CVE-2024-11641 – VikBooking Hotel Booking Engine & PMS <= 1.7.2 - Cross-Site Request Forgery to Authenticated (Subscriber+) Arbitrary File Upload
https://notcve.org/view.php?id=CVE-2024-11641
25 Jan 2025 — Successful exploitation allows attackers with subscriber-level privileges and above to upload arbitrary files on the affected site's server which may make remote code execution possible. • https://plugins.trac.wordpress.org/changeset/3225861/vikbooking • CWE-352: Cross-Site Request Forgery (CSRF) •
CVE-2025-22612 – Coolify Vulnerable to Private Key Enumeration on Onboarding resulting in Remote Command Execution (RCE)
https://notcve.org/view.php?id=CVE-2025-22612
24 Jan 2025 — If the server configuration of IP / domain, port (most likely 22) and user (root) matches with the victim's server configuration, then the attacker can execute arbitrary commands on the remote server. • https://github.com/coollabsio/coolify/security/advisories/GHSA-wg8x-cgq4-vjxj • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-862: Missing Authorization •
CVE-2025-22611 – Coolify vulnerable to Privilege Escalation resulting in Remote Command Execution (RCE)
https://notcve.org/view.php?id=CVE-2025-22611
24 Jan 2025 — This allows the attacker to access the `Terminal` feature and execute remote commands. • https://github.com/coollabsio/coolify/security/advisories/GHSA-9w72-9qww-qj6g • CWE-862: Missing Authorization •
CVE-2025-22609 – Coolify Vulnerable to Private Key Hijacking / Remote Command Execution (RCE)
https://notcve.org/view.php?id=CVE-2025-22609
24 Jan 2025 — Coolify is an open-source and self-hostable tool for managing servers, applications, and databases. Prior to version 4.0.0-beta.361, the missing authorization allows any authenticated user to attach any existing private key on a coolify instance to his own server. If the server configuration of IP / domain, port (most likely 22) and user (root) matches with the victim's server configuration, then the attacker can use the `Terminal` feature and execute arbitrary commands on the victim's server. Version 4.0.0... • https://github.com/coollabsio/coolify/security/advisories/GHSA-3w2c-jfr2-9pg9 • CWE-862: Missing Authorization •
CVE-2025-22605 – Coolify OS Command Injection Vulnerability in SSH Command Generation
https://notcve.org/view.php?id=CVE-2025-22605
24 Jan 2025 — Starting in version 4.0.0-beta.18 and prior to 4.0.0-beta.253, a vulnerability in the execution of commands on remote servers allows an authenticated user to execute arbitrary code on the local Coolify container, gaining access to data and private keys or tokens of other users/teams. ... Additionally, attackers are able to modify the running software, potentially deploying malicious images to remote nodes or generally changing its behavior. • https://github.com/coollabsio/coolify/blob/40a239ddda3fc919f57a052d7b52b8e1a6696b81/bootstrap/helpers/remoteProcess.php#L70 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •
CVE-2025-0357 – WPBookit <= 1.6.9 - Unauthenticated Arbitrary File Upload
https://notcve.org/view.php?id=CVE-2025-0357
24 Jan 2025 — This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible. • https://documentation.iqonic.design/wpbookit/versions/change-log • CWE-434: Unrestricted Upload of File with Dangerous Type •
CVE-2024-57095
https://notcve.org/view.php?id=CVE-2024-57095
24 Jan 2025 — SQL injection vulnerability in Go-CMS v.1.1.10 allows a remote attacker to execute arbitrary code via a crafted payload. • https://gist.github.com/wjlin0/ff3ee8afb8f8001faff89bbc03805605 •
CVE-2025-24650 – WordPress Tourfic plugin <= 2.15.3 - Arbitrary File Upload vulnerability
https://notcve.org/view.php?id=CVE-2025-24650
24 Jan 2025 — This makes it possible for authenticated attackers, with Administrator-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible. • https://patchstack.com/database/wordpress/plugin/tourfic/vulnerability/wordpress-tourfic-plugin-2-15-3-arbitrary-file-upload-vulnerability?_s_id=cve • CWE-434: Unrestricted Upload of File with Dangerous Type •
CVE-2024-13545 – Bootstrap Ultimate <= 1.4.9 - Unauthenticated Limited Local File Inclusion
https://notcve.org/view.php?id=CVE-2024-13545
23 Jan 2025 — This makes it possible for unauthenticated attackers to include PHP files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where PHP files can be uploaded and included. If php://filter is enabled on the server, this issue may directly lead to Remote Code Execution. • https://themes.trac.wordpress.org/browser/bootstrap-ultimate/1.4.9/docs/index.php#L8 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •
CVE-2024-53588
https://notcve.org/view.php?id=CVE-2024-53588
23 Jan 2025 — A DLL hijacking vulnerability in iTop VPN v16.0 allows attackers to execute arbitrary code via placing a crafted DLL file into the path \ProgramData\iTop VPN\Downloader\vpn6. • https://github.com/JonathanLauener/iTop-privesc • CWE-427: Uncontrolled Search Path Element •