Latest Cybersecurity Vulnerabilities - Real-Time Updates
Stay ahead of cybersecurity threats with real-time updates on the latest vulnerabilities.
This page lists the 30 most recently disclosed Common Vulnerabilities and Exposures (CVEs),
including risk scores, affected vendors, and mitigation insights.
Keeping track of emerging threats helps security professionals protect their systems.
Latest 30 CVEs - Real-Time Cyber Threats
Cyber threats are constantly evolving, making real-time vulnerability tracking essential.
Below are the 30 most recently disclosed Common Vulnerabilities and Exposures (CVEs),
providing key details such as affected vendors, impact levels, and risk scores.
Each CVE entry includes a brief summary and a direct link to its full details,
enabling cybersecurity professionals, system administrators, and developers to quickly assess
and mitigate potential security risks.
-
CVE-2025-3431 Critical Security Advisory
The ZoomSounds - WordPress Wave Audio Player with Playlist plugin for WordPress is vulnerable to Arbitrary File Read in all versions up to, and including, 6.91 via the 'dzsap_download' action. This makes it possible for unauthenticated attackers to read the contents of arbitrary files on the server, which can contain sensitive information.
Score: 7.5/10
🔥 Very High Risk
Published on 08 Apr 2025, 08:15 UTC (only 39 minutes ago)
-
CVE-2025-31333 Security Flaw Alert
SAP S4CORE OData meta-data property is vulnerable to data tampering, due to which entity set could be externally modified by an attacker causing low impact on integrity of the application. Confidentiality and availability is not impacted.
Score: 4.3/10
⚠️ Medium Risk
Published on 08 Apr 2025, 08:15 UTC (only 39 minutes ago)
-
CVE-2025-31332 Critical Risk Assessment
Due to insecure file permissions in SAP BusinessObjects Business Intelligence Platform, an attacker who has local access to the system could modify files potentially disrupting operations or cause service downtime hence leading to a high impact on integrity and availability. However, this vulnerability does not disclose any sensitive data.
Score: 6.6/10
🔥 High Risk
Published on 08 Apr 2025, 08:15 UTC (only 39 minutes ago)
-
CVE-2025-31331 Security Flaw Alert
SAP NetWeaver allows an attacker to bypass authorization checks, enabling them to view portions of ABAP code that would normally require additional validation. Once logged into the ABAP system, the attacker can run a specific transaction that exposes sensitive system code without proper authorization. This vulnerability compromises the confidentiality.
Score: 4.3/10
⚠️ Medium Risk
Published on 08 Apr 2025, 08:15 UTC (only 39 minutes ago)
-
CVE-2025-31330 Critical Vulnerability Alert
SAP Landscape Transformation (SLT) allows an attacker with user privileges to exploit a vulnerability in the function module exposed via RFC. This flaw enables the injection of arbitrary ABAP code into the system, bypassing essential authorization checks. This vulnerability effectively functions as a backdoor, creating the risk of full system compromise, undermining the confidentiality, integrity and availability of the system.
Score: 9.9/10
☠️ Critical Risk
Published on 08 Apr 2025, 08:15 UTC (only 39 minutes ago)
-
CVE-2025-30017 Risk & Patch Advisory
Due to a missing authorization check, an authenticated attacker could upload a file as a template for solution documentation in SAP Solution Manager 7.1. After successful exploitation, an attacker can cause limited impact on the integrity and availability of the application.
Score: 4.4/10
⚠️ Medium Risk
Published on 08 Apr 2025, 08:15 UTC (only 39 minutes ago)
-
CVE-2025-30016 Emergency Security Advisory
SAP Financial Consolidation allows an unauthenticated attacker to gain unauthorized access to the Admin account. The vulnerability arises due to improper authentication mechanisms, due to which there is high impact on the Confidentiality, Integrity & Availability of the application.
Score: 9.8/10
☠️ Critical Risk
Published on 08 Apr 2025, 08:15 UTC (only 39 minutes ago)
-
CVE-2025-30015 Cybersecurity Threat Advisory
Due to incorrect memory address handling in ABAP SQL of SAP NetWeaver and ABAP Platform (Application Server ABAP), an authenticated attacker with high privileges could execute certain forms of SQL queries leading to manipulation of content in the output variable. This vulnerability has a low impact on the confidentiality, integrity and the availability of the application.
Score: 4.1/10
⚠️ Medium Risk
Published on 08 Apr 2025, 08:15 UTC (only 39 minutes ago)
-
CVE-2025-30014 Critical Security Advisory
SAP Capital Yield Tax Management has directory traversal vulnerability due to insufficient path validation. This could allow an attacker with low privileges to read files from directory which they don�t have access to, hence causing a high impact on confidentiality. Integrity and Availability are not affected.
Score: 7.7/10
🔥 Very High Risk
Published on 08 Apr 2025, 08:15 UTC (only 39 minutes ago)
-
CVE-2025-30013 High-Risk Security Alert
SAP ERP BW Business Content is vulnerable to OS Command Injection through certain function modules. These function modules, when executed with elevated privileges, improperly handle user input, allowing attacker to inject arbitrary OS commands. This vulnerability allows the execution of unintended commands on the underlying system, posing a significant security risk to the confidentiality, integrity and availability of the application.
Score: 6.7/10
🔥 High Risk
Published on 08 Apr 2025, 08:15 UTC (only 39 minutes ago)
-
CVE-2025-2882 Exploit & Mitigation Report
The GreenPay(tm) by Green.Money plugin for WordPress is vulnerable to Sensitive Information Exposure in versions between 3.0.0 and 3.0.9 through the publicly accessible phpinfo.php script. This makes it possible for unauthenticated attackers to view potentially sensitive information contained in the exposed file.
Score: 5.3/10
🚨 Significant Risk
Published on 08 Apr 2025, 08:15 UTC (only 39 minutes ago)
-
CVE-2025-27437 Security Flaw Alert
A Missing Authorization Check vulnerability exists in the Virus Scanner Interface of SAP NetWeaver Application Server ABAP. Because of this, an attacker authenticated as a non-administrative user can initiate a transaction, allowing them to access but not modify non-sensitive data without further authorization and with no effect on availability.
Score: 4.3/10
⚠️ Medium Risk
Published on 08 Apr 2025, 08:15 UTC (only 39 minutes ago)
-
CVE-2025-27435 Security Flaw Alert
Under specific conditions and prerequisites, an unauthenticated attacker could access customer coupon codes exposed in the URL parameters of the Coupon Campaign URL in SAP Commerce. This could allow the attacker to use the disclosed coupon code, hence posing a low impact on confidentiality and integrity of the application.
Score: 4.2/10
⚠️ Medium Risk
Published on 08 Apr 2025, 08:15 UTC (only 39 minutes ago)
-
CVE-2025-27429 Emergency Security Advisory
SAP S/4HANA allows an attacker with user privileges to exploit a vulnerability in the function module exposed via RFC. This flaw enables the injection of arbitrary ABAP code into the system, bypassing essential authorization checks. This vulnerability effectively functions as a backdoor, creating the risk of full system compromise, undermining the confidentiality, integrity and availability of the system.
Score: 9.9/10
☠️ Critical Risk
Published on 08 Apr 2025, 08:15 UTC (only 39 minutes ago)
-
CVE-2025-27428 Exploitable Vulnerability Warning
Due to directory traversal vulnerability, an authorized attacker could gain access to some critical information by using RFC enabled function module. Upon successful exploitation, they could read files from any managed system connected to SAP Solution Manager, leading to high impact on confidentiality. There is no impact on integrity or availability.
Score: 7.7/10
🔥 Very High Risk
Published on 08 Apr 2025, 08:15 UTC (only 39 minutes ago)
-
CVE-2025-26657 Significant Vulnerability Warning
SAP KMC WPC allows an unauthenticated attacker to remotely retrieve usernames by a simple parameter query which could expose sensitive information causing low impact on confidentiality of the application. This has no effect on integrity and availability.
Score: 5.3/10
🚨 Significant Risk
Published on 08 Apr 2025, 08:15 UTC (only 39 minutes ago)
-
CVE-2025-26654 Critical Risk Assessment
SAP Commerce Cloud (Public Cloud) does not allow to disable unencrypted HTTP (port 80) entirely, but instead allows a redirect from port 80 to 443 (HTTPS). As a result, Commerce normally communicates securely over HTTPS. However, the confidentiality and integrity of data sent on the first request before the redirect may be impacted if the client is configured to use HTTP and sends confidential data on the first request before the redirect.
Score: 6.8/10
🔥 High Risk
Published on 08 Apr 2025, 08:15 UTC (only 39 minutes ago)
-
CVE-2025-26653 Risk & Patch Advisory
SAP NetWeaver Application Server ABAP does not sufficiently encode user-controlled inputs, leading to Stored Cross-Site Scripting (XSS) vulnerability. This enables an attacker, without requiring any privileges, to inject malicious JavaScript into a website. When a user visits the compromised page, the injected script gets executed, potentially compromising the confidentiality and integrity within the scope of the victim�s browser. Availability is not impacted.
Score: 4.7/10
⚠️ Medium Risk
Published on 08 Apr 2025, 08:15 UTC (only 39 minutes ago)
-
CVE-2025-23186 Urgent Exploit Warning
In certain conditions, SAP NetWeaver Application Server ABAP allows an authenticated attacker to craft a Remote Function Call (RFC) request to restricted destinations, which can be used to expose credentials for a remote service. These credentials can then be further exploited to completely compromise the remote service, potentially resulting in a significant impact on the confidentiality, integrity, and availability of the application.
Score: 8.5/10
☠️ Severe Risk
Published on 08 Apr 2025, 08:15 UTC (only 39 minutes ago)
-
CVE-2025-3430 Cybersecurity Threat Advisory
The 3DPrint Lite plugin for WordPress is vulnerable to SQL Injection via the 'printer_text' parameter in all versions up to, and including, 2.1.3.6 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
Score: 4.9/10
⚠️ Medium Risk
Published on 08 Apr 2025, 07:15 UTC (only 1 hour ago)
What are CVEs?
A Common Vulnerability and Exposure (CVE) is a publicly disclosed cybersecurity flaw
that can be exploited by attackers to compromise software, systems, or networks.
The CVE system is maintained by The CVE Program
and provides a unique identifier for each vulnerability.
CVEs are assigned a severity score using the Common Vulnerability Scoring System (CVSS),
which helps security teams prioritize their response to threats.
Why Tracking CVEs is Important?
Keeping track of the latest CVEs is crucial for organizations and IT security professionals.
Cybercriminals frequently exploit unpatched vulnerabilities to launch ransomware attacks, data breaches, and system takeovers.
By staying updated with the latest threats, companies can apply security patches,
adjust firewall rules, and implement security policies to minimize risks.