In BuddyBoss Platform Pro plugin for WordPress versions up to and including 2.7.01 a critical severity vulnerability CVE-2025-1909 was detected. This vulnerability allows unauthenticated attackers to bypass authentication and log in as any existing user, including administrators, if they have access to the user’s email address, due to insufficient verification during the Apple OAuth authentication process. To address this issue, users should upgrade BuddyBoss Platform Pro plugin to versions 2.7.10 or later. For more details, visit https://nvd.nist.gov/vuln/detail/CVE-2025-1909.
Read more CMSIn Login Lockdown & Protection plugin for WordPress versions up to and including 2.11 a medium severity vulnerability CVE-2025-3766 was detected. This vulnerability allows authenticated users with Subscriber-level access or higher to obtain a valid nonce via the ajax_run_tool function, enabling them to generate a global unlock key and add IPs to the allowlist—exploitable only on new installs where the loginlockdown page has not been visited by an admin. To address this issue, users should upgrade Login Lockdown & Protection plugin to versions 2.12 or later. For more details, visit https://nvd.nist.gov/vuln/detail/CVE-2025-3766.
Read more CMSIn Frontend Dashboard Plugin for WordPress versions 1.0 to 2.2.6 a critical severity vulnerability CVE-2025-4104 was detected. This vulnerability allows unauthenticated attackers to reset the administrator’s email and password and escalate privileges to administrator due to a missing capability check in the fed_wp_ajax_fed_login_form_post() function. To address this issue, users should upgrade Frontend Dashboard Plugin to versions 2.2.7 or later. For more details, visit https://nvd.nist.gov/vuln/detail/CVE-2025-4104.
Read more CMSIn WP SEO Structured Data Schema plugin for WordPress versions up to and including 2.7.11 a medium severity vulnerability CVE-2025-4127 was detected. This vulnerability allows authenticated attackers with Contributor-level access and above to inject arbitrary web scripts via the ‘Price Range’ parameter, which execute when an administrator accesses the plugin settings page, due to insufficient input sanitization and output escaping. To address this issue, users should upgrade WP SEO Structured Data Schema plugin to versions 2.8.0 or later. For more details, visit https://nvd.nist.gov/vuln/detail/CVE-2025-4127.
Read more CMSIn Django versions 4.2 before 4.2.21, 5.1 before 5.1.9 and 5.2 before 5.2.1 a medium severity vulnerability CVE-2025-32873 was detected. This vulnerability allows attackers to cause a denial-of-service condition through slow performance by supplying large sequences of incomplete HTML tags to the `strip_tags()` function or the `striptags` template filter. To address this issue, users should upgrade Django to versions 4.2.21, 5.1.9 or 5.2.1. For more details, visit https://nvd.nist.gov/vuln/detail/CVE-2025-32873.
Read more Application DevelopmentIn Logstash versions prior to 8.17.6, 8.18.0 and 9.0.0 a medium severity vulnerability CVE-2025-37730 was detected. This vulnerability allows attackers to perform man-in-the-middle (MitM) attacks in “client” mode due to improper certificate validation – specifically, the lack of hostname verification when `ssl_verification_mode => full` was set in the TCP output configuration. To address this issue, users should upgrade Logstash to versions 8.17.6, 8.18.1 or 9.0.1. For more details, visit https://nvd.nist.gov/vuln/detail/CVE-2025-37730.
Read more Data Analytics