The North Korean threat actors linked to the Contagious Interview campaign have been observed publishing another set of 67 malicious packages to the npm registry, underscoring ongoing attempts to poison the open-source ecosystem via software supply chain attacks.
The packages, per Socket, have attracted more than 17,000 downloads, and incorporate a previously undocumented version of a malware
A vulnerability, which was classified as problematic, was found in Companion Auto Update Plugin up to 3.9.2 on WordPress. This affects an unknown part. The manipulation of the argument update_delay_days leads to cross site scripting.
This vulnerability is uniquely identified as CVE-2025-4369. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability, which was classified as problematic, has been found in Restrict File Access Plugin up to 1.1.2 on WordPress. Affected by this issue is some unknown functionality. The manipulation leads to cross-site request forgery.
This vulnerability is handled as CVE-2025-7667. The attack may be launched remotely. There is no exploit available.
A vulnerability classified as problematic was found in Caido up to 0.48.x. Affected by this vulnerability is an unknown functionality of the component Toast UI. The manipulation leads to cross site scripting.
This vulnerability is known as CVE-2025-53834. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic has been found in Directus up to 11.8.x. Affected is an unknown function of the file /server/specs/oas of the component OpenAPI. The manipulation leads to information disclosure.
This vulnerability is traded as CVE-2025-53887. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Directus up to 11.8.x. It has been rated as critical. This issue affects some unknown processing. The manipulation leads to improper authentication.
The identification of this vulnerability is CVE-2025-53889. The attack may be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in dracoon up to 2.9.x. It has been declared as problematic. This vulnerability affects unknown code. The manipulation leads to cross site scripting.
This vulnerability was named CVE-2025-53839. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Directus up to 11.8.x. It has been classified as problematic. This affects an unknown part of the component WebHook Trigger Handler. The manipulation leads to information disclosure.
This vulnerability is uniquely identified as CVE-2025-53886. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Directus up to 11.8.x and classified as problematic. Affected by this issue is some unknown functionality of the component CRUD Event Handler. The manipulation leads to sensitive information in log files.
This vulnerability is handled as CVE-2025-53885. Local access is required to approach this attack. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in XWiki xwiki-rendering up to 14.9 and classified as problematic. Affected by this vulnerability is an unknown functionality of the component XHTML Syntax Handler. The manipulation leads to HTML injection.
This vulnerability is known as CVE-2025-53835. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, was found in Zyxel NWA50AX PRO up to 7.10(ACGE.2). Affected is an unknown function of the file file_upload-cgi of the component Configuration File Handler. The manipulation leads to path traversal.
This vulnerability is traded as CVE-2025-6265. It is possible to launch the attack remotely. There is no exploit available.
A vulnerability, which was classified as critical, has been found in XWiki xwiki-rendering up to 13.10.10/14.4.6/14.9. This issue affects some unknown processing. The manipulation leads to incorrect authorization.
The identification of this vulnerability is CVE-2025-53836. The attack may be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical was found in TimeLineOfficial Time-Line up to 1.0.4. This vulnerability affects unknown code. The manipulation leads to unrestricted upload.
This vulnerability was named CVE-2025-53891. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as very critical has been found in dokploy up to 0.24.2. This affects an unknown part of the component Environment Variable Handler. The manipulation leads to missing authorization.
This vulnerability is uniquely identified as CVE-2025-53825. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.