SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsISC provides a free analysis and warning service to thousands of Internet users and organizations, and is actively working with Internet Service Providers to fight back against the most malicious attackers. https://isc.sans.edu/about.html
Experimental Suspicious Domain Feed
Published: 2025-07-13
Last Updated: 2025-07-13 23:33:36 UTC
by Johannes Ullrich (Version: 1)
We have had a "newly registered domain" feed for a few years. This feed pulls data from ICANN's centralized zone data service (https://czds.icann.org) and TLS certificate transparency logs.
The ICANN CZDS is a good start, but it only offers data from top-level domains collaborating with ICANN. Missing are in particular country-level domains. Country-level zone files can be hard to come by, so we use TLS certificate transparency logs as a "cheap" alternative. Pretty much all domain registrars will, by default, create a "parked" website, and with that, they will make a certificate. Even if they do not, any halfway self-respecting phishing site will use TLS and register a certificate with a public certificate authority at one point. The TLS certificate transparency logs also help capture older domains.
Each day, we capture around 250,000 new domains using this system. But of course, we want to know which domains are used for malicious purposes. However, as the sample below shows, there are a lot of "odd" domain names ...
Read the full entry: https://isc.sans.edu/diary/Experimental+Suspicious+Domain+Feed/32102/
SSH Tunneling in Action: direct-tcp requests [Guest Diary]
Published: 2025-07-09
Last Updated: 2025-07-10 21:22:00 UTC
by Guy Bruneau (Version: 1)
[This is a Guest Diary by Sihui Neo, an ISC intern as part of the SANS.edu BACS program]
As part of the SANS degree program curriculum, I had the opportunity to set up a honeypot to monitor log activities mimicking a vulnerable server. I used the AWS free tier EC2 instance to set up the honeypot sensor in Japan and deployed Cowrie, a SSH and Telnet honeypot designed to log brute force attacks and shell interaction performed by an attacker.
In addition to the sensor setup, to allow me to easily look at all the logs in a single platform, I purchased a separate virtual private server and installed ELK SIEM, following the setup instructions from ISC mentor, Guy Bruneau’s github page. Then setup the sensor to send all logs to the SIEM server.
Since the setup of the honeypot, one of the interesting observations in logs was direct-tcp connection requests. More than 1000 different IPs within a month were seen to have made these requests and more than 75% were made to a single destination IP. In this post, I’ll cover how and why these connections are set up, and where the destination IP points to.
What did the logs look like? ...
Read the full entry: https://isc.sans.edu/diary/SSH+Tunneling+in+Action+directtcp+requests+Guest+Diary/32094/
More Free File Sharing Services Abuse
Published: 2025-07-16
Last Updated: 2025-07-16 13:00:28 UTC
by Xavier Mertens (Version: 1)
A few months ago, I wrote a diary about online services used to exfiltrate data. In this diary, I mentioned some well-known services. One of them was catbox[.]moe. Recently, I found a sample that was trying to download some payload from this website. I performed a quick research and collected more samples!
I collected (and stopped because it was a constant flood!) 612 URLs pointing to direct downloads (hxxps://files[.]catbox[.]moe/xxxxxx). Some were popular and used by multiple samples ...
Read the full entry: https://isc.sans.edu/diary/More+Free+File+Sharing+Services+Abuse/32112/
Keylogger Data Stored in an ADS (2025.07.15)
https://isc.sans.edu/diary/Keylogger+Data+Stored+in+an+ADS/32108/
DShield Honeypot Log Volume Increase (2025.07.14)
https://isc.sans.edu/diary/DShield+Honeypot+Log+Volume+Increase/32100/
Setting up Your Own Certificate Authority for Development: Why and How. (2025.07.09)
The list is assembled by pulling recent vulnerabilities from NIST NVD, Microsoft, Twitter mentions of vulnerabilities, ISC Diaries and Podcast, and the CISA list of known exploited vulnerabilities. There are also some unscored, but significant, vulnerabilities at the end. This includes vulnerabilities that have not been added to the NVD yet.
CVE-2025-47812 - Wing FTP Server before 7.4.4 allows injection of arbitrary Lua code into user session files, leading to remote code execution and total server compromise via anonymous FTP accounts.
Product: Wftpserver Wing FTP Server
CVSS Score: 10.0
** KEV since 2025-07-14 **
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-47812
ISC Podcast: https://isc.sans.edu/podcastdetail/9524
NVD References:
- https://www.rcesecurity.com/2025/06/what-the-null-wing-ftp-server-rce-cve-2025-47812/
- https://www.huntress.com/blog/wing-ftp-server-remote-code-execution-cve-2025-47812-exploited-in-wild
CVE-2025-42963 - SAP NetWeaver Application server for Java Log Viewer allows authenticated administrators to exploit unsafe Java object deserialization, enabling full operating system compromise and granting attackers complete control over the affected system, severely impacting confidentiality, integrity, and availability.
Product: SAP NetWeaver Application server
CVSS Score: 9.1
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-42963
NVD References: https://url.sap/sapsecuritypatchday
CVE-2025-42964 - SAP NetWeaver Enterprise Portal Administration is vulnerable to content upload attacks that could compromise system security.
Product: SAP NetWeaver Enterprise Portal Administration
CVSS Score: 9.1
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-42964
NVD References: https://url.sap/sapsecuritypatchday
CVE-2025-42966 - SAP NetWeaver XML Data Archiving Service is vulnerable to an insecure Java deserialization issue, potentially enabling an authenticated attacker with administrative privileges to compromise the confidentiality, integrity, and availability of the application.
Product: SAP NetWeaver XML Data Archiving Service
CVSS Score: 9.1
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-42966
NVD References: https://url.sap/sapsecuritypatchday
CVE-2025-42967 - SAP S/4HANA and SAP SCM Characteristic Propagation allows remote code execution, granting attackers full control of the system and compromising the confidentiality, integrity, and availability of the application.
Product: SAP S/4HANA
CVSS Score: 9.9
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-42967
NVD References: https://url.sap/sapsecuritypatchday
CVE-2025-42980 - SAP NetWeaver Enterprise Portal Federated Portal Network is vulnerable to a potential compromise of confidentiality, integrity, and availability when a privileged user uploads untrusted or malicious content.
Product: SAP NetWeaver Enterprise Portal
CVSS Score: 9.1
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-42980
NVD References: https://url.sap/sapsecuritypatchday
CVE-2025-20680 - Bluetooth driver may allow for out of bounds write, enabling local privilege escalation without user interaction, Patch ID: WCNCR00418044; Issue ID: MSV-3482.
Product: Mediatek Nbiot SDK
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-20680
NVD References: https://corp.mediatek.com/product-security-bulletin/July-2025
CVE-2025-20681 - The wlan AP driver allows for a possible out of bounds write leading to local privilege escalation without user interaction.
Product: Mediatek Software Development Kit
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-20681
NVD References: https://corp.mediatek.com/product-security-bulletin/July-2025
CVE-2025-20682, CVE-2025-20683, CVE-2025-20684 - Wlan AP driver has a potential out of bounds write vulnerabilities allowing for local privilege escalation without user interaction
Product: Mediatek Software Development Kit
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-20682
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-20683
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-20684
NVD References: https://corp.mediatek.com/product-security-bulletin/July-2025
CVE-2025-25270 - Phoenix Contact CHARX SEC-3xxx charging controllers are vulnerable to improper control of dynamically-managed code resources. An unauthenticated remote attacker can alter the device configuration in a way to get remote code execution as root with specific configurations
Product: Phoenixcontact Charx Sec-3000
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-25270
NVD References: https://certvde.com/de/advisories/VDE-2025-019
CVE-2025-40736 - SINEC NMS (All versions < V4.0) allows unauthorized modification of administrative credentials, potentially granting full control to unauthenticated attackers.
Product: Siemens SINEC NMS
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-40736
NVD References: https://cert-portal.siemens.com/productcert/html/ssa-078892.html
CVE-2025-21450 - Cryptographic issue occurs due to use of insecure connection method while downloading.
Product: Qualcomm GPS components
CVSS Score: 9.1
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-21450
NVD References: https://docs.qualcomm.com/product/publicresources/securitybulletin/july-2025-bulletin.html
CVE-2025-47981 - Heap-based buffer overflow in Windows SPNEGO Extended Negotiation allows an unauthorized attacker to execute code over a network.
Product: Microsoft Windows 10 1507
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-47981
NVD References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47981
CVE-2025-37103 - HPE Networking Instant On Access Points contain hard-coded login credentials, enabling unauthorized access and potential administrative control by remote attackers.
Product: HPE Networking Instant On Access Points
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-37103
NVD References: https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04894en_us&docLocale=en_US
CVE-2025-49535 - ColdFusion versions 2025.2, 2023.14, 2021.20 and earlier are affected by an XXE vulnerability allowing for a security feature bypass, leading to potential information disclosure or denial of service attacks.
Product: Adobe ColdFusion
CVSS Score: 9.3
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-49535
NVD References: https://helpx.adobe.com/security/products/coldfusion/apsb25-69.html
CVE-2025-27203 - Adobe Connect versions 24.0 and earlier are vulnerable to a Deserialization of Untrusted Data flaw allowing attackers to execute arbitrary code through user interaction.
Product: Adobe Connect
CVSS Score: 9.6
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-27203
NVD References: https://helpx.adobe.com/security/products/connect/apsb25-61.html
CVE-2025-49533 - Adobe Experience Manager versions 6.5.23.0 and earlier are vulnerable to arbitrary code execution due to a Deserialization of Untrusted Data flaw, without requiring user interaction.
Product: Adobe Experience Manager (MS)
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-49533
NVD References: https://helpx.adobe.com/security/products/aem-forms/apsb25-67.html
CVE-2025-7206 - D-Link DIR-825 2.10 is vulnerable to a critical remote stack-based buffer overflow in its httpd component, allowing for attacks if the Language argument is manipulated, but only affects unsupported products.
Product: D-Link DIR-825
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-7206
CVE-2025-3498 - Radiflow iSAP Smart Collector (CentOS 7 - VSAP 1.20) is vulnerable to unauthorized access and modification through unauthenticated REST APIs on TCP ports 8084 and 8086.
Product: Radiflow iSAP Smart Collector
CVSS Score: 9.9
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-3498
NVD References: https://www.cvcn.gov.it/cvcn/cve/CVE-2025-3498
CVE-2025-3499 - The device has two web servers with unauthenticated REST APIs vulnerable to OS command injection over TCP ports 8084 and 8086.
Product: Siemens RUGGEDCOM ROS
CVSS Score: 10.0
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-3499
NVD References: https://www.cvcn.gov.it/cvcn/cve/CVE-2025-3499
CVE-2025-6514 - mcp-remote is vulnerable to OS command injection when connecting to untrusted MCP servers through crafted input in the authorization_endpoint response URL.
Product: mcp-remote MCP
CVSS Score: 9.6
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-6514
CVE-2025-53546 - Folo’s feed content organization can be exploited through pull_request_target in .github/workflows/auto-fix-lint-format-commit.yml, granting attackers access to secrets and exfiltration of GITHUB_TOKEN with high privileges, fixed in commit 585c6a591440cd39f92374230ac5d65d7dd23d6a.
Product: GitHub Actions
CVSS Score: 9.1
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-53546
CVE-2025-53624 - Docusaurus gists plugin versions prior to 4.0.0 inadvertently expose GitHub Personal Access Tokens in production build artifacts.
Product: Docusaurus docusaurus-plugin-content-gists
CVSS Score: 10.0
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-53624
NVD References: https://github.com/webbertakken/docusaurus-plugin-content-gists/security/advisories/GHSA-qf34-qpr4-5pph
CVE-2025-23048 - Apache HTTP Server versions 2.4.35 through 2.4.63 are vulnerable to an access control bypass by trusted clients through TLS 1.3 session resumption.
Product: Apache HTTP Server mod_ssl
CVSS Score: 9.1
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-23048
NVD References: https://httpd.apache.org/security/vulnerabilities_24.html
CVE-2025-53371 - DiscordNotifications allows for DOS and SSRF vulnerabilities by sending requests to arbitrary URLs set via $wgDiscordIncomingWebhookUrl and $wgDiscordAdditionalIncomingWebhookUrls, potentially leading to RCE.
Product: MediaWiki DiscordNotifications
CVSS Score: 9.1
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-53371
CVE-2025-2523 - The Honeywell Experion PKS and OneWireless WDM components are vulnerable to an Integer Underflow, leading to Communication Channel Manipulation and potential remote code execution.
Product: Honeywell Experion PKS
CVSS Score: 9.4
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-2523
CVE-2025-52579 - Emerson ValveLink Products fail to securely handle sensitive information stored in memory, potentially exposing it in various scenarios.
Product: Emerson ValveLink Products
CVSS Score: 9.4
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-52579
NVD References:
- https://www.cisa.gov/news-events/ics-advisories/icsa-25-189-01
- https://www.emerson.com/en-us/support/security-notifications
CVE-2025-30023 - The vulnerable product allows authenticated users to execute remote code by exploiting a flaw in the communication protocol used between client and server.
Product: Nozomi Networks Guardian
CVSS Score: 9.0
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-30023
NVD References: https://www.axis.com/dam/public/9b/a5/72/cve-2025-30023pdf-en-US-485733.pdf
CVE-2025-52950 - Juniper Networks Security Director has a Missing Authorization vulnerability that allows an attacker to access unauthorized data via the web interface, potentially leading to further compromises in downstream managed devices.
Product: Juniper Networks Security Director
CVSS Score: 9.6
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-52950
NVD References: https://supportportal.juniper.net/JSA100054
CVE-2023-38036 - Ivanti Avalanche Manager before version 6.4.1 is vulnerable to a potential buffer overflow attack that could lead to service disruption or execution of arbitrary code by an unauthenticated attacker.
Product: Ivanti Avalanche
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-38036
NVD References: https://forums.ivanti.com/s/article/Security-Advisory-Avalanche-CVE-2023-38036
CVE-2025-7451 - iSherlock by Hgiga is vulnerable to OS Command Injection, allowing remote attackers to execute arbitrary commands on the server.
Product: Hgiga iSherlock
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-7451
NVD References:
- https://www.twcert.org.tw/en/cp-139-10238-f2bba-2.html
- https://www.twcert.org.tw/tw/cp-132-10237-9e0f7-1.html
CVE-2025-7574 - LB-LINK BL-AC1900, BL-AC2100_AZ3, BL-AC3600, BL-AX1800, BL-AX5400P and BL-WR9000 up to 20250702 are vulnerable to a critical improper authentication issue in the Web Interface, allowing remote attackers to launch attacks through the reboot/restore function of the file /cgi-bin/lighttpd.cgi.
Product: LB-LINK BL-AC1900, BL-AC2100_AZ3, BL-AC3600, BL-AX1800, BL-AX5400P, BL-WR9000
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-7574
CVE-2025-50756 - Wavlink WN535K3 20191010 is susceptible to command injection via the newpass parameter, enabling attackers to run malicious commands through a crafted request.
Product: Wavlink WN535K3
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-50756
CVE-2025-53825 - Dokploy allows unauthenticated users to execute arbitrary code and access sensitive environment variables through a preview deployment vulnerability, putting all public users at risk.
Product: Dokploy Platform as a Service (PaaS)
CVSS Score: 9.4
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-53825
CVE-2025-53833 - LaRecipe version 2.8.1 allows for Server-Side Template Injection (SSTI) and potential Remote Code Execution (RCE) in vulnerable configurations.
Product: LaRecipe
CVSS Score: 10.0
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-53833
NVD References: https://github.com/saleem-hadad/larecipe/security/advisories/GHSA-jv7x-xhv2-p5v2
CVE-2025-53835 - XWiki Rendering allows for XSS attacks in versions prior to 14.10 due to the `xdom+xml/current` syntax enabling insertion of arbitrary HTML content.
Product: XWiki Rendering
CVSS Score: 9.0
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-53835
NVD References: https://github.com/xwiki/xwiki-rendering/security/advisories/GHSA-w3wh-g4m9-783p
CVE-2025-53836 - XWiki Rendering allows for execution of forbidden macros in restricted mode due to a vulnerability in versions prior to 13.10.11, 14.4.7, and 14.10, requiring comments to be disabled for untrusted users until an upgrade is completed.
Product: XWiki Rendering
CVSS Score: 9.9
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-53836
NVD References: https://github.com/xwiki/xwiki-rendering/security/advisories/GHSA-32mf-57h2-64x9
CVE-2025-53890 - Pyload is vulnerable to an unsafe JavaScript evaluation exploit that allows unauthenticated attackers to execute malicious code, leading to potential session hijacking, credential theft, and remote code execution.
Product: Pyload Download Manager
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-53890
CVE-2025-3621 - ActADUR local server product, developed and maintained by ProTNS, is vulnerable to Remote Code Inclusion due to Command Injection, Hard-coded Credentials, Improper Authentication, and Binding to an Unrestricted IP Address.
Product: ProTNS ActADUR
CVSS Score: 9.6
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-3621
CVE-2025-52376 - Nexxt Solutions NCM-X1800 Mesh Router firmware UV1.2.7 and below is vulnerable to an authentication bypass in the /web/um_open_telnet.cgi endpoint, enabling attackers to remotely activate Telnet without authentication and gain administrative control with hard-coded credentials.
Product: Nexxt Solutions NCM-X1800 Mesh Router
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-52376
NVD References: https://github.com/Vagebondcur/nexxt-solutions-NCM-X1800-exploits/blob/main/CVE-2025-52376/writeup.md
CVE-2025-41236 - VMware ESXi, Workstation, and Fusion are vulnerable to an integer-overflow flaw in the VMXNET3 virtual network adapter, allowing local admins to execute code on the host.
Product: VMware ESXi
CVSS Score: 9.3
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-41236
NVD References: https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35877
CVE-2025-41237 - VMware ESXi, Workstation, and Fusion are vulnerable to integer-underflow in VMCI, allowing a local attacker to execute code on the host.
Product: VMware ESXi, Workstation, Fusion
CVSS Score: 9.3
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-41237
NVD References: https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35877
CVE-2025-41238 - VMware ESXi, Workstation, and Fusion are vulnerable to a heap-overflow issue in the PVSCSI controller allowing local administrative actors to execute code on the host or machine.
Product: VMware ESXi
CVSS Score: 9.3
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-41238
NVD References: https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35877
CVE-2025-50067 - Oracle Application Express (component: Strategic Planner Starter App) versions 24.2.4 and 24.2.5 allow a low privileged attacker with network access to compromise the system, potentially resulting in a complete takeover.
Product: Oracle Application Express
CVSS Score: 9.0
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-50067
NVD References: https://www.oracle.com/security-alerts/cpujul2025.html
CVE-2025-5333 - Remote attackers can execute arbitrary code in the context of the vulnerable service process.
Product: Microsoft
Product name: Windows Operating System
CVSS Score: 0
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-5333
ISC Podcast: https://isc.sans.edu/podcastdetail/9528
CVE-2025-4828 - The Support Board plugin for WordPress is vulnerable to arbitrary file deletion, allowing attackers to delete files on the server and potentially execute remote code.
Product: Schiocco Support Board
Active Installations: unknown
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-4828
NVD References: https://www.wordfence.com/threat-intel/vulnerabilities/id/33989611-8640-4c33-a34e-14f10cd7286d?source=cve
CVE-2025-4855 - The Support Board plugin for WordPress is susceptible to unauthorized data access and manipulation due to hardcoded default secrets, potentially allowing unauthenticated attackers to execute arbitrary actions and exploit CVE-2025-4828.
Product: Schiocco Support Board
Active Installations: unknown
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-4855
NVD References: https://www.wordfence.com/threat-intel/vulnerabilities/id/afd48bc8-d490-4a3e-97fc-70cf008cbf66?source=cve
CVE-2025-4606 - The Sala - Startup & SaaS WordPress Theme is vulnerable to privilege escalation through account takeover by allowing unauthenticated attackers to change any user's password, including administrators, in versions up to 1.1.4.
Product: The Sala Startup & SaaS WordPress Theme
Active Installations: unknown
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-4606
NVD References: https://www.wordfence.com/threat-intel/vulnerabilities/id/aa385a1f-1623-4f0a-bb2f-d4564b8f91bf?source=cve
CVE-2025-7401 - The Premium Age Verification / Restriction for WordPress plugin is vulnerable to arbitrary file read and write, allowing unauthenticated attackers to access sensitive information or execute remote code.
Product: WordPress Premium Age Verification / Restriction_plugin
Active Installations: unknown
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-7401
NVD References: https://www.wordfence.com/threat-intel/vulnerabilities/id/e0906a45-6d9b-48a0-98ae-df7b591a8848?source=cve
CVE-2020-36847 - The Simple-File-List Plugin for WordPress is vulnerable to Remote Code Execution via the rename function, allowing unauthenticated attackers to execute code on the server.
Product: WordPress Simple-File-List Plugin
Active Installations: 6,000+
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2020-36847
NVD References: https://www.wordfence.com/threat-intel/vulnerabilities/id/9eb835fd-6ebf-4162-856c-0366b663a07e?source=cve
CVE-2020-36849 - The AIT CSV import/export plugin for WordPress allows arbitrary file uploads, potentially enabling remote code execution.
Product: AIT CSV import/export plugin
Active Installations: Unknown. Update to version 3.0.4, or a newer patched version
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2020-36849
NVD References: https://www.wordfence.com/threat-intel/vulnerabilities/id/cece751c-400d-42b4-9438-950d5aca51fc?source=cve
CVE-2025-5393 & CVE-2025-5394 - Vulnerabilities in the Alone – Charity Multipurpose Non-profit WordPress Theme could be exploited by unauthenticated attackers to achieve remote code execution.
Product: Alone Charity Multipurpose Non-profit WordPress Theme
Active Installations: Unknown. Update to version 7.8.5, or a newer patched version
CVSS Score: 9.1
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-5393
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-5394
NVD References:
CVE-2025-7340, CVE-2025-7341, CVE-2025-7360 - Multiple vulnerabilities in the HT Contact Form Widget For Elementor Page Builder & Gutenberg Blocks & Form Builder plugin for WordPress could allow unauthenticated attackers to potentially execute remote code.
Product: HT Plugins HT Contact Form Widget For Elementor Page Builder & Gutenberg Blocks & Form Builder
Active Installations: 10,000+
CVSS Scores: 9.1 - 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-7340
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-7341
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-7360
NVD References:
The following vulnerability needs a manual review:
CVE-2025-25257 - An improper neutralization of special elements used in an SQL command ('SQL Injection') vulnerability [CWE-89] in FortiWeb may allow an unauthenticated attacker to execute unauthorized SQL code or commands via crafted HTTP or HTTPs requests.
Product: Fortinet FortiWeb Fabric Connector.
CVSS Score: 9.6
NVD: N/A
ISC Podcast: https://isc.sans.edu/podcastdetail/9524
NVD References:
- https://pwner.gg/blog/2025-07-10-fortiweb-fabric-rce
Is Your Exposure Management Strategy Aligned with Your Security Maturity? Choosing the right tools starts with understanding where your organization stands. Sevco Security describes how maturity impacts visibility, prioritization, and risk reduction. And, why a one-size-fits-all approach doesn’t work.
Join Picus and SANS on Wednesday, July 23 at 1:00 PM EDT Annual pentests show yesterday’s weaknesses once. Discover how leading SOCs shift from point-in-time testing to continuous penetration testing.
Survey | Detection & Response How effective is your threat detection strategy? Take 14 minutes to share your insights and help shape the 2025 SANS Detection & Response Report. Four $100 gift card winners will be selected.
Survey | The State of ICS/OT Cybersecurity Survey Help SANS understand the state of industrial cybersecurity in 2025 by taking our quick survey. Protecting critical infrastructure starts with data. BONUS: You could win 1 of 4 $100 Amazon gift cards.