Overview A critical Remote Code Execution (RCE) vulnerability, identified as CVE-2025-6389, has been discovered in the Sneeit Framework plugin for WordPress. This vulnerability affects all versions up to, and including, 8.3. Exploitation of this flaw allows unauthenticated attackers to execute arbitrary code on the server hosting the WordPress site. This poses a significant threat to website security and data integrity. Technical Details The vulnerability resides within the sneeit_articles_pagination_callback() function. This function improperly handles user-supplied input, directly passing it to the call_user_func() function. call_user_func() is a PHP function that calls a function specified by a string. By crafting malicious input, an…
-
-
Overview CVE-2025-59373 is a local privilege escalation vulnerability affecting the ASUS System Control Interface. This vulnerability arises from improper validation during the restore mechanism. An unprivileged user can exploit this flaw by copying files without proper validation into protected system directories. This can lead to arbitrary files being executed with SYSTEM privileges, potentially giving the attacker complete control over the affected system. Technical Details The vulnerability lies within the ASUS System Control Interface’s restore functionality. The process allows file restoration to specific locations on the system. However, a lack of sufficient input validation and sanitization allows an attacker to craft…
-
Overview A critical security vulnerability, identified as CVE-2025-9803, has been discovered in lunary-ai/lunary version 1.9.34. This vulnerability allows for potential account takeover due to improper authentication within the Google OAuth integration. The application’s failure to properly validate the ‘aud’ (audience) field in Google-issued access tokens allows attackers to leverage tokens intended for other malicious applications to gain unauthorized access to legitimate user accounts. This issue has been addressed in version 1.9.35. If you are running an affected version, immediate action is required. Technical Details The vulnerability stems from the lack of proper validation of the ‘aud’ (audience) claim within the…
-
Overview CVE-2025-65951 is a high-severity vulnerability affecting Inside Track / Entropy Derby, a research-grade horse-racing betting engine. This vulnerability allows the betting operator to bypass the intended delay enforced by the VDF (Verifiable Delay Function) timelock encryption system. By exploiting this flaw, the house can decrypt bet tickets immediately instead of performing the computationally expensive VDF evaluation, potentially leading to unfair advantages and manipulation of the betting process. The vulnerability has been addressed in commit 2d38d2f. Technical Details The vulnerability stems from the fact that bettors were able to pre-compute the entire Wesolowski VDF and include the vdfOutputHex value in…
-
Overview This blog post details a security vulnerability, identified as CVE-2025-65944, affecting the Sentry-Javascript SDK. This vulnerability could lead to the inadvertent leakage of sensitive HTTP headers, including the Cookie header, to a Sentry organization. If exploited, this could allow unauthorized access and privilege escalation. Technical Details CVE-2025-65944 exists in Sentry-Javascript versions 10.11.0 through 10.26.x. When a Node.js application utilizing the Sentry SDK has the sendDefaultPii: true configuration enabled, certain sensitive HTTP headers are unintentionally sent to Sentry. Specifically, the Cookie header, containing authentication tokens and session identifiers, is captured and stored within the associated Sentry organization’s traces. This occurs…
-
Overview A critical security vulnerability, identified as CVE-2025-64761, has been discovered in OpenBao, an open-source identity-based secrets management system. This vulnerability allows a privileged operator to escalate their own or another user’s permissions to root-equivalent within the system. This issue affects versions prior to 2.4.4. Immediate action is required to mitigate the risk. Technical Details The vulnerability resides within the identity group subsystem of OpenBao. Specifically, it can be exploited under the following conditions: An operator in the root namespace has access to the identity/groups endpoints. The operator does not have policy access. In this scenario, the operator could add…
-
Overview CVE-2025-65018 is a high-severity heap buffer overflow vulnerability affecting libpng, the reference library for handling PNG (Portable Network Graphics) images. The vulnerability resides within the simplified API function png_image_finish_read and occurs during the processing of 16-bit interlaced PNG images when configured for 8-bit output format. Specifically, attacker-crafted interlaced PNG files can trigger heap writes beyond the allocated buffer bounds, potentially leading to arbitrary code execution or denial-of-service. This vulnerability affects libpng versions 1.6.0 up to, but not including, 1.6.51. The issue has been addressed in libpng version 1.6.51. Technical Details The vulnerability stems from insufficient bounds checking within the…
-
Overview CVE-2025-64720 describes an out-of-bounds read vulnerability discovered in libpng, a widely used library for handling PNG image files. This vulnerability affects libpng versions 1.6.0 up to and including 1.6.50. Specifically, the issue resides in the png_image_read_composite function when processing palette images with the PNG_FLAG_OPTIMIZE_ALPHA flag enabled. Successful exploitation of this vulnerability could lead to denial of service or potentially arbitrary code execution. Technical Details The vulnerability stems from incorrect handling of background compositing during premultiplication within the palette compositing code in png_init_read_transformations. When PNG_FLAG_OPTIMIZE_ALPHA is active, the code violates the invariant component ≤ alpha × 257, which is required…
-
Overview CVE-2025-64506 is a medium-severity heap buffer over-read vulnerability affecting LIBPNG, the widely used library for handling PNG image files. Specifically, versions 1.6.0 through 1.6.50 are susceptible. The vulnerability resides in the png_write_image_8bit function when processing 8-bit images through the simplified write API with the convert_to_8bit option enabled. This can lead to denial-of-service or potentially other security consequences. The vulnerability was published on 2025-11-25T00:15:47.300. Technical Details The vulnerability arises because a conditional guard within the png_write_image_8bit function incorrectly allows 8-bit input data to enter code that expects 16-bit input. When processing 8-bit grayscale+alpha, RGB/RGBA images, or images with incomplete row…
-
Overview CVE-2025-64505 describes a heap buffer over-read vulnerability affecting libpng, the reference library for handling PNG (Portable Network Graphics) images. The vulnerability resides in the png_do_quantize function and can be triggered by processing specially crafted PNG files with malformed palette indices. This flaw allows attackers to potentially leak sensitive information or cause a denial-of-service. Technical Details The vulnerability stems from insufficient validation of palette indices within the png_do_quantize function. Specifically, the palette_lookup array bounds are not properly checked against externally supplied image data. An attacker can exploit this by crafting a PNG file containing out-of-range palette indices. When png_do_quantize attempts…