A vulnerability, which was classified as critical, has been found in Bonanza Plugin up to 1.0.0 on WordPress. Affected by this issue is the function xlo_optin_call. The manipulation leads to missing authorization.
This vulnerability is handled as CVE-2025-6730. The attack may be launched remotely. There is no exploit available.
A vulnerability has been found in Sky Addons for Elementor Plugin up to 3.1.4 on WordPress and classified as problematic. This vulnerability affects unknown code of the component Widget. The manipulation leads to cross site scripting.
This vulnerability was named CVE-2025-8216. The attack can be initiated remotely. There is no exploit available.
A vulnerability was found in Hydra Booking Plugin up to 1.1.18 on WordPress and classified as critical. This issue affects the function tfhb_reset_password_callback. The manipulation leads to missing authorization.
The identification of this vulnerability is CVE-2025-7689. The attack may be initiated remotely. There is no exploit available.
A vulnerability was found in Fan Page Plugin up to 1.0.1 on WordPress. It has been rated as problematic. Affected by this issue is some unknown functionality. The manipulation of the argument width leads to cross site scripting.
This vulnerability is handled as CVE-2025-6681. The attack may be launched remotely. There is no exploit available.
A vulnerability classified as problematic has been found in Magical Addons for Elementor Plugin up to 1.3.8 on WordPress. This affects an unknown part of the component Custom Attributes Handler. The manipulation leads to cross site scripting.
This vulnerability is uniquely identified as CVE-2025-8196. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability, which was classified as problematic, was found in YouTube Embed Plugin up to 10.3 on WordPress. Affected is an unknown function. The manipulation of the argument Instance leads to cross site scripting.
This vulnerability is traded as CVE-2025-6692. It is possible to launch the attack remotely. There is no exploit available.
React conquered XSS? Think again. That's the reality facing JavaScript developers in 2025, where attackers have quietly evolved their injection techniques to exploit everything from prototype pollution to AI-generated code, bypassing the very frameworks designed to keep applications secure.
Full 47-page guide with framework-specific defenses (PDF, free).
JavaScript conquered the web, but with
A cyberattack claimed by Ukrainian group Silent Crow and Belarusian Cyber-Partisans crippled Aeroflot ’s systems, canceling over 100 flights. On July 28, 2025, a cyberattack claimed by Ukrainian group Silent Crow and Belarusian Cyber-Partisans crippled the systems of Russian state-owned carrier Aeroflot. Over 100 flights were cancelled following the attack, which also caused delays. The […]