🔥 Trending CVEs - Last 90 Days
4,672 critical and high-severity vulnerabilities discovered in the last 90 days. Stay ahead of emerging threats with real-time CVE tracking and instant security alerts.
Critical & High-Risk CVEs
This vulnerability allows attackers to upload malicious files to WordPress sites using the Blogzee theme, potentially leading to complete system compr...
📅 43 days ago • Jan 22, 2026This vulnerability allows attackers to upload malicious files to WordPress sites using the Real Homes CRM plugin. Attackers can exploit this to execut...
📅 43 days ago • Jan 22, 2026This vulnerability allows attackers to upload arbitrary files to WordPress sites using the Blogmatic theme, potentially leading to remote code executi...
📅 43 days ago • Jan 22, 2026The WordPress News Event theme (versions up to 1.0.1) contains an unrestricted file upload vulnerability that allows attackers to upload arbitrary fil...
📅 43 days ago • Jan 22, 2026A command injection vulnerability in Wrangler's `pages deploy` command allows attackers who control the `--commit-hash` parameter to execute arbitrary...
📅 45 days ago • Jan 20, 2026A command injection vulnerability in Zoom Node Multimedia Routers allows meeting participants to execute arbitrary commands on the MMR system via netw...
📅 45 days ago • Jan 20, 2026CVE-2026-23836 is a critical remote code execution vulnerability in HotCRP conference review software. It allows authenticated users to execute arbitr...
📅 46 days ago • Jan 19, 2026This vulnerability in OpenStack keystonemiddleware allows authenticated attackers to forge identity headers like X-Is-Admin-Project, X-Roles, or X-Use...
📅 46 days ago • Jan 19, 2026This vulnerability allows authenticated attackers to upload malicious PHP files as attachments in InvoicePlane, which can then be executed remotely to...
📅 50 days ago • Jan 15, 2026This critical vulnerability allows attackers to bypass security controls and access the host filesystem, enabling unauthorized reading and modificatio...
📅 50 days ago • Jan 15, 2026A privilege escalation vulnerability in Automai Director v.25.2.0 allows remote attackers to gain elevated privileges on affected systems. This affect...
📅 53 days ago • Jan 12, 2026CVE-2026-22688 is a command injection vulnerability in WeKnora that allows authenticated users to inject malicious commands into MCP stdio settings, c...
📅 56 days ago • Jan 10, 2026This vulnerability allows authenticated attackers to execute arbitrary code on n8n workflow automation platforms, leading to full system compromise. I...
📅 58 days ago • Jan 8, 2026This vulnerability allows attackers to upload arbitrary files, including web shells, to WordPress sites using affected Themify themes. It enables remo...
📅 59 days ago • Jan 6, 2026This vulnerability allows low-privileged users in Coolify to view the root user's private SSH key, enabling them to authenticate as root on the server...
📅 60 days ago • Jan 5, 2026CVE-2025-59157 is a command injection vulnerability in Coolify's Git Repository field during project creation. Unauthenticated user input is not prope...
📅 60 days ago • Jan 5, 2026This vulnerability allows attackers to upload arbitrary files, including web shells, to servers running vulnerable versions of the MapSVG WordPress pl...
📅 67 days ago • Dec 29, 2025This vulnerability allows remote code execution through improper input validation in the IF AS Shortcode WordPress plugin. Attackers can inject malici...
📅 67 days ago • Dec 29, 2025StreamVault versions before 251126 contain a remote code execution vulnerability that allows attackers to execute arbitrary commands on the server. Ad...
📅 70 days ago • Dec 27, 2025This CVE describes a sandbox bypass vulnerability in n8n's Python Code Node that allows authenticated users with workflow creation/modification permis...
📅 70 days ago • Dec 26, 2025CVE-2025-66209 is an authenticated command injection vulnerability in Coolify's Database Backup functionality. It allows users with application/servic...
📅 73 days ago • Dec 23, 2025This CVE describes an elevation of privilege vulnerability in Microsoft's Custom Question Answering service. Attackers can exploit this to gain unauth...
📅 78 days ago • Dec 18, 2025This vulnerability allows attackers to upload malicious files to WordPress sites using the Motors theme. It affects all Motors theme installations fro...
📅 79 days ago • Dec 18, 2025ChurchCRM versions before 6.5.3 expose sensitive database credentials in error messages, allowing attackers to obtain database host, IP, username, and...
📅 79 days ago • Dec 17, 2025This vulnerability allows local unprivileged users on Windows systems to manipulate privileged DriveLock processes, enabling privilege escalation. Att...
📅 79 days ago • Dec 17, 2025An authenticated arbitrary file upload vulnerability in Pagekit CMS v1.0.18 allows attackers to upload malicious PHP files and execute arbitrary code ...
📅 79 days ago • Dec 17, 2025This critical vulnerability in Crafty Controller's Webhook Template component allows authenticated attackers to execute arbitrary code on the server t...
📅 80 days ago • Dec 17, 2025This vulnerability in Open edX Platform allows CourseLimitedStaffRole users to access and edit courses in Studio when granted organization-level permi...
📅 80 days ago • Dec 16, 2025CVE-2025-42880 is a critical remote code execution vulnerability in SAP Solution Manager where authenticated attackers can inject malicious code throu...
📅 87 days ago • Dec 9, 2025This critical vulnerability allows unauthenticated attackers to read and write sensitive files via AppEngine's HTTP-based file access feature. Attacke...
⚡ Yesterday • Mar 6, 2026CVE-2026-29058 is a critical remote code execution vulnerability in AVideo video-sharing platform where unauthenticated attackers can execute arbitrar...
⚡ Yesterday • Mar 6, 2026CVE-2026-28501 is an unauthenticated SQL injection vulnerability in WWBN AVideo that allows attackers to execute arbitrary SQL commands without authen...
⚡ Yesterday • Mar 6, 2026This is a critical remote code execution vulnerability in Microsoft Devices Pricing Program that allows attackers to execute arbitrary code on affecte...
⚡ Yesterday • Mar 5, 2026This vulnerability allows attackers to bypass allowlist restrictions in Nextcloud Talk by changing their display name to match an allowlisted user ID....
⚡ Yesterday • Mar 5, 2026OpenClaw versions before 2026.2.2 have a command injection vulnerability where attackers can bypass allowlist restrictions by using Windows cmd.exe me...
⚡ Yesterday • Mar 5, 2026Nginx UI versions before 2.3.3 expose an unauthenticated API endpoint that discloses encryption keys in response headers, allowing attackers to downlo...
⚡ Yesterday • Mar 5, 2026The Database for Contact Form 7, WPforms, Elementor forms WordPress plugin is vulnerable to PHP Object Injection via deserialization of untrusted inpu...
⚡ Yesterday • Mar 5, 2026A stack buffer overflow vulnerability in D-Link DIR-513 routers allows remote attackers to execute arbitrary code via the curTime parameter in the gof...
📅 2 days ago • Mar 4, 2026OpenSTAManager versions 2.9.8 and earlier contain an authentication bypass and privilege escalation vulnerability that allows attackers to arbitrarily...
📅 3 days ago • Mar 3, 2026This CVE describes a remote command injection vulnerability in D-Link DIR-868L routers via the SSDP service. Attackers can execute arbitrary operating...
📅 3 days ago • Mar 3, 2026An authentication bypass vulnerability in Weintek cMT-3072XH2 HMI devices allows unauthorized attackers to perform administrative actions using servic...
📅 3 days ago • Mar 3, 2026A heap-based buffer overflow vulnerability in libbiosig's Intan CLP parsing allows arbitrary code execution when processing malicious files. This affe...
📅 3 days ago • Mar 3, 2026OpenMQ's management service ships with default admin credentials (admin/admin) that are never forced to change, allowing remote attackers who can reac...
📅 4 days ago • Mar 3, 2026This vulnerability allows unauthenticated attackers to create administrator accounts on WordPress sites using the User Registration & Membership plugi...
📅 4 days ago • Mar 3, 2026The All-in-One Microsoft 365 & Entra ID / Azure AD SSO Login plugin for WordPress has an authentication bypass vulnerability that allows unauthenticat...
📅 4 days ago • Mar 3, 2026This vulnerability allows remote code execution in Chamilo LMS by exploiting unfiltered parameter evaluation in SOAP requests. Attackers can execute a...
📅 4 days ago • Mar 2, 2026SimStudio versions below 0.5.74 have MongoDB tool endpoints that accept arbitrary connection parameters without authentication or host restrictions. T...
📅 4 days ago • Mar 2, 2026U-Office Force software has an insecure deserialization vulnerability that allows unauthenticated attackers to remotely execute arbitrary code on affe...
📅 5 days ago • Mar 2, 2026CVE-2026-2999 is a critical remote code execution vulnerability in IDExpert Windows Logon Agent that allows unauthenticated attackers to force the sys...
📅 5 days ago • Mar 2, 2026CVE-2026-27975 is an unauthenticated remote code execution vulnerability in Ajenti server admin panel. Attackers can execute arbitrary code on servers...
📅 9 days ago • Feb 26, 2026Why Track Trending CVEs?
Stay ahead of emerging threats: Newly discovered vulnerabilities pose the highest risk as attackers race to exploit them before patches are deployed. Trending CVEs represent the most critical security issues requiring immediate attention from security teams worldwide.
Prioritize remediation efforts: With thousands of CVEs published annually, security teams need to focus on the most recent and severe threats first. Our trending CVE dashboard highlights critical and high-severity vulnerabilities from the past 7, 30, or 90 days, helping you prioritize patching efforts.
🚀 Automated Trending CVE Monitoring
- Scan your servers to detect packages affected by trending CVEs
- Receive instant email alerts when critical vulnerabilities are discovered
- Dashboard shows CVE age, severity, CVSS scores, and affected systems
- Filter by time period (7/30/90 days) to focus on recent threats