary files to the server, potentially enabling remote code execution. This vulnerability has a CVSS score of 8.8 (High) and represents a significant risk to WordPress installations using this plugin.

WordPress RCE PHP +1
NVD
CVE-2025-49843
EPSS 0% CVSS 2.7
LOW Monitor

conda-smithy is a tool for combining a conda recipe with configurations to build using freely hosted CI services into a single repository. Prior to version 3.47.1, the travis_headers function in the conda-smithy repository creates files with permissions exceeding 0o600, allowing read and write access beyond the intended user/owner. This violates the principle of least privilege, which mandates restricting file permissions to the minimum necessary. An attacker could exploit this to access configuration files in shared hosting environments. This issue has been patched in version 3.47.1.

Privilege Escalation
NVD GitHub
CVE-2025-49385
EPSS 0% CVSS 7.8
HIGH This Week

Local privilege escalation vulnerability in Trend Micro Security 17.8 (Consumer) that exploits insecure link following to allow a low-privileged local attacker to delete privileged Trend Micro files, potentially compromising the security product's integrity. With a CVSS score of 7.8 and low attack complexity (AC:L), this vulnerability poses a significant risk to consumer systems where privilege escalation could disable or corrupt critical security components. No active exploitation (KEV status) or public POC has been reported at this time, but the low barrier to exploitation (local access with low privileges required) warrants prompt patching.

Privilege Escalation Trendmicro Windows +1
NVD
CVE-2025-49384
EPSS 0% CVSS 7.8
HIGH This Week

Local privilege escalation vulnerability in Trend Micro Security 17.8 (Consumer) that exploits improper link following (symlink/junction attack) to allow a low-privileged local attacker to delete privileged Trend Micro system files without user interaction. This vulnerability carries a CVSS 7.8 high severity rating due to high impact on confidentiality, integrity, and availability; however, real-world exploitability depends on KEV status, EPSS probability data, and proof-of-concept availability, which are not provided in the available intelligence.

Privilege Escalation Trendmicro Path Traversal +1
NVD
Prev Page 17 of 27 Next

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy